Showing 1 - 20 results of 265 for search '(( python ((model implementation) OR (time implementation)) ) OR ( python tool implementing ))', query time: 0.54s Refine Results
  1. 1

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education by Suha Assayed (22454038)

    Published 2025
    “…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
  2. 2
  3. 3

    Comparison of performance between our next reaction implementation and the Python library from Ref. [3]. by Samuel Cure (22250922)

    Published 2025
    “…<p>We simulate SIR epidemic processes on Watts-Strogatz networks with parameters <i>k</i><sub>0</sub> = 5, <i>p</i> = 0.1 <b>(a)</b> and Barabási-Albert networks with parameter <i>m</i> = 5 <b>(b)</b> using the Python wrapper of our C++ implementation and compare its performance with the Python library from Ref. …”
  4. 4

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
  5. 5

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool by Pavel Izosimov (20096259)

    Published 2024
    “…By implementing advanced security measures such as <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>end-to-end encryption</b></a>, <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>asymmetric encryption</b></a>, and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>symmetric encryption</b></a>, the platform strives to keep code better protected during transmission and execution.Explore other tools offered by Alpha Beta Network:</p><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Secure Python Code Manager</b></a>: A command-line tool for secure Python code sharing and protection using the Alpha Beta Network cloud platform.…”
  6. 6

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Technical Support and Troubleshooting</b>: Support teams can quickly identify devices during support requests, track support history, and automate support processes using the HWID, improving response times and customer satisfaction.</li></ul><h2>Integration with Other Tools</h2><p dir="ltr">The System Hardware ID Generator Script is part of the broader suite of tools offered by the <a href="https://xn--mxac.net/" target="_blank">Alpha Beta Network</a>, dedicated to enhancing security and performance in <a href="https://xn--mxac.net/" target="_blank">Python programming</a>.…”
  7. 7

    Cost functions implemented in Neuroptimus. by Máté Mohácsi (20469514)

    Published 2024
    “…In recent years, manual model tuning has been gradually replaced by automated parameter search using a variety of different tools and methods. …”
  8. 8
  9. 9
  10. 10
  11. 11

    Exploring the integration of metaverse technologies in engineering education through the SAMR model by Snezhana Dineva (22444471)

    Published 2025
    “…The final deliverable is a plan for phased integration of metaverse learning into a Python programming course following this model, building on existing best practices.…”
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Source Code for the Hierarchical Key Assignment Scheme (HKAS) by Baris Celiktas (22804778)

    Published 2025
    Subjects: “…Hierarchical Key Assignment, Cryptography, Key Management, HKAS, Security Model, Python Implementation…”
  19. 19

    Comparison of BlueRecording with existing tools by Joseph James Tharayil (21416715)

    Published 2025
    “…To our knowledge, this is the first application of this generalized (i.e., non-dipolar) reciprocity-based approach to simulate EEG recordings. We use these tools to calculate extracellular signals from an <i>in silico</i> model of the rat somatosensory cortex and hippocampus and to study signal contribution differences between regions and cell types.…”
  20. 20

    Python implementation for image-based ERT inversion using ViT, CNN, UNet, and LDM models, and related data conversion and visualization by Huichao Yin (14589020)

    Published 2025
    “…<p dir="ltr">Python implementation for image-based ERT inversion using ViT, CNN, UNet, and LDM models, and related data conversion and visualization.…”