With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Picsart Enterprise Background Removal API for Stunning eCommerce Visuals
Instantly remove the background from your images in just one click.
With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
Type setting engine in Java. Uses an algorithm similar to Tex to layout text and images on a page and create a pdf output, supports multiple columns and images, which can be placed at arbitrary positions, spawm columns etc.
Project Tokaf is an general implementation of top-k algorithm. It provides interfaces for all modules that are needed. It also features user preferences module, for computing new preferences and manipulating existing ones.
KNN-WEKA provides a implementation of the K-nearest neighbour algorithm for Weka. Weka is a collection of machine learning algorithms for data mining tasks. For more information on Weka, see http://www.cs.waikato.ac.nz/ml/weka/.
Sales CRM and Pipeline Management Software | Pipedrive
The easy and effective CRM for closing deals
Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
DrPangloss is a python implementation of a three operator genetic algorithm, complete with a java swing GUI for running the GA and visualising performance, generation by generation
This project intends to create an indexing search engine, for knowledge management. The primary object is to apply an information retrieval core. And implement a knowledge data discovery theory such as data mining algorithm, text mining.
J2CPP Translator is a converter of Java code to C++ code, and vice versa. It also functions as a simple code generator for both languages. Tis now dead.
A Java implementation of the NEAT algorithm as created by Kenneth O Stanley. Also provides a toolkit for further experiments to be created and can provide both local and distributed learning environments.
Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
StrMatch is a simple java program, created for educational purposes, that allows user to test a great part of string matching algorithms.
An intuitive user interface shows each algorithm step accurately...
musicomp is a program which most important element is an evolutionary algorithm which uses data mining methods as a fitness function to generate monophone melodies.
jGABL (the Java Graph Algorithm Base Library) is a java library for the implementation of graph algorithms. It covers a hierarchy of graph concepts, various graph implementations, and algorithm animation.
This is an attempt to make a X vs. O game, without using a back-tracing, or any other time wasteful algorithm. Instead, an arrays of bonuses are used. Bonuses are given for each move, after which empty fields are sorted.
In imitative learning, an agent will attempt to match what is observed to their memory. By visualizing the incorrectly matches "scenes", this project will allow algorithm developers to gain a better understanding of what causes their algorithms to fail.
Gara, is a spell of a Chinese word. This word means 'Corner' or 'interstice'. I'll develop some small tools base on many BIG tool like Eclipse or GoogleDesktop. Current plan is: GoogleDesktop MSN plugin. Eclipse Translator.
It is an universal language translator and written in Java. All languages are translated to an unique language (interlingua) and generate any native language from the interlingua. The wordbooks are XML. It use the context of a text, rules and a grammar.
ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool
JEQ is class library written in pure Java. It implements the infinite impulse response (IIR) algorithm for bandpass filtering of sound stream. So, it represents a backend code for stereo 10/15/25/31-band equalizer.
Molevolve is a Java library for running a Genetic Algorithm to model the 3-dimensional structures of peptide chains from amino-acid sequences. Client code can specify its own peptide chain model, fitness functions and GA operations. Requires JDK 1.5.
Web-Based Academic course system for assigning students to courses written in JAVA with pgsql DB and evolutionary algorithm for assigning students to course requests. Multiple roles for users: Admin, Student, Teacher or Tutor. International localization.
ANJI
(Another NEAT Java Implementation)
Built on top of existing OpenSource projects, ANJI is an implementation of NEAT (Neuro-Evolution of Augmenting Topologies), an algorithm for evolving artificial neural networks.
distDES is a Java RMI-based application which manages load balancing on heterogeneous clusters. Development will extend the theoretical initial implementation to include clustered Rainbow Table generation and encryption algorithm collision detection.