Search alternatives:
from implementations » prior implementations (Expand Search), slam implementations (Expand Search), pre implementation (Expand Search)
code implementing » consider implementing (Expand Search), after implementing (Expand Search), _ implementing (Expand Search)
method from » methods from (Expand Search), method first (Expand Search)
from implementations » prior implementations (Expand Search), slam implementations (Expand Search), pre implementation (Expand Search)
code implementing » consider implementing (Expand Search), after implementing (Expand Search), _ implementing (Expand Search)
method from » methods from (Expand Search), method first (Expand Search)
-
1
code implementing the finite element method and finite difference method from Hybrid PDE-ODE Models for Efficient Simulation of Infection Spread in Epidemiology
Published 2025“…This dataset contains code implementing the finite element method based on Kaskade 7 (C++) and code implementing the finite difference method (Python) for the development of hybrid PDE-ODE models aimed at efficiently simulating infection spread in epidemiology. …”
-
2
-
3
-
4
-
5
-
6
Python code that implements the Hoshen Kopleman algorithm used to identify the clusters shown in Figs 9 and 10.
Published 2023“…<p>Python code that implements the Hoshen Kopleman algorithm used to identify the clusters shown in Figs <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0285630#pone.0285630.g009" target="_blank">9</a> and <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0285630#pone.0285630.g010" target="_blank">10</a>.…”
-
7
Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management
Published 2024“…</p><h2>Key Features</h2><ul><li><b>Secure Code Sharing</b>: Utilize advanced <b>encryption</b> and <b>obfuscation</b> methods to <b>protect Python code</b> during transfer, enabling <b>secure code sharing</b> and <b>Python secure code transfer</b>.…”
-
8
-
9
Analysis of the selected studies in terms of tools used for implementing RNN models.
Published 2024Subjects: -
10
-
11
PCA-RF Python codes.txt
Published 2024“…<p dir="ltr">This text file is the PCA-RF model’s Python code. You can implement it in the Jupyter notebook.…”
-
12
-
13
SecurityGuidelinesRetrievalForPythonCodeGen
Published 2025“…Using Task-Specific Guidelines for Secure Python Code Generation: Replication Package"</p><p dir="ltr">This replication package contains SecGuide along with the results of each step followed in its creation, the scripts that implement all the prompting approaches and the code generated by the LLMs using these approaches. …”
-
14
Python implementation of the geometric minimum action method (gMAM)
Published 2021“…<p>The Python 3 script <code>gmam_demo.py</code> found in this repository implements the geometric minimum action method (gMAM) as presented in Heymann, M. and Vanden-Eijnden, E. (2008), "The geometric minimum action method: A least action principleon the space of curves." …”
-
15
-
16
Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education
Published 2025“…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
-
17
-
18
Simple implementation examples of agent AI on free energy calculation and phase-field simulation
Published 2025“…</p> <p>Using Gibbs energy calculations and diffusion simulations as examples, we demonstrated the implementation method and usefulness of simple agent AI, where sample python codes are distributed as supplemental materials.…”
-
19
-
20
Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing
Published 2024“…</li></ul><h2>Security and Best Practices</h2><p dir="ltr">By implementing <a href="https://xn--mxac.net/python-app-bundle-shield.html" target="_blank"><b>Python code security best practices</b></a>, including advanced cryptographic methods like <a href="https://xn--mxac.net/python-binary-optimization-compiler.html" target="_blank"><b>asymmetric encryption</b></a> and <a href="https://xn--mxac.net/python-binary-optimization-compiler.html" target="_blank"><b>symmetric encryption</b></a>, the Local Python Code Protector Script strives to keep code better protected during transmission and execution. …”