The growth path of Architects - Design Patterns - 07 Prototype mode, clone mode, java attribute replication

Prototype mode Prototype pattern solves the problem of copying a large number of attributes. This paper will introduce several depth attribute replication methods and several shallow attribute replication methods. The source code address of this paper will be given at the end of the text. Code before prototype pattern is not used public stat ...

Added by dragin33 on Sat, 19 Feb 2022 13:15:26 +0200

laf.js - open source cloud development framework (README.md)

laf.js cloud development frameworkOnline documentation: https://docs.lafyun.com/Online experience: https://www.lafyun.com/introducelaf.js is a set of out of the box, complete, open source, cloud development framework based on serverless mode and js programming.With the familiar js, you can easily handle the overall business of the front and bac ...

Added by mbdonner on Sat, 19 Feb 2022 13:12:52 +0200

Fundamentals of software testing

Fundamentals of software testing Software Foundation 1: Definition of software Software testing (English): Software Testing), Describes a process used to promote the verification of software correctness, integrity, safety and quality. In other words, software testing is a review or comparison process between actual output and ex ...

Added by thimble on Sat, 19 Feb 2022 13:11:21 +0200

Java basic programming job 2

1 - simple encryption system based on ASCII code [problem description] implement a simple encryption system based on ASCII code. The encryption rules are as follows: if (OriginalChar + Key > 126) then EncryptedChar = ((OriginalChar + Key)-127) + 32 else EncryptedChar = (OriginalChar + Key) The qualified key is a number ...

Added by The Wise One on Sat, 19 Feb 2022 13:05:32 +0200

Service flow limitation of springboot

Current limiting of Springboot Basic algorithm of current limiting Token bucket and leaky bucket The implementation of leaky bucket algorithm often depends on the queue. If the queue is not full, it will be directly put into the queue, and then a processor will take out the request from the queue head according to a fixed frequency for proc ...

Added by daedalus__ on Sat, 19 Feb 2022 13:03:12 +0200

Simple interface implementation

Simple interface implementation Basic knowledge understanding package In the previous study, we simply mastered the function relationship between classes and objects, and between classes. For the sorting of different code files, we put forward the concept of package, which can be understood as a folder to classify code files and facilitate fu ...

Added by landavia on Sat, 19 Feb 2022 12:57:26 +0200

Redis replication (Master/Slave)

What is it? It is the Master / Slave mechanism that we often call Master-Slave replication. After the host data is updated, it is automatically synchronized to the standby machine according to the configuration and policy. The Master is mainly written and the Slave is mainly read What can I do? Read write separation Disaster recovery Ho ...

Added by Deviants on Sat, 19 Feb 2022 12:57:41 +0200

Summary of methods for deleting outliers

Premise: import pandas as pd import numpy as np import os import seaborn as sns from pyod.models.mad import MAD from pyod.models.knn import KNN from pyod.models.lof import LOF import matplotlib.pyplot as plt from sklearn.ensemble import IsolationForest 1.IQR python deletes outliers based on IQR: df = pd.read_excel('./7.xlsx') def fit_mod ...

Added by AndyB on Sat, 19 Feb 2022 12:54:19 +0200

Week 5 of 2005 -- program design and algorithm test

28: the number of the same number as the specified number Total time limit: 1000ms memory limit: 65536kB describe Outputs the number of the same number as the specified number in an integer sequence. input The input contains three lines: The first line N represents the length of the integer sequence (N < = 100); The second line is N integ ...

Added by kjelle392 on Sat, 19 Feb 2022 12:52:39 +0200

The art of java Concurrent Programming -- Analysis of ReentrantLock's fair lock principle

lock method analysis final void lock() { acquire(1); } The lock method calls the acquire method of AbstractQueuedSynchronizer /** * Acquires in exclusive mode, ignoring interrupts. Implemented * by invoking at least once {@link #tryAcquire}, * returning on success. Otherwise the thread is queued, possibly ...

Added by nelsok on Sat, 19 Feb 2022 12:47:28 +0200