Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Picsart Enterprise Background Removal API for Stunning eCommerce Visuals
Instantly remove the background from your images in just one click.
With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
Hermes FTP Server is a free, cross-platform FTP server adhering to RFC 959, RFC 2228, and RFC 2389. It is being developed in Java with a strong focus on security and extensibility.
Figaro's Password Manager (FPM) is a GNOME application that allows you to securely store & categorize your passwords, which are encrypted using the blowfish algorithm. It can launch applications using the host names, user names, and passwords you supply.
Pseudo Random Number Generator (PRNG) frontend using libtomcrypt. It simply writes pseudorandom data (using sober-128, fortuna, yarrow or rc4 algorithm) on standard output. The output may be encoded to base64, base85 or hex or just left binary.
Turn Your Content into Interactive Magic - For Free
From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.
Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
A discretization algorithm based on the Minimum Description Length. Implemented as a filter according to the standards and interfaces of WEKA, the Java API for Machine Learning. More Info: http://bruno-wp.blogspot.com/search/label/Software
JPowerGraph is a Java library for creating directed graphs for both Swing and SWT. It supports graph movement, selection, context menus, tooltips and dynamic edge creation. JPowerGraph has a spring layout algorithm based on that used in TouchGraph.
A small application which should be a notepad for your desktop, you can put new notes in a list and there are special features like encryption for private notes oder a bookmarkmanager and some other features
XinDiff is a diff utility implementing WinDiff like GUI by an improved LCS algorithm. The key feature in addition to WinDiff is in-place comments for code review.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.
Encryption plugin for Alfresco. Enables the user to crypt and decrypt (it handles the 'pkcs5' MIME-type). This is a component of the IDX-eDOC project (OpenTrust suite), contributed by IDEALX
Tools and documentations for algorithm competitions. 1) Luvlipse Eclipse plugin, providing the quick fixes which helps Java coding in program contest such as TopCoder. 2) documentations about algorithm competitions.
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryptionalgorithm can be proven to be unbreakable.
stores a free text field strongly encrypted on a cell-phone or PDA using AES encryption with 256 bit -- can be used for storing passwords, pins and other sensitive data
Proposed is an algorithm
that uses computer vision, combined with a modified Rubine classifier, to allow
arbitrary N-sided polygons as accepted sketches in real-time.
Random Forest classification implementation in Java based on Breiman's algorithm (2001). It assumes the data is in the form [ X_1, X_2, . . ., X_M, Y ] where Y \in {0, 1, . . ., C}. The user must define M, C, and m initially.
The simpliZia-program implements the simplex-algorithm and is designed to help students of Operations Research to understand and learn the algorithm. This is a german project, source and program are actually written in german.
JFish is a simple Java implementation of the popular Twofish cryptography algorithm. It allows any application to easily implement powerful encryption, using a single small library and minimal code changes.
JRijndael is a 100% pure Java implementation of the popular Rijndael (aka AES) cryptography algorithm. It's designed to be implemented as easily as possible and features ECB, padding, and a simple API.
JSerpent is an easy to use Java implementation of the powerful Serpent cryptography algorithm. It can be easily implemented into any project, and is complete with ECB, padding, and a simple API.