期刊文献+
共找到66篇文章
< 1 2 4 >
每页显示 20 50 100
Data trustworthiness and user reputation as indicators of VGI quality 被引量:5
1
作者 Paolo Fogliaroni Fausto D’Antonio Eliseo Clementini 《Geo-Spatial Information Science》 SCIE CSCD 2018年第3期213-233,共21页
Volunteered geographic information(VGI)has entered a phase where there are both a substantial amount of crowdsourced information available and a big interest in using it by organizations.But the issue of deciding the ... Volunteered geographic information(VGI)has entered a phase where there are both a substantial amount of crowdsourced information available and a big interest in using it by organizations.But the issue of deciding the quality of VGI without resorting to a comparison with authoritative data remains an open challenge.This article first formulates the problem of quality assessment of VGI data.Then presents a model to measure trustworthiness of information and reputation of contributors by analyzing geometric,qualitative,and semantic aspects of edits over time.An implementation of the model is running on a small data-set for a preliminary empirical validation.The results indicate that the computed trustworthiness provides a valid approximation of VGI quality. 展开更多
关键词 Volunteered geographic information data quality trustworthiness REPUTATION
原文传递
Analysis of system trustworthiness based on information flow noninterference theory 被引量:1
2
作者 Xiangying Kong Yanhui Chen Yi Zhuang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第2期367-380,共14页
The trustworthiness analysis and evaluation are the bases of the trust chain transfer. In this paper the formal method of trustworthiness analysis of a system based on the noninterfer- ence (NI) theory of the inform... The trustworthiness analysis and evaluation are the bases of the trust chain transfer. In this paper the formal method of trustworthiness analysis of a system based on the noninterfer- ence (NI) theory of the information flow is studied. Firstly, existing methods cannot analyze the impact of the system states on the trustworthiness of software during the process of trust chain trans- fer. To solve this problem, the impact of the system state on trust- worthiness of software is investigated, the run-time mutual interfer- ence behavior of software entitles is described and an interference model of the access control automaton of a system is established. Secondly, based on the intransitive noninterference (INI) theory, a formal analytic method of trustworthiness for trust chain transfer is proposed, providing a theoretical basis for the analysis of dynamic trustworthiness of software during the trust chain transfer process. Thirdly, a prototype system with dynamic trustworthiness on a plat- form with dual core architecture is constructed and a verification algorithm of the system trustworthiness is provided. Finally, the monitor hypothesis is extended to the dynamic monitor hypothe- sis, a theorem of static judgment rule of system trustworthiness is provided, which is useful to prove dynamic trustworthiness of a system at the beginning of system construction. Compared with previous work in this field, this research proposes not only a formal analytic method for the determination of system trustworthiness, but also a modeling method and an analysis algorithm that are feasible for practical implementation. 展开更多
关键词 trusted computing trust chain intransitive noninterference(INI) dynamic trustworthiness access control
在线阅读 下载PDF
Access Request Trustworthiness in Weighted Access Control Framework 被引量:1
3
作者 WANGLun-wei LIAOXiang-ke WANGHuai-min 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期65-69,共5页
Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess ... Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess request is also given. In this model, we give themeasure of trustworthiness factor to access request- by using some idea of uncertainty reasoning ofexpert system, present and prove the parallel propagation formula of request trustworthiness factoramong multiple policies, and get thefinal trustworthiness factor to decide whether authorizing. Inthis model, authorization decision is given according to the calculation of request trustworthinessfactor, which is more understandable, more suitable for real requirement and more powerfulforsecurity enhancement than traditional methods. Meanwhile the finer access control granularity isanother advantage. 展开更多
关键词 weighted factor access control framework access request trustworthiness
在线阅读 下载PDF
A Trustworthiness-Based Distribution Model for Data Leakage Prevention 被引量:1
4
作者 YIN Fan WANG Yu +1 位作者 WANG Lina YU Rongwei 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期205-209,共5页
