Search Results for "ns2 code with algorithm" - Page 3

Showing 433 open source projects for "ns2 code with algorithm"

View related business solutions
  • Resolve Support Tickets 2x Faster​ with ServoDesk Icon
    Resolve Support Tickets 2x Faster​ with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • The complete IT asset and license management platform Icon
    The complete IT asset and license management platform

    Gain full visibility and control over your IT assets, licenses, usage and spend in one place with Setyl.

    The platform seamlessly integrates with 100+ IT systems, including MDM, RMM, IDP, SSO, HR, finance, helpdesk tools, and more.
    Learn More
  • 1

    cline

    Command line tool for counting source code lines

    cline is a command line tool that counts code lines or non-whitespace characters in your project folder. It is designed to recursively find any source file matching specific rules and count the line breaks within that file. You may specify file suffixes to include or exclude as well as regular expressions for code lines that shall be excluded (e.g. to exclude comments). By default a heuristic algorithm skips binary files.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2

    TAS: Task assignment solver

    Task assignment solver

    ...Also includes a 30 lines-of-code Lua version of Andrey Lopatin's version, given in: Alessandro Minisini, Oleksandr Kulkov. "Hungarian algorithm for solving the assignment problem." Dec 13, 2023. [https://cp-algorithms.com/graph/hungarian-algorithm.html].
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Serpent_in_CBC_mode_for_MCUs

    Serpent_in_CBC_mode_for_MCUs

    Open-source code that enables you to use Serpent in CBC mode

    Serpent_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the Serpent encryption algorithm in CBC mode to your project. Based on the work of https://github.com/peterferrie/serpent GitHub Page: https://github.com/Northstrix/Serpent_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Nyquist

    Nyquist

    Nyquist is a language for sound synthesis and music composition.

    Nyquist is a language for sound synthesis and music composition. It is implemented in C and C++ and runs on Win32, OSX, and Linux. Nyquist combines a powerful functional programming style with efficient signal-processing primitives. Nyquist is also embedded as a scripting language in Audacity.
    Leader badge
    Downloads: 65 This Week
    Last Update:
    See Project
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • 5
    AES_in_CBC_mode_for_MCUs

    AES_in_CBC_mode_for_MCUs

    Open-source code that enables you to use AES in CBC mode

    AES_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the AES encryption algorithm in CBC mode to your project. Based on the work of https://github.com/zhouyangchao/AES GitHub Page: https://github.com/Northstrix/AES_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    cfMesh

    cfMesh

    A library for polyhedral mesh generation

    ...It is already a part of foam-extend, OpenFOAM for Windows, Caelus and OpenFOAM+ released by ESI. This repository is intended for contribution and collaborative development. If you have a new meshing algorithm or interested in contributing to cfMesh, do not hesitate to contact us. Please note that this code is not the same as CF-MESH+, which is a commercial product offered by Creative Fields Holding.
    Leader badge
    Downloads: 182 This Week
    Last Update:
    See Project
  • 7

    SqliteFuzzyPlusExtension

    Sqlite Fuzzy Extension adds dozens of functions to SQLite3

    The ultimate fuzzy SQLite extension, which includes most of the well known fuzzy libraries and methods like Levenshtein, DamerauLevenshtein, Hamming, Jaro-Winkler, Soundex, Caverphone and much more. It includes libraries like SQLean and Edlib. The documentation has many examples, and the open source code includes example usage for C, C++, and C# projects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    JVerifier An hash code verifier JVerifier is a command line application that verify checksums from a GNU-style file. Source code available on https://github.com/davidesestiliwork/JVerifier2 Usage: param 1: file name, param 2: algorithm, param 3: baseDir Example: java -jar JVerifier2.jar SHA1SUMS SHA-1 /home/davide Note: this program requires GnuPG to work properly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    gendasm

    gendasm

    Generic Code-Seeking Diassembler with Fuzzy-Function Analyzer

    GenDasm is a Generic Code-Seeking Diassembler engine. It allows you to enter known starting vectors for a given code image for the micro. It will disassemble the code and follow through branches to assist in the separation of code and data. Its included Fuzzy Function Analyzer companion uses a DNA Sequence Alignment Algorithm to locate similar code in multiple binaries to facilitate reverse-engineering and/or code recovery. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 10
    syre

    syre

    Synchronous Reluctance (machines) - evolution

    ...To perform Finite Element Analysis (FEA) SyR-e is linked to FEMM software, and the simulation process (model creation, pre-processing, post-processing) is automatic and completely controlled from SyR-e code. For the design section, SyR-e embeds automatic procedures based on design equations, minimal FEA simulations or multi-objective optimization algorithm joined with FEA simulations. Once the final design is selected, the SyR-e/FEMM workflow allows the evaluation of several performance figures, but the export to dxf and some leading external motor design software is also possible. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 11

    pwwAutoVision

    Non-standard automated vision software

    The only software that integrates vision and motion, as well as interfaces and reports, is developed with zero code and comes with online debugging. Link:https://pan.baidu.com/s/1vsTptn_pvtbK2sDhWVCZJg code:1234
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Bandicoot

    Bandicoot

    fast C++ library for GPU linear algebra & scientific computing

    * Fast GPU linear algebra library (matrix maths) for the C++ language, aiming towards a good balance between speed and ease of use * Provides high-level syntax and functionality deliberately similar to Matlab * Provides an API that is aiming to be compatible with Armadillo for easy transition between CPU and GPU linear algebra code * Useful for algorithm development directly in C++, or quick conversion of research code into production environments * Distributed under the permissive Apache 2.0 license, useful for both open-source and proprietary (closed-source) software * Can be used for machine learning, pattern recognition, computer vision, signal processing, bioinformatics, statistics, finance, etc * Downloads: http://coot.sourceforge.io/download.html * Documentation: http://coot.sourceforge.io/docs.html * Bug reports: http://coot.sourceforge.io/faq.html * Git repo: https://gitlab.com/conradsnicta/bandicoot-code...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 13
    [OFFICIAL] tinyfiledialogs C C++ v3.21.2

    [OFFICIAL] tinyfiledialogs C C++ v3.21.2

    inputbox password WIN OSX GTK QT Console VCPKG C# Lua R Fortran Pascal

    one C/C++ file & header ==> 8 functions: - beep - tray notify popup - message & question - input & password - save file - open file(s) - select folder - color picker complements OpenGL Vulkan GLFW GLUT GLUI VTK SFML TGUI SDL Ogre Unity3d ION OpenCV CeGui MathGL GLM CPW GLOW Open3D ImGui MyGui GLT NGL STB Nuklear Fenster MicroUi & head-less programs NO INIT NO MAIN LOOP NO LINKING NO INCLUDE win (XP to 11) ASCII MBCS UTF-8 UTF-16 (wchar_t) - native dialogs osx/unix...
    Leader badge
    Downloads: 98 This Week
    Last Update:
    See Project
  • 14
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    Speedcrypt is a software to encrypt your data that implements some of the most powerful and secure algorithms in the world. It also uses the most sophisticated password derivation techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 15

    Smart Hospital Management in C

    The Hospital Management System – Doctor Salary Sorting

    ...This modular approach makes the code easier to understand, maintain, and extend in the future. For example, the system can later be expande
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Batch Auto Upscale Images xBRZ

    Batch Auto Upscale Images xBRZ

    Auto Upscale All Images Using xBRZ 234x

    ...It creates cool stylized results! Unlike AI-driven upscaling, which takes gigabytes of space and enormous processing power, xBRZ is lightweight and can run on a potato PC! Only 5MB! (Source code is included with the program .zip file.)
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    calculatorpp

    calculatorpp

    Calculator++

    Written in C++ (using template). Calculator++ is a application/library for Window (POSIX). The core of code is adaptable for posix. This algorithm support: + built-in operator + built-in functions + run-time functions and variables definition + run-time units system, units with prefix + constants definition + Pretty mathematical expressions - Process ascii files (dev) - vector and matrix (dev) - graph 2D and 3D (dev) - vector graph (dev) - symbolic calculate (dev) - Animations (dev)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    C++ Eigenvectors

    C++ matrix class template with eigenvectors

    All code is in a single .h file except for a .cpp file with the main() demo. Computation time scales as N^4. Also has class template Polynomial. Has extensive operators and methods. Algorithm summary: Any polynomial of degree m is uniquely and simply determined by its values at m+1 points. In particular the characteristic polynomial of an NxN matrix A can be determined by evaluating the determinant |x * I - A| at N+1 distinct values of x.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Fosite - advection problem solver

    numerical simulation code for solving transport equations in 1D/2D/3D

    Fosite is a generic framework for the numerical solution of hyperbolic conservation laws in generalized orthogonal coordinates. Its main purpose is the simulation of compressible flows in accretion disks. The underlying numerical solution method belongs to the family of unsplit conservative finite volume TVD schemes. The method is 2nd order accurate in space and uses high order Runge-Kutta and multistep schemes for time evolution. In addition to the pure advection code several source terms...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
     In-Browser-File-Encrypter

    In-Browser-File-Encrypter

    The source code of the In-Browser-File-Encrypter web app

    The In-Browser File Encrypter is a simple web application that enables you to securely encrypt your files directly in your browser using the AES-256 encryption algorithm in CBC mode. Check it out at: https://codepen.io/Northstrix/pen/xxvXvJL and https://northstrix.github.io/In-Browser-File-Encrypter/V1.0/web-app.html GitHub page: https://github.com/Northstrix/In-Browser-File-Encrypter The download shortcut:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Adaptive Intelligence

    Adaptive Intelligence

    Adaptive Intelligence also known as "Artificial General Intelligence"

    Adaptive Intelligence is the implementation of neural science, forensic psychology , behavioral science with machine-learning and artificial intelligence to provide advanced automated software platforms with the ability to adjust and thrive in dynamic environments by combining cognitive flexibility, emotional regulation, resilience, and practical problem-solving skills.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    LabRPS

    LabRPS

    Random phenomena generator

    This is an official mirror of LabRPS. Code and release files are primarily hosted on https://github.com/LabRPS/LabRPS and mirrored here LabRPS aims to be a tool for the numerical simulation of random phenomena such as stochastic wind velocity, seismic ground motion, sea surface ... etc. It can be in a wide range of uses around engineering, such as random vibration or vibration fatigue in mechanical engineering, buffeting analysis in bridge engineering.... LabRPS is mainly to assist...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    miRDeep*

    miRDeep*

    MiRDeep*

    Please cite: An, J., Lai, J., Lehman, M.L. and Nelson, C.C. (2013) miRDeep*: an integrated application tool for miRNA identification from RNA sequencing data. Nucleic Acids Res, 41, 727-737. We will create index for you if you tell us your interested species (j.an@qut.edu.au). download command line version "MDS_command_line_Vxx.zip" clicking "Browse All Files" please find miRPlant in sourceforge for plant miRNA prediction.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24
    The program allows you to generate the hashes with the chosen algorithm (MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512) of a single file or an entire folder (you can choose to scan the folder recursively or not recursively). It supports drag and drop of files and folders. The hash can be exported to text files. Compiled with openjdk 8. Usage: param 1: exclude symbolic links (0 or 1) [mandatory], param 2: exclude hidden files (0 or 1) [mandatory], param 3: folders to exclude [optional], param 4: texts to exclude [optional] Example: java -jar JHashCode2.jar 1 1 /home/davide/snap,/home/davide/Video,/home/davide/vmware HomeBank Source code available on https://github.com/davidesestiliwork/JHashCode2 See also JVerifier at: https://sourceforge.net/projects/jverifier/ See also GenerateAndDownloadHash at: https://sourceforge.net/projects/generateanddownloadhash/ Thanks to DDR Diego for translating in spanish language
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    CS Notes

    CS Notes

    Essential knowledge for technical interviews, Leetcode, and OS

    ...In addition, it emphasizes code readability, clean coding practices, and proper documentation formatting. The notes follow the Chinese copywriting typesetting guidelines for improved readability, and the project employs consistent HTML-based image formatting to maintain a polished, uniform presentation across all documents.
    Downloads: 4 This Week
    Last Update:
    See Project