The 8th web front-end training notes (HTML)

1, Get form             1. Document getelementbyid ("ID attribute value"); Get the form object through the id attribute value of the from tag             2. document. name attribute value of the form; Get the form object through ...

Added by markvaughn2006 on Sat, 12 Feb 2022 16:39:15 +0200

To make "IPC" calls with JS more gracefully, I wrote the event invoke library

backgroundThe team has a node recently JS new module needs to be developed, involving the management and communication of multiple processes. The simplified model can be understood as some methods that need to frequently call the worker process from the master process. A simple design and implementation is implemented event-invoke The library c ...

Added by twm on Sat, 12 Feb 2022 16:28:03 +0200

[shell series] necessary tools for environmental management

‍ catalogue 1, What is a shell 2, Application scenario of shell script 3, Common shell scripts 4, Summary 1, What is a shell Shell is an application program, which connects users and Linux kernel, so that users can use Linux kernel more efficiently, safely and at low cost. This is the essence of shell. In short, we operate Linux through ...

Added by shams on Sat, 12 Feb 2022 15:59:38 +0200

Complexity [data structure and algorithm]

What is a data structure Data structure is the way that computers store and organize data, and there are one or more specific relationships between them What is an algorithm Algorithm: a well-defined calculation process that takes an input and produces an output The algorithm is a series of calculation steps to convert the input ...

Added by Crow on Sat, 12 Feb 2022 15:59:37 +0200

Unit 2 learn the second basic theorem of calculus with python

The content of this article comes from learning MIT open course: univariate calculus - the second basic theorem of calculus - Netease open course 1, In reverse, FTC1 FTC1: if F'(x) = f(x), On the contrary: Use f to understand F and f ' The information of F 'can be derived from the information of F 1. Compare FTC1 and mean value theorem ...

Added by anthonyfellows on Sat, 12 Feb 2022 15:52:27 +0200

Rust short notes: solutions to 4 different quoted variables

Rust defines reference variables in four ways: 1. a: &T 2. a:&mut T 3. mut a:&T 4. mut a:&mut T The following describes these four writing methods respectively 1,a: &T This kind of reference variable means that the reference is immutable and the content pointed to by the reference cannot be modified. for instance: # ...

Added by whare on Sat, 12 Feb 2022 15:51:56 +0200

Solution of adding explicit watermark to web pages at the front end

Solution of adding explicit watermark to web pages at the front endIn order to prevent information leakage and protect copyright, we often use watermark in the front end.Of course, watermark can also be divided into bright watermark and dark watermark. Today, we will realize the bright watermark and full screen coverage at the front end.To crea ...

Added by Senate on Sat, 12 Feb 2022 15:46:51 +0200

MongoDB 4.X CRUD basic operating instructions

Introduction: This article summarizes mongodb 4 Some basic addition, deletion, modification and query operations of documents involved in X in mongo shell client, namely CRUD operation. For image download, domain name resolution and time synchronization, please click Alibaba open source mirror station 1, Create operations Create operation ...

Added by JStefan on Sat, 12 Feb 2022 15:41:06 +0200

[machine learning] WGAN theory and code analysis based on pytoch

catalogue 1. There is a problem with the original GAN 2 WGAN principle 3 code understanding GitHub source code Reference article: Amazing Wasserstein GAN - Zhihu (zhihu.com) 1. There is a problem with the original GAN In practical training, GAN has some problems, such as difficult training, the loss of generator and discriminator can no ...

Added by kristo5747 on Sat, 12 Feb 2022 15:40:29 +0200

String expression evaluation

It can carry out addition, subtraction, multiplication and division, exponential operation, power operation, factorial operation, trigonometric function operation and logarithmic function operation. Because the previous ones are easy to handle, here I mainly explain that the operation of trigonometric function and logarithmic function can adop ...

Added by tdnxxx444 on Sat, 12 Feb 2022 15:11:26 +0200