Search alternatives:
practical implementation » practical implications (Expand Search)
Showing 1 - 20 results of 174 for search '(( ((python tool) OR (python code)) implementation ) OR ( python practical implementation ))', query time: 0.49s Refine Results
  1. 1

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Code Security Best Practices</b>: The tool enforces <b>Python code security best practices</b>, helping you adhere to industry standards for code protection.…”
  2. 2

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool by Pavel Izosimov (20096259)

    Published 2024
    “…</p><p dir="ltr"><b>Secure Code Sharing</b></p><p dir="ltr">The tool facilitates <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>secure code sharing</b></a> without exposing the original source code, aligning with the best practices of <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Python code security</b></a>. …”
  3. 3

    Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing by Pavel Izosimov (20096259)

    Published 2024
    “…This tool is ideal for developers who need to <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank"><b>protect Python code</b></a> when sharing it with clients, colleagues, or deploying it on servers, ensuring <a href="https://xn--mxac.net/python-app-bundle-shield.html" target="_blank"><b>Python code security best practices</b></a> are upheld.…”
  4. 4

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool by Pavel Izosimov (20096259)

    Published 2024
    “…</li></ul><p dir="ltr">By integrating the System Hardware ID Generator Script with these tools, developers can build robust applications that are both secure and optimized, adhering to the best practices in <a href="https://xn--mxac.net/" target="_blank">Python code security</a> and performance optimization.…”
  5. 5

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education by Suha Assayed (22454038)

    Published 2025
    “…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
  6. 6

    Dialogue Propositional Content Replacement (DPCR) code by Jacopo Amidei (10511297)

    Published 2025
    “…<p dir="ltr">This resource consists of a Python notebook with code that was implemented for a research project that developed a novel method for testing the components of theories of (dialogue) coherence through utterance substitution. …”
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Comparison of BlueRecording with existing tools by Joseph James Tharayil (21416715)

    Published 2025
    “…To enable efficient calculation of extracellular signals from large neural network simulations, we have developed <i>BlueRecording</i>, a pipeline consisting of standalone Python code, along with extensions to the Neurodamus simulation control application, the CoreNEURON computation engine, and the SONATA data format, to permit online calculation of such signals. …”
  15. 15
  16. 16

    SecurityGuidelinesRetrievalForPythonCodeGen by Catherine Tony (18368913)

    Published 2025
    “…Using Task-Specific Guidelines for Secure Python Code Generation: Replication Package"</p><p dir="ltr">This replication package contains SecGuide along with the results of each step followed in its creation, the scripts that implement all the prompting approaches and the code generated by the LLMs using these approaches. …”
  17. 17

    Exploring the integration of metaverse technologies in engineering education through the SAMR model by Snezhana Dineva (22444471)

    Published 2025
    “…It demonstrates the successful implementation of the model in practice and provides examples of effective practices in the context of the CAVE (Cave Automatic Virtual Environment) metaverse. …”
  18. 18
  19. 19
  20. 20

    Supporting data for "Interpreting complex ecological patterns and processes across differentscales using Artificial Intelligence" by Yifei Gu (9507104)

    Published 2025
    “…<p dir="ltr">This thesis bridges the gap between field observations and the empirical understanding of ecological systems by applying AI models at different spatial scales and hierarchical levels to study ecological complexity. The detailed implementation, source code and demo dataset are included in dedicated folders for each chapter.…”