Five cases of data analysis: handle data processing (basic, detailed)

Article catalog Data analysis with python (Second Edition) Example 1. Data analysis of time zone 1.1 pure python time zone count 1.2 time zone counting with pandas Example 2. Analysis of film rating data 2.1 difference of measurement and evaluation Example 3. Data analysis of infant names in the Un ...

Posted by revraz on Mon, 15 Jun 2020 01:30:32 -0700

Detailed explanation of builder's design mode

1, Definition GOF definition: separate the construction of a complex object from its representation, so that the same construction process can create different representations. Such a design pattern is called builder pattern. Builder pattern, also called builder pattern or generator pattern, is one of ...

Posted by H4mm3r3r on Fri, 12 Jun 2020 23:59:53 -0700

Python crawler tutorial: detailed explanation of crawling and recognition of verification code

Today I want to introduce to you the crawling and identification of verification code, but only involves the simplest graphic verification code, which is also a common type now. Many people study python and don't know where to start.Many people learn python, master the basic syntax, do not know where to find cases to start.Many people who have ...

Posted by grungefreak on Tue, 09 Jun 2020 01:38:20 -0700

One way master-slave synchronous configuration of mysql under windows

View mysql profile address mysql --help|grep 'my.cnf' ps aux|grep mysql|grep 'my.cnf' The configuration is divided into two parts, the master server part and the slave server part In this test, the master and slave of the two machines are synchronized, and the environment is windows (the same as Linux) Main server ip:192.168.1.199 Slave serve ...

Posted by busnut on Sun, 07 Jun 2020 19:52:27 -0700

iOS Animation-Panorama

This is the second in a series. Students who have read the previous article already know that the title "scene" refers to view and "window" refers to view.View.maskThe panorama combs masks and mask animations.If you're not familiar with iOS masks, it's a good idea to look at them first First. Windows change more than scenes ...

Posted by Petrushka on Sun, 07 Jun 2020 18:45:30 -0700

Learn the last project of Python: Airplane war games (pure code)

Learn the last project of Python: Airplane war games (pure code) In ancient times, those who made great achievements must not only have extraordinary talents, but also perseverance. ——Su Shi Sweet first This time, pygame module in Python is used to complete a small game of aircraft wa ...

Posted by liamthebof on Fri, 05 Jun 2020 19:36:14 -0700

Teach you to use Python: batch download downhill to tiktok video watermark ~

Tiktok: This article introduces how to use Python crawler to pick up all the videos of your favorite patten (including two kinds of watermark and no watermark). Love is the best way to get your favorite video. Tiktok has been uploaded to the official account. Reply: you can get it by shaking. 1, G ...

Posted by Inkyskin on Thu, 04 Jun 2020 20:56:40 -0700

DVWA command injection

Command injection is to destroy the command statement structure by submitting maliciously constructed parameters, so as to achieve the purpose of executing maliciously constructed commands. PHP command injection attack vulnerability is one of the common script vulnerabilities in PHP applications. The fa ...

Posted by coverman on Thu, 04 Jun 2020 06:13:05 -0700

Java implementation converts txt file to xls file

Recently, the project uses the conversion of txt file and xls file. Here are the specific ideas. Next, use java code to convert txt to xls. Here, use the jxl.jar Package, which is a tool class library for operating Excel tables through Java. The jar package supports font, number and date operations, can modify cell at ...

Posted by Harbinger on Wed, 03 Jun 2020 09:31:15 -0700

2019-2020-2 network countermeasure technology 20174326 principle and practice of EXP3 in Danzeng liecuo

2019-2020-2 network countermeasure technology 20174326 principle and practice of EXP3 in Danzeng liecuo 1. Experimental environment One PC, installed with win10 system, as the target machine for actual measurement kali virtual machine installed as attack machine The kali virtual machine is installed with the vector evaluation ...

Posted by stokie-rich on Mon, 01 Jun 2020 05:04:07 -0700