Showing 1 - 20 results of 328 for search '(( python _ implementation ) OR ( python tool implementing ))', query time: 0.26s Refine Results
  1. 1

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education by Suha Assayed (22454038)

    Published 2025
    “…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
  2. 2

    Comparison of performance between our next reaction implementation and the Python library from Ref. [3]. by Samuel Cure (22250922)

    Published 2025
    “…<p>We simulate SIR epidemic processes on Watts-Strogatz networks with parameters <i>k</i><sub>0</sub> = 5, <i>p</i> = 0.1 <b>(a)</b> and Barabási-Albert networks with parameter <i>m</i> = 5 <b>(b)</b> using the Python wrapper of our C++ implementation and compare its performance with the Python library from Ref. …”
  3. 3
  4. 4

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
  5. 5

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool by Pavel Izosimov (20096259)

    Published 2024
    “…By implementing advanced security measures such as <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>end-to-end encryption</b></a>, <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>asymmetric encryption</b></a>, and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>symmetric encryption</b></a>, the platform strives to keep code better protected during transmission and execution.Explore other tools offered by Alpha Beta Network:</p><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Secure Python Code Manager</b></a>: A command-line tool for secure Python code sharing and protection using the Alpha Beta Network cloud platform.…”
  6. 6

    Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing by Pavel Izosimov (20096259)

    Published 2024
    “…<p dir="ltr">Local Python Code Protector Script: Advanced Tool for Python Code Protection and Secure Sharing</p><h2>Introduction</h2><p dir="ltr">The <b>Local Python Code Protector Script</b> is a powerful command-line tool designed to provide <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank"><b>source code protection</b></a> and <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank"><b>secure code sharing</b></a> for Python scripts. …”
  7. 7

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool by Pavel Izosimov (20096259)

    Published 2024
    “…System Hardware ID Generator Script: Unique Device Identification for Enhanced Security and Licensing<p dir="ltr">The <b>System Hardware ID Generator Script</b> is a powerful Python tool developed to generate a unique Hardware ID (HWID) for the device it runs on. …”
  8. 8

    Cost functions implemented in Neuroptimus. by Máté Mohácsi (20469514)

    Published 2024
    “…To address these issues, we developed a generic platform (called Neuroptimus) that allows users to set up neural parameter optimization tasks via a graphical interface, and to solve these tasks using a wide selection of state-of-the-art parameter search methods implemented by five different Python packages. Neuroptimus also offers several features to support more advanced usage, including the ability to run most algorithms in parallel, which allows it to take advantage of high-performance computing architectures. …”
  9. 9

    SCADET algorithm parameter configuration (Python implementation). by Xiaolong Zhang (470454)

    Published 2025
    “…<p>SCADET algorithm parameter configuration (Python implementation).</p>…”
  10. 10

    Exploring the integration of metaverse technologies in engineering education through the SAMR model by Snezhana Dineva (22444471)

    Published 2025
    “…The final deliverable is a plan for phased integration of metaverse learning into a Python programming course following this model, building on existing best practices.…”
  11. 11

    Comparison of BlueRecording with existing tools by Joseph James Tharayil (21416715)

    Published 2025
    “…To enable efficient calculation of extracellular signals from large neural network simulations, we have developed <i>BlueRecording</i>, a pipeline consisting of standalone Python code, along with extensions to the Neurodamus simulation control application, the CoreNEURON computation engine, and the SONATA data format, to permit online calculation of such signals. …”
  12. 12

    Comprehensive Analysis of Key Probability Distributions in Data Science: Applications, Mathematical Formulations, and Python Implementation by Rasikh Tariq (17117866)

    Published 2024
    “…Comprehensive Analysis of Key Probability Distributions in Data Science: Applications, Mathematical Formulations, and Python Implementation. Open Educational Resource for the Data Analytics and Artificial Intelligence II course. …”
  13. 13
  14. 14
  15. 15

    Is your Open Source Research Community implementing the Diversity Equity and Inclusion (DEI) equivalent of Python 2.6? by Rowland Mosbergen (7533140)

    Published 2025
    “…</p><p dir="ltr">However many DEI strategies fail because they think they are implementing the DEI equivalent of Python 3.13 when they are actually implementing the DEI equivalent of Python 2.6.…”
  16. 16
  17. 17

    Simple implementation examples of agent AI on free energy calculation and phase-field simulation by Toshiyuki Koyama (22828581)

    Published 2025
    “…</p> <p>Using Gibbs energy calculations and diffusion simulations as examples, we demonstrated the implementation method and usefulness of simple agent AI, where sample python codes are distributed as supplemental materials.…”
  18. 18
  19. 19

    Source Code for the Hierarchical Key Assignment Scheme (HKAS) by Baris Celiktas (22804778)

    Published 2025
    Subjects: “…Hierarchical Key Assignment, Cryptography, Key Management, HKAS, Security Model, Python Implementation…”
  20. 20