Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
Download Chrome
Gen AI apps are built with MongoDB Atlas
Build gen AI apps with an all-in-one modern database: MongoDB Atlas
MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
TaxonFinder is an application that annotates taxon found in literature. The application harnesses a hybrid algorithm that is necessarily a combination of morphological analysis, dictionary lookup and Levenstein Distance algorithm.
JHippo primarily hosted on https://edge.launchpad.net/jhippo , and is cHippo Reprogrammed in Java using the pircbot api, the same goals for cHippo are in mind with this project, a modular irc bot with built in scripting functionality.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
weka outlier is an implementation of outlier detection algorithms for WEKA.
CODB (Class Outliers: Distance-Based) Algorithm is the first algorithm developed using WEKA framework.
DazioAES is a password manager: it's an application protected by a single password that stores multiple other password or informations in an encrypted way. It uses Bouncycastle crypto library (classes from) and their AES encryption implementation.
A small program written in java which helps you to manage your passwords in a secure way. Stores all your passwords so you only have to remember one single master password. You can create multiple profiles. 128 or 256 bit AES encryption.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Maui is a multi-purpose automatic topic indexing algorithm. Given a document, Maui automatically identifies its topics. Depending on the task topics are tags, keywords, keyphrases, vocabulary terms, descriptors or Wikipedia titles.
This project is use full for student , project is developed by means of java swing ,here the cpu is stimulated by means of how it handles the multiple process at a time by means of different scheduling technique like FCFS,SJF,PSJF,RR etc.
Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
Marc's Awesome Name Generator is a Java based library to allow the easy and fast generation of random first, middle and last names based on user-definded criteria, such as culture of origin or contained letters.
This library provides two operations: one to wrap key data, and another to unwrap the key data. This code also includes a fairly comprehensive unit test library which ensures the implementation is verified against the vectors provided in RFC 3394.
This is a reference implementation of snoBAC, a Bayesian Classifier designed to predict box H/ACA snoRNAs in Caenorhabditis nematode genomes. For details of algorithm and data, see Wang and Ruvinsky (2009) RNA in press.
This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
This library implements Josh MacDonalds xdelta binary diff algorithm in java. More information on this algorithm can be found at http://sourceforge.net/projects/xdelta.
Binary diff files are stored using the GDIFF file format for storing binary deltas.
ConTextKit is a Java-based implementation of Wendy Chapman's ConText algorithm for annotating the context of medical documents, specifically the negation, temporality, and experiencer.
...Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryptionalgorithm.
sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
EMURA is a suite of Java applications that allows two users to send encrypted messages back and forth - as a chat. The encryption key is secure and generated using the Diffie-Hellman algorithm. Utilizes GNU-CRYPTO libraries