Skip to content
View Aryia-Behroziuan's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report Aryia-Behroziuan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

低代码框架,支持流式布局与自由布局拖拽编排,可视化拖拽、随意嵌套组合、实时渲染、实时辅助线展示、自由布局支持辅助对齐、支持自动吸附、实时组件间距展示、实时拖拽排序、状态域管理,可视化属性配置、可视化样式配置、多设备适配展示,支持逻辑渲染、模板字符变量、表达式、自定义方法、自定义状态

TypeScript 5,160 781 Updated Oct 30, 2023

An ANN is a model based on a collection of connected units or nodes called "artificial neurons", which loosely model the neurons in a biological brain. Each connection, like the synapses in a biolo…

78 18 Updated Nov 15, 2023

بکاپ از گوگل: چه اتفاقی افتاده و چه باید کرد؟

281 22 Updated Nov 20, 2022

This tool is a script for ِِِِِِDDOS attacks that can be used to shut down sites and cancel their services.

Python 2 Updated Jun 4, 2022

Cross-site request forgery is a common malicious exploit of websites. It occurs when unauthorised commands are transmitted from a user that a web application trusts. The user is usually logged into…

2 Updated Jan 7, 2021

In many cases, hackers won’t specifically target your website. They will be targeting a vulnerability that exists for a content management system, plugin, or template. For example, they may have de…

5 1 Updated Jan 7, 2021

In some cases, the greatest weakness in a website’s security system is the people that use it. Social engineering seeks to exploit this weakness. A hacker will convince a website user or administra…

7 Updated Jan 7, 2021

This hacking technique injects corrupt domain system data into a DNS resolver’s cache to redirect where a website’s traffic is sent. It is often used to send traffic from legitimate websites to mal…

3 Updated Jan 7, 2021

A denial of service attack floods a website with a huge amount of Internet traffic, causing its servers to become overwhelmed and crash. Most DDoS attacks are carried out using computers that have …

7 2 Updated Dec 14, 2021

Cross Site Scripting is a major vulnerability that is often exploited by hackers for website hacking. It is one of the more difficult vulnerabilities to deal with because of the way it works. Some …

3 Updated Jan 7, 2021

SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with databases. SQL allows the website to create, retrieve, update, …

12 2 Updated Jul 16, 2022

Computer vision is an interdisciplinary field that deals with how computers can be made to gain high-level understanding from digital images or videos. From the perspective of engineering, it seeks…

1 Updated Dec 28, 2020

The classical problem in computer vision, image processing, and machine vision is that of determining whether or not the image data contains some specific object, feature, or activity. Different va…

3 1 Updated Dec 28, 2020

Materials such as rubber and silicon are being used to create sensors that allow for applications such as detecting micro undulations and calibrating robotic hands. Rubber can be used in order to c…

1 Updated Dec 28, 2020

One of the newer application areas is autonomous vehicles, which include submersibles, land-based vehicles (small robots with wheels, cars or trucks), aerial vehicles, and unmanned aerial vehicles …

3 2 Updated Jan 18, 2023

Military applications are probably one of the largest areas for computer vision. The obvious examples are detection of enemy soldiers or vehicles and missile guidance. More advanced systems for mis…

3 Updated Dec 28, 2020

A second application area in computer vision is in industry, sometimes called machine vision, where information is extracted for the purpose of supporting a manufacturing process. One example is qu…

2 Updated Dec 28, 2020

One of the most prominent application fields is medical computer vision, or medical image processing, characterized by the extraction of information from image data to diagnose a patient. An exampl…

2 Updated Dec 28, 2020

The fields most closely related to computer vision are image processing, image analysis and machine vision. There is a significant overlap in the range of techniques and applications that these cov…

1 Updated Dec 28, 2020

In the late 1960s, computer vision began at universities which were pioneering artificial intelligence. It was meant to mimic the human visual system, as a stepping stone to endowing robots with in…

2 Updated Dec 28, 2020

Create Main Repository github for save My File

1 Updated Dec 24, 2020

New

1 Updated Dec 24, 2020

My installer Package

1 Updated Dec 3, 2020

This software is for graphic work and can be used to graphically design a website.

HTML 1 1 Updated Dec 14, 2021

It is an open source tool and others can help in its development and growth.The goal is to find open pitfalls on the network and is very useful for security engineering

Python 1 Updated Oct 3, 2020
Next