期刊文献+
共找到1,404篇文章
< 1 2 71 >
每页显示 20 50 100
Trusting the trustless blockchain for its adoption in accounting:theorizing the mediating role of technology‑organization‑environment framework
1
作者 Sujata Seshadrinathan Shalini Chandra 《Financial Innovation》 2025年第1期1314-1352,共39页
Blockchain technology has a unique ability to automate accounting processes that are a part of regulatory requirements in all commercial enterprises.Moreover,it can hold verified accounting records and eliminate the n... Blockchain technology has a unique ability to automate accounting processes that are a part of regulatory requirements in all commercial enterprises.Moreover,it can hold verified accounting records and eliminate the need for a trusted third party.Despite blockchain’s potential to transform the nature of traditional accountancy procedures,adoption by the accounting industry is somewhat limited.Knowledge in this domain is lacking,and research on the antecedents influencing the adoption of blockchainbased accounting systems is scarce.This study is rooted in the technology-organization-environment(TOE)framework,presenting a trust-centric adoption model based on diligent analysis of blockchain and technology adoption literature.The model proposes that TOE factors mediate trust’s role in adopting blockchain for accounting applications.The model was validated based on qualitative semi-structured interviews of twelve industry leaders and was comprehensively tested using a quantitative surveybased methodology with accounting professionals knowledgeable about blockchain technology.The data collected was analyzed using PLS-SEM.The results demonstrate the role of trust and the mediating effect of the theorized TOE variables on adopting blockchain-based accounting solutions.The results’implications for research and practice are discussed. 展开更多
关键词 Blockchain ADOPTION TRUST TOE framework ACCOUNTING Multimethod research
在线阅读 下载PDF
Security Architecture on the Trusting Internet of Things 被引量:2
2
作者 Bing Zhang Xin-Xin Ma Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第4期364-367,共4页
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi... By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided. 展开更多
关键词 Combined public key elliptic curves cryptography Internet of Things radio frequency identification security system trusting system.
在线阅读 下载PDF
126例二期梅毒患者临床特征、实验室检查及预后分析
3
作者 杨艳萍 孙嘉昱 +1 位作者 蒲小霞 葛新红 《中国麻风皮肤病杂志》 2026年第1期15-18,共4页
目的:总结分析二期梅毒患者的临床表现、实验室检查特征以及不同治疗方案的预后状况。方法:回顾性分析2018年1月至2023年1月于宁夏回族自治区人民医院确诊为二期梅毒且规律复诊的126例患者资料,对其临床表现、实验室检查结果及治疗情况... 目的:总结分析二期梅毒患者的临床表现、实验室检查特征以及不同治疗方案的预后状况。方法:回顾性分析2018年1月至2023年1月于宁夏回族自治区人民医院确诊为二期梅毒且规律复诊的126例患者资料,对其临床表现、实验室检查结果及治疗情况进行描述性分析。结果:本组患者平均发病年龄为28.84岁(16~61岁),男女比例为1.74∶1。126例患者中二期梅毒神经损害1例,HIV感染4例,尖锐湿疣12例,同时合并尖锐湿疣和HIV 3例。皮损为躯干及四肢暗紫红色斑疹或斑片82例,其中伴有硬下疳5例;手掌、足底铜红色斑片、领圈状脱屑30例;虫蚀状脱发8例,肛周扁平湿疣6例。实验室检测结果示,所有患者TPHA、TRUST均呈阳性,TRUST滴度1∶8(6例)、1∶16(42例)、1∶32(46例)、1∶64(18例)、1∶128(10例)及1∶256(4例)。治疗上,119例接受苄星青霉素肌肉注射,5例口服多西环素,2例静脉输注头孢曲松钠;对于基线TRUST≥1∶64的32例患者,24例患者予以泼尼松治疗预处理,仅1例出现发热;8例直接予以苄星青霉素驱梅治疗,均出现发热。治疗3个月后,所有患者的TRUST滴度均下降4倍以上;6个月时,120例患者TRUST滴度降至1∶8以下;2年后,105例TRUST转阴,21例(16.67%)发生血清固定,其中合并HIV阳性组血清固定率(4/7)显著高于非HIV组(17/119,P=0.002);基线TRUST≥1∶64组患者血清固定率(12/32)显著高于TRUST≤1∶32组(9/94)。结论:二期梅毒最为常见的皮肤表现为躯干与四肢的暗紫红色斑疹或斑片。TRUST滴度≥1∶64或合并HIV感染的患者更易出现血清固定现象;而对于TRUST滴度≥1∶64的患者,在治疗中联合口服泼尼松可有效降低吉海反应的发生风险。 展开更多
关键词 二期梅毒 神经损害 HIV 尖锐湿疣 硬下疳 TRUST滴度 驱梅治疗 血清固定 吉海反应
暂未订购
A Year of Deepening China-Africa Bonds--Political trust,economic collaboration and cultural exchanges further solidify China-Africa ties
4
作者 HE WENPING 《ChinAfrica》 2026年第1期20-22,共3页
