نتایج جستجو برای: keywords trust
تعداد نتایج: 2024769 فیلتر نتایج به سال:
This document gives formatting guidelines for authors preparing papers for publication in the International Journal of Emerging Technology and Advanced Engineering The authors must follow the instructions given in the document for the papers to be published. Keywords—Keyword are your own designated keyword which can be used for easy location of the manuscript using any search engines. It includ...
Keyword-based linked data information retrieval is an easy choice for general-purpose users, but the implementation of such an approach is a challenge because mere keywords do not hold semantic information. Some studies have incorporated templates in an effort to bridge this gap, but most such approaches have proven ineffective because of inefficient template management. Because linked data can...
The open nature of the peer-to-peer systems exposes them to malicious actions. Here in this paper we introdusing distributed algorithms that can enable peer to get the trustworthiness of other peers based on interactions of those peers in the past with other peers. The peers in the network are able of creating a trust network on their own proximity by the help of the local information it alread...
Introduction . Keywords, reflecting the main content of article, play an extremely important role in search for scientific papers databases. Together with title and abstract, keywords provide primary information about study. Selecting extracting effective is a time-consuming process, so its optimization requires further studying. Purpose. The article aimed at acquainting authors journal methods...
Acta Academica is an accredited, open access South African journal dedicated to scholarship in the humanities. The publishes independently refereed research articles It promotes perspectives of critical social theory and engagements with postcolonial post-developmental debates special references (Southern) Africa. thereby support scholarly work that examines how humanities twenty-first century ...
People have been using Social Network Sites (SNS) to communicate and make friends through online. Although SNS has been benefited its users in many ways, information privacy seemed to be overlooked. This study proposes a framework to examine users’ protective behaviour associated with information disclosure in SNS. The proposed framework was derived based on the Protection Motivation Theory and...
This paper is motivated by a desire to create a user friendly, technically flexible approach to cryptography. This approach can create a flexible design pattern that is useable under a wide variety of circumstances from broadcast media to existing network protocols. This is accomplished by designing a new, key piece of infrastructure used for cryptography key lookup. Once the key is obtained th...
This paper aimed to analyzed the factors influencing knowledge sharing. An integrative literature review was employed as a tool in analyzing step. Total twenty academic papers which concerned with knowledge sharing were chosen. Thirty five factors were mentioned in those literatures. As a result, five factors which were most mentioned in earlier literatures were chosen as a key success factors ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید