Android EventBus source code analysis

Preface In the last article, I gave a brief account of the usage of EventBus, and then I went to study the source code of EventBus 3.0. I also referred to some big blogs on the Internet for further understanding. I wrote this article to give myself a good summary and review of EventBus. If there is an ...

Posted by carydean on Mon, 09 Mar 2020 01:59:50 -0700

shell script -- regular expression

Basic regularity ^word ##Search for the beginning of the ^ line in vi/vim starting with word word$ ##Search for the end of the $line in vi/vim that ends in word ^$ ##Blank line . ##Represents and can only represent any one character \ ##For example, \. It only represents ...

Posted by Timewell on Sun, 08 Mar 2020 21:01:00 -0700

Detailed analysis of Lifecycle

Lifecycle source code analysis Catalogue introduction 01. What is the role of lifecycle 02. Simple use of lifecycle 03. Usage scenarios of lifecycle 04. How to realize life cycle awareness 05. How annotation methods are called 06.addObserver call analysis 07. Sort out and summarize the knowledge po ...

Posted by wangsc66 on Sun, 08 Mar 2020 19:37:25 -0700

Build your own intranet penetration

Preface Hello everyone, I am a different technology house. I make a little progress every day and experience a different life. What we bring today is to use frp to build our own intranet penetration, which is convenient for debugging in our daily development. At the same time, frp is open-source and free, only one cloud server is needed to bui ...

Posted by jimdelong on Sun, 08 Mar 2020 04:04:42 -0700

Keras implementation of CNN: handwritten digit recognition accuracy 99.6%

After installing Tensorflow, install keras to use TF as the back-end by default. The code of keras to realize convolution network is very simple, and the callback class in keras provides a method to detect variables in the model training process, which can adjust the learning efficiency and some para ...

Posted by MoFish on Sat, 07 Mar 2020 07:39:20 -0800

JWT generates token with error: secret key byte array cannot be null or empty

Want to get the most complete and detailed information of the whole network: (1022848328)   JWT generates token with error: secret key byte array cannot be null or empty java.lang.IllegalArgumentException: secret key byte array cannot be null or empty. at io.jsonwebtoken.lang.Assert.notEmpty(Asse ...

Posted by seddonym on Sat, 07 Mar 2020 06:09:19 -0800

Beauty of unity online game architecture design (Lesson 11: role synchronization solution)

Lesson 11: role synchronization solutions In the previous chapter, we introduced the deployment of servers. In this chapter, we use deployed servers to synchronize roles. Here we first introduce what is role real-time synchronization. Online game role real-time synchronization has always been a tech ...

Posted by mwilson on Sat, 07 Mar 2020 01:51:22 -0800

NIO - Selector in Java network programming

Preface I have a general understanding of NIO operation and three componentsJava network programming (4) NIO understanding and three components of NIO And learn in detail: Buffer and ChannelJava network programming (5) NIO - Buffer detailsJava network programming (6) NIO - Channel details Next, comple ...

Posted by ulenie on Fri, 06 Mar 2020 22:39:16 -0800

Machine learning note 5-decision tree

I. Preface The previous section describes the principle of machine learning decision tree and how to select the optimal feature as the classification feature. Main contents of this section: Decision tree construction Decision tree visualization (white box model, neural network is black box model) Usi ...

Posted by BillBillJr on Fri, 06 Mar 2020 20:43:46 -0800

Rsyslog return of the king

Rsyslog Everyone in the company is following the trend of learning es's log scheme. I've been struggling from three years ago to now. Filebeat + kafka + logstash+ es, at that time, I also wanted to build another storm. Later, I found that just a little log volume and a hammer kafka were used. Many of the tools that had been used were damaged by ...

Posted by lucie on Thu, 05 Mar 2020 23:02:10 -0800