Book to previous:
1-Zero basic programming -- Python basic
2-Zero basic programming: basic theory of cryptography
In the previous part, we shared the basic theory of cryptography. Starting from Morse code, we analyzed Caesar encryption, transposition encryption, digital multiplication en ...
Posted on Thu, 11 Jun 2020 22:57:56 -0400 by Zaxnyd
Title Source: Python 100 cases
Skill: segment function uses number axis to divide and locate.
ratio = [0.01, 0.015, 0.03, 0.05, 0.075, 0.1]
The bonus paid by the enterprise is based on the profit commission. If the profit (I) is less than or equal to RMB 100000, the bonus ...
Posted on Thu, 11 Jun 2020 01:04:17 -0400 by Thatsmej
https://github.com/ning1875/falcon-plus This is my change to the open source version of falcon
The most important thing I forgot to write is: why can consistency hash algorithm only migrate a small number of keys when the nodes change? Because the sortkeys list is actually a hash ring. The relative position of the client's hash value and t ...
Posted on Wed, 10 Jun 2020 23:46:24 -0400 by assonitis
Today, we are going to officially use the program to crawl the BOSS recruitment data. I will improve the program step by step from the most basic step to help you understand the crawler program. There are still many problems that I can't solve. I also hope that someone can leave a message to help us
Posted on Tue, 09 Jun 2020 03:16:16 -0400 by PW
Transaction signature is the only way to prove your identity to blockchain, which is also a basic concept to be clarified when using Ethereum's Web3 development library. In this tutorial, we will learn how to use Web3.js to complete the signing and submission of Ethereum smart contract call transactions, which is applicable to all Ethereum cont ...
Posted on Mon, 08 Jun 2020 22:25:54 -0400 by dcj1978
A brief introduction to the algorithm
The algorithm is also called hash algorithm and hash algorithm. It uses a function to convert any length of data into a fixed length data string (usually represented by a hexadecimal string). Python's hashlib provides common summary algorithms, such as MD5, SHA1, SHA512, and so on.
Tips: It should be n ...
Posted on Mon, 08 Jun 2020 00:36:46 -0400 by Phpdiot
1 kd tree construction
Take the set (2,3), (5,4), (9,6), (4,7), (8,1), (7,2) of two-dimensional plane points ((x,y)) as an example to illustrate the construction process of k-d tree.
(1) Build steps
1. When building the root node, the segmentation dimension is (x), and the orde ...
Posted on Sun, 07 Jun 2020 05:46:29 -0400 by TabLeft
In the last article, we have preprocessed the ECG signal to smooth the noisy signal for classification. In this paper, we will formally start to use deep learning to classify and recognize ECG signals.
Convolutional neural network
Whether it is traditional machine learning or deep learning, the classification is based on the different featur ...
Posted on Sun, 07 Jun 2020 04:22:13 -0400 by greenCountry
1, Introduction to Html
2, Common HTML tags
1. h label
2. Common labels for text
3. Text decoration label
4. div box label
5. img picture label
6. Hyperlink tab a
7. List label
1. ol ordered label
2. ul unordered label
3. dt custom label
8. Table label
1. Table label table
2. tr l ...
Posted on Sat, 06 Jun 2020 02:27:53 -0400 by oliverw92
python data structure
The most basic and important part of learning a language is data structure, which in python is sequence or array, but seems to be more powerful than arrays.
>>> dat ...
Posted on Fri, 05 Jun 2020 22:29:05 -0400 by ym_chaitu