SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME 
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING  
TECHNOLOGY (IJCET) 
ISSN 0976 – 6367(Print) 
ISSN 0976 – 6375(Online) 
Volume 5, Issue 7, July (2014), pp. 01-10 
© IAEME: www.iaeme.com/IJCET.asp 
Journal Impact Factor (2014): 8.5328 (Calculated by GISI) 
www.jifactor.com 
 1 
 
IJCET 
© I A E M E 
ONTOLOGY BASED JAVA PLATFORM PERSONALIZATION TO HOST 
ENVIRONMENT 
Sinan Adnan Diwan Alwan1, 4, Dr. Enas Hadi Salih2, Ammar J.Fatah3 
1Wasit University, College of Computer and Mathematics, Computer Science dept., 
Wasit, Republic of Iraq 
2Head of computer Technology Engineering, Alrafedain University College 
3Science Gate, Virtual Research Center, System security dept. 
4Limkokwing University of creative technology, information systems department, cyberjaya, 
Selangor, Malaysia 
ABSTRACT 
 
This paper presents a personalization platform to adapt Java based applications to Host 
Environment; this is to converge the performance and reliability toward platform dependant (e.g., 
like C++). Intelligent Java agent is designed to perceive Host Environment and embed Java Native 
Interfaces (JNI) to Java program at Byte Code level. Intelligent Java agent scans host machines for 
low level libraries; which are normally DLL (Dynamic Link Library) files, and list them in table. 
The personalized program is executed at two performance levels, first level is the impersonalized 
level (i.e., not handled by the agent) which is low performance and the second is the personalized 
level which is the high level in term of performance due to injecting JNI interfaces 
Keywords: JRE, JVM, JNI, Personalization, Ontology, Agent, Java Byte Code. 
1. INTRODUCTION 
The Java platform is a programming environment consisting of the Java virtual machine 
(VM) and the Java Application Programming Interface (API). 
Java applications are written in the Java programming language, and compiled into a 
machine-independent binary class format. A class can be executed on any Java virtual machine 
implementation. The Java API consists of a set of predefined classes. Any implementation of the 
Java platform is guaranteed to support the Java programming language, virtual machine, and API.[ 1]
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME 
In this paper, the term host environment represents the host operating system, a set of native 
libraries, and the CPU instruction set. Native applications are written in native programming 
languages such as C and C++, compiled into host-specific binary code, and linked with native 
libraries. Native applications and native libraries are typically dependent on a particular host 
environment. A C application built for one operating system, for example, typically does not work on 
other operating systems.[ 1][2] 
Java platforms are commonly deployed on top of a host environment. For example, the Java 
Runtime Environment (JRE) is a Sun product that supports the Java platform on existing operating 
systems such as Solaris and Windows. The Java platform offers a set of features that applications can 
rely on independent of the underlying host environment.[ 1] 
The Java™ Native Interface (JNI) is a powerful feature of the Java platform. Applications 
that use the JNI can incorporate native code written in programming languages such as C and C++, 
as well as code written in the Java programming language. The JNI allows programmers to take 
advantage of the power of the Java platform, without having to abandon their investments in legacy 
code. Because the JNI is a part of the Java platform, programmers can address interoperability issues 
once, and expect their solution to work with all implementations of the Java platform.[1][2][3] 
The JNI is a powerful feature that allows you to take advantage of the Java platform, but still 
utilize code written in other languages. As a part of the Java virtual machine implementation, the JNI 
is a two-way interface that allows Java applications to invoke native code and vice versa. Figure 1 
illustrates the role of the JNI.[1][2] 
Personalization is the science of altering multi-user software product behaviors or attributes 
according to the preferences of individual, yet maintaining the performance and the standards 
according to the multi-user software product has been designed in the first place. 
The act of personalizing platform; offering user-specific customization; the act of changing 
an option of a multi-user software platform product to change the product's behavior or style for one 
user 
This paper will deploy personalization concepts to adapt Java platform (i.e. Java Runtime 
Environment) to host platform, the outcome of this deployment will enhance the overall performance 
of java programs and increase the accessibility of java programs to local host resources. 
 2 
 
2. JAVA VIRTUAL MACHINE  JAVA RUNTIME ENVIRONMENT 
Due to the fact that personalization is so related to destination architecture a deep knowledge 
is required about internal java virtual machine architecture. This section is going to present the 
internal architecture in bit of details to conceptualize later the proposal. 
At the heart of the Java platform lays the Java Virtual Machine, or JVM. Most programming 
languages compile source code directly into machine code, suitable for execution on particular 
microprocessor architecture. The difference with Java is that it uses bytecode - a special type of 
machine code. [4] 
Java bytecode executes on a special type of microprocessor. Strangely enough, there wasn't a 
hardware implementation of this microprocessor available when Java was first released. Instead, the 
processor architecture is emulated by what is known as a virtual machine. This virtual machine is 
an emulation of a real Java processor - a machine within a machine Figure (1). The only difference is 
that the virtual machine isn't running on a CPU - it is being emulated on the CPU of the host 
machine. [4] 
Java Runtime Environment (JRE) is a Sun product that supports the Java platform on existing 
operating systems such as Solaris and Windows. The Java platform offers a set of features that 
applications can rely on independent of the underlying host environment.[1 ]
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME 
Instruction Set 
Javac.exe bytecode Javac.exe 
 3 
 
Physical Machine 
 
Java Virtual 
Machine
Java 
Application 
s 
Physical 
Virtual 
Instruction Set 
Figure 1: Java Virtual Machine is emulation within Physical Machine 
The Java Virtual Machine is responsible for interpreting Java bytecode, and translating this 
into actions or operating system calls, as in Figure 2, Java source code passes through two stages ( 
compile and interpret) before getting executed on physical CPU. The intermediate form is the 
ByteCode which is a set of instructions known only by Java Virtual Machine (JVM). JVM is 
executing ByteCode in the same manner as real CPU is executing instruction set through fetch-execute 
cycle and the output will machine code that is executable by local host physical machine 
For example, a request to establish a socket connection to a remote machine will involve an 
operating system call. Different operating systems handle sockets in different ways - but the 
programmer doesn't need to worry about such details. It is the responsibility of the JVM to handle 
these translations, so that the operating system and CPU architecture on which Java software is 
running is completely irrelevant to the developer.[4]
Java source 
code 
Figure 2: Java source passing through java compiler and java interpreter
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME 
The need for Java applications to interoperate with native code has been recognized since the 
very early days of the Java platform. The first release of the Java platform, Java Development Kit 
(JDK™) release 1.0, included a native method interface that allowed Java applications to call 
functions written in other languages such as C and C++. Many third-party applications, as well as the 
implementation of the Java class libraries (including, for example, java.lang, java.io, and java.net), 
relied on the native method interface to access the features in the underlying host environment.[1] 
Figure (3) depicts the interaction mechanism between java byte code and machine dependant 
code generated from included third party. This figure is crucial to be understood in order to 
determine place of action for the personalization. 
 4
!
!
#
 
$
#

Mais conteúdo relacionado

Mais procurados

A seminar report on core java
A  seminar report on core javaA  seminar report on core java
A seminar report on core javaAisha Siddiqui
 
Advance java summer training report
Advance java summer training report Advance java summer training report
Advance java summer training report Nitesh Saini
 
Java for Recruiters
Java for RecruitersJava for Recruiters
Java for Recruitersph7 -
 
Summer internship report
Summer internship reportSummer internship report
Summer internship reportIpsit Pradhan
 
Grade 8: Introduction To Java
Grade 8: Introduction To JavaGrade 8: Introduction To Java
Grade 8: Introduction To Javanandanrocker
 
Building Enterprise Application with J2EE
Building Enterprise Application with J2EEBuilding Enterprise Application with J2EE
Building Enterprise Application with J2EECalance
 
6 Weeks Project Based Summer Training
6 Weeks Project Based Summer Training6 Weeks Project Based Summer Training
6 Weeks Project Based Summer TrainingTech Mentro
 
Java training noida hibernate+spring+struts+web services(1)
Java training noida hibernate+spring+struts+web services(1)Java training noida hibernate+spring+struts+web services(1)
Java training noida hibernate+spring+struts+web services(1)miracleindia
 
JAVA AND ANDROID OS_PRESENTATION
JAVA AND ANDROID OS_PRESENTATIONJAVA AND ANDROID OS_PRESENTATION
JAVA AND ANDROID OS_PRESENTATIONBenjamin Agboola
 
What Your Jvm Has Been Trying To Tell You
What Your Jvm Has Been Trying To Tell YouWhat Your Jvm Has Been Trying To Tell You
What Your Jvm Has Been Trying To Tell YouJohn Pape
 
Introduction tojavaandxml lc-slides01-fp2005-ver 1.0
Introduction tojavaandxml lc-slides01-fp2005-ver 1.0Introduction tojavaandxml lc-slides01-fp2005-ver 1.0
Introduction tojavaandxml lc-slides01-fp2005-ver 1.0Sanjay Yadav
 
Core Java Slides
Core Java SlidesCore Java Slides
Core Java SlidesVinit Vyas
 
Introduction to java
Introduction to javaIntroduction to java
Introduction to javashwanjava
 
Sybsc cs sem 3 core java
Sybsc cs sem 3 core javaSybsc cs sem 3 core java
Sybsc cs sem 3 core javaWE-IT TUTORIALS
 
basic core java up to operator
basic core java up to operatorbasic core java up to operator
basic core java up to operatorkamal kotecha
 

Mais procurados (20)

A seminar report on core java
A  seminar report on core javaA  seminar report on core java
A seminar report on core java
 
Bn1005 demo ppt core java
Bn1005 demo ppt core javaBn1005 demo ppt core java
Bn1005 demo ppt core java
 
Advance java summer training report
Advance java summer training report Advance java summer training report
Advance java summer training report
 
Java for Recruiters
Java for RecruitersJava for Recruiters
Java for Recruiters
 
Java Programming Basics
Java Programming BasicsJava Programming Basics
Java Programming Basics
 
Summer internship report
Summer internship reportSummer internship report
Summer internship report
 
Introducing Java 7
Introducing Java 7Introducing Java 7
Introducing Java 7
 
Grade 8: Introduction To Java
Grade 8: Introduction To JavaGrade 8: Introduction To Java
Grade 8: Introduction To Java
 
Building Enterprise Application with J2EE
Building Enterprise Application with J2EEBuilding Enterprise Application with J2EE
Building Enterprise Application with J2EE
 
6 Weeks Project Based Summer Training
6 Weeks Project Based Summer Training6 Weeks Project Based Summer Training
6 Weeks Project Based Summer Training
 
Java training noida hibernate+spring+struts+web services(1)
Java training noida hibernate+spring+struts+web services(1)Java training noida hibernate+spring+struts+web services(1)
Java training noida hibernate+spring+struts+web services(1)
 
Java seminar
Java seminarJava seminar
Java seminar
 
JAVA AND ANDROID OS_PRESENTATION
JAVA AND ANDROID OS_PRESENTATIONJAVA AND ANDROID OS_PRESENTATION
JAVA AND ANDROID OS_PRESENTATION
 
What Your Jvm Has Been Trying To Tell You
What Your Jvm Has Been Trying To Tell YouWhat Your Jvm Has Been Trying To Tell You
What Your Jvm Has Been Trying To Tell You
 
Introduction tojavaandxml lc-slides01-fp2005-ver 1.0
Introduction tojavaandxml lc-slides01-fp2005-ver 1.0Introduction tojavaandxml lc-slides01-fp2005-ver 1.0
Introduction tojavaandxml lc-slides01-fp2005-ver 1.0
 
Core Java Slides
Core Java SlidesCore Java Slides
Core Java Slides
 
Introduction to java
Introduction to javaIntroduction to java
Introduction to java
 
String class
String classString class
String class
 
Sybsc cs sem 3 core java
Sybsc cs sem 3 core javaSybsc cs sem 3 core java
Sybsc cs sem 3 core java
 
basic core java up to operator
basic core java up to operatorbasic core java up to operator
basic core java up to operator
 

Destaque

1.manual streaming raditcast
1.manual streaming raditcast1.manual streaming raditcast
1.manual streaming raditcastKlair Fivalén
 
Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...
Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...
Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...ÁggapBrasil
 
Directiva pip huayopata para residentes
Directiva pip huayopata para residentesDirectiva pip huayopata para residentes
Directiva pip huayopata para residentesgofercitoo
 
Producción pediatrica española 2006 2010 parte1-objetivos y metodologia
Producción pediatrica española 2006 2010 parte1-objetivos y metodologiaProducción pediatrica española 2006 2010 parte1-objetivos y metodologia
Producción pediatrica española 2006 2010 parte1-objetivos y metodologiaJavier González de Dios
 
Mathematical code in buildings
Mathematical code in buildingsMathematical code in buildings
Mathematical code in buildingsErasmus+
 
Mosque of Brunei Darussalam
Mosque of Brunei DarussalamMosque of Brunei Darussalam
Mosque of Brunei DarussalamLirazbregman
 
Proyecto Compu Blogg Tic
Proyecto Compu Blogg TicProyecto Compu Blogg Tic
Proyecto Compu Blogg Ticfercha93
 
Laura Isabel 5 Grado A Fuentes De Energia
Laura Isabel 5 Grado A  Fuentes  De  EnergiaLaura Isabel 5 Grado A  Fuentes  De  Energia
Laura Isabel 5 Grado A Fuentes De Energiaarianna
 
Trabajo sobre las computadoras
Trabajo sobre las computadorasTrabajo sobre las computadoras
Trabajo sobre las computadorasgueste98d1db
 
Capacitacion a distancia online en vivo, en tiempo real
Capacitacion a distancia online en vivo, en tiempo realCapacitacion a distancia online en vivo, en tiempo real
Capacitacion a distancia online en vivo, en tiempo realFormacion Sin Fronteras
 
Qué Es La DocumentacióN Narrativa De Experiencias
Qué Es La DocumentacióN Narrativa De ExperienciasQué Es La DocumentacióN Narrativa De Experiencias
Qué Es La DocumentacióN Narrativa De Experienciasguest57b4c2
 
Historia Salud Ocupacional
Historia Salud OcupacionalHistoria Salud Ocupacional
Historia Salud Ocupacionalerika
 
Deber confidencialidad y proteccion de datos
Deber confidencialidad y proteccion de datosDeber confidencialidad y proteccion de datos
Deber confidencialidad y proteccion de datosJasfer
 
Moscow
MoscowMoscow
MoscowBryagh
 
Cómo llegar al cumpleaños de Nadima
Cómo llegar al cumpleaños de NadimaCómo llegar al cumpleaños de Nadima
Cómo llegar al cumpleaños de NadimaAbril Mejías Romhany
 

Destaque (20)

1.manual streaming raditcast
1.manual streaming raditcast1.manual streaming raditcast
1.manual streaming raditcast
 
Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...
Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...
Bela Augusta Boulevard Offices | Renata Gaban (11) 7853-9660 LANÇAMENTO...
 
Directiva pip huayopata para residentes
Directiva pip huayopata para residentesDirectiva pip huayopata para residentes
Directiva pip huayopata para residentes
 
Producción pediatrica española 2006 2010 parte1-objetivos y metodologia
Producción pediatrica española 2006 2010 parte1-objetivos y metodologiaProducción pediatrica española 2006 2010 parte1-objetivos y metodologia
Producción pediatrica española 2006 2010 parte1-objetivos y metodologia
 
Mathematical code in buildings
Mathematical code in buildingsMathematical code in buildings
Mathematical code in buildings
 
Mosque of Brunei Darussalam
Mosque of Brunei DarussalamMosque of Brunei Darussalam
Mosque of Brunei Darussalam
 
Diostedice
DiostediceDiostedice
Diostedice
 
Proyecto Compu Blogg Tic
Proyecto Compu Blogg TicProyecto Compu Blogg Tic
Proyecto Compu Blogg Tic
 
Laura Isabel 5 Grado A Fuentes De Energia
Laura Isabel 5 Grado A  Fuentes  De  EnergiaLaura Isabel 5 Grado A  Fuentes  De  Energia
Laura Isabel 5 Grado A Fuentes De Energia
 
Trabajo sobre las computadoras
Trabajo sobre las computadorasTrabajo sobre las computadoras
Trabajo sobre las computadoras
 
Capacitacion a distancia online en vivo, en tiempo real
Capacitacion a distancia online en vivo, en tiempo realCapacitacion a distancia online en vivo, en tiempo real
Capacitacion a distancia online en vivo, en tiempo real
 
Qué Es La DocumentacióN Narrativa De Experiencias
Qué Es La DocumentacióN Narrativa De ExperienciasQué Es La DocumentacióN Narrativa De Experiencias
Qué Es La DocumentacióN Narrativa De Experiencias
 
27
2727
27
 
Historia Salud Ocupacional
Historia Salud OcupacionalHistoria Salud Ocupacional
Historia Salud Ocupacional
 
Plantas asexual
Plantas asexualPlantas asexual
Plantas asexual
 
Deber confidencialidad y proteccion de datos
Deber confidencialidad y proteccion de datosDeber confidencialidad y proteccion de datos
Deber confidencialidad y proteccion de datos
 
Moscow
MoscowMoscow
Moscow
 
Cómo llegar al cumpleaños de Nadima
Cómo llegar al cumpleaños de NadimaCómo llegar al cumpleaños de Nadima
Cómo llegar al cumpleaños de Nadima
 
Estrategias basicas de_lectura
Estrategias basicas de_lecturaEstrategias basicas de_lectura
Estrategias basicas de_lectura
 
CV Angel
CV AngelCV Angel
CV Angel
 

Semelhante a 50120140507001

J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01Jay Palit
 
Java & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate FrameworkJava & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate FrameworkMohit Belwal
 
Java presentation
Java presentationJava presentation
Java presentationsurajdmk
 
Java presentation
Java presentationJava presentation
Java presentationsurajdmk
 
Eclipse & java based modeling platforms for smart phone
Eclipse & java based modeling platforms for smart phoneEclipse & java based modeling platforms for smart phone
Eclipse & java based modeling platforms for smart phoneIAEME Publication
 
Technology Tutorial.pdf
Technology Tutorial.pdfTechnology Tutorial.pdf
Technology Tutorial.pdfTechSearchWeb
 
A CASE STUDY JAVA IS SECURE PROGRAMMING LANGUAGE
A CASE STUDY  JAVA IS SECURE PROGRAMMING LANGUAGEA CASE STUDY  JAVA IS SECURE PROGRAMMING LANGUAGE
A CASE STUDY JAVA IS SECURE PROGRAMMING LANGUAGENathan Mathis
 
TechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdfTechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdfTechSearchWeb
 
JAVA PROGRAMMING-Unit I - Final PPT.pptx
JAVA PROGRAMMING-Unit I - Final PPT.pptxJAVA PROGRAMMING-Unit I - Final PPT.pptx
JAVA PROGRAMMING-Unit I - Final PPT.pptxSuganthiDPSGRKCW
 
Chapter 1 introduction to java technology
Chapter 1 introduction to java technologyChapter 1 introduction to java technology
Chapter 1 introduction to java technologysshhzap
 

Semelhante a 50120140507001 (20)

J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01
 
Java & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate FrameworkJava & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate Framework
 
Java presentation
Java presentationJava presentation
Java presentation
 
Java presentation
Java presentationJava presentation
Java presentation
 
Java-Unit-I.ppt
Java-Unit-I.pptJava-Unit-I.ppt
Java-Unit-I.ppt
 
Eclipse & java based modeling platforms for smart phone
Eclipse & java based modeling platforms for smart phoneEclipse & java based modeling platforms for smart phone
Eclipse & java based modeling platforms for smart phone
 
Core Java-1 (1).pdf
Core Java-1 (1).pdfCore Java-1 (1).pdf
Core Java-1 (1).pdf
 
Java ms harsha
Java ms harshaJava ms harsha
Java ms harsha
 
Presentation on Java Basic
Presentation on Java BasicPresentation on Java Basic
Presentation on Java Basic
 
Java session2
Java session2Java session2
Java session2
 
java concepts
java conceptsjava concepts
java concepts
 
TechSearchWeb.pdf
TechSearchWeb.pdfTechSearchWeb.pdf
TechSearchWeb.pdf
 
Technology Tutorial.pdf
Technology Tutorial.pdfTechnology Tutorial.pdf
Technology Tutorial.pdf
 
Core java slides
Core java slidesCore java slides
Core java slides
 
A CASE STUDY JAVA IS SECURE PROGRAMMING LANGUAGE
A CASE STUDY  JAVA IS SECURE PROGRAMMING LANGUAGEA CASE STUDY  JAVA IS SECURE PROGRAMMING LANGUAGE
A CASE STUDY JAVA IS SECURE PROGRAMMING LANGUAGE
 
Java unit 1
Java unit 1Java unit 1
Java unit 1
 
Java Intro
Java IntroJava Intro
Java Intro
 
TechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdfTechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdf
 
JAVA PROGRAMMING-Unit I - Final PPT.pptx
JAVA PROGRAMMING-Unit I - Final PPT.pptxJAVA PROGRAMMING-Unit I - Final PPT.pptx
JAVA PROGRAMMING-Unit I - Final PPT.pptx
 
Chapter 1 introduction to java technology
Chapter 1 introduction to java technologyChapter 1 introduction to java technology
Chapter 1 introduction to java technology
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

50120140507001

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com 1 IJCET © I A E M E ONTOLOGY BASED JAVA PLATFORM PERSONALIZATION TO HOST ENVIRONMENT Sinan Adnan Diwan Alwan1, 4, Dr. Enas Hadi Salih2, Ammar J.Fatah3 1Wasit University, College of Computer and Mathematics, Computer Science dept., Wasit, Republic of Iraq 2Head of computer Technology Engineering, Alrafedain University College 3Science Gate, Virtual Research Center, System security dept. 4Limkokwing University of creative technology, information systems department, cyberjaya, Selangor, Malaysia ABSTRACT This paper presents a personalization platform to adapt Java based applications to Host Environment; this is to converge the performance and reliability toward platform dependant (e.g., like C++). Intelligent Java agent is designed to perceive Host Environment and embed Java Native Interfaces (JNI) to Java program at Byte Code level. Intelligent Java agent scans host machines for low level libraries; which are normally DLL (Dynamic Link Library) files, and list them in table. The personalized program is executed at two performance levels, first level is the impersonalized level (i.e., not handled by the agent) which is low performance and the second is the personalized level which is the high level in term of performance due to injecting JNI interfaces Keywords: JRE, JVM, JNI, Personalization, Ontology, Agent, Java Byte Code. 1. INTRODUCTION The Java platform is a programming environment consisting of the Java virtual machine (VM) and the Java Application Programming Interface (API). Java applications are written in the Java programming language, and compiled into a machine-independent binary class format. A class can be executed on any Java virtual machine implementation. The Java API consists of a set of predefined classes. Any implementation of the Java platform is guaranteed to support the Java programming language, virtual machine, and API.[ 1]
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME In this paper, the term host environment represents the host operating system, a set of native libraries, and the CPU instruction set. Native applications are written in native programming languages such as C and C++, compiled into host-specific binary code, and linked with native libraries. Native applications and native libraries are typically dependent on a particular host environment. A C application built for one operating system, for example, typically does not work on other operating systems.[ 1][2] Java platforms are commonly deployed on top of a host environment. For example, the Java Runtime Environment (JRE) is a Sun product that supports the Java platform on existing operating systems such as Solaris and Windows. The Java platform offers a set of features that applications can rely on independent of the underlying host environment.[ 1] The Java™ Native Interface (JNI) is a powerful feature of the Java platform. Applications that use the JNI can incorporate native code written in programming languages such as C and C++, as well as code written in the Java programming language. The JNI allows programmers to take advantage of the power of the Java platform, without having to abandon their investments in legacy code. Because the JNI is a part of the Java platform, programmers can address interoperability issues once, and expect their solution to work with all implementations of the Java platform.[1][2][3] The JNI is a powerful feature that allows you to take advantage of the Java platform, but still utilize code written in other languages. As a part of the Java virtual machine implementation, the JNI is a two-way interface that allows Java applications to invoke native code and vice versa. Figure 1 illustrates the role of the JNI.[1][2] Personalization is the science of altering multi-user software product behaviors or attributes according to the preferences of individual, yet maintaining the performance and the standards according to the multi-user software product has been designed in the first place. The act of personalizing platform; offering user-specific customization; the act of changing an option of a multi-user software platform product to change the product's behavior or style for one user This paper will deploy personalization concepts to adapt Java platform (i.e. Java Runtime Environment) to host platform, the outcome of this deployment will enhance the overall performance of java programs and increase the accessibility of java programs to local host resources. 2 2. JAVA VIRTUAL MACHINE JAVA RUNTIME ENVIRONMENT Due to the fact that personalization is so related to destination architecture a deep knowledge is required about internal java virtual machine architecture. This section is going to present the internal architecture in bit of details to conceptualize later the proposal. At the heart of the Java platform lays the Java Virtual Machine, or JVM. Most programming languages compile source code directly into machine code, suitable for execution on particular microprocessor architecture. The difference with Java is that it uses bytecode - a special type of machine code. [4] Java bytecode executes on a special type of microprocessor. Strangely enough, there wasn't a hardware implementation of this microprocessor available when Java was first released. Instead, the processor architecture is emulated by what is known as a virtual machine. This virtual machine is an emulation of a real Java processor - a machine within a machine Figure (1). The only difference is that the virtual machine isn't running on a CPU - it is being emulated on the CPU of the host machine. [4] Java Runtime Environment (JRE) is a Sun product that supports the Java platform on existing operating systems such as Solaris and Windows. The Java platform offers a set of features that applications can rely on independent of the underlying host environment.[1 ]
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME Instruction Set Javac.exe bytecode Javac.exe 3 Physical Machine Java Virtual Machine
  • 4. Java Application s Physical Virtual Instruction Set Figure 1: Java Virtual Machine is emulation within Physical Machine The Java Virtual Machine is responsible for interpreting Java bytecode, and translating this into actions or operating system calls, as in Figure 2, Java source code passes through two stages ( compile and interpret) before getting executed on physical CPU. The intermediate form is the ByteCode which is a set of instructions known only by Java Virtual Machine (JVM). JVM is executing ByteCode in the same manner as real CPU is executing instruction set through fetch-execute cycle and the output will machine code that is executable by local host physical machine For example, a request to establish a socket connection to a remote machine will involve an operating system call. Different operating systems handle sockets in different ways - but the programmer doesn't need to worry about such details. It is the responsibility of the JVM to handle these translations, so that the operating system and CPU architecture on which Java software is running is completely irrelevant to the developer.[4]
  • 5. Java source code Figure 2: Java source passing through java compiler and java interpreter
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME The need for Java applications to interoperate with native code has been recognized since the very early days of the Java platform. The first release of the Java platform, Java Development Kit (JDK™) release 1.0, included a native method interface that allowed Java applications to call functions written in other languages such as C and C++. Many third-party applications, as well as the implementation of the Java class libraries (including, for example, java.lang, java.io, and java.net), relied on the native method interface to access the features in the underlying host environment.[1] Figure (3) depicts the interaction mechanism between java byte code and machine dependant code generated from included third party. This figure is crucial to be understood in order to determine place of action for the personalization. 4
  • 7. !
  • 8. !
  • 9. # $
  • 10. #
  • 11. % '
  • 12. ' ! Application.java Application.class Application.h Application.c Application.dll Native Application Figure 3: building Java Native Interface Application
  • 13. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME 5 3. ONTOLOGY Ontology is originally a philosophical discipline which deals with the study of being and existence. The term is borrowed to computer science and defined as an explicit specification of conceptualization [13], which specifies the set of concepts that will be used in a particular system as a basis for communication or sharing of information. In particular, ontology is an important component in the Semantic Web [2]. An ontology generally consists of a taxonomy of concepts, a set of relations, a set of individuals (representing real objects), and possibly a set of inference rules for discovering of implicit knowledge [2]. formally ontology O can be defined as a four-tuple O = (C,P,I,R), where C is a set of concepts, P is a set of properties, I is a set of data instances, representing real objects in the domain of interest, and lastly R is a set of rules, propositions or axioms that specify the relations between concepts and properties. The proposal of this paper has the following interpretation for the components of the ontology: C: is the basic concepts within the model and here it represents marked block of code, where the program code can be treated as a series of marked block of code. P: properties of the block of code for example its length in byte and addressing mode are properties of code block. I: Instances of code block for example functions can be instantiated many times in a program. R: relationships between code blocks for example INVOKE relationship is assigned to code block invoked by other code. 4. CHALLENGES The challenges in implementing tasks in native or in standard java depends on the availability of native libraries installed in the system 1- Mining java program at byte code level which needs dedicated ontologies to conceptualize 2- Mining system files at execute level (Portable Executable format) 5. THE PROPOSED PERSONALIZATION SYSTEM The proposed technique is to build Java Agent that capable of perceiving concepts in Java Byte code domain which is stored in separate class file (i.e., .jar or .class), the ontology used to define these concepts will be specially designed to do this task. Java Agent ultimate goal is to map perceived concepts in java byte code to its analogous in native library (i.e., .dll, .exe, .ocx) as in figure (4)
  • 14. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME Figure 4: Java Agent Maps Java Byte code to binaries in dll file The proposed technique passes through two phases, the first phase is with no mapping entries exist in the updated log file, this log file will serve as a direct mapping pointer, the agent will check the validity of the code referred by this pointer to sustain the mapping. Java Agent will start looking inside dll files to explore for analogous code that matches Java byte code, the data will be isolated to keep it out of the mapping, in phase one a log file will be built to enhance the mapping function and to not mining again for requested functions. Figure (5) shows the architecture of personalization Java Byte code in phase one Log File ) Byte code Ontology Native Libraries ( Binary images) Java Agent
  • 15. (
  • 16. Figure 5: Java Agent is building Mapping table in phase one 6 When phase one is finished the personalization Agent will direct the dispatcher of the operating system to the native code in dll rather than send it to Java Virtual Machine as in figure (6)
  • 17. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME ,
  • 19. %
  • 20. #
  • 21. % Figure 6: Java Agent is mapping byte code to native in phase two 7 Central execution unit Java Virtual machine *% + Tc = Time to compile Java source code Tp = Time to interpret Java Byte code Tb = Time to execute binary code Texe = Time to execute Java Program Texe = Tc + Tp this is without personalization Personalization Agent due to the fact that binary code is executed directly, and the following equation is describing the proposed system with personalization It is obvious that when is small then the overall performance of the system is is going high. Figure (7) presents the machine code corresponding 'printf' c language function compiled using visual studio 6.0. Figure 7: Java Agent perceived requested machine code
  • 22. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME In the same manner corresponding byte code will be perceived in java class file, the example taken by this paper is simple and contains only 'println' which is part of 'System.out' class. Figure (8) presents a screen shot of bytecode viewer which has been used to reveal the byte code image of 'System.out.println' method. each found member function in java class file that has a analogous native representation will be marked as comment and a method added with the name 'mXxx' where Xxx is the name of the member function to be implemented as native code. Figure (9) presented the resultant of applying personalization concepts on java class file called 'Hello.class' built to be an example for the personalization. 8 Figure 8: Bytecode viewer presents java byte code of System.out.println Figure 9: Hello.class has been personalized and native keyword has been added
  • 23. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME Personalization ratio (personalized java / original java) is not fixed along different categories of programming classes; this is shown in table-1 where different categories have been tested. Table -1- Personalization rate for different programming categories I Java SLC Category Personalized rate 1 137 402 Consol 73% 331 2 214 309 Form Based 68% 290 3 180 553 Network 69% 440 4 167 506 Data base 37% 481 5 179 613 Graphics 53% 413 6 165 585 Multi-threading 76% 335 Figure (10) presents a discrimination graph between the performance of different programming categories shown in table-1, which are implemented using java and c# programming languages. 4.. .. 3.. 2.. 1.. 0.. /.. The personalization of a java program can be represented by a cumulative function as logistic function as figure (11) which presents the effect of increasing the source line of code (SLC) on the overall performance of the personalization. 9 . ! 5 Figure 10: Performance Chart due to personalization
  • 24. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 01-10 © IAEME / 0 1 2 3 4 6 /. // /0 /1 /2 /3 / /4 / /6 0. 0/ Figure 10: Performance of personalization as it relates source line code 10 13 1 03 0 /3 / .3 .
  • 25. 6. CONCLUSIONS / 1- Java program can be personalized to certain platform according to the interpretation of its binary images, which represents executable format adopted by that platform. The personalized java programs showed an increased performance level due to the low level linkages of binary code; this binary code is hold by DLL ( dynamic link linbrary) files. 2- Java program can be personalized to open source operating systems like Unix and lunix more easier that windows operating system due to its readability and matching to source code in Java program. 7. REFERENCES 1- Sheng Liang, The Java Native Interface, Programmer's Guide and Specification, ADDISON-WESLEY, USA, 1999. 2- Fabio Bellifemine, Giovanni Caire, Tiziana Tucco and Giovanni Rimassa, JADE Progammer's Guide, TILab S.P.A, 2010. 3- Chris H.Pappas William H. Murray, The complete Reference visual studio 6.0, McGraw- Hill, 1998. 4- David Reilly, Inside Java: Java Virtual Machine, 2006. 5- Abhishek Singh, “Identifying Malicious Code Through Reverse Engineering: Portable Executable File Format”, Advances in Information Security Volume 44, 2009. 6- David Reilly, “Inside Java: The Java Virtual Machine”, accessed at: http://www.javacoffeebreak.com/articles/inside_java/insidejava-jan99.html. 7- P.Shvaiko, J.Euzenat., “Ontology Matching : State of the art and Future Challenges”, IEEE Transactions on Knowledge and Data Engineering, 2013. 8- Pratibha S. Yalagi and Dr. Sulabha S. Apte, “Exploiting Parallelism for a Java Code with an Efficient Parallelization Technique”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 3, 2012, pp. 484 - 489, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.