Jni Generator module extracted from Chromium project

1 Dependencies 1.1 C ++ dependencies Copy two directories: chromium-jni-generator-native-essential and chromium-jni-generator-native-gen-script to your projectThe chromium-jni-generator-neutral-essential directory contains the chromium_jni_generator_native_essential .h and chromium_jni_generator_native_essential.ccThe chromium-jni-generator-native-gen-script directory contains python scripts that generate native codechromium_native_code_gen.sh is an example of using python scripts to generate native code #!/bin/bash #create code generation directories rm -rf ./gen mkdir -p gen/cpp mkdir -p gen/java #generate native code ./jni_generator.py –input_file XXXXA.java –input_file XXXXB.java –output_file gen/cpp/XXXXA.h –output_file gen/cpp/XXXXB.h 1.2 Java dependencies    

Read more

Generates a shortened URL link or a QR code with color and shape options

Generates a shortened URL link or a QR code with color and shape options When you execute the main file, it asks a URL and then you choose if you want to generate a shortened url or a QR Code with it. Shorter URLs are copied direct to clipboard (or to a txt file, if you uncomment the shortener_saver function in ‘urlshortener.py’ and add it into the main function) QR Code options are the colors (using tk color picker) and […]

Read more

The generative design for single red clood cell hydrodynamic traps using GEFEST framework

This is the repository for the paper “Single Red Blood Cell Hydrodynamic Traps Via the Generative Design” submitted to Micromachines journal. In the paper, the evolutionary approach implemented in GEFEST framework was applied to optimize the structure of geometrically-encoded cell traps. Experiments folder contains the scripts that run the optimization for the described case.Setup contains the wrapper for the COMSOL simulator and the configuration for the simulation environment.Results folder contains the structure of best obtained configuration. GitHub View Github   […]

Read more

The code needed to train Mega-NeRF models and generate the sparse voxel octrees

This repository contains the code needed to train Mega-NeRF models and generate the sparse voxel octrees used by the Mega-NeRF-Dynamic viewer. The codebase for the Mega-NeRF-Dynamic viewer can be found here. Note: This is a preliminary release and there may still be outstanding bugs. Citation @misc{turki2021meganerf, title={Mega-NeRF: Scalable Construction of Large-Scale NeRFs for Virtual Fly-Throughs}, author={Haithem Turki and Deva Ramanan and Mahadev Satyanarayanan}, year={2021}, eprint={2112.10703}, archivePrefix={arXiv}, primaryClass={cs.CV} } Demo Setup    

Read more

An NUS timetable generator which uses a genetic algorithm to optimise timetables to suit the needs of NUS students

A timetable optimsier which uses an evolutionary algorithm to “breed” a timetable suited to your needs. Try it out here! Inspiration Planning the best fit timetable to suit our needs can be an absolute nightmare. Different sets of modules can result in a seemingly limitless combinations of timetable. Comparing and choosing the best timetable can take hours or even days. The struggle is real Having chanced upon an article on genetic algorithm, we thought that this would be the best […]

Read more

Knowledge Bridging for Empathetic Dialogue Generation

Knowledge Bridging for Empathetic Dialogue Generation This is the official implementation for paper Knowledge Bridging for Empathetic Dialogue Generation (AAAI 2021). Model Architecture Setup Check the packages needed or simply run the command: pip install -r requirements.txt Download GloVe vectors from here (glove.6B.300d.txt) and put it into /data/. Download other data sources regarding ConceptNet and NRC_VAD lexicon, please visit Google Drive and place processed dataset kemp_dataset_preproc.json into /data/. For reproducibility purposes, we place the model checkpoints at

Read more

Malicious shortcut generator for collecting NTLM hashes from insecure file shares

Lnkbomb is used for uploading malicious shortcut files to insecure file shares. The vulnerability exists due to Windows looking for an icon file to associate with the shortcut file. This icon file can be directed to a penetration tester’s machine running Responder or smbserver to gather NTLMv1 or NTLMv2 hashes (depending on configuration of the victim host machine). The tester can then attempt to crack those collected hashes offline with a tool like Hashcat. The payload file is uploaded directly […]

Read more

A WIP Code Generator tool. This is the way

Django Fett is an incomplete code generator used on several projects.This is an attempt to clean it up and make it public for consumption. Django Fett is different because it leverages Frontmatter Metadata and exposes the extra metadata into the template context.Frontmatter Metadata may also contain variables that make setting an output filename cleaner than trying to save file or folder names with Jinja syntax. TODO: Quick start Templates A Fett template is a header of a markdown-like frontmatter and […]

Read more
1 2 3 4 6