Search Results for "ns2 code with algorithm" - Page 8

Showing 433 open source projects for "ns2 code with algorithm"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 1

    GreMod

    GreMod: Real-time Incremental Community Detection

    This is the source code of the paper: Shang, Jiaxing, Lianchen Liu, Feng Xie, Zhen Chen, Jiajia Miao, Xuelin Fang, and Cheng Wu. "A real-time detecting algorithm for tracking community structure of dynamic networks." In 6th SNA-KDD Workshop, 2012. Anyone using this code please cite this paper.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    LPP Transit Metric
    This contains the code used to create the LPP transit metric to evaluate the TCEs found by the Kepler Mission. This code uses the LPP dimensionality reduction algorithm and K-nearest neighbours and a training set of known transits to decide if an unknown TCE looks like a transiting exoplanet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Adaptive Search

    Adaptive Search is a constraint-based Local Search method.

    ...For each constraint, an error function needs to be defined: it gives, for each tuple of variable values (i.e., a variable assignment), an indication on how much the constraint is violated. The algorithm also uses a short-term adaptive memory in the spirit of Tabu Search to avoid stagnation in local minima and loops. This archive contains the source code of sequential and parallel versions of the Adaptive Search algorithm and its specialization on several examples.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Preesm
    PREESM provides a complete framework for fast prototyping. It generates a simulation and an optimized multiprocessor code from graph descriptions of algorithm and architecture. Please visit the project homepage at http://preesm.sourceforge.net.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • 5

    Point Symmetry Clustering

    Point Symmetry Clustering Approach Using Differential Evolution

    Implementation of Point Symmetry-based Automatic Clustering Approach Using Differential Evolution Using bug fixed KD tree nearest neighbor search from https://github.com/CristianDallos/kmeansclustering. (It is also modified to search for multiple nearest points instead only for one.) Used those academic works for algorithm implementation: http://cs.cug.edu.cn/teacherweb/gwy/Publication/ISICA-09.pdf http://www.isical.ac.in/~sanghami/ieeetkde_cameraready.pdf http://www.softcomputing.net/smca-paper1.pdf 1. You may download code: git clone git://git.code.sf.net/p/pointsymmetryclustering/code pointsymmetryclustering-code 2. Build: mvn clean install assembly:assembly -DskipTests -Dmaven.test.skip=true -DdownloadSources=true -Dcheckstyle.skip=true 3. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Designed to help you with nonlinear, multidimensional, multi-parameter regression, using the Levenberg-Marquardt algorithm. The regression model can be set up using the input syntax of most modern cas. Full featured visualization and data edit mask. Regression Easy needs help. Especially need to catch exceptions and give reasonable error messages. (In the moment, the standard error handler is invoked. Simply click "resume" on any error.) For newest binary builds, look in the "/bin" directory of the Subversion distribution (code section). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    JILRuntime/JewelScript

    An object-oriented script language to embed in any application

    A general purpose, object-oriented script language that compiles into code for a register based virtual machine. The language is quite similar to object-oriented high-level languages like Java and C#. The library is entirely self-sufficient and ANSI C compliant. It's main purpose is to be embedded in any application to allow automation of that application through scripting. An integrated C++ binding code generator allows you to create bindings for your application's classes in seconds....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Recursive Directory Removal

    Recursive Directory Removal

    https://github.com/mhisoft/rdpro
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    KMC-KaiC

    KMC-KaiC

    Kinetic Monte Carlo simulation of the in-vitro Kai Circadian clock

    This code is a dedicated Kinetic Monte Carlo (KMC) algorithm which simulates a model of the post-translational Kai circadian clock. The code allows you to simulate the Kai system at the level of individual KaiC hexamers and monomers and explicitly tracks the turnover of every ATP nucleotide. Apart from ATP hydrolysis, all reactions obey detailed balance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Powerful cloud-based licensing solution designed for fast-growing software businesses. Icon
    Powerful cloud-based licensing solution designed for fast-growing software businesses.

    A single-point of license control for desktop, SaaS, and mobile applications, APIs, VMs and devices.

    10Duke Enterprise is a cloud-based, scalable and flexible software licensing solution enabling software vendors to easily configure, manage and monetize the licenses they provide to their customers in real-time.
    Learn More
  • 10
    JView is a command line client for MyWebProject SOAP Web Service. Usage: param 1: endpoint, param 2: remote folder, param 3: algorithm, param 4: modeParam, param 5: userName, param 6: password, param 7: outputFile Example: java -jar JView2.jar http://davidesestili.ddns.net:8080/MyWebProjectLogin/services/GenerateAndDownloadHashWSLogin /home/dsestili82/ SHA-512 no-subfolders davide davide /home/davide/Scaricati/mozilla.sha512 (Currently unavailable) Source code available on https://github.com/davidesestiliwork/JView
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11

    Machine Learning:Perceptron

    Minimal version of the perceptron algorithm.Coded the simpler way.

