Results 81 to 90 of about 22,301 (286)
Teachers' recognition of school bullying according to background variables and type of bullying [PDF]
How teachers identify and judge school bullying may affect their willingness to intervene in bullying situations and influence their strategies for doing so.
Chen, Li-Ming +2 more
core +2 more sources
A Hybrid Transfer Learning Framework for Brain Tumor Diagnosis
A novel hybrid transfer learning approach for brain tumor classification achieves 99.47% accuracy using magnetic resonance imaging (MRI) images. By combining image preprocessing, ensemble deep learning, and explainable artificial intelligence (XAI) techniques like gradient‐weighted class activation mapping and SHapley Additive exPlanations (SHAP), the ...
Sadia Islam Tonni +11 more
wiley +1 more source
Purpose Although gender nonconformity (GNC) and transgender identity are both linked to bullying victimization, few studies have examined them with bullying victimization simultaneously.
Qiguo Lian +5 more
doaj +1 more source
Propiedades psicométricas del Cuestionario de Violencia de Pareja, versión corta (DVQ-8): una herramienta de evaluación para entornos educativos [PDF]
Este artículo proporciona información psicométrica de un instrumento de screening de victimización en parejas jóvenes: Dating Violence Questionnaire de 8 ítems.
Chan-Gamboa, Elsy Claudia +3 more
core +2 more sources
Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian +37 more
wiley +1 more source
Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory [PDF]
Cybercrime is recognized as one of the top threats to UK economic security. On a daily basis, the computer networks of businesses suffer security breaches. A less explored dimension of this problem is cybercrimes committed by insiders.
Burnap, Pete +3 more
core +3 more sources
Deep Learning Methods for Assessing Time‐Variant Nonlinear Signatures in Clutter Echoes
Motion classification from biosonar echoes in clutter presents a fundamental challenge: extracting structured information from stochastic interference. Deep learning successfully discriminates object speed and direction from bat‐inspired signals, achieving 97% accuracy with frequency‐modulated calls but only 48% with constant‐frequency tones. This work
Ibrahim Eshera +2 more
wiley +1 more source
Cyber Crimes and Cyber Laws : A Perspective of Women Victimization
Women from all the parts of society are facing cybercrime against them. Being a victim of cyber crime, women experiences several psychological impact which deeply effects their life. Sometimes they even commit suicide. The National Crime Records Bureau (NCRB) has reported increased rate of cyber crime against women in the last few years.
openaire +1 more source
Digital forms of dating violence : what school nurses need to know [PDF]
A substantial amount of U.S. teenagers experience physical or sexual abuse within their romantic relationship. With recent technological advances, teenage dating violence can also be perpetrated digitally by harassing or controlling a romantic partner ...
Ponnet, Koen +3 more
core +2 more sources
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source

