Critical damage (famous knife, yin sword, yang sword, big shadowless, etc.) Critical strike damage refers to the higher damage that can be hit when skill or general attack triggers critical strike. For example, if a piece of equipment with a 30% increase in critical strike damage hits 10,000 damage before wearing it, it can hit 13,000 damage after triggering a critical strike after wearing it. Note that there is also a maximum limit between critical strikes.I have also seen it spray on cars. The fuel burns to extinguish the flame for more than five minutes. When it finally went out, the whole car head was burned by more than half. Although I don't know the specific figure of the temperature, the comrades in the chemical defense class said it was at least 1300-1500 degrees Celsius, so I thought at that time, even the steel plate could melt into the flame of molten iron in a few minutes. It was not a piece of cake to burn this insect. Even if you are much bigger than the average wasp, may there be steel plates that are resistant to burning? After being ignited by the flame, it should be burned to ashes in an instant. But the result was not what I thought. After being ignited, the big wasp was quite resistant to burning. Actually flying around in the air for more than ten seconds before being burned, the air disintegrated and died. But this has become a good thing, It is precisely because it will burn to death for a while. So flying in the air with flames all over it must be either because of the sharp pain, Either they lost their direction because of something else, Anyway, it is flying around in the air, As a result, they hit many of their peers in the process of flying around. Then it ignited the same kind that was hit, If the ignited kind bumps into each other again, To ignite another kind, It just went through a couple of cycles, Most of the big wasps were set on fire, That will burn quickly. The sky is full of the sound of "crackling" burning meat, and there is a smell of barbecue burnt. The black corpses of wasps that have been burned apart and fallen and the corpses of wasps that have been smashed by bullets are piled up most. One foot is thick enough to reach the knee. That scene, IIf an attacker sends a large number of SYN requests with fake source addresses, the server side will consume a lot of resources to handle this semi-connection, and saving traversal will consume a lot of CPU time and memory, not to mention retrying SYN + ACK on IP in this list. The end result is that the server has no time to ignore the normal connection request-denial of service. If you look at the SYN_RECV status on the server with the netstat-an command, you can see that there are a large number of connection states that are "SYN_RECEIVED"Category division is specified through the Coding Matrix. There are many forms of coding matrix, the common ones are binary code and ternary code. The former specifies each class as a positive class and an inverse class respectively, while the latter can specify "disabled class" in addition to the positive and inverse classes. FIG. 3.5 shows a schematic diagram. In FIG. 3.5 (a), classifier f2 takes samples of Cl and C3 as positive examples and samples of C2 and C4 as counterexamples. In FIG. 3.5 (B), classifier f4 takes the samples of C1 and C4 as positive examples and the samples of C3 as counterexamples. In the decoding stage, the prediction results of each classifier are combined to form the code of the test example. The code is compared with the corresponding codes of various types, and the category corresponding to the code with the smallest distance is taken as the prediction result. For example, in Figure 3.5 (a), if based on the European distance, the prediction result will be C3.In fact, each design pattern is a very important idea, which looks very familiar. In fact, it is because what we have learned is involved. Although sometimes we don't know it, it is actually reflected everywhere in Java's own design, such as AWT, JDBC, collection class, IO pipeline or Web framework, in which design patterns are everywhere. Because of our limited space, it is difficult to talk about every design pattern in great detail, but I will try my best to write down the meaning clearly in the limited space and space so as to make everyone understand better. If there is no accident in this chapter, it should be the last talk of the design pattern. First of all, it should be the figure at the beginning of the previous article: