Results 91 to 100 of about 1,065,019 (294)
Dentist-Patient Relationship [PDF]
What was highlighted were the impact of communication through the internet and its utilization inimproving the physician-patient relationship, the results of the realized research in the field beingdivided, because of the consideration that using ...
Gheorghe Raftu
doaj
Confidentiality in government contracts: Senate Order for Departmental and Agency Contracts (calendar year 2012 compliance) [PDF]
This audit is the fifteenth in a series of audits and fulfils the Senate’s request for the Auditor‐General to provide an annual report on the use of confidentiality provisions in Australian Government contracts.The audit objective was to assess the ...
core
Heat generation in lithium‐ion batteries affects performance, aging, and safety, requiring accurate thermal modeling. Traditional methods face efficiency and adaptability challenges. This article reviews machine learning‐based and hybrid modeling approaches, integrating data and physics to improve parameter estimation and temperature prediction ...
Qi Lin +4 more
wiley +1 more source
Confidentiality or disclosure? [PDF]
Considers the discretion of the trustees to disclose the settlor's wishes to the beneficiaries of a family discretionary trust. Discusses the confidentiality principle relating to family discretionary trusts and whether a settlor's wish letter falls ...
Pawlowski, Mark
core
Large Language Model‐Based Chatbots in Higher Education
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci +4 more
wiley +1 more source
Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity [PDF]
Progress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to ...
Jeff Hughes, George Cybenko
doaj
Substance Use Disorder Treatment Confidentiality Boot Camp [PDF]
[Excerpt]: INTRODUCTION: The Health Law and Policy Programs at UNH School of Law, Institute for Health Policy and Practice, and the NH Citizens Health Initiative have contracted with several of the New Hampshire Building Capacity for Transformation ...
Cameron, Stephanie +4 more
core +1 more source
Machine Learning‐Driven Variability Analysis of Process Parameters for Semiconductor Manufacturing
This research presents a machine learning approach that integrates nonlinear variation decomposition (NLVD) with statistical techniques to quantify the contribution of individual unit processes to performance and variance of figure of merit (FoM) at the LOT level.
Sinyeong Kang +6 more
wiley +1 more source
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor +5 more
wiley +1 more source
Publicness, Privacy and Confidentiality in the Single-Serving Quantum Broadcast Channel
The 2-receiver broadcast channel is studied: a network with three parties where the transmitter and one of the receivers are the primarily involved parties and the other receiver considered as third party.
Fonollosa, Javier R. +2 more
core +1 more source

