Hamming Error Correction Codes (SECDED)
☆25Jun 3, 2020Updated 5 years ago
Alternatives and similar repositories for hamming
Users that are interested in hamming are comparing it to the libraries listed below
Sorting:
- ☆12Jan 5, 2019Updated 7 years ago
- Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results f…☆11Apr 21, 2021Updated 4 years ago
- My solution to labs for self-study students in CS:APP3e.☆11Mar 30, 2020Updated 5 years ago
- A simple baremetal program template for RISC-V inspired from riscv benchmark tests☆11Apr 17, 2018Updated 7 years ago
- Parallel external merge sort via Python/multiprocessing☆10Oct 10, 2011Updated 14 years ago
- ☆13Apr 1, 2017Updated 8 years ago
- Image compression and recovery via a Laplacian Convolutional Neural Network☆11Jan 13, 2018Updated 8 years ago
- Implementation of Trivium Stream Cipher in Python☆17Jan 23, 2018Updated 8 years ago
- LDPC codes for Illumina sequencing-based DNA storage☆11Dec 2, 2020Updated 5 years ago
- A Python implementation of Adobe's Creative Cloud Lightroom API☆12Apr 15, 2025Updated 10 months ago
- Polynomial arithmetic over GF2☆12Oct 30, 2018Updated 7 years ago
- Complete simulation of IEEE 754 fixed and floating point specification to any precision☆12Aug 26, 2020Updated 5 years ago
- Image Compression on COCO Dataset using Convolution AutoEncoders☆12Feb 24, 2019Updated 7 years ago
- Repository for compilation and cycle-accurate simulator for scale-out systolic arrays☆16Jan 4, 2023Updated 3 years ago
- File compression library | Shennon | Fano | Huffman | Bigram Huffman | Adaptive Huffman | Arithmetic coding☆13May 10, 2020Updated 5 years ago
- DFT watermarking method robust to print-scan, halftoning, and other degradation attacks☆12Oct 3, 2020Updated 5 years ago
- Python driver for fingerprint scanner☆11Apr 23, 2021Updated 4 years ago
- ☆13Aug 10, 2021Updated 4 years ago
- Java实现网盘☆10Sep 12, 2015Updated 10 years ago
- [CF ’20] Verified Instruction-Level Energy Consumption Measurement for NVIDIA GPUs☆15Dec 11, 2020Updated 5 years ago
- GPGPU-SIM 使用篇☆14Nov 12, 2022Updated 3 years ago
- Song et al., End-to-End Image Stitching Network via Multi-Homography Estimation, IEEE SPL, 2021☆17Jun 25, 2021Updated 4 years ago
- ☆15May 1, 2022Updated 3 years ago
- A way for JavaFx and based on Jfoenix to generate a diglog☆15Sep 13, 2023Updated 2 years ago
- Wake-up-word(WUW)system is an emerging development in recent times. Voice interaction with systems have made life ease and aids in multi-…☆18Mar 11, 2019Updated 6 years ago
- ☆14Sep 20, 2017Updated 8 years ago
- Cryptographic Key Generation from PUF Data☆23Oct 29, 2019Updated 6 years ago
- Implementation of RC6 encryption and decryption in python.☆20Mar 11, 2017Updated 8 years ago
- Implement some trivial digital watermark and test its robustness☆17Apr 12, 2019Updated 6 years ago
- Implementation of Strumok stream cipher☆19Aug 20, 2022Updated 3 years ago
- ☆21Nov 29, 2022Updated 3 years ago
- Accelerated Computer Vision Lab (ACCV-Lab) is a systematic collection of packages with the common goal to facilitate end-to-end efficient…☆46Feb 15, 2026Updated 3 weeks ago
- BCH (Bose-Chaudhuri-Hocquenghem) encoder and decoder built from scratch in matlab as course project for EE5160: Error Control Coding☆18Mar 31, 2017Updated 8 years ago
- torch.compile artifacts for common deep learning models, can be used as a learning resource for torch.compile☆19Dec 22, 2023Updated 2 years ago
- 笔记本☆18Oct 22, 2021Updated 4 years ago
- study of Ampere' Sparse Matmul☆18Jan 10, 2021Updated 5 years ago
- Bokeh demonstration of streaming and patching OHLC chart using synthetic generated data.☆17Jan 30, 2018Updated 8 years ago
- A very basic demonstration connecting speech recognition and text-to-speech☆20May 3, 2020Updated 5 years ago
- DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization☆24Aug 31, 2021Updated 4 years ago