Showing 2779 open source projects for "algorithm"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    LaMa

    LaMa

    LaMa - A Localization and Mapping library

    LaMa is a C++11 software library for robotic localization and mapping developed at the Intelligent Robotics and Systems (IRIS) Laboratory at the University of Aveiro - Portugal. It includes a framework for 3D volumetric grids (for mapping), a localization algorithm based on scan matching, and two SLAM solutions (an Online SLAM and a Particle Filter SLAM). The main feature is efficiency. Low computational effort and low memory usage whenever possible. The minimum viable computer to run our...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Jadecy

    Java lib to compute (code) deps, SCCs, and cycles (Johnson algorithm).

    Jadecy (Java Dependencies and Cycles) is a Java library to compute dependencies (elements depended on, or depending), strongly connected components, and cycles, in general directed graphs, or classes or packages dependencies graphs parsed from class files (major version <= 52, else does best effort). It uses Tarjan's algorithm for SCCs computation, and Johnson's algorithm for exhaustive cycles computation, with continuations instead of recursion, which allows to handle large graphs (< 2^31...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Auto-PyTorch

    Auto-PyTorch

    Automatic architecture search and hyperparameter optimization

    While early AutoML frameworks focused on optimizing traditional ML pipelines and their hyperparameters, another trend in AutoML is to focus on neural architecture search. To bring the best of these two worlds together, we developed Auto-PyTorch, which jointly and robustly optimizes the network architecture and the training hyperparameters to enable fully automated deep learning (AutoDL). Auto-PyTorch is mainly developed to support tabular data (classification, regression) and time series...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    OpenSSL for Windows

    OpenSSL for Windows

    OpenSSL Portable for Windows 32-bit and Android

    OpenSSL is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library. GOST Engine: GOST 28147-89 - 64-bit block cipher with 256-bit key. GOST R 34.11-94 - Message digest algorithm. 256-bit hash value. GOST R 34.10-2001 - Digital signature algorithm. GOST R 34.10-2012 - Digital signature algorithm. GOST R 34.11-2012 - "Streebog" hash function 256 and 512-bit...
    Leader badge
    Downloads: 1,602 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    blackjack-warrior

    blackjack-warrior

    Blackjack Warrior - online casino cards counting software

    The Blackjack Warrior software program has been designed to offer players to practice the game’s strategy and master their skills while playing Blackjack. Software is intended to be used by a player when playing a Blackjack game in an online casino. The basis of the program is a statistical algorithm that analyzes two significant factors in the game and provides the best possible scenario for the next move. These are the factors considered to suggest a move: 1) The current number of points...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Tree Visualisation with Visual Cues

    Tree Visualisation with Visual Cues

    This project extends a previous work on node link tree visualisation and interaction by providing visual clues on hidden structures. We adopt DOITree from Prefuse package (https://github.com/prefuse/Prefuse), a multi-focal tree layout algorithm, for exploring large hierarchical structures. Related publications: https://www.sciencedirect.com/science/article/pii/S1045926X1630009X https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6902871
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    ...: Encrypt-then-MAC (EtM), GCM, OCB, ChaCha-Poly1305, Schwaemm. Streaming AEAD. MAC functions: HMAC, Poly1305. Key derivation functions: PBKDF2, scrypt, Argon2, HKDF. Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash). - 'cryptor' - for file encryption using Serpent-256 algorithm in AEAD mode. Check out the cppcrypto web site linked below for programming documentation.
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    This program is a password generator. It uses a hashing algorithm to transform a master password into unique and complex site or service specific passwords. It's written in Python and runs either in GUI mode (using GTK+) or in text console.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    WaveFunctionCollapse

    WaveFunctionCollapse

    Bitmap & tilemap generation from a single example

    ... into the observation-propagation cycle. It may happen that during propagation all the coefficients for a certain pixel become zero. That means that the algorithm has run into a contradiction and can not continue. The problem of determining whether a certain bitmap allows other nontrivial bitmaps satisfying condition (C1) is NP-hard, so it's impossible to create a fast solution that always finishes. In practice, however, the algorithm runs into contradictions surprisingly rarely.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Sales CRM and Pipeline Management Software | Pipedrive Icon
    Sales CRM and Pipeline Management Software | Pipedrive

    The easy and effective CRM for closing deals

    Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
    Try it for free
  • 10
    Reskin Sensor Library

    Reskin Sensor Library

    ReSkin Sensor Interfacing Library

    ... learning and magnetic sensing to offer a low-cost, diverse and compact solution for long-term use. Magnetic sensing separates the electronic circuitry from the passive-interface, making it easier to replace interfaces as they wear out while allowing for a wide variety of form factors. Machine learning allows us to learn sensor response models that are robust to variations across fabrication and time, and our self-supervised learning algorithm enables finer performance enhancement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Crunch PNG

    Crunch PNG

    Insane(ly slow but wicked good) PNG image optimization

    Crunch is a tool for lossy PNG image file optimization. It combines selective bit depth, color type, and color palette reduction with zopfli DEFLATE compression algorithm encoding using the pngquant and zopflipng PNG optimization tools. This approach leads to a significant file size gain relative to lossless approaches at the expense of a relatively modest decrease in image quality. Continuous benchmark testing is available in our GitHub Actions CI. Please see the benchmarks directory...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 12
    Crunch

    Crunch

    Insane(ly slow but wicked good) PNG image optimization

    Crunch is an image compression tool for lossy PNG image file optimization. Using a combination of selective bit depth, color palette reduction and color type, as well as zopfli DEFLATE compression algorithm encoding that employs the pngquant and zopflipng PNG optimization tools, Crunch is effectively able to optimize and compress images with minimal decrease in image quality. While it may produce file size gains larger than those produced by lossless approaches, the impact on image quality...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 13
    DifferenceKit

    DifferenceKit

    A fast and flexible O(n) difference algorithm framework

    A fast and flexible O(n) difference algorithm framework for Swift collection. The algorithm is optimized based on the Paul Heckel’s algorithm. This is a diffing algorithm developed for Carbon, works stand alone. The algorithm optimized based on the Paul Heckel’s algorithm. See also his paper A technique for isolating differences between files released in 1978. It allows all kind of diffs to be calculated in linear time O(n). RxDataSources and IGListKit are also implemented based on his...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    GigaBASE is object-relational embedded database engine for C++ applications. It provides SQL-like query language, smart C++ interface (loading objects instead of tupples), transaction based on shadowing page algorithm (no separate log file and very fas
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15

    Build & Lexigraphical Permutations

    Documentation of two types of permutation algorithms

    This project provides documentation on two different approaches to permutations. Permutations can be generated by building them or by transposing characters between different character positions. My project addresses the efficiency between CPU speed and memory usage for generating unique permutations from input source texts that have repeated characters. The challenge is to create an efficient algorithm that can have the capacity to permutate sources texts that are hundreds and thousands...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Dragonbox

    Dragonbox

    Reference implementation of Dragonbox in C++

    This library is a reference implementation of Dragonbox in C++. Dragonbox is a float-to-string conversion algorithm based on a beautiful algorithm Schubfach, developed by Raffaello Giulietti in 2017-2018. Dragonbox is further inspired by Grisu and Grisu-Exact. Dragonbox generates a pair of integers from a floating-point number: the decimal significand and the decimal exponent of the input floating-point number. These integers can then be used for string generation of the decimal representation...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    SHA256-in-C

    SHA-256 Algorithm Implementation in C

    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    LASTAR

    LASTAR

    Automatic audio RMS normalizer & splitter

    ... RunTime to be installed https://www.microsoft.com/fr-fr/download/details.aspx?id=48145 You use LASTAR for your mobile music library ? Try now the new Android player with its real-time embedded algorithm ! https://play.google.com/store/apps/details?id=com.arthelion.loudplayer&hl=fr
    Leader badge
    Downloads: 27 This Week
    Last Update:
    See Project
  • 19
    StringHash

    StringHash

    Open Source Commandline String Hasher written in AutoIt3

    String Hash Tool - ALBANESE Research Lab © 2018-2019 Usage: StringHash.exe --str <string> --alg <algorithm> Algorithms: MD2, MD4, MD5, SHA1, SHA-256, SHA-384, SHA-512 Example: StringHash.exe --str MyString001 (Default MD5) StringHash.exe --str "MyString 002" --alg sha-256 Copyright © 2018-2019 Pedro F. Albanese Source: https://github.com/pedroalbanese/stringhash Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    BD-Func

    Bidirectional Functional Enrichment of Gene Expression Data

    BD-Func is an algorithm to predict activation or inhibition of pathways based upon gene expression patterns. If you use BD-Func, please cite: Warden C, Kanaya N, Chen S, and Yuan Y-C. (2013) BD-Func: A Streamlined Algorithm for Predicting Activation and Inhibition of Pathways. peerJ, 1:e159
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    The Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed environments such as big data and cloud computing, as well as lightweight environments such as IoT devices and mobile devices. LEA is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP) and is the national standard of Republic of Korea (KS X 3246). LEA is included in the ISO/IEC...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    PY-Nodes

    Code for finding nodes in a material using first-principle approach.

    PY-Nodes is a Python 3 based code designed for searching nodes (bands-degenerate points) associated with two or more bands in a given material using the first-principle approach. This code is helpful in efficient searching of the nodes present in the topological semimetals such as- Weyl semimetals, Dirac semimetals & nodal-line semimetals. The code is presently interfaced with the WIEN2k package. The algorithm of the code is based on the Nelder-Mead’s function-minimization approach. The code...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Sudoku Maker is a generator for Sudoku number puzzles. It uses a genetic algorithm internally, so it can serve as an introduction to genetic algorithms. The generated Sudokus are usually very hard to solve -- good for getting rid of a Sudoku addiction.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    LeetCode Python

    LeetCode Python

    LeetCode Solutions: A Record of My Problem Solving Journey

    This repository is a comprehensive personal journal of LeetCode problem-solving journey. It includes detailed solutions with code, algorithm insights, data structure summaries, Anki flashcards, daily challenge logs, and future planning sections.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    M3

    M3

    Distributed TSDB, Aggregator and Query Engine, Prometheus Sidecar

    M3 is a Prometheus-compatible, easy-to-adopt metrics engine that provides visibility for some of the world’s largest brands. M3 is the obvious choice for Cloud Native companies looking to scale up their Prometheus-based monitoring systems. M3 can be used as Prometheus Remote Storage and has 100% PromQL compatibility. M3 was originally developed at Uber in order to provide visibility into Uber’s business operations, microservices, and infrastructure. With its ability to horizontally scale...
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.