Search
New Code
VB.Net PDF 4.4.7
SuiteCRM Survey Rocket Plugin 1.0
Airbnb Clone Script | Airbnb Clone 4.3.1
IP2Location Geolocation Database 2018
ODBC Driver for Salesforce 1.5
Rapid PHP 2018 15.0
Bytescout BarCode Generator SDK 4.70.0.981
Data Puppy Lite (32-bit) 1.0
ProZ clone script 1.0.3
VideoCap Live Streaming SDK ActiveX 8.5
Magento Web to Print 1.0
dbForge Data Compare for MySQL 5.4
dbForge Query Builder for MySQL 4.3
ODBC Driver for NetSuite 1.2
Rapid CSS 2018 15.0
Top Code
Output Messenger 1.8.0
Aliexpress Clone- Ec21 Script 1
Indiegogo Clone 3.0
Online Food Ordeing System 1.0
PHP Image Resize Script 1.0
Best Spotify Clone 1.0
Get Random Record Based on Weight 1.0.0
Travel Portal Script 9.29
Magento Product Designer 1.0
OFOS - Just Eat Clone Script 1.0
PrestaShop Upload Images Module 1.2.1
Trading Software 1.2.4
Deals and Discounts Website Script 1.0.2
ADO.NET Provider for ExactTarget 1.0
Solid File System OS edition 5.1
Code Listing by Alexander James Wallar

Code 1-10 of 15   Pages: Go to  1  2  Next >>  page  






This program interactively lets you encrypt and decrypt text as well as text files using a key system as well as a cipher.



This algorithm factors a polynomial but will only factor it by giving the rational roots. For instance if one of the roots in the polynomial was irrational, the polynomial would not be factored correctly.



This module/function lets you find a 2 dimensional list of indices for elements you are looking for in a super list.
Example:

find([1,1,1,2,1,2,3,3],[1,2,3])

returns: [[0, 1, 2, 4], [3, 5], [6, 7]]



This recipe generates a pseudo-random password of a prescribed length. It also lets you specify what characters are not permitted in the password or specify what characters are.



This recipe returns a list of size n such that the contents of the returned list are random 0s and 1s. It returns a random binary list of size n.



This is an evolutionary algorithm that returns a random list of prime numbers. This code is highly inefficient for a reason. This algorithm is more of a proof of concept that if a prime was a heritable trait, it would not be a desired one.



This algorithm searches for more than one element in a list. The input is a list that you want to search through and a list of elements that you want to search for. The output is a multidimensional list with the positions of the elements you are...



This algorithm converts a base c number into a base b number. Parameters c and b are arbitrary are not constrained by any bounds. The input n is a list and the output is a list.



This is a simple code that lets a user control the mouse and left-click using the Microsoft Kinect, Python, and OpenKinect.

Computer Prerequisites:
-OpenKinect
-Python Wrapper for OpenKinect
-A Linux machine using...



This demo requires you to be using a Linux machine and to have libfreenect installed with the python wrapper. This demo also requires you to have opencv, numpy, and pygame. They can all be installed using sudo apt-get install {PROGRAM NAME HERE}....