This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
-- This is a starter contract, based on the Game contract, | |
-- containing the bare minimum required scaffolding. | |
-- | |
-- What you should change to something more suitable for | |
-- your use case: | |
-- * The MyDatum type | |
-- * The MyMyRedeemerValue type | |
-- | |
-- And add function implementations (and rename them to | |
-- something suitable) for the endpoints: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
""" | |
Genetic Algorithm Implementation | |
This script is an implementation of a simple genetic algorithm (GA), inspired by the principles | |
of biological evolution. The concepts outlined in Daniel Shiffman's book "Nature of Code" have | |
been followed to create this. The main concepts involved are: | |
1. Initialization: Start with a population of individuals, each of which is a potential solution. | |
2. Fitness Function: Each individual is evaluated using a fitness function. | |
3. Selection: The individuals with higher fitness are more likely to be selected for reproduction. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
""" | |
Digital Identity Verification | |
This script is an implementation of a digital identity in a self-sovereign identity system. | |
Self-sovereign identity refers to digital identities that are owned and controlled by the identity | |
holder themselves, rather than a centralized authority. The main concepts involved are: | |
1. Identity Creation: An identity is represented by a public-private key pair. The private key is kept | |
secret by the identity owner, while the public key is made public for others to use in verifying | |
the identity's claims. |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.