The Story Behind GCC Why OpenCV Meet
1. Experimental Requirements
(1) Experiment 1
Learn and master the compilation and assembly of executable programs. The learning tasks are as follows: 1) Read, understand and learn the materials "Generating static and dynamic libraries with gcc. pdf" and "Generating and using.Pdf for static libraries. a and. so libraries" ...
Posted by spelman07 on Tue, 05 Oct 2021 18:32:48 +0200
Qt based OpenGL: QOpenGLShaderProgram and GLSL
Qoopenglshaderprogram encapsulates the compilation process of ShaderProgram. Whether it is loading SourceCode or SourceFile, Qt encapsulation is very good. If it is not encapsulated, the code will be written into the string as shown in the figure below. There is no color identification, and there must be a newline character on each line, which ...
Posted by jabba_29 on Sun, 03 Oct 2021 20:30:23 +0200
week4 KMP+Chain List+Stack+Queue
1. KMP
Next array: what is the length of the longest common prefix for each location of the storage pattern string, and then when moving the pattern string pointer, when p[j]!=When s[i] (p mode string, s main string), pointer J can move quickly, that I s, j=next[j]. Why?
Title: Activities - AcWing
#include<iostream>
#include<strin ...
Posted by beermaker74 on Sun, 03 Oct 2021 18:08:29 +0200
Linux: Segmentation fault (core dumped) (how to get a core dumped of a segment error on Linux) (Note) (incomplete, paused)
How to get a core dump of a segment error on Linux
What is a segment error?
Segment fault refers to a situation in which your program attempts to access memory addresses that are not allowed. This may be due to:
Attempt to dereference null pointer (you are not allowed to access memory address 0);Try to unquote other pointers that are not ...
Posted by WhiteCube on Sat, 02 Oct 2021 19:16:41 +0200
Week 9: array + pointer + string
1. Transpose of two-dimensional array matrix
Title:
Please write a function to transpose an integer matrix of m*n. Note: Please store the transposed data in the two-dimensional array before outputting the two-dimensional array. Three transposes are required using the following three functions:
void Transpose1(int a[][N], int at[][M], int m, ...
Posted by jokullsolberg on Sat, 02 Oct 2021 00:29:09 +0200
[OS Linux] explain Linux Process 1 in detail (process concept, PCB, process creation, process status, zombie process, orphan process)
Based on CentOS, this paper deeply explains the process concept, PCB, process creation, process status, zombie process and orphan process by von Neumann system and operating system concept.
catalogue
1, Von Neumann system
2, Operating system
3, Basic concepts of process
4, Description process - PCB
1.task_ struct
5, Organizational ...
Posted by fansa on Fri, 01 Oct 2021 21:18:50 +0200
step05 day15 learning notes
1. Traditional hash, consistency hash and hash slot
1.1 traditional hash (hard hash)
In the distributed system, it is assumed that there are n nodes, which is used in the traditional scheme mod(key, n) Map data and nodes. When the capacity is expanded or reduced (even if only one node is increased or decreased), the mapping rela ...
Posted by FarhanKhalaf on Tue, 28 Sep 2021 23:14:21 +0200
Decorator Pattern C + + implementation of design pattern
Refer to the book Head First design pattern
Design pattern and design principle
Decorator Pattern dynamically attaches responsibility to objects. To extend functionality, decorator pattern provides a more flexible alternative than inheritance.
The decorator pattern follows the following design p ...
Posted by TripleDES on Tue, 28 Sep 2021 20:12:39 +0200
C language implementation of address book (static version)
Preface: bloggers have written two interesting small projects before: tic-tac-toe and mine clearance Next, the blogger continues to update a small project - address book, including three versions, static version, dynamic version and file saving version. Next, let's explain how to implement the static version.
catalogue
1, Overview of static ...
Posted by keystroke on Tue, 28 Sep 2021 06:19:45 +0200
639. [C + +] decoding method II
Title Description
A message containing the letters A-Z is encoded as follows:
'A' -> 1 'B' -> 2 ... 'Z' -> 26 To decode an encoded message, all numbers must be grouped and then mapped back to letters according to the original encoding scheme (there may be many ways). For example, "11106" can be mapped to:
"AAJF" ...
Posted by ganeshcp on Mon, 27 Sep 2021 15:02:16 +0200