First introduce the environment:1. The host computer's operating system is scientific Linux, kernel version 2.6.18, hostname spvm02,ip address 135.100.101.102, and VMware Workstation 8 deployed.2. Guest (virtual machine) This side of the installed operating system is windows 7.3. Guest uses the VMNET8 network card to achieve Internet access through the NAT protocol.The feature that needs to be implemented is that other computers in the host network us
There are many benefits to git, and it's clear from the web that I won't repeat it here. For me, if I wanted to do some projects privately, and I couldn't save my Code and version control well, I used git. Now, let me take a personal example of how Git installs and uses it from 0 onwards.STEP1 preparatory workMsysgit, for http://msysgit.github.io/.Eclipse IDE for Java EE Developers (must be this, bring your own egit, or install the Egit plugin yourse
Original URL: http://softbeta.iteye.com/blog/1185573Common uses of Java enumeration 7Blog Category:
Java
Java Enumeration ENMUOriginal address : http://blog.lichengwu.cn/java/2011/09/26/the-usage-of-enum-in-java/JDK1.5 introduces a new type--enumeration. In Java, although it is a "small" function, but to my development has brought "big" convenience.Usage One: ConstantsBefore JDK1.5, we defined constants: public static fianl ..... Now, wit
Previously wrote an article "VC + + using CImage in memory JPEG conversion BMP picture", through the CImage realized in memory JPEG to BMP.Since JPEG can be transferred to BMP, that CImage also supports BMP-to-JPEG, in contrast to the previous article, which relies on the CImage load function, BMP-to-JPEG is implemented by the Save function:The use of the IStream interface is also a function overload, specifically refer to msdn:http://msdn.microsoft.com/zh-cn/library/d06f3fhw.aspxThe following i
The use of Python pytesser module, originally wanted to do is the image of Chinese recognition, engaged for some time, in the Chinese recognition there are still a lot of problems, here to do record sharing. Pytesser, OCR in Python using the Tesseract engine from Google. is a module of the Google OCR Open source project, which converts the text in the image to text (mainly in English). 1.pytesser InstallationEquipment used: Win8 64-bit Pytesser uses
Spring uses annotations for transaction managementOriginal link Http://www.cnblogs.com/younggun/archive/2013/07/16/3193800.html#topSteps to use:Step one, introducing the xmlns:tx= "Http://www.springframework.org/schema/tx" xsi:schemalocation= "Http://www.springframework.org/schema/beans http://www.springframework.org/schema/ Beans/spring-beans-2.0.xsd http://www.springframework.org/schema/tx http://www.springframework.org/ Schema/tx/spring-tx-2.0.x
Urllib use the following URL:http://blog.51cto.com/shangdc/2090763The use of Python crawler is actually convenient, it will have a variety of tools for you to use, very convenient. Java is not OK? Also, with the HttpClient tool, and a webmagic framework written by the great God, these can be crawlers, except Python's integrated library, which uses a few rows of crawls, and Java needs to write more rows to implement, but the purpose is the same.The fol
Millisecond delay function: Mdelay ()Subtle delay function: Ndelay ()1 #ifndef Mdelay2 #defineMdelay (n) (/3(__builtin_constant_p (n) amp;amp; (n) +) : /4({unsignedLong__ms= (n); while(__ms--) Udelay ( +);}))5 #endif6 7 #ifndef Ndelay8 #defineNdelay (x) Udelay (((x) +999)/1000)9 #endifWhen the kernel uses these two delay functions, it has to include a header file:#include The Linux kernel uses the millise
java.util.arrays;/** * uses comparable interface: Enables the class where the object to be sorted implements the comparable interface, And overriding the CompareTo () method in the comparable interface * The disadvantage is that you can only sort by one rule * @author Tong * */public class Objectsort {public static void main (string[ ] args) {person[] persons = new PERSON[5];p ersons[0] =new person ("Tom", "a");p ersons[1] =new person ("Jack", a);p e
The more commonly used logging tool classes in Java are log4j, slf4j, commons-logging (JCL), Logback, Log4j2 (log4j upgrade), and JDK logging.Spring Boot uses Logback by default, but in comparison, Log4j2 is better on performance.Using Log4j2 in Spring Boot (version 1.5.10.RELEASE ) is very simple and adds the following dependencies: -- Org.springframework.boot Spring-boot-starter Org.springframework.boot Spring
Python3 uses OPENPYXL and Jieba to extract keywords from the posts--frequency statistics of the extracted keywords
20180413 Study Notes
First, the workThe day before yesterday in the post of the keywords extracted storage, found a problem. I seem to put each keyword into a separate cell, so that at the end of the total frequency of statistics, it is not good to deal with. So, the last style:is not possible, they should be placed in the s
The Linux find command uses a little trickToday, we need to clean up some of the directories that were used to store the packages that were generated by the daily build, and the names are stored according to certain rules, such as:/dailybuild/[module_name]/[yyyy]-[MM]-[dd]/xxxConsider here that only the last 5 days of Dailybuild are saved, and delete operations are performed for directories older than 5 days.After a look at the Find command descriptio
Using Dense_flow to extract the image of the optical flow image, the original project address: Https://github.com/wanglimin/dense_flowThis method uses the Opecnv most basic method of optical flow image calculation, the output is flow_x and flow_y two images.Because the input is different from the program requirements (video---continuous frame image), the program is partially modified, roughly the same.The method for compiling the program is:Suppose th
. Snapshot replication is typically used in situations where a large number of changes occur over a certain period of time, but the amount of data is small and the period of change is longer.(2) A transactional publication snapshot publication sends the entire data set to the subscriber, resulting in a replication lag problem due to the large size of the replication cycle. Then transactional replication uses transaction logs to generate transactions t
by converting the argument list to small pieces to pass to other commands to avoid the problem of too long argument listsb 、--nodeps forced unloading, regardless of dependencies3 , install the downloaded CentOS of the Yum Package:RPM-IVH python-iniparse-0.3.1-2.1.el6.noarch.rpmRPM-IVH yum-metadata-parser-1.1.2-16.el6.x86_64.rpmRPM-IVH yum-3.2.29-40.el6.centos.noarch.rpm yum-plugin-fastestmirror-1.1.30-14.el6.noarch.rpm[note]: The last 2 need to be installed together, or there will be a dependen
Operating System:centos 6.5 64bitSSH Clients:putty/puttygen1) Installing the SSH service#yum install-y openssh-server//install SSH service #/etc/init.d/sshd start//start SSH Service #netstat-anpt | grep sshd//To see if it started successfully2) generate the key on the server#ssh-keygen-b 1024-t RSA uses the Ssh-keygen command on Linux to generate the key (-B bits-t type/more parameters to know for yourself)//enter file in which to save key (store key
The end reboot of Nginx is usually accomplished by the following command:Kill-quit 26000Where 26000 is the main process number of nginx.Each time you need to use the PS command to query the Nginx main process number, very troublesome. In the "real Nginx: Replace Apache's high-performance Web Server" in the book mentioned the use of PID file method, unfortunately, gave the command missing something, here gives the complete instructions.What is a PID fileThe PID file is a plain text file, which re
permissions of the group for the file, and the third represents the permissions of all other users:"Rw-""r--""r--"Netstat-net lists active Internet connections (w/o servers) to list the number of active Internet connections, and you can see the processes that Tomcat occupiesView current Java Memory Situation jstat-gcutil 1942 view Java process 1942 memory conditionS0 S1 E O P ygc ygct FGC fgct GCT0.05 0.00 2.04 1.28 9.91 170 0.187 338 1.314 1.501E Elden Use spatial proportions, O old area
,ABBBC do not match AC,ABBBC.M is the Nether and n is the upper bound. The nether of token in M province is 0,n omitted and the upper bound of the table is infinitely large.* indicates {,} + means {1,}? = {0,1}The maximum and minimum matching python are the maximum matches, and if you want to minimize the match, add one after *,+,?, {m,n}.The end of the match object can be used to match the position of the last character.Re.compile ("A *"). Match (' AAAA '). End () 4 maximum matchRe.compile ("A
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.