Showing 81 - 100 results of 190 for search '(( python time implementation ) OR ( python code implementing ))', query time: 0.30s Refine Results
  1. 81

    Code and data for reproducing the results in the original paper of DML-Geo by Pengfei CHEN (8059976)

    Published 2025
    “…<p dir="ltr">This asset provides all the code and data for reproducing the results (figures and statistics) in the original paper of DML-Geo</p><h2>Main Files:</h2><p dir="ltr"><b>main.ipynb</b>: the main notebook to generate all the figures and data presented in the paper</p><p dir="ltr"><b>data_generator.py</b>: used for generating synthetic datasets to validate the performance of different models</p><p dir="ltr"><b>dml_models.py</b>: Contains implementations of different Double Machine Learning variants used in this study.…”
  2. 82

    Data sets and coding scripts for research on sensory processing in ADHD and ASD by Vesko Varbanov (9687029)

    Published 2025
    “…The repository includes raw and matched datasets, analysis outputs, and the full Python code used for the matching pipeline.</p><h4>Ethics and Approval</h4><p dir="ltr">All procedures were approved by the University of Sheffield Department of Psychology Ethics Committee (Ref: 046476). …”
  3. 83

    Graphical abstract of HCAP. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  4. 84

    Recall analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  5. 85

    Convergence rate analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  6. 86

    Computational efficiency. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  7. 87

    Analysis of IoMT data sources. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  8. 88

    Prediction accuracy on varying attack types. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  9. 89

    <b> </b> Precision analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  10. 90

    Impact of cyberattack types on IoMT devices. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  11. 91

    Code for High-quality Human Activity Intensity Maps in China from 2000-2020 by Wenqi Xie (18273238)

    Published 2025
    “…<p dir="ltr">Code and remote sensing images and interpretation results of the samples for uncertainty analysis for "High-quality Human Activity Intensity Maps in China from 2000-2020"</p><p dir="ltr">“Mapping_HAI.py”:We generated the HAI maps using ArcGIS 10.8, and the geoprocessing tasks were implemented using Python 2.7 with the ArcPy library (ArcGIS 10.8 + Python 2.7 environment). …”
  12. 92
  13. 93

    The codes and data for "Lane Extraction from Trajectories at Road Intersections Based on Graph Transformer Network" by Chongshan Wan (19247614)

    Published 2024
    “…Each lane includes 'geometry' and 'inter_id' attributes.</li></ul><h2>Codes</h2><p dir="ltr">This repository contains the following Python codes:</p><ul><li>`data_processing.py`: Contains the implementation of data processing and feature extraction. …”
  14. 94

    Monte Carlo Simulation Code for Evaluating Cognitive Biases in Penalty Shootouts Using ABAB and ABBA Formats by Raul MATSUSHITA (10276562)

    Published 2024
    “…<p dir="ltr">This Python code implements a Monte Carlo simulation to evaluate the impact of cognitive biases on penalty shootouts under two formats: ABAB (alternating shots) and ABBA (similar to tennis tiebreak format). …”
  15. 95

    MATH_code : False Data Injection Attack Detection in Smart Grids based on Reservoir Computing by Carl-Hendrik Peters (21530624)

    Published 2025
    “…</li><li><b>3_literature_analysis_and_mapping.ipynb</b><br>Contains the Python code used for executing the systematic mapping study (SMS), including automated processing of literature data and thematic clustering.…”
  16. 96

    The codes and data for "A Graph Convolutional Neural Network-based Method for Predicting Computational Intensity of Geocomputation" by FirstName LastName (20554465)

    Published 2025
    “…The <b>innovations</b> and <b>steps</b> in Case 3, including data download, sample generation, and parallel computation optimization, were independently developed and are not dependent on the GeoCube’s code.</p><h2>Requirements</h2><p dir="ltr">The codes use the following dependencies with Python 3.8</p><ul><li>torch==2.0.0</li><li>torch_geometric==2.5.3</li><li>networkx==2.6.3</li><li>pyshp==2.3.1</li><li>tensorrt==8.6.1</li><li>matplotlib==3.7.2</li><li>scipy==1.10.1</li><li>scikit-learn==1.3.0</li><li>geopandas==0.13.2</li></ul><p><br></p>…”
  17. 97

    The codes and data for "A Graph Convolutional Neural Network-based Method for Predicting Computational Intensity of Geocomputation" by FirstName LastName (20554465)

    Published 2025
    “…The <b>innovations</b> and <b>steps</b> in Case 3, including data download, sample generation, and parallel computation optimization, were independently developed and are not dependent on the GeoCube’s code.</p><h2>Requirements</h2><p dir="ltr">The codes use the following dependencies with Python 3.8</p><ul><li>torch==2.0.0</li><li>torch_geometric==2.5.3</li><li>networkx==2.6.3</li><li>pyshp==2.3.1</li><li>tensorrt==8.6.1</li><li>matplotlib==3.7.2</li><li>scipy==1.10.1</li><li>scikit-learn==1.3.0</li><li>geopandas==0.13.2</li></ul><p><br></p>…”
  18. 98

    Evaluation and Statistical Analysis Code for "Multi-Task Learning for Joint Fisheye Compression and Perception for Autonomous Driving" by Basem Ahmed (18127861)

    Published 2025
    “…</li></ul><p dir="ltr">These scripts are implemented in Python using the PyTorch framework and are provided to ensure the reproducibility of the experimental results presented in the manuscript.…”
  19. 99

    Workflow of a typical Epydemix run. by Nicolò Gozzi (8837522)

    Published 2025
    “…<div><p>We present Epydemix, an open-source Python package for the development and calibration of stochastic compartmental epidemic models. …”
  20. 100

    <b>Code and derived data for</b><b>Training Sample Location Matters: Accuracy Impacts in LULC Classification</b> by Pajtim Zariqi (22155799)

    Published 2025
    “…</li><li>Python/Kaggle notebooks (<code>.ipynb</code>): reproducibility pipeline for accuracy metrics and statistical analysis.…”