Domain Driven Design Tactical Patterns--Domain Events
Use domain events to capture something that happens in the domain.
Domain-driven practitioners find that they can better understand the problem domain by understanding more events that occur in the problem domain. These events are domain events, which are mainly acquired in the process of knowledge extraction with domain experts.
Domain events ...
Posted by irbrian on Thu, 09 May 2019 14:08:38 -0700
Branch and Bound Method for Algorithmic Notes
BFs
In fact, breadth-first search is hierarchical traversal, and the program is implemented by queue.
Algorithmic thought
Beginning with the root, the solution space tree of the problem is often searched by BF or in the way of minimum cost (i.e. maximum benefit) priority. Firstly, the root node is added to the live node table, and then the root ...
Posted by pothole_89 on Thu, 09 May 2019 11:44:40 -0700
MongoDB Update Document
The commands in this article are all real-time under the mongo shell. In real web projects, the corresponding implementations of these commands are encapsulated, so there is no need to be scared.
Put on the official orthodox documents first English document The links below are all from the Chinese community.
There are many ways for ...
Posted by blawson7 on Thu, 09 May 2019 01:27:39 -0700
Eight main uses of killall commands to terminate processes on Linux
Linux's command line provides many commands to kill a process.For example, you can pass a PID to kill a process; the pkill command uses a regular expression as input, so processes matching that pattern are killed.
But there is also a command called killall, which by default matches the parameter name exactly and then kills the matching proce ...
Posted by RamboJustRambo on Tue, 07 May 2019 16:00:39 -0700
Numpy&Pandas
Simply put, Numpy is used for matrix calculation, while Pandas is based on Numpy, which enriches and simplifies Numpy's operation.
Numpy
Basic operation
import numpy as np
array = np.array([[1, 2, 3],
[2, 3, 4]], dtype=np.int) #dtype is the element data type
a = np.zeros((3, 4)) # Zero Matrix of 3 Rows and 4 ...
Posted by woody79 on Tue, 07 May 2019 05:50:40 -0700
es6 grammar commonly used in work
let and const
In JavaScript, we used to use key var to define variables. After ES6, we added two keywords to define variables, let and const.
For variables, variables defined by var in ES5 will be raised to all functions and statements in scope, while variables defined by let in ES6 will not. Variables declared by let will est ...
Posted by onyx on Tue, 07 May 2019 02:05:38 -0700
Pool Area of Netty Memory Pool
Pool Area is a core container in Netty memory pool. Its main function is to manage a series of Pool Chunks and Pool Subpages created, and to delegate the final application action to these two sub-containers according to the different memory size of the application. This paper first introduces the overall structure of PoolArena, then introduces ...
Posted by khujo56 on Mon, 06 May 2019 01:05:38 -0700
Python Crawler Introduction Tutorial 61-100 Write about a crawler that runs into a backcrawl and destroys it!
The python3 crawler encountered a backcrawl
When you excitedly open a web page and find that the resources inside are great, you can download them in batches. Then thank you for writing a crawler download. As a result, after an operation, you find that the website has anti-crawling measures, which is embarrassing.
In the next few articles, we w ...
Posted by Spiz on Sun, 05 May 2019 20:55:37 -0700
Graph Theory Summary - Topological Sorting and Shortest Path Problems (Weightless Shortest Path, Dijkstra Algorithm, Graph with Negative Edge Values)
Definition of graph
A graph G = (V,E) consists of a vertex set V and an edge set E.
Each edge is a pair of points (v,w), where v,w < V, sometimes referred to as an arc.
If the pairs of points are ordered, the graph is called directed, and the directed graph is sometimes called digraph.
Vertices V and W adjacent if and only ...
Posted by drepster on Sun, 28 Apr 2019 18:20:36 -0700
Introduction to the Lazy Man about PHP Encryption and Decryption (API Security Enhancement Part 1)
Slacker
Introduction
These two points are enough to show that this article does not want to have any high-end atmospheric technology content, I tell you, it's all water. There can't be any prime number, elliptic curve cryptography, Diffy-Herman or anything, there can't be.
First of all, I don't understand it. Second, you don't understand it a ...
Posted by justbane on Sat, 27 Apr 2019 17:00:36 -0700