using 6,595 Words on a Traffic Generation Tactic You’re Not Using (But Should Be) By www.viperchill.com Published On :: Wed, 13 Jan 2016 16:58:42 +0000 I would argue that when it comes to making money online, the most important skill you need is not in being able to find untapped niches, knowing how to do A/B testing, creating attractive websites or even having a great ability to write. Instead, the most sought after skill in my eyes is being able […] The post 6,595 Words on a Traffic Generation Tactic You’re Not Using (But Should Be) appeared first on ViperChill. Full Article Social Media
using Confusing Our Goodness with God’s Goodness By www.ancientfaith.com Published On :: 2024-11-08T15:54:01+00:00 Join Michael in a discussion of God’s goodness versus our own goodness, and why the prevalent cultural belief of many that all you have to be is a good person is results in so many unintended consequences. Full Article
using How to Create a Blog or a Freelance Writer’s Portfolio Using Propel Site By leavingworkbehind.com Published On :: Mon, 07 Sep 2020 22:39:00 +0000 These days, anyone can start a blog or create a simple website in a matter of hours. However, getting that website to work and look just the way you want it to takes a lot more time. Most people don’t realize that and end up giving up long before the work is done. If you don’t have […] The post How to Create a Blog or a Freelance Writer’s Portfolio Using Propel Site appeared first on Leaving Work Behind. Full Article Blogging Beginner Blogging
using Divine Dousing with the Dynamic Duo By www.ancientfaith.com Published On :: 2014-11-22T06:12:57+00:00 Thanks to a superb pair of handlers/chauffeurs, Fr. Joseph goes a house blessin' in Houston. Full Article
using Offering the Fruits of Our Lives Instead of Using Religion to Hoard Them By www.ancientfaith.com Published On :: 2020-09-08T21:27:28+00:00 As much as we do not like to acknowledge it, Christ’s Kingdom is not about giving us religion or anything else on our own terms. He calls us to offer Him “the fruits [of our lives] in their seasons.” Full Article
using Humbly Refusing to Remain in the Dark By www.ancientfaith.com Published On :: 2022-02-02T20:26:56+00:00 Let us not despair even when the darkness threatens to overwhelm us, but instead mindfully open our hearts to the light of Christ as we trust that He will minister to us at our point of greatest need and make us participants in His salvation. Full Article
using Anti-government militias using Facebook to recruit and organize in plain sight By www.wired.com Published On :: Wed, 30 Oct 2024 18:53:22 +0000 in some cases, Meta is automatically creating the pages # Full Article Links
using Spammers using Google links By www.hutteman.com Published On :: 2006-05-05T21:13:41-05:00 In my "Spam Suspects" email folder today, I noticed some spam which used Google as a redirection service, by linking to http://www.google.com/url?q=http://www.somespamsite.com. When trying this technique with some other site, I found that google responds to this query with a 302 redirect to the site in question. Clearly, the spammer was using this system to lure people who trust Google... (176 words) Full Article Miscellaneous
using You Keep Using That Word By www.ancientfaith.com Published On :: 2015-09-13T14:10:09+00:00 Full Article
using Summer Musings By www.ancientfaith.com Published On :: 2020-01-31T21:25:20+00:00 Dr. Albert Rossi shares his insights from his summer experiences. Full Article
using Musings about the Theotokos - Part 2 By www.ancientfaith.com Published On :: 2021-04-09T14:13:50+00:00 Dr. Albert Rossi continues his musings about the real life experiences of the Theotokos. Full Article
using Musing About the Theotokos - Part 1 By www.ancientfaith.com Published On :: 2021-04-09T14:14:14+00:00 Dr. Albert Rossi muses about the life of the Theotokos, the Virgin Mary, "the Great Example". Full Article
using 078: Sahil Bloom – Using Flywheels to Build Longevity in the Creator Economy By nathanbarry.com Published On :: Mon, 31 Jul 2023 09:00:17 +0000 In today’s episode, I sit down with investor, entrepreneur, and content creator, Sahil Bloom (in front of a live audience) to unpack the key strategies and lessons that will help you achieve longevity and sustainability in the creator economy. Sahil has had a fascinating journey, transitioning from the world of private equity to making a […] Full Article Podcast
using Road work causing gridlock in Fort William By www.bbc.com Published On :: Wed, 13 Nov 2024 12:09:23 GMT Bear Scotland says it is aware of complaints about congestion around improvements to a cycleway. Full Article
using Labour 'shocked' by social housing failures By www.bbc.com Published On :: Wed, 13 Nov 2024 11:07:38 GMT A council refers itself to the Regulator of Social Housing following a review. Full Article
using Emergency housing: 'I miss my sofa the most' By www.bbc.com Published On :: Wed, 13 Nov 2024 06:04:50 GMT Heather is one of dozens of people in Portsmouth living in temporary accommodation. Full Article
using Campaigners 'delighted' housing estate turned down By www.bbc.com Published On :: Tue, 12 Nov 2024 06:10:47 GMT Developers wanted to build 20 homes on land next to a Site of Biological Importance in Harwood, Bolton. Full Article
