By using some assistive tools to find bottlenecks in the program, you can then optimize the code in the Bottleneck section. There are generally two scenarios: optimizing code or changing design methods. We generally choose the latter because it is better to improve the performance of the program than to call some optimized code without calling the following code. A well-designed program can streamline the code and improve performance.Here are some of
1. Java view mode (facade pattern)(1) Overview:Modern software systems are more complex, and a common way for designers to deal with complex systems is to divide and divide a system into smaller subsystems. If the hospital as a subsystem, according to departmental functions, the system can be divided into registered, outpatient, pricing, laboratory, charge, take
Java implements employee management system and java employee management system
The examples in this article share the code for implementing the employee management system in Java for your reference. The specific content is as foll
The overall design of a real project Java architecture DesignTags: javajava architecture design Spring mvcmybatis 2015-06-12 23:10 1891 people read comments (6) Favorites Report Category: Java (2)
Copyright NOTICE: This article is the original article of the blogger, without the permission of the blogger may not be rep
1 Overall architecture module diagram
1.1 Abstract schema module diagram
1.2 Specific technical framework module diagram
As shown above, the framework mainly includes:
• MVC Development Framework
L Workflow Technology
L Users, permissions, role management
The details are detailed below. 2 MVC Scenario 2.1 View Layer Technology Scheme (view)
In the application of common development framework, it is used in the view layer: JSP, JSF,FREEMARKER,XSLT, velocity, etc. jsp: a common view layer tha
pool overflow, if the instantiated object is not exploited for a long time,The system is considered garbage and is recycled by GC resulting in loss of object state Lazy mode: A Hungry man mode:Dual Lock mode: Summarize: 1, lazy mode features: Thread insecure, load classes faster, run time to get objects slower,2, a Hungry man mode features: Thread safety, load class is slow, run time to get objects faster3, double lock mode: Thread-safe,
("Architecture Design: Inter-system Communication (31)--Other message middleware and scenario applications (1)")5-3. Solution Two: The problem of improving the semi-invasive scheme 5-3-1 and solving method oneScenario one is not the best semi-intrusive solution, but it is easy to understand the architect's design intent: at least business-level isolation. One of
embedded devices, or memory, hard disk space, etc., by using the method of sacrificing CPU, to obtain the original need more memory or hard disk space to complete the work;3. A very simple time to change the space of the algorithm: the implementation of a, b two variable value exchange. The commonly used algorithm is to use the intermediate variables, and the introduction of additional variables means that more space is to be used, the following algorithm, you can eliminate the intermediate var
function partition in RPC rules and is an RPC framework for remote invocation between systems built in the Java language.
Hessian:hessian is a lightweight remoting onhttp tool that provides RMI functionality in an easy-to-use way. Simpler and faster than Webservice,hessian. The binary RPC protocol is used because the binary protocol is used, so it is well suited for sending binary data.
The core/minor structural elements of the RPC framework
(next to the above)2-5. Design mode: Proxy mode and Java support for proxy mode 2-5-1, typical proxy modeThe following class diagram illustrates the typical design design structure of the "proxy mode":A typical proxy pattern can be summed up in one sentence: external systems/external modules to invoke the implementatio
using the event "adapter" in Java 1.1 AWT, it is particularly prone to a trap. If an adapter method is overwritten and the spelling method is not particular, the final result is to add a new method instead of overwriting the existing method. However, this is completely legal, so no error prompts will be returned from the compiler or runtime system ?? But the code becomes abnormal.
(25) Eliminate "pseudo f
UML Analysis and Design of Advertising Management System
Source: www.ahcit.com Author: Dong Yiping Liu Jie Ding Minghua
Abstract: The advertising management
-consumer website system architecture, there may be a variety of solutions to solve various problems in the framework, focusing on technology integration, expansion, maintainability. In a different perspective, there are also architectural issues in the framework, such as the development of the NHibernate framework and the need to consider how to design it.4. PlatformThe concept of a platform is similar to
.
Using the combination to build the system has great elasticity, not only can the behavior of the class be divided into classes, but also can be re-run dynamic change behavior
Chapter One Introduction to the design pattern using a duck example introduces the strategy mode. (The implementation of the strategy mode depends mainly on Java
JAVA single-State design mode and JAVA mode
Core: privatize the constructor within the class, generate objects internally, and return the reference of the instantiated object through the class. static Method (static)
The design mode is the code result, programming style, and thinking method that is optimized after a l
probably choose the following:
Locating remote objects using the name service: Because Enterprise Services require high availability, using the name service can identify and select an Availability service object when querying a name. The EJB (Enterprise JavaBean) in the Java EE scheme is a name service.
Use IDL to generate interface definitions: Because of Enterprise services or game services, their development language may not be unifie
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.