Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Picsart Enterprise Background Removal API for Stunning eCommerce Visuals
Instantly remove the background from your images in just one click.
With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
A Gtkmm Othello-like game that supports one player ( with both random move selection and genetic algorithm based selection), two players, and network play.
PHP based Authentication code that makes HTML pages secure by authenticating users agianst a MySQL database. Uses a MD5 algorithm session id to futher secure a session.
UbWator II is an artificial life simulation inspired by A. K. Dewdney, in his "Computer Recreations" article in the December, 1984 issue of Scientific American.
Moreover we are going to add some genetic algorithm.
We start from an existing Delphi prog
RL-POMDP is a Reinforcement Learning (RL) based algorithm to find approximate and satisfactory solution to POMDP problems. RL-POMDP is orders of magnitude faster than exact POMDP solver.
Find the pitch of a power spectrum (signal) as per the afferent/efferent neural crossover. This occurs between the Lateral olivocochlear efferents and the inner hair cell afferents.
The Athlete is a virtual robot living in the ODE (Open Dynamics Engine)world. An evolution algorithm is implemented based on the DR-EA-M to optimize its performances. This involves a Genetic algorithm, network of neurons and morphology. All is in java.
This program is based on a algorithm that solves a Master Mind combination.
The algo seems to work but without hole and with 5 different colors in an atempt.
Turn Your Content into Interactive Magic - For Free
From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.
Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
Simulated annealing package written in Java using simplex downhill algorithm from Numerical Recipies in C++/FORTRAN/C
It is intended for use "behind the scenes" in applications, and it is optimised for ease of integration.
Completely standalone,
jui is a tool for creating Java GUI layout components. It has a powerful but simple layout algorithm and support for the Swing look and feel guidelines.
A fast, simple method of establishing musical genre of arbitrary compressed audio files calculated by comparisons with training sets. Program currently consists of a java console program. GUI front end, algorithm upgrades to come.
I needed a library of functions that enabled me to perform hash
functions and symmetric cryptography. I chose MD5 initially but
eventually chose SHA as the hashing algorithm due to concerns regarding
the \'collision resistance\' of MD5 due to weakne
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
'Einsatz' is a free Java based application to plan medical services. Using the 'Maurer Algorithm' it calculates the staff and equipment you need for services like sporting events or concerts.
This project comprises a collection of libraries and applications for the field of program analysis. The starting point is a type analysis for Java programs using Agesen's Cartesian Product Algorithm.
MAGMA: Multiobjective Analyzer for Genetic Marker Acquisition
A genetic algorithm for generating SNP tiling paths from a large SNP database
based on the competing objectives of cost (number of SNPs) and coverage (haplotype blocks):
Hubley R., Zitzler
Two Dimensional NOesy simulation (TDN) implementents an algorithm that creates a time-domain 2D NOesy spectrum. TDN does not calculated the nOe peak intensities, Therefore, you will need the CORMA (Complete nuclear Overhauser Relaxation Matrices).
This toolbox is designed to make implementations of voting systems freely available in Java. It will initially have software for Single Transferrable vote (Meek algorithm), but others may be included.
This is an academic project.
A library and a sample program will be developed, that will implement the Burrows-Wheeler compression algorithm, using C++ and templates.
This is the same algorithm for BZip.
A Java library for validation of credit cards. Implements the Luhn Algorithm to ensure the card number is well formed, checks card type prefix's and length. The rules are stored in a text file allowing new cards to be added without changing the source
OpenLabel is a label placement tool and decluttering algorithm for OpenMap. Labels are placed in full conformance with applicable cartographic specifications and conventions - without overlap or ambiguity.