using Council spends £2.5m on temporary homeless housing By www.bbc.com Published On :: Wed, 13 Nov 2024 08:25:09 GMT Sandwell Council says there are currently 220 households living in temporary accommodation. Full Article
using Using leftovers for free meals in Worcester By www.bbc.co.uk Published On :: Mon, 04 Nov 2024 13:06:00 GMT Discover FoodCycle, which turns supermarket food waste into hot meals. Full Article
using Tax on second homes to fund affordable housing By www.bbc.com Published On :: Wed, 06 Nov 2024 07:58:53 GMT North Yorkshire councillors say £1m from the second homes tax premium will fund community-led plans. Full Article
using Hundreds of social housing mould cases reported By www.bbc.com Published On :: Thu, 07 Nov 2024 18:19:48 GMT There are almost 400 active cases of reported damp or mould in social housing across Wiltshire. Full Article
using The ultimate guide for using behavioural analytics and A/B testing to optimise website conversions By www.articulatemarketing.com Published On :: 2024-08-15T08:15:00Z Content may be king, but data sits behind the throne and has the king’s ear. You want to be informed by data before you make changes to your marketing strategies. This is never truer than in the case of your website, which is a rich source of behavioural analytics and, therefore, a valuable insight into your audience’s interests. Full Article Websites Hubspot
using Using personalisation and segmentation to support advanced marketing techniques By www.articulatemarketing.com Published On :: 2024-08-29T08:15:00Z Advanced marketing techniques such as Account-based Marketing (ABM) and 1-1 marketing require a more individualised approach than traditional inbound marketing tactics. No longer can we paint with a broad brush, as marketers. We must find ways to speak directly with individuals, rather than an audience. Full Article Websites abm
using How to create more housing By www.mackinac.org Published On :: Wed, 23 Oct 2024 06:00:00 -0400 Muskegon’s supply-side reforms designed to ease home price inflation Full Article
using Using OSGi as the core of a middleware platform By pzf.fremantle.org Published On :: Thu, 11 Nov 2010 10:37:00 +0000 Ross Mason of Mulesoft recently blogged: "OSGi - no thanks". Ross is a smart guy and he usually has something interesting to say. In this case, I think Ross has made a lot of good points: 1. Ross is right - OSGi is a great technology for middleware vendors. 2. Ross is right - Developers shouldn't be forced to mess with OSGi. 3. Ross is wrong - You can make both of these work together. At WSO2 we went through exactly the same issues. We simply came to a different conclusion - that we can provide the benefits of OSGi (modularity, pluggability, dynamic loading) without giving pain to end-users. In WSO2 Carbon, customers can deploy their systems in exactly the same way that worked pre-OSGi. Why did we choose OSGi? We also looked at building our own dynamic loading schemes. In fact, we've had dynamic classloading capabilities in our platform from day one. The reasons we went with OSGi are: A structured and versioned approach to dynamic classloading An industry standard approach - hence better understood, better skills, better resources It solves more than just dynamic loading: as well as providing versions and dynamic loading, it also really gives proper modularity - which means hiding classes as much as exposing classes. It provides (through Equinox p2) a proper provisioning model. It wasn't easy. We struggled with OSGi to start with, but in the end we have a much stronger solution than if we had built our own. And we have done some great improvements. Our new Carbon Studio tooling gives a simple model to build complete end-to-end applications and hides OSGi completely from the end-user. The web admin consoles and deployment models allow complete deployment with zero OSGi. Drop a JAR in and we take care of the OSGi bundling for you. The result - the best of both worlds - ease of use for developers and great middleware. Full Article
using Using OAuth 2.0 with MQTT By pzf.fremantle.org Published On :: Thu, 14 Nov 2013 14:37:00 +0000 I've been thinking about security and privacy for IoT. I would argue that as the IoT grows we are going to need to think about federated and user-directed authorization. In other words, if my device is publishing data, I ought to be able to decide who can use that data. And my identity ought to be something based on my own identity provider. The latest working draft of the MQTT spec explicitly calls out that one might use OAuth tokens as identifiers in the CONNECT, so I have tried this out using OAuth 2.0 bearer tokens. In order to do it, I used Mosquitto and mosquitto_pyauth, which is a handy plugin that let's you write your authentication/authorization login in python. As the OAuth provider I used the WSO2 Identity Server. The plan I had on starting was: Use a web app to go through the bootstrap process to get the bearer token. Encode an OAuth scope that indicates what permissions the token will have: e.g. rw{/topic/#} would allow the client to publish and subscribe to anything in /topic/# Encode the bearer token as the password, with a standard username such as "OAuth Bearer" During the connect validate the token is ok During any pub/sub validate the requested resource against the scope. Here is a sequence diagram: The good news - it works. In order to help, I created a shim in the ESB that offers a nice RESTful OAuth Token Introspection service, and I call that from my Python authentication and authorization logic. I had to do a few hacks to get it to work. 1) I wanted to use a JSON array to capture the scopes that are allowed. It turns out that there was a problem, so I had to encode the JSON as a Base 64 string. This is just a bug in the OAuth provider I think. 