Showing 21 - 40 results of 174 for search 'writing algorithm', query time: 0.08s Refine Results
  1. 21

    Information Hiding Based on Chan-Vese Algorithm by Samia Sh. Lazar, Nadia M. Mohammed

    Published 2011-12-01
    “…In addition the algorithm of this technique is implemented in Matlab.…”
    Get full text
    Article
  2. 22

    The Algorithm to Automatically Extract Body Sizes and Shapes by Mong Hien Thi Nguyen, Tuong Quan Vo, Mai Huong Bui, Van Anh Pham

    Published 2022-02-01
    “…In addition, the rotation matrix and the optimal function are used to write an algorithm to estimate the neck girth and inseam measurements. …”
    Get full text
    Article
  3. 23

    Algorithmic Literacy and the Role of Librarians in Its Education by Shahnaz Khademizadeh, Mohammad Amin Sekhavatmanesh

    Published 2025-02-01
    “…Objective: Considering the increasing spread of artificial intelligence and its algorithm-oriented nature and the increasing interaction of users with these algorithms in various platforms such as social networks, online stores, and search engines, the present study intends to examine the concept and necessity of algorithmic literacy and, in the following, the role of librarians who are actually specialists in information science in the education and development of this literacy. …”
    Get full text
    Article
  4. 24

    Magnetic Coil’s Performance Optimization with Nonsmooth Search Algorithms by Igor Reznichenko, Primož Podržaj, Aljoša Peperko

    Published 2025-08-01
    “…Numerical tests using non-gradient search algorithms show the difference in optimal designs provided by these methods. …”
    Get full text
    Article
  5. 25
  6. 26

    Highly Efficient Digitized Quasi-3D Photolithography Based on a Modified Golomb Coding via DMD Laser Direct Writing by Hui Wang, Zhe Huang, Yanting Shen, Shangying Zhou

    Published 2025-06-01
    “…In the image slicing algorithm, a modified Golomb coding is introduced to make full use of the highest available exposure intensity. …”
    Get full text
    Article
  7. 27

    Exploring the Potential of the Bicameral Mind Theory in Reinforcement Learning Algorithms by Munavvarkhon Mukhitdinova, Mariana Petrova

    Published 2025-06-01
    “…This study explores the potential of Julian Jaynes’ bicameral mind theory in enhancing reinforcement learning (RL) algorithms and large language models (LLMs) for artificial intelligence (AI) systems. …”
    Get full text
    Article
  8. 28

    Blockchain efficient Byzantine fault tolerance consensus algorithm for IIoT by LI Fengqi, SONG Qingqing, XU Hui, DU Xuefeng, GAO Jialong, TONG Ning, WANG Deguang

    Published 2024-05-01
    “…The parallelism of transaction verification and read write operations was achieved through the implementation of a double layer architecture. …”
    Get full text
    Article
  9. 29

    Apply Block Ciphers Using Tiny Encryption Algorithm (TEA) by Hana Rashied Ismaeel

    Published 2010-06-01
    “…The paper presents how a block cipher could be constructed in general, it includes an observation of the history, inventors, and algorithms of the TEA block ciphers. It also discuss the manner did the programming took in terms of modularity, simplicity, resource reservation, in the previous algorithm the user cannot enter the plain text as a characters, it must enter the ASCII cod of the characters we write a lot e of functions to solve this problem also we enable the user to save his message in text file to make him use it to receive a message from email ,Also the time of encryption and decryption are calculated to measure the performance of the algorithm., The implementation of TEA is made using C/C++ Borland compiler version( 4.5). …”
    Get full text
    Article
  10. 30
  11. 31

    An intelligent comprehensive scoring approach based on improved differential evolution algorithm by WANG Rongsheng, WANG Xiaogang, LONG Yixuan, LYU Yisheng, YUAN Zhiming

    Published 2025-03-01
    “…Secondly, an intelligent comprehensive scoring approach had been proposed based on improved differential evolution algorithm, which introduced the following three improvements to the traditional differential evolution algorithm framework: a real encoding and decoding method was developed based on the score weights. …”
    Get full text
    Article
  12. 32

    An intelligent comprehensive scoring approach based on improved differential evolution algorithm by WANG Rongsheng, WANG Xiaogang, LONG Yixuan, LYU Yisheng, YUAN Zhiming

    Published 2025-03-01
    “…Secondly, an intelligent comprehensive scoring approach had been proposed based on improved differential evolution algorithm, which introduced the following three improvements to the traditional differential evolution algorithm framework: a real encoding and decoding method was developed based on the score weights. …”
    Get full text
    Article
  13. 33

    Plagiarism types and detection methods: a systematic survey of algorithms in text analysis by Altynbek Amirzhanov, Cemil Turan, Alfira Makhmutova

    Published 2025-03-01
    “…Plagiarism in academic and creative writing continues to be a significant challenge, driven by the exponential growth of digital content. …”
    Get full text
    Article
  14. 34

    A novel Smishing defense approach based on meta-heuristic optimization algorithms by Mohammad Alshinwan, Osama A. Khashan, Zakwan Alarnaout, Salam Salameh Shreem, Ahmed Younes Shdefat, Nader Abdel Karim

    Published 2025-05-01
    “…This paper introduces an approach for detecting SMS phishing based on machine learning algorithms. The suggested system incorporates feature extraction, oversampling, and selection and classification optimization algorithms. …”
    Get full text
    Article
  15. 35
  16. 36

    Design and Construction of Multimedia Smart English Teaching Platform Based on RBF Algorithm by Qianbo Li

    Published 2021-01-01
    “…Hence, the ability to read, write, and communicate in English is essential and very necessary. …”
    Get full text
    Article
  17. 37

    Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media by Bedoor Y. AlHarbi, Mashael S. AlHarbi, Nouf J. AlZahrani, Meshaiel M. Alsheail, Dina M. Ibrahim

    Published 2020-06-01
    “…However, some of users may write offensive twits to other via social media which known as cyber bullying. …”
    Get full text
    Article
  18. 38

    An Author Gender Detection Method Using Whale Optimization Algorithm and Artificial Neural Network by Fatemeh Safara, Amin Salih Mohammed, Moayad Yousif Potrus, Saqib Ali, Quan Thanh Tho, Alireza Souri, Fereshteh Janenia, Mehdi Hosseinzadeh

    Published 2020-01-01
    “…Machine learning and meta-heuristic algorithms are valuable techniques to extract hidden patterns useful for detecting gender of a text. …”
    Get full text
    Article
  19. 39

    A smart pen prototype with adaptive algorithms for stabilizing handwriting tremor signals in Parkinson’s disease by Jéssica Cristina Tironi, Anita Fernandes, Renata Coelho Borges, Luis Augusto Silva, Wemerson Delcio Parreira

    Published 2025-08-01
    “…Abstract This study presents a smart pen prototype designed to dynamically mitigate hand tremors, thereby enhancing writing quality and user comfort for individuals with conditions such as Parkinson’s disease. …”
    Get full text
    Article
  20. 40

    Laser Fabrication of Multi‐Dimensional Perovskite Patterns with Intelligent Anti‐Counterfeiting Applications by Xiangyu Xu, Shoufang Liu, Yan Kuai, Yuxuan Jiang, Zhijia Hu, Benli Yu, Siqi Li

    Published 2024-11-01
    “…In this study, femtosecond laser direct writing technology is utilized to achieve rapid and highly precise micro/nanofabrication on perovskites. …”
    Get full text
    Article