Tuesday, December 31, 2019

My First Class Is Not A Decision That I Have Taken

Returning to college to finish my degree is not a decision that I have taken lightly. When the opportunity arose, I took a look at the big picture before deciding on classes in which I would enroll. It had been ten years since I had attended a college class. Even though I was excited for some of the technical classes afforded in my degree path, I also knew that strengthening my overall academic foundation would play a much more important role; this is why I chose to take WRTG 101 as my first class returning to school. I began WRTG 101 with unrefined writing skills; now I can properly apply the writing process, construct unified and well supported paragraphs, demonstrate accurate grammar and mechanics, and properly analyze and integrate valid sources using an accepted documentation style. Approaching the initial writing assignment was difficult for me because it had been so long since I had utilized and applied the writing process. Writing for Success played a very important role in refreshing the writing process for me, and Chapter 1 set the stage for reestablishing my use of the writing process. It felt infinitely easier to prewrite and revise for the contrast essay than it did for the autobiography. Although the week one prewriting exercise helped ease me back into the prewriting methods, it was not until the second essay that I found a prewriting style that worked for me; I actually went back to Chapter 8 in Writing for Success to review different styles.Show MoreRelatedMy Personal Experience : My Experience In My Life1132 Words   |  5 PagesWe all have our own opinions on things. Some people have strong opinions. When people with strong feelings get together and notice they have differing opinions, it can lead to arguments. That’s what happened in my case. Recently, I experienced my first big fight with my parents over how many college classes I should be able to take. Ever since I was little, I have always tried to do my very best in classes and really push myself. I have also always been a perfectionist and been very on top ofRead MoreMaking The Decision At School Online865 Words   |  4 PagesMaking the decision to go to school online was a very challenging decision. I am very pleased to have taken the EXP105 class first. This class has taught me the meaning of why we learn. The class has taught me how to learn, and the many ways we learn on a daily basis with each task we complete. Taking this class I see learning on a whole new level. I have what it means to be an intentional learner. When I first began the class, I had no idea that there were ways we learn and that being and intentionalRead MoreMy Experience At The Soc Experience903 Words   |  4 PagesExperience I have always taken what I have been given in most aspects of my life. In terms of school and implement I figured if the rules and regulations are set then there is good reasoning behind it all. Typically looking at how a change might affect employees and professors, if had a problem with something I just did my best to work within constraints. There has been times where I felt like I did not have enough time to finish an assignment or where I felt there was too much work for one class but neverRead More educational philosophy Essay example972 Words   |  4 Pages My Philosophy on Classroom Discipline My philosophy regarding the best way to manage a classroom is through a model of ownership and preventative discipline. In order to accomplish this, the teacher needs to set the tone for the class during the first two weeks of school and never veer from it. During this time, the students will be made aware of my classroom rules as well as what I expect out of each of them on a daily basis. This will create an open atmosphere in which all members of the classroomRead MoreBeing An International Student Program1218 Words   |  5 PagesWhen I first came to class, I was curious, nervous and excited as this was the only class for which I gave thought for â€Å"should I go for it in this semester or in next semester†. As being an international student coming directly from India with an undergraduate degree and no work experience made me nervous in starting of the class. But as the class progressed through weeks, I was becoming more confident and the zeal to learn new things kept me going. I was science student back in India with majorRead MoreMy Assessment On Business Ethics Online Discussion On Board1504 Words   |  7 PagesIntroduction My assessment on business ethics online discussion on board I have to chose best tree in activity 1 to 12 and I have to make report format and describe on details what I understand of all I chose the tree each activity have 4/5 question . I have to define each question and in final I have to make report writing . Best three. ïÆ'Ëœ Behavioral ethics ïÆ'Ëœ bounded ethicality ïÆ'Ëœ conflict of interest I n this activity shows what are loop hole between employs and originations andRead MorePersonal Statement On Business And Public Relations853 Words   |  4 PagesExecutive Briefing On Business and Public Relations My Major: Public Relations My Related Field: Business Overview of Business The public relations major at Franklin College require student to have a minor or related field. I choose to have a related field in business, which means I am required to take 12 credit hours in business courses. I have already taken four business courses and I am currently in my fifth. My first two business courses were Introduction to Business and Principles ofRead MoreThe Military Professional Identity Is Defined Differently By The United States Naval Academy1676 Words   |  7 Pagesdefined differently by everyone. I believe for one to embody the military professional identity, he or she has to be a leader of character and ready to defend the nation. The four years spent at the Naval Academy gives you the opportunity to develop and mold your physical, mental, and moral stature in order to embody the military professional identity that one desires or believes is right. I believe that one’s character is partially developed based on their core values. I personally embody core valuesRead MoreHigh School For The Adult Learning Environment Of A Community College Essay1249 Words   |  5 PagesDuring my junior and senior year of high school, I took a leap of faith and enrolled into the Running Start program through Clark College. This was one of the challenging decisions of my life. Running Start is a unique opportunity afforded to juniors and seniors in our state, and also a monumental challenge for any High School student who chooses to take part in the program. The challenges include leaving the rigidity and comfort of the High School for the adult learning environment of a communityRead MoreThe Importance Of Setting Goals For The United States713 Words   |  3 PagesBefore my arrival to the United States, I had been living with my aunt and uncle for about one year, that way, my parents could establish themselves in the U.S. before my sister and I arrived. A few months after I celebrated my seventh birthday, I moved from Ethiopia to the United States, so that I could be reunited with my parents. The excitement of being able to just hug my parents again eclipsed any fear I had about traveling half way across the world, away from anything I was previously familiar

Monday, December 23, 2019

Visual Management, Single Minute Exchange Of Die ( Smed )...

Introduction: In today’s world, opening or managing a company is very difficult. The Economic crisis, heavy taxation and barriers of entrance in some countries, make it more difficult. But all blame can’t be given to external factors. Most of the times the critical factors are inside the company. So what is the right way of managing a company? In this assignment I studied and analyzed three tools that can help me and are fundamental to success in this business world that is ruled by time and efficiency. The tools I selected are: Visual Management, Single Minute Exchange of Die (SMED) and Value Stream Mapping. VISUAL MANAGEMENT: In order to continuously improve and progress as an organization, people need to observe, communicate and sharing information. The visual management is a strategy that make information easier to interpret and immediately available. Is such an intuitive strategy, many people don’t even realize that they used it in their daily lives and despites this prevalent outside of work place most of organizations don’t know how to take follow advantage of it. The simplicity of visual management causes many people to overlook its usefulness. Image using a water faucet with impropriate mark handles. There is a blue handle for hot water and red handle for cold water. This will be incredibly frustrating and confusing. Societies have established the standard that the color blue indicates cold and color red indicates hot. Therefore the colors are interpreted thatShow MoreRelatedProduction Of The Automotive Industry966 Words   |  4 Pagesmanufacturing, and they define it as the elimination of waste by determining value added activities and non-value added activities. Non-value added activities consist of transportation, inventory, motion waiting, overproduction, over processing, and defects (2014). Elmoselhy has found multiple tools to be used to implement lean manufacturing. Some of these tools are: 5S, Value Stream Mapping, Single Minute Exchange Die, Kaizen, and Autonomation. This list does not include all of the possible waysRead MoreCorrelation between Cost Reduction and Manufacturing Perishable Food Reduction Item s1077 Words   |  4 PagesTechnology† barbed out â€Å"The food manufacturing industry needs improvement on various methods when it comes to production such as lean manufacturing for operational effectiveness† (Mahalik, 2010). [2] â€Å"In academia, the majority of the operations management literature focuses on the application of lean manufacturing in large discrete organizations (Moreno-Luzon, 1993). [3] Few academic articles even started to raise interests over the straightforward application of lean manufacturing in processingRead MoreLean Manufacturing And Process Improvement Essay2326 Words   |  10 Pagesusing value stream mapping in an auto-parts manufacturing unit†, Journal of advances in Management Research, Vol.10 iss 1 pp. 72-84 Submitted to: Submitted by: SardarAsif Khan Simarjot Singh Student ID : 104514634 BACKGROUND INFORMATION AND PROBLEM DESCRIPTION The given mentioned research paper basically features the implementation of process improving Lean Manufacturing methodologies especially Value Stream Mapping (VSM)Read MoreThe Performance Of A Company2640 Words   |  11 Pagesin certain types of industries and business categories. LEAN PRESENTATION Companies are attracted to the Lean practice because it focuses on continuous improvement through research, identification, eliminating waste or activities that have no value to an organization. Lean includes a set of tools and technologies for improving processes and services. It is more practical for instance, for a delivery truck driver to make his round when there is less traffic jam, to save time and fuel. The leanRead MoreImplementation of Lean Manufacturing Tools in Garment Manufacturing Process Focusing Sewing Section of Men’s Shirt17575 Words   |  71 Pagesof Men’s Shirt Naresh Paneru Master’s thesis Autumn 2011 Degree Programme in Industrial Management Oulu University of Applied Sciences Author: Title of Thesis: Naresh Paneru Implementation of lean manufacturing tools in garment manufacturing process focusing sewing section of Men’s Shirt Thesis Supervisor: Degree: Graduation Year: Number of Pages: Hannu Pà ¤Ãƒ ¤talo Degree Programme in Industrial Management Autumn, 2011 72 + 8 ABSTRACT Traditionally operated garment industries are facing problemsRead MoreSupply Chain Management Essay7333 Words   |  30 Pagesimportant consideration in corporate strategy. Expansion of activities downstream is referred to as forward integration, and expansion upstream is referred to as backward integration. The concept of vertical integration can be visualized using the value chain. Considering the fact that the tool company’s products are made using an assembly process given this, it should implement backward integrating into intermediate manufacturing or forward integrating into distribution. There are two important issues

Sunday, December 15, 2019

Mordernism Free Essays

Modernism During the 20th century a communications revolution that introduced motion pictures, radio, and television brought the world into view†and eventually into the living room. The new forms of communication competed with books as sources of amusement and enlightenment. New forms of communication and new modes of transportation made American society increasingly mobile and familiar with many more regions of the country. We will write a custom essay sample on Mordernism or any similar topic only for you Order Now Literary voices from even the remotest corners could reach a national audience. At the same time, American writers†particularly writers of fiction†began to influence world literature. The 20th century saw the emergence of modernism. Modernism responded to the world’s complexity by asserting that the individual had the potential to achieve a broader perspective than that offered by any one society or its history. Although realism, naturalism, and regionalism were still viable modes of expression, they reflected the increasingly complex reality of 20th- century society. Immigration and industrialization led to increasing urbanization, nd, in turn, to class stratification. Theme: Some writers examined the sometimes complex psychology of America’s elite, other writers turned to the psychological and physical reality of the laboring classes, whose ranks continued to swell with high rates of immigration in the late 19th and early 20th centuries. Several American authors who are sometimes known as social realists looked at working conditions, often for the purpose of social reform. A period of disillusion and cynicism that followed World War I (1914-1918) found expression in he writings of a group of Americans living in Paris who became known as the Lost Generation. They shared a bitterness about the war, a sense of rootlessness, and dissatisfaction with American society. They portrayed the emotional exhaustion of this generation and their seemingly vain search for meaning and value in life. Some other writers focus on the overwhelming forces of nature and on issues of class. Gender issues remain major topics in 21st century American literature, and more gay and lesbian authors are publishing their work and bringing their community and oncerns into focus. Characteristics 1. Diversity The reading audience of the United States changed as social and economic realities changed. Immigrant populations added great variety to 20th-century American fiction. American literature at the is exceptionally diverse, with rapidly growing multicultural influences. New voices continue to emerge within the Native American, African American, Asian American, and Hispanic American communities. After the 1960s it became increasingly difficult even to define a mainstream. Jewish-American iterature: among the first to record their experiences. African American literature: focuses on slavery and its legacies while also offering hope, particularly in the strength of bonds among women. Native American literature: reassesses the experience of their cultures. Hispanic American literature. Asian American authors brought strong voices to American literature after the 1960s. those who bridge two cultures. Modernity and Americanization are typically the realm of youth, while traditional culture and history remain the dying province of their elders. While creating unique worlds for various distinct communities, America’s diverse literary voices continue to reflect the unique characteristics of its land, people, and culture. 2. Regionalism The vastness of the United States and the great diversity of its people have always been reflected in its literature. This was especially true in the 20th century, which witnessed the blossoming of strong regional traditions in the West and the South. The South was also rich in women writers during the 20th century. 3. Bilingualism. Many American authors incorporate a lot of their mother tongue language into their writing. This reflects both the alienation and the strong cultural identity that comes from being a nonnative English speaker in the United States. 4. style Writing is noted for innovations in narrative style, such as simplification and fragmentation of plot and the use of unconventional syntax and punctuation. Representatives: Henry James Theodore Dreiser Sinclair Lewis Ernest Hemingway and F. Scott Fitzgerald, William Faulkner, How to cite Mordernism, Papers

Friday, December 6, 2019

The Pros and Cons for the Company to Go Public free essay sample

Small companies looking to further the growth of their company often use an IPO as a way to generate the capital needed to expand. Although further expansion is a benefit to the company, there are both pros and cons that arise when a company goes public. As such there is a need to evaluate the factors Starhill REIT took into consideration before issuing their IPO. The factors, that is, the advantages and disadvantages are listed and described below: PROS Less Need to Borrow According to investopedia, Public companies, those whose shares are available for purchase on stock exchanges, can fund major initiatives such as expanding into new markets and entering new product lines by issuing common stock. Capital can also be used to fund research and development, fund capital expenditure or even used to pay off existing debt. So IPO is a way for Starhill to obtain money that they do not have to repay. We will write a custom essay sample on The Pros and Cons for the Company to Go Public or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Anonymous investors who purchase the stock are not considered as lenders; they are much rather considered as the companies co-investors. Stock as Currency and Public Awareness Tool The â€Å"International Journal of Business† states that when public companies expand by issuing IPO they can use their stock in the future to acquire other businesses, they can use their own stock as part of the purchase price. This method ties the owners of the acquired entities to the buyer, in this case Starhill, and brings them on board in a meaningful way. Similarly, they can use their own stock as collateral for secured loans. Another pro is an increased public awareness of the company because IPOs often generate publicity by making their products known to a new group of potential investors, be it individuals or institutional investors the company places itself at an advantage. Stock Options After companies have undergone their initial public offering, they can use stock options in various ways: as employee stock options, which are issued as non-cash compensation for deserving employees, and to outsiders consultants, attorneys and others for services rendered. If the stock price rises, the option holders enjoy a direct benefit. Stock options are commonly used during a companys startup phase to save cash and later as part of senior executives ongoing compensation packages. Potential customers Going public is often an outward sign of credibility solid reputation and achievement as stated by investopedia. This tends to pay off not only with the investing public but also with bankers, industry participants and customers. Because a public offering will increase Starhill’s net worth, they should find it possible to borrow funds in the future on more favorable terms. Banks, which are also considered as potential investors use the companys debt-to-equity ratio as an indicator of loan risk; most bankers prefer that total debt never exceed the net worth of the company. Diversification of risk When owners of a company decide to offer IPO of their company it is also a way of diversifying the risk that they used to bare alone. New investors also take on some of the risk the company may face in the future. And current owners of the Starhill REIT may have new capital which they may use to acquire stock from other public companies to expand their portfolios and minimize their risk.

Friday, November 29, 2019

Asian Emigration Patterns, Similarities, and Perspectives essays

Asian Emigration Patterns, Similarities, and Perspectives essays Meantime, the first pattern of arrivals of Asians to America - in any significant numbers - were the Chinese, in who were pushed out of their homeland but also drawn to the opportunities for employment in Hawaii, the American West, and British Columbia. There were also Korean, Filipino and Japanese immigrants who followed a second pattern, which was bolstered by a vigorous recruitment effort on the part of sugar plantation owners in Hawaii. The cultivation of sugar was a growth industry in Hawaii, and workers were needed, and were welcomed from those three Asian nations. The third pattern of Asian immigrants mentioned by the author was groups of "Asian Indians" (people from the northwestern region of India) who purchased passage to Canada and the Pacific Coast of America. These three patterns of immigration into the U.S. and Canada, by Asians from five different nations were only a small part of a much larger "global phenomenon" occurring in this time period - and the author describes it thoroughly on page 4. "The capitalist form of production, under which goods are produced for sale in order to make the largest profit possible and workers receive wages for selling their labor," appeared first in England, then elsewhere in Western Europe, and then in the United States. Workers were moved across "national boundaries to enable entrepreneurs to exploit natural resources in more and more parts of the world," Chan continues. The colonial governments such as England, in many cases, were not hesitant to bring in workers from the far corners of the globe when the indigenous populations in those conquered colonies could not provide a sufficient workforce for the exploitation of the natural resources in those colonies. That was a large part of the global phenomenon of workers moving from place to place - beyond the basic emigration which was already taking place...

Monday, November 25, 2019

Degration of Women essays

Degration of Women essays Since the beginning of civilization, homosexual relationships have been looked down upon and condemned. The infamous story of Sodom and Gomorrah, which is taken from The Holy Bible, gives a detailed account of Gods own intolerance of homosexuality. But, as time moves on and the attitudes of the masses change, we find ourselves moving towards a society that seemingly tolerates actions that were once seen as abominable. The blatant use of sexuality as an advertisement tool, the insurgence of talk shows such as The Jerry Springer Show, and a music industry that routinely sells materials that degrade women and advocate the use of recreational drugs seem to be the calling cards of modern society. Over the years, the United States Armed Forces has made a conscious effort to maintain a sense of morality and discipline in an ever-changing world. We are an institution of proud men and women who have volunteered our lives to the nations defense. We have the awesome task of not only accomplishing a wartime mission, but, living together in tense, limited facilities that do not always accommodate ones need for comfort and convenience. After saying all of these things about the military, as I know it to be, I have to give careful consideration to the topic of this essay. When the armed forces oppose openly homosexual service members, what are we opposed to? In 1999, Senator Bill Bradley and former Vice President Al Gore expected members of the Joint Chiefs of Staff to let homosexuals openly serve in the military. What they received was a backlash of military leadership that opposed the changes due to fears that unit cohesion would decay throughout the armed forces. However, living in a more tolerant society would eventually usher in the Dont ask, dont tell policy. The Army Command Policy (Army Regulation 600-20) allows homosexuals to serve in the military under the con ...

Thursday, November 21, 2019

Doing Business in Martinique Essay Example | Topics and Well Written Essays - 1000 words

Doing Business in Martinique - Essay Example Under the CARIFORUM-EPA agreement countries like Jamaica that are English speaking Caribbean countries have the opportunity to carry out trade in goods and services with the French overseas territories like Martinique as well as other countries like French Guiana and Guadeloupe. Doing business in Martinique can be a good opportunity for the investors due to the cultural, economic, social and political factors that favor the development of business in Martinique. For instance, the main exports from Jamaica to the Martinique are food products like shrimps, lobsters, and crustaceans. Therefore, there remains room for the diversification of the goods and the expansion of the services. France is the main trading partner with Martinique but still there remains a vast untapped opportunity for Martinique due to the relatively lower prices. If an investor is considering entering in the service sector (service exporters), he or she should take a keen interest in a multitude of factors such as language, and the entry requirements. However, in terms of the entry requirements, they are similar to those of France especially when you are considering the service sector (businessmonitor.com, n.d.). For instance, Sam Kruiner, an Advisor at the Caribbean Export Development Agency (CEDA) during a presentation shared the information on support of CEDA, which has encouraged investors and countries to trade in Martinique. The agency carries activities such as workshops, seminars and studies and the development of the Creative Industries and Sports Tourism in collaboration with Martinique in order to promote business (Worldtravelguide.net, n.d.). The national currency of Martinique is Euros and its balance of payments as at 2006, exports US$ 818 million and imports US$ 3,483 million. The agriculture contributes 6%, services 72% and industry 15%. The inflation rate as of 2005 was 2.4%. Martinique’s economy is characterized by chronic balance

Wednesday, November 20, 2019

Pathophysiology of Late Onset Alzheimer's Disease Research Paper

Pathophysiology of Late Onset Alzheimer's Disease - Research Paper Example Alzheimer’s is normally classified into three different groups; Early onset, Late onset and familial. This paper analyses the dimensions of late onset Alzheimer’s. Pathophysiology of "Late Onset" Alzheimer's Disease It is estimated that more than 4.5 million people in America alone experiencing Alzheimer’s currently. Doraiswamy et al, (2009) have mentioned that Alzheimer’s can occur even at the age of forties or fifties (Doraiswamy et al, 2009, xvii). However, about 90% of the Alzheimer’s disease patients are victims of "Late Onset" Alzheimer's. Alzheimer's victims of more than 65 years of age are normally included in the category of Late Onset" Alzheimer's. Only 10% of Alzheimer's victims are below the age of 65. Normally people below the age of 65 suffers Alzheimer’s because of Down syndrome. This type of Alzheimer’s is known as Early onset Alzheimer’s. On the other hand, "Late Onset" Alzheimer's disease is caused by hereditar y and environmental factors. A third type of Alzheimer’s is known as Familial Alzheimer's disease (FAD). In the case of FAD patients, the disease is caused by family history or hereditary. ... It has the ability to recollect everything in the distant memory while facing problems in recollecting information stored in the recent memory. Bonda et al. (2010) pointed out the imbalances between mitochondrial fission and fusion of cell proliferation as the reason for Alzheimer’s. â€Å"Specifically, the dynamic balance of fission and fusion in AD is greatly shifted toward fission, and, as a result, affected neurons contain abnormal mitochondria that are unable to meet the metabolic demands of the cell†(p.181). It should be noted that fission is the process of breaking of cells whereas fusion is the process of combining cells. Both fission and fusion are necessary body mechanisms to maintain good memory. However, in the case of patients with Alzheimer’s fission mechanism occurs more while fusion mechanism occurs less. As a result of that cell proliferation procedures will be troubled and the communication though neurons become defective. It should be noted tha t neurons are responsible for sending instructions from the brain to different parts of body. This communication process may become defective because of the imbalances in fusion and fission. Risk Factors Advanced age is the primary risk factor for AD; risk doubles every 5 years after the age of 65. Additional risk factors include having a first-degree relative with AD; Down syndrome; head trauma; certain environmental exposures, including metals, infection, and toxins; decreased estrogen levels; and mutations in the APP, PSEN1, PSEN2, or APOE genes. Cardiovascular disease, cardiovascular risk factors (e.g., hypertension, obesity, dyslipidemia, insulin resistance), depression, and certain lifestyle choices (e.g.,

Monday, November 18, 2019

Research the negatives of Charter schools in LAUSD school system Paper

The negatives of Charter schools in LAUSD school system - Research Paper Example It is located in board district 1, local district 3, South Burnside Avenue, at 5100 Wilshire BLVD, in Los Angeles, CA. it serves approximately 300 students in grade 6-8. Charter schools have brought about criticism in education system especially in Los Angeles. The race of schools to provide quality education and maintain a position at the top has increased the support for charter schools in Los Angeles (Jack Buckley 3). The current struggle seen between LAUSD school board and union over charter schools represents the thirst for quality and top position. The quality of schools in Los Angeles is very low. They do o respond to the educational needs of the Los Angeles community. This observation clearly shows that something has to be done to bring a desired change. Despite the fact, that t it is clear that schools in Los Angeles need radical change, charter schools are not the answer for the required change (Jack Buckley 3). Charter schools have been criticized for not meeting the requi rements of the change required to solve the problem of low quality education in Los Angeles. Critics state that charter schools provide the best in terms of educational performance but still ignore important aspects of the society. The problem about charter schools started at the same time that charter schools began (Whitney 194). ... For instance, in a report compiled by UCLA civil rights project in 2003, Gary Orfield noted that people had an early concern with regard to the ability of charter schools to represent the minority (Whitney 95). They were concerned that charter schools would admit white students as they would escape diverse public schools. Others noted that charter schools would compromise public schools further to offer poor education to those who would not afford to pay for charter schools. In addition, this would result to discrimination of students based on the schools they occupy and consequently their social class in society (Whitney 195). Other people criticized charter schools stating that they are more business oriented than education oriented because they get their funding from a variety of sources that includes private investment. Private firms are allowed to fund Charter schools and can get profits when these schools perform. The schools are managed for profit. However, when charter school s fail to realize its target private investors leave for other business viable places. This means that the schools are closed thereby depriving students a right to continuous education (Jack Buckley 43). Therefore, some argued that the schools would promote profit-making ideals as opposed to educating children. Others argued that the profit would assist those schools achieve success. The government as well as private investors fund charter schools. They are funded through the federal categorical funding. They are opposed by teacher unions, antiracial groups and activists, private researchers and parents and students who favor public school system(Jack Buckley 43). According to Grading the Chartering Organizations, 2003, most states had a few resources for oversight

Saturday, November 16, 2019

Analysis of Treatment Options for Depression

Analysis of Treatment Options for Depression Cognitive Therapy Donna Thompson An accruing relapse of depression is hard to overcome nevertheless; preventing these relapses is the key. The length of depression constitutes a major problem in the treatment of depression. The aim of any treatment is to lessen relapses and the recurrence of depression in patients. All patterns are different and the level in mental codes that are used in the treatment of depression Antidepressant medications (ADMS) are a common form of treatment for major depression. However, not all individuals want to take medications since the side effects could be lethal or unwanted. There have been other studies for treatment such as; BA (Behavioral Activation) treatment. Depression can lead to suicide and the feeling of hopelessness that lays dormant in people who attempt suicide. Cognitive therapy has a few sessions that target suicide tendencies due to Cognitive therapy targets the key reasons. Clinical practice concentrates on group therapy and the format is recommended to help people with depression. Group methods can be seen as evidences as implementing an intervention. Literature Review Brown, G. K. (2005) discovered that treatments that prevent the repeat of suicide attempts is limited. The research is based on randomized trials that concentrates on treatment differences between medications and therapy. DeRubeis et al (2005) found that experienced therapist could be as effective as medications. The research was done at top universities and clinics such as: University of Pennsylvania, Vanderbilt University and more. The research used a controlled placebo trial target at the similarities of cognitive therapy. Dimidjian et al (2006) researched AMD (antidepressant medication) against cognitive therapy. There is very little study and cognitive therapy has not been proven to help. The research was based on the testing of cognitive therapy against the AMD. The research founded that with experience cognitive therapy helped more than the medication. Scope et al (2013) research is based on cognitive therapy evidence in helping PND (postnatal depression) victims. This study compared one on one therapy against group therapy and suggested an intervention in the current standards. The research reviewed the evidence scientifically. Teasdale et al (1995) research was based on the theory that relapses of depression can be reduced by cognitive therapy during the main treatment. An information analysis was used to weigh the effectiveness of the primary therapy. The research concluded that similar effects of cognitive therapy can be used in other mental disorders using meditation techniques. The Interaction to Cognitive Therapy (ICS) Study An accruing relapse of depression is hard to overcome nevertheless; preventing these relapses is the key. The length of depression constitutes a major problem in the treatment of depression. However, many evidences suggest that psychological treatments have been withdrawn to the many treatment trials that have been found in cognitive therapy such as drugs or different types of therapy that defends against depression. â€Å"The preventive interventions such as the drugs operate through effects in changing the patterns of the cognitive processing that becomes active in mild negative side effects† (Teasdale, Segal, Williams, 1995, p.25). The aim of any treatment is to lessen relapses and the recurrence of depression in patients. Therefore, the interaction to cognitive subsystems (ICS). ICS works through information that may be developed for cognitive therapy. The different aspects and experiences are represented in patterns that are qualitatively different to ICS. Different inflections and patterns seem different. Many analogies, recurring patterns are common to visual inputs from similar objects and what objects are different. All patterns are different and the level in mental codes that are used in the treatment of depression. A research done by Teasdale, et al (1995) found that the level of study denotes a concerned meaning that can be demonstrated by the similarities between a poem and a sentence (p.26). Information processing involves the transformation of patterns in one information code into patterns. Depression shows that emotional reactions occur when emotion relates to schematic models that are produced from patterns of lower level meanings and patterns that show production of depression and emotional responses. The main effect is to help control the relapse of depression. In addition, â€Å"The insight to sounds and physical sensations depends on implicated schematic models, creating propositional outputs (specific meanings) that are extreme to derive information from current sensory input† (Teasdale, Segal, Williams, 1995, p.36). Antidepressant Treatment Study Antidepressant medications (ADMS) are a common form of treatment for major depression. However, not all individuals want to take medications since the side effects could be lethal or unwanted. However, there have been other studies for treatment such as; BA (Behavioral Activation) treatment. Dimidjian et al., (2006), conducted a study that had 258 people involved and came to a census of depression stresses the affiliation between action and attitude conditions that play a role of relative changes that are linked with reduced access to support antidepressant conditions (p.660). The study indicated that BA was comparable to ADM. In the future the standard targeting avoidance behaviors will be in accordance with an earlier behavioral theory that may be an important to innovation on depression. Addressing treatments for depression has not emphasized targeting avoidances, with the exception of the use of opposite action for sadness within dialectical behavior therapy and early investigations of acceptance and commitment therapy with depressed patients. Cognitive Therapy vs Medications Antidepressant medications may treat depression. DeRubeis et al (2005) research was conducted across five universities that included 240 outpatients. He used The Hamilton Rating Scale for Depression (HRSD), in which is a several item survey used to warn of depression, and it is used as a controller to evaluate the recovery of depression. This provided endless scores that permitted for descriptions of remission. DeRubeis et al (2005) concluded that knowledge levels of the cognitive therapists seem to have subsidized the communication. Hence, cognitive therapy can be as effective as the drugs for the primary treatment of severe depression. Nonetheless, this degree of success may depend on a higher level of therapist that has experience or expertise in treating depression (p.409). Suicide Cognitive Therapy Study Depression can lead to suicide and the feeling of hopelessness lays dormant in people who attempt suicide. Cognitive therapy has a few sessions that target suicide tendencies due to most of Cognitive therapy tries to target the key reasons such as depression or the feeling of hopelessness. Brown did a study in 2005 and the objective of the study is to test a 10-session therapy. Throughout this study many relapsed, some were watching closer than others and some had many sessions. â€Å"The severity of depression as measured by the Beck Depression Inventory was significantly lower for the cognitive therapy group than for the usual care group† (Brown, 2005, p. 565). The participants was broken into two groups a cognitive therapy group and a care group. The study proved that overall the cognitive therapy group had less depression and hopelessness than the care group in lesser time. Brown (2005) research concluded that â€Å"the cognitive therapy group also had significantly less hopeless than the usual care group. The severity of self-reported depression was significantly lower for the cognitive therapy group than for the usual care group† (p. 569). Psychological Therapies Study Clinical practice concentrates on group therapy and the format is recommended to help people with depression. Group methods can be seen as evidences as implementing an intervention. â€Å"Many selected studies were quality assessed, using Cochrane risk of bias tools that were data extracted by two reviews using a standardized data† (Scope et al., 2013, p.3). The method was a synthesized effect that was an inverse and variance method. The results of Meta analyses showed groups to (CBT). The current national institute for health and clinical excellence (NICE) showed that clinical guidelines was intended for postnatal mental health. The outline that is recommended is to identify and treat women with psychological interventions such as undivided cognitive behavioral therapy or interpersonal therapy (IPT) for women with (PND). In any future studies that may be beneficial is a psychological intervention because it is useful for treatments that may meet the requirements of evidence based practice to (EBP) if it is applied. Conclusion The length of depression constitutes a major problem in the treatment of depression. However, many evidences suggest that psychological treatments have been withdrawn to the many treatment trials that have been found in cognitive therapy such as drugs or different types of therapy that defends against depression. Depression shows that emotional reactions occur when emotion relates to schematic models that are produced from patterns of lower level meanings and patterns that show production of depression and emotional responses. The main effect is to help control the relapse of depression. DeRubeis (2005) concluded that knowledge levels of the cognitive therapists seem to have subsidized the communication. Hence, cognitive therapy can be as effective as the drugs for the primary treatment of severe depression or other mental problems. Nonetheless, this degree of success may depend on a higher level of therapist that has experience or expertise in treating depression (p.409). An accruing relapse of depression is hard to overcome nevertheless; preventing these relapses is the key. The length of depression constitutes a major problem in the treatment of depression. The aim of any treatment is to lessen relapses and the recurrence of depression in patients. References Brown,G.K. (2005). Cognitive Therapy for the Prevention of Suicide Attempts: A Randomized Controlled Trial.Jama-journal of The American Medical Association,294(5), 563-570. doi:10.1001/jama.294.5.563 Retrieved from: http://www.behavioralhealth-ctx.org/resources/Suicide_Prevention.pdf DeRubeis,R.J., Hollon,S.D., Amsterdam,J.D., Shelton,R.C., Young,P.R., Salomon,R.M., . . . Gallop,R. (2005). Cognitive Therapy vs Medications in the Treatment of Moderate to Severe Depression.Archives of General Psychiatry,62(4), 409-416. doi:10.1001/archpsyc.62.4.409 Retrieved from: http://archpsyc.jamanetwork.com/article.aspx?articleid=208460 Dimidjian,S., Hollon,S.D., Dobson,K.S., Schmaling,K.B., Kohlenberg,R.J., Addis,M.E., . . . Jacobson,N.S. (2006). Randomized Trial of Behavioral Activation, Cognitive Therapy, and Antidepressant Medication in the Acute Treatment of Adults With Major Depression.Journal of Consulting and Clinical Psychology,74(4), 658-670. doi:10.1037/0022-006X.74.4.658 Retrieved from http://ww.abnormalwootwoot.com/Cool_Abnormal_Reads_Videos_ETC._files/Dimidjia n%202006-Randomized%20Trial%20of%20Behavioral%20Activation_1.pdf Scope,A., Leaviss,J., Kaltenhaler,E., Parry,G., Sutcliffe,P., Bradburn,M., Cantell,A. (2013). Is group cognitive behavior therapy for postnatal depression evidence based practice? A systematic review.BMC Psychiatry,13(1), 1-19. doi:10.1186/1471-244x-13-321 Retrieved from: https://eds-b-ebscohost- com.libroxy.chapman.edu/ehost/detail/detail?vid=8sid=143e2edd-dfaa-4ad4-88aa- 90d630d4673d%40sessionmgr110hid=113bdata=JkF1dGhUeXBlPWlwLHVpZCxjb 29raWUsdXJsJnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=aphAN=92802416 Teasdale,J.D., Segal,Z., Williams,J.M. (1995). How does cognitive therapy prevent depressive relapse and why should attentional control (mindfulness) training help?Behaviour Research and Therapy,33(1), 25-39. doi:10.1016/0005-7967(94)E0011-7 Retrieved from: http://oxfordmindfulness.org/wp-content/uploads/Teasdale-Segal-and- Williams-1995.pdf

Wednesday, November 13, 2019

The Garden Of Love Essays -- essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Julia McDonald   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  ENGL 102H/Ellzey   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Poetry Interpretation â€Å"The Garden of Love†   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"The Garden of Love† is, quite obviously, a poem about life and the pursuit of happiness. It is also about the effects that negativity can have on love. Blake uses religion to convey the idea that negativity â€Å"†¦pervades and corrupts all life†(51 n.9), further supporting it with his use of rhyme scheme and imagery. In searching for love people often times emerge scarred and hostile from their fruitless efforts. Some continue to have faith in the idea of love and its possibilities, others do not. These folk sometimes seek refuge from their pain in a variety of houses. It is just as often that these refugees project their negative attitudes onto others that search for love and happiness. People who fear love can prevent others from finding it, because they change the positive surroundings to suit their negative world.   Ã‚  Ã‚  Ã‚  Ã‚  The conflict between organized religion and the individual is the constant idea throughout the poem. Blake, himself, despised the Church, as an institution rather than an idea, and used religious symbols to show how structured religion can destroy the lover and creator within. A chapel has been built, perverting a once pure and loving environment. In inspecting the chapel, the persona feels only negativity from a religious house, as the gates are shut â€Å"And Thou shalt not writ over the door†(6). Not only has man and machine invaded this place once full of life, but they have also brought with them negative comm... ...laws and motions that love does not. In â€Å"The Garden of Love,† the church expects the natural act and emotion of love to follow these motions, which is entirely unnatural, just as it is unnatural to be celibate and deny emotion for another human being. â€Å"The result is no less cruel-the banishment of daylight love for nighttime deceit, the repression and perversion of the young into the gray and palsied sufferings of the old†(Hagstrum 531). The negative and confining nature of the Church and celibacy prevent the young, positive nature of love from existing and exploring. â€Å"The Garden of Love† is a true testament to how easily negative energy and negative surroundings can wound and infect a positive environment. Negativity spreads like a disease, disrupting the easy and natural optimistic heart. Blake conveys this point with the convenient use of a confining institution such as the Church, which he further supports with a fine use of imagery and an effective incomplete rhyme scheme and voice. He quite easily showed that the negativity others accept through their life experiences end up robbing others of their innocence, as they choose not to process their emotions, but dwell in them.

