Search Results for "ns2 code with algorithm" - Page 3

Showing 277 open source projects for "ns2 code with algorithm"

View related business solutions
  • Make Recruiting and Onboarding Easy Icon
    Make Recruiting and Onboarding Easy

    Simple, easy-to-use applicant tracking and employee Onboarding system for any sized organization.

    Take away the pain and hassle associated with applicant recruitment, hiring, and onboarding with ApplicantStack. Designed for HR professionals and recruiters, ApplicantStack helps streamline the recruiting and onboarding processes to improve productivity and reduce costs. ApplicantStack provides a complete toolkit that includes tools for posting, launching, and advertising jobs, assessing and managing candidates, collaborating with teams, centralizing information for quick hiring and onboarding, and more.
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 1
    JVerifier An hash code verifier JVerifier is a command line application that verify checksums from a GNU-style file. Source code available on https://github.com/davidesestiliwork/JVerifier2 Usage: param 1: file name, param 2: algorithm, param 3: baseDir Example: java -jar JVerifier2.jar SHA1SUMS SHA-1 /home/davide Note: this program requires GnuPG to work properly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    The Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed environments such as big data and cloud computing, as well as lightweight environments such as IoT devices and mobile devices. LEA is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP) and is the national standard of Republic of Korea (KS X 3246). LEA is included in the ISO/IEC 29192...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    The program allows you to generate the hashes with the chosen algorithm (MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512) of a single file or an entire folder (you can choose to scan the folder recursively or not recursively). It supports drag and drop of files and folders. The hash can be exported to text files. Compiled with openjdk 8. Usage: param 1: exclude symbolic links (0 or 1) [mandatory], param 2: exclude hidden files (0 or 1) [mandatory], param 3: folders to exclude [optional...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    codeforces-go

    codeforces-go

    Solutions to Codeforces by Go

    Golang algorithm competition template library. Due to the complexity of algorithm knowledge points, it is necessary to classify the algorithms you have learned and the questions you have done. An algorithm template should cover the following points. Basic introduction to the algorithm (core idea, complexity, etc.) Reference links or book chapters (good material) Template code (can contain some comments, usage instructions) Template supplements (extra codes in common question types, modeling...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
  • 5

    pwwAutoVision

    Non-standard automated vision software

    The only software that integrates vision and motion, as well as interfaces and reports, is developed with zero code and comes with online debugging. Link:https://pan.baidu.com/s/1vsTptn_pvtbK2sDhWVCZJg code:1234
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    IO91pm

    Command-line calculator for Maidenhead- (QTH-, QRA-) Locators.

    Keywords: Hamradio, Radio-amateurs, Maidenhead-, QTH-, (QRA-), Locator, Distance and Bearing Calculator, GNU/Linux command-line, LaTeX,- UTF-8-, ASCII-output, GPLv3; based on GM4ANB's book. "IO91pm is the Maidenhead-Locator for Maidenhead" ========================================= Background --------------- * For another little project, I wanted a QTH-Locator calculator for the UNIX (GNU/Linux, bash) command-line. * There are many, some very good, online QTH resources, but I wanted...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SimpleDCS
    SimpleDCS is a Distributed Control System made easy - fully configurable both on hardware and a software level. Experimental stage (alpha)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SM3SUM(2)

    SM3SUM(2)

    Command-line GM/T 0004-2012 SM3 Recursive Hashsum Tool

    This new module can be used to compute SM3 message digest of files or memory blocks according to the specification GM/T 004-2012 Cryptographic Hash Algorithm SM3, published by State Encryption Management Bureau, China. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/sm3sum Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    DreamTime

    DreamTime

    Use artificial intelligence to create images

    The easiest-to-use application to create fake images from photos and videos. Available for Windows, Linux, and Mac. By being open-source you can build a version for your operating system. Source code is available and totally free, without premium versions or cracks. More stable than DeepNude and easy to use thanks to its modern design. Create the body of your dreams, increase or decrease the size of the body parts or leave everything to random. Don't just stay with static photos, you can also...
    Downloads: 148 This Week
    Last Update:
    See Project
  • EBizCharge Payment Platform for Accounts Receivable Icon
    EBizCharge Payment Platform for Accounts Receivable

    Getting paid has never been easier.

    Don’t let unpaid invoices limit your business’s growth. EBizCharge plugs directly into the tools your business already uses to speed up payment collection.
  • 10
    JSONCrush

    JSONCrush

    Compress JSON into URL friendly strings

    This simple system allows for excellent compression of uri encoded JSON strings using the JSCrush algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Hyperledger Burrow

    Hyperledger Burrow

    A permissioned Ethereum smart-contract blockchain node

    Hyperledger Burrow is a permissioned Ethereum smart-contract blockchain node. It executes Ethereum EVM and WASM smart contract code (usually written in Solidity) on a permissioned virtual machine. Burrow provides transaction finality and high transaction throughput on a proof-of-stake Tendermint consensus engine. Burrow is a fully-fledged blockchain node and smart contract execution engine -- a distributed database that executes code. Burrow runs Ethereum Virtual Machine (EVM) and Web Assembly...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    MAGeCK

    Model-based Analysis of Genome-wide CRISPR-Cas9 Knockout

    Model-based Analysis of Genome-wide CRISPR-Cas9 Knockout (MAGeCK) is a computational tool to identify important genes from the recent genome-scale CRISPR-Cas9 knockout screens technology. For instructions and documentations, please refer to the wiki page. MAGeCK is developed by Wei Li and Han Xu from Dr. Xiaole Shirley Liu's lab at Dana-Farber Cancer Institute/Harvard School of Public Health, and is maintained by Wei Li lab at Children's National Medical Center. We thank the support from...
    Leader badge
    Downloads: 125 This Week
    Last Update:
    See Project
  • 13

    Jasmine

    Super fast Java aexpression and algorithm evaluator

    V1.0.1 fully compatible with PS2 and 3. Jasmine uses the ASM byte code manipulation library (http://asm.ow2.org/) to create Java byte code to evaluate numerical expressions and algorithms. Evaluation of compiled expressions is very fast, in most cases it is faster than the equivalent byte code produced by the Java compiler (javac).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    playqt

    playqt

    GUI version of ffplay for Windows

    playqt is a Windows GUI version of the well known ffplay program and has been enhanced with Object Detection capabilities. It can process multiple types of media including real time streams. An integrated camera control feature allows control over the camera parameters as well as automatic network configuration and connection. See the README under the files tab for configuration info. Real time object counting is implemented using YOLO detection algorithm. The program can be used...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15

    Generic Hash and HMAC Program

    52 Hash Functions In One Program, plus each with HMAC or KMAC

    ...* can produce output lengths from 1 byte to infinity. V1.5.0 merges shake and the previous xofshake functions, xofshake is no longer a separate algorithm. Indicative performance data are included (V2.0 and later), but no further optimization is intended. V2.1: SHA3 and keccak are now based on the latest code base from their authors.
    Leader badge
    Downloads: 9 This Week
    Last Update:
    See Project
  • 16
    gendasm

    gendasm

    Generic Code-Seeking Diassembler with Fuzzy-Function Analyzer

    GenDasm is a Generic Code-Seeking Diassembler engine. It allows you to enter known starting vectors for a given code image for the micro. It will disassemble the code and follow through branches to assist in the separation of code and data. Its included Fuzzy Function Analyzer companion uses a DNA Sequence Alignment Algorithm to locate similar code in multiple binaries to facilitate reverse-engineering and/or code recovery. The original purpose of the Fuzzy Function Analyzer was to assist...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Cuda Simulated Annealing GPU Route Plan

    Cuda Simulated Annealing GPU Route Plan

    An Optimized GPU-Accelerated Route Planning of Multi-UAV Systems Using

    ... increase the computation performance. Therefore, this study focuses to discuss and solve the route planning problem for multi-UAV systems by using optimization techniques based on an evolutionary algorithm: simulated annealing. The travel cost and execution time are downsized in this work by optimization on algorithm and code. We implemented CPU based parallel solution to compare results with the GPU-accelerated one. The efficiency and the effectiveness of our parallelized and optimized solution
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    KISA Toolkit

    KISA Toolkit

    Korea Internet & Security Agency's Cipher Suite written in Go

    Golang implementation of cryptographic algorithms designed by Republic of Korea. The Korea Internet & Security Agency (KISA) is distributing source codes that you can easily use. South Korean National Standard Algorithms: • LSH Message digest algorithm. 256/512-bit hash value. • ARIA 128-bit Block cipher with 128/192/256-bit keys. • LEA 128-bit Block cipher with 128/192/256-bit keys. • SEED 128-bit Block cipher with 128/256-bit keys. • HIGHT 64-bit Block cipher with 128bit key. Cryptographic...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Algorithmic Pseudocode

    Algorithmic Pseudocode

    This repository contains the pseudocode(pdf) of various algorithms

    This repository contains the pseudo-code of various algorithms and data structures necessary for Interview Preparation and Competitive Coding. The pseudocodes are written such that they can be easily adapted to any language. Let us remove the clutter of language and focus on the core concepts of the question.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    asBezpch

    asBezpch

    Source code for efficiently rendering parametrically defined surfaces

    Source code and generated images from my 1987 master's degree project: An Adaptive Subdivision Algorithm for the Display of Parametrically Defined Surfaces
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    shadowsocks-libev

    shadowsocks-libev

    Bug-fix-only libev port of shadowsocks

    Shadowsocks-libev is a lightweight secured SOCKS5 proxy for embedded devices and low-end boxes. Shadowsocks-libev is written in pure C and depends on libev. It's designed to be a lightweight implementation of shadowsocks protocol, in order to keep the resource usage as low as possible. Snap is the recommended way to install the latest binaries. You can build shadowsocks-libev and all its dependencies by script. The latest shadowsocks-libev has provided a redir mode. You can configure your...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    ML.NET Samples

    ML.NET Samples

    Samples for ML.NET, an open source and cross-platform machine learning

    ..." model and the code for running it will be generated for you. The ML.NET CLI (command-line interface) is a tool you can run on any command prompt (Windows, Mac or Linux) for generating good quality ML.NET models based on training datasets you provide. In addition, it also generates sample C# code to run/score that model plus the C# code that was used to create/train it so you can research what algorithm and settings it is using.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    AmPEP and AxPEP

    AmPEP and AxPEP

    Sequence-based Antimicrobial Peptide Prediction by Random Forest

    Antimicrobial peptides (AMPs) are promising candidates in the fight against multidrug-resistant pathogens due to its broad range of activities and low toxicity. However, identification of AMPs through wet-lab experiment is still expensive and time consuming. AmPEP is an accurate computational method for AMP prediction using the random forest algorithm. The prediction model is based on the distribution patterns of amino acid properties along the sequence. Our optimal model, AmPEP with 1:3 data...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    clzw

    clzw

    Implementation of LZW compression algorithm in C

    Simple, fast implementation of LZW (Lempel–Ziv–Welch) data compression algorithm in C. - Console encoder/decoder tools - OS independent - Could be used in embedded projects - Works with raw code-stream LZW features: - Hardcoded dictionary size - Variable code size - Code search is performed by hash table and embedded in dictionary linked lists (encoder) - No dynamic memory allocation
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    KCP

    KCP

    A fast and reliable ARQ protocol

    KCP is a fast and reliable protocol that can achieve the transmission effect of a reduction of the average latency by 30% to 40% and reduction of the maximum delay by a factor of three, at the cost of 10% to 20% more bandwidth wasted than TCP. It is implemented by using the pure algorithm, and is not responsible for the sending and receiving of the underlying protocol (such as UDP), requiring the users to define their own transmission mode for the underlying data packet, and provide it to KCP...
    Downloads: 0 This Week
    Last Update:
    See Project