AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Try it Free
Deliver secure remote access with OpenVPN.
Trusted by nearly 20,000 customers worldwide, and all major cloud providers.
OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
EMURA is a suite of Java applications that allows two users to send encrypted messages back and forth - as a chat. The encryption key is secure and generated using the Diffie-Hellman algorithm. Utilizes GNU-CRYPTO libraries
Face tracking system that allows the user to interact with the computer moving the head. It's possible to move a camera in a 3D scene and the mouse in the screen. Contains also an open source implementation of the condensation algorithm.
Active Shape/Appearance Model Library (ASMLibrary/AAMLibrary) source code, which includes ASMBuilding/AAMBuilding as well as ASMFitting/AAMFitting algorithm. It is developped under OpenCV 1.0 for locating features in a face and face recognition.
Simple game puzzle, Load custom bmp pic and cutting selected pic on choised numbers of pieces. Included fastest algorithm for the randomize positions the pieces of pic on the main screen. Moving pic pieces by mouse click to solving game.
Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.
Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights. Click to perfect your product now.
The IEEE 1619 Committee open-source reference implementations of encryption algorithms, plus testing and certification suites, for each encryption algorithm included in the standard.
Mobile Unattended WSN @ Sphere is a Python software for simulating a mobile unattended sensor network (MUWSN) on a sphere. One or more, fixed or mobile, adversaries can be used to compromise a MUWSN, that runs an anti-intrusion algorithm.
Application to search for faces in the webcam image in real time.
It uses the results of a personal implementation of the AdaBoost algorithm by Viola and Jones.
The implementation of Bee Hive @ Work algorithm that simulates the foraging behavior of honey bees in nature. The aim is to provide an extensible framework that can be used by researchers to simply create new applications of this algorithm.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Recolition is a simple file encryption program which uses AES as it's algorithm. It will encrypt exisiting files to the .encrypt file extension and then decrypt them back to thier original state.
a first work algorithm trials to implement a compromise between distributed and centralized version control system.part of research project,it's only a simulation. no real networking is implemented ,only virtual random signal are imaginary produced.
otp.el is a one-time-password implementation in emacs lisp, suitable for generating one time passwords with the MD5 algorithm. It's designed to be plugged in to tramp.
MelodyBall generates a simulated array of soundmaking bars, on which a ball bounces and plays a melody (see www.melodyball.com). Need to fix Java/MIDI bugs and read MIDI files as source data for the algorithm to create alternate melodies.
Shape is a molecular conformation prediction program. It uses a genetic algorithm to efficiently search the conformational space of a biomolecule and then clusters the results. It is very simple to use.
This is a set of octave-functions to simulate grover's quantum search algorithm in which we introduce spontaneously decaying qubits. See http://arxiv.org/abs/quant-ph/0609047. This is a modification to account for multiple item searching.
This is a library that implements multicast (ASM and SSM) sockets with dynamic fec capabilities in order to guarantee QoS in broadcasting services. The implemented algorithm is the result of my personal Ph. research.
Vijner 974 E-Sys (2048 bits and unlimited encryption). Enables easy (un-)encryption from text input or .txt file, and to (un-)encrypt raw files, with Vigenère Algorithm + unlimited encryption keys. Simple and powerful. Adapt to fit your needs.
A Java package for pretty-printing a text by deciding where to introduce line-breaks and indentation. A Java implementation of Derek Oppen\'s pretty printing algorithm. It is _not_ a pretty printer for Java code, though it could be used to write one.
Scicos-HDL is a tool to design digital circuit system; it integrates the hardware circuit, algorithm and Scilab/Scicos environment as a plat for digital circuit design, simulation and Hardware Description Language generation. ZhangDong & KangCai
This is an implementation of Donald Knuth's Algorithm X ("dancing links"). This is primarily a sudoku generator and solver, though it can be used to solve other exact cover problems.