A CNN that recognizes the flower species
☆12Mar 5, 2019Updated 7 years ago
Alternatives and similar repositories for Flower-Species-Recognition
Users that are interested in Flower-Species-Recognition are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A GAN that generates face portraits of people who do not exist☆14Mar 13, 2019Updated 7 years ago
- A Unified MultItask Network for zero-shot M/EEG visual Decoding (referred to UMind), including visual stimulus retrieval, classification,…☆18Mar 23, 2026Updated last week
- ☆16Feb 3, 2025Updated last year
- Detecting wheat heads using YOLOv5☆16Oct 18, 2021Updated 4 years ago
- Code implementation of Soft Matter submission with title "Learning 3D Shape Proprioception for Continuum Soft Robots with Multiple Magnet…☆16Mar 21, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- restart adbd with root privileges☆11Oct 21, 2015Updated 10 years ago
- AND101 - Introduction to Xamarin.Android☆13May 13, 2019Updated 6 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- Cheat Sheets☆13Aug 1, 2020Updated 5 years ago
- 深度学习大作业(基于ResNet网络模型的花卉识别研究)☆18Jan 7, 2024Updated 2 years ago
- ☆11Aug 27, 2019Updated 6 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Jan 13, 2018Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 9 years ago
- 一个带登录界面的基于MINST的花卉识别系统☆15Apr 17, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- Official implementation of "cmSalGAN: RGB-D Salient Object Detection with Cross-View Generative Adversarial Networks" (IEEE TMM 2020)☆10Aug 23, 2021Updated 4 years ago
- A Swift library of data structures and algorithms found and used in compilers☆25May 21, 2018Updated 7 years ago
- ETL pipeline combined with supervised learning and grid search to classify text messages sent during a disaster event☆16Feb 24, 2019Updated 7 years ago
- Prompt your users to donate after `npm install`☆14Jan 10, 2021Updated 5 years ago
- Dump the saved wifi passwords for windows using regular expressions and python 3☆17Dec 22, 2016Updated 9 years ago
- For noobs like me: how to connect your google drive to Colab and download data with kaggle API☆28Nov 23, 2018Updated 7 years ago
- A 11 week workshop for Data Structure concepts and Algorithms.☆17Jul 22, 2021Updated 4 years ago
- Notes on Facebook PyTorch Challenge Lessons☆27Feb 3, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Implementation of "Group-Wise Deep Object Co-Segmentation With Co-Attention Recurrent Neural Network" ICCV 2019☆14Jan 27, 2023Updated 3 years ago
- SSM整合(带案例)书籍增删查改☆11Jan 21, 2020Updated 6 years ago
- a high performance blockchain☆14Updated this week
- course labratory☆14Dec 12, 2018Updated 7 years ago
- Fast subdomains enumeration tool for penetration testers☆11Jan 31, 2017Updated 9 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Share wifi on windows with arranged password like every hour or every day☆14Feb 4, 2017Updated 9 years ago
- Whatsapp Rest API☆10Mar 4, 2023Updated 3 years ago
- ☆17Nov 22, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Tier0 (Tier Zero) Account discovery for ActiveDirectory Security☆17Apr 11, 2018Updated 7 years ago
- Quiz app created in the Try Ember course☆10Mar 4, 2016Updated 10 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆19Mar 15, 2017Updated 9 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Sep 27, 2016Updated 9 years ago
- Using GMMs, WMV, ViBe and template match to detect moving object in various backgroud☆13Jun 20, 2018Updated 7 years ago
- A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.☆15Sep 19, 2023Updated 2 years ago
- This project uses a Convolutional Neural Network (CNN) to predict flowers of 5 types using the flower recognition dataset on Kaggle.☆10Updated this week