us Elon Musk se défend au tribunal d'accusations "scandaleuses" sur des tweets de 2018 By www.rtl.be Published On :: Tue, 24 Jan 2023 01:00:17 +0100 Elon Musk a tenté de montrer lundi au tribunal que ses fameux tweets de 2018, sur sa volonté de sortir Tesla de la Bourse, n'avaient rien de trompeurs ou de frauduleux, contrairement aux accusations d'investisseurs qui disent avoir perdu des millions de dollars à cause du milliardaire. Le patron de Tesla -- et de Twitter, depuis fin octobre -- a assuré qu'il n'avait "jamais" cherché à tromper les investisseurs, et que l'accusation de fraude était "scandaleuse". Il avait créé la stupeur le 7 août 2018 en affirmant qu'il voulait retirer son groupe automobile de la Bourse au prix de 420 dollars par action, puis en assurant que le financement était "sécurisé". "Je ne disais pas que c'était fait, je disais simplement que je l'envisageais, que j'y pensais. Et qu'à mon avis le financement était sécurisé", a déclaré Elon Musk à la barre, dans le tribunal de San Francisco où a lieu le procès. La semaine dernière, le principal avocat des plaignants, Nicholas Porritt, avait accusé le dirigeant d'avoir "menti" et d'être responsable des pertes des investisseurs. Le titre avait bondi dans la foulée des tweets très inhabituels (et le Nasdaq avait temporairement suspendu le cours de l'action Tesla), avant de décliner les jours suivants. Des articles de presse avaient fini par révéler que le patron n'avait pas vraiment les fonds. Tesla était restée cotée en Bourse. A travers ses questions, Nicholas Porritt a cherché à montrer qu'Elon Musk n'avait pas réalisé les consultations appropriées, et ne disposait pas ni des éléments nécessaires, ni de l'autorité pour faire une annonce aussi fracassante, surtout sur Twitter, et surtout pendant que les marchés étaient ouverts. - "M. Tweet" - L'avocat a mis en avant des échanges acerbes le 12 août 2018 entre le milliardaire et Yasir Al-Rumayyan, le directeur du fonds souverain saoudien, qui s'était engagé "catégoriquement" et "sans hésitation" à financer l'opération, selon Elon Musk. "Le financement n'était pas vraiment sécurisé, n'est-ce pas?", a demandé M Porritt. Yasir Al-Rumayyan a fait du "rétropédalage", a rétorqué le patron de Tesla. Il a assuré qu'il avait de toute façon la possibilité de vendre ses actions de son autre fleuron, SpaceX, "l'entreprise non cotée la plus valorisée des Etats-Unis". "Cela m'aurait brisé le cœur (de les vendre), mais je l'aurais fait si besoin", a-t-il déclaré, évoquant comment il avait dû se séparer d'actions de Tesla pour racheter Twitter l'année dernière. Costume sombre, chemise blanche et cravate, il est apparu hésitant, ne se souvenant pas de nombreux emails et détails, et répondant souvent à côté des questions pour répéter à l'envie les messages qu'il voulait faire passer au jury. Au point de faire perdre patience à l'avocat des investisseurs. "Nous avons passé toute une journée ensemble à Austin, vous vous en souvenez M. Tweet?!", a lancé Nicholas Porritt, avant de corriger pour "M. Musk". - "Karma" - L'accusation est aussi revenue sur le prix proposé par Elon Musk, 420 dollars par action. Aux Etats-Unis, les chiffres 4 et 20 accolés sont associés à la consommation de cannabis. Quand le milliardaire a proposé de racheter Twitter au printemps dernier, il a choisi un prix de 54,20 dollars par action. "Avez-vous arrondi à 420 en guise de blague à l'attention de votre petite amie?", a demandé Nicholas Porritt. "Ce n'était pas une blague, cela représentait une prime de 20% au-dessus du prix de l'action", a répondu Elon Musk, reconnaissant cependant qu'il y a "un certain karma autour de 420". "Pas sûr que ce soit un bon ou un mauvais karma à ce stade", a-t-il encore plaisanté. Son avocat Alex Spiro l'a ensuite aidé à dresser le portrait d'un immigré parti de rien, venu aux Etats-Unis - "là où les grandes choses sont possibles" - après une enfance "malheureuse" en Afrique du Sud, selon les mots du milliardaire. "On m'a traité de fou à de nombreuses reprises", a déclaré Elon Musk après avoir énuméré les entreprises qu'il a cofondées. Mais "à ce stade je crois que j'ai levé plus d'argent que quiconque dans l'histoire", s'est-il vanté, attribuant sa réussite à son "honnêteté" à l'égard des investisseurs. Le procès doit durer trois semaines. Dans une précédente décision liée à cette affaire, un juge avait estimé que le fameux tweet de 2018 pouvait être considéré comme "faux et trompeur". Le gendarme boursier américain, la SEC, avait de son côté obligé Elon Musk à céder la présidence du conseil d'administration, à payer une amende et à faire pré-approuver par un juriste ses tweets directement liés à l'activité de Tesla. Full Article
us Insurrection à Washington - Assaut du Capitole: des membres de la milice Oath Keepers reconnus coupables de "sédition" By www.rtl.be Published On :: Tue, 24 Jan 2023 01:10:46 +0100 (Belga) Quatre membres de la milice d'extrême droite "Oath Keepers" ont été reconnus coupables lundi de sédition pour leur rôle dans l'assaut du Capitole, à l'issue du second procès organisé sur ce chef d'accusation extrêmement rare.Depuis l'attaque du 6 janvier 2021, plus de 950 partisans de l'ex-président républicain Donald Trump ont été arrêtés et inculpés pour avoir semé le chaos dans le siège de la démocratie américaine. Parmi eux, seuls 14 militants de groupuscules d'extrême droite - neuf membres des "Oath Keepers" et cinq "Proud Boys" - ont été accusés de "sédition", un chef passible de 20 ans de prison qui implique d'avoir planifié l'usage de la force pour s'opposer au gouvernement. Faute de place suffisante dans le tribunal fédéral de Washington, la justice a organisé le procès des Oath Keepers, accusés de s'être entraînés et armés pour l'occasion, en deux temps. Un premier procès s'est conclu fin novembre par un verdict mitigé: le fondateur de cette milice, Stewart Rhodes, et un responsable local ont été déclarés coupables de sédition, mais leurs trois co-accusés ont été acquittés sur ce chef. Lundi, à l'issue du second procès, les jurés ont jugé coupables les quatre derniers Oath Keepers, des hommes âgés de 38 à 64 ans décrits comme de dangereux "traîtres" par l'accusation, mais comme des "fanfarons" par leurs avocats. Le procès des Proud Boys, dont leur leader Enrique Tarrio, s'est ouvert en décembre et était toujours en cours lundi, dans le même tribunal. (Belga) Full Article
us Sept morts dans une double fusillade en Californie, selon des médias américains By www.rtl.be Published On :: Tue, 24 Jan 2023 03:45:37 +0100 (Belga) Sept personnes ont été tuées lundi lors d'une double fusillade près de San Francisco, en Californie, ont indiqué les médias américains sur la base des déclarations de la police locale.Le suspect a été arrêté, a annoncé sur Twitter le bureau du shérif du comté de San Mateo, qui comprend la ville de Half Moon Bay où ont eu lieu les drames. "Il n'y a plus de danger pour la population à cette heure", a-t-il assuré. Les deux fusillades sont intervenues dans des exploitations agricoles proches l'une de l'autre, ont précisé les médias. Cette nouvelle tuerie intervient moins de 48 heures après qu'un tireur a tué 11 personnes dans un club de danse près de Los Angeles. (Belga) Full Article
us En pleine crise du covid-19, l'Assemblᅵe change les rᅵgles des CDD et prᅵcarise un peu plus les salariᅵs By www.politique.net Published On :: Wed, 20 May 2020 12:32:23 GMT L'information est ᅵ lire sur le site de Mediapart : le 15 mai, alors que l'Assemblᅵe est en train de voter la poursuite de l'ᅵtat d'urgence sanitaire, les dᅵputᅵs de la Rᅵpublique en... Full Article
us La France a dᅵtruit des stocks de masques pendant l'ᅵpidᅵmie du coronavirus By www.politique.net Published On :: Wed, 20 May 2020 19:46:26 GMT C'est surrᅵaliste. Les services de Matignon ont dᅵcouvert fin mars que des stocks de masques pᅵrimᅵs continuaient ᅵ ᅵtre brᅵlᅵs pendant l'ᅵpidᅵmie alors que certains... Full Article
us Le maire d'extrᅵme-droite de Perpignan s'est augmentᅵ de 17% juste aprᅵs son ᅵlection By www.politique.net Published On :: Thu, 03 Sep 2020 07:01:24 GMT C'est un classique. Juste aprᅵs leur victoire, certains ᅵlus locaux font voter une augmentation de leur salaire. Une dᅵcision qui intervient au dᅵbut de leur mandat, histoire que les ᅵlecteurs aient le temps... Full Article
us Journᅵes parlementaires, campus rᅵgionaux : La Rᅵpublique en marche va dᅵpenser prᅵs d'un million d'euros pour sa rentrᅵe By www.politique.net Published On :: Thu, 03 Sep 2020 07:02:22 GMT C'est la rentrᅵe politique. Et qui dit rentrᅵe, dit universitᅵ d'ᅵtᅵ. Cette annᅵe, la Rᅵpublique en marche a vu les choses en grand en organisant ᅵ la fois des journᅵes... Full Article
us La justice stoppe une enquᅵte potentiellement gᅵnante sur Jean Castex, trois jours aprᅵs sa nomination comme Premier ministre By www.politique.net Published On :: Thu, 03 Sep 2020 07:03:17 GMT Hasard du calendrier ou volontᅵ de prᅵserver le nouveau Premier ministre ? Selon Mediapart, une enquᅵte judiciaire ouverte par le parquet de Perpignan, potentiellement gᅵnante pour Jean Castex, a ᅵtᅵ... Full Article
us Selon Le Canard enchaᅵnᅵ, le gouvernement Castex est le plus coᅵteux de l'histoire de la Ve Rᅵpublique (185 millions d'euros par an) By www.politique.net Published On :: Tue, 06 Apr 2021 19:45:04 GMT L'information est passᅵe inaperᅵue mais elle ne manque pas de sel. Alors que la gestion de la crise du covid-19 par le gouvernement est trᅵs contestᅵe (au retard dans la livraison de masques s'ajoute... Full Article
us Le ministre de la justice, Eric Dupont-Moretti, a oubliᅵ de dᅵclarer 300 000 euros de revenus au fisc By www.politique.net Published On :: Wed, 07 Jul 2021 18:27:41 GMT Voilᅵ un "petit oubli" bien embᅵtant. Selon Mediapart, "le garde des Sceaux, Eric Dupont-Moretti, a oubliᅵ de dᅵclarer au fisc et ᅵ la Haute Autoritᅵ pour la transparence de la vie publique... Full Article
us Crᅵation de 3000 postes de "gendarmes verts" : la fausse promesse de Darmanin By www.politique.net Published On :: Wed, 24 Aug 2022 19:11:50 GMT A chaque jour, une nouvelle annonce. Cet ᅵtᅵ, le ministre de l'Intᅵrieur, Gᅵrald Darmanin, a multipliᅵ les dᅵplacements sur le terrain et les annonces. Pour lutter contre les pyromanes ᅵ... Full Article
us Research on Weibo marketing advertising push method based on social network data mining By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The current advertising push methods have low accuracy and poor advertising conversion effects. Therefore, a Weibo marketing advertising push method based on social network data mining is studied. Firstly, establish a social network graph and use graph clustering algorithm to mine the association relationships of users in the network. Secondly, through sparsisation processing, the association between nodes in the social network graph is excavated. Then, evaluate the tightness between user preferences and other nodes in the social network, and use the TF-IDF algorithm to extract user interest features. Finally, an attention mechanism is introduced to improve the deep learning model, which matches user interests with advertising domain features and outputs push results. The experimental results show that the push accuracy of this method is higher than 95%, with a maximum advertising click through rate of 82.7% and a maximum advertising conversion rate of 60.7%. Full Article
us Studentsâ Perceptions of Using Massive Open Online Courses (MOOCs) in Higher Learning Institutions By ijedict.dec.uwi.edu Published On :: Sat, 31 Aug 2024 09:44:41 -0400 Full Article Refereed Articles
us Juste une trêve By www.koztoujours.fr Published On :: Wed, 21 Aug 2024 18:01:19 +0000 Plus de débats législatifs. Presque plus de gouvernement. Plus de projet de loi sur l’euthanasie. Plus d’invectives. Plus de bruit. Plus de métro. Plus de Twitter. Même plus de chronique (à bientôt). Silence. Le calme, olympien. La trêve, olympique. On voudrait y croire, on veut en rêver. Full Article Société Jeux Olympiques top Trêve
us Risk-based operation of plug-in electric vehicles in a microgrid using downside risk constraints method By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 To achieve the benefits as much as possible, it is required to identify the available PEV capacity and prepare scheduling plans based on that. The analysis revealed that the risk-based scheduling of the microgrid could reduce the financial risk completely from $9.89 to $0.00 and increases the expected operation cost by 24% from $91.38 to $112.94, in turn. This implies that the risk-averse decision-maker tends to spend more money to reduce the expected risk-in-cost by using the proposed downside risk management technique. At the end, by the help of fuzzy satisfying method, the suitable risk-averse strategy is determined for the studied case. Full Article
us Enabling smart city technologies: impact of smart city-ICTs on e-Govt. services and society welfare using UTAUT model By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Smart cities research is growing all over the world seeking to understand the effect of smart cities from different angles, domains and countries. The aim of this study is to analyse how the smart city ICTs (e.g., big data analytics, AI, IoT, cloud computing, smart grids, wireless communication, intelligent transportation system, smart building, e-governance, smart health, smart education and cyber security) are related to government. services and society welfare from the perspective of China. This research confirmed a positive correlation of smart city ICTs to e-Govt. Services (e-GS). On the other hand, the research showed a positive influence of smart city ICTs on society's welfare. These findings about smart cities and ICTs inform us how the thought paradigm to smart technologies can cause the improvement of e-GS through economic development, job creation and social welfare. The study offers different applications of the theoretical perspectives and the management perspective which are significant to building a society during recent technologised era. Full Article
us An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Image forgery detection techniques refer to the process of detecting manipulated or altered images, which can be used for various purposes, including malicious intent or misinformation. Image forgery detection is a crucial task in digital image forensics, where researchers have developed various techniques to detect image forgery. These techniques can be broadly categorised into active, passive, machine learning-based and hybrid. Active approaches involve embedding digital watermarks or signatures into the image during the creation process, which can later be used to detect any tampering. On the other hand, passive approaches rely on analysing the statistical properties of the image to detect any inconsistencies or irregularities that may indicate forgery. In this paper for the detection of scaling and cropping attack a deep learning method has been proposed using ResNet. The proposed method (Res-Net-Adam-Adam) is able to achieve highest amount of accuracy of 99.14% (0.9914) while detecting fake and real images. Full Article
us Robust and secure file transmission through video streaming using steganography and blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 File transfer is always handled by a separate service, sometimes it is a third-party service in videoconferencing. When sending files during a video session, file data flow and video stream are independent of each other. Encryption is a mature method to ensure file security. However, it still has the chance to leave footprints on the intermediate forwarding machines. These footprints can indicate that a file once passed through, some protocol-related logs give clues to the hackers' later investigation. This work proposes a file-sending scheme through the video stream using blockchain and steganography. Blockchain is used as a file slicing and linkage mechanism. Steganography is applied to embed file pieces into video frames that are continuously generated during the session. The scheme merges files into the video stream with no file transfer protocol use and no extra bandwidth consumed by the file to provide trackless file transmission during the video communication. Full Article
us Secure digital academic certificate verification system using blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 At present, there is a need for an authentic and fast approach to certificate verification. Which verifies and authenticates the certificates to reduce the extent of duplicity and time. An academic certificate is significant for students, the government, universities, and employers. Academic credentials play a vital role in the career of students. A few people manipulate academic documents for their benefit. There are cases identified where people produced fake academic certificates for jobs or higher education admission. Various research works are developing a secure model to verify genuine academic credentials. This research article proposed a new security model which contains several security algorithms such as timestamps, hash function, digital signature, steganography, and blockchain. The proposed model issues secure digital academic certificates. It enhanced security measures and automated educational certificate verification using blockchain technology. The advantages of the proposed model are automated, cost-effective, secured, traceable, accurate, and time-saving. Full Article
us Robust watermarking of medical images using SVM and hybrid DWT-SVD By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 In the present scenario, the security of medical images is an important aspect in the field of image processing. Support vector machines (SVMs) are a supervised machine learning technique used in image classification. The roots of SVM are from statistical learning theory. It has gained excellent significance because of its robust, accurate, and very effective algorithm, even though it was applied to a small set of training samples. SVM can classify data into binary classification or multiple classifications according to the application's needs. Discrete wavelet transform (DWT) and singular value decomposition (SVD) transform techniques are utilised to enhance the image's security. In this paper, the image is first classified using SVM into ROI and RONI, and thereafter, to enhance the images diagnostic capabilities, the DWT-SVD-based hybrid watermarking technique is utilised to embed the watermark in the RONI region. Overall, our work makes a significant contribution to the field of medical image security by presenting a novel and effective solution. The results are evaluated using both perceptual and imperceptibility testing using PSNR and SSIM parameters. Different attacks were introduced to the watermarked image, which shows the efficacy and robustness of the proposed algorithm. Full Article
us An image encryption using hybrid grey wolf optimisation and chaotic map By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Image encryption is a critical and attractive issue in digital image processing that has gained approval and interest of many researchers in the world. A proposed hybrid encryption method was implemented by using the combination of the Nahrain chaotic map with a well-known optimised algorithm namely the grey wolf optimisation (GWO). It was noted from analysing the results of the experiments conducted on the new hybrid algorithm, that it gave strong resistance against expected statistical invasion as well as brute force. Several statistical analyses were carried out and showed that the average entropy of the encrypted images is near to its ideal information entropy. Full Article
us A robust feature points-based screen-shooting resilient watermarking scheme By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Screen-shooting will lead to information leakage. Anti-screen-shooting watermark, which can track the leaking sources and protect the copyrights of images, plays an important role in image information security. Due to the randomness of shooting distance and angle, more robust watermark algorithms are needed to resist the mixed attack generated by screen-shooting. A robust digital watermarking algorithm that is resistant to screen-shooting is proposed in this paper. We use improved Harris-Laplace algorithm to detect the image feature points and embed the watermark into the feature domain. In this paper, all test images are selected on the dataset USC-SIPI and six related common algorithms are used for performance comparison. The experimental results show that within a certain range of shooting distance and angle, this algorithm presented can not only extract the watermark effectively but also ensure the most basic invisibility of watermark. Therefore, the algorithm has good robustness for anti-screen-shooting. Full Article
us Undertaking a bibliometric analysis to investigate the framework and dynamics of slow fashion in the context of sustainability By www.inderscience.com Published On :: 2024-09-05T23:20:50-05:00 The current study has outlined slow fashion (SF) research trends and created a future research agenda for this field. It is a thorough analysis of the literature on slow fashion. Numerous bibliometric features of slow fashion have been discussed in the paper. This study comprises 182 research articles from the Scopus database. The database was utilised for bibliometric analysis. To identify certain trends in the area of slow fashion, a bibliometric study is done. For bibliometric analysis, the study employed R-software (the Biblioshiny package). Here, VOSviewer software is used to determine the co-occurrence of authors, countries, sources, etc. The study has outlined the gap that still exists in the field of slow fashion. Here, the research outcome strengthens the domain of slow fashion for sustainable consumption. The study findings will be useful for policymakers, industry professionals, and researchers. Full Article
us Nexus between artificial intelligence and marketing: a systematic review and bibliometric analysis By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Although artificial intelligence provides a new method to gather, process, analyse data, generate insights, and offer customised solutions, such methods could change how marketers deal with customers, and there is a lack of literature to portray the application of artificial intelligence in marketing. This study aims to recognise and portray the use of artificial intelligence from a marketing standpoint, as well as to provide a conceptual framework for the application of artificial intelligence in marketing. This study uses a systematic literature review analysis as a research method to achieve the aims. Data from 142 articles were extracted from the Scopus database using relevant search terms for artificial intelligence and marketing. The systematic review identified significant usage of artificial intelligence in conversational artificial intelligence, content creation, audience segmentation, predictive analytics, personalisation, paid ads, sales forecasting, dynamic pricing, and recommendation engines and the bibliometric analysis produced the trend in co-authorship, citation, bibliographic coupling, and co-citation analysis. Practitioners and academics may use this study to decide on the marketing area in which artificial intelligence can be invested and used. Full Article
us The discussion of information security risk control in mobile banking By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The emergence of digital technology and the increasing prevalence of smartphones have promoted innovations in payment options available in finance and consumption markets. Banks providing mobile payment must ensure the information security. Inadequate security control leads to information leakage, which severely affects user rights and service providers' reputations. This study uses control objectives for Information and Related Technologies 4.1 as the mobile payment security control framework to examine the emergent field of mobile payment. A literature review is performed to compile studies on the safety risk, regulations, and operations of mobile payments. In addition, the Delphi questionnaire is distributed among experts to determine the practical perspectives, supplement research gaps in the literature, and revise the prototype framework. According to the experts' opinions, 59 control objectives from the four domains of COBIT 4.1 are selected. The plan and organise, acquire and implement, deliver and support, and monitor and evaluate four domains comprised 2, 5, 10, and 2 control objectives that had mean importance scores of > 4.50. Thus, these are considered the most important objectives by the experts, respectively. The results of this study can serve as a reference for banks to construct secure frameworks in mobile payment services. Full Article
us What drives mobile game stickiness and in-game purchase intention? Based on the uses and gratifications theory By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Despite the considerable growth potential predicted for mobile games, little research explored what motivates users to be sticky and make purchases in the mobile game context. Drawing on uses and gratifications theory (UGT), this study evaluates the influencing effects of players' characteristics (i.e., individual gratification and individual situation) and the mobile game structure (i.e., presence and governance) on players' mobile game behaviour (i.e., stickiness and purchase intention). Specifically, the model was extended with factors of the individual situation and governance. After surveying 439 samples, the research model was examined using the Partial least squares structural equation modelling (PLS-SEM) approach. The results indicate that stickiness is a crucial antecedent for users' in-game purchase intention. The individual situation plays an essential role in influencing user gratification, and individual gratification is the most vital criterion affecting stickiness. Finally, except for incentives, presence, and integration positively affect stickiness. This study provides further insights into both mobile game design and governance strategies. Full Article
us Impacts of social media usage on consumers' engagement in social commerce: the roles of trust and cultural distance By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The prevalence of social media transforms e-business into social commerce and facilitates consumers' engagement in cross-cultural social commerce. However, social commerce operations encounter unpredictable challenges in cross-cultural business environment. It is vital to further investigate how contextual elements affect consumers' trust and their engagement when they are exposed to the complexity of cross-cultural business environment. The stimuli-organism-response paradigm is employed to examine how the two dimensions of social media usage influence consumers' engagement in cross-cultural social commerce. The current study surveyed 2,058 samples from 135 countries, and the regression analysis results illustrate the mechanism whereby informational and socialising usage of social media positively influences consumers' engagement in social commerce through consumers' trust toward social commerce websites. Additionally, the associations between two aspects of social media usage and consumers' trust towards social commerce are negatively moderated by cultural distance. Both theoretical and practical implications are also discussed. Full Article
us Learning the usage intention of robo-advisors in fin-tech services: implications for customer education By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Drawing on the MOA framework, this study establishes a research model that explains the usage intention of robo-advisors. In the model, three predictors that consist of technology relative advantage, technology herding, and technology familiarity influence usage intention of robo-advisors directly and indirectly via the partial mediation of trust. At the same time, the effects of the three predictors on trust are hypothetically moderated by learning goal orientation and perceived performance risk respectively. Statistical analyses are provided using the data of working professionals from the insurance industry in Taiwan. Based on its empirical findings, this study discusses important theoretical and practical implications. Full Article
us A constant temperature control system for indoor environments in buildings using internet of things By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 The performance of a building's internal environment, which includes the air temperature, lighting and acoustics, is what determines the quality of the environment inside the building. We present a thermal model for achieving thermal comfort in buildings that makes use of a multimodal analytic framework as a solution to this challenge. In this study, a multimodal combination is used to evaluate several temperature and humidity sensors as well as an area image. Additionally, a CNN and LSTM combination is used to process the image and sensor data. The results show that heating setback and interior set point temperatures, as well as mechanical ventilation based on real people's presence and CO<SUB align=right>2 levels, are all consistently reduced when ICT-driven intelligent solutions are used. The CNN-LSTM model has a goodness of fit that is 0.7258 on average, which is much higher than both the CNN (0.5291) and LSTM (0.5949) models. Full Article
us Smart approach to constraint programming: intelligent backtracking using artificial intelligence By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 Constrained programming is the concept used to select possible alternatives from an incredibly diverse range of candidates. This paper proposes an AI-assisted Backtracking Scheme (AI-BS) by integrating the generic backtracking algorithm with Artificial Intelligence (AI). The detailed study observes that the extreme dual ray associated with the infeasible linear program can be automatically extracted from minimum unfeasible sets. Constraints are used in artificial intelligence to list all possible values for a group of variables in a given universe. To put it another way, a solution is a way of assigning a value to each variable that these values satisfy all constraints. Furthermore, this helps the study reach a decreased search area for smart backtracking without paying high costs. The evaluation results exhibit that the IB-BC algorithm-based smart electricity schedule controller performs better electricity bill during the scheduled periods than comparison approaches such as binary backtracking and binary particle swarm optimiser. Full Article
us Application of integrated image processing technology based on PCNN in online music symbol recognition training By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 To improve the effectiveness of online training for music education, it was investigated how to improve the pulse-coupled neural network in image processing for spectral image segmentation. The study proposes a two-scale descent method to achieve oblique spectral correction. Subsequently, a convolutional neural network was optimised using a two-channel feature fusion recognition network for music theory notation recognition. The results showed that this image segmentation method had the highest accuracy, close to 98%, and the accuracy of spectral tilt correction was also as high as 98.4%, which provided good image pre-processing results. When combined with the improved convolutional neural network, the average accuracy of music theory symbol recognition was about 97% and the highest score of music majors was improved by 16 points. This shows that the method can effectively improve the teaching effect of online training in music education and has certain practical value. Full Article
us BEFA: bald eagle firefly algorithm enabled deep recurrent neural network-based food quality prediction using dairy products By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Food quality is defined as a collection of properties that differentiate each unit and influences acceptability degree of food by users or consumers. Owing to the nature of food, food quality prediction is highly significant after specific periods of storage or before use by consumers. However, the accuracy is the major problem in the existing methods. Hence, this paper presents a BEFA_DRNN approach for accurate food quality prediction using dairy products. Firstly, input data is fed to data normalisation phase, which is performed by min-max normalisation. Thereafter, normalised data is given to feature fusion phase that is conducted employing DNN with Canberra distance. Then, fused data is subjected to data augmentation stage, which is carried out utilising oversampling technique. Finally, food quality prediction is done wherein milk is graded employing DRNN. The training of DRNN is executed by proposed BEFA that is a combination of BES and FA. Additionally, BEFA_DRNN obtained maximum accuracy, TPR and TNR values of 93.6%, 92.5% and 90.7%. Full Article
us Business intelligence in human management strategies during COVID-19 By www.inderscience.com Published On :: 2024-10-01T23:20:50-05:00 The spread of COVID-19 results in disruption, uncertainty, complexity, and ambiguity in all businesses. Employees help companies achieve their aims. To manage human resources sustainably, analyse organisational strategy. This thorough research study attempts to find previously unidentified challenges, cutting-edge techniques, and surprising decisions in human resource management outside of healthcare organisations during the COVID-19 pandemic. The narrative review examined corporate human resource management measures to mitigate COVID-19. Fifteen publications were selected for the study after removing duplicates and applying the inclusion and exclusion criteria. This article examines HR's COVID-19 response. Human resource management's response to economic and financial crises has been extensively studied, but the COVID-19 pandemic has not. This paper reviewed the literature to reach its goal. The results followed the AMO framework for human resource policies and procedures and the HR management system. This document suggests COVID-19 pandemic-related changes to human resource management system architecture, policies, and practises. The study created a COVID-19 pandemic human resource management framework based on the literature. The COVID-19 pandemic had several negative effects, including social and behavioural changes, economic shock, and organisational disruption. Full Article
us Enhancing clean technology's dynamic cross technique using value chain By www.inderscience.com Published On :: 2024-10-01T23:20:50-05:00 Numerous Indian economic sectors have been impacted by the COVID-19 epidemic, with many being forced to the verge of extinction. As a result, this essay analyses the importance of supply chains for grapes and the manufactured goods made from them, including beverages and currants, in a specific state that happens to be India's top grape-producing region. In order to identify the sites of rupture brought on by the pandemic and to recommend policy changes to create a resilient system, a value chain analysis is performed. Value chain management has emerged as one of the key strategies businesses use today to boost productivity and costs when they are up against greater rivalry in the marketplace, however, with several new challenges, such as concerns over security, environmental protection, compensation, and business accountability. According to the value chain study, the level of value addition for intermediary agents, such as pre-harvest contractors, has increased after COVID-19 at the expense of farmers. Various policy approaches are explained to enhance the grape value chain using the knowledge gained from Porter's value chain results and supply and demand shocks. Full Article
us Integrating big data collaboration models: advancements in health security and infectious disease early warning systems By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 In order to further improve the public health assurance system and the infectious diseases early warning system to give play to their positive roles and enhance their collaborative capacity, this paper, based on the big and thick data analytics technology, designs a 'rolling-type' data synergy model. This model covers districts and counties, municipalities, provinces, and the country. It forms a data blockchain for the public health assurance system and enables high sharing of data from existing system platforms such as the infectious diseases early warning system, the hospital medical record management system, the public health data management system, and the health big and thick data management system. Additionally, it realises prevention, control and early warning by utilising data mining and synergy technologies, and ideally solves problems of traditional public health assurance system platforms such as excessive pressure on the 'central node', poor data tamper-proofing capacity, low transmission efficiency of big and thick data, bad timeliness of emergency response, and so on. The realisation of this technology can greatly improve the application and analytics of big and thick data and further enhance the public health assurance capacity. Full Article
us Design of intelligent financial sharing platform driven by consensus mechanism under mobile edge computing and accounting transformation By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 The intelligent financial sharing platform in the online realm is capable of collecting, storing, processing, analysing and sharing financial data through the integration of AI and big data processing technologies. However, as data volume grows exponentially, the cost of financial data storage and processing increases, and the asset accounting and financial profit data sharing analysis structure in financial sharing platforms is inadequate. To address the issue of data security sharing in the intelligent financial digital sharing platform, this paper proposes a data-sharing framework based on blockchain and edge computing. Building upon this framework, a non-separable task distribution algorithm based on data sharing is developed, which employs multiple nodes for cooperative data storage, reducing the pressure on the central server for data storage and solving the problem of non-separable task distribution. Multiple sets of comparative experiments confirm the proposed scheme has good feasibility in improving algorithm performance and reducing energy consumption and latency. Full Article
us Trust in news accuracy on X and its impact on news seeking, democratic perceptions and political participation By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 Based on a survey of 2548 American adults conducted by Pew Research Center in 2021, this study finds that trust in the accuracy of news circulated on X (former Twitter) is positively correlated with following news sites on X, underscoring the crucial role of trust in news accuracy in shaping news-seeking behaviour. Trust in news accuracy also positively relates to political participation via X. Those who trust in news accuracy are more likely to perceive X as an effective tool for raising public awareness about political and social issues, as well as a positive force for democracy. However, exposure to misinformation weakens the connection between trust in news accuracy and users' perception about X as an effective tool for raising public awareness about political or social issues and as a positive driver for democracy. Full Article
us Beyond utility: unpacking the enjoyment gap in e-government service use By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 E-government serves as a vital channel for citizen interactions with the public sector, where user enjoyment is of paramount importance. To date, few studies have comprehensively examined the determinants of citizen enjoyment in e-government. To address this research gap, we administered a survey and gathered data from 363 Australian residents using myGov for tax filing. Our analysis revealed a pronounced discrepancy between reported enjoyment and the intention to continue using the services. Although users demonstrated a strong intent to use e-government services, this intent did not uniformly align with enjoyment. Additionally, informed by self-determination theory, we developed and tested an e-government service enjoyment model to study the impacts of effort expectancy, technophilia, technology humanness, and engagement in fostering user enjoyment. Unexpectedly, the results showed that information privacy concerns, commonly seen as a deterrent in e-government adoption, did not significantly affect enjoyment. Our findings advance the discourse on e-government service improvement. Full Article
us Impact of servicescape dimensions on customer satisfaction and behavioural intentions: a case of casual dining restaurants By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Physical and social aspects each make up a separate part of servicescape. Together, these make up the servicescape. Although previous research has frequently investigated these aspects separately, the purpose of this study is to simultaneously find out the impact of both aspects within the casual dining restaurants' context. In total, 462 customers in Delhi were polled for this study, and structural equation modelling was used to analyse the data. According to the results, both the social and physical parts of the servicescape have the ability to affect how satisfied customers are, which in turn can affect how they behave in the future. Full Article
us Artificial neural networks for demand forecasting of the Canadian forest products industry By www.inderscience.com Published On :: 2024-11-11T23:20:50-05:00 The supply chains of the Canadian forest products industry are largely dependent on accurate demand forecasts. The USA is the major export market for the Canadian forest products industry, although some Canadian provinces are also exporting forest products to other global markets. However, it is very difficult for each province to develop accurate demand forecasts, given the number of factors determining the demand of the forest products in the global markets. We develop multi-layer feed-forward artificial neural network (ANN) models for demand forecasting of the Canadian forest products industry. We find that the ANN models have lower prediction errors and higher threshold statistics as compared to that of the traditional models for predicting the demand of the Canadian forest products. Accurate future demand forecasts will not only help in improving the short-term profitability of the Canadian forest products industry, but also their long-term competitiveness in the global markets. Full Article
us International Journal of Business Information Systems By www.inderscience.com Published On :: Full Article
us Loan delinquency analysis using predictive model By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The research uses a machine learning approach to appraising the validity of customer aptness for a loan. Banks and non-banking financial companies (NBFC) face significant non-performing assets (NPAs) threats because of the non-payment of loans. In this study, the data is collected from Kaggle and tested using various machine learning models to determine if the borrower can repay its loan. In addition, we analysed the performance of the models [K-nearest neighbours (K-NN), logistic regression, support vector machines (SVM), decision tree, naive Bayes and neural networks]. The purpose is to support decisions that are based not on subjective aspects but objective data analysis. This work aims to analyse how objective factors influence borrowers to default loans, identify the leading causes contributing to a borrower's default loan. The results show that the decision tree classifier gives the best result, with a recall rate of 0.0885 and a false- negative rate of 5.4%. Full Article
us Does smartphone usage affect academic performance during COVID outbreak? By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Pandemic has compelled the entire world to change their way of life and work. To control the infection rate, academic institutes deliver education online similarly. At least one smartphone is available in every home, and students use their smartphones to attend class. The study investigates the link between smartphone usage (SU) and academic performance (AP) during the pandemic. 490 data were obtained from various institutions and undergraduate students using stratified random sampling. These components were identified using factor analysis and descriptive methods, while the relationship of SU and AP based on gender classification was tested using Smart-PLS-SEM. The findings show that SU has a substantial relationship with academic success, whether done in class or outside of it. Even yet, the study found that SU and AP significantly impact both male and female students. Furthermore, the research focuses on SU outside and within the classroom to improve students' AP. Full Article
us A Realistic Data Warehouse Project: An Integration of Microsoft Access® and Microsoft Excel® Advanced Features and Skills By Published On :: Full Article
us Real World Project: Integrating the Classroom, External Business Partnerships and Professional Organizations By Published On :: Full Article
us Using Digital Logs to Reduce Academic Misdemeanour by Students in Digital Forensic Assessments By Published On :: Full Article
us Using Wikis to Enhance Website Peer Evaluation in an Online Website Development Course: An Exploratory Study By Published On :: Full Article
us Open-Source ERP: Is It Ripe for Use in Teaching Supply Chain Management? By Published On :: Full Article