Search Results for "ns2 code with algorithm" - Page 5

109 projects for "ns2 code with algorithm" with 1 filter applied:

  • anny is an all-in-one platform for managing hybrid workplaces and shared resources. Icon
    anny is an all-in-one platform for managing hybrid workplaces and shared resources.

    For Businesses looking for a flexible solution for internal and external bookings

    Enable your employees to easily book desks, meeting rooms, parking spots, equipment, and more – all in one place. With flexible rules and group permissions, you stay in full control of who can access what.
    Learn More
  • GWI: On-demand Consumer Research Icon
    GWI: On-demand Consumer Research

    For marketing agencies and media organizations requiring a solution to get consumer insights

    Need easy access to consumer insights? Our intuitive platform is the answer. Get the ultra-reliable research that brands and agencies need to stay ahead of changing consumer behavior.
    Learn More
  • 1
    Molevolve is a Java library for running a Genetic Algorithm to model the 3-dimensional structures of peptide chains from amino-acid sequences. Client code can specify its own peptide chain model, fitness functions and GA operations. Requires JDK 1.5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    JEQ is class library written in pure Java. It implements the infinite impulse response (IIR) algorithm for bandpass filtering of sound stream. So, it represents a backend code for stereo 10/15/25/31-band equalizer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    We, the people from #algos@freenode are a community of programmers discussing general/explicit algorithms to improve our knowledges - We also organise general programming contests called "Open Code Hacks", and those results (and others) are released here.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Butterfly XML Editor is an IDE built on top of a new real-time incremental XML parsing algorithm. The editor features syntax and error highlighting, incremental validation, code completion, XSLT pipelines, and side by side DOM and source viewing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Caller ID Reputation provides the most comprehensive view of your caller ID scores across all carriers Icon
    Caller ID Reputation provides the most comprehensive view of your caller ID scores across all carriers

    Instantly identify flagged caller IDs and decrease flags by up to 95% your first month.

    Keep your agents on the phone with increased connection rates by monitoring your phone number reputation across all major carriers and call blocking apps.
    Learn More
  • 5
    Python Trust Metrics. Implementation of Ford-Faulkersson Maximum Flow algorithm and mod_virgule's Trust Metrics code, in python
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Firefly's Clean Lzo

    A human-readable ISC-Licensed implementation of the LZO1X algorithm.

    ...The main problem with LZO is that it is absolutely not human readable. People have done crazy stuff to get LZO to run in their language. Usually it implies inline assembly or trying to execute data which actually contains machine code. This is sick. Whoever is responsible for this sorry situation ought to be ashamed. So I'm going to deobfuscate LZO and provide a ISC implementation of this algorithm in Python and C. In addition, I will provide a textual description of the algorithm so that it can be easily ported to any programming language. I expect a severe performance degradation, but I leave optimizing for speed to other people.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    using simple cuboids and gjk algorithm, this general purpose algorithm gives a ready made code to work with swissranger 3D camera.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Fast-Fourier-Transform-based number theory code to test Mersenne numbers for primality using the Lucas-Lehmer test and the Crandall-Fagin irrational-base discrete weighted transform (IBDWT) algorithm (Math. Computation 62 (205), pp.305-324, January 1994)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Quick-Safe

    Quick-Safe

    Generate strong and secure passwords with QuickSafe ,

    QuickSafe is an open-source password generator designed to bolster online security by generating robust and secure passwords. This project addresses the growing need for enhanced password strength in the face of escalating cyber threats. QuickSafe empowers users to create highly secure passwords through a diverse character set, including uppercase and lowercase letters, numbers, symbols, and more. With the increasing frequency of online security breaches, having a reliable password generator...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Endpoint Protection Software for Businesses | HYPERSECURE Icon
    Endpoint Protection Software for Businesses | HYPERSECURE

    DriveLock protects systems, data, end devices from data loss and misuse.

    The HYPERSECURE endpoint protection platform is a comprehensive suite of products and services enhanced by European third-party solutions. It ensures our customers’ IT security, regulatory compliance, and digital sovereignty.
    Learn More
MongoDB Logo MongoDB