Showing 47 open source projects for "image analysis algorithm"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 1
    Imagen - Pytorch

    Imagen - Pytorch

    Implementation of Imagen, Google's Text-to-Image Neural Network

    Implementation of Imagen, Google's Text-to-Image Neural Network that beats DALL-E2, in Pytorch. It is the new SOTA for text-to-image synthesis. Architecturally, it is actually much simpler than DALL-E2. It consists of a cascading DDPM conditioned on text embeddings from a large pre-trained T5 model (attention network). It also contains dynamic clipping for improved classifier-free guidance, noise level conditioning, and a memory-efficient unit design. It appears neither CLIP nor prior...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    UDP Image Uploader

    UDP Image Uploader

    UDP Image Uploader with Serpent Encryption Algorithm in CBC Mode

    Easily transfer an encrypted image from your PC to the display connected to the microcontroller via Wi-Fi using the UDP protocol. *Improved version is available at https://sourceforge.net/projects/esl-management-system/ User guide is available at https://medium.com/@Northstrix/how-to-stream-encrypted-images-over-udp-71f5e2ab1b0c * Credit for photo: https://www.pexels.com/photo/bird-s-eye-view-of-city-during-daytime-2815170/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    FractalImageCompression

    FractalImageCompression

    Java Fractal Image Compression based on Delaunay triangulation

    Implementation of the algorithm of the paper: "Fractal image compression based on Delaunay triangulation and vector quantization" It is a Fractal compression algorithm, based on relationships between regions of the image (in this case triangles), rather than in explicitly the pixel values themselves. Video demo: https://frojasg1.com:8443/resource_counter/resourceCounter?
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    LittleFancyTool

    supports RS232/485/Modbus, sockets, text enc/dec (multi-alg) and so on

    This small tool, built with WinForm and Ant Design UI, supports RS232, RS485, and Modbus serial communication debugging, socket communication capabilities, multi-algorithm text encryption/decryption, image/text Base64 conversion, and asynchronous multi-threaded file encryption/decryption.
    Downloads: 3 This Week
    Last Update:
    See Project
  • AI-powered conversation intelligence software Icon
    AI-powered conversation intelligence software

    Unlock call analytics that provide actionable insights with our call tracking software, empowering you to identify what's working and what's not.

    Every customer interaction is vital to your business success and revenue growth. With Jiminny’s AI-powered conversation intelligence software, we take recording, capturing, and meticulous analysis of call recordings to the next level. Unlock call analytics that provide actionable insights with our call tracking software, empowering you to identify what's working and what's not. Seamlessly support your biggest objectives across the entire business landscape with our innovative call tracking system.
    Learn More
  • 5
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    ...The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.
    Leader badge
    Downloads: 197 This Week
    Last Update:
    See Project
  • 6
    Process Monitor

    Process Monitor

    Advanced monitoring tool for Windows

    Process Monitor is an advanced Windows monitoring tool that provides real-time visibility into file system, Registry, and process/thread activity. It merges the capabilities of the older Filemon and Regmon utilities while adding powerful enhancements like non-destructive filtering and detailed event properties. Users can capture comprehensive data including session IDs, user names, thread stacks, and process details such as image paths and command lines. The tool supports highly configurable...
    Downloads: 136 This Week
    Last Update:
    See Project
  • 7
    Penguins' eggs

    Penguins' eggs

    On the road of Remastersys, Refracta, Systemback and father Knoppix!

    penguins-eggs is a console tool, under continuous development, that allows you to remaster your system and redistribute it as live images on usb sticks or via PXE, work on amd64, i386 and ARM64.
    Leader badge
    Downloads: 99 This Week
    Last Update:
    See Project
  • 8
    DocWire SDK

    DocWire SDK

    Award-winning modern data processing SDK in C++20

    DocWire SDK, a standout C++20AI driven data processing tool, has received award from SourceForge and strong backing from Microsoft. It handles nearly 100 file types, empowering efficient text extraction, web data extraction, and document analysis. For businesses, the shift to DocWire SDK signifies a leap forward. It promises comprehensive document format support and the ability to extract valuable insights from email boxes, databases, and websites using cutting-edge AI. DocWire SDK aims to...
    Leader badge
    Downloads: 9 This Week
    Last Update:
    See Project
  • 9
    RY GeoIP 3

    RY GeoIP 3

    User-friendly network & geolocation tools, APIs integration and more!

    RY GeoIP 3 is a powerful application that combines network and geolocation tools for comprehensive analysis. With its user-friendly interface and integration with Google Maps API and API Ninja DNS Lookups service, you can perform a wide range of operations, from geolocation lookups and ping tests to DNS analysis, traceroute, SSL certificate inspection, header data retrieval, and open port scanning. The ability to save data as PDFs and maps as images further enhances the utility of the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Lightspeed golf course management software Icon
    Lightspeed golf course management software

    Lightspeed Golf is all-in-one golf course management software to help courses simplify operations, drive revenue and deliver amazing golf experiences.

    From tee sheet management, point of sale and payment processing to marketing, automation, reporting and more—Lightspeed is built for the pro shop, restaurant, back office, beverage cart and beyond.
    Learn More
  • 10
    Common Resource Grep - crgrep

    Common Resource Grep - crgrep

    Common Resource Grep

    CRGREP searches for matching text in databases, various document formats, archives and other difficult to access resources. A command line tool for name and content text matching in database tables, plain files, MS Office documents, PDF, archives, MP3 audio, image meta-data, scanned documents, maven dependencies and web resources. CRGREP will search resources within resources of any arbitrary combination or depth, so text within a document within a zip archive, and so on. Here you...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    GXSM

    GXSM

    Scanning Probe Microscopy Controller and Data Visualization Software

    GXSM -- Gnome X Scanning Microscopy: A multi-channel image and vector-probe data acquisition and visualization system designed for SPM techniques (STM,AFM..), but also SPA-LEED/LEED/LEEM data analysis. A plug-in interface allows any user add-on data-processing and special hardware and instrument support. Latest: NC-AFM and related explorative methods as SQDM can be configured. High-Speed external PAC-PLL hardware option with digital DSP link.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12

    Dolphin Data Recovery Assistant Pro

    one software-only data recovery assisting tool

    ...All data recovery engineers can purchase Dolphin Data Recovery Assistant Pro., download the latest software, install it, activate it and then get it working immediately for your data recovery success! Dolphin Data Recovery Assistant Pro. contains 6 modules: 01: Invalid Files; 02: Extension; 03: N.S Image; 04: 2258XT; 05: Database Repair; 06: Raid Analysis; 07: File Rename. Each module is very helpful for data recovery success! Free to use for the first two months!Full Functions, Try it now! More info here->https://www.dolphindatalab.com/product/dolphin-data-recovery-assistant-pro/
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    dupeGuru

    dupeGuru

    Find duplicate files

    dupeGuru is a cross-platform GUI application written in Python (with Qt/Cocoa UI) that quickly detects duplicate files on your computer using flexible scanning modes—including filename fuzzy matching, content comparison, and specialized Music/Picture modes. On some linux systems pyrcc5 is not put on the path when installing python3-pyqt5, this will cause some issues with the resource files (and icons). These systems should have a respective pyqt5-dev-tools package, which should also be...
    Downloads: 91 This Week
    Last Update:
    See Project
  • 14
    Crunch

    Crunch

    Insane(ly slow but wicked good) PNG image optimization

    Crunch is an image compression tool for lossy PNG image file optimization. Using a combination of selective bit depth, color palette reduction and color type, as well as zopfli DEFLATE compression algorithm encoding that employs the pngquant and zopflipng PNG optimization tools, Crunch is effectively able to optimize and compress images with minimal decrease in image quality.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15

    Screen Capture Image Text App Launcher

    Run defined applications by detecting text in a captured screenshot

    This application requires the "TESSERACT" OCR engine to decode text in a captured screenshot. The text file can be analysed to look for specific trigger words which will run a defined application. TESSERACT OCR is available for Windows users here: https://digi.bib.uni-mannheim.de/tesseract/ Information on its use is generally available, this medium post provides an overview: https://medium.com/quantrium-tech/installing-and-using-tesseract-4-on-windows-10-4f7930313f82 During the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    BerryNet

    BerryNet

    Deep learning gateway on Raspberry Pi and other edge devices

    This project turns edge devices such as Raspberry Pi into an intelligent gateway with deep learning running on it. No internet connection is required, everything is done locally on the edge device itself. Further, multiple edge devices can create a distributed AIoT network. At DT42, we believe that bringing deep learning to edge devices is the trend towards the future. It not only saves costs of data transmission and storage but also makes devices able to respond according to the events...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    DeepCluster

    DeepCluster

    Deep Clustering for Unsupervised Learning of Visual Features

    DeepCluster is a classic self-supervised clustering-based representation learning algorithm that iteratively groups image features and uses the cluster assignments as pseudo-labels to train the network. In each round, features produced by the network are clustered (e.g. k-means), and the cluster IDs become supervision targets in the next epoch, encouraging the model to refine its representation to better separate semantic groups.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    CAELinux

    CAELinux

    Dedicated to computer-aided engineering Linux distribution

    CAELinux is an installable live (USB) Linux distribution dedicated to open source engineering with a focus on Computer Aided Engineering and Scientific Computing. Based on Ubuntu, it features a ready to use workstation environment for open source product development, makers and scientist with many CAD/CAM/CAE applications for mechanical design, stress analysis, heat transfer, flow simulation and CNC manufacturing / 3D printing as well as electronic design tools and a complete development...
    Leader badge
    Downloads: 216 This Week
    Last Update:
    See Project
  • 19
    Fiwix

    Fiwix

    A UNIX-like kernel for the i386 architecture

    FiwixOS 3 is a Fiwix distribution, an operating system made from a software collection that is based upon the Fiwix kernel. It basically comprises a Fiwix kernel, GNU tools, libraries and additional software. All the included software is free and open-source software made available both as compiled binaries and in source code form, which allows modifications to the original software. FiwixOS 3 uses the Newlib v3.1.0 as its C standard library, and the Ext2 as its primary file...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    NiceHash Miner

    NiceHash Miner

    NiceHash easy to use CPU & GPU miner

    ...NiceHash Miner is essentially the only tool a miner needs. No need to go through tons of configuration files, various mining software versions, configuration tuning or cryptocurrency coins market analysis. Auto-tuning for best performance and efficiency, automatic selection and runtime automatic switching to most profitable cryptocurrency algorithm are all integrated into NiceHash Miner and will enable you seamless, joyful and profitable mining experience.
    Downloads: 23 This Week
    Last Update:
    See Project
  • 21
    Eye

    Eye

    Process monitoring tool. Inspired from Bluepill and God

    Process monitoring tool. Inspired from Bluepill and God. Requires Ruby(MRI) >= 1.9.3-p194. Uses Celluloid and Celluloid::IO. Eye is an image processing and analysis library for quickly analyzing image patterns and features, often used in computer vision tasks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    corrupt

    This program corrupts a unix stream at a specified error rate

    This program intentionally corrupts a unix stream at a specified error rate. It is for systematic analysis on the effects of data corruption. I wrote it to simulate bit-rot in file archives so I could test RAID and archive strategies for data recovery. A few short bash scripts are included so you can instantly enjoy text, image, audio, and video corruption. Just drop in your own data files called test.jpg, test.mp3, and test.mp4 and run the scripts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    thinkpad-ec

    thinkpad-ec

    Infrastructure for examining and patching Thinkpad embedded controller

    thinkpad-ec is a community effort to study and patch the embedded controller (EC) firmware used in certain classic Lenovo ThinkPad models. The EC is a tiny microcontroller that governs low-level features such as keyboard scan codes, fan behavior, battery checks, and thermal policies—things the operating system can’t normally change. This project documents the EC’s layout and provides tooling to extract, analyze, and modify EC images so users can apply specific fixes or enhancements. Common...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24

    vtrunkd

    Network link bonding/trunking/aggregation and multichannel VPN daemon

    vtrunkd - network link bonding and multichannel VPN. Vtrunkd is a Linux VPN daemon used to combine several connection paths into one aggregated channel. Features latency, reordering and jitter management, behaviour analysis optimizations for encapsulated protocols, bufferbloat control, packet redundancy, and multiple cpu cores utilization. Up to 30 heterogenous links bonding supported. Used for live streaming, LTE/3G/Wi-Fi link bonding. 32/64-bit, x86, MIPS and ARM supported. Supports python...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    RadicalSpam Virtual Appliance

    RadicalSpam Virtual Appliance

    Virtual Appliance of RadicalSpam

    RadicalSpam Virtual Appliance takes full solution of RadicalSpam Community Edition , pre-installed in a OVF virtual machine ( Open Virtual Format ) compatible with the best virtualization platforms on the market , including VMware ESX Server. More information : http://www.radical-spam.org
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next