Java
-
Two ways of creating threads in Java multithreading and comparative code examples
1. Concept of thread: thread refers to the execution flow of a task from beginning to end. Thread provides a mechanism…… -
Java popular written test questions sorting
Xiaobian has sorted out the very popular written interview questions in 2017 for the friends interviewing Java program…… -
JDK1. 7 implementation method of uploading and deleting files through Java FTP
Examples are as follows: 2. Constant class, system path separator 3. FTP link configuration properties file, including…… -
Timeout summary of components in spring cloud
preface Spring cloud is a complete set of framework for implementing microservices based on spring boot. It provides c…… -
Simple exploration of the working principle of spring
1. Spring principle The core of the internal is IOC, dynamic injection, so that an object can be created without new a…… -
Description of common spring configuration and parsing classes
There are many articles on spring MVC configuration usage, but the specific description is not clear. Here we mainly i…… -
Java programming swing circular button example code
Swing is a GUI toolkit designed for Java. Swing is part of the Java foundation class. Swing includes graphical user in…… -
The method of accessing files by using the files tool class and path interface of Java 7
In the Java version of date, files are accessed through the file class, but the operation of the file class is limited…… -
Maven uses Tomcat plug-in to deploy remote Linux server
preface This article mainly introduces Maven's deployment of remote Linux server by using Tomcat plug-in, and shares i…… -
Example of filtering sensitive words and advertising words by DFA algorithm in Java
1、 Foreword The development often needs to deal with the submission of some words from users, so it involves the func…… -
Understand session in Java
Let's take a look at a better description of session: A session is a session that can save user information without cl…… -
Error unsupported major when starting Tomcat Solution to minor version XXX
Recently, the project updated the JDK from 1.7 to 1.8. After downloading and installing the new JDK, when compiling an…… -
An example analysis of the longest common subsequence problem (LCS) of Java algorithm
This paper describes the longest common subsequence problem (LCS) of Java algorithm. Share with you for your reference…… -
Complete example of weight random algorithm implemented in Java language
preface Now apps are springing up, whizzing out. Experienced, inexperienced, qualified and unqualified people want to …… -
Java extracts code examples of the same and different elements in 2 collections
The sample code implementation shared in this article extracts the same and different elements in two collections Here…… -
70 lines of Java code to realize deep neural network algorithm sharing
For the popular in-depth learning, it is necessary to maintain the learning spirit - programmers, especially architect…… -
Detailed explanation of preflight request and cross domain problems in spring security
Spring Security Spring security is a security framework that can provide a comprehensive security access control solut…… -
Java programming depth first traversal and connected component code example
Depth first traversal Depth first traversal is similar to a person walking a maze: As shown in the figure, select an e…… -
Java programming implementation of user based collaborative filtering recommendation algorithm code example
Collaborative filtering is simply to use the preferences of a group with similar interests and common experience to re…… -
The spring boot application realizes the process of building, running and publishing through docker
1. Docker introduction Docker is an open source application container engine, which allows developers to package their…… -
Example of ticket selling in Java multithreaded window
This paper introduces two ways to realize multi window ticket selling by multithreading, which are synchronized and lo…… -
Code example of dense graph represented by adjacency matrix in Java programming
We know that to represent nodes, we can use a one-dimensional array. However, for the relationship between nodes, we c…… -
Code example of Kruskal algorithm based on undirected weighted graph in Java language
The so-called weighted graph means that each edge in the graph will have a corresponding value or group of values. Usu…… -
Java image color scale adjustment and brightness adjustment code example
I don't know much about the content of java image processing, and my words are simple. Please forgive me. Java to achi…… -
Java serial communication implementation process example
1. Download the 64 bit rxtx for Java link: http://fizzed.com/oss/rxtx-for-java 2. Unzip the downloaded package and put…… -
Detailed explanation of generic instances in Java
I. Introduction: In Java se 1 5. Before that, in the absence of generics, the "arbitrary" of parameters was realized b…… -
App backend session information management instance imitating J2EE session mechanism
This article only provides ideas and does not provide specific and complete implementation (bloggers are too lazy to s…… -
Java implementation of scheduled tasks in Web Applications (example explanation)
Scheduled task is the function of specifying a future time range to execute a certain task. In current web application…… -
Detailed explanation of spring boot Linux startup mode
Foreground start Background start Difference: the foreground starts Ctrl + C to close the program, while the backgroun…… -
Java thread deadlock code example
Deadlock is an error at the operating system level. It is the abbreviation of process deadlock. It was first proposed …… -
Problems and solutions of time zone conversion to daylight saving time based on Java
I Preparation knowledge 1.America/New_ The daylight saving time in York is as follows: left not right 2016-3-13,02:00:…… -
Detailed explanation of the front and rear end separation and consolidation scheme of spring boot + Vue
The combination of springboot and Vue mainly includes the following two schemes on the network: 1. [not recommended] t……