毕业论文论文范文课程设计实践报告法律论文英语论文教学论文医学论文农学论文艺术论文行政论文管理论文计算机安全
您现在的位置: 毕业论文 >> 论文 >> 正文

基于J2ME WTK的2D手机游戏开发(英文文献翻译) 第19页

更新时间:2010-3-11:  来源:毕业论文
基于J2ME WTK的2D手机游戏开发(英文文献翻译) 第19页
Five steps for using JDBC database: load JDBC drive, establish connection, create SQL inquiry, present and receive inquiry results, take out inquiry results. Related core codes are as follows
Class. for Name (" sun.jdbc.odbc. JdbcOdbcDrive "); //load drive
Connection conn = null ;
String url = " jdbc: odbc: publicSp " ;
conn = Driver Manager . getConnection ( url );//establish connection
Statement stmt = conn . createStatement ( ) ;//SQLquery
String condition = " Select Commercenum from " +
City + " wherecommerce like " + ","%" / /input
inquiry conditional SQL statements
ResultSet rs = sql . executeQuery( condition) ; //execute SQL query
while ( rs . next ( ) ) {
String Buffer full Name = new String Buffer
full Name . append ( rs . getString(1) ) ;
full Name . append ( " " ) ;
full Name . append ( rs . getString(2) ) ;//get query
results
}
4.2 Implementation of Server-tier
Server-tier is implemented by J2EE. J2ME client transmission process: submit inquiry data to server, Java Servlet gain user’s inquiry keyword, link it to database through JDBC, search qualified record and return the results to J2ME client -tier.
Servlet main codes
String std=request.get Parameter (“spxx”);//get J2ME client request contents
Servlet Context context=get Servlet Context ();
Connection Pool = ( ConnectionPool) context.
Get Attribute (“connectionPool”);
Connection connection=connection Pool. Get Connection(); //get links to database
Statement stmt = connection. Create Statement();//create inquiry statements and implement
……
4.3 Security
Security in the process of communication must be dealt with very well in order to secure mobile payments. Not only communication in wired environment but also the good service of transmitting information in wireless environment should be ensured. That is the question about confidence,integrity, discrimination and non-repudiation. The cryptography, hashing function and digital signatures technology based on Algorithm can help security schemes to accomplish the purpose. And they can help to counteract various common attacks from internet in order to guarantee security. There are different ways of data encryption. The technology used in this paper (MIDP2.0 supporting HTTPS) has already matured to encrypt the network connection to ensure data tier-totier security. Besides, digital signatures have become one of the most important measures of network security in the information society, bringing security to many enterprises and consumers. In Internet application digital signatures can ensure the authenticity, integrity and non-repudiation of transmitting data together with PKI and CA.
5. Conclusion
With the arrival of the 3G era, the whole telecom industry is faced with unprecedented opportunities. Combining the mobile e-commerce supporting wireless
devices (such as cell phone, PAD and etc) with the application research in mobile payment schemes, this article constructs a mobile payment system based on J2ME and centered in the third payment platform. And it explores the structure, design and the security of the system in terms of technology. With the technology development and application mature, mobile payment as a new mode of consumption, can integrate the logistics and flow of funds service with traffic service very efficiently. It will become one of the greatest value-added services in 3G business in our Chinese daily life. 
 References
[1] Li Yunhong, Luo Siwen, “Research and Development of Mobile Business System Based on J2ME and J2EE”, ICCSE 2007, pp. 781-783.
[2] Chen Xun, “Research and Implement for Secure Scheme of Mobile Payment Based on J2ME” 2007. Degree paper for master.
[3] Chi Ruinan, “Research on Moblie Commerce System Based on J2ME and J2EE”, Microcomputer Information, VOL.23, 2007, pp. 152-154.
[4] TANG RUN-HUA,ZHANG LU,LIU WAI-XI. “Design and Development of Mobile Integration Inquiry System Based on J2ME and J2EE Technologies”, Science Technology and Engineering, VOL. 8, Jan,2008, pp. 87-90.
[5] MAO Li, JIA Hengsong, XU Wenbo. “Design of B2B Ebusiness System Based on J2EE Multi-pattern”, Computer Engineering, VOL.32, 2006, pp. 283-284.

 << 上一页  [11] [12] [13] [14] [15] [16] [17] [18] [19] 

基于J2ME WTK的2D手机游戏开发(英文文献翻译) 第19页下载如图片无法显示或论文不完整,请联系qq752018766
设为首页 | 联系站长 | 友情链接 | 网站地图 |

copyright©youerw.com 优文论文网 严禁转载
如果本毕业论文网损害了您的利益或者侵犯了您的权利,请及时联系,我们一定会及时改正。