`
elan1986
  • 浏览: 170134 次
  • 性别: Icon_minigender_1
  • 来自: 北京
社区版块
存档分类
最新评论

JBOSS HTTPS 续

阅读更多
原文地址:http://docs.jboss.org/jbossweb/latest/ssl-howto.html

IMPORTANT NOTE: This Howto refers to usage of JSSE, that comes included with jdk 1.5 and higher. When using APR, JBoss Web will use OpenSSL, which uses a different configuration.

The description below uses the variable name $CATALINA_HOME to refer to the directory into which you have installed JBoss Web, and is the base directory against which most relative paths are resolved. However, if you have configured JBoss Web for multiple instances by setting a CATALINA_BASE directory, you should use $CATALINA_BASE instead of $CATALINA_HOME for each of these references.

To install and configure SSL support on JBoss Web, you need to follow these simple steps. For more information, read the rest of this HOW-TO.

Create a certificate keystore by executing the following command:
Windows:

%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA
Unix:

$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA
and specify a password value of "changeit".


Uncomment the "SSL HTTP/1.1 Connector" entry in $CATALINA_HOME/conf/server.xml and tweak as necessary.


Introduction to SSL

SSL, or Secure Socket Layer, is a technology which allows web browsers and web servers to communicate over a secured connection. This means that the data being sent is encrypted by one side, transmitted, then decrypted by the other side before processing. This is a two-way process, meaning that both the server AND the browser encrypt all traffic before sending out data.

Another important aspect of the SSL protocol is Authentication. This means that during your initial attempt to communicate with a web server over a secure connection, that server will present your web browser with a set of credentials, in the form of a "Certificate", as proof the site is who and what it claims to be. In certain cases, the server may also request a Certificate from your web browser, asking for proof that you are who you claim to be. This is known as "Client Authentication," although in practice this is used more for business-to-business (B2B) transactions than with individual users. Most SSL-enabled web servers do not request Client Authentication.

SSL and JBoss Web

It is important to note that configuring JBoss Web to take advantage of secure sockets is usually only necessary when running it as a stand-alone web server. When running JBoss Web primarily as a Servlet/JSP container behind another web server, such as Apache or Microsoft IIS, it is usually necessary to configure the primary web server to handle the SSL connections from users. Typically, this server will negotiate all SSL-related functionality, then pass on any requests destined for the JBoss Web container only after decrypting those requests. Likewise, JBoss Web will return cleartext responses, that will be encrypted before being returned to the user's browser. In this environment, JBoss Web knows that communications between the primary web server and the client are taking place over a secure connection (because your application needs to be able to ask about this), but it does not participate in the encryption or decryption itself.

Certificates

In order to implement SSL, a web server must have an associated Certificate for each external interface (IP address) that accepts secure connections. The theory behind this design is that a server should provide some kind of reasonable assurance that its owner is who you think it is, particularly before receiving any sensitive information. While a broader explanation of Certificates is beyond the scope of this document, think of a Certificate as a "digital driver's license" for an Internet address. It states what company the site is associated with, along with some basic contact information about the site owner or administrator.

This "driver's license" is cryptographically signed by its owner, and is therefore extremely difficult for anyone else to forge. For sites involved in e-commerce, or any other business transaction in which authentication of identity is important, a Certificate is typically purchased from a well-known Certificate Authority (CA) such as VeriSign or Thawte. Such certificates can be electronically verified -- in effect, the Certificate Authority will vouch for the authenticity of the certificates that it grants, so you can believe that that Certificate is valid if you trust the Certificate Authority that granted it.

In many cases, however, authentication is not really a concern. An administrator may simply want to ensure that the data being transmitted and received by the server is private and cannot be snooped by anyone who may be eavesdropping on the connection. Fortunately, Java provides a relatively simple command-line tool, called keytool, which can easily create a "self-signed" Certificate. Self-signed Certificates are simply user generated Certificates which have not been officially registered with any well-known CA, and are therefore not really guaranteed to be authentic at all. Again, this may or may not even be important, depending on your needs.

General Tips on Running SSL

The first time a user attempts to access a secured page on your site, he or she is typically presented with a dialog containing the details of the certificate (such as the company and contact name), and asked if he or she wishes to accept the Certificate as valid and continue with the transaction. Some browsers will provide an option for permanently accepting a given Certificate as valid, in which case the user will not be bothered with a prompt each time they visit your site. Other browsers do not provide this option. Once approved by the user, a Certificate will be considered valid for at least the entire browser session.

Also, while the SSL protocol was designed to be as efficient as securely possible, encryption/decryption is a computationally expensive process from a performance standpoint. It is not strictly necessary to run an entire web application over SSL, and indeed a developer can pick and choose which pages require a secure connection and which do not. For a reasonably busy site, it is customary to only run certain pages under SSL, namely those pages where sensitive information could possibly be exchanged. This would include things like login pages, personal information pages, and shopping cart checkouts, where credit card information could possibly be transmitted. Any page within an application can be requested over a secure socket by simply prefixing the address with https: instead of http:. Any pages which absolutely require a secure connection should check the protocol type associated with the page request and take the appropriate action if https is not specified.

Finally, using name-based virtual hosts on a secured connection can be problematic. This is a design limitation of the SSL protocol itself. The SSL handshake, where the client browser accepts the server certificate, must occur before the HTTP request is accessed. As a result, the request information containing the virtual host name cannot be determined prior to authentication, and it is therefore not possible to assign multiple certificates to a single IP address. If all virtual hosts on a single IP address need to authenticate against the same certificate, the addition of multiple virtual hosts should not interfere with normal SSL operations on the server. Be aware, however, that most client browsers will compare the server's domain name against the domain name listed in the certificate, if any (applicable primarily to official, CA-signed certificates). If the domain names do not match, these browsers will display a warning to the client user. In general, only address-based virtual hosts are commonly used with SSL in a production environment.

Configuration

Prepare the Certificate Keystore

JBoss Web currently operates only on JKS, PKCS11 or PKCS12 format keystores. The JKS format is Java's standard "Java KeyStore" format, and is the format created by the keytool command-line utility. This tool is included in the JDK. The PKCS12 format is an internet standard, and can be manipulated via (among other things) OpenSSL and Microsoft's Key-Manager.

Each entry in a keystore is identified by an alias string. Whilst many keystore implmentations treat alaises in a case insensitive manner, case sensitive implementations are available. The PKCS11 specification, for example, requires that aliases are case sensitive. To avoid issues related to the case sensitivity of aliases, it is not recommended to use aliases that differ only in case.

To import an existing certificate into a JKS keystore, please read the documentation (in your JDK documentation package) about keytool. Note that OpenSSL often adds readable comments before the key, keytooldoes not support that, so remove the OpenSSL comments if they exist before importing the key using keytool.

To import an existing certificate signed by your own CA into a PKCS12 keystore using OpenSSL you would execute a command like:

openssl pkcs12 -export -in mycert.crt -inkey mykey.key \
                        -out mycert.p12 -name tomcat -CAfile myCA.crt \
                        -caname root -chain
For more advanced cases, consult the OpenSSL documentation.
To create a new keystore from scratch, containing a single self-signed Certificate, execute the following from a terminal command line:

Windows:

%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA
Unix:

$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA
(The RSA algorithm should be preferred as a secure algorithm, and this also ensures general compatibility with other servers and components.)

This command will create a new file, in the home directory of the user under which you run it, named ".keystore". To specify a different location or filename, add the -keystore parameter, followed by the complete pathname to your keystore file, to the keytool command shown above. You will also need to reflect this new location in the server.xml configuration file, as described later. For example:

Windows:

%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA \
  -keystore \path\to\my\keystore
Unix:

$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA \
  -keystore /path/to/my/keystore
After executing this command, you will first be prompted for the keystore password. The default password used by JBoss Web is "changeit" (all lower case), although you can specify a custom password if you like. You will also need to specify the custom password in the server.xml configuration file, as described later.

Next, you will be prompted for general information about this Certificate, such as company, contact name, and so on. This information will be displayed to users who attempt to access a secure page in your application, so make sure that the information provided here matches what they will expect.

Finally, you will be prompted for the key password, which is the password specifically for this Certificate (as opposed to any other Certificates stored in the same keystore file). You MUST use the same password here as was used for the keystore password itself. (Currently, the keytool prompt will tell you that pressing the ENTER key does this for you automatically.)

If everything was successful, you now have a keystore file with a Certificate that can be used by your server.

Note: your private key password and keystore password should be the same. If they differ, you will get an error along the lines of java.io.IOException: Cannot recover key, as documented in Bugzilla issue 38217, which contains further references for this issue.

Edit the JBoss Web Configuration File

If you are using APR, you have the option of configuring an alternative engine to openSSL.

<Listener className="org.apache.catalina.core.AprLifecycleListener" SSLEngine="someengine" SSLRandomSeed="somedevice" />
The default value is
<Listener className="org.apache.catalina.core.AprLifecycleListener" SSLEngine="on" SSLRandomSeed="builtin" />
So to use SSL under APR, make sure the SSLEngine attribute is set to something other than off. The default value is on and if you specify another value, it has to be a valid engine name.
If you haven't compiled in SSL support into your Tomcat Native library, then you can turn this initialization off
<Listener className="org.apache.catalina.core.AprLifecycleListener" SSLEngine="off" />
SSLRandomSeed allows to specify a source of entropy. Productive system needs a reliable source of entropy but entropy may need a lot of time to be collected therefore test systems could use no blocking entropy sources like "/dev/urandom" that will allow quicker starts of JBoss Web.
The final step is to configure your secure socket in the $CATALINA_HOME/conf/server.xml file, where $CATALINA_HOME represents the directory into which you installed JBoss Web. An example <Connector> element for an SSL connector is included in the default server.xml file installed with JBoss Web. It will look something like this:

<-- Define a SSL Coyote HTTP/1.1 Connector on port 8443 -->
<!--
<Connector
           port="8443" minSpareThreads="5" maxSpareThreads="75"
           enableLookups="true" disableUploadTimeout="true"
           acceptCount="100"  maxThreads="200"
           scheme="https" secure="true" SSLEnabled="true"
           keystoreFile="${user.home}/.keystore" keystorePass="changeit"
           clientAuth="false" sslProtocol="TLS"/>
-->
The example above will throw an error if you have the APR and the Tomcat Native libraries in your path, as tomcat will try to autoload the APR connector. The APR connector uses different attributes for SSL keys and certificates. An example of such configuration would be

<-- Define a SSL Coyote HTTP/1.1 Connector on port 8443 -->
<!--
<Connector
           port="8443" minSpareThreads="5" maxSpareThreads="75"
           enableLookups="true" disableUploadTimeout="true"
           acceptCount="100"  maxThreads="200"
           scheme="https" secure="true" SSLEnabled="true"
           SSLCertificateFile="/usr/local/ssl/server.crt"
           SSLCertificateKeyFile="/usr/local/ssl/server.pem"
           clientAuth="false" sslProtocol="TLS"/>
-->
To avoid auto configuration you can define which connector to use by specifying a classname in the protocol attribute.
To define a Java connector, regardless if the APR library is loaded or not do:

<-- Define a blocking Java SSL Coyote HTTP/1.1 Connector on port 8443 -->
<!--
<Connector protocol="org.apache.coyote.http11.Http11Protocol"
           port="8443" minSpareThreads="5" maxSpareThreads="75"
           enableLookups="true" disableUploadTimeout="true"
           acceptCount="100"  maxThreads="200"
           scheme="https" secure="true" SSLEnabled="true"
           keystoreFile="${user.home}/.keystore" keystorePass="changeit"
           clientAuth="false" sslProtocol="TLS"/>
-->
<-- Define a non-blocking Java SSL Coyote HTTP/1.1 Connector on port 8443 -->
<!--
<Connector protocol="org.apache.coyote.http11.Http11NioProtocol"
           port="8443" minSpareThreads="5" maxSpareThreads="75"
           enableLookups="true" disableUploadTimeout="true"
           acceptCount="100"  maxThreads="200"
           scheme="https" secure="true" SSLEnabled="true"
           keystoreFile="${user.home}/.keystore" keystorePass="changeit"
           clientAuth="false" sslProtocol="TLS"/>
-->
and to specify an APR connector
<-- Define a APR SSL Coyote HTTP/1.1 Connector on port 8443 -->
<!--
<Connector protocol="org.apache.coyote.http11.Http11AprProtocol"
           port="8443" minSpareThreads="5" maxSpareThreads="75"
           enableLookups="true" disableUploadTimeout="true"
           acceptCount="100"  maxThreads="200"
           scheme="https" secure="true" SSLEnabled="true"
           SSLCertificateFile="/usr/local/ssl/server.crt"
           SSLCertificateKeyFile="/usr/local/ssl/server.pem"
           clientAuth="false" sslProtocol="TLS"/>
-->
You will note that the Connector element itself is commented out by default, so you will need to remove the comment tags around it. Then, you can customize the specified attributes as necessary. For detailed information about the various options, consult the Server Configuration Reference. The following discussion covers only those attributes of most interest when setting up SSL communication.

The port attribute (default value is 8443) is the TCP/IP port number on which JBoss Web will listen for secure connections. You can change this to any port number you wish (such as to the default port for https communications, which is 443). However, special setup (outside the scope of this document) is necessary to run JBoss Web on port numbers lower than 1024 on many operating systems.

If you change the port number here, you should also change the value specified for the redirectPort attribute on the non-SSL connector. This allows JBoss Web to automatically redirect users who attempt to access a page with a security constraint specifying that SSL is required, as required by the Servlet 2.4 Specification.

There are additional options used to configure the SSL protocol. You may need to add or change the following attribute values, depending on how you configured your keystore earlier:

Attribute Description
algorithm
The certificate encoding algorithm to be used. This defaults to the Sun implementation (SunX509). For IBM JVMs you should use the value IbmX509. For other vendors, consult the JVM documentation for the correct value.

clientAuth
Set to true if you want the SSL stack to require a valid certificate chain from the client before accepting a connection. Set to want if you want the SSL stack to request a client Certificate, but not fail if one isn't presented. A false value (which is the default) will not require a certificate chain unless the client requests a resource protected by a security constraint that uses CLIENT-CERT authentication.

keystoreFile
The pathname of the keystore file where you have stored the server certificate to be loaded. By default, the pathname is the file ".keystore" in the operating system home directory of the user that is running JBoss Web.

keystorePass
The password used to access the server certificate from the specified keystore file. The default value is "changeit".

keystoreType
The type of keystore file to be used for the server certificate. If not specified, the default value is "JKS". For example the *.p12 files from openssl can be used using PKCS12

sslProtocol
The version of the SSL protocol to use. If not specified, the default is "TLS".

ciphers
A comma seperated list of the encryption ciphers that may be used. If not specified, then any available cipher may be used.

keyAlias
The alias used to for the server certificate in the keystore. If not specified the first key read in the keystore will be used.

truststoreFile
The TrustStore file to use to validate client certificates.

truststorePass
The password to access the TrustStore. This defaults to the value of keystorePass.

truststoreType
Add this element if your are using a different format for the TrustStore then you are using for the KeyStore.

After completing these configuration changes, you must restart JBoss Web as you normally do, and you should be in business. You should be able to access any web application supported by JBoss Web via SSL. For example, try:

https://localhost:8443
and you should see the usual JBoss Web splash page (unless you have modified the ROOT web application). If this does not work, the following section contains some troubleshooting tips.

Installing a Certificate from a Certificate Authority

To obtain and install a Certificate from a Certificate Authority (like verisign.com, thawte.com or trustcenter.de), read the previous section and then follow these instructions:

Create a local Certificate Signing Request (CSR)

In order to obtain a Certificate from the Certificate Authority of your choice you have to create a so called Certificate Signing Request (CSR). That CSR will be used by the Certificate Authority to create a Certificate that will identify your website as "secure". To create a CSR follow these steps:

Create a local Certificate (as described in the previous section):
keytool -genkey -alias tomcat -keyalg RSA \
-keystore <your_keystore_filename>
Note: In some cases you will have to enter the domain of your website (i.e. www.myside.org) in the field "first- and lastname" in order to create a working Certificate.
The CSR is then created with:
keytool -certreq -keyalg RSA -alias tomcat -file certreq.csr \
-keystore <your_keystore_filename>
Now you have a file called certreq.csr that you can submit to the Certificate Authority (look at the documentation of the Certificate Authority website on how to do this). In return you get a Certificate.

Importing the Certificate

Now that you have your Certificate you can import it into you local keystore. First of all you have to import a so called Chain Certificate or Root Certificate into your keystore. After that you can proceed with importing your Certificate.

Download a Chain Certificate from the Certificate Authority you obtained the Certificate from.
For Verisign.com commercial certificates go to: http://www.verisign.com/support/install/intermediate.html
For Verisign.com trial certificates go to: http://www.verisign.com/support/verisign-intermediate-ca/Trial_Secure_Server_Root/index.html
For Trustcenter.de go to: http://www.trustcenter.de/certservices/cacerts/en/en.htm#server
For Thawte.com go to: http://www.thawte.com/certs/trustmap.html
Import the Chain Certificate into your keystore
keytool -import -alias root -keystore <your_keystore_filename> \
-trustcacerts -file <filename_of_the_chain_certificate>
And finally import your new Certificate
keytool -import -alias tomcat -keystore <your_keystore_filename> \
-file <your_certificate_filename>
Troubleshooting

Here is a list of common problems that you may encounter when setting up SSL communications, and what to do about them.

I get "java.security.NoSuchAlgorithmException" errors in my log files.
The JVM cannot find the JSSE JAR files. Follow all of the directions to download and install JSSE.

When JBoss Web starts up, I get an exception like "java.io.FileNotFoundException: {some-directory}/{some-file} not found".
A likely explanation is that JBoss Web cannot find the keystore file where it is looking. By default, JBoss Web expects the keystore file to be named .keystore in the user home directory under which JBoss Web is running (which may or may not be the same as yours :-). If the keystore file is anywhere else, you will need to add a keystoreFile attribute to the <Factory> element in the JBoss Web configuration file.

When JBoss Web starts up, I get an exception like "java.io.FileNotFoundException: Keystore was tampered with, or password was incorrect".
Assuming that someone has not actually tampered with your keystore file, the most likely cause is that JBoss Web is using a different password than the one you used when you created the keystore file. To fix this, you can either go back and recreate the keystore file, or you can add or update the keystorePass attribute on the <Connector> element in the JBoss Web configuration file. REMINDER - Passwords are case sensitive!

When JBoss Web starts up, I get an exception like "java.net.SocketException: SSL handshake errorjavax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled."
A likely explanation is that JBoss Web cannot find the alias for the server key withinthe specified keystore. Check that the correct keystoreFile and keyAlias are specified in the <Connector> element in the JBoss Web configuration file. REMINDER - keyAlias values may be case sensitive!

If you are still having problems, a good source of information is the TOMCAT-USER mailing list. You can find pointers to archives of previous messages on this list, as well as subscription and unsubscription information, at http://tomcat.apache.org/lists.html.

Miscellaneous Tips and Bits

To access the SSL session ID from the request, use:
String sslID = (String)request.getAttribute("javax.servlet.request.ssl_session");
For additional discussion on this area, please see Bugzilla.
分享到:
评论

相关推荐

    spring boot 转https访问的相关配置

    spring boot 转https访问的相关配置

    基于springboot框架的公司日常考勤系统(完整Java源码+数据库sql文件+项目文档+Java项目编程实战+编程练手好项目).zip

    第1章 绪论 1 1.1 项目背景及意义 1 1.2 国内外研究现状 1 1.3 主要研究内容 2 第2章 主要技术介绍 2 2.1 JSP 编程语言 2 2.2 MYSQL数据库 3 2.3 BS模式 3 2.4 Springboot 3 第3章 需求分析 4 3.1 可行性分析 4 3.2 系统定义 4 3.3 系统的性能要求 4 3.4 功能分析 4 第4章 系统设计 5 4.1 总体功能概述 5 4.1.1系统功能模块的划分 5 4.1.2 系统的结构框架图 6 4.2 系统流程图 7 4.3数据库设计 7 4.3.1 系统数据流程图 7 4.4 数据库的设计 8 4.4.1 数据库的概念设计 8 4.4.2 数据库逻辑结构设计 8 4.4.3 数据库物理设计 10 4.5 输入输出设计 12 4.6 存储过程的设计 12 第5章 详细设计与实现 15 5.1 用户登陆 15 5.2 修改密码 16 5.3 系统主界面 16 5.4 部门管理界面 16 5.5 员工管理 17 5.6 系统公告管理 20 5.7请假申请 20 第6章 系统测试 20 6.1 系统测试的目的及意义

    学生宿舍管理系统(源码+数据库+万字文档)

    579学生宿舍管理系统,系统包含两种角色:用户、管理员,系统分为前台和后台两大模块,主要功能如下: 1 管理员功能实现 宿管员管理 管理员可以对宿管员的资料进行管理,包括新增、修改、删除等操作。 学生管理 管理员可以对学生信息进行管理,包括增、删、改、查操作。 2宿管员功能实现 学生信息管理 宿管员可以进行学生信息的增、删、改、查操作,管理学生的床位申请、卫生记录和日常事务评分。 公寓资产管理 宿管员可以管理公寓资产,登记资产损坏信息。 缴费信息管理 宿管员可以进行缴费信息的增、删、改操作。 床位安排管理 宿管员可以审核学生的床位安排信息。 3 学生功能实现 清理公共场所 学生可以查看自己负责清理的公共场所信息。 申请床位 学生可以选择床位号进行床位申请,宿管员审核通过后,学生才能使用申请的床位。 日常事务 学生可以查看日常事务的加分项和评分标准信息。 缴费信息 学生可以查看住宿费用及缴费时间等信息。 二、项目技术 开发语言:Java 数据库:MySQL 项目管理工具:Maven Web应用服务器:Tomcat 前端技术:Vue、 后端

    AI技术发展与全球市场规模增长:2023-2034年趋势解析及前景展望

    内容概要:本文深入探讨了自2023年至2034年人工智能(AI)全球市场规模迅速扩展的趋势及其背后的原因,详述了各个地理区域的发展状况,以及AI细分领域的具体表现。报告显示,在接下来十年间,全球AI市场规模将保持高速增长,CAGR达到19.1%。尤其值得关注的是北美区凭借强大的技术和产业生态系统占据领先地位,同时亚太地区由于人口优势和积极政策支持正在崛起,未来有望成为新的增长极点。此外,AI软件特别是生成式AI、以及支持AI发展的硬件设施(高性能芯片、数据中心建设等方面)也有望获得巨大进步和发展。 适合人群:对新兴科技发展动态感兴趣的投资人、研究人员和技术爱好者等。 使用场景及目标:帮助用户理解当前AI市场的现状和发展趋势,为投资者提供决策依据,助力企业和政府部门规划战略方向。 其他说明:文中引用了权威机构的研究成果来支持论断,确保提供的预测可靠且富有洞察力。

    Java面向对象初始概念

    Java面向对象初始概念

    基于springboot框架的新冠病毒密接者跟踪系统(完整Java源码+数据库sql文件+项目文档+Java项目编程实战+编程练手好项目).zip

    信息数据从传统到当代,是一直在变革当中,突如其来的互联网让传统的信息管理看到了革命性的曙光,因为传统信息管理从时效性,还是安全性,还是可操作性等各个方面来讲,遇到了互联网时代才发现能补上自古以来的短板,有效的提升管理的效率和业务水平。传统的管理模式,时间越久管理的内容越多,也需要更多的人来对数据进行整理,并且数据的汇总查询方面效率也是极其的低下,并且数据安全方面永远不会保证安全性能。结合数据内容管理的种种缺点,在互联网时代都可以得到有效的补充。结合先进的互联网技术,开发符合需求的软件,让数据内容管理不管是从录入的及时性,查看的及时性还是汇总分析的及时性,都能让正确率达到最高,管理更加的科学和便捷。本次开发的新冠病毒密接者跟踪系统实现了字典管理、地点管理、公告信息管理、用户轨迹管理、核算检测管理、口罩管理、口罩预订管理、医护人员管理、疫苗管理、疫苗预约管理、用户管理、管理员管理等功能。系统用到了关系型数据库中王者MySql作为系统的数据库,有效的对数据进行安全的存储,有效的备份,对数据可靠性方面得到了保证。并且程序也具备程序需求的所有功能,使得操作性还是安全性都大大提高,让新冠病毒密接者

    【卫星信号】模拟卫星信号传播研究附Matlab代码.rar

    1.版本:matlab2014/2019a/2024a 2.附赠案例数据可直接运行matlab程序。 3.代码特点:参数化编程、参数可方便更改、代码编程思路清晰、注释明细。

    常数、变量和随机分数阶松弛方程的预测-校正方法附Matlab代码.rar

    1.版本:matlab2014/2019a/2024a 2.附赠案例数据可直接运行matlab程序。 3.代码特点:参数化编程、参数可方便更改、代码编程思路清晰、注释明细。

    Data Structures and Algorithms with the C++ STL - 2024.pdf

    Farrier John - Data Structures and Algorithms with the C++ STL - 2024.pdf

    DBeaver Community 25.0.0

    DBeaver Community 25.0.0

    Javascript初步视频教程.zip

    javascript

    源代码vue3+cesium 水库可视化模型项目/webgis素材

    源代码]vue3+cesium 水库可视化模型项目/webgis素材

    数据挖掘实战-基于随机森林算法的交通事故预测模型(数据集+代码).rar

    数据挖掘实战-基于随机森林算法的交通事故预测模型(数据集+代码).rar

    chromedriver-mac-arm64-136.0.7083.0.zip

    chromedriver-mac-arm64-136.0.7083.0.zip

    无线传感网络的节点部署覆盖及能源消耗问题研究附Matlab代码.rar

    1.版本:matlab2014/2019a/2024a 2.附赠案例数据可直接运行matlab程序。 3.代码特点:参数化编程、参数可方便更改、代码编程思路清晰、注释明细。

    Spring的IOC实现

    Spring的IOC实现

    python双色球选号过滤器

    # 双色球选号过滤器使用说明 ## 1. 基本功能 - 随机生成双色球号码 - 多选模式选号 - 过滤条件筛选 - 结果导出(支持TXT和Excel格式) ## 2. 界面说明 ### 2.1 生成设置 - **生成组数**:设置要生成的号码组数(随机模式下使用) - **多选模式**:勾选后可以手动输入多个号码进行组合 - 红球输入:7-20个号码,用空格分隔(如:1 2 3 4 5 6 7 8) - 蓝球输入:输入1个号码(1-16之间) ### 2.2 基本过滤条件 - **和值范围**:红球号码之和的范围(建议:60-120) - **奇数个数**:红球中奇数的个数(建议:2-4个) - **连号设置**:是否允许连续的号码 ### 2.3 高级过滤条件 - **AC值范围**:用于衡量号码分布的均匀度(建议:2-15) - AC值越小,号码分布越均匀 - AC值越大,号码分布越集中 ### 2.4 导出设置 - **TXT格式**:导出为文本文件 - **Excel格式**:导出为Excel表格

    ssm806基于java_ssm+vue的心理测评系统设计实现(代码+数据库+演示录像+运行教学+软件部署).zip

    项目已获导师指导并通过的高分毕业设计项目,可作为课程设计和期末大作业,下载即用无需修改,项目完整确保可以运行。 包含:项目源码、数据库脚本、软件工具等,该项目可以作为毕设、课程设计使用,前后端代码都在里面。 该系统功能完善、界面美观、操作简单、功能齐全、管理便捷,具有很高的实际应用价值。 项目都经过严格调试,确保可以运行!可以放心下载 技术组成 语言:java 开发环境:idea 数据库:MySql 部署环境:maven 数据库工具:navica 更多毕业设计https://cv2022.blog.csdn.net/article/details/124463185

    深度学习YOLO算法对象检测Python实现与应用实践指南

    内容概要:本文详细介绍了YOLO(You Only Look Once)实时对象检测算法及其应用场景。主要内容涵盖了环境配置(包括安装必要依赖库),使用预训练模型对图像和视频进行对象检测的方法,并逐步指导了自定义YOLO模型的训练步骤,从准备数据集到模型参数设定的具体操作。通过一系列示例代码展示如何高效运用这一先进的人工智能工具执行任务,为开发者提供了一个完整的YOLO实践路线图。 适用人群:对机器学习特别是深度学习有基本了解的数据科学家、程序员以及研究人员。 使用场景及目标:适用于需要快速构建基于YOLO的对象识别系统的项目,如自动驾驶、安防监控等领域的开发者。学习本篇文章可以帮助他们掌握设置运行环境、调用已有模型以及创建新模型的关键技巧,从而将理论转化为实际应用。 其他说明:本文档提供的教程和案例可以作为学习YOLO及相关领域前沿进展的理想起点。此外,在实践中不断调整优化所学到的知识和技术将会进一步提升解决方案的质量。

    基于springboot框架的校园失物招领系统(完整Java源码+数据库sql文件+项目文档+Java项目编程实战+编程练手好项目).zip

    目 录 I 摘 要 III ABSTRACT IV 1 绪论 1 1.1 课题背景 1 1.2 研究现状 1 1.3 研究内容 2 2 系统开发环境 3 2.1 vue技术 3 2.2 JAVA技术 3 2.3 MYSQL数据库 3 2.4 B/S结构 4 2.5 SSM框架技术 4 3 系统分析 5 3.1 可行性分析 5 3.1.1 技术可行性 5 3.1.2 操作可行性 5 3.1.3 经济可行性 5 3.1.4 法律可行性 5 3.2 系统性能分析 5 3.3 系统功能分析 6 3.3.1 角色需求 6 3.3.2 功能需求 6 3.4 系统流程分析 6 3.4.1 注册流程 6 3.4.2 登录流程 7 4 系统设计 8 4.1 系统概要设计 8 4.2 系统结构设计 8 4.3 数据库设计 9 4.3.1 数据库表设计 9 5 系统的实现 13 5.1 功能模块的实现 13 5.1用户信息管理 13 5.2 失物招领管理 14 5.3物品挂失管理 16 5.1公告信息管理 18 6 系统测试 21 6.1 测试定义 21 6.2 测试目的 21 6.3 测试方法 21 6

Global site tag (gtag.js) - Google Analytics