Showing 21 - 40 results of 129 for search '(( ((python proof) OR (python tool)) implementation ) OR ( python time implementation ))', query time: 0.57s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24

    BSTPP: a python package for Bayesian spatiotemporal point processes by Isaac Manring (20705955)

    Published 2025
    “…<p>Spatiotemporal point process models have a rich history of effectively modeling event data in space and time. However, they are sometimes neglected due to the difficulty of implementing them. …”
  5. 25

    Exploring the integration of metaverse technologies in engineering education through the SAMR model by Snezhana Dineva (22444471)

    Published 2025
    “…The metaverse is presented as a tool to improve the learning process and to promote innovative educational approaches. …”
  6. 26
  7. 27
  8. 28
  9. 29

    Memory monitoring recognition test workflow. by Pedro C. Martínez-Suárez (21192459)

    Published 2025
    “…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
  10. 30

    Voice recognition workflow. by Pedro C. Martínez-Suárez (21192459)

    Published 2025
    “…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
  11. 31

    Memory monitoring recognition test main screen. by Pedro C. Martínez-Suárez (21192459)

    Published 2025
    “…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
  12. 32

    Task descriptions. by Pedro C. Martínez-Suárez (21192459)

    Published 2025
    “…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
  13. 33

    Five Operator Lattice Simulation by James McDaniel (22522571)

    Published 2025
    “…</p><p dir="ltr">Running the included file <code>five_operator_lattice_sim.py</code> (Python 3.14 + NumPy 2.1) reproduces the dynamic interactions and figures reported in Appendix A of the paper, generating time-series data that demonstrate operator balance, instability, and renewal cycles.…”
  14. 34

    Simple implementation examples of agent AI on free energy calculation and phase-field simulation by Toshiyuki Koyama (22828581)

    Published 2025
    “…</p> <p>Using Gibbs energy calculations and diffusion simulations as examples, we demonstrated the implementation method and usefulness of simple agent AI, where sample python codes are distributed as supplemental materials.…”
  15. 35

    A comparison between the static Python-based visualizations of the p65 activity in activated fibroblasts and the dynamic, HTML-based visualizations that use these same reduction me... by Hector Torres (11708207)

    Published 2025
    “…<p><b>(a)</b> UMAP, t-SNE, PCA, and Diffmap were first generated using the Python libraries Scikit-learn, UMAP, and PyDiffmap within Jupyter to generate static graphs as a starting point. …”
  16. 36

    Design and Implementation of a Browser-Based Toolfor Protecting Gaming Assets from UnauthorizedAccess by Alim Imashev (22606007)

    Published 2025
    “…<p dir="ltr">The project <b>“Design and Implementation of a Browser-Based Tool for Protecting Gaming Assets from Unauthorized Access”</b> focuses on developing a security-oriented software solution that safeguards digital game assets within browser environments.…”
  17. 37

    Graphical abstract of HCAP. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  18. 38

    Recall analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  19. 39

    Convergence rate analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  20. 40

    Computational efficiency. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”