Showing 1 - 20 results of 264 for search '(( python ((model implementation) OR (effective implementation)) ) OR ( python tool implementing ))', query time: 0.62s Refine Results
  1. 1

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education by Suha Assayed (22454038)

    Published 2025
    “…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
  2. 2
  3. 3
  4. 4

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
  5. 5

    Cost functions implemented in Neuroptimus. by Máté Mohácsi (20469514)

    Published 2024
    “…In recent years, manual model tuning has been gradually replaced by automated parameter search using a variety of different tools and methods. …”
  6. 6

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool by Pavel Izosimov (20096259)

    Published 2024
    “…</li></ul><p dir="ltr"><b>Application Areas</b></p><p dir="ltr">The <b>Multi-Version PYZ Builder Script</b> can be effectively applied in various areas:</p><ul><li><b>Commercial Distribution</b>: Distribute protected Python code to clients or customers, implementing advanced <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>source code protection</b></a> for sales or rentals.…”
  7. 7

    Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing by Pavel Izosimov (20096259)

    Published 2024
    “…</li></ul><h2>Additional Features</h2><ul><li><a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank"><b>Protect Python Code</b></a>: The tool effectively protects your Python code, preventing unauthorized access or modification.…”
  8. 8

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool by Pavel Izosimov (20096259)

    Published 2024
    “…This tool provides <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">code obfuscation in Python</a> and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank">Python code encryption</a>, enabling developers to <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">protect Python code</a> effectively.…”
  9. 9
  10. 10

    Exploring the integration of metaverse technologies in engineering education through the SAMR model by Snezhana Dineva (22444471)

    Published 2025
    “…It demonstrates the successful implementation of the model in practice and provides examples of effective practices in the context of the CAVE (Cave Automatic Virtual Environment) metaverse. …”
  11. 11
  12. 12
  13. 13

    Source Code for the Hierarchical Key Assignment Scheme (HKAS) by Baris Celiktas (22804778)

    Published 2025
    Subjects: “…Hierarchical Key Assignment, Cryptography, Key Management, HKAS, Security Model, Python Implementation…”
  14. 14

    Comparison of BlueRecording with existing tools by Joseph James Tharayil (21416715)

    Published 2025
    “…To our knowledge, this is the first application of this generalized (i.e., non-dipolar) reciprocity-based approach to simulate EEG recordings. We use these tools to calculate extracellular signals from an <i>in silico</i> model of the rat somatosensory cortex and hippocampus and to study signal contribution differences between regions and cell types.…”
  15. 15

    Python implementation for image-based ERT inversion using ViT, CNN, UNet, and LDM models, and related data conversion and visualization by Huichao Yin (14589020)

    Published 2025
    “…<p dir="ltr">Python implementation for image-based ERT inversion using ViT, CNN, UNet, and LDM models, and related data conversion and visualization.…”
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20