يعرض 1 - 20 نتائج من 1,326 نتيجة بحث عن '(( python code implementation ) OR ( methods cross implementation ))', وقت الاستعلام: 0.28s تنقيح النتائج
  1. 1
  2. 2
  3. 3

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…<p dir="ltr"><b>Multi-Version PYZ Builder Script: Secure Python Code Distribution Across Platforms and Versions</b></p><p dir="ltr">The <b>Multi-Version PYZ Builder Script</b> is an advanced tool designed for developers seeking to enhance their Python code protection and distribution methods. …"
  4. 4

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…</li><li><b>Source Code Protection</b>: Implement multi-level <b>source code protection</b> with dynamic <b>code obfuscation in Python</b>, making it significantly harder for others to reverse-engineer your code.…"
  5. 5

    SecurityGuidelinesRetrievalForPythonCodeGen حسب Catherine Tony (18368913)

    منشور في 2025
    "…Using Task-Specific Guidelines for Secure Python Code Generation: Replication Package"</p><p dir="ltr">This replication package contains SecGuide along with the results of each step followed in its creation, the scripts that implement all the prompting approaches and the code generated by the LLMs using these approaches. …"
  6. 6

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education حسب Suha Assayed (22454038)

    منشور في 2025
    "…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …"
  7. 7
  8. 8
  9. 9

    Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…</li></ul><h2>Security and Best Practices</h2><p dir="ltr">By implementing <a href="https://xn--mxac.net/python-app-bundle-shield.html" target="_blank"><b>Python code security best practices</b></a>, including advanced cryptographic methods like <a href="https://xn--mxac.net/python-binary-optimization-compiler.html" target="_blank"><b>asymmetric encryption</b></a> and <a href="https://xn--mxac.net/python-binary-optimization-compiler.html" target="_blank"><b>symmetric encryption</b></a>, the Local Python Code Protector Script strives to keep code better protected during transmission and execution. …"
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…This tool provides <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">code obfuscation in Python</a> and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank">Python code encryption</a>, enabling developers to <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">protect Python code</a> effectively.…"
  15. 15

    Dialogue Propositional Content Replacement (DPCR) code حسب Jacopo Amidei (10511297)

    منشور في 2025
    "…<p dir="ltr">This resource consists of a Python notebook with code that was implemented for a research project that developed a novel method for testing the components of theories of (dialogue) coherence through utterance substitution. …"
  16. 16
  17. 17

    Online Resource 3: Word Cloud Dataset and Code حسب Jessica Zylla (17692920)

    منشور في 2025
    "…<p dir="ltr">Online Resource 3: Word Cloud Dataset and Code. This set of files are part of Online Resource 3, which allows readers to implement a Jupyter Notebook Python program to create a word cloud based on survey responses. …"
  18. 18
  19. 19

    Cross plots of different methods. حسب Xingan Fu (21594713)

    منشور في 2025
    "…This synergistic architecture not only preserves sequential correlations but also enhances cross-domain adaptability through adversarial feature alignment. …"
  20. 20