Showing 1 - 20 results of 40 for search 'writing algorithm', query time: 0.08s Refine Results
  1. 1

    Software implementation of the system for learning to write Chinese characters by N. V. Gubanov

    Published 2023-08-01
    “…Each of the writing features is an integral part of learning a language, since it can not only completely change the meaning of the written hieroglyph, but also help the learner to memorize the hieroglyph in a structured way, giving him a clear structure and algorithm of actions for writing the hieroglyph. …”
    Get full text
    Article
  2. 2

    Robots Learn Writing by Huan Tan, Qian Du, Na Wu

    Published 2012-01-01
    “…This paper proposes a general method for robots to learn motions and corresponding semantic knowledge simultaneously. A modified ISOMAP algorithm is used to convert the sampled 6D vectors of joint angles into 2D trajectories, and the required movements for writing numbers are learned from this modified ISOMAP-based model. …”
    Get full text
    Article
  3. 3

    Magnetic Coil’s Performance Optimization with Nonsmooth Search Algorithms by Igor Reznichenko, Primož Podržaj, Aljoša Peperko

    Published 2025-08-01
    “…Numerical tests using non-gradient search algorithms show the difference in optimal designs provided by these methods. …”
    Get full text
    Article
  4. 4

    Apply Block Ciphers Using Tiny Encryption Algorithm (TEA) by Hana Rashied Ismaeel

    Published 2010-06-01
    “…The paper presents how a block cipher could be constructed in general, it includes an observation of the history, inventors, and algorithms of the TEA block ciphers. It also discuss the manner did the programming took in terms of modularity, simplicity, resource reservation, in the previous algorithm the user cannot enter the plain text as a characters, it must enter the ASCII cod of the characters we write a lot e of functions to solve this problem also we enable the user to save his message in text file to make him use it to receive a message from email ,Also the time of encryption and decryption are calculated to measure the performance of the algorithm., The implementation of TEA is made using C/C++ Borland compiler version( 4.5). …”
    Get full text
    Article
  5. 5
  6. 6

    Fuzzy logic, genetic algorithms, and artificial neural networks applied to cognitive radio networks: A review by Ahmed Alkhayyat, Firas Abedi, Ashish Bagwari, Pooja Joshi, Haider Mahmood Jawad, Sarmad Nozad Mahmood, Yousif K Yousif

    Published 2022-07-01
    “…Computerized reasoning approaches, such as fuzzy logic, evolutionary algorithms, and artificial neural networks, are used in the writing audit. …”
    Get full text
    Article
  7. 7

    Simulation of direct mapped, k-way and fully associative cache on all pairs shortest paths algorithms by A. A. Prihozhy

    Published 2019-12-01
    “…This paper presents a technique of simulating the direct mapped, k-way associative and fully associative cache during the algorithm execution, to measure the frequency of read data to cache and write data to memory operations. …”
    Get full text
    Article
  8. 8
  9. 9

    Learning the Style via Mixed SN-Grams: An Evaluation in Authorship Attribution by Juan Pablo Francisco Posadas-Durán, Germán Ríos-Toledo, Erick Velázquez-Lozada, J. A. de Jesús Osuna-Coutiño, Madaín Pérez-Patricio, Fernando Pech May

    Published 2025-05-01
    “…The study’s results suggest that mixed sn-grams constitute effective stylistic markers for building a reliable writing style model, which machine learning algorithms can learn.…”
    Get full text
    Article
  10. 10

    Weak form shallow ice approximation models with an improved time-step restriction by Igor Tominec, Josefin Ahlkrona

    Published 2025-01-01
    “…When that velocity field is used to advance the ice surface in time, the time steps have to take small values due to quadratic scaling in the horizontal mesh size. In this paper, we write the SIA model in weak form and add in the free-surface stabilization algorithm (FSSA) terms. …”
    Get full text
    Article
  11. 11

    Research on Automatic Test Case Generation Technology Based on Finite State Machines and Function Block Diagrams by LI Ning, XIONG Yan, DING Yaoguo

    Published 2024-12-01
    “…Following the modeling based on finite state machines and function block diagrams, this study explored a transformation algorithm that converts function block diagrams into finite state machines and an automatic test case generation algorithm. …”
    Get full text
    Article
  12. 12

    REVIEW OF: GOLUBKOVA O.N. FUNDAMENTALS OF SCIENTIFIC RESEARCH IN THE PROFESSIONAL FIELD: TEXTBOOK by A.A. Bilyalova, A.N. Utekhina

    Published 2025-07-01
    “…The research methodology course enhances students’ research skills and intensifies their final qualifying paper writing by deepening their understanding of methodological principles. …”
    Get full text
    Article
  13. 13

    CLINICAL STUDY REPORT: AN OVERVIEW OF REGULATORY DOCUMENTS AND THE ORGANIZATIONAL AND PRACTICAL ASPECTS OF DEVELOPMENT by E. A. Radkova, I. N. Petrova, K. A. Leus, I. A. Dobromyslov

    Published 2019-01-01
    “…This article provides an overview of the current Russian and international regulatory documents and recommendations of professional organizations on the content and structure of the clinical study report, and describes an example of an algorithm for preparing the report from the earliest stages (data processing) to writing the final report with interpretation of study results.…”
    Get full text
    Article
  14. 14

    Asset Valuation Concept by N. V. Tkachuk

    Published 2024-06-01
    “…An algorithm for generating a balance sheet corresponding to the static balance theory and a report on the financial results of the organization’s activities corresponding to the dynamic balance theory is presented. …”
    Get full text
    Article
  15. 15

    Artificial intelligence in teaching programming to students of pedagogical university by I. A. Yashina

    Published 2024-09-01
    “…In particular, the use of artificial intelligence helps the student in writing and debugging code, simplifies the process of explaining to the instructor the ways of algorithm development and program compilation. …”
    Get full text
    Article
  16. 16

    Unbalance terminal control method at the reception, storage and delivery of petroleum products to the fuel depots of JSC “Russian Railways” by A. G. Godnev, E. P. Loktev, S. N. Naumenko

    Published 2016-10-01
    “…In practice, the method can be implemented with control algorithm of terminal control, provided that the relative error of the incoming of the actual mass of oil product to the tank is within the range stated in regulations. …”
    Get full text
    Article
  17. 17

    Sentiment Analysis Twitter Bahasa Indonesia Berbasis WORD2VEC Menggunakan Deep Convolutional Neural Network by Hans Juwiantho, Esther Irawati Setiawan, Joan Santoso, Mauridhi Hery Purnomo

    Published 2020-02-01
    “…The results of experiments that have been carried out with the Deep Convolutional Neural Network algorithm have the best accuracy value of 76.40%. …”
    Get full text
    Article
  18. 18

    Detection of Hijaiyah Letters Handwritten in Early Childhood Using Yolov8 by Hidayatul Mustagfiroh, Aviv Yuniar Rahman, Rangga Pahlevi Putra

    Published 2025-07-01
    “…This study investigates the effectiveness of the YOLOv8 (You Only Look Once version 8) algorithm in detecting handwritten Hijaiyah letters among early childhood learners. …”
    Get full text
    Article
  19. 19

    Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses by Norah Alanazi, Esam Khan, Adnan Gutub

    Published 2022-04-01
    “…This technique also has a higher security ratio than the other methods in this study, with the exception of Method 5, and is robust against electronic text modifications such as copying, pasting, and text formatting. Moreover, our algorithm can be widely adopted in related languages, such as Urdu and Farsi, due to its utilization of Unicode characters, which is the encoding standard used in most of the world’s writing systems.…”
    Get full text
    Article
  20. 20

    Pattern of adverse drug reactions to anticancer drugs: A quantitative and qualitative analysis by Shruti Singh, D C Dhasmana, Manisha Bisht, Prashant Kumar Singh

    Published 2017-01-01
    “…According to the Naranjo's algorithm, 100% ADRs fell in probable category. About 94.80% reactions were found to be predictable. …”
    Get full text
    Article