Other listings by this author |
|
Primes 1.4 (Downloads: 477)
calculates the prime numbers 1..N, tells you if N is prime etc. calculates the prime numbers 1..N, tells you if N is prime etc.
Prints tables of primes.
Computes the prime just below or above N.
It is useful in computing optimal Hashtable sizes.
Java source included....
|
|
Pluck 1.0 (Downloads: 205)
Scans multiple files looking for a REGEX pattern, and summarised what it finds. Scans multiple files looking for a REGEX pattern, and
summarised what it finds as a CSV file.
java -jar C:\com\mindprod\pluck\pluck.jar "\.[a-z]+\." E:\temp\temp.csv E:\somedir
adjusting as necessary to account for where the jar file is.
The first parameter is the regex pattern. See regex in the java glossary
for how to compose them.
The next parameter is where the output in to go. use the
wo...
|
|
Official Encoding 1.1 (Downloads: 173)
Discover the official name of any given Java encoding. Official Encoding will tell you the official name of any given Java encoding and whether it is supported by Java. It will also display some of the characters available with that encoding.
Prerequisites:
This program runs under any OS,
(e.g. Win2K/XP/Vista/OSX/Linux/Solaris/Vista64/AIX...) so long as you have
Java version 1.5 or later installed.
Installing:
Download source and compiled class files to run...
|
|
Pws 2.0 (Downloads: 230)
PWS (the pathway amanuensis) helps you with personal problems. PWS (the pathway amanuensis) helps you with personal
problems. You describe your problem and it prescribes some
sage advise based on Ken Keyes' twelve pathways from the
book Handbook To Higher Consciousness.
To install, Extract the zip download with WinZip, available from
winzip.com (or similar unzip utility) into any
directory you please, often C:\ -- ticking off the (user
folder names) option. To run as an applicat...
|
|
QuickSort 1.6 (Downloads: 274)
QuickSort is an implementation of Tony Hoare's classic recursive Quicksort. QuickSort is an implementation of Tony Hoare's classic
QuickSort. QuickSort works by choosing a pivot point and
ensuring all elements below the pivot point are small all
above are big, (i.e. smaller than the pivot) Then it
recursively splites the upper and lower halves, repeating
the process. QuickSort is an internal sort written in Java.
Both RadixSort and HeapSort are quicker than QuickSort.
QuickSort can also take patholo...
|
|
Biorhythms Calculator 2.7 (Downloads: 929)
Calculates and displays biorhythm graphs. Calculates and displays biorhythm graphs.
Enter your birthdate and this Applet and it will calculate
your biorhythms. It computes your 23-day physical, 28-day
emotional, 33-day intellectual and combined cycles. The
combined cycle is sometimes called the luck cycle. The
theory of biorhythms is when the cycles are positive/high
you will have high energy. When they are negative/low you
will have low energy. When they...
|
|
CreditCard Validator 1.8 (Downloads: 403)
Verifies that credit card number is valid. The CreditCard Validator will help you tell:
1. if a credit card number is valid,
2. which credit card vendor handles that number.
It is a simple Applet to demonstrate the use of the ValidateCreditCard class.
It validates the prefix and the checkdigit. It does *not* contact the credit card company to ensure that number has actually been issued and that the account is in good standing.
It will also tell you which of ...
|
|
CurrCon 4.5 (Downloads: 589)
CurrCon displays prices in HTML in users' home currency. Currency Conversion Applet.
CurrCon is an Applet you embed in your HTML
to display prices in a variety of world currencies
defaulting to the user's country.
It usually works in conjunction with the htmlmacros
pre-processor to insert the necessary Applet calls,
though you can do it manually.
Shareware for non military use only.
Registrants get help setting it up....
|
|
RadixSort 1.6 (Downloads: 216)
RadixSort is a fast internal sort written in Java that mimics a card sorter. RadixSort is a fast internal sort written in Java that
mimics a card sorter. Source provided. It is faster than
both HeapSort and QuickSort. It sorts using a comparision
routine you provide to compare two elements to be sorted
plus a method to extract individual bytes from the keys to
be sorted. The time to sort each item unlike most sorts,
does not increase with larger sorts. It depends rather on
the key length.
|
|
Replicator 11.3 (Downloads: 801)
The Replicator lets you distribute large numbers of files to many people. The Replicator lets you distribute large numbers of files to
many people efficiently. The software automatically
downloads just the changed files and deletes ones no longer
part of the distribution.
Unlike other similar tools, all it requires is an ordinary
HTTP website. It requires no code to run on the server.
It can also work with CDs, and LANs.
Custom configured for each customer. Not free. Registrat...
|
|
FileTransfer 2.5 (Downloads: 303)
Java classes to cop, upload and download files. Includes classes to let you copy, download and upload files from within a Java program. Also contains a command-line utility to download files.
Fully commented Java source is provided. It is now comes in four parts, MiniFileTransfer, FileTransfer and MaxiFileTransfer, Download depending on how much functionality you require. Now supports copying members in local jar files.
Command line use:
java -jar download.jar http : //x...
|
|
KeyPlayer 1.5 (Downloads: 384)
Java Keystroke and Mouse Event Tutor / Keyboard Diagnostic. Java Keystroke and Mouse Event Tutor / Keyboard Diagnostic
Application to let you experiment to learn how mouse and
keystroke events work. Output appears on the console.
Just click the mouse or hit keystrokes and watch what details
of the events generated.
To install, Extract the zip download with WinZip, available from
winzip.com (or similar unzip utility) into any
directory you please, often C:\ -- ticking off the (...
|
|
Masker 1.9 (Downloads: 291)
Hides email addresses from spammers as PNG image files. Produces PNG files (image files similar to GIFs, but
smaller) that contain your email address. When you post them
on your website, it is harder for spammer to harvest them.
You can include the generated image files in the HTML on
your website with: code like this:
[a href="../image/mailto/roedy.png"]email me[/a]
(pretend [] are angle brackets)
or
[mg src="image/mailto/r...
|
|
JarLook 1.2 (Downloads: 311)
Check that class target versions are as expected in a Java jar. Check a Java jar to make sure all the javac -target versions of
the class files are what you expect.
Java application.
Requires Java version 1.5 or later.
All Java source code is included.
to use:
java -jar jarlook.jar jartotocheck.jar 1.1 1.4
where jartocheck.jar is the name of jar to check.
It will check all the class files in it.
In this example:
1.1 is the low...
|
|
BlOut 2.6 (Downloads: 370)
Blout removes extra or all blank lines from a file. Blout removes extra blank lines from a file, collapsing multiple blank
lines down to one, (or removing them altogether with the -compact option).
It also ensures the file has a final CrLf. It also trims any blank lines
off the beginning and end of the file. It also converts all line endings
to Windows standard CrLf form. It trims trailing tabs and spaces from
each line.
Blout is not that bright. It does not understand w...
|
|
Mouse 1.4 (Downloads: 268)
In Java, allows you to find out where the mouse in on the screen In Java, allows you to find out where the mouse in on the
screen, even when it is not over one of your apps. This has
similar function to MouseInfo.getPointerInfo in Java 1.5+.
This class will work in any version of Java.
It uses JNI and a DLL, so it only works on Windows.
You must install the nativemouse.dll somewhere on the path.
Then your programs can find out the x and y position of the
mouse, [(0,0...
|
|
Transporter 1.4 (Downloads: 247)
Lightweight Java classes to let you encrypt/sign/armour for secure transmission. The Transporter acts like an electronic secure courier to
deliver your data and documents in encrypted form safe from
prying eyes or those who would tamper with them.
It Encrypts, digitally signs and armours to send sensitive
information over the Internet without SSL.
Typically you would embed it in your own Internet
applications....
|