re Timed influence: The future of Modern (Family) life and the law By script-ed.org Published On :: Fri, 10 Sep 2021 12:48:20 +0000 By Lucas Miotto Lopes and Jiahong Chen The future of real-time appeal Knowing when to say or do something is often just as important as knowing what to say or do. The right advice at the wrong time is not Full Article Blog
re En renonᅵant aux dividendes, l'Etat va perdre 2,4 milliards d'euros By www.politique.net Published On :: Wed, 20 May 2020 19:16:48 GMT Pas de dividendes en pᅵriode de crise. En annonᅵant qu'il n'accorderait aucune aide (comme des reports de cotisation) aux entreprises qui verseraient des dividendes ᅵ leurs actionnaires, le gouvernement a tentᅵ... Full Article
re La Semaine politique : la France a dᅵtruit ses masques, un ex-collaborateur de Vᅵran a cherchᅵ ᅵ en vendre (et quelques autres infos) By www.politique.net Published On :: Mon, 25 May 2020 12:30:18 GMT Vous n'avez pas eu le temps de lire Le Canard enchaᅵnᅵ, Mediapart, Le Monde, Arrᅵt sur images et tous les autres titres de presse ? On s'en charge pour vous. Full Article
re Le maire d'extrᅵme-droite de Perpignan s'est augmentᅵ de 17% juste aprᅵs son ᅵlection By www.politique.net Published On :: Thu, 03 Sep 2020 07:01:24 GMT C'est un classique. Juste aprᅵs leur victoire, certains ᅵlus locaux font voter une augmentation de leur salaire. Une dᅵcision qui intervient au dᅵbut de leur mandat, histoire que les ᅵlecteurs aient le temps... Full Article
re Journᅵes parlementaires, campus rᅵgionaux : La Rᅵpublique en marche va dᅵpenser prᅵs d'un million d'euros pour sa rentrᅵe By www.politique.net Published On :: Thu, 03 Sep 2020 07:02:22 GMT C'est la rentrᅵe politique. Et qui dit rentrᅵe, dit universitᅵ d'ᅵtᅵ. Cette annᅵe, la Rᅵpublique en marche a vu les choses en grand en organisant ᅵ la fois des journᅵes... Full Article
re La justice stoppe une enquᅵte potentiellement gᅵnante sur Jean Castex, trois jours aprᅵs sa nomination comme Premier ministre By www.politique.net Published On :: Thu, 03 Sep 2020 07:03:17 GMT Hasard du calendrier ou volontᅵ de prᅵserver le nouveau Premier ministre ? Selon Mediapart, une enquᅵte judiciaire ouverte par le parquet de Perpignan, potentiellement gᅵnante pour Jean Castex, a ᅵtᅵ... Full Article
re Titres de sᅵjour : pour ᅵviter les files d'attente, les prᅵfectures ont inventᅵ l'inscription en ligne (qui ne fonctionne quasiment jamais) By www.politique.net Published On :: Tue, 06 Apr 2021 19:00:30 GMT Des files d'attente, la nuit, devant les prᅵfectures, pour tenter d'obtenir un rendez-vous afin de demander ou de renouveler un titre de sᅵjour. C'ᅵtait la rᅵalitᅵ au dᅵbut des annᅵes... Full Article
re 0 800 : le numᅵro vert sur le covid rapporte gros et informe peu (certains tᅵlᅵopᅵrateurs sont des intᅵrimaires formᅵs en 30 minutes) By www.politique.net Published On :: Tue, 06 Apr 2021 19:24:42 GMT Inquiet par le coronavirus ? Vous pouvez appeler le numᅵro vert 0 800 130 000. C'est Emmanuel Macron lui-mᅵme qui en a fait la promotion dans un tweet en avril 2020, en plein confinement. Ce 0 800 fait partie de la longue liste... Full Article
re Selon Le Canard enchaᅵnᅵ, le gouvernement Castex est le plus coᅵteux de l'histoire de la Ve Rᅵpublique (185 millions d'euros par an) By www.politique.net Published On :: Tue, 06 Apr 2021 19:45:04 GMT L'information est passᅵe inaperᅵue mais elle ne manque pas de sel. Alors que la gestion de la crise du covid-19 par le gouvernement est trᅵs contestᅵe (au retard dans la livraison de masques s'ajoute... Full Article
re Le ministre de la justice, Eric Dupont-Moretti, a oubliᅵ de dᅵclarer 300 000 euros de revenus au fisc By www.politique.net Published On :: Wed, 07 Jul 2021 18:27:41 GMT Voilᅵ un "petit oubli" bien embᅵtant. Selon Mediapart, "le garde des Sceaux, Eric Dupont-Moretti, a oubliᅵ de dᅵclarer au fisc et ᅵ la Haute Autoritᅵ pour la transparence de la vie publique... Full Article
re Pᅵle emploi a organisᅵ un sᅵminaire au Stade de France pour 300 000 euros By www.politique.net Published On :: Mon, 22 Aug 2022 19:20:41 GMT Le retour de Politique.net mᅵritait bien de commencer par une fᅵte. Selon Le Canard enchaᅵnᅵ, "le 17 juin, Pᅵle emploi Il-de-France s'est offert un sᅵminaire managers au Stade de France pour communier... Full Article
re Pour dᅵsengorger les urgences des hᅵpitaux, le ministre de la Santᅵ a saturᅵ le Samu By www.politique.net Published On :: Tue, 23 Aug 2022 08:04:13 GMT C'est malin. A peine nommᅵ ministre de la Santᅵ, Franᅵois Braun croyait avoir trouvᅵ une astuce pour dᅵsengorger les services d'urgences des hᅵpitaux : demander aux patients d'appeler le 15,... Full Article
re Banques, assurances et entreprises du CAC 40 : leurs bᅵnᅵfices explosent By www.politique.net Published On :: Fri, 26 Aug 2022 18:26:00 GMT La crise ? Quelle crise ? Alors que le gouvernement prᅵpare l'opinion ᅵ une longue pᅵriode d'inflation et de hausse des prix de l'ᅵnergie en raison de la guerre en Ukraine, tout ne va pas si mal sur le plan... Full Article
re Ascendancy of SNS information and age difference on intention to buy eco-friendly offerings: meaningful insights for e-tailers By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Through the unparalleled espousal of theory of planned behaviour, this study intends to significantly add to the current knowledge on social networking sites (SNS) in <i>eWOM</i> information and its role in defining intentions to buy green products. In specie, this study seeks to first investigate the part played by <i>attitude towards SNS information</i> in influencing the <i>acceptance of SNS information</i> and then by <i>acceptance of SNS information</i> in effecting the <i>green purchase intention</i>. Besides this, it also aims to analyse the influence exerted by first <i>credibility of SNS information</i> on <i>acceptance of SNS information</i> and then by <i>acceptance of SNS information</i> on <i>green purchase intention</i>. In doing so, it also examines how well the age of the SNS users moderates all these four associations. Full Article
re Risk evaluation method of electronic bank investment based on random forest By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Aiming at the problems of high error rate, low evaluation accuracy and low investment return in traditional methods, a random forest-based e-bank investment risk evaluation method is proposed. First, establish a scientific e-bank investment risk evaluation index system. Then, G1-COWA combined weighting method is used to calculate the weights of each index. Finally, the e-bank investment risk evaluation index data is taken as the input vector, and the e-bank investment risk evaluation result is taken as the output vector. The random forest model is established and the result of e-banking investment risk evaluation is obtained. The experimental results show that the maximum relative error rate of this method is 4.32%, the evaluation accuracy range is 94.5~98.1%, and the maximum return rate of e-banking investment is 8.32%. It shows that this method can accurately evaluate the investment risk of electronic banking. Full Article
re Study on operational risks and preventive measures of supply chain finance By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The operation of supply chain finance faces various risks, therefore, studying the operational risks of supply chain finance and corresponding preventive measures is of great significance. Firstly, classify the types of operational risks in supply chain finance. Secondly, based on the risk classification results, the decision tree method is used to evaluate the operational risks of supply chain finance. Finally, based on the risk assessment results, targeted risk prevention measures for supply chain finance operations are proposed, such as strengthening supplier management, optimising logistics and warehouse management, risk analysis and monitoring, and strengthening information security and data protection. The case analysis results show that the accuracy of the evaluation results of this method is higher, and the risk coefficient has been significantly reduced after applying this method, indicating that it can effectively reduce supply chain risk. Full Article
re Research on Weibo marketing advertising push method based on social network data mining By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The current advertising push methods have low accuracy and poor advertising conversion effects. Therefore, a Weibo marketing advertising push method based on social network data mining is studied. Firstly, establish a social network graph and use graph clustering algorithm to mine the association relationships of users in the network. Secondly, through sparsisation processing, the association between nodes in the social network graph is excavated. Then, evaluate the tightness between user preferences and other nodes in the social network, and use the TF-IDF algorithm to extract user interest features. Finally, an attention mechanism is introduced to improve the deep learning model, which matches user interests with advertising domain features and outputs push results. The experimental results show that the push accuracy of this method is higher than 95%, with a maximum advertising click through rate of 82.7% and a maximum advertising conversion rate of 60.7%. Full Article
re E-commerce growth prediction model based on grey Markov chain By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 In order to solve the problems of long prediction consumption time and many prediction iterations existing in traditional prediction models, an e-commerce growth prediction model based on grey Markov chain is proposed. The Scrapy crawler framework is used to collect a variety of e-commerce data from e-commerce websites, and the feedforward neural network model is used to clean the collected data. With the cleaned e-commerce data as the input vector and the e-commerce growth prediction results as the output vector, an e-commerce growth prediction model based on the grey Markov chain is built. The prediction model is improved by using the background value optimisation method. After training the model through the improved particle swarm optimisation algorithm, accurate e-commerce growth prediction results are obtained. The experimental results show that the maximum time consumption of e-commerce growth prediction of this model is only 0.032, and the number of iterations is small. Full Article
re A method for selecting multiple logistics sites in cross-border e-commerce based on return uncertainty By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 To reduce the location cost of cross-border e-commerce logistics sites, this article proposes a multi-logistics site location method based on return uncertainty. Firstly, a site selection model is established with the objective function of minimising site construction costs, transportation costs, return costs, and operating costs, and the constraint conditions of return recovery costs and delayed pick-up time; Then, using the Monte Carlo method to simulate the number of returned items, and using an improved chicken swarm algorithm based on simulated annealing, the cross-border e-commerce multi-logistics site location model is solved to complete the location selection. Experimental results show that this method can effectively reduce the related costs of cross-border e-commerce multi-logistics site selection. After applying this method, the total cost of multi-logistics site selection is 19.4 million yuan, while the total cost of the five comparative methods exceeds 20 million yuan. Full Article
re The Impact of Physics Open Educational Resources (OER) on the Professional Development of Bhutanese Secondary School Physics Teachers By ijedict.dec.uwi.edu Published On :: Sat, 31 Aug 2024 09:44:41 -0400 Full Article Refereed Articles
re Où le brouillard, la lumière By www.koztoujours.fr Published On :: Wed, 10 Jul 2024 15:20:16 +0000 Départager LFI et le RN. Nous sommes tombés bien bas. N'y a-t-il que des raisons politiques ? N'est-ce pas aussi une culture qui le permet ? Culture marquée par une déroute de la raison, supplantée par le relativisme, le subjectivisme et l'émotivisme. Comment changer ? Full Article Société Benoît XVI LFI RN top
re A vin nouveau, outres neuves ? By www.koztoujours.fr Published On :: Wed, 21 Aug 2024 17:47:32 +0000 (Chronique d'avant-plage) Emmanuel Macron a écrit aux Français pour louer le parlementarisme et la stabilité institutionnelle. Il a pourtant contourné le Parlement pendant 7 ans et méprisé les Présidents des deux chambres en se contentant de les informer de la dissolution. Alors, avec un tel garant, que fait-on ? Full Article Société Macron top
re Totems migratoires By www.koztoujours.fr Published On :: Wed, 09 Oct 2024 16:15:45 +0000 La politique est souvent guidée par des marqueurs idéologiques qui manquent de nuances. L'immigration illustre cette polarisation : la gauche prône une générosité aveugle, la droite une sévérité rigide. Le meurtre de Philippine de Carlan relance ce débat. La gestion de l'immigration doit équilibrer humanité et acceptabilité, mais sans sacrifier vérité ni lucidité. Full Article Société Immigration top
re La revanche des darons By www.koztoujours.fr Published On :: Wed, 23 Oct 2024 14:08:02 +0000 La nomination de Gabriel Attal était l’apothéose macroniste, l’acmé juvénile. La consécration des jeunes executives en costumes slim. Las, nos virtuoses de la finance laissent le pays dans un sale état et, pour tenter de réparer les dégâts, c'est au panache blanc du vieux Barnier qu'il a fallu faire appel... Dans le marasme actuel, le renversement est au moins savoureux. Full Article Société âgisme dette macronisme top
re L’épreuve de vérités By www.koztoujours.fr Published On :: Wed, 06 Nov 2024 11:10:07 +0000 On ne peut se contenter de soutenir Israël ou la Palestine : le Proche-Orient exige une lecture nuancée, où coexistent des vérités concurrentes et conflictuelles. Même la singularité locale qu'est démocratie israélienne ne l’absout pas de ses choix politiques extrêmes. Taire les souffrances civiles palestiniennes décrédibilise les Droits de l'Homme, trahissant les valeurs occidentales essentielles à notre propre sécurité. Full Article Société Gaza Palestine top
re Feature-aware task offloading and scheduling mechanism in vehicle edge computing environment By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 With the rapid development and application of driverless technology, the number and location of vehicles, the channel and bandwidth of wireless network are time-varying, which leads to the increase of offloading delay and energy consumption of existing algorithms. To solve this problem, the vehicle terminal task offloading decision problem is modelled as a Markov decision process, and a task offloading algorithm based on DDQN is proposed. In order to guide agents to quickly select optimal strategies, this paper proposes an offloading mechanism based on task feature. In order to solve the problem that the processing delay of some edge server tasks exceeds the upper limit of their delay, a task scheduling mechanism based on buffer delay is proposed. Simulation results show that the proposed method has greater performance advantages in reducing delay and energy consumption compared with existing algorithms. Full Article
re Research on multi-objective optimisation for shared bicycle dispatching By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 The problem of dispatching is key to management of shared bicycles. Considering the number of borrowing and returning events during the dispatching period, optimisation plans of shared bicycles dispatching are studied in this paper. Firstly, the dispatching model of shared bicycles is built, which regards the dispatching cost and lost demand as optimised objectives. Secondly, the solution algorithm is designed based on non-dominated Genetic Algorithm. Finally, a case is given to illustrate the application of the method. The research results show that the method proposed in the paper can get optimised dispatching plans, and the model considering borrowing and returning during dispatching period has better effects with a 39.3% decrease in lost demand. Full Article
re Enabling smart city technologies: impact of smart city-ICTs on e-Govt. services and society welfare using UTAUT model By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Smart cities research is growing all over the world seeking to understand the effect of smart cities from different angles, domains and countries. The aim of this study is to analyse how the smart city ICTs (e.g., big data analytics, AI, IoT, cloud computing, smart grids, wireless communication, intelligent transportation system, smart building, e-governance, smart health, smart education and cyber security) are related to government. services and society welfare from the perspective of China. This research confirmed a positive correlation of smart city ICTs to e-Govt. Services (e-GS). On the other hand, the research showed a positive influence of smart city ICTs on society's welfare. These findings about smart cities and ICTs inform us how the thought paradigm to smart technologies can cause the improvement of e-GS through economic development, job creation and social welfare. The study offers different applications of the theoretical perspectives and the management perspective which are significant to building a society during recent technologised era. Full Article
re Data dissemination and policy enforcement in multi-level secure multi-domain environments By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Several challenges exist in disseminating multi-level secure (MLS) data in multi-domain environments. First, the security domains participating in data dissemination generally use different MLS labels and lattice structures. Second, when MLS data objects are transferred across multiple domains, there is a need for an agreed security policy that must be properly applied, and correctly enforced for the data objects. Moreover, the data sender may not be able to predetermine the data recipients located beyond its trust boundary. To address these challenges, we propose a new framework that enables secure dissemination and access of the data as intended by the owner. Our novel framework leverages simple public key infrastructure and active bundle, and allows domains to securely disseminate data without the need to repackage it for each domain. Full Article
re Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 The confluence of the internet of things (IoT) with smart grids has ushered in a paradigm shift in energy management, promising unparalleled efficiency, economic robustness and unwavering reliability. However, this integrative evolution has concurrently amplified the grid's susceptibility to cyber intrusions, casting shadows on its foundational security and structural integrity. Machine learning (ML) and deep learning (DL) emerge as beacons in this landscape, offering robust methodologies to navigate the intricate cybersecurity labyrinth of IoT-infused smart grids. While ML excels at sifting through voluminous data to identify and classify looming threats, DL delves deeper, crafting sophisticated models equipped to counteract avant-garde cyber offensives. Both of these techniques are united in their objective of leveraging intricate data patterns to provide real-time, actionable security intelligence. Yet, despite the revolutionary potential of ML and DL, the battle against the ceaselessly morphing cyber threat landscape is relentless. The pursuit of an impervious smart grid continues to be a collective odyssey. In this review, we embark on a scholarly exploration of ML and DL's indispensable contributions to enhancing cybersecurity in IoT-centric smart grids. We meticulously dissect predominant cyber threats, critically assess extant security paradigms, and spotlight research frontiers yearning for deeper inquiry and innovation. Full Article
re Robust and secure file transmission through video streaming using steganography and blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 File transfer is always handled by a separate service, sometimes it is a third-party service in videoconferencing. When sending files during a video session, file data flow and video stream are independent of each other. Encryption is a mature method to ensure file security. However, it still has the chance to leave footprints on the intermediate forwarding machines. These footprints can indicate that a file once passed through, some protocol-related logs give clues to the hackers' later investigation. This work proposes a file-sending scheme through the video stream using blockchain and steganography. Blockchain is used as a file slicing and linkage mechanism. Steganography is applied to embed file pieces into video frames that are continuously generated during the session. The scheme merges files into the video stream with no file transfer protocol use and no extra bandwidth consumed by the file to provide trackless file transmission during the video communication. Full Article
re Secure digital academic certificate verification system using blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 At present, there is a need for an authentic and fast approach to certificate verification. Which verifies and authenticates the certificates to reduce the extent of duplicity and time. An academic certificate is significant for students, the government, universities, and employers. Academic credentials play a vital role in the career of students. A few people manipulate academic documents for their benefit. There are cases identified where people produced fake academic certificates for jobs or higher education admission. Various research works are developing a secure model to verify genuine academic credentials. This research article proposed a new security model which contains several security algorithms such as timestamps, hash function, digital signature, steganography, and blockchain. The proposed model issues secure digital academic certificates. It enhanced security measures and automated educational certificate verification using blockchain technology. The advantages of the proposed model are automated, cost-effective, secured, traceable, accurate, and time-saving. Full Article
re An image encryption using hybrid grey wolf optimisation and chaotic map By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Image encryption is a critical and attractive issue in digital image processing that has gained approval and interest of many researchers in the world. A proposed hybrid encryption method was implemented by using the combination of the Nahrain chaotic map with a well-known optimised algorithm namely the grey wolf optimisation (GWO). It was noted from analysing the results of the experiments conducted on the new hybrid algorithm, that it gave strong resistance against expected statistical invasion as well as brute force. Several statistical analyses were carried out and showed that the average entropy of the encrypted images is near to its ideal information entropy. Full Article
re A robust feature points-based screen-shooting resilient watermarking scheme By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Screen-shooting will lead to information leakage. Anti-screen-shooting watermark, which can track the leaking sources and protect the copyrights of images, plays an important role in image information security. Due to the randomness of shooting distance and angle, more robust watermark algorithms are needed to resist the mixed attack generated by screen-shooting. A robust digital watermarking algorithm that is resistant to screen-shooting is proposed in this paper. We use improved Harris-Laplace algorithm to detect the image feature points and embed the watermark into the feature domain. In this paper, all test images are selected on the dataset USC-SIPI and six related common algorithms are used for performance comparison. The experimental results show that within a certain range of shooting distance and angle, this algorithm presented can not only extract the watermark effectively but also ensure the most basic invisibility of watermark. Therefore, the algorithm has good robustness for anti-screen-shooting. Full Article
re Trends and development of workplace mindfulness for two decades: a bibliometric analysis By www.inderscience.com Published On :: 2024-09-05T23:20:50-05:00 This systematic literature study employed bibliometric analysis to identify workplace mindfulness-related methods and practices in literature published from 2000 to 2020 by leading nations, institutions, journals, authors, and keywords. We also assessed the impact of workplace mindfulness research papers. Scopus analysis tools provided a literature report for 638 Scopus articles used in the study. Using VOSviewer, leading nations, institutions, articles, authors, journals, and keyword co-occurrence network maps were constructed. PRISMA was used to identify 56 publications to recognise workplace mindfulness literature's significant achievements. The research's main contribution is a deep review of neurological mindfulness and psychological measuring tools as workplace mindfulness tool categories. The study is the first to use the PRISMA technique to capture the essential contributions of workplace mindfulness papers from 2000 to 2020. Full Article
re What we know and do not know about video games as marketers: a review and synthesis of the literature By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The video game industry (VGI) has evolved considerably, transitioning from a niche market to a substantial sector. The VGI's magnitude and the societal implications tied to video game consumption have naturally piqued the interest of scholars in marketing and consumer behaviour. This research serves a dual purpose: firstly, it consolidates existing VG literature by evaluating articles, concepts, and methodologies, systematically tracing their evolution; secondly, it outlines potential directions and implications for forthcoming research. Within this literature, a predominant focus lies on articles investigating purchase decisions concerning VGs, followed by those exploring the integration of video game consumption into broader social contexts. Notably, a limited number of articles delve into player-game interactions and experiences within gaming worlds. This imbalance can be attributed to the fact that such inquiries are often suited to psychology and multidisciplinary journals, while the marketing discipline has predominantly addressed the VGI from a marketing management standpoint. Full Article
re Nexus between artificial intelligence and marketing: a systematic review and bibliometric analysis By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Although artificial intelligence provides a new method to gather, process, analyse data, generate insights, and offer customised solutions, such methods could change how marketers deal with customers, and there is a lack of literature to portray the application of artificial intelligence in marketing. This study aims to recognise and portray the use of artificial intelligence from a marketing standpoint, as well as to provide a conceptual framework for the application of artificial intelligence in marketing. This study uses a systematic literature review analysis as a research method to achieve the aims. Data from 142 articles were extracted from the Scopus database using relevant search terms for artificial intelligence and marketing. The systematic review identified significant usage of artificial intelligence in conversational artificial intelligence, content creation, audience segmentation, predictive analytics, personalisation, paid ads, sales forecasting, dynamic pricing, and recommendation engines and the bibliometric analysis produced the trend in co-authorship, citation, bibliographic coupling, and co-citation analysis. Practitioners and academics may use this study to decide on the marketing area in which artificial intelligence can be invested and used. Full Article
re Springs of digital disruption: mediation of blockchain technology adoption in retail supply chain management By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Supply chain management practices are vital for success and survival in today's competitive Indian retail market. The advent of COVID-19 pandemic necessitates a digital disruption in retail supply chain management centred on efficient technology like blockchain in order to enhance supply chain performance. The present research aims to decipher the nature of associations between supply chain management practices, blockchain technology adoption and supply chain performance in retail firms. The research is based on primary survey of specific food and grocery retailers operating on a supermarket format stores in two Indian cities. The findings pointed towards the presence of significant and positive association of all the constructs with each other. Moreover, the mediating role of blockchain technology adoption was also revealed, i.e., it partially mediates the effects of supply chain management practices on supply chain performance. Full Article
re Does brand association, brand attachment, and brand identification mediate the relationship between consumers' willingness to pay premium prices and social media marketing efforts? By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 This study investigates the effects of social media marketing efforts (SMME) on smartphone brand identification, attachment, association, and willingness to pay premium prices. A survey of 320 smartphone users who followed official social media handles managed by smartphone companies was conducted for this purpose. PLS-SEM was used to analyse the collected data. The findings demonstrated importance of SMME dimensions. According to the study's findings, the smartphone brand's SMMEs had significant impact on brand identification, brand association, and brand attachment. The results revealed that SMMEs had significant impact on willingness to pay the premium price. The findings also show that brand identification, attachment, and association mediated the relationship between SMMEs and willingness to pay a premium price. The findings of this study will be useful in developing social media marketing strategies for smartphones. This study demonstrates the use of social media marketing to promote mobile phones, particularly in emerging markets. Full Article
re International Journal of Electronic Marketing and Retailing By www.inderscience.com Published On :: Full Article
re Enhanced TCP BBR performance in wireless mesh networks (WMNs) and next-generation high-speed 5G networks By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 TCP BBR is one of the most powerful congestion control algorithms. In this article, we provide a comprehensive review of BBR analysis, expanding on existing knowledge across various fronts. Utilising ns3 simulations, we evaluate BBR's performance under diverse conditions, generating graphical representations. Our findings reveal flaws in the probe's RTT phase duration estimation and unequal bandwidth sharing between BBR and CUBIC protocols. Specifically, we demonstrated that the probe's RTT phase duration estimation algorithm is flawed and that BBR and CUBIC generally do not share bandwidth equally. Towards the end of the article, we propose a new improved version of TCP BBR which minimises these problems of inequity in bandwidth sharing and corrects the inaccuracies of the two key parameters RTprop and cwnd. Consequently, the BBR' protocol maintains very good fairness with the Cubic protocol, with an index that is almost equal to 0.98, and an equity index over 0.95. Full Article
re A constant temperature control system for indoor environments in buildings using internet of things By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 The performance of a building's internal environment, which includes the air temperature, lighting and acoustics, is what determines the quality of the environment inside the building. We present a thermal model for achieving thermal comfort in buildings that makes use of a multimodal analytic framework as a solution to this challenge. In this study, a multimodal combination is used to evaluate several temperature and humidity sensors as well as an area image. Additionally, a CNN and LSTM combination is used to process the image and sensor data. The results show that heating setback and interior set point temperatures, as well as mechanical ventilation based on real people's presence and CO<SUB align=right>2 levels, are all consistently reduced when ICT-driven intelligent solutions are used. The CNN-LSTM model has a goodness of fit that is 0.7258 on average, which is much higher than both the CNN (0.5291) and LSTM (0.5949) models. Full Article
re SVC-MST BWQLB multicast over software-defined networking By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 This paper presents a Scalable Video Coding (SVC) system over multicast Software-Defined Networking (SDN), which focuses on, transmission management for the sender-receiver model. Our approach reduces bandwidth usage by allowing the receiver to select various video resolutions in a multicast group, which helps avoid a video freezing issue during bandwidth congestion. Moreover, the SVC Multiple Sessions Transmission Bandwidth thresholds Quantised Level Balance (SVC-MST BWQLB) routes different layers of the SVC stream using distinct paths and reduces storage space and bandwidth congestion problems in different video resolutions. The experimental results show that the proposed model provides better display quality than the traditional Open Shortest Path First (OSPF) routing technique. Furthermore, it reduced transmission delays by up to 66.64% for grouped resolutions compared to SVC-Single Session Transmission (SVC-SST). Additionally, the modified Real-time Transport Protocol (RTP) header and the sorting buffer for SVC-MST are proposed to deal with the defragmentation problem. Full Article
re An effective differential privacy protection method of location data based on perturbation loss constraint By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 Differential privacy is usually applied to location privacy protection scenarios, which confuses real data by adding interference noise to location points to achieve the purpose of protecting privacy. However, this method can result in a significant amount of redundant noisy data and impact the accuracy of the location. Considering the security and practicability of location data, an effective differential privacy protection method of location data based on perturbation loss constraint is proposed. After applying the Laplace mechanism under the condition of differential privacy to perturb the location data, the Savitzky-Golay filtering technology is used to correct the data with noise, and the data with large deviation and low availability is optimised. The introduction of Savitzky-Golay filtering mechanism in differential privacy can reduce the error caused by noise data while protecting user privacy. The experiments results indicate that the scheme improves the practicability of location data and is feasible. Full Article
re Emotion recognition method for multimedia teaching classroom based on convolutional neural network By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 In order to further improve the teaching quality of multimedia teaching in school daily teaching, a classroom facial expression emotion recognition model is proposed based on convolutional neural network. VGGNet and CliqueNet are used as the basic expression emotion recognition methods, and the two recognition models are fused while the attention module CBAM is added. Simulation results show that the designed classroom face expression emotion recognition model based on V-CNet has high recognition accuracy, and the recognition accuracy on the test set reaches 93.11%, which can be applied to actual teaching scenarios and improve the quality of classroom teaching. Full Article
re Design of traffic signal automatic control system based on deep reinforcement learning By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Aiming at the problem of aggravation of traffic congestion caused by unstable signal control of traffic signal control system, the Multi-Agent Deep Deterministic Policy Gradient-based Traffic Cyclic Signal (MADDPG-TCS) control algorithm is used to control the time and data dimensions of the signal control scheme. The results show that the maximum vehicle delay time and vehicle queue length of the proposed algorithm are 11.33 s and 27.18 m, which are lower than those of the traditional control methods. Therefore, this method can effectively reduce the delay of traffic signal control and improve the stability of signal control. Full Article
re Application of integrated image processing technology based on PCNN in online music symbol recognition training By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 To improve the effectiveness of online training for music education, it was investigated how to improve the pulse-coupled neural network in image processing for spectral image segmentation. The study proposes a two-scale descent method to achieve oblique spectral correction. Subsequently, a convolutional neural network was optimised using a two-channel feature fusion recognition network for music theory notation recognition. The results showed that this image segmentation method had the highest accuracy, close to 98%, and the accuracy of spectral tilt correction was also as high as 98.4%, which provided good image pre-processing results. When combined with the improved convolutional neural network, the average accuracy of music theory symbol recognition was about 97% and the highest score of music majors was improved by 16 points. This shows that the method can effectively improve the teaching effect of online training in music education and has certain practical value. Full Article
re Multi-agent Q-learning algorithm-based relay and jammer selection for physical layer security improvement By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Physical Layer Security (PLS) and relay technology have emerged as viable methods for enhancing the security of wireless networks. Relay technology adoption enhances the extent of coverage and enhances dependability. Moreover, it can improve the PLS. Choosing relay and jammer nodes from the group of intermediate nodes effectively mitigates the presence of powerful eavesdroppers. Current methods for Joint Relay and Jammer Selection (JRJS) address the optimisation problem of achieving near-optimal secrecy. However, most of these techniques are not scalable for large networks due to their computational cost. Secrecy will decrease if eavesdroppers are aware of the relay and jammer intermediary nodes because beamforming can be used to counter the jammer. Consequently, this study introduces a multi-agent Q-learning-based PLS-enhanced secured joint relay and jammer in dual-hop wireless cooperative networks, considering the existence of several eavesdroppers. The performance of the suggested algorithm is evaluated in comparison to the current algorithms for secure node selection. The simulation results verified the superiority of the proposed algorithm. Full Article
re Injury prediction analysis of college basketball players based on FMS scores By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 It is inevitable for basketball players to have physical injury in sports. Reducing basketball injury is one of the main aims of the study of basketball. In view of this, this paper proposes a monocular vision and FMS injury prediction model for basketball players. Aiming at the limitations of traditional FMS testing methods, this study introduces intelligent machine learning methods. In this study, random forest algorithm was introduced into OpenPose network to improve model node occlusion, missed detection or false detection. In addition, to reduce the computational load of the network, the original OpenPose network was replaced by a lightweight OpenPose network. The experimental results show that the average processing time of the proposed model is about 90 ms, and the output video frame rate is 10 frames per second, which can meet the real-time requirements. This study analysed the students participating in the basketball league of the College of Sports Science of Nantong University, and the results confirmed the accuracy of the injury prediction of college basketball players based on FMS scores. It is hoped that this study can provide some reference for the research of injury prevention of basketball players. Full Article
re BEFA: bald eagle firefly algorithm enabled deep recurrent neural network-based food quality prediction using dairy products By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Food quality is defined as a collection of properties that differentiate each unit and influences acceptability degree of food by users or consumers. Owing to the nature of food, food quality prediction is highly significant after specific periods of storage or before use by consumers. However, the accuracy is the major problem in the existing methods. Hence, this paper presents a BEFA_DRNN approach for accurate food quality prediction using dairy products. Firstly, input data is fed to data normalisation phase, which is performed by min-max normalisation. Thereafter, normalised data is given to feature fusion phase that is conducted employing DNN with Canberra distance. Then, fused data is subjected to data augmentation stage, which is carried out utilising oversampling technique. Finally, food quality prediction is done wherein milk is graded employing DRNN. The training of DRNN is executed by proposed BEFA that is a combination of BES and FA. Additionally, BEFA_DRNN obtained maximum accuracy, TPR and TNR values of 93.6%, 92.5% and 90.7%. Full Article