2) I couldn't encode the token as the password, because of the way Mosquitto and mosquitto_pyauth call my code. I ended up passing the token as the username instead. I need to look at the mosquitto auth plugin interface more deeply to see if this is something I can fix or I need help from Mosquitto for. 3) mosquitto_pyauth assumes that if you have a username you must have a password, so I had to pass bogus passwords as well as the token. This is a minor issue. Overall it works pretty nicely, but there are some wider issues I've come up with that I'll capture in another write-up. I'm pretty pleased as I think this could be used effectively to help control access to MQTT topics in a very cool kind of way. Thanks to Roger Light for Mosquitto and Martin Bachry for mosquitto_pyauth. And of course to the WSO2 Identity Server team for creating a nice easy to use OAuth2 provider, especially Prabath for answering the questions I had. Here is the pyauth plugin I wrote. Apologies for poor coding, etc - my only excuses are (1) its a prototype and (2) I'm a CTO... do you expect nice code?! Loading .... Full Article
using Document Retrieval Using SIFT Image Features By www.jucs.org Published On :: 2011-04-07T14:38:22+02:00 This paper describes a new approach to document classification based on visual features alone. Text-based retrieval systems perform poorly on noisy text. We have conducted series of experiments using cosine distance as our similarity measure, selecting varying numbers local interest points per page, and varying numbers of nearest neighbour points in the similarity calculations. We have found that a distance-based measure of similarity outperforms a rank-based measure except when there are few interest points. We show that using visual features substantially outperforms textbased approaches for noisy text, giving average precision in the range 0.4-0.43 in several experiments retrieving scientific papers. Full Article
using Color Image Restoration Using Neural Network Model By www.jucs.org Published On :: 2011-04-07T14:38:54+02:00 Neural network learning approach for color image restoration has been discussed in this paper and one of the possible solutions for restoring images has been presented. Here neural network weights are considered as regularization parameter values instead of explicitly specifying them. The weights are modified during the training through the supply of training set data. The desired response of the network is in the form of estimated value of the current pixel. This estimated value is used to modify the network weights such that the restored value produced by the network for a pixel is as close as to this desired response. One of the advantages of the proposed approach is that, once the neural network is trained, images can be restored without having prior information about the model of noise/blurring with which the image is corrupted. Full Article
using Realising the Potential of Web 2.0 for Collaborative Learning Using Affordances By www.jucs.org Published On :: 2011-07-08T12:30:08+02:00 With the emergence of the Web 2.0 phenomena, technology-assisted social networking has become the norm. The potential of social software for collaborative learning purposes is clear, but as yet there is little evidence of realisation of the benefits. In this paper we consider Information and Communication Technology student attitudes to collaboration and via two case studies the extent to which they exploit the use of wikis for group collaboration. Even when directed to use a particular wiki designed for the type of project they are involved with, we found that groups utilized the wiki in different ways according to the affordances ascribed to the wiki. We propose that the integration of activity theory with an affordances perspective may lead to improved technology, specifically Web 2.0, assisted collaboration. Full Article
using Enhancement of Collaborative Learning Activities using Portable Devices in the Classroom By www.jucs.org Published On :: 2011-07-08T12:30:09+02:00 Computer Supported Collaborative Learning could highly impact education around the world if the proper Collaborative Learning tools are set in place. In this paper we describe the design of a collaborative learning activity for teaching Chemistry to Chilean students. We describe a PDA-based software tool that allows teachers to create workgroups in their classrooms in order to work on the activity. The developed software tool has three modules: one module for teachers, which runs on a PC and lets them create the required pedagogical material; second, there is a PDA module for students which lets them execute the activity; finally, a third module allows the teacher set workgroups and monitor each workgroup during the activity. Full Article
