Skip to main content

Creational Patterns : Singleton


Properties:
-          Ensures that only one instance is created.
-          Global access is provided to single instance.
-          Conventionally has a public static method named getInstance/getXYZ ,where XYZ stands for class name, to return the class instance.
-          Suitable for creating factory instances and system wide unique resources.


Implementation:
-          Constructor should be made private/protected to prevent arbitrary instance creation.
-          Single instance is created and assigned to a public static member of the class. This class member is conventionally named as instance.
-          Class instance is exposed to outside world by a public static method named getInstance/getXYZ ,where XYZ stands for class name.


Java Standard Library Implementations:
-          java.lang.Runtime
-          java.awt.Desktop
-          java.awt.print.PrinterJob

Example Usage:
PrinterJob pj = PrinterJob.getPrinterJob();

if (pj.printDialog()) {
    try {
        pj.print();
    }
    catch (PrinterException e) {
        e.printStackTrace();
    }
 }  

Comments

Popular posts from this blog

Obfuscating Spring Boot Projects Using Maven Proguard Plugin

Introduction Obfuscation is the act of reorganizing bytecode such that it becomes hard to decompile. Many developers rely on obfuscation to save their sensitive code from undesired eyes. Publishing jars without obfuscation may hinder competitiveness because rivals may take advantage of easily decompilable nature of java binaries. Objective Spring Boot applications make use of public interfaces, annotations which makes applications harder to obfuscate. Additionally, maven Spring Boot plugin creates a fat jar which contains all dependent jars. It is not viable to obfuscate the whole fat jar. Thus obfuscating Spring Boot applications is different than obfuscating regular java applications and requires a suitable strategy. Audience Those who use Spring Boot and Maven and wish to obfuscate their application using Proguard are the target audience for this article. Sample Application As the sample application, I will use elastic search synch application from my G...

Behavioral Patterns : Chain of Responsibilities

Properties: -            Lets a request to be passed sequentially to a set of handlers. -            Each handler decides wheter to handle the request or pass it to next handler. Implementation: -            Handler  interface declares operations to handle requests. -            ConcreteHandler  decides wheter to handle the request or pass it to next handler. Java Standard Library Implementations: -            javax.servlet.Filter#doFilter(ServletRequest request,ServletResponse response,FilterChain chain) -            java.util.logging.Logger#log(Level,String) Example Usage: public   class  Logger  {      public ...

How To Use Keras Trained CNN Models

Introduction Keras is a popular deep learning api. It can run on top of Tensorflow , CNTK and Theano frameworks. Keras provides an easy to use interface which makes deep learning practice straight forward. It is widely used thus resources are easily accessible. Objective This article aims to give an introductory information about using a Keras trained CNN model for inference. This article does not contain information about CNN training. Audience This article assumes introductory information about python and Convolutional Neural Networks. For those who lack information may first begin with information from following resources. For python use  Python For Beginners For Convolutional Neural Networks use  CS231n Convolutional Neural Networks for Visual Recognition Software Installation Keras is a high level API. It requires a back-end framework to be installed. In this article, Tensorflow is used. Keras can transparently select CPU or GPU for processing. If use ...