SAM: Segment Anything Code Reproduction and Testing Basic Usage

Related addresses Code: https://github.com/facebookresearch/segment-anything Online website: https://segment-anything.com/demo Environment configuration It is recommended that you clone it to learn the relevant code, and the installation does not depend on this library git clone https://github.com/facebookresearch/segment-anything.git 1.Create environment.yaml name: sam channels: – pytorch -conda-forge dependencies: -python=3.8 -pytorch=1.9.0 -torchvision=0.10.0 -cudatoolkit=11.1 -pip conda env create -f environment.yaml conda activate raptor […]

Vulnerability Analysis | Apache ActiveMQ RCE Vulnerability Reproduction (CNVD-2023-69477)

1. Vulnerability description ActiveMQ is an open source message broker and integrated mode server that supports the Java Message Service (JMS) API. It is a project under the Apache Software Foundation and is used to implement message middleware to help communication between different applications or systems. There is a remote code execution vulnerability in Apache […]

[3D image segmentation] 3D image segmentation based on Pytorch 7 (data preprocessing: resample data to 1mm unified scale)

In the previous section: [3D Image Segmentation] VNet 3D Image Segmentation 6 (data preprocessing) based on Pytorch, we have obtained the same seriesUID name as the mhd image mask nrrd data file, it can be said that there is a one-to-one correspondence. Moreover, the files of mask are divided into 4 folders according to how […]

Some basic image preprocessing—normalize the scale of all pictures in a file, view the RGB value of each pixel, switch the specified color to white, and switch all pictures in the file from png to jpg

Table of Contents 1. Normalize the scale of all pictures in a file 2. View the RGB value of each pixel of an image 3. Switch the specified color to other colors (switch red to white in the code) 4. Switch all pictures in a file from png to jpg 5. Rename all images in […]

[3D Image Segmentation] 3D Image Segmentation 6 based on Pytorch (data preprocessing LIDC-IDRI tag xml tag dump and tag count statistics)

Since the previous LUNA16 data processing method compiled by the author of Bizhan was too cumbersome, this article will make a new sorting of the LUNA16 data. The final data and form are similar. of. However, the main difference is that the code logic is relatively simple and easy to understand. For learning about the […]

Big Data Experiment 3 Data Preprocessing 1-Principal Component Analysis

Purpose of the experiment:Understanding big data ExperimentContent: Conduct principal component analysis on the provided data set – sources of per capita disposable income of rural residents in 2016 – and analyze the results. Code import pandas as pd import numpy as np import matplotlib.pyplot as plt def zhuchengfenfenxi(X_T): # Each dimension of the data that […]

[Target Detection] Visdrone data set and CARPK data set preprocessing

The previous blog post [Target Detection] YOLOv5 ran through the VisDrone data set introduced the Visdrone data set. I will not repeat it here. This article mainly performs target extraction and filtering on the Visdrone data set and CARPK data set. Description of requirements This article needs to extract and merge the data sets about […]

Reproduction and simple exploitation of ibos4.5.5pro command execution vulnerability

Vulnerability description There is a command injection vulnerability in IBOS. This vulnerability originates from the command injection vulnerability in the database backup in the IBOS 4.5.4 Open version. An attacker could exploit this vulnerability to gain control of the server. Source code analysis Download the source code from the official website, and we use the […]

Hyper-V installs Centos + configures Centos repo + solves the problem of wifi connection and fixed IP access to Cetos + other fragmentary issues + remote access (reprinted + modified version + supplementary version of the problem + supplementary part)

In the past year or two, I have been using a laptop provided by the company. Due to security restrictions, I cannot install some virtual machine software, which makes me always feel troublesome during the learning process. Therefore, I have always wanted to try a free virtual machine software, using Windows The built-in service Hyper-V […]