Showing 1 - 20 results of 111 for search '(( python new implementation ) OR ( python time implementation ))', query time: 0.38s Refine Results
  1. 1

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
  2. 2

    BSTPP: a python package for Bayesian spatiotemporal point processes by Isaac Manring (20705955)

    Published 2025
    “…<p>Spatiotemporal point process models have a rich history of effectively modeling event data in space and time. However, they are sometimes neglected due to the difficulty of implementing them. …”
  3. 3

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education by Suha Assayed (22454038)

    Published 2025
    “…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
  4. 4

    Prediction accuracy analysis over time steps. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  5. 5
  6. 6
  7. 7

    Comparison of performance between our next reaction implementation and the Python library from Ref. [3]. by Samuel Cure (22250922)

    Published 2025
    “…<p>We simulate SIR epidemic processes on Watts-Strogatz networks with parameters <i>k</i><sub>0</sub> = 5, <i>p</i> = 0.1 <b>(a)</b> and Barabási-Albert networks with parameter <i>m</i> = 5 <b>(b)</b> using the Python wrapper of our C++ implementation and compare its performance with the Python library from Ref. …”
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Graphical abstract of HCAP. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  18. 18

    Recall analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  19. 19

    Convergence rate analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  20. 20

    Computational efficiency. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”