Showing 9 open source projects for "java examples"

View related business solutions
  • B2i offers full-service IR websites, widgets and plugins Icon
    B2i offers full-service IR websites, widgets and plugins

    Built for IR professionals who work for, or support public companies

    B2i Technologies provides the most robust and versatile tools to manage your Corporate website, Investor Relations website and email communications. Our Investor Relations Software solutions work through automation and implements into existing systems with ease in only a few steps. Our solutions not only help you stay compliant but save valuable time while reporting and delivering critical financial data and press release activities to investors. B2i's Investor Relations Solution provides highly reliable and customizable data for corporate websites including press releases, stock data, charting, and SEC filings within SOX compliance standards. Our investor relations software displays real-time data on your website without requiring additional work on your behalf. Once you have completed your filings and press releases they are automatically loaded onto your website and formatted for easy access.
    Learn More
  • Managed Cybersecurity Platform Built for MSPs Icon
    Managed Cybersecurity Platform Built for MSPs

    Discover the cyber platform that secures and insures SMEs

    In a world that lives and breathes all things digital, every business is at risk. Cybersecurity has become a major problem for small and growing businesses due to limited budgets, resources, time, and training. Hackers are leveraging these vulnerabilities, and most of the existing cybersecurity solutions on the market are too cumbersome, too complicated, and far too costly.
    Learn More
  • 1

    polynomial-roots-calculation

    Application for calculating the real roots of a polynomial

    Application for polynomial roots calculation. The application does the job by supposing the roots of the derivative function are known. This way, we can delimit the range where each possible root is in, and by applying Bolzano's theorem, we can find the zeroes. It is not a very eficient way, as we must calculate al the derivatives of the polinomial, implying very high numbers (n!), that make the needed precision increase, making the computational complexity for high-degree polinomials...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Numerics for Chemical Engineering

    Numerics for Chemical Engineering

    Numerical models for chemical and process engineering

    NCE Calculation Framework is a library of routines, models and data applicable to chemical and process engineering calculations, written in Java. -- NEW -- www.chesolver.com *ONLINE CALCULATORS*. A set of solvers to perform calculations consistently on any device, from smart-phone to desktop. The project includes the following ready to use software all based on the same core library: * Online Calculators at www.chesolver.com * Extensions for Libreoffice/Openoffice Calc...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    GLPK for Windows

    GLPK for Windows

    Windows binaries for the GNU Linear Programming Kit (GLPK)

    GLPK 4.65 (GNU Linear Programming Kit, http://www.gnu.org/software/glpk/) is a solver for large-scale linear programming (LP), and mixed integer programming (MIP). This project supplies the most recent Windows executables - 2018-03-17. Linux and OSX users should download the source distribution from http://ftp.gnu.org/gnu/glpk
    Leader badge
    Downloads: 319 This Week
    Last Update:
    See Project
  • 4
    JBernstein

    JBernstein

    JBernstein: Exploration techniques for non-linear constraint checking

    ...Concerning performance, the tool enables to check all examples in the PVS Bernstein testsuite within a second, which can be an order of magnitude faster than some other tools such as QEPCAD or REDLOG. Although JBernstein uses double, it offers automatic error-estimation capabilities (experimental) so that the generated result is correct (the solver may return unknown when the error-estimate is too large)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Powering the next decade of business messaging | Twilio MessagingX Icon
    Powering the next decade of business messaging | Twilio MessagingX

    For organizations interested programmable APIs built on a scalable business messaging platform

    Build unique experiences across SMS, MMS, Facebook Messenger, and WhatsApp – with our unified messaging APIs.
    Learn More
  • 5
    Seems to be closely related to Cellular automaton, except this creates a complex pattern from a mathematical function you input. See website for examples/live applets. This program makes use of an old GPL version of the JEP equation parser.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Graph polynomials and view prime numbers on a ulam spiral graphing plot. Only integer numbers. Based on an old GPL version of the JEP equation parser. See website for additional examples/live applets Seems to be closely related to Cellular automaton.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    To help math students visualize the prufer code and/or discover anything new about the prufer code not already present. Examples and live applet on webiste.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A tool for people interested in Special Relativity. Can introduce you to some basics, as the transformations and the 4-vectors. Examples, illustrations and some exercises will be included. With some time, effort, and space on the desk, you can master it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    An Java artificial intelligence platform comprising common AI tools (neural networks, genetic algorithms, wavelets, etc...) and examples. The platform focuses on ease of use and ease of integration..
    Downloads: 0 This Week
    Last Update:
    See Project
  • DriveStrike: Remote Wipe | Data Breach Protection Icon
    DriveStrike: Remote Wipe | Data Breach Protection

    . From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.

    DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB