• Read write lock


    ReadWriteLock import java.util.HashMap; import java.util.Map; import java.util.concurrent.locks.Lock; import java.util.concurrent.locks.ReadWriteLock; import java.util.concurrent.locks.ReentrantLock; import java.util.concurrent.locks.ReentrantReadWriteLock; /** *An exclusive lock (write lock) can only be held by one thread at a time *Shared lock (read lock) multiple threads can occupy at the same time * ReadWriteLock *Read read can coexist *Read write cannot coexist *Write write can coexist […]

  • IK word breaker plug-in


    What is an IK word breaker Word segmentation: that is to divide a paragraph of Chinese or other words into keywords. When searching, we will segment our own information, segment the data in the database or index library, and then perform a matching operation. The default Chinese word segmentation is to treat each word as […]

  • Flink + hologres 100 million users real time UV accurate de duplication best practice


    Introduction:Flink + hologres 100 million users real time UV accurate de duplication best practice UV and PV computing are usually divided into two scenarios because of different business requirements Offline computing scenario: Based on T + 1, calculate historical data Real time computing scenario: real time computing of daily new data, de duplication of user […]

  • Data warehouse series | in depth interpretation of Flink resource management mechanism


    Author: Song Xintong (Wu Zang)Edited by: Wang Wenjie (volunteer of Flink community) Abstract: This article is based on Apache Flink series live broadcast and shared by song Xintong, senior development engineer of Alibaba. This article mainly from the basic concept, the current mechanism and strategy, the future development direction of three aspects to help developers […]

  • Neural network visualization: grad cam


    Title: grad- CAM:Visual Explanations from Deep Networks via Gradient-based Localization》 Author’s unit: Georgia Institute of technology, Facebook AI research Year: 2017 Official account: CVpython simultaneous release Introduction: some time ago, grad cam was used to visualize the output of neural network. At that time, it was a multi note classification task, but the results of […]

  • Acnet: a special idea, Tencent proposes fine-grained classification based on binary neural tree with attention convolution | CVPR 2020


    This paper proposes a fine-grained classification method based on the binary neural tree of attention convolution, which combines the attention convolution operation on the edge of the tree structure, defines the calculation path from the root node to the leaf node by using the routing function at each node, and makes the final prediction combined […]

  • Attngan of text generated image


    A new series of text generated images, which has been studied before, has some ideas, but Gan’s training is a bit pit and time-consuming. Write it down first. Put it here. AttnGAN 1、 GitHub and paper link GitHub link: [https://github.com/cn-boop/At…]() Paper links:AttnGAN: Fine-Grained Text to Image Generation with Attentional Generative Adversarial Networks 2、 Reading summary […]

  • Deep understanding of Flink resource management mechanism


    Author: Song Xintong (Wuzang)Organized by: Wang Wenjie (Flink community volunteer) Abstract: This article is based on Apache Flink series live broadcast, shared by Alibaba Senior Development Engineer song Xintong. This paper helps developers understand Flink’s resource management mechanism from three aspects: basic concept, current mechanism and strategy, and future development direction. Basic concepts Current mechanism […]

  • The difference of two-step permission check in MySQL execution


    Original link: he Xiaodong blog The article comes from a question of lemonVersion 8.0 of the document reference in the article Screenshot of the problem: The main test scenario is: the K field does not exist, and there is no select permission. See which error is thrown first, and the result is that the error […]