Python artificial intelligence v. TensorFlow creating regression neural network and Optimizer optimizer
Starting from this article, the author officially began to explain the knowledge related to Python in-depth learning, neural network and artificial intelligence. I hope you like it.The previous article explained TensorFlow basis and univariate linear prediction cases, as well as Session, variable, incoming value and excitation function; This ar ...
Posted by vampke on Thu, 02 Dec 2021 12:22:49 -0800
[Python image processing] III. acquiring image attributes, ROI regions of interest and channel processing
This series of articles is to explain Python OpenCV image processing knowledge. In the early stage, it mainly explains the introduction of image and the basic usage of OpenCV. In the middle stage, it explains various algorithms of image processing, including image sharpening operator, image enhancement technology, image segmentation, etc. in th ...
Posted by birwin on Thu, 02 Dec 2021 12:13:39 -0800
Fundamentals of network programming
Basic knowledge
Client: refers to the browser or custom client.
Server: like Tomcat server or custom client.
TCP/IP
TCP: transport layer protocol.
IP: network layer protocol.
TCP/UDP
Difference between TCP and UDP
TCP use case: used for RPC interface calls, sending e-mail and other things that need reliable transmission.
UDP use case: used ...
Posted by pureDesi on Thu, 02 Dec 2021 12:10:35 -0800
Spring Notes: Automatic assembly of bean s
Assembly refers to assigning attributes to objects. In addition to explicitly assigning attributes in xml files using the property tag, there are other ways to automatically assign attributes (assembly).
1. Auto-assemble using the autowire property of the bean tag.
The common values for the bean tag's autowire property are byName and byType, wh ...
Posted by rockroka on Thu, 02 Dec 2021 12:09:03 -0800
socket communication programming
socket introduction
The "ip address" of the network layer can uniquely identify the host in the network, while the "port" of the transport layer can uniquely identify the application (process) in the host. In this way, triples (ip address, protocol, port) are used The process of the network can be identified, and the proces ...
Posted by dimkasmir on Thu, 02 Dec 2021 11:57:34 -0800
Python artificial intelligence VI. basic usage of Tensorboard visualization and neural network rendering
After a busy week, I had a rest in the evening and then shared AI knowledge. The author of this series will explain Python deep learning, neural network and artificial intelligence. I hope you like it.The previous article explained how TensorFlow creates a regression neural network and Optimizer optimizer; This article will explain the basic us ...
Posted by Grant Cooper on Thu, 02 Dec 2021 11:38:19 -0800
Hadoop2.6.0+Linux Centos7+idea environment: MapReduce second degree friend recommendation case
Catalog
1. Problem Description
2. Writing Code + Packaging Project in intellij idea
3. Upload jar package to Linux in xftp
4. Preparing input data + Running jar package + Viewing input results in hadoop
1. Problem Description
With MapReduce, for each user, A suggests 10 users who are not friends with A, but have the most common friends w ...
Posted by ADLE on Thu, 02 Dec 2021 11:32:51 -0800
Spring boot17: asynchronous, scheduled, mail tasks
Asynchronous task
1. Create a service package
2. Create an AsyncService class
Asynchronous processing is still very common. For example, when we send mail on the website, the background will send mail. At this time, the foreground will cause the response to remain motionless. The response will not succeed until the mail is sent. Therefore, we g ...
Posted by ec on Thu, 02 Dec 2021 11:30:32 -0800
Usage of Scrapy Middleware - crawling the historical data of Douban top250/PM2.5
Get started with python Programming quickly (continuous update...)
python crawler from entry to mastery
Scrapy crawler framework
1. Classification and function of the scratch Middleware
1.1 classification of sweep Middleware
According to the different locations in the operation process of the sweep, it can be divided into: 1. Downloa ...
Posted by eaglelegend on Thu, 02 Dec 2021 11:18:51 -0800
Section V: data verification
1, Data verification
Data verification is involved in the project. If only front-end verification is unsafe, we can bypass the front-end verification, and the back-end verification must be added to important data;
1. Through the program, each data is taken out and verified. If it fails, go directly to the add page and prompt it to fill in again ...
Posted by Calver on Thu, 02 Dec 2021 11:09:52 -0800