Literatura académica sobre el tema "Trust models requirements"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Trust models requirements".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Trust models requirements"

1

Lee, Hyo-Cheol y Seok-Won Lee. "Provenance-Based Trust-Aware Requirements Engineering Framework for Self-Adaptive Systems". Sensors 23, n.º 10 (10 de mayo de 2023): 4622. http://dx.doi.org/10.3390/s23104622.

Texto completo
Resumen
With the development of artificial intelligence technology, systems that can actively adapt to their surroundings and cooperate with other systems have become increasingly important. One of the most important factors to consider during the process of cooperation among systems is trust. Trust is a social concept that assumes that cooperation with an object will produce positive results in the direction we intend. Our objectives are to propose a method for defining trust during the requirements engineering phase in the process of developing self-adaptive systems and to define the trust evidence models required to evaluate the defined trust at runtime. To achieve this objective, we propose in this study a provenance-based trust-aware requirement engineering framework for self-adaptive systems. The framework helps system engineers derive the user’s requirements as a trust-aware goal model through analysis of the trust concept in the requirements engineering process. We also propose a provenance-based trust evidence model to evaluate trust and provide a method for defining this model for the target domain. Through the proposed framework, a system engineer can treat trust as a factor emerging from the requirements engineering phase for the self-adaptive system and understand the factors affecting trust using the standardized format.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Tikhvinskiy, Valery O., Grigory Bochechka y Andrey Gryazev. "QoS Requirements as Factor of Trust to 5G Network". Journal of Telecommunications and Information Technology, n.º 1 (30 de marzo de 2016): 3–8. http://dx.doi.org/10.26636/jtit.2016.1.697.

Texto completo
Resumen
Trust to modern telecommunications networks plays an important role as a driver of technological and market success of any technology or telecommunication services. Most of the technological approaches to this problem are focused only on network security and do not include such a factor as the quality of service (QoS), which also plays an important role in the formation of trust both from the consumers and the regulator. The future 5G mobile technology will be the engine of development of telecommunications until 2020 and the formation of trust to the 5G networks is one of the main tasks for developers. The authors present the view on the trust to 5G networks in the plane of QoS requirements formation and QoS management. QoS requirements to 5 G networks were determined on the basis of three main business models of services: xMBB, M-MTC and U-MTC and the need to ensure user trust to networks. Infrastructure requirements for QoS control and spectrum management network entities which are based on Network Function Virtualization (NFV) principles have been formed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Hussein, Aya, Sondoss Elsawah y Hussein Abbass. "A System Dynamics Model for Human Trust in Automation under Speed and Accuracy Requirements". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, n.º 1 (noviembre de 2019): 822–26. http://dx.doi.org/10.1177/1071181319631167.

Texto completo
Resumen
Research shows that human trust in automation is a key predictor of human reliance on the automation. Several models have been proposed to capture the interplay between trust and reliance and their combined impacts on task performance. Whereas some models assume that trust is affected by automation reliability, others assume that trust is affected by automation speed. In fact, both speed and reliability can be crucial for mission performance, therefore, these models do not represent the interrelationships among automation speed, automation reliability, human decision making, and subsequent effects on mission performance. To address this gap, we propose a system dynamics model which incorporates both the speed and reliability of automation and their combined effects on trust. Our model explicitly represents the speed-accuracy compromise adopted by the subjects to weigh the perceived relative importance of these aspects while evaluating the reliance decision. The model is calibrated and evaluated using data collected from a human experiment in which 33 subjects interacted with an automated aid for swarm supervision in a foraging mission. The simulation results show that the model can closely replicate and predict the experimental data in terms of the reliance rate and the number of targets collected. Model limitations and further efforts for model extension are discussed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Wang, Jingpei y Jie Liu. "The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios". Journal of Electrical and Computer Engineering 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/4361719.

Texto completo
Resumen
Varied P2P trust models have been proposed recently; it is necessary to develop an effective method to evaluate these trust models to resolve the commonalities (guiding the newly generated trust models in theory) and individuality (assisting a decision maker in choosing an optimal trust model to implement in specific context) issues. A new method for analyzing and comparing P2P trust models based on hierarchical parameters quantization in the file downloading scenarios is proposed in this paper. Several parameters are extracted from the functional attributes and quality feature of trust relationship, as well as requirements from the specific network context and the evaluators. Several distributed P2P trust models are analyzed quantitatively with extracted parameters modeled into a hierarchical model. The fuzzy inferring method is applied to the hierarchical modeling of parameters to fuse the evaluated values of the candidate trust models, and then the relative optimal one is selected based on the sorted overall quantitative values. Finally, analyses and simulation are performed. The results show that the proposed method is reasonable and effective compared with the previous algorithms.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Ayed, Samiha, Lamia Chaari y Amina Fares. "A Survey on Trust Management for WBAN: Investigations and Future Directions". Sensors 20, n.º 21 (23 de octubre de 2020): 6041. http://dx.doi.org/10.3390/s20216041.

Texto completo
Resumen
The rapid uptake of the Wireless Body Area Networks (WBAN) and their services poses unprecedented security requirements. WBAN are evolving to support these requirements. Fulfilling these tasks is challenging as their mobile context is increasingly complex, heterogeneous, and evolving. One potential solution to meet the WBAN security requirements is trust management that helps to reach a more secure and adaptable WBAN environment. Accordingly, this article aims to serve as a brief survey of trust management approaches within intra-WBAN and inter-WBAN. For that, we first summarize trust management concepts, discuss WBAN challenges and classify the attacks on WBAN trust management models. Subsequently, we detail and compare the existing trust based approaches in a WBAN context. We pinpoint their limitations and provide a new classification of these different approaches. We also propose a set of best practices that may help the reader to build a robust and an efficient trust management framework. We complete this survey by highlighting the open future directions and perspectives for research.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Sun, Po-Ling y Cheng-Yuan Ku. "Review of threats on trust and reputation models". Industrial Management & Data Systems 114, n.º 3 (8 de abril de 2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.

Texto completo
Resumen
Purpose – As the number of available services increases on the web, it becomes greatly vital in service-oriented computing to discover a trustworthy service for a service composition so as to best-fit business requirements. However, some dishonest service providers may advertise more than what they can offer and cause a great loss to users. In the last few years, trust and reputation management over web service selection mechanism becomes an emerging way of dealing with security deficiencies which are inherent in web services environment. The purpose of this paper is to review the security threats carefully and expect that the results serve as a reference guide for designing the robust trust and reputation management mechanisms. Design/methodology/approach – Based on the published literature, the paper reviews and categorizes the most critical and important security threats that apply to trust and reputation models. Findings – A detailed review and a dedicated taxonomy table are derived. As emphasized earlier, they could serve as the most important guideline for design of trust and reputation mechanisms. Originality/value – The papers work contributes to: first, understand in details what kind of security threats may cause damage to trust and reputation management mechanisms for web services selection; and second, categorize these complex security threats and then assist in planning the defense mechanisms.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Soni, Sonam. "Reliable Trust Computation model in Vehicular ad-hoc Network". American Journal of Advanced Computing 1, n.º 3 (1 de julio de 2020): 1–5. http://dx.doi.org/10.15864/ajac.1304.

Texto completo
Resumen
This paper concerns about the various implemented work has been studied and analyzed to form a new survey on trust model to VANET. In this paper it is observed that there are lot of new techniques are possible to form a new trust model in VANET to provide better security with trust concern over the entire environment of trust management in VANET. This work concerns of entire trust calculation work which has been done yet over it. Here summarizing the various trust models, various security requirements, issues over it.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Asiri, Ahmad Yahya y Sultan S. Alshamrani. "Performance Evaluation of a B2C Model Based on Trust Requirements and Factors". Scientific Programming 2021 (26 de mayo de 2021): 1–10. http://dx.doi.org/10.1155/2021/9935849.

Texto completo
Resumen
This paper evaluates the performance of a newly proposed B2C e-commerce model based on trust factors and requirements in the context of Saudi Arabia. Two categories of trust factors, namely, governmental and nongovernmental types, are identified to create the model for determining the feasibility of an efficient online business strategy in the Kingdom. Data are collected over a duration of 10 weeks based on the designed questionnaire, carefully analyzed, and interpreted. The standpoint of the end user is analyzed to determine the influence of the proposed trust requirements and factors on B2C e-commerce in Saudi Arabia. The reliability of the questionnaires for each requirement with their factors is quantitatively analyzed using Cronbach’s alpha. The questionnaire consists of three parts, namely, demographic component, questions related to the identified requirements, and additional notes as an open question. Questions are designed as per the requirements and the factors of trust models to demonstrate their possible relationship. Furthermore, the questionnaires’ content validity is judged by expert lecturers with relevant specialization before distributing them, which are well organized together with easy understandability. They are randomly distributed among 222 academic and administrative staff (female and male) in addition to university students from the Faculty of Computer Science and Information System in Saudi Arabia. This random selection performed on total 222 responders ensures the statistical accuracy of the sampling. Adaptable government approaches, enactment, rules, insurance of buyer rights, and banking network situation with less web expenses are demonstrated to be significant to e-commerce expansion in the Kingdom. Implementation of the proposed model is believed to augment consumer self-confidence and reliance together with e-commerce growth in Saudi Arabia.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Kulaklıoğlu, Duru. "Explainable AI: Enhancing Interpretability of Machine Learning Models". Human Computer Interaction 8, n.º 1 (6 de diciembre de 2024): 91. https://doi.org/10.62802/z3pde490.

Texto completo
Resumen
Explainable Artificial Intelligence (XAI) is emerging as a critical field to address the “black box” nature of many machine learning (ML) models. While these models achieve high predictive accuracy, their opacity undermines trust, adoption, and ethical compliance in critical domains such as healthcare, finance, and autonomous systems. This research explores methodologies and frameworks to enhance the interpretability of ML models, focusing on techniques like feature attribution, surrogate models, and counterfactual explanations. By balancing model complexity and transparency, this study highlights strategies to bridge the gap between performance and explainability. The integration of XAI into ML workflows not only fosters trust but also aligns with regulatory requirements, enabling actionable insights for stakeholders. The findings reveal a roadmap to design inherently interpretable models and tools for post-hoc analysis, offering a sustainable approach to democratize AI.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Kapse, Smita, Latesh Malik y Sanjay Kumar. "NTHCMB: DESIGN OF AN EFFICIENT NOVEL TRUST-BASED HYBRID CONSENSUS MODEL FOR SECURING BLOCKCHAIN DEPLOYMENTS". ASEAN Engineering Journal 14, n.º 2 (31 de mayo de 2024): 83–90. http://dx.doi.org/10.11113/aej.v14.20763.

Texto completo
Resumen
Blockchain deployments require efficient consensus models in order to be scaled for larger networks. Existing consensus models either use stake-levels, trust-levels, authority-levels, etc. or their combinations in order to reduce mining delay while maintaining higher security levels. But these models either have higher energy requirements, lower security, or have linear/exponential relationship between mining delay and length of the chains. Due to these restrictions, the applicability of these models is affected when deployed under real-time network scenarios. To overcome these issues, this text proposes design of an efficient novel trust-based hybrid consensus model for securing blockchain deployments. The proposed model initially uses a hybrid consensus model that fuses Proof-of-Work (PoW), Proof-of-Stake (PoS) with Proof-of-Temporal-Trust (PoTT) for improving security while maintaining higher Quality of Service (QoS) levels. The PoTT Model fuses together temporal mining delay, temporal mining energy, throughput and block mining efficiency in order to generate miner-level trusts. These trust values are fused with Work efficiency and Stake levels and used for selection of miners. The selected miners are used for serving block addition requests, which assists in improving mining speed by 3.2%, reducing energy consumption 4.5%, and improving throughput by 8.5%, while improving block mining efficiency by 2.9% when compared with existing mining optimization models. This performance was validated under Sybil, Finney, Man-in-the-Middle, and Spoofing attacks. Performance of the model was observed to be consistent even under attacks, thereby making it useful for real-time network scenarios.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Tesis sobre el tema "Trust models requirements"

1

Abidi, Rihab. "Smart Rοad Signs based trust management mοdels fοr cοοperative Ιntellgent Τranspοrtatiοn Systems". Electronic Thesis or Diss., Normandie, 2024. http://www.theses.fr/2024NORMR111.

Texto completo
Resumen
L'augmentation de la complexité des systèmes de circulation urbaine a rendu la congestion un défi majeur, entraînant des impacts économiques, environnementaux et sociaux considérables. Les Systèmes de Transport Intelligents (STIs) sont apparus comme une solution prometteuse pour atténuer ces défis en permettant une gestion dynamique du trafic. Cependant, la fiabilité des données au sein des STIs représente un enjeu de plus en plus important. L'introduction de données erronées par des capteurs défectueux ou malveillants peut entraîner des dysfonctionnements ou des perturbations intentionnelles du système. Dans ce contexte, les modèles de gestion de la confiance revêtent une importance cruciale.La plupart des modèles de confiance existants proposent des approches centrées sur les véhicules. Cependant, la forte mobilité et la nature dynamique des environnements des STIs affectent la stabilité et la scalabilité de ces systèmes. En conséquence, la proposition de nouveaux modèles de confiance conçus spécifiquement pour les STIs, afin d'améliorer la précision, la sécurité, la scalabilité et la stabilité de la diffusion des informations sur le trafic, constitue l'objectif global de cette thèse.Tout d'abord, nous avons proposé une architecture générique pour un cadre de modèle de gestion de la confiance, exploitant les Smart Road Signs (SRSs). La conception de cette architecture repose sur une étude approfondie de l'état de l'art. Cette architecture a ensuite été développée pour proposer deux nouveaux modèles de confiance. Le premier modèle, considère les informations contextuelles et l'agrégation. De plus, ce modèle prend en compte les informations contextuelles et l'agrégation des données provenant de multi-sources pour évaluer la fiabilité des événements de trafic signalés aux SRSs et des différents nœuds du réseau. De plus, le modèle applique une évaluation de confiance à deux niveaux en combinant l'inférence Bayésienne et une approche de somme pondérée dynamique. En outre, une inférence bayésienne basée sur la prédiction a été proposée pour améliorer la précision de l'évaluation de la confiance.Par la suite, un modèle de confiance en communication a été proposé, pour compléter la contribution précédente, en utilisant des métriques de Quality of Service (QoS) pour évaluer le comportement des SRSs. Ce modèle introduit un modèle de confiance auto-organisé pour suivre les comportements des SRSs et établir des environnements stables en utilisant Dempster Shafer Theory (DST) basée sur la logique floue. En effet, nous considérons un scénario plus réaliste où tous les nœuds sont vulnérables aux attaques et aux pannes. Ainsi, l'objectif principal de ce modèle est de garantir que le système reste opérationnel même dans des environnements hostiles, en atténuant la vulnérabilité des architectures de réseau centralisées, qui est le point de défaillance unique.Les modèles proposés ont été validés par des simulations, démontrant leur efficacité dans l'identification des nœuds malveillants et la réduction des rapports de trafic erronés. Les résultats montrent que la prise en compte de l'agrégation de données provenant de multi-sources et des informations contextuelles augmente la précision de l'évaluation de la confiance. De plus, l'adoption d'un modèle basé sur l'infrastructure, exploitant une architecture décentralisée et hiérarchique, améliore l'évolutivité et la stabilité des modèles de confiance, ce qui est adapté à un tel environnement
The increasing complexity of urban traffic systems has made congestion a significant challenge, leading to severe economic, environmental, and social impacts. Intelligent Transportation Systems (ITSs) have emerged as a promising solution to mitigate these challenges by enabling dynamic traffic management. However, the reliability of data within ITSs represents an increasingly significant challenge. The introduction of erroneous data by defective or malicious sensors can lead to malfunctions or intentional disruptions of the system. In this context, trust management models assume a crucial importance.Most of the existing trust models propose vehicle-centric approaches. However, the high mobility and dynamic nature of the ITS environments affects the stability and scalabity of such systems. Accordingly, proposing novel trust models designed specifically for ITSs to enhance the accuracy, security, scalability and stabilty of traffic information dissemination constitutes the overall goal of this thesis.First, we proposed a generic architecture for a trust framework, leveraging Smart Road Signs (SRSs). The conception of this architecture was built upon the output of a deep investigation of the state of the art. This framework has been, then, developed to propose two novel trust models. The first model, considers the contextual information and multi-source data aggregation to assess the trustworthiness of reported traffic events and the different nodes of the network. Additionally, the model applies a bi-level trust evaluation combining Bayesian Inference and a dynamic weighted sum approach. Furthermore, a predictive-based Baysian Inference was proposed to enhance the accuracy of trust evaluation. Thereafter, a communication trust model was proposed, to complement the previous contribution, using Quality of Service (QoS) metrics to evaluate the SRSs behaviour. This model introduces a self-organizing trust model to track the SRSs' behaviours and establishes stable environments using a fuzzy-based Dempster Shafer Theory (DST). In fact, we consider a more realistic scenario where all the nodes are vulnerable to attacks and failure. Thus, the main objective of this model is to ensure that the system remains operational even in hostile environments, by mitigating the inherent single point of failure vulnerability characteristic of centralized network architectures.\\The proposed models were validated through simulations, showing their effectiveness in identifying malicious nodes and mitigating erroneous traffic reports. The results demonstrate that considering multi-source data aggregation and context-aware information increases the accuracy of trust evaluation. Furthermore, the adoption of an infrastructure-based framework leveraging a decentralized and hierarchical architecture enhances the scalability and stability of the trust models, which is suitable for such environment
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Blatt, Nicole I. "Trust and influence in the information age operational requirements for network centric warfare". Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1313.

Texto completo
Resumen
Approved for public release; distribution in unlimited.
Military leaders and scholars alike debate the existence of a revolution in military affairs (RMA) based on information technology. This thesis will show that the Information RMA not only exists, but will also reshape how we plan, operate, educate, organize, train, and equip forces for the 21st century. This thesis introduces the Communication Technology (CommTech) Model to explain how communication technologies affect organizations, leadership styles, and decision-making processes. Due to the growth in networking enterprises, leaders will have to relinquish their tight, centralized control over subordinates. Instead, they will have to perfect their use of softer power skills such as influence and trust as they embrace decentralized decision-making. Network Centric Warfare, Self-Synchronization, and Network Enabled Operations are concepts that provide the framework for integrating information technology into the battlespace. The debate that drives centralized versus decentralized control in network operations is analyzed with respect to the CommTech Model. A new term called Operational Trust is introduced and developed, identifying ways to make it easier to build trust among network entities. Finally, the thesis focuses on what leaders need to do to shape network culture for effective operations.
Major, United States Air Force
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Trust models requirements"

1

Watt, Gary. Equity & Trusts Law Directions. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198804703.001.0001.

Texto completo
Resumen
Without assuming prior legal knowledge, books in the Directions series introduce and guide readers through key points of law and legal debate. Questions, diagrams, and exercises help readers to engage fully with each subject and check their understanding as they progress. This book explains the key topics covered on equity and trusts courses. The content of the text is designed to emphasise the relationship between equity, trusts, property, contract, and restitution to enable students to map out conceptual connections between related legal ideas. There is also a focus on modern cases in the commercial sphere to reflect the constantly changing and socially significant role of trusts and equity. The book starts by introducing equity and trusts. It then includes a chapter on understanding trusts, and moves on to consider capacity and formality requirements, certainty requirements, and the constitution of trusts. Various types of trusts are then examined such as purpose, charitable, and variation trusts. The book then describes issues related to trusteeship. Breach of trust is explained, as is informal trusts of land. There is a chapter on tracing, and then the book concludes by looking at equitable liability of strangers to trust and equitable doctrines and remedies. This new edition includes coverage of significant recent cases, including Patel v Mirza [2016], Supreme Court on the right to recover wealth transferred between parties to an illegal scheme; Burnden Holdings (UK) Ltd v Fielding [2018] UKSC 14; [2018] 2 WLR 885, Supreme Court on limitation of actions; Barnett v Creggy [2016], Court of Appeal on breach of trust and limitation of actions; Singha v Heer [2016], Court of Appeal on facts giving rise to declaration of trust; Clydesdale Bank plc v John Workman [2016], Court of Appeal on dishonest assistance in a breach of trust; Bathurst v Bathurst [2016], on variation of trusts; Newman v Clarke [2016], on fiduciary conflict of interest; RBC Trustees (CI) Ltd v Stubbs [2017], on rectification of a trust deed on the ground of mistake; Erlam v Rahman [2016] EWHC 111 and JSC Mezhdunarodniy Promyshlenniy Bank v Pugachev [2017] EWHC 2426, on ‘sham” trusts’. It also provides coverage of the 2017 Money Laundering, Terrorist Financing and Transfer of Funds Regulations (SI 2017/692 as well as the EU Fourth Money Laundering Directive ((EU) 2015/849), as amended by the The EU Fifth Money Laundering Directive ((EU) 2018/843)
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Watt, Gary. Equity & Trusts Law Directions. 7a ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198869382.001.0001.

Texto completo
Resumen
Without assuming prior legal knowledge, books in the Directions series introduce and guide readers through key points of law and legal debate. Questions, diagrams and exercises help readers to engage fully with each subject and check their understanding as they progress. This book explains the key topics covered on equity and trusts courses. The content of the text is designed to emphasise the relationship between equity, trusts, property, contract and restitution to enable students to map out conceptual connections between related legal ideas. There is also a focus on modern cases in the commercial sphere to reflect the constantly changing and socially significant role of trusts and equity. The book starts by introducing equity and trusts. It then includes a chapter on understanding trusts, and moves on to consider capacity and formality requirements, certainty requirements and the constitution of trusts. Various types of trusts are then examined such as purpose, charitable, and variation trusts. The book then describes issues related to trusteeship. Breach of trust is explained, as is informal trusts of land. There is a chapter on tracing, and then the book concludes by looking at equitable liability of strangers to trust and equitable doctrines and remedies. This new edition includes coverage of significant recent cases, including the Supreme Court decision on interest to be paid by tax authorities on monies owed; the Supreme Court decision on the test of dishonesty applicable to civil matters; the Privy Council decision on the division of investment property acquired by cohabitants; the Court of Appeal decisions on Quistclose trusts; fiduciary duties in arms-length contracts; transactions prejudicing creditors; beneficiary anonymity in variation of trust cases; exemption clauses; discretion exercised beyond trustee’s authority; implications of GDPR for trustee disclosures; trustee personal liability; causation and equitable compensation; statutory relief for a professional trustee’s breach of trust; use of proprietary estoppel to reward work undertaken in farming families; costs of seeking court’s directions; injunctions ordered against persons unknown; equitable jurisdiction to rectify agreements.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Hannah, Leslie. Trust and Regulation in Corporate Capital Markets before 1914. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198782797.003.0007.

Texto completo
Resumen
Historians have struggled to explain how stock markets could develop—with notable vigour in many countries before 1914—before modern shareholder protections were legally mandated. Trust networks among local elites—and/or information signalling to public investors—substituted for legal regulation, but this chapter suggests real limits to such processes. They are especially implausible when applied to giant companies with ownership substantially divorced from control, of which there were many with—nationally and internationally—dispersed shareholdings. In London—the largest pre-1914 securities market—strong supplementary supports for market development were provided by mandatory requirements for transparency and anti-director rights in UK statutory companies and by low new issue fees. There were also stringent London Stock Exchange requirements for other companies wanting the liquidity benefits of official listing. Shareholder rights were similarly achieved in Brazil and other countries and colonies dependent on British capital.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Wheelahan, Leesa. Rethinking Skills Development. Editado por John Buchanan, David Finegold, Ken Mayhew y Chris Warhurst. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199655366.013.30.

Texto completo
Resumen
This article critiques models of competency-based training in vocational education and training in Anglophone countries and contrasts it to ‘kompetenz’ in Germanic countries. It identifies six key problems with Competency-Based Training (CBT): first, CBT is tied to specific ensembles of workplace roles and requirements; second, the outcomes of learning are tied to descriptions of work as it currently exists; third, CBT does not provide adequate access to underpinning knowledge; fourth, CBT is based on the simplistic and behaviourist notion that processes of learning are identical with the skills that are to be learnt; fifth, the credibility of a qualification is based on trust, not what it says a person can do; and sixth, CBT is based on a notion of the human actor as the supervised worker. The article argues generic skills are not the alternative, and it uses a ‘modified’ version of the capabilities approach as the conceptual basis for qualifications.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Delaney, Hollie. Meeting: Journal I. AuthorHouse, 2011.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Trust models requirements"

1

Gol Mohammadi, Nazila y Maritta Heisel. "Enhancing Business Process Models with Trustworthiness Requirements". En Trust Management X, 33–51. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41354-9_3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Theis, Sabine, Sophie Jentzsch, Fotini Deligiannaki, Charles Berro, Arne Peter Raulf y Carmen Bruder. "Requirements for Explainability and Acceptance of Artificial Intelligence in Collaborative Work". En Artificial Intelligence in HCI, 355–80. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35891-3_22.

Texto completo
Resumen
AbstractThe increasing prevalence of Artificial Intelligence (AI) in safety-critical contexts such as air-traffic control leads to systems that are practical and efficient, and to some extent explainable to humans to be trusted and accepted. The present structured literature analysis examines $$n = 236$$ articles on the requirements for the explainability and acceptance of AI. Results include a comprehensive review of $$n = 48$$ articles on information people need to perceive an AI as explainable, the information needed to accept an AI, and representation and interaction methods promoting trust in an AI. Results indicate that the two main groups of users are developers who require information about the internal operations of the model and end users who require information about AI results or behavior. Users’ information needs vary in specificity, complexity, and urgency and must consider context, domain knowledge, and the user’s cognitive resources. The acceptance of AI systems depends on information about the system’s functions and performance, privacy and ethical considerations, as well as goal-supporting information tailored to individual preferences and information to establish trust in the system. Information about the system’s limitations and potential failures can increase acceptance and trust. Trusted interaction methods are human-like, including natural language, speech, text, and visual representations such as graphs, charts, and animations. Our results have significant implications for future human-centric AI systems being developed. Thus, they are suitable as input for further application-specific investigations of user needs.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Soldatos, John, Babis Ipektsidis, Nikos Kefalakis y Angela-Maria Despotopoulou. "Reference Architecture for AI-Based Industry 5.0 Applications". En Artificial Intelligence in Manufacturing, 3–26. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-46452-2_1.

Texto completo
Resumen
AbstractIndustry 5.0 (I5.0) is a novel paradigm for the development and deployment of industrial applications based on Cyber-Physical Systems (CPS). It evolves Industry 4.0 in directions that exploit trustworthy human–AI interactions in human-in-the-loop scenarios. Despite the rising popularity of I5.0, there is still a lack of reference architectures (RAs) that outline the building blocks of I5.0 applications, along with the structuring principles for effectively integrating them in industrial systems. This chapter introduces a reference model for industrial applications that addresses critical elements and requirements of the I5.0, including human–robot collaboration, cybersecurity, safety, and trust. The model enhances state-of-the-art I4.0 Industrial Internet of Things (IIoT) architectures with human-centered I5.0 features and functionalities. Based on this model, the present chapter introduces a set of blueprints that could ease the development, deployment, and operation of I5.0 applications. These blueprints address technical integration, trustworthy operations, as well as the ever-important compliance to applicable regulations such as General Data Protection Regulation (GDPR) and the emerging AI Act.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Mancuso, Antonio, Antonio Saporito y Davide Tumino. "Topology Optimization Design of Internal Reinforcements in a Sailing Dinghy". En Lecture Notes in Mechanical Engineering, 73–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70566-4_13.

Texto completo
Resumen
AbstractIn this paper, a novel approach has been followed based on FEM simulation and Topology Optimization tools to locate and model the reinforcements inside the hull of a sailing dinghy. This process assumes that the inner volume included between the hull and the deck is, at the beginning of the simulation, filled with material; then a portion of this inner volume is eroded until a final free form shape of the reinforcements is obtained. A key point of this procedure is the definition of the optimization constrains because the final shape of the reinforcements must fulfill several requirements such as weight, stiffness and stress. At the end of the optimization procedure, the final shape of internal reinforcements consists of a truss-like web frame with a final weight equal to the 18% of the initial full body.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Adula, Metasebia, Shashi Kant y Mando Genale. "Green Financing Effect on Sustenance Finance Models With Mediation of Corporate Social Responsibility in Ethiopia". En Advances in Systems Analysis, Software Engineering, and High Performance Computing, 159–74. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3884-1.ch009.

Texto completo
Resumen
This chapter examines the Green financing effect on Sustenance finance models with mediation of corporate social responsibility in Ethiopia. CSR principles guide financial institutions in prioritizing investments aligned with sustainable development goals, engaging stakeholders in decision-making processes, and integrating environmental and social factors into risk assessment. Sustainable business practices are adopted, enhancing reputation and attracting stakeholders valuing social responsibility. Regulatory compliance is ensured, aligning finance models with legal requirements and societal expectations. Future directions involve strengthening transparency, fostering collaboration and innovation, building capacity and awareness, incentivizing sustainability, developing impact measurement methodologies, and aligning with the SDGs. Ethiopian finance models may satisfy social requirements, promote sustainable development, and build trust by incorporating CSR practices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Roberta, Oppedisano. "Anti-Money Laundering and Corporate Compliance". En Business Ethics - The Competitive Advantage of Trust and Reputation [Working Title]. IntechOpen, 2024. http://dx.doi.org/10.5772/intechopen.114226.

Texto completo
Resumen
In the past two decades, companies have invested significant resources in implementing corporate compliance programs to ensure adherence to legal, regulatory, and internal requirements. Compliance involves formal rules and self-organizing methods to reduce business risks, influenced by various laws globally. In Italy, legislations like D.lgs. 231/2001, 231/2007, D.lgs. 101/2016 (GDPR), and Law No. 190/2012 have shaped organizational models. Companies adopt internal management systems, and compliance models aid in identifying, measuring, and managing key risks. However, the complexity of regulations has led to disorganized business models and a gap between adopted structures and actual compliance. The concept of a ‘Compliance Organizational Model’ is proposed, aiming for a unified approach that combines economic, legal, and regulatory forces. The rise of compliance models was driven by regulatory pressures, but their fall is attributed to over-regulation, unclear reasons for unethical behavior, and an ineffective legislative response. The metaphor of Mandeville’s ‘Fable of the Bees’ illustrates societal decay, questioning the compatibility of wealth and virtue. Learning from past mistakes is crucial for continuous improvement. While compliance models initially received positive responses, their success now faces challenges. Companies recognize the value in corporate governance improvement, but repeated criminal acts and temporary legislative solutions have led to a decline in their effectiveness. The responsibility of compliance models is to ensure proper behavior, but the need for a more comprehensive and standardized approach persists.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Ruotsalainen, Pekka y Bernd Blobel. "Privacy and Trust in pHealth – Past, Present and Future". En Studies in Health Technology and Informatics. IOS Press, 2022. http://dx.doi.org/10.3233/shti220968.

Texto completo
Resumen
From beginning to today, pHealth has been a data driven service that collects and uses personal health information (PHI) for personal health services and personalized healthcare. As a result, pHealth services use intensively ICT technology, sensors, computers and mathematical algorithms. In past, pHealth applications were focused to certain health or sickness related problem, but in today they use mobile devices, wireless networks, Web-technology and Cloud platforms. In future, pHealth uses information systems that are highly distributed, dynamic, increasingly autonomous, multi-stakeholder data driven eco-system having ability to monitor anywhere person’s regular life, movements and health related behaviours. Because privacy and trust are pre-requirements for successful pHealth, this development raises huge privacy and trust challenges to be solved. Researchers have shown that current privacy approaches and solutions used in pHealth do not offer acceptable level of privacy, and trust is only an illusion. This indicates, that today’s privacy models and technology shall not be moved to the future pHealth. The authors have analysed interesting new privacy and trust ideas published in journals, and found that they seem to be effective but offer only a partial solution. To solve this weakness, the authors used a holistic system view to aspects impacting privacy and trust in pHealth, and created a template that can be used in planning and development future pHealth services. The authors also propose a tentative solution for future trustworthy pHealth. It combines privacy as personal property and trust as legal binding fiducial duty approaches, and uses a Blockchain-based smart contract solution to store person’s privacy and trust requirements and service providers’ promises.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Patil, Dimple, Nitin Liladhar Rane y Jayesh Rane. "Challenges in implementing ChatGPT and generative artificial intelligence in various business sectors". En The Future Impact of ChatGPT on Several Business Sectors. Deep Science Publishing, 2024. http://dx.doi.org/10.70593/978-81-981367-8-7_3.

Texto completo
Resumen
From customer service to content development, ChatGPT and generative AI can alter corporate processes across industries. Implementing these technologies presents substantial hurdles that firms must overcome to maximize their potential. Generative AI systems need a lot of data to work, which raises privacy and security concerns and makes GDPR compliance difficult. Model biases can perpetuate prejudice or produce inconsistent consumer experiences, affecting brand reputation and trust. These technologies' scalability and adaptation across industries is another issue. Some sectors demand very precise contextual information, yet generative AI models are generally trained on broad, generic datasets, which may limit their efficacy. The significant computational costs and infrastructural requirements of installing these models strain resources, especially for smaller organizations. Companies typically lack the in-house skills to maintain and fine-tune complex AI systems. This chapter analyses these challenges and provides actionable insights to assist firms strategically negotiate the intricacies of using generative AI for sustainable and scalable impact.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Yan, Gongjun, Danda B. Rawat, Bhed Bahadur Bista y Lei Chen. "Location Security in Vehicular Wireless Networks". En Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, 108–33. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4691-9.ch006.

Texto completo
Resumen
In Vehicular Ad-Hoc Networks (VANETs), applications are based on one fundamental piece of information: location. Therefore, attackers will exploit location information to launch attacks. The authors present an in-depth survey of location security methods that have been recently proposed in literature. They present the algorithms or protocols of different methods and compare them with each other in this chapter. The methods are mainly in three aspects: position integrity, position confidentiality, and position availability. The position integrity methods focus on validating a vehicle’s position to ensure the position information is correct. Position confidentiality ensures not only the confidentiality of position information but also the authentication of location that a location related message can only decrypt by the receiver which is “physically” present inside a decryption region that is specified by location, time, and speed. The position availability methods create and maintain a reliable routing path to delivery position information. The selection and maintenance of routing paths in literature can be based on multiple resources, for example wireless signal strength, computation resources, and probability models. The three aspects, position integrity, position confidentiality, and position availability, are the three basic requirements of information security based on the standard 200 of NIST.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Sindiramutty, Siva Raja, Krishna Raj V. Prabagaran, Noor Zaman Jhanjhi, Raja Kumar Murugesan, Nazir Ahmed Malik y Manzoor Hussain. "Ethics and Transparency in Secure Web Model Generation". En Advances in Information Security, Privacy, and Ethics, 411–64. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-5415-5.ch012.

Texto completo
Resumen
The chapter discusses how ethics and transparency relate to creating secure web models for AI. AI plays a role in secure web development, and the authors consider ethics and transparency as two critical aspects of this subject, which influences users, stakeholders, or society. The examination begins with AI principles, which include fairness, accountability, and privacy requirements. They then get into the problems with secure web models. In this chapter, they break down bias and fairness concerns at the source and find ways to resolve them in web models. This relates to trust and accountability, where transparency and explainability are highlighted. They also provide case studies showing the effectiveness of transparent and explainable AI in increasing user engagement. They also delve into decision-making frameworks to help navigate the ethical dilemmas in AI web development. It then represents the conversation on the atmospherics of empowerment tools, such as monitoring and evaluation guidelines for mobilisation implementation practice and governance. To sum up, the authors underline the ethical and transparent views for us to do AI-driven web development. Therefore, they urge all stakeholders to make ethics and transparency the cornerstones of responsible webs.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Trust models requirements"

1

Alqurashi, Saja, Indrakshi Ray, Mahmoud Abdelgawad y Hosein Shirazi. "SR2ACM: A Methodical Approach for Translating Natural Language Security Requirements to Access Control Model". En 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), 303–12. IEEE, 2024. https://doi.org/10.1109/tps-isa62245.2024.00042.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Salgado, André de Lima y Renata Pontin de Mattos Fortes. "Usable privacy: from grounded models to new guidelines and heuristics". En Anais Estendidos do Simpósio Brasileiro de Sistemas Multimídia e Web. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/webmedia_estendido.2023.233789.

Texto completo
Resumen
The development of usable interfaces for privacy policies is essential to increase users’ trust in technology and comply with legal requirements. This thesis aimed to design interfaces that allow laypeople to protect their online privacy. A comprehensive analysis was conducted, comprising a literature review, a thematic and cluster analysis, and an empirical evaluation. Six usable privacy heuristics (push) were derived, which effectively detect severe problems in privacy policy interfaces for laypeople. Moreover, initial usable privacy guidelines (pug) were formulated, and a novel process for developing usability criteria was proposed. Future research directions were suggested, such as applying these heuristics and guidelines to domains like human-robot interaction and human-artificial intelligence interaction.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Sophie Charlotte Dautzenberg, Pia y Gudrun Mechthild Irmgard Voß. "A theoretical framework for trust in automation considering its relationship to technology acceptance and its influencing factors". En 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002462.

Texto completo
Resumen
Automated cars are about to bring substantial changes in future mobility as the advantages regarding safety, comfort, and mobility independence are manifold. However, despite the many advantages, there are some factors which could affect the breakthrough of this technology. On the one hand, for automated driving to be viable, meeting technical and legal requirements is a fundamental and equally challenging prerequisite. On the other hand, user acceptance is a mandatory premise for technology adoption. But which factors are decisive for whether a technology is accepted or not? We propose that trust in automation (TiA) is a key influencing factor in terms of acceptance as the impact of trust on the acceptance of automated systems seems to be empirically proven. Nevertheless, acceptance models often either do not consider the concept of trust or seem to disagree as to whether trust has a direct and/or indirect influence on acceptance. Furthermore, influencing factors of trust are often neglected in such models. To provide a more holistic perspective on these issues, we conducted a structured literature review and analysis. Scientific papers which consider the relationship between TiA and acceptance as well as factors influencing trust in the context of automated driving were included. Based on the identified literature, we propose a theoretically derived framework on the relationship between TiA and technology acceptance as well as on influencing factors of TiA for the application context of automated driving. The framework is intended to serve as a complement to existing sound acceptance and trust models as well as a starting point for empirical verification of the theoretical assumptions in the course of further research.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Riepnieks, Artis y Harold Kirkham. "Improving Trust in Power System Measurements". En 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003577.

Texto completo
Resumen
The power grid is a large and complex system. The system becomes larger and more complex daily. Distributed energy resources and a more active customer role are factors adding to the complexity. This complicated system is operated by a combination of human operators and automation. Effective control of the power grid requires an increasing amount of automation to support system operators. The need for more support from automation can only increase as operational complexity increases.Actions in controlling the system are entirely dependent on the results of measurements. Measurements inform decisions at all scales. How much trust can be placed in the measurements is essentially an unknown factor. North American Electric Reliability Corporation has generated reports showing that procedures and models have not always worked as expected. Part of the problem lies in the fact that system events can distort signal waveforms. Another part of the problem is that events taking place outside the control area of an operator can affect measured results. The companies involved, and their regulators, have had to change their requirements and guidelines.High “accuracy” measurements are available for most quantities of interest, but the problems are related to trustworthiness, rather than “accuracy.” Accuracy is established for a device within a controlled environment, where a “true value” can be estimated. Real-world conditions can be vastly different. The instrument may provide accurate output according to its specifications, but the measurement might not represent reality because what is happening in the real world is outside the bounds of these specifications. That is a problem that demands a solution. The crux of the matter is this: a real-world measurement’s usefulness as a decision-making aid is related to how believable the measurement is, and not to how accurate the owner’s manual says the instrument is. The concept of “uncertainty” that metrologists have refined over the last few decades is a statistical process that predicts the dispersion of future results. Such a measure is virtually meaningless for real-time power system use. The properties of the power system are not stationary for long periods. A low-quality result can lead to a bad decision, because power system measurements presently lack any kind of real-time “trustworthiness connection.”The signal model generally used in the electric power industry is that the voltages and currents are well-represented by mathematical sinusoids. Given that starting point, we describe two trust metrics that provide verifiable links to the real-time system being measured. The metrics capture any mismatch between the instrument measurement model and the actual signal. Our trust-awareness metrics can lead to ways to develop more robust operating models in the power system environment. Every measurement result is reported with an associated real-time trust (or no-trust) metric, allowing the user (whether human or not) to assess the usefulness of the result. It is, of course, up to the user to determine how a low-quality result should be used in decision-making. Examples of real-time trust metric calculations during real power system events are provided, with evaluation for application in utility user scenarios.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Jungbauer, Christoph y Christian Luidold. "Certificates and the security of digital health information". En 13th International Conference on Human Interaction & Emerging Technologies: Artificial Intelligence & Future Applications. AHFE International, 2025. https://doi.org/10.54941/ahfe1005932.

Texto completo
Resumen
The digitization of healthcare information has expanded access to medical data while raising concerns about its security, authenticity, and trustworthiness. This paper explores the role of digital certificates in addressing these challenges, focusing on their potential to verify the credibility of health information and protect sensitive data. It begins with a theoretical overview, emphasizing the importance of certificates in ensuring data authenticity and integrity, particularly in compliance with regulations such as the GDPR.The analysis examines current certificate models like HONcode and PIF TICK, highlighting their limitations in public awareness and practical application. Innovative technologies such as blockchain and zero-knowledge proofs are identified as promising tools for enhancing the security and traceability of health information. Blockchain’s immutability and decentralized verification capabilities, combined with patient-controlled data access via smart contracts, underscore its potential in fostering trust and compliance with privacy standards.The paper outlines essential certification requirements, including technical efficiency through machine learning, content accuracy based on scientific validation, and process transparency. Furthermore, user-centric approaches are emphasized to enhance certificate accessibility and public trust. The study also examines parallels in other industries, such as food and finance, which employ rigorous certification systems for safety and reliability.Ultimately, this research advocates for a hybrid certification model combining automated and expert-driven processes. By leveraging modern technologies and interdisciplinary practices, such a model can address the dual goals of ensuring high-quality health information and fostering user trust in the digital healthcare landscape.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Martinez Gutierrez, Rodolfo, Jorge Vicente Villa Garcia, Carmen Carey-Raygoza y Artemio Lara Chavez. "SDG 9: Digital Innovation in Foreign Trade through Industry 5.0". En 6th International Conference on Human Systems Engineering and Design Future Trends and Applications (IHSED 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1005557.

Texto completo
Resumen
Technical and technological progress leads to new possibilities for information exchange systems. Particularly, the associated aspects of IT security are continuously evolving. In addition, information is nowadays most of the time stored decentralized and not close to the user working with it. Information is disseminated over different network nodes and geolocations. This leads to the necessity of integrating heterogeneous external and internal systems and applications. As a result of these conditions, new requirements as well as risks to the underlying systems are being identified. Technological progress also opens up new opportunities for attackers and provides additional targets. This is extremely challenging for systems that support data exchange based on a multinational standard such as Coalition Shared Data (CSD).CSD is a concept for the distribution of information in multinational Joint ISR (Intelligence, Surveillance and Reconnaissance) operations. The interfaces, data models and specifications to support this concept are described in the STANAG (STANdardization AGreement) 4559. In order to fulfill the security requirements of a current multinational environment, zero trust architecture is now enforced.In this paper we investigate the compatibility of the zero trust architecture with the current version of STANAG 4559 Edition 4. Here we focus on a specific part of the standard that deals with the storage and dissemination of Joint ISR products. We point out working fields in the areas of authentication, authorization, data integrity and legacy technologies. As the latter is a core problem, our main focus in this paper is the replacement of legacy technology through the communication architecture REST (Representational State Transfer). We highlight the challenges associated with such changes. We explain how the STANAG 4559 Custodian Support Team (CST) deals with these challenges. We also describe how we support these aspects by providing definitions, prototyping and participating in the test events with our implementation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Schaefer, S. y O. Revheim. "Building Trust in AI/ML Solutions: Key Factors for Successful Adoption in Drilling Optimization and Hazard Prevention". En SPE Norway Subsurface Conference. SPE, 2024. http://dx.doi.org/10.2118/218455-ms.

Texto completo
Resumen
The use of AI/ML technologies has provided breakthrough performance in automated predictive data analytics. With the increasing amount of data available during drilling operations, data driven AI/ML solutions lay out the future of current technologies for drilling optimization and hazard prevention. Fast adoption and appeal of these technologies to the industry could be explained by a few reasons: AI/ML enables digital transformation by using only real-time data without extensive requirements for contextual data so that engineering and data input processes can be fully automated;AI/ML solutions predict outputs based on the data trends allowing to solve problems where conventional models are hard to implement or are not sensitive enough to identify subtle anomalies;Targeted solutions address specific problems and become more applicable in the modern digital ecosystem,Due to previous reasons, such technologies are easier to implement and to scale up in the operational environment. Successful adoption of AI/ML technologies lies in its validation and trust in the operational environment. Based on the project experience from various parts of the world, prerequisites for building trust have proven to be: high performance AL/ML technology;matured IT infrastructure with relevant support services to enable digital transformation;monitoring specialists in an established RTOC or rigsite team to validate solution decisions;good communication protocol and established responsibilities of the RTOC and rig team to validate the impact of the predictions and to apply for operations. The success factors are consequently related to technology, infrastructure and "soft" aspects like work processes, team interactions and defined roles and responsibilities. Each of these areas will be addressed individually.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Hyo-Cheol, Lee. "An Approach to Design Trust-Aware Goal Model and Provenance Model for Intelligent Adaptive Systems". En 2019 IEEE 27th International Requirements Engineering Conference (RE). IEEE, 2019. http://dx.doi.org/10.1109/re.2019.00062.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Neacsu, Mihaela gabriela y Adrian Adascalitei. "QUALITY ASSURANCE ELEARNING RESOURCES FOR STUDENTS". En eLSE 2014. Editura Universitatii Nationale de Aparare "Carol I", 2014. http://dx.doi.org/10.12753/2066-026x-14-222.