    A minimal version of the perceptron algorithm is implemented in C#. Coded for ease of understanding the referred to algorithm. Enter your info-press the learn button-then type in new info which the program will try and recognnise. There are some typos in the text displayed-but the code is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Deep Photo Style Transfer

    Deep Photo Style Transfer

    Code and data for paper "Deep Photo Style Transfer"

    ...The repository provides code in Torch (Lua), MATLAB / Octave scripts for computing the Laplacian, and pre-trained models. Pretrained models and example scripts for ease of use. Compatibility with MATLAB / Octave for Laplacian computations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ECO

    ECO

    Matlab implementation of the ECO tracker

    ECO (Efficient Convolution Operators for Tracking) is a high-performance object tracking algorithm developed by Martin Danelljan and collaborators. It is based on discriminative correlation filters and designed to handle appearance changes, occlusions, and scale variations in visual object tracking tasks. The code provides a MATLAB implementation of the ECO and ECO-HC (high-speed) variants and was one of the top performers on multiple visual tracking benchmarks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Marshall

    Detect False Alarm KOIs in Kepler Data

    Marshall is a tool for detecting artefacts masquerading as transits of small, long period planets in *Kepler* data. It is described in detail in Mullally et al. (2015, submitted to ApJ) This code is published primarily as a record of how the results in that paper were produced, and running this package depends on code not yet made available. However, the core of the algorithm is self contained, even if the details of how I ran it on Kepler data are incomplete. See the readme file for more details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ipytracer

    ipytracer

    Algorithm Visualizer for IPython/Jupyter Notebook

    Algorithm Visualizer for IPython/Jupyter Notebook. If you use the display(TracerObject) code from where you want to see, you can use it without any special modification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Dwifft!

    Dwifft!

    Dwifft is a small Swift library

    Dwifft is a small Swift library that tells you what the "diff" is between two collections, namely, the series of "edit operations" required to turn one into the other. It also comes with UIKit bindings, to automatically, animatedly keep a UITableView/UICollectionView in sync with a piece of data by making the necessary row/section insertion/deletion calls for you as the data changes. Dwifft is a Swift library that does two things. The first thing sounds interesting but perhaps only...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    GenCodeGenerator

    C++ class to generate biologically plausible genetic codes

    The "GeneticCode" C++ class is designed to generate versions of the genetic code subject to the requirements of the three major models of the genetic code origin and evolution (about these models see, e.g., Koonin & Novozhilov, 2009, IUBMB Life). This class was written specifically to perform statistical test for the paper Makukov & shCherbak (2017), but it might be used for a wider class of studies related to the genetic code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Illustrated Algorithms

    Illustrated Algorithms

    Interactive algorithm visualizations

    Inspired by Grokking Algorithms and python-execution-trace, this project aims to reveal the mechanics behind algorithms via interactive visualizations of their execution. Visual representations of variables and operations augment the control flow, alongside actual source code. You can fast forward and rewind the execution to closely observe how an algorithm works. The same code that is displayed next to the illustration is also decorated using babel-plugin-trace-execution and executed to record the context at every step. Literally the same source file. Going back and forth between function execution (and call stack when algorithm uses recursion) is effortless. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    DES-Rotem

    DES-Rotem

    DES attempt to crack code with 3 rounds

    This Java project is an attempt to crack the key in a DES encryption algorithm. The plaintext and the cyphertext are known. The purpose is to crack the 64-bit key with 3 rounds instead of 16. This project checks all 2^64 possible keys. Therefore, it takes a long time to find the correct key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Ransomware Recovery Tool

    Why pay Ransom when you have Ransomware Recovery Tool for decryption

    ...This recovery tool is one of the best solution to recover & restore corrupt, damaged and inaccessible data with great efficiency. Ransomware Recovery Tool can recover deleted & corrupted files, images, videos, data in original state. With high end algorithm and two recovery modes, it recover maximum possible data from you corrupted FAT & NTFS drives
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    node2vec

    node2vec

    Learn continuous vector embeddings for nodes in a graph using biased R

    The node2vec project provides an implementation of the node2vec algorithm, a scalable feature learning method for networks. The algorithm is designed to learn continuous vector representations of nodes in a graph by simulating biased random walks and applying skip-gram models from natural language processing. These embeddings capture community structure as well as structural equivalence, enabling machine learning on graphs for tasks such as classification, clustering, and link prediction. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    adapter trimmer

    We implement a very simple approach. Each read is searched for the jun

    ...Each read is searched for the junction adapter (CTGTCTCTTATACACATCT) and its reverse complement (AGATGTGTATAAGAGACAG) based on Hamming distance, the entire junction being CTGTCTCTTATACACATCT+AGATGTGTATAAGAGACAG. If a match to either side of the junction is found then the entire 38bp juncton is clipped. This means the algorithm can tolerate an indel error in one of the sides of the junction, but not both. Optionally Smith-Waterman alignment can be turned on with -w which resolves this issue, although the code is less tested. eg. this will be caught: CTGTCTCT-TA-TACACATCTAGATGTGTATAAGAGACAG but not this: CTGTCTCT-TA-TACACATCTAGATGT-GTATAAGAGACAG
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    MSU's Sparse Fourier Repository

    The Home of DMSFT, AAFFT, GFFT, and MSFFT.

    ...MSFFT, implemented by David Lawlor and Bosu Choi. This code is fast, but is not terribly easy to use. The algorithm is robust to some noise, but requires a lot of parameter tuning. Enjoy at your own risk :), Mark Iwen
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    ns2-wimax-awg

    WIMAX Model for ns-2.36 implementing IEEE 802.16-2012 OFDMA.

    The earlier version of this NS-2 add-on (for OFDM PHY) was developed at NIST. At the WiMAX Forum Plenary Meeting at Hawaii (January 30 - February 2, 2007), the decision to merge the independent development efforts supported by Application Architecture Task Group (AATG), WiMAX Forum and NIST was taken. In 2009 the source code was made available to public though the website http://community.4gdeveloper.com/ and is moved from Google code to sourceforge gain a broader attention. Credit is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Algorithms in Python

    Algorithms in Python

    Data Structures and Algorithms in Python

    Algorithms in Python is a collection of algorithm and data structure implementations (primarily in Python) meant to serve as both learning material and reference code for engineers. It includes code for graph algorithms, heap data structures, stacks, queues, and more — each implemented cleanly so learners can trace logic and adapt for their problems. The repository is particularly useful for people preparing for competitive programming, job interviews, or building a foundational understanding of algorithmic patterns. ...
    Downloads: 0 This Week
    Last Update:
    See Project