بدائل البحث:
practical application » practical applications (توسيع البحث)
يعرض 1 - 20 نتائج من 185 نتيجة بحث عن '(( python practical application ) OR ( ((python time) OR (python files)) implementation ))', وقت الاستعلام: 0.32s تنقيح النتائج
  1. 1

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…</li><li><b>Code Security Best Practices</b>: The tool enforces <b>Python code security best practices</b>, helping you adhere to industry standards for code protection.…"
  2. 2

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…Once the protected .pyc files are prepared, the script bundles them into a single .pyz archive.The script requires Python 3.6 or higher, and the following Python packages:</p><ul><li>requests</li><li>psutil</li><li>cryptography</li><li>astor</li></ul><p dir="ltr"><b>Recommendations and Best Practices</b></p><ul><li><b>Enhance Protection with Multiple Layers</b>: Apply the <b>Local Python Code Protector</b> multiple times to each .pyc file before bundling them. …"
  3. 3

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…</li></ul><p dir="ltr">By integrating the System Hardware ID Generator Script with these tools, developers can build robust applications that are both secure and optimized, adhering to the best practices in <a href="https://xn--mxac.net/" target="_blank">Python code security</a> and performance optimization.…"
  4. 4
  5. 5
  6. 6

    Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing حسب Pavel Izosimov (20096259)

    منشور في 2024
    "…</p><h2>Key Features</h2><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Code Obfuscation in Python</b></a>: Implements multi-level protection with dynamic encryption and obfuscation techniques, making it an effective <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Python obfuscator</b></a>.…"
  7. 7

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education حسب Suha Assayed (22454038)

    منشور في 2025
    "…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …"
  8. 8
  9. 9
  10. 10
  11. 11

    Comparison of performance between our next reaction implementation and the Python library from Ref. [3]. حسب Samuel Cure (22250922)

    منشور في 2025
    "…<p>We simulate SIR epidemic processes on Watts-Strogatz networks with parameters <i>k</i><sub>0</sub> = 5, <i>p</i> = 0.1 <b>(a)</b> and Barabási-Albert networks with parameter <i>m</i> = 5 <b>(b)</b> using the Python wrapper of our C++ implementation and compare its performance with the Python library from Ref. …"
  12. 12

    Real-Time Optical Imaging Acquisition and Processing in Python: A Practical Guide Using CAS: Code Repository حسب Michael Hughes (8821646)

    منشور في 2025
    "…This note provides guidelines for achieving high performance in Python for optical imaging applications, and introduces an open source framework 'CAS' for rapid protoyping of imaging system software. …"
  13. 13
  14. 14

    Five Operator Lattice Simulation حسب James McDaniel (22522571)

    منشور في 2025
    "…</p><p dir="ltr">Running the included file <code>five_operator_lattice_sim.py</code> (Python 3.14 + NumPy 2.1) reproduces the dynamic interactions and figures reported in Appendix A of the paper, generating time-series data that demonstrate operator balance, instability, and renewal cycles.…"
  15. 15

    HaPy-Bug – Human Annotated Python Bug Resolution Dataset حسب Piotr Przymus (14564009)

    منشور في 2025
    "…Additionally, we explore its potential applications in bug tracking, the analysis of bug-fixing practices, and the development of repository analysis tools. …"
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20