of

A Ranking Tool Exploiting Semantic Descriptions for the Comparison of EQF-based Qualifications

Nowadays, one of the main issues discussed at the Community level is represented by the mobility of students and workers across Europe. During the last years, in order to deal with the above picture, several initiatives have been carried out: one of them is the definition of the European Qualification Framework (EQF), a common architecture for the description of qualifications. At the same time, several research activities were established with the aim of finding how semantic technologies could be exploited for qualifications comparison in the field of human resources acquisition. In this paper, the EQF specifications are taken into account and they are applied in a practical scenario to develop a ranking algorithm for the comparison of qualifications expressed in terms of knowledge, skill and competence concepts, potentially aimed at supporting European employers during the recruiting phase.




of

Ontology-based Competency Management: the Case Study of the Mihajlo Pupin Institute

Semantic-based technologies have been steadily increasing their relevance in recent years in both the research world and business world. Considering this, the present article discusses the process of design and implementation of a competency management system in information and communication technologies domain utilizing the latest Semantic Web tools and technologies including D2RQ server, TopBraid Composer, OWL 2, SPARQL, SPARQL Rules and common human resources related public vocabularies. In particular, the paper discusses the process of building individual and enterprise competence models in a form of ontology database, as well as different ways of meaningful search and retrieval of expertise data on the Semantic Web. The ontological knowledge base aims at storing the extracted and integrated competences from structured, as well as unstructured sources. By using the illustrative case study of deployment of such a system in the Human Resources sector at the Mihajlo Pupin Institute, this paper shows an example of new approaches to data integration and information management. The proposed approach extends the functionalities of existing enterprise information systems and offers possibilities for development of future Internet services. This allows organizations to express their core competences and talents in a standardized, machine processable and understandable format, and hence, facilitates their integration in the European Research Area and beyond.




of

A Comparison of Different Retrieval Strategies Working on Medical Free Texts

Patient information in health care systems mostly consists of textual data, and free text in particular makes up a significant amount of it. Information retrieval systems that concentrate on these text types have to deal with the different challenges these medical free texts pose to achieve an acceptable performance. This paper describes the evaluation of four different types of information retrieval strategies: keyword search, search performed by a medical domain expert, a semantic based information retrieval tool, and a purely statistical information retrieval method. The different methods are evaluated and compared with respect to its appliance in medical health care systems.




of

An efficient edge swap mechanism for enhancement of robustness in scale-free networks in healthcare systems

This paper presents a sequential edge swap (SQES) mechanism to design a robust network for a healthcare system utilising energy and communication range of nodes. Two operations: sequential degree difference operation (SQDDO) and sequential angle sum operation (SQASO) are performed to enhance the robustness of network. With equivalent degrees of nodes from the network's centre to its periphery, these operations build a robust network structure. Disaster attacks that have a substantial impact on the network are carried out using the network information. To identify a link between the malicious and disaster attacks, the Pearson coefficient is employed. SQES creates a robust network structure as a single objective optimisation solution by changing the connections of nodes based on the positive correlation of these attacks. SQES beats the current methods, according to simulation results. When compared to hill-climbing algorithm, simulated annealing, and ROSE, respectively, the robustness of SQES is improved by roughly 26%, 19% and 12%.




of

An architectural view of VANETs cloud: its models, services, applications and challenges

This research explores vehicular ad hoc networks (VANETs) and their extensive applications, such as enhancing traffic efficiency, infotainment, and passenger safety. Despite significant study, widespread deployment of VANETs has been hindered by security and privacy concerns. Challenges in implementation, including scalability, flexibility, poor connection, and insufficient intelligence, have further complicated VANETs. This study proposes leveraging cloud computing to address these challenges, marking a paradigm shift. Cloud computing, recognised for its cost-efficiency and virtualisation, is integrated with VANETs. The paper details the nomenclature, architecture, models, services, applications, and challenges of VANET-based cloud computing. Three architectures for VANET clouds - vehicular clouds (VCs), vehicles utilising clouds (VuCs), and hybrid vehicular clouds (HVCs) - are discussed in detail. The research provides an overview, delves into related work, and explores VANET cloud computing's architectural frameworks, models, and cloud services. It concludes with insights into future work and a comprehensive conclusion.




of

International Journal of Web and Grid Services






of

Hiking with a backpack is the workout of 2024. An exercise scientist says it’s worth the extra effort - The Globe and Mail

  1. Hiking with a backpack is the workout of 2024. An exercise scientist says it’s worth the extra effort  The Globe and Mail
  2. Military-Inspired Workout Has 'Huge Wins' for Women, Says Personal Trainer  MSN
  3. How Rucking Can Turn Your Walks into a Full-Body Workout  Verywell Health
  4. What Is Rucking and Is It Better Than Regular Walking? Here's What Personal Trainers Say  EatingWell
  5. Rucking: Why It’s a Great Workout & How to Get Started  Athletech News




of

Last supermoon of 2024 to shine over Central Alberta this week - Central Alberta Online

  1. Last supermoon of 2024 to shine over Central Alberta this week  Central Alberta Online
  2. 4 of 4: Last supermoon of the year to light up Canadian skies  Global News Toronto
  3. Beaver Moon 2024: See the final 'supermoon' of the year rise next to the 'Seven Sisters'  Livescience.com
  4. See 2024’s Final ‘Supermoon’ And ‘Fireballs’: The Night Sky This Week  Forbes
  5. How and when to catch the last supermoon of 2024  National Post





of

Senators make short work of listless Leafs in a flat Battle of Ontario - The Globe and Mail

  1. Senators make short work of listless Leafs in a flat Battle of Ontario  The Globe and Mail
  2. Tavares on Maple Leafs’ lifeless loss to Senators: ‘We should be disappointed’  Sportsnet.ca
  3. Ullmark records first shutout of season as Senators smother Maple Leafs  TSN
  4. TAKEAWAYS: Ottawa Senators draw first blood in Battle of Ontario  Ottawa Citizen
  5. Wednesday FTB: Lose to the Sens, why not?  Pension Plan Puppets




of

Stop Using Chrome On Your iPhone, Warns Apple—Millions Of Users Must Now Decide - Forbes

  1. Stop Using Chrome On Your iPhone, Warns Apple—Millions Of Users Must Now Decide  Forbes
  2. 4 new Chrome improvements for iOS  The Keyword
  3. Chrome on your iPhone can search using pictures and words at the same time  The Verge
  4. Google Rolls Out Four New Chrome Features for iOS  iPhone in Canada
  5. Chrome 131 for iOS adding new Google Drive, Maps integrations  9to5Google





of

Justin Welby resigns as archbishop of Canterbury over abuse scandal - Al Jazeera English

  1. Justin Welby resigns as archbishop of Canterbury over abuse scandal  Al Jazeera English
  2. Church of England head resigns over handling of sex abuse scandal  CTV News
  3. The four bishops at risk from child abuse cover-up report  The Telegraph
  4. The archbishop and the abuser  The Economist
  5. Archbishop of Canterbury Justin Welby resigns in abuse fallout: All to know  Al Jazeera English





of

Niagara Health offering free parking after delays reported - News Talk 610 CKTB

  1. Niagara Health offering free parking after delays reported  News Talk 610 CKTB
  2. Implementation of new Niagara Health patient info system resulting in long wait times  St. Catharines Standard
  3. Temporary delays impacting registration at emergency departments  Thorold News
  4. Niagara Health Working Through Delays  101.1 More FM
  5. Niagara Health experiencing temporary delays impacting registration and EDs  Niagara Health






of

Former B.C. premier John Horgan dies aged 65, after third bout of cancer - National Post

  1. Former B.C. premier John Horgan dies aged 65, after third bout of cancer  National Post
  2. Adam Pankratz: John Horgan wasn't your typical NDP premier  National Post
  3. John Horgan: Reluctant leader became B.C.'s most-loved premier  Vancouver Sun
  4. Premier’s statement on the passing of John Horgan  BC Gov News
  5. UBC political scientist remembers former B.C. premier John Horgan’s legacy  CBC.ca





of

Trump says Elon Musk, Vivek Ramaswamy will lead the Department of Government Efficiency - The Globe and Mail

  1. Trump says Elon Musk, Vivek Ramaswamy will lead the Department of Government Efficiency  The Globe and Mail
  2. Why is Elon Musk becoming Donald Trump's efficiency adviser?  BBC.com
  3. Elon Musk and Vivek Ramaswamy will lead new 'Department of Government Efficiency' in Trump administration  CTV News
  4. George Conway: Musk, Ramaswamy to lead ‘nonexistent department’  The Hill





of

Online Journal of Nursing Informatics Archive

Online journal dedicated to nursing informatics




of

Timed influence: The future of Modern (Family) life and the law

By Lucas Miotto Lopes and Jiahong Chen The future of real-time appeal Knowing when to say or do something is often just as important as knowing what to say or do. The right advice at the wrong time is not




of

Ascendancy of SNS information and age difference on intention to buy eco-friendly offerings: meaningful insights for e-tailers

Through the unparalleled espousal of theory of planned behaviour, this study intends to significantly add to the current knowledge on social networking sites (SNS) in <i>eWOM</i> information and its role in defining intentions to buy green products. In specie, this study seeks to first investigate the part played by <i>attitude towards SNS information</i> in influencing the <i>acceptance of SNS information</i> and then by <i>acceptance of SNS information</i> in effecting the <i>green purchase intention</i>. Besides this, it also aims to analyse the influence exerted by first <i>credibility of SNS information</i> on <i>acceptance of SNS information</i> and then by <i>acceptance of SNS information</i> on <i>green purchase intention</i>. In doing so, it also examines how well the age of the SNS users moderates all these four associations.




of

Risk evaluation method of electronic bank investment based on random forest

Aiming at the problems of high error rate, low evaluation accuracy and low investment return in traditional methods, a random forest-based e-bank investment risk evaluation method is proposed. First, establish a scientific e-bank investment risk evaluation index system. Then, G1-COWA combined weighting method is used to calculate the weights of each index. Finally, the e-bank investment risk evaluation index data is taken as the input vector, and the e-bank investment risk evaluation result is taken as the output vector. The random forest model is established and the result of e-banking investment risk evaluation is obtained. The experimental results show that the maximum relative error rate of this method is 4.32%, the evaluation accuracy range is 94.5~98.1%, and the maximum return rate of e-banking investment is 8.32%. It shows that this method can accurately evaluate the investment risk of electronic banking.




of

Study on operational risks and preventive measures of supply chain finance

The operation of supply chain finance faces various risks, therefore, studying the operational risks of supply chain finance and corresponding preventive measures is of great significance. Firstly, classify the types of operational risks in supply chain finance. Secondly, based on the risk classification results, the decision tree method is used to evaluate the operational risks of supply chain finance. Finally, based on the risk assessment results, targeted risk prevention measures for supply chain finance operations are proposed, such as strengthening supplier management, optimising logistics and warehouse management, risk analysis and monitoring, and strengthening information security and data protection. The case analysis results show that the accuracy of the evaluation results of this method is higher, and the risk coefficient has been significantly reduced after applying this method, indicating that it can effectively reduce supply chain risk.




of

An effectiveness analysis of enterprise financial risk management for cost control

This paper aims to analyse the effectiveness of cost control oriented enterprise financial risk management. Firstly, it analyses the importance of enterprise financial risk management. Secondly, the position of cost control in enterprise financial risk management was analysed. Cost control can be used to reduce the operating costs of enterprises, improve their profitability, and thus reduce the financial risks they face. Finally, a corporate financial risk management strategy is constructed from several aspects: establishing a sound risk management system, predicting and responding to various risks, optimising fund operation management, strengthening internal control, and enhancing employee risk awareness. The results show that after applying the proposed management strategy, the enterprise performs well in cost control oriented enterprise financial risk management, with a cost accounting accuracy of 95% and an audit system completeness of 90%. It can also help the enterprise develop emergency plans and provide comprehensive risk management strategy coverage.




of

International Journal of Electronic Business




of

Students’ Perceptions of Using Massive Open Online Courses (MOOCs) in Higher Learning Institutions




of

Exploring the impact of TPACK on Education 5.0 during the times of COVID-19: a case of Zimbabwean universities




of

The Impact of Physics Open Educational Resources (OER) on the Professional Development of Bhutanese Secondary School Physics Teachers




of

Feature-aware task offloading and scheduling mechanism in vehicle edge computing environment

With the rapid development and application of driverless technology, the number and location of vehicles, the channel and bandwidth of wireless network are time-varying, which leads to the increase of offloading delay and energy consumption of existing algorithms. To solve this problem, the vehicle terminal task offloading decision problem is modelled as a Markov decision process, and a task offloading algorithm based on DDQN is proposed. In order to guide agents to quickly select optimal strategies, this paper proposes an offloading mechanism based on task feature. In order to solve the problem that the processing delay of some edge server tasks exceeds the upper limit of their delay, a task scheduling mechanism based on buffer delay is proposed. Simulation results show that the proposed method has greater performance advantages in reducing delay and energy consumption compared with existing algorithms.




of

Risk-based operation of plug-in electric vehicles in a microgrid using downside risk constraints method

To achieve the benefits as much as possible, it is required to identify the available PEV capacity and prepare scheduling plans based on that. The analysis revealed that the risk-based scheduling of the microgrid could reduce the financial risk completely from $9.89 to $0.00 and increases the expected operation cost by 24% from $91.38 to $112.94, in turn. This implies that the risk-averse decision-maker tends to spend more money to reduce the expected risk-in-cost by using the proposed downside risk management technique. At the end, by the help of fuzzy satisfying method, the suitable risk-averse strategy is determined for the studied case.




of

Enabling smart city technologies: impact of smart city-ICTs on e-Govt. services and society welfare using UTAUT model

Smart cities research is growing all over the world seeking to understand the effect of smart cities from different angles, domains and countries. The aim of this study is to analyse how the smart city ICTs (e.g., big data analytics, AI, IoT, cloud computing, smart grids, wireless communication, intelligent transportation system, smart building, e-governance, smart health, smart education and cyber security) are related to government. services and society welfare from the perspective of China. This research confirmed a positive correlation of smart city ICTs to e-Govt. Services (e-GS). On the other hand, the research showed a positive influence of smart city ICTs on society's welfare. These findings about smart cities and ICTs inform us how the thought paradigm to smart technologies can cause the improvement of e-GS through economic development, job creation and social welfare. The study offers different applications of the theoretical perspectives and the management perspective which are significant to building a society during recent technologised era.




of

Adaptive terminal sliding mode control of a non-holonomic wheeled mobile robot

In this paper, a second-order sliding mode adaptive controller with finite time stability is proposed for trajectory tracking of robotic systems. In order to reduce the chattering phenomenon in the response of the variable structure resistant controller, two dependent sliding surfaces are used. In the outer loop, a kinematic controller is used to compensate the geometric uncertainty of the robot, and in the inner loop, the proposed resistive control is used as the main loop. On the other hand, considering the dynamic uncertainty and disturbance of the robot, an adaptive strategy has been used to estimate the uncertainty limit during the control process in order to eliminate the need for basic knowledge to determine the uncertainty limit in the resistant structure. The proposed control method demonstrates significant enhancements in performance, with the linear velocity error improving by approximately 80%, leading to a more accurate and responsive system.




of

International Journal of Vehicle Information and Communication Systems




of

An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning

Image forgery detection techniques refer to the process of detecting manipulated or altered images, which can be used for various purposes, including malicious intent or misinformation. Image forgery detection is a crucial task in digital image forensics, where researchers have developed various techniques to detect image forgery. These techniques can be broadly categorised into active, passive, machine learning-based and hybrid. Active approaches involve embedding digital watermarks or signatures into the image during the creation process, which can later be used to detect any tampering. On the other hand, passive approaches rely on analysing the statistical properties of the image to detect any inconsistencies or irregularities that may indicate forgery. In this paper for the detection of scaling and cropping attack a deep learning method has been proposed using ResNet. The proposed method (Res-Net-Adam-Adam) is able to achieve highest amount of accuracy of 99.14% (0.9914) while detecting fake and real images.




of

Robust watermarking of medical images using SVM and hybrid DWT-SVD

In the present scenario, the security of medical images is an important aspect in the field of image processing. Support vector machines (SVMs) are a supervised machine learning technique used in image classification. The roots of SVM are from statistical learning theory. It has gained excellent significance because of its robust, accurate, and very effective algorithm, even though it was applied to a small set of training samples. SVM can classify data into binary classification or multiple classifications according to the application's needs. Discrete wavelet transform (DWT) and singular value decomposition (SVD) transform techniques are utilised to enhance the image's security. In this paper, the image is first classified using SVM into ROI and RONI, and thereafter, to enhance the images diagnostic capabilities, the DWT-SVD-based hybrid watermarking technique is utilised to embed the watermark in the RONI region. Overall, our work makes a significant contribution to the field of medical image security by presenting a novel and effective solution. The results are evaluated using both perceptual and imperceptibility testing using PSNR and SSIM parameters. Different attacks were introduced to the watermarked image, which shows the efficacy and robustness of the proposed algorithm.




of

International Journal of Information and Computer Security




of

Undertaking a bibliometric analysis to investigate the framework and dynamics of slow fashion in the context of sustainability

The current study has outlined slow fashion (SF) research trends and created a future research agenda for this field. It is a thorough analysis of the literature on slow fashion. Numerous bibliometric features of slow fashion have been discussed in the paper. This study comprises 182 research articles from the Scopus database. The database was utilised for bibliometric analysis. To identify certain trends in the area of slow fashion, a bibliometric study is done. For bibliometric analysis, the study employed R-software (the Biblioshiny package). Here, VOSviewer software is used to determine the co-occurrence of authors, countries, sources, etc. The study has outlined the gap that still exists in the field of slow fashion. Here, the research outcome strengthens the domain of slow fashion for sustainable consumption. The study findings will be useful for policymakers, industry professionals, and researchers.




of

Modern health solution: acceptance and adoption of telemedicine among Indian women

Access to quality healthcare is a fundamental right but unfortunately, India suffers from gender disparities in healthcare access. Telemedicine has the potential to improve access to healthcare services for women by eliminating traditional barriers. Therefore, our research aims to investigate the factors influencing the adoption of telemedicine among Indian women. This study has collected 442 responses and analysed them through structural equation modelling. The result indicates a strong and positive connection between the willingness to adopt telemedicine services and factors like performance expectancy, perceived benefits, e-health literacy, and perceived reliability. Notably, perceived reliability emerges as the most impactful predictor, closely followed by perceived benefits, while factors like effort expectancy and user resistance show no significant influence. This underscores the pivotal role of reliability and perceived benefits in shaping women's inclination toward adopting telemedicine. The study provides practical insights for telemedicine providers and policymakers to customise strategies and policies for effective promotion.




of

Trends and development of workplace mindfulness for two decades: a bibliometric analysis

This systematic literature study employed bibliometric analysis to identify workplace mindfulness-related methods and practices in literature published from 2000 to 2020 by leading nations, institutions, journals, authors, and keywords. We also assessed the impact of workplace mindfulness research papers. Scopus analysis tools provided a literature report for 638 Scopus articles used in the study. Using VOSviewer, leading nations, institutions, articles, authors, journals, and keyword co-occurrence network maps were constructed. PRISMA was used to identify 56 publications to recognise workplace mindfulness literature's significant achievements. The research's main contribution is a deep review of neurological mindfulness and psychological measuring tools as workplace mindfulness tool categories. The study is the first to use the PRISMA technique to capture the essential contributions of workplace mindfulness papers from 2000 to 2020.




of

International Journal of Services and Standards




of

What we know and do not know about video games as marketers: a review and synthesis of the literature

The video game industry (VGI) has evolved considerably, transitioning from a niche market to a substantial sector. The VGI's magnitude and the societal implications tied to video game consumption have naturally piqued the interest of scholars in marketing and consumer behaviour. This research serves a dual purpose: firstly, it consolidates existing VG literature by evaluating articles, concepts, and methodologies, systematically tracing their evolution; secondly, it outlines potential directions and implications for forthcoming research. Within this literature, a predominant focus lies on articles investigating purchase decisions concerning VGs, followed by those exploring the integration of video game consumption into broader social contexts. Notably, a limited number of articles delve into player-game interactions and experiences within gaming worlds. This imbalance can be attributed to the fact that such inquiries are often suited to psychology and multidisciplinary journals, while the marketing discipline has predominantly addressed the VGI from a marketing management standpoint.




of

Springs of digital disruption: mediation of blockchain technology adoption in retail supply chain management

Supply chain management practices are vital for success and survival in today's competitive Indian retail market. The advent of COVID-19 pandemic necessitates a digital disruption in retail supply chain management centred on efficient technology like blockchain in order to enhance supply chain performance. The present research aims to decipher the nature of associations between supply chain management practices, blockchain technology adoption and supply chain performance in retail firms. The research is based on primary survey of specific food and grocery retailers operating on a supermarket format stores in two Indian cities. The findings pointed towards the presence of significant and positive association of all the constructs with each other. Moreover, the mediating role of blockchain technology adoption was also revealed, i.e., it partially mediates the effects of supply chain management practices on supply chain performance.




of

Analysing the role of WOM and eWOM in exploring tourist destinations

Word of mouth (WOM) and electronic word of mouth (eWOM) are very effective and important communication tools to persuade consumers for purchasing the products/services. These become more significant with products that are difficult to assess before consumption, e.g., hospitality. The tourism industry is reviving, and the consumer is conscious when booking a particular destination. Thus, it is important to understand how WOM and eWOM are impacting the various factors in distinct ways while choosing the tourist destination. The seven factors identified, for the present study, are channel engagement, expertise, homophily, resource helpfulness, source credibility, tie-strength, and trustworthiness. The PLS-SEM was used to test the theoretical model of this study. The study shows that both WOM and eWOM impact an individual in different ways. The expertise of the reviewer is the most important factor in the case of WOM and channel engagement is the most significant factor for eWOM. Resource helpfulness is common for both WOM and eWOM.




of

International Journal of Electronic Marketing and Retailing




of

The discussion of information security risk control in mobile banking

The emergence of digital technology and the increasing prevalence of smartphones have promoted innovations in payment options available in finance and consumption markets. Banks providing mobile payment must ensure the information security. Inadequate security control leads to information leakage, which severely affects user rights and service providers' reputations. This study uses control objectives for Information and Related Technologies 4.1 as the mobile payment security control framework to examine the emergent field of mobile payment. A literature review is performed to compile studies on the safety risk, regulations, and operations of mobile payments. In addition, the Delphi questionnaire is distributed among experts to determine the practical perspectives, supplement research gaps in the literature, and revise the prototype framework. According to the experts' opinions, 59 control objectives from the four domains of COBIT 4.1 are selected. The plan and organise, acquire and implement, deliver and support, and monitor and evaluate four domains comprised 2, 5, 10, and 2 control objectives that had mean importance scores of > 4.50. Thus, these are considered the most important objectives by the experts, respectively. The results of this study can serve as a reference for banks to construct secure frameworks in mobile payment services.