Unanswered Questions
1,230 questions with no upvoted or accepted answers
0
votes
0
answers
58
views
Element-wise natural logarithm of large array
Let X be a numpy.array of np.float32 with shape (100,100,100,100). I'm computing the variable lX with the following formula
<...
2
votes
0
answers
79
views
backward induction algorithm computation
Is there a way to significantly speed-up this code?
I'm solving a dynamic programming model using a backward induction algorithm. A crucial step is to calculate the current-period value function (VF), ...
1
vote
0
answers
99
views
Runtime function overloading / dynamic dispatch for Python (2nd revision)
Second revision of the original post: Function overloading / dynamic dispatch for Python
TL;DR:
Improved version of this library[^1] based on previous reviews and criticism. It provides runtime ...
2
votes
0
answers
137
views
How to make this arbitrary precision π calculator using Machin-like formula run faster?
Two days ago (or yesterday depending on your timezone) was π-day. So I thought it was a good day to calculate π.
I used Machin-like formula to calculate π, in homage of William Shanks, who calculated ...
1
vote
1
answer
101
views
Convolutional LSTM
I write code about convolutional LSTM, but I am not sure if mine is good enough. Is anyone interested in giving a look at my code?
...
3
votes
0
answers
80
views
Upload Data Products to OpenMetadata
I need to build a python application to interact with the OpenMetadata API (specifically, to upload a data in YAML format). However, I’ve encountered some intrinsic connections between the ...
4
votes
0
answers
212
views
Regression model is doing exceptionally very well on time series
I have the following task to do: I have time series data. Training by the consecutive 3 days to predict the each 4th day. Each day data represents one CSV file which has dimension 24x25. Every ...
1
vote
0
answers
69
views
Nostr OAuth 2 authentication using Fastapi
I liked the idea of being able to authenticate using your own private key using Nostr protocol. The idea is based on events, so you prove your identity by signing an event.
It's close to Wallet ...
2
votes
0
answers
48
views
Brzozowski Algebraic Method for converting finite automaton from NFA to DFA
The Brzozowski Algebraic Method is a technique used in automata theory, specifically for constructing the minimal deterministic finite automaton (DFA) from a given nondeterministic finite automaton (...
0
votes
0
answers
145
views
Fuzz-test the performance of SmokeDetector's keywords regex
I had an idea for attempting to detect bad performing regexes in Charcoal-SE/SmokeDetector, by using Atheris (a fuzzer for python code).
The theory behind it is that a bad performing regex will most ...
0
votes
0
answers
52
views
Scrapy Spider - Code Audit and Optimization Suggestions
I've written a Scrapy spider to scrape product details from a specific website. The spider is designed to navigate through various pages, locate specific products, and gather detailed information ...
1
vote
0
answers
63
views
Principal Variation Search (PVS) for playing Connect Four in Java
This time, I have an implementation of PVS (Principal Variation Search) algorithm for playing the game of Connect Four.
The repository holding the above .java file ...
1
vote
0
answers
60
views
Negamax with Alpha-beta pruning for playing Connect Four in Java
I have this repository.
My main concern this time is my implementation of the Negamax algorithm with alpha-beta pruning:
...
4
votes
0
answers
54
views
Connect Four AI vs. AI match in Javascript
This time, I have a Javascript program that runs a Connect Four match between two Alpha-beta pruning based AI bots. (See this page.)
ai-battle.html:
...
6
votes
0
answers
107
views
Optimizing SymPy Implementation of prime factorization in form of QUBO
I'm trying to reproduce a paper on Prime Factorization. This paper converts the problem into a QUBO form, which then we can map it to an Ising Minimizer. I've basically done everything and I've ...