Java
-
Detailed explanation of symmetric encryption using Java (DES, 3DES, AES)
There are two sentences: 1) Algorithms and data structures are an important part of programming. If you lose algorithm…… -
Deep understanding of spring multi data source configuration
We often encounter the problem of multiple data sources in projects, especially in projects such as data synchronizati…… -
Java decimal to binary, octal, hexadecimal string
Decimal to binary class DecToBin { public static void main(String[] args) { //System.out.println("Hello Worl…… -
Collection of Java interview questions and answers (122 basic questions and 19 code questions)
A collection of java basic interview questions and answers (122 basic questions and 19 code questions). The details ar…… -
Detailed explanation of Java chart class library
abstract In the development of background sites using Java, chart and report functions are indispensable. This paper r…… -
Explain in detail the simple addition, deletion and modification through JDBC (take MySQL as an example)
Foreword: what is JDBC Java database connectivity (JDBC) is an application program interface used in the Java language…… -
Java implementation traverses all files under the folder (recursive call and non recursive call)
Java traverses all files under the folder (recursive call and non recursive call) 1. Do not use recursive method calls…… -
Example code of Excel file upload and download based on spring MVC
Recently, I encountered a demand. I need to download the excel template, upload it for analysis and store it in the da…… -
Introduction and wonderful use of absolute value function in Java
1、 Instructions for absolute value function The absolute value function is math in JDK Java implementation method, wh…… -
Summary of six principles and one rule of java object-oriented
1. Single responsibility principle: one kind only does what it should do. 2. Richter substitution principle: a subclas…… -
Several algorithms of Java symmetric encryption are implemented respectively
Java symmetric encryption is implemented using DES / 3DES / AES algorithms There are two sentences: 1) Algorithms and …… -
Delete element instance code in linked list of Java data structure
Java delete elements in linked list The following example demonstrates using the clear() method to delete elements in …… -
Summary of six principles and one rule of java object-oriented
1. Single responsibility principle: one kind only does what it should do. 2. Richter substitution principle: a subclas…… -
Java sorts list collections sort()
Sort the objects in a collection, and sort them in ascending or descending order according to the size of an indicator…… -
Explain in detail that the Java client can’t link to the redis solution
Problem Description: 1.Could not get a resource from the pool,Connection refused: connect The windows java client link…… -
Detailed explanation of XML configuration in mybatis
Mybatis commonly uses XML configurations with caching disabled Mybatis is fully configured as follows: Mybatis officia…… -
JDBC connection to Oracle database function example
This paper describes the function of JDBC linking Oracle database. Share with you for your reference, as follows: I ho…… -
Detailed introduction and summary of java reflection mechanism knowledge
This article will describe the knowledge of reflection from the following aspects: 1、 What is a class In the object-o…… -
Implementation of Java websocket and sample code of spring websocket
Start learning websocket, and prepare to use it to realize a log that outputs log4j in real time on the page and the l…… -
Deep analysis of Java disassembly box
Let's start with a code: Guess what? Many people will think that the results are all true, but that's not the case tru…… -
Calculates the maximum public substring of two strings
background There has been little application of algorithms. Recently, I saw some typical algorithms and wanted to prac…… -
Method of parsing excel file with Java
The POI package needs to be imported before the project is established. Download address of POI related jar package: h…… -
Deep understanding of spring AOP
I preface In previous projects, I seldom paid attention to the specific implementation and theory of spring AOP. I jus…… -
Composite of Java design patterns
summary It is a structural mode, which organizes objects in a tree structure to represent the "part whole" hierarchy, …… -
JAVA memory structure and data type
JAVA memory structure Memory is a temporary storage of data. Its storage speed is very fast, but it is temporary stora…… -
Detailed explanation of the difference between Java array and ArrayList
The difference between Java array and ArrayList 1) Incisive exposition: You can think of ArrayList as an "array that a…… -
Redis of Java (spring data redis integration)
1. Integrate with spring data redis POM used in the project xml: Except for the log part, there is only one spring co…… -
Instance resolves the Java date format tool class dateutil java
If you don't have much to say, please see the code: DateUtil. java Test use DateUtilTester. java The above is the whol…… -
Wechat public account development – example of creating custom menu and menu event response
The user-defined menu of wechat development public platform needs to spend money for authentication. If you don't want…… -
Play with spring boot MVC application (2)
How to quickly build an MCV program? Refer to the official example of spring: https://spring.io/guides/gs/serving-web-…… -
A case study of using spring AOP to realize read-write separation of MySQL database (with demo)
1、 Foreword The read-write separation strategy of database in distributed environment is a key solution to solve the …… -
Analysis of Java method for counting the number of string words
In some projects, it may be necessary to count the words in a string. I wrote a simple demo here, which can be taken b……