-
41
A personalized recommendation algorithm for English exercises incorporating fuzzy cognitive models and multiple attention mechanisms
Published 2025-04-01“…In response to the above problems in the recommendation of English reading, writing and translation exercises in higher education, this paper proposes an algorithm that combines improved fuzzy cognitive diagnosis model and multi-head attention mechanism to predict students’ performance on future recommended exercises. …”
Get full text
Article -
42
Enhanced OCR Recognition for Madurese Text Documents: A Genetic Algorithm Approach with Tesseract 5.5
Published 2025-08-01“…Character Recognition (OCR) for the Madurese language using Genetic Algorithms (GA). The study addresses the challenges in processing Madurese text documents by implementing a nine-step image preprocessing workflow optimized through GA. …”
Get full text
Article -
43
Fuzzy logic, genetic algorithms, and artificial neural networks applied to cognitive radio networks: A review
Published 2022-07-01“…Computerized reasoning approaches, such as fuzzy logic, evolutionary algorithms, and artificial neural networks, are used in the writing audit. …”
Get full text
Article -
44
Leveraging retinanet based object detection model for assisting visually impaired individuals with metaheuristic optimization algorithm
Published 2025-05-01“…Abstract Visually impaired individuals suffer many problems in handling their everyday activities like road crossing, writing, finding an object, reading, and so on. However, many navigation methods are available, and efficient object detection (OD) methods for visually impaired people (VIP) need to be improved. …”
Get full text
Article -
45
Simulation of direct mapped, k-way and fully associative cache on all pairs shortest paths algorithms
Published 2019-12-01“…This paper presents a technique of simulating the direct mapped, k-way associative and fully associative cache during the algorithm execution, to measure the frequency of read data to cache and write data to memory operations. …”
Get full text
Article -
46
Reflection-AI: artificial intelligence or algorithmic instruction problem? Empowering students through situated knowledges-based reflexivity
Published 2025-05-01“…Drawing on technology studies and critical reflection on student experiences with English academic writing assignments in pre-AI era Korea, I reposition the “AI problem” as a cultural problem, namely an “algorithmic instruction” problem concerning structural prioritization of formulaic student work and pedagogical standardization, not a novel technology or individual moral(e) problem. …”
Get full text
Article -
47
User alignment across social networks
Published 2022-01-01“…For user writing style, it is identified by One-Class SVM algorithm, and finally, the information entropy empowerment method is used to compare the similarity of user profile attributes. …”
Get full text
Article -
48
The impact of artificial intelligence on research efficiency
Published 2025-06-01“…However, challenges such as bias in algorithms, concerns about data privacy, and deficiencies in the infrastructure impede wide-scale application. …”
Get full text
Article -
49
Cuneiform Symbols Recognition Based on K-Means and Neural Network
Published 2013-03-01“…The proposed algorithm gave good results.…”
Get full text
Article -
50
Research on the Trusted Traceability Model of Taishan Tea Products Based on Blockchain
Published 2024-11-01“…The optimized SM2 encryption algorithm is introduced, and the execution efficiency of the encryption algorithm is improved by the concurrent processing framework, which guarantees the security and transmission speed of the data. …”
Get full text
Article -
51
PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM
Published 2019-05-01“…Accepting the existing methodology as a baseline, the purpose of the article is to develop a private method of forming requirements for GIS from unauthorized access to the AU, which has practical value and allows you to formulate quantitative requirements for a wide class of certified GIS.Method. When writing the article, the methods of system analysis, evolutionary modeling, probability theory and mathematical statistics, mathematical apparatus for modeling dynamic discrete networks (E-networks), and theory of algorithms were used. …”
Get full text
Article -
52
-
53
A method for determining the topology of swarm elements relative to the leader and an algorithm for constructing a spatial matrix of unmanned aerial vehicles placement
Published 2025-05-01“…In writing the article, a systematic analysis of the processes controlling unmanned systems and the synthesis of methods and algorithms for their functioning were employed. …”
Get full text
Article -
54
RAPO: An Automated Performance Optimization Tool for Redis Clusters in Distributed Storage Metadata Management
Published 2025-01-01“…By optimizing with the greedy and random iterative search algorithms, the cluster’s LBI was reduced by an average of 29.36% and 25.20% respectively during random read operations and by 24.98% and 24.03% respectively during imbalanced write operations. …”
Get full text
Article -
55
-
56
DEFINITION OF TYPOS IN ANSWER OF STUDENT IN KNOWN CORRECT ANSWER
Published 2016-05-01Get full text
Article -
57
Learning the Style via Mixed SN-Grams: An Evaluation in Authorship Attribution
Published 2025-05-01“…The study’s results suggest that mixed sn-grams constitute effective stylistic markers for building a reliable writing style model, which machine learning algorithms can learn.…”
Get full text
Article -
58
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
Get full text
Article -
59
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
Get full text
Article -
60
Artificial Intelligence (AI) and the University. How AI Will Change Our Approach to Education
Published 2025-06-01“…Observers of technological changes may rightly ask whether AI development and its takeover of various human competences will not inevitably disavow all work based on reading, acquiring knowledge, inferring, discovering, writing and producing scientific or literary works? …”
Get full text
Article