[pytorch] transform resnet into a full convolution neural network to adapt to different input sizes

Why is resnet input certain? Because resnet finally has a full connection layer. Because of this full connection layer, the size of the input image must be fixed. What are the limitations of a fixed input size? The original resnet will scale the image to 224 × 224 on the imagenet dataset, but there are some limitations in doing so: (1 ...

Posted by pcjackson06 on Sun, 21 Jun 2020 21:45:52 -0700

[Golang] how to use the GRPC interface test tool? Swagger

This article does not involve principle, pure operation Operating system: Ubuntu 18.04 + AMD64. I packed the executable program of my own platform. For other platforms, please use the source code compilation tools. Before you start, install the protoc related tools and environment, specifically Bai ...

Posted by mustng66 on Fri, 19 Jun 2020 20:29:29 -0700

Python notes 1 - numpy section

Start to sort out the important modules of python and the parts that you often forget. First, let's study and sort out numpy. First of all, numpy (Numerical Python) is a very important library of python. It is also a program library that I often use in my study and work process. It is mainly used for ar ...

Posted by mccormr7 on Tue, 16 Jun 2020 20:30:40 -0700

CNN residual network

The use of residual network in CNN K. He, X. Zhang, S. Ren and J. Sun, "Deep Residual Learning for Image Recognition," in 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 2016 pp. 770-778.doi: 10.1109/CVPR.2016.90 Innovation: The residual network still ...

Posted by seodevhead on Mon, 15 Jun 2020 01:00:44 -0700

I heard that your resources have been stolen. Do you know how the Nginx anti-theft chain works?

As mentioned in the last article Variables and operation principle in Nginx , here is a module that mainly provides variables and modifies the values of variables, that is, the anti-theft chain module we want to talk about: the referer module. Simple and effective means of anti-theft chain scene If you ...

Posted by nats on Sun, 14 Jun 2020 02:39:02 -0700

Ordering system - buyer side - order

Article catalog DAO layer design Service layer design Controller layer design DAO layer design 1. Write two entity classes, OrderMaster and OrderDetail. Because it involves the update of the order modification time, add the annotation @ DynamicUpdate, that is, modify the time data during the upd ...

Posted by joshmaker on Fri, 12 Jun 2020 21:32:50 -0700

[js] D3 drawing parallel coordinates

Parallel coordinate system (parallel) is a kind of commonly used chart to visualize high-dimensional data. Parallel coordinate system has a good mathematical basis, and its projective geometry interpretation and dual characteristics make it suitable for visual data analysis. Article catalog 1. Drawin ...

Posted by henrygao on Wed, 10 Jun 2020 22:25:46 -0700

Leetcode 1472. Design browser history

Leetcode 1472. Design browser history You have a browser that only supports a single tab. The first page you browse is homepage. You can visit other website URLs, or step back or step forward in browsing history. Please implement BrowserHistory class: BrowserHistory(string homepage), initialize the b ...

Posted by watsonowen on Tue, 09 Jun 2020 02:02:01 -0700

Secondary encapsulation of paging data source and my current understanding

To be honest, the definition of paging data source is too tedious, so it's encapsulated twice, without any intrusion, clean and neat. It's preserved for the time being, maybe it can be used in my life.. package com.lk.care.respository import androidx.paging.DataSource import androidx.paging.PageKeyedDataSource import androidx.paging.PagedList ...

Posted by sy-co on Wed, 03 Jun 2020 06:58:43 -0700

Development of plug-ins for automatically generating getter and setter methods based on annotation processor

The copyright of this article belongs to the official account of WeChat public code ID:onblog. If it is reproduced, please keep the original statement of the paragraph, and the offender will investigate it. If there are any shortcomings, please welcome the official account of WeChat public. ] Yesterday, I found out by accident lombok The auth ...

Posted by daedlus on Tue, 02 Jun 2020 22:56:22 -0700