Showing 1 - 20 results of 7,653 for search '(( python code implementation ) OR ( method used implementation ))', query time: 0.42s Refine Results
  1. 1
  2. 2
  3. 3

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…<p dir="ltr"><b>Secure Python Code Manager Script: Secure Code Sharing and Source Code Protection Tool</b></p><h2>Introduction</h2><p dir="ltr">The <b>Secure Python Code Manager Script</b> is a powerful command-line tool designed to help developers <b>securely share and protect their Python code</b> using the <a href="https://xn--mxac.net/" target="_blank">Alpha Beta Network</a> cloud platform. …”
  4. 4
  5. 5

    SecurityGuidelinesRetrievalForPythonCodeGen by Catherine Tony (18368913)

    Published 2025
    “…Using Task-Specific Guidelines for Secure Python Code Generation: Replication Package"</p><p dir="ltr">This replication package contains SecGuide along with the results of each step followed in its creation, the scripts that implement all the prompting approaches and the code generated by the LLMs using these approaches. …”
  6. 6

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education by Suha Assayed (22454038)

    Published 2025
    “…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
  7. 7

    Simple implementation examples of agent AI on free energy calculation and phase-field simulation by Toshiyuki Koyama (22828581)

    Published 2025
    “…</p> <p>Using Gibbs energy calculations and diffusion simulations as examples, we demonstrated the implementation method and usefulness of simple agent AI, where sample python codes are distributed as supplemental materials.…”
  8. 8
  9. 9
  10. 10

    Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing by Pavel Izosimov (20096259)

    Published 2024
    “…</li></ul><h2>Security and Best Practices</h2><p dir="ltr">By implementing <a href="https://xn--mxac.net/python-app-bundle-shield.html" target="_blank"><b>Python code security best practices</b></a>, including advanced cryptographic methods like <a href="https://xn--mxac.net/python-binary-optimization-compiler.html" target="_blank"><b>asymmetric encryption</b></a> and <a href="https://xn--mxac.net/python-binary-optimization-compiler.html" target="_blank"><b>symmetric encryption</b></a>, the Local Python Code Protector Script strives to keep code better protected during transmission and execution. …”
  11. 11

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool by Pavel Izosimov (20096259)

    Published 2024
    “…By implementing advanced security measures such as <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>end-to-end encryption</b></a>, <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>asymmetric encryption</b></a>, and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>symmetric encryption</b></a>, the platform strives to keep code better protected during transmission and execution.Explore other tools offered by Alpha Beta Network:</p><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Secure Python Code Manager</b></a>: A command-line tool for secure Python code sharing and protection using the Alpha Beta Network cloud platform.…”
  12. 12

    Supporting data for "Interpreting complex ecological patterns and processes across differentscales using Artificial Intelligence" by Yifei Gu (9507104)

    Published 2025
    “…<p dir="ltr">This thesis bridges the gap between field observations and the empirical understanding of ecological systems by applying AI models at different spatial scales and hierarchical levels to study ecological complexity. The detailed implementation, source code and demo dataset are included in dedicated folders for each chapter.…”
  13. 13
  14. 14
  15. 15

    Mixed methods implementation evaluation. by Melissa L. deJonge (16951466)

    Published 2025
    “…A 3-arm parallel Randomized Controlled Trial, using a hybrid effectiveness-implementation design, will be conducted using a collaborative implementation approach. …”
  16. 16
  17. 17
  18. 18
  19. 19

    Dialogue Propositional Content Replacement (DPCR) code by Jacopo Amidei (10511297)

    Published 2025
    “…<p dir="ltr">This resource consists of a Python notebook with code that was implemented for a research project that developed a novel method for testing the components of theories of (dialogue) coherence through utterance substitution. …”
  20. 20

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool by Pavel Izosimov (20096259)

    Published 2024
    “…This tool provides <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">code obfuscation in Python</a> and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank">Python code encryption</a>, enabling developers to <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">protect Python code</a> effectively.…”