Network programming in Java using Socket
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 5
Abstract
This paper describes about Network programming using java. The Network programming is similar to socket programming or Client-Server programming. Where Socket programming is important to understand how internet based interprocess communication work. In this we describe about different types of socket used in interprocess communicate on. Network programming basically uses the Client Server model. In Client-Server programming there are two different programs or process, one which initiates communication called Client process and other who is waiting for communication to start called Server process. In this paper we also focus on the Secure Socket Layer needed for security purpose.
Authors and Affiliations
Sweety Sen, Sonali Samanta
slugComparisons and Implementation of different Segmentation algorithm based on entropy and energy
In image segmentation features like edges, boundaries etc are extracted to characterize images. This emphasizes the necessity of image segmentation, which divides an image into parts that have strong correlations with o...
Solar Powered Underground Cable Fault Distance Locator Over IOT
the objective of this project is to determine the distance of underground cable fault distance from the base station in kilometers and displayed over the internet and to the connected computer .the device is powered by...
Design and Analysis of a two stage Wideband LNA in 130-nm CMOS Technology
This paper presents a Two stage wideband low-noise amplifier (LNA). Wideband input-impedance matching was achieved using lumped component. Cascode Topology(CS transistor cascade with CG transistor) is used. Inductive de...
Exploring Usability Effects of Increasing Security in Click-Based Graphical Password
Graphical passwords have been proposed to address known problems with traditional text passwords. For example, memorable user-chosen text passwords are predictable, but random system assigned passwords are difficult to...
VBIOT: Building a Virtual Brain to Life for the Secrets
The main aim is to upload to any secure document any other. After the death of the body, the virtual brain will act as the man's brain. Human brain was the most valuable creation of God. The man is called intelligent be...