A new second practical assignment for Huawei's NLP course
☆19Mar 20, 2024Updated last year
Alternatives and similar repositories for nlp_huawei_new2_task
Users that are interested in nlp_huawei_new2_task are comparing it to the libraries listed below
Sorting:
- Neural model for prediction of stress position in Russian words☆13Jun 22, 2025Updated 8 months ago
- ☆13Dec 7, 2022Updated 3 years ago
- NLP course materials at ITMO☆13Apr 17, 2025Updated 10 months ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Updated this week
- ☆13Dec 2, 2023Updated 2 years ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- ☆14Oct 19, 2025Updated 4 months ago
- Using transformers to generate Russian poetry☆37Aug 21, 2023Updated 2 years ago
- The tiniest sentence encoder for Russian language☆247Jul 25, 2024Updated last year
- A local, voice-controlled AI assistant with the personality of HAL 9000 from 2001: A Space Odyssey.☆22Aug 16, 2025Updated 6 months ago
- Статьи по роликам на канале мыш☆18Dec 26, 2025Updated 2 months ago
- Nanos klib for NVIDIA GPUs☆14Mar 25, 2025Updated 11 months ago
- Implementation of a fast semantic chunker in C++, installable in python 3.7+ projects.☆22Sep 20, 2025Updated 5 months ago
- Machine Learning Course☆12Nov 3, 2025Updated 4 months ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated last week
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- Russian phonetical transcription☆11Nov 19, 2025Updated 3 months ago
- ☆29Dec 20, 2025Updated 2 months ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 3 weeks ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- 🎵 muse: Music Separation☆11Feb 14, 2024Updated 2 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- Tokenizer for Text to Speech (TTS) models☆13Jan 16, 2025Updated last year
- Ghidra Loader for ESP32 Flash Dumps☆15Feb 10, 2025Updated last year
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- A hackable library for running and fine-tuning modern transformer models on commodity and alternative GPUs, powered by tinygrad.☆28Feb 10, 2026Updated 3 weeks ago
- ☆11Jun 2, 2015Updated 10 years ago
- QBDI Examples☆13Nov 15, 2022Updated 3 years ago
- Neural Network of enhancer regions☆14Aug 23, 2019Updated 6 years ago
- GOST-34.11-2012 (Stribog) hash-function☆11May 12, 2015Updated 10 years ago
- Multilingual RAG benchmark.☆10Nov 22, 2024Updated last year
- ☆12Aug 17, 2020Updated 5 years ago
- Repo for Kedro Academy☆26Feb 24, 2026Updated last week
- ☆14Dec 26, 2023Updated 2 years ago
- Intruder.py - A powerful tool to customize attacks on websites. Has 4 different options of attacks☆12Dec 1, 2020Updated 5 years ago
- Piper based VoiceDock TTS implementation☆11Aug 12, 2023Updated 2 years ago
- A Flow Matching-based Text-to-Speech Model with Emoji-driven Style Control☆28Feb 27, 2026Updated last week
- ☆12Jun 30, 2021Updated 4 years ago