CN110413336A - Exploration project starts method, apparatus, server and storage medium - Google Patents

Exploration project starts method, apparatus, server and storage medium Download PDF

Info

Publication number
CN110413336A
CN110413336A CN201910528779.7A CN201910528779A CN110413336A CN 110413336 A CN110413336 A CN 110413336A CN 201910528779 A CN201910528779 A CN 201910528779A CN 110413336 A CN110413336 A CN 110413336A
Authority
CN
China
Prior art keywords
component
file
shielded
object module
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910528779.7A
Other languages
Chinese (zh)
Other versions
CN110413336B (en
Inventor
王保军
王海瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910528779.7A priority Critical patent/CN110413336B/en
Publication of CN110413336A publication Critical patent/CN110413336A/en
Application granted granted Critical
Publication of CN110413336B publication Critical patent/CN110413336B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/20Software design
    • G06F8/24Object-oriented
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44568Immediately runnable code
    • G06F9/44578Preparing or optimising for loading

Abstract

A kind of exploration project starting method, which comprises receive the enabled instruction for the object module in exploration project;Determine the to be shielded file and/or to be shielded component unrelated with the object module;Shield the file to be shielded and/or component to be shielded;According to the file to be shielded and/or component to be shielded, associated documents relevant to the object module and/or associated component are determined;The associated documents and/or the associated component are loaded, to start the object module.The present invention also provides a kind of exploration project starter, server and storage mediums.The present invention can be reduced the starting time of project, meanwhile, improve the development efficiency of project.

Description

Exploration project starts method, apparatus, server and storage medium
Technical field
The present invention relates to project development technical field more particularly to a kind of exploration project starting method, apparatus, server and Storage medium.
Background technique
In the development process of project, a developer would generally be responsible for some module or function of the project.With Project is continually developed, and project is increasing, and the module or function of project are also more and more, this allows for load when project initiation Content it is more and more, the speed for causing project initiation is slower and slower.
Found in practice, developer usually only need to spend several seconds time go to modify the module oneself being responsible for some File, but the starting time of entire project but needs 6 minutes or so, and for developer, they, which are only concerned, bears The modification time of some module of duty, is not relevant for the starting time of entire project, if the starting time of entire project is significantly More than the modification time for the module that he is responsible for, this can undoubtedly waste the time of developer, meanwhile, reduce project development Efficiency.
Summary of the invention
In view of the foregoing, it is necessary to which a kind of exploration project starting method, apparatus, server and storage medium, energy are provided The starting time of project is enough reduced, meanwhile, improve the development efficiency of project.
The first aspect of the present invention provides a kind of exploration project starting method, which comprises
Receive the enabled instruction for the object module in exploration project;
Determine the to be shielded file and/or to be shielded component unrelated with the object module;
Shield the file to be shielded and/or component to be shielded;
According to the file to be shielded and/or component to be shielded, determine associated documents relevant to the object module and/ Or associated component;
The associated documents and/or the associated component are loaded, to start the object module.
In one possible implementation, described after the shielding file to be shielded and/or component to be shielded Method further include:
Obtain remaining file and/or component;
According to the dependence between the remaining file and/or component, judge to load the remaining file and/or Whether component can start the object module;
If the object module cannot be started by loading the remaining file and/or component, from the described to be shielded of shielding In file and/or component to be shielded, the file to be restored and/or component to be restored for needing to restore are determined;
Restore the file to be restored and/or component to be restored;
It is described according to the file to be shielded and/or component to be shielded, it is determining relevant related literary with the object module Part and/or associated component include;
According to the file to be shielded and/or component to be shielded and the file to be restored and/or component to be restored, really Fixed associated documents relevant to the object module and/or associated component.
In one possible implementation, the determination to be shielded file unrelated with the object module and/or to Shield assembly includes:
Obtain deployment descriptor file;
The serve end program unrelated with the object module is determined from the deployment descriptor file;
The shielding file to be shielded and/or component to be shielded include:
Shield the serve end program.
In one possible implementation, the determination to be shielded file unrelated with the object module and/or to Shield assembly includes:
Obtain Enterprise Java Beans configuration describing document;
The all components unrelated with the object module are determined from the Enterprise Java Beans configuration describing document;
Infrastructure component and common package are determined from all components;
The shielding file to be shielded and/or component to be shielded include:
Shield the component in all components in addition to the infrastructure component and the common package.
In one possible implementation, the determination to be shielded file unrelated with the object module and/or to Shield assembly includes:
Obtain data base manipulation statement configuration file;
The data base manipulation statement unrelated with the object module is determined from the data base manipulation statement configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the data base manipulation statement.
In one possible implementation, the determination to be shielded file unrelated with the object module and/or to Shield assembly includes:
Obtain configuration file relevant to timer in the exploration project;
The timer unrelated with the object module is determined from the configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the timer unrelated with the object module.
In one possible implementation, the determination to be shielded file unrelated with the object module and/or to Shield assembly includes:
Obtain routing configuration file;
The binding address unrelated with the object module is determined from the routing configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the binding address.
The second aspect of the present invention provides a kind of exploration project starter, and the exploration project starter includes:
Receiving module, for receiving the enabled instruction for the object module being directed in exploration project;
First determining module, for determining the to be shielded file and/or to be shielded component unrelated with the object module;
Shroud module, for shielding the file to be shielded and/or component to be shielded;
Second determining module, for according to the file to be shielded and/or component to be shielded, the determining and object module Relevant associated documents and/or associated component;
Loading module, for loading the associated documents and/or the associated component, to start the object module.
The third aspect of the present invention provides a kind of server, and the server includes processor and memory, the processing Device realizes the exploration project starting method when being used to execute the computer program stored in the memory.
The fourth aspect of the present invention provides a kind of computer readable storage medium, deposits on the computer readable storage medium Computer program is contained, realizes that the exploration project starts method when the computer program is executed by processor.
By above technical scheme, in the present invention, the enabled instruction for the object module in exploration project can receive;Into One step, determine the to be shielded file and/or to be shielded component unrelated with the object module;Further, described in shielding File to be shielded and/or component to be shielded;Still further, according to the file to be shielded and/or component to be shielded, determine with The relevant associated documents of the object module and/or associated component;Load file relevant to the object module and/or group Part, to start the object module.As it can be seen that before starting for the object module in exploration project, passing through screen in the present invention The to be shielded file and/or to be shielded component unrelated with the object module are covered, what is loaded when can reduce project initiation is interior Holding, this can reduce the starting time of project, meanwhile, improve the development efficiency of project.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of the preferred embodiment of exploration project starting method disclosed by the invention.
Fig. 2 is a kind of functional block diagram of the preferred embodiment of exploration project starter disclosed by the invention.
Fig. 3 is the structural schematic diagram of the server for the preferred embodiment that the present invention realizes exploration project starting method.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real Applying example, the present invention will be described in detail.It should be noted that in the absence of conflict, the embodiment of the present invention and embodiment In feature can be combined with each other.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Unless otherwise defined, all technical and scientific terms used herein and belong to technical field of the invention The normally understood meaning of technical staff is identical.Term as used herein in the specification of the present invention is intended merely to description tool The purpose of the embodiment of body, it is not intended that in the limitation present invention.
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real Applying mode, the present invention is described in further detail.
The exploration project starting method application of the embodiment of the present invention in the server, can also apply in server and pass through In the hardware environment that the electronic equipment that network and the server are attached is constituted, held jointly by server and electronic equipment Row.Network includes but is not limited to: wide area network, Metropolitan Area Network (MAN) or local area network.
Wherein, server, which can refer to, to provide the department of computer science of service to equipment (such as electronic equipment) other in network System.If personal computer can externally provide File Transfer Protocol (File Transfer Protocol, abbreviation FTP) clothes Business, can also be server.From narrow scope, server refers exclusively to certain high-performance computers, can externally be mentioned by network For service, for common PC, stability, safety, performance etc. require it is higher, therefore The hardware such as CPU, chipset, memory, disk system, network and common PC are different.
Referring to Figure 1, Fig. 1 is a kind of flow chart of the preferred embodiment of exploration project starting method disclosed by the invention. Wherein, the sequence of step can change in the flow chart according to different requirements, and certain steps can be omitted.
S11, server receive the enabled instruction for the object module in exploration project.
In the development process of project, project is often split into modules different one by one by function, is allowed different Developer can carry out development to the module being each responsible for simultaneously, improve the efficiency of project development.
Wherein, module, also known as component are the collection for referring to individually name and be independently completed the program statement of certain function It closes (i.e. the aggregate of program code and data structure).There are two basic features for its tool: surface and internal feature.
Wherein, surface refers to interface that module contacts with external environment (i.e. other modules or the routine call module Mode, include the global variable of input/output argument, reference) and module function;Internal feature refers to the inside of module Environment has the special feature that (i.e. the local data of the module and program code).
Wherein, object module can be understood as some developer some module in responsible exploration project.
S12, server determine the to be shielded file and/or to be shielded component unrelated with the object module.
In general, containing many a modules inside a project, when a module needs to start, it is full load is not needed The file and/or component in portion.
