poj3845 Fractal
Main idea:
For a polyline, each operation transforms all line segments of the polyline into the same shape as the polyline, and repeats d times. Ask at which point the f (0 ≤ f ≤ 1) times of the whole length from the beginning to the end will stop.
Solutions:
Assuming that the length of the broken line is k times of the original, the ...
Posted by kliopa10 on Fri, 01 May 2020 21:07:42 +0200
Multithreading (read and write lock)
[notice: All Rights Reserved. Please reprint. Do not use for commercial purposes. Contact email: feixiaoxing@163.com]When writing multithreads, it's very common to have one. That is, there are few opportunities for public data modification. Compared with rewriting, their chances of reading are much higher. Generally speaking, the process of rea ...
Posted by Fribbles on Fri, 01 May 2020 13:20:56 +0200
Ranking of data structure experiment 7: course selection list
Ranking of data structure experiment 7: course selection list
Time Limit: 1000MS Memory Limit: 65536KB
Submit Statistic
Problem Description
With the expansion of the school scale, the number of students has increased dramatically, and the output of the course selection list has become a heavy task. At present, our school has more than 3000 ...
Posted by fr@nkie on Thu, 30 Apr 2020 18:54:26 +0200
Flutter writes an iOS style address book
This article mainly introduces how to use the Cupertino style control of Flutter to write an iOS style address book, as well as the problems encountered in the process and solutions.
When you write apps with Flutter, you will generally use material style controls. Because material style controls are rich, but they will appear Android flavor on ...
Posted by Shamrox on Tue, 28 Apr 2020 22:09:31 +0200
Let's take a bird's-eye view of the concurrency framework in Java!
Author: Tang Youhua
https://dzone.com/articles/a-birds-eye-view-on-java-concurrency-frameworks-1
1. Why to write this article
When NoSQL became popular a few years ago, like other teams, our team was keen on exciting new things and planned to replace an application's database. However, when we go deep into details, we think of what a wise man ...
Posted by Tatara on Mon, 27 Apr 2020 09:07:29 +0200
Oracle (Basic Grammar)
1. Functions
1.1 case conversion function
function
describe
LOWER()
All lowercase
UPPER()
uppercase
INITCAP()
title case
1.2 String Operating Functions
function
describe
concat()
Split String
Substr (field, startIndex,endIndex)
substr
length()
String Length
Instr (field,'character')
Location index where specified characte ...
Posted by speedyslow on Thu, 23 Apr 2020 05:04:22 +0200
Introduction to Feature Engineering
Author: Lin Zelong
1 What is feature engineering?
Excellent models often depend on excellent feature extraction, which involves feature engineering.The purpose of feature engineering is to maximize the extraction of features from raw data for use by algorithms and models.Therefore, feature engineering is mainly carried out in the aspect of feat ...
Posted by JoWiGo on Wed, 22 Apr 2020 18:37:01 +0200
Nginx Current Limiting Configuration
Current Limiting Algorithm
Token Bucket Tokens are generated at a fixed rate and placed in the token bucket. When the token bucket is full, extra tokens are discarded; requests consume an equal proportion of tokens.When the token is not enough, the request comes and no token is received, and the request is denied service.
Leaky buc ...
Posted by hismightiness on Tue, 21 Apr 2020 02:00:14 +0200
python building multiple linear regression model
In the previous article, the blogger introduced a model reflecting the relationship between two variables, namely, one variable linear regression model. If there are several variables, then we need to use multiple linear regression model.First, import related modules and datasets:
from sklearn import model_selection
import pandas as pd
import ...
Posted by Kurrel on Mon, 20 Apr 2020 18:05:40 +0200
Source code analysis of main methods of HashMap (JDK 1.8)
This article starts with the put, get and remove methods of HashMap, and analyzes the source flow
(specific algorithm of red black tree is not involved)
The structure of HashMap in jkd1.8 is in the form of array, linked list and red black tree
(when the red black tree is not transformed)
(when converted to mangrove)
1, About th ...
Posted by dkoolgeek on Mon, 20 Apr 2020 15:42:53 +0200