One, the solution of daily life1. Identify the problem/clear the problem2. Understanding the background (question background, self-level, problem details)//understanding Issues3. Listing programmes//finding alternatives4. Preferred option//Choose the best solution from the alternatives5. Make specific actions on the selected scenario//list instructions for the selected solution6. Implementation, evaluation solution//evaluation SolutionIi. Types of problem solving1. Algorithm (algorithm) scheme (
summary of the wrong quiz
Wrong question 1 and reason, understand the situation
Wrong question 2 and reason, understand the situation
...
Other (sentiment, thinking, etc., optional)XxxXxxLearning progress Bar
lines of code (new/cumulative)
Blog Volume (Add/accumulate)
Learning Time (new/cumulative)
Important Growth
Goal
5000 rows
30 Articles
400 hours
First week
200/200
2/
Engineers from the Nginx company introduced what Ngnix, how to install Nginx and nginx+, the main configuration files, commands and folders, also talked about the basic configuration and Advanced configuration options, including a large number of configuration options and related principles introduced, can be used as a reference to the site operators to get started, Finally, the log and monitoring file management are also discussed.Too long, the original link https://www.slidestalk.com/s/nginx_b
operation
Partial Bloom Filter: The value of the hash function of the original Bloom filter is 0~m-1, that is, the subscript range of the entire bit array, whereas in PBF each hash function has a smaller range, with no overlap between the bits, and the bit array is divided into K regions, each hash function value is responsible for a region. The advantage is that the accuracy rate is higher than the original, and the array can be accessed in parallel, optimizing program performance
The React component lifecycle would allow you to update the your components at runtime. This lesson would explore how to does that.Import React from 'react'; import Reactdom from 'React-dom'; exportdefault classApp extends React.component {constructor () {super (); This. State ={increasing:false}} update () {Reactdom.render ( This. props.val+1}/>, document.getElementById ('app')); } componentwillreceiveprops (nextprops) {//invoked when a component is receiving new props. This method isn't calle
React components has a lifecycle, and you is able to access specific phases of that lifecycle. This lesson would introduce mounting and unmounting of your React components.Import React from 'react'; import Reactdom from 'React-dom'; exportdefault classApp extends React.component {constructor () {super (); This. State ={val:0}} update () { This. SetState ({val: This. State.val +1})} componentwillmount () {Console.log ("Component would Mount"); } render () {Console.log ("Rendering"); return (
number of positive classesTN predicts negative class as negative class number
Different measure values
Precision = TP/(TP + FP) accuracy rateNumber of positive sample predictions/total predicted as positive
Recall = TP/(TP + FN) recall ratePositive sample forecast result/Positive sample actual number
FPR = FP/(fp + TN)Negative sample result/Negative sample actual number predicted as positive
FNR = FN/(TP + fn)Positive sample result/Positive sample actual number predict
-oriented class is a well-encapsulated module in which the class definition explicitly separates its description (the user-visible external interface) from the implementation (an internal implementation that is not visible to the user), and its internal implementation provides protection according to the scope it specifically defines. The object is the most basic unit of encapsulation. Encapsulation prevents the change effect of program interdependencies.Object-oriented encapsulation is clearer
other, improving efficiency. However, a highly available cluster can only be started on a single host at a time.brain fissure: because of cluster division, when a node in a cluster cluster temporarily stops responding because of a processor busy or other reason, the other node may mistakenly consider the node "dead", thereby seizing access to the shared disk (that is, the resource). At this point it is very likely that the suspended animation node re-writes to the shared file system, causing th
log in, the login information to configure the Hive-site.xml can be.The next step is to happily use the hive, create tables, and so on. Remember to open the Hadoop service, sbin/start-all.sh.Summary: Today, the two major problems encountered is that after 1:bin/hive has been an error, after the final initialization can be. 2, Sublim-text in Linux can not input Chinese, and cannot download GPK resolution, unable to compile sublime_imfix.c, later through the discovery of the compiled library on G
programmatic conversion was unsuccessful, and the other return value indicates a successful conversion.Domain address, integer address#include struct hostent *gethostname (constchar *name);Integer address, domain name address#include struct hostent *gethostbyaddr (constchar *addr,int len, int family);BYTE conversionFormat of storage bytes:
Network byte order: High byte in front (Big Endian)
Native byte order: low byte in front (Little Endian)
Function naming law:h represents t
In the past seven days, I have learned the basis of computer applications, although I think that there is a certain basis for computers, but after the seven days of learning, only to find that they understand is really fur, also in this seven days learned a lot of knowledge.The first is to learn the field of computer, history and its components and operating system, although before some understanding, but the specific characters have time and so not very understanding, but also in the face of le
"UML Foundation and Application Case" This book read half, remember very few things, feel the book a bit redundant, but because want to know about UML (Unified Modeling Language, Unified Modeling Language) The most basic knowledge, so still have to look at it again, The catalogue is listed with mind mapping software.So far, the brain is still mess, there are too many types of graphs, there are many relationships, there is no better way to remember them. Specifically under a STARUML software, to
Classification of a software test Divided by test phase1) Unit Test2) Integration Testing3) system Testing4) Acceptance Test5) Regression test6) Alpha Test7) Beta testDivided by test method1) white box test2) black box test3) Grey Box test4) performance Test5) Automated Testing6) Compatibility test7) Ease of use testing8) Safety test9) Exploratory Testing10) Random TestSpecific what each test classification specifically said, see http://www.cnblogs.com/fnng/archive/2012/10/24/2737972.htm
subclass can have only one base class, and to implement multiple inheritance, it can be implemented by multilevel inheritance.Inheritance concepts are implemented in three categories: implementation inheritance, interface inheritance, and visual inheritance.Implementation of inheritance refers to the ability to use the properties and methods of the base class without additional coding;Interface inheritance refers to the ability to use only the names of properties and methods, but subclasses mus
/12
20/200
Learn the contents of system level I/O and understand the intrinsic function
Tenth Week
407/1035
1/13
30/230
Analyze and debug your code, system-level I/O content
11th Week
714/1749
2/15
40/270
Understanding anomalies and their types
12th Week
0/1749
4/19
30/300
Review the contents of the previous weeks
13th Week
797/2728
2/21
20/320
Learn t
Processor, A large-scale system consisting of hundreds of processors, a symbol of the country's comprehensive strength. ), cluster system (Cluster, interconnected homogeneous or heterogeneous independent computer aggregation, each node has its own memory, I/O, operating system, can be used as a single machine, between nodes using commodity network interconnection, flexible).Hardware: Multi-core CPU (Intel, AMD), GPU (Nvidia), Cellbe (SONYTOSHIBAIBM, including a master processing Unit and 8 co-p
=x+y;Return z;//the data type of the above function is the return data type, it must be consistent, in order to invoke and output the return value in the main function;}}absence of return value (void)Class Name {public void function name (int x,int y)//If there is no return value, it is added void before the name of the defining function;{int z=x+y;Console.Write (the value of "Z:" +z); output directly in the functionreturn;//or direct return+ semicolon, i.e. no return value, no call to output in
reliable, efficient and easy to read). Implementation details of complex data structures and algorithms in the shielding program2) Main factors of concern:Data structures and algorithms are concise (readable), rugged (reliable, easy to maintain).3) Main methods and technologies:Defensive programming, assertion programming, test-driven development, exception handling, profile programming, table-driven programming, state machine-based programming. The first four are about reliability, and the nex
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.