SlideShare a Scribd company logo
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME 
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING  
TECHNOLOGY (IJCET) 
ISSN 0976 – 6367(Print) 
ISSN 0976 – 6375(Online) 
Volume 5, Issue 7, July (2014), pp. 01-10 
© IAEME: www.iaeme.com/IJCET.asp 
Journal Impact Factor (2014): 8.5328 (Calculated by GISI) 
www.jifactor.com 
 1 
 
IJCET 
© I A E M E 
ONTOLOGY BASED JAVA PLATFORM PERSONALIZATION TO HOST 
ENVIRONMENT 
Sinan Adnan Diwan Alwan1, 4, Dr. Enas Hadi Salih2, Ammar J.Fatah3 
1Wasit University, College of Computer and Mathematics, Computer Science dept., 
Wasit, Republic of Iraq 
2Head of computer Technology Engineering, Alrafedain University College 
3Science Gate, Virtual Research Center, System security dept. 
4Limkokwing University of creative technology, information systems department, cyberjaya, 
Selangor, Malaysia 
ABSTRACT 
 
This paper presents a personalization platform to adapt Java based applications to Host 
Environment; this is to converge the performance and reliability toward platform dependant (e.g., 
like C++). Intelligent Java agent is designed to perceive Host Environment and embed Java Native 
Interfaces (JNI) to Java program at Byte Code level. Intelligent Java agent scans host machines for 
low level libraries; which are normally DLL (Dynamic Link Library) files, and list them in table. 
The personalized program is executed at two performance levels, first level is the impersonalized 
level (i.e., not handled by the agent) which is low performance and the second is the personalized 
level which is the high level in term of performance due to injecting JNI interfaces 
Keywords: JRE, JVM, JNI, Personalization, Ontology, Agent, Java Byte Code. 
1. INTRODUCTION 
The Java platform is a programming environment consisting of the Java virtual machine 
(VM) and the Java Application Programming Interface (API). 
Java applications are written in the Java programming language, and compiled into a 
machine-independent binary class format. A class can be executed on any Java virtual machine 
implementation. The Java API consists of a set of predefined classes. Any implementation of the 
Java platform is guaranteed to support the Java programming language, virtual machine, and API.[ 1]
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME 
In this paper, the term host environment represents the host operating system, a set of native 
libraries, and the CPU instruction set. Native applications are written in native programming 
languages such as C and C++, compiled into host-specific binary code, and linked with native 
libraries. Native applications and native libraries are typically dependent on a particular host 
environment. A C application built for one operating system, for example, typically does not work on 
other operating systems.[ 1][2] 
Java platforms are commonly deployed on top of a host environment. For example, the Java 
Runtime Environment (JRE) is a Sun product that supports the Java platform on existing operating 
systems such as Solaris and Windows. The Java platform offers a set of features that applications can 
rely on independent of the underlying host environment.[ 1] 
The Java™ Native Interface (JNI) is a powerful feature of the Java platform. Applications 
that use the JNI can incorporate native code written in programming languages such as C and C++, 
as well as code written in the Java programming language. The JNI allows programmers to take 
advantage of the power of the Java platform, without having to abandon their investments in legacy 
code. Because the JNI is a part of the Java platform, programmers can address interoperability issues 
once, and expect their solution to work with all implementations of the Java platform.[1][2][3] 
The JNI is a powerful feature that allows you to take advantage of the Java platform, but still 
utilize code written in other languages. As a part of the Java virtual machine implementation, the JNI 
is a two-way interface that allows Java applications to invoke native code and vice versa. Figure 1 
illustrates the role of the JNI.[1][2] 
Personalization is the science of altering multi-user software product behaviors or attributes 
according to the preferences of individual, yet maintaining the performance and the standards 
according to the multi-user software product has been designed in the first place. 
The act of personalizing platform; offering user-specific customization; the act of changing 
an option of a multi-user software platform product to change the product's behavior or style for one 
user 
This paper will deploy personalization concepts to adapt Java platform (i.e. Java Runtime 
Environment) to host platform, the outcome of this deployment will enhance the overall performance 
of java programs and increase the accessibility of java programs to local host resources. 
 2 
 
