Data Cleaning Chapter VII Operational Topics
Preface
Data loading mechanism is similar to data extraction mechanism, which can be divided into full load and incremental load. Full load refers to the operation of loading data after deleting all the data in the target data table. Incremental loading, on the other hand, means that the target table only loads data that changes in the s ...
Posted by logging on Sat, 30 Oct 2021 13:19:41 -0700
Kubedm deployment K8S
kubeadm is a tool launched by the official community for rapid deployment of kubernetes clusters. This tool can complete the deployment of a kubernetes cluster through two instructions:
Create a Master node kubedm initJoin the Node to the current cluster $kubedm join < IP and port of the master Node >
Installation requirements
Before y ...
Posted by avario on Sat, 30 Oct 2021 13:06:42 -0700
Classic interview questions of binary tree (you deserve it)
Classic interview questions of binary tree
Before that, I have published the basic knowledge of binary tree:
Detailed explanation of binary tree Next, I will tell you some classic and common binary tree interview questions
Preliminary interview questions
Maximum depth of binary tree
Question: Maximum depth of binary tree Solution idea: ...
Posted by gacon on Sat, 30 Oct 2021 12:46:33 -0700
20191302 Chapter IV study notes
Concurrent programming
abstract
This chapter discusses concurrent programming, introduces the concept of parallel computing, and points out the importance of parallel computing;
The sequential algorithm and parallel algorithm, parallelism and concurrency are compared;
The principle of thread and its advantages over process are explained;
This ...
Posted by zalath on Sat, 30 Oct 2021 12:29:07 -0700
Network loading framework OkHttp
1. What is OkHttp
github address: https://square.github.io/okhttp/
An open source project for processing network requests contributed by Square is the most widely used network framework for Android. Starting with Android 4.4 The underlying implementation of HttpURLConnection adopts OkHttp.
1. Support HTTP/2 and allow all requests to the ...
Posted by dprichard on Sat, 30 Oct 2021 12:08:34 -0700
Introduction to C language basic data types
The above picture lists the keywords that define data types, and indicates the occupation and value range of different types in 32-bit machines. Next, let's briefly introduce these three data types.
1. Integer: there are two types of integers: signed and unsigned. Signed integers can be regarded as compatible with negative integers, w ...
Posted by daedlus on Sat, 30 Oct 2021 11:57:17 -0700
Codeforces Round #752 (Div. 2) A B C D
Codeforces Round #752 (Div. 2)
Record high!!
A. Era
Idea: at first, I thought it was to find a maximum subscript, and then output the maximum minus the maximum subscript. Later, I dropped this idea with the data 1 1 5 1 6 hack, and it was obvious that as long as I enumerated it, I saved the largest memory
...
Posted by jaybeeb on Sat, 30 Oct 2021 11:24:42 -0700
Linear regression with one variable
2.1 linear regression algorithm model representation
Let's start with an example: this example is to predict housing prices. We want to use a data set containing housing prices in Portland, Oregon. Here, I want to draw my data set according to the selling prices of different house sizes. For example, if your friend's house is 1250 square feet ...
Posted by SyncViews on Sat, 30 Oct 2021 11:15:12 -0700
[basis of artificial intelligence] realizing fuzzy reasoning system of washing machine in python
Operating environment
Pycharm + Anaconda3
A set of fuzzy sets of sludge and oil parameters and the corresponding washing time reasoning results are known.
Now a group of fuzzy sets of sludge and grease are given, fuzzy reasoning is carried out, and the fuzzy set of washing time is deduced.
Finally, the fuzzy decision is made to select the ...
Posted by seidel on Sat, 30 Oct 2021 11:13:23 -0700
Why does Ali have to ask Redis for an interview? Alibaba architect's Redis distributed lock actual combat sharing
1, What is a distributed lock?
We all know the concept of lock when learning Java, such as synchronized lock based on JVM implementation and a set of code level locking mechanism lock provided by jdk. We often use these two locks in concurrent programming to ensure the correctness of code running in multi-threaded environment. However, these l ...
Posted by DJ Judas on Sat, 30 Oct 2021 11:10:29 -0700