-
41
On Modelling and Investigating User Acceptance of Highly Automated Passenger Vehicles
Published 2024-01-01Subjects: Get full text
Article -
42
Combining non-Monotone trust rregion method with a new adaptive radius for unconstrained optimization problems
Published 2024-06-01“…Purpose: One of the most effective methods for solving unconstrained optimization problems is the trust region method. The strategy of determining the radius of the trust region has a significant effect on the efficiency of this method. …”
Get full text
Article -
43
Designing a Trust-Aware Reputation Model for Enhanced Data Quality in Human-Centric Sensing Systems
Published 2025-01-01Get full text
Article -
44
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Published 2025-01-01“…To address these challenges, this study proposes an enhanced security model that integrates the concepts of Multi-Level Security (MLS) and Zero Trust (ZT). The proposed model classifies data into the following three sensitivity levels: “Classified”, “Sensitive”, and “Open”. …”
Get full text
Article -
45
-
46
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things
Published 2023-03-01“…To address the challenges, fog computing is generally employed in IoMT systems. However, it raises additional concerns of trust and security. …”
Get full text
Article -
47
-
48
-
49
Communication-Based Book Recommendation in Computational Social Systems
Published 2021-01-01“…Therefore, this paper proposes a new method that uses a computational social system, including a trust model based on community relationships, to improve the user similarity calculation accuracy to enhance personalized recommendation. …”
Get full text
Article -
50
Computational problems of analysis of short next generation sequencing reads
Published 2017-02-01Get full text
Article -
51
-
52
-
53
-
54
Evolutionary Algorithms and Quantum Computing: Recent Advances, Opportunities, and Challenges
Published 2025-01-01Get full text
Article -
55
A Survey of Game-Theoretic Approach for Resource Management in Cloud Computing
Published 2022-01-01“…It allows businesses and individuals to subcontract their computing needs as well as trust a network provider with its data warehousing and processing. …”
Get full text
Article -
56
-
57
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Published 2014-01-01“…Cloud computing has provided services for users as a software paradigm. …”
Get full text
Article -
58
Evaluating consumers benefits in electronic-commerce using fuzzy TOPSIS
Published 2025-03-01Get full text
Article -
59
Synthetic Computed Tomography generation using deep-learning for female pelvic radiotherapy planning
Published 2025-01-01Get full text
Article -
60
TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices
Published 2025-01-01“…Remote attestation (RA) is a process for checking whether a device’s underlying Trusted Computing Base (TCB) and sensing data from the TCB are trustworthy. …”
Get full text
Article