Showing 1 - 20 results of 328 for search '(( python ((code implementation) OR (implementation _)) ) OR ( python effective implementation ))', query time: 0.49s Refine Results
  1. 1

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Source Code Protection</b>: Implement multi-level <b>source code protection</b> with dynamic <b>code obfuscation in Python</b>, making it significantly harder for others to reverse-engineer your code.…”
  2. 2
  3. 3
  4. 4

    Source Code for the Hierarchical Key Assignment Scheme (HKAS) by Baris Celiktas (22804778)

    Published 2025
    Subjects: “…Hierarchical Key Assignment, Cryptography, Key Management, HKAS, Security Model, Python Implementation…”
  5. 5

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool by Pavel Izosimov (20096259)

    Published 2024
    “…</li></ul><p dir="ltr"><b>Application Areas</b></p><p dir="ltr">The <b>Multi-Version PYZ Builder Script</b> can be effectively applied in various areas:</p><ul><li><b>Commercial Distribution</b>: Distribute protected Python code to clients or customers, implementing advanced <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>source code protection</b></a> for sales or rentals.…”
  6. 6

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education by Suha Assayed (22454038)

    Published 2025
    “…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
  7. 7
  8. 8

    Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing by Pavel Izosimov (20096259)

    Published 2024
    “…</p><h2>Key Features</h2><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Code Obfuscation in Python</b></a>: Implements multi-level protection with dynamic encryption and obfuscation techniques, making it an effective <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Python obfuscator</b></a>.…”
  9. 9

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool by Pavel Izosimov (20096259)

    Published 2024
    “…This tool provides <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">code obfuscation in Python</a> and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank">Python code encryption</a>, enabling developers to <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">protect Python code</a> effectively.…”
  10. 10

    Dialogue Propositional Content Replacement (DPCR) code by Jacopo Amidei (10511297)

    Published 2025
    “…<p dir="ltr">This resource consists of a Python notebook with code that was implemented for a research project that developed a novel method for testing the components of theories of (dialogue) coherence through utterance substitution. …”
  11. 11
  12. 12
  13. 13

    Numerical data and codes for "Noisy Probabilistic Error Cancellation and Generalized Physical Implementability" by Tian-Ren Jin (18781930)

    Published 2025
    “…<p dir="ltr">This data set contains the data and codes for "Noisy Probabilistic Error Cancellation and Generalized Physical Implementability". …”
  14. 14

    BSTPP: a python package for Bayesian spatiotemporal point processes by Isaac Manring (20705955)

    Published 2025
    “…<p>Spatiotemporal point process models have a rich history of effectively modeling event data in space and time. However, they are sometimes neglected due to the difficulty of implementing them. …”
  15. 15

    SCADET algorithm parameter configuration (Python implementation). by Xiaolong Zhang (470454)

    Published 2025
    “…<p>SCADET algorithm parameter configuration (Python implementation).</p>…”
  16. 16
  17. 17

    Cost functions implemented in Neuroptimus. by Máté Mohácsi (20469514)

    Published 2024
    “…However, using most of these software tools and choosing the most appropriate algorithm for a given optimization task require substantial technical expertise, which prevents the majority of researchers from using these methods effectively. To address these issues, we developed a generic platform (called Neuroptimus) that allows users to set up neural parameter optimization tasks via a graphical interface, and to solve these tasks using a wide selection of state-of-the-art parameter search methods implemented by five different Python packages. …”
  18. 18

    SecurityGuidelinesRetrievalForPythonCodeGen by Catherine Tony (18368913)

    Published 2025
    “…Using Task-Specific Guidelines for Secure Python Code Generation: Replication Package"</p><p dir="ltr">This replication package contains SecGuide along with the results of each step followed in its creation, the scripts that implement all the prompting approaches and the code generated by the LLMs using these approaches. …”
  19. 19
  20. 20

    Exploring the integration of metaverse technologies in engineering education through the SAMR model by Snezhana Dineva (22444471)

    Published 2025
    “…It demonstrates the successful implementation of the model in practice and provides examples of effective practices in the context of the CAVE (Cave Automatic Virtual Environment) metaverse. …”