-
21
Parallel Finite Element Algorithm for Large Elastic Deformations: Program Development and Validation
Published 2025-03-01Get full text
Article -
22
Enhanced OCR Recognition for Madurese Text Documents: A Genetic Algorithm Approach with Tesseract 5.5
Published 2025-08-01“…The system utilizes Tesseract 5.5 OCR engine configured with Vietnamese language model parameters to accommodate Maderese writing characteristics. …”
Get full text
Article -
23
Reconceptualizing Gatekeeping in the Age of Artificial Intelligence: A Theoretical Exploration of Artificial Intelligence-Driven News Curation and Automated Journalism
Published 2025-05-01“…We integrate classic media theories—gatekeeping, agenda-setting, and framing—with contemporary insights from algorithmic news recommender systems, large language model (LLM)–based news writing, and platform studies. …”
Get full text
Article -
24
User alignment across social networks
Published 2022-01-01“…For user writing style, it is identified by One-Class SVM algorithm, and finally, the information entropy empowerment method is used to compare the similarity of user profile attributes. …”
Get full text
Article -
25
A method for determining the topology of swarm elements relative to the leader and an algorithm for constructing a spatial matrix of unmanned aerial vehicles placement
Published 2025-05-01“…In writing the article, a systematic analysis of the processes controlling unmanned systems and the synthesis of methods and algorithms for their functioning were employed. …”
Get full text
Article -
26
-
27
Learning the Style via Mixed SN-Grams: An Evaluation in Authorship Attribution
Published 2025-05-01“…The study’s results suggest that mixed sn-grams constitute effective stylistic markers for building a reliable writing style model, which machine learning algorithms can learn.…”
Get full text
Article -
28
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
Get full text
Article -
29
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
Get full text
Article -
30
Artificial Intelligence (AI) and the University. How AI Will Change Our Approach to Education
Published 2025-06-01“…At the end of this paper, I will show the model of a university that would be able to meet the challenges described above.…”
Get full text
Article -
31
Analysis for models of interaction between road passenger transport operators
Published 2023-01-01“…The prerequisites for the creation of algorithms for the transition from one model to another and for evaluating their effectiveness are determined.Results. …”
Get full text
Article -
32
-
33
Real-time Smartphone Usage Surveillance System Based on YOLOv5
Published 2023-02-01“…The supervision can be done by utilizing a camera to detect a smartphone. The YOLOv5 algorithm was used, which is known for its good speed and accuracy in object detection. …”
Get full text
Article -
34
Development of a manipulator kinematic model using Abb Robot Studio
Published 2024-12-01“…The article addresses the following tasks: to analyze the current state of integration of manipulators into production processes, as well as to choose and substantiate the development platform and robot model, to develop a kinematic model and design and write software for controlling manipulators based on mathematical calculations. …”
Get full text
Article -
35
INVESTIGATION ON FINITE ELEMENT MODELING METHOD OF WITH TRIPLE JUNCTION POLYCRYSTALLINE INTERGRANULAR FRACTURE
Published 2018-01-01“…Cohesive zone model was used to simulate polycrystalline intergranular fracture at the grain level model,the finite element model build-ing reflected the actual situation is a difficult point.In this paper,Mixed Programming of Matlab,Python and Abaqus,An algorithm was presented which can easily and quickly generated Voronoi geometric model and the grain sizes distribution agrees with lognormal distribution.Realized the automatically insert the zero-thickness cohesive interface element by writing nodes and elements at crystal boundary,firstly solved the void zone at the intersection of the three zerothickness cohesive element,which is the triple junction,And to make up the defect of cohesive zone model.The whole process of the finite element analysis was performed automatically by secondary development,including the assignation material properties,material orientation,load application,model solution.Finally,polycrystalline aluminum was used as an example to simulate the intergranular fracture process without the initial damage.The results show that the method is more effectively and practically,which can be used to simulate polycrystalline intergranular crack initiation and propagation in random microscopic grains.…”
Get full text
Article -
36
Time series forecasting of infant mortality rate in India using Bayesian ARIMA models
Published 2025-08-01“…A Random Walk Metropolis algorithm has been used to deal with analytically intractable posterior results from the ARIMA model. …”
Get full text
Article -
37
Identification of Scientific Texts Generated by Large Language Models Using Machine Learning
Published 2024-12-01“…Therefore, we propose to create a model to identify texts produced by LLM. To do so, we will use natural language processing (NLP) and machine-learning algorithms to recognize texts that mask LLM misuse using different types of adversarial attack, like paraphrasing or translation from one language to another. …”
Get full text
Article -
38
Multi-authority attribute-based encryption access control model for cloud storage
Published 2015-06-01“…The existing attribute-based encryption access control studies are mostly based on single authority,and this scheme is apt to be under attack to cause exposure of secret keys.Thus,a multi-authority access control model PRM-CSAC is proposed.Based on CP-ABE method,a multi-authority attribute-based encryption scheme is designed to improve security level.Minimized attribute grouping algorithm is designed to distribute keys to users according to needs,which can reduce unnecessary attribute key distribution and decrease the amount of re-encryption attributes.The read and write attribute are added to strengthen the control of owners.The analysis shows that the proposed scheme can meet the security requirement of access control in cloud,and it also has less response time and system cost.…”
Get full text
Article -
39
Opinion Mining on Viet Thanh Nguyen’s The Sympathizer Using Topic Modelling and Sentiment Analysis
Published 2022-02-01“…In addition, Python is used as the analytical tool for this project as it supports two LDA algorithms: Gensim and Mallet. To overcome the limitation that the performance of the model relies on the available libraries in Python, the study employs machine learning approach. …”
Get full text
Article -
40
A Novel Approach to Efficiently Verify Sequential Consistency in Concurrent Programs
Published 2025-03-01Get full text
Article