[Leetcode notes] monotonous stack

I have encountered a lot of monotonous stack problems when I brush questions recently. I hereby record it. I forget it all in the future. The monotone stack problem has a feature that most of the stack does not store elements directly, but subscripts, which are used to judge. Monotone stack, as the name suggests, means that the elements stored ...

Added by FijiSmithy on Sun, 20 Feb 2022 20:48:22 +0200

Application of multithreading in iOS development

1, Foreword Multithreading schemes that can be used in iOS development include: pthread: a cross platform multithreading solution implemented in pure C language, which is difficult to use. It is not recommended on iOS platform.NSThread: the object-oriented thread object under iOS platform is relatively easy to use, but it needs developers to ...

Added by matthewod on Sun, 20 Feb 2022 20:47:02 +0200

Problems encountered in building Redis clusters from scratch

Install Redis Download package On the official website https://redis.io/download install Download redis-6.2.6 tar. GZ file Use Xshell to transfer files into the virtual machine Using sftp protocol, the host ip is the ip address in ens33 in ifconfig on the command line. For the first time, you need to enter the virtual machine login acc ...

Added by alan543 on Sun, 20 Feb 2022 20:35:15 +0200

Java mainstream framework - (14) spring elastic search

1. Introduction to rocketmq 1.1MQ introduction MQ (Message Queue) Message Queue is a queue used to save message data Queue: a type of data structure characterized by "first in first out" 1.2 what is a message Service requests between servers Original architecture: In the server A Function needs to be called B , C M ...

Added by musclehead on Sun, 20 Feb 2022 20:29:52 +0200

java introduction notes 8

Keyword learning static keyword In a class, member variables declared with static are static member variables, also known as class variables. Class variables have the same life cycle as classes and are valid throughout the execution of the application. It has the following characteristics: It is a public variable of this class and be ...

Added by Xorandnotor on Sun, 20 Feb 2022 20:26:00 +0200

OpenLayers - layer Perspective

brief introduction This article mainly explains how to realize the layer perspective function by controlling the layer, level and size. It mainly uses the layer monitoring event prerender to monitor the layer before rendering and postrender to monitor the layer after rendering. Implement DEMO Initialize map <!DOCTYPE html> <html la ...

Added by ankrah on Sun, 20 Feb 2022 20:24:18 +0200

Manufacture of Bluetooth remote control car based on STM32f103C8T6

Chapter 0: PrefaceThe smart car design starts from 0 and involves multiple modulesThis article includes not only the production process, but also some problems and solutions encountered in the production process.If the clock is not set, the system default clock is 72MHz, which is in the system_stm32f10x.c file (#define SYSCLK_FREQ_72MHz 7200000 ...

Added by plehmurof on Sun, 20 Feb 2022 20:20:07 +0200

Detailed explanation of Linux orphan process and zombie process

1. Foreword When looking at Chapter 8 of advanced programming in unix environment, I mentioned orphan process and zombie process. I have been vague about these two concepts. Today, I was asked what is the orphan process and zombie process, what problems will be brought about and how to solve them. I just stay on the concept without going deep. ...

Added by bond00 on Sun, 20 Feb 2022 20:14:24 +0200

DOM proficient? What is the difference between Node and Elment?

prefaceI believe many of our students often use the concepts of Node and Element. What's the difference between them? I don't know how many people can answer this question?Today, I'm here to try to explain the difference between Node and Element.preparationBefore formally introducing the difference between Node and Element, let's prepare the fo ...

Added by ghurtado on Sun, 20 Feb 2022 20:12:25 +0200

Spring Boot 2.x basic tutorial: sensitive information in encryption configuration

In the previous series of tutorials, we have introduced a lot about the various usages in the Spring Boot configuration file.These configuration related knowledge are provided by Spring Boot natively. The function we will introduce today is not supported by Spring Boot natively, but it is very useful: encryption of configuration content.Why enc ...

Added by pornophobic on Sun, 20 Feb 2022 20:03:55 +0200