- 博客(158)
- 资源 (24)
- 收藏
- 关注
转载 万字长文带你看尽深度学习中的各种卷积网络
深度学习中的各种卷积网络大家知多少?对于那些听说过却又对它们没有特别清晰的认识的小伙伴们,Kunlun Bai这篇文章非常值得一读。Kunlun Bai 是一位人工智能、机器学习、物体学以及工程学领域的研究型科学家,在本文中,他详细地介绍了 2D、3D、1x1 、转置 、空洞(扩张)、空间可分离、深度可分离、扁平化、 分组等十多种卷积网络类型。AI 科技评论编译如下。如果你曾听过深度学习的各...
2019-03-09 19:07:58
508
转载 训练集(train)、验证集(validation)和测试集(test)
在有监督的机器学习中,经常会说到训练集(train)、验证集(validation)和测试集(test),这三个集合的区分可能会让人糊涂,特别是,有些读者搞不清楚验证集和测试集有什么区别。划分 #如果我们自己已经有了一个大的标注数据集,想要完成一个有监督模型的测试,那么通常使用均匀随机抽样的方式,将数据集划分为训练集、验证集、测试集,这三个集合不能有交集,常见的比例是8:1:1,当然比例是...
2019-03-09 09:14:04
23866
4
转载 SIFT: Theory and Practice - Generating a feature(转)
SIFT: Theory and Practice Generating a featureSeries: SIFT: Theory and Practice:Introduction The scale space LoG approximations Finding keypoints Getting rid of low contrast keypoints Key...
2018-11-26 17:46:09
401
转载 SIFT: Theory and Practice - Keypoint orientations(转)
SIFT: Theory and Practice Keypoint orientationsSeries: SIFT: Theory and Practice:Introduction The scale space LoG approximations Finding keypoints Getting rid of low contrast keypoints Ke...
2018-11-26 17:45:28
417
转载 SIFT: Theory and Practice - Getting rid of low contrast keypoints(转)
SIFT: Theory and Practice Getting rid of low contrast keypointsSeries: SIFT: Theory and Practice:Introduction The scale space LoG approximations Finding keypoints Getting rid of low contra...
2018-11-26 17:43:59
425
转载 SIFT: Theory and Practice - Finding keypoints(转)
SIFT: Theory and Practice Finding keypointsSeries: SIFT: Theory and Practice:Introduction The scale space LoG approximations Finding keypoints Getting rid of low contrast keypoints Keypoi...
2018-11-26 17:43:06
419
转载 SIFT: Theory and Practice - LoG approximations (转)
SIFT: Theory and Practice LoG approximationsSeries: SIFT: Theory and Practice:Introduction The scale space LoG approximations Finding keypoints Getting rid of low contrast keypoints Keypo...
2018-11-26 17:42:10
344
转载 SIFT: Theory and Practice - The scale space(转)
SIFT: Theory and Practice The scale spaceSeries: SIFT: Theory and Practice:Introduction The scale space LoG approximations Finding keypoints Getting rid of low contrast keypoints Keypoint...
2018-11-26 17:41:01
507
转载 SIFT: Theory and Practice - Introduction (转)
SIFT: Theory and PracticeLearn how the famous SIFT keypoint detector works in the background. This paper led a mini revolution in the world of computer vision!IntroductionSeries: SIFT: Theory an...
2018-11-26 17:39:43
241
转载 A tutorial on binary descriptors – part 5 – The FREAK descriptor(转)
A tutorial on binary descriptors – part 5 – The FREAK descriptorThis is our fifth post in the series about binary descriptors and here we will talk about the FREAK[4] descriptor. This is the last de...
2018-11-18 21:27:22
327
转载 A tutorial on binary descriptors – part 4 – The BRISK descriptor(转)
A tutorial on binary descriptors – part 4 – The BRISK descriptorThis fourth post in our series about binary descriptors that will talk about the BRISK descriptor [1]. We had an introduction to patch...
2018-11-18 21:26:17
270
转载 A tutorial on binary descriptors – part 3 – The ORB descriptor(转)
A tutorial on binary descriptors – part 3 – The ORB descriptorThis third post in our series about binary descriptors that will talk about the ORB descriptor [1]. We had an introduction to patch desc...
2018-11-18 21:25:13
488
转载 A tutorial on binary descriptors – part 2 – The BRIEF descriptor(转)
A tutorial on binary descriptors – part 2 – The BRIEF descriptorFollowing the previous posts that provided both an introduction to patch descriptors in general and specifically to binary descriptors...
2018-11-18 21:23:58
258
转载 Tutorial on Binary Descriptors – part 1(转)
Tutorial on Binary Descriptors – part 1Why Binary Descriptors?Following the previous post on descriptors, we’re now familiar with histogram of gradients (HOG) based patch descriptors. SIFT[1], SUR...
2018-11-18 21:22:13
322
转载 How to do distributed locking (转)
As part of the research for my book, I came across an algorithm called Redlock on the Redis website. The algorithm claims to implement fault-tolerant distributed locks (or rather, leases [1]) on top o...
2018-11-06 09:09:28
1344
原创 生成RSA私钥和公钥
#私钥openssl genrsa -out rsakey0.pem 1024#公钥openssl rsa -in rsakey0.pem -pubout -out rsakey0-pub.pem#pkcs8格式私钥openssl pkcs8 -topk8 -in rsakey0.pem -out pkcs8_rsa_private_key.pem -nocrypt
2018-07-05 09:27:40
1487
转载 Spring Beginners to Professionals
http://techieme.in/category/j2ee-concepts/spring-beginners-to-professionals/?order=ascSpring Beginners to Professionals
2017-12-31 21:43:52
253
转载 Understanding reference in java
http://www.pawlan.com/monica/articles/refobjs/https://stackoverflow.com/questions/299659/whats-the-difference-between-softreference-and-weakreference-in-javaAnalogy: Assume a JVM is a kingdo
2017-12-23 10:39:51
344
原创 配置MongoDB Sharding
1) 启动副本集三个shard,每个shard三个副本,三台机器(170/171/172),每台机器分别对应三个shard中的一个副本#170mongod --shardsvr --replSet shard-a --dbpath /mongo-data/rs-170-a --port 30000 --logpath /mongo-data/rs-170-a.log --fork --no
2017-09-12 16:40:02
778
原创 Recurrent Neural Networks - collections
The Unreasonable Effectiveness of Recurrent Neural NetworksUnderstanding LSTM NetworksRECURRENT NEURAL NETWORKREGULARIZATIONNeural Networks and Deep Learning
2016-12-05 14:23:57
493
转载 AOP技术基础
1、引言2、AOP技术基础3、Java平台AOP技术研究4、.Net平台AOP技术研究2.1 AOP技术起源AOP技术的诞生并不算晚,早在1990年开始,来自Xerox Palo Alto Research Lab(即PARC)的研究人员就对面向对象思想的局限性进行了分析。他们研究出了一种新的编程思想,借助这一思想或许可以通过减少代码重复模块从而帮助开发人员
2016-08-28 10:41:49
729
原创 Lp距离, L1范数, 和L2范数
LpL_p距离, L1L_1范数, 和 L2L_2范数LpL_p 距离定义为: Lp(xi,xj)=(∑l=1n|x(l)i−x(l)j|p)1p L_p(x_i, x_j) = \left( \sum_{l=1}^{n} | x_i^{(l)} - x_j^{(l)} |^p \right)^{\frac{1}{p}} 其中xi∈Rnx_i \in \mathbf{R}^n,
2016-07-31 17:12:22
13740
原创 TensorFlow - ImportError: cannot import name pywrap_tensorflow
>>> import tensorflow as tfTraceback (most recent call last): File "", line 1, in File "tensorflow/__init__.py", line 23, in from tensorflow.python import * File "tensorflow/python/_
2016-07-31 10:02:37
19207
11
原创 机器学习资源列表
Machine Learning Group at Department of Engineering, University of CambridgeMachine Learning Group at University of columbiaMachine Learning Research Group at university of texas at austinMachin
2015-10-27 13:28:20
903
转载 Understanding the Internal Message Buffers of Storm
Understanding the Internal Message Buffers of StormJun 21st, 2013 Table of ContentsInternal messaging within Storm worker processesIllustrationDetailed descriptionWorker processesExecutors
2014-10-21 09:41:13
1264
原创 shell使用随笔
001 对文件某一列求和awk '{sum += $collum};END {print sum}' /path/to/your/file
2014-08-01 17:01:45
831
转载 Shannon entropy
Shannon entropy is one of the most important metrics in information theory. Entropy measures the uncertainty associated with a random variable, i.e. the expected value of the information in the messag
2014-07-10 15:59:52
1831
转载 Positive-definite kernel
http://www.encyclopediaofmath.org/index.php/Bounded_operator
2014-07-10 15:43:16
1197
转载 Hilbert space
DefinitionA Hilbert space H is a real or complex inner product space that is also a complete metric space with respect to the distance function induced by the inner product.[2] To say that
2014-07-10 15:30:46
1439
转载 Positive-definite matrix
In linear algebra, a symmetric n × n real matrix M is said to be positive definite if zTMz is positive for every non-zero columnvector z of n real numbers. Here zT denotes thetranspose
2014-07-10 14:51:11
1480
原创 MVN使用随笔
001 创建项目mvn archetype:generate -DgroupId=com.funshion.push.monitor -DartifactId=push-monitor -DarchetypeArtifactId=maven-archetype-quickstart -DinteractiveMode=false002 [WARNING] File encoding h
2014-06-09 16:23:37
769
转载 The storage wars: Shadow Paging, Log Structured Merge and Write Ahead Logging
The storage wars: Shadow Paging, Log Structured Merge and Write Ahead Loggingprevious: Seek, and you shall find, or maybe delay a lot next: New interview questionI’ve been doing a lo
2014-04-29 23:13:33
1017
转载 MySQL删除表数据
在MySQL中有两种方法可以删除数据,一种是DELETE语句,另一种是TRUNCATE TABLE语句。DELETE语句可以通过WHERE对要删除的记录进行选择。而使用TRUNCATE TABLE将删除表中的所有记录。因此,DELETE语句更灵活。 如果要清空表中的所有记录,可以使用下面的两种方法: DELETE FROM table1 TRUNCATE TABLE table1
2014-04-14 16:38:51
111789
转载 MySQL存储过程之事务管理
原文链接:http://hideto.iteye.com/blog/195275MySQL存储过程之事务管理ACID:Atomic、Consistent、Isolated、Durable存储程序提供了一个绝佳的机制来定义、封装和管理事务。1,MySQL的事务支持MySQL的事务支持不是绑定在MySQL服务器本身,而是与存储引擎相关:Java代码
2014-04-14 11:34:27
858
转载 MySQL事务隔离级别详解
SQL标准定义了4类隔离级别,包括了一些具体规则,用来限定事务内外的哪些改变是可见的,哪些是不可见的。低级别的隔离级一般支持更高的并发处理,并拥有更低的系统开销。Read Uncommitted(读取未提交内容) 在该隔离级别,所有事务都可以看到其他未提交事务的执行结果。本隔离级别很少用于实际应用,因为它的性能也不比其他级别好多少。读取未提交的数据,也被称之为脏读(Dirty
2014-04-14 10:57:19
549
Real Time Big Data Analytics Emerging Architecture
2014-02-19
Ten steps to better requirements management
2014-01-17
Towards the Next Generation of Recommender Systems
2013-08-06
A-Comparative-Study-of-Reco-mmendation-Algorithms-in-E-Commerce-Applications
2013-08-02
twisted-introduction
2013-07-31
A-collection-of-popular-NoSQL-articles-published-on-InfoQ.com
2013-07-19
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人