Search Results for "encryption algorithm java" - Page 20

485 programs for "encryption algorithm java" with 1 filter applied:

  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • Sales CRM and Pipeline Management Software | Pipedrive Icon
    Sales CRM and Pipeline Management Software | Pipedrive

    The easy and effective CRM for closing deals

    Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
    Try it for free
  • 1
    TafWeb is a Proof of Concept of the JNDiff algorithm implementation in a particular work environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A unified collection of ruby data structure and algorithm packages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The Highly Adaptive Link is a Java middleware that implements a client-cooperation algorithm, to reduce server load and server-client latency.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A repository of grid computing student exercises. The repository currently contains a grid-enabled mergesort using Condor. Exercises to be developed include genome analysis, genetic algorithm, integration, matrix multiply, ray tracing, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 5
    DEAL
    DEAL (Domain Extraction ALgorithm) is an application for domain analysis. Its main purpose is to extract domain information from existing Java applications and to create different kinds of models from the extracted data, including domain-specific languages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    NXTAI's main objective is to create a new generation of natural language processing program by using a unique neural networking model. To demonstrate the algorithm works, A chatbot will be developed as a classical example of how it can be used.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Weka++ is a collection of machine learning and data mining algorithm implementations ported from Weka (http://www.cs.waikato.ac.nz/ml/weka/) from Java to C++, with enhancements for usability as embedded components.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Platform based on JMS queues to centralize System Event Messages (syslog) and Application Layer Messages, persisting them in several Databases and providing several pre- and post- processes according the message's nature, like encryption, mail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    JLyap calculates and displays image maps of the lyapunov exponents of functions. It supports smart algorithm for fast calculation of lyapunov exponent, pane selection by mouse clicking within image (no limition for aspect ratios or angles), Open/save fun
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.