Cyber Safety: A theoretical Insight [PDF]
This paper is written by the EUCPN Secretariat following the topic of the Estonian Presidency of the Network, which is Cyber Safety. It gives a theoretical insight in what Cyber Safety is.
Vanhee, Jorne, Verleysen, Cindy
core +1 more source
Toward Environmentally Friendly Hydrogel‐Based Flexible Intelligent Sensor Systems
This review summarizes environmentally and biologically friendly hydrogel‐based flexible sensor systems focusing on physical, chemical, and physiological sensors. Furthermore, device concepts moving forward for the practical application are discussed about wireless integration, the interface between hydrogel and dry electronics, automatic data analysis
Sudipta Kumar Sarkar, Kuniharu Takei
wiley +1 more source
A Hybrid Transfer Learning Framework for Brain Tumor Diagnosis
A novel hybrid transfer learning approach for brain tumor classification achieves 99.47% accuracy using magnetic resonance imaging (MRI) images. By combining image preprocessing, ensemble deep learning, and explainable artificial intelligence (XAI) techniques like gradient‐weighted class activation mapping and SHapley Additive exPlanations (SHAP), the ...
Sadia Islam Tonni +11 more
wiley +1 more source
Purpose Although gender nonconformity (GNC) and transgender identity are both linked to bullying victimization, few studies have examined them with bullying victimization simultaneously.
Qiguo Lian +5 more
doaj +1 more source
Development of the multidimensional peer victimization scale–revised (MPVS-R) and the multidimensional peer bullying scale (MPVS-RB) [PDF]
Peer victimization is a frequent occurrence for many adolescents; however, some of the psychometric properties of self-report scales assessing these experiences remain unclear.
Brown T.A. +10 more
core +1 more source
Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian +37 more
wiley +1 more source
Adolescents' involvement in cyber bullying and perceptions of school: the importance of perceived peer acceptance for female adolescents [PDF]
Young people are spending increasing amounts of time using digital technology and, as such, are at great risk of being involved in cyber bullying as a victim, bully, or bully/victim.
A Gorrese +75 more
core +1 more source
Deep Learning Methods for Assessing Time‐Variant Nonlinear Signatures in Clutter Echoes
Motion classification from biosonar echoes in clutter presents a fundamental challenge: extracting structured information from stochastic interference. Deep learning successfully discriminates object speed and direction from bat‐inspired signals, achieving 97% accuracy with frequency‐modulated calls but only 48% with constant‐frequency tones. This work
Ibrahim Eshera +2 more
wiley +1 more source
From cybercrime to cyborg crime:An exploration of high-tech cybercrime, offenders and victims through the lens of Actor-Network Theory [PDF]
Universiteiten die worden gehackt, computersystemen die worden gegijzeld of tot ‘zombies’ gemaakt, servers van Internetproviders die worden gebombardeerd, we worden bijna dagelijks wel geconfronteerd met cybercrime en haar gevolgen.
van der Wagen, Wytske
core +1 more source
Education of Young People and Children as a Way of Fighting Against Internet Hate, a Form of Cyber Violence [PDF]
Due to highly innovative technologies such as the smartphone, cyber- bullying and on-line, aggression has increasingly affected individuals across the world.
Górka, M. (Marek)
core +2 more sources

