Showing 21 - 40 results of 82 for search 'model writing algorithm', query time: 0.08s Refine Results
  1. 21
  2. 22

    Enhanced OCR Recognition for Madurese Text Documents: A Genetic Algorithm Approach with Tesseract 5.5 by Muhammad Nazir Arifin, Muhammad Umar Mansyur, Ali Rahman, Nindian Puspa Dewi, Fauzan Prasetyo Eka Putra

    Published 2025-08-01
    “…The system utilizes Tesseract 5.5 OCR engine configured with Vietnamese language model parameters to accommodate Maderese writing characteristics. …”
    Get full text
    Article
  3. 23

    Reconceptualizing Gatekeeping in the Age of Artificial Intelligence: A Theoretical Exploration of Artificial Intelligence-Driven News Curation and Automated Journalism by Dan Valeriu Voinea

    Published 2025-05-01
    “…We integrate classic media theories—gatekeeping, agenda-setting, and framing—with contemporary insights from algorithmic news recommender systems, large language model (LLM)–based news writing, and platform studies. …”
    Get full text
    Article
  4. 24

    User alignment across social networks by Shen Jiaqi, Zhou Guomin

    Published 2022-01-01
    “…For user writing style, it is identified by One-Class SVM algorithm, and finally, the information entropy empowerment method is used to compare the similarity of user profile attributes. …”
    Get full text
    Article
  5. 25

    A method for determining the topology of swarm elements relative to the leader and an algorithm for constructing a spatial matrix of unmanned aerial vehicles placement by Pavlo Marchenko

    Published 2025-05-01
    “…In writing the article, a systematic analysis of the processes controlling unmanned systems and the synthesis of methods and algorithms for their functioning were employed. …”
    Get full text
    Article
  6. 26
  7. 27

    Learning the Style via Mixed SN-Grams: An Evaluation in Authorship Attribution by Juan Pablo Francisco Posadas-Durán, Germán Ríos-Toledo, Erick Velázquez-Lozada, J. A. de Jesús Osuna-Coutiño, Madaín Pérez-Patricio, Fernando Pech May

    Published 2025-05-01
    “…The study’s results suggest that mixed sn-grams constitute effective stylistic markers for building a reliable writing style model, which machine learning algorithms can learn.…”
    Get full text
    Article
  8. 28

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
    Get full text
    Article
  9. 29

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
    Get full text
    Article
  10. 30

    Artificial Intelligence (AI) and the University. How AI Will Change Our Approach to Education by Jacek Grzybowski

    Published 2025-06-01
    “…At the end of this paper, I will show the model of a university that would be able to meet the challenges described above.…”
    Get full text
    Article
  11. 31

    Analysis for models of interaction between road passenger transport operators by I. I. Lyubimov, N. N. Yakunin, N. V. Yakunina

    Published 2023-01-01
    “…The prerequisites for the creation of algorithms for the transition from one model to another and for evaluating their effectiveness are determined.Results. …”
    Get full text
    Article
  12. 32
  13. 33

    Real-time Smartphone Usage Surveillance System Based on YOLOv5 by Rr. Hajar Puji Sejati, Rodhiyah Mardhiyyah, Zulkhairi Zulkhairi, Nur Istiqomah, R. Imam Budi Prasetya

    Published 2023-02-01
    “…The supervision can be done by utilizing a camera to detect a smartphone. The YOLOv5 algorithm was used, which is known for its good speed and accuracy in object detection. …”
    Get full text
    Article
  14. 34

    Development of a manipulator kinematic model using Abb Robot Studio by Артем Бронніков, Марія Бендеберя

    Published 2024-12-01
    “…The article addresses the following tasks: to analyze the current state of integration of manipulators into production processes, as well as to choose and substantiate the development platform and robot model, to develop a kinematic model and design and write software for controlling manipulators based on mathematical calculations. …”
    Get full text
    Article
  15. 35

    INVESTIGATION ON FINITE ELEMENT MODELING METHOD OF WITH TRIPLE JUNCTION POLYCRYSTALLINE INTERGRANULAR FRACTURE by SHI JunLin, ZHAO JianPing

    Published 2018-01-01
    “…Cohesive zone model was used to simulate polycrystalline intergranular fracture at the grain level model,the finite element model build-ing reflected the actual situation is a difficult point.In this paper,Mixed Programming of Matlab,Python and Abaqus,An algorithm was presented which can easily and quickly generated Voronoi geometric model and the grain sizes distribution agrees with lognormal distribution.Realized the automatically insert the zero-thickness cohesive interface element by writing nodes and elements at crystal boundary,firstly solved the void zone at the intersection of the three zerothickness cohesive element,which is the triple junction,And to make up the defect of cohesive zone model.The whole process of the finite element analysis was performed automatically by secondary development,including the assignation material properties,material orientation,load application,model solution.Finally,polycrystalline aluminum was used as an example to simulate the intergranular fracture process without the initial damage.The results show that the method is more effectively and practically,which can be used to simulate polycrystalline intergranular crack initiation and propagation in random microscopic grains.…”
    Get full text
    Article
  16. 36

    Time series forecasting of infant mortality rate in India using Bayesian ARIMA models by Anuj Singh, Tripti Tripathi, Rakesh Ranjan, Abhay K. Tiwari

    Published 2025-08-01
    “…A Random Walk Metropolis algorithm has been used to deal with analytically intractable posterior results from the ARIMA model. …”
    Get full text
    Article
  17. 37

    Identification of Scientific Texts Generated by Large Language Models Using Machine Learning by David Soto-Osorio, Grigori Sidorov, Liliana Chanona-Hernández, Blanca Cecilia López-Ramírez

    Published 2024-12-01
    “…Therefore, we propose to create a model to identify texts produced by LLM. To do so, we will use natural language processing (NLP) and machine-learning algorithms to recognize texts that mask LLM misuse using different types of adversarial attack, like paraphrasing or translation from one language to another. …”
    Get full text
    Article
  18. 38

    Multi-authority attribute-based encryption access control model for cloud storage by Zhi-tao GUAN, Ting-ting YANG, Ru-zhi XU, Zhu-xiao WANG

    Published 2015-06-01
    “…The existing attribute-based encryption access control studies are mostly based on single authority,and this scheme is apt to be under attack to cause exposure of secret keys.Thus,a multi-authority access control model PRM-CSAC is proposed.Based on CP-ABE method,a multi-authority attribute-based encryption scheme is designed to improve security level.Minimized attribute grouping algorithm is designed to distribute keys to users according to needs,which can reduce unnecessary attribute key distribution and decrease the amount of re-encryption attributes.The read and write attribute are added to strengthen the control of owners.The analysis shows that the proposed scheme can meet the security requirement of access control in cloud,and it also has less response time and system cost.…”
    Get full text
    Article
  19. 39

    Opinion Mining on Viet Thanh Nguyen’s The Sympathizer Using Topic Modelling and Sentiment Analysis by Sea Yun Ying, Pantea Keikhosrokiani, Moussa Pourya Asl

    Published 2022-02-01
    “…In addition, Python is used as the analytical tool for this project as it supports two LDA algorithms: Gensim and Mallet. To overcome the limitation that the performance of the model relies on the available libraries in Python, the study employs machine learning approach. …”
    Get full text
    Article
  20. 40