Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Go From AI Idea to AI App Fast
One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Stynalyser is a tool that analyses the style of a text. It extracts several variables measuring the text style and displays the results. Export to other analysis programs possible. Programmed in Perl and Java.
Chameleon is a rule-based expert system to assist farmers in semi-arid areas to prevent bush encroachment.
It runs as a web-application on a Tomcat server with MySQL and is based on the Mandarax library for deduction rules and its front-end, Oryx.
HORUS is a system for knowledge acquisition, hypothesis generation, inference and learning. It is an interactive, internet environment accessible to a diverse community of users (public-access or membership basis) - see also UMKAILASH project for more.
A java based neural network framework. The Auratus network is built around an XML messaging system, allowing for a complete MVC design. Additionally, Auratus networks are constructed and at the node/edge level, allowing for advanced topologies.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Provides the implementation of an adjacency-list based graph. Edges and nodes can be decorated with extra (user-provided) information. Depth-first and breadth-first algorithms are also provided.
Some of the features are:
-create and configure a State Tr
Weka-Parallel is a modification to Weka, created with the intention of being able to harness the power of Weka and the speed of parallel processing to be able to run a number of data mining and machine learning algorithms quickly.
The compilerMonitor persists a record of all javac error messages and the sources that caused/fixed the errors. It is a CAUSE (computer-aided usability engineering) tool that analyzes interaction between a developer and the compiler.
Jeep is a modular, abstract and distributed evolutionnary programming core written in Java, allowing to grow autonomous agents as well a gene pool (as in genetic algorithms).
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
A fast, simple method of establishing musical genre of arbitrary compressed audio files calculated by comparisons with training sets. Program currently consists of a java console program. GUI front end, algorithm upgrades to come.
A ContextTree is a way of dynamically forming relationships between information: the same information can be viewed in different ways, depending on what you want from it.
Java port and extension of MLC++ 2.0 by Kohavi et al. Currently contains ID3, C4.5, Naive (aka Simple) Bayes, and FSS and CHC (genetic algorithm) wrappers for feature selection. WEKA 3 interfaces are in development.
A general purpose CPU scavenging platform written in Java. The goal of the Numenor project is to provide a distributed processing platform that allows an organization to take advantage of unused CPU capacity.