Skip list Definition Searching in a dictionary of n number pairs described by an ordered linked list requires at most n key comparisons. If a pointer is added to the middle node of the linked list, the number of comparisons can be reduced to n/2 + 1. At this time, in order to find a […]
Tag: ord
Build a website using wordpress based on IIS under Windows Server
Article directory Preface 1. Components required to build a website in WordPress 2. Component installation and configuration 1. Enable IIS 2. Install and configure php 3. Install and configure MySQL 4. Install and configure wordpress 3. Analysis of error prompts and causes encountered Foreword When I was learning wordpress before, because I was not familiar […]
Parse html to generate Word document
Content: Read the text content in the html file, and then generate a Word document for export. Case scenario: After the requirement development is completed, a document (code modification list) needs to be written. The content of the document is all the codes modified/added this time. The modified file paths and code snippets need to […]
Pre-middle and post-order traversal (recursive and non-recursive) and level-order traversal of binary trees
Pre-middle and post-order traversal (recursive and non-recursive) and level-order traversal of binary trees Article directory Pre-middle and post-order traversal (recursive and non-recursive) and level-order traversal of binary trees Preface 1. Recursive implementation 1. Preorder traversal 2. In-order traversal 3. Post-order traversal 2. Non-recursive implementation 1. Preorder traversal 2. In-order traversal 3. Postorder traversal 3. Layer […]
Word2Vec word vector analysis (word similarity) based on the character story of Genshin Impact character Keqing
First get the character text of Keqing: raw_texts = [ “Emperor Yanwang brought prosperity to Liyue Port, and his reputation for governing the world was turned into novels and biographies that people talked about. However, as one of the people closest to God, Keqing seems to be the one who lacks the least awe. \ […]
Nanny-level explanation of static keyword
What is the static keyword? In Java, a static keyword is defined, which is used to modify members of a class, such as member variables, member methods, and code blocks. When a member is declared static, it is called a class member (or class attribute), not an instance member. There is only one copy of […]
jsp+servlet online ordering system (front desk, backend) based on javaweb+mysql (java+jsp+servlet+mysql+dbutil+tomcat)
jsp + servlet online ordering system (front desk, backend) based on javaweb + mysql (java + jsp + servlet + mysql + dbutil + tomcat) Private message Source code acquisition and debugging communication Operating environment Java≥8, MySQL≥5.7, Tomcat≥8 development tools eclipse/idea/myeclipse/sts, etc. can be configured to run Be applicable Course design, major assignments, graduation projects, […]
VUE3+javaCV realizes long-term video recording
Table of Contents need accomplish The front-end plays the picture of Hikvision camera Record video Method 1: HTMLVideoElement (obsolete) Method 2: HTMLCanvasElement (obsolete) Method three: javaCV code question Requirement The front end receives the hls stream converted from rtsp by webrtc-streamer Click the start button to start recording for a while Click the Stop button […]
2-5 (outside the article) word vector Word2Vec code practical article
Table of Contents 1 Statement: 2 Code link: 3 Reference links: 4 practical steps: 4.1 Data selection: 4.2 Data preprocessing and word segmentation: 4.2.1 Data preprocessing: 4.2.2 Why word segmentation? 4.2.3 Participles: 4.3 Model training: 4.4 Visualization: 4.4.1 PCA dimensionality reduction: 4.4.2 Draw a starry sky map: 4.5 Analogical relationship experiment: 1 claim: This course […]
[West Lake Sword Theory 2022]real_ez_node
Article directory prerequisite knowledge EJS template injection (CVE-2022-29078) Prototype chain contamination vulnerability (CVE-2021-25928) HTTP response splitting attack (CRLF) Problem solving process Code audit Construct payload Prerequisite knowledge EJS template injection (CVE-2022-29078) There is a rendering function in the EJS library that is very special Data and options are merged together via the function utils.shallowCopyFromList, so […]