Tutorial by Examples: en

template <class ForwardIterator> ForwardIterator min_element (ForwardIterator first, ForwardIterator last); template <class ForwardIterator, class Compare> ForwardIterator min_element (ForwardIterator first, ForwardIterator last,Compare comp); Effects Finds the minimum element i...
Use the fst and snd functions (from Prelude or Data.Tuple) to extract the first and second component of pairs. fst (1, 2) -- evaluates to 1 snd (1, 2) -- evaluates to 2 Or use pattern matching. case (1, 2) of (result, _) => result -- evaluates to 1 case (1, 2) of (_, result) => resu...
Use the curry function (from Prelude or Data.Tuple) to convert a function that takes tuples to a function that takes two arguments. curry fst 1 2 -- computes 1 curry snd 1 2 -- computes 2 curry (uncurry f) -- computes the same as f import Data.Tuple (swap) curry swap 1 2 -- computes (2, 1...
Use swap (from Data.Tuple) to swap the components of a pair. import Data.Tuple (swap) swap (1, 2) -- evaluates to (2, 1) Or use pattern matching. case (1, 2) of (x, y) => (y, x) -- evaluates to (2, 1)
Using comments in your projects is a handy way of leaving explanations of your design choices, and should aim to make your (or someone else's) life easier when maintaining or adding to the code. There are a two ways of adding a comment to your code. Single line comments Any text placed after // w...
By default, LESS will use its own calc() unless told otherwise. So: @column-count: 2; .class-example { width: calc(100% / @column-count); } Would compile to this: .class-example { width: 50%; } While it is our desired width, LESS has used it's own calc() function to calculate ...
RSA can be used to create a message signature. A valid signature can only be generated with access to the private RSA key, validating on the other hand is possible with merely the corresponding public key. So as long as the other side knows your public key they can verify the message to be signed by...
Asymmetric encryption has the advantage that a message can be encrypted without exchanging a secret key with the recipient of the message. The sender merely needs to know the recipients public key, this allows encrypting the message in such a way that only the designated recipient (who has the corre...
1. Jenkins : Jenkins is an open source continuous integration tool written in Java. The project was forked from Hudson after a dispute with Oracle. In a nutshell, Jenkins is the leading open source automation server. Built with Java, it provides hundreds of plugins to support building, testing, de...
From dataframe: mtrdd <- createDataFrame(sqlContext, mtcars) From csv: For csv's, you need to add the csv package to the environment before initiating the Spark context: Sys.setenv('SPARKR_SUBMIT_ARGS'='"--packages" "com.databricks:spark-csv_2.10:1.4.0" "sparkr-shel...
Let's assume that we have one row in Company table with companyId 1. We can insert row in employee table that has companyId 1: insert into Employee values (17, 'John', 1) However, we cannot insert employee that has non-existing CompanyId: insert into Employee values (17, 'John', 111111) Msg ...
Encapsulation hides implementation details from client code. The Handling QueryClose example demonstrates encapsulation: the form has a checkbox control, but its client code doesn't work with it directly - the checkbox is an implementation detail, what the client code needs to know is whether the s...
When followed by a qualified name, typename specifies that it is the name of a type. This is often required in templates, in particular, when the nested name specifier is a dependent type other than the current instantiation. In this example, std::decay<T> depends on the template parameter...
One useful feature of extension methods is that you can create common methods for an interface. Normally an interface cannot have shared implementations, but with extension methods they can. public interface IVehicle { int MilesDriven { get; set; } } public static class Extensions { ...
Rather than use clearRect which makes all pixels transparent you may want a background. To clear with a gradient // create the background gradient once var bgGrad = ctx.createLinearGradient(0,0,0,canvas.height); bgGrad.addColorStop(0,"#0FF"); bgGrad.addColorStop(1,"#08F"); ...
Given the 4 points of a cubic Bezier curve the following function returns its length. Method: The length of a cubic Bezier curve does not have a direct mathematical calculation. This "brute force" method finds a sampling of points along the curve and calculates the total distance spanne...
When writing wrappers for unmanaged resources, you should subclass SafeHandle rather than trying to implement IDisposable and a finalizer yourself. Your SafeHandle subclass should be as small and simple as possible to minimize the chance of a handle leak. This likely means that your SafeHandle imple...
Enable and upgrade setup php bin/magento module:enable YKM_Custom php bin/magento setup:upgrade Disable the Module php bin/magento module:disable YKM_Custom Another One - module uninstall script is executed and whole module gets deleted afterwards. Only modules installed through Composer ca...
When we use @SpringApplicationConfiguration it will use configuration from application.yml [properties] which in certain situation is not appropriate. So to override the properties we can use @TestPropertySource annotation. @TestPropertySource( properties = { "spring...
You can extract fasta sequence from a blastdb constructed from a fasta file using blastdbcmd which should be installed when you install makeblastdb. blastdbcmd -entry all -db <database label> -out <outfile> If you had a database called my_database which contained the files my_databas...

Page 150 of 275