يعرض 61 - 80 نتائج من 196 نتيجة بحث عن '(( python time implementation ) OR ( ((python tool) OR (python code)) represent ))', وقت الاستعلام: 0.35s تنقيح النتائج
  1. 61

    Analysis topics. حسب Harry Hochheiser (3413396)

    منشور في 2025
    "…Teams were invited to develop hypotheses, to use tools of their choosing to identify potential sources of bias, and to provide a final report.…"
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66
  7. 67

    Memory monitoring recognition test workflow. حسب Pedro C. Martínez-Suárez (21192459)

    منشور في 2025
    "…Developed with open-source technology and an interface adaptable to various platforms, the MMRT represents an accessible and efficient tool for psychological evaluation, with innovative potential in the study of reality monitoring.…"
  8. 68

    Voice recognition workflow. حسب Pedro C. Martínez-Suárez (21192459)

    منشور في 2025
    "…Developed with open-source technology and an interface adaptable to various platforms, the MMRT represents an accessible and efficient tool for psychological evaluation, with innovative potential in the study of reality monitoring.…"
  9. 69

    Memory monitoring recognition test main screen. حسب Pedro C. Martínez-Suárez (21192459)

    منشور في 2025
    "…Developed with open-source technology and an interface adaptable to various platforms, the MMRT represents an accessible and efficient tool for psychological evaluation, with innovative potential in the study of reality monitoring.…"
  10. 70

    Task descriptions. حسب Pedro C. Martínez-Suárez (21192459)

    منشور في 2025
    "…Developed with open-source technology and an interface adaptable to various platforms, the MMRT represents an accessible and efficient tool for psychological evaluation, with innovative potential in the study of reality monitoring.…"
  11. 71

    Five Operator Lattice Simulation حسب James McDaniel (22522571)

    منشور في 2025
    "…</p><p dir="ltr">Running the included file <code>five_operator_lattice_sim.py</code> (Python 3.14 + NumPy 2.1) reproduces the dynamic interactions and figures reported in Appendix A of the paper, generating time-series data that demonstrate operator balance, instability, and renewal cycles.…"
  12. 72

    CompuCrawl: Full database and code حسب Richard Haans (6324669)

    منشور في 2024
    "…<p><br></p><p dir="ltr">This folder contains the full set of code and data for the CompuCrawl database. The database contains the archived websites of publicly traded North American firms listed in the Compustat database between 1996 and 2020—representing 11,277 firms with 86,303 firm/year observations and 1,617,675 webpages in the final cleaned and selected set.…"
  13. 73

    Catalogue of compact radio sources in Messier-82 from e-MERLIN observations حسب Sibongumusa Shungube (21197363)

    منشور في 2025
    "…Source finding was initially performed using Python Blob Detection and Source Finder (PyBDSF).</p><p dir="ltr">The dataset includes two tables detailing the properties of these 36 sources:</p><p dir="ltr"><b>Table 3.1: CASA </b><code><strong>imfit</strong></code><b> Source Catalogue</b></p><p dir="ltr">This table contains source parameters derived using the CASA task <code>imfit</code>. …"
  14. 74

    A comparison between the static Python-based visualizations of the p65 activity in activated fibroblasts and the dynamic, HTML-based visualizations that use these same reduction me... حسب Hector Torres (11708207)

    منشور في 2025
    "…<p><b>(a)</b> UMAP, t-SNE, PCA, and Diffmap were first generated using the Python libraries Scikit-learn, UMAP, and PyDiffmap within Jupyter to generate static graphs as a starting point. …"
  15. 75

    PTPC-UHT bounce حسب David Parry (22169299)

    منشور في 2025
    "…<br>It contains the full Python implementation of the PTPC bounce model (<code>PTPC_UHT_bounce.py</code>) and representative outputs used to generate the figures in the paper. …"
  16. 76

    Graphical abstract of HCAP. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  17. 77

    Recall analysis. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  18. 78

    Convergence rate analysis. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  19. 79

    Computational efficiency. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  20. 80

    Analysis of IoMT data sources. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"