should be noted that I am a cross-platform expert and do not like to use Windows only. I used to write code for UNIX platforms. What I wrote below is not verified, but I have tried not to use any windows things. I only use standard C or standard C ++. However, I have never tried to compile it in other systems or compilers. Therefore, if the descriptions below are incorrect, they will not be modified. I t ;? 7 N/B9 F, L: Q %}.} "X4 D * K' $ I9 C/N * PThe following code is still written in VC, be
sparafile "Initial. cn2"
4 J "J6 l r$ r'e M # I/B6 F ,[! N6 B0 P8 V3 H/z "V7 C I
# Determine whether the file initial. cn2 exists
9 p; J6 N2 O0? +] 1 y Assign nreturn fileexists (sparafile)
'F * _ % u % ^-Z % i8 G8 P If EQ nreturn 1
'{/L # f) I) G1 D .{ # Open this file if it exists
8 S7 '"H6 j0' 3 C! C Fileopen sparafile
, S # Y: J "O! M "F # U2 t # Formatting and reading from a file
Data To store the data list in strlist.
) T8 y "d
working methods 8E 'g8 ~! } + S: D8 sSuccessful people follow the best working spirit and methods. Successful users must consider the feasibility, possible costs, the proportion of resources invested and output, and the inevitable and possible risks of failure in advance. THINKING CLEARLYOnce a decision is made, the matter should be done and a new job should be started immediately. In addition, they share the same characteristics that once they are i
give the series and the maximum and minimum values!
Finally, the histogram of 2g-r-b is obtained:
Use OTSU to binarization 2g-r-b Grayscale Images:
# Convert to u8 type and perform otsu binarization gray_u8 = np. array (gray-minVal)/(maxVal-minVal) * 255, dtype = np. uint8) (thresh, bin_img) = cv2.threshold (gray_u8,-1.0, 255, cv2.THRESH _ OTSU) cv2.imshow ('bin _ img ', bin_img)
Then we get a good binary image:
Use this as the mask to obtain the color plant image:
# Obtain the color
brief introduction to my device list:
Router: H3C SR6604
Firewall: H3C SecBlade FW Firewall
Core switches: H3C7506, H3C7503, Huawei S6506, Huawei 5700
Specific operations:
Mirror the optical port of H3C7506 connected to the SR6604 router to the port connecting H3C7506 to the Bandwidthd server.
For example, you can create an image on the optical port to mirror traffic from G8/0/1 to G8/0/12.
Interface Gig
Replacement: S/S1/S2 (replace the next S1 with S2)5. Replace All:%S/S1/S26. Replace the current line only: s/s1/s2/g7. Replace some lines: n1,n2 s/s1/s2/g8, search mode for/string, search for the next n, search for the previous n9, make bookmarks MX, but do not see bookmark tags, and can only use lowercase letters10. Move to the key next to ' x,1 ' at a label11. Move to the location where you last edited the file.PS:. Represents an arbitrary characte
replacements1. The cursor looks backwards for keywords # org#2, the cursor forward to find the keyword * org*3. The current line looks for charactersfx/Fx/tx/Tx4. Basic substitution s/s1/s2 (replace next s1 to s2 )5. Replace All%s/s1/s26, only replace when the forwards/s1/s2/g7. Replace some linesn1,n2 s/s1/s2/g8, search mode for /string , search the next place for n , search the previous place forN9, make bookmarks mx , but do not see bookmark marks
Replacement: S/S1/S2 (replace the next S1 with S2)5. Replace All:%S/S1/S26. Replace the current line only: s/s1/s2/g7. Replace some lines: n1,n2 s/s1/s2/g8, search mode for/string, search for the next n, search for the previous n9, make bookmarks MX, but do not see bookmark tags, and can only use lowercase letters10. Move to the key next to ' x,1 ' at a label11. Move to the location where you last edited the file.PS:. Represents an arbitrary characte
Replacement: S/S1/S2 (replace the next S1 with S2)5. Replace All:%S/S1/S26. Replace the current line only: s/s1/s2/g7. Replace some lines: n1,n2 s/s1/s2/g8, search mode for/string, search for the next n, search for the previous n9, make bookmarks MX, but do not see bookmark tags, and can only use lowercase letters10. Move to the key next to ' x,1 ' at a label11. Move to the location where you last edited the file.PS:. Represents an arbitrary characte
the cursor to the last lineEnter the uppercase letter GGo back to the first lineInput GGGo to the line with the specified line numberEnter line number GExample: 5g,8gMove cursor up or downMethod One: ↑↓←→Method Two: HJKL5. Edit the text contents of the operationDelete Current line: DDDelete n rows starting from the current line: DNDUndo the action you just made: URedo the action you just made: Ctrl+rCopy Current line: yyPaste to the next line in the current row: lowercase letter PPaste to the p
keywords * or g*3. The current line looks for characters FX, FX, TX, TX4. Basic Replacement: S/S1/S2 (replace the next S1 with S2)5. Replace All:%S/S1/S26. Replace the current line only: s/s1/s2/g7. Replace some lines: n1,n2 s/s1/s2/g8, search mode for/string, search for the next n, search for the previous n9, make bookmarks MX, but do not see bookmark tags, and can only use lowercase letters10. Move to the key next to ' x,1 ' at a label11. Move to t
The Prum filter is actually made up of a very long binary vector and a series of random mapping functions, and the Prum filter is used to retrieve whether an element is in a set
AdvantagesPrum filters have space and time advantages. The Prum filter storage space and insert/query time are constant. In addition, the Hash function is not related to each other and is conveniently implemented by hardware. The Prum filter does not require the storage element itself, and has an advantage in certain sit
, then the depth of all trees with nodes as the root will not exceed 4, then we can directly implement it through left join.
However, we often cannot control the depth of the tree. In this case, you need to implement this recursion using a stored procedure in MySQL or in your program. This article discusses several implementation methods.
Sample Data:
Mysql> create table treeNodes-> (-> Id int primary key,-> Nodename varchar (20 ),-> Pid int-> );Query OK, 0 rows affected (0.09 sec)Mysql> sel
, # so the GetText function searches the Locale_dir directory for the binary App_name.mo file of the corresponding language Gettext.bindtextdomain (App_name, Locale_dir) # Declare using the current domain, you can use more than one domain, you can provide multiple sets of translations for the same language, # This program only uses a domain Gettext.textdomain (app_name) _ = gettext.gettextif __name__ = = "__main__ ": Print _ (" Hello World ")Then go back to the command-line window, check the cur
G6 is 5, it is impossible to enter B6 and C6 in the column as 5, and these cells are also in the block starting from A4. Therefore, only C4 is left in the starting block of A4 (the ninth Palace) where the number 5 is entered, so that the answer is obtained by division, that is, C4 = 5.
Next, let's look at an example of unit exclusion in a row:
Observe number 5 and row G in the puzzle, and there are 6 empty cells in row G that cannot determine the number, however, the value 5 at the D5 posit
can modify the config (such as C:/winnt/Microsoft. net/framework/v1.0.3705/config) directory. the processmodel of config. Use the user name "system. This may not be safe, but it does not matter if it is developed. 9 {: F/v. s s2b1s #?. G8] "B + W6u 'l * ' Y) L $ [% YSolution 2:+ |, @/M, j9h8j2r qimei webmaster Forum [old site]! Q; p9h w3s-S0N6t qimei webmaster Forum, sponsorship space, free space application, webmaster exchange, free resources, sourc
some local information such as: r! Ifconfig eth0 grep "inet" puts the IP address information of the local machine directly in the vi document.
Display man content of words under the cursor
K
Display the hexadecimal value of Unicode characters under the cursor
G8
Bookmarks
When you need to mark the Code:
MX: X is any letter
Jump to bookmarks:
'X
Save and exit: ZZ is very convenient
Code Movement
: Set sw? View the number of code moves at a time
: Set
// Yahtzee (Yahtzee game) // PC/Ultraviolet IDs: 110208/10149, Popularity: C, Success rate: average Level: 3 // copyright ownership (C), Qiu, 2011. Metaphysis at yeah dot net // Verdict: Accepted // Submission Date: 2011-05-16 // ultraviolet A Run Time: 0.088 s // You can select any of the 13 scoring methods for each group of shards. The selected scoring method cannot be selected again. If each group of workers is scored based on each method and the scores are arranged as follows, a matrix is ob
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.