Showing 172 open source projects for "encryption algorithm java"

View related business solutions
  • All Things Performance and Partner Marketing, All in One Place Icon
    All Things Performance and Partner Marketing, All in One Place

    Track calls, leads, and clicks without the manual work

    Automatically tie revenue back to campaigns, channels, publishers, and networks through marketing attribution. Spend less time juggling reports, and more time optimizing for growth by using a single operating solution for partner and performance marketing.
    Learn More
  • Melis Platform is an enterprise-grade Low Code Platform simplifying app creation, management, and delivery. Icon
    Melis Platform is an enterprise-grade Low Code Platform simplifying app creation, management, and delivery.

    Ideal for websites, apps, e-commerce, CRMs, and more

    Melis is a new generation of Content Management System and eCommerce platform to achieve and manage websites from a single web interface easy to use while offering the best of open source technology.
    Learn More
  • 1
    The Security Annotation Framework (SAF) is an instance-level access control framework and field-level encryption framework driven by Java 5 annotations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This is an algorithm to codify Spanish words to an equivalent phonetic code. That intends to be a substitute of Soundex algorithm that is not practical to use in Spanish. It is very useful for search engines based on text information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Jala is a Java framework for algorithm performance measurement and comparison.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A 2D rigid physics simulator and set of genetic algorithm tools. Evolve cute little walking creatures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.
 Icon
    Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.


    How the world collects public web data

    Bright Data is a leading data collection platform, enabling businesses to collect crucial structured and unstructured data from millions of websites through our proprietary technology. Our proxy networks give you access to sophisticated target sites using precise geo-targeting. You can also use our tools to unblock tough target sites, accomplish SERP-specific data collection tasks, manage and optimize your proxy performance as well as automating all of your data collection needs.
    Learn More
  • 5
    This is an academic project; the main objective is to generate an algorithm to parallelize a CNF formula and then feed the distributed parts to sequential SAT solvers, for this project we have choose to use Sat4J as the solver.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This educational software simulates an Ad-hoc network with AODV algorithm, it uses a high level view and only works in Routing layer. it has a user-friendly graphical user interface and has been written in java language.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Sorting algorithm performance testing using a generic test interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Java implementation of A* algorithm, that could be used in Roguelike games.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    JNSGA2 is a Java library with an implementation of the multi-objective genetic algorithm NSGA-II published by Deb et al.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Monitoring, Securing, Optimizing 3rd party scripts Icon
    Monitoring, Securing, Optimizing 3rd party scripts

    For developers looking for a solution to monitor, script, and optimize 3rd party scripts

    c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.
    Learn More
  • 10
    Automatic test generation tool for Java, based on genetic algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The simpliZia-program implements the simplex-algorithm and is designed to help students of Operations Research to understand and learn the algorithm. This is a german project, source and program are actually written in german.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Proposed is an algorithm that uses computer vision, combined with a modified Rubine classifier, to allow arbitrary N-sided polygons as accepted sketches in real-time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This Project implements the mergesort algorithm in a MPICH2 (parallel programming -) environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The algorithm used by this MasterMind applet is very simple. Yet it is also very fast and it uses relatively few guesses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Project Tokaf is an general implementation of top-k algorithm. It provides interfaces for all modules that are needed. It also features user preferences module, for computing new preferences and manipulating existing ones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    KNN-WEKA provides a implementation of the K-nearest neighbour algorithm for Weka. Weka is a collection of machine learning algorithms for data mining tasks. For more information on Weka, see http://www.cs.waikato.ac.nz/ml/weka/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The main goal of OWLVE is to visualize graphically any OWL–lite file. Using powerful RCP and GEF technologies will improve the quality of graphics and diagrams.This project includes an algorithm for similarity calculus between two OWL files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Luky Library is a set of java classes which abstract complex operations. It comprises of classes for networking, event handling, encryption, database handling, snmp monitoring, queues, semaphores, parsers, XML handlers and much more
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A framework for utilising the Genetic Algorithm in the domain of Game Theory
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This project intends to create an indexing search engine, for knowledge management. The primary object is to apply an information retrieval core. And implement a knowledge data discovery theory such as data mining algorithm, text mining.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A Java implementation of the NEAT algorithm as created by Kenneth O Stanley. Also provides a toolkit for further experiments to be created and can provide both local and distributed learning environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    StrMatch is a simple java program, created for educational purposes, that allows user to test a great part of string matching algorithms. An intuitive user interface shows each algorithm step accurately...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    musicomp is a program which most important element is an evolutionary algorithm which uses data mining methods as a fitness function to generate monophone melodies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Galapagos is a Genetic Algorithm framework written in Java 5 with the intended audience of undergraduates in an Artificial Intelligence class. The goal of Galapagos is usability: a competent student should be able to learn this library in an afternoon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB