behavior ).
(18) Remove unnecessary classes from your design.
In general, we will downgrade this class to an attribute.
(19) Remove classes outside the system.
Classes outside the system are abstracted to send messages only to the system domain, but do not accept messages sent from other classes in the system domain.
(20) do not change operations into classes. Question any class whose name is a verb or a derived Automatic Word, especially a
relevant data and behavior ).
(18) Remove unnecessary classes from your design.
In general, we will downgrade this class to an attribute.
(19) Remove classes outside the system.
Classes outside the system are abstracted to send messages only to the system domain, but do not accept messages sent from other classes in the system domain.
(20) do not change operations into classes. Question any class whose name is a verb or a derived Automatic
from other classes in the system domain.
(20) Do not turn the operation into a class. Question any class whose name is a verb or a derived automatic word, especially one that has only a meaningful behavior. Consider whether the meaningful behavior should be migrated to a class that already exists or has not yet been discovered.
(21) We often introduce proxy classes when creating an application's analysis model. In the
from other classes in the system domain.
(20) Do not turn the operation into a class. Question any class whose name is a verb or a derived automatic word, especially one that has only a meaningful behavior. Consider whether the meaningful behavior should be migrated to a class that already exists or has not yet been discovered.
(21) We often introduce proxy classes when creating an application's analysis model. In the
analysis phase (use case diagram/activity diagram/State Diagram (Business modeling), Class Diagram (Domain Modeling), and also in the software design phase (Class Diagram (Class/Object Design) activity diagram (Algorithm Description) and use case implementation (Time Sequence diagram and interface interaction )). In addition, through case implementation, the
to customize attributes in components? Do I need to bind data? How do I draw the component appearance? How to communicate with IIS? Do I need post-back? Many and many problems require component designers to consider them one by one.
Therefore, if you care about it, isn't it just designing a component? How difficult is this! So, I will smile, because I know, you must be joking.
But do not be afraid, "programmers need to explore the spirit !"
ASP. NET Component
Analysis of callback ideas in android system design, android callbackI. Why do I write this article?
During the process of gradually getting into touch with android development, I have found that many callback ideas are used in android (at least in app development. For example, the lifecycle of an activity and fragment are implemented by callback functions. One of the event processing mechanisms in android
(Reprint http://bbs.database.ccidnet.com/read.php? Tid = 325895) concise and clear! Analysis of Three paradigm application examples of Database Design
Introduction
Ol ~ Er {q
; IC, $ VZ 0}
The design paradigm of databases is the specifications that need to be met by database design. databases that meet these spe
speech is more relaxed, often will have some wisdom, the smile your lmho comment appears. Regional attack is a major feature of NetEase commentary. Web Teaching Network Blog ' I firmly believe that the comments can be on the nail on the head ' is from NetEase comments, here I know Rite, Director, Xiao Li, Mars netizens and see posts do not reply to netizens ...
2: Sina reviews Web design and comment quality http://news.sina.com.cn/opinion/
W
).Dimitri rule (least known principle)It means that a class knows more about a class that it depends on than it burns better. This means that no matter how complex a dependent class is, the logic should be encapsulated inside the method and provided externally through the public method. This way, the class can be minimized when the dependent class changes.The least known principle is another way of saying it: communicate only with direct friends. As long as there is a coupling relationship betwe
not change operations into classes. Question any class whose name is a verb or a derived Automatic Word, especially a class with only one meaningful action. Consider whether the meaningful behavior should be migrated to an existing or undiscovered class.(21) We often introduce a proxy class when creating an analysis model for an application. In the design phase, we often find that many agents are useless a
system domain.(20) Do not turn the operation into a class. Question any class whose name is a verb or a derived automatic word, especially one that has only a meaningful behavior. Consider whether the meaningful behavior should be migrated to a class that already exists or has not yet been discovered.(21) We often introduce proxy classes when creating an application's analysis model. In the design phase, w
to obfuscation of the relationship between entities and actor are inaccurate or the assignment of duties is inaccurate.We may also note that we have not provided the attributes of each object here. In fact, in the domain analysis stage, the attributes of an object are not important. What is important is to identify the operations of an object.
Step 6 of OOA D is to draw an implementation class diagram.
The above steps are the
Article title: analysis and program design based on the object-oriented operating system development platform (OSKit) (4 ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Author: Tang Haijing
Thread scheduling in thread analysis
The sixth chapter of "Demand Analysis and system design" is about continuing the ideas and viewpoints discussed in the fifth chapter, and further, in the sixth chapter of system design, we discuss the concerns from the point of view of design, and will explain in depth the problems which are not related to the analysis
The third "creative positive energy" Central Central mobile APP analysis and Design competitionEntry TipsIn this competition, my team in the preliminary round to the relative back to the rankings into the second, and in the relative to the ranking in the semi-finals, failed to enter the final.The result of failure to enter the finals is expected. However, the low overall ranking is necessarily a reflection
Speaking of Modularity, perhaps the first thing we think of is programming in the module design, functional block for the unit for the program, and finally through the selection of modules and composition of the final product. It is no novelty to apply this idea to the page building. It is believed that a large number of page-building engineers have gone through several phases: the first stage is in a CSS file to the multiple pages in their own custom
Article title: analysis and program design based on the object-oriented operating system development platform (OSKit) (2 ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Author: Tang Haijing
Thread initialization in thread analy
An analysis of relevance designParadigmIdeally, no matter what a table in the database will be corresponding to a real life object, such as the player is an object, the team is an object, the schedule is an object, the result of the game is an object and so on, is the paradigm."Associative Design"For associative design to be able to understand the relationship be
classes in the package should be closed together for changes of the same class nature. If a change affects one package, it will affect all classes in the package, without any impact on the other packages.
(9) Put the relevant data and behavior in a centralized position.
Designers should be aware of objects that get data from other objects through operations such as get. This type of behavior implies that the rule of thumb has been violated.
(10) Placing irrelevant information in another class (
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.