Detailed explanation of route command parameters, adding and deleting route commands in linux
The route command of linux system is used to display and operate the IP routing table (show / manage the IP routing table). To realize the communication between two different subnets, a router connecting the two networks or a gateway located in both n ...
Posted by webworks on Thu, 10 Mar 2022 11:51:37 +0100
Complete writing sequence of simulation script [1-9]
1. Header file
Header file naming convention: "< module name > - module. H" Directory of header file: [build/ns3] Common header files are as follows:
#include "ns3/core-module.h" // The core functions of ns-3 (such as simulating events and event scheduling) ar ...
Posted by zed420 on Thu, 10 Mar 2022 06:27:41 +0100
Discovery host refers to the host that detects activity in the network. Discovering hosts is the first and most important step in implementing penetration testing. Penetration testing can only be performed further if the target host is determined to be active. Hosts can be discovered in Nmap s in different ways, such as
IP discovery, ICMP d ...
Posted by AliasBDI on Wed, 09 Mar 2022 18:47:06 +0100
Full convolution network (FCN) practice: using FCN to realize semantic segmentation
FCN classifies images at pixel level, which solves the problem of semantic segmentation. Unlike the classical CNN, which uses the full connection layer to obtain a fixed length feature vector for classification after the convolution layer (full connection layer ...
Posted by purinkle on Wed, 09 Mar 2022 00:03:14 +0100
Thesis address: https://arxiv.org/pdf/1708.05031.pdf?ref=https://codemonkey.link Code address: https://github.com/hexiangnan/neural_collaborative_filtering
This is an earlier article. Recommendation systems often use the dot product of vectors to learn the interactive information between vectors,
Purpose of vector dot ...
Posted by steveonly20 on Tue, 08 Mar 2022 10:19:51 +0100
Today we will use the famous pipe mkfifo to realize a simple version of QQ dialogue function.
Step 1: first create two processes Talka C and talkb c；
Step 2: talk a C and talkb C is responsible for checking whether two pipelines have been created. If not, it is necessary to create pipelines;
Step 3: talk a C open pipe 1 in a write only mann ...
Posted by Hannes2k on Mon, 07 Mar 2022 22:40:26 +0100
Implementation of process scheduling algorithm Summary: The process scheduling algorithm is realized, including FCFS (first in first out), SPF (short process priority), HRRF (highest response ratio priority method) and HPF (priority method). A process management simulation system that allows n processes to run concurrently is designed. The syst ...
Posted by kennethl on Mon, 07 Mar 2022 05:54:46 +0100
Catalogue of series articles
leetcode: Week 1 leetcode questions: the second week
Tip: after writing the article, the directory can be generated automatically. For how to generate it, please refer to the help document on the right
leetcode questions: the second week
Day 1 (breadth first search / depth first search)
1. Im ...
Posted by nyy2000 on Sun, 06 Mar 2022 13:39:06 +0100
The article puts forward that UNet mainly has the following two defects:
① the optimal depth of the network is unknown, which requires a large number of experiments and integration of networks with different depths, resulting in low efficiency;
② skip connection introduces unnecessary restrictions, that is, it restricts fea ...
Posted by amazinggrace1983 on Sun, 06 Mar 2022 08:39:21 +0100
1. Agreement: an agreement.
2. Protocol layering:
(1) OSI (open system interconnection) seven layer model
(2) TCP/IP five layer model
(3) TCP/IP four layer model
Layer namefunctionRelated agreementsapplication layerResponsible for communication between applications HTTP SSH DNS Display layerConvert the network datagram into the package req ...
Posted by mrpickleman on Fri, 04 Mar 2022 14:21:06 +0100