-
1
A Model for Automated Business Writing Assessment
Published 2022-12-01“…This study is aimed at building an automated model for business writing assessment, based on 14 rubrics that integrate EFL teacher assessment frameworks and identify expected performance against various criteria (including language, task fulfillment, content knowledge, register, format, and cohesion). …”
Get full text
Article -
2
Software implementation of the system for learning to write Chinese characters
Published 2023-08-01“…The neural network training model is based on the use of artificial neural networks using the backpropagation algorithm.Result. …”
Get full text
Article -
3
Provident garbage collection algorithm for SSD storage system
Published 2019-05-01Get full text
Article -
4
Robots Learn Writing
Published 2012-01-01“…This paper proposes a general method for robots to learn motions and corresponding semantic knowledge simultaneously. A modified ISOMAP algorithm is used to convert the sampled 6D vectors of joint angles into 2D trajectories, and the required movements for writing numbers are learned from this modified ISOMAP-based model. …”
Get full text
Article -
5
Research on the security audit model in intrusion prevention based on write-related support vector data description
Published 2007-01-01“…The security audit model based on write-related SVDD was designed to resolve the one-class problem.Once the classifier has been trained using the write-related subset,all activities deviated from the normal patterns are classified as potential intrusion.The proposed one-class classification algorithms can be implemented to build up an anomaly detection system by using only normal samples and the algorithms also makes the security audit system detect the new anomaly behaviors.In the experiments,the One-class classifier acquires nearly 100% detection rate and average zero false alarm rate for sequences of system calls based on a small training dataset.…”
Get full text
Article -
6
-
7
Blockchain efficient Byzantine fault tolerance consensus algorithm for IIoT
Published 2024-05-01“…The participation of good nodes in the consensus and the removal of faulty nodes were ensured by the credit score model. The parallelism of transaction verification and read write operations was achieved through the implementation of a double layer architecture. …”
Get full text
Article -
8
Navigating Ethical Dilemmas Of Generative AI In Medical Writing
Published 2024-10-01“…Generative AI in Medical Writing Generative AI tools or “chatbots” combine the adaptive learning capabilities of deep learning algorithms and natural language processing, resulting in a virtual assistant or aide that is capable of answering queries, following commands, and improving its responses according to the vast data available on the Internet in addition to user responses.3 This has allowed the accomplishment of various complex tasks within seconds that would otherwise require hours of trial and error. …”
Get full text
Article -
9
Research on the Trusted Traceability Model of Taishan Tea Products Based on Blockchain
Published 2024-11-01“…The experimental results show that the blockchain-based trusted traceability model for Taishan tea significantly improves the data security, query, and writing speed, and greatly optimizes the problems of traditional traceability methods. …”
Get full text
Article -
10
A personalized recommendation algorithm for English exercises incorporating fuzzy cognitive models and multiple attention mechanisms
Published 2025-04-01“…In response to the above problems in the recommendation of English reading, writing and translation exercises in higher education, this paper proposes an algorithm that combines improved fuzzy cognitive diagnosis model and multi-head attention mechanism to predict students’ performance on future recommended exercises. …”
Get full text
Article -
11
Leveraging retinanet based object detection model for assisting visually impaired individuals with metaheuristic optimization algorithm
Published 2025-05-01“…This paper proposes a novel Object Detection Model for Visually Impaired Individuals with a Metaheuristic Optimization Algorithm (ODMVII-MOA) technique. …”
Get full text
Article -
12
Exploring the Potential of the Bicameral Mind Theory in Reinforcement Learning Algorithms
Published 2025-06-01“…This study explores the potential of Julian Jaynes’ bicameral mind theory in enhancing reinforcement learning (RL) algorithms and large language models (LLMs) for artificial intelligence (AI) systems. …”
Get full text
Article -
13
End-to-End Architecture for English Reading and Writing Content Assessment Based on Prompt Learning
Published 2025-01-01“…The algorithm preprocesses the input English texts through the prompt learning framework and uses multi-scale attention mechanisms to improve the model’s ability to capture features at different linguistic levels. …”
Get full text
Article -
14
Detecting Covid-19 Fake News on Twitter/X in French: Deceptive Writing Strategies
Published 2025-04-01“…These results extend deceptive writing theory and inform fake news detection algorithms and media literacy instruction.…”
Get full text
Article -
15
Weak form shallow ice approximation models with an improved time-step restriction
Published 2025-01-01“…When that velocity field is used to advance the ice surface in time, the time steps have to take small values due to quadratic scaling in the horizontal mesh size. In this paper, we write the SIA model in weak form and add in the free-surface stabilization algorithm (FSSA) terms. …”
Get full text
Article -
16
Investigating performance of a multi-subcarrier free space optic using log-normal channel model
Published 2025-02-01“…The paper builds a computational model of a multi-subcarrier free space optic, a variant of the Subcarrier Intensity Modulation Free Space Optic (SIM-FSO), establishes algorithmic flowcharts, writes a computational program to investigate the system performance under various modulation methods, air turbulence levels and different numbers of subcarriers and data rates. …”
Get full text
Article -
17
PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM
Published 2019-05-01“…Accepting the existing methodology as a baseline, the purpose of the article is to develop a private method of forming requirements for GIS from unauthorized access to the AU, which has practical value and allows you to formulate quantitative requirements for a wide class of certified GIS.Method. When writing the article, the methods of system analysis, evolutionary modeling, probability theory and mathematical statistics, mathematical apparatus for modeling dynamic discrete networks (E-networks), and theory of algorithms were used. …”
Get full text
Article -
18
A Comparative Study of YOLO, SSD, Faster R-CNN, and More for Optimized Eye-Gaze Writing
Published 2025-04-01“…Finally, for self-supervised learning, we utilized the SimCLR algorithm. Our results indicate that the Haar classifier achieves the highest accuracy (0.85) with a model size of 97.358 KB, while YOLOv8 demonstrates competitive accuracy (0.83) alongside an exceptional processing speed and the smallest model size (6.083 KB), making it particularly suitable for cost-effective real-time eye-gaze applications.…”
Get full text
Article -
19
The Algorithm to Automatically Extract Body Sizes and Shapes
Published 2022-02-01“… This study presents an algorithm to automatically extract the size and body shape of a 3D scanned model. …”
Get full text
Article -
20
Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm
Published 2021-06-01Get full text
Article