Results 81 to 90 of about 22,301 (286)

Teachers' recognition of school bullying according to background variables and type of bullying [PDF]

open access: yes, 2018
How teachers identify and judge school bullying may affect their willingness to intervene in bullying situations and influence their strategies for doing so.
Chen, Li-Ming   +2 more
core   +2 more sources

A Hybrid Transfer Learning Framework for Brain Tumor Diagnosis

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
A novel hybrid transfer learning approach for brain tumor classification achieves 99.47% accuracy using magnetic resonance imaging (MRI) images. By combining image preprocessing, ensemble deep learning, and explainable artificial intelligence (XAI) techniques like gradient‐weighted class activation mapping and SHapley Additive exPlanations (SHAP), the ...
Sadia Islam Tonni   +11 more
wiley   +1 more source

Associations of nonconforming gender expression and gender identity with bullying victimization: an analysis of the 2017 youth risk behavior survey

open access: yesBMC Public Health, 2022
Purpose Although gender nonconformity (GNC) and transgender identity are both linked to bullying victimization, few studies have examined them with bullying victimization simultaneously.
Qiguo Lian   +5 more
doaj   +1 more source

Propiedades psicométricas del Cuestionario de Violencia de Pareja, versión corta (DVQ-8): una herramienta de evaluación para entornos educativos [PDF]

open access: yes, 2019
Este artículo proporciona información psicométrica de un instrumento de screening de victimización en parejas jóvenes: Dating Violence Questionnaire de 8 ítems.
Chan-Gamboa, Elsy Claudia   +3 more
core   +2 more sources

Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing

open access: yesAdvanced Intelligent Systems, EarlyView.
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian   +37 more
wiley   +1 more source

Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory [PDF]

open access: yes, 2018
Cybercrime is recognized as one of the top threats to UK economic security. On a daily basis, the computer networks of businesses suffer security breaches. A less explored dimension of this problem is cybercrimes committed by insiders.
Burnap, Pete   +3 more
core   +3 more sources

Deep Learning Methods for Assessing Time‐Variant Nonlinear Signatures in Clutter Echoes

open access: yesAdvanced Intelligent Systems, EarlyView.
Motion classification from biosonar echoes in clutter presents a fundamental challenge: extracting structured information from stochastic interference. Deep learning successfully discriminates object speed and direction from bat‐inspired signals, achieving 97% accuracy with frequency‐modulated calls but only 48% with constant‐frequency tones. This work
Ibrahim Eshera   +2 more
wiley   +1 more source

Cyber Crimes and Cyber Laws : A Perspective of Women Victimization

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2021
Women from all the parts of society are facing cybercrime against them. Being a victim of cyber crime, women experiences several psychological impact which deeply effects their life. Sometimes they even commit suicide. The National Crime Records Bureau (NCRB) has reported increased rate of cyber crime against women in the last few years.
openaire   +1 more source

Digital forms of dating violence : what school nurses need to know [PDF]

open access: yes, 2016
A substantial amount of U.S. teenagers experience physical or sexual abuse within their romantic relationship. With recent technological advances, teenage dating violence can also be perpetrated digitally by harassing or controlling a romantic partner ...
Ponnet, Koen   +3 more
core   +2 more sources

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy