Summary of Java Day 20
1.Set
1.1 Hash list
Hash List: You can understand that saving elements in an array is a chain table Time-key-value pairs (K and V) saved in a Hash list The hashCode:hash algorithm, which changes variable-length data to fixed-length data, is a secure encryption algorithm but does not guarantee uniqueness. If the same object generates ha ...
Posted by bufo on Mon, 25 Oct 2021 09:27:48 -0700
Integrated Shiro framework for SpringBoot basic learning (Part 2)
preface:
Hello, guys, I'm running snail rz. Of course, you can call me snail Jun. I'm a rookie who has studied Java for more than half a year. At the same time, I also have a great dream, that is, to become an excellent Java Architect one day.
This SpringBoot basic learning series is used to record the whole process of learning the ...
Posted by wrapper on Mon, 25 Oct 2021 07:56:13 -0700
UVM practice volume I learning notes 9 - sequence in UVM
sequence related macro and its implementation
uvm_do series macro
uvm_do series macros mainly include the following 8:
`uvm_do(SEQ_OR_ITEM)
`uvm_do_pri(SEQ_OR_ITEM, PRIORITY)
`uvm_do_with(SEQ_OR_ITEM, CONSTRAINTS)
`uvm_do_pri_with(SEQ_OR_ITEM, PRIORITY, CONSTRAINTS)
`uvm_do_on(SEQ_OR_ITEM, SEQR)
`uvm_do_on_pri(SEQ_OR_ITEM, SEQR, PRIORI ...
Posted by Jene200 on Mon, 25 Oct 2021 07:37:41 -0700
Design mode 4 decorator mode
definition
Decorator Pattern is to dynamically attach responsibilities to objects. To extend functionality, decorators offer a more flexible alternative than inheritance—— HEAD First design pattern
Main role
Abstract decorated Component: the most primitive object that needs to be decorated. Such as the coverage class (super ...
Posted by chawezul on Mon, 25 Oct 2021 07:33:52 -0700
[the strongest in the whole network] python function
Welcome to the column [the strongest in the whole network] Python system learning manual
catalogue
1, Introduction to functions
2, Parameters of function
3, Local function (nesting of functions)
4, Advanced content of functions
5, Local functions and lambda
1, Introduction to functions
1. Conce ...
Posted by KingWylim on Mon, 25 Oct 2021 07:24:53 -0700
Code implementation of AES encryption algorithm
Code implementation of AES encryption algorithm
Job objectives
The AES encryption algorithm is implemented in C language and optimized to the fastest speed.
Algorithm description
Introduction to AES
AES (Advanced Encryption Standard) is the most common symmetric encryption algorithm, also known as Rijndael encryption method. It is a block ...
Posted by trazan on Mon, 25 Oct 2021 07:18:14 -0700
Java from introduction to actual combat Summary - 4.4, JDBC
Java from introduction to actual combat Summary - 4.4, JDBC
1. Introduction
JDBC (Java database connectivity) is a Java API for executing SQL statements. It can provide unified access to a variety of relational databases. It is composed of a group of classes and interfaces written in Java language. JDBC provides a benchmark by which mor ...
Posted by scottrad on Mon, 25 Oct 2021 07:15:04 -0700
Recognition of C language
catalogue
Sentence classification in C language
Branch statement (select structure)
1, if... else statement
2, switch statement
summary
Sentence classification in C language
Expression statementFunction call statementControl statementCompound statementEmpty statement
All statements in C language end with a semico ...
Posted by legohead6 on Mon, 25 Oct 2021 06:57:30 -0700
I don't know about Nginx thread pool yet. I'll get you started this time [novice collection recommended]
Nginx solves the c10k problem by using multiplexing IO Technology (such as epoll of Linux, kqueue of FreeBSD, etc.), but the premise is that the request of nginx cannot have blocking operation, otherwise the whole nginx process will stop serving. However, blocking is inevitable in many cases. For example, when a client requests a static file, d ...
Posted by murtoz on Mon, 25 Oct 2021 06:56:01 -0700
Oracle database statistical experiment
This experiment comes from Oracle developer performance lesson 2: Module 2: What are Database Statistics? It is a repetition and interpretation of this experiment.
First, create two tables for the experiment, namely bricks and colors, and generate statistical information:
-- According to document Database Reference,statistics_level The defau ...
Posted by ptolomea on Mon, 25 Oct 2021 06:34:28 -0700