java¼¯ºÏSet²Ù×÷
package Sets;
import java.util.HashSet;
import java.util.Iterator;
import java.util.Set;
import java.util.TreeSet;
/**
* java¼¯ºÏ²Ù×÷
*
* @author baby69yy2000
*
*/
public class Sets {
/** Çó²¢¼¯ */
public static <T> Set<T> union(Set<T> setA, Set<T> setB) {
Set<T> setUnion;
if (setA instanceof TreeSet)
setUnion = new TreeSet<T>();
else
setUnion = new HashSet<T>();
Iterator<T> iterA = setA.iterator();
while (iterA.hasNext())
setUnion.add(iterA.next());
Iterator<T> iterB = setB.iterator();
while (iterB.hasNext())
setUnion.add(iterB.next());
return setUnion;
&n
Ïà¹ØÎĵµ£º
public class TestClass{
public static void main(String args[]){
VarArgs(1, "one");
VarArgs(2, "one", "two");
VarArgs(3, "one", "two", "three");
VarArgs(0); // Attention!
}
static void VarArgs(int nRequired, String... trailing){
System.out.print("Required: " + nRequired + " ");
......
ǰһ¶Îʱ¼äÒòΪÐèÒª°ï±ðÈËдÁ˼òµ¥µÄ×Ö·û´®·Ö¸ôµÄjavaС³ÌÐò£¬¾¡¹Ü×îºóûÓÃÉÏ£¬µ«ÊÇ×÷ΪÁ·Ï°»¹ÊDz»´íµÄ¡£
ÐèÇ󣺶ÔÓÚÏñÈçϵÄ×Ö·û´´½«Æä·Ö¸ôΪÁ½ÁУ¬ÕâÑù¾Í¿ÉÒÔÖ±½ÓÕ³ÌùµÄExcelÖи÷×ÔÁУ¬·ñÔòÒ»¸öÒ»¸ö·Ö¸ô»áºÄ·ÑºÜ¶àʱ¼ä¡£
16 bit microcomputer 16 λ΢ÐͼÆËã»ú
3 d distribution Èýά·Ö²¼
4 ......
http://blog.csdn.net/hbcui1984/archive/2009/12/10/4980805.aspx
Ò»¡¢¸ÅÊö
JNI(java native interface)£¬JAVA±¾µØ½Ó¿Úµ÷Óã¬Ä¿µÄÊÇΪÁËJAVA¿ÉÒÔµ÷Óñ¾µØ³ÌÐò£¬Ö÷ÒªÓŵãÓУº
Ìá¸ßЧÂÊ£¬½â¾öÐÔÄÜÎÊÌâ
·ÀÖ¹·´±àÒ룬Ìá¸ßºËÐÄ´úÂ밲ȫÐÔ
ÔöÇ¿±¾»ú½Ó¿Úµ÷ÓÃ
ǶÈëʽ¿ª·¢Ó¦ÓÃ
ÈçÏÂͨ¹ýÒ»¸ö×î¼òµ¥µÄÐ ......
import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
public class CipherTest {
public static void main(String[] args) {
try {
byte[] keydata = { (byte) 0x00, (byte) 0x01, (byte) 0x02,
(byte) 0x03, (byte) 0x04, (byte) 0x05, (byte) 0x06,
......
import java.util.Enumeration;
public class CipherTest implements Enumeration {
private int N;
private int c[], k;
private Object[] objs;
public CipherTest(Object[] items) {
N = items.length;
c = new int[N + 1];
for (int i = 0; i <= N; i++)
c[i] = i;
objs = items;
k = 1 ......