To see the other types of publications on this topic, follow the link: Dynamic Trust Scoring.

Journal articles on the topic 'Dynamic Trust Scoring'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 39 journal articles for your research on the topic 'Dynamic Trust Scoring.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Park, Ui Hyun, Jeong-hyeop Hong, Auk Kim, and Kyung Ho Son. "Endpoint Device Risk-Scoring Algorithm Proposal for Zero Trust." Electronics 12, no. 8 (2023): 1906. http://dx.doi.org/10.3390/electronics12081906.

Full text
Abstract:
The rapid expansion of remote work following the COVID-19 pandemic has necessitated the development of more robust and secure endpoint device security solutions. Companies have begun to adopt the zero trust security concept as an alternative to traditional network boundary security measures, which requires that every device and user be considered untrustworthy until proven otherwise. Despite the potential benefits of implementing zero trust, the stringent security measures can inadvertently lead to low availability by denying access to legitimate users or limiting their ability to access neces
APA, Harvard, Vancouver, ISO, and other styles
2

Parmar, Digvijay. "Dynamic Trust Score Explanation and Adjustment in Zero Trust Architecture Using Large Language Models." Journal of Artificial Intelligence Research 5, no. 1 (2025): 1–30. https://doi.org/10.5281/zenodo.15524788.

Full text
Abstract:
Dynamic trust scoring in ZTA enables frequent risk assessment using constant inputs from various security sources. Multiple data sources are combined to compute a continuously updated score reflecting the level of trust in a given access or transaction. The study utilizes explainable Large Language Models (LLMs) to generate comprehensible explanations for why trust levels are altered. The model leverages a RAM pipeline to consolidate diverse security signals, enhance them with contextual data, and generate human-readable justifications explaining trust score updates. The system associates the
APA, Harvard, Vancouver, ISO, and other styles
3

Chaoqun Kang, Chaoqun Kang, Erxia Li Chaoqun Kang, Dongxiao Liu Erxia Li, Xinhong You Dongxiao Liu, and Xiaoyong Li Xinhong You. "A Dynamic and Fine-Grained User Trust Evaluation Model for Micro-Segmentation Cloud Computing Environment." 電腦學刊 34, no. 4 (2023): 215–32. http://dx.doi.org/10.53106/199115992023083404019.

Full text
Abstract:
<p>With the diversity and complexity of user access behaviors in the “micro-segmentation” cloud computing environment, it is no longer possible to control unauthorized access of authorized users by only relying on user identity login authentication to control user access to cloud resources. The existing trust evaluation methods can not cope with the characteristics of “micro-isolated” cloud environment, which is characterized by high granularity of resources, increasing number of users’ access requests and rapid changes. Based on the zero
APA, Harvard, Vancouver, ISO, and other styles
4

Vinod, Veeramachaneni. "Integrating Zero Trust Principles into IAM for Enhanced Cloud Security." Recent Trends in Cloud Computing and Web Engineering 7, no. 1 (2024): 78–92. https://doi.org/10.5281/zenodo.14162091.

Full text
Abstract:
<em>This paper investigates the integration of Zero Trust principles into Identity and Access Management (IAM) frameworks to strengthen security in multi-cloud and hybrid cloud environments. Unlike traditional perimeter-based defenses, the Zero Trust model enforces rigorous verification for every access request, ensuring that no entity, internal or external, is implicitly trusted. Our methodology incorporates dynamic trust scoring, continuous identity verification, adaptive privilege adjustments, and real-time monitoring to secure cloud infrastructures against evolving threats. By employing a
APA, Harvard, Vancouver, ISO, and other styles
5

Synko, Anna. "The method of trust level of publications hosted in virtual communities." Scientific journal of the Ternopil national technical university 105, no. 1 (2022): 68–79. http://dx.doi.org/10.33108/visnyk_tntu2022.01.068.

Full text
Abstract:
The proposed model of data collection and analysis from thematic virtual communities using known information analysis techniques: scoring and parsing. Open communities were selected for the study, namely their architecture and main components: information content (title, description, posts, topics of the event) and audience (community members). To select relevant, informative, reliable publications, the scoring method is used which reflects the level of trust of the authors of the publication in the form of weighted indicators of a set of certain characteristics. Data collection is a combined
APA, Harvard, Vancouver, ISO, and other styles
6

Rani, Jyoti, Rushan Gupta, Sameer Kumar Singh, Manik Sood, and Kuldeep Kumar Chauhan. "Federated Learning-Based Authentication and Trust Scoring System for Cloud IoT Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 412–18. http://dx.doi.org/10.22214/ijraset.2024.65079.

Full text
Abstract:
Abstract: A number of IoT-related security challenges are faced due to the introduction of IoT devices in almost all sections, including smart homes and industrial applications. New security solutions will be required in IoT networks to tackle issues pertaining to privacy, scalability, and efficiency with solid robustness against potential vulnerabilities. Even though some occasions these are effective centralized security frameworks suffer from significant limitations, including single points of failure, increased latency, and risks associated with data centralization [1][2]. These problems w
APA, Harvard, Vancouver, ISO, and other styles
7

Samuel Amoateng, Omolola A. Akinola, Victor Ogechukwu Anuebunwa, and Jesudunsin O. Olaobaju. "Designing a zero-trust post-quantum encryption framework for adaptive end-to-end network security in dynamic threat environments." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 934–48. https://doi.org/10.30574/wjaets.2024.13.2.0629.

Full text
Abstract:
The advent of quantum computing poses a fundamental threat to classical encryption protocols, demanding urgent transformation in cybersecurity architectures. This study presents a U.S.-focused Zero-Trust Enabled Post-Quantum Encryption Framework (ZT-PQEF) designed to deliver adaptive end-to-end network security in dynamic threat environments. ZT-PQEF integrates NIST-standard post-quantum cryptographic algorithms (CRYSTALS-Kyber and Dilithium) with behavior-informed trust scoring, real-time key rotation, and telemetry-driven microsegmentation. A U.S. federal network simulation was used to bench
APA, Harvard, Vancouver, ISO, and other styles
8

Haridasan, Praveen Kotholliparambil. "The Salesforce Einstein Trust Layer for Retrieval-Augmented Generation (RAG) for Enterprise Applications." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–3. http://dx.doi.org/10.55041/ijsrem28465.

Full text
Abstract:
Generative AI has the potential to revolutionize the enterprise workflows to great extent but it poses privacy, security, and data governance challenges. Companies who want to utilize advanced AI models like Large Language Models, are only allowed to do so under the guidelines of security and regulatory frameworks. Salesforce Einstein Trust Layer proposes a solution to these challenges by not only setting up a trusted layer for deploying Retrieval-Augmented Generation (RAG) models but also ensures that the data privacy standards are met while delivering the AI generated responses. This paper d
APA, Harvard, Vancouver, ISO, and other styles
9

Anitha, 1. and Anirban Basu2. "NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD COMPUTING USING MULTI ATTRIBUTE QOS." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 6, February (2018): 01–14. https://doi.org/10.5281/zenodo.1413283.

Full text
Abstract:
Cloud collaboration is an emerging technology which enables sharing of computer files using cloud computing. Here the cloud resources are assembled and cloud services are provided using these resources. Cloud collaboration technologies are allowing users to share documents. Resource allocation in the cloud is challenging because resources offer different Quality of Service (QoS) and services running on these resources are risky for user demands. We propose a solution for resource allocation based on multi attribute QoS Scoring considering parameters such as distance to the resource from user s
APA, Harvard, Vancouver, ISO, and other styles
10

Dasu, Lalitha Sravanti, Mannav Dhamija, Gurram Dishitha, Ajith Vivekanandan, and V. Sarasvathi. "Defending Against Identity Threats Using Risk-Based Authentication." Cybernetics and Information Technologies 23, no. 2 (2023): 105–23. http://dx.doi.org/10.2478/cait-2023-0016.

Full text
Abstract:
Abstract Defending against identity-based threats, which have predominantly increased in the era of remote access and working, requires non-conventional, dynamic, intelligent, and strategic means of authenticating and authorizing. This paper aims at devising detailed risk-scoring algorithms for five real-time use cases to make identity security adaptive and risk-based. Zero-trust principles are incorporated by collecting sign-in logs and analyzing them continually to check for any anomalies, making it a dynamic approach. Users are categorized as risky and non-risky based on the calculated risk
APA, Harvard, Vancouver, ISO, and other styles
11

Segun Adanigbo, Oluwasanmi, Bolaji Iyanu Adekunle, Ejielo Ogbuefi, Oyejide Timothy Odofin, Oluwademilade Aderemi Agboola, and Denis Kisina. "Implementing Zero Trust Security in Multi-Cloud Microservices Platforms: A Review and Architectural Framework." International Journal of Advanced Multidisciplinary Research and Studies 4, no. 6 (2024): 2402–9. https://doi.org/10.62225/2583049x.2024.4.6.4357.

Full text
Abstract:
The widespread adoption of multi-cloud infrastructures and microservices architectures has redefined enterprise computing by enhancing scalability, modularity, and service delivery. However, this decentralization has also introduced expanded threat surfaces and complex security challenges that traditional perimeter-based models can no longer address effectively. This paper presents a comprehensive review and a proposed architectural framework for implementing Zero Trust Security (ZTS) in multi-cloud microservices environments. Beginning with a synthesis of existing literature and industry best
APA, Harvard, Vancouver, ISO, and other styles
12

Crocker-Buque, Tim, Jonathan Myles, Adam Brentnall, et al. "Using ISARIC 4C mortality score to predict dynamic changes in mortality risk in COVID-19 patients during hospital admission." PLOS ONE 17, no. 10 (2022): e0274158. http://dx.doi.org/10.1371/journal.pone.0274158.

Full text
Abstract:
As SARS-CoV-2 infections continue to cause hospital admissions around the world, there is a continued need to accurately assess those at highest risk of death to guide resource use and clinical management. The ISARIC 4C mortality score provides mortality risk prediction at admission to hospital based on demographic and physiological parameters. Here we evaluate dynamic use of the 4C score at different points following admission. Score components were extracted for 6,373 patients admitted to Barts Health NHS Trust hospitals between 1st August 2020 and 19th July 2021 and total score calculated e
APA, Harvard, Vancouver, ISO, and other styles
13

Balazon, Marlen W., Joanna Mae B. Iserio, Ralph Michael S. Bembo, and Ruissan A. Ramos. "Flexi: A Comprehensive Event Tabulation System for Pangasinan State University Alaminos City Campus." International Journal of Research and Innovation in Social Science IX, no. II (2025): 3444–48. https://doi.org/10.47772/ijriss.2025.9020268.

Full text
Abstract:
This paper evaluates the implementation and effectiveness of an event tabulator during festival activities at Pangasinan State University – Alaminos City Campus. Previously, event scoring relied on traditional pen-and-paper methods, which were slow, error-prone, and often led to dissatisfaction among participants. The manual process required extensive time for result computation and verification, frequently causing delays in announcing winners. These challenges were addressed through the integration of an event tabulator, a digital system designed to collate and process scores on the field. Wi
APA, Harvard, Vancouver, ISO, and other styles
14

Oluoha, Oluchukwu Modesta, Abisola Odeshina, Oluwatosin Reis, Friday Okpeke, Verlinda Attipoe, and Omamode Henry Orieno. "AI-Enabled Framework for Zero Trust Architecture and Continuous Access Governance in Security-Sensitive Organizations." International Journal of Social Science Exceptional Research 3, no. 1 (2024): 343–64. https://doi.org/10.54660/ijsser.2024.3.1.343-364.

Full text
Abstract:
In today’s increasingly complex cybersecurity landscape, traditional perimeter-based security models are no longer sufficient to protect sensitive data and systems. Security-sensitive organizations, such as those in finance, healthcare, and government, are facing heightened risks from insider threats, credential misuse, and sophisticated cyberattacks. This paper proposes an AI-enabled framework for implementing Zero Trust Architecture (ZTA) and Continuous Access Governance (CAG) to enhance identity and access management (IAM) and strengthen organizational security posture. The Zero Trust model
APA, Harvard, Vancouver, ISO, and other styles
15

Yadlapalli, Rakesh. "Technical Review: Cloud-Native Payment Processing Platform." European Journal of Computer Science and Information Technology 13, no. 50 (2025): 45–57. https://doi.org/10.37745/ejcsit.2013/vol13n504557.

Full text
Abstract:
The evolution of digital commerce has driven the transformation from traditional monolithic payment systems toward cloud-native architectures that deliver superior scalability, resilience, and operational efficiency. This technical review examines a comprehensive cloud-native payment processing platform designed to address the fundamental limitations of legacy payment infrastructure through distributed microservices architectures, containerization, and event-driven design patterns. The platform addresses critical business challenges, including transaction volume volatility, multi-channel payme
APA, Harvard, Vancouver, ISO, and other styles
16

Sri, Keerthi Suggu. "Shadows in the Supply Chain: Assessing Security Gaps in Third‑Party Dependencies." Journal of Scientific and Engineering Research 11, no. 11 (2024): 179–86. https://doi.org/10.5281/zenodo.15606825.

Full text
Abstract:
Modern software supply chains are dense, dynamic webs of third‑party packages, container layers, and infrastructure‑as‑code templates. While these dependencies super‑charge developer productivity, they also create &ldquo;shadow&rdquo; risk: latent vulnerabilities or malicious implants that may be several transitive hops away from any manifest file. In this paper we present the first cross‑ecosystem, end‑to‑end measurement of supply‑chain risk covering N = 1.1 million packages and 47,000 public CI/CD pipelines across JavaScript (npm), Python (PyPI) and Java (Maven Central). Our study reveals th
APA, Harvard, Vancouver, ISO, and other styles
17

Owoade, Samuel, Denis Kisina, Oluwasanmi Segun Adanigbo, Abel Chukwuemeke Uzoka, Andrew Ifesinachi Daraojimba, and Toluwase Peter Gbenle. "Advances in Access Control Systems Using Policy-Driven and Role-Based Authorization Models." International Journal of Management and Organizational Research 2, no. 2 (2023): 128–34. https://doi.org/10.54660/ijmor.2023.2.2.128-134.

Full text
Abstract:
This paper examines the evolution and advancements in access control systems, with a focus on policy-driven and role-based authorization models. As modern computing environments—such as cloud, IoT, and distributed systems—become increasingly complex, traditional access control mechanisms, including Discretionary Access Control (DAC), are proving inadequate. Role-Based Access Control (RBAC) has long been the cornerstone of secure access management, but as systems evolve, the limitations of RBAC become evident. To address these challenges, Policy-Based Access Control (PBAC) has emerged, offering
APA, Harvard, Vancouver, ISO, and other styles
18

Almatarneh, Rami, Mohammad Aljaidi, Ayoub Alsarhan, Sami Aziz Alshammari, Fahd Alhamazani, and Ahmed Badi Alshammari. "An integrated AI-blockchain framework for securing web applications, mitigating SQL injection, model poisoning, and IoT spoofing attacks." International Journal of Innovative Research and Scientific Studies 8, no. 3 (2025): 2759–73. https://doi.org/10.53894/ijirss.v8i3.7077.

Full text
Abstract:
The rapid evolution of Web 4.0, characterized by decentralized systems, real-time data processing, and AI-driven interfaces, presents serious security threats such as SQL injection (SQLi) attacks, adversarial model poisoning, and IoT device spoofing. This paper presents a unified AI-blockchain framework designed to address these vulnerabilities, incorporating bidirectional LSTM networks for SQLi detection, Trimmed Mean aggregation with a reputation system for model poisoning defense, and CNN-based IoT authentication anchored to a decentralized blockchain. Evaluated on the Bitcoin OTC trust net
APA, Harvard, Vancouver, ISO, and other styles
19

Petrosoniak, A., A. Gray, M. Fan, et al. "MP036: Trauma Resuscitation Using in-situ Simulation Team Training (TRUST): a novel approach to latent safety threat identification in trauma care." CJEM 18, S1 (2016): S78—S79. http://dx.doi.org/10.1017/cem.2016.177.

Full text
Abstract:
Introduction: Resuscitation of a trauma patient requires a multidisciplinary team to perform in a dynamic, high-stakes environment. Error is ubiquitous in trauma care, often related to latent safety threats (LSTs) - previously unrecognized threats that can materialize at any time. In-situ simulation (ISS) allows a team to practice in their authentic environment while providing an opportunistic milieu to explore critical events and uncover LSTs that impact patient safety. Methods: At a Canadian Level 1 trauma centre, regular, unannounced trauma ISSs were conducted and video-recorded. A retrospe
APA, Harvard, Vancouver, ISO, and other styles
20

Ejeofobiri, Chigozie Kingsley, Joy Ezinwanneamaka Ike, Mukhtar Dolapo Salawudeen, David Agyemfra Atakora, Joseph Darko Kessie, and Tolulope Onibokun. "Securing Cloud Databases Using AI and Attribute-Based Encryption." Journal of Frontiers in Multidisciplinary Research 6, no. 1 (2025): 39–47. https://doi.org/10.54660/.ijfmr.2025.6.1.39-47.

