Search alternatives:
code implementing » consider implementing (Expand Search), after implementing (Expand Search), _ implementing (Expand Search)
tool representing » model representing (Expand Search), plot representing (Expand Search), thus representing (Expand Search)
code implementing » consider implementing (Expand Search), after implementing (Expand Search), _ implementing (Expand Search)
tool representing » model representing (Expand Search), plot representing (Expand Search), thus representing (Expand Search)
-
1
Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool
Published 2024“…This tool represents a significant advancement in the realm of <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>secure code sharing</b></a>, providing a robust solution for modern Python programming challenges.…”
-
2
System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool
Published 2024“…</p><ul><li>For advanced <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">Python code protection tools</a>, consider using the <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">Local Python Code Protector Script</a>. …”
-
3
-
4
-
5
-
6
-
7
-
8
Python code that implements the Hoshen Kopleman algorithm used to identify the clusters shown in Figs 9 and 10.
Published 2023“…<p>Python code that implements the Hoshen Kopleman algorithm used to identify the clusters shown in Figs <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0285630#pone.0285630.g009" target="_blank">9</a> and <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0285630#pone.0285630.g010" target="_blank">10</a>.…”
-
9
Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management
Published 2024“…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
-
10
Analysis of the selected studies in terms of tools used for implementing RNN models.
Published 2024Subjects: -
11
-
12
PCA-RF Python codes.txt
Published 2024“…<p dir="ltr">This text file is the PCA-RF model’s Python code. You can implement it in the Jupyter notebook.…”
-
13
SecurityGuidelinesRetrievalForPythonCodeGen
Published 2025“…Using Task-Specific Guidelines for Secure Python Code Generation: Replication Package"</p><p dir="ltr">This replication package contains SecGuide along with the results of each step followed in its creation, the scripts that implement all the prompting approaches and the code generated by the LLMs using these approaches. …”
-
14
Python implementation of the geometric minimum action method (gMAM)
Published 2021“…<p>The Python 3 script <code>gmam_demo.py</code> found in this repository implements the geometric minimum action method (gMAM) as presented in Heymann, M. and Vanden-Eijnden, E. (2008), "The geometric minimum action method: A least action principleon the space of curves." …”
-
15
Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education
Published 2025“…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
-
16
-
17
-
18
Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing
Published 2024“…</p><h2>Key Features</h2><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Code Obfuscation in Python</b></a>: Implements multi-level protection with dynamic encryption and obfuscation techniques, making it an effective <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Python obfuscator</b></a>.…”
-
19
-
20