Summary of double finger needling -- Taking LeetCode 27, 977, 15 and 18 as examples
The initial brush force deduction starts from the foundation, and the double pointer method is widely used in basic problems.
LeetCode 27, 977, 15 and 18 are the problems I have done in recent days, which can be well solved by double pointer method:
27:
It is equivalent to dividing the array into two parts: the first part is the valid p ...
Posted by reinmedia on Sat, 05 Mar 2022 13:45:24 +0100
Explain generics generically?
Generic, "generic" means broad, and "type" means data type. As the name suggests, a generic type is a type suitable for multiple data types. It is usually defined by Object. In theory, it can store any type of data.
If we have studied arrays, we should know that the same data types are stored in arrays, such as integer and ...
Posted by r270ba on Sat, 05 Mar 2022 13:38:17 +0100
day10.2_java learning notes
1. Common methods of StringBuilder class
The StringBuilder append (any type) parameter is appended to a string, and becomes a string no matter what the parameter is written It is equivalent to the + operation in the string
public static void builderAppend(){
StringBuilder builder = new StringBuilder();
//The append method appends a st ...
Posted by JasonMWaldo on Sat, 05 Mar 2022 13:36:39 +0100
How to add some custom mechanisms to Spring Boot graceful shutdown
Personal creation Convention: I declare that all articles created are original. If there is any reference to any article, it will be marked out. If there are omissions, you are welcome to criticize. If you find someone plagiarizing this article on the Internet, you are welcome to report it and actively report it to this organization github ware ...
Posted by cmccomas on Sat, 05 Mar 2022 13:16:58 +0100
How to output Chinese characters in C language; How to use C language Chinese character code to output Chinese characters (super full version)
Prospect summary
I want to use char type to store Chinese, and then print it out
Mode 1:
Print in the form of char [] array. Then, because a man has two bytes, two% c are required for printing
example
#define MAXSIZE 20
int main()
{
char ch[MAXSIZE] = { "Zhao qiansun Li Zhou Wu Zheng Wang" };
int j = 1;
for (int i = 0; i <= 14; i ...
Posted by nuttycoder on Sat, 05 Mar 2022 13:16:53 +0100
java implementation of distributed project construction
1 distributed
1.1 what is distributed
A distributed system must be a system composed of multiple nodes. Among them, nodes refer to computer servers, and these nodes are generally not isolated, but interconnected.Our nodes are deployed on these connected nodes, and their operations will be coordinated. For users, the distributed system is just ...
Posted by napurist on Sat, 05 Mar 2022 13:07:40 +0100
Time complexity of algorithm
The time of the algorithm is complex
1. Time complexity
[] the concept of time complexity[~] time complexity rule (representation of big O)[~] common time complex calculations
(1) The concept of time complexity: The time complexity of the algorithm is a function, which describes the operation time of the algorithm. The time spent by an algor ...
Posted by ggkfc on Sat, 05 Mar 2022 12:51:38 +0100
RAS encrypted file analysis
There are two different coding formats for X.509 standard certificates. pem coding is generally used pem as the file extension,
If der coding is adopted, it shall be in der as the extension. But common certificate extensions also include crt,. cer,. p12 et al,
They may adopt different coding formats and contents, but most of them can be convert ...
Posted by quickstopman on Sat, 05 Mar 2022 12:45:28 +0100
Understand ASP Net core: Cookie authentication
Understand ASP Net core: Cookie authentication
ASP.NET Core provides built-in Cookie based authentication support. When using Cookie authentication, there are three related elements;
Authentication mode name; CookieAuthenticationDefaults.AuthenticationScheme
namespace Microsoft.AspNetCore.Authentication.Cookies
{
public static class Cooki ...
Posted by jusitnm on Sat, 05 Mar 2022 12:43:44 +0100
NanoDet code line by line intensive reading and modification of Backbone
--neozng1@hnu.edu.cn
1. Backbone
As a network focusing on edge platform deployment, especially for CPU devices, NanoDet naturally chose to use a lightweight backbone network with deep separable convolution.
Here we mainly introduce the default Backbone: GhostNet , this is a lightweight backbone network proposed by Huawei. For details about ...
Posted by hammerslane on Sat, 05 Mar 2022 12:41:03 +0100