Custom blog skinVIP only

*Blog header:

The format is PNG and JPG, the width * height is greater than 1920 * 100 pixels, not more than 2MB, the main visual suggestion is placed on the right, please refer to the online blog header

Please upload pictures larger than 1920 * 100 pixels!

Blog basemap:

The picture format is PNG and JPG, no more than 1MB, and can be tiled up, down, left and right to the whole background

Column diagram:

The picture format is PNG and JPG, and the picture width * height is 300 * 38 pixels, no more than 0.5Mb

Main title color:

RGB color, for example: #afaf


RGB color, for example: #afaf

Subtitle color:

RGB color, for example: #afaf

Custom blog skin

  • Blog (150)
  • Collection
  • follow
By last release time
By visits
RSS subscription

original How do I blog as a past person?

Table of contents Chapter 1 current situation Chapter 2 how to choose Chapter 3 how to install Chapter 4 drawing bed configuration Chapter 5 drawing bed docking Chapter 6 writing skills supporting materials, free download link: Spu9a extraction code: l43x after copying this content, open Baidu online disk mobile app, which is more convenient to operate. Chapter 1 current situation pain point 1: when you write an article, it is sometimes difficult to write it once, and publish it everywhere on major online platforms. 2: in the process of editing the article, the introduction of pictures often brings great trouble to the author, And it's inconvenient to carry. Pain point 3: some blog platforms are not supported

2021-02-07 13:41:24 thirteen thousand two hundred and fifty-nine one hundred and sixty-eight

original How did I learn technology as a past person?

Chapter 1 the original intention of writing this article Chapter 2 do I want to go to the training class Chapter 3 how to learn a technology chapter 4 do you want to learn an old technology Chapter 5 why do you have to learn the source code Chapter 1 the original intention of writing this article recently has a private letter from fans who want to ask me how I learn and some problems I encounter in learning. I want to think about it myself, After studying for so many years, I have walked a lot of roads and stepped on many pits. Finally, I have a certain understanding of this industry. I want to help all friends confused in technical learning through this article. The following remarks represent my own position and are for reference only. Chapter 2 do I want to go to the training class? A big question that many people have doubts about is whether I want to go to the training class or not? For this problem, I think it is necessary to

2021-02-07 12:57:29 eight thousand nine hundred and fifty-five one hundred and sixteen

original The growth path of Java engineers

Reading Guide: the main purpose of writing this article is to sort out the knowledge I have learned. The whole learning route is my own learning plan for technology and strive towards the ultimate goal of every programmer! Object: Java beginning / middle / senior programmer start: 2020-07-20 end: endless life, more than learning! Directory [introduction], [basic], [system], [database], [server], [advanced], [front-end], [Engineering], [back-end], [security], [queue], [search], [Payment], [micro service], [depth], [introduction] article title, article address, learning the basics of C is enough. Click the access exercise C programming Click visit

2020-09-26 11:05:42 twenty-one thousand seven hundred and twenty three hundred and forty-six

original Advanced path for Java engineers

Directory knowledge point 01: Nine sorting algorithms knowledge point 02: binary search algorithm knowledge point 03: binary tree traversal knowledge point 04: Spring IOC knowledge point 05: Spring AOP knowledge point 06: TCP three-time handshake knowledge point 07: TCP four-time wave knowledge point 01: Nine sorting algorithms public class sort {public static void main (string [] args) {testtime(); testSort(); } public static void testTime()

2021-08-30 11:10:03 eight hundred and eight eleven

original Learning java 8 is enough

Article contents Chapter 1 basic syntax 1.1, identifier 1.2, keyword and reserved word 1.3, basic data type 1.4, variable and constant 1.5, type conversion 1.6, operator 1.7, input and output 1.8, process control 1.9, array Chapter 2 object-oriented 2.1, class 2.1.1, class definition 2.1.2, class inheritance 2.1.3, static keyword 2.1.4, final keyword 2.1.5 Package keyword 2.1.6, import keyword 2.1.7, permission modifier 2.2, object 2.3, interface 2.4, abstract class 2.5, internal class 2.6, enumeration class 2.7, annotation 2.8, generic 2.9, annotation Chapter 3 basic class 3.1, obj

