Showing 2782 open source projects for "algorithm"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights. Click to perfect your product now.
    Click to perfect your product now.
  • 1
    Military Survelliance open source GPS with Filters(like night vision,Sharpening location,Contrast) with optimal route finding algorithm embedded in the application developed in java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    MacMakk is a tournament management program for go, the asian boardgame. It uses a new ranking algorithm, called McMakko. It is intended to be portable, with Linux and Windows being the main targets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The implementations of finding the k shortest paths (KSP) algorithm. A C/C++ library including some classical graph relative algorithm implementations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    In imitative learning, an agent will attempt to match what is observed to their memory. By visualizing the incorrectly matches "scenes", this project will allow algorithm developers to gain a better understanding of what causes their algorithms to fail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Garbage collection for C++. Small portable library that can even be multithreaded (with some restrictions). It uses the mark & sweep algorithm. No dependencies. Provides garbage-collected array class; provides wrapper class for external classes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    project is based on another open source product. extending original functionality of detecting harvester attacks, we focus on categorizing email contents by using an bayesian algorithm. this is improved by visualisation and analytics concerning keywords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Implement a scheduling algorithm to schedule classes at a university
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This project provides a JAVA library and a graphical user interface which implement the "FastICA" algorithm based on the paper "Fast and Robust Fixed-Point Algorithms for Independent Component Analysis (ICA)" by Aapo Hyvärinen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 10
    Magic Cube Cryptography is a new algorithm of cryptography and at future a program of data security in linux. The ideia is to create a safe and fast cryptography algorithm in C and x86-assembly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This project aims to provide developers a convenient library about graph theory algorithm and some basic data structures. It will be developed in Java via Eclipse IDE, supporting both win32 and linux systems, and published as jar files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This distribution contains a novel fast CRC generation algorithm developed by Intel. This algorithm runs at under 3 cycles per byte (vs. 7) and thus triples the performance of existing CRC implementations. Slicing-by-8 uses an 8KB cache footprint.
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • 13
    This is a proof of concept project of my sorting algorithm that I call MSort.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Neural networks evolution (genetic algorithm) written in Java. Now neural networks try to playing Go, Tic-Tac-Toe.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    RC4.NET is a library that adds support for encrypting/decrypting using the symmetric RC4 algorithm in the .NET environment. The library is written in C# language, and performs equally well on both the Microsoft CLR and Mono platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Genetic Algorithm based software to resolve the Traveling Salesman Problem (Problema del Commesso Viaggiatore).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    PseudoKu is a SuDoKu puzzle game and is intended to allow the user create their own puzzle from scratch, generate new puzzles depending on skill level, and save to and load from files. The game solves puzzles using Donald Knuth's Dancing Links Algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Secure Addressbook is based on the JavaScript implementation of Wheeler & Needham's Block TEA (Tiny Encryption Algorithm) by Chris Veness. It allows maintaining secure records even the on shared hosting server, as data en/decrypted at browser only.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The OSCAR Backup System is a PERL powered graphical frontend for rsync over ssh backups in the Windows environment. The Rsync algorithm and SSH tunnel encryption makes this archival tool extremely secure and efficient.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    C#Match - C# Pub/Sub Matching Engine. Support for multiple operators, XML subject line, efficient matching algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    MultiBoost is a C++ implementation of the multi-class AdaBoost algorithm. AdaBoost is a powerful meta-learning algorithm commonly used in machine learning. The code is well documented and easy to extend, especially for adding new weak learners.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    whbEncrypter is a very simple variable encryption program to encrypt and decrypt a file based on a passkey provided based on the user. It uses a simple encryption algorithm that I wrote for a school project. The passkey can also be the contents of a file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    PasswordChain is a secure Web-based password database designed to securely encrypt and store passwords. Data is encrypted using the Blowfish algorithm and stored in a MySQL database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    This is a collection of vb class modules written in native Visual Basic. They provide the following functionality: Processing of very large integer numbers, hashing algorithms, prime number handling and an implementation of the RSA algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.