[c++] STL Source Analysis: Iterator and Trats Programming Skills
Reference book STL Source Analysis
STL mainly learns the following parts:I. Containers
1. Sequential containers
vector list deque
2. Associated Container, Red-Black Tree BST
set multiset map multimap//observer mode
3. Container adapter deque
stack queue priority_queueII. ...
Posted by Haktar on Sat, 27 Jul 2019 09:41:51 +0200
First Problem Solution of ACM Summer Training in Inner Mongolia (Primary Group)
List of topics:
Problem A Miss Sister's Programming Questions
Problem B A's brushing exercises
Problem C Small A origami crane
Problem D Little A plays games with little sister
Problem E Small A earns bonuses
Problem F Little A and Little Sister Paint the Balloon
Problem G Little A's Date
...
Posted by shatner on Fri, 26 Jul 2019 14:49:43 +0200
The biggest feature of Java 8: Lambda expressions
I. Introduction
The biggest feature of Java 8 is the introduction of Lambda expressions, i.e. functional programming, which can transfer behavior. The conclusion is: using immutable values and functions, functions process immutable values and map them to another value.
2. Important Functional Inter ...
Posted by teejayuu on Thu, 25 Jul 2019 09:09:24 +0200
Thinking in Java - Operator
3. Operator
3.1 Static Import
Static import: Method calls static methods in other classes of static import
<! - Classes and static methods - >
package com.one;
public class Print {
public static void print(String s){
System.out.println(s);
}
}
<! - Method of testing static imports
package com.one;
// Static Import Metho ...
Posted by robot43298 on Thu, 25 Jul 2019 04:21:58 +0200
In MVC Controller, requests are intercepted and processed at will, regardless of custom routing.
MVC in Asp.net is mainly oriented to Content-Type of "text" type to handle HTTP requests. In addition to file transfer, even json and xml are text types.
Therefore, MVC naturally handles input and output of text type very well. Sometimes, however, this does not satisfy us.
What happens when we want to transfer binary byte [] ...
Posted by riespies on Tue, 23 Jul 2019 23:13:18 +0200
Simple Implementation of Shadowmap
I haven't realized the shadow myself before, but I understand it conceptually. This time, I write it through Demo.
Generally speaking, nothing can be optimized, but for windows, which can be replaced by facets, it seems that they can be optimized to map, which was done by demo at arm's chess house before.
Back to Shadowmap, the main idea i ...
Posted by shadiadiph on Tue, 23 Jul 2019 15:43:45 +0200
Implementation of matrix transformation encryption in java
A Playfair cryptographic variant encryption method is as follows: first, a key word (called pair) is selected (letters are not repeated and all are lowercase letters), and then, together with other letters in the alphabet, it is filled into a 5x5 square matrix. The method is as follows:
1. First fill in ...
Posted by nmcglennon on Tue, 23 Jul 2019 13:35:01 +0200
Java Language Programming. Chapter 3 Selection of Basic Chapter
Java Language Programming. Chapter 3 Selection of Basic Chapter
Below are some exercises in Chapter 3.
A single branch if statement is an action performed if and only if the condition is true. The statement is designed as follows:
If (Boolean expression){
Statements (Groups)
}
Double branch if-else ...
Posted by erfg1 on Tue, 23 Jul 2019 12:22:32 +0200
MySQL database about storage engines
If you want to modify the storage engine of MySQL database, you must understand the two engines, and clearly understand the difference between the two engines.
MySQL database supports two common storage engines:
InnoDB engine: Provides support for database ACID transactions, and implements four isolation levels of the SQL standard. The engine ...
Posted by Mesden on Tue, 23 Jul 2019 08:10:58 +0200
Machine Learning-Hierarchical Clustering (Partition Clustering)
Hierarchical Clustering (Partition Clustering)
Clustering refers to a large number of unknown labeled datasets, which are divided into several different categories according to the data characteristics existing inside the data, so that the data within the categories are similar, and the data similarity between the categories is small; it belon ...
Posted by dallasx on Tue, 23 Jul 2019 02:39:29 +0200