Browsing Research publications by Title
Now showing items 21204-21223 of 22815
-
TRUST IN CROSS-CULTURAL B2B FINANCIAL SERVICE RELATIONSHIPS: THE ROLE OF SHARED VALUES
(2016-06-13)Trust in business-to-business supplier–customer relationships in financial services is an area of considerable research interest. The bulk of prior empirical research in this field has concentrated on trust in business ... -
Trust in Software Outsourcing Relationships: An Empirical Investigation of Indian Software Companies
(2006)This paper investigates trust in software outsourcing relationships. The study is based on an empirical investigation of eighteen high maturity software vendor companies based in India. Our analysis of the literature ... -
Trust in Technology: A Distinctive and a Problematic Relation
(2010)The use of tools and artefacts is a distinctive and problematic phenomenon in the history of humanity, and as such it has been a topic of discussion since the beginning of Western culture, from the myths of the Ancient ... -
Trust requirements in E-Business : a conceptual framework
(University of Hertfordshire, 1999)Trust in information services and technologies is an increasingly important issue. The development of trust between businesses, consumers and other stakeholders is seen as crucial to the expansion of e-business markets, ... -
Trust*: Using Local Guarantees to Extend the Reach of Trust
(Springer Nature, 2013)We propose a new concept called trust* as a way of avoiding the necessity to transitively trust others in a range of distributed environments. The trust* approach uses guarantees based upon already established trust ... -
Trust, systems and accidents : Designing complex systems
(IEEE COMPUTER SOC, 2003)Trust is easier to destroy than create, hence, trust in overly applied automation may erode following accidents. This paper looks at the crash of a revolutionary supersonic fighter that resulted from over-reliance on ... -
A Trust-Based Approach for Data Sharing in the MQTT Environment
(IEEE Canada, 2023-11-22)Internet of Things (IoT) is considered as a giant network of connected devices who collect data and share them with each other. There has been extensive developments on IoT standards and protocols that enable IoT devices ... -
Trusted? Third? Parties
(2004)To ensure certainty in e-Commerce, a Trusted Third Party can be used to issue certificates, which act as an electronic equivalent to a witness acknowledging and authenticating the identity of the contracting party. The ... -
Trustworthiness and Authentication in Ubiquitous Computing
(ACM Press, 2012-10)In a pervasive computing environment, principle authentication veries if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what ... -
Tuberculin screening of some selected Fulani lactating cows in north-central Nigeria
(2013-10)The prevalence of mycobacterial infection among lactating Fulani cows was investigated in the Federal Capital Territory, Abuja and Kaduna State of Nigeria. Tuberculin testing using single comparative intradermal tuberculin ... -
Tuberculosis comorbidity with communicable and non-communicable diseases : integrating health services and control efforts
(2013-05-01)Recent data for the global burden of disease reflect major demographic and lifestyle changes, leading to a rise in non-communicable diseases. Most countries with high levels of tuberculosis face a large comorbidity burden ... -
Tuberculosis stigma as a social determinant of health : a systematic mapping review of research in low incidence countries
(2017-03-31)Tuberculosis (TB)-related stigma is an important social determinant of health. Research generally highlights how stigma can have a considerable impact on individuals and communities, including delays in seeking health care ... -
Tuning of continuous-time filters using genetic algorithms
(Institute of Electrical and Electronics Engineers (IEEE), 2000)A tuning method of continuous-time filters is proposed which is based on genetic algorithms. Simulation results show that the method can be used to tune OTA-C filters for a given accuracy within a reasonable time. -
Tuning of leapfrog multiple loop feedback bandpass filters
(2001)Off-line tuning of leapfrog multiple loop feedback bandpass filters is demonstrated using a modification of Dishal's method. The proposed method has advantages including simplified tuning circuits and algorithms, minimal ... -
Turbidimetric and HPLC assays for the determination of formulated lysozyme activity
(2001-04)In several studies lysozyme has been employed as a model protein to investigate the effects of formulation factors upon biological activity. The aim of this work was to develop and validate an HPLC technique to assay ... -
Turbulence in giant molecular clouds: the effect of photoionization feedback
(2015-02-21)Giant molecular clouds (GMCs) are observed to be turbulent, but theory shows that without a driving mechanism turbulence should quickly decay. The question arises by which mechanisms turbulence is driven or sustained. It ... -
Turbulent flame boundary and structure detection in an optical DISI engine using tracer-based two-line PLIF technique
(2015-11-01)Design and development of new combustion system for Spark Ignition Direct Injection (DISI) engines requires thorough understanding of the flame as it develops from electric discharge and propagates across the combustion ...