hellocharts, Android Chart Library
Links to the original text: https://www.cnblogs.com/huolongluo/p/5988644.html
Thank you guys: https://www.cnblogs.com/huolongluo/p/5988644.html
Because the project needs to make a broken line map, according to the date to show the cor ...
Added by TonyB on Wed, 18 Sep 2019 15:43:08 +0300
Compiling C++ code from the command line
Links to the original text: https://my.oschina.net/u/160145/blog/264399
Some people haven't written HelloWorld for three months; some people don't know what the compiler is; some peopl ...
Added by tibberous on Wed, 18 Sep 2019 08:42:45 +0300
How do I optimize my APP from 400 k to 2B?
Preface
This article focuses on the size optimization of Android APK in Android performance optimization.
Although the network speed is very fast and the user traffic is very large now, it is necessary to optimize our Android apk file. The user experience is still very bad even though the size of tens or hundreds of megabytes is fixed. Let's ...
Added by gunslinger008 on Tue, 17 Sep 2019 16:15:05 +0300
Ali Architect teaches you how to understand HashMap source code in 10 minutes
Ten minutes to understand the HashMap source code in depth, after reading you can understand? I think it will take one more minute to master it completely! ____________
[Img-C72neM5a-1568723061512] (https://upload-images.jianshu.io/upload_images/168 ...
Added by eashton123 on Tue, 17 Sep 2019 15:32:46 +0300
Log appending process for source analysis RocketMQ DLedger
In the last article we analyzed in detail Leader Selector for Multiple Copies of Source Analysis RocketMQ DLedger This article will analyze the implementation of log replication in detail.
According to raft protocol, when the entire cluster finishes Leader selection, the primary node in the cluster can accept requests from the client, while the ...
Added by fat creative on Tue, 17 Sep 2019 05:35:03 +0300
Problems caused by missing XGBoost values and their depth analysis
Problems caused by missing XGBoost values and their depth analysis
Author: Li Zhaojun, August 15, 2019 Article Links 3,969 words 8 minutes reading
1. Background
The XGBoost model, as a "killer" in machine learning, is widely used in ...
Added by sol01 on Tue, 17 Sep 2019 04:17:15 +0300
Do you know how enumeration works?
1. Origin of Enumeration
Assume a scenario first, and now there is a requirement.You are asked to create an Employee class with an attribute role.The company has three roles: BOSS, MANAGER and WORKER.So how do we define this class? We'll impleme ...
Added by sean.mccoy on Tue, 17 Sep 2019 04:16:41 +0300
Understanding hashmap source code
ThreadLocalMap uses the open address method to solve the conflict problem, and our protagonist HashMap uses the linked list method to deal with the conflict. What is the linked list method?
data structure
In the hash table, each "bucket& ...
Added by chandru_cp on Mon, 16 Sep 2019 16:55:09 +0300
Emotional Analysis and Prediction of Naive Bayes-Douban Top250 Movie Review
Preface
In this paper, naive Bayesian algorithm is used to realize emotional analysis and prediction of Douban Top250 film evaluation.
Recently, the problem of dealing with positive and negative emotions in learning natural language is studied, but ...
Added by david4u on Mon, 16 Sep 2019 12:15:12 +0300
Go Night Reading-IPFS Preview
IPFS itself does not use many new technologies, most of which are existing technologies and ideas, but it cannot be said that there is no innovation, similar to Bitcoin.
dht
Ideas: KadDHT's node addressing and content addressing are isomorphic. On the basis of KAD calculating logical distance based on XOR, the specific physical distance such as ...
Added by phence on Mon, 16 Sep 2019 06:16:49 +0300