Tutorial by Examples: me

The following code sample demonstrates a quick and easy means of encrypting and decrypting files using the AES symmetric encryption algorithm. The code randomly generates the Salt and Initialization Vectors each time a file is encrypted, meaning that encrypting the same file with the same password ...
Use Spring REST Docs to document your services. It's a powerful framework which makes sure that the Service logic is always inline with the documentation. In order to do so, you would have to write integration tests for your services. If there is any mismatch in the documentation & service beha...
Use Spring REST Docs to document your services. It's a powerful framework which makes sure that the Service logic is always inline with the documentation. In order to do so, you would have to write integration tests for your services. If there is any mismatch in the documentation & service beha...
<?php defined('BASEPATH') OR exit('No direct script access allowed'); class Api extends CI_Controller { //default value private $login_credential; function __construct() { parent::__construct(); //for user authentication $this->load->library('session'); ...
/***************************** @return all events ****************************/ public function getallevents(){ //get data from model $events = array( array('Event 1', '2015-04-03'), array('Event 2', '2015-04-03'), array('Event 3', '2015-06-16'), array('Event 4', '2015-0...
/***************************** login user @required : username and password via post method only @return user data if login successfull otherwise error message ****************************/ public function login(){ $username=$this->input->post('username'); $password=$this->input-...
This code creates the table: begin execute immediate 'create table my_table (id number, column_value varchar2(100))'; end; /
How comp, comp-1 ... comp-5 are implemented is implementation dependent. Format Normal Implementation Comp Big endian binary integer Comp-1 4 byte floating point Comp-2 8 byte floating point Comp-3 Packed decimal 123 is stored as x'123c' Comp-5 Binary In...
=> Original Post <= ASP.NET Core uses the ASPNETCORE_ENVIRONMENT environment variable to determine the current environment. By default, if you run your application without setting this value, it will automatically default to the Production environment. > dotnet run Project TestApp (.NETC...
Please me mindful of importing all necessary libraries required. This example uses InMemoryDbService from angular-in-memory-web-api to provide the JSON data from mock API. Live demo service.ts: import { Injectable } from '@angular/core'; import { Headers, Http } from '@angular/http'; import...
The machine has to automatically determine the ideal behavior to maximize its performance. For example: Using reinforcement learning you can also make a computer program that can complete a Mario level (MarI/O - Machine Learning for Video Games).
Many modern Image Processing algorithms use patches are their basic element to work on. For instance one could denoise patches (See BM3D Algorithm). Yet when building the image form the processed patches we have many results for the same pixel. One way to deal with it is taking the average (Empir...
Open3.popen3 or Open3.capture3: Open3 actually just uses Ruby's spawn command, but gives you a much better API. Open3.popen3 Popen3 runs in a sub-process and returns stdin, stdout, stderr and wait_thr. require 'open3' stdin, stdout, stderr, wait_thr = Open3.popen3("sleep 5s && ls&q...
Asymmetric encryption is often regarded as preferable to Symmetric encryption for transferring messages to other parties. This is mainly because it negates many of the risks related to the exchange of a shared key and ensures that whilst anyone with the public key can encrypt a message for the inten...
Shopify themes can also be developed locally. Follow the steps below to setup local development environment: Install Shopify Theme Kit Get API Access Use a new theme or Configure an existing theme with theme kit Explanation of the above steps are as follows: Install Shopify Theme Kit A...
Events triggered by actions inside a HTML form (applies to almost all HTML elements, but is most used in form elements): AttributeDescriptiononblurFires the moment that the element loses focusonchangeFires the moment when the value of the element is changedoncontextmenuScript to be run when a conte...
It is occasionally desirable to deny a certain Permission to some ProtectionDomain, regardless of any other permissions that domain accrues. This example demonstrates just one of all the possible approaches for satisfying this kind of requirement. It introduces a "negative" permission clas...
ArrayList<String> fontNames = new ArrayList<String>(); File temp = new File("/system/fonts/"); String fontSuffix = ".ttf"; for(File font : temp.listFiles()) { String fontName = font.getName(); if(fontName.endsWith(fontSuffix)) { fontNames.add(f...
The following method will take a second or two depending on your connection to retrieve a web page and count the text length. Whatever thread calls it will block for that period of time. Also it rethrows an exception which is useful later on. public static long blockingGetWebPageLength(String urlS...
mView.afterMeasured { // inside this block the view is completely drawn // you can get view's height/width, it.height / it.width } Under the hood inline fun View.afterMeasured(crossinline f: View.() -> Unit) { viewTreeObserver.addOnGlobalLayoutListener(object : ViewTreeObserver.OnGlob...

Page 196 of 197