Elliptic curve cryptography is powerful. Calculating public key from known private key and base point can be handled easily. On…
Counting Points on Elliptic Curves over Finite Field: Order of Elliptic Curve Group
ECDSA enables to produce signatures faster. Besides, its both signatures and keys are much smaller than adopted alternative options offering…
Leaky ReLU as a Neural Networks Activation Function
Convolutional neural networks make ReLU activation function so popular. Common alternatives such as sigmoid or tanh have upper limits to…
Elegant Signatures with Elliptic Curve Cryptography
Elegance is the only beauty that never fades. This is a loving Audrey Hepburn quote. I struggle to adapt this…
Moving Numbers To Upside Down: Extended Euclidean Algorithm
You might be familiar with the upside down if you watched Netflix series Stranger Things. Eleven shows the underside of…
Real Time Facial Expression Recognition on Streaming Data
Previously, we’ve worked on facial expression recognition of a custom image. Additionally, we can detect multiple faces in a image,…
Sinc as a Neural Networks Activation Function
Sinc function is a sinusoidal activation function in neural networks. In contrast to other common activation functions, it has rises…
ELU as a Neural Networks Activation Function
Recently a new activation function named Exponential Linear Unit or its widely known name ELU was introduced. Researchs reveal that…
Facial Expression Recognition with Keras
Kaggle announced facial expression recognition challenge in 2013. Researchers are expected to create models to detect 7 different emotions from human…
A Gentle Introduction to Cross-Entropy Loss Function
Neural networks produce multiple outputs in multi-class classification problems. However, they do not have ability to produce exact outputs, they…