Мы предполагаем, что вам понравилась эта презентация. Чтобы скачать ее, порекомендуйте, пожалуйста, эту презентацию своим друзьям в любой соц. сети. Кнопочки находятся чуть ниже. Спасибо.
Идет загрузка презентации. Пожалуйста, подождите
Презентация была опубликована
© Luxoft Training 2013 Annotations
© Luxoft Training 2013 Java reflection / RTTI // given the name of a class, get a "Class" object that // has all info about it Class c = Class.forName(classname); // get the methods of this class Method methods = c.getMethods(); // select a particular method Method m1 = method; // get the name of this method m1.getName() // get the argument types of one of the methods, also its return type Class arginfo = m1.getParameterTypes(); int nargs = arginfo.length; Class rtnclass = m1.getReturnType(); // get the name of one of the arguments arginfo[i].getName(); // call the method Object args = new Object[nargs] Object val = m1.invoke(c, args); // result of calling is in val // get a typed variable for the result Float f; Integer i; if (val instanceof Float) f = (Float)val; if (val instanceof Integer) i = (Integer)val;
© Luxoft Training 2013 Annotations Annotations are metadata that can be added to the program source code without affecting it in a semantic way. However, they can be used during code analysis, compilation and even during run- time 8-3 Introduction
© Luxoft Training 2013 Annotations In contrast to JavaDoc comments that are destroyed in compile-time, annotations are reflective: they are stored in a class file and can be retrieved in run-time using reflection mechanism Annotations were introduced in Java version Introduction
© Luxoft Training 2013 Annotations What can be annotated: Class Method Class fields Arguments Packages Etc. (the full list is examined below) 8-5 Introduction
© Luxoft Training 2013 Annotations Main uses of annotations include: Provide information for the compiler; Provide metadata to various software tools to generate code, configurations and so forth; To be used in runtime processing to control program execution 8-6 Using annotations
© Luxoft Training 2013 Standard Annotations There are annotations that are predefined by the language @SuppressWarnings 8-7 Annotations used by the compiler
© Luxoft Training 2013 Standard : indicates that the marked element is deprecated and should no longer be used. Specified in class, method or field Many IDE analyze this annotation and mark (Eclipse underlines) the corresponding element
© Luxoft Training 2013 Standard Annotations
© Luxoft Training 2013 Standard informs the compiler that the element is meant to override an element declared in a superclass. If a method marked fails to correctly override a method in one of its superclasses (or if the method has been removed/renamed), the compiler generates an error
© Luxoft Training 2013 Standard Annotations
© Luxoft Training 2013 Standard tells the compiler to suppress specific warnings that it would otherwise generate
© Luxoft Training 2013 Create Custom Annotations To create an annotation use the : annotations are annotations for annotations 8-13 Introduction
© Luxoft Training 2013 annotation indicates the elements to which an annotation type is applicable and takes the following values: TYPE FIELD METHOD PARAMETER CONSTRUCTOR LOCAL_VARIABLE ANNOTATION_TYPE PACKAGE Create Custom Annotations
© Luxoft Training 2013 annotation indicates where the specified annotation is available and takes the following values: SOURCE annotations are only available in the source code and are to be discarded by the compiler Create Custom Annotations
© Luxoft Training 2013 CLASS annotations are to be recorded in the class file by the compiler but need not be retained by the VM at run time RUNTIME annotations are to be recorded in the class file by the compiler and retained by the VM at run time, so they may be read reflectively Create Custom Annotations
© Luxoft Training Example Create Custom Annotations
© Luxoft Training Getting annotations via reflection Create Custom Annotations
© Luxoft Training 2013 Example AnnotationTutor
© Luxoft Training 2013 Using Reflection API in Java.
1 © Luxoft Training 2012 Inner and anonymous classes.
1/30 Chapter 8: Dynamic Binding And Abstract classes.
1/27 Chapter 9: Template Functions And Template Classes.
Loader Design Options Linkage Editors Dynamic Linking Bootstrap Loaders.
Inner Classes. 2 Simple Uses of Inner Classes Inner classes are classes defined within other classes The class that includes the inner class is called.
2005 Pearson Education, Inc. All rights reserved. 1 Object-Oriented Programming: Polymorphism.
Operator Overloading Customised behaviour of operators Chapter: 08 Lecture: 26 & 27 Date: 24.09.2012.
Multiples Michael Marchenko. Definition In mathematics, a multiple is the product of any quantity and an integer. in other words, for the quantities a.
2005 Pearson Education, Inc. All rights reserved. 1 9 9 Object-Oriented Programming: Inheritance.
Unit II Constructor Cont… Destructor Default constructor.
Mobility Control and one-X Mobile. Mobility Control User Configuration Mobile Call Control requires PRI-U, BRI or SIP (RFC2833) trunks in the IP Office.
© 2009 Avaya Inc. All rights reserved.1 Chapter Two, VoiceMail Pro Components Module Two – Actions, Variables & Conditions.
S5-1 PAT328, Section 5, September 2004 Copyright 2004 MSC.Software Corporation SECTION 5 RESULTS TITLE EDITOR.
RLC circuit. An RLC circuit (or LCR circuit) is an electrical circuit consisting of a resistor, an inductor, and a capacitor, connected in series or in.
© Luxoft Training 2013 Java Collections API. © Luxoft Training 2013 Collections hierarchy.
S11-1 PAT318, Section 11, March 2005 SECTION 11 ANALYSIS SETUP.
S11-1PAT301, Section 11, October 2003 SECTION 11 ANALYSIS SETUP.
Copyright 2003 www.ciscopress.com CCNA 2 Chapter 12 Configuring a Router By Your Name.
© The McGraw-Hill Companies, Inc., 2000 4-1 Chapter 4 Counting Techniques.
XjCharts A C++ / Java Statecharts Tool for Developers Experimental Object Technologies www.xjtek.com.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.23-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
CSTA is a kind of standard communication protocol used between PBX and computer that is famous in Europe. What is CSTA ? Control Requests Event Notifications.
Data Types in C. A Data Type A data type is –A set of values AND –A set of operations on those values A data type is used to –Identify the type of a variable.
A class is just a collection of variables--often of different types--combined with a set of related functions. The variables in the class are referred.
© 2006 Cisco Systems, Inc. All rights reserved. SND v2.04-1 Configuring a Cisco IOS Firewall Configuring a Cisco IOS Firewall with the Cisco SDM Wizard.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v3.06-1 Using CSA Analysis Generating Behavior Analysis Reports.
Object-Oriented Programming Dr. Ramzi Saifan Slides adapted from Prof. Steven Roehrig.
2005 Pearson Education, Inc. All rights reserved. 1 Object-Oriented Programming: Interface.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.27-1 Optimizing BGP Scalability Implementing BGP Peer Groups.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.25-1 MPLS VPN Implementation Configuring VRF Tables.
1 © Luxoft Training 2012 Java basics Module 2. 2 © Luxoft Training 2012 Running Java application.
In mathematics, the notion of permutation is used with several slightly different meanings, all related to the act of permuting (rearranging) objects.
Unit 2 Users Management. Users Every user is assigned a unique User ID number (UID) UID 0 identifies root User accounts normally start at UID 500 Users'
While its always a good idea to think outside the box when approaching a creative task, this is not always the case. For example, when working with teams,
WS3-1 WORKSHOP 3 RESULTS TITLE EDITOR PAT328, Workshop 3, September 2004 Copyright 2004 MSC.Software Corporation.
PAT312, Section 21, December 2006 S21-1 Copyright 2007 MSC.Software Corporation SECTION 21 GROUPS.
Www.ciscopress.com Copyright 2003 CCNA 2 Chapter 16 Distance Vector Routing Protocols By Your Name.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.26-1 Complex MPLS VPNs Using Advanced VRF Import and Export Features.
A new interface model for the Jazyki Mira typological database Oleg Belyaev The research is supported by RFBR grant (www.rfbr.ru), 07-06-00229 а.
Section 2.1: Use Inductive Reasoning Conjecture: A conjecture is an unproven statement that is based on observations; an educated guess. Inductive Reasoning:
Michael Marchenko. In mathematics, a sequence is an ordered list of objects (or events). Like a set, it contains members (also called elements, or terms),
© 2009 Avaya Inc. All rights reserved.1 Chapter Three, VoiceMail Pro Advanced Functions Module One – Text to Speech.
PAT312, Section 16, December 2006 S16-1 Copyright 2007 MSC.Software Corporation SECTION 16 MATERIALS.
© 2009 Avaya Inc. All rights reserved.1 Chapter Three, VoiceMail Pro Advanced Functions Module Two – Database and IVR.
WS4-1 PAT328, Workshop 4, May 2005 Copyright 2005 MSC.Software Corporation WORKSHOP 4 SOLID TOPOLOGY OPTIMIZATION.
S4-1 PAT328, Section 4, September 2004 Copyright 2004 MSC.Software Corporation SECTION 4 FIELD IMPORT AND EXPORT.
Date:29.09.2014 File:GRAPH_02e.1 SIMATIC S7 Siemens AG 2000. All rights reserved. SITRAIN Training for Automation and Drives Project Planning and Configuration.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v2.19-1 Module Summary The Cisco Discovery Protocol is an information-gathering tool used by network.
BACK-IN-TIME DEBUGGER INTRODUCTION PRINCIPLE OF WORK PROBLEM It is well known that significant effort in the process of software developing is focused.
© 2009 Avaya Inc. All rights reserved.1 Chapter Three, VoiceMail Pro Advanced Functions Module Four – Voicemail Campaigns.
Combination. In mathematics a combination is a way of selecting several things out of a larger group, where (unlike permutations) order does not matter.
© 2009 Avaya Inc. All rights reserved.1 Chapter Seven, Customer Call Reporter (CCR) Module Two – Standard Configuration.
© 2009 Avaya Inc. All rights reserved.1 Chapter Four, UMS Web Services Module Three – Exchange 2007.
Windows Server 2003 DHCP firstname.lastname@example.org. How DHCP Allocates IP Addresses DHCP Server DHCP Database IP Address1: Leased to DHCP Client1 IP Address2:
© 2002 IBM Corporation Confidential | Date | Other Information, if necessary © Wind River Systems, released under EPL 1.0. All logos are TM of their respective.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.25-1 MPLS VPN Implementation Configuring an MP-BGP Session Between PE Routers.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.27-1 Optimizing BGP Scalability Limiting the Number of Prefixes Received from a BGP Neighbor.
Escalating TAC Service Request © 2004 Cisco Systems, Inc. All rights reserved. IPTT v4.07-1 TAC Service Request and Telephone Service Providers.
1/13 Chapter 06- Implementing Operators in a class.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.23-1 Route Selection Using Policy Controls Applying Route-Maps as BGP Filters.
S10-1 PAT328, Section 10, September 2004 Copyright 2004 MSC.Software Corporation TOPOLOGY OPTIMIZATION.
Conditional Statements. Program control statements modify the order of statement execution. Statements in a C program normally executes from top to bottom,
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v3.04-1 Configuring Rules Rule Basics.
Overview of the Paysonnel CE. Overview Paysonnel CE Go to URL- 1 Click [Login to Paysonnel CE] 2 How to Log-in to Paysonnel CE 1 2.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.26-1 Complex MPLS VPNs Introducing Central Services VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v3.06-1 Using CSA Analysis Configuring Application Deployment Investigation.
Carousel from flshow.netflshow.net by Saverio CaminitiSaverio Caminiti.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.23-1 Route Selection Using Policy Controls Implementing Changes in BGP Policy.
© 2009 Avaya Inc. All rights reserved.1 Chapter Four, UMS Web Services Module Two – IMAP Service.
1 © Luxoft Training 2013 Spring Framework Module 10 JMS & EJB.
A Bill is a proposal for a new law, or a proposal to change an existing law that is presented for debate before Parliament. Bills are introduced in either.
PAT312, Section 17, December 2006 S17-1 Copyright 2007 MSC.Software Corporation SECTION 17 ELEMENT PROPERTIES.
HPC Pipelining Parallelism is achieved by starting to execute one instruction before the previous one is finished. The simplest kind overlaps the execution.
© 2005 by IBM; made available under the EPL v1.0 | March 1, 2005 Tim deBoer email@example.com Gorkem Ercan firstname.lastname@example.org Extend WTP Server Tools for your.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.23-1 Module Summary The multihomed customer network must exchange BGP information with both ISP.
© 2006 Avaya Inc. All rights reserved. Embedded File Management and SD-Card Handling.
PRELIMINARY ENGLISH TEST Form 11-A Okulicheva Olga.
Aim The experiment is aimed at testing the following hypothesis: light is necessary for the leaves of a young plant to become green.
Object-Oriented Programme 1 SSD3: Object-Oriented Programming and Design.
WS8-1 PAT328, Workshop 8, September 2004 Copyright 2004 MSC.Software Corporation WORKSHOP 8 Viewing Results for MSC.Nastran Ply PCOMPG Entries Using MSC.Patran.
How can we measure distances in open space. Distances in open space.
Exception Handling 1. Introduction Users may use our programs in an unexpected ways. Due to design errors or coding errors, our programs may fail in unexpected.
© 2006 Cisco Systems, Inc. All rights reserved. CIPT1 v5.03-1 Deployment of Cisco Unified CallManager Release 5.0 Endpoints Managing Endpoints with Cisco.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.23-1 Route Selection Using Policy Controls Using Outbound Route Filtering.
Linear Block Codes Mahdi Barhoush Mohammad Hanaysheh.
Object Oriented Programming Ashraf Zia Lecturer Abdul Wali Khan University, Mardan. Lecture - 2.
Linux Daemons. Agenda What is a daemon What is a daemon What Is It Going To Do? What Is It Going To Do? How much interaction How much interaction Basic.
© 2006 Cisco Systems, Inc. All rights reserved. BSCI v3.02-1 Configuring EIGRP Using EIGRP in an Enterprise Network.
Standard I/O and Pipes. Standard Input and Output Linux provides three I/O channels to Programs Standard input (STDIN) - keyboard by default Standard.
© 2006 Avaya Inc. All rights reserved. Programmable Buttons and features.
Dynamic Designer Is the easy way for you to cut as much as 80% from the time and cost of getting your new products to market, and improving the old ones.
© 2006 Cisco Systems, Inc. All rights reserved.IP6FD v2.06-1 IPv6 Transition Mechanisms Implementing Dual Stack.
Учимся писать Эссе. Opinion essays § 1- introduce the subject and state your opinion § 2-4 – or more paragraphs - first viewpoint supported by reasons/
BREADTH FIRST TRAVERSAL Lesson Plan -3. Evocation.
Copyright ® 2000 MSC.Software Results Animation S15-1 PAT301, Section 15, October 2003 SECTION 15 RESULTS ANIMATION.
WS4-1 WORKSHOP 4 MODAL TRANSIENT ANALYSIS NAS122, Workshop 4, August 2005 Copyright 2005 MSC.Software Corporation.
Centrifugal force (rotating reference frame). Centrifugal force (from Latin centrum "center" and fugere "to flee") can generally be any force directed.
WS3-1 PAT328, Workshop 3, May 2005 Copyright 2005 MSC.Software Corporation WORKSHOP 3 TOPOLOGY OPTIMIZATION.
PERT/CPM PROJECT SCHEDULING Allocation of resources. Includes assigning the starting and completion dates to each part (or activity) in such a manner that.
Еще похожие презентации в нашем архиве:
© 2017 MyShared Inc. All rights reserved.