using On the Construction of Efficiently Navigable Tag Clouds Using Knowledge from Structured Web Content By www.jucs.org Published On :: 2011-07-08T12:31:45+02:00 In this paper we present an approach to improving navigability of a hierarchically structured Web content. The approach is based on an integration of a tagging module and adoption of tag clouds as a navigational aid for such content. The main idea of this approach is to apply tagging for the purpose of a better highlighting of cross-references between information items across the hierarchy. Although in principle tag clouds have the potential to support efficient navigation in tagging systems, recent research identified a number of limitations. In particular, applying tag clouds within pragmatic limits of a typical user interface leads to poor navigational performance as tag clouds are vulnerable to a so-called pagination effect. In this paper, a solution to the pagination problem is discussed, implemented as a part of an Austrian online encyclopedia called Austria-Forum, and analyzed. In addition, a simulation-based evaluation of the new algorithm has been conducted. The first evaluation results are quite promising, as the efficient navigational properties are restored. Full Article
using A Clustering Approach for Collaborative Filtering Recommendation Using Social Network Analysis By www.jucs.org Published On :: 2011-07-08T12:31:46+02:00 Collaborative Filtering(CF) is a well-known technique in recommender systems. CF exploits relationships between users and recommends items to the active user according to the ratings of his/her neighbors. CF suffers from the data sparsity problem, where users only rate a small set of items. That makes the computation of similarity between users imprecise and consequently reduces the accuracy of CF algorithms. In this article, we propose a clustering approach based on the social information of users to derive the recommendations. We study the application of this approach in two application scenarios: academic venue recommendation based on collaboration information and trust-based recommendation. Using the data from DBLP digital library and Epinion, the evaluation shows that our clustering technique based CF performs better than traditional CF algorithms. Full Article
using Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection By www.jucs.org Published On :: 2011-07-04T16:04:49+02:00 E-mail spam is no more garbage but risk since it recently includes virus attachments and spyware agents which make the recipients' system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning techniques have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should counteract with it. To cope with this, parameters optimization and feature selection have been used to reduce processing overheads while guaranteeing high detection rates. However, previous approaches have not taken into account feature variable importance and optimal number of features. Moreover, to the best of our knowledge, there is no approach which uses both parameters optimization and feature selection together for spam detection. In this paper, we propose a spam detection model enabling both parameters optimization and optimal feature selection; we optimize two parameters of detection models using Random Forests (RF) so as to maximize the detection rates. We provide the variable importance of each feature so that it is easy to eliminate the irrelevant features. Furthermore, we decide an optimal number of selected features using two methods; (i) only one parameters optimization during overall feature selection and (ii) parameters optimization in every feature elimination phase. Finally, we evaluate our spam detection model with cost-sensitive measures to avoid misclassification of legitimate messages, since the cost of classifying a legitimate message as a spam far outweighs the cost of classifying a spam as a legitimate message. We perform experiments on Spambase dataset and show the feasibility of our approaches. Full Article
using Cloud Warehousing By www.jucs.org Published On :: 2011-07-20T10:35:19+02:00 Data warehouses integrate and aggregate data from various sources to support decision making within an enterprise. Usually, it is assumed that data are extracted from operational databases used by the enterprise. Cloud warehousing relaxes this view permitting data sources to be located anywhere on the world-wide web in a so-called "cloud", which is understood as a registry of services. Thus, we need a model of dataintensive web services, for which we adopt the view of the recently introduced model of abstract state services (AS2s). An AS2 combines a hidden database layer with an operation-equipped view layer, and thus provides an abstraction of web services that can be made available for use by other systems. In this paper we extend this model to an abstract model of clouds by means of an ontology for service description. The ontology can be specified using description logics, where the ABox contains the set of services, and the TBox can be queried to find suitable services. Consequently, AS2 composition can be used for cloud warehousing. Full Article
