Search alternatives:
world implementation » policy implementation (Expand Search), _ implementation (Expand Search)
detection model » detection models (Expand Search), infection model (Expand Search), prediction model (Expand Search)
python world » python tool (Expand Search)
world implementation » policy implementation (Expand Search), _ implementation (Expand Search)
detection model » detection models (Expand Search), infection model (Expand Search), prediction model (Expand Search)
python world » python tool (Expand Search)
-
1
-
2
-
3
Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management
Published 2024“…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
-
4
XGBoost-SHAP model implementation for blown snow detection.
Published 2025“…<p>XGBoost-SHAP model implementation for blown snow detection.</p>…”
-
5
SecurityGuidelinesRetrievalForPythonCodeGen
Published 2025“…Using Task-Specific Guidelines for Secure Python Code Generation: Replication Package"</p><p dir="ltr">This replication package contains SecGuide along with the results of each step followed in its creation, the scripts that implement all the prompting approaches and the code generated by the LLMs using these approaches. …”
-
6
Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education
Published 2025“…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
-
7
-
8
Python code for hierarchical cluster analysis of detected R-strategies from rule-based NLP on 500 circular economy definitions
Published 2025“…</p><p dir="ltr">This Python code was optimized and debugged using ChatGPT-4o to ensure implementation efficiency, accuracy, and clarity.…”
-
9
Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing
Published 2024“…</p><h2>Key Features</h2><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Code Obfuscation in Python</b></a>: Implements multi-level protection with dynamic encryption and obfuscation techniques, making it an effective <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Python obfuscator</b></a>.…”
-
10
Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool
Published 2024“…</li></ul><p dir="ltr"><b>Application Areas</b></p><p dir="ltr">The <b>Multi-Version PYZ Builder Script</b> can be effectively applied in various areas:</p><ul><li><b>Commercial Distribution</b>: Distribute protected Python code to clients or customers, implementing advanced <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>source code protection</b></a> for sales or rentals.…”
-
11
-
12
System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool
Published 2024“…This tool provides <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">code obfuscation in Python</a> and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank">Python code encryption</a>, enabling developers to <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">protect Python code</a> effectively.…”
-
13
Dialogue Propositional Content Replacement (DPCR) code
Published 2025“…<p dir="ltr">This resource consists of a Python notebook with code that was implemented for a research project that developed a novel method for testing the components of theories of (dialogue) coherence through utterance substitution. …”
-
14
-
15
-
16
-
17
Online Resource 3: Word Cloud Dataset and Code
Published 2025“…<p dir="ltr">Online Resource 3: Word Cloud Dataset and Code. This set of files are part of Online Resource 3, which allows readers to implement a Jupyter Notebook Python program to create a word cloud based on survey responses. …”
-
18
-
19
-
20
The results of implementing the models.
Published 2024“…Radiomics features were extracted from each image and finally, the machine learning models were implemented on these features. The used machine learning algorithms are Gradient Tree Boosting (GBM), eXtreme Gradient Boosting (XGBoost), and Light GBM. …”