Found 51 repositories(showing 30)
Nfactor26
Bootstrapper for https://github.com/openiddict/openiddict-core and Asp.net Identity with a blazor based UI .
yqmark
Privacy Policy introduction We understand the importance of personal information to you and will do our utmost to protect your personal information. We are committed to maintaining your trust in us and to abide by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of purpose , choose the principle of consent, at least the principle of sufficient use, ensure the principle of security, the principle of subject participation, the principle of openness and transparency, and so on. At the same time, we promise that we will take appropriate security measures to protect your personal information according to the industry's mature security solutions. In view of this, we have formulated this "Private Privacy Policy" (hereinafter referred to as "this policy" /This Privacy Policy") and remind you: This policy applies to products or services on this platform. If the products or services provided by the platform are used in the products or services of our affiliates (for example, using the platform account directly) but there is no independent privacy policy, this policy also applies to the products or services. It is important to note that this policy does not apply to other third-party services provided by you, nor to products or services on this platform that have been independently set up with a privacy policy. Before using the products or services on this platform, please read and understand this policy carefully, and use the related products or services after confirming that you fully understand and agree. By using the products or services on this platform, you understand and agree to this policy. If you have any questions, comments or suggestions about the content of this policy, you can contact us through various contact methods provided by this platform. This privacy policy section will help you understand the following: How we collect and use your personal information How do we use cookies and similar technologies? How do we share, transfer, and publicly disclose your personal information? How we protect your personal information How do you manage your personal information? How do we deal with the personal information of minors? How your personal information is transferred globally How to update this privacy policy How to contact us 一、How we collect and use your personal information Personal information refers to various information recorded electronically or otherwise that can identify a specific natural person or reflect the activities of a particular natural person, either alone or in combination with other information. We collect and use your information for the purposes described in this policy. Personal information: (一)Help you become our user To create an account so that we can serve you, you will need to provide the following information: your nickname, avatar, gender, date of birth, mobile number/signal/QQ number, and create a username and password. During the registration process, if you provide the following additional information to supplement your personal information, it will help us to provide you with better service and experience: your real name, real ID information, hometown, emotional status, constellation, occupation, school Your real avatar. However, if you do not provide this information, it will not affect the basic functions of using the platform products or services. The above information provided by you will continue to authorize us during your use of the Service. When you voluntarily cancel your account, we will make it anonymous or delete your personal information as soon as possible in accordance with applicable laws and regulations. (二)Show and push goods or services for you In order to improve our products or services and provide you with personalized information search and transaction services, we will extract your browsing, search preferences, behavioral habits based on your browsing and search history, device information, location information, and transaction information. Features such as location information, indirect crowd portraits based on feature tags, and display and push information. If you do not want to accept commercials that we send to you, you can cancel them at any time through the product unsubscribe feature. (三)Provide goods or services to you 1、Information you provide to us Relevant personal information that you provide to us when registering for an account or using our services, such as phone numbers, emails, bank card numbers or Alipay accounts; The shared information that you provide to other parties through our services and the information that you store when you use our services. Before providing the platform with the aforementioned personal information of the other party, you need to ensure that you have obtained your authorization. 2、Information we collect during your use of the service In order to provide you with page display and search results that better suit your needs, understand product suitability, and identify account anomalies, we collect and correlate information about the services you use and how they are used, including: Device Information: We will receive and record information about the device you are using (such as device model, operating system version, device settings, unique device identifier, etc.) based on the specific permissions you have granted during software installation and use. Information about the location of the device (such as Idiv address, GdivS location, and Wi-Fi that can provide relevant information) Sensor information such as access points, Bluetooth and base stations. Since the services we provide are based on the mobile social services provided by the geographic location, you confirm that the successful registration of the "this platform" account is deemed to confirm the authorization to extract, disclose and use your geographic location information. . If you need to terminate your location information to other users, you can set it to be invisible at any time. Log information: When you use our website or the products or services provided by the client, we will automatically collect your detailed usage of our services as a related web log. For example, your search query content, Idiv address, browser type, telecom carrier, language used, date and time of access, and web page history you visit. Please note that separate device information, log information, etc. are information that does not identify a particular natural person. If we combine such non-personal information with other information to identify a particular natural person or use it in conjunction with personal information, such non-personal information will be treated as personal information during the combined use, except for your authorization. Or as otherwise provided by laws and regulations, we will anonymize and de-identify such personal information. When you contact us, we may save information such as your communication/call history and content or the contact information you left in order to contact you or help you solve the problem or to document the resolution and results of the problem. 3、Your personal information collected through indirect access You can use the products or services provided by our affiliates through the link of the platform provided by our platform account. In order to facilitate our one-stop service based on the linked accounts and facilitate your unified management, we will show you on this platform. Information or recommendations for information you are interested in, including information from live broadcasts and games. You can discover and use the above services through the homepage of the platform, "More" and other functions. When you use the above services through our products or services, you authorize us to receive, aggregate, and analyze from our affiliates based on actual business and cooperation needs, we confirm that their source is legal or that you authorize to consent to your personal information provided to us or Trading Information. If you refuse to provide the above information or refuse to authorize, you may not be able to use the corresponding products or services of our affiliates, or can not display relevant information, but does not affect the use of the platform to browse, chat, release dynamics and other core services. (四)Provide you with security Please note that in order to ensure the authenticity of the user's identity and provide you with better security, you can provide us with identification information such as identity card, military officer's card, passport, driver's license, social security card, residence permit, facial identification, and other biometric information. Personally sensitive information such as Sesame Credit and other real-name certifications. If you refuse to provide the above information, you may not be able to use services such as account management, live broadcast, and continuing risky transactions, but it will not affect your use of browsing, chat and other services. To improve the security of your services provided by us and our affiliates and partners, protect the personal and property of you or other users or the public from being compromised, and better prevent phishing websites, fraud, network vulnerabilities, computer viruses, cyber attacks , security risks such as network intrusion, more accurately identify violations of laws and regulations or the relevant rules of the platform, we may use or integrate your user information, transaction information, equipment information, related web logs and our affiliates, partners to obtain You authorize or rely on the information shared by law to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary records, audits, analysis, and disposal measures in accordance with the law. (五)Other uses When we use the information for other purposes not covered by this policy, or if the information collected for a specific purpose is used for other purposes, you will be asked for your prior consent. (六)Exception for authorization of consent According to relevant laws and regulations, collecting your personal information in the following situations does not require your authorized consent: 1、Related to national security and national defense security; 2、Related to public safety, public health, and major public interests; 3、Related to criminal investigation, prosecution, trial and execution of judgments, etc.; 4、It is difficult to obtain your own consent for the maintenance of the important legal rights of the personal information or other individuals’ lives and property; 5、The personal information collected is disclosed to the public by yourself; 二、How do we use cookies and similar technologies? (一)Cookies To ensure that your site is up and running, to give you an easier access experience, and to recommend content that may be of interest to you, we store a small data file called a cookie on your computer or mobile device. Cookies usually contain an identifier, a site name, and some numbers and characters. With cookies, websites can store data such as your preferences. (二)Website Beacons and Pixel Labels In addition to cookies, we use other technologies like web beacons and pixel tags on our website. For example, the email we send to you may contain an address link to the content of our website. If you click on the link, we will track the click to help us understand your product or service preferences so that we can proactively improve customer service. Experience. A web beacon is usually a transparent image that is embedded in a website or email. With the pixel tags in the email, we can tell if the email is open. If you don't want your event to be tracked this way, you can unsubscribe from our mailing list at any time. 三、How do we share, transfer, and publicly disclose your personal information? (一)shared We do not share your personal information with companies, organizations, and individuals other than the platform's service providers, with the following exceptions: 1、Sharing with explicit consent: We will share your personal information with others after obtaining your explicit consent. 2、Sharing under statutory circumstances: We may share your personal information in accordance with laws and regulations, litigation dispute resolution needs, or in accordance with the requirements of the administrative and judicial authorities. 3. Sharing with affiliates: In order to facilitate our services to you based on linked accounts, we recommend information that may be of interest to you or protect the personal property of affiliates or other users or the public of this platform from being infringed. Personal information may be shared with our affiliates. We will only share the necessary personal information (for example, to facilitate the use of our affiliated company products or services, we will share your necessary account information with affiliates) if we share your personal sensitive information or affiliate changes The use of personal information and the purpose of processing will be re-examined for your authorization. 4. Sharing with Authorized Partners: For the purposes stated in this Privacy Policy, some of our services will be provided by us and our authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, arrange a partner to provide services. We will only share your personal information for legitimate, legitimate, necessary, specific, and specific purposes, and will only share the personal information necessary to provide the service. Our partners are not authorized to use shared personal information for other purposes unrelated to the product or service. Currently, our authorized partners include the following types: (2) Suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business, including providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, and facilitating payments. Or conduct academic research and investigations. (1) Authorized partners in advertising and analytics services. We will not use your personally identifiable information (information that identifies you, such as your name or email address, which can be used to contact you or identify you) and provide advertising and analytics services, unless you have your permission. Shared by partners. We will provide these partners with information about their advertising coverage and effectiveness, without providing your personally identifiable information, or we may aggregate this information so that it does not identify you personally. For example, we’ll only tell advertisers how effective their ads are when they agree to comply with our advertising guidelines, or how many people see their ads or install apps after seeing ads, or work with them. Partners provide statistical information that does not identify individuals (eg “male, 25-29 years old, in Beijing”) to help them understand their audience or customers. For companies, organizations and individuals with whom we share personal information, we will enter into strict data protection agreements with them to process individuals in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures. information. (2) Transfer We do not transfer your personal information to any company, organization or individual, except: Transfer with the express consent: After obtaining your explicit consent, we will transfer your personal information to other parties; 2, in the case of mergers, acquisitions or bankruptcy liquidation, or other circumstances involving mergers, acquisitions or bankruptcy liquidation, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to receive This policy is bound, otherwise we will ask the company, organization and individual to re-seek your consent. (3) Public disclosure We will only publicly disclose your personal information in the following circumstances: We may publicly disclose your personal information by obtaining your explicit consent or based on your active choice; 2, if we determine that you have violated laws and regulations or serious violations of the relevant rules of the platform, or to protect the personal safety of the platform and its affiliates users or the public from infringement, we may be based on laws and regulations or The relevant agreement rules of this platform disclose your personal information, including related violations, and the measures that the platform has taken against you, with your consent. (4) Exceptions for prior authorization of consent when sharing, transferring, and publicly disclosing personal information In the following situations, sharing, transferring, and publicly disclosing your personal information does not require prior authorization from you: Related to national security and national defense security; Related to public safety, public health, and major public interests; 3, related to criminal investigation, prosecution, trial and judgment execution; 4, in order to protect your or other individuals' life, property and other important legal rights but it is difficult to get my consent; Personal information that you disclose to the public on your own; Collect personal information from legally publicly disclosed information, such as legal news reports and government information disclosure. According to the law, sharing, transferring and de-identifying personal information, and ensuring that the data recipient cannot recover and re-identify the personal information subject, does not belong to the external sharing, transfer and public disclosure of personal information. The preservation and processing of the class data will not require additional notice and your consent. How do we protect your personal information? (1) We have taken reasonable and feasible security measures in accordance with the industry's general solutions to protect the security of personal information provided by you, and to prevent unauthorized access, public disclosure, use, modification, damage or loss of personal information. For example, SSL (Secure Socket) when exchanging data (such as credit card information) between your browser and the server Layer) protocol encryption protection; we use encryption technology to improve the security of personal information; we use a trusted protection mechanism to prevent personal information from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access individuals Information; and we will conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information. (2) We have advanced data security management system around the data life cycle, which enhances the security of the whole system from organizational construction, system design, personnel management, product technology and other aspects. (3) We will take reasonable and feasible measures and try our best to avoid collecting irrelevant personal information. We will only retain your personal information for the period of time required to achieve the purposes stated in this policy, unless the retention period is extended or permitted by law. (4) The Internet is not an absolutely secure environment. We strongly recommend that you do not use personal communication methods that are not recommended by this platform. You can connect and share with each other through our services. When you create communications, transactions, or sharing through our services, you can choose who you want to communicate, trade, or share as a third party who can see your trading content, contact information, exchange information, or share content. If you find that your personal information, especially your account or password, has been leaked, please contact our customer service immediately so that we can take appropriate measures according to your application. Please note that the information you voluntarily share or even share publicly when using our services may involve personal information of you or others or even sensitive personal information, such as when you post a news or choose to upload in public in group chats, circles, etc. A picture containing personal information. Please consider more carefully whether you share or even share information publicly when using our services. Please use complex passwords to help us keep your account secure. We will do our best to protect the security of any information you send us. At the same time, we will report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities. V. How your personal information is transferred globally Personal information collected and generated by us during our operations in the People's Republic of China is stored in China, with the following exceptions: Laws and regulations have clear provisions; 2, get your explicit authorization; 3, you through the Internet for cross-border live broadcast / release dynamics and other personal initiatives. In response to the above, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.
muhammadsohaib60
Our project is based on one of the most important application of machine learning i.e. pattern recognition. Optical character recognition or optical character reader is the electronic or mechanical conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo or from subtitle text superimposed on an image. We are working on developing an OCR for URDU. We studied a couple of research papers related to our project. So far, we have found that Both Arabic and Urdu are written in Perso-Arabic script; at the written level, therefore, they share similarities. The styles of Arabic and Persian writing have a heavy influence on the Urdu script. There are 6 major styles for writing Arabic, Persian and Pashto as well. Urdu is written in Naskh writing style which is most famous of all. Optical character recognition (OCR) is the process of converting an image of text, such as a scanned paper document or electronic fax file, into computer-editable text [1]. The text in an image is not editable: the letters are made of tiny dots (pixels) that together form a picture of text. During OCR, the software analyzes an image and converts the pictures of the characters to editable text based on the patterns of the pixels in the image. After OCR, the converted text can be exported and used with a variety of word-processing, page layout and spreadsheet applications [2]. One of the main aims of OCR is to emulate the human ability to read at a much faster rate by associating symbolic identities with images of characters. Its potential applications include Screen Readers, Refreshable Braille Displays [3], reading customer filled forms, reading postal address off envelops, archiving and retrieving text etc. OCR’s ultimate goal is to develop a communication interface between the computer and its potential users. Urdu is the national language of Pakistan. It is a language that is understood by over 300 million people belonging to Pakistan, India and Bangladesh. Due to its historical database of literature, there is definitely a need to devise automatic systems for conversion of this literature into electronic form that may be accessible on the worldwide web. Although much work has been done in the field of OCR, Urdu and other languages using the Arabic script like Farsi, Urdu and Arabic, have received least attention. This is due in part to a lack of interest in the field and in part to the intricacies of the Arabic script. Owing to this state of indifference, there remains a huge amount of Urdu and Arabic literature unattended and rotting away on some old shelves. The proposed research aims to develop workable solutions to many of the problems faced in realization of an OCR designed specifically for Urdu Noori Nastaleeq Script, which is widely used in Urdu newspapers, governmental documents and books. The underlying processes first isolate and classify ligatures based on certain carefully chosen special, contour and statistical features and eventually recognize them with the aid of Feed-Forward Back Propagation Neural Networks. The input to the system is a monochrome bitmap image file of Urdu text written in Noori Nastaleeq and the output is the equivalent text converted to an editable text file.
0xmonas
On-chain AI agent generator on Base. Create, mint, and register AI agents with fully on-chain pixel art and identity — powered by ERC-8004.
Leuchtfeuer
Allow Sync of Identity from outside system e.g. CMS login, though a control pixel with parameters
mpezeshki
RNN on MNIST (one pixel at a time) with Identity initialization
adilwiser
Privacy-first KYC web app with Zero-Knowledge Proofs (ZKP), pixel-art UI, Auth0, and MongoDB Atlas. Prove your identity without revealing sensitive data. Built for Data Hackfest 2025.
Abdushekur0985
NilePixel Tech is a creative group of intuitive developers who blend heritage and innovation. Rooted in African identity and inspired by the Nile — a symbol of life, connection, and growth — NilePixel merges this essence with the Pixel, the building block of modern digital creation. T
vinkCodesEXE
The aim of my project falls under image classification as it attempts to match images. The algorithm takes image inputs from the user and then cycles through images stored in its database and try to predict probabilities that these faces match. This algorithm has a multitude of uses depending upon the need. For example, the algorithm can be implemented by law enforcement to match CCTV footage with potential perpetrators, either to check for past offenders or as proof during a trial. It could similarly be used by companies when hiring people to check if they have a criminal record. The inspiration for my project arose from my frustration with the increase in identity fraud and the lack of solutions for it. When companies hire people, their attempts to conduct a thorough background check can be manipulated very easily. To solve such issues, I came up with the idea to build a database which stores the image of past offenders which can be used to find criminal records of individuals.The algorithm was built using a jupyter notebook and python programming language. I used a variety of libraries like numpy, tensorflow and cv2 to construct the algorithm. The algorithm was built over a period of two months during which my mentor and I worked on the algorithm and discussed various options on methods of improvement. To train the algorithm I built a celebrity image bank because of the ease of finding pictures at different angles. In my training set, I’ve used five images of twenty different celebrities at different angles and time periods. The first step was to build the framework of the neural network, where I specified an optimization function, the number of hidden layers and a maximum iteration. The algorithm begins by storing the image information from the database in a pixel array for colored photographs. The image is then resized to suit the algorithm As the pixel info of the images is quite memory intensive, I decided to resize down to 250*250 pixels and standardize the pixel rgb values .The next step is to train the algorithm, which I have done by calibrating its input layer to accept image pixel vectors, and then providing the algorithm instructions for the multiple layers of processing i.e. learning or looking for repeated pixel patterns from the stored images, a probability vector is outputted. This probability vector calculates the ‘similarity’ of the input image that matches each celebrity in the database.The purpose of this algorithm was to control crime based on identity theft, identity fraud and help the law enforcement departments to capture criminals. As the output is a probability vector, even if they used a disguise etc, the algorithm’s prediction would not be extremely compromised.
korryrdev
A full-stack Node.js/Express/MongoDB web application, developed by the Firewall Pixel team, Forensic students for our Integrated Thinking course. It generates HMAC-signed QR codes to give students a secure, tamper-resistant student digital identity verification.
assokhi
Real-time video recovery using Reinforcement Learning to maintain identity-invariant pixel weights during high packet loss.
tariqjamel
An image processing pipeline written in Verilog that performs RAW Bayer to RGB conversion and applies 3x3 convolution filters like blur and identity for pixel-level image enhancement.
PixeL24x8
This repository features packaging designs created by Pixel 24×8 for products across industries. From labels to box designs, each package reflects strong branding, creative visuals, and shelf-ready appeal tailored to the product’s identity and market.
Rashmi-S-Gowda
A software package is built for display and classification of Hyperspectral Images captured byIMS-1 HySI sensor has been developed using SAM.The construction and display of the 3-D cube by considering all the 64 bands of image at a time. The identification of classes in the Hyperspectral Image using a supervised classification algorithm called the Spectral Angle Mapper Algorithm. Results are obtained to read and reorganize multiple 2-D datasets into a single compact 3D dataset cube.Thematic Information Extraction — Supervised Classification Remotely sensed data may be analyzed to extract use- ful thematic information. This transforms the data into in- formation. For example, themes may include land-cover, water bodies, and clouds. The classification may be per- formed using supervised, unsupervised and fuzzy set clas- sification approaches. In a supervised image classification, the identity and lo- cation of some of the land-cover types should be known beforehand through a combination of fieldwork, analy- sis of aerial photography, maps, and personal experience. The analyst attempts to locate sites in the remotely sensed data that represent homogeneous examples of these known land-cover types. These areas are commonly referred to as training sites because the spectral characteristics of these known areas are used to train the classification algorithm for eventual land-cover mapping of the remainder of the image. Multivariate statistical parameters such as means, standard deviations, and covariance matrices are calculated for each training site. Every pixel both inside and outside these training sites is then evaluated and assigned to the class where it has the highest likelihood of being a mem- ber. This is often referred to as hard classification because a pixel is assigned to only one class (e.g., forest), even though the sensor records the radiant flux from a mixture of biophysical materials, for example: 10% bare soil, 20% scrub shrub, 70% forest.
oratioandco
PixelCotton Dynamic Identity
Horymir23
No description available
Manish-bat
No description available
Saurabh272
No description available
fluffmoth
Tiny pixel identity buttons database
wearedood
No description available
wearedood
A Celo dApp where users interact with the blockchain to discover their on-chain soulmate, rendered in 8-bit style.
wearedood
No description available
ArkDataShaw
ArkData Platform — Multi-tenant pixel tracking, identity resolution, and data activation
coderm186-cmyk
Google Pixel imei null fixed, Titan m2 tricked , Pixel6Pro-Hardware-Identity-Realignment, cyber security
sojanvarghese
A collaborative, interactive web experience where users can claim a single pixel in a vast 1000×1000 grid — one pixel, one identity, forever.
Cybercamp1
BioVault AI is a Web3 biometric identity and wallet security system that uses face and voice authentication to unlock encrypted private keys, combined with a privacy-preserving Binary Pixel NFT identity built from biometric data.
Chrisleo-16
UhakikiAI is an autonomous, multi-layered AI pipeline designed to eliminate identity fraud and certificate forgery in Kenya’s education sector. By integrating Generative AI for pixel-by-pixel document authenticity checks and Agentic AI (using LangChain/CrewAI) for automated fraud investigation.
armitagekerr
"High-performance automated compliance engine using Playwright and Node.js to detect GDPR/ePrivacy 'Prior Consent' failures. Features a dynamic severity escalator for identifying unauthorised tracking pixels and Google Identity Sync leaks."
jojoharnest1-coder
To help your web developer (SIBTO) create a perfect website for **Pixel Plus**, you’ll want to give them a clear, complete brief that covers your brand, goals, services, audience, and functionality. Here's a comprehensive guide you can share with them: --- ## 🧠 Brand Identity **Business Name:** Pixel Plus **Tagline (optional):** “Your Digital
Leemonztuff
IDENTITY DNA LOCK™ — MODULES MODULE 16 — FACE ANCHOR Copiar código ROLE: system The face of the base sprite defines the canonical identity. You must preserve: - Eye shape - Eye position - Facial pixel placement - Expression You are forbidden to redraw the face. MODULE 17 — HAIR LOCK Copiar código ROLE: system The hairstyle and hair silhouette ar