G-Research-Crypto-Competition - Project for passing the ML exam. Dataset took from the competition on the kaggle

Overview

G-Research-Crypto-Competition

Project for passing the ML exam. Dataset took from the competition on the kaggle https://www.kaggle.com/c/g-research-crypto-forecasting

In this repository you can find an example of using SnakeMake to solve ML tasks.

The workflow automation system Snakemake is a tool for creating reproducible and scalable pipelines. Pipelines are described using a human-readable Python-based language. They can be easily scaled for server, cluster, network and cloud environments without having to change the workflow definition. Finally, Snakemake workflows can include a description of the necessary software that will be automatically deployed in any runtime environment.

Getting Started:

  • Create virtual environment for development:
$ conda env create -f devenv.yaml
  • Activate virtual environment:
$ conda activate G-Research-Crypto-Competition
  • Start snakemake pipelines with 8 cores:
$ snakemake --cores 8

Project Organization

├── README.rst         <- The top-level readme for developers.
│
├── data
│   ├── external       <- Data from third party sources.
│   ├── interim        <- Intermediate data that has been transformed.
│   ├── processed      <- The final, canonical data sets for modeling.
│   └── raw            <- The original, immutable data dump.
│
├── docs               <- Technical documentation.
│
├── models             <- Trained and serialized models, model predictions,
│                         or model summaries.
│
├── notebooks          <- Jupyter notebooks. Naming convention is a number
│                         (for ordering), the creator's initials, and a
│                         short `-` delimited description, e.g.
│                         `001-jqp-initial-data-exploration`.
│
├── references         <- Data dictionaries, manuals, and all other
│                         explanatory materials.
│
├── reports            <- Generated analysis as HTML, PDF, LaTeX, etc.
│   └── figures        <- Generated graphics and figures to be used in
│                         reporting.
│
├── devenv.yaml        <- The environment file for reproducing the analysis
│                         environment, e.g. generated with
│                         `conda env export --from-history > devenv.yaml`
│
├── src                <- Source code for use in this project.
│   ├── __init__.py    <- Makes src a Python package.
│   │
│   ├── data           <- Scripts to download or generate data.
│   │
│   ├── features       <- Scripts to turn raw data into features for
│   │                     modeling.
│   │
│   ├── models         <- Scripts to train models and then use trained
│   │                     models to make predictions.
│   │
│   └── reports        <- Scripts to create exploratory reports and results
│                         oriented visualizations.
│
├── workflow           <- Snakemake workflow storage.
│   ├── envs           <- Conda environments for snakemake rules.
│   │   └── default.yaml
│   │
│   ├── rules          <- Rules as modules.
│   │   └── clean.smk
│   │
│   ├── scripts        <- Support functions for using in snakemake workflow.
│   │
│   ├── config.yaml    <- Parameters for workflow in yaml format.
│   │
│   └── Snakefile      <- Entrypoint of the workflow (it will be
│                         automatically discovered when running snakemake
│                         from the root of above structure).
│
└── .env.example       <- Example of file for environment variables, like
                          MinIO access or Postgresql credentials. It is
                          necessary to create an `.env` file based on it.
I coded the sha256 algorithm into python without using any modules.

sha256.py I coded the sha256 algorithm in python without using any modules. The purpose of the code was to better understand the algorithm and learn h

4 Dec 12, 2022
Random Password Generator With Python

Random_Password_Generator example output length

Mahdi Rostami Pooya 2 Dec 22, 2021
Generate a 2FA Code out of an 2FA Secret(Time-based only!)

2FA-Generator Generate a 2FA Code out of an 2FA Secret(Time-based only!) ❗ Pleas don't share this secrets/generated codes with someone. If someone kno

TheDanniCraft 1 Nov 05, 2021
Python binding to the Networking and Cryptography (NaCl) library

PyNaCl: Python binding to the libsodium library PyNaCl is a Python binding to libsodium, which is a fork of the Networking and Cryptography library. T

Python Cryptographic Authority 941 Jan 04, 2023
Pool funds to bootstrap a Uniswap pair

Seed liquidity A contract to pool funds which are then used to boostrap a new Uniswap liquidity pair. Specification A new SeedLiquidity contract is de

66 Dec 09, 2022
Hide secret texts inside an image, optionally encrypt them with a password using AES-256.

Hide secret texts/messages inside an image. You can optionally encrypt your texts with a password using AES-256 before encoding into the image.

Teja Swaroop 97 Dec 29, 2022
Given a string or a text file with plain text , returns his encryption using SHA256 method

Encryption using SHA256 Given a string or a .txt file with plain text. Returns his encryption using SHA256 method Requirements : pip install pyperclip

yuno 3 Jan 24, 2022
Bot to trade crypto trading ranges

crypto-trading-bot Crypto bot with DCA or GRID trading strategy Sends notifictions to telegram chat Crypto bot with webhook feature which can be used

3 Jun 18, 2021
Bsvlib - Bitcoin SV (BSV) Python Library

bsvlib A Bitcoin SV (BSV) Python Library that is extremely simple to use but mor

Aaron 22 Dec 15, 2022
CertPy is a high level toolkit for generating x509 (e.g. SSL/TLS/HTTPS) certificates in Python.

CertPy CertPy is a high level toolkit for generating x509 (e.g. SSL/TLS/HTTPS) certificates in Python. Certificate “profiles” are implemented as Pytho

Ryan Castellucci 4 Feb 21, 2022
A simple python program to sign text using either the RSA or ISRSAC algorithm with GUI built using tkinter library.

Digital Signatures using ISRSAC Algorithm A simple python program to sign text using either the RSA or ISRSAC algorithm with GUI built using tkinter l

Vasu Mandhanya 3 Nov 15, 2022
Blockchain with crypto transaction feature

python script that asks users for their name, who they are sending J2 coin too(fictional cryptocurrency) and how much they're sending. it then prints the transaction detail in words and prints the ha

Joshua Stojkovic 2 Jan 10, 2022
Bridge between L1 (Ethereum) and L2 (cheapETH)

The ETH chain and the cheapETH chain. We can assume the ETH chain has ~1000x more value than the cheapETH chain.

107 Oct 12, 2022
Python ASN.1 library with a focus on performance and a pythonic API

asn1crypto A fast, pure Python library for parsing and serializing ASN.1 structures. Features Why Another Python ASN.1 Library? Related Crypto Librari

Will Bond 282 Dec 11, 2022
A bot written in Python to automatically buy tokens on the Binance Smart Chain as soon as liquidity is provided

A bot written in Python to automatically buy tokens on the Binance Smart Chain as soon as liquidity is provided. If you’ve found this bot useful and have profited from it please consider donating any

473 Dec 25, 2022
Persian caesar and rot16 encryptor and decryptor

persian caesar and rot16 encrypt and decrypt how to install if you use windows python -m venv .venv .\.venv\Script\activate python -m pip install -r r

Mehdi Radfar 5 Oct 28, 2022
A web app to scan crypto markets based on candlestick pattern recognition from

Crypto_Scanner A web app to scan crypto markets based on candlestick pattern recognition from "Japanese Candlestick Charting Techniques: A Contemporar

Chris Qi 27 Jan 01, 2023
G-Research-Crypto-Competition - Project for passing the ML exam. Dataset took from the competition on the kaggle

G-Research-Crypto-Competition Project for passing the ML exam. Dataset took from

5 Jan 09, 2022
Linear encryption software programmed with python

Echoder linear encryption software programmed with python How does it work? The text in the text section runs a function with two keys entered keys mu

Emre Orhan 4 Dec 20, 2021
Secure open-source password manager.

aes256_passwd_store This script securely encrypts or decrypts passwords on disk within a custom database file. It also features functionality to retri

14 Nov 15, 2022