Showing 1 - 20 results of 666 for search '(( python code implementing ) OR ( ((python line) OR (python files)) represents ))', query time: 0.47s Refine Results
  1. 1

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool by Pavel Izosimov (20096259)

    Published 2024
    “…By implementing advanced security measures such as <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>end-to-end encryption</b></a>, <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>asymmetric encryption</b></a>, and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>symmetric encryption</b></a>, the platform strives to keep code better protected during transmission and execution.Explore other tools offered by Alpha Beta Network:</p><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Secure Python Code Manager</b></a>: A command-line tool for secure Python code sharing and protection using the Alpha Beta Network cloud platform.…”
  2. 2
  3. 3

    Python implementation of a wildfire propagation example using m:n-CAk over Z and R. by Pau Fonseca i Casas (9507338)

    Published 2025
    “…</p><p dir="ltr"><br></p><p dir="ltr">## Files in the Project</p><p dir="ltr"><br></p><p dir="ltr">### Python Scripts</p><p dir="ltr">- **Wildfire_on_m_n-CAk.py**: This file contains the main code for the fire cellular automaton. …”
  4. 4

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool by Pavel Izosimov (20096259)

    Published 2024
    “…This tool provides <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">code obfuscation in Python</a> and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank">Python code encryption</a>, enabling developers to <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">protect Python code</a> effectively.…”
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Python code and Excel data for machine learning integrated life cycle sustainability analysis of pyrolysis and hydrothermal carbonization of animal manure by Mohammed Tamim Zaki (17551557)

    Published 2023
    “…The sustainability analysis comprise of quantifying environmental performance via life cycle assessment (global warming potential), economic performance via techno-economic analysis (annual worth), and social performance via social impact assessment (system intrusiveness). The Excel file represents the input data for the Python code that include two resource recovery technologies: Pyrolysis and Hydrothermal Carbonization. …”
  10. 10
  11. 11

    Python code that implements the Hoshen Kopleman algorithm used to identify the clusters shown in Figs 9 and 10. by Leonardo Costa Ribeiro (10439243)

    Published 2023
    “…<p>Python code that implements the Hoshen Kopleman algorithm used to identify the clusters shown in Figs <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0285630#pone.0285630.g009" target="_blank">9</a> and <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0285630#pone.0285630.g010" target="_blank">10</a>.…”
  12. 12

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
  13. 13
  14. 14
  15. 15
  16. 16

    PCA-RF Python codes.txt by Junming Li (19324492)

    Published 2024
    “…<p dir="ltr">This text file is the PCA-RF model’s Python code. You can implement it in the Jupyter notebook.…”
  17. 17
  18. 18
  19. 19
  20. 20

    SecurityGuidelinesRetrievalForPythonCodeGen by Catherine Tony (18368913)

    Published 2025
    “…Using Task-Specific Guidelines for Secure Python Code Generation: Replication Package"</p><p dir="ltr">This replication package contains SecGuide along with the results of each step followed in its creation, the scripts that implement all the prompting approaches and the code generated by the LLMs using these approaches. …”