Wherein, the file to be shielded and/or component to be shielded refer to the file and/or group unrelated with the object module Part, in order to accelerate the starting time of module, these files unrelated with the object module and/or component need to shield.
Wherein, component (Component) is the simplified package to data and method, is part reusable in program, In During software development, reusable part can be generally packaged, after packaged, so that it may it calls directly, without Rewrite this partial code.
Optionally, the determination to be shielded file unrelated with the object module and/or component to be shielded include:
Obtain deployment descriptor file;
The serve end program unrelated with the object module is determined from the deployment descriptor file;
The shielding file to be shielded and/or component to be shielded include:
Shield the serve end program.
Wherein, deployment descriptor file refers to web.xml file, needs to add when for configuring web (network) project initiation The information of load.
Wherein, the serve end program Servlet (Server Applet) is the abbreviation of Java Servlet, referred to as small Service routine or service adapter, with the server of written in Java, major function is interactively to browse and modify Data generate dynamic web content.
Specifically, the deployment descriptor file state presence of the serve end program, and bind specific class with And access path.
Wherein, class (Class) is that Object-oriented Programming Design (OOP, Object-Oriented Programming) is realized The basis of Information encapsulation.Class is a kind of user defined type, also referred to as Class Type.Each class includes data explanation and one group of operand According to or transmitting message function.The example of class is known as object.
In the optional embodiment, deployment descriptor file can be first obtained, from the deployment descriptor file After the determining serve end program unrelated with the object module, so that it may shield the serve end program, leave behind the portion Program relevant to the object module in descriptor file is affixed one's name to, is loaded when can thus reduce the starting object module Content, to reduce the starting time.
Optionally, the determination to be shielded file unrelated with the object module and/or component to be shielded include:
Obtain Enterprise Java Beans configuration describing document;
The all components unrelated with the object module are determined from the Enterprise Java Beans configuration describing document;
Infrastructure component and common package are determined from all components;
The shielding file to be shielded and/or component to be shielded include:
Shield the component in all components in addition to the infrastructure component and the common package.
Wherein, the Enterprise Java Beans refer to that EJB (Enterprise JavaBean), EJB are J2EE (Java2 Platform, Enterprise Edition) server end component model, EJB include Session Border Control (Session Bean), Entity B ean (Entity Bean), Message-Driven Bean (Message Driven Bean).Wherein, it is big enterprise that J2EE, which is one, The calculating type of industry host-level and the Java platform designed.
Wherein, Session Border Control is utilized to complete the business operation of some server ends in J2EE application program, such as visits It asks database, call other EJB components;Entity B ean is domain model object, maps (object/ for realizing O/R Relational mapping, Object/Relational Mapping), it is responsible for the record of table in database being mapped to entity object;Message-driven Bean is the new firms Bean introduced in EJB2.0, and an actually asynchronous Stateless session Bean, client call disappears It withouts waiting for, immediately returns to after breath driving Bean.
Wherein, the infrastructure component includes but is not limited to: System (system) class, Runtime (running environment) class, Date (date) class, Math (mathematics) class and Random (random) class etc..
Wherein, the common package refer to the daily accumulation of developer, encapsulation it is good, functional independence, often use The range of the accessory part arrived, the common package can include but is not limited to: collection class (including synchronization, sequence etc.), equipment Assisted class (including the assisted class such as sound, photo acquisition, clipbook, computer hardware information, keyboard, mouse), encryption class (including Base64, Md5 (Message-Digest Algorithm, Message Digest 5), SHA1 (Secure Hash Algorithm1, secure hash algorithm 1), it is reversible with irreversible encryption etc.) and thread class etc..The common package can help Developer saves many development times.Wherein, Base64 is that one kind based on 64 printable characters indicates binary data Method;Md5 refers to a kind of Cryptographic Hash Function being widely used, and can produce out the hash of one 128 (16 byte) It is worth (hash value), for ensuring that information transmission is complete consistent;SHA1 is a kind of Cryptographic Hash Function, and message is treated as always One position (bit) character string is handled.
In the optional embodiment, Enterprise Java Beans configuration describing document can be first obtained, from the enterprise It, will also be from described all groups after determining all components unrelated with the object module in grade Java component configuration describing document Infrastructure component and common package are determined in part, further, are shielded in all components except the infrastructure component and the public affairs With the component except component, the component content loaded when starting the object module can be thus reduced, when reducing starting Between.
Optionally, the determination to be shielded file unrelated with the object module and/or component to be shielded include:
Obtain data base manipulation statement configuration file;
The data base manipulation statement unrelated with the object module is determined from the data base manipulation statement configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the data base manipulation statement.
Wherein, the data base manipulation statement abbreviation SQL, for accessing data and querying, updating, and managing relationship number According to library system;It is simultaneously also the extension name of database script file.
Specifically, during exploitation, it will usually need the data base manipulation statement used to encapsulate exploration project Come, it is only necessary to which specified data library action statement can be called by providing specific parameter, and not have to repeat to go to write described Data base manipulation statement.But for a module, the operation for having excessive to database is not needed many times, than Such as, some module is accomplished that function of search, there was only the operation inquired to database, as other data base manipulation statements are to use Less than, such as insertion, deletion and update etc..These data base manipulation statements taken less than are not required to be loaded, and being can be by Shielding, any influence will not be had to the object module by shielding.It therefore, can be in the optional embodiment Data base manipulation statement configuration file is first obtained, the determining and object module from the data base manipulation statement configuration file After unrelated data base manipulation statement, so that it may the shielding data base manipulation statement unrelated with the object module, only Retain data base manipulation statement relevant to the object module in the data base manipulation statement configuration file, it thus can be with The data base manipulation statement content loaded when starting the object module is reduced, to reduce the starting time.
Optionally, the determination to be shielded file unrelated with the object module and/or component to be shielded include:
Obtain configuration file relevant to timer in the exploration project;
The timer unrelated with the object module is determined from the configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the timer unrelated with the object module.
Specifically, the timer is one preset time value of setting, then after the preset time value or every The function of pre-set programs code is executed every this time value.
For example, triggering timer, the timer is for monitoring the user in some page when user logins successfully Without operation duration, when the user is when the page is more than the preset time value of timer without operation duration, logging off users Logging state.At this point, the user needs to re-start register.
Specifically, there are mainly two types of timers: Timer timer and Quartz timer in Java exploitation.
Wherein, Timer (timer) is provided in JDK (Java Development Kit, Java development kit) One Timer Utility, use when, can play an individual thread except main thread and execute specified plan target, can It once or is repeatedly executed repeatedly with specified execute.Quartz is one completely by the open source job scheduling frame of written in Java, Simple powerful mechanism is provided to carry out job scheduling in java application.
In the optional embodiment, configuration file relevant to timer in the exploration project can be first obtained, After determining the timer unrelated with the object module in the configuration file, so that it may shielding and the object module without The timer of pass leaves behind timer relevant to the object module in the configuration file, can thus reduce starting The timer content loaded when the object module, to reduce the starting time.
Optionally, the determination to be shielded file unrelated with the object module and/or component to be shielded include:
Obtain routing configuration file;
The binding address unrelated with the object module is determined from the routing configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the binding address.
Wherein, the routing refers to the specific method being mapped to address (URL) in the concrete kind of Java, or is mapped to On specific JSP (Java Server Pages, Java service page) file.Wherein, JSP is in traditional webpage HTML Java applet is inserted into (HyperText Markup Language, HyperText Markup Language) file (* .htm, * .html) Section (Scriptlet) and JSP label (tag), to form jsp file, suffix is entitled (.jsp).
Wherein, the binding address refers to the address for the specific method being mapped in concrete kind.Different addresses may tie The different function of disparate modules is tied up.
Specifically, it is not required to be loaded by other modules in addition to the object module that address bundlees.Therefore, In the optional embodiment, routing configuration file can be first obtained, the determining and mesh from the routing configuration file After marking the unrelated binding address of module, so that it may the binding address is shielded, it can be to avoid by shielding the binding address The method of other modules of call address binding, thus can load other modules to avoid when starting the object module Content reduces the content loaded when starting the object module, reduces the starting time.
S13, server shield the file to be shielded and/or component to be shielded.
Wherein, the mode of the shielding includes but is not limited to: the modes such as deletion, annotation and isolation.Wherein, the annotation is Finger falls the code annotation of the component to be shielded, and the code after annotation will not be compiled device compiling;The isolation refers to institute State file to be shielded be moved to exploration project scanning less than catalogue under, it is ensured that will not be loaded by the object module.
S14, according to the file to be shielded and/or component to be shielded, server determination is relevant to the object module Associated documents and/or associated component.
Specifically, remove the file to be shielded and/or component to be shielded from whole file and/or component, it is remaining File and/or component be associated documents relevant to the object module and/or associated component.
As an alternative embodiment, after step S13, the method also includes:
Obtain remaining file and/or component;
According to the dependence between the remaining file and/or component, judge to load the remaining file and/or Whether component can start the object module;
If the object module cannot be started by loading the remaining file and/or component, from the described to be shielded of shielding In file and/or component to be shielded, the file to be restored and/or component to be restored for needing to restore are determined;
Restore the file to be restored and/or component to be restored;
For step S14 according to the file to be shielded and/or component to be shielded, determination is relevant related to the object module File and/or associated component include;
According to the file to be shielded and/or component to be shielded and the file to be restored and/or component to be restored, really Fixed associated documents relevant to the object module and/or associated component.
Specifically, there may be the relationships that certain is relied between file and file, between component and component.For example, In In Java exploitation, if first class has invoked the method and/or data of second class, first class is just to second class Dependence is produced, if second class is shielded, first class may malfunction in operation.It therefore, be according to institute The dependence between remaining file and/or component is stated, it is further to remaining file and/or component to be judged.
Wherein, the file to be restored and/or component to be restored refer in the file to be shielded and/or component to be shielded In, file relevant to the object module and/or component have the file and/or component of dependence.The file to be restored And/or the method that needs to call there may be file relevant to the object module and/or component in component to be restored and/or Data etc..
In the optional embodiment, available remaining file and/or component, then according to the remaining text Dependence between part and/or component judges whether load the remaining file and/or component can start the target mould Block, if the load remaining file and/or component cannot start the object module it is necessary to from the text to be shielded of shielding In part and/or component to be shielded, the file to be restored and/or component to be restored for needing to restore are determined, finally restore described to extensive Multiple file and/or component to be restored.Wherein, the remaining file and/or component and the file to be restored and/or to Recovery component is associated documents relevant to the object module and/or associated component together.The file to be restored and/or Component to be restored namely file relevant to the object module and/or component are essential in start-up loading.
S15, server load the associated documents and/or the associated component, to start the object module.
Specifically, the file and/or component loaded when starting the object module is to start the mesh by screening It does not need to load the file and/or component unrelated with the object module when marking module, need to only load and the object module phase The file and/or component of pass, to reduce the content loaded when starting the object module.
In the method flow described in Fig. 1, the enabled instruction for the object module in exploration project can receive;Into One step, determine the to be shielded file and/or to be shielded component unrelated with the object module;Further, described in shielding File to be shielded and/or component to be shielded;Still further, according to the file to be shielded and/or component to be shielded, determine with The relevant associated documents of the object module and/or associated component;Load file relevant to the object module and/or group Part, to start the object module.As it can be seen that before starting for the object module in exploration project, passing through screen in the present invention The to be shielded file and/or to be shielded component unrelated with the object module are covered, what is loaded when can reduce project initiation is interior Holding, this can reduce the starting time of project, meanwhile, improve the development efficiency of project.
The above is only a specific embodiment of the invention, but scope of protection of the present invention is not limited thereto, for For those skilled in the art, without departing from the concept of the premise of the invention, improvement, but these can also be made It all belongs to the scope of protection of the present invention.
Fig. 2 is referred to, Fig. 2 is a kind of functional module of the preferred embodiment of exploration project starter disclosed by the invention Figure.
In some embodiments, the exploration project starter is run in server.The exploration project starting dress Setting may include multiple functional modules as composed by program code segments.Each program segment in the exploration project starter Program code can store in memory, and as performed by least one processor, item is developed described in Fig. 1 to execute Step some or all of in mesh starting method.
In the present embodiment, function of the exploration project starter according to performed by it can be divided into multiple function It can module.The functional module may include: receiving module 201, the first determining module 202, the determination of shroud module 203, second Module 204 and loading module 205.The so-called module of the present invention refers to that one kind can be performed by least one processor and energy The series of computation machine program segment of fixed function is enough completed, storage is in memory.In some embodiments, about each module Function will be described in detail in subsequent embodiment.
Receiving module 201, for receiving the enabled instruction for the object module being directed in exploration project;
In the development process of project, project is often split into modules different one by one by function, is allowed different Developer can carry out development to the module being each responsible for simultaneously, improve the efficiency of project development.
Wherein, module, also known as component are the collection for referring to individually name and be independently completed the program statement of certain function It closes (i.e. the aggregate of program code and data structure).There are two basic features for its tool: surface and internal feature.
Wherein, surface refers to interface that module contacts with external environment (i.e. other modules or the routine call module Mode, include the global variable of input/output argument, reference) and module function;Internal feature refers to the inside of module Environment has the special feature that (i.e. the local data of the module and program code).
Wherein, object module can be understood as some developer some module in responsible exploration project.
First determining module 202, for the determining to be shielded file unrelated with the object module and/or to be shielded group Part;
In general, containing many a modules inside a project, when a module needs to start, it is full load is not needed The file and/or component in portion.
Wherein, the file to be shielded and/or component to be shielded refer to the file and/or group unrelated with the object module Part, in order to accelerate the starting time of module, these files unrelated with the object module and/or component need to shield.
Wherein, component (Component) is the simplified package to data and method, is part reusable in program, In During software development, reusable part can be generally packaged, after packaged, so that it may it calls directly, without Rewrite this partial code.
Shroud module 203, for shielding the file to be shielded and/or component to be shielded;
Wherein, the mode of the shielding includes but is not limited to: the modes such as deletion, annotation and isolation.Wherein, the annotation is Finger falls the code annotation of the component to be shielded, and the code after annotation will not be compiled device compiling;The isolation refers to institute State file to be shielded be moved to exploration project scanning less than catalogue under, it is ensured that will not be loaded by the object module.
Second determining module 204, for according to the file to be shielded and/or component to be shielded, the determining and target The relevant associated documents of module and/or associated component;
Specifically, remove the file to be shielded and/or component to be shielded from whole file and/or component, it is remaining File and/or component be associated documents relevant to the object module and/or associated component.
Wherein, if the load remaining file and/or component cannot start the object module, then the institute from shielding It states after restoring the file to be restored and/or component to be restored in file to be shielded and/or component to be shielded, the remaining text Part and/or component and the file to be restored and/or component to be restored are relevant related to the object module together File and/or associated component.
Loading module 205, for loading the associated documents and/or the associated component, to start the object module.
Specifically, the file and/or component loaded when starting the object module is to start the mesh by screening It does not need to load the file and/or component unrelated with the object module when marking module, need to only load and the object module phase The file and/or component of pass, to reduce the content loaded when starting the object module.
As an alternative embodiment, the exploration project starter further include:
Module is obtained, for after the shroud module 203 shields the file to be shielded and/or component to be shielded, Obtain remaining file and/or component;
Judgment module, it is described surplus for according to the dependence between the remaining file and/or component, judging to load Whether remaining file and/or component can start the object module;
Third determining module, if the object module cannot be started for loading the remaining file and/or component, from In the file to be shielded and/or component to be shielded of shielding, the file to be restored for needing to restore and/or to be restored group are determined Part;
Recovery module, for restoring the file to be restored and/or component to be restored;
Second determining module 204 is according to the file to be shielded and/or component to be shielded, the determining and target mould The relevant associated documents of block and/or associated component include:
According to the file to be shielded and/or component to be shielded and the file to be restored and/or component to be restored, really Fixed associated documents relevant to the object module and/or associated component.
Specifically, there may be the relationships that certain is relied between file and file, between component and component.For example, In In Java exploitation, if first class has invoked the method and/or data of second class, first class is just to second class Dependence is produced, if second class is shielded, first class may malfunction in operation.It therefore, be according to institute The dependence between remaining file and/or component is stated, it is further to remaining file and/or component to be judged.
Wherein, the file to be restored and/or component to be restored refer in the file to be shielded and/or component to be shielded In, file relevant to the object module and/or component have the file and/or component of dependence.The file to be restored And/or the method that needs to call there may be file relevant to the object module and/or component in component to be restored and/or Data etc..
In the optional embodiment, available remaining file and/or component, then according to the remaining text Dependence between part and/or component judges whether load the remaining file and/or component can start the target mould Block, if the load remaining file and/or component cannot start the object module it is necessary to from the text to be shielded of shielding In part and/or component to be shielded, the file to be restored and/or component to be restored for needing to restore are determined, finally restore described to extensive Multiple file and/or component to be restored, wherein the file to be restored of recovery and/or component to be restored namely with the target The relevant file of module and/or component are essential in start-up loading.
As an alternative embodiment, first determining module 202 includes:
First acquisition submodule, for obtaining deployment descriptor file;
First determines submodule, for determining the service unrelated with the object module from the deployment descriptor file Hold program;
The shroud module 203 shields the mode of the file to be shielded and/or component to be shielded specifically:
Shield the serve end program.
Wherein, deployment descriptor file refers to web.xml file, needs to add when for configuring web (network) project initiation The information of load.
Wherein, the serve end program Servlet (Server Applet) is the abbreviation of Java Servlet, referred to as small Service routine or service adapter, with the server of written in Java, major function is interactively to browse and modify Data generate dynamic web content.
Specifically, the deployment descriptor file state presence of the serve end program, and bind specific class with And access path.
Wherein, class (Class) is that Object-oriented Programming Design (OOP, Object-Oriented Programming) is realized The basis of Information encapsulation.Class is a kind of user defined type, also referred to as Class Type.Each class includes data explanation and one group of operand According to or transmitting message function.The example of class is known as object.
In the optional embodiment, deployment descriptor file can be first obtained, from the deployment descriptor file After the determining serve end program unrelated with the object module, so that it may shield the serve end program, leave behind the portion Program relevant to the object module in descriptor file is affixed one's name to, is loaded when can thus reduce the starting object module Content, to reduce the starting time.
As an alternative embodiment, first determining module 202 includes:
Second acquisition submodule, for obtaining Enterprise Java Beans configuration describing document;
Second determines submodule, for the determining and target mould from the Enterprise Java Beans configuration describing document The unrelated all components of block;
Described second determines submodule, is also used to determine infrastructure component and common package from all components;
The shroud module 203 shields the mode of the file to be shielded and/or component to be shielded specifically:
Shield the component in all components in addition to the infrastructure component and the common package.
Wherein, the Enterprise Java Beans refer to that EJB (Enterprise JavaBean), EJB are J2EE (Java2 Platform, Enterprise Edition) server end component model, EJB include Session Border Control (Session Bean), Entity B ean (Entity Bean), Message-Driven Bean (Message Driven Bean).Wherein, it is big enterprise that J2EE, which is one, The calculating type of industry host-level and the Java platform designed.
Wherein, Session Border Control is utilized to complete the business operation of some server ends in J2EE application program, such as visits It asks database, call other EJB components;Entity B ean is domain model object, maps (object/ for realizing O/R Relational mapping, Object/Relational Mapping), it is responsible for the record of table in database being mapped to entity object;Message-driven Bean is the new firms Bean introduced in EJB2.0, and an actually asynchronous Stateless session Bean, client call disappears It withouts waiting for, immediately returns to after breath driving Bean.
Wherein, the infrastructure component includes but is not limited to: System (system) class, Runtime (running environment) class, Date (date) class, Math (mathematics) class and Random (random) class etc..
Wherein, the common package refer to the daily accumulation of developer, encapsulation it is good, functional independence, often use The range of the accessory part arrived, the common package can include but is not limited to: collection class (including synchronization, sequence etc.), equipment Assisted class (including the assisted class such as sound, photo acquisition, clipbook, computer hardware information, keyboard, mouse), encryption class (including Base64, Md5 (Message-Digest Algorithm, Message Digest 5), SHA1 (Secure Hash Algorithm1, secure hash algorithm 1), it is reversible with irreversible encryption etc.) and thread class etc..The common package can help Developer saves many development times.Wherein, Base64 is that one kind based on 64 printable characters indicates binary data Method;Md5 refers to a kind of Cryptographic Hash Function being widely used, and can produce out the hash of one 128 (16 byte) It is worth (hash value), for ensuring that information transmission is complete consistent;SHA1 is a kind of Cryptographic Hash Function, and message is treated as always One position (bit) character string is handled.
In the optional embodiment, Enterprise Java Beans configuration describing document can be first obtained, from the enterprise It, will also be from described all groups after determining all components unrelated with the object module in grade Java component configuration describing document Infrastructure component and common package are determined in part, further, are shielded in all components except the infrastructure component and the public affairs With the component except component, the component content loaded when starting the object module can be thus reduced, when reducing starting Between.
As an alternative embodiment, first determining module 202 includes:
Third acquisition submodule, for obtaining data base manipulation statement configuration file;
Third determines submodule, for from the data base manipulation statement configuration file it is determining with the object module without The data base manipulation statement of pass;
The shroud module 203 shields the mode of the file to be shielded and/or component to be shielded specifically:
Shield the data base manipulation statement.
Wherein, the data base manipulation statement abbreviation SQL, for accessing data and querying, updating, and managing relationship number According to library system;It is simultaneously also the extension name of database script file.
Specifically, during exploitation, it will usually need the data base manipulation statement used to encapsulate exploration project Come, it is only necessary to which specified data library action statement can be called by providing specific parameter, and not have to repeat to go to write described Data base manipulation statement.But for a module, the operation for having excessive to database is not needed many times, than Such as, some module is accomplished that function of search, there was only the operation inquired to database, as other data base manipulation statements are to use Less than, such as insertion, deletion and update etc..These data base manipulation statements taken less than are not required to be loaded, and being can be by Shielding, any influence will not be had to the object module by shielding.It therefore, can be in the optional embodiment Data base manipulation statement configuration file is first obtained, the determining and object module from the data base manipulation statement configuration file After unrelated data base manipulation statement, so that it may the shielding data base manipulation statement unrelated with the object module, only Retain data base manipulation statement relevant to the object module in the data base manipulation statement configuration file, it thus can be with The data base manipulation statement content loaded when starting the object module is reduced, to reduce the starting time.
As an alternative embodiment, first determining module 202 includes:
4th acquisition submodule, for obtaining configuration file relevant to timer in the exploration project;
4th determines submodule, for determining the timer unrelated with the object module from the configuration file;
The shroud module 203 shields the mode of the file to be shielded and/or component to be shielded specifically:
Shield the timer unrelated with the object module.
Specifically, the timer is one preset time value of setting, then after the preset time value or every The function of pre-set programs code is executed every this time value.
For example, triggering timer, the timer is for monitoring the user in some page when user logins successfully Without operation duration, when the user is when the page is more than the preset time value of timer without operation duration, logging off users Logging state.At this point, the user needs to re-start register.
Specifically, there are mainly two types of timers: Timer timer and Quartz timer in Java exploitation.
Wherein, Timer (timer) is provided in JDK (Java Development Kit, Java development kit) One Timer Utility, use when, can play an individual thread except main thread and execute specified plan target, can It once or is repeatedly executed repeatedly with specified execute.Quartz is one completely by the open source job scheduling frame of written in Java, Simple powerful mechanism is provided to carry out job scheduling in java application.
In the optional embodiment, configuration file relevant to timer in the exploration project can be first obtained, After determining the timer unrelated with the object module in the configuration file, so that it may shielding and the object module without The timer of pass leaves behind timer relevant to the object module in the configuration file, can thus reduce starting The timer content loaded when the object module, to reduce the starting time.
As an alternative embodiment, first determining module 202 includes:
5th acquisition submodule, for obtaining routing configuration file;
5th determines submodule, for determining the binding unrelated with the object module from the routing configuration file Location;
The shroud module 203 shields the mode of the file to be shielded and/or component to be shielded specifically:
Shield the binding address.
Wherein, the routing refers to the specific method being mapped to address (URL) in the concrete kind of Java, or is mapped to On specific JSP (Java Server Pages, Java service page) file.Wherein, JSP is in traditional webpage HTML Java applet is inserted into (HyperText Markup Language, HyperText Markup Language) file (* .htm, * .html) Section (Scriptlet) and JSP label (tag), to form jsp file, suffix is entitled (.jsp).
Wherein, the binding address refers to the address for the specific method being mapped in concrete kind.Different addresses may tie The different function of disparate modules is tied up.
Specifically, it is not required to be loaded by other modules in addition to the object module that address bundlees.Therefore, In the optional embodiment, routing configuration file can be first obtained, the determining and mesh from the routing configuration file After marking the unrelated binding address of module, so that it may the binding address is shielded, it can be to avoid by shielding the binding address The method of other modules of call address binding, thus can load other modules to avoid when starting the object module Content reduces the content loaded when starting the object module, reduces the starting time.
In the exploration project starter described in Fig. 2, opening for the object module in exploration project can receive Dynamic instruction;Further, it is determined that the to be shielded file and/or to be shielded component unrelated with the object module;Further, Shield the file to be shielded and/or component to be shielded;Still further, according to the file to be shielded and/or to be shielded group Part determines associated documents relevant to the object module and/or associated component;Load file relevant to the object module And/or component, to start the object module.As it can be seen that in the present invention, starting for the object module in exploration project it Before, by shielding the to be shielded file and/or to be shielded component unrelated with the object module, project initiation when institute can be reduced The content of load, this can reduce the starting time of project, meanwhile, improve the development efficiency of project.
As shown in figure 3, the structure that Fig. 3 is the server for the preferred embodiment that the present invention realizes exploration project starting method is shown It is intended to.The server 3 includes memory 31, at least one processor 32, is stored in the memory 31 and can be described The computer program 33 and at least one communication bus 34 run at least one processor 32.
It will be understood by those skilled in the art that schematic diagram shown in Fig. 3 is only the example of the server 3, not structure The restriction of the pairs of server 3 may include perhaps combining certain components or not than illustrating more or fewer components Same component, such as the server 3 can also include input-output equipment, network access equipment etc..
At least one described processor 32 can be central processing unit (Central Processing Unit, CPU), It can also be other general processors, digital signal processor (Digital Signal Processor, DSP), dedicated integrated Circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..The processor 32 can be microprocessor or the processor 32 is also possible to any conventional processor Deng the processor 32 is the control centre of the server 3, utilizes each of various interfaces and the entire server 3 of connection A part.
The memory 31 can be used for storing the computer program 33 and/or module/unit, and the processor 32 passes through Operation executes the computer program and/or module/unit being stored in the memory 31, and calls and be stored in memory Data in 31 realize the various functions of the server 3.The memory 31 can mainly include storing program area and storage number According to area, wherein storing program area can application program needed for storage program area, at least one function (for example sound plays function Energy, image player function etc.) etc.;Storage data area, which can be stored, uses created data (such as audio number according to server 3 According to, phone directory etc.) etc..In addition, memory 31 may include high-speed random access memory, it can also include non-volatile memories Device, such as hard disk, memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatibility are solid State memory device.
In conjunction with Fig. 1, the memory 31 in the server 3 stores multiple instruction to realize a kind of exploration project starting The multiple instruction can be performed to realize in method, the processor 32:
Receive the enabled instruction for the object module in exploration project;
Determine the to be shielded file and/or to be shielded component unrelated with the object module;
Shield the file to be shielded and/or component to be shielded;
According to the file to be shielded and/or component to be shielded, determine associated documents relevant to the object module and/ Or associated component;
The associated documents and/or the associated component are loaded, to start the object module.
In a kind of optional embodiment, after the shielding file to be shielded and/or component to be shielded, institute Stating processor 32 can be performed the multiple instruction to realize:
Obtain remaining file and/or component;
According to the dependence between the remaining file and/or component, judge to load the remaining file and/or Whether component can start the object module;
If the object module cannot be started by loading the remaining file and/or component, from the described to be shielded of shielding In file and/or component to be shielded, the file to be restored and/or component to be restored for needing to restore are determined;
Restore the file to be restored and/or component to be restored;
It is described according to the file to be shielded and/or component to be shielded, it is determining relevant related literary with the object module Part and/or associated component include;
According to the file to be shielded and/or component to be shielded and the file to be restored and/or component to be restored, really Fixed associated documents relevant to the object module and/or associated component.
In a kind of optional embodiment, the determination to be shielded file unrelated with the object module and/or to Shield assembly includes:
Obtain deployment descriptor file;
The serve end program unrelated with the object module is determined from the deployment descriptor file;
The shielding file to be shielded and/or component to be shielded include:
Shield the serve end program.
In a kind of optional embodiment, the determination to be shielded file unrelated with the object module and/or to Shield assembly includes:
Obtain Enterprise Java Beans configuration describing document;
The all components unrelated with the object module are determined from the Enterprise Java Beans configuration describing document;
Infrastructure component and common package are determined from all components;
The shielding file to be shielded and/or component to be shielded include:
Shield the component in all components in addition to the infrastructure component and the common package.
In a kind of optional embodiment, the determination to be shielded file unrelated with the object module and/or to Shield assembly includes:
Obtain data base manipulation statement configuration file;
The data base manipulation statement unrelated with the object module is determined from the data base manipulation statement configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the data base manipulation statement.
In a kind of optional embodiment, the determination to be shielded file unrelated with the object module and/or to Shield assembly includes:
Obtain configuration file relevant to timer in the exploration project;
The timer unrelated with the object module is determined from the configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the timer unrelated with the object module.
In a kind of optional embodiment, the determination to be shielded file unrelated with the object module and/or to Shield assembly includes:
Obtain routing configuration file;
The binding address unrelated with the object module is determined from the routing configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the binding address.
Specifically, the processor 32 can refer to the concrete methods of realizing of above-metioned instruction related in Fig. 1 corresponding embodiment The description of step, this will not be repeated here.
In the server 3 described in Fig. 3, the enabled instruction for the object module in exploration project can receive;Into One step, determine the to be shielded file and/or to be shielded component unrelated with the object module;Further, described in shielding File to be shielded and/or component to be shielded;Still further, according to the file to be shielded and/or component to be shielded, determine with The relevant associated documents of the object module and/or associated component;Load file relevant to the object module and/or group Part, to start the object module.As it can be seen that before starting for the object module in exploration project, passing through screen in the present invention The to be shielded file and/or to be shielded component unrelated with the object module are covered, what is loaded when can reduce project initiation is interior Holding, this can reduce the starting time of project, meanwhile, improve the development efficiency of project.
If the integrated module/unit of the server 3 is realized in the form of SFU software functional unit and as independent production Product when selling or using, can store in a computer readable storage medium.Based on this understanding, the present invention realizes All or part of the process in above-described embodiment method can also instruct relevant hardware to complete by computer program, The computer program can be stored in a computer readable storage medium, the computer program when being executed by processor, The step of above-mentioned each embodiment of the method can be achieved.Wherein, the computer program includes computer program code, the calculating Machine program code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer Readable medium may include: any entity or device, recording medium, USB flash disk, the movement that can carry the computer program code Hard disk, magnetic disk, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It needs to illustrate It is that the content that the computer-readable medium includes can be fitted according to the requirement made laws in jurisdiction with patent practice When increase and decrease, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium does not include electric carrier wave letter Number and telecommunication signal.
In several embodiments provided by the present invention, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the module It divides, only a kind of logical function partition, there may be another division manner in actual implementation.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds software function module.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the present invention.Any attached associated diagram label in claim should not be considered as right involved in limitation to want It asks.Furthermore, it is to be understood that one word of " comprising " does not exclude other units or steps, odd number is not excluded for plural number.It is stated in system claims Multiple units or device can also be implemented through software or hardware by a unit or device.Second equal words are used to table Show title, and does not indicate any particular order.
Finally it should be noted that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although reference Preferred embodiment describes the invention in detail, those skilled in the art should understand that, it can be to of the invention Technical solution is modified or equivalent replacement, without departing from the spirit and scope of the technical solution of the present invention.

Claims (10)

1. a kind of exploration project starts method, which is characterized in that the described method includes:
Receive the enabled instruction for the object module in exploration project;
Determine the to be shielded file and/or to be shielded component unrelated with the object module;
Shield the file to be shielded and/or component to be shielded;
According to the file to be shielded and/or component to be shielded, associated documents relevant to the object module and/or phase are determined Close component;
The associated documents and/or the associated component are loaded, to start the object module.
2. the method according to claim 1, wherein the shielding file to be shielded and/or to be shielded group After part, the method also includes:
Obtain remaining file and/or component;
According to the dependence between the remaining file and/or component, judge to load the remaining file and/or component Whether the object module can be started;
If the object module cannot be started by loading the remaining file and/or component, from the file to be shielded of shielding And/or in component to be shielded, the file to be restored and/or component to be restored for needing to restore are determined;
Restore the file to be restored and/or component to be restored;
It is described according to the file to be shielded and/or component to be shielded, determine associated documents relevant to the object module and/ Or associated component includes;
According to the file to be shielded and/or component to be shielded and the file to be restored and/or component to be restored, determine with The relevant associated documents of the object module and/or associated component.
3. method according to claim 1 or 2, which is characterized in that the determination is unrelated with the object module wait shield It covers file and/or component to be shielded includes:
Obtain deployment descriptor file;
The serve end program unrelated with the object module is determined from the deployment descriptor file;
The shielding file to be shielded and/or component to be shielded include:
Shield the serve end program.
4. method according to claim 1 or 2, which is characterized in that the determination is unrelated with the object module wait shield It covers file and/or component to be shielded includes:
Obtain Enterprise Java Beans configuration describing document;
The all components unrelated with the object module are determined from the Enterprise Java Beans configuration describing document;
Infrastructure component and common package are determined from all components;
The shielding file to be shielded and/or component to be shielded include:
Shield the component in all components in addition to the infrastructure component and the common package.
5. method according to claim 1 or 2, which is characterized in that the determination is unrelated with the object module wait shield It covers file and/or component to be shielded includes:
Obtain data base manipulation statement configuration file;
The data base manipulation statement unrelated with the object module is determined from the data base manipulation statement configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the data base manipulation statement.
6. method according to claim 1 or 2, which is characterized in that the determination is unrelated with the object module wait shield It covers file and/or component to be shielded includes:
Obtain configuration file relevant to timer in the exploration project;
The timer unrelated with the object module is determined from the configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the timer unrelated with the object module.
7. method according to claim 1 or 2, which is characterized in that the determination is unrelated with the object module wait shield It covers file and/or component to be shielded includes:
Obtain routing configuration file;
The binding address unrelated with the object module is determined from the routing configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the binding address.
8. a kind of exploration project starter, which is characterized in that the exploration project starter includes:
Receiving module, for receiving the enabled instruction for the object module being directed in exploration project;
First determining module, for determining the to be shielded file and/or to be shielded component unrelated with the object module;
Shroud module, for shielding the file to be shielded and/or component to be shielded;
Second determining module, for according to the file to be shielded and/or component to be shielded, determination to be related to the object module Associated documents and/or associated component;
Loading module, for loading the associated documents and/or the associated component, to start the object module.
9. a kind of server, which is characterized in that the server includes processor and memory, and the processor is deposited for executing The computer program stored in reservoir is to realize exploration project starting method as claimed in any of claims 1 to 7 in one of claims.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has at least one Instruction, at least one described instruction realize that exploration project as claimed in any one of claims 1 to 7 opens when being executed by processor Dynamic method.
CN201910528779.7A 2019-06-18 2019-06-18 Development project starting method, device, server and storage medium Active CN110413336B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910528779.7A CN110413336B (en) 2019-06-18 2019-06-18 Development project starting method, device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910528779.7A CN110413336B (en) 2019-06-18 2019-06-18 Development project starting method, device, server and storage medium

