Mirror | Deploy Google and Wikipedia mirror
kandi X-RAY | Mirror Summary
kandi X-RAY | Mirror Summary
Note: if you have a server and want to implement something like subs_filter (eg. replace all google.com to google.upupming.site in web pages.), please consider using v0.0.1. v0.0.1 can also proxy all subdomains of Google, it will be useful if you are a heavy Google user. Using now.sh to proxy mirror websites for Google and Chinese Wikipedia, keeping to organize the world's information and make it universally accessible and useful in mind.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of Mirror
Mirror Key Features
Mirror Examples and Code Snippets
def _composite_mirror_pad_grad(input_, paddings, mode):
shape = input_.shape.as_list()
for i in range(len(shape)):
rdims = tf.raw_ops.OneHot(
indices=i, depth=len(shape), on_value=True, off_value=False, axis=-1)
left_padding_size
def binary_tree_mirror(binary_tree: dict, root: int = 1) -> dict:
"""
>>> binary_tree_mirror({ 1: [2,3], 2: [4,5], 3: [6,7], 7: [8,9]}, 1)
{1: [3, 2], 2: [5, 4], 3: [7, 6], 7: [9, 8]}
>>> binary_tree_mirror({ 1: [
public static > void mirror(BinaryNode node) {
if (node == null) return;
// mirror sub-trees
mirror(node.left);
mirror(node.right);
// swap nodes
BinaryNode tempNode;
tempNode = node.left;
Community Discussions
Trending Discussions on Mirror
QUESTION
ANSWER
Answered 2022-Apr-08 at 15:31Consider a typical use case of a std::any
: You pass it around in your code, move it dozens of times, store it in a data structure and fetch it again later. In particular, you'll likely return it from functions a lot.
As it is now, the pointer to the single "do everything" function is stored right next to the data in the any
. Given that it's a fairly small type (16 bytes on GCC x86-64), any
fits into a pair of registers. Now, if you return an any
from a function, the pointer to the "do everything" function of the any
is already in a register or on the stack! You can just jump directly to it without having to fetch anything from memory. Most likely, you didn't even have to touch memory at all: You know what type is in the any
at the point you construct it, so the function pointer value is just a constant that's loaded into the appropriate register. Later, you use the value of that register as your jump target. This means there's no chance for misprediction of the jump because there is nothing to predict, the value is right there for the CPU to consume.
In other words: The reason that you get the jump target for free with this implementation is that the CPU must have already touched the any
in some way to obtain it in the first place, meaning that it already knows the jump target and can jump to it with no additional delay.
That means there really is no indirection to speak of with the current implementation if the any
is already "hot", which it will be most of the time, especially if it's used as a return value.
On the other hand, if you use a table of function pointers somewhere in a read-only section (and let the any
instance point to that instead), you'll have to go to memory (or cache) every single time you want to move or access it. The size of an any
is still 16 bytes in this case but fetching values from memory is much, much slower than accessing a value in a register, especially if it's not in a cache. In a lot of cases, moving an any
is as simple as copying its 16 bytes from one location to another, followed by zeroing out the original instance. This is pretty much free on any modern CPU. However, if you go the pointer table route, you'll have to fetch from memory every time, wait for the reads to complete, and then do the indirect call. Now consider that you'll often have to do a sequence of calls on the any
(i.e. move, then destruct) and this will quickly add up. The problem is that you don't just get the address of the function you want to jump to for free every time you touch the any
, the CPU has to fetch it explicitly. Indirect jumps to a value read from memory are quite expensive since the CPU can only retire the jump operation once the entire memory operation has finished. That doesn't just include fetching a value (which is potentially quite fast because of caches) but also address generation, store forwarding buffer lookup, TLB lookup, access validation, and potentially even page table walks. So even if the jump address is computed quickly, the jump won't retire for quite a long while. In general, "indirect-jump-to-address-from-memory" operations are among the worst things that can happen to a CPU's pipeline.
TL;DR: As it is now, returning an any
doesn't stall the CPU's pipeline (the jump target is already available in a register so the jump can retire pretty much immediately). With a table-based solution, returning an any
will stall the pipeline twice: Once to fetch the address of the move function, then another time to fetch the destructor. This delays retirement of the jump quite a bit since it'll have to wait not only for the memory value but also for the TLB and access permission checks.
Code memory accesses, on the other hand, aren't affected by this since the code is kept in microcode form anyway (in the µOp cache). Fetching and executing a few conditional branches in that switch statement is therefore quite fast (and even more so when the branch predictor gets things right, which it almost always does).
QUESTION
- I am searching a 2D grid for a word.
- We can search left/right and up/down.
- For example, in this grid, searching for
"abef"
starting at(0,0)
will returnTrue
Example (grid1):
Where I'm at- The recursive version gives expected results (see
dfs_rec()
below). - The iterative version also gives expected results (see
dfs_iter()
below). However, in this version I am making a copy of thevisited
set onto the stack at every node.
- Is there a way to avoid the copy (
visited.copy()
) in the iterative version, and add/remove to a singlevisited
set as in the recursive version?
In
dfs_rec()
there is a singleset()
namedvisited
, and it's changed viavisited.add((row,col))
andvisited.remove((row,col))
But in
dfs_iter()
I am pushingvisited.copy()
onto the stack each time, to prevent nodes from being marked as visited incorrectly.I have seen some iterative examples where they use a single
visited
set, without making copies or removing anything from the set, but that does not give me the right output in these examples (seedfs_iter_nocopy()
usinggrid3
below).
As an example, take this grid:
- Say you search for
"abexxxxxx"
(covering the entire grid), the expected output will beTrue
But
dfs_iter_nocopy()
will give incorrect output on one ofgrid2
orgrid3
(they are just mirrored, one will pass and one will fail), depending on the order you push nodes onto the stack.What's happening is, when you search for
"abexxxxxx"
, it searches a path like this (only hitting 5 x's, while it needs 6).
- It marks the
x
at(1,0)
as visited, and when it's time to search that branch, it stops at(1,0)
, like this:
ANSWER
Answered 2022-Mar-09 at 22:14You noticed that the recursive version was able to use a single visited
accumulator by resetting it with visited.remove((row,col))
when backtracking. So the same can be done here by imitating the function call stack so that we know when backtracking occurs.
QUESTION
I'm learning the basics of javascript at school, now I'm working on the canvas
This is my code
...ANSWER
Answered 2022-Feb-20 at 20:52Looks like drawing lines to very high negative numbers causes problems...
If you want that code to show something useful, we can add an if statement for those with positive Y values, we could also restrict to a not so big negative, but I leave that up to you.
I'm drawing arcs to show the points and also divide the output of the function to lower the amount, showing different curves.
QUESTION
We have a Flutter app which uses a private repository as a dependency.
The SSH key has been added to CircleCI, and the remote access to the repository works just fine locally using this same key.
The config has been added to the .circleci/config.yml
:
ANSWER
Answered 2022-Feb-02 at 23:39OK - there were a couple of things I had wrong,
The main one was that I had the add_ssh_keys
line in the wrong place.
It really needs to be the first step, or at least be before the flutter/install_sdk_and_pub
step.
eg. This works (but if the add_ssh_keys
step was at the bottom of the list of 4 steps here then it fails):
QUESTION
Discussion about this was started under this answer for quite simple question.
ProblemThis simple code has unexpected overload resolution of constructor for std::basic_string
:
ANSWER
Answered 2022-Jan-05 at 12:05Maybe I'm wrong, but it seems that last part:
QUESTION
While trying to implement some deep magic that I'd rather not get into here (I should be able to figure it out if I get an answer for this), it occurred to me that __new__
doesn't work the same way for classes that define it, as for classes that don't. Specifically: when you define __new__
yourself, it will be passed arguments that mirror those of __init__
, but the default implementation doesn't accept any. This makes some sense, in that object
is a builtin type and doesn't need those arguments for itself.
However, it leads to the following behaviour, which I find quite vexatious:
...ANSWER
Answered 2022-Jan-21 at 12:42The issues you're seeing aren't related to how Python finds __new__
or chooses its arguments. __new__
receives every argument you're passing. The effects you observed come from specific code in object.__new__
, combined with a bug in the logic for updating the C-level tp_new
slot.
There's nothing special about how Python passes arguments to __new__
. What's special is what object.__new__
does with those arguments.
object.__new__
and object.__init__
expect one argument, the class to instantiate for __new__
and the object to initialize for __init__
. If they receive any extra arguments, they will either ignore the extra arguments or throw an exception, depending on what methods have been overridden:
- If a class overrides exactly one of
__new__
or__init__
, the non-overriddenobject
method should ignore extra arguments, so people aren't forced to override both. - If a subclass
__new__
or__init__
explicitly passes extra arguments toobject.__new__
orobject.__init__
, theobject
method should raise an exception. - If neither
__new__
nor__init__
are overridden, bothobject
methods should throw an exception for extra arguments.
There's a big comment in the source code talking about this.
At C level, __new__
and __init__
correspond to tp_new
and tp_init
function pointer slots in a class's memory layout. Under normal circumstances, if one of these methods is implemented in C, the slot will point directly to the C-level implementation, and a Python method object will be generated wrapping the C function. If the method is implemented in Python, the slot will point to the slot_tp_new
function, which searches the MRO for a __new__
method object and calls it. When instantiating an object, Python will invoke __new__
and __init__
by calling the tp_new
and tp_init
function pointers.
object.__new__
is implemented by the object_new
C-level function, and object.__init__
is implemented by object_init
. object
's tp_new
and tp_init
slots are set to point to these functions.
object_new
and object_init
check whether they're overridden by checking a class's tp_new
and tp_init
slots. If tp_new
points to something other than object_new
, then __new__
has been overridden, and similar for tp_init
and __init__
.
QUESTION
I am deploying multiple R versions on multiple virtual desktops. I've built 3.6.3
and 4.1.2
R from source on Ubuntu 18.04.3 LTS
. None of them finds the system-wide Rprofile.site
file in /etc/R
or the system certificates in /usr/share/ca-certificates
. However R (3.4.4
) installed with APT has no such problems. I used Ansible, but for the sake of this question I reproduced the deployment for one host with a shell script.
ANSWER
Answered 2022-Jan-14 at 17:25Finally I found the solution:
Since both system has the arch and OS. I cross copied the R compiled installations between them. The R which was compiled on the problematic system, but was run on the correct one gave the warnings below after the calling of the install.packages("renv", repos="https://cran.wu.ac.at/")
QUESTION
Thanks for taking the time to review my post. I hope that this post will not only yield results for myself but perhaps helps others too!
IntroductionCurrently I am working on a project involving pointclouds generated with photogrammetry. It consists of photos combined with laser scans. The software used in making the pointcloud is Reality Capture. Besides the pointcloud export one can export "Internal/External camera parameters" providing the ability of retrieving photos that are used to make up a certain 3D point in the pointcloud. Reality Capture isn't that well documented online and I have also posted in their forum regarding camera variables, perhaps it can be of use in solving the issue at hand?
Only a few variables listed in the camera parameters file are relevant (for now) in referencing camera positioning such as filename, x,y,alt for location, heading, pitch and roll as its rotation.
Currently the generated pointcloud is loaded into the browser compatible THREE.JS viewer after which the camera parameters .csv file is loaded and for each known photo a 'PerspectiveCamera' is spawned with a green cube. An example is shown below:
The challengeAs a matter of fact you might already know what the issue might be based on the previous image (or the title of this post of course ;P) Just in case you might not have spotted it, the direction of the cameras is all wrong. Let me visualize it for you with shabby self-drawn vectors that rudimentary show in what direction it should be facing (Marked in red) and how it is currently vectored (green).
Row 37, DJI_0176.jpg is the most right camera with a red reference line row 38 is 177 etc. The last picture (Row 48 is DJI_189.jpg) and corresponds with the most left image of the clustured images (as I didn't draw the other two camera references within the image above I did not include the others).
When you copy the data below into an Excel sheet it should display correctly ^^
...ANSWER
Answered 2022-Jan-02 at 22:26At first glance, I see three possibilities:
It's hard to see where the issue is without showing how you're using the
createCamera()
method. You could be swappingpitch
withheading
or something like that. In Three.js, heading is rotation around the Y-axis, pitch around X-axis, and roll around Z-axis.Secondly, do you know in what order the
heading, pitch, roll
measurements were taken by your sensor? That will affect the way in which you initiate yourTHREE.Euler(xRad, yRad, zRad, 'XYZ')
, since the order in which to apply rotations could also be'YZX', 'ZXY', 'XZY', 'YXZ' or 'ZYX'
.Finally, you have to think "What does
heading: 0
mean to the sensor?" It could mean different things between real-world and Three.js coordinate system. A camera with no rotation in Three.js is looking straight down towards-Z
axis, but your sensor might have it pointing towards+Z
, or+X
, etc.
I added a demo below, I think this is what you needed from the screenshots. Notice I multiplied pitch * -1
so the cameras "Look down", and added +180
to the heading so they're pointing in the right... heading.
QUESTION
I installed MSYS2-64bits on my Windows Server 2016 to support some Linux librairies, such as OpenSSL, which I need in my Ruby on Rails development. MSYS2 has been partially installed with Ruby 2.7, but did not complete due to certificates error messages.
I first downloaded and install msys2-x86_64-20210725.exe. It took a very long time and finished after a few messages about Updating the trust database:
...ANSWER
Answered 2021-Dec-17 at 20:02Great question, but it's not exactly the corporate proxy refusing self-signed certificates; it's pacman's SSL agent.
In your browser, go to repo.msys2.org to find which certificates are being used:
Open details:
You'll need to export all certificates individually, but don't need the lowest one for repo.msys2.org:
Save to a local file:
Export using Base-64 encoding:
Can save directly to the trust source anchors folder. Things move around from time to time, but as of now, that's C:\msys64\etc\pki\ca-trust\source\anchors\.cer
Go through the same steps to import the top-level root certificate. Save in the same path, different file name.
QUESTION
Background
I've been using the Exclude
and Extract
utility types but have come across a case where i only want to match exact types not subtypes.
So far
I've managed to create a StrictExtract
utility type that only extracts types that are an exact match - although there's possibly an easier way to do this?
ANSWER
Answered 2021-Nov-17 at 00:49First, it seems like you want StrictExclude
to distribute across unions in T
, so if T
is A | B | C
, then StrictExclude
is equivalent to StrictExclude | StrictExclude | StrictExclude
. So as a first step we can write this as a distributive conditional type:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install Mirror
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page