自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(158)
  • 资源 (24)
  • 收藏
  • 关注

转载 万字长文带你看尽深度学习中的各种卷积网络

深度学习中的各种卷积网络大家知多少?对于那些听说过却又对它们没有特别清晰的认识的小伙伴们,Kunlun Bai这篇文章非常值得一读。Kunlun Bai 是一位人工智能、机器学习、物体学以及工程学领域的研究型科学家,在本文中,他详细地介绍了 2D、3D、1x1 、转置 、空洞(扩张)、空间可分离、深度可分离、扁平化、 分组等十多种卷积网络类型。AI 科技评论编译如下。如果你曾听过深度学习的各...

2019-03-09 19:07:58 425

转载 训练集(train)、验证集(validation)和测试集(test)

在有监督的机器学习中,经常会说到训练集(train)、验证集(validation)和测试集(test),这三个集合的区分可能会让人糊涂,特别是,有些读者搞不清楚验证集和测试集有什么区别。划分 #如果我们自己已经有了一个大的标注数据集,想要完成一个有监督模型的测试,那么通常使用均匀随机抽样的方式,将数据集划分为训练集、验证集、测试集,这三个集合不能有交集,常见的比例是8:1:1,当然比例是...

2019-03-09 09:14:04 20139 2

转载 SIFT: Theory and Practice - Generating a feature(转)

SIFT: Theory and Practice Generating a featureSeries: SIFT: Theory and Practice:Introduction The scale space LoG approximations Finding keypoints Getting rid of low contrast keypoints Key...

2018-11-26 17:46:09 350

转载 SIFT: Theory and Practice - Keypoint orientations(转)

SIFT: Theory and Practice Keypoint orientationsSeries: SIFT: Theory and Practice:Introduction The scale space LoG approximations Finding keypoints Getting rid of low contrast keypoints Ke...

2018-11-26 17:45:28 338

转载 SIFT: Theory and Practice - Getting rid of low contrast keypoints(转)

SIFT: Theory and Practice Getting rid of low contrast keypointsSeries: SIFT: Theory and Practice:Introduction The scale space LoG approximations Finding keypoints Getting rid of low contra...

2018-11-26 17:43:59 387

转载 SIFT: Theory and Practice - Finding keypoints(转)

SIFT: Theory and Practice Finding keypointsSeries: SIFT: Theory and Practice:Introduction The scale space LoG approximations Finding keypoints Getting rid of low contrast keypoints Keypoi...

2018-11-26 17:43:06 383

转载 SIFT: Theory and Practice - LoG approximations (转)

SIFT: Theory and Practice LoG approximationsSeries: SIFT: Theory and Practice:Introduction The scale space LoG approximations Finding keypoints Getting rid of low contrast keypoints Keypo...

2018-11-26 17:42:10 312

转载 SIFT: Theory and Practice - The scale space(转)

SIFT: Theory and Practice The scale spaceSeries: SIFT: Theory and Practice:Introduction The scale space LoG approximations Finding keypoints Getting rid of low contrast keypoints Keypoint...

2018-11-26 17:41:01 466

转载 SIFT: Theory and Practice - Introduction (转)

SIFT: Theory and PracticeLearn how the famous SIFT keypoint detector works in the background. This paper led a mini revolution in the world of computer vision!IntroductionSeries: SIFT: Theory an...

2018-11-26 17:39:43 207

转载 A tutorial on binary descriptors – part 5 – The FREAK descriptor(转)

A tutorial on binary descriptors – part 5 – The FREAK descriptorThis is our fifth post in the series about binary descriptors and here we will talk about the FREAK[4] descriptor. This is the last de...

2018-11-18 21:27:22 279

转载 A tutorial on binary descriptors – part 4 – The BRISK descriptor(转)

A tutorial on binary descriptors – part 4 – The BRISK descriptorThis fourth post in our series about binary descriptors that will talk about the BRISK descriptor [1]. We had an introduction to patch...

2018-11-18 21:26:17 228

转载 A tutorial on binary descriptors – part 3 – The ORB descriptor(转)

A tutorial on binary descriptors – part 3 – The ORB descriptorThis third post in our series about binary descriptors that will talk about the ORB descriptor [1]. We had an introduction to patch desc...

2018-11-18 21:25:13 443

转载 A tutorial on binary descriptors – part 2 – The BRIEF descriptor(转)

A tutorial on binary descriptors – part 2 – The BRIEF descriptorFollowing the previous posts that provided both an introduction to patch descriptors in general and specifically to binary descriptors...

2018-11-18 21:23:58 217

转载 Tutorial on Binary Descriptors – part 1(转)

Tutorial on Binary Descriptors – part 1Why Binary Descriptors?Following the previous post on descriptors, we’re now familiar with histogram of gradients (HOG) based patch descriptors. SIFT[1], SUR...

2018-11-18 21:22:13 276

转载 How to do distributed locking (转)

As part of the research for my book, I came across an algorithm called Redlock on the Redis website. The algorithm claims to implement fault-tolerant distributed locks (or rather, leases [1]) on top o...

2018-11-06 09:09:28 1120

原创 生成RSA私钥和公钥

#私钥openssl genrsa -out rsakey0.pem 1024#公钥openssl rsa -in rsakey0.pem -pubout -out rsakey0-pub.pem#pkcs8格式私钥openssl pkcs8 -topk8 -in rsakey0.pem -out pkcs8_rsa_private_key.pem -nocrypt

2018-07-05 09:27:40 1446

转载 Spring Beginners to Professionals

http://techieme.in/category/j2ee-concepts/spring-beginners-to-professionals/?order=ascSpring Beginners to Professionals

2017-12-31 21:43:52 222

转载 Understanding reference in java

http://www.pawlan.com/monica/articles/refobjs/https://stackoverflow.com/questions/299659/whats-the-difference-between-softreference-and-weakreference-in-javaAnalogy: Assume a JVM is a kingdo

2017-12-23 10:39:51 297

原创 配置MongoDB Sharding

1) 启动副本集三个shard,每个shard三个副本,三台机器(170/171/172),每台机器分别对应三个shard中的一个副本#170mongod --shardsvr --replSet shard-a --dbpath /mongo-data/rs-170-a --port 30000 --logpath /mongo-data/rs-170-a.log --fork --no

2017-09-12 16:40:02 703

原创 Recurrent Neural Networks - collections

The Unreasonable Effectiveness of Recurrent Neural NetworksUnderstanding LSTM NetworksRECURRENT NEURAL NETWORKREGULARIZATIONNeural Networks and Deep Learning

2016-12-05 14:23:57 451

转载 AOP技术基础

1、引言2、AOP技术基础3、Java平台AOP技术研究4、.Net平台AOP技术研究2.1 AOP技术起源AOP技术的诞生并不算晚,早在1990年开始,来自Xerox Palo Alto Research Lab(即PARC)的研究人员就对面向对象思想的局限性进行了分析。他们研究出了一种新的编程思想,借助这一思想或许可以通过减少代码重复模块从而帮助开发人员

2016-08-28 10:41:49 698

原创 Lp距离, L1范数, 和L2范数

LpL_p距离, L1L_1范数, 和 L2L_2范数LpL_p 距离定义为: Lp(xi,xj)=(∑l=1n|x(l)i−x(l)j|p)1p L_p(x_i, x_j) = \left( \sum_{l=1}^{n} | x_i^{(l)} - x_j^{(l)} |^p \right)^{\frac{1}{p}} 其中xi∈Rnx_i \in \mathbf{R}^n,

2016-07-31 17:12:22 13516 3

原创 TensorFlow - ImportError: cannot import name pywrap_tensorflow

>>> import tensorflow as tfTraceback (most recent call last):  File "", line 1, in   File "tensorflow/__init__.py", line 23, in     from tensorflow.python import *  File "tensorflow/python/_

2016-07-31 10:02:37 19081 11

原创 Yann LeCun, Geoffrey E. Hinton, and Yoshua Bengio

2016-01-16 16:32:16 937

原创 深度学习历史图

2016-01-16 16:17:48 1095 1

原创 机器学习资源列表

Machine Learning Group at Department of Engineering, University of CambridgeMachine Learning Group at University of columbiaMachine Learning Research Group at university of texas at austinMachin

2015-10-27 13:28:20 871

原创 大数据资源收集

数据可视化https://github.com/showcases/data-visualization

2015-09-17 15:46:22 765

转载 Understanding the Internal Message Buffers of Storm

Understanding the Internal Message Buffers of StormJun 21st, 2013 Table of ContentsInternal messaging within Storm worker processesIllustrationDetailed descriptionWorker processesExecutors

2014-10-21 09:41:13 1218

原创 shell使用随笔

001 对文件某一列求和awk '{sum += $collum};END {print sum}' /path/to/your/file

2014-08-01 17:01:45 798

转载 Shannon entropy

Shannon entropy is one of the most important metrics in information theory. Entropy measures the uncertainty associated with a random variable, i.e. the expected value of the information in the messag

2014-07-10 15:59:52 1773

转载 Positive-definite kernel

http://www.encyclopediaofmath.org/index.php/Bounded_operator

2014-07-10 15:43:16 1140

转载 Hilbert space

DefinitionA Hilbert space H is a real or complex inner product space that is also a complete metric space with respect to the distance function induced by the inner product.[2] To say that

2014-07-10 15:30:46 1372

转载 Positive-definite matrix

In linear algebra, a symmetric n × n real matrix M is said to be positive definite if zTMz is positive for every non-zero columnvector z of n real numbers. Here zT denotes thetranspose

2014-07-10 14:51:11 1437

原创 MVN使用随笔

001 创建项目mvn archetype:generate -DgroupId=com.funshion.push.monitor -DartifactId=push-monitor -DarchetypeArtifactId=maven-archetype-quickstart -DinteractiveMode=false002 [WARNING] File encoding h

2014-06-09 16:23:37 741

转载 The storage wars: Shadow Paging, Log Structured Merge and Write Ahead Logging

The storage wars: Shadow Paging, Log Structured Merge and Write Ahead Loggingprevious: Seek, and you shall find, or maybe delay a lot next: New interview questionI’ve been doing a lo

2014-04-29 23:13:33 984

转载 MySQL删除表数据

在MySQL中有两种方法可以删除数据,一种是DELETE语句,另一种是TRUNCATE TABLE语句。DELETE语句可以通过WHERE对要删除的记录进行选择。而使用TRUNCATE TABLE将删除表中的所有记录。因此,DELETE语句更灵活。  如果要清空表中的所有记录,可以使用下面的两种方法:  DELETE FROM table1  TRUNCATE TABLE table1

2014-04-14 16:38:51 111660

转载 MySQL存储过程之事务管理

原文链接:http://hideto.iteye.com/blog/195275MySQL存储过程之事务管理ACID:Atomic、Consistent、Isolated、Durable存储程序提供了一个绝佳的机制来定义、封装和管理事务。1,MySQL的事务支持MySQL的事务支持不是绑定在MySQL服务器本身,而是与存储引擎相关:Java代码  

2014-04-14 11:34:27 824

转载 MySQL事务隔离级别详解

SQL标准定义了4类隔离级别,包括了一些具体规则,用来限定事务内外的哪些改变是可见的,哪些是不可见的。低级别的隔离级一般支持更高的并发处理,并拥有更低的系统开销。Read Uncommitted(读取未提交内容)       在该隔离级别,所有事务都可以看到其他未提交事务的执行结果。本隔离级别很少用于实际应用,因为它的性能也不比其他级别好多少。读取未提交的数据,也被称之为脏读(Dirty

2014-04-14 10:57:19 517

原创 MySQL使用随笔

#查看版本:mysql --versionselect version();status;

2014-04-08 15:52:17 2882

转载 HBase High Level Architecutre

2014-04-05 16:12:51 878

Machine Learning In Action

Machine Learning In Action

2014-05-10

大话存储 pdf

大话存储

2014-05-10

Real Time Big Data Analytics Emerging Architecture

Real Time Big Data Analytics Emerging Architecture 实时大数据分析架构

2014-02-19

Getting Started with Storm

Getting Started with Storm - 关于Storm的介绍,短小清晰,非常好

2014-02-18

Ten steps to better requirements management

Ten steps to better requirements management IBM需求管理建议

2014-01-17

Distributed system: CAP paper

Distributed system, CAP, NoSQL

2013-11-12

Dynamo-and-Cassandra-paper

Two papers on Dynamo, Cassandra, Key-value, store

2013-11-04

google papers

Google分布式系统的几篇经典论文,即GFS,MapReduce,BigTable,Chubby

2013-10-30

R and Hadoop

This is one presentation for R and Hadoop

2013-09-03

50 Tips and Tricks for MongoDB Developers

50 Tips and Tricks for MongoDB Developers

2013-08-22

视觉中国的MongoDB应用实践

视觉中国的MongoDB应用实践, good share

2013-08-22

The.Definitive.Guide.to.MongoDB

The.Definitive.Guide.to.MongoDB

2013-08-22

Scaling.MongoDB

Scaling MongoDB, excellent NoSQL solution

2013-08-22

The.Little.MongoDB.Book

NoSQL MongoDB Document-Oriented

2013-08-22

The-Little-Redis-Book

Redis is famous key value store with persistent

2013-08-16

Towards the Next Generation of Recommender Systems

Towards the Next Generation of Recommender Systems

2013-08-06

redis实战电子书

Key-value,NoSQL,Redis,不用积分,帮大家共享一下

2013-08-06

A-Comparative-Study-of-Reco-mmendation-Algorithms-in-E-Commerce-Applications

A-Comparative-Study-of-Reco-mmendation-Algorithms-in-E-Commerce-Applications

2013-08-02

The-BellKor-solution-to-the-Netflix-Prize

Netflix奖的实现方案,向牛人学习,希望对大家有帮助

2013-08-02

Why No SQL

Why No SQL, Please read it

2013-07-31

twisted-introduction

目前看到的最好的twisted文章 中文翻译 http://blog.sina.com.cn/s/blog_704b6af70100py9n.html

2013-07-31

Apple Push Notification Service简介

Apple Push Notification Service简介

2013-07-26

A-collection-of-popular-NoSQL-articles-published-on-InfoQ.com

A-collection-of-popular-NoSQL-articles-published-on-InfoQ.com

2013-07-19

深入浅出node.js

node.js资料,来自于infoq.com, 作者田永强

2013-07-15

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除