Results 81 to 90 of about 5,478 (285)

A Hybrid Transfer Learning Framework for Brain Tumor Diagnosis

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
A novel hybrid transfer learning approach for brain tumor classification achieves 99.47% accuracy using magnetic resonance imaging (MRI) images. By combining image preprocessing, ensemble deep learning, and explainable artificial intelligence (XAI) techniques like gradient‐weighted class activation mapping and SHapley Additive exPlanations (SHAP), the ...
Sadia Islam Tonni   +11 more
wiley   +1 more source

Zero Watermarking Using Convolutional Additive Self‐Attention Vision Transformer and Discrete Wavelet Transform‐Variance‐Based Feature Descriptor for Medical Image Security in Mobile Healthcare Services

open access: yesAdvanced Intelligent Systems, EarlyView.
A zero‐watermarking algorithm that combines a refined convolutional additive self‐attention vision transformer (CAS‐ViT) with a discrete wavelet transform variance‐based feature descriptor (DVFD) is proposed for protecting the privacy of medical images in mobile healthcare services.
Pei Liu   +6 more
wiley   +1 more source

Emotional and cognitive mechanisms of cyber-displaced aggression: exploring the impact of young adults’ victimization

open access: yesBMC Public Health
This study aims to explore the mediation of revenge planning and anger rumination in the associations among face-to-face victimization, cyber victimization, and cyber-displaced aggression.
Michelle F. Wright
doaj   +1 more source

Patterns of Cyberbullying Victimization in US Adolescents: A Latent Class Analysis

open access: yesGeorgia Educational Researcher, 2020
This study used latent class analysis (LCA) with binary observed indicators to identify latent classes of victimization, based on the extent to which adolescents in the U.S. experienced traditional victimization and cyber-victimization.
Diana Mindrila
doaj   +1 more source

Psychological Correlates of Cyberbullying and Cyber-Victimization

open access: yesThe International Journal of Human and Behavioral Science, 2017
Technology use is increasing rapidly in today’s world. Technological advances created new medium for aggression. Cyber bullying is one type of these behaviors which is defined as bullying via electronic communication tools. Although bullying is not an old issue, cyber bullying is a new concept which has similarities and differences between bullying in ...
ILDIRIM, Ezgi   +2 more
openaire   +3 more sources

EMG‐Driven Telemetry and Inference System for Fish: Pose Reconstruction and Flow Sensing

open access: yesAdvanced Intelligent Systems, EarlyView.
This work introduces an electromyography (EMG)‐driven telemetry framework that reconstructs body pose and infers hydrodynamic conditions in freely swimming fish. A custom 16‐channel archival system records intramuscular EMG, enabling deep‐learning models to decode joint kinematics, classify flow regimes, and reveal channel‐efficient sensing strategies.
Rahdar Hussain Afridi   +7 more
wiley   +1 more source

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

Adolescents’ Cyber Victimization

open access: yes, 2020
The purpose of the present study was to investigate the role of gender and gender stereotype traits (masculinity, femininity) in cyber victimization behaviors (cyber relational victimization, cyber verbal victimization, hacking) through different technologies (mobile phones, gaming consoles, social networking sites).
Wright, Michelle F. (Dr.)   +1 more
openaire   +2 more sources

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy