يعرض 21 - 40 نتائج من 101 نتيجة بحث عن '(( python time implementation ) OR ( python practical implementation ))', وقت الاستعلام: 0.28s تنقيح النتائج
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25

    Exploring the integration of metaverse technologies in engineering education through the SAMR model حسب Snezhana Dineva (22444471)

    منشور في 2025
    "…It demonstrates the successful implementation of the model in practice and provides examples of effective practices in the context of the CAVE (Cave Automatic Virtual Environment) metaverse. …"
  6. 26

    Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…</li></ul><h2>Security and Best Practices</h2><p dir="ltr">By implementing <a href="https://xn--mxac.net/python-app-bundle-shield.html" target="_blank"><b>Python code security best practices</b></a>, including advanced cryptographic methods like <a href="https://xn--mxac.net/python-binary-optimization-compiler.html" target="_blank"><b>asymmetric encryption</b></a> and <a href="https://xn--mxac.net/python-binary-optimization-compiler.html" target="_blank"><b>symmetric encryption</b></a>, the Local Python Code Protector Script strives to keep code better protected during transmission and execution. …"
  7. 27
  8. 28
  9. 29
  10. 30

    Dialogue Propositional Content Replacement (DPCR) code حسب Jacopo Amidei (10511297)

    منشور في 2025
    "…<p dir="ltr">This resource consists of a Python notebook with code that was implemented for a research project that developed a novel method for testing the components of theories of (dialogue) coherence through utterance substitution. …"
  11. 31
  12. 32
  13. 33
  14. 34

    Five Operator Lattice Simulation حسب James McDaniel (22522571)

    منشور في 2025
    "…</p><p dir="ltr">Running the included file <code>five_operator_lattice_sim.py</code> (Python 3.14 + NumPy 2.1) reproduces the dynamic interactions and figures reported in Appendix A of the paper, generating time-series data that demonstrate operator balance, instability, and renewal cycles.…"
  15. 35
  16. 36

    Graphical abstract of HCAP. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  17. 37

    Recall analysis. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  18. 38

    Convergence rate analysis. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  19. 39

    Computational efficiency. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"
  20. 40

    Analysis of IoMT data sources. حسب Mohanad Faeq Ali (21354273)

    منشور في 2025
    "…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …"