Showing 141 - 160 results of 1,170 for search 'trust optimization', query time: 0.10s Refine Results
  1. 141

    The Effect of E-Service Quality, E-Trust, and E-Customer Satisfaction on E-Customer Loyalty on the Use of the Halodoc Application (Study: Users of the Halodoc Application in Suraba... by Sri Linda Handayani, Budi Prabowo

    Published 2025-08-01
    “…This study concludes that in order to maintain and encourage customer loyalty, companies need to focus on optimizing service quality, maintaining trust consistently, and increasing high customer satisfaction in order to maintain customer loyalty. …”
    Get full text
    Article
  2. 142

    Conceptualizing Clinicians’ Trust in Artificial Intelligence as a Function of Their Expertise, Workload, Patient Outcome, Diagnosis Difficulty, and AI Accuracy: A Systems Th... by Hamid Shamszare, Zaira Chaudhry, Manijeh Berenji, Avishek Choudhury

    Published 2025-01-01
    “…This work contributes to the broader understanding of trust dynamics in clinical AI adoption and offers practical guidance for developers and healthcare organizations seeking to optimize human-AI collaboration.…”
    Get full text
    Article
  3. 143

    A hybrid deep learning and differential evolution approach for accurate fake news detection by Shailendra Pratap Singh, Naween Kumar, Gyanendra Kumar, Ahamed Shafeeq B.M.

    Published 2025-12-01
    “…The rapid spread of misinformation on digital platforms has led to widespread trust breakdowns, influencing critical decisions in politics, healthcare, and finance. …”
    Get full text
    Article
  4. 144
  5. 145
  6. 146

    SafeTrack: Secure Tracking Protocol for Mobile Sensor Nodes in Unstable Wireless Sensor Networks by Ali Adnan Al-Khazraji, Fatimah Abdulridha Rashid

    Published 2025-01-01
    “…In SafeTrack, we introduce a Dual Layer Security Framework (DLSF), which a lightweight cryptographic technique is paired with a trust based approach to provide robust node authentication and secured communication. …”
    Get full text
    Article
  7. 147

    Professional Position of Teacher-Psychologist in Terms of Optimizing the Education by A. D. Andreyeva

    Published 2017-03-01
    “…Domination of the low level of trust in such professionals is revealed. The contradiction between the objective necessity of the presence of the school psychologist and the requirements of the new law on education is shown. …”
    Get full text
    Article
  8. 148

    Trustworthy Reputation for Federated Learning in O-RAN Using Blockchain and Smart Contracts by Farhana Javed, Josep Mangues-Bafalluy, Engin Zeydan, Luis Blanco

    Published 2025-01-01
    “…Our solution transitions from implicit trust, where the reliability of contributions is assumed, to explicit trust, where reputation is verifiably established on-chain. …”
    Get full text
    Article
  9. 149

    Estimation of gas hydrate and free gas saturation using the rock physics model based on constrained least squares and trust region method in the Shenhu Area, South China Sea by Dajiang Meng, Dajiang Meng, Ruwei Zhang, Ruwei Zhang, Yuan Gu, Yuan Gu, Baojin Zhang, Baojin Zhang, Yunqian Lu, Yunqian Lu, Jiangnan Lin, Jiangnan Lin, Lijie Wang, Lijie Wang

    Published 2025-04-01
    “…We formulated the inversion as a multi-parameter constrained least squares problem and then used the trust region algorithm to find the optimal least-squares solution. …”
    Get full text
    Article
  10. 150
  11. 151

    Topology optimization and forwarding strategy design for blockchain network by Ru HUO, Xiangfeng CHENG, Chuang SUN, Shuo WANG, Tao HUANG, Yu F.Richard

    Published 2022-12-01
    “…In order to solve the problem of the low data transmission efficiency of the blockchain network, an optimization method of blockchain transmission efficiency was proposed to optimize the network topology and forwarding strategy.First, the trusted value function was designed to calculate the trusted value of blockchain nodes, and a tree topology was constructed by comprehensively considering the trusted value and transmission time.Furthermore, the forwarding path selection strategy was designed based on the tree topology, with the minimum overall concurrent transmission time as the goal, and the forwarding table of the node about the forwarding order of its neighbor nodes was established.To reduce the impact of the node changed on the tree topology, a topology dynamic optimization strategy was proposed to adjust tree topology locally.The forwarding path selection strategy enabled the entire data transmission process to have the minimum transmission time, and the dynamic optimization strategy avoided reconfiguration of the entire network topology and effectively shortened the data transmission time.The simulation results show that, compared with the weight-first algorithm, the transmission time of the proposed method is reduced by about 20%, and the data transmission efficiency is significantly improved.…”
    Get full text
    Article
  12. 152

    Ageism in a health-related context: the physiological, psychological, and behavioral impacts of subtle age discrimination on older adults by Linnea C. Ng, Hannah J. Kim, Mikki Hebl, Eden B. King, Christopher P. Fagundes

    Published 2025-08-01
    “…., lowered HRV), psychological (i.e., reduced trust), and behavioral (i.e., increased avoidance of future interactions) outcomes. …”
    Get full text
    Article
  13. 153

    Virtualization security:the good,the bad and the ugly by Yu-tao LIU, Hai-bo CHEN

    Published 2016-10-01
    “…The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security services for upper-level software.On the other side,the extra indirection brings complexity and overhead as well,which poses huge challenges.A series of recent representative work done by the institute of parallel and distributed system shanghai jiaotong university,including providing security services of trusted execution environment,virtual machine monitoring,intra-domain isolation,as well as optimizing trusted computing base and cross-world calls in the virtualization environment.Finally the problems and directions in the space of virtualization security were summarized.…”
    Get full text
    Article
  14. 154
  15. 155
  16. 156

    OPTIMIZING KEYWORD SEARCH FOR SEARCH ENGINES USING BLOCKCHAIN TECHNOLOGY by Bharti Aggarwal, Dinesh Rai, Naresh Kumar

    Published 2024-12-01
    “…The multifaceted evaluation, employing TF-IDF and cosine similarity across three datasets, demonstrates the efficacy of this approach in optimizing website visibility while safeguarding user data. …”
    Get full text
    Article
  17. 157

    Learning to Optimize Joint Chance-Constrained Power Dispatch Problems by Meiyi Li, Javad Mohammadi

    Published 2025-01-01
    “…To overcome the shortcomings of today&#x0027;s solvers, we propose a fast, scalable, and explainable machine learning-based optimization proxy. Our solution, called Learning to Optimize the Optimization of Joint Chance-Constrained Problems <tex>$(\mathcal{LOOP}-\mathcal{JCCP})$</tex>, is iteration-free and solves the underlying problem in a single-shot. …”
    Get full text
    Article
  18. 158
  19. 159

    Optimizing Monkeypox Lesions Detection With a Lightweight Hybrid Model by Mehdhar S. A. M. Al-Gaashani, Reem Ibrahim Alkanhel, Dina S. M. Hassan, Abduljabbar S. Ba Mahel, Ahmed Aziz, Mashael M. Khayyat, Ammar Muthanna

    Published 2025-01-01
    “…Grad-CAM, saliency maps, and other visualization techniques help improve clinical trust by highlighting relevant regions in input images, emphasizing key features of the lesions. …”
    Get full text
    Article
  20. 160