The study notes of calf -- sonar data analysis

This lecture: How to load and prepare data How to create a baseline neural network How to use scikit learn and k-fold cross validation to evaluate Keras model How data preparation can improve your model performance How to adjust the network topology can improve the performance test of the model 1. ...

Posted on Thu, 12 Mar 2020 21:27:09 -0700 by kovudalion

How to use GAN to color Pokemon

In the previous Demo, we used the conditional GAN to generate a handwritten digital image. So what else can we do with neural networks besides generating digital images? In this case, we use neural network to color the wireframe of Pokemon. Step 1: import and use the library from __future__ import absolute_import, division, print_function, uni ...

Posted on Thu, 12 Mar 2020 20:37:02 -0700 by tkmk

Java byte stream

Catalog Byte stream 1. input stream a. Common methods of InputStream b. FileInputStream class c. Read and display files 2. output stream a. Common methods of OutputStream b. FileOutputStream class c. Write data c. Write and read data Byte stream byte stream class processes data in bytes; ...

Posted on Wed, 11 Mar 2020 22:20:15 -0700 by IMP_TWI

Three publishing strategies to solve the problem of rapid application delivery in K8s

By Hao Shuwei, senior R & D Engineer of alicloud Preface Software technology updates quickly, but our goal is always the same. That is to increase the deployment frequency of applications and shorten the iteration cycle of product functions on the premise of security and stability. This benefit is that enterprises can obtain the price value ...

Posted on Wed, 11 Mar 2020 21:45:38 -0700 by Plasma

Tutorial of PyTorch generation countermeasure network (DCGAN)

To read the illustrated tutorial, go to http://studyai.com/pytorch-1.4/beginner/dcgan_faces_tutorial.html This tutorial introduces DCGANs with an example. We will train a general adversarial network (GAN) to generate new celebrities after showing it many photos of celebrities. Most of the code here comes from the implementation of Python / exam ...

Posted on Wed, 11 Mar 2020 04:32:32 -0700 by atulkul

Linux learning -- socket network programming foundation

Hierarchical model OSI seven layer model 1. Physical layer: it mainly defines physical equipment standards, such as interface type of network cable, interface type of optical fiber, transmission rate of various transmission media, etc. Its main function is to transmit the bit stream (that is, from 1, ...

Posted on Wed, 11 Mar 2020 04:03:09 -0700 by RockyShark

Right search algorithm idea

The following is a programming problem of byte jumping on the network. I wrote a solution with a time complexity of O(n*n), but it timed out. Later, I saw an algorithm with a time complexity of O(n). I called it to explore the algorithm to the right. Time limit: 1 second for C / C + + and 2 seconds for ...

Posted on Tue, 10 Mar 2020 22:32:47 -0700 by ossi69

RPC principle and GRPC details

1, RPC principle 1. RPC framework origin As the volume of single application becomes larger and larger, and the code is not easy to maintain and manage, a microservice architecture is generated, which is divided into independent services according to public or functional modules, and then independent services can be called each other. How to ca ...

Posted on Tue, 10 Mar 2020 20:44:49 -0700 by reckdan

Active Information Collection

Introduction to active information collection Interacting directly with the target system will not avoid leaving traces of access, using a controlled third-party computer to detect, using a proxy or a controlled machine to scan, sending different probes, and determining the target status based on the returned results Scan based on TCP/IP model ...

Posted on Tue, 10 Mar 2020 09:56:58 -0700 by babyrocky1

Correct practices for relationship binding between Channel and users of project system Netty and security scenarios for Channel channel

Preface Consider a functional business that communicates in real time to a specified user in a web program In the Socket communication functions used by the Web (e.g. online customer service), to ensure peer-to-peer communication, this seemingly simple channel will actually encounter a lot of problems based on the user finding the channel The ...

Posted on Tue, 10 Mar 2020 09:55:26 -0700 by EPCtech