2021-08-30 11:04:04 one thousand seven hundred and fifty thirty-five

original Learning and using docker

Directory Chapter 1 docker introduction chapter 2 docker architecture Chapter 3 docker installation chapter 4 docker process related commands Chapter 5 docker image related commands Chapter 6 docker container related commands Chapter 7 docker container data volumes Chapter 8 docker common application deployment 8.1, MySQL 8.2, redis8.3, tomcat8.4, nginx8.5, rabbitmq8.6 Deploying fastdfs Chapter 9 dockerfile quick start Chapter 10 docker building its own private server Chapter 1 docker introduction docker is an open source application

2021-08-05 21:58:11 three hundred and twenty-eight nineteen

original Personal blog management system

Project introduction blog is a personal blog management system. It is the final assignment of my classmates and I last semester. It was completed in a hurry, and most functions have been completed. Access address: Main page website foreground classification column search module article details website background classification management article addition article list rotation management blogger information website information technology front-end technology stack: technical name technical version official address react17

2021-07-31 17:09:48 six hundred and eighty-three fifty-nine

original Button level authority management system

Project introduction commonadmin is a button level authority management platform, including the most commonly used system modules in the enterprise background. The code is concise and can be used out of the box. Access address: Main functions login function department management user management role management menu management log management adopts technology front-end technology stack: Technology name adopts version official address vue-element-admin4.4.0 Click to access back-end technology stack: Technology name

2021-07-31 00:59:43 one thousand seven hundred and sixty one hundred and seven

original Template code generator

Project introduction codebuilder can help you quickly generate template files. At present, it supports mysql, Oracle and SQL server databases. You can create your own code templates and add them to the template directory to help you cope with various development scenarios. Access address: Note: this code generator has provided a set of sample code. The name of the database is all lowercase. See the meaning of the name. For multiple words, use "" Separate, for example: store database table names are all lowercase, the name should see the meaning of the name, multiple words, use "" Separated table notes must be written, for example: T

2021-07-21 14:15:18 two hundred and eighteen seventeen

original Sure enough, fresh B2C mall

Project introduction as expected, fresh mall is a B2C e-commerce platform similar to Xiaomi mall, which can be used as a reference for graduation design. Access address: Screenshot of the project: local access to the homepage of the website: Login account: caochenlei login password: 123456 website background local access: Login account: admin login password: 123456 service monitoring local access:

2021-07-21 14:13:54 two hundred and nine fourteen

original WeChat official account development

Chapter 1 environment preparation 1.1, development tools 1.2, creation project 1.3, adding dependencies 1.4, adding templates 1.5, test interface 1.6, intranet penetration 1.7, access Guide Chapter 2 basic support 2.1, obtaining accesstoken token 2.2, obtaining wechat API interface IP address 2.3, obtaining wechat API callback IP address Chapter 3 receiving message 3.1, receiving general message 3.2 Receive event push Chapter 4 QR code 4.1, generate QR code with parameters (temporary) 4.2, generate QR code with parameters (permanent) Chapter 5 menu bar Chapter 6 send message 6.1, send general message 6.2, send template message 6.2.1, set industry 6.2.2 and obtain line

2021-07-03 16:29:00 three hundred and thirty-five

original Network programming learning

Chapter 1 NiO foundation 1.1, environment preparation 1.2, NiO introduction 1.3, three components 1.3.1, channel & buffer 1.3.2, selector 1.4, ByteBuffer 1.4.1, correct use of ByteBuffer 1.4.2, internal structure of ByteBuffer 1.4.3, ByteBuffer debugging tool 1.4.4, common methods of ByteBuffer, ByteBuffer allocation space, writing data to buffer Read data, mark and res from buffer

2021-06-26 17:02:31 four hundred and two five

original Concurrent programming learning

Chapter 1 thread 1.1, process and thread 1.2, parallelism and concurrency 1.3, synchronization and asynchrony 1.4, thread creation mode 1.5, basic thread method 1.6, thread safety problem 1.7, thread eight lock problem Chapter 2 shared model management 2.1, monitor principle 2.2, synchronized principle 2.2.1, lightweight lock 2.2.2, lock inflation 2.2.3, spin optimization 2.2.4, biased lock 2.2.5 Lock elimination 2.3, wait & notify principle 2.3.1, protective pause in synchronous mode 2.3.2, producer / consumer in asynchronous mode 2.3.3, fixed sequence in synchronous mode 2.3.4, alternating output in synchronous mode

2021-06-04 16:58:39 one thousand two hundred and sixty-three sixty-one

original Force button brushing question: DFS

Directory 112. Path summation topic introduction topic implementation 113. Path summation II topic introduction topic implementation 17. Letter combination topic introduction topic implementation of telephone number 22. Bracket generation topic introduction topic implementation 39. Combination summation topic introduction topic implementation 46. Full arrangement topic introduction topic implementation 47. Full arrangement II topic introduction topic implementation 112. Path summation topic introduction to your binary tree The root node root and an integer targetsum representing the target sum determine whether there is a path from the root node to the leaf node in the tree. The sum of all node values on this path is equal to the target and targetsum. A leaf node is a node that has no children. Example 1:

2021-05-29 09:04:40 four hundred and sixty-six forty-nine

original Force button brush question: binary tree chapter

Table of contents 101. Introduction to symmetric binary tree [sword finger offer 28. Symmetric binary tree]( )Topic realization 102. Sequence traversal of binary tree topic introduction topic realization 104. Maximum depth of binary tree topic introduction [sword finger offer 55 - I. depth of binary tree]( ) Topic realization 110. Balanced binary tree topic introduction [sword finger off

2021-05-29 09:01:56 three hundred and five forty-three

original Dynamic programming

Table of contents 322. Change change topic introduction topic realization 5. Longest palindrome sub string topic introduction topic realization 518. Change II topic introduction topic realization 53. Maximum sub sequence and topic introduction topic realization 63. Different path II topic introduction [62. Different paths]( )Topic realization 70. Stair climbing topic introduction topic realization 72. Editing distance topic Introduction topic realization topic 000. All problems of buying and selling stocks [121. The best time to buy and sell stocks](

2021-05-29 08:58:26 four hundred and ninety-seven forty-six

original Force deduction brush question: String chapter

Table of contents 151. Introduction to the word title in the flipped string [sword finger offer 58 - I. flipped word order]( )Topic realization 242. Effective letter ectopic word topic introduction topic realization 3. Longest substring topic introduction topic realization without repeated characters 344. Inverted string topic introduction topic realization 572. Subtree of another tree Topic introduction topic introduction interview question 01.09. String rotation topic introduction topic implementation 151. Flip the word topic introduction in the string. Given a string, flip the string one by one

2021-05-29 08:53:04 two hundred and thirty-two forty-six

original Force button brush question: stack_ Queue article

Directory 150. Introduction to the evaluation of inverse Polish expression 155. Introduction to the minimum stack [interview question 03.02. Minimum stack]( )[sword finger offer 30. Stack containing min function]( )Topic implementation 20. Effective bracketed topic introduction topic implementation 225. Implement with queue Now the topic introduction of the stack is realized 42. The topic introduction of rainwater is realized 739. Every day

2021-05-29 08:50:58 two hundred and ninety-three forty

original Force button brush question: linked list

Directory 1290. Introduction and implementation of binary linked list to integer 138. Introduction to copying linked list with random pointer [sword finger offer 35. Replication of complex linked list]( )Topic realization 141. Circular linked list topic introduction topic realization 160. Intersecting linked list topic introduction [interview question 02.07. Linked list intersection]( m/problems/intersection-of-two-linked-lists-lcci/)[

2021-05-29 08:48:45 one hundred and ninety-one twenty-nine

original Force deduction brush question: array

Write the directory title here 1. Sum of two numbers topic introduction topic realization 164. Maximum spacing topic introduction topic realization 240. Search two-dimensional matrix II topic introduction [sword finger offer 04. Search in two-dimensional array]( )Topic implementation 26. Delete duplicate items in the ordered array topic introduction topic implementation 27. Remove element topics Introduction topic implementation 75. Color classification topic introduction topic implementation 977. Square topic introduction topic of ordered array implementation sword finger offer 03. Introduction of repeated digital topics in array

2021-05-29 08:44:44 three hundred and twenty-three thirty-seven

original Force deduction brush problem: Mathematics_ Bit operation

Directory 1486. Implementation of array XOR operation topic 1720. Implementation of array topic after decoding XOR 67. Implementation of binary summation topic 7. Implementation of integer inversion topic to achieve sword finger offer 15. Implementation of 1 number topic in binary to achieve sword finger offer 64. Implementation of 1 + 2 +... + n topic introduction topic 1486. Introduction of array XOR operation topic to you Two integers, N and start. The array num is defined as: num [i] = start + 2 * I (subscript starts from 0) and N = = num.length. Please return bitwise XOR of all elements in nums(