Under the global circumstances where data leakage gets more and more severe, we present a trustworthiness-based distribution model that aims at data leakage prevention (DLP). In our model, first, the distributor cal... Under the global circumstances where data leakage gets more and more severe, we present a trustworthiness-based distribution model that aims at data leakage prevention (DLP). In our model, first, the distributor calculates the user's trustworthiness based on his historical behaviors; second, according to the user's trustworthiness and his obtained file set overlapping leaked file set, the distributor accesses the probability of the user's intentional leak behavior as the subjective risk assessment; third, the distributor evaluates the user's platform vulnerability as an objective element; last, the distributor makes decisions whether to distribute the file based on the integrated risk assessment. The experiments indicate that the model can distinguish users of different types and make the probability of malicious users' requirements being denied much higher than that of honest users' requirements being denied, so that the model is capable of preventing data leakage validly. 展开更多
关键词 distribution model trustworthiness data leakage prevention (DLP)
原文传递
Reasoning about Software Trustworthiness with Derivation Trees
5
作者 邓玉欣 陈泽众 +5 位作者 汪洋 杜文杰 毛碧飞 梁智章 林秋诗 李静辉 《Journal of Shanghai Jiaotong university(Science)》 EI 2024年第3期579-587,共9页
In order to analyze the trustworthiness of complex software systems,we propose a model of evidence-based software trustworthiness called trustworthiness derivation tree(TDT).The basic idea of constructing a TDT is to ... In order to analyze the trustworthiness of complex software systems,we propose a model of evidence-based software trustworthiness called trustworthiness derivation tree(TDT).The basic idea of constructing a TDT is to refine main properties into key ingredients and continue the refinement until basic facts such as evidences are reached.The skeleton of a TDT can be specified by a set of rules,which are convenient for automated reasoning in Prolog.We develop a visualization tool that can construct the skeleton of a TDT by taking the rules as input,and allow a user to edit the TDT in a graphical user interface.In a software development life cycle,TDTs can serve as a communication means for different stakeholders to agree on the properties about a system in the requirement analysis phase,and they can be used for deductive reasoning so as to verify whether the system achieves trustworthiness in the product validation phase.We have piloted the approach of using TDTs in more than a dozen real scenarios of software development.Indeed,using TDTs helped us to discover and then resolve some subtle problems. 展开更多
关键词 trustworthiness REFINEMENT EVIDENCE VISUALIZATION
原文传递
Analysis of Software Trustworthiness Based on FAHP-CRITIC Method
6
作者 高晓彤 马艳芳 周伟 《Journal of Shanghai Jiaotong university(Science)》 EI 2024年第3期588-600,共13页
Software trustworthiness includes many attributes.Reasonable weight allocation of trustworthy at-tributes plays a key role in the software trustworthiness measurement.In practical application,attribute weight usually ... Software trustworthiness includes many attributes.Reasonable weight allocation of trustworthy at-tributes plays a key role in the software trustworthiness measurement.In practical application,attribute weight usually comes from experts'evaluation to attributes and hidden information derived from attributes.Therefore,when the weight of attributes is researched,it is necessary to consider weight from subjective and objective as-pects.First,a novel weight allocation method is proposed by combining the fuzzy analytical hierarchy process(FAHP)method and the criteria importance though intercrieria correlation(CRITIC)method.Second,based on the weight allocation method,the trustworthiness measurement models of component-based software are estab-lished according to the seven combination structures of components.Third,the model reasonability is verified via proving some metric criteria.Finally,a case is carried out.According to the comparison with other models,the result shows that the model has the advantage of utilizing hidden information fully and analyzing the com-bination of components effectively.It is an important guide for measuring the trustworthiness measurement of component-based software. 展开更多
关键词 trustworthiness WEIGHT component-based software MEASUREMENT
原文传递
Component-Based Software Trustworthiness Fuzzy Analytic Hierarchy Process Model
7
作者 石剑飞 闫怀志 +1 位作者 秦玮 王文同 《Journal of Beijing Institute of Technology》 EI CAS 2010年第2期170-176,共7页
For a more accurate and comprehensive assessment of the trustworthiness of component-based soft- ware system, the fuzzy analytic hierarchy process is introduced to establish the analysis model. Combine qualitative and... For a more accurate and comprehensive assessment of the trustworthiness of component-based soft- ware system, the fuzzy analytic hierarchy process is introduced to establish the analysis model. Combine qualitative and quantitative analyses, the impacts to overall trustworthiness by the different types of components are distinguished. Considering the coupling relationship between components, dividing the system into several layers from target layer to scheme layer, evaluating the scheme advantages disadvantages by group decision-making, the trustworthiness of a typical J2EE structured component-based software is assessed. The trustworthiness asses model of the software components provides an effective methods of operation. 展开更多
关键词 component-based software trustworthiness analysis fuzzy analytic hierarchy process J2EE structure
在线阅读 下载PDF
Hash Tree Based Trustworthiness Verification Mechanism in Virtual Environment
8
作者 ZHU Shuaishuai HAN Yiliang +1 位作者 YANG Xiaoyuan WEI Yuechuan 《China Communications》 SCIE CSCD 2016年第3期184-192,共9页
The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certifi... The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certificate agent, the cloud user generates a trust base and extends it to its VMs. For each service running on the VM, a hash value is generated from all the necessary modules, and these hash values are organized and maintained with a specially designed hash tree whose root is extended from the user's trust base. Before the VM loads a service, the hash tree is verified from the coordinated hash value to check the trustworthiness of the service. 展开更多
关键词 trustworthiness verification virtual environment hash tree virtual machine
在线阅读 下载PDF
Three trustworthiness challenges in large language model-based financial systems:real-world examples and mitigation strategies
9
作者 Shurui XU Feng LUO +2 位作者 Shuyan LI Mengzhen FAN Zhongtian SUN 《Frontiers of Information Technology & Electronic Engineering》 2025年第10期1871-1878,共8页
The integration of large language models(LLMs)into financial applications has demonstrated remarkable potential for enhancing decision-making processes,automating operations,and delivering personalized services.Howeve... The integration of large language models(LLMs)into financial applications has demonstrated remarkable potential for enhancing decision-making processes,automating operations,and delivering personalized services.However,the high-stakes nature of financial systems demands a very high level of trustworthiness that current LLMs often fail to meet. 展开更多
关键词 trustworthiness large language models llms real world examples financial systems financial applications large language models mitigation strategies delivering personalized serviceshoweverthe
原文传递
Complexity of software trustworthiness and its dynamical statistical analysis methods 被引量:11
10
作者 ZHENG ZhiMing MA ShiLong +4 位作者 LI Wei JIANG Xin WEI Wei MA LiLi TANG ShaoTing 《Science in China(Series F)》 2009年第9期1651-1657,共7页
Developing trusted softwares has become an important trend and a natural choice in the development of software technology and applications. At present, the method of measurement and assessment of software trustworthin... Developing trusted softwares has become an important trend and a natural choice in the development of software technology and applications. At present, the method of measurement and assessment of software trustworthiness cannot guarantee safe and reliable operations of software systems completely and effectively. Based on the dynamical system study, this paper interprets the characteristics of be- haviors of software systems and the basic scientific problems of software trustworthiness complexity, analyzes the characteristics of complexity of software trustworthiness, and proposes to study the soft- ware trustworthiness measurement in terms of the complexity of software trustworthiness. Using the dynamical statistical analysis methods, the paper advances an invariant-measure based assessment method of software trustworthiness by statistical indices, and hereby provides a dynamical criterion for the untrustworthiness of software systems. By an example, the feasibility of the proposed dynamical statistical analysis method in software trustworthiness measurement is demonstrated using numerical simulations and theoretical analysis. 展开更多
关键词 software trustworthiness trustworthiness attributes dynamical system invariant-measure
原文传递
Dynamical characteristics of software trustworthiness and their evolutionary complexity 被引量:8
11
作者 ZHENG ZhiMing MA ShiLong +4 位作者 LI Wei WEI Wei JIANG Xin ZHANG ZhanLi GUO BingHui 《Science in China(Series F)》 2009年第8期1328-1334,共7页
Developing trusted softwares has become an important trend and a natural choice in the development of software technology and applications, and software trustworthiness modeling has become a prerequisite and necessary... Developing trusted softwares has become an important trend and a natural choice in the development of software technology and applications, and software trustworthiness modeling has become a prerequisite and necessary means. To discuss and explain the basic scientific problems in software trustworthiness and to establish theoretical foundations for software trustworthiness measurement, combining the ideas of dynamical system study, this paper studies evolutionary laws of software trustworthiness and the dynamical mechanism under the effect of various internal and external factors, and proposes dynamical models for software trustworthiness, thus, software trustworthiness can be considered as the statistical characteristics of behaviors of software systems in the dynamical and open environment. By analyzing two simple examples, the paper explains the relationship between the limit evolutionary behaviors of software trustworthiness attributes and dynamical system characteristics, and interprets the dynamical characteristics of software trustworthiness and their evolutionary complexity. 展开更多
关键词 software trustworthiness trustworthiness attributes evolutionary complexity dynamical system
原文传递
Optimized Deep Learning Framework for Robust Detection of GAN-Induced Hallucinations in Medical Imaging
12
作者 Jarrar Amjad Muhammad Zaheer Sajid +5 位作者 Mudassir Khalil Ayman Youssef Muhammad Fareed Hamid Imran Qureshi Haya Aldossary Qaisar Abbas 《Computer Modeling in Engineering & Sciences》 2026年第2期1185-1213,共29页
Generative Adversarial Networks(GANs)have become valuable tools in medical imaging,enabling realistic image synthesis for enhancement,augmentation,and restoration.However,their integration into clinical workflows rais... Generative Adversarial Networks(GANs)have become valuable tools in medical imaging,enabling realistic image synthesis for enhancement,augmentation,and restoration.However,their integration into clinical workflows raises concerns,particularly the risk of subtle distortions or hallucinations that may undermine diagnostic accuracy and weaken trust in AI-assisted decision-making.To address this challenge,we propose a hybrid deep learning framework designed to detect GAN-induced artifacts in medical images,thereby reinforcing the reliability of AI-driven diagnostics.The framework integrates low-level statistical descriptors,including high-frequency residuals and Gray-Level Co-occurrence Matrix(GLCM)texture features,with high-level semantic representations extracted from a pre-trained ResNet18.This dual-stream approach enables detection of both pixel-level anomalies and structural inconsistencies introduced by GAN-based manipulation.We validated the framework on a curated dataset of 10,000 medical images,evenly split between authentic and GAN-generated samples across four modalities:MRI,CT,X-ray,and fundus photography.To improve generalizability to real-world clinical settings,we incorporated domain adaptation strategies such as adversarial training and style transfer,reducing domain shift by 15%.Experimental results demonstrate robust performance,achieving 92.6%accuracy and an F1-score of 0.91 on synthetic test data,and maintaining strong performance on real-world GAN-modified images with 87.3%accuracy and an F1-score of 0.85.Additionally,the model attained an AUC of 0.96 and an average precision of 0.92,outperforming conventional GAN detection pipelines and baseline Convolutional Neural Network(CNN)architectures.These findings establish the proposed framework as an effective and reliable solution for detecting GAN-induced hallucinations in medical imaging,representing an important step toward building trustworthy and clinically deployable AI systems. 展开更多
关键词 GAN-induced hallucinations medical image detection AI-driven diagnostics domain adaptation synthetic medical images GAN artifacts trustworthiness in AI
在线阅读 下载PDF
Explainable Ensemble Learning Framework for Early Detection of Autism Spectrum Disorder:Enhancing Trust,Interpretability and Reliability in AI-Driven Healthcare
13
作者 Menwa Alshammeri Noshina Tariq +2 位作者 NZ Jhanji Mamoona Humayun Muhammad Attique Khan 《Computer Modeling in Engineering & Sciences》 2026年第1期1233-1265,共33页
Artificial Intelligence(AI)is changing healthcare by helping with diagnosis.However,for doctors to trust AI tools,they need to be both accurate and easy to understand.In this study,we created a new machine learning sy... Artificial Intelligence(AI)is changing healthcare by helping with diagnosis.However,for doctors to trust AI tools,they need to be both accurate and easy to understand.In this study,we created a new machine learning system for the early detection of Autism Spectrum Disorder(ASD)in children.Our main goal was to build a model that is not only good at predicting ASD but also clear in its reasoning.For this,we combined several different models,including Random Forest,XGBoost,and Neural Networks,into a single,more powerful framework.We used two different types of datasets:(i)a standard behavioral dataset and(ii)a more complex multimodal dataset with images,audio,and physiological information.The datasets were carefully preprocessed for missing values,redundant features,and dataset imbalance to ensure fair learning.The results outperformed the state-of-the-art with a Regularized Neural Network,achieving 97.6%accuracy on behavioral data.Whereas,on the multimodal data,the accuracy is 98.2%.Other models also did well with accuracies consistently above 96%.We also used SHAP and LIME on a behavioral dataset for models’explainability. 展开更多
关键词 Autism spectrum disorder(ASD) artificial intelligence in healthcare explainable AI(XAI) ensemble learning machine learning early diagnosis model interpretability SHAP LIME predictive analytics ethical AI healthcare trustworthiness
在线阅读 下载PDF
Research on Network Architecture with Trustworthiness and Controllability 被引量:11
14
作者 林闯 彭雪海 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第5期732-739,共8页
In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and su... In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed. 展开更多
关键词 network architecture trustworthiness SECURITY CONTROLLABILITY cross layer
原文传递
Trustworthiness of Internet-based software 被引量:27
15
作者 WANG Huaimin TANG Yangbin YIN Gang LI Lei 《Science in China(Series F)》 2006年第6期759-773,共15页
Recent years see an increasing concern over the trustworthiness of Internet-based software. By analyzing the trustworthiness of Internet-based software and the nature of the Internet applications, we point out that, o... Recent years see an increasing concern over the trustworthiness of Internet-based software. By analyzing the trustworthiness of Internet-based software and the nature of the Internet applications, we point out that, on the one hand, due to the openness and dynamic nature of the Internet, the identity trustworthiness and the capability trustworthiness of the software are facing serious challenges; on the other hand, in order to ensure the trustworthiness of the whole system, emerging computing paradigms based on the collaboration of autonomous software need some impacts on the behavior of the software. Here we put forward a conceptual model for the trustworthiness of Internet-based software, and propose a trustworthy assurance framework for Internet-based virtual computing environment (iVCE). This framework deals with the trustworthy properties of software on identity, capability and behavior in a combinated way. The authorization management in inter-domain computing environment, assurance on high availability of service and incentive mechanism for autonomic collaboration are taken as three core mechanisms of iVCE trustworthy assurance. 展开更多
关键词 INTERNET SOFTWARE trustworthiness iVCE.
原文传递
A Unified Measurement Solution of Software Trustworthiness Based on Social-to-Software Framework 被引量:1
16
作者 Xi Yang Gul Jabeen +2 位作者 Ping Luo Xiao-Ling Zhu Mei-Hua Liu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第3期603-620,共18页
As trust becomes increasingly important in software domain,software trustworthiness--as a complex high-composite concept,has developed into a big challenge people have to face,especially in the current open,dynamic an... As trust becomes increasingly important in software domain,software trustworthiness--as a complex high-composite concept,has developed into a big challenge people have to face,especially in the current open,dynamic and ever-changing Internet environment.Furthermore,how to recognize and define trust problem from its nature and how to measure software trustworthiness correctly and effectively play a key role in improving users'trust in choosing software.Based on trust theory in the field of humanities and sociology,this paper proposes a measurable S2S(Social-to-Software)software trustworthiness framework,introduces a generalized indicator loss to unify three parts of trustworthiness result,and presents a whole metric solution for software trustworthiness,including the advanced J-M model based on power function and time-loss rate for ability trustworthiness measurement,the fuzzy comprehensive evaluation advanced-model considering effect of multiple short boards for basic standard trustworthiness,and the identity trustworthiness measurement method based on the code homology detecting tools.Finally,it provides a case study to verify that the solution is applicable and effective. 展开更多
关键词 software trustworthiness measurement solution LOSS social-to-software(S2S)framework generalized indicator
原文传递
The Transparency Revolution in Geohazard Science:A Systematic Review and Research Roadmap for Explainable Artificial Intelligence
17
作者 Moein Tosan Vahid Nourani +5 位作者 Ozgur Kisi Yongqiang Zhang Sameh A.Kantoush Mekonnen Gebremichael Ruhollah Taghizadeh-Mehrjardi Jinhui Jeanne Huang 《Computer Modeling in Engineering & Sciences》 2026年第1期77-117,共41页
The integration of machine learning(ML)into geohazard assessment has successfully instigated a paradigm shift,leading to the production of models that possess a level of predictive accuracy previously considered unatt... The integration of machine learning(ML)into geohazard assessment has successfully instigated a paradigm shift,leading to the production of models that possess a level of predictive accuracy previously considered unattainable.However,the black-box nature of these systems presents a significant barrier,hindering their operational adoption,regulatory approval,and full scientific validation.This paper provides a systematic review and synthesis of the emerging field of explainable artificial intelligence(XAI)as applied to geohazard science(GeoXAI),a domain that aims to resolve the long-standing trade-off between model performance and interpretability.A rigorous synthesis of 87 foundational studies is used to map the intellectual and