我正在使用fontawesome,我想添加或删除所选项目的图标.所以我这样做了:http ://jsbin.com/nasixuro/7/edit(感谢@Fares M.)
JS
$(document).ready(function () {
function format_select2_icon(opti) {
if (!opti.id) return opti.text; // optgroup
if ($(opti.element).data('icon') == "1") {
return opti.text + " <i class='fa fa-check'></i>";
} else {
return opti.text;
}
}
$("#sel").select2({
escapeMarkup: function(m) { return m; },
formatResult: format_select2_icon,
formatSelection: format_select2_icon
});
$("#addok").click(function() {
actual_value = $("#sel").find(':selected').text();
if (actual_value.indexOf(" <i class='fa fa-check'></i>") > -1){
alert("asd");
return;
}
newtext = actual_value + " <i class='fa fa-check'></i>";
$("#sel").find(':selected').text(newtext).change();
});
$("#removeok").click(function() {
actual_value= …Run Code Online (Sandbox Code Playgroud) 我正在使用饼图Highchart.js插件,我正在尝试更改包含percentajes类型的标签的某些字体属性.
我试过这个但是不起作用...... http://tinker.io/3fc64/6
JS
$(function () {
$('#container').highcharts({
chart: {
plotBackgroundColor: null,
plotBorderWidth: null,
plotShadow: false,
style: {
fontFamily: 'Lato',
color: "red"
}
},
plotOptions: {
pie: {
cursor: 'pointer'
}
},
credits: false,
title: false,
tooltip: false,
series: [{
type: 'pie',
data: [
{
name: 'Example1',
y: 40,
sliced: true,
color: "rgb(10,200,23)"
},
['Example2', 12.0],
['Example3', 26.8],
['Example4', 8.5],
['Example5', 6.2],
['Example6', 0.7]
]
}]
});
});
Run Code Online (Sandbox Code Playgroud)
CSS
@import url(http://fonts.googleapis.com/css?family=Lato);
Run Code Online (Sandbox Code Playgroud)
HTML
<div id="container" style="width:100%; height:400px;"></div>
Run Code Online (Sandbox Code Playgroud)
我想念的是什么?有任何想法或建议吗?提前致谢.
我想使用Keras CNN构建二进制分类器.我有大约6000行输入数据,如下所示:
>> print(X_train[0])
[[[-1.06405307 -1.06685851 -1.05989663 -1.06273152]
[-1.06295958 -1.06655996 -1.05969803 -1.06382503]
[-1.06415248 -1.06735609 -1.05999593 -1.06302975]
[-1.06295958 -1.06755513 -1.05949944 -1.06362621]
[-1.06355603 -1.06636092 -1.05959873 -1.06173742]
[-1.0619655 -1.06655996 -1.06039312 -1.06412326]
[-1.06415248 -1.06725658 -1.05940014 -1.06322857]
[-1.06345662 -1.06377347 -1.05890365 -1.06034568]
[-1.06027557 -1.06019084 -1.05592469 -1.05537518]
[-1.05550398 -1.06038988 -1.05225064 -1.05676692]]]
>>> print(y_train[0])
[1]
Run Code Online (Sandbox Code Playgroud)
然后我通过这种方式构建CNN:
model = Sequential()
model.add(Convolution1D(input_shape = (10, 4),
nb_filter=16,
filter_length=4,
border_mode='same'))
model.add(BatchNormalization())
model.add(LeakyReLU())
model.add(Dropout(0.2))
model.add(Convolution1D(nb_filter=8,
filter_length=4,
border_mode='same'))
model.add(BatchNormalization())
model.add(LeakyReLU())
model.add(Dropout(0.2))
model.add(Flatten())
model.add(Dense(64))
model.add(BatchNormalization())
model.add(LeakyReLU())
model.add(Dense(1))
model.add(Activation('softmax'))
reduce_lr = ReduceLROnPlateau(monitor='val_acc', factor=0.9, patience=30, min_lr=0.000001, verbose=0) …Run Code Online (Sandbox Code Playgroud) 我有以下代码使用JCL通过FTP发送文件:
//FTP00001 EXEC PGM=IKJEFT01,DYNAMNBR=50
//OUT DD SYSOUT=*
//AMSDUMP DD SYSOUT=*
//SYSTSPRT DD SYSOUT=*
//SYSIN DD DUMMY
//SYSPRINT DD DUMMY
//OUTPUT DD SYSOUT=*
//SYSTSIN DD *
123.234.345.67
myuser1
p4ssw0rd
ascii
cd infos
PUT 'EF35.LMINFO.D180203' info_180203.txt
QUIT
/*
Run Code Online (Sandbox Code Playgroud)
它就像一个魅力,问题是我不想把凭证硬编码在JCL里面.我们怎么能隐藏它们,以便任何有权访问JCL的人都看不到连接细节?我也想从输出中隐藏凭据,但请注意我仍然希望看到其余的信息:传输的字节,可能的错误消息等等.
我想将SYSTSIN内容放在一个文件中,但是我遇到了同样的问题:任何有权访问该文件的人都会看到用户并通过.因此,解决这个问题的最佳方法是什么?
给字符串:
foo='Hello \
World! \
x
we are friends
here we are'
Run Code Online (Sandbox Code Playgroud)
在角色之前或之前,还有与空格混合的制表\符.我想只用空格替换空格,制表符和斜杠.我尝试过:
echo "$foo" | tr "[\s\t]\\\[\s\t]\n\[\s\t]" " " | tr -s " "
Run Code Online (Sandbox Code Playgroud)
返回:
Hello World! x we are friend here we are
Run Code Online (Sandbox Code Playgroud)
我需要的结果是:
Hello World! x
we are friends
here we are
Run Code Online (Sandbox Code Playgroud)
有一些想法,小费或诀窍吗?我能在一个命令中得到我想要的结果吗?
我有这个代码与websocket api使用async和websoketspython库进行交互:
#!/usr/bin/env python3
import sys, json
import asyncio
from websockets import connect
class AsyncWebsocket():
async def __aenter__(self):
self._conn = connect('wss://ws.myws.com/v2')
self.websocket = await self._conn.__aenter__()
return self
async def __aexit__(self, *args, **kwargs):
await self._conn.__aexit__(*args, **kwargs)
async def send(self, message):
await self.websocket.send(message)
async def receive(self):
return await self.websocket.recv()
class mtest():
def __init__(self, api_token):
self.aws = AsyncWebsocket()
self.loop = asyncio.get_event_loop()
self.api_token = api_token
self.authorize()
def authorize(self):
jdata = self.__async_exec({
'authorize': self.api_token
})
try:
print (jdata['email'])
ret = True …Run Code Online (Sandbox Code Playgroud) 我有以下代码连接到COBOL程序内的外部数据库:
MOVE 'I2SFG04' TO WK-USER
MOVE '12345' TO WK-PASS
EXEC SQL
CONNECT TO :WK-EXT-MACHINE
USER :WK-USER
USING :WK-PASS
END-EXEC.
Run Code Online (Sandbox Code Playgroud)
但是你可以猜到,我不想硬编码用户并在COBOL程序中传递.那么有一种安全的存储方式,所以有权查看COBOL程序的人都看不到凭据吗?
我的第一种方法是使用SYSIN内容创建一个文件(受RACF保护),因此COBOL程序可以加载它,但它不会显示在源代码中.像这样的东西:
//STEP001 EXEC PGM=IKJEFT01
//STEPLIB DD DSN=I2SJR04.SYS.DBRMLIB,DISP=SHR
//SYSIN DD DSN=EF35.PRIVATE.DB.LOGIN,DISP=SHR
//SYSOUT DD SYSOUT=*
//SYSTSIN DD *
DSN SYSTEM(SSID)
RUN PROGRAM(MYCOBB) PLAN(PLANNAME) -
LIB('I2SJR04.SYS.LOADLIB')
END
/*
Run Code Online (Sandbox Code Playgroud)
EF35.PRIVATE.DB.LOGIN文件的内容:
I2SFG04
12345
Run Code Online (Sandbox Code Playgroud)
有没有更好的方法来处理这种情况?
我已经多次看到以下段落命名结构:
nnnn-PARAGRAPH-NAME.
Run Code Online (Sandbox Code Playgroud)
哪里nnnn代表一个4位数字.
这是一个完整的例子:
0000-MAINLINE.
PERFORM 1000-INITIALIZE-THE-PROGRAM.
PERFORM 2000-PROCESS-1-BILLING-RECORD
UNTIL 88-100-ALL-RECORDS-PROCESSED.
PERFORM 3000-TERMINATE-THE-PROGRAM.
GOBACK.
1000-INITIALIZE-THE-PROGRAM.
PERFORM 1100-VALIDATE-CONTROL-CARD.
PERFORM 1200-OPEN-THE-FILES.
PERFORM 8000-GET-NEXT-BILLING-RECORD.
1100-VALIDATE-CONTROL-CARD.
PERFORM 1110-READ-CONTROL-CARD.
PERFORM 1120-EDIT-CONTROL-CARD.
1110-READ-CONTROL-CARD.
PERFORM 9000-ABEND-THE-PROGRAM. *> IF A READ ERROR OCCURRED
1120-EDIT-CONTROL-CARD.
PERFORM 9000-ABEND-THE-PROGRAM *> IF AN EDIT ERROR OCCURRED
1200-OPEN-THE-FILES.
PERFORM 9000-ABEND-THE-PROGRAM *> IF AN OPEN ERROR OCCURRED
2000-PROCESS-1-BILLING-RECORD.
PERFORM 2100-CALCULATE-BILLABLE-AMT.
PERFORM 2200-PRINT-BILLING-REPORT.
PERFORM 8000-GET-NEXT-BILLING-RECORD.
2200-PRINT-BILLING-REPORT.
PERFORM 2210-PRINT-REPORT-HEADER. *> WHEN IT'S NEEDED
3000-TERMINATE-THE-PROGRAM.
PERFORM 3100-CLOSE-THE-FILES.
PERFORM 3200-DISPLAY-FINAL-MESSAGES.
8000-GET-NEXT-BILLING-RECORD.
PERFORM 9000-ABEND-THE-PROGRAM. *> IF A …Run Code Online (Sandbox Code Playgroud) 此代码创建一个具有 10 分钟范围索引的数据框:
import pandas as pd
import datetime as dt
date_range = pd.date_range(end=dt.datetime(2017, 1, 6, 15, 00), periods=10, freq='10Min')
df = pd.DataFrame(index=date_range)
df['A'] = 1
print(df)
Run Code Online (Sandbox Code Playgroud)
它输出:
A
2017-01-06 13:30:00 1
2017-01-06 13:40:00 1
2017-01-06 13:50:00 1
2017-01-06 14:00:00 1
2017-01-06 14:10:00 1
2017-01-06 14:20:00 1
2017-01-06 14:30:00 1
2017-01-06 14:40:00 1
2017-01-06 14:50:00 1
2017-01-06 15:00:00 1
Run Code Online (Sandbox Code Playgroud)
我的问题是:
当索引之间存在间隙时,如何将以下三行中的 A 列设置为 0?
例如,如果我们删除特定行:
df = df[df.index != dt.datetime(2017, 1, 6, 14, 00)]
Run Code Online (Sandbox Code Playgroud)
它输出:
A
2017-01-06 13:30:00 1
2017-01-06 …Run Code Online (Sandbox Code Playgroud) 我使用 LSTM 模型创建了一个词级文本生成器。但就我而言,并非每个词都适合选择。我希望它们匹配其他条件:
10100010)。然后,生成的句子需要满足给定的结构,例如,01001100(hi 01和朋友 001100)。因此,为了处理这种情况,我创建了一个具有以下结构的 Pandas 数据框:
word last_vowel word_map
----- --------- ----------
hello o 01001
stack a 00100
jhon o 0010
Run Code Online (Sandbox Code Playgroud)
这是我目前的工作流程:
0100100100100,我们可以选择单词hello,因为它的元音结构是01001。0100100100100will be become00100100因为我们已经删除了首字母01001( hello )。00100和jhon 0010。machine-learning reinforcement-learning fst lstm generative-adversarial-network
mainframe ×3
python ×3
cobol ×2
css ×2
javascript ×2
jcl ×2
jquery ×2
optimization ×2
security ×2
zos ×2
asynchronous ×1
bash ×1
css3 ×1
dataframe ×1
fst ×1
ftp ×1
generative-adversarial-network ×1
highcharts ×1
html ×1
keras ×1
keras-layer ×1
lstm ×1
numpy ×1
pandas ×1
passwords ×1
regex ×1
scripting ×1
session ×1
tensorflow ×1
tr ×1
websocket ×1