Search alternatives:
time implementation » _ implementation (Expand Search), policy implementation (Expand Search), effective implementation (Expand Search)
python time » python files (Expand Search)
time implementation » _ implementation (Expand Search), policy implementation (Expand Search), effective implementation (Expand Search)
python time » python files (Expand Search)
-
101
Data sets and coding scripts for research on sensory processing in ADHD and ASD
Published 2025“…The repository includes raw and matched datasets, analysis outputs, and the full Python code used for the matching pipeline.</p><h4>Ethics and Approval</h4><p dir="ltr">All procedures were approved by the University of Sheffield Department of Psychology Ethics Committee (Ref: 046476). …”
-
102
Graphical abstract of HCAP.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
103
Recall analysis.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
104
Convergence rate analysis.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
105
Computational efficiency.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
106
Analysis of IoMT data sources.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
107
Prediction accuracy on varying attack types.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
108
<b> </b> Precision analysis.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
109
Impact of cyberattack types on IoMT devices.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
110
DataSheet1_Prostruc: an open-source tool for 3D structure prediction using homology modeling.PDF
Published 2024“…</p>Methods<p>Prostruc is a Python-based homology modeling tool designed to simplify protein structure prediction through an intuitive, automated pipeline. …”
-
111
DataSheet1_Prostruc: an open-source tool for 3D structure prediction using homology modeling.PDF
Published 2024“…</p>Methods<p>Prostruc is a Python-based homology modeling tool designed to simplify protein structure prediction through an intuitive, automated pipeline. …”
-
112
Code for High-quality Human Activity Intensity Maps in China from 2000-2020
Published 2025“…<p dir="ltr">Code and remote sensing images and interpretation results of the samples for uncertainty analysis for "High-quality Human Activity Intensity Maps in China from 2000-2020"</p><p dir="ltr">“Mapping_HAI.py”:We generated the HAI maps using ArcGIS 10.8, and the geoprocessing tasks were implemented using Python 2.7 with the ArcPy library (ArcGIS 10.8 + Python 2.7 environment). …”
-
113
-
114
-
115
The codes and data for "Lane Extraction from Trajectories at Road Intersections Based on Graph Transformer Network"
Published 2024“…Each lane includes 'geometry' and 'inter_id' attributes.</li></ul><h2>Codes</h2><p dir="ltr">This repository contains the following Python codes:</p><ul><li>`data_processing.py`: Contains the implementation of data processing and feature extraction. …”
-
116
MATH_code : False Data Injection Attack Detection in Smart Grids based on Reservoir Computing
Published 2025“…</li><li><b>3_literature_analysis_and_mapping.ipynb</b><br>Contains the Python code used for executing the systematic mapping study (SMS), including automated processing of literature data and thematic clustering.…”
-
117
Monte Carlo Simulation Code for Evaluating Cognitive Biases in Penalty Shootouts Using ABAB and ABBA Formats
Published 2024“…<p dir="ltr">This Python code implements a Monte Carlo simulation to evaluate the impact of cognitive biases on penalty shootouts under two formats: ABAB (alternating shots) and ABBA (similar to tennis tiebreak format). …”
-
118
The codes and data for "A Graph Convolutional Neural Network-based Method for Predicting Computational Intensity of Geocomputation"
Published 2025“…The <b>innovations</b> and <b>steps</b> in Case 3, including data download, sample generation, and parallel computation optimization, were independently developed and are not dependent on the GeoCube’s code.</p><h2>Requirements</h2><p dir="ltr">The codes use the following dependencies with Python 3.8</p><ul><li>torch==2.0.0</li><li>torch_geometric==2.5.3</li><li>networkx==2.6.3</li><li>pyshp==2.3.1</li><li>tensorrt==8.6.1</li><li>matplotlib==3.7.2</li><li>scipy==1.10.1</li><li>scikit-learn==1.3.0</li><li>geopandas==0.13.2</li></ul><p><br></p>…”
-
119
The codes and data for "A Graph Convolutional Neural Network-based Method for Predicting Computational Intensity of Geocomputation"
Published 2025“…The <b>innovations</b> and <b>steps</b> in Case 3, including data download, sample generation, and parallel computation optimization, were independently developed and are not dependent on the GeoCube’s code.</p><h2>Requirements</h2><p dir="ltr">The codes use the following dependencies with Python 3.8</p><ul><li>torch==2.0.0</li><li>torch_geometric==2.5.3</li><li>networkx==2.6.3</li><li>pyshp==2.3.1</li><li>tensorrt==8.6.1</li><li>matplotlib==3.7.2</li><li>scipy==1.10.1</li><li>scikit-learn==1.3.0</li><li>geopandas==0.13.2</li></ul><p><br></p>…”
-
120
Evaluation and Statistical Analysis Code for "Multi-Task Learning for Joint Fisheye Compression and Perception for Autonomous Driving"
Published 2025“…</li></ul><p dir="ltr">These scripts are implemented in Python using the PyTorch framework and are provided to ensure the reproducibility of the experimental results presented in the manuscript.…”