Showing 3 open source projects for "pseudo code"

View related business solutions
  • Office Ally: Healthcare Software for Your Medical Practice Icon
    Office Ally: Healthcare Software for Your Medical Practice

    We support healthcare organizations of all sizes with easy-to-use, affordable software solutions.

    Service Center by Office Ally is a trusted revenue cycle management platform used by over 65,000 healthcare organizations processing more than 350 million claims annually. With it, providers can verify patient eligibility and benefits, upload and submit claims, correct rejected claims, check claim status, and obtain remits. With multiple claim types and submission options, providers can easily submit claims to any payer from any practice management system. Transactions are secure, ensuring the confidentiality of sensitive patient information. With no needed implementation, providers can quickly and effortlessly streamline their billing processes, increase their financial performance, simplify medical billing, and reduce claim rejections for faster reimbursements.
    Learn More
  • Caller ID Reputation provides the most comprehensive view of your caller ID scores across all carriers Icon
    Caller ID Reputation provides the most comprehensive view of your caller ID scores across all carriers

    Instantly identify flagged caller IDs and decrease flags by up to 95% your first month.

    Keep your agents on the phone with increased connection rates by monitoring your phone number reputation across all major carriers and call blocking apps.
    Learn More
  • 1
    DeepCluster

    DeepCluster

    Deep Clustering for Unsupervised Learning of Visual Features

    ...DeepCluster was one of the early successes in unsupervised visual feature learning, demonstrating that clustering-based reformulation can rival supervised baselines for many downstream tasks. The repository includes code for feature extraction, clustering, training loops, and evaluation benchmarks like linear probes. Because of its simplicity and modular design, DeepCluster has inspired many later methods.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Gutmann Algorithm Secure File Deletion

    Using Gutmann method for securely deleting files in Windows.

    Gutmann method uses 35 passes over the region to be deleted, 8 of them are Pseudo-random. Considered by some to be highly effective for preventing file recovery. Requires .NET Framework 4.0 --- Systems & Safety Establishment https://sarab.me Source Code available in c# with comments. Reference: http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3

    AppInventor on a VM or Flash Drive

    AppInventor Personal Private Server on Linux VM or Flash Drive

    ...Two flavors are iincluded: Vmware Virtual Machine and a Bootable Flash Drive image. Google Appinventor is a graphical blocks based development environment for Android devices. Google ended the their support of the project and released the code to MIT for educations support. MIT periodically releases JAR files in a pseudo open project. This self contained project used unmodified MIT jars. The project allows a users to develop, save and build a running application that can be downloaded to the phone, shared with others and potentially modified to place in the Google Market / Play service. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB