Showing 41 - 60 results of 198 for search '(( ((python broad) OR (python based)) implementation ) OR ( python time implementation ))', query time: 0.27s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46

    Online Resource 3: Word Cloud Dataset and Code by Jessica Zylla (17692920)

    Published 2025
    “…This set of files are part of Online Resource 3, which allows readers to implement a Jupyter Notebook Python program to create a word cloud based on survey responses. …”
  7. 47
  8. 48
  9. 49

    Five Operator Lattice Simulation by James McDaniel (22522571)

    Published 2025
    “…</p><p dir="ltr">Running the included file <code>five_operator_lattice_sim.py</code> (Python 3.14 + NumPy 2.1) reproduces the dynamic interactions and figures reported in Appendix A of the paper, generating time-series data that demonstrate operator balance, instability, and renewal cycles.…”
  10. 50
  11. 51
  12. 52

    EthoPy: Reproducible Behavioral Neuroscience Made Simple by Alexandros Evangelou (22235917)

    Published 2025
    “…To overcome these challenges, we developed EthoPy, an open-source, Python-based behavioral control framework that integrates stimulus presentation, hardware management, and data logging. …”
  13. 53

    Complex Eigenvalues, Orthogonality, and QR Factorization: Analytical Proofs and Numerical Verification by Umar Tabbsum (22058780)

    Published 2025
    “…Discrepancies between QR-based solutions and NumPy’s lstsq method are quantified to confirm high accuracy (~10⁻¹⁶), demonstrating numerical stability and machine-precision correctness.…”
  14. 54

    ZILLNB_Model by Qinhuan Luo (21288548)

    Published 2025
    “…<p dir="ltr">Acquire latent variables using deep-learning based model implemented in python</p>…”
  15. 55
  16. 56

    Graphical abstract of HCAP. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  17. 57

    Recall analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  18. 58

    Convergence rate analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  19. 59

    Computational efficiency. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  20. 60

    Analysis of IoMT data sources. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”