2021-05-29 08:40:15 two hundred and fifty-seven thirty-seven

original Data structure: hash table

Table of contents Chapter 1 Introduction to hash table Chapter 2 hash conflict Chapter 3 hash function Chapter 4 hash table implementation item address: The first chapter introduces the design of an office address book to store the communication information of all companies in the office building, and the landline number is used as the key (assuming that the landline number is 8 digits at most), As value, the company details (name, address, etc.) require that the time complexity of adding, deleting and searching is O (1), and the implementation code is as follows: we found that the above code can meet the requirements, but the space complexity is very large, the space utilization is very low, and the memory space is very wasted. In fact, array C

2021-04-28 08:10:26 four thousand seven hundred and six forty-six

original Data structures: symbol tables

Chapter 1 Introduction to unordered symbol table Chapter 2 implementation of unordered symbol table 2.1, basic structure 2.2, addition and replacement 2.3, deletion method 2.4, acquisition method 2.5, acquisition key set 2.6, acquisition value set 2.7, code test Chapter 3 implementation of ordered symbol table Chapter 4 implementation of ordered symbol table 4.1, basic structure 4.2, addition and replacement 4.3, deletion method 4.4, acquisition method 4.5 Get key set 4.6, get value set 4.7, code test item address: The first chapter introduces the unordered symbol table. The main purpose of the symbol table is to associate a key with a value

2021-04-22 15:53:42 four hundred and fifty-two thirteen

original Data structure: Advanced tree

Chapter 1 of the directory: 1.1, introduction to the joint query set, 1.2, structure of the joint query set, 1.3, implementation of the joint query set, 11.4, implementation of the joint query set, 21.5, implementation of the joint query set, 3 chapter 2: binary heap, 2.1, introduction to binary heap, 2.2, structure of binary heap, 2.3, implementation of the maximum heap, 2.4, implementation of the minimum heap, 2.5, implementation of batch heap building, Chapter 3: optimal binary tree, 3.1, introduction to Huffman tree, 3.2 Huffman tree structure 3.3, Huffman tree implementation 3.4, Huffman coding introduction 3.5, Huffman coding implementation Chapter 4 word lookup tree 4.1, word lookup tree introduction 4.2, word lookup Tree Structure 4.3, word lookup tree implementation project address:

2021-04-18 22:24:38 eight hundred and four fifty

original Design mode: behavior responsibility chain mode

Chapter 1 responsibility chain mode introduction chapter 2 responsibility chain mode implementation 2.1, abstract handler 2.2, specific handler 2.3, final test class Chapter 3 responsibility chain mode application project address: The first chapter introduces the responsibility chain model: in real life, It is a common scenario that an event needs to be processed by multiple objects. For example, purchase approval process, leave process, etc. When employees ask for leave, the leaders who can approve leave include department heads, deputy general managers, general managers, etc., but the number of days each leader can approve is different. Employees must find different leaders to sign according to the number of days they need to ask for leave, that is, employees must sign

2021-04-11 21:06:49 one thousand two hundred and three thirty-four

original Design pattern: behavior strategy pattern

Chapter 1 Introduction to policy pattern Chapter 2 implementation of policy pattern 2.1, abstract strategy 2.2, specific strategy 2.3, environment class 2.4 Test class Chapter 3 application project address of policy mode: Chapter 1 Introduction to strategy mode introduction to strategy mode: in real life, we often encounter the situation that there are many strategies to choose to achieve a certain goal. For example, when traveling, we can take a plane, a train, a bicycle or drive a private car by ourselves, Supermarket promotion can adopt discount, goods delivery, points delivery and other methods. Similar situations are often encountered in software development. When there are multiple algorithms or strategies to implement a function,

2021-04-11 19:01:30 three hundred and forty-seven thirty-one

original Design pattern: behavior state pattern

Chapter 1 state mode introduction chapter 2 state mode implementation 2.1, environment class 2.2, abstract state class 2.3, specific state class 2.4, test class Chapter 3 state mode application 3.1, environment class 3.2, abstract state class 3.3, specific state class 3.4 Test project address: Chapter 1 Introduction to state mode introduction to state mode: in the process of software development, some objects in the application may behave differently according to different situations. We call this kind of object stateful object, One or more dynamically changing attributes that affect the behavior of objects are called states. When stateful objects and

2021-04-11 17:34:24 one thousand and ninety eight

original Design pattern: behavioral Interpreter pattern

Chapter 1 interpreter mode introduction chapter 2 interpreter mode implementation 2.1, abstract expression 2.2, terminator expression 2.3, non terminator expression 2.4, environment class 2.5, test class Chapter 3 interpreter mode application project address: Chapter 1 Introduction to interpreter mode: in software development, Some problems will occur repeatedly, and there are certain similarities and regularity. If they are summarized into a simple language, these problem examples will be some sentences of the language, which can be implemented by the interpreter mode in "compilation principle". In "compilation principles"

2021-04-11 15:47:46 two hundred and eighty-eight eleven

original Design pattern: behavioral memo pattern

Chapter 1 memo mode introduction chapter 2 memo mode implementation 2.1, initiator 2.2, memo 2.3, manager 2.4, test class Chapter 3 memo mode application project address: Chapter 1 Introduction to memo mode: everyone makes mistakes, They all hope that there is a "regret medicine" that can make up for their mistakes and start over, but the reality is cruel. In computer applications, customers also often make mistakes. Can we provide them with "regret medicine"? Of course, it is possible and necessary. This function is realized by "memo mode". Many applications

2021-04-11 12:52:22 nine hundred and eighty six

original Design pattern: behavioral intermediary pattern

Chapter 1 Introduction to intermediary mode Chapter 2 implementation of intermediary mode 2.1, abstract intermediary 2.2, specific intermediary 2.3, abstract colleague class 2.4, specific colleague class 2.5, final test class Chapter 3 application project address of intermediary mode: The first chapter introduces the intermediary model: in real life, There are often complex interaction relationships between many objects. This interaction relationship is often a "mesh structure", which requires each object to know the object it needs to interact with. For example, everyone must remember the phone numbers of all his or her friends; And if someone in your friend's phone changes

2021-04-11 11:14:39 two hundred and seventy ten

original Design pattern: behavioral observer pattern

Chapter 1 Introduction to observer mode Chapter 2 observer mode implementation 2.1, abstract topic class 2.2, specific topic class 2.3, abstract observer 2.4, specific observer 2.5, final test class Chapter 3 observer mode application 3.1, specific topic class 3.2, specific observer 3.3 Final test project address: Chapter 1 Introduction to observer mode introduction to observer mode: the weather station can publish the daily measured temperature, humidity, air pressure and other information in the form of announcement and provide it to its own website or a third-party website. When the temperature, humidity and air pressure data are updated, Need real

2021-04-10 21:44:30 six hundred and fourteen ten

original Design pattern: behavioral iterator pattern

Chapter 1 iterator pattern introduction chapter 2 iterator pattern implementation 2.1, abstract iterator 2.2, concrete iterator 2.3, abstract aggregate class 2.4, concrete aggregate class 2.5, final test class Chapter 3 iterator pattern application chapter 1 iterator pattern introduction iterator pattern introduction: in real life and program design, It is often necessary to access each element in an aggregate object, such as the linked list traversal in the "data structure". The usual practice is to put the creation and traversal of the linked list in the same class, but this method is not conducive to the expansion of the program. If you want to change the traversal method, you must modify the program source code, which violates the "opening and closing principle". Iterator patterns are Java and. Net

2021-04-10 17:24:45 six hundred and nine eleven

original Design pattern: behavioral visitor pattern

Chapter 1 visitor pattern introduction chapter 2 visitor pattern implementation 2.1, abstract visitor class 2.2, concrete visitor class 2.3, abstract element class 2.4, concrete element class 2.5, object structure class 2.6 Final test class Chapter 3 visitor mode application project address: Chapter 1 visitor pattern introduction visitor pattern introduction: in real life, some collection objects have many different elements, and each element also has many different visitors and processing methods. For example, there are multiple scenic spots and multiple tourists in the park. Different tourists may have different comments on the same scenic spot; Hospital doctors prescribe

2021-04-10 16:27:10 one thousand two hundred and thirty-eight thirteen

original Design pattern: behavioral command pattern

Chapter 1 command mode introduction chapter 2 command mode implementation 2.1, abstract command class 2.2, specific command class 2.3, command receiver 2.4, command requester 2.5, final test class Chapter 3 command mode application project address: The first chapter introduces the command mode: in the software development system, There is often a close coupling relationship between "method requester" and "method implementer", which is not conducive to the expansion and maintenance of software functions. For example, it is inconvenient to "undo, redo, record" a method, so "how to decouple the requester and implementer of a method" becomes very important