Publications (2)

Publication Number Publication Date
CN110413336A true CN110413336A (en) 2019-11-05
CN110413336B CN110413336B (en) 2024-03-15

Family

ID=68359265

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910528779.7A Active CN110413336B (en) 2019-06-18 2019-06-18 Development project starting method, device, server and storage medium

Country Status (1)

Country Link
CN (1) CN110413336B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020129333A1 (en) * 2000-06-05 2002-09-12 Sundeep Chandhoke System and method for programmatically generating a graphical program based on a sequence of motion control, machine vision, and data acquisition (DAQ) operations
CN101625647A (en) * 2009-08-06 2010-01-13 青岛海信电器股份有限公司 Method for accelerating starting speed of embedded software system
US8930940B2 (en) * 2011-08-19 2015-01-06 Yongyong Xu Online software execution platform

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020129333A1 (en) * 2000-06-05 2002-09-12 Sundeep Chandhoke System and method for programmatically generating a graphical program based on a sequence of motion control, machine vision, and data acquisition (DAQ) operations
CN101625647A (en) * 2009-08-06 2010-01-13 青岛海信电器股份有限公司 Method for accelerating starting speed of embedded software system
US8930940B2 (en) * 2011-08-19 2015-01-06 Yongyong Xu Online software execution platform

Also Published As

Publication number Publication date
CN110413336B (en) 2024-03-15

Similar Documents

Publication Publication Date Title
Arlow et al. Enterprise patterns and MDA: building better software with archetype patterns and UML
US10581949B2 (en) Systems, methods and computer program products for dynamic user profile enrichment and data integration
Goncalves Beginning Java EE 6 Platform with GlassFish 3: from novice to professional
US7861222B2 (en) Discoscript: a simplified distributed computing scripting language
US20070067418A1 (en) Object oriented web application framework
CA2506233A1 (en) System and method for integrating disparate data sources and application sources using a web services orchestration platform with business process execution language (bpel)
Mackey Introducing. NET 4.0: With Visual Studio 2010
Jaworski et al. Expert Python Programming: Become a master in Python by learning coding best practices and advanced programming concepts in Python 3.7
CN107608672B (en) UI module manager, UI module management method and system
US20230083849A1 (en) Parsing tool for optimizing code for deployment on a serverless platform
CN110413336A (en) Exploration project starts method, apparatus, server and storage medium
US8010955B2 (en) Reducing the run-time cost of incorporating custom tags in a server page
US20180181382A1 (en) Consuming persistent library bundles
Juneau JavaServer Faces: introduction by example
Hoffman Building Microservices with ASP. NET Core: Develop, Test, and Deploy Cross-platform Services in the Cloud
Han et al. Reconstructing Software Architecture for J2EE Web Applications.
Anurag Distributed computing with Go: practical concurrency and parallelism for Go applications
CN112199080A (en) Webpack construction method and equipment for vuejs project
Pasquali et al. Mastering Node. js: build robust and scalable real-time server-side web applications efficiently
Lukavsky Building Big Data Pipelines with Apache Beam: Use a single programming model for both batch and stream data processing
Kainulainen Spring Data Standard Guide
Hautaviita Developing a web application on the MEVN stack: the architecture of a full-stack JavaScript application
Gupta Java 11 and 12–New Features: Learn about Project Amber and the latest developments in the Java language and platform
Doglio et al. Node. js and REST
Davis Learning Groovy 3: Java-Based Dynamic Scripting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant