Spring boot + neo4j ☞ create a multi-point network
Based on the simple practice of the first two articles, we will continue to talk about the application of Neo4j, simulat...
Teacher, are you sure Java annotations will not be executed?
Previously, I shared an article on my blog about comments in Java and wrote a word with oath: "Comments will not be...
pandas data type conversion
Data types in data processing When processing data with pandas, we often encounter the problem of data type. When we ge...
How to build test cases of linked list and tree by LeetCode
When you brush the list and tree in the leetcode topic, it's hard to avoid inconvenient debugging. Because I am used to ...
Regular expression and grep instruction in Shell programming
#In fact, regular expressions complete data filtering, reject the data defined by the unsatisfied regular expressions, a...
Core implementation of kubernetes container state synchronization mechanism
After the Pod is dispatched to a Node in K8s, the subsequent state maintenance information is maintained by the kubelet ...
Java recursion exercises
1. Receive a folder path from the keyboard and count the size of the folder package demo; import java.io.File; import ja...
Java Chapter 3 exercises
Analysis Value: a b c delt solution Steps: 1. Prompt for a b c 2. Calculate the value of delt 3. Solution of equation by...
Beauty of Interval K Large Number Query
Problem: In an unordered sequence, find the K-th largest number in a given interval Method 1: Sort first, then find the ...
Easily build REST API through SCF Component, no need to stay up late and work overtime
When an application needs to provide a service interface to a third party, REST API is undoubtedly the most popular choi...
Elasticsearch 6.3.1 Create a parent-child document (join datatype)
Why use join datatype An index in ES6.3 can only correspond to one type, so if you want to store tree-structured data, ...
Common development knowledge points of ES6: Introduction
ES6 introduction
ES6, full name ECMAScript 6....
Implement a synchronizer based on AQS
As mentioned above, we can try to implement a synchronizer ourselves. We can simply refer to the implementation of Reent...
nginx worker process loop
When the worker process starts, it first initializes the environment it needs to run, then it enters a cycle in which it...
1python how to find all permutations of a string
Title Description:
Design a program that requires all pe...
Classification of epilepsy with keras - Python case
Catalog Introduction to epilepsy data set Keras deep learning case This sharing is published in public address for b...
Take a look at LockSupport and AQS
This time, we can see the principle of lock in concurrency. We will talk about AQS, ReentrantLock, ReentrantReadWriteLock and the newly added StampedL...
Getting data from python's restful api (flask)
The Advanced Rest Client, an extension program of Google browser, is required for simulation request 1. Code directly 1 from flask import Flask 2 from...
The use of ICAP primitives in FPGA -- the implementation of Multiboot function
Use of ICAP primitives First, gossip Introduction of ICAP primitives Introduction of ICAPE2 primitive Code of ICAPE2 primitive Verification Concludin...
Using Spring Boot and OAuth to build a secure SPA
Recently, I have been studying in a closed door, but the process is still a little hard. Fortunately, there are also teachers who take the excellent c...
Summary of common skills in Salesforce Apex (continuous update)
Preface The blogger is also a Salesforce Apex, who has been working for a long time. I would like to share the useful knowledge and the knowledge I u...
What's the secret hidden in Taobao code shared with wechat friends
It's going to be my birthday soon. I try to find the same gift I like on Taobao. Click the top right corner to share her wechat to see if she can...
bzoj4818 SDOI2017 sequence count
Title Link thinking First of all, consider the scheme number of violence \ (dp \), \ (f[i][j] \) represents the number of first \ (I \), the sum of nu...
spring's Custom Annotation Analysis
Preface spring provides rich annotations, but sometimes does not meet the complex needs of existing businesses. We can refine our business framework b...
Laravel uses JWT to implement API user authorization
Part I installation of JWT Step 1. Use Composer to install tymon / JWT auth:`composer require tymon/jwt-auth 1.0.0-rc.3 Step 2. Add a service provider...
Python practice example (10)
55. Learn to use bitwise inversion ~. Program analysis: ~ 0 = 1; ~ 1 = 0(1) first shift a to the right by 4 digits. (2) set a number with the lower 4 ...
Fifth populate of mongoose series
Effect Mongoose's populate() can join tables to query, referencing documents in other collections. Populate() automatically replaces the specifie...