Texto completo
Resumen
The problem of the e-learning quality systems, the assessment of the e-learning platforms using their specifications, the progressive identification and implementation of the quality standards in e-learning are actual research themes that concern pedagogues, IT specialists and practitioners. It is known the fact that nowadays e-learning is the key instrument to make learning international, and the development e-learning media quality has become a strategic objective for the modern provider for education and training. The present article deals with the problem of ensuring the quality for the e-learning resources and proceses for the students that use the Moodle platform in Romania making use of the ELQ model for quality assessment of e-learning in higher education. The aim of the present paper is to demonstrate the importance of a correct understanding of the process of ensuring the quality within the e-learning media for students, as well as the necessity to generate trust in satisfying the quality requirements for the interactive training in the e-learning system. After reviewing the existing literature, particularly focusing on QA frameworks, models and procedures, one used the base semi structured interview enquiry and content analysis. The paper submits to analysing some experts' opinions on e-learning, pedagogues and practitioners concerning the quality of the training process of students in the e-learning system, but also some students' perceptions concerning their degree of satisfaction of these in rapport with the e-learning services that are offered. Qualitative and quantitative findings have been presented. The findings support the flexibility and relevance of ELQ as an e-learning assessment model. The present paper brings light on some concrete aspects of the quality ensuring process of the e-learning content and services for students that need permanent improvement and that makes all the people involved responsible and creates the premises for the development of an e-learning culture.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Hahn, Mark A., Maj D. Mirmirani y Helen R. Boussalis. "Optimal Design of a Truss Structure for a Segmented Reflector". En ASME 1995 Design Engineering Technical Conferences collocated with the ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/detc1995-0605.

Texto completo
Resumen
Abstract Design requirements for a support truss used in a segmented reflector telescope test-bed are identified. From these requirements a baseline model of the support truss is developed. Multicriteria optimization and Pareto optimality concepts are employed to obtain an optimal truss structure among variations of the baseline model that yields a correct balance between strength and flexibility. Modal analysis shows that the structure exhibits the characteristics of a large space-borne structure.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Trust models requirements"

1

Streb, Jorge M. y Gustavo Torrens. Meaningful Talk. Inter-American Development Bank, febrero de 2015. http://dx.doi.org/10.18235/0011676.

Texto completo
Resumen
This paper develops a semiotic-inferential model of verbal communication for incomplete information games: a language is seen as a set of conventional signs that point to types, and the credibility of a message depends on the strategic context. Formally, there is an encoding-decoding step where the receiver can understand the sender's message if and only if a common language is used, and an inferential step where the receiver may either trust the message's literal meaning or disregard it when updating priors. The epistemic requirement that information be transmitted through the literal meaning of the message uttered leads to an equilibrium concept distinct from a Perfect Bayesian Equilibrium, ruling out informative equilibria where language is not used in its ordinary sense. The paper also proposes a refinement by which the sender selects among equilibria if all sender types are willing to play the same equilibrium.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Orr, Kyla, Ali McKnight, Kathryn Logan y Hannah Ladd-Jones. Scottish Inshore Fisheries Integrated Data System (SIFIDS): work package 7 final report engagement with inshore fisheries to promote and inform. Editado por Mark James. Marine Alliance for Science and Technology for Scotland (MASTS), 2020. http://dx.doi.org/10.15664/10023.23453.

Texto completo
Resumen
[Extract from Executive Summary] This report documents Work Package 7 of the Scottish Inshore Fisheries Integrated Data Systems (SIFIDS) Project, which was designed to facilitate engagement with the key stakeholders including; inshore fishers, their representative bodies, Regional Inshore Fisheries Groups, Marine Scotland including Policy, Compliance and Science. The SIFIDS Project focused on 12 metre and under inshore fisheries vessels, of which around 1,500 are registered in Scotland including those that work part-time or seasonally. The facilitation team was set various targets for engagement based on the requirements of other work packages. The success of the overall project was dependent to a significant extent on securing voluntary engagement and input from working fishers. Previous experience has shown that having a dedicated project facilitation team is an extremely effective model for establishing the necessary trust to encourage industry-participation in projects such as this. The WP7 facilitation team comprised three individuals who have significant marine and fisheries related experience and wide-ranging skills in communications and stakeholder engagement. They worked together flexibly on a part-time basis, ensuring staffing cover over extended hours where required to match fishers’ availability and geographical coverage over Scotland.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

SHAKING TABLE TEST OF NEW LIGHT STEEL STRUCTURE SYSTEM. The Hong Kong Institute of Steel Construction, agosto de 2022. http://dx.doi.org/10.18057/icass2020.p.342.

Texto completo
Resumen
The low-rise cold-formed thin-walled steel buildings have good seismic performance, and their lateral force resistance is generally provided by the pull-out parts, the wall skeleton support system, and the skin effect between the wall skeleton and the wall. However, the current cold-formed thin-walled steel residential system is difficult to meet the seismic requirements of multi-storey cold-formed thin-walled steel buildings in high intensity areas. In this paper, the thin steel brace and light steel skeleton are combined to form a wall skeleton with a new support system with "truss structure" at the top and bottom of the skeleton. A full-scale shaking table test model is designed and made, and its structural dynamic characteristics and dynamic response are studied by shaking table test. The results show that the horizontal steel strap and inclined steel strap are used to form a "flat" structure with steel columns and guide beams, and the triangular element on the "flat" structure is used to restrict the displacement of the local area at the top and bottom of the wall skeleton and improve the stiffness of the area. T1 model performs better than T2 model, and has better seismic application potential for developing multi-storey cold-formed thin-walled steel residential buildings, which can meet the engineering needs.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

A STUDY OF COLLAPSE SUSCEPTIBILITY AND RESISTANCE OF LOADED CABLE-SUPPORTED PIPE STRUCTURE SUBJECT TO A SUDDEN BREAK OF CABLE MEMBER. The Hong Kong Institute of Steel Construction, septiembre de 2021. http://dx.doi.org/10.18057/ijasc.2021.17.3.7.

Texto completo
Resumen
Cable-supported pipe system (CSPS) provides a suitable system of structure for meeting the stringent structural requirements of pipeline bridges. However, due to a composite action of cable with truss and pipe members, the sudden failure of its structural member may lead to undesired vibratory response and collapse. The occurrence of a sudden break of the CSPS structural member is characterized by spontaneous dynamics and internal force rearrangement. The present study aims to investigate parametrically the collapse susceptibility and resistance of scaled down CSPS model in the event of a sudden break of the cable member by combined experimental and numerical procedures. The displacement of the structure, the pattern of internal force rearrangement, and dynamic responses were comparatively evaluated. Experimental results depict imminent cable failure under load and attendant dynamic response, but without a total collapse of the CSPS structure. Critical members causing large dynamic response amplitudes were identified and the mitigation of collapse was evaluated. Dynamic increasing factor (DIF) methods was utilized for the evaluation of the dynamic response of the sudden cable break resulting from the pattern of responses between the cable members and the rest of the CSPS structure. Comparison with provisions in other studies shows higher values DIF of the CSPS cable members which led to proposed evaluation using dynamic factor (DF). Thus, the dynamic factors for the sudden break of various cable members along the span and the errors were also estimated considering the parametric of design variables which will enable easy utilization during the structural process of CSPS.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía