يعرض 21 - 40 نتائج من 141 نتيجة بحث عن '(( python time implementation ) OR ( python files implementation ))', وقت الاستعلام: 0.26s تنقيح النتائج
  1. 21
  2. 22
  3. 23

    BSTPP: a python package for Bayesian spatiotemporal point processes حسب Isaac Manring (20705955)

    منشور في 2025
    "…<p>Spatiotemporal point process models have a rich history of effectively modeling event data in space and time. However, they are sometimes neglected due to the difficulty of implementing them. …"
  4. 24
  5. 25
  6. 26

    Python code for a rule-based NLP model for mapping circular economy indicators to SDGs حسب Zahir Barahmand (18008947)

    منشور في 2025
    "…The package includes:</p><ul><li>The complete Python codebase implementing the classification algorithm</li><li>A detailed manual outlining model features, requirements, and usage instructions</li><li>Sample input CSV files and corresponding processed output files to demonstrate functionality</li><li>Keyword dictionaries for all 17 SDGs, distinguishing strong and weak matches</li></ul><p dir="ltr">These materials enable full reproducibility of the study, facilitate adaptation for related research, and offer transparency in the methodological framework.…"
  7. 27

    Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…</p><h2>Key Features</h2><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Code Obfuscation in Python</b></a>: Implements multi-level protection with dynamic encryption and obfuscation techniques, making it an effective <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Python obfuscator</b></a>.…"
  8. 28
  9. 29
  10. 30
  11. 31

    Online Resource 3: Word Cloud Dataset and Code حسب Jessica Zylla (17692920)

    منشور في 2025
    "…<p dir="ltr">Online Resource 3: Word Cloud Dataset and Code. This set of files are part of Online Resource 3, which allows readers to implement a Jupyter Notebook Python program to create a word cloud based on survey responses. …"
  12. 32
  13. 33
  14. 34

    2D Orthogonal Planes Split: <b>Python</b> and <b>MATLAB</b> code | <b>Source Images</b> for Figures حسب Nektarios Valous (20715650)

    منشور في 2025
    "…The output files generated by the code include results from both Python and MATLAB implementations; these output images are provided as validation, demonstrating that both implementations produce matching results.…"
  15. 35

    Finites differences python code to solve CH equation with a source term and Comsol routine to solve Brusselator equation in radial domains. حسب Giulio Facchini (9031490)

    منشور في 2025
    "…<p dir="ltr"><b><i>* Cahn-Hilliard simulations *</i></b><br>Finite difference code implementing the modified Cahn Hilliard equation with a forward Euler scheme and the possibility to parallelize the solver using the numba python library.…"
  16. 36

    This package of Python scripts implements the proposed unsupervised sentiment analysis approach.... حسب Xiaohan Yu (7525940)

    منشور في 2025
    "…<p>This package of Python scripts implements the proposed unsupervised sentiment analysis approach. …"
  17. 37

    PTPC-UHT bounce حسب David Parry (22169299)

    منشور في 2025
    "…<br>It contains the full Python implementation of the PTPC bounce model (<code>PTPC_UHT_bounce.py</code>) and representative outputs used to generate the figures in the paper. …"
  18. 38
  19. 39

    Overview of deep learning terminology. حسب Aaron E. Maxwell (8840882)

    منشور في 2024
    "…Training loops are implemented with the luz package. The geodl package provides utility functions for creating raster masks or labels from vector-based geospatial data and image chips and associated masks from larger files and extents. …"
  20. 40

    Graphical abstract of HCAP. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"