Search alternatives:
code encryption » image encryption (Expand Search)
code detection » score detection (Expand Search), case detection (Expand Search), wide detection (Expand Search)
code encryption » image encryption (Expand Search)
code detection » score detection (Expand Search), case detection (Expand Search), wide detection (Expand Search)
-
301
Echo Peak
Published 2025“…It leverages an external peak detection function (<code>do_SimpleDetection0</code>) described in <i>Passive Acoustic Monitoring for Cetaceans</i> by Zimmer et al., making it suitable for integration into established passive acoustic monitoring workflows.…”
-
302
-
303
-
304
Video 1_TDE-3: an improved prior for optical flow computation in spiking neural networks.mp4
Published 2025“…<p>Motion detection is a primary task required for robotic systems to perceive and navigate in their environment. …”
-
305
Data Sheet 1_TDE-3: an improved prior for optical flow computation in spiking neural networks.pdf
Published 2025“…<p>Motion detection is a primary task required for robotic systems to perceive and navigate in their environment. …”
-
306
-
307
-
308
Table 1_High-throughput end-to-end aphid honeydew excretion behavior recognition method based on rapid adaptive motion-feature fusion.docx
Published 2025“…Compared with the model excluding the RK50 module, the mAP50 improved by 2.9%, and its performance in detecting small-target honeydew significantly surpassed mainstream algorithms. …”
-
309
-
310
A Tutorial on the Use of Artificial Intelligence Tools for Facial Emotion Recognition in R
Published 2025“…Furthermore, we provide an introductory level explanation of the machine learning, deep learning, and computer vision algorithms that underlie most emotion detection programs in order to improve literacy of explainable artificial intelligence in the social and behavioral science literature.…”
-
311
Research data for paper: Efficient Event-based Delay Learning in Spiking Neural Networks
Published 2025“…We evaluate our method on a simple sequence detection task, as well as the Yin-Yang, Spiking Heidelberg Digits, Spiking Speech Commands and Braille letter reading datasets, demonstrating that our algorithm can optimise delays from suboptimal initial conditions and enhance classification accuracy compared to architectures without delays. …”
-
312
-
313
Catalogue of compact radio sources in Messier-82 from e-MERLIN observations
Published 2025“…Source finding was initially performed using Python Blob Detection and Source Finder (PyBDSF).</p><p dir="ltr">The dataset includes two tables detailing the properties of these 36 sources:</p><p dir="ltr"><b>Table 3.1: CASA </b><code><strong>imfit</strong></code><b> Source Catalogue</b></p><p dir="ltr">This table contains source parameters derived using the CASA task <code>imfit</code>. …”
-
314
Arithmetic modules.
Published 2025“…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
-
315
SDF Unit.
Published 2025“…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
-
316
8-point DIT NTT data flow.
Published 2025“…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
-
317
First two stages of pipelined SDFNTT for Kyber.
Published 2025“…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
-
318
Unified CT/GS radix-2 butterfly architecture.
Published 2025“…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
-
319
PUs connected in pipelined SDFNTT for Kyber.
Published 2025“…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”
-
320
Dataflow of first two stages for Kyber SDFNTT.
Published 2025“…CRYSTALS-Kyber, based on Lattice-based cryptography, has been standardized as the Public-Key Encryption and Key-Establishment Mechanism Algorithm by the National Institute of Standards and Technology (NIST). …”