Search alternatives:
time implementation » _ implementation (Expand Search), policy implementation (Expand Search), effective implementation (Expand Search)
python proof » method proof (Expand Search)
python time » python files (Expand Search)
time implementation » _ implementation (Expand Search), policy implementation (Expand Search), effective implementation (Expand Search)
python proof » method proof (Expand Search)
python time » python files (Expand Search)
-
21
-
22
-
23
-
24
BSTPP: a python package for Bayesian spatiotemporal point processes
Published 2025“…<p>Spatiotemporal point process models have a rich history of effectively modeling event data in space and time. However, they are sometimes neglected due to the difficulty of implementing them. …”
-
25
Exploring the integration of metaverse technologies in engineering education through the SAMR model
Published 2025“…The metaverse is presented as a tool to improve the learning process and to promote innovative educational approaches. …”
-
26
-
27
-
28
-
29
Memory monitoring recognition test workflow.
Published 2025“…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
-
30
Voice recognition workflow.
Published 2025“…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
-
31
Memory monitoring recognition test main screen.
Published 2025“…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
-
32
Task descriptions.
Published 2025“…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
-
33
Five Operator Lattice Simulation
Published 2025“…</p><p dir="ltr">Running the included file <code>five_operator_lattice_sim.py</code> (Python 3.14 + NumPy 2.1) reproduces the dynamic interactions and figures reported in Appendix A of the paper, generating time-series data that demonstrate operator balance, instability, and renewal cycles.…”
-
34
Simple implementation examples of agent AI on free energy calculation and phase-field simulation
Published 2025“…</p> <p>Using Gibbs energy calculations and diffusion simulations as examples, we demonstrated the implementation method and usefulness of simple agent AI, where sample python codes are distributed as supplemental materials.…”
-
35
A comparison between the static Python-based visualizations of the p65 activity in activated fibroblasts and the dynamic, HTML-based visualizations that use these same reduction me...
Published 2025“…<p><b>(a)</b> UMAP, t-SNE, PCA, and Diffmap were first generated using the Python libraries Scikit-learn, UMAP, and PyDiffmap within Jupyter to generate static graphs as a starting point. …”
-
36
Design and Implementation of a Browser-Based Toolfor Protecting Gaming Assets from UnauthorizedAccess
Published 2025“…<p dir="ltr">The project <b>“Design and Implementation of a Browser-Based Tool for Protecting Gaming Assets from Unauthorized Access”</b> focuses on developing a security-oriented software solution that safeguards digital game assets within browser environments.…”
-
37
Graphical abstract of HCAP.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
38
Recall analysis.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
39
Convergence rate analysis.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
-
40
Computational efficiency.
Published 2025“…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”