Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Start Free Trial
Try Google Cloud Risk-Free With $300 in Credit
No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
3-layer neural network for regression and classification with sigmoid activation function and command line interface similar to LibSVM.
Quick Start: "java -jar nen.jar"
The objective of this project is to make available an open-source of a gridified version of the Multifactor Dimensionality Reduction (MDR) software (http://www.epistasis.org/software.html).
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.
Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
The aim of ALIVE is to develop new approaches to the engineering of flexible, adaptable distributed service-oriented systems based on the adaptation of social coordination and organisation mechanisms.
Text annotation application (Tapp) is a stand alone software component that facilitates the quick annotation of text files for the purpose of creating labelled data for training, testing, and deploying machine learning models
Optex Analyzer is a software to analyze and compare algorithms to solve approximately optimization problems. It has a GUI that allows select a set of input files containing raw algorithm results. The analysis is shown with tables and charts.
Program to performing the complete cycle of neural networks analysis: preparing data, choosing neural network (CasCor, MP, LogRegression, PNN), learning of network, monitoring learning state, ROC-analysis, optimization of network parameters using GA.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Este projeto objetiva a criação de um Toolbox para utilização de algoritmos de Computação Bioinspirada. O Toobox oferece uma vasta coleção de algoritmos de ferramentas para o projeto de Algoritmos Genéticos e Redes Neurais.
A java tool for anytime and interactive sequence mining. Aims at providing users with a way of analyzing her activity traces and extract activity schemes from them.
Neuroph OCR - Handwriting Recognition is developed to recognize hand written letter and characters. It's engine derived's from the Java Neural Network Framework - Neuroph and as such it can be used as a standalone project or a Neuroph plug in.
Extensible framework that enables productive design, analysis, and execution of arbitrary-sized neural-networks or system on a distributed, scalable, high-throughput runtime platform. Enables synapse-oriented-programming.
Blunder is an automated tool for analyzing chained exceptions in Java. It's usefull for classify, generate a customized error message and a list for possible solutions.
Supertagging is a process of statistical lexical disambiguation, preprocessing step to parsing, which assigns LTAG tree categories to the lexical items present in the input sentence. Thus, if the input sentence is in the form of a dependency tree, the task of the supertagger is to assign the most probable TAG family to each node and edge in the dependency tree.