IJRIT International Journal of Research in Information Technology, Volume 2, Issue 9, September 2014, Pg. 173-176

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Advance Java Study Hiteshi Kumari, Abhimanyu Vats, Jatin Chabbra

Abstract The main reason for the popularity of java and its enormous practical applications are due to its open source, free features and the combined set of functionalities which provide user a vast variety of applications. There are numerous good computer languages. There are relatively few languages with the momentum to make a real difference in software development. Java is one of those languages. The developers of Java had a chance to look at existing computer languages and address their deficiencies. Java allows inexperienced users to write high quality code. It incorporates user interface directly in the language. Java and Object-Oriented technology are a major paradigm shift.

I. Introduction The features of Java this torrent computer- speak jargon has often been labelled the “Buzzword description” and was doubtless intended with tongue in cheek, it nevertheless accurately identifies many of the features of Java that they make it so well-suited for programming internet applications. The following Java Buzzwords: 1) Platform Independent 2) Secure 3) Portable 4) Object-Oriented 5) Robust 6) Architecture-neutral 7) Multithread 8) Interpreted 9) High performance 10) Distributed 11) Dynamic

II. Platform Independent Java is Platform independent. The meaning of the platform here, in the computer industry it typically means some combination of hardware and system software. Java is compiled to an intermediate form called Java byte-code or simply byte code Java program never really executes immediately after compilation on the host machine. Rather, this special program called the Java interpreter or Java Virtual Machine reads the byte code, translates it into the corresponding host machine instructions and then executes the machine instruction. A Java program can run on any computer system for which a JVM .

Hiteshi Kumari, IJRIT

173

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 9, September 2014, Pg. 173-176

III. Secure Java is intended to work in networked and distributed environments by providing security. All the references to memory are symbolic references, meaning that the user is not aware where in the memory program is present; it totally depends on the JVM and the machine on which the program is running. Each applet is loaded on its own memory space, which avoids the information interchange between applets. Introducing viruses, deleting and modifying file in the host computer. The Java enabled web browser checks the byte code of applets to ensure that it should not do anything wrong before it will run the applet. The major security issue in today’s software world is BUGS. Unintended bugs are responsible for more data loss than data loss because of viruses. In Java it is easier to write bug-free code than in other languages. \

IV. Portable Early form portability involved carrying media, for example, floppy disks, from one system to another. Portability becomes a much larger problem once different sorts of computers were interconnected to form the internet. Java programs contain no implementation-dependent aspects, so the result of executing a series of Java byte codes should always be the same, no matter on what system they are executed. Moreover, the Java run-time system itself, though it is written in c is written in a way that simplifies porting the Java run-time for a new computer system.

V. Object-Oriented In objects represent object-oriented languages' data. Objects have two sections. The first is Data (instance variables) and the second is methods. Data represents what an object is. A method represents what an object does. The Data and methods are closely related to the real world structure and behavior of objects. Java is a true object-oriented language, which provides a platform to develop an effective and efficient application and program real life complexities. Java does not allow methods without class, thus an application consists of only the object which makes it true OOP. Most of the Object-oriented concepts in Java are inherited from C++ which makes it easy for traditional programmers to understand it.

VI. Robust Java provides checking for possible problems at two levels, one at the compile time and the other at the run time, so programs are highly reliable and eliminate situations that are error-prone compared to C/C++. The best and worst features of C and C++ are pointers that help in direct manipulation of memory addresses. The power of pointers is as a great tool used by expert programmers in developing system software, driver etc. but many times pointers is the main cause of runtime errors because of improper use of memory. Java eliminates pointer manipulation completely from the language, and therefore eliminates a large source of runtime errors. Java programmers need not remember to de-allocate memory in programs since thereis a garbage collection mechanism which handles de-allocation of memory. It provides powerful a robust exception handling mechanism to deal with both expected and unexpected errors at run time.

VII. Architecture-Nature The word architecture in this phase does not refer to the building in which live. But to the home in which your computer program lives, we can say that the computer systems. Java’s byte code are designed to be read and interpreted in exactly the same manner on any computer hardware or operating system that supports a Java run time

VIII. Multithread A thread is a program’s path of execution. In any programming problems, when multiple Events or actions need to occur at the same time. Multithreaded applications deliver their potent power by running many threads Concurrently within a single program. Java is inherently multi-threaded, for example garbage collection subsystem runs as a low-priority thread. A single Java program can have many different threads executing independently and

Hiteshi Kumari, IJRIT

174

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 9, September 2014, Pg. 173-176

continuously, for example, different Java applets on thesame web page can run together with getting equal time from the processor. Because multithreaded applications share data andall threads of an application exists in the same data space therefore for maintaining reliability is sometime difficult. To make easythe use of threads Java offers features for synchronization between threads.

IX. Interpreted One of the first advances, after the intention of the programs itself, was the of the program interpreter. Like the early short code and speed code, Java is an interpreted language. This means the Java executable files are composed of so called byte codes that are instructions and data relating to a hypothetical computer called Java virtual machines.

X. High Performance In Java first compile the program, then execute it using the Java interpreter. In general, interpreters are slow, because an interpreter executes program instruction by instruction while Java is a fast-interpreted language. Java has also been designed so that the run-time system can optimize their performance by compiling byte code to native machine code on the fly (execute immediately after compilation). Many companies are a working on a native machine-architecture compilers for Java. These will produce an executable code that does not require a separate interpreter, and that is indistinguishable in speed from C++.Java offers two flavors of programming, Java applets and Java application. Applets are small Java programs (mostly) that can be downloaded over a computer network and run from a web page by using a Java enabled browser like Netscape /Microsoft Internet Explorer.

XI. Distributed Java is designed as a distributed language for creating applications on networks. It has ability to share both data and programs.java applications can open and access remote objects on internet as easily they can do in a local system .This enables multiple programs at multiple remote locations to collaborations and work together son a single project.

XII. Dynamic Java was designed to adapt to an evolving environment, therefore the Java compiler is smart and dynamic. If you a recompiling a file that depends on other non-compiled files, then the compiler will try to find and compile them also. The compiler can handle methods that are used before they’re declared. It can also determine whether a source code has been changed since the last time it was compiled. Java classes that were unknown to a program when it was compiled can still be loaded into it at runtime. For example, a web browser can load applets of other classes without recompilation.

XIII. Conclusion In this paper, I have studied the Buzzword of Java and also why Java is popular language now days.Java an Object Oriented, general-purpose programming language. After its birth it became popular because of many reasons like security, robustness and multi threadedness but mainly because of its Buzzword of Architecture Neutral and platform independent. The logic and magic behind its platform independence is “BYTECODE”.

References Books 1.

Stephen Gilbert and Bill McCarty. Object Oriented Programming in Java 1st Edition, New Delhi-

1.

Techmedia2. E Balagurusamy, Programming with JAVA 2 nd Edition, New Delhi: Tata McGraw-Hill Publishing.

Hiteshi Kumari, IJRIT

175

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 9, September 2014, Pg. 173-176

2.

Herbert Schildt, The Complete Reference Java2 5 th Edition McGraw-Hill/Osborne.

3.

R. Nageswara Rao, Core JAVA : An Integrated Approach 1 st Edition, Dreamtech Press.

4.

Herb Schildt, Java: A Beginner's Guide 5 th Edition, Tata McGraw-Hill Education Pvt. Ltd.

5.

Katherine Sierra, Bert Bates - SCJP Sun Certified Programmer for Java 6 th Edition Tata McGraw-Hill

6.

Bryan Basham, Kathy Sierra, Bert Bates - Head First Servlets And JSP 2 nd Edition , O’reilly.

Hiteshi Kumari, IJRIT

176

Advance Java Study - IJRIT

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 9, September 2014, Pg. ... Java and Object-Oriented technology are a major.

89KB Sizes 0 Downloads 273 Views

Recommend Documents

Advance Java Study - IJRIT
interpreter, and that is indistinguishable in speed from C++.Java offers two flavors of programming, Java applets and Java application. Applets are small Java programs (mostly) that can be downloaded over a computer network and run from a web page by

Advance-Java-Suresh - GitHub
Page 1. ameerpetmaterials.blogspot.in. For More Tutorials Visit. Page 2. Advance Java. (Suresh Sir). Page 3. Page 4. Page 5. Page 6. Page 7. Page 8. Page 9. Page 10 .... Page 141. Page 142. Page 143. Page 144. Page 145. Page 146. Page 147. Page 148.

Advance Java Programming Techniques.pdf
products remains at the sole discretion of Oracle. Page 3 of 49. Advance Java Programming Techniques.pdf. Advance Java Programming Techniques.pdf. Open.

Effectual User Navigation through Advance Website Organization - IJRIT
structure [9]. In spite of the heavy and ever growing investments in the design of a website, it is still exposed. On ... In view of the fact that our assessment is simulation based, a usability learning ... and the components of online personalizati

Effectual User Navigation through Advance Website Organization - IJRIT
In spite of the heavy and ever growing investments in the design of a website, ... In view of the fact that our assessment is simulation based, a usability learning.

