当前位置:网站首页>Analyze menu analysis
Analyze menu analysis
2022-07-06 03:02:00 【thoughtCodes】
Analyze Menu analysis
- Catalog
- summary
- Design thinking
- Analysis of implementation ideas
- 1.Inspact code
- 2.code clean up
- 3.silnet cleanup
- 4.
- 5. Configure the current inspection file
- inter nuntity
- show data cover
- generate coverage report
- hide covergage
- analysize dependiences
- Analyise background dependies
- Analyise modeul dependiences
- analyise circle denpendience
- Analysis data tohere
- Analysis datea from here
- Analysiss stack trace or thead dump
- Expand to achieve
- Performance parameter test :
- References and recommended readings
Survive by day and develop by night.
talk for import biz , show your code,I am busy,make a better result.
Catalog
summary
demand :
Design thinking
Analysis of implementation ideas
1.Inspact code
Used to check java Code quality :
2.code clean up
The code empties the file .
3.silnet cleanup
Code in silent mode clean up
4.
Inspection methods
5. Configure the current inspection file
inter nuntity
Code inference
show data cover
generate coverage report
Generate html The report file of
hide covergage
Hide overlay
analysize dependiences
Analysis dependence :
Analyise background dependies
Analyze reverse dependencies
Analyise modeul dependiences
analyise circle denpendience
Analyze circular dependencies :
Analyze whether the project has circular dependencies :
Analysis data tohere
Analyze this data flow
Analysis datea from here
Analyze the data flow here
Analysiss stack trace or thead dump
analysis heap,stack The trajectory , Or thread dump file .
Expand to achieve
Reference here :github: Simply implement the above process :
Entry level implementation :
: Partial source code implementation .
: The source code to achieve
Performance parameter test :
About per second 18-20 A request , It's mainly used in the Internet IO The operation takes a lot of time .
References and recommended readings
Welcome to , Dear brother , If it helps you , A little praise and a little attention !~
边栏推荐
- codeforces每日5题(均1700)-第六天
- Pat 1084 broken keyboard (20 points) string find
- Introduction to robotframework (III) Baidu search of webui automation
- DDoS "fire drill" service urges companies to be prepared
- Web security SQL injection vulnerability (1)
- Maturity of master data management (MDM)
- [Chongqing Guangdong education] higher mathematics I reference materials of Southwest Petroleum University
- Custom attribute access__ getattribute__/ Settings__ setattr__/ Delete__ delattr__ method
- XSS challenges bypass the protection strategy for XSS injection
- 技术分享 | undo 太大了怎么办
猜你喜欢
故障分析 | MySQL 耗尽主机内存一例分析
一个复制也能玩出花来
GifCam v7.0 极简GIF动画录制工具中文单文件版
[pointer training - eight questions]
Taobao focus map layout practice
OCR文字识别方法综述
BUUCTF刷题笔记——[极客大挑战 2019]EasySQL 1
Web security SQL injection vulnerability (1)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 14
Yyds dry inventory comparison of several database storage engines
随机推荐
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 23
Sign SSL certificate as Ca
How to accurately identify master data?
Yyds dry inventory comparison of several database storage engines
1. Dynamic parameters of function: *args, **kwargs
ERA5再分析资料下载攻略
2.13 simulation summary
一个复制也能玩出花来
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 24
深度解析链动2+1模式,颠覆传统卖货思维?
手写数据库客户端
淘宝焦点图布局实战
Era5 reanalysis data download strategy
MySQL advanced notes
What are the principles of software design (OCP)
Redis SDS principle
主数据管理(MDM)的成熟度
Installation and use tutorial of cobaltstrike-4.4-k8 modified version
Jenkins basic knowledge ----- detailed explanation of 03pipeline code
[ruoyi] enable Mini navigation bar