) Liskov substitution principle (Rishi replacement principle): Subtypes must be able to replace their base types. Iii. Dependency inversion principle (DIP) Iv. Interface isolation principle (ISP) 5. Principles of synthesis/aggregation multiplexing (CARP) Vi. dumit rules) I. "open-closed" principle (OCP) We are required to make the software extensible and closed as much as possible when designing the software. Open-closed PrincipleIn principle,
sky will protect her.
Little snail bait: but the younger brother has no bones to climb fast, and it will not become a butterfly. What should he do without carrying this hard and heavy shell?
Mom: Because will drill Earth and the earth will protect him.
Little snail bait cried: We are so poor, the sky is not protected, and the Earth is not protected.
Snail mother comforted him: "That's why we have shells !」
We don't rely on the sky or the land. We rely on ourselves.
3. Sharks and fishSomeone onc
Black fungus, grown on bamboo trees, looks like human ears, black or brown black. It is also known as black fungus, also known as wood fungus, trek chicken. Black fungus is extremely nutritious,According to historical records, it was the exclusive product of Emperors in the ancient times, containing a lot of carbohydrate, protein, iron, calcium, phosphorus, carotene,Vitamins and other nutrients, each 100 grams containing 375 mg of calcium, equivalent to 7 times of crucian
muddy ground. Just like a child looking at the old man, thinking that there will be endless fish as long as there is a fishing rod, like a staff looking at the boss, thinking that as long as you sit in the office, there will be a financial source.
Sharks and fish
Someone once tried to put the most ferocious shark and a group of tropical fish in the same pool, and then separated them with reinforced glass. At first, the shark continuously collided with the invisible glass every day,
object-oriented language. Beauty is a base class, and sister is a child class of beauty. As a "Love ()" method, brother accepts sister as a parameter. Therefore, this "love ()" method generally cannot accept the beauty instance.
I will not turn the example of the rectangle square below. You can go to the blog address above to learn about it.
2. Synthesis/aggregation Reuse Principle (CARP) (conversion from http://www.cnblogs.com/zhenyulu/articles/3
snail bait: but the younger brother has no bones to climb fast, and it will not become a butterfly. What should he do without carrying this hard and heavy shell?Mom: Because will drill Earth and the earth will protect him.Little snail bait cried: We are so poor, the sky is not protected, and the Earth is not protected.Snail mother comforted him: "That's why we have shells !」 We do not * Days, nor * places, we * ourselves.
3. Sharks and fish
Someone once tried to put the most ferocious shark and
.
My umbrella is convenient. it sits there waiting for me. it has wheels on it so that I do not have to carry it around. I don't even have to push it because it can propel itself. sometimes, I will open the top of my umbrella to let in the sun. (Why I am using my umbrella when it is sunny outside is beyond me !)
In Seattle, there are hundreds of thousands of these umbrellas in all kinds of colors. Most people call them cars.
Implementation Method:1. Use the delegate separation Interface2. Use mu
A distributed hash (DHT) implementation algorithm, proposed by MIT in 1997, was designed to address hot spot problems in the Internet, with a similar intent to carp. The consistent hash corrects the problem caused by the simple hashing algorithm used by carp, so that distributed hashing (DHT) can be really applied in the peer-to-peer environment.The consistency hash algorithm proposes four definitions for d
Carp flag on the man's Day is a legend from China's "ambitious" and "Carp leaping dragon".Gift ConsiderationsPungent odorThis kind of toys is usually cheaper than the inferior toys, do not map a cheap, thought to go home to wash the sun can be. Pungent taste, may be a toy with irritating substances, it is easy to stimulate the children's respiratory tract, the children's nasal mucosa also has a stimulating
The consistent hashing algorithm was proposed in 1997 by the MIT Karger and others in the solution of the distributed cache, designed to address hot spot issues in the Internet, with the original intent and carp very similar. The consistent hash corrects the problem caused by the simple hashing algorithm used by carp, so that DHT can actually be applied in the peer-to-peer environment.Consistency Hash Algor
lamb cooked
Rotten can add salt and other condiments edible. This soup has the function of invigorating qi and nourishing blood, warming the cold, and is suitable for the consumption of Yang deficiency and deficiency constitution.
