يعرض 1 - 20 نتائج من 328 نتيجة بحث عن '(( python ((code implementation) OR (_ implementation)) ) OR ( python time implementation ))', وقت الاستعلام: 0.56s تنقيح النتائج
  1. 1

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education حسب Suha Assayed (22454038)

    منشور في 2025
    "…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …"
  2. 2
  3. 3

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…</li><li><b>Source Code Protection</b>: Implement multi-level <b>source code protection</b> with dynamic <b>code obfuscation in Python</b>, making it significantly harder for others to reverse-engineer your code.…"
  4. 4

    Comparison of performance between our next reaction implementation and the Python library from Ref. [3]. حسب Samuel Cure (22250922)

    منشور في 2025
    "…<p>We simulate SIR epidemic processes on Watts-Strogatz networks with parameters <i>k</i><sub>0</sub> = 5, <i>p</i> = 0.1 <b>(a)</b> and Barabási-Albert networks with parameter <i>m</i> = 5 <b>(b)</b> using the Python wrapper of our C++ implementation and compare its performance with the Python library from Ref. …"
  5. 5
  6. 6

    Source Code for the Hierarchical Key Assignment Scheme (HKAS) حسب Baris Celiktas (22804778)

    منشور في 2025
    الموضوعات: "…Hierarchical Key Assignment, Cryptography, Key Management, HKAS, Security Model, Python Implementation…"
  7. 7

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…</li></ul><p dir="ltr"><b>Application Areas</b></p><p dir="ltr">The <b>Multi-Version PYZ Builder Script</b> can be effectively applied in various areas:</p><ul><li><b>Commercial Distribution</b>: Distribute protected Python code to clients or customers, implementing advanced <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>source code protection</b></a> for sales or rentals.…"
  8. 8
  9. 9
  10. 10

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…This tool provides <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">code obfuscation in Python</a> and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank">Python code encryption</a>, enabling developers to <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">protect Python code</a> effectively.…"
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Numerical data and codes for "Noisy Probabilistic Error Cancellation and Generalized Physical Implementability" حسب Tian-Ren Jin (18781930)

    منشور في 2025
    "…<p dir="ltr">This data set contains the data and codes for "Noisy Probabilistic Error Cancellation and Generalized Physical Implementability". …"
  16. 16

    BSTPP: a python package for Bayesian spatiotemporal point processes حسب Isaac Manring (20705955)

    منشور في 2025
    "…<p>Spatiotemporal point process models have a rich history of effectively modeling event data in space and time. However, they are sometimes neglected due to the difficulty of implementing them. …"
  17. 17
  18. 18

    SCADET algorithm parameter configuration (Python implementation). حسب Xiaolong Zhang (470454)

    منشور في 2025
    "…<p>SCADET algorithm parameter configuration (Python implementation).</p>…"
  19. 19
  20. 20

    SecurityGuidelinesRetrievalForPythonCodeGen حسب Catherine Tony (18368913)

    منشور في 2025
    "…Using Task-Specific Guidelines for Secure Python Code Generation: Replication Package"</p><p dir="ltr">This replication package contains SecGuide along with the results of each step followed in its creation, the scripts that implement all the prompting approaches and the code generated by the LLMs using these approaches. …"