Showing 101 - 120 results of 1,170 for search 'trust optimization', query time: 0.11s Refine Results
  1. 101

    Building Brand Loyalty: The Role of Brand Communication, Brand Identity, and Brand Experience Mediated by Brand Trust by Fatmah Cholid Bawazir, Eric Harianto, Muhammad Azizurrohman

    Published 2024-09-01
    “…Sarung Mangga has the problem of inefficient and effective branding budgeting, so branding objectives have not been achieved optimally. This study aims to determine the effect of brand communication, brand identity, and brand experience on brand loyalty mediated by brand trust in Sarong Mangga. …”
    Get full text
    Article
  2. 102

    Intelligent Trust Evaluation Method for Underwater Sensor Networks Based on Fuzzy Clustering and Dynamic Weight Allocation by Zhaohui WANG, Guangjie HAN, Jiaxin DU, Chuan LIN, Lei WANG

    Published 2025-04-01
    “…However, most existing trust evaluation methods rely on the linear weighting of trust features and the decision-making method based on threshold comparison. …”
    Get full text
    Article
  3. 103

    Influence of short video content on consumers purchase intentions on social media platforms with trust as a mediator by Chengdan Luo, Nurul Ain Mohd Hasan, Abdul Mua’ti Zamri bin Ahmad, Guosheng Lei

    Published 2025-05-01
    “…This research extends the application of the SOR model to the context of social media short videos, highlighting the crucial role of consumer trust in shaping consumer purchase decisions. Based on these findings, we propose actionable strategies for businesses to optimize short video content and build consumer trust, ultimately enhancing marketing effectiveness and driving consumer purchases.…”
    Get full text
    Article
  4. 104
  5. 105

    SGRiT: Non-Negative Matrix Factorization via Subspace Graph Regularization and Riemannian-Based Trust Region Algorithm by Mohsen Nokhodchian, Mohammad Hossein Moattar, Mehrdad Jalali

    Published 2025-03-01
    “…Additionally, this paper presents a solution for addressing the Stiefel manifold problem and utilizes a Riemannian-based trust region algorithm to optimize the loss function. …”
    Get full text
    Article
  6. 106

    A Consensus Reaching Process for Product Design Decision-Making by Integrating Intuitionistic Fuzzy Sets and Trust Network by Yanpu Yang, Kai Zhang, Zijing Lei

    Published 2024-11-01
    “…By establishing a consensus measurement model, DMs contributing less to consensus are identified, and consensus optimization is achieved through the modification of DMs’ preferences or the calibration of their trust relationships. …”
    Get full text
    Article
  7. 107

    SIMULATION OF PERIPHERAL DEVICE SECURITY: IMPLEMENTATION AND PRACTICAL EVLUATION OF ADDRESS SPACES PROTECTION IN A TRUSTED MICROPROCESSOR EMULATOR by Mikael A. Kondakhchan, Nikita A. Grevtsev, Peter A. Chibisov

    Published 2025-07-01
    “…Necessary security can be achieved through the use of trusted microprocessors and systems based on them. …”
    Get full text
    Article
  8. 108
  9. 109

    Developing an Efficient Deep Learning-Based Trusted Model for Pervasive Computing Using an LSTM-Based Classification Model by Yang He, Shah Nazir, Baisheng Nie, Sulaiman Khan, Jianhui Zhang

    Published 2020-01-01
    “…The role of pervasive computing is foremost in the field where it provides the ability to distribute computational services to the surroundings where people work and leads to issues such as trust, privacy, and identity. To provide an optimal solution to these generic problems, the proposed research work aims to implement a deep learning-based pervasive computing architecture to address these problems. …”
    Get full text
    Article
  10. 110

    Trust as the Foundation of Effective Management: Between Control and Support in the Context of Douglas McGregor’s Theories X and Y by K. V. Kulikov

    Published 2025-07-01
    “…The article proposes an original classification of employee types based on motivational traits, with a corresponding optimal managerial approach (X, Y, or hybrid). Special emphasis is placed on the role of trust, autonomy, and maturity in shaping a productive organizational culture. …”
    Get full text
    Article
  11. 111

    Secure Latency-Aware Task Offloading Using Federated Learning and Zero Trust in Edge Computing for IoMT by Waleed Almuseelem

    Published 2025-01-01
    “…Although offloading medical tasks to Edge Servers (ESs) improves the agility of medical services and enhances real-time processing capabilities, it simultaneously introduces significant security and trust concerns in heterogeneous and delay-sensitive IoMT environments. …”
    Get full text
    Article
  12. 112

    Interpretable Optimization: Why and How We Should Explain Optimization Models by Sara Lumbreras, Pedro Ciller

    Published 2025-05-01
    “…Enhancing interpretability strengthens both efficiency and ethical responsibility, enabling decision-makers to trust, validate, and implement optimization-driven insights with confidence.…”
    Get full text
    Article
  13. 113
  14. 114

    The Role of Artificial Intelligence in Boosting Cybersecurity and Trusted Embedded Systems Performance: A Systematic Review on Current and Future Trends by Ahmed Oun, Kaden Wince, Xiangyi Cheng

    Published 2025-01-01
    “…To address this gap, this article systematically reviews 63 articles on AI in cybersecurity and trusted embedded systems. The reviewed articles are categorized into four application domains: 1) Intrusion Detection and Prevention (IDPS), 2) Malware Detection, 3) Industrial Control and Cyber-Physical Systems (CPS) and 4) Distributed Denial-of-Service (DDoS) Detection and Prevention. …”
    Get full text
    Article
  15. 115

    Commercialisation fears and preferred forms of governance: a mixed methods investigation to identify a trusted Australian genomics repository by Brad Elphinstone, Jarrod Walshe, Dianne Nicol, Mark Taylor

    Published 2024-12-01
    “…Contrary to what was expected based on the interviews, when certain baseline operating conditions were included (e.g., public management, data access committee to ensure data is restricted to human health research), none of the additional tested governance mechanisms (e.g., financial penalties for misuse) increased trust or donation willingness. Thus, providing suitable baseline conditions are in place, a feasible Australian genomic repository may not require external oversight or new legislation to optimize recruitment, even if commercial users are anticipated.…”
    Get full text
    Article
  16. 116

    Enhancing MANET Security Through Long Short-Term Memory-Based Trust Prediction in Location-Aided Routing Protocols by Saad Mohsen Hassan, Mohd Murtadha Mohamad, Farkhana Binti Muchtar

    Published 2025-01-01
    “…To address this, we propose LSTMT-LAR, an LSTM-based trust prediction mechanism integrated with Location-Aided Routing (LAR) to enhance MANET security. …”
    Get full text
    Article
  17. 117

    Research on the blockchain-based trusted ownership confirmation and value transfer system and its light weight of industrial data assets by WANG Dongchu, FU Yusun, YU Ya

    Published 2025-06-01
    “…To solve the contradiction between security and efficiency, a lightweight trusted blockchain model was proposed, which measured the trustworthiness of nodes based on their behavior and status, and provided a dynamic initial value calculation method for nodes and an overall trust value measurement model for trust management. …”
    Get full text
    Article
  18. 118

    Establishing trust through home visits during pregnancy: a realist evaluation of a Danish breastfeeding support intervention by Anne Kristine Gadeberg, Ingrid Maria Susanne Nilsson, Ulla Christensen, Marie Honoré Jacobsen, Henriette Knold Rossau, Sarah Fredsted Villadsen

    Published 2025-01-01
    “…In realist terms, our central mechanism of change, the establishment of trust, had optimal conditions for success in the contextual setting of the pregnancy home visit where there was time, peace, undisturbed conversations, mental capacity to reflection, and a perceived more even power balance between the family and the health visitor which resulted in a range of positive outcomes. …”
    Get full text
    Article
  19. 119

    Standardization of epistemic trust/mistrust/credulity questionnaire: Examining validity and reliability among adolescents Standardization of ETMCQ among adolescents by Raziyeh Hashemi, Mehdi Reza Sarafraz, Habib Hadian Fard, Mohammad Reza Taghavi

    Published 2024-08-01
    “…The factor structure, reliability, and reliability of the epistemic trust/mistrust/credulity questionnaire for research applications and clinical diagnosis are acceptable and it can be said that the questionnaire is a useful and valid tool for conducting research related to epistemic trust in different areas of the relationship.IntroductionOne of the prerequisites for optimal interpersonal functioning is the capacity for mentalization (Fonagy et al., 1991; Frith, 1989) , which is closely related to concepts such as emotion recognition and trust (Bateman & Fonagy, 2016) . …”
    Get full text
    Article
  20. 120

    A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks by Sridhar Varadala, Hao Xu

    Published 2025-07-01
    “…To overcome these challenges, a new bio-inspired ZTS framework called Manta Ray Foraging Cost-Optimized Zero-Trust Security (MRFCO-ZTS) has been introduced. …”
    Get full text
    Article