laavanyebahl / OCR-Extracting-text-from-images-with-neural-networks
OCR using a simple network developed from scratch on NIST36 dataset vs with CNN on PyTorch on EMNIST dataset
☆13Updated 6 years ago
Alternatives and similar repositories for OCR-Extracting-text-from-images-with-neural-networks:
Users that are interested in OCR-Extracting-text-from-images-with-neural-networks are comparing it to the libraries listed below
- Contenido práctico de la asignatura Señales y Sistemas de la carrera Ingeniería de Sonido, en la Universidad Nacional de Tres de Febrero.☆8Updated 10 months ago
- An implementation of memcpy for amd64 with clang/gcc☆15Updated 3 years ago
- CA Issuers Monitor (Authority Info Access)☆13Updated 2 years ago
- Private Internet Access - Windows TAP adapter for Desktop VPN Client☆12Updated 5 years ago
- Neural network with learning without a teacher, performing the task of visualization and clustering.☆8Updated 5 years ago
- Copy of GAlib (http://lancet.mit.edu/ga/) for use in pngwolf-zopfli☆13Updated last year
- Header-only portable implementations of common Intel intrisics, including cryptographic instructions.☆13Updated 3 weeks ago
- LibXDiff (built using CMake)☆10Updated 3 years ago
- ☆19Updated 4 years ago
- Crypto algorithms for use in Canokeys☆13Updated last month
- My software engineering notes.☆18Updated this week
- Use Convolutional Recurrent Neural Network to recognize the Handwritten Word text image without pre segmentation into words or characters…☆37Updated 2 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆13Updated last year
- FPE - Format Preserving Encryption with FF3 in C☆13Updated 2 months ago
- Fork of https://git.zx2c4.com/wintun☆13Updated last year
- A small tool for quickly generating LLVM passes☆28Updated this week
- The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language☆23Updated 10 years ago
- A tiny library to properly encrypt IP addresses.☆15Updated this week
- Sample of standalone portable C to verify Ed25519 public-key signature☆20Updated 8 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- A socks5 server in C☆11Updated 6 years ago
- JuCC - Jadavpur University Compiler Compiler☆43Updated 3 years ago
- Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.☆9Updated last year
- https://pypi.org/project/kviz/ Visualization library for keras neural networks. Contributions welcome☆25Updated 3 months ago
- xxhash-64 in 20 lines☆23Updated 9 months ago
- Implement design patterns using c++☆11Updated 5 years ago
- Handwriting Recognition System based on a deep Convolutional Recurrent Neural Network architecture☆447Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 8 months ago
- An implementation of go-libp2p-interface-pnet☆12Updated 2 years ago
- Proxy for efficiently circumventing censorship using existing tools and gathering information about censorship around the world.☆13Updated 6 years ago