Showing 301 - 320 results of 365 for search '(( code detection algorithm ) OR ( code encryption algorithm ))', query time: 0.21s Refine Results
  1. 301

    Echo Peak by Rocco De Marco (14146593)

    Published 2025
    “…It leverages an external peak detection function (<code>do_SimpleDetection0</code>) described in <i>Passive Acoustic Monitoring for Cetaceans</i> by Zimmer et al., making it suitable for integration into established passive acoustic monitoring workflows.…”
  2. 302
  3. 303
  4. 304

    Video 1_TDE-3: an improved prior for optical flow computation in spiking neural networks.mp4 by Matthew Yedutenko (5142461)

    Published 2025
    “…<p>Motion detection is a primary task required for robotic systems to perceive and navigate in their environment. …”
  5. 305

    Data Sheet 1_TDE-3: an improved prior for optical flow computation in spiking neural networks.pdf by Matthew Yedutenko (5142461)

    Published 2025
    “…<p>Motion detection is a primary task required for robotic systems to perceive and navigate in their environment. …”
  6. 306
  7. 307
  8. 308

    Table 1_High-throughput end-to-end aphid honeydew excretion behavior recognition method based on rapid adaptive motion-feature fusion.docx by Zhongqiang Song (21669041)

    Published 2025
    “…Compared with the model excluding the RK50 module, the mAP50 improved by 2.9%, and its performance in detecting small-target honeydew significantly surpassed mainstream algorithms. …”
  9. 309
  10. 310

    A Tutorial on the Use of Artificial Intelligence Tools for Facial Emotion Recognition in R by Austin Wyman (17559054)

    Published 2025
    “…Furthermore, we provide an introductory level explanation of the machine learning, deep learning, and computer vision algorithms that underlie most emotion detection programs in order to improve literacy of explainable artificial intelligence in the social and behavioral science literature.…”
  11. 311

    Research data for paper: Efficient Event-based Delay Learning in Spiking Neural Networks by Balázs Mészáros (16890225)

    Published 2025
    “…We evaluate our method on a simple sequence detection task, as well as the Yin-Yang, Spiking Heidelberg Digits, Spiking Speech Commands and Braille letter reading datasets, demonstrating that our algorithm can optimise delays from suboptimal initial conditions and enhance classification accuracy compared to architectures without delays. …”
  12. 312
  13. 313

    Catalogue of compact radio sources in Messier-82 from e-MERLIN observations by Sibongumusa Shungube (21197363)

    Published 2025
    “…Source finding was initially performed using Python Blob Detection and Source Finder (PyBDSF).</p><p dir="ltr">The dataset includes two tables detailing the properties of these 36 sources:</p><p dir="ltr"><b>Table 3.1: CASA </b><code><strong>imfit</strong></code><b> Source Catalogue</b></p><p dir="ltr">This table contains source parameters derived using the CASA task <code>imfit</code>. …”
  14. 314

    Arithmetic modules. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
  15. 315

    SDF Unit. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
  16. 316

    8-point DIT NTT data flow. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
  17. 317

    First two stages of pipelined SDFNTT for Kyber. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
  18. 318

    Unified CT/GS radix-2 butterfly architecture. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
  19. 319

    PUs connected in pipelined SDFNTT for Kyber. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
  20. 320

    Dataflow of first two stages for Kyber SDFNTT. by Ayesha Waris (21368446)

    Published 2025
    “…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”