نتایج جستجو برای: hybrid trust model
تعداد نتایج: 2303760 فیلتر نتایج به سال:
چکیده: پژوهش حاضر به بررسی تطبیقی اعتماد اجتماعی در بین دبیران زن و مرد مقطع راهنمایی شهر ایلام می پردازد. امروزه در جوامع شاهد گسترش ارتباطات هستیم و با توجه به این که دامنه کنش های اجتماعی از حد روابط با آشنایان و دوستان فراتر رفته و به تعامل با کنشگران غربیه و نا آشنا گسترش یافته است، لزوم وجود اعتماد، بیش از پیش احساس می شود. اما با توجه به نقش دبیران در نهادهای آموزشی، در انتقال ارزش ها و...
As a result of recent advancements in computer technology, hybrid inspection systems, those in which humans and computers work cooperatively, have found increasing application in quality control processes. These systems are preferable because they take advantage of the superiority of humans in rational decision-making and adaptability to new circumstances. Although the classical performance iss...
customers extend robust trust to a business when they believe the business puts their interests first. good experience of banking services and recommendations of other customers can increase trust. loyalty and word of mouth (wom) is accepted as key factors successes of marketing. this paper seeks to discover the affecting factors on positive word of mouth and loyalty based on trust enhancement ...
Im this paper, the performance of suppliers is evaluated based on their efficiencies. Evaluation environment is not always precise and we may face imprecise for evaluation indexes values. In this situation, traditional and certain models cannot be employed. For overcoming uncertainty problem, there are different models such as stochastic, statistical, Rough, Fuzzy, etc for solving uncertainty e...
The sharing of knowledge within teams is critical to team functioning. However, working with team members who are in different locations (i.e. in virtual teams) may introduce communication challenges and reduce opportunities for rich interactions, potentially affecting knowledge sharing and its outcomes. Therefore, using questionnaire-based data, this study examined the potential effects of dif...
Access control in modern computing environments is different from access control in the traditional setting of operating systems. For distributed computing systems, specification and enforcement of permissions can be based on a public key infrastructure which deals with public keys for asymmetric cryptography. Previous approaches and their implementations for applying a public key infrastructur...
Computing a few eigenpairs of large-scale matrices is a significant problem in science and engineering applications and a very active area of research. In this paper, two methods that compute extreme eigenpairs of positive-definite matrix pencils are combined into a hybrid scheme that inherits the advantages of both constituents. The hybrid algorithm is developed and analyzed in the framework o...
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive in computation, and are not robust in dealing with system malfunction or user misbehavior. In this paper, we propose a secure and practical double auction protocols based on a hybrid trust model, where computation loa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید