HashTable实例 public class HashTable_msg { public HashTable_msg() { String sum_sql="select mobilenum,count(*) from SJSJ_Msg where (left(in_date,6)=(select left(CONVERT(varchar(12) , getdate(), 112 ),6)))group by mobilenum" Hashtable<String,Integer> ht = new Hashtable<String,Integer>() try{ ResultSet rs= DBAccess.getInstance().select(sum_sql) while(rs!=null) { ht.put(rs.getString(1),rs.getInt(2)) rs.next() } } catch (Exception e) { Logs.printError(e) } } }
标签: HashTable_msg public HashTable sum_sql
上传时间: 2014-12-07
上传用户:a6697238
Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair
标签: monoalphabetic Playfair provides security
上传时间: 2017-05-25
上传用户:变形金刚
Heapsort 1.A heap is a binary tree satisfying the followingconditions: -This tree is completely balanced. -If the height of this binary tree is h, then leaves can be at level h or level h-1. -All leaves at level h are as far to the left as possible. -The data associated with all descendants of a node are smaller than the datum associated with this node. Implementation 1.using a linear array not a binary tree. -The sons of A(h) are A(2h) and A(2h+1). 2.time complexity: O(n log n)
标签: followingconditions tree completely satisfying
上传时间: 2017-05-25
上传用户:2467478207
If you have ever wanted to store data temporarily in your Delphi Win32/.Net, C++ Builder or Kylix application, and you at the same time wanted full access to the data as if they were stored in a database table, you have the right solution here. kbmMemTable is a full TDataset compatible in memory table loaded with functionality.
标签: temporarily Builder Delphi wanted
上传时间: 2017-05-29
上传用户:ljt101007
Novell.Press.Linux.Kernel.Development linux内核开发的经典书籍之一 The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a Novell insider in the second edition of Linux Kernel Development. This authoritative, practical guide will help you better understand the Linux kernel through updated coverage of all the major subsystems, new features associated with Linux 2.6 kernel and insider information on not-yet-released developments. You ll be able to take an in-depth look at Linux kernel from both a theoretical and an applied perspective as you cover a wide range of topics, including algorithms, system call interface, paging strategies and kernel synchronization. Get the top information right from the source in Linux Kernel Development
标签: Linux Development interes Novell
上传时间: 2017-06-06
上传用户:songyue1991
SMPP3.4 norms -- SMS Gateway developers required reading, even if the use of CMPP / SGIP / Wide developers, the right SMPP familiar with is essential.
标签: developers required Gateway reading
上传时间: 2017-07-04
上传用户:xcy122677
Very hard to design reusable Software Design must be specific to problem on hand Design must be general enough to address future problems and requirements Almost impossible to do it right the first time Experienced designers don’t reinvent the wheel They use good solutions again and again Find & use recurring patterns of classes &
标签: Design must Software reusable
上传时间: 2014-07-08
上传用户:wang0123456789
Very hard to design reusable Software Design must be specific to problem on hand Design must be general enough to address future problems and requirements Almost impossible to do it right the first time Experienced designers don’t reinvent the wheel They use good solutions again and again Find & use recurring patterns of classes &
标签: Design must Software reusable
上传时间: 2017-08-05
上传用户:dave520l
Very hard to design reusable Software Design must be specific to problem on hand Design must be general enough to address future problems and requirements Almost impossible to do it right the first time Experienced designers don’t reinvent the wheel They use good solutions again and again Find & use recurring patterns of classes &
标签: Design must Software reusable
上传时间: 2017-08-05
上传用户:dongqiangqiang
Very hard to design reusable Software Design must be specific to problem on hand Design must be general enough to address future problems and requirements Almost impossible to do it right the first time Experienced designers don’t reinvent the wheel They use good solutions again and again Find & use recurring patterns of classes &
标签: Design must Software reusable
上传时间: 2014-01-23
上传用户:qazxsw