"Crucian Carp pig blood porridge" fresh crucian 1 (150 grams or so), pig blood 100 grams, red JuJube 10, Medlar 5 grams, millet 40~5
0 grams, 15 grams of brown sugar, ginger, green onions, vegetable oil, salt each
Reprint please indicate source: http://blog.csdn.net/cywosp/article/details/23397179A distributed hash (DHT) implementation algorithm, proposed by MIT in 1997, was designed to address hot spot problems in the Internet, with a similar intent to carp. The consistent hash corrects the problem caused by the simple hashing algorithm used by carp, so that distributed hashing (DHT) can be really applied in the pe
What is an algorithm:Algorithm (algorithm): A computational process that solves the problemTwo characteristics of recursion:
Call itself
End condition
Recursive example:def func (x):ifx==0: Print ("my little carp.", end="') Else: Print ("hold the", end="') func (x-1) Print ("of Me", end="") func (5)Recursive example one: my little carp" "1 1 2 3 5 8 - + theFibonacci sequence with out
Yesterday afternoon to help carp to a large group purchase site Transfer Database server, this article should have been transferred yesterday after the summary issued, but for some reason did not write in time, now quickly fill up.
First of all, the environment is like this, the old database server MySQL version 5.0 centos system no Web, no FTP, new database server mysql5.1 CentOS nginx.
See this environment first idea is through phpMyAdmin import exp
Reprint please indicate the source: http://blog.csdn.net/cywosp/article/details/23397179 consistent hashing algorithm a distributed hash (DHT) implementation algorithm proposed by MIT in 1997, The design goal is to solve the hot spot problem in the Internet, the original intention and carp very similar. Consistent hashing fixes the problem with the simple hashing algorithm used by Carp, which allows distr
-win; Design patterns make code production truly engineering ; Design patterns are the cornerstone of software engineering, like the structure of a building. Design principle Editor Why should we advocate "Design pattern?" The root cause is for code reuse, which increases maintainability. So how do you implement code reuse? There are several principles of object-oriented: Open Closed PRINCIPLE,OCP, Richter substitution principle (Liskov Substitution principle,lsp), dependency reversal principle
Reprint please indicate source: http://blog.csdn.net/cywosp/article/details/23397179A distributed hash (DHT) implementation algorithm, proposed by MIT in 1997, was designed to address hot spot problems in the Internet, with a similar intent to carp. The consistent hash corrects the problem caused by the simple hashing algorithm used by carp, so that distributed hashing (DHT) can be really applied in the pee
This article goes from: http://blog.csdn.net/cywosp/article/details/23397179 consistent hashing algorithm, a distributed hash (DHT) implementation algorithm, proposed by MIT in 1997, Designed to address hot spot problems in the Internet, the original intention and carp are very similar. The consistent hash corrects the problem caused by the simple hashing algorithm used by carp, so that distributed hashing
Reprint please indicate the source: http://blog.csdn.net/cywosp/article/details/23397179 a distributed hash (DHT) implementation algorithm, proposed by MIT in 1997, Designed to address hot spot problems in the Internet, the original intention and carp are very similar. The consistent hash corrects the problem caused by the simple hashing algorithm used by carp, so that distributed hashing (DHT) can be real
snail bait: but the younger brother has no bones to climb fast, and it will not become a butterfly. What should he do without carrying this hard and heavy shell?Mom: Because will drill Earth and the earth will protect him.Little snail bait cried: We are so poor, the sky is not protected, and the Earth is not protected.Snail mother comforted him: "That's why we have shells !」 We do not * Days, nor * places, we * ourselves.
3. Sharks and fish
Someone once tried to put the most ferocious shark and
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.