بدائل البحث:
code represent » models represent (توسيع البحث), dots represent (توسيع البحث), d represent (توسيع البحث)
python proof » method proof (توسيع البحث)
code represent » models represent (توسيع البحث), dots represent (توسيع البحث), d represent (توسيع البحث)
python proof » method proof (توسيع البحث)
-
41
-
42
Python implementation of a wildfire propagation example using m:n-CAk over Z and R.
منشور في 2025"…</p><p dir="ltr"><br></p><p dir="ltr">## Files in the Project</p><p dir="ltr"><br></p><p dir="ltr">### Python Scripts</p><p dir="ltr">- **Wildfire_on_m_n-CAk.py**: This file contains the main code for the fire cellular automaton. …"
-
43
-
44
-
45
6. Motif Code Theory
منشور في 2025"…<p dir="ltr">The Motif Code Theory (MCT) simulation code, mct_unified_code.py, is a Python 3.9 script that models the universe as a time-dependent directed multigraph G(t) = (V(t), E(t)) with N=10^7 vertices (representing quantum fields/particles) and edges (interactions). …"
-
46
-
47
-
48
-
49
-
50
-
51
Memory monitoring recognition test workflow.
منشور في 2025"…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …"
-
52
Voice recognition workflow.
منشور في 2025"…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …"
-
53
Memory monitoring recognition test main screen.
منشور في 2025"…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …"
-
54
Task descriptions.
منشور في 2025"…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …"
-
55
CompuCrawl: Full database and code
منشور في 2024"…<p><br></p><p dir="ltr">This folder contains the full set of code and data for the CompuCrawl database. The database contains the archived websites of publicly traded North American firms listed in the Compustat database between 1996 and 2020—representing 11,277 firms with 86,303 firm/year observations and 1,617,675 webpages in the final cleaned and selected set.…"
-
56
Catalogue of compact radio sources in Messier-82 from e-MERLIN observations
منشور في 2025"…Source finding was initially performed using Python Blob Detection and Source Finder (PyBDSF).</p><p dir="ltr">The dataset includes two tables detailing the properties of these 36 sources:</p><p dir="ltr"><b>Table 3.1: CASA </b><code><strong>imfit</strong></code><b> Source Catalogue</b></p><p dir="ltr">This table contains source parameters derived using the CASA task <code>imfit</code>. …"
-
57
Simple implementation examples of agent AI on free energy calculation and phase-field simulation
منشور في 2025"…</p> <p>Using Gibbs energy calculations and diffusion simulations as examples, we demonstrated the implementation method and usefulness of simple agent AI, where sample python codes are distributed as supplemental materials.…"
-
58
A comparison between the static Python-based visualizations of the p65 activity in activated fibroblasts and the dynamic, HTML-based visualizations that use these same reduction me...
منشور في 2025"…<p><b>(a)</b> UMAP, t-SNE, PCA, and Diffmap were first generated using the Python libraries Scikit-learn, UMAP, and PyDiffmap within Jupyter to generate static graphs as a starting point. …"
-
59
Design and Implementation of a Browser-Based Toolfor Protecting Gaming Assets from UnauthorizedAccess
منشور في 2025"…<p dir="ltr">The project <b>“Design and Implementation of a Browser-Based Tool for Protecting Gaming Assets from Unauthorized Access”</b> focuses on developing a security-oriented software solution that safeguards digital game assets within browser environments.…"
-
60
PTPC-UHT bounce
منشور في 2025"…<br>It contains the full Python implementation of the PTPC bounce model (<code>PTPC_UHT_bounce.py</code>) and representative outputs used to generate the figures in the paper. …"