Suggested Topics within your search.
Suggested Topics within your search.
- Human anatomy 20
- Human physiology 13
- Human geography 11
- Anatomy 8
- Human rights 7
- Personnel management 7
- Dissection 5
- Mass media 5
- Social aspects 5
- methods 5
- Abdomen 4
- Chest 4
- Extremities (Anatomy) 4
- Human ecology 4
- Human-computer interaction 4
- Law 4
- Psychological aspects 4
- Psychology 4
- Study and teaching 4
- Constitutional law 3
- Economic development 3
- Law and legislation 3
- Management 3
- Moral and ethical aspects 3
- Philosophy 3
- Physiology 3
- Prevention 3
- Research 3
- Women 3
- geography 3
-
26081
A Critical Review of the Book Iranian Identity: From Antiquity to the End of Pahlavi
Published 2022-03-01Get full text
Article -
26082
Risk assessment and prevention in airport security assurance by integrating LSTM algorithm.
Published 2025-01-01“…The risk assessment and prevention in traditional airport safety assurance usually rely on human experience for analysis, and there are problems such as heavy manual workload, excessive subjectivity, and significant limitations. …”
Get full text
Article -
26083
Privacy view and target of differential privacy
Published 2023-10-01“…The study aimed to address the challenges in understanding the privacy goals of differential privacy by analyzing the privacy controversies surrounding it in various fields.It began with the example of data correlation and highlighted the differing perspectives among scholars regarding the targets of privacy protection.In cases where records in a dataset were correlated, adversaries can exploit this correlation to infer sensitive information about individuals, thereby sparking a debate on whether this violates privacy protection.To investigate the influence of privacy theories in the legal domain on defining privacy, two mainstream privacy theories in the computer field were examined.The first theory, limited access to personal information, focuses on preventing others from accessing an individual’s sensitive information.According to this theory, privacy mechanisms should aim to prevent adversaries from accessing a user’s actual information.In contrast, the second theory, control over personal information, emphasizes an individual’s right to communicate personal information to others.This theory suggests that the disclosure of personal information due to the relevance of others sharing data should not be considered a breach of privacy.Then the controversies of differential privacy were analyzed in the fields of computer science, social science, ethics and human-computer interaction due to their different understandings of privacy.By exploring the privacy concept of differential privacy from a multidisciplinary perspective, this study helps readers gain a correct understanding of the privacy viewpoint and goals of differential privacy while enhancing their understanding of the concept of “privacy” itself.…”
Get full text
Article -
26084
-
26085
Ochrona stabilności sektora bankowego jako ochrona wartości konstytucyjnych
Published 2024-01-01“…An important supplement and development of the conducted considerations was the reflection on the jurisprudence of the European Court of Human Rights and the Court of Justice of the European Union, which - at least several times - also referred to the problem of perceiving the stability of the banking system as a value of the legal system. …”
Get full text
Article -
26086
-
26087
A Critical Review of A Buenos Aires Collection (Rugs and Art Tribal Bird Rugs and Others)
Published 2020-08-01Get full text
Article -
26088
Sanitary and hygienic issues in the design of individual heat supply systems
Published 2024-10-01“…There are questions about the quality of sanitary water that has contact with human skin. There are engineering solutions that can eliminate or significantly reduce these risks. …”
Get full text
Article -
26089
Politics in Indonesia: democracy, social networks and youth political participation
Published 2025-12-01Get full text
Article -
26090
A multidimensional momentum chain model for tennis matches based on difference equations.
Published 2024-01-01“…In the process of pushing the limits of human performance, competitive sports are dedicated to the pursuit of excellence. …”
Get full text
Article -
26091
Periodontal Health and Caries Prevalence Evaluation in Patients Affected by Parkinson's Disease
Published 2012-01-01Get full text
Article -
26092
Pathology of the Arabic Language Curriculum A Case Study: Farhangian University
Published 2022-05-01Get full text
Article -
26093
Historiography of Neo-Roman Thought: Critical Review of Skinner’s Liberty before Liberalism
Published 2018-09-01Get full text
Article -
26094
Semisupervised Learning-Based Word-Sense Disambiguation Using Word Embedding for Afaan Oromoo Language
Published 2024-01-01“…Natural language is a type of language that human beings use to communicate with each other. …”
Get full text
Article -
26095
-
26096
Peer support for discharge from hospital to community mental healthcare: a cost analysis
Published 2025-02-01Get full text
Article -
26097
SPATIAL EVOLUTION OF SMART CITIES FOR SUSTAINABLE TOURISM: A CASE STUDY OF PHUKET PROVINCE, THAILAND
Published 2024-09-01Get full text
Article -
26098
An Analytical Study of the Methodological Implications of the Concept of “Social Current”
Published 2020-07-01Get full text
Article -
26099
Language writ large: LLMs, ChatGPT, meaning, and understanding
Published 2025-02-01“…These convergent biases are related to (1) the parasitism of indirect verbal grounding on direct sensorimotor grounding, (2) the circularity of verbal definition, (3) the “mirroring” of language production and comprehension, (4) iconicity in propositions at LLM scale, (5) computational counterparts of human “categorical perception” in category learning by neural nets, and perhaps also (6) a conjecture by Chomsky about the laws of thought. …”
Get full text
Article -
26100
Conducting Polymer Nanocomposite for Energy Storage and Energy Harvesting Systems
Published 2022-01-01Get full text
Article