Search Results for "encryption algorithm java" - Page 24

Showing 776 open source projects for "encryption algorithm java"

View related business solutions
  • Earn up to 15% annual interest with Nexo. Icon
    Earn up to 15% annual interest with Nexo.

    More flexibility. More control.

    Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Earn up to 15% annual interest with Nexo. Icon
    Earn up to 15% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    Simple Java Graph is a minimal matrix- and listbased graph implementation. An AStar search algorithm is also available.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Random Forest classification implementation in Java based on Breiman's algorithm (2001). It assumes the data is in the form [ X_1, X_2, . . ., X_M, Y ] where Y \in {0, 1, . . ., C}. The user must define M, C, and m initially.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SierpinskiChaosGame is a graphical Java application for demonstrating the creation of a Sierpinski triangle using a probabilistic algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This is a network based text search tool. The Network part consists of Client and Server side .class files. The text search algorithm has been implemented in C. On client side type SearchClient ip(server) string
    Downloads: 0 This Week
    Last Update:
    See Project
  • Iris Powered By Generali - Iris puts your customer in control of their identity. Icon
    Iris Powered By Generali - Iris puts your customer in control of their identity.

    Increase customer and employee retention by offering Onwatch identity protection today.

    Iris Identity Protection API sends identity monitoring and alerts data into your existing digital environment – an ideal solution for businesses that are looking to offer their customers identity protection services without having to build a new product or app from scratch.
    Learn More
  • 5
    TigerJars is a project designed around the idea of making a executable jars that preform desired system tasks such as file comparison, file encryption, and possibly networking tasks. In gerneral, to provide a free alternative to high end shareware.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This Project implements the mergesort algorithm in a MPICH2 (parallel programming -) environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Wodka is the implementation of a genetic algorithm (GA) that can bread two dimensional structures that might be used as robots in sodarace competitions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    wlfXchanger is a point-to-point communication software which enable developers to cooperate in a secure way, using an asymmetric encryption system (Public Key Cryptography).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This project is a compression utility that supports different kinds of compression algorithm. For starters the following formats are supported (zip, jar, tar, gzip, bzip2). More compression format will be supported in the future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • 10
    The algorithm used by this MasterMind applet is very simple. Yet it is also very fast and it uses relatively few guesses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Popular Game 15 implemented in Java. The most intersting part of the project is the genetic algorithm which solving the puzzle. Play the game here: http://www.geocities.com/todordimitrovbalabanov/the15/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    RL HNFP is a neuro Fuzzy model which can automatic generate set of rule. So it can implement in domain although human don't have knowledge on it. This project implement that algorithm in Java so other people can use that for their application
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The project implements Dana Angluin's learning algorithm with intent to look into the possibility of computational learning of changing (shifting) information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A collection of language tools based on recursive adaptive grammars (RAGs), built around a general RAG parsing algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Type setting engine in Java. Uses an algorithm similar to Tex to layout text and images on a page and create a pdf output, supports multiple columns and images, which can be placed at arbitrary positions, spawm columns etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A multithreaded GUI based encryption software that can encrypt any file on any platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    anti spam tool. uses an active algorithm (not filtering).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Project Tokaf is an general implementation of top-k algorithm. It provides interfaces for all modules that are needed. It also features user preferences module, for computing new preferences and manipulating existing ones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    DrPangloss is a python implementation of a three operator genetic algorithm, complete with a java swing GUI for running the GA and visualising performance, generation by generation
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    VeNCrypt adds TLS/X509 encryption and authentication to VNC. It is heavily based on the RealVNC Free Edition, thus being a single fork away from the original creators of VNC, and is fully compliant with the RFB protocol.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    KNN-WEKA provides a implementation of the K-nearest neighbour algorithm for Weka. Weka is a collection of machine learning algorithms for data mining tasks. For more information on Weka, see http://www.cs.waikato.ac.nz/ml/weka/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The main goal of OWLVE is to visualize graphically any OWL–lite file. Using powerful RCP and GEF technologies will improve the quality of graphics and diagrams.This project includes an algorithm for similarity calculus between two OWL files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Luky Library is a set of java classes which abstract complex operations. It comprises of classes for networking, event handling, encryption, database handling, snmp monitoring, queues, semaphores, parsers, XML handlers and much more
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A framework for utilising the Genetic Algorithm in the domain of Game Theory
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB