Search alternatives:
tool implementation » world implementation (Expand Search), model implementation (Expand Search), proof implementation (Expand Search)
tool implementation » world implementation (Expand Search), model implementation (Expand Search), proof implementation (Expand Search)
-
41
Task descriptions.
Published 2025“…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
-
42
Finites differences python code to solve CH equation with a source term and Comsol routine to solve Brusselator equation in radial domains.
Published 2025“…<p dir="ltr"><b><i>* Cahn-Hilliard simulations *</i></b><br>Finite difference code implementing the modified Cahn Hilliard equation with a forward Euler scheme and the possibility to parallelize the solver using the numba python library.…”
-
43
This package of Python scripts implements the proposed unsupervised sentiment analysis approach....
Published 2025“…<p>This package of Python scripts implements the proposed unsupervised sentiment analysis approach. …”
-
44
Simple implementation examples of agent AI on free energy calculation and phase-field simulation
Published 2025“…</p> <p>Using Gibbs energy calculations and diffusion simulations as examples, we demonstrated the implementation method and usefulness of simple agent AI, where sample python codes are distributed as supplemental materials.…”
-
45
A comparison between the static Python-based visualizations of the p65 activity in activated fibroblasts and the dynamic, HTML-based visualizations that use these same reduction me...
Published 2025“…<p><b>(a)</b> UMAP, t-SNE, PCA, and Diffmap were first generated using the Python libraries Scikit-learn, UMAP, and PyDiffmap within Jupyter to generate static graphs as a starting point. …”
-
46
Design and Implementation of a Browser-Based Toolfor Protecting Gaming Assets from UnauthorizedAccess
Published 2025“…<p dir="ltr">The project <b>“Design and Implementation of a Browser-Based Tool for Protecting Gaming Assets from Unauthorized Access”</b> focuses on developing a security-oriented software solution that safeguards digital game assets within browser environments.…”
-
47
PTPC-UHT bounce
Published 2025“…<br>It contains the full Python implementation of the PTPC bounce model (<code>PTPC_UHT_bounce.py</code>) and representative outputs used to generate the figures in the paper. …”
-
48
-
49
Overview of deep learning terminology.
Published 2024“…Training loops are implemented with the luz package. The geodl package provides utility functions for creating raster masks or labels from vector-based geospatial data and image chips and associated masks from larger files and extents. …”
-
50
Graphical abstract of HCAP.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
51
Recall analysis.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
52
Convergence rate analysis.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
53
Computational efficiency.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
54
Analysis of IoMT data sources.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
55
Prediction accuracy on varying attack types.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
56
<b> </b> Precision analysis.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
57
Impact of cyberattack types on IoMT devices.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
58
DataSheet1_Prostruc: an open-source tool for 3D structure prediction using homology modeling.PDF
Published 2024“…</p>Methods<p>Prostruc is a Python-based homology modeling tool designed to simplify protein structure prediction through an intuitive, automated pipeline. …”
-
59
DataSheet1_Prostruc: an open-source tool for 3D structure prediction using homology modeling.PDF
Published 2024“…</p>Methods<p>Prostruc is a Python-based homology modeling tool designed to simplify protein structure prediction through an intuitive, automated pipeline. …”
-
60