Showing 1 - 20 results of 121 for search '(( python ((explore implementation) OR (world implementation)) ) OR ( python time implementation ))', query time: 0.59s Refine Results
  1. 1

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
  2. 2

    BSTPP: a python package for Bayesian spatiotemporal point processes by Isaac Manring (20705955)

    Published 2025
    “…<p>Spatiotemporal point process models have a rich history of effectively modeling event data in space and time. However, they are sometimes neglected due to the difficulty of implementing them. …”
  3. 3

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool by Pavel Izosimov (20096259)

    Published 2024
    “…By implementing advanced security measures such as <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>end-to-end encryption</b></a>, <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>asymmetric encryption</b></a>, and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>symmetric encryption</b></a>, the platform strives to keep code better protected during transmission and execution.Explore other tools offered by Alpha Beta Network:</p><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Secure Python Code Manager</b></a>: A command-line tool for secure Python code sharing and protection using the Alpha Beta Network cloud platform.…”
  4. 4

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education by Suha Assayed (22454038)

    Published 2025
    “…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
  5. 5

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool by Pavel Izosimov (20096259)

    Published 2024
    “…By generating a unique HWID for devices, it provides a foundation for implementing robust security measures, efficient asset management, and compliance with licensing agreements.Download the script and explore the possibilities of unique hardware identification in your projects today.© 2024 αβ.net (alphabetanet.com) - <b>Alpha Beta Network</b>. …”
  6. 6
  7. 7
  8. 8

    Comparison of performance between our next reaction implementation and the Python library from Ref. [3]. by Samuel Cure (22250922)

    Published 2025
    “…<p>We simulate SIR epidemic processes on Watts-Strogatz networks with parameters <i>k</i><sub>0</sub> = 5, <i>p</i> = 0.1 <b>(a)</b> and Barabási-Albert networks with parameter <i>m</i> = 5 <b>(b)</b> using the Python wrapper of our C++ implementation and compare its performance with the Python library from Ref. …”
  9. 9
  10. 10
  11. 11

    Five Operator Lattice Simulation by James McDaniel (22522571)

    Published 2025
    “…Together these functions form a minimal closed system for self-referential information control, modeling how conscious processes balance stability, exploration, and renewal.</p><p dir="ltr">Running the included file <code>five_operator_lattice_sim.py</code> (Python 3.14 + NumPy 2.1) reproduces the dynamic interactions and figures reported in Appendix A of the paper, generating time-series data that demonstrate operator balance, instability, and renewal cycles.…”
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Prediction accuracy analysis over time steps. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  18. 18
  19. 19
  20. 20