بدائل البحث:
time implementation » _ implementation (توسيع البحث), policy implementation (توسيع البحث), effective implementation (توسيع البحث)
python time » python files (توسيع البحث)
time implementation » _ implementation (توسيع البحث), policy implementation (توسيع البحث), effective implementation (توسيع البحث)
python time » python files (توسيع البحث)
-
61
Analysis topics.
منشور في 2025"…Teams were invited to develop hypotheses, to use tools of their choosing to identify potential sources of bias, and to provide a final report.…"
-
62
-
63
-
64
-
65
-
66
-
67
Memory monitoring recognition test workflow.
منشور في 2025"…Developed with open-source technology and an interface adaptable to various platforms, the MMRT represents an accessible and efficient tool for psychological evaluation, with innovative potential in the study of reality monitoring.…"
-
68
Voice recognition workflow.
منشور في 2025"…Developed with open-source technology and an interface adaptable to various platforms, the MMRT represents an accessible and efficient tool for psychological evaluation, with innovative potential in the study of reality monitoring.…"
-
69
Memory monitoring recognition test main screen.
منشور في 2025"…Developed with open-source technology and an interface adaptable to various platforms, the MMRT represents an accessible and efficient tool for psychological evaluation, with innovative potential in the study of reality monitoring.…"
-
70
Task descriptions.
منشور في 2025"…Developed with open-source technology and an interface adaptable to various platforms, the MMRT represents an accessible and efficient tool for psychological evaluation, with innovative potential in the study of reality monitoring.…"
-
71
Five Operator Lattice Simulation
منشور في 2025"…</p><p dir="ltr">Running the included file <code>five_operator_lattice_sim.py</code> (Python 3.14 + NumPy 2.1) reproduces the dynamic interactions and figures reported in Appendix A of the paper, generating time-series data that demonstrate operator balance, instability, and renewal cycles.…"
-
72
CompuCrawl: Full database and code
منشور في 2024"…<p><br></p><p dir="ltr">This folder contains the full set of code and data for the CompuCrawl database. The database contains the archived websites of publicly traded North American firms listed in the Compustat database between 1996 and 2020—representing 11,277 firms with 86,303 firm/year observations and 1,617,675 webpages in the final cleaned and selected set.…"
-
73
Catalogue of compact radio sources in Messier-82 from e-MERLIN observations
منشور في 2025"…Source finding was initially performed using Python Blob Detection and Source Finder (PyBDSF).</p><p dir="ltr">The dataset includes two tables detailing the properties of these 36 sources:</p><p dir="ltr"><b>Table 3.1: CASA </b><code><strong>imfit</strong></code><b> Source Catalogue</b></p><p dir="ltr">This table contains source parameters derived using the CASA task <code>imfit</code>. …"
-
74
A comparison between the static Python-based visualizations of the p65 activity in activated fibroblasts and the dynamic, HTML-based visualizations that use these same reduction me...
منشور في 2025"…<p><b>(a)</b> UMAP, t-SNE, PCA, and Diffmap were first generated using the Python libraries Scikit-learn, UMAP, and PyDiffmap within Jupyter to generate static graphs as a starting point. …"
-
75
PTPC-UHT bounce
منشور في 2025"…<br>It contains the full Python implementation of the PTPC bounce model (<code>PTPC_UHT_bounce.py</code>) and representative outputs used to generate the figures in the paper. …"
-
76
Graphical abstract of HCAP.
منشور في 2025"…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
-
77
Recall analysis.
منشور في 2025"…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
-
78
Convergence rate analysis.
منشور في 2025"…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
-
79
Computational efficiency.
منشور في 2025"…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
-
80
Analysis of IoMT data sources.
منشور في 2025"…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"