Search alternatives:
model implementation » modular implementation (Expand Search), world implementation (Expand Search), time implementation (Expand Search)
code presented » model presented (Expand Search), side presented (Expand Search), order presented (Expand Search)
python model » python tool (Expand Search), action model (Expand Search), motion model (Expand Search)
model implementation » modular implementation (Expand Search), world implementation (Expand Search), time implementation (Expand Search)
code presented » model presented (Expand Search), side presented (Expand Search), order presented (Expand Search)
python model » python tool (Expand Search), action model (Expand Search), motion model (Expand Search)
-
321
Measurement data from full-scale fire experiments of battery electric vehicles and internal combustion engine vehicles
Published 2025“…</li><li><strong>data_heatflux.zip</strong>: ZIP archive containing 12 HDF5 files (readable via Python <code>h5py</code>). Six files (<code>T_XX</code>) record temperature and six (<code>HF_XX</code>) record incident radiative heat flux to plate sensors located along the driver and passenger sides of the vehicle. …”
-
322
Table 1_Analysis of distribution equilibrium and influencing factors for older adult meal service facilities in mainland China.xlsx
Published 2025“…A multiple linear regression model was applied to explore the relationships between older adult meal services and factors such as population, economy, infrastructure, geography, and policies.…”
-
323
Cognitive Fatigue
Published 2025“…<br></p><p dir="ltr"><b>HCI features</b> encompass keyboard, mouse, and screenshot data. Below is a Python code snippet for extracting screenshot files from the screenshots CSV file.…”
-
324
CNG-ARCO-RADAR.pdf
Published 2025“…This approach uses a suite of Python libraries, including Xarray (Xarray-Datatree), Xradar, and Zarr, to implement a hierarchical tree-like data model. …”
-
325
Genomic Surveillance of Pemivibart (VYD2311) Escape-Associated Mutations in SARS-CoV-2: December 2025 BioSamples (n=2)
Published 2025“…<p dir="ltr">This dataset presents computational analyses of two SARS-CoV-2 BioSamples sequenced in December 2025, processed to assess the genomic presence of mutations associated with pemivibart (VYD2311) monoclonal antibody escape. …”
-
326
Trustworthy and Ethical AI for Intrusion Detection in Healthcare IoT (IoMT) Systems: An Agentic Decision Loop Framework
Published 2025“…</p><h2>️ Repository Structure</h2><pre><pre>agentic-ethical-ids-healthcare/<br>│<br>├── src/ # Source code for model, rule engine, and agent<br>│ ├── train_agent.py<br>│ ├── ethical_engine.py<br>│ ├── detector_model.py<br>│ └── utils/<br>│<br>├── data/ # Links or sample data subsets<br>│ ├── CIC-IoMT-2024/ <br>│ └── CSE-CIC-IDS2018/<br>│<br>├── notebooks/ # Jupyter notebooks for training and analysis<br>│<br>├── models/ # Pretrained model checkpoints (.pth, .pkl)<br>│<br>├── results/ # Evaluation outputs and figures<br>│<br>├── requirements.txt # Python dependencies<br>├── LICENSE # MIT License for open research use<br>└── README.md # Project documentation<br></pre></pre><h2>⚙️ Setup and Installation</h2><p dir="ltr">Clone the repository and set up your environment:</p><pre><pre>git clone https://github.com/ibrahimadabara01/agentic-ethical-ids-healthcare.git<br>cd agentic-ethical-ids-healthcare<br>python -m venv venv<br>source venv/bin/activate # On Windows: venv\Scripts\activate<br>pip install -r requirements.txt<br></pre></pre><h2> Datasets</h2><p dir="ltr">This project uses three datasets:</p><table><tr><th><p dir="ltr">Dataset</p></th><th><p dir="ltr">Purpose</p></th><th><p dir="ltr">Source</p></th></tr><tr><td><b>CIC-IoMT 2024</b></td><td><p dir="ltr">Primary IoMT intrusion detection dataset</p></td><td><a href="https://www.unb.ca/cic/datasets/index.html" rel="noopener" target="_new">Canadian Institute for Cybersecurity</a></td></tr><tr><td><b>CSE-CIC-IDS2018</b></td><td><p dir="ltr">Domain-shift evaluation</p></td><td><a href="https://www.unb.ca/cic/datasets/ids-2018.html" rel="noopener" target="_new">CIC Dataset Portal</a></td></tr><tr><td><b>MIMIC-IV (Demo)</b></td><td><p dir="ltr">Clinical context signals</p></td><td><a href="https://physionet.org/content/mimic-iv-demo/2.2/" rel="noopener" target="_new">PhysioNet</a></td></tr></table><blockquote><p dir="ltr">⚠️ Note: All datasets are publicly available. …”
-
327
MATH_code : False Data Injection Attack Detection in Smart Grids based on Reservoir Computing
Published 2025“…</li><li><b>4_final_models_pipeline.ipynb</b><br>The final implementation pipeline that loads the data, applies preprocessing and encoding (e.g., latency or ISI), trains the detection models, and stores performance metrics.…”