Full text
Abstract:
As cloud databases continue to gain widespread adoption, ensuring data security remains a critical challenge due to risks such as unauthorized access, data breaches, and insider threats. Traditional encryption techniques provide data confidentiality but lack the flexibility needed for dynamic and fine-grained access control. Attribute-Based Encryption (ABE) offers a robust solution by enabling access control based on user attributes rather than static roles, ensuring that only authorized users with matching attributes can decrypt sensitive data. This review explores the integration of Artifici
APA, Harvard, Vancouver, ISO, and other styles
21

Cornacchia, Giandomenico, Vito W. Anelli, Fedelucio Narducci, Azzurra Ragone, and Eugenio Di Sciascio. "A General Architecture for a Trustworthy Creditworthiness-Assessment Platform in the Financial Domain." Annals of Emerging Technologies in Computing 7, no. 2 (2023): 56–64. http://dx.doi.org/10.33166/aetic.2023.02.005.

Full text
Abstract:
The financial domain is making huge advancements thanks to the exploitation of artificial intelligence. As an example, the credit-worthiness-assessment task is now strongly based on Machine Learning algorithms that make decisions independently from humans. Several studies showed remarkable improvement in reliability, customer care, and return on investment. Nonetheless, many users remain sceptical since they perceive the whole as only partially transparent. The trust in the system decision, the guarantee of fairness in the decision-making process, the explanation of the reasons behind the deci
APA, Harvard, Vancouver, ISO, and other styles
22

Olawale, Habeeb Olatunji, Adegbola Oluwole Ogedengbe, Maxwell Nana Ameyaw, Temitayo Oluwaseun Jejeniwa, and Solomon Christopher Friday. "Standardizing Compliance Practices across AML, ESG, and Transaction Monitoring for Financial Institutions." Journal of Frontiers in Multidisciplinary Research 5, no. 2 (2024): 75–93. https://doi.org/10.54660/.jfmr.2024.5.2.75-93.

Full text
Abstract:
In today’s complex regulatory landscape, financial institutions face mounting pressure to standardize compliance practices across Anti-Money Laundering (AML), Environmental, Social, and Governance (ESG), and transaction monitoring frameworks. Fragmented compliance efforts often lead to operational inefficiencies, regulatory breaches, and reputational damage. This study proposes an integrated compliance standardization framework that unifies AML, ESG, and transaction monitoring through data-driven governance, cross-functional controls, and risk-based alignment. The goal is to develop a cohesive
APA, Harvard, Vancouver, ISO, and other styles
23

Oluwatosin Abdul-Azeez, Alexsandra Ogadimma Ihechere, and Courage Idemudia. "Promoting financial inclusion for SMEs: Leveraging AI and data analytics in the banking sector." International Journal of Multidisciplinary Research Updates 8, no. 1 (2024): 001–14. http://dx.doi.org/10.53430/ijmru.2024.8.1.0037.

Full text
Abstract:
Financial inclusion is crucial for the growth and sustainability of small and medium-sized enterprises (SMEs), which are significant contributors to economic development and job creation. However, traditional banking models often fall short in serving the unique needs of SMEs due to perceived high risks and insufficient credit history. Leveraging artificial intelligence (AI) and data analytics, the banking sector can transform its approach to financial inclusion, offering tailored financial products and services that cater specifically to SMEs. AI and data analytics enable banks to analyze vas
APA, Harvard, Vancouver, ISO, and other styles
24

Ugbaja, Unomah Success, Uloma Stella Nwabekee, Wilfred Oseremen Owobu, and Olumese Anthony Abieba. "Revolutionizing Sales Strategies through AI-Driven Customer Insights, Market Intelligence, and Automated Engagement Tools." International Journal of Social Science Exceptional Research 2, no. 1 (2023): 193–210. https://doi.org/10.54660/ijsser.2023.2.1.193-210.

Full text
Abstract:
The rapid evolution of artificial intelligence (AI) is reshaping sales strategies by enabling data-driven decision-making, predictive analytics, and automated customer engagement. This paper explores how AI-driven customer insights, market intelligence, and automated engagement tools are transforming sales operations, optimizing customer interactions, and enhancing revenue generation. AI-powered analytics provide a deeper understanding of customer behavior, preferences, and purchasing patterns, allowing businesses to tailor their sales strategies to meet evolving demands. Market intelligence,
APA, Harvard, Vancouver, ISO, and other styles
25

Anwulika Ogechukwu Scott, Prisca Amajuoyi, and Kudirat Bukola Adeusi. "Advanced risk management solutions for mitigating credit risk in financial operations." Magna Scientia Advanced Research and Reviews 12, no. 1 (2024): 212–23. http://dx.doi.org/10.30574/msarr.2024.11.1.0085.

Full text
Abstract:
Advanced risk management solutions are essential for mitigating credit risk in financial operations, particularly in today's volatile economic environment. This Review explores the innovative approaches and technologies being utilized to enhance credit risk management and safeguard financial institutions against potential losses. Credit risk, the possibility that a borrower will default on their obligations, poses a significant threat to financial stability. Traditional methods of assessing and managing credit risk, such as credit scoring and historical data analysis, are no longer sufficient
APA, Harvard, Vancouver, ISO, and other styles
26

Strilok, Ivanna, Viktoriia Shkliar, and Mykola Ilinov. "ANALYSIS OF THE COMPETITIVENESS OF INTERNATIONAL COMPANIES BASED ON THE USE OF ANALYTICAL SYSTEMS." Collection of scientific research papers State University of Infrastructure and Technologies Section “Economics and Management”, no. 57 (April 10, 2025): 65–77. https://doi.org/10.32703/2664-2964-2025-57-65-77.

Full text
Abstract:
n today's globalized world, with increased competition and uncertainty caused by the war, the issue of ensuring and maintaining the competitiveness of international business is of particular importance. The rapid development of digital technologies is transforming approaches to strategic planning and analysis of companies' market positions. Traditional methods of economic analysis are gradually losing their dominance, giving way to information analytical systems capable of providing a multi-level, comprehensive, verified and timely assessment of the market position of a business entity. These
APA, Harvard, Vancouver, ISO, and other styles
27

Adesiyan Taiwo Fausiyat. "Assessing digital market access and mobile finance tools in boosting agribusiness growth among rural farming communities." World Journal of Advanced Research and Reviews 27, no. 1 (2025): 659–76. https://doi.org/10.30574/wjarr.2025.27.1.2579.

Full text
Abstract:
Rural agribusinesses in developing regions remain constrained by limited access to traditional financial services, fragmented supply chains, and exclusion from lucrative urban and international markets. This paper investigates how digital market access platforms and mobile financial technologies are transforming agribusiness productivity, efficiency, and sustainability in rural farming communities. The emergence of mobile finance tools such as digital wallets, mobile credit scoring, and blockchain-enabled payment systems has enabled farmers to overcome credit inaccessibility and reduced relian
APA, Harvard, Vancouver, ISO, and other styles
28

Inggrida, Jedda, Fadli Mulyadi, and Septian Purnama. "Rural Social Capital in Organic Farmer Institutions in Rice Organic Farming." HABITAT 34, no. 2 (2023): 190–202. http://dx.doi.org/10.21776/ub.habitat.2023.034.2.17.

Full text
Abstract:
Social capital is one of the seven fundamental capitals provided to groups or communities. Social capital is used to facilitate interpersonal interactions within a community or group. But nonetheless, only a small number of particular farmer groups, like the Sekar Putih Farming Group, have adopted organic farming methods to produce organic rice. One of the innovators and leaders in the production of organic rice is the Sekar Putih Farmer Group, who interpret the need for cohesiveness in interpersonal relationships. In theory, farmer groups are created because of the members' shared vision, mis
APA, Harvard, Vancouver, ISO, and other styles
29

Powers, Jack, James M. McGree, David Grieve, Ratna Aseervatham, Suzanne Ryan, and Paul Corry. "Managing surgical waiting lists through dynamic priority scoring." Health Care Management Science, June 28, 2023. http://dx.doi.org/10.1007/s10729-023-09648-1.

