meth 'Something really precious has been taken away from me' By www.bbc.co.uk Published On :: Tue, 26 Jan 2021 16:54:14 GMT As the UK records its 100,000th death from Covid within 28 days of a positive test, Catherine Burns speaks to some of the people behind the figures. Full Article
meth ...And Now For Something Completely Different By belledejour-uk.blogspot.com Published On :: Mon, 11 Jul 2011 19:45:00 +0000 This is not about sex, and not about The Sex Myth. This is about the old blog, and the growing scandal in News International's paper the rules they played by. And as Prince Humperdinck so eloquently put it, I always think everything could be a trap.Very early on in blogging as Belle de Jour, I had an email address associated with the blog. It was with one of those free email providers and not very secure. Later, I wised up a touch and moved to doing everything through Hushmail. But for some reason I kept the old email up and running, and checked it occasionally.So on the day of the book's release in the UK, I logged on to a public library computer in Clearwater, Florida, and had a look at that old account. There was a new message from someone I didn't recognise. I opened it.The message was from a journo at the Sunday Times. It was short, which struck me as unusual: Come on Belle, not even a little hint? There was an attachment. The attachment started downloading automatically (then if I remember correctly, came up with a "failed to download" message).My heart sank - my suspicion was that there had been a program attached to the message, some sort of trojan, presumably trying to get information from my computer.Now, I understood the papers regarded all of this as a game. There were accusations that the anonymity thing was a ruse to pump sales. It wasn't. I was really afraid of losing my job and my career if found out. But I knew the rules they played by. And as Prince Humperdinck so eloquently put it, I always think everything could be a trap.I did several things:1. Alerted library staff that I thought there had been a virus downloaded on to the computer, so they could deal with it.2. Phoned a friend who knew my secret. I explained what happened. He agreed to log in to that email account from where he lived, halfway around the world, open the email and send a reply, so they would have competing IP address information.3. Alerted the man who owned the .co.uk address pointing to my blog, someone called Ian (who to my knowledge I have never met). He confirmed he had been contacted by the Times and asked if I was indeed in Florida. He told them he didn't know (which was true).Point 3 is the part that makes me think my suspicions were correct. I hadn't replied to the message from the computer in Florida, so why would they have a Florida IP address? They did get a reply from "my" account, but it would have had an IP address from Australia.(It's been suggested on Twitter that this could also have been because of a read receipt or embedded images. However, if my memory serves - and it usually does - the service I used did not send read receipts and I had images/HTML off as a matter of habit. There could of course be other explanations for what happened, but it is certainly true that the Times were trying hard to find me. Thanks for the comments, I hope this answers any concerns.) Full Article
meth Something hoist something petard. By belledejour-uk.blogspot.com Published On :: Mon, 03 Oct 2011 14:46:00 +0000 It is with some interest that I have been following media reports of the alleged conduct of Ashton Kutcher, a well-known campaigner against sex trafficking. As has been pointed out elsewhere, the "problem" his advocacy claims to address is certainly hugely overstated and possibly being manipulated by people who are at least as interested in money and credibility as they are in philanthropy. Interestingly, on Quora, which Kutcher has called "the smartest place on the internet" (you know, because academic journals and research forums are where the dumb kids hang out), there was a question not long ago which asked, "Why is it so common to include voluntary prostitution in the category of sex trafficking?" Kutcher stepped in, as did others, in defence of the idea that foreign-born women voluntarily choosing to enter sex work - such as, say, myself (and yes, one of them did mention me specifically) are trafficked. Also people being transported over state and international borders, or something. When you hear the word "trafficking", maybe you imagine a foreign child being kidnapped and sold into sexual slavery. Not only is that not accurate, it's also not what the lobbyists against sex work even seem to believe themselves. But it is an assumption they appear happy to exploit. As the Quora discussion shows, Kutcher and people like him claim that "trafficking" includes people going into sex work willingly and migrating willingly. In other words, equating consensual sex work with involuntary slavery. Actually a lot of other "rescue industry" types buy that as well. It's a stand with a lot of errors of logic, but it's their platform, they defend it, they own it. Right. Now, let's check out an article from the Daily Mail dated 03 October 2011 (no link since Istyosty has gone now, HuffPo covers it and so does The Frisky, also it's screensnapped below). It includes quotes from someone who not only claims to know the person Kutcher allegedly cheated with, but who also appears to indicate that the presence of girls like her at celeb parties is, shall we say, not entirely without reimbursement. Here's the bit in the Mail that caught my eye: Naumoff, who arranges for good looking girls to be shipped to certain hotspots, also told the newspaper: 'Sara’s a great girl. My job is to round up hot girls and bus them into clubs in San Diego or Vegas. The girls get free booze, food, whatever, and they attract rich and famous guys to the clubs. It’s a two-way street. The girls get to meet rich men and the guys get what they want.’ Which is? ‘Sex, obviously.’ Is Naumoff paid to do this? If so, by whom? The Mail doesn't say. You could be charitable and interpret this as kind of an introduction service. But then again, some of the men in question are already married. You could alternatively think this setup sounds an awful lot like people being reimbursed for travel and sex. Which might not only count as prostitution to some people, but trafficking as well. If you were the sort of person who was inclined to see things that way. Me? I don't believe anyone who enters any kind of quid-pro-quo relationship, be it sex for money or naked hot tubbing for a drinks tab, and does so willingly, is trafficked. So far so sugar daddy. But read the Quora opinions, and consider what's being quoted in the Mail, and ask yourself whether you think this alleged situation would tick the rescue industry's boxes for "prostitution: trafficking" or not. Whatever would the missus think? Full Article hypocrisy kutcher trafficking
meth New Aston Martin simulator ‘like something from Star Wars’ – Krack | RaceFans Round-up By www.racefans.net Published On :: Mon, 11 Nov 2024 00:01:00 +0000 In the round-up: New simulator 'like Star Wars' - Krack • Pirelli likes 'flexibility' of new C6 • Play NZ anthem when McLaren wins - Lawson Full Article RaceFans Round-up
meth An OCR Free Method for Word Spotting in Printed Documents: the Evaluation of Different Feature Sets By www.jucs.org Published On :: 2011-04-07T14:38:36+02:00 An OCR free word spotting method is developed and evaluated under a strong experimental protocol. Different feature sets are evaluated under the same experimental conditions. In addition, a tuning process in the document segmentation step is proposed which provides a significant reduction in terms of processing time. For this purpose, a complete OCR-free method for word spotting in printed documents was implemented, and a document database containing document images and their corresponding ground truth text files was created. A strong experimental protocol based on 800 document images allows us to compare the results of the three feature sets used to represent the word image. Full Article
meth Risk evaluation method of electronic bank investment based on random forest By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Aiming at the problems of high error rate, low evaluation accuracy and low investment return in traditional methods, a random forest-based e-bank investment risk evaluation method is proposed. First, establish a scientific e-bank investment risk evaluation index system. Then, G1-COWA combined weighting method is used to calculate the weights of each index. Finally, the e-bank investment risk evaluation index data is taken as the input vector, and the e-bank investment risk evaluation result is taken as the output vector. The random forest model is established and the result of e-banking investment risk evaluation is obtained. The experimental results show that the maximum relative error rate of this method is 4.32%, the evaluation accuracy range is 94.5~98.1%, and the maximum return rate of e-banking investment is 8.32%. It shows that this method can accurately evaluate the investment risk of electronic banking. Full Article
meth Research on Weibo marketing advertising push method based on social network data mining By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The current advertising push methods have low accuracy and poor advertising conversion effects. Therefore, a Weibo marketing advertising push method based on social network data mining is studied. Firstly, establish a social network graph and use graph clustering algorithm to mine the association relationships of users in the network. Secondly, through sparsisation processing, the association between nodes in the social network graph is excavated. Then, evaluate the tightness between user preferences and other nodes in the social network, and use the TF-IDF algorithm to extract user interest features. Finally, an attention mechanism is introduced to improve the deep learning model, which matches user interests with advertising domain features and outputs push results. The experimental results show that the push accuracy of this method is higher than 95%, with a maximum advertising click through rate of 82.7% and a maximum advertising conversion rate of 60.7%. Full Article
meth A method for selecting multiple logistics sites in cross-border e-commerce based on return uncertainty By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 To reduce the location cost of cross-border e-commerce logistics sites, this article proposes a multi-logistics site location method based on return uncertainty. Firstly, a site selection model is established with the objective function of minimising site construction costs, transportation costs, return costs, and operating costs, and the constraint conditions of return recovery costs and delayed pick-up time; Then, using the Monte Carlo method to simulate the number of returned items, and using an improved chicken swarm algorithm based on simulated annealing, the cross-border e-commerce multi-logistics site location model is solved to complete the location selection. Experimental results show that this method can effectively reduce the related costs of cross-border e-commerce multi-logistics site selection. After applying this method, the total cost of multi-logistics site selection is 19.4 million yuan, while the total cost of the five comparative methods exceeds 20 million yuan. Full Article
meth Risk-based operation of plug-in electric vehicles in a microgrid using downside risk constraints method By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 To achieve the benefits as much as possible, it is required to identify the available PEV capacity and prepare scheduling plans based on that. The analysis revealed that the risk-based scheduling of the microgrid could reduce the financial risk completely from $9.89 to $0.00 and increases the expected operation cost by 24% from $91.38 to $112.94, in turn. This implies that the risk-averse decision-maker tends to spend more money to reduce the expected risk-in-cost by using the proposed downside risk management technique. At the end, by the help of fuzzy satisfying method, the suitable risk-averse strategy is determined for the studied case. Full Article
meth An effective differential privacy protection method of location data based on perturbation loss constraint By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 Differential privacy is usually applied to location privacy protection scenarios, which confuses real data by adding interference noise to location points to achieve the purpose of protecting privacy. However, this method can result in a significant amount of redundant noisy data and impact the accuracy of the location. Considering the security and practicability of location data, an effective differential privacy protection method of location data based on perturbation loss constraint is proposed. After applying the Laplace mechanism under the condition of differential privacy to perturb the location data, the Savitzky-Golay filtering technology is used to correct the data with noise, and the data with large deviation and low availability is optimised. The introduction of Savitzky-Golay filtering mechanism in differential privacy can reduce the error caused by noise data while protecting user privacy. The experiments results indicate that the scheme improves the practicability of location data and is feasible. Full Article
meth Emotion recognition method for multimedia teaching classroom based on convolutional neural network By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 In order to further improve the teaching quality of multimedia teaching in school daily teaching, a classroom facial expression emotion recognition model is proposed based on convolutional neural network. VGGNet and CliqueNet are used as the basic expression emotion recognition methods, and the two recognition models are fused while the attention module CBAM is added. Simulation results show that the designed classroom face expression emotion recognition model based on V-CNet has high recognition accuracy, and the recognition accuracy on the test set reaches 93.11%, which can be applied to actual teaching scenarios and improve the quality of classroom teaching. Full Article
meth Natural language processing-based machine learning psychological emotion analysis method By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 To achieve psychological and emotional analysis of massive internet chats, researchers have used statistical methods, machine learning, and neural networks to analyse the dynamic tendencies of texts dynamically. For long readers, the author first compares and explores the differences between the two psychoanalysis algorithms based on the emotion dictionary and machine learning for simple sentences, then studies the expansion algorithm of the emotion dictionary, and finally proposes an extended text psychoanalysis algorithm based on conditional random field. According to the experimental results, the mental dictionary's accuracy, recall, and F-score based on the cognitive understanding of each additional ten words were calculated. The optimisation decreased, and the memory and F-score improved. An <i>F</i>-value greater than 1, which is the most effective indicator for evaluating the effectiveness of a mental analysis problem, can better demonstrate that the algorithm is adaptive in the literature dictionary. It has been proven that this scheme can achieve good results in analysing emotional tendencies and has higher efficiency than ordinary weight-based psychological sentiment analysis algorithms. Full Article
meth Using the Work System Method with Freshman Information Systems Students By Published On :: Full Article
meth The Influence of Teaching Methods on Learners’ Perception of E-safety By Published On :: 2017-10-24 Aim/Purpose: The traditional method of teaching e-safety by lecturing is not very effective. Despite learners often being equipped with the right knowledge, they reject the need to act accordingly. There is a need to improve the way digital e-safety is taught. Background: The study compares four different teaching styles, examining how each affected the way students perceive a range of e-safety keywords and consequently the way they approach this issue. Methodology: The semantic differential technique was used to carry out the research. Students completed a semantic differential questionnaire before and after lessons. A total of 405 first year undergraduates took part in the study. Contribution: The paper contributes to the debate on appropriate methods for teaching e-safety, with an aim to influence learners’ attitudes. Findings: Experience-based learning seems to be very effective, confronting students with an e-safety situation and providing them with a negative experience. This teaching method had the biggest influence on students who were deceived by the prepared e-safety risk situation. Recommendations for Practitioners: E-safety instruction can be enhanced by ensuring that lessons provide students with a personal experience. Recommendation for Researchers: The semantic differential technique can be used to measure changes in learners’ attitudes during the teaching process. Impact on Society: Our findings may bring improvements to the way e-safety topics are taught, which could, in turn, evoke in learners a more positive e-safety attitude and a desire to improve their e-safety behavior. Future Research: More research needs to be carried out to examine how the experiential learning method affects the attitudes of younger learners (primary, middle, and high school students). Full Article
meth Generating a Template for an Educational Software Development Methodology for Novice Computing Undergraduates: An Integrative Review By Published On :: 2024-09-24 Aim/Purpose: The teaching of appropriate problem-solving techniques to novice learners in undergraduate software development education is often poorly defined when compared to the delivery of programming techniques. Given the global need for qualified designers of information technology, the purpose of this research is to produce a foundational template for an educational software development methodology grounded in the established literature. This template can be used by third-level educators and researchers to develop robust educational methodologies to cultivate structured problem solving and software development habits in their students while systematically teaching the intricacies of software creation. Background: While software development methodologies are a standard approach to structured and traceable problem solving in commercial software development, educational methodologies for inexperienced