Showing 1 - 20 results of 430 for search '(( python _ implementing ) OR ( python model representing ))', query time: 0.28s Refine Results
  1. 1

    SCADET algorithm parameter configuration (Python implementation). by Xiaolong Zhang (470454)

    Published 2025
    “…<p>SCADET algorithm parameter configuration (Python implementation).</p>…”
  2. 2

    Comparison of performance between our next reaction implementation and the Python library from Ref. [3]. by Samuel Cure (22250922)

    Published 2025
    “…<p>We simulate SIR epidemic processes on Watts-Strogatz networks with parameters <i>k</i><sub>0</sub> = 5, <i>p</i> = 0.1 <b>(a)</b> and Barabási-Albert networks with parameter <i>m</i> = 5 <b>(b)</b> using the Python wrapper of our C++ implementation and compare its performance with the Python library from Ref. …”
  3. 3
  4. 4

    Python implementation of a wildfire propagation example using m:n-CAk over Z and R. by Pau Fonseca i Casas (9507338)

    Published 2025
    “…<p dir="ltr"># m:n-CAk Wildfire Simulation Project</p><p dir="ltr"><br></p><p dir="ltr">## Overview</p><p dir="ltr">This project simulates the spread of a wildfire using a cellular automaton model based on m:n-CAk. The simulation takes into account various factors such as vegetation type, and humidity levels, to model the propagation of the fire over a landscape. …”
  5. 5

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education by Suha Assayed (22454038)

    Published 2025
    “…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
  6. 6
  7. 7

    Comprehensive Analysis of Key Probability Distributions in Data Science: Applications, Mathematical Formulations, and Python Implementation by Rasikh Tariq (17117866)

    Published 2024
    “…Comprehensive Analysis of Key Probability Distributions in Data Science: Applications, Mathematical Formulations, and Python Implementation. Open Educational Resource for the Data Analytics and Artificial Intelligence II course. …”
  8. 8

    Python code for hierarchical cluster analysis of detected R-strategies from rule-based NLP on 500 circular economy definitions by Zahir Barahmand (18008947)

    Published 2025
    “…</p><p dir="ltr">This Python code was optimized and debugged using ChatGPT-4o to ensure implementation efficiency, accuracy, and clarity.…”
  9. 9
  10. 10

    Is your Open Source Research Community implementing the Diversity Equity and Inclusion (DEI) equivalent of Python 2.6? by Rowland Mosbergen (7533140)

    Published 2025
    “…</p><p dir="ltr">However many DEI strategies fail because they think they are implementing the DEI equivalent of Python 3.13 when they are actually implementing the DEI equivalent of Python 2.6.…”
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Cost functions implemented in Neuroptimus. by Máté Mohácsi (20469514)

    Published 2024
    “…We used the common interface provided by Neuroptimus to conduct a detailed comparison of more than twenty different algorithms (and implementations) on six distinct benchmarks that represent typical scenarios in neuronal parameter search. …”
  16. 16

    Python implementation for image-based ERT inversion using ViT, CNN, UNet, and LDM models, and related data conversion and visualization by Huichao Yin (14589020)

    Published 2025
    “…<p dir="ltr">Python implementation for image-based ERT inversion using ViT, CNN, UNet, and LDM models, and related data conversion and visualization.…”
  17. 17
  18. 18

    PTPC-UHT bounce by David Parry (22169299)

    Published 2025
    “…<br>It contains the full Python implementation of the PTPC bounce model (<code>PTPC_UHT_bounce.py</code>) and representative outputs used to generate the figures in the paper. …”
  19. 19
  20. 20

    Source Code for the Hierarchical Key Assignment Scheme (HKAS) by Baris Celiktas (22804778)

    Published 2025
    Subjects: “…Hierarchical Key Assignment, Cryptography, Key Management, HKAS, Security Model, Python Implementation…”