Showing 1 - 20 results of 493 for search '(( python consider implementing ) OR ( python ((code implementing) OR (modular implementation)) ))', query time: 0.45s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool by Pavel Izosimov (20096259)

    Published 2024
    “…</li></ul><h2>Integration with Other Tools</h2><p dir="ltr">The System Hardware ID Generator Script is part of the broader suite of tools offered by the <a href="https://xn--mxac.net/" target="_blank">Alpha Beta Network</a>, dedicated to enhancing security and performance in <a href="https://xn--mxac.net/" target="_blank">Python programming</a>.</p><ul><li>For advanced <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">Python code protection tools</a>, consider using the <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">Local Python Code Protector Script</a>. …”
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Python code that implements the Hoshen Kopleman algorithm used to identify the clusters shown in Figs 9 and 10. by Leonardo Costa Ribeiro (10439243)

    Published 2023
    “…<p>Python code that implements the Hoshen Kopleman algorithm used to identify the clusters shown in Figs <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0285630#pone.0285630.g009" target="_blank">9</a> and <a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0285630#pone.0285630.g010" target="_blank">10</a>.…”
  14. 14

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
  15. 15
  16. 16
  17. 17
  18. 18

    PCA-RF Python codes.txt by Junming Li (19324492)

    Published 2024
    “…<p dir="ltr">This text file is the PCA-RF model’s Python code. You can implement it in the Jupyter notebook.…”
  19. 19

    SecurityGuidelinesRetrievalForPythonCodeGen by Catherine Tony (18368913)

    Published 2025
    “…Using Task-Specific Guidelines for Secure Python Code Generation: Replication Package"</p><p dir="ltr">This replication package contains SecGuide along with the results of each step followed in its creation, the scripts that implement all the prompting approaches and the code generated by the LLMs using these approaches. …”
  20. 20

    Python implementation of the geometric minimum action method (gMAM) by Pascal Wang (10130612)

    Published 2021
    “…<p>The Python 3 script <code>gmam_demo.py</code> found in this repository implements the geometric minimum action method (gMAM) as presented in Heymann, M. and Vanden-Eijnden, E. (2008), "The geometric minimum action method: A least action principleon the space of curves." …”