Showing 1 open source project for "deep learning with python"

View related business solutions
  • The Most Awarded Employee Time Clock Software Icon
    The Most Awarded Employee Time Clock Software

    For businesses who have employees they need to track time, attendance, or schedule.

    Cloud based time clock solution that pre-populates reports for payroll. Employees can punch in on their desktop or mobile devices. Punching in & out is intuitive for your employees & easy for you to view & export time. Employees can clock in using a browser or our Google, iOS, & Android apps. You can view who's working, their GPS position or even limit where they can punch. We integrate with QuickBooks, ADP, Paychex, & SurePayroll while also offering Excel exports. Advanced features such as PTO Accrual Tracking, Punch Rounding, Job Codes, QR Codes, Automatic Breaks, & SSO are all included in our cloud based time clock.
    Learn More
  • Streamline Hiring with Skill Assessments Icon
    Streamline Hiring with Skill Assessments

    Say goodbye to hiring guesswork. Use Canditech’s job simulation tests to assess real-world skills and make data-driven decisions.

    Canditech offers innovative, cheat-proof skill assessments and job simulations to transform your hiring process. From technical skills to soft skills, we help you assess candidates on actual job performance. With over 500 customizable tests and powerful video interview features, you can evaluate real-world capabilities, streamline your hiring, and reduce biases. Whether you’re hiring for remote roles, mass hiring, or looking to expand your diversity pool, Canditech’s data-driven platform ensures the right candidates are chosen for the job every time.
    Get a Free Demo
  • 1
    Cyberbit

    Cyberbit

    Visual Cryptography and Bit-Plane Complexity Segmentation in Python

    Hide secret messages in your pictures! Cyberbit lets you transmit a secret message to an intended person in a new manner. The secret message is an 1-bit deep black & white image. The message can contain written text, a drawing, a secret code etc. Using Visual Cryptography the application splits the secret message into two "shadow images" called <<shares>>. Any of the two shares will be embedded into a "normal" image file called by tradition <<vessel>>. You can use a method of hand to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB