包含标签:Java 的文章
-
Deep understanding of spring AOP
I preface In previous projects, I seldom paid attention to the specific implementation and theory of spring AOP. I jus…… -
Composite of Java design patterns
summary It is a structural mode, which organizes objects in a tree structure to represent the "part whole" hierarchy, …… -
Writing method and simple use of mybatis configuration file
First meeting mybatis At first, Apache had an open source project of Batis, which was put in Google Code. Later, it wa…… -
Java IO is an example of computer search and deletion
I Recursive method @ h_ 301_ 4@ 1. Recursion is to call its own method on the premise that there is a method. 2. Recur…… -
Java Web export data to PDF format file code snippet
The effect of this clip is: after accessing this request, the browser will open a new interface and display the PDF fi…… -
Play spring boot with angularjs and JDBC (4)
Refer to official examples: http://spring.io/guides/gs/relational-data-access/ -
Example code of mybatis interceptor for processing query parameters and query results
Now let's introduce the query parameters and query results processed by mybatis interceptor. The specific code is as f…… -
Solve the problem of Java Lang.exceptionininitializererror error problem
Solve the problem of Java Lang.exceptionininitializererror error problem Start a project today An error is reported wh…… -
Design of Java Web personal address book system
Now start the screenshot: Paste the code below: The first is the directory structure: index. jsp <%@ page language=…… -
Explain in detail how Java obtains the file encoding format
1: Simply judge whether it is UTF-8 or not. Because it is generally GBK except UTF-8, it is set to GBK by default@ H_ …… -
Detailed explanation of encryption and decryption function implemented by Java based on DES symmetric encryption algorithm
This paper describes the encryption and decryption function of Java based on DES symmetric encryption algorithm. Share…… -
Detailed explanation of Java backend to realize unified code scanning payment: wechat
Recently I finished a project and just had nothing to do. The product manager arranged a task for me. Make a function …… -
Detailed explanation and examples of Java statement block
Java statement block I still remember when I first read the programming books of C, C + + and Java, there was an intro…… -
Java encryption and decryption function example based on AES symmetric encryption algorithm
This paper describes the encryption and decryption function of Java based on AES symmetric encryption algorithm. Share…… -
Detailed explanation of three methods of converting list into map in Java
Detailed explanation of three methods of converting list into map in Java In this article, we introduce three methods …… -
Detailed explanation of symmetric encryption using Java (DES, 3DES, AES)
There are two sentences: 1) Algorithms and data structures are an important part of programming. If you lose algorithm…… -
Deep understanding of spring multi data source configuration
We often encounter the problem of multiple data sources in projects, especially in projects such as data synchronizati…… -
Java decimal to binary, octal, hexadecimal string
Decimal to binary class DecToBin { public static void main(String[] args) { //System.out.println("Hello Worl…… -
Collection of Java interview questions and answers (122 basic questions and 19 code questions)
A collection of java basic interview questions and answers (122 basic questions and 19 code questions). The details ar…… -
Detailed explanation of Java chart class library
abstract In the development of background sites using Java, chart and report functions are indispensable. This paper r…… -
Explain in detail the simple addition, deletion and modification through JDBC (take MySQL as an example)
Foreword: what is JDBC Java database connectivity (JDBC) is an application program interface used in the Java language…… -
Java implementation traverses all files under the folder (recursive call and non recursive call)
Java traverses all files under the folder (recursive call and non recursive call) 1. Do not use recursive method calls…… -
Example code of Excel file upload and download based on spring MVC
Recently, I encountered a demand. I need to download the excel template, upload it for analysis and store it in the da…… -
Introduction and wonderful use of absolute value function in Java
1、 Instructions for absolute value function The absolute value function is math in JDK Java implementation method, wh…… -
Explain in detail the Chinese garbled code problem of JSON data returned by spring mvc3 and solve it
After checking some information on the Internet, I feel more complicated. Here, I use two very simple methods to solve…… -
Explain in detail how to use redis setnx command to realize distributed lock
Distributed locks can be implemented by using the setnx command of redis. The implementation method is described below…… -
Java thread explanation and the difference between thread and process
@H_ 419_ 1@java Thread explanation and the difference between thread and process @H_ 419_ 1@1. Process and thread Each…… -
Java code development specification
I Development tool specification: 1. The development tools shall be uniformly determined after debugging by the projec…… -
Java determines whether two objects are the same object instance code
Java determines whether two objects are the same object Reference addresses are compared with "= =" and values are com…… -
How to solve mybatis — Java lang.IllegalArgumentException: Result Maps collection already contains value for X
In the past two days, the project needs to integrate the three frameworks of spring, struts 2 and mybatis, but this er…… -
Example of conversion between JSON and objects and collections
Conversion of JSON string and Java Object [JSON lib] During the development process, it is often necessary to exchange…… -
Example of AES secret key generation algorithm implemented in Java
This paper describes the AES secret key generation algorithm implemented in Java. Share with you for your reference, a……