The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supporte... The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supported Africa in addressing historical injustices at diplomatic and political levels and firmly backed South Africa in hosting the G20 Leaders’Summit,further deepening China-Africa strategic mutual trust. 展开更多
关键词 Political Trust Forum China Africa Cooperation addressing historical injustices FOCAC China Africa Cooperation Strategic Mutual Trust Economic Collaboration Diplomatic Support
原文传递
Blockchain-Enabled Trusted Virtual Network Embedding in Intelligent Cyber-Physical Systems
5
作者 Zhu Hailong Huang Tao +2 位作者 Zhang Yi Chen Ning Zhang Peiying 《China Communications》 2026年第1期175-188,共14页
With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Further... With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate. 展开更多
关键词 blockchain cyber-physical system trusted embedding virtual network
在线阅读 下载PDF
Promoting psychological well-being in AI-enhanced english as a foreign language learning:A mixed-methods study of motivation,language learning anxiety and trust in higher education
6
作者 Zhiyong Sun 《Journal of Psychology in Africa》 2026年第1期33-43,共11页
This mixed-methods study investigated how AI-enhanced English as a Foreign Language(EFL)learning environments influence students’psychological well-being through the mediating roles of motivation and language learnin... This mixed-methods study investigated how AI-enhanced English as a Foreign Language(EFL)learning environments influence students’psychological well-being through the mediating roles of motivation and language learning anxiety and the moderating role of trust.Participants were Chinese university students(N=310,62%female,mean age=18.9,SD=0.8),of whom 15 completed interviews to both add to and to clarify the evidence from the surveys.Structural equation modeling results revealed that AI use had significant indirect effects on well-being through increased motivation and reduced language learning anxiety.Trust in AI significantly moderated both paths,amplifying the motivational benefits and anxiety reduction associated with AI use.Thematic analysis supported these results,identifying three experiential themes:(1)motivational empowerment through personalization,(2)anxiety regulation through safe practice and feedback,and(3)trust as the emotional bridge between AI and well-being.The study extends AI psychology applications by empirically linking technology engagement with affective outcomes and underscores the need for human-centered and trust-enhancing design in AI-supported education.From these findings,we conclude that adaptive,transparent,and autonomy-supportive AI systems promote self-determined motivation,emotional safety,and overall psychological health among EFL learners. 展开更多
关键词 Artificial intelligence psychology EFL learning MOTIVATION anxiety trust WELL-BEING mixed methods self-determination theory
在线阅读 下载PDF
The Collapse of the American Dream: Cultural Deconstruction of the Wealth Myth in Trust
7
作者 LI Shi-yu 《Journal of Literature and Art Studies》 2026年第1期53-59,共7页
This paper examines Hernán Díaz’s novel Trust (2022) through the lens of cultural deconstruction, analyzing how its four nested narratives systematically dismantle the American Dream ideology. The novel Bon... This paper examines Hernán Díaz’s novel Trust (2022) through the lens of cultural deconstruction, analyzing how its four nested narratives systematically dismantle the American Dream ideology. The novel Bonds and autobiography My Life collaboratively construct a financial myth portraying protagonist Andrew Bevel as an exemplar of self-made success. Subsequently, Ida’s Memoir exposes the subjective construction of history, declaring the American Dream’s bankruptcy at the epistemological level, while Mildred’s diary Futures deconstructs the myth from within by revealing that Bevel’s financial genius was built upon appropriation of his wife’s intellectual labor. This paper argues that Trust reveals the American Dream as an ideological illusion-narratively constructed, practically dependent on structural injustice, and essentially serving power reproduction. 展开更多
关键词 American Dream TRUST Hernán Díaz narrative deconstruction
在线阅读 下载PDF
Anomaly Detection Method of Power Internet of Things Terminals in Zero-Trust Environment
8
作者 Sun Pengzhan Ren Yinlin +2 位作者 Shao Sujie Yang Chao Qiu Xuesong 《China Communications》 2026年第1期290-305,共16页
With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT termi... With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space. 展开更多
关键词 anomaly detection distributed machine learning power internet of Things zero trust
在线阅读 下载PDF
国际档案领域人工智能研究进展及启示——基于I Trust AI项目五项课题研究的述评 被引量:1
9
作者 潘未梅 曹飞羽 张佳琦 《北京档案》 北大核心 2025年第8期12-18,共7页
伴随着人工智能技术的发展与普及,人工智能技术对档案学学科的影响已成为档案领域深入研究与探讨的热点议题。为推动我国档案学领域人工智能相关研究的创新性发展,本文对国际档案领域规模最大、持续时间最长、影响最为深远的跨国跨学科... 伴随着人工智能技术的发展与普及,人工智能技术对档案学学科的影响已成为档案领域深入研究与探讨的热点议题。为推动我国档案学领域人工智能相关研究的创新性发展,本文对国际档案领域规模最大、持续时间最长、影响最为深远的跨国跨学科项目InterPARES第五期——I(nterPARES)Trust AI项目的部分前沿成果进行介绍,旨在为我国档案学界的理论探索与实践应用提供参考。 展开更多
关键词 InterPARES I Trust AI 人工智能 档案
在线阅读 下载PDF
2020—2022年无锡市锡山区高危人群梅毒感染检测方法及流行病学特征分析
10
作者 王慧弘 王伟 徐依峰 《实验室检测》 2025年第23期268-270,共3页
目的 本研究旨在分析2020—2022年无锡市锡山区哨点监测高危人群梅毒感染的流行病学特征,并探讨所用检测方法的应用价值。方法 通过收集该地区此期间哨点高危人群的2460份血样,采用梅毒螺旋体抗体ELISA试验(TP-ELISA)进行初筛,阳性结果... 目的 本研究旨在分析2020—2022年无锡市锡山区哨点监测高危人群梅毒感染的流行病学特征,并探讨所用检测方法的应用价值。方法 通过收集该地区此期间哨点高危人群的2460份血样,采用梅毒螺旋体抗体ELISA试验(TP-ELISA)进行初筛,阳性结果再经梅毒甲苯胺红不加热血清试验(Trust)确认现症感染。结果 TP-ELISA法阳性率为5.08%,Trust法确认现症感染率为0.93%;男性感染率高于女性,感染者年龄主要集中在50岁以上,同时在地域分布方面,除2022年鹅湖镇、东北塘街道等西部部分区域确诊率较高外,总体呈现东高西低态势。结论 研究表明,无锡市锡山区高危人群梅毒感染存在一定传播风险,需针对性采取防控措施,且TP-ELISA联合Trust法在高危人群梅毒检测中具有良好的应用效果。 展开更多
关键词 高危人群 梅毒 流行病学特征 TP-ELISA TRUST
暂未订购
不同检验方法检测梅毒螺旋体的诊断价值 被引量:1
11
作者 刘艳梅 《实验室检测》 2025年第10期174-176,共3页
目的分析梅毒螺旋体的不同检验方法以及其价值。方法本研究回顾性分析了2021年12月—2023年12月100例梅毒感染者资料,根据不同检验方法分组,包括甲苯胺红不加热血清试验(TRUST)+梅毒螺旋体酶联免疫组、TRUST检验组、梅毒螺旋体明胶颗粒... 目的分析梅毒螺旋体的不同检验方法以及其价值。方法本研究回顾性分析了2021年12月—2023年12月100例梅毒感染者资料,根据不同检验方法分组,包括甲苯胺红不加热血清试验(TRUST)+梅毒螺旋体酶联免疫组、TRUST检验组、梅毒螺旋体明胶颗粒凝集试验(TPPA)组、梅毒螺旋体酶联免疫检验组,对比不同方法的检测效果。结果TRUST检验组、梅毒螺旋体酶联免疫检验组的临床诊断准确率、误诊率、漏诊率、检查满意度评分比较,无差异性(P>0.05)。TRUST+梅毒螺旋体酶联免疫检验组的临床诊断准确率均高于TRUST检验组、梅毒螺旋体酶联免疫检验组(P<0.05)。同TRUST检验组、梅毒螺旋体酶联免疫检验组比较,TRUST+梅毒螺旋体酶联免疫检验组误诊、漏诊率更低(P<0.05)。TRUST+梅毒螺旋体酶联免疫检验组的临床诊断准确率、误诊率、漏诊率,同TPPA检验组比较,无差异性(P>0.05)。TRUST+梅毒螺旋体酶联免疫检验组的检查满意度评分,均高于TRUST检验组、梅毒螺旋体酶联免疫检验组(P<0.05)。结论更推荐采取TRUST与梅毒螺旋体酶联免疫联合检验,实施梅毒螺旋体检验工作,更能发挥有效的诊断价值。 展开更多
关键词 梅毒螺旋体 TRUST 梅毒螺旋体酶联免疫检验 TPPA
暂未订购
A Cross-Multi-Domain Trust Assessment Authority Delegation Method Based on Automotive Industry Chain
12
作者 Binyong Li Liangming Deng +1 位作者 Jie Zhang Xianhui Deng 《Computers, Materials & Continua》 SCIE EI 2025年第1期407-426,共20页
To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel... To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions. 展开更多
关键词 Automotive industry chain cross-domain access block chain delegate authority trust assessment
在线阅读 下载PDF
Blockchain-Based Trust Model for Inter-Domain Routing
13
作者 Qiong Yang Li Ma +3 位作者 Sami Ullah Shanshan Tu Hisham Alasmary Muhammad Waqas 《Computers, Materials & Continua》 2025年第3期4821-4839,共19页
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,com... Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain routing.Existing research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP nodes.In this paper,we propose a blockchain-based trust model for inter-domain routing.Our model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the blockchain.The BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective alliance.We incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing service.We forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing behavior.We use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust model.Compared with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks. 展开更多
关键词 Inter-domain routing BGP security blockchain trust model trust mechanisms trust evaluation
在线阅读 下载PDF
Trusted identification and trusted product data: GS1’s vision for collaborative global standards
14
作者 Renaud de Barbuat 《China Standardization》 2025年第5期42-42,共1页
GS1 is an international standards organization,which focuses on product identification and product data,helping businesses and governments to improve commerce and supply chain.Why trusted data is essential to high-qua... GS1 is an international standards organization,which focuses on product identification and product data,helping businesses and governments to improve commerce and supply chain.Why trusted data is essential to high-quality development?More than 50 years ago,GS1 was initiated with the bar code,a profound transformation of the way we work and live.From then on,a simple scan connected a physical product to its digital identity.It transformed commerce,improving supply chains and enabling safer healthcare.Collaboration between industry and governments,and a strong partnership with ISO and IEC laid the foundations for the global adoption of a common product identification over the past 50 years and all around the world. 展开更多
关键词 improve commerce supply chainwhy trusted product data supply chains product identification bar codea trusted data trusted identification physical product
原文传递
International AI standards:Forging trust and fueling innovation
15
作者 Sung Hwan Cho 《China Standardization》 2025年第5期20-21,共2页
Today,I want to share how international standards can forge trust and fuel innovation,laying the foundation for a future where AI benefits everyone,everywhere.First,AI standards,developed jointly by ISO and IEC-the In... Today,I want to share how international standards can forge trust and fuel innovation,laying the foundation for a future where AI benefits everyone,everywhere.First,AI standards,developed jointly by ISO and IEC-the International Electrotechnical Commission-help build global trust and enable responsible innovation by bringing clarity and coherence to an ever-changing AI landscape.As developments in AI continue to emerge at speed,regulation is struggling to keep up and the proliferation of competing standards has created confusion rather than clarity.ISO and our partner IEC are addressing this challenge through the work of our expert committee on AI,SC 42,which takes a holistic,cohesive approach to AI standardization. 展开更多
关键词 international standards build global trust ISO IEC responsible innovation clarity coherence AI standardization forge trust
原文传递
Standards help build global trust and enable innovation in the AI era
16
《China Standardization》 2025年第5期2-3,共2页
Nowadays,we are witnessing the tremendous changes brought by AI technologies.What role can standards play in this process?How can we build global trust and enable responsible innovation?
关键词 STANDARDS build global trust responsible innovation AI global trust
原文传递
Toward zero trust in 5G Industrial Internet collaboration systems
17
作者 Han Zhang Ziyan Zhang Liquan Chen 《Digital Communications and Networks》 2025年第2期547-555,共9页
With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To... With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To solve this problem,a new security model called Zero Trust(ZT)is desired,which believes in“never trust and always verify”.Every time the asset in the industrial network is accessed,the subject is authenticated and its trustworthiness is assessed.In this way,the asset in industrial network can be well protected,whether the subject is in the internal network or the external network.However,in order to construct the zero trust model in the 5G Industrial Internet collaboration system,there are still many problems to be solved.In this paper,we first introduce the security issues in the 5G Industrial Internet collaboration system,and illustrate the zero trust architecture.Then,we analyze the gap between existing security techniques and the zero trust architecture.Finally,we discuss several potential security techniques that can be used to implement the zero trust model.The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture(ZTA)in the 5G Industrial Internet collaboration system. 展开更多
关键词 Zero trust 5G Industrial Internet collaboration system Trust assessment Access control AUTHENTICATION
在线阅读 下载PDF
Three-Level Intrusion Detection Model for Wireless Sensor Networks Based on Dynamic Trust Evaluation
18
作者 Xiaogang Yuan Huan Pei Yanlin Wu 《Computers, Materials & Continua》 2025年第9期5555-5575,共21页
In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stabili... In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stability,data transmission reliability,and overall performance.To effectively address this issue and significantly improve intrusion detection speed,accuracy,and resistance to malicious attacks,this research designs a Three-level Intrusion Detection Model based on Dynamic Trust Evaluation(TIDM-DTE).This study conducts a detailed analysis of how different attack types impact node trust and establishes node models for data trust,communication trust,and energy consumption trust by focusing on characteristics such as continuous packet loss and energy consumption changes.By dynamically predicting node trust values using the grey Markov model,the model accurately and sensitively reflects changes in node trust levels during attacks.Additionally,DBSCAN(Density-Based Spatial Clustering of Applications with Noise)data noise monitoring technology is employed to quickly identify attacked nodes,while a trust recovery mechanism restores the trust of temporarily faulty nodes to reduce False Alarm Rate.Simulation results demonstrate that TIDM-DTE achieves high detection rates,fast detection speed,and low False Alarm Rate when identifying various network attacks,including selective forwarding attacks,Sybil attacks,switch attacks,and black hole attacks.TIDM-DTE significantly enhances network security,ensures secure and reliable data transmission,moderately improves network energy efficiency,reduces unnecessary energy consumption,and provides strong support for the stable operation of WSNs.Meanwhile,the research findings offer new ideas and methods for WSN security protection,possessing important theoretical significance and practical application value. 展开更多
关键词 Wireless sensor networks intrusion detection dynamic trust evaluation data noise detection trust recovery mechanism
在线阅读 下载PDF
主题2 课标词汇之真挚友情
19
作者 周莉 《疯狂英语(新悦读)》 2025年第7期71-72,80,共3页
True friendship is like a strong tree-its roots grow deep through trust,loyalty and care.Unlike casual acquaintances(泛泛之交),real friends stay by your side through life's storms and sunshine.A genuine friendship... True friendship is like a strong tree-its roots grow deep through trust,loyalty and care.Unlike casual acquaintances(泛泛之交),real friends stay by your side through life's storms and sunshine.A genuine friendship begins with honesty.Friends who truly care about you will tell you the truth kindly,even when it's hard.For example,if you make a mistake,a real friend won't laugh but will help you learn.They create a safe space where you can share fears or dreams without judgment-this is called emotional safety. 展开更多
关键词 care LOYALTY emotional safety casual acquaintances true friendship trust HONESTY
在线阅读 下载PDF
GLOBAL VISION
20
《China Standardization》 2025年第5期60-63,共4页
Measuring the impact of AI systems The recent 2025 AI Index Report from Stanford University revealed that skepticism about the ethical conduct of AI companies is growing,and trust in fairness is shrinking.There is als... Measuring the impact of AI systems The recent 2025 AI Index Report from Stanford University revealed that skepticism about the ethical conduct of AI companies is growing,and trust in fairness is shrinking.There is also less confidence that personal data will be protected and fewer people believe AI systems are unbiased and free of discrimination.Trust and transparency are essential for AI to deliver on its promises in a safe and responsible way.Governments are stepping up with new AI-related regulations,and international standards such as ISO/IEC 42001 have been developed to support them,but a lot more needs to be done to reduce potential risks and address societal concerns. 展开更多
关键词 skepticism ethical conduct FAIRNESS ethical conduct bias TRANSPARENCY REGULATIONS trust discrimination
原文传递
上一页 1 2 71 下一页 到第
使用帮助 返回顶部