hellocharts, Android Chart Library

Links to the original text: https://www.cnblogs.com/huolongluo/p/5988644.html Thank you guys: https://www.cnblogs.com/huolongluo/p/5988644.html Because the project needs to make a broken line map, according to the date to show the cor ...

Added by TonyB on Wed, 18 Sep 2019 15:43:08 +0300

Compiling C++ code from the command line

Links to the original text: https://my.oschina.net/u/160145/blog/264399 Some people haven't written HelloWorld for three months; some people don't know what the compiler is; some peopl ...

Added by tibberous on Wed, 18 Sep 2019 08:42:45 +0300

How do I optimize my APP from 400 k to 2B?

Preface This article focuses on the size optimization of Android APK in Android performance optimization. Although the network speed is very fast and the user traffic is very large now, it is necessary to optimize our Android apk file. The user experience is still very bad even though the size of tens or hundreds of megabytes is fixed. Let's ...

Added by gunslinger008 on Tue, 17 Sep 2019 16:15:05 +0300

Ali Architect teaches you how to understand HashMap source code in 10 minutes

Ten minutes to understand the HashMap source code in depth, after reading you can understand? I think it will take one more minute to master it completely! ____________ [Img-C72neM5a-1568723061512] (https://upload-images.jianshu.io/upload_images/168 ...

Added by eashton123 on Tue, 17 Sep 2019 15:32:46 +0300

Log appending process for source analysis RocketMQ DLedger

In the last article we analyzed in detail Leader Selector for Multiple Copies of Source Analysis RocketMQ DLedger This article will analyze the implementation of log replication in detail. According to raft protocol, when the entire cluster finishes Leader selection, the primary node in the cluster can accept requests from the client, while the ...

Added by fat creative on Tue, 17 Sep 2019 05:35:03 +0300

Problems caused by missing XGBoost values and their depth analysis

Problems caused by missing XGBoost values and their depth analysis Author: Li Zhaojun, August 15, 2019 Article Links 3,969 words 8 minutes reading 1. Background The XGBoost model, as a "killer" in machine learning, is widely used in ...

Added by sol01 on Tue, 17 Sep 2019 04:17:15 +0300

Do you know how enumeration works?

1. Origin of Enumeration Assume a scenario first, and now there is a requirement.You are asked to create an Employee class with an attribute role.The company has three roles: BOSS, MANAGER and WORKER.So how do we define this class? We'll impleme ...

Added by sean.mccoy on Tue, 17 Sep 2019 04:16:41 +0300

Understanding hashmap source code

ThreadLocalMap uses the open address method to solve the conflict problem, and our protagonist HashMap uses the linked list method to deal with the conflict. What is the linked list method? data structure In the hash table, each "bucket& ...

Added by chandru_cp on Mon, 16 Sep 2019 16:55:09 +0300

Emotional Analysis and Prediction of Naive Bayes-Douban Top250 Movie Review

Preface In this paper, naive Bayesian algorithm is used to realize emotional analysis and prediction of Douban Top250 film evaluation. Recently, the problem of dealing with positive and negative emotions in learning natural language is studied, but ...

Added by david4u on Mon, 16 Sep 2019 12:15:12 +0300

Go Night Reading-IPFS Preview

IPFS itself does not use many new technologies, most of which are existing technologies and ideas, but it cannot be said that there is no innovation, similar to Bitcoin. dht Ideas: KadDHT's node addressing and content addressing are isomorphic. On the basis of KAD calculating logical distance based on XOR, the specific physical distance such as ...

Added by phence on Mon, 16 Sep 2019 06:16:49 +0300