程序特点:无需数据库独立运行支持泛解析模式1程序带有简易后台2文章内容可以自动采集或者自动组合生成3程序伪静态动态可一键开关4内置近50套模版可随机调用,也可以选择缓存固定。
5今日昨日蜘蛛数量全权掌握。
6提供自助开发模版标签。
7每个网站都有首页列表页及其文章页8列表页采用中文URL9可以优化自己定义的关键词10程序支持泛解析模式11关键词可以转码显示12无需数据库支持13程序默认屏蔽谷歌蜘蛛,如需要谷歌蜘蛛请在robots.txt中删除(注意:非快车seo网付费会员将随机出现我们提供的广告)安装使用教程:php环境首选5.4与5.2,如果遇到报错或者乱码请尝试切换不同版本php试试.将程序上传到网站根目录,直接访问首页(index.php),将出现先安装配置页面,按要求配置好后将打开后台页面,后台登录页面http://域名/login.php(安装好后建议修改)后台设置好是否需要采集(如采集内容页自动显示采集的文章和标题)是否开启伪静态 是否缓存(缓存后刷新页面不变化) 后台可以自动采集title content(如果配置为caiji0将调
2025/2/21 4:05:04 9.54MB php源码
1
Gitlab的TerraformProvider邮件列表:生成状态:要求0.12.x>=1.14(以构建提供程序插件)建立提供者将存储$GOPATH/src/github.com/gitlabhq/terraform-provider-gitlab到:$GOPATH/src/github.com/gitlabhq/terraform-provider-gitlab$mkdir-p$GOPATH/src/github.com/gitlabhq;cd$GOPATH/src/github.com/gitlabhq$gitclonegit@github.com:gitlabhq/terraform-provider-gitlab输入提供者目录并构建提供者$cd$GOPATH/src/github.com/gitlabhq/terraform-provider-gitlab$makebuild使用提供者发展提供者如果您希望使用提供程序,则首先需要在计算机上安装(需要1.14+版本)。
要编译提供程序,请运行mak
2025/2/20 22:05:21 6.26MB gitlab terraform terraform-provider Terraform
1
2017.12.06最新的版本32位aquadatastudio18.5.0-2的绿色破解版本。
链接:https://pan.baidu.com/s/1nuHgZl3密码见附件。
2025/2/20 22:25:01 125B aqua datastudio 最新版 32位
1
1-ENVI基础知识2-影像预处理基础3-自定义坐标系4-MODIS几何校正5-地形图的几何校正6-几何校正(RapidEye几何校正)7-TM图像与SPOT图像配准8-TM图像校正(矢量上选点)9-图像融合10-图像镶嵌11-图像裁剪12-图像增强13-监督分类(样本选择)14-监督分类(分类)15-监督分类(分类后处理)16-监督分类(精度验证)17-非监督分类18-快速制图19-三维可视20-基于GLT的几何校正(风云三号气象卫星为例)21-正射校正22-正射校正(选择控制点QB校正)23-RapidEye正射校正24-构建RPC正射校正(BuildRPC)25-图像自动配准26-基于专家知识决策树分类27-决策树自动阈值分类28-面向对象图像分类(城市信息提取)29-面向对象耕地信息提取30-基于立体像对的DEM提取31-DEM分析与应用32-遥感动态监测33-林冠状态遥感变化监测34-森林砍伐监测35-耕地信息变化监测36-雷达图像基本处理37-高光谱基础38-传感器定标和大气校正39-快速大气校正40-波谱库浏览与建立41-植被识别42-矿物识别43-基于波谱沙漏工具的矿物识别44-植被指数计算和分析45-波段运算(bandmath)46-ENVI的二次开发47-IDL简介48-遥感与GIS一体化
2025/2/19 18:06:16 251KB ENVI IDL 视频 培训
1
人工智能课程作业资源包,包含了12硬币(12coins)源程序和README文档,而且包含了上课时用需要演讲使用的PPT幻灯片,还有两篇关于12硬币的论文可以参考阅读。
12硬币问题的描述:有12个硬币,已知有一个是不标准的(不能确定是轻还是重),要求使用天平最多3次,找出那个不标准的硬币,并确定是轻的还是重的。
2025/2/18 11:26:20 667KB 人工智能 12硬币 AO*算法 图优先搜索
1
一、激趣导入,引出课题。
1.(课件出示1)图片——摇摇欲坠的老屋。
2.学生认真观察图片,互相交流这是一座的老屋。
3.教师小结,导入课题。
(课件出示2)12总也倒不了的老屋(学生齐读课题)二、初读全文,认识生字  1.初读课文。
  (1)学生听课文的录音,边听边画出本课的生字新词。
  (2)自由读课文,(课件出示3)要求:  ①读准字音,读通顺句子。
②边读边思考,在不理解的地方做上记号。
  2.检查读书情况。
  (1)(课件出示4)生字,读生字。
dònɡzhǔnbèibàoqiángbìèzhīzhūpiāozhuànɡbǎo洞准备暴墙壁饿蜘蛛漂撞饱shài晒自己练读,指名读。
师生共同正音:注意读准翘舌音“准、蜘、蛛、撞、晒”,后鼻音“洞、墙”等。
(2)(课件出示5)词语,读词语。
  暴风雨往前凑喵喵孵小鸡叽叽好饿偶尔自由读,小组读,指名读。
注意读准:平舌音“凑”,三拼音节“喵”。
(开火车读,齐读)3.学生以自己喜欢的方式再读一读这个故事(可以独自读,也可以和同桌合作读),看看哪些地方使你受到感动,做做记号,再有感情地朗读体会。
4.组长汇报,全班交流,师引导学生评价所提出的问题,并解决疑问。
(相机进行词句训练和朗读指导)
2025/2/15 6:58:48 70KB 12总也倒不了的老屋教案
1
基于(ISC)2CISSPCommonBodyofKnowledge,可以辅助allinone加深对8个域知识点了解,最新的知识点已经在2018年4月15日CISSP考试中广泛体现。
本学习指南重点突出知识点概念并伴有相应测试题,结合allinone8后面测试题、光盘题和《CISSPOfficial(ISC)2PracticeTests2018年第二版》英文版&官方练习题及解题详解(1300题左右),备考题库已足够了解所有知识点本书含21章节,各域对应的章节如下:1-4章对应Domain1SecurityandRiskMgmt第5章对应Domain2Assetsecurity资产安全第6,7,8,9,10章对应Domain3安全架构与工程第11,12章,通讯与网络安全第13,14章,身份与访问管理IAM第15章对应域安全评估与测试第16,17,18,19章对应域7安全运维第20,21章软件开发安全DevelopmentEditor:KellyTalbotTechnicalEditors:JeffParker,BobSipes,andDavidSeidlCopyEditor:KimWimpsettEditorialManager:PeteGaughanProductionManager:KathleenwisorExecutiveeditor:imminatelProofreader:AmyschneiderIndexer:JohnnaVanHoosedinseProjectCoordinator,Cover:brentSavageCoverDesigner:wileyCoverImage:@JeremyWoodhouse/GettyImages,Inc.CopyrightC2018byJohnWileySons,InC,Indianapolis,IndianaPublishedsimultaneouslyinCanadaISBN:978-1-119-47593-4ISBN:978-1-119-47595-8(ebk)ISBN:978-1-119-47587-3(ebk)ManufacturedintheUnitedStatesofamericaNopartofthispublicationmaybereproduced,storedinaretrievalsystemortransmittedianyformorbyanymeans,electronic,mechanical,photocopying,recording,scanningorotherwise,exceptaspermittedunderSections107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,222RosewoodDrive,Danvers,MAO1923,(978)750-8400,fax(978)646-8600RequeststothePublisherforpermissionshouldbeaddressedtothepermissionsDepartment,JohnWileysons,Inc.111RiverStreet,Hoboken,NJo7030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permissionsLimitofliability/DisclaimerofWarranty:Thepublisherandtheauthormakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkandspecificallydisclaimallwarranties,includingwithoutlimitationwarrantiesoffitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesorpromotionalmaterials.Theadviceandstrategiescontainedhereinmaynotbesuitableforeverysituation.Thisworkissoldwiththeunderstandingthatthepublisherisnotengagedinrenderinglegal,accounting,orotherprofessionalservices.Ifprofessionalassistanceisrequiredtheservicesofacompetentprofessionalpersonshouldbesought.Neitherthepublishernortheauthorshallbeliablefordamagesarisingherefrom.ThefactthatanorganizationorWebsiteisreferredtointhisworkasacitationand/orapotentialsourceoffurtherinformationdoesnotmeanthattheauthororthepublisherendorsestheinformationtheorganizationorWebsitemayprovideorrecommendationsitmaymakeFurtherreadersshouldbeawarethatInternetWebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhenitisreadForgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupportpleasecontactourCustomerCareDepartmentwithintheU.S.at(877)762-2974,outsidetheUS.at(317)5723993orfax(317)572-4002Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Somematerialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorinprint-On-demand.IfthisbookreferstomediasuchasaCDorDVdthatisnotincludedintheversionyoupurchasedyoumaydownloadthismaterialathttp://booksupport.wilev.comFormoreinformationaboutwileyproductsvisitwww.wiley.comLibraryofCongressControlNumber:2018933561TRADEMARKS:Wiley,theWileylogo,andtheSybexlogoaretrademarksorregisteredtrademarksofJohnWileySons,Incand/oritsaffiliates,intheUnitedStatesandothercountries,andmaynotbeusedwithoutwrittenpermission.CISSPisaregisteredtrademarkof(ISC)2,Inc.AllothertrademarksarethepropertyoftheirrespectiveownersJohnWileySons,Incisnotassociatedwithanyproductorvendormentionedinthisbook.ToDewittLatimer,mymentor,friend,andcolleague.Imissyoudearly.MikeChappleToCathy,yourperspectiveontheworldandlifeoftensurprisesme,challengesme,andmakesmeloveyouevenmoreJamesmichaelstewartToNimfa,thanksforsharingyourlifewithmeforthepast26yearsandlettingmeshareminewithyouDarrilgibsonDearFuture(ISC)2MemberCongratulationsonstartingyourjourneytoCISSPRcertificationEarningyourCISSPisanexcitingandrewardingmilestoneinyourcybersecuritycareer.Notonlydoesitdemonstrateyourabilitytodevelopandmanagenearlyallaspectsofanorganizationscybersecurityoperations,butyoualsosignaltoemployersyourcommitmenttolife-longlearningandtakinganactiveroleinfulfillingthe(isc)2visionofinspiringasafeandsecurecyberworldThematerialinthisstudyguideisbaseduponthe(isc)2cisspCommonBodyofKnowledge.ItwillhelpyoupreparefortheexamthatwillassessyourcompetencyinthefollowingeightdomainsaSecurityandriskmanagement■AssetsecuritySecurityArchitectureandengineeringaCommunicationandNetworksecurityaIdentityandAccessManagement(IAM)SecurityAssessmentandTesting■SecurityOperationsSoftwareDevelopmentSecurityWhilethisstudyguidewillhelpyouprepare,passingthecisspexamdependsonyourmasteryofthedomainscombinedwithyourabilitytoapplythoseconceptsusingyourreal-worldexperienceiwishyouthebestofluckasyoucontinueonyourpathtobecomeaCISSPandcertifiedmemberof(Isc)2Sincerely,Davidshearer.CISSPCEO(ISC)2Ackn。
w|edgmentsWe'dliketoexpressourthankstoSybexforcontinuingtosupportthisproject.Extrathankstotheeightheditiondevelopmentaleditor,kellyTalbot,andtechnicaleditors,JeffParker,BobSipes,andDavidSeidlwhoperformedamazingfeatsinguidingustoimprovethisbookThanksaswelltoouragent,CaroleJelen,forcontinuingtoassistinnailingdowntheseprojectsMikejames.anddarrilSpecialthanksgototheinformationsecurityteamattheUniversityofNotreDame,whoprovidedhoursofinterestingconversationanddebateonsecurityissuesthatinspiredandinformedmuchofthematerialinthisbookIwouldliketothanktheteamatwileywhoprovidedinvaluableassistancethroughoutthebookdevelopmentprocess.ialsooweadebtofgratitudetomyliteraryagent,CaroleJelenofWatersideProductions.Mycoauthors,JamesMichaelStewartanddarrilGibsonweregreatcollaborators.JeffParker,BobSipes,andDavidSeidl,ourdiligentandknowledgeabletechnicaleditors,providedvaluableinsightaswebroughtthiseditiontopressIdalsoliketothankthemanypeoplewhoparticipatedintheproductionofthisbookbutwhomIneverhadthechancetomeet:thegraphicsteam,theproductionstaff,andallofthoseinvolvedinbringingthisbooktopress-MikeChappleThankstoMikeChappleandDarrilGibsonforcontinuingtocontributetothisprojectThanksalsotoallmycisspcoursestudentswhohaveprovidedtheirinsightandinputtoimprovemytrainingcoursewareandultimatelythistome.Tomyadoringwife,CathyBuildingalifeandafamilytogetherhasbeenmorewonderfulthanIcouldhaveeverimagined.ToSlaydeandremi:youaregrowingupsofastandlearningatanoutstandingpace,andyoucontinuetodelightandimpressmedaily.YouarebothgrowingintoamazingindividualsTomymom,Johnnie:ItiswonderfultohaveyouclosebyToMarkNomatterhowmuchtimehaspassedorhowlittleweseeeachother,Ihavebeenandalwayswillbeyourfriend.andfinally,asalways,toElvis:Youwerewayaheadofthecurrentbaconobsessionwithyourpeanutbutter/banana/baconsandwich;ithinkthat'sproofyoutraveledthroughtimeJamesmichaelStewartThankstoJimMinatelandCaroleJelenforhelpinggetthisupdateinplacebefore(IsC)2releasedtheobjectives.Thishelpedusgetaheadstartonthisnewedition,andweappreciateyourefforts.It'sbeenapleasureworkingwithtalentedpeoplelikeJamesMichaelStewartandMikeChappleThankstobothofyouforallyourworkandcollaborativeeffortsonthisproject.Thetechnicaleditors,JeffParkerBobSipes,andDavidSeidl,provideduswithsomeoutstandingfeedback,andthisbookisbetterbecauseoftheireffortsThankstotheteamatSybex(includingprojectmanagers,editors,andgraphicsartists)foralltheworkyoudidhelpingusgetthisbooktoprint.Last,thankstomywife,Nimfa,forputtingupwithmyoddhoursasIworkedonthisbookDarrilgibsonAbouttheauthorsMikeChapple,CISSP,PhD,Security+,CISA,CySA+,isanassociateteachingprofessorofIT,analytics,andoperationsattheUniversityofNotreDame.InthepasthewaschiefinformationofficerofBrandInstituteandaninformationsecurityresearcherwiththenationalSecurityagencyandtheu.s.airForcehisprimaryareasofexpertiseincludenetworkintrusiondetectionandaccesscontrols.mikeisafrequentcontributortoTechTarget'sSearchSecuritysiteandtheauthorofmorethan25booksincludingthecompanionbooktothisstudyguide:CISSPOfficial(ISC)2PracticeTests,theCompTIACSA+StudyGuide,andCyberwarfare:InformationOperationsinaConnectedWorld.MikeoffersstudygroupsfortheCISSP,SSCP,Security+,andcSa+certificationsonhiswebsiteatwww.certmike.comJamesMichaelStewart,CISSP,CEH,ECSA,CHFI,Security+Network+,hasbeenwritingandtrainingformorethan20years,withacurrentfocusonsecurity.hehasbeenteachingCiSsPtrainingcoursessince2002,nottomentionothercoursesonInternetsecurityandethicalhacking/penetrationtestingHeistheauthorofandcontributortomorethan75booksandnumerouscoursewaresetsonsecuritycertification,Microsofttopics,andnetworkadministrationincludingtheSecurity+(SY0-501)Reviewguide.Moreinformationaboutmichaelcanbefoundathiswebsiteatwww.impactonline.comDarrilGibson,CISSP,Security+,CASP,istheCeoofYODa(shortforYouCanDoAnything),andhehasauthoredorcoauthoredmorethan40books.Darrilregularlywrites,consults,andteachesonawidevarietyoftechnicalandsecuritytopicsandholdsseveralcertificationsHeregularlypostsblogarticlesathttp://blogs.getcertifiedgetahead.com/aboutcertificationtopicsandusesthatsitetohelppeoplestayabreastofchangesincertificationexams.Heloveshearingfromreaders,especiallywhentheypassanexamafterusingoneofhisbooks,andyoucancontacthimthroughthelebloggingsite.
