Search alternatives:
code implementation » model implementation (Expand Search), time implementation (Expand Search), pre implementation (Expand Search)
python based » method based (Expand Search), person based (Expand Search)
code implementation » model implementation (Expand Search), time implementation (Expand Search), pre implementation (Expand Search)
python based » method based (Expand Search), person based (Expand Search)
-
1
-
2
DataSheet_1_AirSeaFluxCode: Open-source software for calculating turbulent air-sea fluxes from meteorological parameters.pdf
Published 2023“…This means that empirical “bulk formulae” parameterizations that relate direct flux observations to concurrent measurements of the mean meteorological and sea surface variables contain considerable uncertainty. In this paper, we present a Python 3.6 (or higher) open-source software package “AirSeaFluxCode” for the computation of the heat (latent and sensible) and momentum fluxes. …”
-
3
-
4
-
5
Python code for hierarchical cluster analysis of detected R-strategies from rule-based NLP on 500 circular economy definitions
Published 2025“…</p><p dir="ltr">This Python code was optimized and debugged using ChatGPT-4o to ensure implementation efficiency, accuracy, and clarity.…”
-
6
Python implementation of a wildfire propagation example using m:n-CAk over Z and R.
Published 2025“…</p><p dir="ltr"><br></p><p dir="ltr">## Files in the Project</p><p dir="ltr"><br></p><p dir="ltr">### Python Scripts</p><p dir="ltr">- **Wildfire_on_m_n-CAk.py**: This file contains the main code for the fire cellular automaton. …”
-
7
-
8
-
9
System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool
Published 2024“…This tool provides <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">code obfuscation in Python</a> and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank">Python code encryption</a>, enabling developers to <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">protect Python code</a> effectively.…”
-
10
-
11
-
12
-
13
-
14
Python code that implements the Hoshen Kopleman algorithm used to identify the clusters shown in Figs 9 and 10.
Published 2023“…<p>Python code that implements the Hoshen Kopleman algorithm used to identify the clusters shown in Figs <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0285630#pone.0285630.g009" target="_blank">9</a> and <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0285630#pone.0285630.g010" target="_blank">10</a>.…”
-
15
-
16
Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management
Published 2024“…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
-
17
Analysis of the selected studies in terms of tools used for implementing RNN models.
Published 2024Subjects: -
18
-
19
Comparison of copy numbers of A and R during simulations by different methods.
Published 2024Subjects: -
20