algorithm 5 downloads

Disk Wiper 11

Personal download

... erasure of your critical data with the powerful algorithm and customization option, wizard-based interface and extensive reporting. ... partitions (primary, extended, logical) - New Paragon developed algorithm - Create your own wipe algorithm with minimal ...

Topcoder AutoGen for Arena C++

1.0 download

... competition for programmers to demonstrate their talent in algorithm and programming. There are many talent people participated ... into the C++ class and method, design the algorithm, implement, and test them manually. Now with TopCoder ...

VisionLab .NET

8.0 download

... video. - Adaptive threshold - Performs Adaptive threshold algorithm for edge detection. - Canny - Performs Canny algorithm for edge detection. - Hough Lines - Finds ... Robust Features - Extracts robust features using SURF algorithm. - Haar and HOG Detect Objects - Detects ...

PSP MasterComp

1.8.0 download

... distortion due to our optional Smooth Level Detector algorithm Optional automatic attack and release times Wide range ... MicroComp Simple and effective control layout. CPU efficient algorithm optimized for mixing purposes. Low distortion thanks to ...

PSP MasterComp for Mac OS X

1.8.0 download

... distortion due to our optional Smooth Level Detector algorithm Optional automatic attack and release times Wide range ... MicroComp Simple and effective control layout. CPU efficient algorithm optimized for mixing purposes. Low distortion thanks to ...

PyPedal

2.0.3 download

... Computation of effective founder number using the exact algorithm of Lacy Computation of effective founder number using the approximate algorithm of Boichard et al. Computation of effective ancestor number using the algorithms of Boichard et al. Selection of subpedigrees containing ...

PyPedal for Linux

2.0.3 download

... Computation of effective founder number using the exact algorithm of Lacy Computation of effective founder number using the approximate algorithm of Boichard et al. Computation of effective ancestor number using the algorithms of Boichard et al. Selection of subpedigrees containing ...

toMOTko for Linux

0.11.2 download

... in a way similar to Leitner System. The algorithm is not perfect yet but it's already good ... vocabulary acquisition. Since version 0.12.x, a new algorithm is available. It's called SuperMemo-2 (aka SM-2). SM-2 ...

toMOTko for Mobile

0.11.2 download

... in a way similar to Leitner System. The algorithm is not perfect yet but it's already good ... vocabulary acquisition. Since version 0.12.x, a new algorithm is available. It's called SuperMemo-2 (aka SM-2). SM-2 ...

toMOTko for Mac OS X

0.11.2 download

... in a way similar to Leitner System. The algorithm is not perfect yet but it's already good ... vocabulary acquisition. Since version 0.12.x, a new algorithm is available. It's called SuperMemo-2 (aka SM-2). SM-2 ...

toMOTko for Windows

0.11.2 download

... in a way similar to Leitner System. The algorithm is not perfect yet but it's already good ... vocabulary acquisition. Since version 0.12.x, a new algorithm is available. It's called SuperMemo-2 (aka SM-2). SM-2 ...

Paranoia Text Encryption for PC

15.0.4 download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish ... text within an image - JPG). A steganographic algorithm (F5 algorithm) is used in combination with chosen ...

Super Refocus for Mac

1.5.4 download

... on the target box with state-of-the-art image segmentation algorithm. 2 Two processing modes: Regular mode and Customized ... Complete professional image editing with the advanced focus algorithm. 7 Intuitively control 5 blur levels and precise ...

Paranoia Text Encryption for Mac

15.0.4 download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish ... text within an image - JPG). A steganographic algorithm (F5 algorithm) is used in combination with chosen ...

File Privacy

0.2 download

... (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The Data ...

Freeware Digital Camera Data Recovery

6.1.2.3 download

... loss cases. Photo search mode cases raw search algorithm to find individual photo files regardless of file ... mode searched for lost videos using raw search algorithm regardless of file system structure. Raw search mode ...

Atomicrobot Information Manager

8.0 download

... encrypt your information using a simple but effective algorithm that we designed. This is an incredible program! ... your data using a simple but effective encryption algorithm that we designed. Note: The encryption is algorithm ...

Website Link Checker

4.0.0.2206 download

... performance Website Link Checker uses a unique multi-threaded algorithm, which allows checking several pages at a time. This algorithm minimizes checking time and scanning a large site ...

AntispamSniper for The Bat!

3.3.5.4 download

The statistical trainable classification algorithm has unique characteristics. It analyzes your private correspondence, ... supports several complementary methods in addition to statistical algorithm: black and white lists of email addresses, anti-phishing

Direct MP3 Joiner

3.0.2.9 download

... Artist, Title, Track#, etc.) With our powerful sorting algorithm you can sort your mp3 files in the ... 1 and 2) support; - Powerful Natural Sort Algorithm; - Supports MP3 files with artwork (album cover) ...

DeSofto Traffic Compressor for Windows Mobile

2.1 download

... etc. The software is equipped with a unique algorithm that compresses texts as well as graphics. The ... easy to use display interface; - Unique compression algorithm (up to 90%); - Compresses texts as well ...

Stepoks Raw Importer

1.2 download

... … * Best quality result interpolated by AHD algorithm and full control of exposure, dynamic, color, white ... ? · Best quality result interpolated by AHD algorithm and full control of exposure, dynamic, color, white ...

Corrupt DOCX Salvager

2.0.4 download

... well as an inadequate corruption tolerant XML reading algorithm to salvage text from the mentioned XML file ... tolerant unzipper and a corruption tolerant XML reading algorithm as well, succeeding where MS Word fails. This ...

Website Link Checker

4.0.0.2206 download

... performance Website Link Checker uses a unique multi-threaded algorithm, which allows checking several pages at a time. This algorithm minimizes checking time and scanning a large site ...

EML to PST Software

1.0.1.4 download

... operate in all Windows OS plus has secured algorithm for conversion process. This utility supports all email-program ... operate in all Windows OS plus has secured algorithm for conversion process. It can easily convert EML ...