Showing 20 open source projects for "algorithm"

View related business solutions
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • Business Automation Software for SMBs Icon
    Business Automation Software for SMBs

    Fed up with not having the time, money and resources to grow your business?

    The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
    Learn More
  • 1
    gse

    gse

    Go efficient multilingual NLP and text segmentation

    ...Support user and embed dictionary, Part-of-speech/POS tagging, analyze segment info, stop and trim words. Support multilingual: English, Chinese, Japanese and others. Support Traditional Chinese. Support HMM cut text use Viterbi algorithm. Support NLP by TensorFlow (in work). Named Entity Recognition (in work). Supports with elastic search and bleve. run JSON RPC service.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    GmSSL

    GmSSL

    Password toolbox that supports national secret

    ...GmSSL 3.0 greatly reduces memory requirements and binary code volume, does not rely on dynamic memory, and can be used in low-power embedded environments (MCU, SOC, etc.) National secret algorithm and SSL protocol are embedded in existing projects. The default CMake build system can be easily used with default compilation tools such as Visual Studio and Android NDK. Developers can also manually write Makefiles to compile in special environments, tailoring.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    etcd

    etcd

    Distributed reliable key-value store for the most critical data

    A distributed, reliable key-value store for the most critical data of a distributed system. etcd is a strongly consistent, distributed key-value store that provides a reliable way to store data that needs to be accessed by a distributed system or cluster of machines. It gracefully handles leader elections during network partitions and can tolerate machine failure, even in the leader node. etcd is a consistent distributed key-value store. Mainly used as a separate coordination service, in...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 4
    Wesh Network Toolkit

    Wesh Network Toolkit

    Async Mesh Network Protocol for Extreme Communication

    ...Wesh Protocol provides end-to-end encryption and perfect forward secrecy for all the exchanged messages. Distributed p2p transmissions and hosting over IPFS powered by CRDT algorithm. Efficient end-to-end encryption and perfect forward secrecy to prevent eavesdropping and provide reliable identity access management. Distributed authentication and authorization. Multiple devices per identity. Resilient p2p transmissions between groups of mutually-authorized users. Improved performance and availability with decentralized rendez-vous servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 5
    Caire

    Caire

    Content aware image resize library

    Caire is a content aware image resize library based on Seam Carving for Content-Aware Image Resizing paper. An energy map (edge detection) is generated from the provided image. The algorithm tries to find the least important parts of the image taking into account the lowest energy values. Using a dynamic programming approach the algorithm will generate individual seams across the image from top to down, or from left to right (depending on the horizontal or vertical resizing) and will allocate for each seam a custom value, the least important pixels having the lowest energy cost and the most important ones having the highest cost. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    nkn

    nkn

    Official Go implementation of NKN full node

    NKN (New Kind of Network) is a blockchain-based network infrastructure that utilizes a novel consensus mechanism to facilitate decentralized data transmission. By incentivizing network participants with tokens, NKN aims to create a more open, efficient, and secure internet. Its architecture supports a wide range of applications, from messaging to content delivery.​
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    A QUIC implementation in pure Go

    A QUIC implementation in pure Go

    A QUIC implementation in pure go

    ...QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    glider

    glider

    glider is a forward proxy with multiple protocols support

    ...We can set up local listeners as proxy servers, and forward requests to internet via forwarders. Act as both proxy client and proxy server(protocol converter). Flexible proxy & protocol chains. Load balancing with the following scheduling algorithm, rr: round robin, ha: high availability, lha: latency based high availability, dh: destination hashing. Rule & priority based forwarder choosing: Config Examples. DNS forwarding server. Force upstream querying by TCP. Association rules between dns and forwarder choosing. Association rules between dns and ipset. dns cache support. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Vald

    Vald

    Vald. A Highly Scalable Distributed Vector Search Engine

    Vald is a highly scalable distributed fast approximate nearest neighbor dense vector search engine. Vald is designed and implemented based on the Cloud-Native architecture. It uses the fastest ANN Algorithm NGT to search for neighbors. Vald has automatic vector indexing and index backup, and horizontal scaling which is made for searching from billions of feature vector data. Vald is easy to use, feature-rich and highly customizable as you needed. Usually, the graph requires locking during indexing, which causes stop-the-world. But Vald uses distributed index graphs so it continues to work during indexing. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 10
    Vearch

    Vearch

    A distributed system for embedding-based vector retrieval

    ...Through the module of the plugin, a complete default visual search system can be deployed just with one click. Otherwise, you can easily customize your own image, video, or text feature extraction algorithm plugin. This GIF provides a clear demonstration of the project vearch usage and its internal structure. The use of vearch is mainly divided into three steps. Firstly, create DB and Space, then import your data, and finally, you can search on your own dataset.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    M3

