Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (2)
Encrypted connections to the database
no vote
Connect to the database encryption, file encryption password to connect to the database via hashmap store user names, passwords, user names are stored by hashmap to a file, by encapsulating jdbc driver, Real information can protect the user login user name and password. Do not need to rely on third-party packages. AES-128 is used in encryption technology. Advanced Encryption Standard (English: Advanced Encryption Standard, abbreviation: AES), also known as Rijndael encryption method in cryptography, is used by the US federal government One kind of block encryption standard. This standard is used to replace the original DES, has been widely analyzed and multi- used around the world. After five years of the selection process, the Advanced Encryption Standard by US National Institute of Standards and Technology (NIST) on November 26, 2001 Posted in FIPS PUB 197, and in the May 26, 2002 became effective standards. 2006,
晓明
2016-08-23
0
1
Particle Swarm Optimization algorithm
no vote
Particle swarm optimization, also known as particle swarm optimization (PSO), is an evolutionary computing technology developed by J. Kennedy and R. C. Eberhart in 1995. It comes from the simulation of a simplified social model. Among them, "swarm" comes from particle swarm optimization, which conforms to the five basic principles of swarm intelligence proposed by M. M. millonas in the development and application of artificial life model. "Particle" is a compromise choice, because it is necessary to describe the members of a group as having no mass or volume, as well as its speed and acceleration state.
晓明
2016-08-23
1
1
No more~