etho

Holy Equals-to-the-Apostles Methodius (885) and Cyril (869), first teachers of the Slavs

The two saints were brothers, born in Thessalonica. St Methodius, the elder brother, served as a soldier for ten years before becoming a monk. Cyril was librarian at the Hagia Sophia in Constantinople; then he too became a monk.   Their first missionary work was not among the Slavs: When the king of the Khazars (a Mongol people who then inhabited much of what is now Russia) petitioned the Emperor Michael to sent teachers to instruct his people, the Emperor chose Cyril and Methodius as his emissaries. They converted the Khazar king to the Christian faith, along with many of his nobles and commoners.   When King Rostislav of Moravia likewise sought teachers of the Christian faith, Cyril and Methodius were again sent forth. This time they devised an alphabet for the Slavic language and used it to translate many of the Greek service books into the language of the people. (In theory, the Orthodox people have always been privileged to hear the Church's services in their own tongue, though often attachment to dead languages has prevented this ideal from becoming reality.) Both brothers were repeatedly attacked by Germanic priests of the region, who opposed the use of the common tongue in the liturgy. At different times, both brothers were forced to appeal for exoneration and protection to the Pope of Rome, who supported them warmly each time.   After the two Saints reposed, attacks on their work continued, and their disciples were eventually driven from Moravia. The disciples, fleeing southward, found a warmer welcome among the southern Slavic peoples, and their work bore much fruit in Bulgaria (including modern-day Serbia) and other countries. And, of course, the alphabet that they devised, called Cyrillic after St Cyril, remains the standard alphabet of both the Slavonic service books of the Church and the Slavic languages of today.




etho

St Methodios, Patriarch of Constantinople (847)

He was born to wealthy parents in Syracuse of Sicily. He entered monastic life and in time became a priest in the service of Patriarch Nikephoros. Because of his great and well-known zeal for the holy icons, he was cruelly persecuted by a succession of iconoclast emperors. Around 815, he was sent as an ambassador to Rome on behalf of the Patriarch, who had been exiled by the Emperor Leo the Armenian. When he returned to Constantinople upon Leo's death, he was immediately exiled and imprisoned by Leo's successor, Michael the Stutterer. Upon Michael's death he was freed for a short time, but soon the Emperor Theophilus had him exiled to an island where, says the Prologue, "he spent seven years in prison with two common robbers, in damp conditions, without light and without sufficient food, as if in a grave." When the pious Empress Theodora restored the Empire to Orthodoxy, he was freed and elevated to Patriarch of Constantinople. On the Sunday of Orthodoxy, we commemorate the restoration of the Holy Icons by Theodora and Methodios. Despite many attacks by heretics while he was Patriarch, he served faithfully and reposed in peace.




etho

Our Holy Mother Methodia of Kimolos (1865)

She was born in 1865 on the island of Kimolos. Against her own wishes, her parents married her to a sailor, but he drowned soon after their wedding. Though she grieved for him, she also took his loss as a sign that she was to follow the path that she had always most deeply desired — so she entered monastic life, receiving the name Methodia. She then shut herself in a small cell where she gave herself to prayer without reservation, hardly ever leaving. She prayed virtually around the clock, and kept strict fast every day but Saturday and Sunday, on which days she would leave her cell to partake of the Mysteries. She received no visitors at all during Lent; at other times, she would receive only women. She became known throughout her region as a counselor and healer. She reposed in peace at the age of forty-two, in 1908.




etho

Holy Equals-to-the-Apostles Methodius (885) and Cyril (869), first teachers of the Slavs

The two saints were brothers, born in Thessalonica. St Methodius, the elder brother, served as a soldier for ten years before becoming a monk. Cyril was librarian at the Hagia Sophia in Constantinople; then he too became a monk.   Their first missionary work was not among the Slavs: When the king of the Khazars (a Mongol people who then inhabited much of what is now Russia) petitioned the Emperor Michael to sent teachers to instruct his people, the Emperor chose Cyril and Methodius as his emissaries. They converted the Khazar king to the Christian faith, along with many of his nobles and commoners.   When King Rostislav of Moravia likewise sought teachers of the Christian faith, Cyril and Methodius were again sent forth. This time they devised an alphabet for the Slavic language and used it to translate many of the Greek service books into the language of the people. (In theory, the Orthodox people have always been privileged to hear the Church's services in their own tongue, though often attachment to dead languages has prevented this ideal from becoming reality.) Both brothers were repeatedly attacked by Germanic priests of the region, who opposed the use of the common tongue in the liturgy. At different times, both brothers were forced to appeal for exoneration and protection to the Pope of Rome, who supported them warmly each time.   After the two Saints reposed, attacks on their work continued, and their disciples were eventually driven from Moravia. The disciples, fleeing southward, found a warmer welcome among the southern Slavic peoples, and their work bore much fruit in Bulgaria (including modern-day Serbia) and other countries. And, of course, the alphabet that they devised, called Cyrillic after St Cyril, remains the standard alphabet of both the Slavonic service books of the Church and the Slavic languages of today.




etho

St Methodios, Patriarch of Constantinople (847)

He was born to wealthy parents in Syracuse of Sicily. He entered monastic life and in time became a priest in the service of Patriarch Nikephoros. Because of his great and well-known zeal for the holy icons, he was cruelly persecuted by a succession of iconoclast emperors. Around 815, he was sent as an ambassador to Rome on behalf of the Patriarch, who had been exiled by the Emperor Leo the Armenian. When he returned to Constantinople upon Leo's death, he was immediately exiled and imprisoned by Leo's successor, Michael the Stutterer. Upon Michael's death he was freed for a short time, but soon the Emperor Theophilus had him exiled to an island where, says the Prologue, "he spent seven years in prison with two common robbers, in damp conditions, without light and without sufficient food, as if in a grave." When the pious Empress Theodora restored the Empire to Orthodoxy, he was freed and elevated to Patriarch of Constantinople. On the Sunday of Orthodoxy, we commemorate the restoration of the Holy Icons by Theodora and Methodios. Despite many attacks by heretics while he was Patriarch, he served faithfully and reposed in peace.




etho

Hieromartyr Methodius, bishop of Patara/Olympia (312)

Noted in his own time for his wisdom and virtue, he was called Eubolos, meaning "of good counsel." He was among the first to oppose the heretical writings of Origen. He was bishop in Patara (according to some sources) or Olympia (according to others), then of Tyre in Phoenecia. Under the Emperor Maximinus, he was attacked by the pagans and received the crown of martyrdom in Chalkis in Greece.




etho

Holy Equals-to-the-Apostles Methodius (885) and Cyril (869), first teachers of the Slavs - May 11th

The two saints were brothers, born in Thessalonica. St Methodius, the elder brother, served as a soldier for ten years before becoming a monk. Cyril was librarian at the Hagia Sophia in Constantinople; then he too became a monk.   Their first missionary work was not among the Slavs: When the king of the Khazars (a Mongol people who then inhabited much of what is now Russia) petitioned the Emperor Michael to sent teachers to instruct his people, the Emperor chose Cyril and Methodius as his emissaries. They converted the Khazar king to the Christian faith, along with many of his nobles and commoners.   When King Rostislav of Moravia likewise sought teachers of the Christian faith, Cyril and Methodius were again sent forth. This time they devised an alphabet for the Slavic language and used it to translate many of the Greek service books into the language of the people. (In theory, the Orthodox people have always been privileged to hear the Church's services in their own tongue, though often attachment to dead languages has prevented this ideal from becoming reality.) Both brothers were repeatedly attacked by Germanic priests of the region, who opposed the use of the common tongue in the liturgy. At different times, both brothers were forced to appeal for exoneration and protection to the Pope of Rome, who supported them warmly each time.   After the two Saints reposed, attacks on their work continued, and their disciples were eventually driven from Moravia. The disciples, fleeing southward, found a warmer welcome among the southern Slavic peoples, and their work bore much fruit in Bulgaria (including modern-day Serbia) and other countries. And, of course, the alphabet that they devised, called Cyrillic after St Cyril, remains the standard alphabet of both the Slavonic service books of the Church and the Slavic languages of today.




etho

St Methodios, Patriarch of Constantinople (847)

He was born to wealthy parents in Syracuse of Sicily. He entered monastic life and in time became a priest in the service of Patriarch Nikephoros. Because of his great and well-known zeal for the holy icons, he was cruelly persecuted by a succession of iconoclast emperors. Around 815, he was sent as an ambassador to Rome on behalf of the Patriarch, who had been exiled by the Emperor Leo the Armenian. When he returned to Constantinople upon Leo's death, he was immediately exiled and imprisoned by Leo's successor, Michael the Stutterer. Upon Michael's death he was freed for a short time, but soon the Emperor Theophilus had him exiled to an island where, says the Prologue, "he spent seven years in prison with two common robbers, in damp conditions, without light and without sufficient food, as if in a grave." When the pious Empress Theodora restored the Empire to Orthodoxy, he was freed and elevated to Patriarch of Constantinople. On the Sunday of Orthodoxy, we commemorate the restoration of the Holy Icons by Theodora and Methodios. Despite many attacks by heretics while he was Patriarch, he served faithfully and reposed in peace.




etho

Holy Equals-to-the-Apostles Methodius (885) and Cyril (869), first teachers of the Slavs - May 11th

The two saints were brothers, born in Thessalonica. St Methodius, the elder brother, served as a soldier for ten years before becoming a monk. Cyril was librarian at the Hagia Sophia in Constantinople; then he too became a monk.   Their first missionary work was not among the Slavs: When the king of the Khazars (a Mongol people who then inhabited much of what is now Russia) petitioned the Emperor Michael to sent teachers to instruct his people, the Emperor chose Cyril and Methodius as his emissaries. They converted the Khazar king to the Christian faith, along with many of his nobles and commoners.   When King Rostislav of Moravia likewise sought teachers of the Christian faith, Cyril and Methodius were again sent forth. This time they devised an alphabet for the Slavic language and used it to translate many of the Greek service books into the language of the people. (In theory, the Orthodox people have always been privileged to hear the Church's services in their own tongue, though often attachment to dead languages has prevented this ideal from becoming reality.) Both brothers were repeatedly attacked by Germanic priests of the region, who opposed the use of the common tongue in the liturgy. At different times, both brothers were forced to appeal for exoneration and protection to the Pope of Rome, who supported them warmly each time.   After the two Saints reposed, attacks on their work continued, and their disciples were eventually driven from Moravia. The disciples, fleeing southward, found a warmer welcome among the southern Slavic peoples, and their work bore much fruit in Bulgaria (including modern-day Serbia) and other countries. And, of course, the alphabet that they devised, called Cyrillic after St Cyril, remains the standard alphabet of both the Slavonic service books of the Church and the Slavic languages of today.




