search
HomeJavaJavaBaseHow to implement polymorphism in java

How to implement polymorphism in java

Dec 04, 2019 am 11:48 AM
javaPolymorphism

How to implement polymorphism in java

Overview of Java polymorphism: (Recommended: java video tutorial)

Polymorphism is an important feature of object-oriented programming languages, which allows basic The pointer or reference of the class points to the object of the derived class, and the dynamic binding of the method is implemented during specific access. Java The implementation of dynamic binding of method calls mainly relies on the method table, but the implementation through class reference calls (invokevitual) and interface reference calls (invokeinterface) is different.

Three conditions are required to implement polymorphism in java:

1. There needs to be an inheritance relationship.

2. There needs to be method rewriting.

3. There needs to be a reference from the parent class pointing to the subclass object.

The general process of class reference calling is: the Java compiler compiles the Java source code into a class file. During the compilation process, the called symbol reference is written into the class file according to the static type.

During execution, the JVM finds the symbolic reference of the calling method according to the class file, then finds the offset in the static type method table, and then determines the actual type of the object based on this pointer, using the actual type method table , the offset is the same as the offset of the method table in the static type. If the method is found in the method table of the actual type, it is called directly. Otherwise, it is considered that the method of the parent class has not been overridden. Search from bottom to top according to inheritance relationship.

How to implement polymorphism in java

As can be seen from the above figure, when the program is running and a certain class is required, the class loading subsystem will load the corresponding class file into the JVM. And internally establish the type information of the class (this type information is actually a data structure stored in the JVM by the class file), including all the information defined by the java class, including method code, class variables, member variables, and the content of this blog post. Key discussion methods table. This type information is stored in the method area.

Note that the type information in this method area is different from the class object stored in the heap. In the method area, the type information of this class has only a unique instance (so it is a memory area shared by each thread), and there can be multiple objects of this class in the heap. The type information in the method area can be accessed through the class object in the heap. Just like the Java reflection mechanism, all information of the class can be accessed through the class object.

For more java knowledge, please pay attention to the java basic tutorial column.

The above is the detailed content of How to implement polymorphism in java. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Tools

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool