-
21
Information Hiding Based on Chan-Vese Algorithm
Published 2011-12-01“…In addition the algorithm of this technique is implemented in Matlab.…”
Get full text
Article -
22
The Algorithm to Automatically Extract Body Sizes and Shapes
Published 2022-02-01“…In addition, the rotation matrix and the optimal function are used to write an algorithm to estimate the neck girth and inseam measurements. …”
Get full text
Article -
23
Algorithmic Literacy and the Role of Librarians in Its Education
Published 2025-02-01“…Objective: Considering the increasing spread of artificial intelligence and its algorithm-oriented nature and the increasing interaction of users with these algorithms in various platforms such as social networks, online stores, and search engines, the present study intends to examine the concept and necessity of algorithmic literacy and, in the following, the role of librarians who are actually specialists in information science in the education and development of this literacy. …”
Get full text
Article -
24
Magnetic Coil’s Performance Optimization with Nonsmooth Search Algorithms
Published 2025-08-01“…Numerical tests using non-gradient search algorithms show the difference in optimal designs provided by these methods. …”
Get full text
Article -
25
-
26
Highly Efficient Digitized Quasi-3D Photolithography Based on a Modified Golomb Coding via DMD Laser Direct Writing
Published 2025-06-01“…In the image slicing algorithm, a modified Golomb coding is introduced to make full use of the highest available exposure intensity. …”
Get full text
Article -
27
Exploring the Potential of the Bicameral Mind Theory in Reinforcement Learning Algorithms
Published 2025-06-01“…This study explores the potential of Julian Jaynes’ bicameral mind theory in enhancing reinforcement learning (RL) algorithms and large language models (LLMs) for artificial intelligence (AI) systems. …”
Get full text
Article -
28
Blockchain efficient Byzantine fault tolerance consensus algorithm for IIoT
Published 2024-05-01“…The parallelism of transaction verification and read write operations was achieved through the implementation of a double layer architecture. …”
Get full text
Article -
29
Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)
Published 2010-06-01“…The paper presents how a block cipher could be constructed in general, it includes an observation of the history, inventors, and algorithms of the TEA block ciphers. It also discuss the manner did the programming took in terms of modularity, simplicity, resource reservation, in the previous algorithm the user cannot enter the plain text as a characters, it must enter the ASCII cod of the characters we write a lot e of functions to solve this problem also we enable the user to save his message in text file to make him use it to receive a message from email ,Also the time of encryption and decryption are calculated to measure the performance of the algorithm., The implementation of TEA is made using C/C++ Borland compiler version( 4.5). …”
Get full text
Article -
30
Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm
Published 2021-06-01Get full text
Article -
31
An intelligent comprehensive scoring approach based on improved differential evolution algorithm
Published 2025-03-01“…Secondly, an intelligent comprehensive scoring approach had been proposed based on improved differential evolution algorithm, which introduced the following three improvements to the traditional differential evolution algorithm framework: a real encoding and decoding method was developed based on the score weights. …”
Get full text
Article -
32
An intelligent comprehensive scoring approach based on improved differential evolution algorithm
Published 2025-03-01“…Secondly, an intelligent comprehensive scoring approach had been proposed based on improved differential evolution algorithm, which introduced the following three improvements to the traditional differential evolution algorithm framework: a real encoding and decoding method was developed based on the score weights. …”
Get full text
Article -
33
Plagiarism types and detection methods: a systematic survey of algorithms in text analysis
Published 2025-03-01“…Plagiarism in academic and creative writing continues to be a significant challenge, driven by the exponential growth of digital content. …”
Get full text
Article -
34
A novel Smishing defense approach based on meta-heuristic optimization algorithms
Published 2025-05-01“…This paper introduces an approach for detecting SMS phishing based on machine learning algorithms. The suggested system incorporates feature extraction, oversampling, and selection and classification optimization algorithms. …”
Get full text
Article -
35
Parallel Finite Element Algorithm for Large Elastic Deformations: Program Development and Validation
Published 2025-03-01Get full text
Article -
36
Design and Construction of Multimedia Smart English Teaching Platform Based on RBF Algorithm
Published 2021-01-01“…Hence, the ability to read, write, and communicate in English is essential and very necessary. …”
Get full text
Article -
37
Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media
Published 2020-06-01“…However, some of users may write offensive twits to other via social media which known as cyber bullying. …”
Get full text
Article -
38
An Author Gender Detection Method Using Whale Optimization Algorithm and Artificial Neural Network
Published 2020-01-01“…Machine learning and meta-heuristic algorithms are valuable techniques to extract hidden patterns useful for detecting gender of a text. …”
Get full text
Article -
39
A smart pen prototype with adaptive algorithms for stabilizing handwriting tremor signals in Parkinson’s disease
Published 2025-08-01“…Abstract This study presents a smart pen prototype designed to dynamically mitigate hand tremors, thereby enhancing writing quality and user comfort for individuals with conditions such as Parkinson’s disease. …”
Get full text
Article -
40
Laser Fabrication of Multi‐Dimensional Perovskite Patterns with Intelligent Anti‐Counterfeiting Applications
Published 2024-11-01“…In this study, femtosecond laser direct writing technology is utilized to achieve rapid and highly precise micro/nanofabrication on perovskites. …”
Get full text
Article