current location:Home > Technical Articles > Java
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- Priority Queues
- Priority queues can be implemented using heaps. An ordinary queue is a first-in, first-out data structure. Elements are appended to the end of the queue and removed from the beginning. In a priority queue, elements are assigned with priorities. When
- javaTutorial 1023 2024-07-20 09:01:10
-
- Bubble Sort
- A bubble sort sorts the array in multiple phases. Each pass successively swaps the neighboring elements if the elements are not in order. The bubble sort algorithm makes several passes through the array. On each pass, successive neighboring pairs are
- javaTutorial 477 2024-07-20 02:51:09
-
- LeetCode DayDynamic Programming
- 198. House Robber You are a professional robber planning to rob houses along a street. Each house has a certain amount of money stashed, the only constraint stopping you from robbing each of them is that adjacent houses have security systems co
- javaTutorial 678 2024-07-19 17:41:52
-
- Understanding Fall-Through in Java Switch-Case Statements
- In Java programming, the switch-case statement is a control structure used to execute one block of code among many based on the value of a variable. It can be more efficient and readable than using multiple if-else statements. One important concept t
- javaTutorial 443 2024-07-19 17:37:06
-
- Examples: Determining Big O
- This section gives several examples of determining Big O for repetition, sequence, and selection statements. Example 1 Consider the time complexity for the following loop: for (int i = 1; i
- javaTutorial 725 2024-07-19 17:32:30
-
- Authorization pitfalls: what does Keycloak cloak?
- Author: Valerii Filatov User authorization and registration are important parts of any application, not only for users but also for security. What pitfalls does the source code of a popular open-source identity management solution hide? How do they
- javaTutorial 582 2024-07-19 17:25:20
-
- Sorting
- Sorting algorithms are good examples for studying algorithm design and analysis. Sorting is a classic subject in computer science. There are three reasons to study sorting algorithms. First, sorting algorithms illustrate many creative approaches to
- javaTutorial 644 2024-07-19 14:39:58
-
- Item Prefer references to methods over lambdas
- Advantages of References for Methods Conciseness: References to methods are more concise than lambdas. Example: Increment value in a Map using merge: Lambda: (count, incr) -> count + incr Reference to method: Integer::sum B reduction
- javaTutorial 705 2024-07-19 14:02:39
-
- Reflection on items and the book
- Let's address the apparent contradiction between items 22 and 41 of the book: Item 22: “If you don't want to define a type, don't use an interface.” This item suggests that you shouldn't use interfaces for things that don't represent a real type or function.
- javaTutorial 1114 2024-07-19 13:46:08
-
- LeetCode Day Dynamic Programming Part 10
- 300. Longest Increasing Subsequence Given an integer array nums, return the length of the longest strictly increasing subsequence . Example 1: Input: nums = [10,9,2,5,3,7,101,18] Output: 4 Explanation: The longest increasing subsequence is [
- javaTutorial 285 2024-07-19 13:07:01
-
- New requestMatchers in Spring Security 6
- In Spring Security 6, the requestMatchers methods have replaced the deprecated antMatchers, mvcMatchers, and regexMatchers methods for configuring path-based access control. Here are the key points about the new requestMatchers: Use request
- javaTutorial 720 2024-07-19 12:18:31
-
- Bodiless loops in Java
- Concept In Java, a loop may not have an associated body because a null statement is syntactically valid. Utility Bodily loops can be used for operations that are completely handled in the loop expression. -Example of loop without co
- javaTutorial 595 2024-07-19 04:26:50
-
- Method security with @Secured Annotation in Spring
- This annotation provides a way to add security configuration to business methods. It will use roles to check if a user has permission to call this method. The annotation is part of spring security. So to enable its usage you need the spring security
- javaTutorial 698 2024-07-19 02:37:10
-
- What is DTO? Why use?
- Hello everyone, I'm Jean and I'm here to bring you an article about DTO. This is just theory, and there will be no practical code. I hope you enjoy it! Introduction DTO, or "Data Transfer Object," as the name suggests, is an obj
- javaTutorial 574 2024-07-19 00:56:23
-
- Pattern Matching for Switch in Java 21
- Pattern matching has been a highly anticipated feature in Java, bringing more power and flexibility to the language. Java 21 introduces pattern matching for switch statements, which simplifies the code and reduces boilerplate. Let's explore how this
- javaTutorial 323 2024-07-19 00:46:41