using A feature-based model selection approach using web traffic for tourism data By www.inderscience.com Published On :: 2024-07-05T23:20:50-05:00 The increased volume of accessible internet data creates an opportunity for researchers and practitioners to improve time series forecasting for many indicators. In our study, we assess the value of web traffic data in forecasting the number of short-term visitors travelling to Australia. We propose a feature-based model selection framework which combines random forest with feature ranking process to select the best performing model using limited and informative number of features extracted from web traffic data. The data was obtained for several tourist attraction and tourism information websites that could be visited by potential tourists to find out more about their destinations. The results of random forest models were evaluated over 3- and 12-month forecasting horizon. Features from web traffic data appears in the final model for short term forecasting. Further, the model with additional data performs better on unseen data post the COVID19 pandemic. Our study shows that web traffic data adds value to tourism forecasting and can assist tourist destination site managers and decision makers in forming timely decisions to prepare for changes in tourism demand. Full Article
using Stop Using Chrome On Your iPhone, Warns Apple—Millions Of Users Must Now Decide - Forbes By news.google.com Published On :: Wed, 13 Nov 2024 05:01:37 GMT Stop Using Chrome On Your iPhone, Warns Apple—Millions Of Users Must Now Decide Forbes4 new Chrome improvements for iOS The KeywordChrome on your iPhone can search using pictures and words at the same time The VergeGoogle Rolls Out Four New Chrome Features for iOS iPhone in CanadaChrome 131 for iOS adding new Google Drive, Maps integrations 9to5Google Full Article
using Studentsâ Perceptions of Using Massive Open Online Courses (MOOCs) in Higher Learning Institutions By ijedict.dec.uwi.edu Published On :: Sat, 31 Aug 2024 09:44:41 -0400 Full Article Refereed Articles
using Risk-based operation of plug-in electric vehicles in a microgrid using downside risk constraints method By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 To achieve the benefits as much as possible, it is required to identify the available PEV capacity and prepare scheduling plans based on that. The analysis revealed that the risk-based scheduling of the microgrid could reduce the financial risk completely from $9.89 to $0.00 and increases the expected operation cost by 24% from $91.38 to $112.94, in turn. This implies that the risk-averse decision-maker tends to spend more money to reduce the expected risk-in-cost by using the proposed downside risk management technique. At the end, by the help of fuzzy satisfying method, the suitable risk-averse strategy is determined for the studied case. Full Article
using Enabling smart city technologies: impact of smart city-ICTs on e-Govt. services and society welfare using UTAUT model By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Smart cities research is growing all over the world seeking to understand the effect of smart cities from different angles, domains and countries. The aim of this study is to analyse how the smart city ICTs (e.g., big data analytics, AI, IoT, cloud computing, smart grids, wireless communication, intelligent transportation system, smart building, e-governance, smart health, smart education and cyber security) are related to government. services and society welfare from the perspective of China. This research confirmed a positive correlation of smart city ICTs to e-Govt. Services (e-GS). On the other hand, the research showed a positive influence of smart city ICTs on society's welfare. These findings about smart cities and ICTs inform us how the thought paradigm to smart technologies can cause the improvement of e-GS through economic development, job creation and social welfare. The study offers different applications of the theoretical perspectives and the management perspective which are significant to building a society during recent technologised era. Full Article
using An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Image forgery detection techniques refer to the process of detecting manipulated or altered images, which can be used for various purposes, including malicious intent or misinformation. Image forgery detection is a crucial task in digital image forensics, where researchers have developed various techniques to detect image forgery. These techniques can be broadly categorised into active, passive, machine learning-based and hybrid. Active approaches involve embedding digital watermarks or signatures into the image during the creation process, which can later be used to detect any tampering. On the other hand, passive approaches rely on analysing the statistical properties of the image to detect any inconsistencies or irregularities that may indicate forgery. In this paper for the detection of scaling and cropping attack a deep learning method has been proposed using ResNet. The proposed method (Res-Net-Adam-Adam) is able to achieve highest amount of accuracy of 99.14% (0.9914) while detecting fake and real images. Full Article
using Robust and secure file transmission through video streaming using steganography and blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 File transfer is always handled by a separate service, sometimes it is a third-party service in videoconferencing. When sending files during a video session, file data flow and video stream are independent of each other. Encryption is a mature method to ensure file security. However, it still has the chance to leave footprints on the intermediate forwarding machines. These footprints can indicate that a file once passed through, some protocol-related logs give clues to the hackers' later investigation. This work proposes a file-sending scheme through the video stream using blockchain and steganography. Blockchain is used as a file slicing and linkage mechanism. Steganography is applied to embed file pieces into video frames that are continuously generated during the session. The scheme merges files into the video stream with no file transfer protocol use and no extra bandwidth consumed by the file to provide trackless file transmission during the video communication. Full Article
using Secure digital academic certificate verification system using blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 At present, there is a need for an authentic and fast approach to certificate verification. Which verifies and authenticates the certificates to reduce the extent of duplicity and time. An academic certificate is significant for students, the government, universities, and employers. Academic credentials play a vital role in the career of students. A few people manipulate academic documents for their benefit. There are cases identified where people produced fake academic certificates for jobs or higher education admission. Various research works are developing a secure model to verify genuine academic credentials. This research article proposed a new security model which contains several security algorithms such as timestamps, hash function, digital signature, steganography, and blockchain. The proposed model issues secure digital academic certificates. It enhanced security measures and automated educational certificate verification using blockchain technology. The advantages of the proposed model are automated, cost-effective, secured, traceable, accurate, and time-saving. Full Article
using Robust watermarking of medical images using SVM and hybrid DWT-SVD By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 In the present scenario, the security of medical images is an important aspect in the field of image processing. Support vector machines (SVMs) are a supervised machine learning technique used in image classification. The roots of SVM are from statistical learning theory. It has gained excellent significance because of its robust, accurate, and very effective algorithm, even though it was applied to a small set of training samples. SVM can classify data into binary classification or multiple classifications according to the application's needs. Discrete wavelet transform (DWT) and singular value decomposition (SVD) transform techniques are utilised to enhance the image's security. In this paper, the image is first classified using SVM into ROI and RONI, and thereafter, to enhance the images diagnostic capabilities, the DWT-SVD-based hybrid watermarking technique is utilised to embed the watermark in the RONI region. Overall, our work makes a significant contribution to the field of medical image security by presenting a novel and effective solution. The results are evaluated using both perceptual and imperceptibility testing using PSNR and SSIM parameters. Different attacks were introduced to the watermarked image, which shows the efficacy and robustness of the proposed algorithm. Full Article
using An image encryption using hybrid grey wolf optimisation and chaotic map By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Image encryption is a critical and attractive issue in digital image processing that has gained approval and interest of many researchers in the world. A proposed hybrid encryption method was implemented by using the combination of the Nahrain chaotic map with a well-known optimised algorithm namely the grey wolf optimisation (GWO). It was noted from analysing the results of the experiments conducted on the new hybrid algorithm, that it gave strong resistance against expected statistical invasion as well as brute force. Several statistical analyses were carried out and showed that the average entropy of the encrypted images is near to its ideal information entropy. Full Article
using A constant temperature control system for indoor environments in buildings using internet of things By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 The performance of a building's internal environment, which includes the air temperature, lighting and acoustics, is what determines the quality of the environment inside the building. We present a thermal model for achieving thermal comfort in buildings that makes use of a multimodal analytic framework as a solution to this challenge. In this study, a multimodal combination is used to evaluate several temperature and humidity sensors as well as an area image. Additionally, a CNN and LSTM combination is used to process the image and sensor data. The results show that heating setback and interior set point temperatures, as well as mechanical ventilation based on real people's presence and CO<SUB align=right>2 levels, are all consistently reduced when ICT-driven intelligent solutions are used. The CNN-LSTM model has a goodness of fit that is 0.7258 on average, which is much higher than both the CNN (0.5291) and LSTM (0.5949) models. Full Article
