Recent Posts
-
Tutorial for installing JS code tips for MyEclipse (socket plug-in)
Recently, a lot of JS needs to be used for development, but the JS editor provided by MyEclipse 2014 has no function o…… -
Java background folder file traversal complete code
1、 There are two ways to traverse all files in a folder in Java: 1. Recursive traversal is usually the first method t…… -
200 lines of Java code to write a calculator program
I found a calculator applet written in college and a graphical interface that can graphically display the expression s…… -
Application notes of java reflection in practical work
Recently, I encountered such a problem in my work: Make a test tool for all interfaces in a project, using Java Swing …… -
Learning Java Memory Model JMM experience
Sometimes, the optimization of compiler and processor will cause the runtime to be different from what we think. There…… -
Form drag and stretch based on swing
This paper shares the specific code of swing to realize form drag and stretch for your reference. The specific content…… -
Javacv uses ffmpeg to play audio and video synchronously
Recently, the ffmpegframegrabber frame catcher of the ffmpeg package of javacv played the captured audio frames and vi…… -
Analysis of the reason why JavaWeb dbutils cannot find the content when executing SQL commands and traversing the result set
The reason why JavaWeb dbutils cannot find the content when executing SQL command and traversing the result set and th…… -
Java IO stream reads pictures for foreground display code sharing
Recently, the project needs to use the IO stream to read pictures to provide foreground page display. In the past, the…… -
Java uses XOR operation to realize simple encryption and decryption algorithm example code
Java simple encryption and decryption algorithm, using XOR operation Example 1: Example 2 summary The above is all abo…… -
Java language describes the correct implementation of redis distributed lock
Distributed locks are generally implemented in three ways: 1 Database lock; 2. Redis based distributed locks; 3. Distr…… -
Detailed analysis of Java comparison problems
The comparison problem in Java is a very basic and confusing problem. Today, I will summarize and sort out several err…… -
Introduction and example summary of Java programming reflection mechanism
This article illustrates the usage of Java programming reflection mechanism. Share with you for your reference, as fol…… -
Maven based SSM framework integration example code
Basic concepts 1.1、Spring Spring is an open source framework. Spring is a lightweight java development framework risi…… -
Java calling DLL method summary
JNI and jnative are commonly used. Note: when Java calls DLL, corresponding processing must be done in DLL. Columns su…… -
Java programming file traversal of the specified number of layers of traversal, detailed code
Traversal is to access each element once For example, in a binary tree, traversing the binary tree means that each ele…… -
Xiaobai tutorial! JDK installation and configuration method on Linux server
This example shares the JDK installation and configuration method on Linux for your reference. The specific contents a…… -
Detailed explanation of the difference between hibernate urgent connection and ordinary connection
The difference between hibernate connection and ordinary connection The relevant introduction and explanation have bee…… -
Java uses Apache toolset to realize FTP file transfer code explanation
This article mainly introduces how to upload and download files to the FTP server using the FTP tool provided by Apach…… -
Java programming implementation of hexadecimal string XOR operation code example
I haven't written a blog for a long time. I feel so busy in the last year. I can't finish all kinds of work. I believe…… -
MyEclipse + Tomcat + Maven + SVN project complete environment construction (Graphic tutorial)
This time, I changed a computer, so I need to reconfigure the project development environment. All kinds of in the pro…… -
On the urgent loading problem of Hibernate (multiple foreign key Association)
The database structure is as follows Foreign key member in strategy_ ID (associated member table) foreign key strategy…… -
Spring security custom authentication login process record
Spring security usage categories: I believe Baidu knows how to use spring security. There are four kinds of usage, fro…… -
Java basics essay
1. Basic concepts IO is the process of copying data from main memory and external devices (hard disk, terminal, networ…… -
Example explanation of Lucene’s implementation of index and query
0 Introduction With the development of the world wide web and the advent of the era of big data, a large amount of dig…… -
Swing jtextarea scroll bar and text zoom effect
This example shares the specific code of swing jtextarea scroll bar and text scaling for your reference. The specific …… -
On the urgent loading problem of Hibernate (multiple foreign key Association)
The database structure is as follows Foreign key member in strategy_ ID (associated member table) foreign key strategy…… -
Modify the fully qualified name resolution of the class during JDK deserialization
Application scenario Spring security oauth2 has a wonderful design, that is, it will work with access_ All the attribu…… -
Java programming for dynamic compilation, loading and code sharing
sketch This class uses javax tools. The javacompiler provided by toolprovider compiles, uses IO files and NiO files to…… -
Java reflection to get an object attribute value code analysis
Sometimes you know what's inside the object, but for various reasons, you can't convert it into an object. You just wa…… -
Installation and application of Java rocksdb
Rocksdb is an embeddable and persistent key value store. The following introduction comes from the Chinese official we…… -
Detailed explanation of java search function code
First of all, we need to make it clear that the conditional search based on keywords in the search box sends a get req……