Showing 1 - 20 results of 186 for search '(( python new implementation ) OR ( python from implementing ))', query time: 0.39s Refine Results
  1. 1
  2. 2

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…A license key is generated, allowing authorized users to access the code.bash<pre><pre>python secure_python_code_manager.py --upload -f your_script.py<br></pre></pre></li><li><b>Updating Previously Uploaded Code</b>: With the <code>--update</code> function, update your code in the cloud without needing to redistribute new files to clients, ensuring seamless code maintenance and updates.bash<pre><pre>python secure_python_code_manager.py --update -f your_script.py -l your_license_key<br></pre></pre></li><li><b>Retrieving License Information</b>: The <code>--license-info</code> function lets you retrieve detailed information about your licenses, including status, usage data, and limits.bash<pre><pre>python secure_python_code_manager.py --license-info -l your_license_key<br></pre></pre></li><li><b>Service Usage Monitoring</b>: Use the <code>--service-usage</code> function to monitor your service usage, including uploaded scripts and associated licenses, helping you keep track of your code deployment.bash<pre><pre>python secure_python_code_manager.py --service-usage<br></pre></pre></li></ol><h2>Use Cases</h2><ul><li><b>Protect Python Code</b>: If you're looking to <b>protect Python code</b> from unauthorized use, this tool provides robust protection mechanisms.…”
  3. 3

    Comparison of performance between our next reaction implementation and the Python library from Ref. [3]. by Samuel Cure (22250922)

    Published 2025
    “…<p>We simulate SIR epidemic processes on Watts-Strogatz networks with parameters <i>k</i><sub>0</sub> = 5, <i>p</i> = 0.1 <b>(a)</b> and Barabási-Albert networks with parameter <i>m</i> = 5 <b>(b)</b> using the Python wrapper of our C++ implementation and compare its performance with the Python library from Ref. …”
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Example change statistic implementations. by Alex Stivala (8356257)

    Published 2024
    “…ALAAMEE implements both the stochastic approximation and equilibrium expectation (EE) algorithms for ALAAM parameter estimation, including estimation from snowball sampled network data. …”
  9. 9

    Simple implementation examples of agent AI on free energy calculation and phase-field simulation by Toshiyuki Koyama (22828581)

    Published 2025
    “…The key points are summarized as follows. (1) Using Gibbs energy calculations as an example, we demonstrated a simple method for constructing agent AI, including explanation and distribution of the python code. (2) We applied this method to a scratch code development of phase-field simulation, and the template python code was also distributed. (3) Using the simple agent AI technique, we were able to easily verify that the Jarzynski equality is applicable for the diffusion behavior in diffusion couple, which provides a new approach for directly evaluating free energy change from diffusion flux information.…”
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Graphical abstract of HCAP. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  16. 16

    Recall analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  17. 17

    Convergence rate analysis. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  18. 18

    Computational efficiency. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  19. 19

    Analysis of IoMT data sources. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”
  20. 20

    Prediction accuracy on varying attack types. by Mohanad Faeq Ali (21354273)

    Published 2025
    “…The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. …”