Showing 1 - 20 results of 328 for search '(( python ((code implementation) OR (_ implementation)) ) OR ( python time implementation ))*', query time: 0.55s Refine Results
  1. 1

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education by Suha Assayed (22454038)

    Published 2025
    “…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
  2. 2
  3. 3

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Source Code Protection</b>: Implement multi-level <b>source code protection</b> with dynamic <b>code obfuscation in Python</b>, making it significantly harder for others to reverse-engineer your code.…”
  4. 4

    Comparison of performance between our next reaction implementation and the Python library from Ref. [3]. by Samuel Cure (22250922)

    Published 2025
    “…<p>We simulate SIR epidemic processes on Watts-Strogatz networks with parameters <i>k</i><sub>0</sub> = 5, <i>p</i> = 0.1 <b>(a)</b> and Barabási-Albert networks with parameter <i>m</i> = 5 <b>(b)</b> using the Python wrapper of our C++ implementation and compare its performance with the Python library from Ref. …”
  5. 5
  6. 6

    Source Code for the Hierarchical Key Assignment Scheme (HKAS) by Baris Celiktas (22804778)

    Published 2025
    Subjects: “…Hierarchical Key Assignment, Cryptography, Key Management, HKAS, Security Model, Python Implementation…”
  7. 7

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool by Pavel Izosimov (20096259)

    Published 2024
    “…</li></ul><p dir="ltr"><b>Application Areas</b></p><p dir="ltr">The <b>Multi-Version PYZ Builder Script</b> can be effectively applied in various areas:</p><ul><li><b>Commercial Distribution</b>: Distribute protected Python code to clients or customers, implementing advanced <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>source code protection</b></a> for sales or rentals.…”
  8. 8
  9. 9
  10. 10

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool by Pavel Izosimov (20096259)

    Published 2024
    “…This tool provides <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">code obfuscation in Python</a> and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank">Python code encryption</a>, enabling developers to <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">protect Python code</a> effectively.…”
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Numerical data and codes for "Noisy Probabilistic Error Cancellation and Generalized Physical Implementability" by Tian-Ren Jin (18781930)

    Published 2025
    “…<p dir="ltr">This data set contains the data and codes for "Noisy Probabilistic Error Cancellation and Generalized Physical Implementability". …”
  16. 16

    BSTPP: a python package for Bayesian spatiotemporal point processes by Isaac Manring (20705955)

    Published 2025
    “…<p>Spatiotemporal point process models have a rich history of effectively modeling event data in space and time. However, they are sometimes neglected due to the difficulty of implementing them. …”
  17. 17
  18. 18

    SCADET algorithm parameter configuration (Python implementation). by Xiaolong Zhang (470454)

    Published 2025
    “…<p>SCADET algorithm parameter configuration (Python implementation).</p>…”
  19. 19
  20. 20

    SecurityGuidelinesRetrievalForPythonCodeGen by Catherine Tony (18368913)

    Published 2025
    “…Using Task-Specific Guidelines for Secure Python Code Generation: Replication Package"</p><p dir="ltr">This replication package contains SecGuide along with the results of each step followed in its creation, the scripts that implement all the prompting approaches and the code generated by the LLMs using these approaches. …”