hy The dark side of nursery rhymes By www.bbc.co.uk Published On :: Wed, 16 Oct 2024 11:34:00 GMT A Coventry teacher has written a play about the attempted murder of Humpty Dumpty. Full Article
hy Why do I need to book to take my waste to the tip? By www.bbc.co.uk Published On :: Mon, 11 Nov 2024 11:09:00 GMT A new booking system has been put in place in Norfolk’s waste recycling centres. Full Article
hy Why is Cromer closing its information centre? By www.bbc.co.uk Published On :: Tue, 12 Nov 2024 14:04:00 GMT The tourist information centre in Cromer has been vital for some, but is set to close. Full Article
hy Why haven’t Spotify released an offical pre-save tool? By here.org.uk Published On :: Tue, 18 Jun 2019 08:03:59 +0000 Back in November 2016 Music Ally wrote an article about how Laura Marling fans could pre-save her new album on Spotify. This was the first ever pre-save. This functionality wasn’t (and still isn’t) an official Spotify tool, it was put together by David Emery (who now works at Apple Music) who was VP of global... Read More Full Article Uncategorised
hy Lockdown Photography (Part One) By plasticbag.org Published On :: Tue, 19 May 2020 07:23:04 +0000 When this whole horrible COVID19 experience started—back when we thought maybe we’d be in lockdown for a few weeks, not a few months to a year—I thought to myself that at least it might be something worthy of documenting with my camera. I considered the world so changed and strange in this moment in time […] Full Article Life Photography
hy Why customers buy again: 3 winning tactics for upsell and cross-sell By www.articulatemarketing.com Published On :: 2024-08-01T08:15:00Z Customers are some of your best leads. According to a 2022 HubSpot Blog survey of more than 500 sales professionals, more than 70 percent said that upsell and cross-sell drives up to 30 percent of their revenue. Full Article Sales Customers
hy Earthy earns maiden England U21 call-up By www.bbc.com Published On :: Wed, 13 Nov 2024 12:37:11 GMT Bristol City midfielder George Earthy called up to the England Under-21 squad for the first time after a series of withdrawals due to either injury or transitions into the senior squad. Full Article
hy Why Does The City Of London Cross Some Bridges And Not Others? By londonist.com Published On :: Sat, 09 Nov 2024 10:00:03 +0000 Boundary anomalies, ahoy! Full Article London Maps bridges maps City Bridge Trust
hy Hyde Park Winter Wonderland 2024: A Guide To Visiting London's Huge Christmas Festival By londonist.com Published On :: Wed, 13 Nov 2024 10:12:02 +0000 When to go, what to see and how to save money. Full Article London Christmas in London Winter Wonderland christmas in London HYDE PARK WINTER WONDERLAND LONDON AT CHRISTMAS WINTER WONDERLAND HYDE PARK WINTER WONDERLAND TICKETS WINTER WONDERLAND MAP 2024 CHRISTMAS 2024
hy Why Scotland should not make sex work illegal By belledejour-uk.blogspot.com Published On :: Mon, 18 Jun 2012 09:14:00 +0000 UPDATE: MSPs have voted that Grant's bill will have to go to consultation and will not be fast-tracked. Which is good news. But the fight is not over, and expect more to come when the consultation hits. At the same time that the Moratorium 2012 campaign kicks off in London, spearheading a common-sense approach to sex work, there appears a bid in Scotland to try to make prostitution illegal. Just to recap: soliciting, running a brothel, and kerb crawling are already illegal (as too are trafficking and sexual exploitation of children). Exchanging sex for money at this point is not. Not yet. Labour MSP Rhoda Grant claims "Scotland should become an unattractive market for prostitution and therefore other associated serious criminal activities, such as people trafficking for sexual exploitation, would be disrupted." Grant is, unfortunately, badly informed and wrong. I'm going to keep this one short and sweet because the points are pretty straightforward... Scotland does not have a sex trafficking epidemic Sex trafficking is the excuse frequently given these days to harass and criminalise sex workers. Problem is, it's not remotely the "epidemic" they would have you believe. If you're not already up to speed on the whys and wherefores, I highly recommend reading Laura Agustin's work on this. Or if I may be so cheeky to suggest you could also buy my book. Specifically, it is not happening in Scotland. “In Scotland, to the best of my knowledge, we don't have a conviction for human trafficking,” said police constable Gordon Meldrum. Meldrum had previously claimed research “proved” the existence of 10 human trafficking groups north of the border, and 367 organised crime groups with over 4000 members. “We had one case which was brought to court previously but was abandoned. My understanding is it was abandoned due to a lack of evidence, essentially.” Strange how the evidence seemed to disappear precisely when someone was asked to produce all these fantasy baddies, isn't it? It's not only Scotland where the trafficking hype falls flat though: investigation throughout the UK has comprehensively failed to find any supposed sex trafficking epidemic. Not convinced by the evidence? Then consider this: criminalising sex workers and their clients removes the most reliable information sources police have for investigating abuses. Police don't have a great track record on this: In interviews by the Sex Workers Project with 15 trafficking survivors who experienced police raids, only one had been asked by law enforcement if she was coerced, and only after she was arrested. SWOP-NYC make this case clearly. Criminalising sex work has been shown in Scotland to make criminal activity worse Criminalisation has all kinds of effects on the behaviour of sex workers, but unfortunately, none of those effects are good. Fear of police forces sex workers to get into clients’ cars quickly, and possibly be unable to avoid dangerous attackers posing as clients. When vigilantes and police roam the pavements, sex workers wait until the wee hours to come out, making them more isolated and vulnerable to harm. Such an approach can also result in a transfer of activity from streetwalking to other ways of getting money. High-profile crackdown results in repeated arrests of prostitutes, which translate to fines that sex workers, now burdened with criminal records, are unable to pay except by more prostitution or by fraud, shoplifting, and dealing drugs. Take Aberdeen, for instance. From 2001 onward, the city had an established tolerance zone for sex workers around the harbour. That ended with passage of the Prostitution (Public Places) (Scotland) Act in 2007. In the following months the city centre experienced an influx of streetwalkers and an increase in petty crimes. Quay Services, which operates a drop-in centre for streetwalkers, reported that sex workers became more afraid to seek assistance, and the number of women coming to the centre dropped to “just a handful”. There was also evidence that displacing sex workers led to more activity in the sex trade, not less – convictions for solicitation tripled. This kind of ‘crime shuffling’ takes prostitution out of one area and dumps it on another. It only resembles an improvement if you fail to look at the full picture. Prohibition never works There is a lot of talk in the political sphere about the need for “evidence based policy”. This means rejecting approaches that are moralistic and manipulative. Sex workers have suffered the tragic consequences of prejudicial social attitudes that lead to bad policy. The prohibition approach has not worked. It will never work. The people who endorse this view are putting people in danger and should not be guiding public opinion any longer. Disliking sex work is not a good enough argument to justify criminalising it. Is there any public interest served by preventing adults from engaging in a consensual transaction for sexual services? No, there is not. Bit like the war on drugs: making the business profitable only to criminals, awaiting the inevitably grim results, then claiming that it’s the drugs themselves, not the laws, wot caused it. Few reasonable people believe that line of argument when it comes to drugs. Why does anyone believe it when it comes to sex? Moral disapproval is a bad basis for policymaking. I don't find the idea of taking drugs at all appealing, but I don't assume my own preferences should be the basis for law. The condescension heaped on people who do sex work is embarrassingly transparent. All this mealy-mouthed, 'oh but we want to help them, really’. How’s that again? By saddling people with criminal records and taking away their children? Do me a favour. As well as the happy prostitutes there are unhappy sex workers in need of support. Society should protect the unwilling and underage from sexual exploitation and provide outreach for those who need and want it. We already have laws and services for that. Maybe the laws should be more intelligently enforced and the services better supported. But prosecuting the victimless crimes does neither of these. It helps no one. The potential existence of abuses does not mean such work should be automatically criminalised if for no other reason than doing so makes the lives of people in sex work worse, not better. Criminalisation is the very opposite of compassion. Rhoda Grant is hiding behind an "end demand" approach that will not achieve what she claims it will, but will punish sex workers and send those with already chaotic lives further into a downward spiral. If that isn't punishing them with no hope for change then I don't know what is. It's time we started acting like grownups and stopped pretending that making something illegal makes it cease to exist. Full Article crime prostitution Scotland trafficking
hy Why Mercedes put ‘a reminder of joy and pain’ on display in their factory lobby | Formula 1 By www.racefans.net Published On :: Mon, 11 Nov 2024 12:32:38 +0000 Mercedes have put the car from Lewis Hamilton's controversial 2021 championship defeat on display in the lobby at their factory. Full Article 2021 F1 season Formula 1 2021 Abu Dhabi Grand Prix Mercedes toto wolff
hy A Semantic Wiki Based on Spatial Hypertext By www.jucs.org Published On :: 2011-07-20T10:20:34+02:00 Spatial Hypertext Wiki (ShyWiki) is a wiki which represents knowledge using notes that are spatially distributed in wiki pages and have visual characteristics such as colour, size, or font type. The use of spatial and visual characteristics in wikis is important to improve human comprehension, creation and organization of knowledge. Another important capability in wikis is to allow machines to process knowledge. Wikis that formally structure knowledge for this purpose are called semantic wikis. This paper describes how ShyWiki can make use of spatial hypertext in order to be a semantic wiki. ShyWiki can represent knowledge at different levels of formality. Users of ShyWiki can annotate the content and represent semantic relations without being experts of semantic web data description languages. The spatial hypertext features make it suitable for users to represent unstructured knowledge and implicit graphic relations among concepts. In addition, semantic web and spatial hypertext features are combined to represent structured knowledge. The semantic web features of ShyWiki improve navigation and publish the wiki knowledge as RDF resources, including the implicit relations that are analyzed using a spatial parser. Full Article
hy Réseaux Sociaux… entre hystérisation et égotisme By marc-vasseur.over-blog.com Published On :: Sun, 09 Dec 2018 12:41:26 +0100 Si la question de l’hystérisation des réseaux sociaux ne date pas des Gilets Jaunes, nulle doute qu’elle revient sur le devant de la scène. Je ne parle même pas des théories du complot lié à ce mouvement. Pour ma part, les choses sont claires, il est... Full Article
hy DeFog: dynamic micro-service placement in hybrid cloud-fog-edge infrastructures By www.inderscience.com Published On :: 2024-07-05T23:20:50-05:00 DeFog is an innovative microservice placement and load balancing approach for distributed multi-cluster cloud-fog-edge architectures to minimise application response times. The architecture is modelled as a three-layered hierarchy. Each layer consists of one or more clusters of machines, with resource constraints increasing towards lower layers. Applications are modelled as service oriented architectures (SOA) comprising multiple interconnected microservices. As many applications can be run simultaneously, and as the resources of the edge and the fog are limited, choosing among services to run on the edge or the fog is the problem this work is dealing with. DeFog focuses on dynamic (i.e., adaptive) decentralised service placement within each cluster with zero downtime, eliminating the need for coordination between clusters. To assess the effectiveness of DeFog, two realistic applications based on microservices are deployed, and several placement policies are tested to select the one that reduces application latency. Least frequently used (LFU) is the reference service placement strategy. The experimental results reveal that a replacement policy that uses individual microservice latency as the crucial factor affecting service placement outperformed LFU by at least 10% in application response time. Full Article
hy Faster flowing glaciers could help predict nearby volcanic activity - Phys.org By news.google.com Published On :: Wed, 13 Nov 2024 10:00:01 GMT Faster flowing glaciers could help predict nearby volcanic activity Phys.org Full Article
hy Why is Trump’s election as US president prompting a Bitcoin surge? - Al Jazeera English By news.google.com Published On :: Tue, 12 Nov 2024 13:10:37 GMT Why is Trump’s election as US president prompting a Bitcoin surge? Al Jazeera EnglishWhy crypto mania is reaching new heights The EconomistCryptocurrency traders: share what got you into crypto, and how you feel about recent developments The GuardianBitcoin Continues Its Ascent To $100,000 Amid Ethereum, Solana, Dogecoin, Shiba Inu, BNB, XRP, Avalanche Rebound ForbesWhat to know about bitcoin’s post-election rally BNN Bloomberg Full Article
hy Big Brother is Watching But He Doesn’t Understand: Why Forced Filtering Technology on the Internet Isn’t the Solution to the Modern Copyright Dilemma By script-ed.org Published On :: Fri, 17 Aug 2018 13:48:38 +0000 by Mitchell Longan[1] Introduction The European Parliament is currently considering a proposal to address problems of piracy and other forms of copyright infringement associated with the digital world.[2] Article 13 of the proposed Directive on Copyright in the Digital Single Full Article Blog
hy Predicting Innovation: Why Facebook/WhatsApp Merger Flunked By script-ed.org Published On :: Thu, 01 Apr 2021 14:02:51 +0000 By Hasan Basri Cifci[1] In the world of 2014, the Commission of Facebook/WhatsApp merger case[2] concluded that integration and interoperation of Facebook and WhatsApp were unfeasible. However, Facebook integrated its three subsidiaries (WhatsApp, Instagram, and Facebook) under its brand in Full Article Blog
hy The Impact of Physics Open Educational Resources (OER) on the Professional Development of Bhutanese Secondary School Physics Teachers By ijedict.dec.uwi.edu Published On :: Sat, 31 Aug 2024 09:44:41 -0400 Full Article Refereed Articles
hy Robust and secure file transmission through video streaming using steganography and blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 File transfer is always handled by a separate service, sometimes it is a third-party service in videoconferencing. When sending files during a video session, file data flow and video stream are independent of each other. Encryption is a mature method to ensure file security. However, it still has the chance to leave footprints on the intermediate forwarding machines. These footprints can indicate that a file once passed through, some protocol-related logs give clues to the hackers' later investigation. This work proposes a file-sending scheme through the video stream using blockchain and steganography. Blockchain is used as a file slicing and linkage mechanism. Steganography is applied to embed file pieces into video frames that are continuously generated during the session. The scheme merges files into the video stream with no file transfer protocol use and no extra bandwidth consumed by the file to provide trackless file transmission during the video communication. Full Article
hy Robust watermarking of medical images using SVM and hybrid DWT-SVD By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 In the present scenario, the security of medical images is an important aspect in the field of image processing. Support vector machines (SVMs) are a supervised machine learning technique used in image classification. The roots of SVM are from statistical learning theory. It has gained excellent significance because of its robust, accurate, and very effective algorithm, even though it was applied to a small set of training samples. SVM can classify data into binary classification or multiple classifications according to the application's needs. Discrete wavelet transform (DWT) and singular value decomposition (SVD) transform techniques are utilised to enhance the image's security. In this paper, the image is first classified using SVM into ROI and RONI, and thereafter, to enhance the images diagnostic capabilities, the DWT-SVD-based hybrid watermarking technique is utilised to embed the watermark in the RONI region. Overall, our work makes a significant contribution to the field of medical image security by presenting a novel and effective solution. The results are evaluated using both perceptual and imperceptibility testing using PSNR and SSIM parameters. Different attacks were introduced to the watermarked image, which shows the efficacy and robustness of the proposed algorithm. Full Article
hy An image encryption using hybrid grey wolf optimisation and chaotic map By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Image encryption is a critical and attractive issue in digital image processing that has gained approval and interest of many researchers in the world. A proposed hybrid encryption method was implemented by using the combination of the Nahrain chaotic map with a well-known optimised algorithm namely the grey wolf optimisation (GWO). It was noted from analysing the results of the experiments conducted on the new hybrid algorithm, that it gave strong resistance against expected statistical invasion as well as brute force. Several statistical analyses were carried out and showed that the average entropy of the encrypted images is near to its ideal information entropy. Full Article
hy Multi-agent Q-learning algorithm-based relay and jammer selection for physical layer security improvement By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Physical Layer Security (PLS) and relay technology have emerged as viable methods for enhancing the security of wireless networks. Relay technology adoption enhances the extent of coverage and enhances dependability. Moreover, it can improve the PLS. Choosing relay and jammer nodes from the group of intermediate nodes effectively mitigates the presence of powerful eavesdroppers. Current methods for Joint Relay and Jammer Selection (JRJS) address the optimisation problem of achieving near-optimal secrecy. However, most of these techniques are not scalable for large networks due to their computational cost. Secrecy will decrease if eavesdroppers are aware of the relay and jammer intermediary nodes because beamforming can be used to counter the jammer. Consequently, this study introduces a multi-agent Q-learning-based PLS-enhanced secured joint relay and jammer in dual-hop wireless cooperative networks, considering the existence of several eavesdroppers. The performance of the suggested algorithm is evaluated in comparison to the current algorithms for secure node selection. The simulation results verified the superiority of the proposed algorithm. Full Article
hy Knowing thy neighbour: creating and capturing value from a firm's alliance experiences By www.inderscience.com Published On :: 2024-09-02T23:20:50-05:00 Intellectual assets, especially its relational forms, have become increasingly important to explain a firm's innovation. To examine relational forms of intellectual assets (IA), this study theoretically and empirically advances a concept of alliance management capability (AMC) to explain the value creation and capture aspects of a firm's innovation process. The concepts of value-creating alliance experiences (VCAE) and value capturing alliance experiences (VCPAE) were introduced in which a firm's ability to learn from these alliance experiences increases the firm's ability to discover and govern partnerships that bring the firm's innovations to market. Hypotheses were developed and empirically examined in the biotechnology industry. A contribution of this study is that a firm's VCAE and VCPAE introduce a greater 'openness' to a firm's innovation process. This openness enables a firm to better adapt and respond to the opportunities of the market and thus impact a firm's competitive advantage to innovate. Full Article
hy Why students need to learn biomimicry rather than select a correct answer? A neurological explanation By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 For a long time, high school students have been forced to practice selecting correct answers on college scholastic ability tests. Recently, it has been suggested that schools introduce biomimicry activities for STEM education to develop students' 21st century competency. However, there have been arguments about which system is more appropriate in terms of enhancing a student's competency development. Therefore, we evaluated neurological evidence of students' competency using fMRI scans taken during the selecting a correct answer for a biology question and during a biomimicry activity. Results showed that the repetitive practice of selecting correct responses limited a student's neurological activities to the brain network of the visual cortex and the front-parietal working memory cortex. However, the biomimicry activity simultaneously involved diverse prefrontal, parietal and temporal cortexes, and the putamen, limbic and cerebellum lobes. Therefore, this study proposes that the biomimicry activities could stimulate their coordinated brain development. Full Article
hy Virtual Computing Laboratories: A Case Study with Comparisons to Physical Computing Laboratories By Published On :: Full Article
hy The Implementation of Hypertext-based Learning Media for a Local Cultural Based Learning By Published On :: Full Article
hy A Hybrid Approach for Selecting a Course Management System: A Case Study By Published On :: Full Article
hy Why provenance of SPARQL 1.1 queries By www.inderscience.com Published On :: 2024-10-14T23:20:50-05:00 In this paper, we study and provide algorithms for source-provenance of answers to extended SPARQL queries. Extended SPARQL queries are an extension of SPARQL 1.1 queries which support not only a single dataset but multiple datasets, each in a particular context. For example, normal subqueries, aggregate subqueries, (NOT) EXISTS filter subqueries may (optionally) have their own dataset. Additionally, GRAPH patterns can query multiple RDF graphs from the local FROM NAMED dataset and not just one. For monotonic queries, the source why provenance sets that we derive for an answer mapping are each the minimal set of sources appearing in the query that if we consider as they are while the rest of the sources are considered empty, we derive the same answer mapping. We show that this property does not hold for non-monotonic queries. Among others, knowing source why provenance is of critical importance for judging confidence on the answer, allow information quality assessment, accountability, as well as understanding the temporal and spatial status of information. Full Article
hy An evaluation of customer trust in e-commerce market based on entropy weight analytic hierarchy process By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to solve the problems of large generalisation error, low recall rate and low retrieval accuracy of customer evaluation information in traditional trust evaluation methods, an evaluation method of customer trust in e-commerce market based on entropy weight analytic hierarchy process was designed. Firstly, build an evaluation index system of customer trust in e-commerce market. Secondly, the customer trust matrix is established, and the index weight is calculated by using the analytic hierarchy process and entropy weight method. Finally, five-scale Likert method is used to analyse the indicator factors and establish a comment set, and the trust evaluation value is obtained by combining the indicator membership. The experiment shows that the maximum generalisation error of this method is only 0.029, the recall rate is 97.5%, and the retrieval accuracy of customer evaluation information is closer to 1. Full Article
hy Building the Hydra Together: Enhancing Repository Provision through Multi-Institution Collaboration By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 In 2008 the University of Hull, Stanford University and University of Virginia decided to collaborate with Fedora Commons (now DuraSpace) on the Hydra project. This project has sought to define and develop repository-enabled solutions for the management of multiple digital content management needs that are multi-purpose and multi-functional in such a way as to allow their use across multiple institutions. This article describes the evolution of Hydra as a project, but most importantly as a community that can sustain the outcomes from Hydra and develop them further. The data modelling and technical implementation are touched on in this context, and examples of the Hydra heads in development or production are highlighted. Finally, the benefits of working together, and having worked together, are explored as a key element in establishing a sustainable open source solution. Full Article Articles Hydra collaboration community partners roles responsibilities Digital Libraries Digital Repositories Scholarly Communication Information Management
hy Kindura: Repository services for researchers based on hybrid clouds By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 The paper describes the investigations and outcomes of the JISC-funded Kindura project, which is piloting the use of hybrid cloud infrastructure to provide repository-focused services to researchers. The hybrid cloud services integrate external commercial cloud services with internal IT infrastructure, which has been adapted to provide cloud-like interfaces. The system provides services to manage and process research outputs, primarily focusing on research data. These services include both repository services, based on use of the Fedora Commons repository, as well as common services such as preservation operations that are provided by cloud compute services. Kindura is piloting the use of the DuraCloud2, open source software developed by DuraSpace, to provide a common interface to interact with cloud storage and compute providers. A storage broker integrates with DuraCloud to optimise the usage of available resources, taking into account such factors as cost, reliability, security and performance. The development is focused on the requirements of target groups of researchers. Full Article Articles
hy Chempound - a Web 2.0-inspired repository for physical science data By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 Chempound is a new generation repository architecture based on RDF, semantic dictionaries and linked data. It has been developed to hold any type of chemical object expressible in CML and is exemplified by crystallographic experiments and computational chemistry calculations. In both examples, the repository can hold >50k entries which can be searched by SPARQL endpoints and pre-indexing of key fields. The Chempound architecture is general and adaptable to other fields of data-rich science. Full Article Articles
hy Location-Oriented Knowledge Management in a Tourism Context: Connecting Virtual Communities to Physical Locations By Published On :: Full Article
hy Higher Education Course Content: Paper-Based, Online or Hybrid Course Delivery? By Published On :: Full Article
hy End-to-End Performance Evaluation of Selected TCP Variants across a Hybrid Wireless Network By Published On :: Full Article
hy Technology Use, Technology Views: Anticipating ICT Use for Beginning Physical and Health Education Teachers By Published On :: Full Article
hy Object-Oriented Hypermedia Design and J2EE Technology for Web-based Applications By Published On :: Full Article
hy DigiStylus: A Socio-Technical Approach to Teaching and Research in Paleography By Published On :: Full Article
hy Framework on Hybrid Network Management System Using a Secure Mobile Agent Protocol By Published On :: Full Article
hy A Novel Visual Cryptography Coding System for Jam Resistant Communications By Published On :: Full Article
hy Hybrid App Approach: Could It Mark the End of Native App Domination? By Published On :: 2017-04-23 Aim/Purpose: Despite millions of apps on the market, it is still challenging to develop a mobile app that can run across platforms using the same code. Background: This paper explores a potential solution for developing cross platform apps by presenting the hybrid app approach. Methodology: The paper first describes a brief evolution of the different mobile app development approaches and then compares them with the hybrid app approach. Next, it focuses on one specific hybrid app development framework called Ionic. Contribution: The paper presents the hybrid app approach as an emerging trend in mobile app development and concludes with the highlight of its advantages and teaching implications. Findings: The hybrid app approach reduces the learning curve and offers tools to allow the reuse of code to create apps for different mobile devices. Recommendations for Practitioners: The experience that the paper describes in using Ionic framework to create a hybrid app can be adopted in a web design or mobile app development course. Impact on Society : The advance in hybrid framework in general and the growing acceptance of open source framework, such as Ionic in particular, may provide an alternative to the native app domination and may trigger the rapid rise of hybrid apps in the years to come. Full Article
hy Medical Image Security Using Quantum Cryptography By Published On :: 2018-05-18 Aim/Purpose: Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. Background: One of the best ways to which medical image could be kept secured is through the use of quantum cryptography Methodology : Applying the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured network communication infrastructure. This enables two legitimate users to produce a shared secret random bit string, which can be used as a key in cryptographic applications, such as message encryption and authentication. Contribution: This paper can make it possible for the healthcare and medical professions to construct cryptographic communication systems to keep patients’ transferred data safe and secured. Findings: This work has been able to provide a way for two authorized users who are in different locations to securely establish a secret network key and to detect if eavesdropping (a fraudulent or disruption in the network) has occurred Recommendations for Practitioners: This security mechanism is recommended for healthcare providers and practitioners to ensure the privacy of patients’ medical information. Recommendation for Researchers: This paper opens a new chapter in secured medical records Impact on Society Quantum key distribution promises network security based on the fundamental laws of quantum mechanics by solving the problems of secret-key cryptography . Future Research: The use of post-quantum cryptography can be further researched. Full Article
hy Autoethnography of the Cultural Competence Exhibited at an African American Weekly Newspaper Organization By Published On :: 2019-04-19 Aim/Purpose: Little is known of the cultural competence or leadership styles of a minority owned newspaper. This autoethnography serves to benchmark one early 1990s example. Background: I focused on a series of flashbacks to observe an African American weekly newspaper editor-in-chief for whom I reported to 25 years ago. In my reflections I sought to answer these questions: How do minorities in entrepreneurial organizations view their own identity, their cultural competence? What degree of this perception is conveyed fairly and equitably in the community they serve? Methodology: Autoethnography using both flashbacks and article artifacts applied to the leadership of an early 1990s African American weekly newspaper. Contribution: Since a literature gap of minority newspaper cultural competence examples is apparent, this observation can serve as a benchmark to springboard off older studies like that of Barbarin (1978) and that by examining the leadership styles and editorial authenticity as noted by The Chicago School of Media Theory (2018), these results can be used for comparison to other such minority owned publications. Findings: By bringing people together, mixing them up, and conducting business any other way than routine helped the Afro-American Gazette, Grand Rapids, proudly display a confidence sense of cultural competence. The result was a potentiating leadership style, and this style positively changed the perception of culture, a social theory change example. Recommendations for Practitioners: For the minority leaders of such publications, this example demonstrates effective use of potentiating leadership to positively change the perception of the quality of such minority owned newspapers. Recommendations for Researchers: Such an autoethnography could be used by others to help document other examples of cultural competence in other minority owned newspapers. Impact on Society: The overall impact shows that leadership at such minority owned publications can influence the community into a positive social change example. Future Research: Research in the areas of culture competence, leadership, within minority owned newspapers as well as other minority alternative publications and websites can be observed with a focus on what works right as well as examples that might show little social change model influence. The suggestion is to conduct the research while employed if possible, instead of relying on flashbacks. Full Article
hy Alzheimer's disease classification using hybrid Alex-ResNet-50 model By www.inderscience.com Published On :: 2024-11-08T23:20:50-05:00 Alzheimer's disease (AD), a leading cause of dementia and mortality, presents a growing concern due to its irreversible progression and the rising costs of care. Early detection is crucial for managing AD, which begins with memory deterioration caused by the damage to neurons involved in cognitive functions. Although incurable, treatments can manage its symptoms. This study introduces a hybrid AlexNet+ResNet-50 model for AD diagnosis, utilising a pre-trained convolutional neural network (CNN) through transfer learning to analyse MRI scans. This method classifies MRI images into Alzheimer's disease (AD), moderate cognitive impairment (MCI), and normal control (NC), enhancing model efficiency without starting from scratch. Incorporating transfer learning allows for refining the CNN to categorise these conditions accurately. Our previous work also explored atlas-based segmentation combined with a U-Net model for segmentation, further supporting our findings. The hybrid model demonstrates superior performance, achieving 94.21% accuracy in identifying AD cases, indicating its potential as a highly effective tool for early AD diagnosis and contributing to efforts in managing the disease's impact. Full Article
hy Hybrid encryption of Fernet and initialisation vector with attribute-based encryption: a secure and flexible approach for data protection By www.inderscience.com Published On :: 2024-06-04T23:20:50-05:00 With the continuous growth and importance of data, the need for strong data protection becomes crucial. Encryption plays a vital role in preserving the confidentiality of data, and attribute-based encryption (ABE) offers a meticulous access control system based on attributes. This study investigates the integration of Fernet encryption with initialisation vector (IV) and ABE, resulting in a hybrid encryption approach that enhances both security and flexibility. By combining the advantages of Fernet encryption and IV-based encryption, the hybrid encryption scheme establishes an effective and robust mechanism for safeguarding data. Fernet encryption, renowned for its simplicity and efficiency, provides authenticated encryption, guaranteeing both the confidentiality and integrity of the data. The incorporation of an initialisation vector (IV) introduces an element of randomness into the encryption process, thereby strengthening the overall security measures. This research paper discusses the advantages and drawbacks of the hybrid encryption of Fernet and IV with ABE. Full Article
hy Practical E-Learning for the Faculty of Mathematics and Physics at the University of Ljubljana By Published On :: Full Article
hy Facilitation of Formative Assessments using Clickers in a University Physics Course By Published On :: Full Article