This repository contains the tutorials and homework assignments for CSCE 790: Neuromorphic computing course at UofSC.
☆11Apr 12, 2023Updated 2 years ago
Alternatives and similar repositories for CSCE790_neuromorphic_computing
Users that are interested in CSCE790_neuromorphic_computing are comparing it to the libraries listed below
Sorting:
- Code for the model presented in the paper "LISNN: Improving Spiking Neural Networks with Lateral Interactions for Robust Object Recogniti…☆12Nov 20, 2020Updated 5 years ago
- Reinforcement learning framework for spiking neural network actors with R-STDP for the master's thesis "Training Spiking Neural Networks …☆21May 26, 2022Updated 3 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated last month
- [ICLR 2024] Official implementation of Spiking Graph Contrastive Learning (0️⃣1️⃣ SpikeGCL)☆30May 8, 2024Updated last year
- An open source Python library for plotting, analyzing, modeling, and documenting semiconductor electronic devices.☆11Sep 14, 2021Updated 4 years ago
- ☆10Sep 10, 2025Updated 5 months ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- A macrospin simulation tool for nanoparticles☆12Dec 4, 2024Updated last year
- Collection of Spiking Neural Network applications for SNN Toolbox.☆34Apr 7, 2020Updated 5 years ago
- Conversion from CNNs to SNNs using Tensorflow-Keras☆39Apr 29, 2024Updated last year
- This is the official implementation of the 'SFOD: Spiking Fusion Object Detection'.☆37Mar 11, 2024Updated last year
- My amp pcbs☆11Jul 28, 2024Updated last year
- Reinforcement learning project using deep Q-learning to control the operations of an electrical microgrid☆10Jan 3, 2023Updated 3 years ago
- ☆10Dec 22, 2023Updated 2 years ago
- This is project for image segmentation based on Spiking Neural Network☆10May 7, 2016Updated 9 years ago
- Python library for Alphanov's PDM laser sources control☆13Feb 24, 2026Updated last week
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- Material for the machine vision course☆12Jan 3, 2023Updated 3 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- 題目練習☆13Sep 29, 2022Updated 3 years ago
- gcnano-binaries☆11Feb 9, 2026Updated 3 weeks ago
- This project is about energy efficiency and renewable energy topic. Developed multivariate time series model to forecast global warming. …☆10Sep 29, 2020Updated 5 years ago
- Modelling and Simulation of Dynamical Systems☆13Jan 3, 2026Updated 2 months ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- Portable electronic device to measure air and noise pollution☆12Feb 21, 2020Updated 6 years ago
- PyTorch and Loihi implementation of the Spiking Neural Network for decoding EEG on Neuromorphic Hardware☆49Jun 26, 2022Updated 3 years ago
- Extended Sensing via Dynamic Tactile Sensors☆10Apr 8, 2024Updated last year
- ☆11Jun 2, 2015Updated 10 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- GOST-34.11-2012 (Stribog) hash-function☆11May 12, 2015Updated 10 years ago
- USB library for ChipWhisperer devices☆15Jan 22, 2026Updated last month
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- Simulation of car parking in different parking lots using Unity ML-Agents☆12Dec 16, 2023Updated 2 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 3 weeks ago
- The project includes SRAM In Memory Computing Accelerator with updates in design/circuits submitted previously in MPW7, by IITD researche…☆16Jan 6, 2023Updated 3 years ago
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- Conda based Python distribution for the Raspberry Pi☆11Jul 16, 2018Updated 7 years ago
- Intruder.py - A powerful tool to customize attacks on websites. Has 4 different options of attacks☆12Dec 1, 2020Updated 5 years ago
- ☆12Aug 17, 2020Updated 5 years ago