Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • PSMNet代码 ... with convolutional neural networks (CNNs). However, current architectures rely on patch-based Siamese networks, lacking the means to exploit context information for finding correspondence in illposed regions. To tackle this problem, we propose PSMNet, a ...
  • Denoising based new Noise model ... the problem of the joint denoising of a number of raw- data images from a digital imaging sensor. In particular, we exploit a recently proposed image modeling [8] that incorporates both the signal-dependent nature of noise and the clipping of the data ...
  • Cooperative Synchronization in Distributed Microgrid Control_Fra... ... called AC microgrids. Recently, DC microgrids have also gained much attention due to their advantages. DC microgrids exploit a DC electrical infrastructure. This book applies techniques from distributed cooperative control of multi-agent dynamical systems ...
  • Game Programming using Qt 5 Beginner's Gui - Lorenz Haas PDF&Cod... ... other tools to add game logic, design animation, add game physics, and build astonishing UIs for games. Toward the end of this book, you'll learn to exploit mobile device features, such as accelerators and sensors, to build engaging user experiences.
  • Classifications and Applications of Physical LayerSecurity Techn... ... approaches, which entail many hurdles and practical problems for future wireless systems. The basic idea of PLS is to exploit the characteristics of the wireless channel and its impairments including noise, fading, interference, dispersion, diversity, etc ...
  • Adaptive Identification of Acoustic Multichannel Systems Efficient adaptive filtering algorithms that exploit the sparsity in the transform domains are presented and the relation between the signal- and the system-based sparse representations is emphasized. The presented approach in this book to acoustic echo ...
  • python灰帽子包含高清扫描和可复制两个版本.zip ...  5.1 安装Immunity Debugger   5.2 Immunity Debugger l01   5.2.1 PyCommand命令   5.2.2 PyHooks   5.3 Exploit(漏洞利用程序)开发   5.3.1 搜寻exploit友好指令   5.3.2“坏”字符过滤   5.3.3 绕过Windows下的DEP机制   5.4 破除恶意软件中的反调试例程   ...
  • How to build AutoML from scratch – Alexander Mamaev – Medium.pdf ... languages rather focused on notational aspects. Thus, MDE techniques and tools cannot be deployed for such languages preventing to exploit the full potential of MDE in terms of standardised storage, exchange and transformation of models. The WebML web ...
  • Passino Biomimicry Op Con Auto Springer OSU.pdf Biomimicry uses our scientific understanding of biological systems to exploit ideas from nature in order to construct some technology. In this book, we focus on how to use biomimicry of the functional operation of the “hardware and software”of biological ...
  • Packt.Kali.Linux.2018.2nd.Edition ... Discover new advances and improvements to the Kali operating system Map and enumerate your Windows network Exploit several common Windows network vulnerabilities Attack and defeat password schemes on Windows Debug and reverse engineer ...