The growth path of Architects - Design Patterns - 07 Prototype mode, clone mode, java attribute replication
Prototype mode
Prototype pattern solves the problem of copying a large number of attributes. This paper will introduce several depth attribute replication methods and several shallow attribute replication methods. The source code address of this paper will be given at the end of the text.
Code before prototype pattern is not used
public stat ...
Added by dragin33 on Sat, 19 Feb 2022 13:15:26 +0200
laf.js - open source cloud development framework (README.md)
laf.js cloud development frameworkOnline documentation: https://docs.lafyun.com/Online experience: https://www.lafyun.com/introducelaf.js is a set of out of the box, complete, open source, cloud development framework based on serverless mode and js programming.With the familiar js, you can easily handle the overall business of the front and bac ...
Added by mbdonner on Sat, 19 Feb 2022 13:12:52 +0200
Fundamentals of software testing
Fundamentals of software testing
Software Foundation
1: Definition of software
Software testing (English): Software Testing),
Describes a process used to promote the verification of software correctness, integrity, safety and quality.
In other words, software testing is a review or comparison process between actual output and ex ...
Added by thimble on Sat, 19 Feb 2022 13:11:21 +0200
Java basic programming job 2
1 - simple encryption system based on ASCII code
[problem description] implement a simple encryption system based on ASCII code.
The encryption rules are as follows:
if (OriginalChar + Key > 126) then
EncryptedChar = ((OriginalChar + Key)-127) + 32
else
EncryptedChar = (OriginalChar + Key)
The qualified key is a number ...
Added by The Wise One on Sat, 19 Feb 2022 13:05:32 +0200
Service flow limitation of springboot
Current limiting of Springboot
Basic algorithm of current limiting
Token bucket and leaky bucket
The implementation of leaky bucket algorithm often depends on the queue. If the queue is not full, it will be directly put into the queue, and then a processor will take out the request from the queue head according to a fixed frequency for proc ...
Added by daedalus__ on Sat, 19 Feb 2022 13:03:12 +0200
Simple interface implementation
Simple interface implementation
Basic knowledge understanding
package In the previous study, we simply mastered the function relationship between classes and objects, and between classes. For the sorting of different code files, we put forward the concept of package, which can be understood as a folder to classify code files and facilitate fu ...
Added by landavia on Sat, 19 Feb 2022 12:57:26 +0200
Redis replication (Master/Slave)
What is it?
It is the Master / Slave mechanism that we often call Master-Slave replication. After the host data is updated, it is automatically synchronized to the standby machine according to the configuration and policy. The Master is mainly written and the Slave is mainly read
What can I do?
Read write separation Disaster recovery
Ho ...
Added by Deviants on Sat, 19 Feb 2022 12:57:41 +0200
Summary of methods for deleting outliers
Premise:
import pandas as pd
import numpy as np
import os
import seaborn as sns
from pyod.models.mad import MAD
from pyod.models.knn import KNN
from pyod.models.lof import LOF
import matplotlib.pyplot as plt
from sklearn.ensemble import IsolationForest
1.IQR python deletes outliers based on IQR:
df = pd.read_excel('./7.xlsx')
def fit_mod ...
Added by AndyB on Sat, 19 Feb 2022 12:54:19 +0200
Week 5 of 2005 -- program design and algorithm test
28: the number of the same number as the specified number
Total time limit: 1000ms memory limit: 65536kB
describe Outputs the number of the same number as the specified number in an integer sequence.
input The input contains three lines: The first line N represents the length of the integer sequence (N < = 100); The second line is N integ ...
Added by kjelle392 on Sat, 19 Feb 2022 12:52:39 +0200
The art of java Concurrent Programming -- Analysis of ReentrantLock's fair lock principle
lock method analysis
final void lock() {
acquire(1);
}
The lock method calls the acquire method of AbstractQueuedSynchronizer
/**
* Acquires in exclusive mode, ignoring interrupts. Implemented
* by invoking at least once {@link #tryAcquire},
* returning on success. Otherwise the thread is queued, possibly
...
Added by nelsok on Sat, 19 Feb 2022 12:47:28 +0200