Showing 41 - 60 results of 174 for search 'writing algorithm', query time: 0.05s Refine Results
  1. 41

    A personalized recommendation algorithm for English exercises incorporating fuzzy cognitive models and multiple attention mechanisms by Yixuan Zhang, Yanyi Wang

    Published 2025-04-01
    “…In response to the above problems in the recommendation of English reading, writing and translation exercises in higher education, this paper proposes an algorithm that combines improved fuzzy cognitive diagnosis model and multi-head attention mechanism to predict students’ performance on future recommended exercises. …”
    Get full text
    Article
  2. 42

    Enhanced OCR Recognition for Madurese Text Documents: A Genetic Algorithm Approach with Tesseract 5.5 by Muhammad Nazir Arifin, Muhammad Umar Mansyur, Ali Rahman, Nindian Puspa Dewi, Fauzan Prasetyo Eka Putra

    Published 2025-08-01
    “…Character Recognition (OCR) for the Madurese language using Genetic Algorithms (GA). The study addresses the challenges in processing Madurese text documents by implementing a nine-step image preprocessing workflow optimized through GA. …”
    Get full text
    Article
  3. 43

    Fuzzy logic, genetic algorithms, and artificial neural networks applied to cognitive radio networks: A review by Ahmed Alkhayyat, Firas Abedi, Ashish Bagwari, Pooja Joshi, Haider Mahmood Jawad, Sarmad Nozad Mahmood, Yousif K Yousif

    Published 2022-07-01
    “…Computerized reasoning approaches, such as fuzzy logic, evolutionary algorithms, and artificial neural networks, are used in the writing audit. …”
    Get full text
    Article
  4. 44

    Leveraging retinanet based object detection model for assisting visually impaired individuals with metaheuristic optimization algorithm by Alaa O. Khadidos, Ayman Yafoz

    Published 2025-05-01
    “…Abstract Visually impaired individuals suffer many problems in handling their everyday activities like road crossing, writing, finding an object, reading, and so on. However, many navigation methods are available, and efficient object detection (OD) methods for visually impaired people (VIP) need to be improved. …”
    Get full text
    Article
  5. 45

    Simulation of direct mapped, k-way and fully associative cache on all pairs shortest paths algorithms by A. A. Prihozhy

    Published 2019-12-01
    “…This paper presents a technique of simulating the direct mapped, k-way associative and fully associative cache during the algorithm execution, to measure the frequency of read data to cache and write data to memory operations. …”
    Get full text
    Article
  6. 46

    Reflection-AI: artificial intelligence or algorithmic instruction problem? Empowering students through situated knowledges-based reflexivity by Do Own (Donna) Kim

    Published 2025-05-01
    “…Drawing on technology studies and critical reflection on student experiences with English academic writing assignments in pre-AI era Korea, I reposition the “AI problem” as a cultural problem, namely an “algorithmic instruction” problem concerning structural prioritization of formulaic student work and pedagogical standardization, not a novel technology or individual moral(e) problem. …”
    Get full text
    Article
  7. 47

    User alignment across social networks by Shen Jiaqi, Zhou Guomin

    Published 2022-01-01
    “…For user writing style, it is identified by One-Class SVM algorithm, and finally, the information entropy empowerment method is used to compare the similarity of user profile attributes. …”
    Get full text
    Article
  8. 48

    The impact of artificial intelligence on research efficiency by Mitra Madanchian, Hamed Taherdoost

    Published 2025-06-01
    “…However, challenges such as bias in algorithms, concerns about data privacy, and deficiencies in the infrastructure impede wide-scale application. …”
    Get full text
    Article
  9. 49

    Cuneiform Symbols Recognition Based on K-Means and Neural Network by Naktal Edan

    Published 2013-03-01
    “…The proposed algorithm  gave good results.…”
    Get full text
    Article
  10. 50

    Research on the Trusted Traceability Model of Taishan Tea Products Based on Blockchain by Kangchen Liu, Pingzeng Liu, Shuaishuai Gao

    Published 2024-11-01
    “…The optimized SM2 encryption algorithm is introduced, and the execution efficiency of the encryption algorithm is improved by the concurrent processing framework, which guarantees the security and transmission speed of the data. …”
    Get full text
    Article
  11. 51

    PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM by I. G. Drovnikova, A. A. Zmeev, E. A. Rogozin

    Published 2019-05-01
    “…Accepting the existing methodology as a baseline, the purpose of the article is to develop a private method of forming requirements for GIS from unauthorized access to the AU, which has practical value and allows you to formulate quantitative requirements for a wide class of certified GIS.Method. When writing the article, the methods of system analysis, evolutionary modeling, probability theory and mathematical statistics, mathematical apparatus for modeling dynamic discrete networks (E-networks), and theory of algorithms were used. …”
    Get full text
    Article
  12. 52
  13. 53

    A method for determining the topology of swarm elements relative to the leader and an algorithm for constructing a spatial matrix of unmanned aerial vehicles placement by Pavlo Marchenko

    Published 2025-05-01
    “…In writing the article, a systematic analysis of the processes controlling unmanned systems and the synthesis of methods and algorithms for their functioning were employed. …”
    Get full text
    Article
  14. 54

    RAPO: An Automated Performance Optimization Tool for Redis Clusters in Distributed Storage Metadata Management by Yunkai Zhu, Tian Xia, Te Zhu, Zhoujie Zhao, Kexin Li, Xingbo Hu

    Published 2025-01-01
    “…By optimizing with the greedy and random iterative search algorithms, the cluster’s LBI was reduced by an average of 29.36% and 25.20% respectively during random read operations and by 24.98% and 24.03% respectively during imbalanced write operations. …”
    Get full text
    Article
  15. 55
  16. 56
  17. 57

    Learning the Style via Mixed SN-Grams: An Evaluation in Authorship Attribution by Juan Pablo Francisco Posadas-Durán, Germán Ríos-Toledo, Erick Velázquez-Lozada, J. A. de Jesús Osuna-Coutiño, Madaín Pérez-Patricio, Fernando Pech May

    Published 2025-05-01
    “…The study’s results suggest that mixed sn-grams constitute effective stylistic markers for building a reliable writing style model, which machine learning algorithms can learn.…”
    Get full text
    Article
  18. 58

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
    Get full text
    Article
  19. 59

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
    Get full text
    Article
  20. 60

    Artificial Intelligence (AI) and the University. How AI Will Change Our Approach to Education by Jacek Grzybowski

    Published 2025-06-01
    “…Observers of technological changes may rightly ask whether AI development and its takeover of various human competences will not inevitably disavow all work based on reading, acquiring knowledge, inferring, discovering, writing and producing scientific or literary works? …”
    Get full text
    Article