-
328
Online Resource: Reservoir Computing as a Promising Approach for False Data Injection Attack Detection in Smart Grids
Published 2025“…</li><li><b>4_final_models_pipeline.ipynb</b><br>The final implementation pipeline that loads the data, applies preprocessing and encoding (e.g., latency or ISI), trains the detection models, and stores performance metrics.…”
-
329
Globus Compute: Federated FaaS for Integrated Research Solutions
Published 2025“…</p><p dir="ltr">Globus Compute [2] is a Function-as-a-Service platform designed to provide a scalable, secure, and simple interface to HPC resources. Globus Compute implements a federated model via which users may deploy endpoints on arbitrary remote computers, from the edge to high performance computing (HPC) cluster, and they may then invoke Python functions on those endpoints via a reliable cloud-hosted service. …”
-
330
-
331
Monte Carlo Simulation Code for Evaluating Cognitive Biases in Penalty Shootouts Using ABAB and ABBA Formats
Published 2024“…<p dir="ltr">This Python code implements a Monte Carlo simulation to evaluate the impact of cognitive biases on penalty shootouts under two formats: ABAB (alternating shots) and ABBA (similar to tennis tiebreak format). …”
-
332
Table & Figure.pdfBrainwaves and Higher-Order Thinking: An EEG Study of Cognitive Engagement in Mathematics Tasks
Published 2025“…Code and Algorithms (if applicable)</p> <p><br></p> <p>Scripts for EEG signal processing and analysis</p> <p><br></p> <p>Machine learning or statistical modeling scripts</p> <p><br></p> <p>Any software implementation used to analyze brainwave patterns</p> <p><br></p> <p><br></p> <p><br></p> <p>4. …”
-
333
Raw Data EEG.pdfBrainwaves and Higher-Order Thinking: An EEG Study of Cognitive Engagement in Mathematics Tasks
Published 2025“…Code and Algorithms (if applicable)</p> <p><br></p> <p>Scripts for EEG signal processing and analysis</p> <p><br></p> <p>Machine learning or statistical modeling scripts</p> <p><br></p> <p>Any software implementation used to analyze brainwave patterns</p> <p><br></p> <p><br></p> <p><br></p> <p>4. …”
-
334
Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems - Research Artifacts
Published 2025“…<h4>We present the research artifacts for our USENIX Security 2025 submission. …”
-
335
Table 1_From rocks to pixels: a comprehensive framework for grain shape characterization through the image analysis of size, orientation, and form descriptors.docx
Published 2025“…A total of 51 descriptors, including elongation and Fourier amplitudes, were extracted, compiled, and computed using Python. The descriptor computation code is provided as a library with this article. …”
-
336
Data Sheet 5_From rocks to pixels: a comprehensive framework for grain shape characterization through the image analysis of size, orientation, and form descriptors.csv
Published 2025“…A total of 51 descriptors, including elongation and Fourier amplitudes, were extracted, compiled, and computed using Python. The descriptor computation code is provided as a library with this article. …”
-
337
Data Sheet 8_From rocks to pixels: a comprehensive framework for grain shape characterization through the image analysis of size, orientation, and form descriptors.csv
Published 2025“…A total of 51 descriptors, including elongation and Fourier amplitudes, were extracted, compiled, and computed using Python. The descriptor computation code is provided as a library with this article. …”
-
338
Data Sheet 4_From rocks to pixels: a comprehensive framework for grain shape characterization through the image analysis of size, orientation, and form descriptors.csv
Published 2025“…A total of 51 descriptors, including elongation and Fourier amplitudes, were extracted, compiled, and computed using Python. The descriptor computation code is provided as a library with this article. …”
-
339
Data Sheet 9_From rocks to pixels: a comprehensive framework for grain shape characterization through the image analysis of size, orientation, and form descriptors.csv
Published 2025“…A total of 51 descriptors, including elongation and Fourier amplitudes, were extracted, compiled, and computed using Python. The descriptor computation code is provided as a library with this article. …”
-
340
Data Sheet 15_From rocks to pixels: a comprehensive framework for grain shape characterization through the image analysis of size, orientation, and form descriptors.csv
Published 2025“…A total of 51 descriptors, including elongation and Fourier amplitudes, were extracted, compiled, and computed using Python. The descriptor computation code is provided as a library with this article. …”