[leetcode algorithm search insertion location]

1, Title Requirements Given a sort array and a target value, find the target value in the array and return its index. If the target value does not exist in the array, returns where it will be inserted sequentially. You can assume that there are no duplicate elements in the array. Example 1: Input: [1,3,5,6], 5 Output: 2 Example 2: Input: [ ...

Posted by jeny on Wed, 19 Feb 2020 10:31:42 -0800

stm32cubeMX learning 18. SD card virtual U disk experiment

This program is based on the operation environment of STM32F103ZET6. I had some losses before running this experiment. Let me come together! 1. After the software was written, it was found that there was no enumeration of USB after the USB cable was inserted and connected to the computer resolvent: ...

Posted by kokomo310 on Tue, 18 Feb 2020 05:20:57 -0800

Access control of critical area of rt'thread

I. WHY What is critical area and why do we need access control of critical area? First, let's look at wiki's definition of critical area: Synchronizing Program design Critical section refers to a program segment that accesses shared resources (such as shared devices or shared memory), which cannot ...

Posted by steve490 on Tue, 18 Feb 2020 00:36:47 -0800

EXCEL password clearing (password protection and cracking) - clever use of macro code

All of you have experienced the password setting in excel. After a long time, I thought I would never forget the password in my life. I really forgot it. The only thing we can do is crack, but all kinds of crack tools on the Internet are not reliable, all kinds of worries, we finally got up the cour ...

Posted by trent2800 on Tue, 18 Feb 2020 00:31:42 -0800

The implementation of kubernetes resource extension mechanism

Yesterday, we introduced the key components of resource plug-in mechanism in k8s. Today, we will continue to see how each component communicates and the key design behind event handling in k8s 1.PluginManager PluginManager is a top-level component, which contains the key components in the previous article, coordinates its internal data flow, an ...

Posted by Sillysoft on Mon, 17 Feb 2020 20:20:07 -0800

2. Monitor mode

When you click Download Sources in the IDEA, you will get an error and cannot download sources. To solve this problem, enter in Terminal mvn dependency:resolve -Dclassifier=sources Reference: https://www.cnblogs.com/wwjj4811/p/10364580.html When the system runs to some key nodes, it will broadcast some events, and there are some listeners in ...

Posted by Develop_Sake on Sun, 16 Feb 2020 22:43:36 -0800

The best location of book information table based on chain storage structure

The best location of book information table based on chain storage structure describe   Define a linked list containing book information (book number, book name, price), read in the corresponding book data to complete the creation of the book information table, and then search for the books in the ...

Posted by aquayle on Sun, 16 Feb 2020 04:07:07 -0800

Python data structure -- stack

What is a stack? Stack is a first in, first out memory, which can only access data items through one entry. A linear table that is restricted to insert and delete operations only at the end of the table. This end is called the top of the stack, and the other end is called the bottom of the stack. Inse ...

Posted by Thora_Fan on Sun, 16 Feb 2020 02:44:34 -0800

BFS search path and record, and binary application (learning notes)

Breadth first search Compared with deep search, wide search is much faster than deep search in a certain situation. For example, to find the shortest path of maze, wide search is better than deep search. This is not a question of whether to use recursion, but how fast it is at the algorithm level. For ...

Posted by jigsawsoul on Sun, 16 Feb 2020 01:30:59 -0800

Data type of redis

Article directory Data type of redis 1: String: 1.1 add a key: 1.2 get the content of a key: 1.3 view the type of a key 1.4 set the automatic key expiration time 1.5 delete a key 1.6 batch setting multiple key s: 1.7 additional data 1.8 numerical increment 1.9 numerical decrement 1.10 return strin ...

Posted by russthebarber on Sat, 15 Feb 2020 22:22:10 -0800