algorithm downloads

Google OrTools

9.14 download

Google OR-Tools, developed by the adept Google ORTools Team, is a robust, open-source suite designed to tackle complex optimization problems. This versatile toolkit is engineered to cater to a wide range ...

BlockTube for Chrome

0.4.5 download

BlockTube, developed by the innovative mind of amitbl, is a powerful browser extension designed to enhance your YouTube experience by giving you unprecedented control over the content you see. This software ...

video2x

6.3.1 download

... media. At its core, Video2X leverages advanced algorithms and machine learning techniques to upscale content. The software supports multiple upscaling engines, including Waifu2x, SRMD, and RealSR, each offering unique ...

RIOT

2024.1.0 download

... 16 bit grayscale, etc). Adaptive logarithmic tone mapping algorithm (Drago) used for HDR images * save and optimize JPEG, GIF and PNG with a simple, clean user interface * works ...

5 award

Duplicate & Same Files Searcher

5.2.6 download

... search engine (byte-to-byte comparison and hard link detection algorithm are used). Detailed visualisation of duplicate files, NTFS hard links, junction points and symbolic links (unique!). Shows fragmentation of files (unique!). ...

5 award

RIOT Portable

2024.1.0 download

... 16 bit grayscale, etc). Adaptive logarithmic tone mapping algorithm (Drago) used for HDR images * save and optimize JPEG, GIF and PNG with a simple, clean user interface * works ...

5 award

R-UNDELETE File Recovery

4.6 download

... xlsx, pptx. A new, faster, and more robust algorithm for Known File Types scanning and FAT file system processing. The algorithm is adapted to multi-core processing and prevents the ...

5 award

Best Folder Encryptor

16.97 download

... files and folder with superfast, strong and faultless algorithms. You can choose from five encryption methods when ... a folder in a time with internationally mature algorithm. Each encrypted file in this folder can be ...

USB Flash Security

5.0.0 download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

USB Flash Security+

4.1.11 download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

USB Flash Security++

4.1.11 download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

USB Flash Security#

4.1.11 download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

USB Flash Security##

4.1.11 download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

USB Flash Security+g

4.1.11 download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

USB Flash Security++g

4.1.11 download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

USB Flash Security#g

4.1.11 download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

USB Flash Security##g

4.1.11 download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 award

Registry Workshop

5.0.1 download

... keys, values and data with super fast search algorithm. - Compare registry between computers and/or .REG files with super fast speed. - Connect mobile device (Pocket PC, SmartPhone, etc.) registry ...

5 award

XorIt

1.9 download

... from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of ...

5 award

abylon ENTERPRISE

23.60.1 download

... or DVD. The using of the recognized encryption algorithm AES and Blowfish guarantee the security of the files. abylon SYMM CRYPT and abylon HYBRID CRYPT are a context sensitive PlugIn ...

RemoteNetstat

1.3.4 download

... local host Ip address, TCP segments including timeout algorithm , minimum and maximum timeouts in milliseconds,the number of maximum connections , opened active and passive connections, failed connections, reset connections, ...

5 award

Maze Creator PRO

1.70 download

... own solution o Advanced control of maze generation algorithm o Color control of maze features Finally a cost effective solution to publishing mazes for commercial use. ...

5 award

BestSync

20.0.0.1 download

... folder with a ZIP file, support AES cryptographic algorithm. 7. Synchronize Outlook(mail, contact). 8. Back up your critical files automatically to the above local/remote/cloud storage. BestSync has an easy to ...

5 award

Cutting Optimization Pro

5.18.12.7 download

... waste and maximize material utilization. The software’s robust algorithm ensures that every inch of material is used efficiently, which translates to significant cost savings and reduced environmental impact. Users can ...

Thumb*.db Viewer

4.145 download

... program`s window;- manipulate with images;- using a heuristic algorithm, the program can search for JPG graphics in files of any format.- disassembled and displaying headers of thumbnails, thumbcache files and ...

5 award