Search alternatives:
effective implementation » effective prevention (Expand Search)
model implementing » model implemented (Expand Search), model implementation (Expand Search), model representing (Expand Search)
python effective » proven effective (Expand Search), 1_the effective (Expand Search), 2_the effective (Expand Search)
python model » python code (Expand Search), python tool (Expand Search), action model (Expand Search)
effective implementation » effective prevention (Expand Search)
model implementing » model implemented (Expand Search), model implementation (Expand Search), model representing (Expand Search)
python effective » proven effective (Expand Search), 1_the effective (Expand Search), 2_the effective (Expand Search)
python model » python code (Expand Search), python tool (Expand Search), action model (Expand Search)
-
221
The artifacts and data for the paper "DD4AV: Detecting Atomicity Violations in Interrupt-Driven Programs with Guided Concolic Execution and Filtering" (OOPSLA 2025)
Published 2025“…</li><li><ul><li><code><strong>DBDS</strong></code>: The code implements our proposed dynamic scheduling execution method, which systematically explores task interleaving for atomicity violation detection, enhanced by an effective prefix-directed strategy.…”
-
222
Fast, FAIR, and Scalable: Managing Big Data in HPC with Zarr
Published 2025“…</p><p dir="ltr">In this work, we apply the scientific datacube model to the transformation of large-scale radar datasets from Colombia and the U.S. …”
-
223
Leveraging explainable causal artificial intelligence to study forest gross primary productivity dynamics in China's protected areas
Published 2025“…<p dir="ltr">A Python script used for modeling forest GPP in China´s Protected Areas, including mean encoding of the categorical variable climate zone (CZ), multicollinearity testing using Variance Inflation Factor (VIF), implementation of four machine learning models to predict forest GPP, XAI and causality analysis.…”
-
224
Folder with all data and algorithms
Published 2025“…In this study, we present an open-source, Python-based computational framework that unifies photon transport modeling, probe geometry optimization, and photothermal safety assessment into a single workflow. …”
-
225
Table 1_Analysis of distribution equilibrium and influencing factors for older adult meal service facilities in mainland China.xlsx
Published 2025“…A multiple linear regression model was applied to explore the relationships between older adult meal services and factors such as population, economy, infrastructure, geography, and policies.…”
-
226
Soulware-Lite
Published 2025“…It supports OpenAI GPT-4, Anthropic Claude, Google Gemini, Meta LLaMA, and other open-source models.</p><p><br></p><p dir="ltr">Soulware-Lite is the first live implementation of a cognitive conscience layer, born from architectural failures in AI output hallucination and anchored by integrity principles like MAP/ARP and RDIP. …”
-
227
Code
Published 2025“…We divided the dataset into training and test sets, using 70% of the genes for training and 30% for testing. We implemented machine learning algorithms using the following R packages: rpart for Decision Trees, gbm for Gradient Boosting Machines (GBM), ranger for Random Forests, the glm function for Generalized Linear Models (GLM), and xgboost for Extreme Gradient Boosting (XGB). …”
-
228
Core data
Published 2025“…We divided the dataset into training and test sets, using 70% of the genes for training and 30% for testing. We implemented machine learning algorithms using the following R packages: rpart for Decision Trees, gbm for Gradient Boosting Machines (GBM), ranger for Random Forests, the glm function for Generalized Linear Models (GLM), and xgboost for Extreme Gradient Boosting (XGB). …”
-
229
3D PD-Controlled Nanorobot Swarm Simulation for Targeted Cancer and BBB Therapy
Published 2025“…Cancer-targeting nanorobots converge rapidly, while BBB-targeting nanorobots follow more complex paths due to navigation constraints.</p><p dir="ltr">Implemented in Python (NumPy, Matplotlib, 3D visualization), the framework is fully annotated and reproducible. …”
-
230
Globus Compute: Federated FaaS for Integrated Research Solutions
Published 2025“…</p><p dir="ltr">Globus Compute [2] is a Function-as-a-Service platform designed to provide a scalable, secure, and simple interface to HPC resources. Globus Compute implements a federated model via which users may deploy endpoints on arbitrary remote computers, from the edge to high performance computing (HPC) cluster, and they may then invoke Python functions on those endpoints via a reliable cloud-hosted service. …”
-
231
Ambient Air Pollutant Dynamics (2010–2025) and the Exceptional Winter 2016–17 Pollution Episode: Implications for a Uranium/Arsenic Exposure Event
Published 2025“…<br><br><b>Missing-Data Handling & Imputation:</b></p><p dir="ltr">The following sequential steps were applied to create a complete and consistent daily time series suitable for analysis (presented in the Imputed_AP_Data_Zurich_2010-25 sheet), particularly addressing the absence of routine PM₂.₅ measurements prior to January 2016. The full implementation is detailed in the accompanying Python script (Imputation_Air_Pollutants_NABEL.py). …”
-
232
Data and code for: Automatic fish scale analysis
Published 2025“…<p dir="ltr">This dataset accompanies the publication:<br><b>"Automatic fish scale analysis: age determination, annuli and circuli detection, length and weight back-calculation of coregonid scales"</b><br></p><p dir="ltr">It provides all essential data and statistical outputs used for the <b>verification and validation</b> of the <i>Coregon Analyzer</i> – a Python-based algorithm for automated biometric fish scale measurement.…”
-
233
MATH_code : False Data Injection Attack Detection in Smart Grids based on Reservoir Computing
Published 2025“…</li><li><b>4_final_models_pipeline.ipynb</b><br>The final implementation pipeline that loads the data, applies preprocessing and encoding (e.g., latency or ISI), trains the detection models, and stores performance metrics.…”
-
234
Online Resource: Reservoir Computing as a Promising Approach for False Data Injection Attack Detection in Smart Grids
Published 2025“…</li><li><b>4_final_models_pipeline.ipynb</b><br>The final implementation pipeline that loads the data, applies preprocessing and encoding (e.g., latency or ISI), trains the detection models, and stores performance metrics.…”
-
235
Table & Figure.pdfBrainwaves and Higher-Order Thinking: An EEG Study of Cognitive Engagement in Mathematics Tasks
Published 2025“…Code and Algorithms (if applicable)</p> <p><br></p> <p>Scripts for EEG signal processing and analysis</p> <p><br></p> <p>Machine learning or statistical modeling scripts</p> <p><br></p> <p>Any software implementation used to analyze brainwave patterns</p> <p><br></p> <p><br></p> <p><br></p> <p>4. …”
-
236
Raw Data EEG.pdfBrainwaves and Higher-Order Thinking: An EEG Study of Cognitive Engagement in Mathematics Tasks
Published 2025“…Code and Algorithms (if applicable)</p> <p><br></p> <p>Scripts for EEG signal processing and analysis</p> <p><br></p> <p>Machine learning or statistical modeling scripts</p> <p><br></p> <p>Any software implementation used to analyze brainwave patterns</p> <p><br></p> <p><br></p> <p><br></p> <p>4. …”
-
237
Mapping Policy Coherence in National UK Food Systems (2008– 2024): Analysing the Integration of Climate Change Mitigation and Adaptation Strategies, LEAP 2025 conference, Oxford
Published 2025“…</p><p dir="ltr">Data Screening inclusion criteria followed the Food Systems Countdown Initiative (FSCI).2</p><p><br></p><p dir="ltr">diets, nutrition and health</p><p dir="ltr">diet quality, food security, food environments, policies affecting</p><p dir="ltr">food environments</p><p dir="ltr">environment and climate</p><p dir="ltr">land use, greenhouse gas emissions, water use, pollution, biosphere integrity</p><p dir="ltr">livelihoods, poverty, and equity</p><p dir="ltr">poverty and income, employment, social protection, rights</p><p dir="ltr">governance</p><p dir="ltr">shared vision, strategic planning and policies, effective implementation, accountability</p><p dir="ltr">resilience and sustainability</p><p dir="ltr">exposure to shocks, resilience capacities, agrobiodiversity, food security stability</p><p><br></p><p dir="ltr">Findings</p><p dir="ltr">o N=157 policy documents integrate climate change considerations.…”
-
238
Data Sheet 1_COCαDA - a fast and scalable algorithm for interatomic contact detection in proteins using Cα distance matrices.pdf
Published 2025“…Here, we introduce COCαDA (COntact search pruning by Cα Distance Analysis), a Python-based command-line tool for improving search pruning in large-scale interatomic protein contact analysis using alpha-carbon (Cα) distance matrices. …”
-
239
OHID-FF dataset for forest fire detection and classification
Published 2025“…</p><p dir="ltr">- Pointed to the `train val scripts/` README for model-specific commands and dependencies.</p>…”
-
240
IGD-cyberbullying-detection-AI
Published 2024“…[<a href="https://doi.org/10.6084/m9.figshare.27266961" rel="nofollow" target="_blank">https://doi.org/10.6084/m9.figshare.27266961</a>]</p><h2>Table of Contents</h2><ul><li><a href="https://github.com/BryanSJamesDev/IGD-cyberbullying-detection-AI#overview" target="_blank">Overview</a></li><li><a href="https://github.com/BryanSJamesDev/IGD-cyberbullying-detection-AI#requirements" target="_blank">Requirements</a></li><li><a href="https://github.com/BryanSJamesDev/IGD-cyberbullying-detection-AI#datasets" target="_blank">Datasets</a></li><li><a href="https://github.com/BryanSJamesDev/IGD-cyberbullying-detection-AI#installation" target="_blank">Installation</a></li><li><a href="https://github.com/BryanSJamesDev/IGD-cyberbullying-detection-AI#running-the-code" target="_blank">Running the Code</a></li><li><a href="https://github.com/BryanSJamesDev/IGD-cyberbullying-detection-AI#expected-results" target="_blank">Expected Results</a></li></ul><h2>Overview</h2><p dir="ltr">This repository provides the code for predicting mental health outcomes associated with Internet Gaming Disorder (IGD) and Cyberbullying using machine learning and deep learning models. Models like Logistic Regression, Random Forest, Ensemble Models, CNNs, and LSTMs are implemented to detect patterns from behavioral data.…”