catalogue
1, WIFI module (ESP-01S)
1. Basic information about the module
2. AT instruction
1) Understanding concepts
2) Common AT commands of ESP-01S
3. Programming
1) Configure ESP-01S as Client
📓 How to debug the program? - White box test
2) Configure ESP-01S as Server
2, 4G wireless communication module (EC03-DNC)
1. Basic informa ...
Posted by kml2katz on Tue, 24 May 2022 12:23:44 +0300
1, Topic analysis
(1) The problem can be abstracted as detecting whether a directed graph has a ring. If yes, return False; If not, return True.
(2) For a directed graph, we can delete nodes with zero penetration one by one. For each deleted node, the connected directed line segment will also be deleted (i.e. the penetration of this point as ...
Posted by judgy on Tue, 24 May 2022 11:48:30 +0300
Â
docker: commit and dockerfile
1. Use commit to build an image:
commit is an image built on the basis of the original image. The purpose of using this method to build an image is to save some configuration information and modified information in the image. Equivalent to a mirrored snapshot.
2. Use dockerfile to build an image:
dockerfile is th ...
Posted by slionheart on Tue, 24 May 2022 11:05:43 +0300
130. Surrounding areas
Title Source: LeetCode https://leetcode-cn.com/problems/surrounded-regions
subject
Given a two-dimensional matrix containing 'X' and 'o' (letter O).
Find all areas surrounded by 'X' and fill all 'O' in these areas with 'X'.
Example:
X X X X
X O O X
X X O X
X O X X
After running your function, the matrix becomes:
X X X X
X ...
Based on go micro version 2.9.1,
Example code: example/greeter, git commit:3b3de68cded8879ca3dde5d81192f2881619aabd
The core of a microservice server has only three steps
service := micro.NewService()
service.Init()
service.Run()
First look at micro NewService()
service := micro.NewService(
micro.Name("greeter"),
micro.Version("latest") ...
Posted by akimm on Tue, 24 May 2022 10:36:22 +0300
Almost every Java application makes and processes collections.
Although collections are indispensable to almost any Java application, collection operations are far from perfect.
Many business logic involve operations similar to database, such as grouping several dishes according to categories (such as all vegetarian dishes), or finding the mo ...
Posted by danieloberg on Tue, 24 May 2022 10:17:38 +0300
1. Introduction
You can use the Enterprise CA certificate to complete this step, but generally, we can generate the certificate through the elasticsearch certutil command provided by elasticsearch. Then each node can communicate securely through the certificate.
Create certificate for node
TLS: TLS protocol requires X.509 certificate issued by ...
Posted by dad00 on Tue, 24 May 2022 10:03:13 +0300
1. Introduction
The first thing to realize is real-time popular commodity statistics. We will analyze it based on UserBehavior data set.
The main body of the project is written in Scala, using IDEA as the development environment for project writing, and maven as the project construction and management tool. First, we need to build the project f ...
Posted by The Chancer on Tue, 24 May 2022 09:56:15 +0300
Task description
The robot needs to take pictures and obtain detection results during operation. The computer processing on the robot is too slow, so it wants to put the image processing program on the server. When the robot needs detection, it sends the captured images and processing requirements to the server. After processing, the server sen ...
Posted by ChrisF79 on Tue, 24 May 2022 09:32:26 +0300
1, Common problems and Solutions
1. How to convert an ordinary project into a maven project in idea?
Right click add as maven project in idea to change a normal project into a maven project.
2. The maven dependency in idea is still displayed after being deleted. May it be due to cache problems?
ide>file>invalidate caches
3. How to avoid d ...
Posted by mbhcool on Tue, 24 May 2022 09:13:01 +0300