benjaminsuarez's Stars
org-roam/org-roam
Rudimentary Roam replica with Org-mode
justmarkham/scikit-learn-videos
Jupyter notebooks from the scikit-learn video series
jceb/vim-orgmode
Text outlining and task management for Vim based on Emacs' Org-Mode
gsamokovarov/jump
Jump helps you navigate faster by learning your habits. ✌️
pyroscope/rtorrent-ps
:art: Extended rTorrent distribution with a fully customizable canvas and colors, other feature additions, and complete docs.
EarnForex/PositionSizer
Calculate your position size based on the risk and account size and execute your trades with this free MetaTrader expert advisor.
adi1090x/battery-wallpaper
Simple bash script to set wallpaper according to battery percentage with charging animations.
zurutech/gans-from-theory-to-production
Material for the tutorial: "Deep Diving into GANs: from theory to production"
braverock/blotter
blotter provides transaction infrastructure for defining transactions, portfolios and accounts for trading systems and simulation. Provides portfolio support for multi-asset class and multi-currency portfolios. Actively maintained and developed.
juacq97/dotfilesOlds
Un respaldo de mis dotfiles más importantes en mi laptop
nmapx/revolut-stocks-list
Extract Revolut stocks list from the list screenshot(s).
xymor/awesome-starbase
cavedave/datacleanup
Python Notebook for a workshop at Convercon Ireland 2019. The title is How to Curate and NLP Dataset and is about a process to find errors in a dataset to improve training.
benparsons/matrix-nio-python-workshop
jaydenmedia/Pycon2019
Scripts available for the workshops at Pycon Dublin 2019.
easchaw/Intrusion-Detection-System-
Cyber-security is concerned with protecting information, a vital asset in today’s world. The volume of data that is generated and can be usefully analysed is such that cyber-security can only be effectively implemented with the aid of software support. Data must be analysed by software tools providing support for security analysts. Often event data generated by computer systems is sequential, that is, not only are the type of the events relevant, but the sequence in which events occur is also relevant. Examples of this include many log files and system call or software library call sequences. This research aims to provide the basis to build an Anomaly Detection based Host Intrusion Detection System (HIDS) that makes decisions based on sequential traces of operating system calls.
broadinstitute/GeLiNEA
Gene-List Network Enrichment Analysis
andreafagan/pyconie2018_django_tut
repo containing full blog project from tutorial
cran/pathfindR
:exclamation: This is a read-only mirror of the CRAN R package repository. pathfindR — Enrichment Analysis Utilizing Active Subnetworks. Homepage: https://egeulgen.github.io/pathfindR/, https://github.com/egeulgen/pathfindR Report bugs for this package: https://github.com/egeulgen/pathfindR/issues
sdadia/docker-basics-workshop