Search Results for "data collection algorithm" - Page 48

Showing 1711 open source projects for "data collection algorithm"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 1
    PyFileSync is a set of tools for over-the-web file synchronization and data collection. Currently it consists of one component: PyFileServer - WSGI/Web application for sharing multiple filestructures/realms via WebDAV
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    puff

    puff

    Fast and Strong Data Encryption Algorithm

    svn checkout http://umcipher.googlecode.com/svn/trunk/ umcipher-read-only
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    sqlamp is an implementation of an efficient algorithm for working with hierarchical data structures — Materialized Path. sqlamp uses (and depends of) SQLAlchemy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    GWCNV is a genome-wide algorithm for detecting CNV associations with diseases. It works directly on a transformation of intensity data. It is powerful and sensitive in detecting small CNV associations, and retains high power for large CNVs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    The RDXplorer is a computational tool for copy number variants (CNV) detection in whole human genome sequence data using read depth (RD) coverage. CNV detection is based on the Event-Wise Testing (EWT) algorithm recently published by our group.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Coffee Maker is a collection of objects which make it easier to program in Java for those that have been using Game Maker.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    SURF-nanodots

    Very basic computer vision program

    ...I'd like to clean it up and improve the back end design when time permits. See the wiki for known issues and more information. A computer vision program for analysis of magnetic data collected by a scanning probe microscope. Originated in summer 2007 as a collection of C compiled for Matlab (MEX) files and was eventually ported to a standalone C++ application with a GUI created in Qt. This program takes atomic and magnetic force microscope (AFM/MFM) image pairs as input and uses threshold segmentation to identify magnetic nanodots by intensity in the AFM image. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Zebra_MPTT

    Zebra_MPTT

    A PHP implementation of the modified preorder tree traversal algorithm

    Zebra_MPTT is a PHP class that provides an implementation of the modified preorder tree traversal algorithm making it easy for you to use MPTT in your PHP applications. It provides methods for adding nodes anywhere in the tree, deleting nodes, moving and copying nodes around the tree and methods for retrieving various information about the nodes. Zebra_MPTT uses table locks making sure that database integrity is always preserved and that concurrent MySQL sessions don’t compromise data integrity. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This is going to be a PC scope app for linux since I sadly noticed linux lacks of good scope apps... in 2006 but then I got distracted for a few years, and now, I realized that nothing has really changed, so I try to restart this project. First, this will be soundcard based, later it may use some kind of USB based data collection HW.
    Downloads: 1 This Week
    Last Update:
    See Project
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • 10
    CFTP is a tool that is dedicated transmission speed, it can break through LAN bandwidth limitations, and the actual data transfer rate can be over the bandwidth. In the Gigabit Ethernet, the actual data transfer rate of CFTP is up to 1600Mbps...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SysBackup

    SysBackup

    SysBackup is a swiss-army-knife-type automated nightly backup utility

    SysBackup helps you Be Prepared to recover from disasters of different types as well as collect the data you need to respond to the day-to-day information requests you get from your user community SysBackup is designed to perform automated one-step full backups that are as fine-grained as you need for easy data retrieval, written to local and/or remote network storage, optionally encrypted for security on public systems, in automatically pruned daily, weekly and monthly rotations, using algorythms designed to save disk space and network bandwidth (almost as if you generated only incremental backupsets,) using a growing collection of specialized backup plugins, for services such as MySQL and MailMan, that automatically collect and organize information for you The Quick Install utility allows you to be up-and-running with a minimum of effort, easy job configuration allows you to tweak your backups as issues arise and specialized plugins execute complex tasks for you in a single job
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Fanteris ® Sensiborte Application Project. Using Huffman algorithm-based MDK file format, fast backup or encrypted data, encryption can also be used as the application calls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    MetaMaster is a Java-based desktop application for defining, managing and manipulating metadata associated with a collection of data files or datasets (both locally and on the network) which are bundled together into "data packages". ANDS-funded
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14

    BLIMToolbox

    A set of tools for processing Argus images of the nearshore zone.

    BLIM Toolbox is a collection of tools for the extraction and analysis of visual features in Argus images of the nearshore zone. The toolbox provides an implementation of the BarLine Intensity Mapper (BLIM) algorithm, which extracts high-intensity bands from Argus images. Also, several analysis and export functions are included in this toolbox, such as timestack plots and movies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Peters Backup is a program for backing up your important data files on to diskette, zip drive, fixed disk or CD/RW. It uses an extremely efficient compression algorithm. It keeps track of all versions of your files in full and incremental backups.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Hash Codes
    Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17

    knowceans

    Utility classes from maps to search engine to random samplers

    Collection of several multi-purpose Java libraries. --- knowceans-tools = collection of Java utility classes. --- Highlights: --- org.knowceans.util: IndexQuickSort, TableList: apply order of one array/list to others +++ Vectors, ArrayUtils: array convenience +++ RandomSamplers, CokusRandom, ArmSampler, Densities: random sampling and distributions +++ Arguments: command line parser +++ StopWatch, Which, ExternalProcess: runtime stuff +++ ParallelFor: OpenMP workalike +++ PatternString,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Allows a user to keep their Winamp Media-Library Meta-Data (like rating and play count) through file moves and renames. For detailed instructions, visit the website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    beantobean

    Java bean to java bean mapper

    Most of java application developped using the layer paradigm needs to map java beans to java beans. This process is used to exchange data between the different layers of the application. As an example, the well known Data Transfer Object Pattern which is used to transfer data between software application subsystems heavily uses mapping between beans of the different layers Transfer. The mapping between beans includes : - Mapping of object fields, - Complexe property mapping (property that consists of field of subclasses), - Collection mapping, - subclass mapping, - conversion during the mapping. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    AI Challenges

    AI challenges

    A small collection of challenges for you to test out your skills using AI algorithms with. Currently includes: Here are some problems for you to get some practice and apply your skills with basic artificial intelligence algorithms in Javascript. In each challenge, you are given a puzzle and must write a function which takes the test data as input and returns a value as output - the precise specifications will differ for each exercise.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    ENIGMA 2000

    ENIGMA 2000 is a reliable file encrypter for DOS shell

    ...On phase 5, it uses the Rubik's cube paradigm to encrypt the data. It's extremly reliable and the password varies between 8 and 16 characters. The execution syntax is: coder.exe [file to encode] [password (min 8 char, max 16)] [mode ('c'oder 'd'ecoder)] Enjoy it
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A starter kit, framework, and collection of libraries and utilities used as the basis for SoftwareMonkeys ASP.NET/db4o applications such as the WorkHub application. Download or checkout from www.softwaremonkeys.net/SiteStarter.aspx
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    SCAP Data Stream Creator

    Convert a SCAP 1.0 zip bundle into SCAP 1.2

    A project to convert a SCAP 1.0 zip bundle into SCAP 1.2 data-stream collection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    iefmirashow
    Displays a selection of dust type mira fractals one after the other in colour rather like a slide show. This simple fractal demonstration uses the SDL graphics library and the dust type fractal algorithm, mira.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    I Have The Power

    I Have The Power

    GUI for illustrating the mathematics of large hash algorithms

    A cross platform (Windows\Linux) graphical interface for demonstrating the numerical enormity of large hash algorithms like MD5 (128 bits), SHA1 (160 bits), SHA256 (256 bits) and SHA512 (512 bits). Useful for demonstrations to non-technical audiences such as jury panels, school children, students and so on by converting the scientific notation of the algorithm to "1 in 340 billion....".
    Downloads: 0 This Week
    Last Update:
    See Project