2. JAVA VIRTUAL MACHINE  JAVA RUNTIME ENVIRONMENT 
Due to the fact that personalization is so related to destination architecture a deep knowledge 
is required about internal java virtual machine architecture. This section is going to present the 
internal architecture in bit of details to conceptualize later the proposal. 
At the heart of the Java platform lays the Java Virtual Machine, or JVM. Most programming 
languages compile source code directly into machine code, suitable for execution on particular 
microprocessor architecture. The difference with Java is that it uses bytecode - a special type of 
machine code. [4] 
Java bytecode executes on a special type of microprocessor. Strangely enough, there wasn't a 
hardware implementation of this microprocessor available when Java was first released. Instead, the 
processor architecture is emulated by what is known as a virtual machine. This virtual machine is 
an emulation of a real Java processor - a machine within a machine Figure (1). The only difference is 
that the virtual machine isn't running on a CPU - it is being emulated on the CPU of the host 
machine. [4] 
Java Runtime Environment (JRE) is a Sun product that supports the Java platform on existing 
operating systems such as Solaris and Windows. The Java platform offers a set of features that 
applications can rely on independent of the underlying host environment.[1 ]
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME 
Instruction Set 
Javac.exe bytecode Javac.exe 
 3 
 
Physical Machine 
 
Java Virtual 
Machine
Java 
Application 
s 
Physical 
Virtual 
Instruction Set 
Figure 1: Java Virtual Machine is emulation within Physical Machine 
The Java Virtual Machine is responsible for interpreting Java bytecode, and translating this 
into actions or operating system calls, as in Figure 2, Java source code passes through two stages ( 
compile and interpret) before getting executed on physical CPU. The intermediate form is the 
ByteCode which is a set of instructions known only by Java Virtual Machine (JVM). JVM is 
executing ByteCode in the same manner as real CPU is executing instruction set through fetch-execute 
cycle and the output will machine code that is executable by local host physical machine 
For example, a request to establish a socket connection to a remote machine will involve an 
operating system call. Different operating systems handle sockets in different ways - but the 
programmer doesn't need to worry about such details. It is the responsibility of the JVM to handle 
these translations, so that the operating system and CPU architecture on which Java software is 
running is completely irrelevant to the developer.[4]
Java source 
code 
Figure 2: Java source passing through java compiler and java interpreter
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME 
The need for Java applications to interoperate with native code has been recognized since the 
very early days of the Java platform. The first release of the Java platform, Java Development Kit 
(JDK™) release 1.0, included a native method interface that allowed Java applications to call 
functions written in other languages such as C and C++. Many third-party applications, as well as the 
implementation of the Java class libraries (including, for example, java.lang, java.io, and java.net), 
relied on the native method interface to access the features in the underlying host environment.[1] 
Figure (3) depicts the interaction mechanism between java byte code and machine dependant 
code generated from included third party. This figure is crucial to be understood in order to 
determine place of action for the personalization. 
 4
!
!
#
 
$
#

More Related Content

What's hot

A seminar report on core java
A  seminar report on core javaA  seminar report on core java
A seminar report on core java
Aisha Siddiqui
 
Bn1005 demo ppt core java
Bn1005 demo ppt core javaBn1005 demo ppt core java
Bn1005 demo ppt core java
conline training
 
Advance java summer training report
Advance java summer training report Advance java summer training report
Advance java summer training report
Nitesh Saini
 
Java for Recruiters
Java for RecruitersJava for Recruiters
Java for Recruiters
ph7 -
 
Java Programming Basics
Java Programming BasicsJava Programming Basics
Java Programming Basics
Rkrishna Mishra
 
Summer internship report
Summer internship reportSummer internship report
Summer internship report
Ipsit Pradhan
 
Introducing Java 7
Introducing Java 7Introducing Java 7
Introducing Java 7
Markus Eisele
 
Grade 8: Introduction To Java
Grade 8: Introduction To JavaGrade 8: Introduction To Java
Grade 8: Introduction To Java
nandanrocker
 
Building Enterprise Application with J2EE
Building Enterprise Application with J2EEBuilding Enterprise Application with J2EE
Building Enterprise Application with J2EE
Calance
 
6 Weeks Project Based Summer Training
6 Weeks Project Based Summer Training6 Weeks Project Based Summer Training
6 Weeks Project Based Summer Training
Tech Mentro
 
Java training noida hibernate+spring+struts+web services(1)
Java training noida hibernate+spring+struts+web services(1)Java training noida hibernate+spring+struts+web services(1)
Java training noida hibernate+spring+struts+web services(1)
miracleindia
 
Java seminar
Java seminarJava seminar
Java seminar
devendrakhairwa
 
JAVA AND ANDROID OS_PRESENTATION
JAVA AND ANDROID OS_PRESENTATIONJAVA AND ANDROID OS_PRESENTATION
JAVA AND ANDROID OS_PRESENTATION
Benjamin Agboola
 
What Your Jvm Has Been Trying To Tell You
What Your Jvm Has Been Trying To Tell YouWhat Your Jvm Has Been Trying To Tell You
What Your Jvm Has Been Trying To Tell You
John Pape
 
Introduction tojavaandxml lc-slides01-fp2005-ver 1.0
Introduction tojavaandxml lc-slides01-fp2005-ver 1.0Introduction tojavaandxml lc-slides01-fp2005-ver 1.0
Introduction tojavaandxml lc-slides01-fp2005-ver 1.0
Sanjay Yadav
 
Core Java Slides
Core Java SlidesCore Java Slides
Core Java Slides
Vinit Vyas
 
Introduction to java
Introduction to javaIntroduction to java
Introduction to java
shwanjava
 
String class
String classString class
String class
TharuniDiddekunta
 
Sybsc cs sem 3 core java
Sybsc cs sem 3 core javaSybsc cs sem 3 core java
Sybsc cs sem 3 core java
WE-IT TUTORIALS
 
basic core java up to operator
basic core java up to operatorbasic core java up to operator
basic core java up to operator
kamal kotecha
 

What's hot (20)

A seminar report on core java
A  seminar report on core javaA  seminar report on core java
A seminar report on core java
 
Bn1005 demo ppt core java
Bn1005 demo ppt core javaBn1005 demo ppt core java
Bn1005 demo ppt core java
 
Advance java summer training report
Advance java summer training report Advance java summer training report
Advance java summer training report
 
Java for Recruiters
Java for RecruitersJava for Recruiters
Java for Recruiters
 
Java Programming Basics
Java Programming BasicsJava Programming Basics
Java Programming Basics
 
Summer internship report
Summer internship reportSummer internship report
Summer internship report
 
Introducing Java 7
Introducing Java 7Introducing Java 7
Introducing Java 7
 
Grade 8: Introduction To Java
Grade 8: Introduction To JavaGrade 8: Introduction To Java
Grade 8: Introduction To Java
 
Building Enterprise Application with J2EE
Building Enterprise Application with J2EEBuilding Enterprise Application with J2EE
Building Enterprise Application with J2EE
 
6 Weeks Project Based Summer Training
6 Weeks Project Based Summer Training6 Weeks Project Based Summer Training
6 Weeks Project Based Summer Training
 
Java training noida hibernate+spring+struts+web services(1)
Java training noida hibernate+spring+struts+web services(1)Java training noida hibernate+spring+struts+web services(1)
Java training noida hibernate+spring+struts+web services(1)
 
Java seminar
Java seminarJava seminar
Java seminar
 
JAVA AND ANDROID OS_PRESENTATION
JAVA AND ANDROID OS_PRESENTATIONJAVA AND ANDROID OS_PRESENTATION
JAVA AND ANDROID OS_PRESENTATION
 
What Your Jvm Has Been Trying To Tell You
What Your Jvm Has Been Trying To Tell YouWhat Your Jvm Has Been Trying To Tell You
What Your Jvm Has Been Trying To Tell You
 
Introduction tojavaandxml lc-slides01-fp2005-ver 1.0
Introduction tojavaandxml lc-slides01-fp2005-ver 1.0Introduction tojavaandxml lc-slides01-fp2005-ver 1.0
Introduction tojavaandxml lc-slides01-fp2005-ver 1.0
 
Core Java Slides
Core Java SlidesCore Java Slides
Core Java Slides
 
Introduction to java
Introduction to javaIntroduction to java
Introduction to java
 
String class
String classString class
String class
 
Sybsc cs sem 3 core java
Sybsc cs sem 3 core javaSybsc cs sem 3 core java
Sybsc cs sem 3 core java
 
basic core java up to operator
basic core java up to operatorbasic core java up to operator
basic core java up to operator
 

Viewers also liked

1.manual streaming raditcast
1.manual streaming raditcast1.manual streaming raditcast
1.manual streaming raditcast
Klair Fivalén
 
Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...
Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...
Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...
ÁggapBrasil
 
Directiva pip huayopata para residentes
Directiva pip huayopata para residentesDirectiva pip huayopata para residentes
Directiva pip huayopata para residentes
gofercitoo
 
Producción pediatrica española 2006 2010 parte1-objetivos y metodologia
Producción pediatrica española 2006 2010 parte1-objetivos y metodologiaProducción pediatrica española 2006 2010 parte1-objetivos y metodologia
Producción pediatrica española 2006 2010 parte1-objetivos y metodologia
Javier González de Dios
 
Mathematical code in buildings
Mathematical code in buildingsMathematical code in buildings
Mathematical code in buildingsErasmus+
 
Mosque of Brunei Darussalam
Mosque of Brunei DarussalamMosque of Brunei Darussalam
Mosque of Brunei Darussalam
Lirazbregman
 
Diostedice
DiostediceDiostedice
Proyecto Compu Blogg Tic
Proyecto Compu Blogg TicProyecto Compu Blogg Tic
Proyecto Compu Blogg Tic
fercha93
 
Laura Isabel 5 Grado A Fuentes De Energia
Laura Isabel 5 Grado A  Fuentes  De  EnergiaLaura Isabel 5 Grado A  Fuentes  De  Energia
Laura Isabel 5 Grado A Fuentes De Energia
arianna
 
Trabajo sobre las computadoras
Trabajo sobre las computadorasTrabajo sobre las computadoras
Trabajo sobre las computadoras
gueste98d1db
 
Capacitacion a distancia online en vivo, en tiempo real
Capacitacion a distancia online en vivo, en tiempo realCapacitacion a distancia online en vivo, en tiempo real
Capacitacion a distancia online en vivo, en tiempo real
Formacion Sin Fronteras
 
Qué Es La DocumentacióN Narrativa De Experiencias
Qué Es La DocumentacióN Narrativa De ExperienciasQué Es La DocumentacióN Narrativa De Experiencias
Qué Es La DocumentacióN Narrativa De Experiencias
guest57b4c2
 
Historia Salud Ocupacional
Historia Salud OcupacionalHistoria Salud Ocupacional
Historia Salud Ocupacional
erika
 
Plantas asexual
Plantas asexualPlantas asexual
Plantas asexual
Laura Fdez Alonso
 
Deber confidencialidad y proteccion de datos
Deber confidencialidad y proteccion de datosDeber confidencialidad y proteccion de datos
Deber confidencialidad y proteccion de datos
Jasfer
 
Moscow
MoscowMoscow
Moscow
Bryagh
 
Cómo llegar al cumpleaños de Nadima
Cómo llegar al cumpleaños de NadimaCómo llegar al cumpleaños de Nadima
Cómo llegar al cumpleaños de Nadima
Abril Mejías Romhany
 
Estrategias basicas de_lectura
Estrategias basicas de_lecturaEstrategias basicas de_lectura
Estrategias basicas de_lectura
Alexander Jose Valera Cegarra
 
CV Angel
CV AngelCV Angel

Viewers also liked (20)

1.manual streaming raditcast
1.manual streaming raditcast1.manual streaming raditcast
1.manual streaming raditcast
 
Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...
Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...
Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...
 
Directiva pip huayopata para residentes
Directiva pip huayopata para residentesDirectiva pip huayopata para residentes
Directiva pip huayopata para residentes
 
Producción pediatrica española 2006 2010 parte1-objetivos y metodologia
Producción pediatrica española 2006 2010 parte1-objetivos y metodologiaProducción pediatrica española 2006 2010 parte1-objetivos y metodologia
Producción pediatrica española 2006 2010 parte1-objetivos y metodologia
 
Mathematical code in buildings
Mathematical code in buildingsMathematical code in buildings
Mathematical code in buildings
 
Mosque of Brunei Darussalam
Mosque of Brunei DarussalamMosque of Brunei Darussalam
Mosque of Brunei Darussalam
 
Diostedice
DiostediceDiostedice
Diostedice
 
Proyecto Compu Blogg Tic
Proyecto Compu Blogg TicProyecto Compu Blogg Tic
Proyecto Compu Blogg Tic
 
Laura Isabel 5 Grado A Fuentes De Energia
Laura Isabel 5 Grado A  Fuentes  De  EnergiaLaura Isabel 5 Grado A  Fuentes  De  Energia
Laura Isabel 5 Grado A Fuentes De Energia
 
Trabajo sobre las computadoras
Trabajo sobre las computadorasTrabajo sobre las computadoras
Trabajo sobre las computadoras
 
Capacitacion a distancia online en vivo, en tiempo real
Capacitacion a distancia online en vivo, en tiempo realCapacitacion a distancia online en vivo, en tiempo real
Capacitacion a distancia online en vivo, en tiempo real
 
Qué Es La DocumentacióN Narrativa De Experiencias
Qué Es La DocumentacióN Narrativa De ExperienciasQué Es La DocumentacióN Narrativa De Experiencias
Qué Es La DocumentacióN Narrativa De Experiencias
 
27
2727
27
 
Historia Salud Ocupacional
Historia Salud OcupacionalHistoria Salud Ocupacional
Historia Salud Ocupacional
 
Plantas asexual
Plantas asexualPlantas asexual
Plantas asexual
 
Deber confidencialidad y proteccion de datos
Deber confidencialidad y proteccion de datosDeber confidencialidad y proteccion de datos
Deber confidencialidad y proteccion de datos
 
Moscow
MoscowMoscow
Moscow
 
Cómo llegar al cumpleaños de Nadima
Cómo llegar al cumpleaños de NadimaCómo llegar al cumpleaños de Nadima
Cómo llegar al cumpleaños de Nadima
 
Estrategias basicas de_lectura
Estrategias basicas de_lecturaEstrategias basicas de_lectura
Estrategias basicas de_lectura
 
CV Angel
CV AngelCV Angel
CV Angel
 

Similar to 50120140507001

J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01
Jay Palit
 
Java & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate FrameworkJava & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate Framework
Mohit Belwal
 
Java presentation
Java presentationJava presentation
Java presentation
surajdmk
 
Java presentation
Java presentationJava presentation
Java presentation
surajdmk
 
Java-Unit-I.ppt
Java-Unit-I.pptJava-Unit-I.ppt
Java-Unit-I.ppt
RameswarGprec
 
Eclipse & java based modeling platforms for smart phone
Eclipse & java based modeling platforms for smart phoneEclipse & java based modeling platforms for smart phone
Eclipse & java based modeling platforms for smart phone
IAEME Publication
 
Core Java-1 (1).pdf
Core Java-1 (1).pdfCore Java-1 (1).pdf
Core Java-1 (1).pdf
HaskellKohler1234
 
Java ms harsha
Java ms harshaJava ms harsha
Java ms harsha
Harsha Batra
 
Presentation on Java Basic
Presentation on Java BasicPresentation on Java Basic
Presentation on Java Basic
Rustamji Institute of Technology
 
Java session2
Java session2Java session2
Java session2
Jigarthacker
 
java concepts
java conceptsjava concepts
java concepts
Surya Prakash
 
TechSearchWeb.pdf
TechSearchWeb.pdfTechSearchWeb.pdf
TechSearchWeb.pdf
TechSearchWeb
 
Technology Tutorial.pdf
Technology Tutorial.pdfTechnology Tutorial.pdf
Technology Tutorial.pdf
TechSearchWeb
 
Core java slides
Core java slidesCore java slides
Core java slides
Abhilash Nair
 
A CASE STUDY JAVA IS SECURE PROGRAMMING LANGUAGE
A CASE STUDY  JAVA IS SECURE PROGRAMMING LANGUAGEA CASE STUDY  JAVA IS SECURE PROGRAMMING LANGUAGE
A CASE STUDY JAVA IS SECURE PROGRAMMING LANGUAGE
Nathan Mathis
 
Java unit 1
Java unit 1Java unit 1
Java unit 1
Shipra Swati
 
Java Intro
Java IntroJava Intro
Java Intro
Nazmul Hasan Rupok
 
TechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdfTechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdf
TechSearchWeb
 
JAVA PROGRAMMING-Unit I - Final PPT.pptx
JAVA PROGRAMMING-Unit I - Final PPT.pptxJAVA PROGRAMMING-Unit I - Final PPT.pptx
JAVA PROGRAMMING-Unit I - Final PPT.pptx
SuganthiDPSGRKCW
 
Chapter 1 introduction to java technology
Chapter 1 introduction to java technologyChapter 1 introduction to java technology
Chapter 1 introduction to java technology
sshhzap
 

Similar to 50120140507001 (20)

J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01
 
Java & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate FrameworkJava & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate Framework
 
Java presentation
Java presentationJava presentation
Java presentation
 
Java presentation
Java presentationJava presentation
Java presentation
 
Java-Unit-I.ppt
Java-Unit-I.pptJava-Unit-I.ppt
Java-Unit-I.ppt
 
Eclipse & java based modeling platforms for smart phone
Eclipse & java based modeling platforms for smart phoneEclipse & java based modeling platforms for smart phone
Eclipse & java based modeling platforms for smart phone
 
Core Java-1 (1).pdf
Core Java-1 (1).pdfCore Java-1 (1).pdf
Core Java-1 (1).pdf
 
Java ms harsha
Java ms harshaJava ms harsha
Java ms harsha
 
Presentation on Java Basic
Presentation on Java BasicPresentation on Java Basic
Presentation on Java Basic
 
Java session2
Java session2Java session2
Java session2
 
java concepts
java conceptsjava concepts
java concepts
 
TechSearchWeb.pdf
TechSearchWeb.pdfTechSearchWeb.pdf
TechSearchWeb.pdf
 
Technology Tutorial.pdf
Technology Tutorial.pdfTechnology Tutorial.pdf
Technology Tutorial.pdf
 
Core java slides
Core java slidesCore java slides
Core java slides
 
A CASE STUDY JAVA IS SECURE PROGRAMMING LANGUAGE
A CASE STUDY  JAVA IS SECURE PROGRAMMING LANGUAGEA CASE STUDY  JAVA IS SECURE PROGRAMMING LANGUAGE
A CASE STUDY JAVA IS SECURE PROGRAMMING LANGUAGE
 
Java unit 1
Java unit 1Java unit 1
Java unit 1
 
Java Intro
Java IntroJava Intro
Java Intro
 
TechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdfTechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdf
 
JAVA PROGRAMMING-Unit I - Final PPT.pptx
JAVA PROGRAMMING-Unit I - Final PPT.pptxJAVA PROGRAMMING-Unit I - Final PPT.pptx
JAVA PROGRAMMING-Unit I - Final PPT.pptx
 
Chapter 1 introduction to java technology
Chapter 1 introduction to java technologyChapter 1 introduction to java technology
Chapter 1 introduction to java technology
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
Sunil Jagani
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 

Recently uploaded (20)

The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 

50120140507001

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com 1 IJCET © I A E M E ONTOLOGY BASED JAVA PLATFORM PERSONALIZATION TO HOST ENVIRONMENT Sinan Adnan Diwan Alwan1, 4, Dr. Enas Hadi Salih2, Ammar J.Fatah3 1Wasit University, College of Computer and Mathematics, Computer Science dept., Wasit, Republic of Iraq 2Head of computer Technology Engineering, Alrafedain University College 3Science Gate, Virtual Research Center, System security dept. 4Limkokwing University of creative technology, information systems department, cyberjaya, Selangor, Malaysia ABSTRACT This paper presents a personalization platform to adapt Java based applications to Host Environment; this is to converge the performance and reliability toward platform dependant (e.g., like C++). Intelligent Java agent is designed to perceive Host Environment and embed Java Native Interfaces (JNI) to Java program at Byte Code level. Intelligent Java agent scans host machines for low level libraries; which are normally DLL (Dynamic Link Library) files, and list them in table. The personalized program is executed at two performance levels, first level is the impersonalized level (i.e., not handled by the agent) which is low performance and the second is the personalized level which is the high level in term of performance due to injecting JNI interfaces Keywords: JRE, JVM, JNI, Personalization, Ontology, Agent, Java Byte Code. 1. INTRODUCTION The Java platform is a programming environment consisting of the Java virtual machine (VM) and the Java Application Programming Interface (API). Java applications are written in the Java programming language, and compiled into a machine-independent binary class format. A class can be executed on any Java virtual machine implementation. The Java API consists of a set of predefined classes. Any implementation of the Java platform is guaranteed to support the Java programming language, virtual machine, and API.[ 1]
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME In this paper, the term host environment represents the host operating system, a set of native libraries, and the CPU instruction set. Native applications are written in native programming languages such as C and C++, compiled into host-specific binary code, and linked with native libraries. Native applications and native libraries are typically dependent on a particular host environment. A C application built for one operating system, for example, typically does not work on other operating systems.[ 1][2] Java platforms are commonly deployed on top of a host environment. For example, the Java Runtime Environment (JRE) is a Sun product that supports the Java platform on existing operating systems such as Solaris and Windows. The Java platform offers a set of features that applications can rely on independent of the underlying host environment.[ 1] The Java™ Native Interface (JNI) is a powerful feature of the Java platform. Applications that use the JNI can incorporate native code written in programming languages such as C and C++, as well as code written in the Java programming language. The JNI allows programmers to take advantage of the power of the Java platform, without having to abandon their investments in legacy code. Because the JNI is a part of the Java platform, programmers can address interoperability issues once, and expect their solution to work with all implementations of the Java platform.[1][2][3] The JNI is a powerful feature that allows you to take advantage of the Java platform, but still utilize code written in other languages. As a part of the Java virtual machine implementation, the JNI is a two-way interface that allows Java applications to invoke native code and vice versa. Figure 1 illustrates the role of the JNI.[1][2] Personalization is the science of altering multi-user software product behaviors or attributes according to the preferences of individual, yet maintaining the performance and the standards according to the multi-user software product has been designed in the first place. The act of personalizing platform; offering user-specific customization; the act of changing an option of a multi-user software platform product to change the product's behavior or style for one user This paper will deploy personalization concepts to adapt Java platform (i.e. Java Runtime Environment) to host platform, the outcome of this deployment will enhance the overall performance of java programs and increase the accessibility of java programs to local host resources. 2 2. JAVA VIRTUAL MACHINE JAVA RUNTIME ENVIRONMENT Due to the fact that personalization is so related to destination architecture a deep knowledge is required about internal java virtual machine architecture. This section is going to present the internal architecture in bit of details to conceptualize later the proposal. At the heart of the Java platform lays the Java Virtual Machine, or JVM. Most programming languages compile source code directly into machine code, suitable for execution on particular microprocessor architecture. The difference with Java is that it uses bytecode - a special type of machine code. [4] Java bytecode executes on a special type of microprocessor. Strangely enough, there wasn't a hardware implementation of this microprocessor available when Java was first released. Instead, the processor architecture is emulated by what is known as a virtual machine. This virtual machine is an emulation of a real Java processor - a machine within a machine Figure (1). The only difference is that the virtual machine isn't running on a CPU - it is being emulated on the CPU of the host machine. [4] Java Runtime Environment (JRE) is a Sun product that supports the Java platform on existing operating systems such as Solaris and Windows. The Java platform offers a set of features that applications can rely on independent of the underlying host environment.[1 ]
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME Instruction Set Javac.exe bytecode Javac.exe 3 Physical Machine Java Virtual Machine
  • 4. Java Application s Physical Virtual Instruction Set Figure 1: Java Virtual Machine is emulation within Physical Machine The Java Virtual Machine is responsible for interpreting Java bytecode, and translating this into actions or operating system calls, as in Figure 2, Java source code passes through two stages ( compile and interpret) before getting executed on physical CPU. The intermediate form is the ByteCode which is a set of instructions known only by Java Virtual Machine (JVM). JVM is executing ByteCode in the same manner as real CPU is executing instruction set through fetch-execute cycle and the output will machine code that is executable by local host physical machine For example, a request to establish a socket connection to a remote machine will involve an operating system call. Different operating systems handle sockets in different ways - but the programmer doesn't need to worry about such details. It is the responsibility of the JVM to handle these translations, so that the operating system and CPU architecture on which Java software is running is completely irrelevant to the developer.[4]
  • 5. Java source code Figure 2: Java source passing through java compiler and java interpreter
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME The need for Java applications to interoperate with native code has been recognized since the very early days of the Java platform. The first release of the Java platform, Java Development Kit (JDK™) release 1.0, included a native method interface that allowed Java applications to call functions written in other languages such as C and C++. Many third-party applications, as well as the implementation of the Java class libraries (including, for example, java.lang, java.io, and java.net), relied on the native method interface to access the features in the underlying host environment.[1] Figure (3) depicts the interaction mechanism between java byte code and machine dependant code generated from included third party. This figure is crucial to be understood in order to determine place of action for the personalization. 4
  • 7. !
  • 8. !
  • 9. # $
  • 10. #
  • 11. % '
  • 12. ' ! Application.java Application.class Application.h Application.c Application.dll Native Application Figure 3: building Java Native Interface Application
  • 13. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME 5 3. ONTOLOGY Ontology is originally a philosophical discipline which deals with the study of being and existence. The term is borrowed to computer science and defined as an explicit specification of conceptualization [13], which specifies the set of concepts that will be used in a particular system as a basis for communication or sharing of information. In particular, ontology is an important component in the Semantic Web [2]. An ontology generally consists of a taxonomy of concepts, a set of relations, a set of individuals (representing real objects), and possibly a set of inference rules for discovering of implicit knowledge [2]. formally ontology O can be defined as a four-tuple O = (C,P,I,R), where C is a set of concepts, P is a set of properties, I is a set of data instances, representing real objects in the domain of interest, and lastly R is a set of rules, propositions or axioms that specify the relations between concepts and properties. The proposal of this paper has the following interpretation for the components of the ontology: C: is the basic concepts within the model and here it represents marked block of code, where the program code can be treated as a series of marked block of code. P: properties of the block of code for example its length in byte and addressing mode are properties of code block. I: Instances of code block for example functions can be instantiated many times in a program. R: relationships between code blocks for example INVOKE relationship is assigned to code block invoked by other code. 4. CHALLENGES The challenges in implementing tasks in native or in standard java depends on the availability of native libraries installed in the system 1- Mining java program at byte code level which needs dedicated ontologies to conceptualize 2- Mining system files at execute level (Portable Executable format) 5. THE PROPOSED PERSONALIZATION SYSTEM The proposed technique is to build Java Agent that capable of perceiving concepts in Java Byte code domain which is stored in separate class file (i.e., .jar or .class), the ontology used to define these concepts will be specially designed to do this task. Java Agent ultimate goal is to map perceived concepts in java byte code to its analogous in native library (i.e., .dll, .exe, .ocx) as in figure (4)
  • 14. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME Figure 4: Java Agent Maps Java Byte code to binaries in dll file The proposed technique passes through two phases, the first phase is with no mapping entries exist in the updated log file, this log file will serve as a direct mapping pointer, the agent will check the validity of the code referred by this pointer to sustain the mapping. Java Agent will start looking inside dll files to explore for analogous code that matches Java byte code, the data will be isolated to keep it out of the mapping, in phase one a log file will be built to enhance the mapping function and to not mining again for requested functions. Figure (5) shows the architecture of personalization Java Byte code in phase one Log File ) Byte code Ontology Native Libraries ( Binary images) Java Agent
  • 15. (
  • 16. Figure 5: Java Agent is building Mapping table in phase one 6 When phase one is finished the personalization Agent will direct the dispatcher of the operating system to the native code in dll rather than send it to Java Virtual Machine as in figure (6)
  • 17. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME ,
  • 19. %
  • 20. #
  • 21. % Figure 6: Java Agent is mapping byte code to native in phase two 7 Central execution unit Java Virtual machine *% + Tc = Time to compile Java source code Tp = Time to interpret Java Byte code Tb = Time to execute binary code Texe = Time to execute Java Program Texe = Tc + Tp this is without personalization Personalization Agent due to the fact that binary code is executed directly, and the following equation is describing the proposed system with personalization It is obvious that when is small then the overall performance of the system is is going high. Figure (7) presents the machine code corresponding 'printf' c language function compiled using visual studio 6.0. Figure 7: Java Agent perceived requested machine code
  • 22. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME In the same manner corresponding byte code will be perceived in java class file, the example taken by this paper is simple and contains only 'println' which is part of 'System.out' class. Figure (8) presents a screen shot of bytecode viewer which has been used to reveal the byte code image of 'System.out.println' method. each found member function in java class file that has a analogous native representation will be marked as comment and a method added with the name 'mXxx' where Xxx is the name of the member function to be implemented as native code. Figure (9) presented the resultant of applying personalization concepts on java class file called 'Hello.class' built to be an example for the personalization. 8 Figure 8: Bytecode viewer presents java byte code of System.out.println Figure 9: Hello.class has been personalized and native keyword has been added
  • 23. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME Personalization ratio (personalized java / original java) is not fixed along different categories of programming classes; this is shown in table-1 where different categories have been tested. Table -1- Personalization rate for different programming categories I Java SLC Category Personalized rate 1 137 402 Consol 73% 331 2 214 309 Form Based 68% 290 3 180 553 Network 69% 440 4 167 506 Data base 37% 481 5 179 613 Graphics 53% 413 6 165 585 Multi-threading 76% 335 Figure (10) presents a discrimination graph between the performance of different programming categories shown in table-1, which are implemented using java and c# programming languages. 4.. .. 3.. 2.. 1.. 0.. /.. The personalization of a java program can be represented by a cumulative function as logistic function as figure (11) which presents the effect of increasing the source line of code (SLC) on the overall performance of the personalization. 9 . ! 5 Figure 10: Performance Chart due to personalization
  • 24. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME / 0 1 2 3 4 6 /. // /0 /1 /2 /3 / /4 / /6 0. 0/ Figure 10: Performance of personalization as it relates source line code 10 13 1 03 0 /3 / .3 .
  • 25. 6. CONCLUSIONS / 1- Java program can be personalized to certain platform according to the interpretation of its binary images, which represents executable format adopted by that platform. The personalized java programs showed an increased performance level due to the low level linkages of binary code; this binary code is hold by DLL ( dynamic link linbrary) files. 2- Java program can be personalized to open source operating systems like Unix and lunix more easier that windows operating system due to its readability and matching to source code in Java program. 7. REFERENCES 1- Sheng Liang, The Java Native Interface, Programmer's Guide and Specification, ADDISON-WESLEY, USA, 1999. 2- Fabio Bellifemine, Giovanni Caire, Tiziana Tucco and Giovanni Rimassa, JADE Progammer's Guide, TILab S.P.A, 2010. 3- Chris H.Pappas William H. Murray, The complete Reference visual studio 6.0, McGraw- Hill, 1998. 4- David Reilly, Inside Java: Java Virtual Machine, 2006. 5- Abhishek Singh, “Identifying Malicious Code Through Reverse Engineering: Portable Executable File Format”, Advances in Information Security Volume 44, 2009. 6- David Reilly, “Inside Java: The Java Virtual Machine”, accessed at: http://www.javacoffeebreak.com/articles/inside_java/insidejava-jan99.html. 7- P.Shvaiko, J.Euzenat., “Ontology Matching : State of the art and Future Challenges”, IEEE Transactions on Knowledge and Data Engineering, 2013. 8- Pratibha S. Yalagi and Dr. Sulabha S. Apte, “Exploiting Parallelism for a Java Code with an Efficient Parallelization Technique”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 3, 2012, pp. 484 - 489, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.