Results for ' Python'

36 found
Order:
  1.  68
    Векторизація обчислень для оптимізації коду на мові програмування Python.Олексій Земляний & Олег Байбуз - 2024 - Challenges and Issues of Modern Science 3:144-149.
    Purpose. The purpose of this study is to explore vectorization as an engineering technique to improve the performance and readability of Python code, particularly in data processing tasks. We aim to demonstrate the benefits of vectorization through practical examples involving the handling of missing data. Design / Method / Approach. To achieve the research goals, we performed a comparative analysis between loop-based and vectorized implementations. Specifically, two versions of a function were developed to identify columns containing missing values within (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Existentialism and Monty Python: Kafka, Camus, Nietzsche, and Sartre.Edward Slowik - 2006 - In George Reisch & G. Hardcastle, Monty Python and Philosophy. pp. 173-186.
    This essay utilizes the work of the comedy group, Monty Python, as a means of introducing basic concepts in Existentialism, especially as it pertains to the writings of Nietzsche, Sartre, and Camus.
    Download  
     
    Export citation  
     
    Bookmark  
  3. Evoke: A Python package for evolutionary signalling games.Stephen Francis Mann & Manolo Martínez - 2024 - Journal of Open Source Software 9 (103):6703.
    Evoke is a Python library for evolutionary simulations of signalling games. It offers a simple and intuitive API that can be used to analyze arbitrary game-theoretic models, and to easily reproduce and customize well-known results and figures from the literature.
    Download  
     
    Export citation  
     
    Bookmark  
  4. Automatic Face Mask Detection Using Python.M. Madan Mohan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):91-100.
    The corona virus COVID-19 pandemic is causing a global health crisis so the effective protection methods is wearing a face mask in public areas according to the World Health Organization (WHO). The COVID-19 pandemic forced governments across the world to impose lockdowns to prevent virus transmissions. Reports indicate that wearing facemasks while at work clearly reduces the risk of transmission. An efficient and economic approach of using AI to create a safe environment in a manufacturing setup. A hybrid model using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. The wisdom-of-crowds: an efficient, philosophically-validated, social epistemological network profiling toolkit.Colin Klein, Marc Cheong, Marinus Ferreira, Emily Sullivan & Mark Alfano - 2023 - In Hocine Cherifi, Rosario Nunzio Mantegna, Luis M. Rocha, Chantal Cherifi & Salvatore Miccichè, Complex Networks and Their Applications XI: Proceedings of The Eleventh International Conference on Complex Networks and Their Applications: COMPLEX NETWORKS 2022 — Volume 1. Springer.
    The epistemic position of an agent often depends on their position in a larger network of other agents who provide them with information. In general, agents are better off if they have diverse and independent sources. Sullivan et al. [19] developed a method for quantitatively characterizing the epistemic position of individuals in a network that takes into account both diversity and independence; and presented a proof-of-concept, closed-source implementation on a small graph derived from Twitter data [19]. This paper reports on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  56
    Wool Demand Prediction for Indian Production Companies.M. Vandan Reddy - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-10.
    Wool production industries rely heavily on accurate demand forecasting to manage supply chains and production schedules effectively. Predicting wool demand allows companies to avoid overproduction and resource wastage while meeting market needs efficiently. Traditional forecasting models often struggle with the seasonality and variability of wool demand. The ARIMA (Auto Regressive Integrated Moving Average) model, a time series forecasting technique, is particularly suited for this task due to its ability to capture both trends and seasonal fluctuations in historical data. The data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Classification of Alzheimer's Disease Using Convolutional Neural Networks.Lamis F. Samhan, Amjad H. Alfarra & Samy S. Abu-Naser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):18-23.
    Brain-related diseases are among the most difficult diseases due to their sensitivity, the difficulty of performing operations, and their high costs. In contrast, the operation is not necessary to succeed, as the results of the operation may be unsuccessful. One of the most common diseases that affect the brain is Alzheimer’s disease, which affects adults, a disease that leads to memory loss and forgetting information in varying degrees. According to the condition of each patient. For these reasons, it is important (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  8. Reasoning about causality in games.Lewis Hammond, James Fox, Tom Everitt, Ryan Carey, Alessandro Abate & Michael Wooldridge - 2023 - Artificial Intelligence 320 (C):103919.
    Causal reasoning and game-theoretic reasoning are fundamental topics in artificial intelligence, among many other disciplines: this paper is concerned with their intersection. Despite their importance, a formal framework that supports both these forms of reasoning has, until now, been lacking. We offer a solution in the form of (structural) causal games, which can be seen as extending Pearl's causal hierarchy to the game-theoretic domain, or as extending Koller and Milch's multi-agent influence diagrams to the causal domain. We then consider three (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Diagnosis of Blood Cells Using Deep Learning.Ahmed J. Khalil & Samy S. Abu-Naser - 2022 - Dissertation, University of Tehran
    In computer science, Artificial Intelligence (AI), sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and other animals. Computer science defines AI research as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals. Deep Learning is a new field of research. One of the branches of Artificial Intelligence Science deals with the creation of theories and algorithms that (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  10. Classification of Dates Using Deep Learning.Raed Z. Sababa & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):18-25.
    Abstract: Dates are the fruit of date palm trees, and it is one of the fruits famous for its high nutritional value. It is a summer fruit spread in the Arab world. In the past, the Arabs relied on it in their daily lives. Dates take an oval shape and vary in size from 20 to 60 mm in length and 8 to 30 mm in diameter. The ripe fruit consists of a hard core surrounded by a papery cover called (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  62
    Alert System Using Facial Recognition.I. Karthika Varsha - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-14.
    This research work presents a cost-effective facial recognition alert system using the ESP32 microcontroller to enhance real-time security. The system integrates high-resolution cameras with Python’s facial recognition libraries to identify individuals. When an unknown face is detected, it triggers an immediate alert via the ESP32, activating an alarm. This solution is both scalable and affordable, making advanced security accessible to small businesses and residential areas. The system improves overall security by automating surveillance, reducing the need for manual monitoring.
    Download  
     
    Export citation  
     
    Bookmark  
  12. Handwritten Signature Verification using Deep Learning. [REVIEW]Eman Alajrami, Belal A. M. Ashqar, Bassem S. Abu-Nasser, Ahmed J. Khalil, Musleh M. Musleh, Alaa M. Barhoom & Samy S. Abu-Naser - manuscript
    Every person has his/her own unique signature that is used mainly for the purposes of personal identification and verification of important documents or legal transactions. There are two kinds of signature verification: static and dynamic. Static(off-line) verification is the process of verifying an electronic or document signature after it has been made, while dynamic(on-line) verification takes place as a person creates his/her signature on a digital tablet or a similar device. Offline signature verification is not efficient and slow for a (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  13. Prediction of Heart Disease Using a Collection of Machine and Deep Learning Algorithms.Ali M. A. Barhoom, Abdelbaset Almasri, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):1-13.
    Abstract: Heart diseases are increasing daily at a rapid rate and it is alarming and vital to predict heart diseases early. The diagnosis of heart diseases is a challenging task i.e. it must be done accurately and proficiently. The aim of this study is to determine which patient is more likely to have heart disease based on a number of medical features. We organized a heart disease prediction model to identify whether the person is likely to be diagnosed with a (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  14. Framework for a Testable Metaphysical Science: Type-Theoretic System and Computational Experimentation Using Z3 SMT Solver.Elliott Bonal - manuscript
    Building upon the works of Gödel, Zalta ; and Benzmüller and Paleo, this paper introduces a formal system and testable system for Metaphysical Cosmology, referring to the study of the nature of existence, non-existence, and their interplay. The aim is to integrate metaphysics into a testable scientific framework, beyond speculative reasoning. The system abides by three principles which serve as a foundation for implementing a scientific methodology in metaphysics: (i) axioms must be minimized, incorporating Cartesian-like skepticism ; (ii) theorems must (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Image schemas in the Great Gatsby: A cognitive linguistic analysis of the protagonist’s psychological movement.Hicham Lahlou, Jun Zhou & Yasir Azam - 2023 - Cogent Arts and Humanities 10 (2):1-19.
    Most research on image schema examined the meaning configuration of words connotation. However, previous studies of adjectives are meaningful in cognitive linguistics because they provide insight into how those adjectives are involved with psychological movement. In this sense, from the perspective of cognitive linguistics, one’s conceptualization and cognition are closely associated with their bodily experience and surroundings; adjectives are no exception. The varieties of transformations of image schemas lay the foundation for the conception and perception. Accordingly, this study is an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The problem of intentionality in the pragmatics of communicative language use.Alexa Bódog - 2012 - Dissertation, Doctoral School of Linguistics, University of Debrecen, Hungary
    The thesis is a metatheoretical analysis of the concept of ‘speaker’s intention’ as it is used in traditional linguistic-philosophical and in cognitive pragmatics. The analysis centers around works of Austin, Searle, Grice, and Relevance Theory. The main aim is to argue for the following thesis: (T1) if pragmatics is targeting on how speaker’s intentions contribute to linguistic choices in communicative language use, then focusing solely on causally efficient mental states and analyzing them at the utterance level necessarily leads to unsatisfactory (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  77
    AI-Augmented Data Lineage: A Cognitive GraphBased Framework for Autonomous Data Traceability in Large Ecosystems.Pulicharla Dr Mohan Raja - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (1):377-387.
    In the era of big data and distributed ecosystems, understanding the origin, flow, and transformation of data across complex infrastructures is critical for ensuring transparency, accountability, and informed decision-making. As data-driven enterprises increasingly rely on hybrid cloud architectures, data lakes, and real-time pipelines, the complexity of tracking data movement and transformations grows exponentially. Traditional data lineage solutions, often based on static metadata extraction or rule-based approaches, are insufficient in dynamically evolving environments and fail to provide granular, context-aware insights. This research (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. From Story to Stewardship: Indigenous Perspectives on Conservation.Thi Mai Anh Tran - 2024 - Sm3D Portal.
    In the way that First Born and the grizzly bear woman once shared a home, or the young girl who happily married the python man, perhaps conservation and preservation is about nurturing and sustaining relationships–relationships of reciprocity, respect, and shared existence with all living beings. Indigenous knowledge reminds us that humans are not separate from nature but integral to its fabric. As we are facing environmental crises like climate change and biodiversity loss, Indigenous knowledge and traditional practices offer a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  97
    Cone Formation from Circle Folding: A Comprehensive Analysis.Parker Emmerson - 2024 - Journal of Liberated Mathematics 1:4.
    This paper explores the mathematical details behind the geometric transformation of folding a circle into a cone. It includes detailed theo- rems, proofs, and Python implementations for visualization, providing a thorough analysis of the transformation process.
    Download  
     
    Export citation  
     
    Bookmark  
  20.  86
    Mathematical Logic for STEM.Paul Mayer - manuscript
    This book serves as an introduction to mathematical logic for STEM (Science, Technology, Engineering, and Mathematics) students, written for undergraduates (in particular, 1st and 2nd year undergraduates). A focus on this book is on logical thinking, not simply rote memorization, with a focus on examples and analogies relevant to students aimed at becoming technical leaders and problem solvers. This book includes propositional logic, set theory, functions and relations, and more, with coding examples provided in the Python programming language.
    Download  
     
    Export citation  
     
    Bookmark  
  21.  52
    Sentiment Analysis of Social Media Presence.T. Sri Harshitha - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (12):1-14.
    This study focuses on developing a comprehensive sentiment analysis framework aimed at understanding sentiments expressed in social media posts, enhancing online reputation management for brands. Given the overwhelming volume of user-generated content across platforms, we instituted a methodical approach leveraging advanced machine learning techniques. Specifically, we used Python libraries such as TensorFlow for deep learning functionalities and PyTorch for natural language processing tasks. Our models classify sentiments into three categories: positive, negative, and neutral, while simultaneously analyzing trending patterns and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Undersampling Aware Learning based Fetal Health Prediction using Cardiotocographic Data.M. Shyamala Devi - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (6):7730-7749.
    With the current improvement of development towards pharmaceutical, distinctive ultrasound methodologies are open to find the fetal prosperity. It is analyzed with diverse clinical parameters with 2-D imaging and other test. In any case, prosperity desire of fetal heart still remains an open issue due to unconstrained works out of the hatchling, the minor heart appraise and inadequate of data in fetal echocardiography. The machine learning strategies can find out the classes of fetal heart rate which can beutilized for earlier (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. COVID-19 Face Mask Detection Alert System.McDonald Moyo & Cen Yuefeng - 2022 - Computer Engineering and Intelligent Systems 13 (2):1-15.
    Study shows that mask-wearing is a critical factor in stopping the COVID-19 transmission. By the time of this article, most states have mandated face masking in public space. Therefore, real-time face mask detection becomes an essential application to prevent the spread of the pandemic. This study will present a face mask detection system that can detect and monitor mask-wearing from camera feeds and alert when there is a violation. The face mask detection algorithm uses a haar cascade classifier to find (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Attendance Management System.V. Rama Krishna - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-16.
    The purpose of this research is to develop an automated attendance management system using Python with a graphical user interface (GUI) and OpenCV for face recognition. The system provides a contactless, efficient, and reliable solution to tracking attendance in institutions such as schools, universities, or workplaces. This paper outlines the system architecture, development process, implementation challenges, and the performance evaluation of the system.
    Download  
     