2021-04-10 11:05:56 one thousand one hundred and fifty-eight ten

original Design pattern: behavioral template pattern

Table of contents Chapter 1 template mode introduction chapter 2 template mode implementation 2.1, abstract parent class 2.2, specific subclass 2.3, test class Chapter 3 template mode application project address: Chapter 1 Introduction to template pattern introduction to template pattern: in the process of object-oriented programming, Programmers often encounter this situation: when designing a system, they know the key steps required by the algorithm and determine the execution order of these steps, but the specific implementation of some steps is still unknown, or the implementation of some steps is related to the specific environment. For example, to handle business in a bank, you generally go through the following four processes: number taking, queuing and handling specific business

2021-04-09 19:31:58 three hundred and twelve twelve

original Design pattern: structural agent pattern

Chapter 1 Introduction to proxy mode Chapter 2 proxy mode implementation (static proxy) 2.1, abstract topic class 2.2, real topic class 2.3, proxy class 2.4, test class Chapter 3 proxy mode implementation (JDK dynamic proxy) 3.1, abstract topic class 3.2, real topic class 3.3, proxy class 3.4, test class Chapter 4 proxy mode implementation (cglib dynamic proxy) 4.1, abstract topic class 4.2 Real topic class 4.3, agent class 4.4, test class Chapter 5 agent mode application project address: The first chapter is the introduction of agent mode: in some cases, a

2021-04-09 17:52:11 three hundred and nine thirteen

original Design mode: structural element mode

The first chapter of the directory introduces the sharing mode. The second chapter implements 2.1, non sharing objects 2.2, abstract sharing objects 2.3, specific sharing objects 2.4, sharing original factory objects 2.5 Final test class Chapter III Application Project address of sharing meta mode: The first chapter is the introduction of shared meta pattern. In the process of object-oriented programming, we sometimes face the problem of creating a large number of instances of the same or similar objects. Creating so many objects will consume a lot of system resources, which is a bottleneck to improve system performance. For example, black and white pieces in go and Gobang, tables and stools in the classroom, etc. These objects are very interesting

2021-04-09 16:11:46 two hundred and sixty-five eight

original Design mode: structural appearance mode

Chapter 1 appearance mode introduction chapter 2 appearance mode implementation 2.1, relationship dependency Figure 2.2, graphic interface class 2.3, graphic implementation class 2.4, appearance role class 2.5, final test class Chapter 3 appearance mode application project address: Chapter 1 Introduction to appearance mode: in real life, There are often more complex examples, such as handling a real estate certificate or registering a company. Sometimes it is necessary to contact multiple departments. At this time, it would be good if a comprehensive department could solve all the formalities. The same is true of software design. When the function of a system becomes stronger and stronger, there will be more and more subsystems, and the customer's understanding of the system will be improved

2021-04-07 14:05:10 three hundred and thirty-seven nine

original Design mode: structural - combined mode

Chapter 1 Introduction to composite mode Chapter 2 implementation of composite mode (transparent) 2.1, transparent introduction 2.2, abstract component 2.3, leaf component 2.4, branch component 2.5, client testing Chapter 3 implementation of composite mode (SAFE) 3.1, safe introduction 3.2, abstract component 3.3, leaf component 3.4, branch component 3.5 Client test Chapter 4 combined mode application project address: Chapter 1 Introduction to composite pattern introduction to composite pattern: composite pattern, also known as "whole part" pattern, is used to treat a group of similar objects as

2021-04-05 20:59:53 four hundred and twenty thirteen

original Data structure: diagram

Table of contents Chapter 1 Figure 1.1, figure definition 1.2, special figure 1.3, figure structure 1.4, figure classification Chapter 2 undirected graph 2.1, undirected graph terminology 2.2, undirected graph implementation 2.3, undirected graph search 2.3.1, depth first search connectivity 2.3.2, breadth first search connectivity 2.4, undirected graph path 2.4.1, depth first search effective path 2.4.2 Breadth first search shortest path 2.5, judgment of undirected ring Chapter 3 directed graph 3.1, terms of directed graph 3.2, implementation of directed graph 3.3, search of directed graph 3.3.1, number of connections of depth first search 3.3.2, number of connections of breadth first search 3.4, path of directed graph 3.4.1 and effective path of depth first search 3

2021-03-31 14:43:35 three thousand six hundred and fifteen seventy-six

absolutely empty

absolutely empty

absolutely empty

Favorites created by TATA favorite

People concerned by TATA fans

Are you sure you want to delete the current article?
cancel delete