Abstract

in this paper, we construct a data-driven trust evaluation model based on perceptual source. The model takes the monitoring module as the evaluation unit, and the relay node completes the trust evaluation of the sensing node in its monitoring module. The direct trust calculation is realized by the relationship between the sensing node's own data, and the recommended trust is calculated by using the relationship between the neighbor nodes in the monitoring module. Combined with the historical trust, the comprehensive trust of the sensing node is output. In this paper, the credibility of existing database driven cognitive software is summarized, and then the key technologies of reliability evaluation and classification of database driven cognitive software are analyzed.

Highlights

  • Introduction of database driven cognitive software credibilityThe credibility of database driven cognitive software mainly refers to the way to obtain the credibility

  • Abstract. in this paper, we construct a data-driven trust evaluation model based on perceptual source

  • Based on the concept of dishonest evidence, this paper proposes a comprehensive software trustworthiness measurement method, and introduces a data-driven software trustworthiness measurement evaluation model in detail

Read more

Summary

Introduction of database driven cognitive software credibility

The credibility of database driven cognitive software mainly refers to the way to obtain the credibility. Updating the software credibility mechanism through the relevant database can expand the scope of cognitive reliability modeling perception ability, and enable the software credibility without modeling perception ability to obtain the corresponding ability through the relevant database channel. It is convenient for managers to adjust and control, and can make the credibility clear the scope of application of their own modeling. The credibility of database driven cognitive software is based on the white space database access protocol (paws) and uses HTTPS as the transmission mechanism. According to the author's review and collation of relevant literature and materials, the author thinks that the credibility evaluation and classification of database driven cognitive software can be divided into two aspects: perception node and weighted calculation

Sensing node
Weighted calculation
Summary

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.