يعرض 21 - 40 نتائج من 112 نتيجة بحث عن '(( python time implementation ) OR ( python explore implementation ))', وقت الاستعلام: 0.29s تنقيح النتائج
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26
  7. 27

    2D Orthogonal Planes Split: <b>Python</b> and <b>MATLAB</b> code | <b>Source Images</b> for Figures حسب Nektarios Valous (20715650)

    منشور في 2025
    "…The output files generated by the code include results from both Python and MATLAB implementations; these output images are provided as validation, demonstrating that both implementations produce matching results.…"
  8. 28

    Finites differences python code to solve CH equation with a source term and Comsol routine to solve Brusselator equation in radial domains. حسب Giulio Facchini (9031490)

    منشور في 2025
    "…<p dir="ltr"><b><i>* Cahn-Hilliard simulations *</i></b><br>Finite difference code implementing the modified Cahn Hilliard equation with a forward Euler scheme and the possibility to parallelize the solver using the numba python library.…"
  9. 29

    A comparison between the static Python-based visualizations of the p65 activity in activated fibroblasts and the dynamic, HTML-based visualizations that use these same reduction me... حسب Hector Torres (11708207)

    منشور في 2025
    "…<p><b>(a)</b> UMAP, t-SNE, PCA, and Diffmap were first generated using the Python libraries Scikit-learn, UMAP, and PyDiffmap within Jupyter to generate static graphs as a starting point. …"
  10. 30

    Complex Eigenvalues, Orthogonality, and QR Factorization: Analytical Proofs and Numerical Verification حسب Umar Tabbsum (22058780)

    منشور في 2025
    "…</p><p dir="ltr">This study provides a computationally verified, reproducible framework for exploring key concepts in numerical linear algebra, and it is suitable as both a teaching resource and a reference for researchers implementing high-precision matrix computations.…"
  11. 31

    PTPC-UHT bounce حسب David Parry (22169299)

    منشور في 2025
    "…<br>It contains the full Python implementation of the PTPC bounce model (<code>PTPC_UHT_bounce.py</code>) and representative outputs used to generate the figures in the paper. …"
  12. 32

    Graphical abstract of HCAP. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  13. 33

    Recall analysis. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  14. 34

    Convergence rate analysis. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  15. 35

    Computational efficiency. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  16. 36

    Analysis of IoMT data sources. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  17. 37

    Prediction accuracy on varying attack types. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  18. 38

    <b> </b> Precision analysis. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  19. 39

    Impact of cyberattack types on IoMT devices. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  20. 40