Author:Ayuns LuzPublications |
---|
EasyChair Preprint 15085 | EasyChair Preprint 15084 | EasyChair Preprint 14949 | EasyChair Preprint 14948 | EasyChair Preprint 14932 | EasyChair Preprint 14931 | EasyChair Preprint 14903 | EasyChair Preprint 14902 | EasyChair Preprint 14901 | EasyChair Preprint 14900 | EasyChair Preprint 14143 | EasyChair Preprint 13954 | EasyChair Preprint 13645 | EasyChair Preprint 13644 | EasyChair Preprint 13593 | EasyChair Preprint 13592 | EasyChair Preprint 13590 | EasyChair Preprint 13465 | EasyChair Preprint 13464 | EasyChair Preprint 13399 | EasyChair Preprint 13398 | EasyChair Preprint 13369 | EasyChair Preprint 13368 | EasyChair Preprint 13363 | EasyChair Preprint 13288 | EasyChair Preprint 13287 | EasyChair Preprint 13280 | EasyChair Preprint 13279 | EasyChair Preprint 13265 | EasyChair Preprint 13249 | EasyChair Preprint 13248 | EasyChair Preprint 13241 | EasyChair Preprint 13240 | EasyChair Preprint 13225 | EasyChair Preprint 13224 | EasyChair Preprint 13219 | EasyChair Preprint 13218 | EasyChair Preprint 13215 | EasyChair Preprint 13210 | EasyChair Preprint 13209 | EasyChair Preprint 12995 |
Keyphrasesacademic achievement, Accountability, Actionable Insights, adaptation, adversarial attacks, African vulture data, Agile Methodology, AI, AI analytics, AI models, AI-Powered, AI-Powered Writing Assistants, AI/ML models, Antioxidants, area efficiency, Artificial Intelligence, Auditing, Automation, back-translation, Banking Industry, Benefits, best practices, body composition, breathing techniques, Cache-based V-to-V broadcasting2, Challenges3, clinical workflow, Cloud Computing, Cloud Computing Security, Cloud Security Posture Management, cluster efficiency, Cognitive interviews, collaboration2, Compliance, Content popularity modeling, cost optimization, cross-functional teams, cultural relevance, Customer Experiences, Customer Preferences, Data Aggregation, data analysis, data availability, data bias, Data Breaches, data collection, Data Governance, data privacy2, data protection, Data Quality2, data representation, Data Security, data utility, decision making, Dedicated Short Range Communication (DSRC), Diabetes, Diabetes Prediction, Diabetes prediction models, differential privacy, Digital Circuit Design, Digital Feedback Tools, digital health, Digital Transformation, Documentation, Dynamic power consumption, early detection, Electronic Health Records, Embedding strategies, Employee Engagement, Employee Experience (EX), engagement strategies, ethical conduct, Ethical Considerations, evaluating, evaluation metrics, Explainability, factors, fairness2, fake news, Fake News Detection, Federated Learning, Financial Technology, Fintech, Gate Diffusion Input, Gradient-based attacks, Grammar and Style Checkers, Healthcare, healthcare professionals, Hyderabad, Image Embeddings, implementation, Industrial IoT3, industrial IoT systems, influences, Innovation, Integration, interpretability, IoT-based greenhouse control systems, language adaptation, Large Language Models (LLMs), limitations2, low-dimensional vectors, low power design, machine learning4, malicious actors, metropolitan areas, Metropolitan Cities, Mobile Health (mHealth), Mobile Payment Security, model, model development, Multi-cloud strategy, Mumbai, Natural Language Generation, Natural Language Processing (NLP), Negative interactions, neural networks, Operational Agility, organizational success, Organizations, Overfitting, oxidative stress, Pakistan2, Pakistani Context, Papaya, Paraphrasing Attacks, patient engagement, Peer Review Platforms, Perceived teacher rejection, performance analysis, Personalization, personalized, Personalized banking services, pilot study, Positive interactions, power consumption, power efficiency, Pranayama, Precision, Prediction programs, predictive models2, Privacy, Privacy challenges2, privacy preserving, privacy protection, propagation delay, prostate cancer, psychological well-being2, Psychological Well-Being Scale, quantum computing, quantum-inspired algorithms, Questionnaire design, real-time collaboration, Reliability, Remote Healthcare, remote monitoring, reports, research practices, Responsible data usage, risk assessment2, risk management, road safety, Scalability, school-age children, Screening, Security Challenges, sensitive data, sensitivity, Sentiment Analysis, social media sentiment, specificity, standardization, Standardized questionnaires, statistical models, Stirling Children Emotional, Stock Market Behavior, structured data, student conduct evaluation, Student conduct questionnaire, student well-being, supportive relationships, Teacher's evaluation, Teacher-student interactions, teacher-student relationships, Techniques, Teleconsultation, Telehealth, Telemedicine, Textual Perturbations, traffic efficiency, Transistor count, transparency, unstructured data, Urdu translation, validity, Vehicular to Vehicular communication, virtual care, Vulnerabilities, weight loss, word embeddings, Yoga Practice, Zero Trust Architecture. |
|