Search alternatives:
samples representing » model representing (Expand Search), plot representing (Expand Search), plots representing (Expand Search)
code implementation » model implementation (Expand Search), time implementation (Expand Search), pre implementation (Expand Search)
python samples » thin samples (Expand Search)
samples representing » model representing (Expand Search), plot representing (Expand Search), plots representing (Expand Search)
code implementation » model implementation (Expand Search), time implementation (Expand Search), pre implementation (Expand Search)
python samples » thin samples (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
Python code that implements the Hoshen Kopleman algorithm used to identify the clusters shown in Figs 9 and 10.
Published 2023“…<p>Python code that implements the Hoshen Kopleman algorithm used to identify the clusters shown in Figs <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0285630#pone.0285630.g009" target="_blank">9</a> and <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0285630#pone.0285630.g010" target="_blank">10</a>.…”
-
8
Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management
Published 2024“…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
-
9
-
10
-
11
Analysis of the selected studies in terms of tools used for implementing RNN models.
Published 2024Subjects: -
12
-
13
PCA-RF Python codes.txt
Published 2024“…<p dir="ltr">This text file is the PCA-RF model’s Python code. You can implement it in the Jupyter notebook.…”
-
14
-
15
SecurityGuidelinesRetrievalForPythonCodeGen
Published 2025“…Using Task-Specific Guidelines for Secure Python Code Generation: Replication Package"</p><p dir="ltr">This replication package contains SecGuide along with the results of each step followed in its creation, the scripts that implement all the prompting approaches and the code generated by the LLMs using these approaches. …”
-
16
Python implementation of the geometric minimum action method (gMAM)
Published 2021“…<p>The Python 3 script <code>gmam_demo.py</code> found in this repository implements the geometric minimum action method (gMAM) as presented in Heymann, M. and Vanden-Eijnden, E. (2008), "The geometric minimum action method: A least action principleon the space of curves." …”
-
17
Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education
Published 2025“…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
-
18
-
19
-
20
Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing
Published 2024“…</p><h2>Key Features</h2><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Code Obfuscation in Python</b></a>: Implements multi-level protection with dynamic encryption and obfuscation techniques, making it an effective <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Python obfuscator</b></a>.…”