Modeling for Reputation Computing Research Base on C2C Communities

2015 ◽  
Vol 740 ◽  
pp. 839-842
Author(s):  
Xin Kao Liao ◽  
Li Sheng Wang ◽  
Ke Te Wang ◽  
Xiao Jie Xu

Trust is part of the main problems in the development of C2C e-commerce. Calculating the value of reputation based on feedback rating is an effective way to create trust in e-commerce transactions. This paper proposes a computing model built on the reputation of e-commerce by introducing a feedback score, the transaction value, time, penalty factor and other parameters. Simulation results demonstrate that the model can effectively prevent the credibility of slander, reputation hype, reputation conspiracy and other issues.

2016 ◽  
Vol 23 (2) ◽  
pp. 232-240 ◽  
Author(s):  
Neda SHAHRARA ◽  
Tahir ÇELIK ◽  
Amir H. GANDOMI

Build-Operate-Transfer (BOT) contracts have been widely implemented in developing countries facing budget constraints. Analysing the expected variability in project viability requires extensive risk analysis. An objective analysis of various risk variables and their influence on a BOT project evaluation requires study and integration of many sce­narios into the concession terms, which is complicated and time-consuming. If the process of negotiating the financial parameters and uncertainties of a BOT project could be automated, this would be a milestone in objective decision-mak­ing from various stakeholders’ points of view. A soft computing model would let the user incorporate as many scenarios as could be provided. Extensive risk analysis could then be easily performed, leading to more accurate and dependable results. In this research, an artificial neural network model with correlation coefficient of 0.9064 has been used to model the relationship between important project parameters and risk variables. This information was extracted from sensitiv­ity analysis and Monte Carlo simulation results obtained from conventional spreadsheet data. The resulting consensus would yield to fair contractual agreements for both the government and the concession company.


Author(s):  
Wenting Wang ◽  
Haopeng Chen ◽  
Xi Chen

With the on-demand ability of cloud computing, the performance requirement of a cloud application can be satisfied by adding a certain amount of computing resources to or removing some from the application in response to the workload fluctuation. However, the problem of the availability of application influenced by VM-based physical relative locations during resource scaling process is a challenge and has not been widely discussed yet. In this paper, the authors present a novel availability-based computing model to describe availability attribute of one application in the hierarchical topology of clouds. Moreover, the authors propose an availability-aware scaling mechanism by performing both vertical and horizontal resizing to explore how and where to allocate computing resource. Simulation results indicate that our model captured the availability of cloud applications properly and the proposed dynamic scaling approach achieves the objectives of meeting availability demands and minimizing the total cost.


Author(s):  
Manxiang Yang ◽  
Baopeng Ye ◽  
Yuling Chen ◽  
Tao Li ◽  
Yixian Yang ◽  
...  

AbstractK-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are still some threats such as behavior deception and service swing, since utilizing distributed k-anonymity technology to construct an anonymous domain. More specifically, the coordinate of the honest node will be a leak if the malicious nodes submit wrong locations coordinate to take part in the domain construction process. Worse still, owing to service swing, the attacker increases the reputation illegally to deceive honest nodes again. To overcome those drawbacks, we propose a trusted de-swinging k-anonymity scheme for location privacy protection. Primarily, we introduce a de-swinging reputation evaluation method (DREM), which designs a penalty factor to curb swinging behavior. This method calculates the reputation from entity honesty degree, location information entropy, and service swing degree. Besides, based on our proposed DREM, a credible cloaking area is constructed to protect the location privacy of the requester. In the area, nodes can choose some nodes with a high reputation for completing the construction process of the anonymous domain. Finally, we design reputation contracts to calculate credit automatically based on smart contracts. The security analysis and simulation results indicate that our proposed scheme effectively resists malicious attacks, curbs the service swing, and encourages nodes to participate honestly in the construction of cloaking areas.


Agronomie ◽  
2002 ◽  
Vol 22 (4) ◽  
pp. 413-425 ◽  
Author(s):  
Matteo Balderacchi ◽  
Ghasam Alavi ◽  
Ettore Capri ◽  
Alberto Vicari ◽  
Cesare Accinelli ◽  
...  

2020 ◽  
Vol 64 (1-4) ◽  
pp. 1381-1389
Author(s):  
Dezhi Chen ◽  
Chengwu Diao ◽  
Zhiyu Feng ◽  
Shichong Zhang ◽  
Wenliang Zhao

In this paper, a novel dual-stator permanent magnet machine (DsPmSynM) with low cost and high torque density is designed. The winding part of the DsPmSynM adopts phase-group concentrated-coil windings, and the permanent magnets are arranged by spoke-type. Firstly, the winding structure reduces the amount of copper at the end of the winding. Secondly, the electromagnetic torque ripple of DsPmSynM is suppressed by reducing the cogging torque. Furthermore, the dynamic performance of DsPmSynM is studied. Finally, the experimental results are compared with the simulation results.


2020 ◽  
pp. 51-81
Author(s):  
D. P. Frolov

The transaction cost economics has accumulated a mass of dogmatic concepts and assertions that have acquired high stability under the influence of path dependence. These include the dogma about transaction costs as frictions, the dogma about the unproductiveness of transactions as a generator of losses, “Stigler—Coase” theorem and the logic of transaction cost minimization, and also the dogma about the priority of institutions providing low-cost transactions. The listed dogmas underlie the prevailing tradition of transactional analysis the frictional paradigm — which, in turn, is the foundation of neo-institutional theory. Therefore, the community of new institutionalists implicitly blocks attempts of a serious revision of this dogmatics. The purpose of the article is to substantiate a post-institutional (alternative to the dominant neo-institutional discourse) value-oriented perspective for the development of transactional studies based on rethinking and combining forgotten theoretical alternatives. Those are Commons’s theory of transactions, Wallis—North’s theory of transaction sector, theory of transaction benefits (T. Sandler, N. Komesar, T. Eggertsson) and Zajac—Olsen’s theory of transaction value. The article provides arguments and examples in favor of broader explanatory possibilities of value-oriented transactional analysis.


2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


Author(s):  
Alexander S. Lelekov ◽  
Anton V. Shiryaev

The work is devoted to modeling the growth of optically dense microalgae cultures in natural light. The basic model is based on the idea of the two-stage photoautotrophic growth of microalgae. It is shown that the increase in the intensity of sunlight in the first half of the day can be described by a linear equation. Analytical equations for the growth of biomass of microalgae and its macromolecular components are obtained. As the initial conditions, it is assumed that at the time of sunrise, the concentration of reserve biomass compounds is zero. The simulation results show that after sunrise, the growth of the microalgae culture is due only to an increase in the reserve part of the biomass, while the structural part practically does not change over six hours. Changes in the ratio of the reserve and structural parts of the biomass indicate a change in the biochemical composition of cells.


2007 ◽  
Vol 13 (4) ◽  
pp. 77-90 ◽  
Author(s):  
Ye.I. Grigorenko ◽  
◽  
S.A. Pazura ◽  
L.F. Chernogor ◽  
◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document