Showing 41 - 60 results of 177 for search '(( ((python time) OR (python files)) implementation ) OR ( python tool implementation ))', query time: 0.39s Refine Results
  1. 41

    Task descriptions. by Pedro C. Martínez-Suárez (21192459)

    Published 2025
    “…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
  2. 42

    Finites differences python code to solve CH equation with a source term and Comsol routine to solve Brusselator equation in radial domains. by Giulio Facchini (9031490)

    Published 2025
    “…<p dir="ltr"><b><i>* Cahn-Hilliard simulations *</i></b><br>Finite difference code implementing the modified Cahn Hilliard equation with a forward Euler scheme and the possibility to parallelize the solver using the numba python library.…”
  3. 43

    This package of Python scripts implements the proposed unsupervised sentiment analysis approach.... by Xiaohan Yu (7525940)

    Published 2025
    “…<p>This package of Python scripts implements the proposed unsupervised sentiment analysis approach. …”
  4. 44

    Simple implementation examples of agent AI on free energy calculation and phase-field simulation by Toshiyuki Koyama (22828581)

    Published 2025
    “…</p> <p>Using Gibbs energy calculations and diffusion simulations as examples, we demonstrated the implementation method and usefulness of simple agent AI, where sample python codes are distributed as supplemental materials.…”
  5. 45

    A comparison between the static Python-based visualizations of the p65 activity in activated fibroblasts and the dynamic, HTML-based visualizations that use these same reduction me... by Hector Torres (11708207)

    Published 2025
    “…<p><b>(a)</b> UMAP, t-SNE, PCA, and Diffmap were first generated using the Python libraries Scikit-learn, UMAP, and PyDiffmap within Jupyter to generate static graphs as a starting point. …”
  6. 46

    Design and Implementation of a Browser-Based Toolfor Protecting Gaming Assets from UnauthorizedAccess by Alim Imashev (22606007)

    Published 2025
    “…<p dir="ltr">The project <b>“Design and Implementation of a Browser-Based Tool for Protecting Gaming Assets from Unauthorized Access”</b> focuses on developing a security-oriented software solution that safeguards digital game assets within browser environments.…”
  7. 47

    PTPC-UHT bounce by David Parry (22169299)

    Published 2025
    “…<br>It contains the full Python implementation of the PTPC bounce model (<code>PTPC_UHT_bounce.py</code>) and representative outputs used to generate the figures in the paper. …”
  8. 48
  9. 49

    Overview of deep learning terminology. by Aaron E. Maxwell (8840882)

    Published 2024
    “…Training loops are implemented with the luz package. The geodl package provides utility functions for creating raster masks or labels from vector-based geospatial data and image chips and associated masks from larger files and extents. …”
  10. 50

    Graphical abstract of HCAP. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  11. 51

    Recall analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  12. 52

    Convergence rate analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  13. 53

    Computational efficiency. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  14. 54

    Analysis of IoMT data sources. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  15. 55

    Prediction accuracy on varying attack types. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  16. 56

    <b> </b> Precision analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  17. 57

    Impact of cyberattack types on IoMT devices. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  18. 58

    DataSheet1_Prostruc: an open-source tool for 3D structure prediction using homology modeling.PDF by Shivani V. Pawar (20355171)

    Published 2024
    “…</p>Methods<p>Prostruc is a Python-based homology modeling tool designed to simplify protein structure prediction through an intuitive, automated pipeline. …”
  19. 59

    DataSheet1_Prostruc: an open-source tool for 3D structure prediction using homology modeling.PDF by Shivani V. Pawar (20355171)

    Published 2024
    “…</p>Methods<p>Prostruc is a Python-based homology modeling tool designed to simplify protein structure prediction through an intuitive, automated pipeline. …”
  20. 60