methodological contours of this rapidly expanding field.The analysis reveals that current research efforts are concentrated predominantly on landslide and flood assessment.Methodologically,tree-based ensembles and deep learning models dominate the literature,with SHapley Additive exPlanations(SHAP)frequently adopted as the principal post-hoc explanation technique.More importantly,the review further documents how the role of XAI has shifted:rather than being used solely as a tool for interpreting models after training,it is increasingly integrated into the modeling cycle itself.Recent applications include its use in feature selection,adaptive sampling strategies,and model evaluation.The evidence also shows that GeoXAI extends beyond producing feature rankings.It reveals nonlinear thresholds and interaction effects that generate deeper mechanistic insights into hazard processes and mechanisms.Nevertheless,several key challenges remain unresolved within the field.These persistent issues are especially pronounced when considering the crucial necessity for interpretation stability,the demanding scholarly task of reliably distinguishing correlation from causation,and the development of appropriate methods for the treatment of complex spatio-temporal dynamics. 展开更多
关键词 Explainable artificial intelligence(XAI) geohazard assessment machine learning SHAP trustworthy AI model interpretability
在线阅读 下载PDF
A Novel Reliable and Trust Objective Function for RPL-Based IoT Routing Protocol
18
作者 Mariam A.Alotaibi Sami S.Alwakeel Aasem N.Alyahya 《Computers, Materials & Continua》 2025年第2期3467-3497,共31页
The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the... The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the selection of appropriate routing protocols, which is crucial for maintaining high Quality of Service (QoS). The Internet Engineering Task Force’s Routing Over Low Power and Lossy Networks (IETF ROLL) working group developed the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) to meet these needs. While the initial RPL standard focused on single-metric route selection, ongoing research explores enhancing RPL by incorporating multiple routing metrics and developing new Objective Functions (OFs). This paper introduces a novel Objective Function (OF), the Reliable and Secure Objective Function (RSOF), designed to enhance the reliability and trustworthiness of parent selection at both the node and link levels within IoT and RPL routing protocols. The RSOF employs an adaptive parent node selection mechanism that incorporates multiple metrics, including Residual Energy (RE), Expected Transmission Count (ETX), Extended RPL Node Trustworthiness (ERNT), and a novel metric that measures node failure rate (NFR). In this mechanism, nodes with a high NFR are excluded from the parent selection process to improve network reliability and stability. The proposed RSOF was evaluated using random and grid topologies in the Cooja Simulator, with tests conducted across small, medium, and large-scale networks to examine the impact of varying node densities. The simulation results indicate a significant improvement in network performance, particularly in terms of average latency, packet acknowledgment ratio (PAR), packet delivery ratio (PDR), and Control Message Overhead (CMO), compared to the standard Minimum Rank with Hysteresis Objective Function (MRHOF). 展开更多
关键词 IOT LLNs RPL objective function OF MRHOF OF0 routing metrics RELIABILITY trustworthiness
在线阅读 下载PDF
CEO political orientation and loan contract
19
作者 Chune Young Chung Changhwan Choi Do Thi Thanh Nhan 《Financial Innovation》 2025年第1期333-368,共36页
Banks rely on soft information when assessing loan applications,making it crucial to evaluate the trustworthiness of potential borrowers in order to set loan conditions,even in a legal environment where contractual ri... Banks rely on soft information when assessing loan applications,making it crucial to evaluate the trustworthiness of potential borrowers in order to set loan conditions,even in a legal environment where contractual rights are straightforwardly enforced.Given the common belief that certain personality traits—such as trustworthiness,reliability,loyalty,thriftiness,and stinginess—are more often linked to conservatives(Republicans)than to liberals(Democrats),we investigate whether companies with conservative chief executive officers(CEOs)secure more advantageous loan terms compared to others.Our findings indicate that firms with conservative CEOs are able to negotiate bank loans with lower interest spreads and upfront fees.While we do not observe a direct impact of CEO overconfidence on loan pricing,we reveal that the combined influence of CEO conservatism and overconfidence contributes to our primary findings.Additionally,we discovered that conservative CEOs tend to receive more favorable non-price conditions(fewer covenants)and are less inclined to offer collateral. 展开更多
关键词 CEO characteristics Conservative CEO trustworthiness Loan contract
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部