包含标签:Java 的文章
-
Strategy model of Java design pattern learning
Policy mode: policy mode is a method to define a series of algorithms. The work completed by the algorithms is the sam…… -
Read the configuration parameter instance in the XML file
paras. XML file SysParam.@ R_ 502_ 1713 @ file use Reference package required The above example of reading configurati…… -
Code example of Java crawling mailbox from the Internet
Web crawler: in fact, it is a program used to obtain data conforming to specified rules on the Internet. summary Jsup …… -
Several ways to implement action in struts 2
Action is used to process user requests, so it is also called business controller. Each action class is a work unit. T…… -
Quickly understand hibernate configuration files and mapping files
Hibernate is a thorough ORM (object relational mapping) open source framework. Let's take a look at the high-level vie…… -
Preventing unlisted users from operating — a simple implementation based on struts 2 interceptor
Generally, our web applications are allowed to operate only after the user logs in, that is, we do not allow non login…… -
Factory method pattern for Java design pattern learning
Factory method: define an interface for creating objects, and let subclasses decide which class to instantiate. Factor…… -
The Jackson entity turns JSON to null or empty and does not participate in serialization (example explanation)
When using Jackson for serialization, we often encounter that the attribute of an entity object in the background is n…… -
Explain in detail how JSTL in Java Web circulates map data in list
Explain in detail how JSTL in Java Web circulates map data in list The first way: 1: Background code (test) 2: Front p…… -
Java implementation of two-dimensional array to JSON method example
This paper describes the method of converting two-dimensional array to JSON in Java. Share with you for your reference…… -
Java implementation of web page verification code function
This example shares the implementation code of Java Web page verification code for your reference. The specific conten…… -
Futuretask source code analysis (recommended)
Futuretask only implements the runnablefuture interface: @ h_ 404_ 1@ This interface inherits Java Lang. runnable and …… -
Java thread safe counter simple implementation code example
In the past few days, a business code needs a variable to increase from 1 every day. To this end, I simply encapsulate…… -
Influence of synchronized method on non synchronized method
StringBuilder is a thread unsafe class. StringBuffer is thread safe because its methods are synchronized. Today, I wro…… -
Simple definition and usage example of Java two-dimensional array
This article describes the simple definition and use of Java two-dimensional array. Share with you for your reference,…… -
Loading order and execution results of classes in Java
The specific code is as follows: Execution results: Static method of parent class 2 static initialization block subcla…… -
Struts 2 interceptor about solving login problems
The working principle of the interceptor is shown in the figure. Each action request is wrapped in a series of interce…… -
Java programming uses stack to solve the code example of Hanoi Tower problem (non recursive)
[title] The tower of Hanoi is a classic problem. Here is a modification of the rules of the game: now the restrictions…… -
Example of Java output printing tool class encapsulation
When you print out Java and view the field value, you feel that you have written system. Net every time out. After pri…… -
Kryo framework usage code example
Source of kryo framework has been moved to https://github.com/EsotericSoftware/kryo , enter this page, and then click …… -
Implementation methods of several common comparators in Java
In Java, the sorting of object arrays is often involved, so it involves the comparison between objects. Generally, the…… -
Mybatis L2 cache implementation code
L2 cache needs to be manually configured and enabled, as follows: Set enable L2 cache / mybatis02 / config / mybatis-c…… -
Learning and using servlet listener (3)
This article shares the specific learning contents of servlet listener for your reference. The specific contents are a…… -
Common problems based on Multithreading concurrency (detailed explanation)
I. overview 1.volatile Ensure that once the shared data is modified, it will be synchronized to the shared memory (hea…… -
Implementation code of readwritelock read-write separation of Java multithreading
In multithreaded development, there is often a situation where we want to separate reading and writing. For the read a…… -
Use recursion to delete all child nodes of the tree structure (Java and MySQL Implementation)
1. Business scenario It has the following tree structure: + - 0 + - 1 + - 2 + - 4 + - 5 + - 3 If you delete a parent n…… -
Explain in detail the spring boot + mybatis + freemaker framework built in MyEclipse
1. Create a maven project in MyEclipse. File>New>Maven Project: Check the red part in the figure and click next…… -
Example of httpclient implementation calling external project interface tool class
Examples are as follows: The above example of httpclient calling external project interface tool class is all the cont…… -
Java code for connecting to MySQL database
This example shares the specific code of Java connecting to MySQL database for your reference. The specific contents a…… -
Switching of multiple data sources in Java automated testing (example explanation)
Data driven is a very important concept in automated testing. When the data is separated from the script, in the face …… -
On the advanced usage of JUnit 4 unit testing
JUnit unit test framework is a necessary test tool for Java program development. Now JUnit 4 is the most commonly used…… -
Use of httpclient in HTTP protocol interface test (detailed explanation)
In the interface test of HTTP protocol, get request and post request are most used. The post request includes form par……