etho

St Methodios, Patriarch of Constantinople (847)

He was born to wealthy parents in Syracuse of Sicily. He entered monastic life and in time became a priest in the service of Patriarch Nikephoros. Because of his great and well-known zeal for the holy icons, he was cruelly persecuted by a succession of iconoclast emperors. Around 815, he was sent as an ambassador to Rome on behalf of the Patriarch, who had been exiled by the Emperor Leo the Armenian. When he returned to Constantinople upon Leo's death, he was immediately exiled and imprisoned by Leo's successor, Michael the Stutterer. Upon Michael's death he was freed for a short time, but soon the Emperor Theophilus had him exiled to an island where, says the Prologue, "he spent seven years in prison with two common robbers, in damp conditions, without light and without sufficient food, as if in a grave." When the pious Empress Theodora restored the Empire to Orthodoxy, he was freed and elevated to Patriarch of Constantinople. On the Sunday of Orthodoxy, we commemorate the restoration of the Holy Icons by Theodora and Methodios. Despite many attacks by heretics while he was Patriarch, he served faithfully and reposed in peace.




etho

Saintly Missions, Methods, and Matters (Mt 4:18-23)

On the second Sunday after Pentecost, the Orthodox Church celebrates local Saints of a particular land. Fr Thomas reminds us that Saints teach us in their way of life that they are devoted to accomplish a divine mission, that they have become holy through their practice of the Orthodox way of prayer, and most importantly, that they love God above all else. (Second Sunday after Pentecost - All Saints of North America)




etho

Parc Cenedlaethol Eryri i gael gwared ar 'Snowdonia' o'i logo

Mae Awdurdod Parc Cenedlaethol Eryri wedi pleidleisio o blaid logo newydd sy'n adlewyrchu penderfyniad cynharach i ollwng 'Snowdonia' o'i enw.




etho

Cyhoeddi prif swyddogion Eisteddfod Genedlaethol Sir Benfro 2026

John Davies sydd wedi cael wedi ei benodi yn gadeirydd pwyllgor gwaith Eisteddfod Genedlaethol Sir Benfro 2026.




etho

An OCR Free Method for Word Spotting in Printed Documents: the Evaluation of Different Feature Sets

An OCR free word spotting method is developed and evaluated under a strong experimental protocol. Different feature sets are evaluated under the same experimental conditions. In addition, a tuning process in the document segmentation step is proposed which provides a significant reduction in terms of processing time. For this purpose, a complete OCR-free method for word spotting in printed documents was implemented, and a document database containing document images and their corresponding ground truth text files was created. A strong experimental protocol based on 800 document images allows us to compare the results of the three feature sets used to represent the word image.




etho

Risk evaluation method of electronic bank investment based on random forest

Aiming at the problems of high error rate, low evaluation accuracy and low investment return in traditional methods, a random forest-based e-bank investment risk evaluation method is proposed. First, establish a scientific e-bank investment risk evaluation index system. Then, G1-COWA combined weighting method is used to calculate the weights of each index. Finally, the e-bank investment risk evaluation index data is taken as the input vector, and the e-bank investment risk evaluation result is taken as the output vector. The random forest model is established and the result of e-banking investment risk evaluation is obtained. The experimental results show that the maximum relative error rate of this method is 4.32%, the evaluation accuracy range is 94.5~98.1%, and the maximum return rate of e-banking investment is 8.32%. It shows that this method can accurately evaluate the investment risk of electronic banking.




etho

Research on Weibo marketing advertising push method based on social network data mining

The current advertising push methods have low accuracy and poor advertising conversion effects. Therefore, a Weibo marketing advertising push method based on social network data mining is studied. Firstly, establish a social network graph and use graph clustering algorithm to mine the association relationships of users in the network. Secondly, through sparsisation processing, the association between nodes in the social network graph is excavated. Then, evaluate the tightness between user preferences and other nodes in the social network, and use the TF-IDF algorithm to extract user interest features. Finally, an attention mechanism is introduced to improve the deep learning model, which matches user interests with advertising domain features and outputs push results. The experimental results show that the push accuracy of this method is higher than 95%, with a maximum advertising click through rate of 82.7% and a maximum advertising conversion rate of 60.7%.




etho

A method for selecting multiple logistics sites in cross-border e-commerce based on return uncertainty

To reduce the location cost of cross-border e-commerce logistics sites, this article proposes a multi-logistics site location method based on return uncertainty. Firstly, a site selection model is established with the objective function of minimising site construction costs, transportation costs, return costs, and operating costs, and the constraint conditions of return recovery costs and delayed pick-up time; Then, using the Monte Carlo method to simulate the number of returned items, and using an improved chicken swarm algorithm based on simulated annealing, the cross-border e-commerce multi-logistics site location model is solved to complete the location selection. Experimental results show that this method can effectively reduce the related costs of cross-border e-commerce multi-logistics site selection. After applying this method, the total cost of multi-logistics site selection is 19.4 million yuan, while the total cost of the five comparative methods exceeds 20 million yuan.




etho

Risk-based operation of plug-in electric vehicles in a microgrid using downside risk constraints method

To achieve the benefits as much as possible, it is required to identify the available PEV capacity and prepare scheduling plans based on that. The analysis revealed that the risk-based scheduling of the microgrid could reduce the financial risk completely from $9.89 to $0.00 and increases the expected operation cost by 24% from $91.38 to $112.94, in turn. This implies that the risk-averse decision-maker tends to spend more money to reduce the expected risk-in-cost by using the proposed downside risk management technique. At the end, by the help of fuzzy satisfying method, the suitable risk-averse strategy is determined for the studied case.




etho

An effective differential privacy protection method of location data based on perturbation loss constraint

Differential privacy is usually applied to location privacy protection scenarios, which confuses real data by adding interference noise to location points to achieve the purpose of protecting privacy. However, this method can result in a significant amount of redundant noisy data and impact the accuracy of the location. Considering the security and practicability of location data, an effective differential privacy protection method of location data based on perturbation loss constraint is proposed. After applying the Laplace mechanism under the condition of differential privacy to perturb the location data, the Savitzky-Golay filtering technology is used to correct the data with noise, and the data with large deviation and low availability is optimised. The introduction of Savitzky-Golay filtering mechanism in differential privacy can reduce the error caused by noise data while protecting user privacy. The experiments results indicate that the scheme improves the practicability of location data and is feasible.




etho

Emotion recognition method for multimedia teaching classroom based on convolutional neural network

In order to further improve the teaching quality of multimedia teaching in school daily teaching, a classroom facial expression emotion recognition model is proposed based on convolutional neural network. VGGNet and CliqueNet are used as the basic expression emotion recognition methods, and the two recognition models are fused while the attention module CBAM is added. Simulation results show that the designed classroom face expression emotion recognition model based on V-CNet has high recognition accuracy, and the recognition accuracy on the test set reaches 93.11%, which can be applied to actual teaching scenarios and improve the quality of classroom teaching.




etho

Natural language processing-based machine learning psychological emotion analysis method

To achieve psychological and emotional analysis of massive internet chats, researchers have used statistical methods, machine learning, and neural networks to analyse the dynamic tendencies of texts dynamically. For long readers, the author first compares and explores the differences between the two psychoanalysis algorithms based on the emotion dictionary and machine learning for simple sentences, then studies the expansion algorithm of the emotion dictionary, and finally proposes an extended text psychoanalysis algorithm based on conditional random field. According to the experimental results, the mental dictionary's accuracy, recall, and F-score based on the cognitive understanding of each additional ten words were calculated. The optimisation decreased, and the memory and F-score improved. An <i>F</i>-value greater than 1, which is the most effective indicator for evaluating the effectiveness of a mental analysis problem, can better demonstrate that the algorithm is adaptive in the literature dictionary. It has been proven that this scheme can achieve good results in analysing emotional tendencies and has higher efficiency than ordinary weight-based psychological sentiment analysis algorithms.




etho

A Tools-Based Approach to Teaching Data Mining Methods




etho

Using the Work System Method with Freshman Information Systems Students




etho

The Influence of Teaching Methods on Learners’ Perception of E-safety

Aim/Purpose: The traditional method of teaching e-safety by lecturing is not very effective. Despite learners often being equipped with the right knowledge, they reject the need to act accordingly. There is a need to improve the way digital e-safety is taught. Background: The study compares four different teaching styles, examining how each affected the way students perceive a range of e-safety keywords and consequently the way they approach this issue. Methodology: The semantic differential technique was used to carry out the research. Students completed a semantic differential questionnaire before and after lessons. A total of 405 first year undergraduates took part in the study. Contribution: The paper contributes to the debate on appropriate methods for teaching e-safety, with an aim to influence learners’ attitudes. Findings: Experience-based learning seems to be very effective, confronting students with an e-safety situation and providing them with a negative experience. This teaching method had the biggest influence on students who were deceived by the prepared e-safety risk situation. Recommendations for Practitioners: E-safety instruction can be enhanced by ensuring that lessons provide students with a personal experience. Recommendation for Researchers: The semantic differential technique can be used to measure changes in learners’ attitudes during the teaching process. Impact on Society: Our findings may bring improvements to the way e-safety topics are taught, which could, in turn, evoke in learners a more positive e-safety attitude and a desire to improve their e-safety behavior. Future Research: More research needs to be carried out to examine how the experiential learning method affects the attitudes of younger learners (primary, middle, and high school students).




etho

Generating a Template for an Educational Software Development Methodology for Novice Computing Undergraduates: An Integrative Review

Aim/Purpose: The teaching of appropriate problem-solving techniques to novice learners in undergraduate software development education is often poorly defined when compared to the delivery of programming techniques. Given the global need for qualified designers of information technology, the purpose of this research is to produce a foundational template for an educational software development methodology grounded in the established literature. This template can be used by third-level educators and researchers to develop robust educational methodologies to cultivate structured problem solving and software development habits in their students while systematically teaching the intricacies of software creation. Background: While software development methodologies are a standard approach to structured and traceable problem solving in commercial software development, educational methodologies for inexperienced learners remain a neglected area of research due to their assumption of prior programming knowledge. This research aims to address this deficit by conducting an integrative review to produce a template for such a methodology. Methodology: An integrative review was conducted on the key components of Teaching Software Development Education, Problem Solving, Threshold Concepts, and Computational Thinking. Systematic reviews were conducted on Computational Thinking and Software Development Education by employing the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) process. Narrative reviews were conducted on Problem Solving and Threshold Concepts. Contribution: This research provides a comprehensive analysis of problem solving, software development education, computational thinking, and threshold concepts in computing in the context of undergraduate software development education. It also synthesizes review findings from these four areas and combines them to form a research-based foundational template methodology for use by educators and researchers interested in software development undergraduate education. Findings: This review identifies seven skills and four concepts required by novice learners. The skills include the ability to perform abstraction, data representation, decomposition, evaluation, mental modeling, pattern recognition, and writing algorithms. The concepts include state and sequential flow, non-sequential flow control, modularity, and object interaction. The teaching of these skills and concepts is combined into a spiral learning framework and is joined by four development stages to guide software problem solving: understanding the problem, breaking into tasks, designing, coding, testing, and integrating, and final evaluation and reflection. This produces the principal finding, which is a research-based foundational template for educational software development methodologies. Recommendations for Practitioners: Focusing introductory undergraduate computing courses on a programming syllabus without giving adequate support to problem solving may hinder students in their attainment of development skills. Therefore, providing a structured methodology is necessary as it equips students with essential problem-solving skills and ensures they develop good development practices from the start, which is crucial to ensuring undergraduate success in their studies and beyond. Recommendation for Researchers: The creation of educational software development methodologies with tool support is an under-researched area in undergraduate education. The template produced by this research can serve as a foundational conceptual model for researchers to create concrete tools to better support computing undergraduates. Impact on Society: Improving the educational value and experience of software development undergraduates is crucial for society once they graduate. They drive innovation and economic growth by creating new technologies, improving efficiency in various industries, and solving complex problems. Future Research: Future research should concentrate on using the template produced by this research to create a concrete educational methodology adapted to suit a specific programming paradigm, with an associated learning tool that can be used with first-year computing undergraduates.




etho

Electronic disciplinary violations and methods of proof in Jordanian and Egyptian laws

The use of electronic means of a public official in carrying out their duties may lead to an instance wherein the person discloses confidential information, which can significantly impact their obligations. After verifying this act as part of electronic misconduct, disciplinary action is enforced upon the concerned party to rectify and ensure proper functioning in delivering public services without any disturbance or infringement. The study presents several significant findings regarding the absence of comparative regulations concerning electronic violations and their judicial evidence. It provides recommendations such as modifying legislative frameworks to enhance public utility disciplinary systems and incorporating rules for electric violations. The fundamental focus revolves around assessing, verifying, and punishing digital misconduct by management or regulatory bodies. Additionally, this research employs descriptive-analytical methods comparing the Jordanian Law with its Egyptian counterpart in exploring these issues.




etho

Honeybrid method for network security in a software defined network system

This research introduces a hybrid honeypot architecture to bolster security within software-defined networks (SDNs). By combining low-interaction and high-interaction honeypots, the proposed solution effectively identifies and mitigates cyber threats, including port scanning and man-in-the-middle attacks. The architecture is structured into multiple modules that focus on detecting open ports using Vilhala honeypots and simulating targeted and random attack scenarios. This hybrid approach enables comprehensive monitoring and detailed packet-level analysis, providing enhanced protection against advanced online threats. The study also conducts a comparative analysis of different attack detection methods using tools like KFSensor and networking shell commands. The results highlight the hybrid honeypot system's efficacy in filtering malicious traffic and detecting security breaches, making it a robust solution for safeguarding SDNs.




etho

Unsupervised VAD method based on short-time energy and spectral centroid in Arabic speech case

Voice Activity Detection (VAD) distinguishes speech segments from noise or silence areas. An efficient and noise-robust VAD system can be widely used for emerging speech technologies such as wireless communication and speech recognition. In this paper, we propose two versions of an unsupervised Arabic VAD method based on the combination of the Short-Time Energy (STE) and the Spectral Centroid (SC) features for formulating a typical threshold to detect speech areas. The first version compares only the STE feature to the threshold (STE-VAD). In contrast, the second compares the SC vector and the threshold (SC-VAD). The two versions of our VAD method were tested on 770 sentences of the Arabphone corpus, which were recorded in clean and noisy environments and evaluated under different values of Signal-to-Noise-Ratio. The experiments demonstrated the robustness of the STE-VAD in terms of accuracy and Mean Square Error.




etho

Intelligent traffic congestion discrimination method based on wireless sensor network front-end data acquisition

Conventional intelligent traffic congestion discrimination methods mainly use GPS terminals to collect traffic congestion data, which is vulnerable to the influence of vehicle time distribution, resulting in poor final discrimination effect. Necessary to design a new intelligent traffic congestion discrimination method based on wireless sensor network front-end data collection. That is to use the front-end data acquisition technology of wireless sensor network to generate a front-end data acquisition platform to obtain intelligent traffic congestion data, and then design an intelligent traffic congestion discrimination algorithm based on traffic congestion rules so as to achieve intelligent traffic congestion discrimination. The experimental results show that the intelligent traffic congestion discrimination method designed based on the front-end data collection of wireless sensor network has good discrimination effect, the obtained discrimination data is more accurate, effective and has certain application value, which has made certain contributions to reducing the frequency of urban traffic accidents.




