Using Python to develop novel crawler reader based on tkinter

Program name Novel crawling reader Crawling website http://www.bjkgjlu.com Technology used This program is the extension of GUI visual interface learning of regular, file and python Program function description This program is developed for me and my professional collaborators to download and display novels without local files. This prog ...

Posted on Wed, 11 Mar 2020 00:58:01 -0700 by Candrew

RPC principle and GRPC details

1, RPC principle 1. RPC framework origin As the volume of single application becomes larger and larger, and the code is not easy to maintain and manage, a microservice architecture is generated, which is divided into independent services according to public or functional modules, and then independent services can be called each other. How to ca ...

Posted on Tue, 10 Mar 2020 20:44:49 -0700 by reckdan

iOS live audio video collection technology sharing

1. The process of iOS live Technology The process of live broadcast technology can be roughly divided into several steps: data acquisition, image processing (real-time filter), video coding, packet, upload, cloud (transcoding, recording, distribution), live player. Data acquisition: obtain real-time audio and video data through ...

Posted on Tue, 10 Mar 2020 19:20:45 -0700 by gilgimech

Spring annotation - Day3 -- auto injection

Day 3 @Value @The Value annotation is used to set the Value of the Bean to be injected into the container. There are three ways to use it: Basic value You can write SpEL, {} You can use ${} to get the value in the configuration file (the value in the running environment variable) To read the configu ...

Posted on Mon, 09 Mar 2020 22:40:01 -0700 by Jamesm

Software design pattern learning abstract factory pattern

Abstract factory pattern Abstract factory pattern is one of the common construction design patterns, which is more abstract than factory method pattern. In the factory method mode, the specific factory only produces one specific product, but in the abstract factory mode, the specific factory can prod ...

Posted on Sat, 07 Mar 2020 05:33:25 -0800 by duncanwilkie

Detailed explanation of Bridge mode

In real life, some classes have two or more dimensions of change, such as graphics can be divided by shape and color. How to design software like Photoshop that can draw different shapes and colors? If we use inheritance method, there are m × n kinds of M shapes and n colors, which not only corres ...

Posted on Sat, 07 Mar 2020 03:46:23 -0800 by stc7outlaw

Rimworld Mod production tutorial 1 make a pestilence gun

0. introduction Before I tried to make mod, I saw more than N tutorials on the Internet, but I still don't know where to start. Later, I thought that I had to tie the bell to get rid of the bell. I had no choice but to read the English documents. I thought it would be more detailed. So this article re ...

Posted on Fri, 06 Mar 2020 04:00:37 -0800 by szalinski

Understand all knowledge points of "wechat payment Api-v3" interface rules

Article directory brief introduction The difference between v2 and v3 API key settings Get API certificate Request signature Sample code Construct signature string Constructing Authorization in HTTP header Get certificate serial number Obtained through tools Get by code SHA256 with RSA signatur ...

Posted on Fri, 06 Mar 2020 02:37:13 -0800 by Sam

Principles of character set GBK and UTF8 and UNICODE

First, from a macro perspective At first, the operating system only supports a-z A-Z 0-9 and some simple symbols, because they are all English systems. Then computers developed in various countries. Then we need to support the languages of all countries. All countries have compiled their own charac ...

Posted on Fri, 06 Mar 2020 01:29:46 -0800 by brighton

unity string information encryption

Recently, I had an idea to encrypt Unity programs and set their permissions. There are many ways to find them on the Internet 1. Set the account and password for the program, which you can understand without saying more. 2. Set the time for the program to use, if the program exceeds this time, it w ...

Posted on Thu, 05 Mar 2020 19:05:18 -0800 by hbsnam