scholarly journals SCTIM: A Trusted Identity Model Based On Smart Contract

2021 ◽  
Vol 2037 (1) ◽  
pp. 012093
Author(s):  
Junze Xu ◽  
Danwei Chen
2021 ◽  
pp. 1-17
Author(s):  
Fátima Leal ◽  
Bruno Veloso ◽  
Benedita Malheiro ◽  
Juan Carlos Burguillo ◽  
Adriana E. Chis ◽  
...  

Explainable recommendations enable users to understand why certain items are suggested and, ultimately, nurture system transparency, trustworthiness, and confidence. Large crowdsourcing recommendation systems ought to crucially promote authenticity and transparency of recommendations. To address such challenge, this paper proposes the use of stream-based explainable recommendations via blockchain profiling. Our contribution relies on chained historical data to improve the quality and transparency of online collaborative recommendation filters – Memory-based and Model-based – using, as use cases, data streamed from two large tourism crowdsourcing platforms, namely Expedia and TripAdvisor. Building historical trust-based models of raters, our method is implemented as an external module and integrated with the collaborative filter through a post-recommendation component. The inter-user trust profiling history, traceability and authenticity are ensured by blockchain, since these profiles are stored as a smart contract in a private Ethereum network. Our empirical evaluation with HotelExpedia and Tripadvisor has consistently shown the positive impact of blockchain-based profiling on the quality (measured as recall) and transparency (determined via explanations) of recommendations.


2021 ◽  
Vol 12 (03) ◽  
pp. 136-150
Author(s):  
Noorah Rashed Al Hamrani ◽  
Aysha Rashed Al Hamrani

2020 ◽  
Vol 43 ◽  
Author(s):  
Peter Dayan

Abstract Bayesian decision theory provides a simple formal elucidation of some of the ways that representation and representational abstraction are involved with, and exploit, both prediction and its rather distant cousin, predictive coding. Both model-free and model-based methods are involved.


2001 ◽  
Vol 7 (S2) ◽  
pp. 578-579
Author(s):  
David W. Knowles ◽  
Sophie A. Lelièvre ◽  
Carlos Ortiz de Solόrzano ◽  
Stephen J. Lockett ◽  
Mina J. Bissell ◽  
...  

The extracellular matrix (ECM) plays a critical role in directing cell behaviour and morphogenesis by regulating gene expression and nuclear organization. Using non-malignant (S1) human mammary epithelial cells (HMECs), it was previously shown that ECM-induced morphogenesis is accompanied by the redistribution of nuclear mitotic apparatus (NuMA) protein from a diffuse pattern in proliferating cells, to a multi-focal pattern as HMECs growth arrested and completed morphogenesis . A process taking 10 to 14 days.To further investigate the link between NuMA distribution and the growth stage of HMECs, we have investigated the distribution of NuMA in non-malignant S1 cells and their malignant, T4, counter-part using a novel model-based image analysis technique. This technique, based on a multi-scale Gaussian blur analysis (Figure 1), quantifies the size of punctate features in an image. Cells were cultured in the presence and absence of a reconstituted basement membrane (rBM) and imaged in 3D using confocal microscopy, for fluorescently labeled monoclonal antibodies to NuMA (fαNuMA) and fluorescently labeled total DNA.


Author(s):  
Charles Bouveyron ◽  
Gilles Celeux ◽  
T. Brendan Murphy ◽  
Adrian E. Raftery

Author(s):  
Jonathan Jacky ◽  
Margus Veanes ◽  
Colin Campbell ◽  
Wolfram Schulte
Keyword(s):  

2000 ◽  
Vol 31 (4) ◽  
pp. 191-203 ◽  
Author(s):  
Kelly S. Fielding ◽  
Michael A. Hogg

Summary: A social identity model of effort exertion in groups is presented. In contrast to most traditional research on productivity and performance motivation, the model is assumed to apply to groups of all sizes and nature, and to all membership contingent norms that specify group behaviors and goals. It is proposed that group identification renders behavior group-normative and encourages people to behave in line with group norms. The effect should be strengthened among people who most need consensual identity validation from fellow members, and in intergroup contexts where there is inescapable identity threat from an outgroup. Together these processes should encourage people to exert substantial effort on behalf of their group.


Sign in / Sign up

Export Citation Format

Share Document