Showing 2782 open source projects for "algorithm"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 1
    EMURA is a suite of Java applications that allows two users to send encrypted messages back and forth - as a chat. The encryption key is secure and generated using the Diffie-Hellman algorithm. Utilizes GNU-CRYPTO libraries
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Face tracking system that allows the user to interact with the computer moving the head. It's possible to move a camera in a 3D scene and the mouse in the screen. Contains also an open source implementation of the condensation algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Active Shape/Appearance Model Library (ASMLibrary/AAMLibrary) source code, which includes ASMBuilding/AAMBuilding as well as ASMFitting/AAMFitting algorithm. It is developped under OpenCV 1.0 for locating features in a face and face recognition.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Simple game puzzle, Load custom bmp pic and cutting selected pic on choised numbers of pieces. Included fastest algorithm for the randomize positions the pieces of pic on the main screen. Moving pic pieces by mouse click to solving game.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights. Click to perfect your product now.
    Click to perfect your product now.
  • 5
    The IEEE 1619 Committee open-source reference implementations of encryption algorithms, plus testing and certification suites, for each encryption algorithm included in the standard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    objectmerge is a generic merging algorithm for arbitrary trees
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Mobile Unattended WSN @ Sphere is a Python software for simulating a mobile unattended sensor network (MUWSN) on a sphere. One or more, fixed or mobile, adversaries can be used to compromise a MUWSN, that runs an anti-intrusion algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Application to search for faces in the webcam image in real time. It uses the results of a personal implementation of the AdaBoost algorithm by Viola and Jones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The implementation of Bee Hive @ Work algorithm that simulates the foraging behavior of honey bees in nature. The aim is to provide an extensible framework that can be used by researchers to simply create new applications of this algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Reimplementation of the anomaly detection/one-class classification algorithm 'V-detector'.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Recolition is a simple file encryption program which uses AES as it's algorithm. It will encrypt exisiting files to the .encrypt file extension and then decrypt them back to thier original state.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Loudatron is a JAVA implementation of loudness analysis of audio files based on the algorithm standardized by ITU-R BS.1770.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ChIPOTle is a peak-finding algorithm used to analyze ChIP-chip microarray data
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    a first work algorithm trials to implement a compromise between distributed and centralized version control system.part of research project,it's only a simulation. no real networking is implemented ,only virtual random signal are imaginary produced.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    otp.el is a one-time-password implementation in emacs lisp, suitable for generating one time passwords with the MD5 algorithm. It's designed to be plugged in to tramp.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    MelodyBall generates a simulated array of soundmaking bars, on which a ball bounces and plays a melody (see www.melodyball.com). Need to fix Java/MIDI bugs and read MIDI files as source data for the algorithm to create alternate melodies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Shape is a molecular conformation prediction program. It uses a genetic algorithm to efficiently search the conformational space of a biomolecule and then clusters the results. It is very simple to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This is a set of octave-functions to simulate grover's quantum search algorithm in which we introduce spontaneously decaying qubits. See http://arxiv.org/abs/quant-ph/0609047. This is a modification to account for multiple item searching.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This is a library that implements multicast (ASM and SSM) sockets with dynamic fec capabilities in order to guarantee QoS in broadcasting services. The implemented algorithm is the result of my personal Ph. research.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Encrypts and decrypts images using the German's WWII Enigma algorithm. The program also generates the rotors for use and encrypts/decrypts plaintext.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Vijner 974 E-Sys (2048 bits and unlimited encryption). Enables easy (un-)encryption from text input or .txt file, and to (un-)encrypt raw files, with Vigenère Algorithm + unlimited encryption keys. Simple and powerful. Adapt to fit your needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A Java package for pretty-printing a text by deciding where to introduce line-breaks and indentation. A Java implementation of Derek Oppen\'s pretty printing algorithm. It is _not_ a pretty printer for Java code, though it could be used to write one.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Scicos-HDL is a tool to design digital circuit system; it integrates the hardware circuit, algorithm and Scilab/Scicos environment as a plat for digital circuit design, simulation and Hardware Description Language generation. ZhangDong & KangCai
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    .Net Implementation of the BIDI algorithm, as described in http://www.unicode.org/reports/tr9/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    This is an implementation of Donald Knuth's Algorithm X ("dancing links"). This is primarily a sudoku generator and solver, though it can be used to solve other exact cover problems.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.