using Smart approach to constraint programming: intelligent backtracking using artificial intelligence By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 Constrained programming is the concept used to select possible alternatives from an incredibly diverse range of candidates. This paper proposes an AI-assisted Backtracking Scheme (AI-BS) by integrating the generic backtracking algorithm with Artificial Intelligence (AI). The detailed study observes that the extreme dual ray associated with the infeasible linear program can be automatically extracted from minimum unfeasible sets. Constraints are used in artificial intelligence to list all possible values for a group of variables in a given universe. To put it another way, a solution is a way of assigning a value to each variable that these values satisfy all constraints. Furthermore, this helps the study reach a decreased search area for smart backtracking without paying high costs. The evaluation results exhibit that the IB-BC algorithm-based smart electricity schedule controller performs better electricity bill during the scheduled periods than comparison approaches such as binary backtracking and binary particle swarm optimiser. Full Article
using BEFA: bald eagle firefly algorithm enabled deep recurrent neural network-based food quality prediction using dairy products By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Food quality is defined as a collection of properties that differentiate each unit and influences acceptability degree of food by users or consumers. Owing to the nature of food, food quality prediction is highly significant after specific periods of storage or before use by consumers. However, the accuracy is the major problem in the existing methods. Hence, this paper presents a BEFA_DRNN approach for accurate food quality prediction using dairy products. Firstly, input data is fed to data normalisation phase, which is performed by min-max normalisation. Thereafter, normalised data is given to feature fusion phase that is conducted employing DNN with Canberra distance. Then, fused data is subjected to data augmentation stage, which is carried out utilising oversampling technique. Finally, food quality prediction is done wherein milk is graded employing DRNN. The training of DRNN is executed by proposed BEFA that is a combination of BES and FA. Additionally, BEFA_DRNN obtained maximum accuracy, TPR and TNR values of 93.6%, 92.5% and 90.7%. Full Article
using Enhancing clean technology's dynamic cross technique using value chain By www.inderscience.com Published On :: 2024-10-01T23:20:50-05:00 Numerous Indian economic sectors have been impacted by the COVID-19 epidemic, with many being forced to the verge of extinction. As a result, this essay analyses the importance of supply chains for grapes and the manufactured goods made from them, including beverages and currants, in a specific state that happens to be India's top grape-producing region. In order to identify the sites of rupture brought on by the pandemic and to recommend policy changes to create a resilient system, a value chain analysis is performed. Value chain management has emerged as one of the key strategies businesses use today to boost productivity and costs when they are up against greater rivalry in the marketplace, however, with several new challenges, such as concerns over security, environmental protection, compensation, and business accountability. According to the value chain study, the level of value addition for intermediary agents, such as pre-harvest contractors, has increased after COVID-19 at the expense of farmers. Various policy approaches are explained to enhance the grape value chain using the knowledge gained from Porter's value chain results and supply and demand shocks. Full Article
using Loan delinquency analysis using predictive model By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The research uses a machine learning approach to appraising the validity of customer aptness for a loan. Banks and non-banking financial companies (NBFC) face significant non-performing assets (NPAs) threats because of the non-payment of loans. In this study, the data is collected from Kaggle and tested using various machine learning models to determine if the borrower can repay its loan. In addition, we analysed the performance of the models [K-nearest neighbours (K-NN), logistic regression, support vector machines (SVM), decision tree, naive Bayes and neural networks]. The purpose is to support decisions that are based not on subjective aspects but objective data analysis. This work aims to analyse how objective factors influence borrowers to default loans, identify the leading causes contributing to a borrower's default loan. The results show that the decision tree classifier gives the best result, with a recall rate of 0.0885 and a false- negative rate of 5.4%. Full Article
using Using Digital Logs to Reduce Academic Misdemeanour by Students in Digital Forensic Assessments By Published On :: Full Article