Article. Page 43



Building recommendation system based on collaborative filtering of users

1. Overview Before that, I introduced how to ...
0:30 26 June 2020

Talk Android together (247th time: data transfer between fragments in Android 5)

Hello, ladies and gentlemen, last time we talked about the example of data transfer between fragments in Android, this t...
23:51 25 June 2020

IBM Cloud Kubernetes Service - k8s external cloud storage performance test

There are many ways to store k8s data: emptyDir (temporary storage), hostpath (semi persistent storage), persistent stor...
23:31 25 June 2020

Linux system running analysis tool - Summary of the use of the sarcommand

catalog sar introduction sar usage sar installation and...
23:21 25 June 2020

Android build process - Part 2

Android build process - Part 2 Pre operation task list How to view a task class Task1: checkDebugClasspath 1. input/ou...
22:42 25 June 2020

Notes on Java learning

Notes on Java introduction 2 - Hao bin abstract class Abstract method abstract class Final keyword Final decorates t...
22:40 25 June 2020

Simulation of alarm mode control for Proteus sensor + gas concentration detection

catalog Simulation of alarm mode control for Proteus sensor + gas concentration detection 1 understanding of experim...
21:57 25 June 2020

Least Squares for Solving Linear Regression Equations

Preface Write this little thing because he was driven mad by his math homework (Big Brother Assassination List) The prin...
20:53 25 June 2020

Source code analysis of Zhiyu dubbo

dubbo source code analysis file dubbo load profile dubbo service provision 1. Verify configuration information 2. Crea...
7:08 25 June 2020

CopyOnWriteArrayList special points, compare ArrayList

CopyOnWriteArrayList special points, compare ArrayList ArrayList can use the iterator's remove method to delete element...
7:03 25 June 2020

Docker entry basic command

Article catalog 1, Overview 1. What is Docker 2. Differences between container technology and virtual machine technolo...
1:24 25 June 2020

Virtual machine - TEST compiler (4)

catalog 1 virtual machine 1.1 function 1.2 characteristics 1.3 design ideas 2 complete code 3 Summary Lexical anal...
0:43 25 June 2020

Selenium+Tesseract cracking login verification code

preface The type of login verification code I cracked is the type of mathematical formula, i.e... does it look simple, b...
0:25 25 June 2020

Attack and defense world XCTF reverse advanced area (continuous update)

Words written in the front It's still a proce...
0:18 25 June 2020

Introduction and use of [Java] LocalDate/LocalTime/LocalDateTime class

background Briefly describe the background of these new date API s in JDK 1.8. As early as in the era of JDK 1.0, JDK in...
0:06 25 June 2020

js asynchronous execution order

Reference article: js asynchronous execution order 1. The execution order of JS is synchronous first and then asynch...
23:55 24 June 2020

Linux system security management

Article catalog 1, Account security control 1.1: basic measures for account security 1.1.1: system account cleaning 1...
23:16 24 June 2020

Spring 7 -- developing spring based on annotation

Developing spring based on annotation There are two forms of spring IOC containers: (1) XML configuration file: applica...
23:02 24 June 2020

Property Injection

Injection in springboot Basic Property Injection @Value Object Mode Injection @ConfigurationProperties Comparison of tw...
22:41 24 June 2020

Servlet learning notes

Three configuration modes of Servlet Mode 1: precise configuration Must be in exact path, plus / SOS to access For exa...
22:34 24 June 2020

Hexo +gitee blogging for the most complete teaching

Hexo is a fast, concise and efficient blog framework.Hexo Use Markdown (or other rendering engine) parses the article an...
22:26 24 June 2020

Deep analysis of Map source code

preface map set is the set of key value ...
22:22 24 June 2020

SQL Mathematical Functions, String Functions for Programmers

Article Directory Preface 1. Mathematical Functions 1.1 ABS 1.2 CEIL 1.3 FLOOR 1.4 MOD 1.5 RAND 1.6 ROUND 1.7 TRUNCATE...
12:55 24 June 2020

New features of Java syntax_ java5 to java11

1, Foreword I never thought, it's 0202, Sun i...
4:07 24 June 2020

Summary of Map set in java

In the Collection, the elements are isolated (understood as single), and the elements are stored in the Collection one b...
4:06 24 June 2020

JavaScript common API collection summary

This chapter includes DOM operation, CSS operation, Object (Object object Object, Array Object, Number Object, String Ob...
3:48 24 June 2020

Word2Vec development and code implementation

Word2Vec Language model calculation shortcoming Hypothesis based on Markov n-gram models Construct language model Wo...
3:39 24 June 2020

JWT detailed instructions for use

JWT What is a token? What is the difference between HS256 and RS256? JWT structure tripartite header payload signatur...
2:18 24 June 2020

The new colleague "optimizes" the if else with the strategy mode. The technical director said: can you think about it and then change it?

This article comes from the author's contribution, the original author: God loves apples ...
1:01 24 June 2020

GMSSLGMSSL double certificate generation for novice

First of all, I'm not a professional in cryptography. I don't have the knowledge base in this area. This blog and the ne...
0:00 24 June 2020