Showing 1 - 20 results of 184 for search '(( python based implementation ) OR ( python effective implementation ))', query time: 0.33s Refine Results
  1. 1

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
  2. 2

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education by Suha Assayed (22454038)

    Published 2025
    “…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
  3. 3

    Exploring the integration of metaverse technologies in engineering education through the SAMR model by Snezhana Dineva (22444471)

    Published 2025
    “…It demonstrates the successful implementation of the model in practice and provides examples of effective practices in the context of the CAVE (Cave Automatic Virtual Environment) metaverse. …”
  4. 4

    Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing by Pavel Izosimov (20096259)

    Published 2024
    “…</p><h2>Key Features</h2><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Code Obfuscation in Python</b></a>: Implements multi-level protection with dynamic encryption and obfuscation techniques, making it an effective <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Python obfuscator</b></a>.…”
  5. 5

    Python implementation for image-based ERT inversion using ViT, CNN, UNet, and LDM models, and related data conversion and visualization by Huichao Yin (14589020)

    Published 2025
    “…<p dir="ltr">Python implementation for image-based ERT inversion using ViT, CNN, UNet, and LDM models, and related data conversion and visualization.…”
  6. 6

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool by Pavel Izosimov (20096259)

    Published 2024
    “…This tool provides <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">code obfuscation in Python</a> and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank">Python code encryption</a>, enabling developers to <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">protect Python code</a> effectively.…”
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Python code for a rule-based NLP model for mapping circular economy indicators to SDGs by Zahir Barahmand (18008947)

    Published 2025
    “…The package includes:</p><ul><li>The complete Python codebase implementing the classification algorithm</li><li>A detailed manual outlining model features, requirements, and usage instructions</li><li>Sample input CSV files and corresponding processed output files to demonstrate functionality</li><li>Keyword dictionaries for all 17 SDGs, distinguishing strong and weak matches</li></ul><p dir="ltr">These materials enable full reproducibility of the study, facilitate adaptation for related research, and offer transparency in the methodological framework.…”
  13. 13

    A comparison between the static Python-based visualizations of the p65 activity in activated fibroblasts and the dynamic, HTML-based visualizations that use these same reduction me... by Hector Torres (11708207)

    Published 2025
    “…<b>(b)</b> After SpatioView: due to PyScript constraints, PCA and t-SNE were implemented as viable dimensionality reduction methods in an HTML-based interface. …”
  14. 14

    Python code for hierarchical cluster analysis of detected R-strategies from rule-based NLP on 500 circular economy definitions by Zahir Barahmand (18008947)

    Published 2025
    “…The resulting dendrogram visually represents how different strategies are conceptually related based on their co-occurrence in CE definitions.</p><p dir="ltr">This Python code was optimized and debugged using ChatGPT-4o to ensure implementation efficiency, accuracy, and clarity.…”
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Design and Implementation of a Browser-Based Toolfor Protecting Gaming Assets from UnauthorizedAccess by Alim Imashev (22606007)

    Published 2025
    “…<p dir="ltr">The project <b>“Design and Implementation of a Browser-Based Tool for Protecting Gaming Assets from Unauthorized Access”</b> focuses on developing a security-oriented software solution that safeguards digital game assets within browser environments.…”
  20. 20