    Export citation  
     
    Bookmark  
  25. IT & C, Volumul 1, Numărul 1, Septembrie 2022.Sfetcu Nicolae - 2022 - It and C 1 (1).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL Cu sau fără Internet?, de Nicolae Sfetcu -/- TEHNOLOGIA INFORMAȚIEI Tehnologia blockchain, de Nicolae Sfetcu -/- TELECOMUNICAȚII Rețelele de comunicații 5G, de Nicolae Sfetcu -/- INTERNET Megadatele (Big Data) pe Internet, de Nicolae Sfetcu -/- SOFTWARE Excel: Comenzi rapide și formatare de bază, de Nicolae Sfetcu -/- PROGRAMARE Tipuri de date atomice în Python, de (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Overhead Cross Section Sampling Machine Learning based Cervical Cancer Risk Factors Prediction.A. Peter Soosai Anandaraj, - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (6): 7697-7715.
    Most forms of human papillomavirus can create alterations on a woman's cervix that can lead to cervical cancer in the long run, while others can produce genital or epidermal tumors. Cervical cancer is a leading cause of morbidity and mortality among women in low- and middle-income countries. The prediction of cervical cancer still remains an open challenge as there are several risk factors affecting the cervix of the women. By considering the above, the cervical cancer risk factor dataset from KAGGLE (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. CareerBot: Advanced AI Mentorship for Students’ Career Aspirations and Planning.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):610-620.
    The scope of the project encompasses the design, development, and implementation of AI-driven functionalities such as interest assessment, skill analysis, resume building, and personalized recommendations. The methodology involves data collection through user inputs, preprocessing of data for analysis, and the creation of a robust system architecture comprising frontend interfaces, backend servers, and database management. The implementation of the application involves a comprehensive technology stack, including Python for AI algorithms, TensorFlow for ML models, React.js for front end development, Flask for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Data Integrity Verification Scheme in Cloud Using Third Party Audit.P. Raja Sekhar Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (3):1-14.
    Due to risks like tampering, corruption, and illegal access, the rapid rise in cloud storage usage makes data integrity a top priority. As a way to verify the correctness of data stored in the cloud, we develop a "Data Integrity Verification Scheme" in this project which involves the use of third-party auditing (TPA). The system produces hash values for files both during upload and retrieval using cryptographic hashing methods, assuring consistency between both. Without needing a link to the real file (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The Book of Phenomenological Velocity: Algebraic Techniques for Gestalt Cosmology, Transcendental Relativity and Quantum Mechanics.Parker Emmerson - 2024 - Journal of Liberated Mathematics 1:380.
    If you have enjoyed any of the 7 (seven) other books I have published over 20 years, including literally thousands of pages of mathematical and topological concepts, Python programs and conceptually expanding papers, please consider buying this book for $20.00 on google play books. -/- Introduction: -/- Though the following pages provide extensive exposition and dedicated descriptions of the phenomenological velocity formulas, theory and mystery, I thought it appropriate to write this introduction as a partial explanation for what phenomenal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  90
    Identification and Extraction of Forward Error Correction (FEC) Schemes from Unknown Demodulated Signals.A. Abhishek - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-14.
    The project focuses on the development of a tool for identifying and extracting Forward Error Correction (FEC) schemes from unknown demodulated signals. FEC is a vital communication technique that ensures error-free data transmission without the need for retransmission, particularly in satellite communications, digital broadcasting, and deepspace applications. The proposed solution involves using Python to preprocess signals, detect FEC schemes, and then extract the specific coding parameters. Different FEC schemes such as BCH, Convolutional Codes, Turbo Codes, and LDPC codes are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  22
    Graphical Pattern Authentication: A UserFriendly and Secure Approach for Account Security.Rutika Vale Prof Balaji Chaugule, Mihir Kanojia, Parvez Kazi - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (3):1331-1335.
    Password authentication is a crucial aspect of computer security and privacy. In today's digital world, users have to remember a plethora of passwords for different online accounts, which can lead to password fatigue and security risks, such as password reuse and weak passwords. To address these issues, researchers have proposed various alternative authentication methods, including graphical password authentication. In this research paper, we propose a graphical password authentication system that uses Structural Similarity Index (SSIM) to compare the user's drawn pattern (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  69
    Efficient Enumeration of URLs of Active Hidden Servers over Anonymous Channel.S. Cherishma Sree - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-14.
    This project presents an innovative approach to the efficient enumeration of hidden service URLs (.onion) on the TOR network using a custom-built graphical user interface (GUI) application. The tool leverages web scraping techniques, targeting the Ahmia search engine, to retrieve and analyze active hidden server URLs. Through the integration of Python’s Tkinter library for GUI development and the use of requests and regular expressions for content mining, the application simplifies the process of discovering and visualizing .onion URLs. The tool (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  73
    InspireNext: Enabling Students to Build Careers with AI-Powered Tools and Insights.S. Yogeswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):615-625.
    The rapid advancement of artificial intelligence (AI) technologies has revolutionized various industries, including the realm of education and career guidance. This project endeavors to harness the power of AI to develop a sophisticated career guidance application that offers personalized and effective recommendations to students and job seekers. The primary objective of this project is to address the limitations of traditional career guidance methods, which often lack customization and fail to adapt to individual preferences, skills, and aspirations. Through the integration of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. IT & C, Volumul 1, 2022.Nicolae Sfetcu - 2022 - It and C 1.
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL Cu sau fără Internet?, de Nicolae Sfetcu Supremația tehnologiilor IT&C, de Nicolae Sfetcu -/- TEHNOLOGIA INFORMAȚIEI Tehnologia blockchain, de Nicolae Sfetcu Ciclul de viață al inteligenței artificiale, de Nicolae Sfetcu -/- TELECOMUNICAȚII Rețelele de comunicații 5G, de Nicolae Sfetcu Proiectarea și arhitectura rețelelor de comunicații 5G, de Nicolae Sfetcu -/- INTERNET Megadatele (Big Data) pe Internet, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. No Hugging, No Learning: The Limitations of Humour.Cochrane Tom - 2017 - British Journal of Aesthetics 57 (1):51-66.
    I claim that the significance of comic works to influence our attitudes is limited by the conditions under which we find things funny. I argue that we can only find something funny if we regard it as norm-violating in a way that doesn’t make certain cognitive or pragmatic demands upon us. It is compatible with these conditions that humour reinforces our attitude that something is norm-violating. However, it is not compatible with these conditions that, on the basis of finding it (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  36. Chaos and Authaumatronics.Parker Emmerson - 2024
    Chaos topology delves into bizarre symbol configurations of the world of quasi-quantification and pseudo-quantifiability. With quantum complexes, we are eventually able to find game play that blends wormholes with quantum computers and transcendental numbers. A conclusion that will leave you breathless, Chaos (Emmerson, 2023),.
    Download  
     
    Export citation  
     
    Bookmark