Latest version: v0.0.1
This package is no longer maintained.
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Numerical integration using methods like: Trapezoidal method, Simpson rule, Newton cotes method and Compound trapezoidal method
No known vulnerabilities found