etho

Evaluation method for the effectiveness of online course teaching reform in universities based on improved decision tree

Aiming at the problems of long evaluation time and poor evaluation accuracy of existing evaluation methods, an improved decision tree-based evaluation method for the effectiveness of college online course teaching reform is proposed. Firstly, the teaching mode of college online course is analysed, and an evaluation system is constructed to ensure the applicability of the evaluation method. Secondly, AHP entropy weight method is used to calculate the weights of evaluation indicators to ensure the accuracy and authority of evaluation results. Finally, the evaluation model based on decision tree algorithm is constructed and improved by fuzzy neural network to further optimise the evaluation results. The parameters of fuzzy neural network are adjusted and gradient descent method is used to optimise the evaluation results, so as to effectively evaluate the effect of college online course teaching reform. Through experiments, the evaluation time of the method is less than 5 ms, and the evaluation accuracy is more than 92.5%, which shows that the method is efficient and accurate, and provides an effective evaluation means for the teaching reform of online courses in colleges and universities.




etho

A data classification method for innovation and entrepreneurship in applied universities based on nearest neighbour criterion

Aiming to improve the accuracy, recall, and F1 value of data classification, this paper proposes an applied university innovation and entrepreneurship data classification method based on the nearest neighbour criterion. Firstly, the decision tree algorithm is used to mine innovation and entrepreneurship data from applied universities. Then, dynamic weight is introduced to improve the similarity calculation method based on edit distance, and the improved method is used to realise data de-duplication to avoid data over fitting. Finally, the nearest neighbour criterion method is used to classify applied university innovation and entrepreneurship data, and cosine similarity is used to calculate the similarity between the samples to be classified and each sample in the training data, achieving data classification. The experimental results demonstrate that the proposed method achieves a maximum accuracy of 96.5% and an average F1 score of 0.91. These findings indicate a high level of accuracy, recall, and F1 value for data classification using the proposed method.




etho

Study on personalised recommendation method of English online learning resources based on improved collaborative filtering algorithm

In order to improve recommendation coverage, a personalised recommendation method for English online learning resources based on improved collaborative filtering algorithm is studied to enhance the comprehensiveness of personalised recommendation for learning resources. Use matrix decomposition to decompose the user English online learning resource rating matrix. Cluster low dimensional English online learning resources by improving the K-means clustering algorithm. Based on the clustering results, calculate the backfill value of English online learning resources and backfill the information matrix of low dimensional English online learning resources. Using an improved collaborative filtering algorithm to calculate the predicted score of learning resources, personalised recommendation of English online learning resources for users based on the predicted score. Experimental results have shown that this method can effectively backfill English online learning resources, and the resource backfilling effect is excellent, and it has a high recommendation coverage rate.




etho

An English MOOC similar resource clustering method based on grey correlation

Due to the problems of low clustering accuracy and efficiency in traditional similar resource clustering methods, this paper studies an English MOOC similar resource clustering method based on grey correlation. Principal component analysis was used to extract similar resource features of English MOOC, and feature selection methods was used to pre-process similar resource features of English MOOC. On this basis, based on the grey correlation method, the pre-processed English MOOC similar resource features are standardised, and the correlation degree between different English MOOC similar resource features is calculated. The English MOOC similar resource correlation matrix is constructed to achieve English MOOC similar resource clustering. The experimental results show that the contour coefficient of the proposed method is closer to one, and the clustering accuracy of similar resources in English MOOC is as high as 94.2%, with a clustering time of only 22.3 ms.




etho

Learning behaviour recognition method of English online course based on multimodal data fusion

The conventional methods for identifying English online course learning behaviours have the problems of low recognition accuracy and high time cost. Therefore, a multimodal data fusion-based method for identifying English online course learning behaviours is proposed. Firstly, the analytic hierarchy process is used for decision fusion of multimodal data of learning behaviour. Secondly, based on the fusion results of multimodal data, weight coefficients are set to minimise losses and extract learning behaviour features. Finally, based on the extracted learning behaviour characteristics, the optimal classification function is constructed to classify the learning behaviour of English online courses. Based on the transfer information of learning behaviour status, the identification of online course learning behaviour is completed. The experimental results show that the recognition accuracy of the proposed method is above 90%, and its recognition accuracy is and can shorten the recognition time of learning behaviour, with high practical application reliability.




etho

A method for evaluating the quality of college curriculum teaching reform based on data mining

In order to improve the evaluation effect of current university teaching reform, a new method for evaluating the quality of university course teaching reform is proposed based on data mining algorithms. Firstly, the optimal data clustering criterion was used to select evaluation indicators and a quality evaluation system for university curriculum teaching reform was established. Next, a reform quality evaluation model is constructed using BP neural network, and the training process is improved through genetic algorithm to obtain the model weight and threshold of the optimal solution. Finally, the calculated parameters are substituted into the model to achieve accurate evaluation of the quality of university curriculum teaching reform. Selecting evaluation accuracy and evaluation efficiency as evaluation indicators, the practicality of the proposed method was verified through experiments. The experimental results showed that the proposed method can mine teaching reform data and evaluate the quality of teaching reform. Its evaluation accuracy is higher than 96.3%, and the evaluation time is less than 10ms, which is much better than the comparison method, fully demonstrating the practicality of the method.




etho

Evaluation method of teaching reform quality in colleges and universities based on big data analysis

Research on the quality evaluation of teaching reforms plays an important role in promoting improvements in teaching quality. Therefore, an evaluation method of teaching reform quality in colleges and universities based on big data analysis is proposed. A multivariate logistic model is used to select the evaluation indicators for the quality evaluation of teaching reforms in universities. And clustering and cleaning of the evaluation indicator data are performed through big data analysis. The evaluation indicator data is used as input vectors, and the results of the teaching reform quality evaluation are used as output vectors. A support vector machine model based on the whale algorithm is built to obtain the relevant evaluation results. Experimental results show that the proposed method achieves a minimum recall rate of 98.7% for evaluation indicator data, the minimum data processing time of 96.3 ms, the accuracy rate consistently above 97.1%.




etho

A personalised recommendation method for English teaching resources on MOOC platform based on data mining

In order to enhance the accuracy of teaching resource recommendation results and optimise user experience, a personalised recommendation method for English teaching resources on the MOOC platform based on data mining is proposed. First, the learner's evaluation of resources and resource attributes are abstracted into the same space, and resource tags are established using the Knowledge graph. Then, interest preference constraints are introduced to mine sequential patterns of user historical learning behaviour in the MOOC platform. Finally, a graph neural network is used to construct a recommendation model, which adjusts users' short-term and short-term interest parameters to achieve dynamic personalised teaching recommendation resources. The experimental results show that the accuracy and recall of the resource recommendation results of the research method are always higher than 0.9, the normalised sorting gain is always higher than 0.5.




etho

Prediction method of college students' achievements based on learning behaviour data mining

This paper proposes a method for predicting college students' performance based on learning behaviour data mining. The method addresses the issue of limited sample size affecting prediction accuracy. It utilises the K-means clustering algorithm to mine learning behaviour data and employs a density-based approach to determine optimal clustering centres, which are then output as the results of the clustering process. These clustering results are used as input for an attention encoder-decoder model to extract features from the learning behaviour sequence, incorporating an attention mechanism, sequence feature generator, and decoder. The characteristics derived from the learning behaviour sequence are then used to establish a prediction model for college students' performance, employing support vector regression. Experimental results demonstrate that this method accurately predicts students' performance with a relative error of less than 4% by leveraging the results obtained from learning behaviour data mining.




etho

A method for evaluating the quality of teaching reform based on fuzzy comprehensive evaluation

In order to improve the comprehensiveness of evaluation results and reduce errors, a teaching reform quality evaluation method based on fuzzy comprehensive evaluation is proposed. Firstly, on the premise of meeting the principles of indicator selection, factor analysis is used to construct an evaluation indicator system. Then, calculate the weights of various evaluation indicators through fuzzy entropy, establish a fuzzy evaluation matrix, and calculate the weight vector of evaluation indicators. Finally, the fuzzy cognitive mapping method is introduced to improve the fuzzy comprehensive evaluation method, obtaining the final weight of the evaluation indicators. The weight is multiplied by the fuzzy evaluation matrix to obtain the comprehensive evaluation result. The experimental results show that the maximum relative error of the proposed method's evaluation results is about 2.0, the average comprehensive evaluation result is 92.3, and the determination coefficient is closer to 1, verifying the application effect of this method.




etho

Quantitative evaluation method of ideological and political teaching achievements based on collaborative filtering algorithm

In order to overcome the problems of large error, low evaluation accuracy and long evaluation time in traditional evaluation methods of ideological and political education, this paper designs a quantitative evaluation method of ideological and political education achievements based on collaborative filtering algorithm. First, the evaluation index system is constructed to divide the teaching achievement evaluation index data in a small scale; then, the quantised dataset is determined and the quantised index weight is calculated; finally, the collaborative filtering algorithm is used to generate a set with high similarity, construct a target index recommendation list, construct a quantitative evaluation function and solve the function value to complete the quantitative evaluation of teaching achievements. The results show that the evaluation error of this method is only 1.75%, the accuracy can reach 98%, and the time consumption is only 2.0 s, which shows that this method can improve the quantitative evaluation effect.




etho

A risk identification method for abnormal accounting data based on weighted random forest

In order to improve the identification accuracy, accuracy and time-consuming of traditional financial risk identification methods, this paper proposes a risk identification method for financial abnormal data based on weighted random forest. Firstly, SMOTE algorithm is used to collect abnormal financial data; secondly, the original accounting data is decomposed into features, and the features of abnormal data are extracted through random forests; then, the index weight is calculated according to the entropy weight method; finally, the negative gradient fitting is used to determine the loss function, and the weighted random forest method is used to solve the loss function value, and the recognition result is obtained. The results show that the identification accuracy of this method can reach 99.9%, the accuracy rate can reach 96.06%, and the time consumption is only 6.8 seconds, indicating that the risk identification effect of this method is good.




etho

Research on evaluation method of e-commerce platform customer relationship based on decision tree algorithm

In order to overcome the problems of poor evaluation accuracy and long evaluation time in traditional customer relationship evaluation methods, this study proposes a new customer relationship evaluation method for e-commerce platform based on decision tree algorithm. Firstly, analyse the connotation and characteristics of customer relationship; secondly, the importance of customer relationship in e-commerce platform is determined by using decision tree algorithm by selecting and dividing attributes according to the information gain results. Finally, the decision tree algorithm is used to design the classifier, the weighted sampling method is used to obtain the training samples of the base classifier, and the multi-period excess income method is used to construct the customer relationship evaluation function to achieve customer relationship evaluation. The experimental results show that the accuracy of the customer relationship evaluation results of this method is 99.8%, and the evaluation time is only 51 minutes.




etho

Evaluation method of cross-border e-commerce supply chain innovation mode based on blockchain technology

In view of the low evaluation accuracy of the effectiveness of cross-border e-commerce supply chain innovation model and the low correlation coefficient of innovation model influencing factors, the evaluation method of cross-border e-commerce supply chain innovation model based on blockchain technology is studied. First, analyse the operation mode of cross-border e-commerce supply chain, and determine the key factors affecting the innovation mode; Then, the comprehensive integration weighting method is used to analyse the factors affecting innovation and calculate the weight value; Finally, the blockchain technology is introduced to build an evaluation model for the supply chain innovation model and realise the evaluation of the cross-border e-commerce supply chain innovation model. The experimental results show that the evaluation accuracy of the proposed method is high, and the highest correlation coefficient of the influencing factors of innovation mode is about 0.99, which is feasible.




etho

Risk assessment method of power grid construction project investment based on grey relational analysis

In view of the problems of low accuracy, long time consuming and low efficiency of the existing engineering investment risk assessment method; this paper puts forward the investment risk assessment method of power grid construction project based on grey correlation analysis. Firstly, classify the risks of power grid construction project; secondly, determine the primary index and secondary index of investment risk assessment of power grid construction project; then construct the correlation coefficient matrix of power grid project investment risk to calculate the correlation degree and weight of investment risk index; finally, adopt the grey correlation analysis method to construct investment risk assessment function to realise investment risk assessment. The experimental results show that the average accuracy of evaluating the investment risk of power grid construction projects using the method is 95.08%, and the maximum time consuming is 49 s, which proves that the method has high accuracy, short time consuming and high evaluation efficiency.




etho

Student's classroom behaviour recognition method based on abstract hidden Markov model

In order to improve the standardisation of mutual information index, accuracy rate and recall rate of student classroom behaviour recognition method, this paper proposes a student's classroom behaviour recognition method based on abstract hidden Markov model (HMM). After cleaning the students' classroom behaviour data, improve the data quality through interpolation and standardisation, and then divide the types of students' classroom behaviour. Then, in support vector machine, abstract HMM is used to calculate the output probability density of support vector machine. Finally, according to the characteristic interval of classroom behaviour, we can judge the category of behaviour characteristics. The experiment shows that normalised mutual information (NMI) index of this method is closer to one, and the maximum AUC-PR index can reach 0.82, which shows that this method can identify students' classroom behaviour more effectively and reliably.




etho

A data mining method based on label mapping for long-term and short-term browsing behaviour of network users

In order to improve the speedup and recognition accuracy of the recognition process, this paper designs a data mining method based on label mapping for long-term and short-term browsing behaviour of network users. First, after removing the noise information in the behaviour sequence, calculate the similarity of behaviour characteristics. Then, multi-source behaviour data is mapped to the same dimension, and a behaviour label mapping layer and a behaviour data mining layer are established. Finally, the similarity of the tag matrix is calculated based on the similarity calculation results, and the mining results are output using SVM binary classification process. Experimental results show that the acceleration ratio of this method exceeds 0.9; area under curve receiver operating characteristic curve (AUC-ROC) value increases rapidly in a short time, and the maximum value can reach 0.95, indicating that the mining precision of this method is high.




etho

Auditing the Performing Rights Society - investigating a new European Union Collective Management Organization member audit method

The European Union Rights Management Directive 2014/26/EU, provides regulatory oversight of European Union (EU) Collective Management Organizations (CMOs). However, the Directive has no provision indicating how members of EU CMOs may conduct non-financial audits of their CMO income and reporting. This paper addresses the problem of a lack of an audit method through a case study of the five writer members of the music group Duran Duran, who have been members of the UK's CMO for performing rights - the Performing Rights Society (PRS) for over 35 years. The paper argues a new audit CMO member method that can address the lacunae regarding the absence of CMO member right to audit a CMO and an applicable CMO audit method.




etho

Transformative advances in volatility prediction: unveiling an innovative model selection method using exponentially weighted information criteria

Using information criteria is a common method for making a decision about which model to use for forecasting. There are many different methods for evaluating forecasting models, such as MAE, RMSE, MAPE, and Theil-U, among others. After the creation of AIC, AICc, HQ, BIC, and BICc, the two criteria that have become the most popular and commonly utilised are Bayesian IC and Akaike's IC. In this investigation, we are innovative in our use of exponential weighting to get the log-likelihood of the information criteria for model selection, which means that we propose assigning greater weight to more recent data in order to reflect their increased precision. All research data is from the major stock markets' daily observations, which include the USA (GSPC, DJI), Europe (FTSE 100, AEX, and FCHI), and Asia (Nikkei).




etho

Logical Soft Systems Methodology for Education Programme Development




etho

Insights into Using Agile Development Methods in Student Final Year Projects