Skip to main content

ids_peak_ipl - A library for image manipulation

Project description

ids_peak_ipl provides python bindings for the IDS peak IPL. It exposes all the functionality of the peak IPL.

Benefit from many Python advantages, for example the interactive programming of your IDS camera. Write and test small code snippets without the complex setup of a programming IDE including a toolchain. This package is ideal for prototyping IDS camera applications for all supported peak IPL platforms (Windows, Linux, Linux Embedded).

Installation

$ pip install ids_peak_ipl

Quickstart

Creating a peak IPL image from width and height:

width = 16
height = 16
image_from_size = ids_peak_ipl.Image.CreateFromSize(
    ids_peak_ipl.PixelFormatName_Mono8, width, height)

Creating a peak IPL image from a IDS peak genericAPI buffer manually:

NOTE: Using the BufferToImage function provided by the peak IPL extension in the IDS peak genericAPI package is strongly recommended. To ensure correct functionality when using auto features, BufferToImage must be utilized.

image_from_size_and_buffer = ids_peak_ipl.Image.CreateFromSizeAndBuffer(
    buffer.PixelFormat(),
    buffer.BasePtr(),
    buffer.Size(),
    buffer.Width(),
    buffer.Height()
)

Creating a peak IPL image from a numpy array:

import numpy as np

numpy_array = np.array([[10, 20, 30]], dtype=np.uint8)
image_from_size_and_python_buffer = ids_peak_ipl.Image.CreateFromSizeAndPythonBuffer(
    img.PixelFormatName_RGB8, numpy_array, width, height)

Creating a peak IPL image from a python bytearray:

byte_array = bytearray([255, 10, 128])
image_from_size_and_python_buffer = ids_peak_ipl.Image.CreateFromSizeAndPythonBuffer(
    img.PixelFormatName_RGB8, byte_array, width, height)

Documentation

Documentation is available here

License

LICENSE TERMS

IDS SOFTWARE SUITE AND IDS peak

Preamble

IDS Imaging Development Systems GmbH ("Licensor") 
has developed an additional Software Suite ("Software")
for the purpose of operating and programming 
of all purchaseable cameras of the Licensor ("IDS cameras")
and integrating it in other products which use IDS 
cameras, from which the customer ("Licensee", Licensor 
and Licensee hereafter also referred to as a "Party" or 
the "Parties") intends to acquire certain rights of use. For 
this purpose, the Parties agree on the following License 
Terms. 

1. Licensed	Software

1.1. Licensor will license the Software as described on 
the Licensor's website at www.ids.imaging.com, its 
subdomains and at www.ids-imaging.us. The Software contains,
inter alia, executable programs, libraries and header file(s),
example source code for using the libraries,
and the respective documentation. 

1.2. The Software contains Open Source components, 
meaning components which are licensed under terms 
that fulfil the criteria of the Open Source Definition of 
the Open Source Initiative as of 2007 (the definition 
is available at https://opensource.org/osd). A list of 
such Open Source components and the respective 
applicable licenses is part of the Software and can 
be reviewed after the installation.

1.3. Software is not offered to consumers within the meaning
of section 13 of the German Civil Code (BGB). 


2. Rights of Use

2.1. As of the Effective Date as defined in clause 5 Licensor
grants to Licensee a non-exclusive, non-transferable
worldwide right to use, distribute, duplicate or 
reproduce and integrate part or all of the Software 
in his own products only if they operate with IDS cameras
and to distribute the Software in connection 
with such products Moreover Licensee shall have 
the right to 

2.1.1. Integrate or cause to be integrated the Software 
into Licensee's products only if they operate with 
IDS cameras and to duplicate or reproduce (or 
make duplicates or reproductions) and distribute 
these products to end users or third parties (in-
cluding retailers, e-tailers, wholesalers or Original 
Equipment Manufacturers, etc.). For the avoidance of doubt,
Licensee shall not be entitled to sublicense the Software
unless otherwise agreed in the following clause 2.1.2.

2.1.2. Licensee shall be entitled to sublicense the rights 
granted herein only to his subcontractors solely for 
work directly related to Licensee's products and 
updates. Other than that, Licensee shall not be 
entitled to sublicense the Software. 

2.2. The Parties agree that notwithstanding the above 
grant of rights of use, Licensor will continue to hold 
any and all intellectual property rights in the Software.

2.3. Licensee is not entitled to 2.3.1. sell, rent or lend die Software as a
stand-alone to others,

2.3.2. to edit, arrange, translate or decompile the Software, 

2.3.3. to use the Software with or integrate the Software 
into a camera that was or is not offered by the Licensor
or that is self-produced by the Licensee, 

2.3.4. to use Software or parts thereof to create an own 
comparable control software or to integrate the 
Software or parts thereof into own comparable 
control software,

2.3.5. to assign his rights and obligations resulting from 
these License terms to third parties without the 
prior written consent of Licensor, unless any of the 
above is explicitly allowed by statutory law. 

2.4. Any software, apart from the python interface and Open Source
software, is offered in object code only. Licensee is not entitled 
to access the source code.

3. Warranty

3.1. Licensor accepts warranty for the Software only as 
explicitly described in this clause 3. Any further warranty is excluded. 

3.2. Licensor is not aware of any patent infringements 
related to the Software and undertakes to inform 
Licensee without undue delay, should he be made 
aware of any such patent infringement, and in such 
case, to undertake reasonable measures to remedy 
such infringement. Other than that, Licensor does 
not assume any warranty with regard to third party 
patent rights. 

3.3. Licensor warrants that the Software are free from 
defects which cause the Software not to operate in 
accordance with the functionality as described on 
the product website at the Effective Date of these 
License Terms. Licensee undertakes to report any 
defects discovered to Licensor without undue delay. 

4. Download

4.1. The Software will be delivered by Licensor to the Licensee
via download from the Licensor's website.

4.2. Additionally the python interface can be obtained by the Licensee
from the public Python Package Index (PyPI; https://pypi.org/)

5. Effective Date, Term	and	Termination

5.1. These License Terms come into force upon successful download of
the Software not later than the commencement of use by the Licensee.

5.2. These License Terms are not limited in the term. 

5.3. The Licensor may, at its choice and without prejudice to
any other legal right or remedy that it might otherwise have,
terminate these License Terms for cause with immediate effect
by written notice to the Licensee upon the happening of any one
of the following events:

5.3.1. any failure by the Licensee to perform one or more 
of its obligations hereunder or any other breach 
hereof which shall not have been cured within sixty (60) days
after receipt of written notice specifying the nature
of such failure or breach;

5.3.2. the Licensee makes a general assignment for the 
benefit of creditors or becomes insolvent or enters 
into liquidation or files bankruptcy;

5.3.3. a receiver, trustee in bankruptcy or similar officer 
of all or substantially all of the property of the Licensee
is appointed and not removed within ninety (90) days.

5.4. Termination shall not excuse the parties from any 
obligations incurred hereunder prior to the date of termination. 

5.5. Termination of the License Terms for any reason will 
not affect the rights of any end user to use the Software
under any license granted in accordance with this License Terms. 

5.6. Furthermore, in the event of termination, products 
already manufactured or in the distribution chan-
nels may still be distributed and sold. This is not applicable
for Licensee's products offered to its customers via download
or any other non-physical form. Such products must not be distributed
and sold after the termination of these License Terms. For the 
avoidance of doubt: Apart from the regulations in 
this clause 5.5, no new products containing the Software may be produced
and the Software may not be used anymore by the Licensee. 

5.7. Within ten (10) business days from the termination 
of these License Terms, Licensee will delete or destroy
all versions of the Software. Upon Licensor's request,
Licensee must attest in writing that Software
has been deleted or destroyed.

6. Liability

6.1. Licensor's liability for intent, gross negligence and in 
the event of personal injury, bodily harm or damage 
to death, and if a claim according to the law on
product liability ("Produkthaftungsgesetz") is affected 
is subject to the respective applicable legal regulations.

6.2. Other than that, Licensor's liability and that of his 
agents, employees and bodies shall be excluded.

6.3. The Licensor is not liable for the loss of data and software.

6.4. The restrictions of liability in this clause 6 shall apply 
to Licensor himself and his agents, employees and bodies. 

7. Miscellaneous

7.1. These License Terms constitute the complete understanding
between the parties regarding the subject matter.
No oral or subsidiary agreements have been concluded
or entered into. All previous agreements between the Parties
with regard to the subject matter are replaced by these License Terms. 
Amendments, supplements and notices of termination of these
License Terms must be made in writing. 
The rescission of these License Terms or an alteration of
the requirement of the written form must also 
be made in writing. This requirement also applies to 
any changes of this provision.

7.2. If individual provisions of these License Terms are 
ineffective, then this shall not affect the effectiveness
of the remaining terms. However, the ineffective provision
shall be deemed to be replaced by an effective provision,
which is as close as possible to the commercially desired purpose
of the ineffective provision; the same shall apply in the case of a gap.

7.3. These License Terms are presented in two languages
(German and English). In case of discrepancies
or doubt with regard to their interpretation, the German version
shall prevail. 

7.4. The legal relations between the parties regarding 
the subject matter shall be governed and construed 
by the laws of the Federal Republic of Germany excluding
the UN law on the sale of goods (CISG) and 
German Private International Law.

7.5. In the event of any dispute or controversy arising 
out of these License Terms or any breach thereof, Licensor and Licensee
shall make a good faith effort to settle the dispute through negotiation.
If the dispute or controversy cannot be solved amicably,
place of jurisdiction for all disputes arising from or in connection
with the subject matter is Berlin. In addition, 
Licensor can bring an action against Licensee at the 
general place of jurisdiction of Licensee.

Last revised: June 21, 2023

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distributions

ids_peak_ipl-1.13.1.0.2-cp311-abi3-win_amd64.whl (6.6 MB view details)

Uploaded CPython 3.11+ Windows x86-64

ids_peak_ipl-1.13.1.0.2-cp311-abi3-win32.whl (5.4 MB view details)

Uploaded CPython 3.11+ Windows x86

ids_peak_ipl-1.13.1.0.2-cp311-abi3-manylinux_2_27_x86_64.whl (5.9 MB view details)

Uploaded CPython 3.11+ manylinux: glibc 2.27+ x86-64

ids_peak_ipl-1.13.1.0.2-cp311-abi3-manylinux_2_27_i686.whl (5.9 MB view details)

Uploaded CPython 3.11+ manylinux: glibc 2.27+ i686

ids_peak_ipl-1.13.1.0.2-cp311-abi3-manylinux_2_27_armv7l.whl (4.8 MB view details)

Uploaded CPython 3.11+ manylinux: glibc 2.27+ ARMv7l

ids_peak_ipl-1.13.1.0.2-cp311-abi3-manylinux_2_27_aarch64.whl (5.5 MB view details)

Uploaded CPython 3.11+ manylinux: glibc 2.27+ ARM64

ids_peak_ipl-1.13.1.0.2-cp310-cp310-win_amd64.whl (6.5 MB view details)

Uploaded CPython 3.10 Windows x86-64

ids_peak_ipl-1.13.1.0.2-cp310-cp310-win32.whl (5.4 MB view details)

Uploaded CPython 3.10 Windows x86

ids_peak_ipl-1.13.1.0.2-cp310-cp310-manylinux_2_27_x86_64.whl (5.9 MB view details)

Uploaded CPython 3.10 manylinux: glibc 2.27+ x86-64

ids_peak_ipl-1.13.1.0.2-cp310-cp310-manylinux_2_27_i686.whl (5.9 MB view details)

Uploaded CPython 3.10 manylinux: glibc 2.27+ i686

ids_peak_ipl-1.13.1.0.2-cp310-cp310-manylinux_2_27_armv7l.whl (4.8 MB view details)

Uploaded CPython 3.10 manylinux: glibc 2.27+ ARMv7l

ids_peak_ipl-1.13.1.0.2-cp310-cp310-manylinux_2_27_aarch64.whl (5.5 MB view details)

Uploaded CPython 3.10 manylinux: glibc 2.27+ ARM64

ids_peak_ipl-1.13.1.0.2-cp39-cp39-win_amd64.whl (6.5 MB view details)

Uploaded CPython 3.9 Windows x86-64

ids_peak_ipl-1.13.1.0.2-cp39-cp39-win32.whl (5.4 MB view details)

Uploaded CPython 3.9 Windows x86

ids_peak_ipl-1.13.1.0.2-cp39-cp39-manylinux_2_27_x86_64.whl (5.9 MB view details)

Uploaded CPython 3.9 manylinux: glibc 2.27+ x86-64

ids_peak_ipl-1.13.1.0.2-cp39-cp39-manylinux_2_27_i686.whl (5.9 MB view details)

Uploaded CPython 3.9 manylinux: glibc 2.27+ i686

ids_peak_ipl-1.13.1.0.2-cp39-cp39-manylinux_2_27_armv7l.whl (4.8 MB view details)

Uploaded CPython 3.9 manylinux: glibc 2.27+ ARMv7l

ids_peak_ipl-1.13.1.0.2-cp39-cp39-manylinux_2_27_aarch64.whl (5.5 MB view details)

Uploaded CPython 3.9 manylinux: glibc 2.27+ ARM64

ids_peak_ipl-1.13.1.0.2-cp38-cp38-win_amd64.whl (6.6 MB view details)

Uploaded CPython 3.8 Windows x86-64

ids_peak_ipl-1.13.1.0.2-cp38-cp38-win32.whl (5.4 MB view details)

Uploaded CPython 3.8 Windows x86

ids_peak_ipl-1.13.1.0.2-cp38-cp38-manylinux_2_27_x86_64.whl (5.9 MB view details)

Uploaded CPython 3.8 manylinux: glibc 2.27+ x86-64

ids_peak_ipl-1.13.1.0.2-cp38-cp38-manylinux_2_27_i686.whl (5.9 MB view details)

Uploaded CPython 3.8 manylinux: glibc 2.27+ i686

ids_peak_ipl-1.13.1.0.2-cp38-cp38-manylinux_2_27_armv7l.whl (4.8 MB view details)

Uploaded CPython 3.8 manylinux: glibc 2.27+ ARMv7l

ids_peak_ipl-1.13.1.0.2-cp38-cp38-manylinux_2_27_aarch64.whl (5.5 MB view details)

Uploaded CPython 3.8 manylinux: glibc 2.27+ ARM64

ids_peak_ipl-1.13.1.0.2-cp37-cp37m-win_amd64.whl (6.6 MB view details)

Uploaded CPython 3.7m Windows x86-64

ids_peak_ipl-1.13.1.0.2-cp37-cp37m-win32.whl (5.4 MB view details)

Uploaded CPython 3.7m Windows x86

ids_peak_ipl-1.13.1.0.2-cp37-cp37m-manylinux_2_27_x86_64.whl (5.9 MB view details)

Uploaded CPython 3.7m manylinux: glibc 2.27+ x86-64

ids_peak_ipl-1.13.1.0.2-cp37-cp37m-manylinux_2_27_i686.whl (5.9 MB view details)

Uploaded CPython 3.7m manylinux: glibc 2.27+ i686

ids_peak_ipl-1.13.1.0.2-cp37-cp37m-manylinux_2_27_armv7l.whl (4.8 MB view details)

Uploaded CPython 3.7m manylinux: glibc 2.27+ ARMv7l

ids_peak_ipl-1.13.1.0.2-cp37-cp37m-manylinux_2_27_aarch64.whl (5.5 MB view details)

Uploaded CPython 3.7m manylinux: glibc 2.27+ ARM64

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp311-abi3-win_amd64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp311-abi3-win_amd64.whl
Algorithm Hash digest
SHA256 b1300ae4167a03042272a54d1b711f1cf9b9a5851628c7f1dd446aafaf85a586
MD5 89c0493f1d2ed303788e156ecdb7c7be
BLAKE2b-256 62c63d3509614801c684776fb5aa7c4ed220bdd65d01a129a2e2131746cfb305

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp311-abi3-win32.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp311-abi3-win32.whl
Algorithm Hash digest
SHA256 4a7a7fa6319c8b1a7a97a011e8a96a6f816ed698ed318ac76cf2b9f024f16a28
MD5 df84057841246e2fc47bd5991ecce0c4
BLAKE2b-256 d5eab736a9e2bb8434ce1a00a836c828e8f847d16f1f0281252c164d821aa834

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp311-abi3-manylinux_2_27_x86_64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp311-abi3-manylinux_2_27_x86_64.whl
Algorithm Hash digest
SHA256 b07f4cb8e5e54fae918e5402dc7712b3da0bf9cebcb06c0c907ecd9d57f025e4
MD5 717265978e391643af9d73612e7c97b3
BLAKE2b-256 9245260c6cd567154c3b1ee116acbe65694a9333204868a0e75f8dc0e455adad

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp311-abi3-manylinux_2_27_i686.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp311-abi3-manylinux_2_27_i686.whl
Algorithm Hash digest
SHA256 304df6ac3bf2511a9ee79d4c491b134350be0f1d5a4e16dd07aa2fc06077d8af
MD5 a4fff701d34c1f55a1513ecf7aaf8b71
BLAKE2b-256 01935c38bdde5cfe3329a79f436406a8616eee68f2ff43d02f4b5e6f4a147677

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp311-abi3-manylinux_2_27_armv7l.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp311-abi3-manylinux_2_27_armv7l.whl
Algorithm Hash digest
SHA256 ae865fdb11f9dfcb174917af0983a04bcf1f0c7b80770cd22188c2f6a269aee5
MD5 b272f9d00db45e5362edbc1789b64f67
BLAKE2b-256 c0bac64d04b35fc13b7ebdce52d42520a7f68f7b70cc66320dfe79b741093798

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp311-abi3-manylinux_2_27_aarch64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp311-abi3-manylinux_2_27_aarch64.whl
Algorithm Hash digest
SHA256 897755897e64d6a536d8adada0a3b198c865d257153ff6accd930da04dcd0962
MD5 139b3a23f5032ebde4861eea625eb768
BLAKE2b-256 39935f6b9edb01d28a240f376d3ef0255a030b21b6b1dd996f8b4499d1ff9d6f

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp310-cp310-win_amd64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp310-cp310-win_amd64.whl
Algorithm Hash digest
SHA256 424770849bc0b7bdc06f351e2da2b3a030ab28b5c47bb81c31ae458a91f670fe
MD5 e34c38fbb8c84db1c201cee6f630f7a3
BLAKE2b-256 0cfeaa3c3ea3614e3aed7336a4254b80d826737b0b705e45322e1beccef491a8

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp310-cp310-win32.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp310-cp310-win32.whl
Algorithm Hash digest
SHA256 cee0a04706e20afb83eadd654b48ad2f3776fb6f7f6bb76cea6644ae21e91b8d
MD5 65566956443dcb7eedc616c3fa6216bd
BLAKE2b-256 a9a226ded4e3261e7e5c95429c25bbc1a9d3f39a52146edfea6e35798d8c4ce2

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp310-cp310-manylinux_2_27_x86_64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp310-cp310-manylinux_2_27_x86_64.whl
Algorithm Hash digest
SHA256 4dd94f51a36558a89fc174ba0efe567963f17388597a6cb9cbf04a2677d8c6f9
MD5 89de60a79cc5c77fa42d534a18f59a82
BLAKE2b-256 503c257421cef8b0841875c65dfb7bd87f8a450b9963f3b499bfe19748838d3c

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp310-cp310-manylinux_2_27_i686.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp310-cp310-manylinux_2_27_i686.whl
Algorithm Hash digest
SHA256 6268faf6b6f50f9347d8e6f55d362b03dea6c3b76d0dd65a88c879efb8f872ed
MD5 2982e3eddf4508da878e947b62779b8d
BLAKE2b-256 990f8ac1e90d23c0ae51c5b6249265a4290eaf96c77ba5a2c3773639dd59235b

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp310-cp310-manylinux_2_27_armv7l.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp310-cp310-manylinux_2_27_armv7l.whl
Algorithm Hash digest
SHA256 a3a9f1cd9421e371f8a14df68538c108fe8138a73003d898aaccc357fc04a683
MD5 dfb90ce5b8a27512bc6e3bdbc6de7708
BLAKE2b-256 22bbad577dd13a836636eaad6acac2c422bbbbc97b0d75335754a916df1a09cf

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp310-cp310-manylinux_2_27_aarch64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp310-cp310-manylinux_2_27_aarch64.whl
Algorithm Hash digest
SHA256 7213882384df00ae0b8108377d0d2f552c31ce4f912d85ac63e0ce3444879814
MD5 f8755ef8cbab03e623b9641282b3a938
BLAKE2b-256 a69f591961c02e976eed6658e90d3dabc6a36bc27265b95a37787f8815c0595c

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp39-cp39-win_amd64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp39-cp39-win_amd64.whl
Algorithm Hash digest
SHA256 368881a085002d35895d17c0963e10a8eab856a7fad88a6428bc082b92defbc7
MD5 ef3fd3cce5ff712e9c1c39cb3157ccc0
BLAKE2b-256 c98454799dd3792cd860e1d2a7b4f03beec045d9c970f6f602045b149e508bdc

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp39-cp39-win32.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp39-cp39-win32.whl
Algorithm Hash digest
SHA256 2b90de1509fa212271a5ee2352bb7f2035d63180a2e6e2614b6d8db2f5dc47a0
MD5 facb783a3490ddce45ef2529f817031c
BLAKE2b-256 708f7bd1264e6a5ff0d3c958a9f557c6d9066c11426d2644b5289679bc71c0b2

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp39-cp39-manylinux_2_27_x86_64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp39-cp39-manylinux_2_27_x86_64.whl
Algorithm Hash digest
SHA256 4b23ca0f97ea5703dd459267244eba436eef4c5c6b06c00b0ac48ff072799620
MD5 01394ac94062b6d43411b91e7d8e2d24
BLAKE2b-256 41b507b755a6fefc4ebe2afcc808ef44e3a7872a6a3fc8d41c8d4242d4920e07

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp39-cp39-manylinux_2_27_i686.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp39-cp39-manylinux_2_27_i686.whl
Algorithm Hash digest
SHA256 b42a7faed967091ed78c8bad5a72854daf74a57861fb70287355fd59ebde9bcc
MD5 0058d86063665990449272d994a6a27e
BLAKE2b-256 533c8c764107510f11ca7c2723fee97769b5fd57114607dd9ab0e5707f2d5c4f

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp39-cp39-manylinux_2_27_armv7l.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp39-cp39-manylinux_2_27_armv7l.whl
Algorithm Hash digest
SHA256 eedf39df3421f6bb5597a9629923cc6b7d41e1913e9ce08445cc01187e95be94
MD5 8920b925602b912515be07ad2af40acd
BLAKE2b-256 f33a1f2cd282ea2720fc749bfd135fcb1b9584d4969dd40406c5d2f6a59e6cf1

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp39-cp39-manylinux_2_27_aarch64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp39-cp39-manylinux_2_27_aarch64.whl
Algorithm Hash digest
SHA256 cab47fa7943d80c6b45e486204284583f88d4e36c0482db38e9164b351938e7f
MD5 16a16dab16b57b48a0d80f38c79a6f4c
BLAKE2b-256 eabe7e2f78e78f70e59219cd0be466dfedd9b6ba078e1e6407d854e9b899faed

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp38-cp38-win_amd64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp38-cp38-win_amd64.whl
Algorithm Hash digest
SHA256 b9b50a0b2e4d5eca9862e3b4f4741a12ea30c04cc9a99a3c9a16f325abd882d6
MD5 5252fd4f6d32b70febea4dcb1df4e7a5
BLAKE2b-256 cd5fed34126e089a683309a3981ab27283998030dfa466aae15acfaa102ec6ed

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp38-cp38-win32.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp38-cp38-win32.whl
Algorithm Hash digest
SHA256 c29be18e5dd096c32057c270441195d4d3d76bd8e4c75211f959c8d68197193d
MD5 9b382d23d8e3a41d22ff5e71141702db
BLAKE2b-256 fc9ab4ccf38ab4b7da0769655c87eefb03980ff05dd91a5bae11ea9867799b77

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp38-cp38-manylinux_2_27_x86_64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp38-cp38-manylinux_2_27_x86_64.whl
Algorithm Hash digest
SHA256 553bcfebb597a40b1fcbd76d49cbd33e817deca9a4e2cf06ca4f9643cf640484
MD5 7a01711eb23b65dabe8e90af151dfdc1
BLAKE2b-256 c720370532cde4aac4e43cceb39412db6bbeb990aa8ef1664551414f1b43c628

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp38-cp38-manylinux_2_27_i686.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp38-cp38-manylinux_2_27_i686.whl
Algorithm Hash digest
SHA256 85c865b8435c5caa3b684934b523e71927397b536eed5290a410521e79e4198f
MD5 822fd74ac5386f2f32944fab1425c54d
BLAKE2b-256 c036800b5dc1c26027fb814de57a2d516814d1069b86a84f45f360c38554e0d6

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp38-cp38-manylinux_2_27_armv7l.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp38-cp38-manylinux_2_27_armv7l.whl
Algorithm Hash digest
SHA256 812f1d3362dbc55c069aed2b6d41ec200d271c256f82cb6ea956176554ddef23
MD5 e2130af81f9e3d3f7f1baecf8115926c
BLAKE2b-256 c81bc647e843e1e0b5cfebc1278bf52ed2662e4c6d3729532323722e24e176b6

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp38-cp38-manylinux_2_27_aarch64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp38-cp38-manylinux_2_27_aarch64.whl
Algorithm Hash digest
SHA256 587c7ca6453cd643bf21cd072cb7b933082fb73f857867881160ab252c6f76b3
MD5 b16eae07a471d328639207ebe2d51712
BLAKE2b-256 3e366d2d3a959e69477700aeb88ef3a14ec77d7b4dcd3828b7fcb86b24b5026b

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp37-cp37m-win_amd64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp37-cp37m-win_amd64.whl
Algorithm Hash digest
SHA256 c814b08723044e30323b390b93164f48ae66c5067f786e0bc251370b45e369a9
MD5 314964294b98935c2ad8300815646912
BLAKE2b-256 f07c8ef9f3fee67efd5c1ff1ca1d851290a644fbbb28dffcdb3501165288945b

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp37-cp37m-win32.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp37-cp37m-win32.whl
Algorithm Hash digest
SHA256 0416f1925cdfaea0ef5af02e6be885fa03862e1f9e47a5027a57e6ce6d74a172
MD5 1958a903e83b897f3ea35c16c2479021
BLAKE2b-256 20c936c52a87a603be3f7fe8781f7e445014c5690de0aec52639408b54a450bd

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp37-cp37m-manylinux_2_27_x86_64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp37-cp37m-manylinux_2_27_x86_64.whl
Algorithm Hash digest
SHA256 2fabcd599eb65a31ae9e17ea495398408dd23611a0680eb7a4c63eb064e92d28
MD5 d5744ba04834c8163422f7e870b0cd3c
BLAKE2b-256 9698389c49a417313b58c7cbd4e867f6b723c5402d2bb76525e24e07af956ee9

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp37-cp37m-manylinux_2_27_i686.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp37-cp37m-manylinux_2_27_i686.whl
Algorithm Hash digest
SHA256 05507d6014be23dfc606841b11c7ee4e347c283a9e408d360e6abc3666d2ee51
MD5 26525406918f2b96b9f5b622809f3ce9
BLAKE2b-256 ace82bfd30d5b9dc1177ae67669edb58ebd621798d9f836355fa24d3c5bd51f8

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp37-cp37m-manylinux_2_27_armv7l.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp37-cp37m-manylinux_2_27_armv7l.whl
Algorithm Hash digest
SHA256 659f953ae75a669c08d8102f23e4be2b208c06741152a2b80077e3acb8548708
MD5 3107ec344b5e79cc26a0661c8aa1b4ff
BLAKE2b-256 007dd361a97bd301922b1ad3dc14df03a352c3f9b254345d8d463144f1ccc107

See more details on using hashes here.

File details

Details for the file ids_peak_ipl-1.13.1.0.2-cp37-cp37m-manylinux_2_27_aarch64.whl.

File metadata

File hashes

Hashes for ids_peak_ipl-1.13.1.0.2-cp37-cp37m-manylinux_2_27_aarch64.whl
Algorithm Hash digest
SHA256 a78f5b703a0ad9c6992ce43fae64b5eb42509afcf37c53a2d48352cea687ee2e
MD5 8fb64a0104879fee105e5c6138c5c81e
BLAKE2b-256 f842404b864aaccb2ad72fe4e4bc2892394df2699c6bb04ce8ff74bf29e2331d

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page