An Advance Reputation System (ARS) for Peer to Peer Network - IJRIT
Resources are therefore distributed all over the P2P network. .... In our system, it is assume semi-decentralized architecture for peer to peer network to decrease ...

An Advance Reputation System (ARS) for Peer to Peer Network - IJRIT
system for Peer-to-Peer network that can handle rational problem in this network efficiently with minimum .... Since both systems use polling protocols to evaluate the reputations, they must produce a lot of .... reputation management scheme is simpl

Advance - Onam Advance to Government Employees for 2009 ...
The Secretary, Kerala Public Service Commission (with C.l.). The Registrar, University of Kerala/(Ioehin/Calicut/Kannur (with C.l.). The Registrar, M.G.University, ...

Study On Network Security: Threats and Safety - IJRIT
Security of network is important as it contains those data which if gets into unauthorized person's .... process involved in the data transmission. ... They can provide real time protection against the installation of malware software on a computer.

Study On Network Security: Threats and Safety - IJRIT
proxy server is a gateway from one network to another for a specific network .... Securing the network from various threats is stopping the biggest cybercrime ...

Study of Rectangular Microstrip Patch Antenna with Co - IJRIT
Misha Thakur1, Dr. Kuldip Pahwa2, Er. Gaurav Walia3. ... than one application entrenched in single device consequently antenna sustaining more than one ...

A Study Of Various Techniques For The Brain Tumor ... - IJRIT
A Study Of Various Techniques For The Brain Tumor ..... Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 3, issue 3 ...

A Review: Study of Iris Recognition Using Feature Extraction ... - IJRIT
INTRODUCTION. Biometric ... iris template in database. There is .... The experiments have been implemented using human eye image from CASAI database.

A Study Of Various Techniques For The Brain Tumor ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 3 ..... assignment and there is a need and wide degree for future examination to ... Journal of Advanced Research in Computer Science and Software Engineering, Vol.

Design and Implementation of e-AODV: A Comparative Study ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, ... Keywords: Wireless mobile ad hoc networks, AODV routing protocol, energy ... In order to maximize the network life time, the cost function defined in [9] ...

Advance America - Services
Nov'11. Dec'11. Jan '12. $17.00. $19.00. $21.00. $23.00. $25.00. $27.00. $29.00. $31.00. Overll eCPA. Frequency Capping Recommendations Implemented from 12/8/2011. About Adometry by Google™. Adometry by Google transforms the way the world's top bra

Advance - Onam Advance to Government Employees for 2009 ...
The Secretary, Kerala Public Service Commission (with C.l.). The Registrar, University of ... The Secretary, Kerala State Electricity Board (with (LL). The Managing Director, Kerala State Road Transport Corporation. The Registrar, lligh ("ourt of ...

Design and Implementation of e-AODV: A Comparative Study ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, ... In order to maximize the network life time, the cost function defined in [9] ...

An Efficient Methodology to Study Distributed Denial of Service ... - IJRIT
Denial of Service Attack in Internet Community. Pabbati Suresh1, P.D.Chidambara .... The DAG is composed of routers and local area networks (LANs). For the ...

Study of Data Warehouse Modeling and its different design ... - IJRIT
Requirement gathering can happen as Joint Application Development (JAD) ... the users with applications and data access tools that are appropriate for their ...

Study and Investigate Effect of Input Parameters on ... - IJRIT
to apply DOE techniques to achieve desired design of gearbox for control the temperature and noise .... replication total 32 experiments will be performed as shown in table ΙΙ. ... will be carried out using dB meter or by using ultrasonic sensor.

An Efficient Methodology to Study Distributed Denial of Service ... - IJRIT
In order to measure and collect the traffic intensities from the routers that are .... DDoS attacks often exhaust the network bandwidth, processing capacity and in- ...

A Review: Study of Iris Recognition Using Feature Extraction ... - IJRIT
analyses the Iris recognition method segmentation, normalization, feature extraction ... Keyword: Iris recognition, Feature extraction, Gabor filter, Edge detection ...

Perioperative Anaphylaxis - Health Advance
Anaphylaxis is defined as a serious, life-threatening generalized or systemic .... administration of the suspected agent, but late-onset reactions can occur, ..... Institute of Allergy and Infectious Disease/Food Allergy and Anaphylaxis Network.