Showing 1 - 20 results of 75 for search '(( python tool implementing ) OR ( python consider implementing ))', query time: 0.23s Refine Results
  1. 1

    System Hardware ID Generator Script: A Cross-Platform Hardware Identification Tool by Pavel Izosimov (20096259)

    Published 2024
    “…</p><ul><li>For advanced <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">Python code protection tools</a>, consider using the <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank">Local Python Code Protector Script</a>. …”
  2. 2
  3. 3

    Secure Python Code Manager: A Tool for Protected Python Code Distribution and Management by Pavel Izosimov (20096259)

    Published 2024
    “…</li><li><b>Commercial Distribution</b>: Safely share Python code with clients or customers, implementing advanced <b>Python code protection tools</b> for sales or rentals.…”
  4. 4
  5. 5

    Python Implementation of HSGAdviser Chatbot: AI model for Sustainable Education by Suha Assayed (22454038)

    Published 2025
    “…<p dir="ltr">This repository contains the Python source code and model implementation for HSGAdviser, an AI speech assistant designed to provide personalized college and career guidance for high school students through conversational AI. …”
  6. 6

    Multi-Version PYZ Builder Script: A Universal Python Module Creation Tool by Pavel Izosimov (20096259)

    Published 2024
    “…By implementing advanced security measures such as <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>end-to-end encryption</b></a>, <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>asymmetric encryption</b></a>, and <a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>symmetric encryption</b></a>, the platform strives to keep code better protected during transmission and execution.Explore other tools offered by Alpha Beta Network:</p><ul><li><a href="https://xn--mxac.net/secure-python-code-manager.html" target="_blank"><b>Secure Python Code Manager</b></a>: A command-line tool for secure Python code sharing and protection using the Alpha Beta Network cloud platform.…”
  7. 7

    Local Python Code Protector Script: A Tool for Source Code Protection and Secure Code Sharing by Pavel Izosimov (20096259)

    Published 2024
    “…<p dir="ltr">Local Python Code Protector Script: Advanced Tool for Python Code Protection and Secure Sharing</p><h2>Introduction</h2><p dir="ltr">The <b>Local Python Code Protector Script</b> is a powerful command-line tool designed to provide <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank"><b>source code protection</b></a> and <a href="https://xn--mxac.net/local-python-code-protector.html" target="_blank"><b>secure code sharing</b></a> for Python scripts. …”
  8. 8
  9. 9

    Comparison of BlueRecording with existing tools by Joseph James Tharayil (21416715)

    Published 2025
    “…To enable efficient calculation of extracellular signals from large neural network simulations, we have developed <i>BlueRecording</i>, a pipeline consisting of standalone Python code, along with extensions to the Neurodamus simulation control application, the CoreNEURON computation engine, and the SONATA data format, to permit online calculation of such signals. …”
  10. 10

    Cost functions implemented in Neuroptimus. by Máté Mohácsi (20469514)

    Published 2024
    “…To address these issues, we developed a generic platform (called Neuroptimus) that allows users to set up neural parameter optimization tasks via a graphical interface, and to solve these tasks using a wide selection of state-of-the-art parameter search methods implemented by five different Python packages. Neuroptimus also offers several features to support more advanced usage, including the ability to run most algorithms in parallel, which allows it to take advantage of high-performance computing architectures. …”
  11. 11

    Exploring the integration of metaverse technologies in engineering education through the SAMR model by Snezhana Dineva (22444471)

    Published 2025
    “…The metaverse is presented as a tool to improve the learning process and to promote innovative educational approaches. …”
  12. 12
  13. 13
  14. 14

    Memory monitoring recognition test workflow. by Pedro C. Martínez-Suárez (21192459)

    Published 2025
    “…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
  15. 15

    Voice recognition workflow. by Pedro C. Martínez-Suárez (21192459)

    Published 2025
    “…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
  16. 16

    Memory monitoring recognition test main screen. by Pedro C. Martínez-Suárez (21192459)

    Published 2025
    “…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
  17. 17

    Task descriptions. by Pedro C. Martínez-Suárez (21192459)

    Published 2025
    “…</p><p>Method</p><p>The MMRT was developed using Python and Kivy, facilitating the creation of cross-platform user interfaces. …”
  18. 18

    Simple implementation examples of agent AI on free energy calculation and phase-field simulation by Toshiyuki Koyama (22828581)

    Published 2025
    “…</p> <p>Using Gibbs energy calculations and diffusion simulations as examples, we demonstrated the implementation method and usefulness of simple agent AI, where sample python codes are distributed as supplemental materials.…”
  19. 19

    A comparison between the static Python-based visualizations of the p65 activity in activated fibroblasts and the dynamic, HTML-based visualizations that use these same reduction me... by Hector Torres (11708207)

    Published 2025
    “…<p><b>(a)</b> UMAP, t-SNE, PCA, and Diffmap were first generated using the Python libraries Scikit-learn, UMAP, and PyDiffmap within Jupyter to generate static graphs as a starting point. …”
  20. 20

    Design and Implementation of a Browser-Based Toolfor Protecting Gaming Assets from UnauthorizedAccess by Alim Imashev (22606007)

    Published 2025
    “…<p dir="ltr">The project <b>“Design and Implementation of a Browser-Based Tool for Protecting Gaming Assets from Unauthorized Access”</b> focuses on developing a security-oriented software solution that safeguards digital game assets within browser environments.…”