Neuroph Studio is the GUI for educational neural network framework Neuroph
☆36May 29, 2020Updated 5 years ago
Alternatives and similar repositories for NeurophStudio
Users that are interested in NeurophStudio are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- jReality: a Java library for real-time interactive 3D graphics and audio☆12Apr 15, 2016Updated 10 years ago
- Multum In Parvo Operating System is a cooperative multitasking RTOS designed for single-chip micro-controllers with severely limited RAM …☆11Apr 6, 2026Updated last month
- source code of 机器学习算法原理与编程实践☆15May 12, 2016Updated 10 years ago
- High level abstraction for Mixed Integer Nonlinear Programming (MINLP) in Java☆17Mar 5, 2020Updated 6 years ago
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Highly interactive, thread-parallel Lattice Boltzmann CFD solver☆21Apr 29, 2019Updated 7 years ago
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated 3 months ago
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 10 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated last year
- Sphincs+ implementation which uses minimal RAM☆14Aug 31, 2023Updated 2 years ago
- Client-side AES-256-GCM zero-knowledge encryption library. Browser-native Web Crypto API, no dependencies. Powers FileShot.io.☆27May 10, 2026Updated last week
- Experimental committing AEAD designed by Soatok.☆11Sep 10, 2020Updated 5 years ago
- Committing ChaCha20-BLAKE3, XChaCha20-BLAKE3, and XChaCha20-BLAKE3-SIV AEAD implementations.☆13Apr 11, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A small, self-contained SHA512 and HMAC-SHA512 implementation.☆10Feb 13, 2026Updated 3 months ago
- Collection of open-source JavaCard crypto algorithms. Optimized for memory and speed with unified interface☆13Oct 6, 2024Updated last year
- FPE - Format Preserving Encryption with FF3 in C☆14Apr 3, 2026Updated last month
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- Crypto library written in pure Lua 5.1 which includes X25519, ChaCha20, BLAKE2s and more.☆11Mar 16, 2026Updated 2 months ago
- ☆12Updated this week
- T&C and Privacy Policy for our website: https://radicallyopensecurity.com/☆17Apr 23, 2026Updated last month
- A pure Java implementation of BLAKE2 (RFC 7693)☆12Sep 12, 2023Updated 2 years ago
- ☆13Jan 10, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- NIST Lightweight Cryptography finalists☆12May 7, 2022Updated 4 years ago
- A cross-platform Swing GUI for Jacksum.☆17Oct 30, 2024Updated last year
- CDN support for Rails asset pipeline made easy☆18Mar 15, 2013Updated 13 years ago
- Build scripts for Qemu.js☆17Jan 26, 2019Updated 7 years ago
- xoshiro256** random number generator☆22May 7, 2018Updated 8 years ago
- P2P BBS over IPFS☆13Sep 25, 2018Updated 7 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆20Mar 26, 2025Updated last year
- ☆11Updated this week
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆19Nov 11, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A cryptographically secure pseudorandom number generator cli tool printing in a wide variety of byte encodings (hex, base64,..) and for m…☆14Sep 25, 2023Updated 2 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- Target-isns is an iSNS client for the Linux LIO iSCSI target☆19Jan 30, 2026Updated 3 months ago
- ☆15Apr 2, 2015Updated 11 years ago
- wraps localStorage and adds .getObject(), .setObject(), .isPersistent☆10Dec 23, 2019Updated 6 years ago
- HC-256 Stream cipher in x86 assembly☆19Nov 14, 2017Updated 8 years ago
- DEVKIT V1 projects, BLE, WiFi and Robotics.☆12Sep 30, 2025Updated 7 months ago