يعرض 61 - 80 نتائج من 173 نتيجة بحث عن '(( python time implementation ) OR ( python code represents ))', وقت الاستعلام: 0.37s تنقيح النتائج
  1. 61

    CompuCrawl: Full database and code حسب Richard Haans (6324669)

    منشور في 2024
    "…<p><br></p><p dir="ltr">This folder contains the full set of code and data for the CompuCrawl database. The database contains the archived websites of publicly traded North American firms listed in the Compustat database between 1996 and 2020—representing 11,277 firms with 86,303 firm/year observations and 1,617,675 webpages in the final cleaned and selected set.…"
  2. 62

    Catalogue of compact radio sources in Messier-82 from e-MERLIN observations حسب Sibongumusa Shungube (21197363)

    منشور في 2025
    "…Source finding was initially performed using Python Blob Detection and Source Finder (PyBDSF).</p><p dir="ltr">The dataset includes two tables detailing the properties of these 36 sources:</p><p dir="ltr"><b>Table 3.1: CASA </b><code><strong>imfit</strong></code><b> Source Catalogue</b></p><p dir="ltr">This table contains source parameters derived using the CASA task <code>imfit</code>. …"
  3. 63

    PTPC-UHT bounce حسب David Parry (22169299)

    منشور في 2025
    "…<br>It contains the full Python implementation of the PTPC bounce model (<code>PTPC_UHT_bounce.py</code>) and representative outputs used to generate the figures in the paper. …"
  4. 64

    Data for "A hollow fiber membrane permeance evaluation device demonstrating outside-in and inside-out performance differences" حسب Timothy Warner (20222838)

    منشور في 2025
    "…</li><li>Plot data derived from the above data sources.</li><li>Python code to generate figures from the plot data.…"
  5. 65

    Graphical abstract of HCAP. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  6. 66

    Recall analysis. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  7. 67

    Convergence rate analysis. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  8. 68

    Computational efficiency. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  9. 69

    Analysis of IoMT data sources. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  10. 70

    Prediction accuracy on varying attack types. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  11. 71

    <b> </b> Precision analysis. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  12. 72

    Impact of cyberattack types on IoMT devices. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  13. 73
  14. 74

    Computing speed and memory usage. حسب David Berling (22170661)

    منشور في 2025
    "…<b>(b)</b> Physical memory consumption depending on simulated plane in radial and depth direction. Color coding same as in (a). Memory consumption was recorded as the maximum resident size during simulation monitored with the Python built-in module resource. …"
  15. 75

    Replication package for Exploring the relation between source code commit information and SonarQube issues حسب Liviu Marian Berciu (17797934)

    منشور في 2025
    "…<p dir="ltr">This item represents a replication package/dataset for the article `Exploring the relation between source code commit information and SonarQube issues`. …"
  16. 76

    R codes and curated dataset for “EnoLEX: A Diachronic Lexical Database for the Enggano Language” حسب Gede Primahadi Wijaya Rajeg (14592023)

    منشور في 2025
    "…</p><blockquote><b><i>EnoLEX</i></b><i> represents a network of independent research materials consisting of a </i><a href="https://doi.org/10.25446/oxford.28295648.v1" rel="noreferrer" target="_blank"><i>source dataset</i></a><i>, this repository of source R codes and the curated data, the </i><a href="https://enggano.shinyapps.io/enolex/" rel="noreferrer" target="_blank"><i>online database</i></a><i>, and a conference </i><a href="https://doi.org/10.25446/oxford.27013864.v1" rel="noreferrer" target="_blank"><i>paper</i></a><i>.…"
  17. 77

    Smart contract and interface code for Nature Energy "A general form of smart contract for decentralised energy systems management" حسب Lee Thomas (19655773)

    منشور في 2024
    "…This provides the modelled electricity network cost data, the smart contract code, and the Python interface scripts described in the Nature Energy Paper  "A general form of smart contract for decentralised energy systems management." …"
  18. 78

    Workflow of a typical Epydemix run. حسب Nicolò Gozzi (8837522)

    منشور في 2025
    "…<div><p>We present Epydemix, an open-source Python package for the development and calibration of stochastic compartmental epidemic models. …"
  19. 79

    <b>Data and Code from 'The Perfect and Legitimate Bribe': A Transparent Record of Human-AI Collaboration in Legal Scholarship</b> حسب Joshua Stern (21748181)

    منشور في 2025
    "…</p><p dir="ltr">For optimal viewing of `collated-anonymized.txt`, a text editor that can handle long lines without word wrapping is recommended to preserve the indentation that represents the conversational branching structure.</p><p><br></p><p dir="ltr">### **Running Code/Software**</p><p dir="ltr">The provided scripts (`collator-ipynb.txt` and `sentence-ancestry-ipynb.txt`) are Jupyter Notebooks and require a Python 3 environment to run. …"
  20. 80

    Data and code from: Hatchery-reared coho salmon develop less otolith deformities in tanks with alternating water flow directions حسب Leigh Gaffney (1389855)

    منشور في 2025
    "…</li><li>Measurements were generated by manually classifying otolith regions in Adobe Photoshop and calculating pixel coverage using a Python script.</li><li>Representative otolith images and details of the classification workflow are provided in the main manuscript figures and Methods section. …"