Results 91 to 100 of about 1,065,019 (294)

Dentist-Patient Relationship [PDF]

open access: yesOvidius University Annals: Economic Sciences Series, 2016
What was highlighted were the impact of communication through the internet and its utilization inimproving the physician-patient relationship, the results of the realized research in the field beingdivided, because of the consideration that using ...
Gheorghe Raftu
doaj  

Confidentiality in government contracts: Senate Order for Departmental and Agency Contracts (calendar year 2012 compliance) [PDF]

open access: yes
This audit is the fifteenth in a series of audits and fulfils the Senate’s request for the Auditor‐General to provide an annual report on the use of confidentiality provisions in Australian Government contracts.The audit objective was to assess the ...

core  

Advances in Thermal Modeling and Simulation of Lithium‐Ion Batteries with Machine Learning Approaches

open access: yesAdvanced Intelligent Discovery, EarlyView.
Heat generation in lithium‐ion batteries affects performance, aging, and safety, requiring accurate thermal modeling. Traditional methods face efficiency and adaptability challenges. This article reviews machine learning‐based and hybrid modeling approaches, integrating data and physics to improve parameter estimation and temperature prediction ...
Qi Lin   +4 more
wiley   +1 more source

Confidentiality or disclosure? [PDF]

open access: yes, 2008
Considers the discretion of the trustees to disclose the settlor's wishes to the beneficiaries of a family discretionary trust. Discusses the confidentiality principle relating to family discretionary trusts and whether a settlor's wish letter falls ...
Pawlowski, Mark
core  

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity [PDF]

open access: yesTechnology Innovation Management Review, 2013
Progress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to ...
Jeff Hughes, George Cybenko
doaj  

Substance Use Disorder Treatment Confidentiality Boot Camp [PDF]

open access: yes, 2017
[Excerpt]: INTRODUCTION: The Health Law and Policy Programs at UNH School of Law, Institute for Health Policy and Practice, and the NH Citizens Health Initiative have contracted with several of the New Hampshire Building Capacity for Transformation ...
Cameron, Stephanie   +4 more
core   +1 more source

Machine Learning‐Driven Variability Analysis of Process Parameters for Semiconductor Manufacturing

open access: yesAdvanced Intelligent Systems, EarlyView.
This research presents a machine learning approach that integrates nonlinear variation decomposition (NLVD) with statistical techniques to quantify the contribution of individual unit processes to performance and variance of figure of merit (FoM) at the LOT level.
Sinyeong Kang   +6 more
wiley   +1 more source

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

Publicness, Privacy and Confidentiality in the Single-Serving Quantum Broadcast Channel

open access: yes, 2019
The 2-receiver broadcast channel is studied: a network with three parties where the transmitter and one of the receivers are the primarily involved parties and the other receiver considered as third party.
Fonollosa, Javier R.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy