Study of Java Access Control Mechanism
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 1
Abstract
a class as "a collection of data and methods." One of the important object-oriented techniques is hiding the data within the class and making it available only through the methods. This technique is known as encapsulation because it seals the data (and internal methods) safely inside the "capsule" of the class, where it can be accessed only by trusted users. Another reason for encapsulation is to protect your class against accidental or willful stupidity. A class often contains a number of interdependent fields that must be in a consistent state. If you allow a users to manipulate those fields directly, he may change one field without changing important related fields, thus leaving the class in an inconsistent state. If, instead, he has to call a method to change the field, that method can be sure to do everything necessary to keep the state consistent. Similarly, if a class defines certain methods for internal use only, hiding these methods prevents users of the class from calling them. The goal is : All the fields and methods of a class can always be used within the body of the class itself. Java defines access control rules that restrict members of a class from being used outside the class that is done through keeping the data (and internal methods) safely inside the "capsule" of the class, where it can be accessed only by trusted users.
Authors and Affiliations
Manhal Mohammad Basher
Mining Interesting Medical Knowledge from Big Data
Abstract: There are many real life applications where uncertain big data is generated. For example: medical data, stock exchange, social media and many more. Big data works on the data which is unstructured. Miningsuch a...
An Improved Novel Steganographic Technique For RGB And YCbCr Colorspace
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most...
Automatic Identification of moving Objects in a Scene using Corners features
Abstract: This Paper presents an automated method to identify the moving objects. The proposed method is a combination of Corner Detectors, Area Based Tracking, K – Means clustering. The Corner Detectors used in this are...
[i][/i] Brief Study of Performance of Routing Protocols for Mobile Ad Hoc Networking in Ns-2
Ad hoc networking allows portable devices to establish communication independent of a centralinfrastructure. However, the fact that there is no central Infrastructure and that the devices can move randomly gives...
Reducing location error in Wireless Sensor Networks
Abstract: Localization is the basic problem in the wireless sensor networks. All the result data get wasted if the node is placed in the wrong position. Range based and Range free algorithms are used for locating t...