The implementation of u-net in the paper of full convolution neural network

Article directory General steps of designing neural network The steps of Unet network design The most important characteristics of Unet network Sample code General steps of designing neural network design framework Design backbone network The steps of Unet network design Design the network ...

Posted on Sat, 22 Feb 2020 10:33:43 -0500 by sharmeen

CentOS 8 Deployment ELK Log Analysis Platform

demand 1. Developers cannot log on to online servers to view logs2. Each system has logs, so log fragmentation is difficult to find3. Large amount of log data, slow lookup, inadequate real-time data Solution: Deploy ELK Platform Introduction to ELK ELK is the abbreviation of three open source software, namely Elasticsearch, Logstash, Kibana ...

Posted on Mon, 17 Feb 2020 19:30:24 -0500 by gentusmaximus

Netty implements a simple http server

Since the client is a browser, only the server needs to be written Server: bind port 10086 package com.jym.http; import io.netty.bootstrap.ServerBootstrap; import io.netty.channel.ChannelFuture; import io.netty.channel.ChannelFutureListener; import io.netty.channel.EventLoopGroup; import io.netty.cha ...

Posted on Sat, 08 Feb 2020 10:05:08 -0500 by fross

Netty 4.1.45 causes of TCP packet splitting and sticking and Solutions

Article directory Simulation of abnormal conditions Server transformation Client transformation Operation result Analysis on the causes of unpacking and sticking Solutions to unpacking and sticking LineBasedFrameDecoder line break delimited message Server modification Client modification Operatio ...

Posted on Sat, 08 Feb 2020 04:43:12 -0500 by deltatango5

Machine learning practice -- naive Bayes method (code explanation)

Machine learning practice -- naive Bayes method Naive Bayes is the category that uses Bayes rule to calculate the posterior probability through the prior probability under the assumption that each feature is independent from each other, and outputs the maximum posterior probability. First, I will talk ...

Posted on Sat, 01 Feb 2020 11:24:04 -0500 by Inkyskin

[redis source code day reading] compressed list (ziplist)

Compressed list Like the author: redis source code, many comments and very detailed. Before looking at the source code of the compressed list, you can first look at the comments at the top of the ziplist.c file to basically understand the data structure design. The compressed list ziplist is a two-wa ...

Posted on Thu, 30 Jan 2020 00:22:05 -0500 by markmax33

Text classification - preprocessing

Preface: Text classification is a classic use scenario in NLP field. Text classification is generally divided into feature engineering + Classifier + result evaluation and feedback. Feature engineering is divided into: text preprocessing + feature extraction + text representation. This paper mainly de ...

Posted on Sun, 19 Jan 2020 23:15:31 -0500 by hooch_au78

Implementation of a lightweight RPC framework based on Netty and SpringBoot Client side request response synchronization

premise Pre article: Implementing a lightweight RPC framework based on Netty and SpringBoot protocol Implementing a lightweight RPC framework Server based on Netty and SpringBoot Implementing a lightweight RPC framework Client based on Netty and SpringBoot The previous article briefly introduced the ...

Posted on Sat, 18 Jan 2020 02:32:15 -0500 by scotch33

Java realizes SMS function through SMS platform

Preface This paper records the use of SMS platform built by China net, which needs to be registered before use. Here, only the use of SMS interface is recorded. 1. Login http://sms.webchinese.cn/User/?action=key Website registration. 2. Log in directly after registration. 3. After successful ...

Posted on Thu, 16 Jan 2020 04:27:50 -0500 by spyke01

Encryption and signature in data transmission

First, we will talk about symmetric encryption and asymmetric encryption: Symmetric encryption, whose important feature is that the encryption key and decryption key are the same, encryption speed is fast, but to solve the security problem of key transmission. Asymmetric encryption, in the process of encryption and decryption, a pair of pri ...

Posted on Fri, 10 Jan 2020 06:55:26 -0500 by RiBlanced