Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Mseg is a generic region-based multi-scale image segmentation algorithm designed with some optimizations for remote sensing imagery. The algorithm can be used as a low level processing part of an object-oriented image analysis system.
hgboost is a header-only library which contains a generic hypergraph implementation and provides vertex/node contraction and vertex/edge filtering. It contains algorithms to compute cohesive subgroups, minimum cuts and maximum flows.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Wodka is the implementation of a geneticalgorithm (GA) that can bread two dimensional structures that might be used as robots in sodarace competitions.
Szyfrator is a GUI application for Windows XP/Vista/7. It encrypts and decrypts text messages using the public RSA algorithm. It generates two 256 bit keys: public and private and was designed to be very easy to use.
This is a compiler which produces ANNs out of a simple, procedural programming language. Those programs can then be subject to genetic algorithms and neuro-evolution to enhance them automatically.
This is a network based text search tool. The Network part consists of Client and Server side .class files. The text search algorithm has been implemented in C. On client side type SearchClient ip(server) string
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
A concise example of the classical geneticalgorithm, with a fancy windows terminal display. Features DNA editing, save/load, customizable constraints and statistics logging.
Secret Sharp is a wizard based GUI for the Shamir Secret Sharing Algorithm provided by the crypto++ API. Secret Sharp replicates the functionality that 'ssss' provides on unix.
A flexible programming library for evolutionary computation. Steady-state, generational and island model genetic algorithms are supported, using Darwinian, Lamarckian or Baldwinian evolution. Includes support for multiprocessor and distributed systems.
Popular Game 15 implemented in Java. The most intersting part of the project is the geneticalgorithm which solving the puzzle. Play the game here: http://www.geocities.com/todordimitrovbalabanov/the15/
ksudoku is a fully-featured Sudoku puzzle generator and solver for KDE. With it you can generate and play 3D and 2D puzzles of different sizes and levels. The main algorithm is fast and extendable to any general graph coloring problem.
HyPhy is a comprehensive environment for maximum likelihood statistical analysis of genetic sequence data. It includes a large collection of out of the box analyses, a feature-rich graphical user interface for custom data analysis and a scripting languag
Library of terrain level of detail algorithm nodes for Coin (an implementation of an Open Inventor scene graph) and other utility classes. Currently are implemented ROAM, Geo Mip-Mapping and Chunked-LoD algorithms. Any issues and feedback for this projec
Clean implementation (in ANSI-C) of the Wavelets Transform. It works fairy good as a sparser, which can be combined with a compression algorithm (by using programs like bzip and gzip) to achieve high compression ratios (as good as mp3's).
Random Forest classification implementation in Java based on Breiman's algorithm (2001). It assumes the data is in the form [ X_1, X_2, . . ., X_M, Y ] where Y \in {0, 1, . . ., C}. The user must define M, C, and m initially.
The Hardware Assisted Visibility Sorting (HAVS) algorithm is a GPU-based, direct volume renderer for unstructured grids. The algorithm operates in both object- and images-space and includes a sample-based, dynamic level-of-detail algorithm.
This project aims to improve the Civilization 4 AI using a geneticalgorithm. We also have some alternative AI algorithms which have been custom written that will hopefully also improve the AI.
libidp is a C library implementation of the iterative dynamic programming (IDP) optimal control algorithm, which solves the optimal control problem for ODE and DAE dynamic equation models. An example problem is included.
OMG is an online 2-D Mesh Generator. Using Shewchuka Triangle (written in C) to generate DT and a Quadtree algorithm (written in php) to triangulate a PSLG. A few Import end Export functions are included. Using SVG to display meshes.