AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Try it Free
Picsart Enterprise Background Removal API for Stunning eCommerce Visuals
Instantly remove the background from your images in just one click.
With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
In computer science and information theory, Huffman coding is an entropy encoding algorithm used for loss less data compression. It is implemented in java. This software shows you a sample of huffman coding.
Pure Java implementation of an interactive 3d graph rendering engine and editor using a spring embedder algorithm. Nice looking sterile real time 3d environment. Feel free to extend our project and build something awesome, just let us know please :D
A very simple file encryption tool. Release 1 is a text editor that saves encrypted files. Release 1.1 will include the ability to convert any file, even binary, to a GEF (Gulosh Encrypted File). Release 2.0 brings the strong encryption into play.
This project contain chat server and chat client/admin that works on Windows/Unix.. This is a Free software. Developed by Osama Mohammad Oransa, 2009,contain 3 parts : Chat Server ,Admin and Chat Clients, Based on Java RMI, will support XMPP soon.
Sales CRM and Pipeline Management Software | Pipedrive
The easy and effective CRM for closing deals
Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
This application is a tree algorithms visualizator. The user can create his own tree of a certain type (among binary, binary search, and red black), his algorithm and then can observe the execution in real time of his algorithm on his tree.
JMS/Joram implementation of the Bully election algorithm. It is a library to be used by a process' implementation to make it transparently manage coordinator's elections, while it carries out business logic. A sample application is included.
Turn Your Content into Interactive Magic - For Free
From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.
Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
DazioAES is a password manager: it's an application protected by a single password that stores multiple other password or informations in an encrypted way. It uses Bouncycastle crypto library (classes from) and their AES encryption implementation.
Encrypted Message Exchange by using Diffie-Hellman key exchange algorithm and Advanced Encryption Standard(AES) encryptionalgorithm with Cipher-block chaining(CBC) mode using User Datagram Protocol(UDP)port server-client application in C, Ansi-style
TaxonFinder is an application that annotates taxon found in literature. The application harnesses a hybrid algorithm that is necessarily a combination of morphological analysis, dictionary lookup and Levenstein Distance algorithm.
JHippo primarily hosted on https://edge.launchpad.net/jhippo , and is cHippo Reprogrammed in Java using the pircbot api, the same goals for cHippo are in mind with this project, a modular irc bot with built in scripting functionality.
weka outlier is an implementation of outlier detection algorithms for WEKA.
CODB (Class Outliers: Distance-Based) Algorithm is the first algorithm developed using WEKA framework.
Maui is a multi-purpose automatic topic indexing algorithm. Given a document, Maui automatically identifies its topics. Depending on the task topics are tags, keywords, keyphrases, vocabulary terms, descriptors or Wikipedia titles.
If you need to protect your confidential files in office or shared desktops, here is the robust command line and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.
A small program written in java which helps you to manage your passwords in a secure way. Stores all your passwords so you only have to remember one single master password. You can create multiple profiles. 128 or 256 bit AES encryption.
This is the extended euclidean algorithm implemented in haskell.
It will put every single step of the algorithm in a file and show the actual result and everything in between.
This project is use full for student , project is developed by means of java swing ,here the cpu is stimulated by means of how it handles the multiple process at a time by means of different scheduling technique like FCFS,SJF,PSJF,RR etc.