Algorithm And Flowcharting
This is an application of the Greedy Algorithm and the Local Search for finding a solution for the SC Distribution Network problem.We dealt with one level SC composed of a set of factories and a set of Sales Points, each sales point has a demand at a certain time, each factory has a production...
Platforms: Matlab
License: Freeware | Size: 583.68 KB | Download (52): Applying Greedy Algorithm and Local Search in a Supply Chain distribution problem Download |
M-files accompanying the " Genetic Algorithms & New Optimization Methods in MATLAB " webinar.These files provide what you need to run the two demos: Optimization of non-smooth objective function, and Optimization of a random stochastic objective function.To run the first demo run the file...
Platforms: Matlab
License: Freeware | Size: 10 KB | Download (58): Optimization with MATLAB and the Genetic Algorithm and Direct Search Toolbox Download |
*Description and Cautions-The SFNG m-file is used to simulate the B-A algorithm and returns scale-free networks of given node sizes. Understanding the B-A algorithm is key to using this code to its fullest. Due to Matlab resource limitations, it may not be possible to generate networks much...
Platforms: Matlab
License: Shareware | Cost: $0.00 USD | Size: 61.44 KB | Download (55): B-A Scale-Free Network Generation and Visualization Download |
Describes development of a failure boundary mapping algorithm and application to a Airfoil Flutter model.Demo files from July 21, 2009 webinar "Using Statistics and Optimization to Support Design Activities"Webinar Link: http://www.mathworks.com/wbnr37485Development of the failure boundary...
Platforms: Matlab
License: Freeware | Size: 2.08 MB | Download (43): Automated Failure Boundary Mapping Download |
The difference between this algorithm and the other one that i posted is that it takes a vector as an input instead of a number. This is useful if the number you are trying to convert has digits bigger than 9.Example:>> baseVecExpandn = [1 15 13 2]starting base = 16base of expanded number = 9ans...
Platforms: Matlab
License: Shareware | Cost: $0.00 USD | Size: 10 KB | Download (39): Improved Base Expansion Algorithm Download |
Encrypt files, disks and folders quickly and simply, with a heavy encryption algorithm and 2048-bit keys. The A2DCrypt algorithm has been designed to withstand the current cryptanalysis. The interface is friendly, clear, precise and intuitive. The algorithm for permutation of data block is...
Platforms: Windows
License: Shareware | Cost: $27.10 USD | Size: 1.84 MB | Download (454): A2DCrypt 2048 Bits Encryption Download |
This demo shows how to use MATLAB, Optimization Toolbox, and Genetic Algorithm and Direct Search Toolbox to optimize the design of a double wishbone suspension system.Note: You will need to have the following products installed in order to run this demo: MATLAB, Simulink, Optimization Toolbox,...
Platforms: Matlab
License: Freeware | Size: 2.02 MB | Download (46): Optimization of a Double Wishbone Suspension System Download |
Most of the "related posts" plugins out there while they provide some kind of control on how to create related posts, they all rely on an algorithm and the results are automatic. With CPR you get total control as you can manually select the posts that you want to relate.installation : 1. Upload...
Platforms: PHP
License: Freeware | Size: 102.4 KB | Download (39): Custom Post Types Relationships (CPTR) (CPR) Download |
Message Smuggler is the leading software on the market of its kind, which used to smuggle or hide text message into images. Create secret picture message with 256-bit encryption algorithm and password protection. This software gives you: - end of censorship - absolute security - end of any...
Platforms: Windows
License: Shareware | Cost: $249.00 USD | Size: 1.92 MB | Download (879): Message Smuggler Download |
CloneSensor is a very different duplicate file finder with a view to organizing the collections of files. It has ultra fast searching speed with special optimized algorithm and provides many batch processing commands to help you find and delete duplicate files. It also provides many ways to...
Platforms: Windows
License: Shareware | Cost: $29.95 USD | Size: 904.43 KB | Download (148): CloneSensor Download |
This is our implementation of the famous MD5 algorithm, and presents an easy and highly secure way of verifying the integrity of files. Single-line text, multi-line text and file contents are all supported inputs.Software is often accompanied by an MD5 'hash' (or 'checksum')....
Platforms: Windows
License: Freeware | Size: 23 KB | Download (114): DiamondCS MD5 Download |
Bad Crystal is unique utility for clean your screen from stuck pixels, burn-in and stuck stripes. Launch Bad Crystal for a few minutes, and your screen will be clean. Innovation algorithm and high technology are using in Bad Crystal can repair defect LCD screen up to 90.7% within few minutes or...
Platforms: Windows, Windows 8, Windows 7
License: Shareware | Cost: $24.99 USD | Size: 39.43 MB | Download (166): Bad Crystal Ultimate Download |
Boxoft Duplicate File Finder is a simple, lightning-fast desktop tool that lets you to find fast all duplicate or similar files in a folder and its subfolders. It uses fast binary comparison algorithm and has internal preview supporting a lot of image, video, music and text file formats....
Platforms: Windows
License: Shareware | Cost: $27.00 USD | Size: 2.05 MB | Download (108): Boxoft Duplicate File Finder Download |
EMpy (Electromagnetic Python) is a suite of algorithms widely knonw and used in electromagnetic problems and optics: the transfer matrix algorithm, the rigorous coupled wave analysis algorithm and more.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 76.87 KB | Download (50): Electromagnetic Python Download |
ClearPass (formerly BlowPass) is web based password storage system that uses the Blowfish algorithm and a Host-Proof design pattern.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 246.79 KB | Download (51): ClearPass Download |
This tool can create one-time-password values based on HOTP (RFC 4226: HOTP: An HMAC-Based One-Time Password Algorithm) and TOTP (RFC 6238: TOTP: Time-Based One-Time Password Algorithm) standards, and also supports client side of OAuth 1.0 protocol.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 35.24 KB | Download (59): HOTP-TOTP.PHP Download |
Java API for implementing any kind of Genetic Algorithm and Genetic Programming applications quickly and easily. Contains a wide range of ready-to-use GA and GP algorithms and operators to be plugged-in or extended. Includes Tutorials and Examples.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 338.61 KB | Download (46): JAGA - Java API for Genetic Algorithms Download |
I want to create a website where people will be able to compose music online, using an automatic composition algorithm, and share the composed melodies with their friends. This site is currently under construction.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 2.3 MB | Download (50): Speedy Composer Download |
Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
Platforms: Windows, Mac, Linux
License: Freeware | Size: 54.68 KB | Download (50): TEncryption Download |
There are two stages in our experiments, one is to find the predicted values of the signal strengths (RSSId-deOaos) by using Grey prediction algorithm and second is to find the location coordinate of the mobile user by using Dynamic Triangular Location method. We have used grey prediction to...
Platforms: Matlab
License: Freeware | Size: 10 KB | Download (43): Mobile user Localization in WSN Download |