learners remain a neglected area of research due to their assumption of prior programming knowledge. This research aims to address this deficit by conducting an integrative review to produce a template for such a methodology. Methodology: An integrative review was conducted on the key components of Teaching Software Development Education, Problem Solving, Threshold Concepts, and Computational Thinking. Systematic reviews were conducted on Computational Thinking and Software Development Education by employing the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) process. Narrative reviews were conducted on Problem Solving and Threshold Concepts. Contribution: This research provides a comprehensive analysis of problem solving, software development education, computational thinking, and threshold concepts in computing in the context of undergraduate software development education. It also synthesizes review findings from these four areas and combines them to form a research-based foundational template methodology for use by educators and researchers interested in software development undergraduate education. Findings: This review identifies seven skills and four concepts required by novice learners. The skills include the ability to perform abstraction, data representation, decomposition, evaluation, mental modeling, pattern recognition, and writing algorithms. The concepts include state and sequential flow, non-sequential flow control, modularity, and object interaction. The teaching of these skills and concepts is combined into a spiral learning framework and is joined by four development stages to guide software problem solving: understanding the problem, breaking into tasks, designing, coding, testing, and integrating, and final evaluation and reflection. This produces the principal finding, which is a research-based foundational template for educational software development methodologies. Recommendations for Practitioners: Focusing introductory undergraduate computing courses on a programming syllabus without giving adequate support to problem solving may hinder students in their attainment of development skills. Therefore, providing a structured methodology is necessary as it equips students with essential problem-solving skills and ensures they develop good development practices from the start, which is crucial to ensuring undergraduate success in their studies and beyond. Recommendation for Researchers: The creation of educational software development methodologies with tool support is an under-researched area in undergraduate education. The template produced by this research can serve as a foundational conceptual model for researchers to create concrete tools to better support computing undergraduates. Impact on Society: Improving the educational value and experience of software development undergraduates is crucial for society once they graduate. They drive innovation and economic growth by creating new technologies, improving efficiency in various industries, and solving complex problems. Future Research: Future research should concentrate on using the template produced by this research to create a concrete educational methodology adapted to suit a specific programming paradigm, with an associated learning tool that can be used with first-year computing undergraduates. Full Article
meth Electronic disciplinary violations and methods of proof in Jordanian and Egyptian laws By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 The use of electronic means of a public official in carrying out their duties may lead to an instance wherein the person discloses confidential information, which can significantly impact their obligations. After verifying this act as part of electronic misconduct, disciplinary action is enforced upon the concerned party to rectify and ensure proper functioning in delivering public services without any disturbance or infringement. The study presents several significant findings regarding the absence of comparative regulations concerning electronic violations and their judicial evidence. It provides recommendations such as modifying legislative frameworks to enhance public utility disciplinary systems and incorporating rules for electric violations. The fundamental focus revolves around assessing, verifying, and punishing digital misconduct by management or regulatory bodies. Additionally, this research employs descriptive-analytical methods comparing the Jordanian Law with its Egyptian counterpart in exploring these issues. Full Article
meth Honeybrid method for network security in a software defined network system By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 This research introduces a hybrid honeypot architecture to bolster security within software-defined networks (SDNs). By combining low-interaction and high-interaction honeypots, the proposed solution effectively identifies and mitigates cyber threats, including port scanning and man-in-the-middle attacks. The architecture is structured into multiple modules that focus on detecting open ports using Vilhala honeypots and simulating targeted and random attack scenarios. This hybrid approach enables comprehensive monitoring and detailed packet-level analysis, providing enhanced protection against advanced online threats. The study also conducts a comparative analysis of different attack detection methods using tools like KFSensor and networking shell commands. The results highlight the hybrid honeypot system's efficacy in filtering malicious traffic and detecting security breaches, making it a robust solution for safeguarding SDNs. Full Article
meth Unsupervised VAD method based on short-time energy and spectral centroid in Arabic speech case By www.inderscience.com Published On :: 2024-10-03T23:20:50-05:00 Voice Activity Detection (VAD) distinguishes speech segments from noise or silence areas. An efficient and noise-robust VAD system can be widely used for emerging speech technologies such as wireless communication and speech recognition. In this paper, we propose two versions of an unsupervised Arabic VAD method based on the combination of the Short-Time Energy (STE) and the Spectral Centroid (SC) features for formulating a typical threshold to detect speech areas. The first version compares only the STE feature to the threshold (STE-VAD). In contrast, the second compares the SC vector and the threshold (SC-VAD). The two versions of our VAD method were tested on 770 sentences of the Arabphone corpus, which were recorded in clean and noisy environments and evaluated under different values of Signal-to-Noise-Ratio. The experiments demonstrated the robustness of the STE-VAD in terms of accuracy and Mean Square Error. Full Article
meth Intelligent traffic congestion discrimination method based on wireless sensor network front-end data acquisition By www.inderscience.com Published On :: 2024-10-03T23:20:50-05:00 Conventional intelligent traffic congestion discrimination methods mainly use GPS terminals to collect traffic congestion data, which is vulnerable to the influence of vehicle time distribution, resulting in poor final discrimination effect. Necessary to design a new intelligent traffic congestion discrimination method based on wireless sensor network front-end data collection. That is to use the front-end data acquisition technology of wireless sensor network to generate a front-end data acquisition platform to obtain intelligent traffic congestion data, and then design an intelligent traffic congestion discrimination algorithm based on traffic congestion rules so as to achieve intelligent traffic congestion discrimination. The experimental results show that the intelligent traffic congestion discrimination method designed based on the front-end data collection of wireless sensor network has good discrimination effect, the obtained discrimination data is more accurate, effective and has certain application value, which has made certain contributions to reducing the frequency of urban traffic accidents. Full Article
meth Evaluation method for the effectiveness of online course teaching reform in universities based on improved decision tree By www.inderscience.com Published On :: 2024-09-03T23:20:50-05:00 Aiming at the problems of long evaluation time and poor evaluation accuracy of existing evaluation methods, an improved decision tree-based evaluation method for the effectiveness of college online course teaching reform is proposed. Firstly, the teaching mode of college online course is analysed, and an evaluation system is constructed to ensure the applicability of the evaluation method. Secondly, AHP entropy weight method is used to calculate the weights of evaluation indicators to ensure the accuracy and authority of evaluation results. Finally, the evaluation model based on decision tree algorithm is constructed and improved by fuzzy neural network to further optimise the evaluation results. The parameters of fuzzy neural network are adjusted and gradient descent method is used to optimise the evaluation results, so as to effectively evaluate the effect of college online course teaching reform. Through experiments, the evaluation time of the method is less than 5 ms, and the evaluation accuracy is more than 92.5%, which shows that the method is efficient and accurate, and provides an effective evaluation means for the teaching reform of online courses in colleges and universities. Full Article
meth A data classification method for innovation and entrepreneurship in applied universities based on nearest neighbour criterion By www.inderscience.com Published On :: 2024-09-03T23:20:50-05:00 Aiming to improve the accuracy, recall, and F1 value of data classification, this paper proposes an applied university innovation and entrepreneurship data classification method based on the nearest neighbour criterion. Firstly, the decision tree algorithm is used to mine innovation and entrepreneurship data from applied universities. Then, dynamic weight is introduced to improve the similarity calculation method based on edit distance, and the improved method is used to realise data de-duplication to avoid data over fitting. Finally, the nearest neighbour criterion method is used to classify applied university innovation and entrepreneurship data, and cosine similarity is used to calculate the similarity between the samples to be classified and each sample in the training data, achieving data classification. The experimental results demonstrate that the proposed method achieves a maximum accuracy of 96.5% and an average F1 score of 0.91. These findings indicate a high level of accuracy, recall, and F1 value for data classification using the proposed method. Full Article
meth Study on personalised recommendation method of English online learning resources based on improved collaborative filtering algorithm By www.inderscience.com Published On :: 2024-09-03T23:20:50-05:00 In order to improve recommendation coverage, a personalised recommendation method for English online learning resources based on improved collaborative filtering algorithm is studied to enhance the comprehensiveness of personalised recommendation for learning resources. Use matrix decomposition to decompose the user English online learning resource rating matrix. Cluster low dimensional English online learning resources by improving the K-means clustering algorithm. Based on the clustering results, calculate the backfill value of English online learning resources and backfill the information matrix of low dimensional English online learning resources. Using an improved collaborative filtering algorithm to calculate the predicted score of learning resources, personalised recommendation of English online learning resources for users based on the predicted score. Experimental results have shown that this method can effectively backfill English online learning resources, and the resource backfilling effect is excellent, and it has a high recommendation coverage rate. Full Article
meth An English MOOC similar resource clustering method based on grey correlation By www.inderscience.com Published On :: 2024-09-03T23:20:50-05:00 Due to the problems of low clustering accuracy and efficiency in traditional similar resource clustering methods, this paper studies an English MOOC similar resource clustering method based on grey correlation. Principal component analysis was used to extract similar resource features of English MOOC, and feature selection methods was used to pre-process similar resource features of English MOOC. On this basis, based on the grey correlation method, the pre-processed English MOOC similar resource features are standardised, and the correlation degree between different English MOOC similar resource features is calculated. The English MOOC similar resource correlation matrix is constructed to achieve English MOOC similar resource clustering. The experimental results show that the contour coefficient of the proposed method is closer to one, and the clustering accuracy of similar resources in English MOOC is as high as 94.2%, with a clustering time of only 22.3 ms. Full Article
meth Learning behaviour recognition method of English online course based on multimodal data fusion By www.inderscience.com Published On :: 2024-09-03T23:20:50-05:00 The conventional methods for identifying English online course learning behaviours have the problems of low recognition accuracy and high time cost. Therefore, a multimodal data fusion-based method for identifying English online course learning behaviours is proposed. Firstly, the analytic hierarchy process is used for decision fusion of multimodal data of learning behaviour. Secondly, based on the fusion results of multimodal data, weight coefficients are set to minimise losses and extract learning behaviour features. Finally, based on the extracted learning behaviour characteristics, the optimal classification function is constructed to classify the learning behaviour of English online courses. Based on the transfer information of learning behaviour status, the identification of online course learning behaviour is completed. The experimental results show that the recognition accuracy of the proposed method is above 90%, and its recognition accuracy is and can shorten the recognition time of learning behaviour, with high practical application reliability. Full Article
meth A method for evaluating the quality of college curriculum teaching reform based on data mining By www.inderscience.com Published On :: 2024-09-03T23:20:50-05:00 In order to improve the evaluation effect of current university teaching reform, a new method for evaluating the quality of university course teaching reform is proposed based on data mining algorithms. Firstly, the optimal data clustering criterion was used to select evaluation indicators and a quality evaluation system for university curriculum teaching reform was established. Next, a reform quality evaluation model is constructed using BP neural network, and the training process is improved through genetic algorithm to obtain the model weight and threshold of the optimal solution. Finally, the calculated parameters are substituted into the model to achieve accurate evaluation of the quality of university curriculum teaching reform. Selecting evaluation accuracy and evaluation efficiency as evaluation indicators, the practicality of the proposed method was verified through experiments. The experimental results showed that the proposed method can mine teaching reform data and evaluate the quality of teaching reform. Its evaluation accuracy is higher than 96.3%, and the evaluation time is less than 10ms, which is much better than the comparison method, fully demonstrating the practicality of the method. Full Article
meth Evaluation method of teaching reform quality in colleges and universities based on big data analysis By www.inderscience.com Published On :: 2024-09-03T23:20:50-05:00 Research on the quality evaluation of teaching reforms plays an important role in promoting improvements in teaching quality. Therefore, an evaluation method of teaching reform quality in colleges and universities based on big data analysis is proposed. A multivariate logistic model is used to select the evaluation indicators for the quality evaluation of teaching reforms in universities. And clustering and cleaning of the evaluation indicator data are performed through big data analysis. The evaluation indicator data is used as input vectors, and the results of the teaching reform quality evaluation are used as output vectors. A support vector machine model based on the whale algorithm is built to obtain the relevant evaluation results. Experimental results show that the proposed method achieves a minimum recall rate of 98.7% for evaluation indicator data, the minimum data processing time of 96.3 ms, the accuracy rate consistently above 97.1%. Full Article
meth A personalised recommendation method for English teaching resources on MOOC platform based on data mining By www.inderscience.com Published On :: 2024-09-03T23:20:50-05:00 In order to enhance the accuracy of teaching resource recommendation results and optimise user experience, a personalised recommendation method for English teaching resources on the MOOC platform based on data mining is proposed. First, the learner's evaluation of resources and resource attributes are abstracted into the same space, and resource tags are established using the Knowledge graph. Then, interest preference constraints are introduced to mine sequential patterns of user historical learning behaviour in the MOOC platform. Finally, a graph neural network is used to construct a recommendation model, which adjusts users' short-term and short-term interest parameters to achieve dynamic personalised teaching recommendation resources. The experimental results show that the accuracy and recall of the resource recommendation results of the research method are always higher than 0.9, the normalised sorting gain is always higher than 0.5. Full Article
meth Prediction method of college students' achievements based on learning behaviour data mining By www.inderscience.com Published On :: 2024-09-03T23:20:50-05:00 This paper proposes a method for predicting college students' performance based on learning behaviour data mining. The method addresses the issue of limited sample size affecting prediction accuracy. It utilises the K-means clustering algorithm to mine learning behaviour data and employs a density-based approach to determine optimal clustering centres, which are then output as the results of the clustering process. These clustering results are used as input for an attention encoder-decoder model to extract features from the learning behaviour sequence, incorporating an attention mechanism, sequence feature generator, and decoder. The characteristics derived from the learning behaviour sequence are then used to establish a prediction model for college students' performance, employing support vector regression. Experimental results demonstrate that this method accurately predicts students' performance with a relative error of less than 4% by leveraging the results obtained from learning behaviour data mining. Full Article
meth A method for evaluating the quality of teaching reform based on fuzzy comprehensive evaluation By www.inderscience.com Published On :: 2024-09-03T23:20:50-05:00 In order to improve the comprehensiveness of evaluation results and reduce errors, a teaching reform quality evaluation method based on fuzzy comprehensive evaluation is proposed. Firstly, on the premise of meeting the principles of indicator selection, factor analysis is used to construct an evaluation indicator system. Then, calculate the weights of various evaluation indicators through fuzzy entropy, establish a fuzzy evaluation matrix, and calculate the weight vector of evaluation indicators. Finally, the fuzzy cognitive mapping method is introduced to improve the fuzzy comprehensive evaluation method, obtaining the final weight of the evaluation indicators. The weight is multiplied by the fuzzy evaluation matrix to obtain the comprehensive evaluation result. The experimental results show that the maximum relative error of the proposed method's evaluation results is about 2.0, the average comprehensive evaluation result is 92.3, and the determination coefficient is closer to 1, verifying the application effect of this method. Full Article
meth Quantitative evaluation method of ideological and political teaching achievements based on collaborative filtering algorithm By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to overcome the problems of large error, low evaluation accuracy and long evaluation time in traditional evaluation methods of ideological and political education, this paper designs a quantitative evaluation method of ideological and political education achievements based on collaborative filtering algorithm. First, the evaluation index system is constructed to divide the teaching achievement evaluation index data in a small scale; then, the quantised dataset is determined and the quantised index weight is calculated; finally, the collaborative filtering algorithm is used to generate a set with high similarity, construct a target index recommendation list, construct a quantitative evaluation function and solve the function value to complete the quantitative evaluation of teaching achievements. The results show that the evaluation error of this method is only 1.75%, the accuracy can reach 98%, and the time consumption is only 2.0 s, which shows that this method can improve the quantitative evaluation effect. Full Article
meth A risk identification method for abnormal accounting data based on weighted random forest By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to improve the identification accuracy, accuracy and time-consuming of traditional financial risk identification methods, this paper proposes a risk identification method for financial abnormal data based on weighted random forest. Firstly, SMOTE algorithm is used to collect abnormal financial data; secondly, the original accounting data is decomposed into features, and the features of abnormal data are extracted through random forests; then, the index weight is calculated according to the entropy weight method; finally, the negative gradient fitting is used to determine the loss function, and the weighted random forest method is used to solve the loss function value, and the recognition result is obtained. The results show that the identification accuracy of this method can reach 99.9%, the accuracy rate can reach 96.06%, and the time consumption is only 6.8 seconds, indicating that the risk identification effect of this method is good. Full Article
meth Research on evaluation method of e-commerce platform customer relationship based on decision tree algorithm By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to overcome the problems of poor evaluation accuracy and long evaluation time in traditional customer relationship evaluation methods, this study proposes a new customer relationship evaluation method for e-commerce platform based on decision tree algorithm. Firstly, analyse the connotation and characteristics of customer relationship; secondly, the importance of customer relationship in e-commerce platform is determined by using decision tree algorithm by selecting and dividing attributes according to the information gain results. Finally, the decision tree algorithm is used to design the classifier, the weighted sampling method is used to obtain the training samples of the base classifier, and the multi-period excess income method is used to construct the customer relationship evaluation function to achieve customer relationship evaluation. The experimental results show that the accuracy of the customer relationship evaluation results of this method is 99.8%, and the evaluation time is only 51 minutes. Full Article
meth Evaluation method of cross-border e-commerce supply chain innovation mode based on blockchain technology By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In view of the low evaluation accuracy of the effectiveness of cross-border e-commerce supply chain innovation model and the low correlation coefficient of innovation model influencing factors, the evaluation method of cross-border e-commerce supply chain innovation model based on blockchain technology is studied. First, analyse the operation mode of cross-border e-commerce supply chain, and determine the key factors affecting the innovation mode; Then, the comprehensive integration weighting method is used to analyse the factors affecting innovation and calculate the weight value; Finally, the blockchain technology is introduced to build an evaluation model for the supply chain innovation model and realise the evaluation of the cross-border e-commerce supply chain innovation model. The experimental results show that the evaluation accuracy of the proposed method is high, and the highest correlation coefficient of the influencing factors of innovation mode is about 0.99, which is feasible. Full Article
meth Risk assessment method of power grid construction project investment based on grey relational analysis By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In view of the problems of low accuracy, long time consuming and low efficiency of the existing engineering investment risk assessment method; this paper puts forward the investment risk assessment method of power grid construction project based on grey correlation analysis. Firstly, classify the risks of power grid construction project; secondly, determine the primary index and secondary index of investment risk assessment of power grid construction project; then construct the correlation coefficient matrix of power grid project investment risk to calculate the correlation degree and weight of investment risk index; finally, adopt the grey correlation analysis method to construct investment risk assessment function to realise investment risk assessment. The experimental results show that the average accuracy of evaluating the investment risk of power grid construction projects using the method is 95.08%, and the maximum time consuming is 49 s, which proves that the method has high accuracy, short time consuming and high evaluation efficiency. Full Article
meth Student's classroom behaviour recognition method based on abstract hidden Markov model By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to improve the standardisation of mutual information index, accuracy rate and recall rate of student classroom behaviour recognition method, this paper proposes a student's classroom behaviour recognition method based on abstract hidden Markov model (HMM). After cleaning the students' classroom behaviour data, improve the data quality through interpolation and standardisation, and then divide the types of students' classroom behaviour. Then, in support vector machine, abstract HMM is used to calculate the output probability density of support vector machine. Finally, according to the characteristic interval of classroom behaviour, we can judge the category of behaviour characteristics. The experiment shows that normalised mutual information (NMI) index of this method is closer to one, and the maximum AUC-PR index can reach 0.82, which shows that this method can identify students' classroom behaviour more effectively and reliably. Full Article
meth A data mining method based on label mapping for long-term and short-term browsing behaviour of network users By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to improve the speedup and recognition accuracy of the recognition process, this paper designs a data mining method based on label mapping for long-term and short-term browsing behaviour of network users. First, after removing the noise information in the behaviour sequence, calculate the similarity of behaviour characteristics. Then, multi-source behaviour data is mapped to the same dimension, and a behaviour label mapping layer and a behaviour data mining layer are established. Finally, the similarity of the tag matrix is calculated based on the similarity calculation results, and the mining results are output using SVM binary classification process. Experimental results show that the acceleration ratio of this method exceeds 0.9; area under curve receiver operating characteristic curve (AUC-ROC) value increases rapidly in a short time, and the maximum value can reach 0.95, indicating that the mining precision of this method is high. Full Article
meth Auditing the Performing Rights Society - investigating a new European Union Collective Management Organization member audit method By www.inderscience.com Published On :: 2020-02-07T23:20:50-05:00 The European Union Rights Management Directive 2014/26/EU, provides regulatory oversight of European Union (EU) Collective Management Organizations (CMOs). However, the Directive has no provision indicating how members of EU CMOs may conduct non-financial audits of their CMO income and reporting. This paper addresses the problem of a lack of an audit method through a case study of the five writer members of the music group Duran Duran, who have been members of the UK's CMO for performing rights - the Performing Rights Society (PRS) for over 35 years. The paper argues a new audit CMO member method that can address the lacunae regarding the absence of CMO member right to audit a CMO and an applicable CMO audit method. Full Article
meth Transformative advances in volatility prediction: unveiling an innovative model selection method using exponentially weighted information criteria By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Using information criteria is a common method for making a decision about which model to use for forecasting. There are many different methods for evaluating forecasting models, such as MAE, RMSE, MAPE, and Theil-U, among others. After the creation of AIC, AICc, HQ, BIC, and BICc, the two criteria that have become the most popular and commonly utilised are Bayesian IC and Akaike's IC. In this investigation, we are innovative in our use of exponential weighting to get the log-likelihood of the information criteria for model selection, which means that we propose assigning greater weight to more recent data in order to reflect their increased precision. All research data is from the major stock markets' daily observations, which include the USA (GSPC, DJI), Europe (FTSE 100, AEX, and FCHI), and Asia (Nikkei). Full Article
meth Logical Soft Systems Methodology for Education Programme Development By Published On :: Full Article
meth Insights into Using Agile Development Methods in Student Final Year Projects By Published On :: Full Article
meth Assessing the Impact of Instructional Methods and Information Technology on Student Learning Styles By Published On :: Full Article
meth Remote Method Invocation and Mobil Agent: A Comparative Analysis By Published On :: Full Article
meth Experimenting with eXtreme Teaching Method – Assessing Students’ and Teachers’ Experiences By Published On :: Full Article
meth An Exploration of How a Technology-Facilitated Part-Complete Solution Method Supports the Learning of Computer Programming By Published On :: Full Article
meth Towards a Guide for Novice Researchers on Research Methodology: Review and Proposed Methods By Published On :: Full Article