Full text
Abstract:
AbstractPrioritising elective surgery patients under the Australian three-category system is inherently subjective due to variability in clinician decision making and the potential for extraneous factors to influence category assignment. As a result, waiting time inequities can exist which may lead to adverse health outcomes and increased morbidity, especially for patients deemed to be low priority. This study investigated the use of a dynamic priority scoring (DPS) system to rank elective surgery patients more equitably, based on a combination of waiting time and clinical factors. Such a syst
APA, Harvard, Vancouver, ISO, and other styles
30

Anitha and Basu Anirban. "Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud Computing Using Multi Attribute QOS." February 29, 2016. https://doi.org/10.5121/ijccsa.2016.6102.

Full text
Abstract:
Cloud collaboration is an emerging technology which enables sharing of computer files using cloud computing. Here the cloud resources are assembled and cloud services are provided using these resources. Cloud collaboration technologies are allowing users to share documents. Resource allocation in the cloud is challenging because resources offer different Quality of Service (QoS) and services running on these resources are risky for user demands. We propose a solution for resource allocation based on multi attribute QoS Scoring considering parameters such as distance to the resource from user s
APA, Harvard, Vancouver, ISO, and other styles
31

Puppala, Naga Sravanthi. "Mitigating Malicious Activities in Blockchain Mining: The Role of Reputation‐Based Protocol." SECURITY AND PRIVACY 8, no. 4 (2025). https://doi.org/10.1002/spy2.70052.

Full text
Abstract:
ABSTRACTThe rise of mining pools in Blockchain networks has improved reward distribution but introduced critical challenges related to centralization and malicious miner activity, which threaten the integrity of decentralized consensus. Addressing this gap, this paper proposes the Reputation‐based Consensus Protocol (RCP), a novel framework designed to enhance trust and security in mining pools by incorporating a transparent and dynamic reputation system. Unlike traditional consensus algorithms like Proof of Work (PoW) and Proof of Stake (PoS), which do not differentiate between trustworthy an
APA, Harvard, Vancouver, ISO, and other styles
32

Gonem, Sherif, Adam Taylor, Grazziela Figueredo, et al. "Dynamic early warning scores for predicting clinical deterioration in patients with respiratory disease." Respiratory Research 23, no. 1 (2022). http://dx.doi.org/10.1186/s12931-022-02130-6.

Full text
Abstract:
Abstract Background The National Early Warning Score-2 (NEWS-2) is used to detect patient deterioration in UK hospitals but fails to take account of the detailed granularity or temporal trends in clinical observations. We used data-driven methods to develop dynamic early warning scores (DEWS) to address these deficiencies, and tested their accuracy in patients with respiratory disease for predicting (1) death or intensive care unit admission, occurring within 24 h (D/ICU), and (2) clinically significant deterioration requiring urgent intervention, occurring within 4 h (CSD). Methods Clinical o
APA, Harvard, Vancouver, ISO, and other styles
33

Lin, Ying-Jen, Allison Ranusch, F. Jacob Seagull, Jeremy B. Sussman, and Geoffrey D. Barnes. "Dynamic interplay between available resources and implementation climate across phases of implementation: a qualitative study of a VA national population health tool." Implementation Science Communications 4, no. 1 (2023). http://dx.doi.org/10.1186/s43058-023-00460-0.

Full text
Abstract:
Abstract Background Available resources within an organization can determine the implementation success of an intervention. However, few studies have investigated how the required resources change over the phases of implementation. Using stakeholder interviews, we examined the changes in and interactions between available resources and implementation climate in the implementation and sustainment phases of a national implementation effort for a population health tool. Methods We conducted a secondary analysis of the interviews with 20 anticoagulation professionals at 17 clinical sites in the Ve
APA, Harvard, Vancouver, ISO, and other styles
34

Rajashree, Jadhav, and A. Patil G. "Automated Personal Finance Manager Using Artificial Intelligence and Machine Learning: A Survey." June 7, 2025. https://doi.org/10.5281/zenodo.15201080.

Full text
Abstract:
The advent of Artificial Intelligence (AI) and Machine Learning (ML) can greatly enhance&nbsp;personal finance by enabling automation in expense tracking, budgeting, and investment planning.&nbsp;The manual effort associated with financial management methods ranging from accounting,&nbsp;budgeting, forecasting to high-level financial analysis is time-consuming, error-prone, and lacks&nbsp;superior forecasting ability. Automated personal finance assistants make use of automation, data&nbsp;analysis, and real-time insights to enable more effective spending decisions. They utilize NLP, deep&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
35

-, Burhan, Nurwidyayanti -, Andi Agusniati -, Baharuddin -, and Andi Irwandi -. "A Case Study of Student Admission Management in Elementary Schools in Makassar: Transparency and Innovation." International Journal For Multidisciplinary Research 6, no. 6 (2024). https://doi.org/10.36948/ijfmr.2024.v06i06.34139.

Full text
Abstract:
This study explores the dynamics of student admission management in elementary schools, with a particular emphasis on transparency and innovation. Employing a qualitative case study approach, structured interviews were conducted with 15 elementary school headmasters in Makassar to gain insights into their practices and perspectives. The findings highlight three key themes: transparent communication, fair and inclusive practices, and the transformative role of technology. Transparent communication strategies, such as online registration systems, public information sessions, and detailed scoring
APA, Harvard, Vancouver, ISO, and other styles
36

Kateb, Ines, and Mouna Youssef. "Sustainability reporting quality: understanding board characteristics, CSR committees and moderation dynamics in Saudi Arabia." Social Responsibility Journal, March 17, 2025. https://doi.org/10.1108/srj-03-2024-0160.

Full text
Abstract:
Purpose This paper aims to investigate the impact of board characteristics on corporate social responsibility (CSR)/sustainability reporting quality in Saudi Arabia, with a particular emphasis on how CSR committees moderate this relationship. Design/methodology/approach This study analyzes data from 75 firms listed on the Saudi Stock Exchange from 2013 to 2020. The CSR/sustainability reporting quality is assessed using a scoring system ranging from 0 to 2. An interaction analysis is conducted using Panel Ordered Logit Regression to examine the moderating effect of CSR committees on the relatio
APA, Harvard, Vancouver, ISO, and other styles
37

Mr.Ashok, kumar Baldev bhai Prajapati. "Artificially Intelligent in Education: "Redefining Learning in the 21st Century"." Artificially Intelligent in Education: "Redefining Learning in the 21st Century" 7, no. 2 (2024). https://doi.org/10.5281/zenodo.12818287.

Full text
Abstract:
<strong>Abstract: </strong> The educational landscape of the 21st century is undergoing a transformative shift, primarily driven by the integration of artificial intelligence (AI) into learning environments. This paradigm shift, referred to as Artificially Intelligent Education, promises to redefine the traditional methodologies and approaches that have long characterized educational systems worldwide. At the core of this transformation is the capability of AI to provide personalized learning experiences, automate administrative tasks, and offer deep insights into student learning behaviours a
APA, Harvard, Vancouver, ISO, and other styles
38

Fredericks, Bronwyn, and Abraham Bradfield. "‘More than a Thought Bubble…’." M/C Journal 24, no. 1 (2021). http://dx.doi.org/10.5204/mcj.2738.

Full text
Abstract:
Introduction In 2017, 250 Indigenous delegates from across the country convened at the National Constitution Convention at Uluru to discuss a strategy towards the implementation of constitutional reform and recognition of Aboriginal and Torres Strait Islander peoples (Referendum Council). Informed by community consultations arising out of 12 regional dialogues conducted by the government appointed Referendum Council, the resulting Uluru Statement from the Heart was unlike any constitutional reform previously proposed (Appleby &amp; Synot). Within the Statement, the delegation outlined that to
APA, Harvard, Vancouver, ISO, and other styles
39

Lohmeier, Christine. "Disclosing the Ethnographic Self." M/C Journal 12, no. 5 (2009). http://dx.doi.org/10.5204/mcj.195.

Full text
Abstract:
We are our own subjects. How our subjectivity becomes entangled in the lives of others is and has always been our topic. (Denzin 27)This article reflects on the process of disclosing the ethnographic self, particularly in relation to the use of e-mails and social networking sites, such as Facebook. Previous work has examined virtual ethnography as the main research method or its place within a mixed method approach (Orgad; Hine, Virtual Ethnography; Fay; Greschke). My focus lies on the voluntary and involuntary intertwining of physical ethnographic work (i.e. going to a specific location to im
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!