Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (5)
FTP Java server and client
4.2
Application background The program will consist of a client and a server. The client will need to register itself with the server for the first time using simple credentials (exact details of these credentials are left to you to decide). These credentials will be used by the server to authenticate the client for any further sessions. After the client is authenticated, the server will accept a request from the client for transferring a file. If the requested file exists then it will be sent across to the client. The contents of the file will

jin shang
2016-08-23
5
1
Secure communication
no vote
Application background client and server C share a symmetric key KCs, which is the only known server and client. This is a long-term key, which is used to set a session key, and the session key is the value of a secret sent by the server to the customer: key technology communication security & nbsp; AES & nbsp; European Central Bank pkcs5 & nbsp;
jin shang
2016-08-23
0
1
The decision tree and that her Naive Bayesian meth
no vote
Application background this is the code of classification research, and in particular, the decision tree method and Na य़ naive Bayes method are used for the comparative analysis of classification data. Comparative analysis of key technology decision tree and decision tree classification methods
jin shang
2016-08-23
0
1
Traveling salesman problem (traveling salesman pro
no vote
Application background The traveling salesperson problem (TSP)   can be solved with the minimum- spanning-tree (MST) heuristic, which estimates the   cost of completing a tour, given that a partial tour has already been constructed. The MST   cost of a set of cities is the smallest sum of the link costs of any tree that connects all the   cities.   Key Technology traveling salesperson problem TSP SMA A* 
jin shang
2016-08-23
2
1
Client server communication code (encryption)
no vote
Application background 1)Secure Transmission of File: When the Client requests a file in the Server, then the server has to send the file through the network, to the Client. The communication channel might not be secure always. So some security measures are to be used for secure transmission of the file.  I have used the encryption and decryption process to ensure the secure file transmission. As per the End-To-End argument, by providing security checks in between the underlying communication channel would not ensure the secure transmission at the end applications (i.e., Server and Client in this scenario). And also the secure transmission of a file should be any ways checked at the application end. So by implementing security at the communication channel would be an extra over head. According to this I have implemented the secure transmission at the Ends. The f
jin shang
2015-11-03
0
1
No more~