    M3

    Distributed TSDB, Aggregator and Query Engine, Prometheus Sidecar

    M3 is a Prometheus-compatible, easy-to-adopt metrics engine that provides visibility for some of the world’s largest brands. M3 is the obvious choice for Cloud Native companies looking to scale up their Prometheus-based monitoring systems. M3 can be used as Prometheus Remote Storage and has 100% PromQL compatibility. M3 was originally developed at Uber in order to provide visibility into Uber’s business operations, microservices, and infrastructure. With its ability to horizontally scale...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    codeforces-go

    codeforces-go

    Solutions to Codeforces by Go

    Golang algorithm competition template library. Due to the complexity of algorithm knowledge points, it is necessary to classify the algorithms you have learned and the questions you have done. An algorithm template should cover the following points. Basic introduction to the algorithm (core idea, complexity, etc.) Reference links or book chapters (good material) Template code (can contain some comments, usage instructions) Template supplements (extra codes in common question types, modeling tips, etc.) ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    LeetCode

    LeetCode

    Solutions to LeetCode by Go, 100% test coverage

    Aimed towards programming enthusiasts who want to improve algorithm capabilities through LeetCode, containing many algorithm questions. Most of them are real interview questions of Google, Facebook, LinkedIn, Apple, etc. and it always help to sharp our algorithm Skills. Level up your coding skills and quickly land a job. This is the best place to expand your knowledge and get prepared for your next interview.
    Downloads: 218 This Week
    Last Update:
    See Project
  • 14
    Hyperledger Burrow

    Hyperledger Burrow

    A permissioned Ethereum smart-contract blockchain node

    ...Burrow is a fully-fledged blockchain node and smart contract execution engine -- a distributed database that executes code. Burrow runs Ethereum Virtual Machine (EVM) and Web Assembly (WASM) smart contracts. Burrow networks are synchronized using the Tendermint consensus algorithm. A node can detect if its state is corrupted or if a validator is dishonestly executing the protocol. Run a private or public permissioned network. Stakeholders may vote for autonomous smart contract upgrades. Application state is organised in an event stream and can drive external systems.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Triangula

    Triangula

    Generate high-quality triangulated and polygonal art from images

    Generate high-quality triangulated and polygonal art from images. Triangula uses a modified genetic algorithm to triangulate or polygonate images. It works best with images smaller than 3000px and with fewer than 3000 points, typically producing an optimal result within a couple of minutes. For a full explanation of the algorithm, see this page in the wiki. You can try the algorithm out in your browser, but the desktop app will typically be 20-50x faster.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Blackfriday

    Blackfriday

    Blackfriday, a markdown processor for Go

    ...Blackfriday itself does nothing to protect against malicious content. If you are dealing with user-supplied markdown, we recommend running Blackfriday's output through HTML sanitizer such as Bluemonday. Blackfriday includes an algorithm for creating sanitized anchor names corresponding to a given input text. This algorithm is used to create anchors for headings when EXTENSION_AUTO_HEADER_IDS is enabled. The algorithm has a specification, so that other packages can create compatible anchor names and links to those anchors.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Jobber

    Jobber

    An alternative to cron, with sophisticated status-reporting

    ...Sophisticated error handling: you can control whether and when a job is run again after it fails. For example, after an initial failure of a job, Jobber can schedule future runs using an exponential backoff algorithm. Sophisticated error reporting: you can control whether Jobber notifies you about each failed run, or only about jobs that have been disabled due to repeated failures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Primitive Pictures

    Primitive Pictures

    Reproducing images with geometric primitives

    Primitive Pictures is an image processing command-line tool written in Go that reproduces images using geometric primitives (triangles, rectangles, ellipses, polygons, etc.). The core algorithm is iterative and “hill-climbing”: given a target image, it repeatedly finds the best single shape to add that will reduce the error between the current approximation and the target image, then draws that shape. Over time (e.g., adding 50-200 shapes) the output becomes an abstracted version of the input image—recognizable, artistic, and often visually striking. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Dep

    Dep

    Go dependency management tool experiment

    Dep was an official experiment to implement a package manager for Go. While dep has many discrete components and moving parts, all of these parts revolve around a central model. Dep is a tool intended primarily for use by developers, to support the work of actually writing and shipping code. It is not intended for end users who are installing Go software - that's what go get does. It is strongly recommended that you use a released version of dep. While tip is never purposefully broken, its...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    SummitDB

    SummitDB

    In-memory NoSQL database with ACID transactions, Raft consensus, etc.

    SummitDB is an in-memory, NoSQL key/value database. It persists to disk, uses the Raft consensus algorithm, is ACID compliant, and is built on a transactional and strongly-consistent model. It supports custom indexes, geospatial data, JSON documents, and user-defined JS scripting. The easiest way to get SummitDB is to use one of the pre-built release binaries which are available for OSX, Linux, and Windows. SummitDB can be compiled and used on Linux, OSX, Windows, FreeBSD, ARM (Raspberry PI) and probably others since the codebase is 100% Go. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next