algorithm 2 downloads
VeriEye Algorithm Demo (For Windows)
2.5 downloadEye iris identification algorithm demo application for MS Windows. The robust proprietary iris recognition technology accepts images with gazing away eyes or narrowed eyelids and provides reliable iris matching at ...
VeriFinger Algorithm Demo for MS Windows
6.5 downloadFingerprint recognition algorithm demo application enrolls and identifies fingers from supported scanners or image files. NIST MINEX-compliant technology. Fast matching (280,000 templates per second on Intel Core i7-2600) with reliability ...
VeriFinger Algorithm Demo for MS Windows
6.5 downloadFingerprint recognition algorithm demo application enrolls and identifies fingers from supported scanners or image files. NIST MINEX-compliant technology. Fast matching (280,000 templates per second on Intel Core i7-2600) with reliability ...
VeriLook algorithm demo for MS Windows
3.1 downloadThe SDK is based on the VeriLook PC-based face identification technology. It can be used with most cameras, webcams and databases on Linux or Windows. Simultaneous multiple faces' detection, processing and ...
SentiSight algorithm demo for Windows
3.0 downloadObject recognition technology and SDK for robotics and computer vision systems. The software offers simultaneous detection, identification and tracking of multiple objects in live video. Object quantity counting. Utilizes multithreading, SSSE3 ...
SentiSight algorithm demo for Windows
3.0 downloadObject recognition technology and SDK for robotics and computer vision systems. The software offers simultaneous detection, identification and tracking of multiple objects in live video. Object quantity counting. Utilizes multithreading, SSSE3 ...
MassWiz
1.7.4.1 downloadMassWiz is an open Source MS/MS algorithm with integrated target-decoy based FDR. It helps in ... proteomics, mass spectrometry, target-decoy search, FDR calculation, specificity, algorithm, and sensitivity. Features proteomics mass spectrometry ...
LuJoSoft Checksum
1.0.0 downloadIntroduction: Description of MD5 The MD5 message-digest algorithm is a widely used cryptography hash function producing ... data integrity. Description of SHA-1 SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by ...
Lzip
1.22 download... a lossless data compressor based on the LZMA algorithm, with very safe integrity checking and a user ... a simplified version of the LZMA (Lempel-Ziv-Markov chain-Algorithm) algorithm. The high compression of LZMA comes from combining ...
Lzip for Linux
1.22 download... a lossless data compressor based on the LZMA algorithm, with very safe integrity checking and a user ... a simplified version of the LZMA (Lempel-Ziv-Markov chain-Algorithm) algorithm. The high compression of LZMA comes from combining ...
jSNARK
1.0.05 download... help researchers interested in developing and evaluating reconstruction algorithms. It is the next incarnation of the SNARK programs, the first of which was written by Richard Gordon in 1970. This ...
File Checksum Utility
2.1.0.0 download... generate MD (Message Digest) and SHA (Secure Hash Algorithm) hashes from a single file or files in ... value from the content of file by special algorithm. Duplicated files are highlighted, but also bigger and ...
PSP 85
1.1.1 download... rate delay lines. PSP 85 benefits from aggressive algorithm optimization and adds numerous significant new features while retaining full preset and bank compatibility with our renowned PSP 84 delay. The ...
PSP 85 for Mac OS X
1.1.1 download... rate delay lines. PSP 85 benefits from aggressive algorithm optimization and adds numerous significant new features while retaining full preset and bank compatibility with our renowned PSP 84 delay. The ...
Apriori
5.73 download... maximal as well as generators) with the Apriori algorithm (Agrawal et al. 1993), which carries out a ... outperformed on basically all data sets by depth-first algorithms like Eclat or FP-growth. The special program ...
Apriori for Linux
5.73 download... maximal as well as generators) with the Apriori algorithm (Agrawal et al. 1993), which carries out a ... outperformed on basically all data sets by depth-first algorithms like Eclat or FP-growth. The special program ...
Eclat
5.6 download... maximal as well as generators) with the eclat algorithm (Zaki et al. 1997), which carries out a ... diffsets (Zaki and Gouda 2003) and several other algorithm variants. A paper that describes some implementation ...
Eclat for Linux
3.76 download... maximal as well as generators) with the eclat algorithm (Zaki et al. 1997), which carries out a ... diffsets (Zaki and Gouda 2003) and several other algorithm variants. A paper that describes some implementation ...
Apriori x64
5.73 download... as well as generators) with the Apriori x64 algorithm (Agrawal et al. 1993), which carries out a ... outperformed on basically all data sets by depth-first algorithms like Eclat or FP-growth. The special program ...
Eclat x64
5.6 download... maximal as well as generators) with the eclat algorithm (Zaki et al. 1997), which carries out a ... diffsets (Zaki and Gouda 2003) and several other algorithm variants. A paper that describes some implementation ...
Encrypting Safe
1.1 download... from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source ... Smart Phone Behind: Using Symmetric key Algorithm for Encrypting and Decrypting note Features: - ...
RElim
4.4 download... sets (also closed and maximal) with the relim algorithm (recursive elimination), which is inspired by the FP-growth algorithm, but does its work without prefix trees or ... complicated data structures. The main strength of this algorithm is not its speed (although it is not ...
RElim x64
4.4 download... sets (also closed and maximal) with the relim algorithm (recursive elimination), which is inspired by the FP-growth algorithm, but does its work without prefix trees or ... complicated data structures. The main strength of this algorithm is not its speed (although it is not ...
Ashampoo Photo Optimizer 10
10.0.4 download... at the click of a button. The smart algorithm detects and fixes exposure, contrast, and color issues. A split view makes comparing original and optimized images extra easy. This 10th ...
FastSum
1.9 download... the usage of a well-known and time-proved cryptographic algorithm, as a matter of fact FastSum is a ... and strong digests of your data via MD5 algorithm to use it as references checksums for ulterior ...