QA Official

[OpenCV] Common Functions

https://qaofficial.com/post/2019/05/10/71757-opencv-common-functions.html 2019-05-10
1, cvLoadImage: load image file into memory; 2, cvNamedWindow: Create a window on the screen; 3, cvShowImage: displays the image in a created window; 4, cvWaitKey: Pause the program and wait for the user to trigger a key operation; 5, cvReleaseImage: Free the memory allocated by the image file; 6. cvDestroyWindow: Destroy the window displaying the image file; 7, cvCreateFileCapture: determine the AVI file to be read through parameter setting;

how to start the Kaggle competition quickly and violently

https://qaofficial.com/post/2019/05/10/71553-how-to-start-the-kaggle-competition-quickly-and-violently.html 2019-05-10
Recently, more and more people asked me how I can quickly become a data scientist. I can earn more and work less. Headhunters chase job-hopping all day, doubling.My general answer is that there is no such thing as a good thing, but engaging in a Kaggle competition will help you become a data scientist quickly, and then it depends on how much you earn.As to what the Kaggle competition is, please Google yourself for space reasons.

8, Sword Finger offer's Abnormal Step Jump Problem, Topic Analysis and java Implementation Method

https://qaofficial.com/post/2019/05/09/69542-8-sword-finger-offeramp#x27s-abnormal-step-jump-problem-topic-analysis-and-java-implementation-method.html 2019-05-09
topic description A frog can jump up to 1 step or 2 steps at a time ... It can also jump up to N steps.Find out how many jumping methods the frog can use to jump up an n-step. requirements Time Limit: 1 Second Space Limit: 32768K topic analysis The premise is that n steps will have an n-order jump method.The analysis is as follows: f(1) = 1F(2) = f(2-1)+f(2-2) //f(2-2) represents the number of times that the 2nd order jumps the 2nd order at a time.

Ajax POST request

https://qaofficial.com/post/2019/05/09/68533-ajax-post-request.html 2019-05-09
POST requests are mainly used to submit information, and the requested data will be placed in the body of HTTP request package.Therefore, the security of POST request is higher than GET request. The security here means that information is not easy to be intercepted by others. Of course, from another aspect, POST request can modify server resources. If scripts are embedded in the request, there is also a risk that

BN layer

https://qaofficial.com/post/2019/05/09/68621-bn-layer.html 2019-05-09
http://blog.csdn.net/yelena_11/article/details/53924225 layer {bottom: "res2a_branch2b"top: "res2a_branch2b"name: "bn2a_branch2b"type: "BatchNorm"batch_norm_param {use_global_stats: true} } layer {bottom: "res2a_branch2b"top: "res2a_branch2b"name: "scale2a_branch2b"type: "Scale"scale_param {bias_term: true} }

C++tolower function usage summary

https://qaofficial.com/post/2019/05/09/68603-c-tolower-function-usage-summary.html 2019-05-09
c++ has a function tolower.This function is a function that processes strings.Converts uppercase to lowercase. Upcase refers to ABCDEFGHIJKLMNOPQRSTUVMXYZ converted to abcdefghijklmnopqrstuvwxyz.Non-alphabetic characters are not processed.For example, 1, 2, 3!Equal characters are header files that are output in the original characters: in VC6.0, they can be ctype.h or stdlib.hOf course, this function is a bit special in its usage. It deals with characters, not strings.The so-called inability to process strings does not mean that he cannot process strings.

Cat VS Dog (binary match)

https://qaofficial.com/post/2019/05/09/68676-cat-vs-dog-binary-match.html 2019-05-09
The zoo have N cats and M dogs, today there are P children visiting the zoo, each child has a like-animal and a dislike-animal, if the child's like-animal is a cat, then his/hers dislike-animal must be a dog, and vice versa. Now the zoo administrator is removing some animals, if one child's like-animal is not removed and his/hers dislike-animal is removed, he/she will be happy. So the administrator wants to know which animals he should remove to make maximum number of happy children.

JQuery Ajax Post Submitting Solution to Chinese Scrambling Code

https://qaofficial.com/post/2019/05/09/68546-jquery-ajax-post-submitting-solution-to-chinese-scrambling-code.html 2019-05-09
Introduction: In JQuery's Ajax POST request, the request is made, and the Chinese in the request is displayed as garbled code in the background. How should it be solved? problem introduction: var regid = $('#oregion').combobox('getValue'); //var sname = $('#sname').val(); var sname = encodeURI($('#sname').val(),"UTF-8"); if(regid!=""&&regid!='undefined'){ $.ajax({ async: true, type : "POST", dataType : "json", url : "<%=request.getContextPath() %>/secretary/isHasUser.do?regid="+regid+"&sname="+sname, success : function(data) { if(data.mes!=""&&data.mes!=null){ $.messager.alert('Warning',data.mes); return false; } } });

JSP Shows Current System Time in Four Ways

https://qaofficial.com/post/2019/05/09/68804-jsp-shows-current-system-time-in-four-ways.html 2019-05-09
JSP shows the current system time in four ways: The first java built-in time class instantiated object: <%@ page language="java" import="java.util.*" pageEncoding="UTF-8"%> <% String path = request.getContextPath(); String basePath = request.getScheme()+"://"+request.getServerName()+":"+request.getServerPort()+path+"/"; %> <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <head> <base href="<%=basePath%>"> <title>My JSP 'time4.jsp' starting page</title> <meta http-equiv="pragma" content="no-cache"> <meta http-equiv="cache-control" content="no-cache"> <meta http-equiv="expires" content="0"> <meta http-equiv="keywords" content="keyword1,keyword2,keyword3"> <meta http-equiv="description" content="This is my page"> <!-- <link rel="stylesheet" type="text/css"

Spark&amp;#x27;s Action operation

https://qaofficial.com/post/2019/05/09/68770-sparkamp#x27s-action-operation.html 2019-05-09
1.reduce(func): through the function func, the data sets of each partition are gathered first, and then the data between partitions are gathered. func receives two parameters and returns a new value. the new value is then passed to the function func as a parameter until the last element 2.collect (): returns all elements in the data set to the Driver program in the form of data. in order to prevent memory overflow of the Driver program, the size of the returned data set is generally controlled