Search alternatives:
code representing » model representing (Expand Search), models representing (Expand Search), tpd representing (Expand Search)
from implementing » after implementing (Expand Search), _ implementing (Expand Search)
code representing » model representing (Expand Search), models representing (Expand Search), tpd representing (Expand Search)
from implementing » after implementing (Expand Search), _ implementing (Expand Search)
-
81
Analysis of IoMT data sources.
Published 2025“…The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
82
Prediction accuracy on varying attack types.
Published 2025“…The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
83
<b> </b> Precision analysis.
Published 2025“…The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
84
Prediction accuracy analysis over time steps.
Published 2025“…The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
85
Impact of cyberattack types on IoMT devices.
Published 2025“…The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
86
Computing speed and memory usage.
Published 2025“…<b>(b)</b> Physical memory consumption depending on simulated plane in radial and depth direction. Color coding same as in (a). Memory consumption was recorded as the maximum resident size during simulation monitored with the Python built-in module resource. …”
-
87
-
88
Replication package for Exploring the relation between source code commit information and SonarQube issues
Published 2025“…<p dir="ltr">This item represents a replication package/dataset for the article `Exploring the relation between source code commit information and SonarQube issues`. …”
-
89
R codes and curated dataset for “EnoLEX: A Diachronic Lexical Database for the Enggano Language”
Published 2025“…</p><blockquote><b><i>EnoLEX</i></b><i> represents a network of independent research materials consisting of a </i><a href="https://doi.org/10.25446/oxford.28295648.v1" rel="noreferrer" target="_blank"><i>source dataset</i></a><i>, this repository of source R codes and the curated data, the </i><a href="https://enggano.shinyapps.io/enolex/" rel="noreferrer" target="_blank"><i>online database</i></a><i>, and a conference </i><a href="https://doi.org/10.25446/oxford.27013864.v1" rel="noreferrer" target="_blank"><i>paper</i></a><i>.…”
-
90
-
91
Supporting data for "Interpreting complex ecological patterns and processes across differentscales using Artificial Intelligence"
Published 2025“…</p><p dir="ltr">Firstly, a Python package HSC3D, was developed to quantify habitat structural complexity (HSC) at the community level. …”
-
92
Smart contract and interface code for Nature Energy "A general form of smart contract for decentralised energy systems management"
Published 2024“…This provides the modelled electricity network cost data, the smart contract code, and the Python interface scripts described in the Nature Energy Paper "A general form of smart contract for decentralised energy systems management." …”
-
93
Workflow of a typical Epydemix run.
Published 2025“…By lowering the barrier for the implementation of computational and inference approaches, Epydemix makes epidemic modeling more accessible to a wider range of users, from academic researchers to public health professionals.…”
-
94
<b>Data and Code from 'The Perfect and Legitimate Bribe': A Transparent Record of Human-AI Collaboration in Legal Scholarship</b>
Published 2025“…</p><p dir="ltr">For optimal viewing of `collated-anonymized.txt`, a text editor that can handle long lines without word wrapping is recommended to preserve the indentation that represents the conversational branching structure.</p><p><br></p><p dir="ltr">### **Running Code/Software**</p><p dir="ltr">The provided scripts (`collator-ipynb.txt` and `sentence-ancestry-ipynb.txt`) are Jupyter Notebooks and require a Python 3 environment to run. …”
-
95
Number of tweets collected over time.
Published 2025“…The process of collecting and creating the database for this study went through three major stages, subdivided into several processes: (1) A preliminary analysis of the platform and its operation; (2) Contextual analysis, creation of the conceptual model, and definition of Keywords and (3) Implementation of the Data Collection Strategy. Python algorithms were developed to model each primary collection type. …”
-
96
Descriptive measures of the dataset.
Published 2025“…The process of collecting and creating the database for this study went through three major stages, subdivided into several processes: (1) A preliminary analysis of the platform and its operation; (2) Contextual analysis, creation of the conceptual model, and definition of Keywords and (3) Implementation of the Data Collection Strategy. Python algorithms were developed to model each primary collection type. …”
-
97
Media information.
Published 2025“…The process of collecting and creating the database for this study went through three major stages, subdivided into several processes: (1) A preliminary analysis of the platform and its operation; (2) Contextual analysis, creation of the conceptual model, and definition of Keywords and (3) Implementation of the Data Collection Strategy. Python algorithms were developed to model each primary collection type. …”
-
98
Table of the database statistical measures.
Published 2025“…The process of collecting and creating the database for this study went through three major stages, subdivided into several processes: (1) A preliminary analysis of the platform and its operation; (2) Contextual analysis, creation of the conceptual model, and definition of Keywords and (3) Implementation of the Data Collection Strategy. Python algorithms were developed to model each primary collection type. …”
-
99
Tweets information.
Published 2025“…The process of collecting and creating the database for this study went through three major stages, subdivided into several processes: (1) A preliminary analysis of the platform and its operation; (2) Contextual analysis, creation of the conceptual model, and definition of Keywords and (3) Implementation of the Data Collection Strategy. Python algorithms were developed to model each primary collection type. …”
-
100
Examples of tweets texts (Portuguese).
Published 2025“…The process of collecting and creating the database for this study went through three major stages, subdivided into several processes: (1) A preliminary analysis of the platform and its operation; (2) Contextual analysis, creation of the conceptual model, and definition of Keywords and (3) Implementation of the Data Collection Strategy. Python algorithms were developed to model each primary collection type. …”