Java
-
Summary of network communication (TCP communication, UDP communication, multicast and NiO) of java basic knowledge
Summary of network communication based on Java In this article, we mainly discuss how to use java to realize network c…… -
Java simulation wechat grab red envelope example code
Java simply simulates the wechat red envelope grabbing function. In this example, 10 people grab a red envelope of 100…… -
Basic knowledge of JavaBean and common garbled code solutions
Basic knowledge of JavaBean and common garbled code solutions The garbled code problem should be a problem encountered…… -
Detailed explanation of split () method example of Java regular expression
This article illustrates the split () method of Java regular expressions. Share with you for your reference, as follow…… -
An example analysis of Chinese regular matching method in Java
This paper describes the method of Java regular matching Chinese. Share with you for your reference, as follows: 1. Ma…… -
Java using POI to operate Excel files
1、 Definition of poi There are two mainstream toolkits for operating excel in Java: JXL and poi. JXL can only operate…… -
Java regular expression determines whether the string contains Chinese examples
preface In daily development and programming, we sometimes get some input information from users. For specific applica…… -
A simple example of intercepting and dividing string in Java
At present, there are three forms: It can be selected and used according to actual needs Operation results: The above …… -
Example of a method for Java to get numbers in a string through regular expressions
preface This article uses a small example to learn how to obtain numbers in a string through regular expressions in Ja…… -
On the loss of digital accuracy in Java object to JSON
phenomenon Large numbers in Java, such as 18 / 19 bit integers (long), are converted into JSON. After they are output …… -
Detailed explanation of JDBC connection database in Java
1、 Concept 1. In order to enable the program to operate the database and operate the tables in the database, each dat…… -
Detailed explanation of Hibernate naming strategy
The naming strategy of Hibernate can reduce the maintenance of database identifier naming and further reduce the amoun…… -
Inheritance of Java person, student and goodstudent and execution of constructor
There are three classes: person, student and goodstudent. Among them, student inherits person and goodstudent inherits…… -
Spring implements scheduled tasks with squertz
preface Speaking of scheduled tasks, the development partners must be familiar. Some things always need computers to c…… -
Implementation of SQL batch modification method in mybatis
In the project, I met the function that needs batch update. I originally wanted to use circular access to the database…… -
On java object-oriented (Abstract inheritance interface polymorphism)
What is inheritance? When the same attributes and behaviors exist in multiple classes, these contents are extracted in…… -
Summary of knowledge points of HashMap in JDK7
Several important variables in HashMap The default initial capacity must be the nth power of 2 The maximum capacity is…… -
Common exception classes in Java
1. java. lang.nullpointerexception We must often encounter this exception. The explanation of the exception is that "t…… -
Detailed explanation of Java data structure (linear table)
Chain storage and implementation of linear list Another way to realize the linear table is chain storage, that is, tho…… -
Java socket file transfer example code
Recently, I became addicted to learning socket, so I wrote a simple file transfer program. Client design idea: the cli…… -
Analysis of several cases of thread death in Java
The java thread conference ends in the following three ways, and is in a dead state after it ends 1. The execution of …… -
Java uses the nesting of conditional operators to complete the division of academic achievement
Title: use the nesting of conditional operators to complete this question: students with academic achievement > = 9…… -
Analysis of spring configuration file
Overview of spring configuration files brief introduction The spring configuration file is a "drawing" used to guide t…… -
Example of generating excel report file with Java
This simple operation will export data from the database, generate excel report and import Excel data into the databas…… -
Spring integrates the simple configuration method of quartz
However, it is rarely used directly in practical work. Spring quartz components are usually used, which can be automat…… -
Java image and byte array mutual conversion instance
Examples are as follows: File parsing: Fileimageoutputstream changed to fileoutputstream fileimageinputstream changed …… -
Explain the simple packaging and use of MySQL in detail
Source address https://github.com/YouXianMing/MySQL-Example Make sure your MySQL is running One of the database files …… -
Removing HTML tags from regular expressions in Java
The regular expression in Java removes the HTML tag, which is mainly used to display the content more accurately. For …… -
Detailed explanation of classreader, classvisitor and classwriter for ASM source code learning
ASM ASM is Java is a popular class library for reading script code, which is used to analyze and convert code based …… -
Comparison of several common thread pools in Java
1. Why use thread pool Many server applications, such as web servers, database servers, file servers, or mail servers,…… -
Java JSON does not generate null or empty string attributes (detailed explanation)
We usually use Java objects to convert JSON strings. Null or empty string attributes do not need to be generated into …… -
Detailed explanation of finding duplicate data instances in Java list
Detailed explanation of finding duplicate data instances in Java list Requirements: Find all duplicate data in a list ……