Showing 50 open source projects for "translator algorithm java"

View related business solutions
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • Managed Cybersecurity Platform Built for MSPs Icon
    Managed Cybersecurity Platform Built for MSPs

    Discover the cyber platform that secures and insures SMEs

    In a world that lives and breathes all things digital, every business is at risk. Cybersecurity has become a major problem for small and growing businesses due to limited budgets, resources, time, and training. Hackers are leveraging these vulnerabilities, and most of the existing cybersecurity solutions on the market are too cumbersome, too complicated, and far too costly.
    Learn More
  • 1
    FractalImageCompression

    FractalImageCompression

    Java Fractal Image Compression based on Delaunay triangulation

    Implementation of the algorithm of the paper: "Fractal image compression based on Delaunay triangulation and vector quantization" It is a Fractal compression algorithm, based on relationships between regions of the image (in this case triangles), rather than in explicitly the pixel values themselves. Video...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3

    AcoPath for Java

    Ant Colony Optimization algorithm for the shortest path problem.

    The shortest path problem is solved by many methods. Heuristics offer lower complexity in expense of accuracy. There are many use cases where the lower accuracy is acceptable in return of lower consumption of computing resources. The basic idea of the Ant System is that virtual ants are exploited for finding paths with a specific property, e.g., short distance between physical nodes, in the same way nature guides physical ants.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    Ank Zipper

    Ank Zipper

    A free and easy-to-use password protected file archiver

    Ank Zipper provides you with a lightweight, Java-based application designed to provide security to your documents. Ank Zipper can compress both files and folders and create password-protected archives, in order to prevent unauthorized access to important files. Additionally, it can be used for extracting or simply browsing ZIP files.It includes AES(Advanced Encryption Standard) algorithm to encrypt/decrypt file(s).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • 5
    JBotSim is a multipurpose dynamic network simulator that allows to quickly prototype a distributed algorithm and test its behavior on a set of static or mobile nodes. If mobile, the nodes can be controlled by the mouse or by program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    jDHTUQ
    ATTENTION: For more info and latest version, refer to https://github.com/estigma88/jdhtuq. jDHTUQ is a peer-to-peer DHT system based in Chord algorithm, but built like API to generalize the implementation of peer-to-peer DHT systems. jDHTUQ have two fundamental services , put and get of resource.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Preesm
    PREESM provides a complete framework for fast prototyping. It generates a simulation and an optimized multiprocessor code from graph descriptions of algorithm and architecture. Please visit the project homepage at http://preesm.sourceforge.net.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Recursive Directory Removal

    Recursive Directory Removal

    https://github.com/mhisoft/rdpro
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    MCU Media Server

    MCU Media Server

    SIP Video Multiconference Media Server with WebRTC support.

    REPOSITORY MOVED TO GITHUB!! https://github.com/medooze/media-server Video Multiconference Media Server with WebRTC support. Provide Multiconference and video broadcasting services to any SIP service. Supports VP8, H264, MP4V-ES, H263 and H263P, continuous presence, RTMP flash broadcasting, adhoc conferences, load balancing and administrative WEB interface. JSR309 driver implementation under development. .
    Downloads: 0 This Week
    Last Update:
    See Project
  • ACI Learning: Internal Audit, Cybersecurity, and IT Training Icon
    ACI Learning: Internal Audit, Cybersecurity, and IT Training

    Proven skill building for every aspect of your support or IT team.

    Traditional training doesn't equip employees with the practical skills they need to drive business success. ACI Learning provides hands-on IT and cybersecurity training designed to build real-world, on-the-job skills. Our outcome-based programs empower employees with certification prep, industry-recognized credentials, and flexible learning options. With expert-led video training, labs, and scalable solutions, we help businesses, individuals, governments, and academic institutions develop a skilled workforce, align with business goals, and stay ahead in a rapidly evolving digital world.
    Learn More
  • 10
    MicroZip

    MicroZip

    Create,extract and encrypt ZIP,GZIP,TAR,BZIP2,TAZ files on Java mobile

    MicroZip is a powerful file compression and encryption utility for mobile phones which allows you to create and extract compressed archives in multiple formats and encrypt sensitive information with powerful AES-256 encryption. MicroZip can create and extract ZIP,TAR,TGZ,TBZ2 archives and extract many other formats as JAR,GZ,BZ2,TBZ,WAR,BZIP2,GZIP,Z,TAZ,CBZ etc. MicroZip allows you to extract selected files without extracting the whole ZIP archive. MicroZip also supports encrypted ZIP...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    backdup

    backdup

    BackDup is a Duplicity front-end for MacOS and Linux

    BackDup is a Duplicity (http://duplicity.nongnu.org/) front-end for MacOS and Linux written in Java. Duplicity creates bandwidth-efficient backup using the rsync algorithm. Mac OS users: please install Duplicity via macports (https://www.macports.org/) Linux users: install Duplicity via your package manager as usual.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    ProvErr

    ProvErr

    System Level Statistical Fault Diagnosis using Dependency Model

    Code base moved to: https://github.com/Data-to-Insight-Center/ProvErr A statistical fault diagnosis tool that leverages an application's dependency model to automatically infer an o ending piece of software/system in event of failure
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    SafePassDB

    SafePassDB

    Protect your personal data with SafePassDB.

    ...IMPORTANT: In order to run SafePassDB you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    JBernstein

    JBernstein

    JBernstein: Exploration techniques for non-linear constraint checking

    JBernstein is a tool implemented in Java that enables to check whether a polynomial constraint holds for all variables within their domain. It is mainly used in the verification or synthesis of cyber-physical systems where the system model is nonlinear. The tool also supports specifications in assume-guarantee style. The underlying algorithm is based on a translation to Bernstein polynomials, and several optimization techniques are implemented to ensure efficiency. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    An easy-to-use simulator for decentralized distributed scheduling in Clusters, Grids, and Cloud ecosystem MaGate 2.0 is now available from github! https://github.com/huangye177/magate
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Mouse Rate

    Mouse Rate

    OS independent mouse rate checker written in Java.

    Tiny program written in Java, which provides OS - independent and clean algorithm to measure your mouse rate (mouse latency). Java 7u5 or higher needed to run version 1.1 and lower. Java 7u40 or higher needed to run version 1.2 and higher. **Version 1.3 changes - Fixed graphic artefacts appearing while program window is dragged. **Version 1.2 changes - Major code review & cleanup - Mouse watching algorithm optimized - Duplicate cursor statistics calculations removed & rewritten - Automatic focus regain removed - Redundant .exe removed, now there is one jar for every java-supported OS.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 17

    VIM cloud

    Web Based IaaS Cloud Controller (VimCloud)

    This is a pure IaaS cloud controller with all the basic functionality of IaaS Cloud Controller. This uses proposed “Trust Based Scheduling Algorithm and Load Balancing Algorithm”. It uses Cloud Architecture with Trust Management layer. It uses Qemu machine emulator and virtualizer as virtualization software at Host. It uses Libvirt driver [30] to interact with Qemu and to interact with its virtualization capabilities of a range of operating systems. Libvirt provides a common, generic and...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    MapPSO
    MapPSO is a tool for Ontology Alignment, which uses Discrete Particle Swarm Optimisation. A particle swarm is used to search for the optimal alignment. The algorithm is massively parallel and adapts naturally on parallel architectures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Dinapter:

    Generate adaptation contracts between incompatible services

    Dinapter automatically generates a mapping between methods of incompatible components/services based on their public interfaces and behaviors. It uses a combination of expert system and A* algorithm. Dinapter is the prototype resulting from a couple of research papers: * J.A. Martín, E. Pimentel. Automatic Generation of Adaptation Contracts, FOCLASA'08, ENTCS, 2008 - http://goo.gl/21iJZ * J.A. martín, E. Pimentel. Dinapter: Automatic Adapter Specification for Software Composition,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Peters Backup is a program for backing up your important data files on to diskette, zip drive, fixed disk or CD/RW. It uses an extremely efficient compression algorithm. It keeps track of all versions of your files in full and incremental backups.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21
    DASM is a new simple platform which helps programmer to implement and evaluate any distributed algorithm. Programmer can implement his/her distributed algorithm using DASM primitives and monitors the results in diagrams during execution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Implementation of LZW compression/decompression algorithm in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ShredBitz
    ShredBitz is a free and simple file shredder tool that can wipe selected files from any hard disk drive. ShredBitz is written in the java programming language and uses a custom written algorithm for shredding. ShredBitz is a very powerful tool.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Ex-Crawler
    Ex-Crawler is divided into 3 subprojects (Crawler Daemon, distributed gui Client, (web) search engine) which together provide a flexible and powerful search engine supporting distributed computing. More informations: http://ex-crawler.sourceforge.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    aRSync is "Another RSync" and provides a pure java implementation of the rsync algorithm. This implementation is intended to be ready to use for file transfer, to be easy to extend for further use cases and - most important - to become productive.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB