Search Results for "encryption algorithm java" - Page 24

Showing 776 open source projects for "encryption algorithm java"

View related business solutions
  • No-code automation to improve your process workflows Icon
    No-code automation to improve your process workflows

    Pipefy is a digital automation software that centralizes data and standardizes workflows for teams like Finance and HR

    Transform your financial and HR operations and improve efficiency even remotely with digital, customized workflows that your team can automate and integrate with other software without the need of IT development.
    Try For Free
  • Ecwid is a hosted cloud commerce platform used by over 1.5 million merchants and offers the easiest way to add an online store to any website, social site or multiple sites simultaneously. Icon
    Ecwid is a hosted cloud commerce platform used by over 1.5 million merchants and offers the easiest way to add an online store to any website, social site or multiple sites simultaneously.

    Your free online store is just a few clicks away.

    Set up your Ecwid store once to easily sync and sell across a website, social media, marketplaces like Amazon, and live in-person. Get started with one, or try them all.
    Start Selling
  • 1
    Simple Java Graph is a minimal matrix- and listbased graph implementation. An AStar search algorithm is also available.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Random Forest classification implementation in Java based on Breiman's algorithm (2001). It assumes the data is in the form [ X_1, X_2, . . ., X_M, Y ] where Y \in {0, 1, . . ., C}. The user must define M, C, and m initially.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SierpinskiChaosGame is a graphical Java application for demonstrating the creation of a Sierpinski triangle using a probabilistic algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This is a network based text search tool. The Network part consists of Client and Server side .class files. The text search algorithm has been implemented in C. On client side type SearchClient ip(server) string
    Downloads: 0 This Week
    Last Update:
    See Project
  • BrandMail Email Signatures for Outlook Icon
    BrandMail Email Signatures for Outlook

    Leverage every email as an opportunity to brand consistently and minimise the security risks associated with the tampering of HTML signatures.

    BrandMail®, developed by BrandQuantum, is a software solution that seamlessly integrates with Microsoft Outlook to empower every employee in the organisation to automatically create consistently branded emails via a single toolbar that provides access to brand standards and the latest pre-approved content.
    Learn More
  • 5
    TigerJars is a project designed around the idea of making a executable jars that preform desired system tasks such as file comparison, file encryption, and possibly networking tasks. In gerneral, to provide a free alternative to high end shareware.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This Project implements the mergesort algorithm in a MPICH2 (parallel programming -) environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Wodka is the implementation of a genetic algorithm (GA) that can bread two dimensional structures that might be used as robots in sodarace competitions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    wlfXchanger is a point-to-point communication software which enable developers to cooperate in a secure way, using an asymmetric encryption system (Public Key Cryptography).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This project is a compression utility that supports different kinds of compression algorithm. For starters the following formats are supported (zip, jar, tar, gzip, bzip2). More compression format will be supported in the future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Powerfully Simple Remote Monitoring and Management Software Icon
    Powerfully Simple Remote Monitoring and Management Software

    NinjaRMM provides intuitive endpoint management software to managed service providers (MSPs) and IT professionals

    If you're looking to support your clients and manage IT more efficiently, turn to NinjaRMM. The world's first security centric remote monitoring and management (RMM) platform, NinjaRMM enables IT professionals to monitor and manage the entire IT stack with full automation all within a single pane of glass. The platform features search and connect through TeamViewer, antivirus integration, real-time alerts, managed patching, automation, software inventory, and reporting.
    Free Trial
  • 10
    The algorithm used by this MasterMind applet is very simple. Yet it is also very fast and it uses relatively few guesses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Popular Game 15 implemented in Java. The most intersting part of the project is the genetic algorithm which solving the puzzle. Play the game here: http://www.geocities.com/todordimitrovbalabanov/the15/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    RL HNFP is a neuro Fuzzy model which can automatic generate set of rule. So it can implement in domain although human don't have knowledge on it. This project implement that algorithm in Java so other people can use that for their application
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The project implements Dana Angluin's learning algorithm with intent to look into the possibility of computational learning of changing (shifting) information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A collection of language tools based on recursive adaptive grammars (RAGs), built around a general RAG parsing algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Type setting engine in Java. Uses an algorithm similar to Tex to layout text and images on a page and create a pdf output, supports multiple columns and images, which can be placed at arbitrary positions, spawm columns etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    anti spam tool. uses an active algorithm (not filtering).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A multithreaded GUI based encryption software that can encrypt any file on any platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Project Tokaf is an general implementation of top-k algorithm. It provides interfaces for all modules that are needed. It also features user preferences module, for computing new preferences and manipulating existing ones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    DrPangloss is a python implementation of a three operator genetic algorithm, complete with a java swing GUI for running the GA and visualising performance, generation by generation
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    VeNCrypt adds TLS/X509 encryption and authentication to VNC. It is heavily based on the RealVNC Free Edition, thus being a single fork away from the original creators of VNC, and is fully compliant with the RFB protocol.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    KNN-WEKA provides a implementation of the K-nearest neighbour algorithm for Weka. Weka is a collection of machine learning algorithms for data mining tasks. For more information on Weka, see http://www.cs.waikato.ac.nz/ml/weka/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The main goal of OWLVE is to visualize graphically any OWL–lite file. Using powerful RCP and GEF technologies will improve the quality of graphics and diagrams.This project includes an algorithm for similarity calculus between two OWL files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Luky Library is a set of java classes which abstract complex operations. It comprises of classes for networking, event handling, encryption, database handling, snmp monitoring, queues, semaphores, parsers, XML handlers and much more
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A framework for utilising the Genetic Algorithm in the domain of Game Theory
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB