Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • 腾讯人脸识别论文 ... . In our approach, we adopt the fully convolutional Residual Network (ResNet) as the backbone network. Particularly, we exploit several new techniques including position-sensitive average pooling, multi-scale training and testing and on-line hard example ...
  • CP tensor-based compression of hyperspectral ... CANDECOMP/PARAFAC tensor decomposition to decompose the original HSI data into the sum of R rank-1 tensors, which can simultaneously exploit both the spatial and spectral information of HSIs. Specifically, compared with the original HSI data, the R rank-1 ...
  • comsol螺旋线圈建模 Models of such spiral inductors can become quite large as the number of turns increases. This example demonstrates how to exploit the near-symmetry of the structure to greatly reduce the model size. A ten-turn octagonal spiral coil is modeled via the ...
  • Attacking Network Protocols ... an attacker’s perspective to help you discover, exploit, and ultimately ­protect vulnerabilities. Introduction Chapter 1: The ... 9: Implementing the Protocol Chapter 10: Root Causes of Vulnerabilities Chapter 11: Fuzzing, Debugging, and Exploit Development ...
  • (eWiley) Optimum Array Processing ... are widely used for oil explo- ration and detection of underground nuclear tests. Various medical diagnosis and treatment techniques exploit arrays. Radio astronomy utilizes very large antenna arrays to achieve resolution goals. It appears that the third ...
  • Deep Learning for Medical Image Analysis ... of geometrical, biophysical, and biochemical properties of their living tissues. These images are acquired with algorithms that exploit complex med- ical imaging processes whose principles must be well understood as well as those governing the complex ...
  • Improved Image Segmentation via Cost Minimization of Multiple Hy... ... . It still remains a challenge to properly select such parameters for human-like perceptual grouping. In this work, we exploit the diversity of segments produced by different choices of parameters. We scan the segmentation parameter space and generate a ...
  • Blockchain_A Practical Guide Developing Biz,Law,Tech Solutions 2... ... the risks that come with data being held centrally. Blockchain networks lack centralized points of vulnerability that computer hackers can exploit easily. Today’s Internet has security problems that are familiar to everyone. We all rely on username and ...
  • ELECTRONIC WARFARE IN INFORMATION AGE ... platform-centric to network-centric forces. When all military tools are physically limited in order to achieve military superiority we should exploit the new domain the information domain. Without this transformation it is not possible to achieve victory。
  • Nginx HTTP Server, 3nd Edition About This Book Discover possible interactions between Nginx and Apache to get the best of both worlds Learn to exploit the features offered by NGinx for your web applications Get the newest techniques available, designed with the latest version in mind ...