2025/2/15 1:12:56 17.84MB CISSP OSG OSG8 Official
1
海康威视近几年的笔试题,包括08、09、12、13年,dsp岗位,嵌入式开发岗位等的笔试题。
1
构建CNNLayerBuilderbuilder=newLayerBuilder();builder.addLayer(Layer.buildInputLayer(newSize(28,28)));builder.addLayer(Layer.buildConvLayer(6,newSize(5,5)));builder.addLayer(Layer.buildSampLayer(newSize(2,2)));builder.addLayer(Layer.buildConvLayer(12,newSize(5,5)));builder.addLayer(Layer.buildSampLayer(newSize(2,2)));builder.addLayer(Layer.buildOutputLayer(10));CNNcnn=newCNN(builder,50);运行MNIST数据集StringfileName="data/train.format";Datasetdataset=Dataset.load(fileName,",",784);cnn.train(dataset,100);Datasettestset=Dataset.load("data/test.format",",",-1);cnn.predict(testset,"data/test.predict");计算精度可以达到97.8%。
2025/2/14 17:58:03 1.87MB 性别识别
1
LxBlog多用户博客个人主页系统,一套基于php+mysql数据库平台架构的多用户博客系统,该系统融合了Blog的最新元素,拥有强大的个人主页系统,独立的二级域名功能,灵活的用户模版系统,丰富的朋友圈和个性相册功能。
部分修正改进功能1.改进个人页面的日志列表页的摘要2.改进相册个人后台发表方式3.改进音乐前台列表页为显示歌曲列表,点击试听后弹出播放窗口,取消音乐上传4.改进个人首页中显示所加入朋友圈的更新信息功能 5.改进最新推送的文章在朋友圈的其他圈友中显示功能 6.改进日志同时推送到多个朋友圈的支持功能7.改进朋友圈系统页列表、会员排行列表8.改进朋友圈系统页9.改进圈主推荐文章列表10.改进写朋友圈写文章功能,即在圈子中加入"写文章"功能,转入个人后台编写,写文章后默认推送到该圈子11.改进朋友圈邀请功能12.改进头像大小控制13.改进书签功能部分新增功能:1.增加日志、评论、留言表情2.增加验证问题3.增加在article.php页面中和该文章tag相关的文章4.增加tags广告词锁定5.增加列表页"隐藏日志","好友可见日志" 链接.6.增加心情,天气在发表日志页7.增加"上一篇","下一篇",在文章阅读页8.增加"转移个人分类"功能,在个人后台日志列表页9.增加日志管理的搜索功能10.增加附件批量上传11.增加文件和商品集成格式在日志发布过程中12.增加相册前台图片列表页,单个图片显示页面13.增加相册个人页面单图显示页面功能,增加图片播放器14.增加短消息功能15.增加系统首页博客文章、人数、今日文章数、评论数量的显示16.增加最新博客内容在论坛首页的显示17.增加个人分类在论坛推送到blog的文章18.增加推送设定,即当博客向论坛推送时,管理员可以设置只允许推送至哪个或者哪些版块19.增加随机访问列表20.增加好友日志更新列表,在个人日志页面21.增加可视化风格编辑22.增加论坛文集23.增加找回密码功能24.增加好友分类25.增加摘要分界符26.增加自定义关键字链接27.增加博主回复评论28.增加转载功能
2025/2/14 6:25:37 3.1MB 博客系统
1
共 1000 条记录 首页 上一页 下一页 尾页
在日常工作中,钉钉打卡成了我生活中不可或缺的一部分。然而,有时候这个看似简单的任务却给我带来了不少烦恼。 每天早晚,我总是得牢记打开钉钉应用,点击"工作台",再找到"考勤打卡"进行签到。有时候因为工作忙碌,会忘记打卡,导致考勤异常,影响当月的工作评价。而且,由于我使用的是苹果手机,有时候系统更新后,钉钉的某些功能会出现异常,使得打卡变得更加麻烦。 另外,我的家人使用的是安卓手机,他们也经常抱怨钉钉打卡的繁琐。尤其是对于那些不太熟悉手机操作的长辈来说,每次打卡都是一次挑战。他们总是担心自己会操作失误,导致打卡失败。 为了解决这些烦恼,我开始思考是否可以通过编写一个全自动化脚本来实现钉钉打卡。经过一段时间的摸索和学习,我终于成功编写出了一个适用于苹果和安卓系统的钉钉打卡脚本。
2024-04-09 15:03 15KB 钉钉 钉钉打卡