2020CVPR -- Deep Unfolding Network for Image Super-Resolution
[paper] : Deep Unfolding Network for Image Super-Resolution
[github] : https://github.com/cszn/USRNet
Learning-based single image super-resolution (SISR) methods are continuously showing superior effectiveness and efficiency over traditional mod ...
Posted on Thu, 21 May 2020 23:29:34 -0400 by peri
Hadoop? MapReduce compression case
Compress at map output
modify Hadoop'wordcount word statistics engineering Just modify the main method of MyWordCount:
Posted on Sun, 26 Apr 2020 12:42:10 -0400 by mbarmawi
The TronTool.Java development package is suitable for rapidly increasing the support ability of Tron/USDT-TRC20 digital assets for Java applications, that is, it supports the application scenarios using its own Tron blockchain nodes, and also supports the lightweight deployment scenarios based on the official public API services of Tron. Offici ...
Posted on Mon, 13 Apr 2020 03:04:47 -0400 by gethinw
Base64 is a method of representing arbitrary binary data with 64 characters. For binary data, a group of three bytes is encoded as four bytes, that is, 3 × 8bit=4 × 6bit. As shown in the figure below, the three consecutive bytes (8bit) are divided into four 6bits, and then each 6bit high two bits ...
Posted on Sat, 04 Apr 2020 18:33:42 -0400 by Mesden
Recently, we built a large data platform by ourselves. Due to time problems and tight schedule, we could not measure the platform.Now that the platform is built, it is planned to test the platform components one by one.
Welcome to correct, don't spray!
Tests the ability of the Kafka cluster to write and consume messag ...
Posted on Sat, 04 Apr 2020 11:37:12 -0400 by yogicasey
In order to ensure the data's concealment and security, we often save some password data stored in the database by encryption, among which MD5 is a common encryption method
2. Encryption method
I know that there are two ways to achieve encryption
1. Encrypt before data insertion
2. Encrypt when inserting data
Posted on Fri, 03 Apr 2020 20:26:37 -0400 by sineadyd
In recent period of time, we have wandered back and forth between image algorithm and audio algorithm.
There are often some requirements for audio sampling and transcoding.
Existing well-known open source libraries, such as webrtc, Sox, etc,
Code reading is really disturbing.
And audio resampling is actually interpolation algorithm.
It is not m ...
Posted on Fri, 03 Apr 2020 18:57:53 -0400 by tcarnes
Premise: when you go to the toilet, there is only one pit, and someone takes it
IO: synchronous blocking (waiting at the door of the toilet, doing nothing, waiting for the person to come out)
NIO: synchronous non blocking (take a cigarette out of the door and go in every now and then to see if the person is out)
AIO: asynchronous non blocking ( ...
Posted on Mon, 23 Mar 2020 10:31:02 -0400 by shaneH
This article mainly analyzes the implementation details of NettyServer and HeaderExchangeServer.
The whole class diagram of NettyServer is as follows:
First, take a look at the properties held by the NettyServer object in general:
private final ChannelHandler handler
Event handling Handler.
private volatile URL ur ...
Posted on Sun, 22 Mar 2020 12:16:06 -0400 by b-real
1. Background of dynamic picture production
With the development of wechat, more and more people like to fight with pictures and use dynamic pictures. If you can explain with a picture, you don't need to force with words. I've made an executable program, which can be used to make dynamic pictures.
Posted on Sat, 07 Mar 2020 09:07:02 -0500 by SleepyP