Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
$300 in Free Credit Towards Top Cloud Services
Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
simple algorithm for a realtime interactive visual cortex for painting
A paint program where the canvas is the visual cortex of a simple kind of artificial intelligence. You paint with the mouse into its dreams and it responds by changing what you painted gradually. There will also be an API for using it with other programs as a general high-dimensional space. Each pixel's brightness is its own dimension. Bayesian nodes have exactly 3 childs because that is all thats needed to do NAND in a fuzzy way as Bayes' Rule which is NAND at certain extremes. NAND can be...
The objective of this project is to evaluate the possibility to use a smart phone (or watch phone) to detect dangerous situations (fall and wandering) encountered by fragile people, especially suffering from Alzeihmer deases.
- HYPOTHESIS -
=> The smart phone embed sensors able to detect falls and wandering thanks an accelerometers and the GPS.
=> The smartphone provide an interface and embed connected technologies able to alert helpers people from almost...
Concurrent agents for Java. Create multithreaded active objects using standard Java interfaces and classes without explicit use of threads, synchronization, or other concurrency primitives.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
The Hironico Db Tool is a graphical database client that can run on all major platforms today. It provides a powerfull, feature rich and user friendly set of tools to work with databases of any vendor using Java drivers while being fast & light.
This application is used to monitor your home via email / FTP using USB camera and microphone , there is a lot of configurations to customize it upon needs. A motion detection is also supported. More info, in my blog http://osama-oransa.blogspot.com/
Used to monitor the kids while they are using the computers transparently by taking screen shots every configurable period and store them in specified location, it also support email or FTP upload according to configurations.
Command line tool written in Java, that automaticly unpacks (password protected) RAR-Archives or multi-part RARs, if all belonging files are complete. It is designed to do unrar jobs on Linux-based NAS-Devices when downloading from Rapidshare & co.
ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others.
TUTU is an automated testing system which finds inconsistencies between a system and its specifications, by using a combination of a number of techniques, such as Design by Contract, test data generation, mutation testing and invariant detection.
Jarrut is a tool that makes developing and debugging Java ME applications (application using CLDC to be more specific) a bit less of a pain. Jarrut enables proper stack traces for exceptions, also when running a MIDlet on a real device
ICE Cafe is Open sourse sequence cromatgram alginer and viewer. The first purpose of this sofware is to find a RNA Editing by Comparing Genomic sequence to RNA sequence, or by using the ICE method developed at Suzuki Lab,Dept Chem&Biotech Tokyo Univ
Intrusion Detection System made in Javausing Snort rule files. The main feature of Nyx are distributiveness, Java based, Software Agent implemented. Iteration 1 has finished. Still more features has to be extended
weka outlier is an implementation of outlier detection algorithms for WEKA.
CODB (Class Outliers: Distance-Based) Algorithm is the first algorithm developed using WEKA framework.
Easy Args java command line processing API is designed using annotations and reflection to greatly simplify the tasks involved in argument processing, including required argument detection, automatic type conversion, and the generation of usage help.
This project covers an algorithm for face detection in color images. It was developed as a conclusion work in graduation of Computer Science at Pontifícia Universidade Católica de Minas Gerais by Breno Santos Araújo (brenopuc@gmail.com).
GlueFace is a Java application for adding lipsync'ed facial animation to BrickFilms (Lego-style) films. The position, size, rotation and 3D spin can be modified using a timeline, so the face "sticks" accurately to the character.
GWT2SWF intend to provide software bridge between GWT and FLASH/FLEX. It means that using GWT2SWF you will be able to communicate between GWT and FLASH/FLEX. GWT2SWF provides SWFWidget and FlashPlayer version detection.
This project is an attempt to solve issues we face while using hibernate.Currently solving these four problems: 1)Updating object delete null data. 2)Projection returns list of object[] instead of pojo. 3)Don't write HQL 4)Paging logic rewrit
Java framework for facedetection and face recognition based on different plugin and filter types. Includes Eigenfaces in pure Java, OpenCV detection via JNI, integration of the Betaface.com Web Service, skin color filter, Adobe XMP Export and a nice GUI
ABPS - Advanced Branch Prediction Simulator - allows: branch prediction simulation using multiple predictors (GAg,PAg,PAp,GShare,Perceptron) and detection of unbiased branches. Results can be seen using charts. Used benchmarks: Stanford, SPEC2000, CBP2.
JTextPro: A Java-based Text Processing tool that includes sentence boundary detection (using maximum entropy classifier), word tokenization (following Penn conventions), part-of-speech tagging (using CRFTagger), and phrase chunking (using CRFChunker).
This is a Yet! Another Sentence Detector developed in Javausing a Regular Expression-Based Boundary Sentence Detection approach that can be customized to work with any language.