• Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1
    Control logic

    Control logic

    Realtime PC-based control and simulator of control systems

    Control logic Java package is a set of Java classes aimed at: - Implementation of a real-time PC-based control - Simulation of control systems Setting up a control system involves working with so-called triggers. See project Wiki for detailed information and examples.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Esta é a documentação de um projeto de conclusão de curso feito na conclusão do curso de Engenharia de Computação-UNIVALI.É um conjunto de arquivos C e Matlab contendo a implementação da Lógica Fuzzy e simulações em sistema de enegia.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    CountBitsSet

    minimal benchmark code for Counting Set Bits (ones) in an Integer

    I was curious how much better the Algorithms, pointed out by BitTwiddling Hacks, perform than a simple Lookup Table approach... Now I think, perhaps my little investigation is interesting for others too... PS: the parallel counting Algo is about 35% faster on average on my computers than a simple LUT based solution. Also this shows nicely how different a human brain compatible solution is to a binary machine optimal solution :-) In the meantime I added other Algorithms beside countbisset (hamming weight): ceil(log2()) + floor(log2()), bitreverse, ... I also recommand to try the code with different compilers and / or plattforms. PS: see result.txt in Code, to see various runs with different compilers and compiler switches
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A cron expression parser.
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5

    CryptoLibraryRefImpl

    encapsulates secure crypto algorithms for easy use

    This library exposes security functionality to the programmer, such as random number generation, hashing, salted hashing, message authentication code, symmetric encryption, asymmetric encryption, hybrid encryption, digital signature and in-memory protection. The library is accompanied by a sophisticated reference implementation, that demonstrates how to make use of the CryptoLibrary.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Cryptography Tools

    Classic & Modern Cryptography tools

    Cryptography Tools is a project to develop demonstration tools on classic (currently Caesar and Playfair) & modern crypto-systems, including private & public key encryptions, digital signatures, cryptographic hashes and authenticated encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    CrystalCMP

    CrystalCMP

    Easy-to-use tool for fast comparison of molecular packing

    CrystalCMP is a code for comparing crystal structures. It is using two basic approaches for this purpose - the fingerprint and the RMSD approach. Result of the comparison is a similarity matrix and dendrogram. Read more here: J. Appl. Cryst. (2016). 49, 2172-2183 (https://doi.org/10.1107/S1600576716016058) and also here: J. Appl. Cryst. (2020). 53, 841-847 https://doi.org/10.1107/S1600576720003787
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    CthughaNix is the reincarnation of Cthugha-L, a Linux port of one of the first audio visualization software packages, known as "An Oscilloscope On Acid".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    CuberGA project is the flexible Genetic Algorithms framework. Realize your ideas easy with deliveries of this project. Keywords: genetic algorithms, framework, permutation, mutation, crossover, genotype, selection, survival, Левченко Илья.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 10
    Current Time Designator

    Current Time Designator

    Displays all time information... at no cost!

    With this application you can know all, about current time! Day, month, year, Week day, clock (hours, minutes and seconds), time of execution of application (years, months, weeks, days, hours, minutes and seconds). -> This application has a miniscule consumption of resources. -> This application doesn't need any configuration just need to be executed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The Customizable Caching Framework provides a basic but robust implementation of a cache with expiry and memory management features. It also provides entry points to populate the cache, making it reusable in several applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Cutting Problem solved by Genetic algorithms. The goal is to cut a rectangular plate of material into more smaller rectangles. The cuts must be rectangular and guillotinable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    D-List

    D-List

    An extensive list subsystem, written in C

    D-List is an extensive, production quality, and robust list management subsystem written in C that can be used as a shared library or compiled directly into your project. D-List provides access to 3 classes of lists, and allows extensive manipulation and customization of these lists. D-List lists can also be easily incorporated as primitives into larger treed, or nested data management systems. D-List implements a comprehensive set of linked list primitives that provides multiple forms of both sequential and random element access, bi-directional movement within a list, and an extensive set of list and element manipulation and reordering features. It also provides for an expansive set of user functions that can be added to lists and called automatically, to efficiently implement a broad range of services using the list primitives as underlying technology. It was written primarily for accuracy and speed, and provides extensive debugging support for easy code development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A C++ library implementing an efficient trie data structure called Double-Array.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    C++ implementation of the DAWG and trimmed DAWG data structures. Supports basic string searching.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    DBI++ is a C++ port of the famous Perl DBI module. Currently it just supports MySQL, but the goal is, to extend it to a driver-independent interface. License is LGPL, so it can be used in closed-source-software, too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    DDMTestbed

    An independent Data Distribution Management testbed

    DDMTestbed is a testbed that allows you to generate random instances and evaluate your proposed resolutive method measuring execution time, memory occupied and distance from the optimal solution. It has been written in C language.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    DEBay

    DEBay

    Deconvolutes qPCR data to estimate cell-type-specific gene expression

    DEBay: Deconvolution of Ensemble through Bayes-approach DEBay estimates cell type-specific gene expression by deconvolution of quantitative PCR data of a mixed population. It will be useful in experiments where the segregation of different cell types in a sample is arduous, but the proportion of different cell types in the sample can be measured. DEBay uses the population distribution data and the qPCR data to calculate the relative expression of the target gene in different cell types in the sample. The user manual of DEBay: https://sourceforge.net/projects/debay/files/UserManual.pdf Sample data: https://sourceforge.net/projects/debay/files/Test_data/ Citation Information: Vimalathithan Devaraj, Biplab Bose. DEBay: A computational tool for deconvolution of quantitative PCR data for estimation of cell type-specific gene expression in a mixed population. Heliyon, 2020, 6(7), e04489. https://doi.org/10.1016/j.heliyon.2020.e04489
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    DIProxy is integrated some DIContainer. And DIProxy reject relation between WebFramework and DIContainer. added DIProxy is implemented Dynamic injection. see at http://diproxy.wiki.sourceforge.net/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Implementation of Damerau-Levenshtein fuzzy string matching in Java. Returns the distance adding one point per character insert, deletion, mismatche and swap.. This is an extension of apache/commons/lang/StringUtils.getLevenshteinDistance()
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    DXE Encryption Algorithm

    DXE (Darkgust's Xor Encoder) is an encryption algorithm made in VB.NET

    DXE (Darkgust's Xor Encoder) is an encryption algorithm made in Visual Basic .NET .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A light-weight group communication system/library of distributed algorithms implementations for agreement problems (e.g., Consensus, Unreliable Leader Election and Atomic Broadcast).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Damerau Levenshtein

    Java Library for Damerau Levenshtein Algorithm

    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This is an implementation of Donald Knuth's Algorithm X ("dancing links"). This is primarily a sudoku generator and solver, though it can be used to solve other exact cover problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Very fast and easy to use Java tool for solving and generating Sudoku puzzles. By using Donald Knuths exact cover algorithmus it can not only solve or create the usual 9x9 but also 4x4, 16x16 or even bigger Sudokus in a very efficient way.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB