Introduction to Mobilenet
Traditional neural network has large memory demand and large amount of computation. Cannot run on mobile and embedded devices. Mobilenet focuses on lightweight CNN networks in mobile terminals or embedded devices (the accuracy is reduced by 0.9% compared with VGG16, but the model parameters are only VGG1/32)
Posted by dooper3 on Wed, 02 Feb 2022 13:01:26 +0100
In some enterprises, some DNS requests will be directly modified by the gateway. Cause inaccessibility. The traditional socks proxy can only proxy at the IP level. When the address to be accessed exists in the form of domain name, the DNS resolution is automatically completed by the system, and the previously set socks proxy will not be used, r ...
Posted by dannymm on Wed, 02 Feb 2022 00:03:14 +0100
OSPF neighbor adjacency
Principle overview: In ospf network, the router must establish a correct OSPF neighbor relationship before sending any link state information.
OSPF router uses Hello message to establish neighbor relationship. OSPF router will check various parameters in the received Hello message, such as router ID, area ID, authe ...
Posted by itsjareds on Tue, 01 Feb 2022 18:35:50 +0100
As a new generation of network request library, HTTPX It not only supports all operations of requests, but also supports asynchronous API and HTTP/2. According to the description on the official website, the following features are summarized:
Standard synchronous interface and asynchronous supportHTTP/1.1 and HTTP/2Make requests directly to WS ...
Posted by wookie on Tue, 01 Feb 2022 15:41:57 +0100
Summary of error prone knowledge points
NIO operates based on channel and buffer. Data is always read from the channel to the buffer or written from the buffer to the channel. The selector is used to listen to the events of multiple channels (such as connection request, data arrival, etc.), so a single thread can listen to multiple client cha ...
Posted by mattdarnold on Mon, 31 Jan 2022 22:04:21 +0100
Experiment 3: GVRP configuration
1, Purpose and requirements of the experiment Objective: to master the configuration process and basic working process of GVRP. Requirements: independently complete the experimental tasks and experimental reports, complete screenshots, supplemented by necessary written instructions, orderly experimental steps, ...
Posted by sribala on Mon, 31 Jan 2022 00:01:05 +0100
The data flowing through the network always has the same type: bytes. How these bytes are transmitted mainly depends on what we call network transmission. Users do not care about the details of transmission, only whether bytes are reliably sent and received
If you use Java network programming, you will find that sometimes when you n ...
Posted by ExpendableDecoy on Sun, 30 Jan 2022 19:29:31 +0100
Welcome to WeChat official account: Xiamen micro think network.
Wechat (official website): https://www.xmws.cn/
During holidays, people who return home and go out to play in the first and second tier cities are almost faced with a problem: grab train tickets!
Although tickets can be booked in most cases, I believe everyone has a deep unders ...
Posted by Sir Jos on Sun, 30 Jan 2022 08:07:46 +0100
docker network host level explanation
Docker Daemon will create a virtual bridge named docker0, which is used to connect the host and container, or connect different containers. veth pair is used for communication between different network namespaces. veth pair sends data from one network namespace to veth of another network namespace. ...
Posted by craigerjs on Sun, 30 Jan 2022 06:44:03 +0100
I mainly write this article to make a note for myself and make it easy for you to read.
Tip: the following is the main content of this article. The following cases can be used for reference
1, TCP network programming
1, There are two main problems in network programming: 1. How to acc ...
Posted by ozestretch on Sun, 30 Jan 2022 04:53:20 +0100