Java
-
Several algorithms of Java symmetric encryption are implemented respectively
Java symmetric encryption is implemented using DES / 3DES / AES algorithms There are two sentences: 1) Algorithms and …… -
Delete element instance code in linked list of Java data structure
Java delete elements in linked list The following example demonstrates using the clear() method to delete elements in …… -
Summary of six principles and one rule of java object-oriented
1. Single responsibility principle: one kind only does what it should do. 2. Richter substitution principle: a subclas…… -
Java sorts list collections sort()
Sort the objects in a collection, and sort them in ascending or descending order according to the size of an indicator…… -
Explain in detail that the Java client can’t link to the redis solution
Problem Description: 1.Could not get a resource from the pool,Connection refused: connect The windows java client link…… -
Detailed explanation of XML configuration in mybatis
Mybatis commonly uses XML configurations with caching disabled Mybatis is fully configured as follows: Mybatis officia…… -
JDBC connection to Oracle database function example
This paper describes the function of JDBC linking Oracle database. Share with you for your reference, as follows: I ho…… -
Detailed introduction and summary of java reflection mechanism knowledge
This article will describe the knowledge of reflection from the following aspects: 1、 What is a class In the object-o…… -
Implementation of Java websocket and sample code of spring websocket
Start learning websocket, and prepare to use it to realize a log that outputs log4j in real time on the page and the l…… -
Deep analysis of Java disassembly box
Let's start with a code: Guess what? Many people will think that the results are all true, but that's not the case tru…… -
Calculates the maximum public substring of two strings
background There has been little application of algorithms. Recently, I saw some typical algorithms and wanted to prac…… -
Method of parsing excel file with Java
The POI package needs to be imported before the project is established. Download address of POI related jar package: h…… -
Deep understanding of spring AOP
I preface In previous projects, I seldom paid attention to the specific implementation and theory of spring AOP. I jus…… -
Composite of Java design patterns
summary It is a structural mode, which organizes objects in a tree structure to represent the "part whole" hierarchy, …… -
Writing method and simple use of mybatis configuration file
First meeting mybatis At first, Apache had an open source project of Batis, which was put in Google Code. Later, it wa…… -
Java IO is an example of computer search and deletion
I Recursive method @ h_ 301_ 4@ 1. Recursion is to call its own method on the premise that there is a method. 2. Recur…… -
Java Web export data to PDF format file code snippet
The effect of this clip is: after accessing this request, the browser will open a new interface and display the PDF fi…… -
Play spring boot with angularjs and JDBC (4)
Refer to official examples: http://spring.io/guides/gs/relational-data-access/ -
Example code of mybatis interceptor for processing query parameters and query results
Now let's introduce the query parameters and query results processed by mybatis interceptor. The specific code is as f…… -
Solve the problem of Java Lang.exceptionininitializererror error problem
Solve the problem of Java Lang.exceptionininitializererror error problem Start a project today An error is reported wh…… -
Design of Java Web personal address book system
Now start the screenshot: Paste the code below: The first is the directory structure: index. jsp <%@ page language=…… -
Explain in detail how Java obtains the file encoding format
1: Simply judge whether it is UTF-8 or not. Because it is generally GBK except UTF-8, it is set to GBK by default@ H_ …… -
Detailed explanation of encryption and decryption function implemented by Java based on DES symmetric encryption algorithm
This paper describes the encryption and decryption function of Java based on DES symmetric encryption algorithm. Share…… -
Detailed explanation of Java backend to realize unified code scanning payment: wechat
Recently I finished a project and just had nothing to do. The product manager arranged a task for me. Make a function …… -
Explain the implementation of Java websocket and spring websocket in detail
Start learning websocket, and prepare to use it to realize a log that outputs log4j in real time on the page and the l…… -
Spring integrates TimerTask to realize scheduled task scheduling
I preface Recently, timed tasks have been used in the company's projects. This blog will summarize the timed tasks of …… -
Method of dynamically adding view in Java
In general, most of us write the layout directly in XML files, but sometimes we need to add the layout dynamically wit…… -
After the Java date is installed as an English string, the solution to date cannot be switched back
This is a problem encountered by colleagues. The date in the code is placed on the page in the format of "fri Mar 21 0…… -
Detailed explanation of spring MVC interceptor to realize session control
If you are not logged in, you are not allowed to access the page in the background folder. How do you determine whethe…… -
Java paging tool class and its use (sample sharing)
Pager. java Use pagertester java The above is the whole content of this article. I hope the content of this article ca…… -
The example explains in detail the conversion between java image and Base64 string
There's no more nonsense. I'll directly post the conversion code between java image and base84 string. The specific co…… -
Rules for Java data types
Rules for data types Select the appropriate data type to store. For example, it is used to store the age. Its value ca……