There are no reviews yet. Be the first to send feedback to the community and the maintainers!
itihasa
A large scale Sanskrit-English translation datasetdeepmind-dqn
The original Deepmind Atari 2600 DQN codechess-misc
Misc tools for rStockcoref-rl
Rewarding Coreference Resolvers for Being Consistent with World Knowledgerobust-maml
https://aclanthology.org/2021.findings-acl.106/varta
ellipsis-baselines
A Simple Transfer Learning Baseline for Ellipsis Resolutionmodel-based-coref
Resources for "Model-based annotation of coreference"TicTacToe
The classic game as a testbed for AI playersCriminalTracker
A smart tracker which uses GPS data to predict path trajectories of potential criminals. Won the IBM iCare challenge in 2014.neuroph
Neuroph clone with Eclipse compatibilityrStock
This project modifies Stockfish and plugs in a neural evaluation function and a companion trainer for purely academic purposes. I thank Andrey Kotlarski without whose BPN, this project would be a lot harder to implement.ramayana
English translation of Valmiki Ramayana by Hari Prasad Shastridarviz-issues
This repository is meant for raising and monitoring issues related to @ibmdarvizBasicSearch
A simple search engine written in Python to acclimatize myself with various concepts such as k-gram indexing, stemming, etcjoint-coref-srl
Othello
2048
Port of Gabriele Cirulli's 2048 to Android (https://github.com/gabrielecirulli/2048)rStockTrainer
This is the trainer module for the rStock engine. It trains a new or exisitng NN and saves it future use. We can also test the trained network and find the sqaured error for a perticular training set. Also, the number of training threads and epochs can be set according to needs.PhoneAuth
An Android application built for additional authentication and user verification. The app when installed on the userโs mobile, automatically performs a handshake with a pre-registered computer as and when it comes into Bluetooth range and identifies itself using the IMEI and MAC of the device. Thus, it can uniquely identify the user using his/her mobile device. This is built as a layer on top of the usual username-password protection system (using the Linux PAM APIs). This process happens periodically which means that if the user is not in the vicinity of the computer, it is immediately locked.Love Open Source and this site? Check out how you can help us