Monday, November 11, 2019

Motivation and Job Satisfaction

In today’s hyper-competitive marketplace, understanding what fosters and forwards employee motivation—and, thus, organizational performance—is critical. Based on theories, studies, best practices, case studies and resources about motivation, this solutions-focused research article presents valuable information for the senior HR leader seeking competitive advantage. Introduction In today’s marketplace, where companies seek a competitive edge, motivation is key for talent retention and performance. No matter the economic environment, the goal is to create a workplace that is engaging and motivating, where employees want to stay, grow and contribute their knowledge, experience and expertise. Motivation is generally defined as the psychological forces that determine the direction of a person’s level of effort, as well as a person’s persistence in the face of obstacles. The direction of a person’s behavior refers to the many possible actions that a person could engage in, while persistence refers to whether, when faced with roadblocks and obstacles, an individual keeps trying or gives up. The responsibility for motivation is three-fold: it falls on the senior leadership, the direct manager and the employee. Numerous factors are involved, from trust, engagement and values (individual and organizational) to job satisfaction, achievement, acknowledgement and rewards. Motivation is essential for working autonomously, as well as for collaboration and effective teamwork. The ultimate focus of the organization is to successfully retain talent, meet goals and go beyond expectations. It is the role of HR and organizational leaders to foster an environment for excellence. Through a foundation of research, theory, studies and practical examples, this article addresses the questions of what motivates employees, what managers need to do, and what supports motivation and, thus, performance. What Influences Motivation? Motivating employees for better performance encompasses these critical factors: employee engagement, Organizational vision and values, management acknowledgment and appreciation of work well done, and overall authenticity of leadership. Chana Anderson, CCP, SPHR-CA, director of HR and a member of the SHRM Employee Relations Special Expertise Panel, says that motivation is influenced equally by the employee and the company: â€Å"Motivation and engagement is truly a 50-50 relationship between the employee and employer. Employees are expected to come to the workplace with the intrinsic motivation and desire to be successful, be value-added and contribute to the obtainment of an employer’s vision. Conversely, it is incumbent upon the employer to provide resources, opportunities, recognition and a cohesive work environment for employees to be successful. Employee Engagement Engagement influences motivation. It is reflected in the extent to which employees commit, how hard they work and how long they stay. People join organizations for different reasons, motivated by intrinsic and extrinsic rewards. Intrinsic rewards are reflected in actions believed to be important. Examples include an employee who wants to help people by providing excellent customer service or a senior manager who gains a sense of accomplishment from overseeing a large corporation. Intrinsic outcomes include responsibility, autonomy, feelings of accomplishment and the pleasure of doing interesting work. Extrinsic-motivated behavior includes actions performed with the goal to have material or social rewards, with outcomes such as job security, benefits, vacation time and public recognition. It is the responsibility of managers to motivate employees, with the goal for employees to contribute to the organization. Managers can best motivate employees by offering rewards that are meaningful to them. Vision and Values Employees are often motivated differently. To develop a work environment that promotes motivation, organizations need to know what is important to their employees and then to emphasize these factors. In fact, some companies and researchers are beginning to look at â€Å"work spirituality†Ã¢â‚¬â€not in a religious sense, but in a sense that what an employee does aligns with his or her greater sense of life and purpose. Aside from monetary gain, work provides people with fulfillment on various levels, from earning a living and â€Å"doing good work† to aspiring to a vision and ultimately having an impact on the quality of life. These reasons can change over time in response to changes in people’s home life and responsibilities. Further, in response to drastic economic changes and natural disasters, companies can change over time as well. Management Acknowledgment and Appreciation How employees are treated is a strong determinant of employee motivation and performance. Edward E. Lawler III, author and consultant for human resource management, emphasizes that â€Å"treating people right is fundamental to creating organizational effectiveness and success. It is also easier said than done. † According to Lawler, this includes â€Å"a highly complex set of actions on the part of both organizations and employees. Organizations must develop ways to treat their employees so that they are motivated and satisfied; employees must behave in ways to help their organizations become effective and high-performing. † This winning combination for performance requires a partnership between the organization and the employees. Lawler states: â€Å"One can’t succeed without the other. To provide people with meaningful work and rewards, organizations need to be successful. And to be successful, organizations need high-performing individuals. The challenge is to design organizations that perform at high levels and treat people in ways that are rewarding and satisfying. To describe this mutually beneficial relationship, Lawler uses the term virtuous spiral, a relationship that occurs when the organization values its employees, and in return, workers are committed to high performance. Leadership and Making a Difference In today’s pressure-cooker environment, performance is carefully noted at all levels of the organization. No matter an individual’s title, everyone has the opportunity to lead in some capacity and have a positive impact on performance. Understanding the value that can be achieved through different roles is one way of providing motivation, performance and thus leadership skills. A recent article published on [email  protected], titled â€Å"Putting a Face to a Name: The Art of Motivating Employees,† emphasizes that workers have better results when they can identify with those they serve. Specifically, face-to-face interactions and task significance (â€Å"what I do makes a difference†) are key drivers for motivation and performance. Research by Adam Grant, Ph. D. , a Wharton management professor, indicates that making human connections is critical for motivation, leadership and high job performance. He found that face-to-face interactions—no matter how superficial—can lead to significant improvements in performance, and that motivation and performance increase simply by an employee’s awareness of the impact of his or her job on others. Dr. Grant has observed this result through studies of all types of jobs and roles in the workplace, from customer service representatives, managers, nurses, doctors and medical technicians to security guards, engineers, salespeople, police officers and fire fighters—based on when people can directly see the impact of their efforts. Mini Case Study In a study published in the Journal of Applied Psychology, Dr. Grant found that lifeguards at a community recreation center who read about how their ability to avoid fatalities made a difference were stronger leaders/performers. Their work improved by 40% in contrast to lifeguards who merely learned that lifeguarding can be personally enriching. Grant points out that in today’s economy, where work is often virtual without the end user physically present, â€Å"it is important for employers to build in systems that reinforce employees’ awareness of whom they are helping. 6 As HR leaders work on processes and systems designed to improve motivation and performance, it is important to be cognizant of the issue of technology and how it can create distance between employees and the end users of their work. Dr. Grant suggests that focus on the mission of the organization is one way to overcome the challenge of a virtual workplace and lack of direct interaction and is a successful strategy for creating the energy for motivation necessary to achieve high performance and quality of service. Leadership for Motivation To reach the hearts and minds of employees, leaders need to be authentic with an impelling vision. It is exceedingly important for a leader of any organization to communicate his or her vision constantly to ensure that there is no doubt about the direction a team is heading,† says Ken Blanchard, world-renowned management coach. He emphasizes: â€Å"One of the most destructive traits a leader can have today is arrogance—acting like you’ve got it together all the time. On the other hand, one of the most endearing qualities a leader can have is to be in touch with his or her vulnerability. It’s that side of a leader that keeps the vision from crumbling under the pressure of circumstance. 7 In addition, leaders need to connect the organization’s vision and values to the employees’ day-to-day work and help them see how the work they do every day connects to the bigger picture. The 2009 study Best Companies for Leadership conducted by Bloomberg BusinessWeek. com and the Hay Group reveals that leading companies were focused on leadership even during the recent economic downtown. This annual study ranks the best companies for leadership and examines how they develop leaders. The 2009 study found a shift in what the top 20 leading organizations value regarding leadership. Specifically, the most valued qualities in leaders are strategic thinking and inspiring leadership. In a press release, John Larrere, national director of Hay Group’s Leadership and Talent Practice, and co-leader of the Best Companies for Leadership Study, stated: â€Å"For organizations to succeed, they will need to understand what key leadership elements are paramount in driving their organizations toward growth. It’s more than just getting people to produce the right outcomes. It’s about getting them to be passionate about their work and grooming them to handle the challenges ahead. The Best Companies for Leadership have figured this out. According to this study, companies are now focusing their efforts on positioning for the future. To do so, 94% of the best companies have leadership development programs to enable employees to deliver on goals/strategies, 90% provide all employees with the opportunity to develop and practice the capabilities needed to lead others, and 87% have a sufficient number of internal candidates ready to assume open leadership positions. In fact, 94% of the best companies actively manage a pool of successors for mission-critical roles, 83% invest a great deal in their people, and 80% promote growth opportunities. In addition, 95% use corporate social responsibility to recruit employees, 66% have a high proportion of women in senior leadership, 91% make it easy for people to work from home, and 91% have an appreciation of global issues as a key job requirement. Finally, the best companies for leadership focus on employee engagement through commitment and discretionary effort and on employee enablement, with optimized roles and a supportive environment, leading to financial success, customer satisfaction and employee performance—all to drive organizational performance. In today’s economy, leaders need to be mindful of economic pressures when looking for ways to motivate employees. Some organizations find cost-effective ways to provide opportunities through â€Å"developmental assignments,† where people can grow their skills in other areas to be ready for promotions when they may occur. A good manager will take the time to consider ways to motivate employees, whether performance levels are good or need improvement. For the leader, it is beneficial to take a step back and consider, on a personal level, what is motivating oneself. Important questions to ask are: 1) what are your own values; 2) what keeps you motivated; 3) how are your own engagement levels; 4) are you committed to the values of your company; and 5) do you take pride in your work and in your organization? By taking the time to examine these questions and thoughtfully answer them, a leader can gain a refreshed and even enlightened viewpoint to perform better—both for him/herself and for his or her staff—and be able to better optimize for improvement. By identifying three areas that need most attention, for example, a leader can develop a plan and put it into action. Employees need to have acknowledgment and respect and know that their contributions are valued. It cannot be stressed enough how demotivating it can be when managers do not recognize, acknowledge or appreciate employees and their hard work. Two strategies that can help motivate employees are 1) to provide training (including current job, new technologies and the ability to keep up with changes in the employees’ areas of expertise) and 2) promotional opportunities (promote from within). Positive and supportive leadership clearly makes the difference for an engaged and motivated workforce. In an interview with Hospitals and Health Networks, Jo Manion, R. N. , Ph. D. , points to the bottom line for hospital and patient care, as outlined in her book, The Engaged Workforce: Proven Strategies to Build a Positive Health Care Workforce. 12 Since excellent health care is critical for everyone at different points in life, employee motivation that results in excellent patient care is one example of motivation that all can relate to on personal and professional levels.

Saturday, November 9, 2019

The Randle Report essays

The Randle Report essays The Randle Report, by Kevin D. Randle explores UFO research in the1990's. In reading his book I have gained much knowledge of how to determine whether information submitted as proof of extraterrestrial existence is valid or bogus, and the truth (from a scientificstandpoint) about several famous unidentified phenomenoms. Much information is submitted to substantiate extraterrestrial existence. This information comes in many forms but the most common are: video, photography, and sworn testimony. Once this information is introduced UFO researchers have to test the authenticity of the information. In 1995 aman named Ray Santilli claimed to have authentic footage of the allegedRoswell alien autopsy. Although it was very interesting, it was most definitly a hoax. This conclusion came after the data from many tests (performed by unbiased scientists and experts in their respected fields) showed that many things in the film and the actual film did not correlateas they should have. In the film there were instruments that hadnt been invented yet and the film was unlike any from that time period. We as humans have always had a facination with visual displays. In 1987 Ed Walters produced several polaroid photographs, several of which were published in several national newspapers and magazines. Once again these photographs were very appealing to the American public but were proved to be not generic either. Mr. Walters was not only unable to recreate his photographs but after he moved from the residence where he claimed to have taken the photographs at the next tennant to reside in that home found a model of a flying saucer that seems to be the same one that appeared ...

Wednesday, November 6, 2019

Lessons of a Mother essays

Lessons of a Mother essays A mother is something that gives rise to or exercises protective care over something else. (Webster's Universal College Dictionary; 1997) A mother is not only the borer of a child but she is someone who takes care of someone else. In the story "The Night Santa Claus Came" by Benjamin Capps, Mama plays the perfect role of a mother. The role that she fulfills is love. Mama is described by her seven year old son as being ancient, thirty-something. Mama is a school teacher who teaches seventeen students of all different ages in the old schoolhouse in Anarene, Texas. Mama was the school sweeper as well and her son describes her as being rich with her one hundred dollars a month. Mama had a way with words with her students. "She could look at a big boy and say, 'I thought you were older and more responsible than that,' and he would start blushing and stammering", explained her son. Mama decided to teach her sons a lesson so she gave them each fifty cents around Christmas time and took them to the nickel and dime store so they could buy each other a Christmas present. She reminded them, "It's better to give than to receive." Roy, the youngest of her three children, immediately spent his fifty cents on himself. On Christmas morning, Roy was very upset that he did not have anything to give his mother for Christmas. Mama decided to give him a nickel so he could buy her something. On Christmas night, Roy wanted to hang up his stockings so Santa Claus would come fill them with candy. His brothers, knowing that there was no Santa Claus and not wanting to cause any trouble for their mother, told Roy that this was a bad idea. The next morning the two boys woke up to a shrilling Roy who had found his treasures in his stockings. Angry, his two brothers climbed out of bed. These two boys were confused and jealous because their mother had not surprised them by acting like Santa Claus. Eventually Mama instructed ...

Monday, November 4, 2019

The Nature and Effects of the Emergence of 'Globalisation' as a Essay

The Nature and Effects of the Emergence of 'Globalisation' as a Feature of the World Economy over the Last 30 Years - Essay Example So what does globalization really mean to the overall world economies in general and what are the real reasons for the increased expansion and global integration of the financial and the general goods and service markets? The concept of globalization is not a new one, with individuals, from scholars, politicians and economists having different viewpoints as to the reasons for globalization as well as the positive and negative consequences of increased economic and industrial integration. Even during the 1960’s and 70’s multinational corporations started to shift their long term operational focus from a domestic to a global operational infrastructure (Colander, 2002).The were a lot of reasons that contributed to the paradigm shift that help drive the globalization of our manufacturing and service infrastructures as well as our financial and monetary systems. Advances in transportation methods such as cheaper air transport made it economically feasible for corporations to transport goods quite quickly and affordably. Starting in the 1980’s, the personal computer has created a revolution in the way business and individuals interact with each other and it has provided cheaper data processing and storage costs. It has increased worker productivity and operational efficiency for all businesses in general. Coupled with the advent of the internet the computer with its inherent functionality of quickly being able to share technical information, ideas and the ability for a team of individuals to be able to cooperate and share information, solutions and ideas seamlessly from different corners of the world has simply revolutionized the way we do business, especially with the wider availability of broadband services starting in the 1990’s (Emilian, Marcel, Hurduzeu, Vlad, 2011). The computer age, technological and communication advances have allowed multinational corporations and nations to expand their economies to more easily integrate themselv es to the global trade and financial markets therefore benefiting from increased economic prosperity for many previously underdeveloped economies. The increased trade has allowed unprecedented levels of economic growth for many of the countries that have successfully positioned themselves in the global arena (Imf, 2008). The ability for a company to choose to operate out of any country is a very important aspect of globalization, where an organization can choose among many nations to source its materials, manufacturing and headquarters and therefore has shifted the industrial operational structure towards one driven by efficiency and profitability instead of national barriers. The nullification of previous import tariffs and general protectionism previously played by many countries has played an important part in the globalization of economic trade by decreasing the amount of tariffs and other obstacles in the international trade of goods and services. It has become a driving factor in the advent of economic and financial globalization. The minimization of trade barriers was created with the idea of optimizing trade, financial flows and providing the maximum level of opportunity for economic benefits to the participating corporations and international economies in a bid to drive a general economic shift to a more fully integrated globalize trade

Saturday, November 2, 2019

Racial disparity Research Paper Example | Topics and Well Written Essays - 1000 words

Racial disparity - Research Paper Example This paper shall discuss the racial disparities in health in the United States. It shall discuss what researchers have found as causes for such disparities. This paper is being carried out in order to establish a clear and comprehensive discussion of the subject matter and to establish reasons for the existence of the phenomenon. Discussion The racial disparities in the United States in relation to health are considered significant. For one, the current death rate for blacks registers at about 100,000 blacks dying each year (Levine, et.al., 2001). The different diseases or health issues as well as causes for mortality shall be specifically discussed by this paper. Death rates for coronary heart disease have registered at a higher rate for blacks as compared to whites, with about 30% of blacks more likely to die from the disease. Cancers now register at a higher rate for blacks as compared to whites. Cancer death rates have also been higher for blacks as compared to whites with lung a nd ovarian cancer increasing for both blacks and whites, and colorectal, breast, and prostate cancer increasing among blacks and remaining stable for whites (Piffath, et.al., 2001). The various causes for such racial disparity shall be assessed in terms of socioeconomic status, residential conditions, and medical care. Socioeconomic status is a definite predictor of health with those in the lower classes likely to experience more illnesses and higher rates of death. Such health status is also influenced by race with those in the minority races likely to experience lower economic conditions and consequently compromised health status (Williams and Jackson, 2005). Education is also a factor in racial disparities in health. The homicide rates among African-American males not having completed high school registers at a rate five times higher as compared to black males having completed college. Moreover, there is also a â€Å"ninefold difference in homicide rates by education for white m ales, a fourfold difference for black females, and a sixfold difference for white females† (Williams and Jackson, 2005). The rate for homicides among African-American males with higher education is eleven times higher than their white counterparts. Income disparities also impact on racial differences in health, especially in terms of coronary heart disease and cancer mortality (Williams and Jackson, 2005). Studies claim that death rates for these two diseases are higher among low income blacks and whites as compared to those in the middle class (Williams and Jackson, 2005). Moreover, blacks also have higher rates of mortality from heart diseases as compared to whites. In the low and middle income female blacks, they incur higher rates of mortality for heart diseases as compared to the white low and middle income white females (Williams and Jackson, 2005). The above picture portrays a clear racial disparity in the health care system of the United States. This disparity is large ly disadvantageous for African-American men and women who mostly belong to the lower income group who are often uninsured and who do not have as much access to health care as their higher income and their white counterparts. Some analysts claim that the cause of racial discrimination may be credited to residential segregation and neighborhood quality (Williams and Collins, 2001). Segregation has caused the middle-class African-Americans to reside

Thursday, October 31, 2019

Assignment 4 Essay Example | Topics and Well Written Essays - 500 words - 1

Assignment 4 - Essay Example Sign in to get into the classroom†. The student enters a login and selects an option from a drop down menu containing a list of subjects. Welcome to the year 2020, where students from all over the world take lessons together thanks to Internet. With new advancements in hypermedia and multimedia systems, students now can take lessons at their chosen time in a virtual classroom. They no longer need a teacher to take them through lessons as they learn independently, at their own pace, with technological assistance. Taking on the role of a trouble-shooter, a teacher steps in only when students encounter difficulties with a particular aspect of study. A learning activity in 2020 could very well be like this: A student clicks open a textbook and learn concepts through a variety of text, visual images and graphics. At the end of the chapter, a voice takes the student through a quick test, which has been designed by the teacher. The test will evaluate the student’s understanding and accordingly mark grades. In case of below-average grades, a link will direct the student to a â€Å"real† teacher who will then explain the concept through video conferencing. Thus a teacher operates behind the scenes and designs strategies instead of being a direct participant in the learning process. In such a scenario, advanced forms of Internet and the virtual reality systems form the dominating aspects in a learning process. The use of hypermedia and multimedia in project assignments will motivate students to study better and faster. Teachers, on the other hand, can keep a track of student’s progress by designing rubrics and other evaluation strategies. In a system where learning is more student-centric and students have the freedom to choose their subjects and pace, an assumption is made here that they are well equipped with the intelligence and the maturity to monitor their studies. This can be a hindrance in case of children with low levels of

Tuesday, October 29, 2019

Challenges Doing Business in India Essay Example for Free

Challenges Doing Business in India Essay Trade barriers are created to encourage domestic players by making it more difficult for foreign firms to compete. Traditionally, India has had several types of trade hurdles for foreign exporters, such as, Import Quotas, Subsidies, Trade Samples and Tariff/Duty. The most critical barrier to trade is tariffs or the tax imposed on imports. High tariffs in several sectors continue to bar foreign businesses from increased market access. Red-tapism and Corruption Traditionally, Indian bureaucracy has been mired in red tape which proved to be a frustrating experience for foreign investors. These include limited access to Government offices, cumbersome and multitude paperwork, lack of coordination between various departments processing the documentation, long waiting period for approvals, and above all ambiguous rules. However, with the economic reforms of early 1990s, the level of bureaucratic hurdles which the MNCs had to overcome, gradually reduced making it easier to do business. Corruption is another big hurdle when doing business in India. Areas like electricity supply, judiciary (particularly lower courts), Police, land administration are counted in the most corrupt category. Since all these are essential in building up a business, corruption proves to be a major hurdle for starting business in India. Inadequate Infrastructure It has long been felt that roads and communication in India need substantial investment in order to make them world class. Problems with the countrys education and power situation are also counted amongst the toughest obstacles for doing business. Today, there is an increased private participation in ports, roads and other key sectors. Infrastructure development has emerged as a niche market for foreign investors in India with several states looking to build world class infrastructure. The problem area is the absence of a clear-cut policy framework, which has hampered private investment in the infrastructure sector.

Sunday, October 27, 2019

Characteristics of Java Language

Characteristics of Java Language Chapter 2 Literature review About Java:- Initially java language is named as Oak in 1991, which is designed for the consumer electronic appliances. Later in 1995 the name was changed to Java. Java was developed by James Gosling, a development leader in sun micro system. Oak was redesigned in 1995 and changed the name to java for the development of the applications which can be run over internet. Using the java language, java programs can be embedded in to the html pages. Java is not only limited for the web applications, it is also useful to develop the stand alone applications. Java has a feature called OOPs, which make it more familiar. Object oriented programming replaced the old traditional techniques i.e. procedural programming. Characteristics of java:- Simple:- Java language is simple than the previous languages such as c and c++. Java eliminates the pointers concept which is earlier present in c and c++. Java also has a properties i.e. automatic allocation of memory and garbage collection, where as in c/c++ the garbage collection and allocation of memory will be done by the programmer which is a complex task. Object oriented:- All the programming languages apart from the c++ are procedural languages which are paradigm of procedures. Java programming language is object oriented because java uses the concept of the object. In java everything will depend on objects i.e. creating the objects and making objects to work together. The overall functionality of the high level program will depends on the objects. Because java is object oriented program it provides great range of reusability, modularity and flexibility. Distributed:- Java uses the http and ftp which are internet protocols, in order to have access the files over the network. So by using this libraries which are in java can easily make file transfers over the network which is connected to internet. Interpreted:- In order to run the java programs we need interpreter. When the java programs are compiled it produces the byte code, which is machine understandable language. The byte code which is produced after the compilation is machine independent, so that it can run on any system using java interpreter. Most of the compilers will convert the high level language instructions to the low-level machine understandable language as machine cant understand the high level instruction. The machine code can only be executed on that compiled native machine. For example a source code is compile on windows platform, the executable file produced after cant be executed on other platforms apart from the windows. But, coming to java it is different i.e. the source code is compiled once and the executable byte code can be run on any platform using java interpreter. The main functionality of the interpreter is, it converts the byte code to the machine language of the target machine. Robust and secure:- Java programming is more reliable. At the time of the execution time java shows all the errors. In java bad and error prone language constructs are eliminated. Java eliminated the concepts such as pointers, due to this there is no corruption of data and overwriting the memory locations. In the same way java supports the exception-handling, which makes java more reliable and robust. Java forces the programmer to write the code for the exceptions, which may occur during the execution of the program. So that program can be terminated successfully, without any error stopping the execution flow of the program. Java also provides the lot of security. Security is important over the network because the computer will be attacked by the external program. Java provides the security that; it encounters the applets for the un-trusted sources. Architecture- neutral:- Java is a interpreted language, which enables java as a architectural neutral i.e. platform independent. We can write the program once and it can be executed on any platform with the help of the Java Virtual Machine (JVM). The java virtual machine can be embedded on the operating system or on web browser. Once the part of the java code is loaded into the machine, it is verified. Byte code verification play a major role, as it check all the code generated by the compiler will not corrupt the machine on which the code is loaded. At the end of the compilation, byte code verification will be done; in order to make sure thats the code is accurate and correct. So the byte code verification is the integral to the compilation and execution. Due to the property of architectural neutral had by java, it is portable. The program once written can be run on any platform without recompilation. Java does not provide any platform specific features. In other languages, such as Ada where the large integer varies according to the platform it runs. But in the case of java the range of the numbers are fixed. Java environment is portal to every operating system and hardware. Multi-threaded:- It is defined as the programs ability to perform several tasks (or) functions simultaneously. The multithreading property is embedded in the java program. Using the java programs we can perform the several tasks simultaneously without calling any procedures of the operating system, which is done by the other programming languages in order to perform the multi-threading. Constant Pool:- Every program i.e. class in java, has a array of constants in the heap memory called as the constant pool, which is available to that class. Usually it is created by the java compiler. The constants encode all the name of the (methods, variables and constant that are presented in the constant pool) which is used by particular method of any class. Each individual class i.e. stored in heap memory has a count of how many constants are there and also has offset which specifies how far in to the class description itself the array of constants begins (Laura Lemay, Charles L.Perkins, and Micheal Morrison, n.d). The constants are represented (or) typed in the special coded bytes and which has a very well defined format, when these constants are appeared in the .class file for the java class file. JVM instructions refer to the symbolic information in java, rather than relying on the run time layouts of the class, methods and fields. Sun Java Wireless Toolkit:- Sun java wireless toolkit CLDC (connected Limited Device Configuration) is a group of tools which is used to develop the applications for the mobiles and for other wireless equipments (or) devices. Although the sun java wireless toolkit is based on the MIDP (Mobile Information Device Profile), it also supports many other optional packages, which make a sun java wireless toolkit as a great tool for developing many applications. It can be supported on the windows and Linux. All the users who have account on the host machine can access this tool either singly or simultaneously. It allows you to use a byte code obfuscator to reduce the size of your MIDlet suite JAR file. It also supports many other standard Application Programming Interfaces (APIs) which are defined by the (JCP) Java Community Process program. Even though, the sun java wireless toolkit did not come up with an obfuscator, it is configured in a way that it supports the ProGaurd. All you need to do is, just simply to download the ProGuard and place it in the system, which sun java wireless tool kit can find it. But due to the flexible nature of the tool, it allows any kind of the obfuscator. BCEL:- BCEL full abbreviation is Byte Code Engineering library. The BCEL helps you to dig the byte code of the java classes. BCEL gives the utmost power on the code because it works at the individual JVM instructions, even though the power comes with cost in complexity. Using the BCEL, we can transform the existing classes transformation or we can construct the new classes. The main difference between the BCEL and Javassist is javassist provides the source code interface where as the BCEL is developed in the intension to work at the level of the JVM assembly language. BCEL is good because the approach it uses is low level, which is very helpful to control the program at the instruction level. Compared to Javassist it is more complex to work with the BCEL. BCEL has the capability to inspect, to edit and to create binary classes in java. There are 2 hierarchy components in the BCEL, in which one component is used to create the new code and the other component is used to edit (or) update the existing code. The inspection of the class aspect in the BCEL mainly deals with the duplication whatever available in the java platform using the Reflection API. This duplication is necessary (or) mandatory in classworking because we generally dont want to load the classes on which we are working until they are modified fully. Org.apache.bcel.classfile package provides all the definition which is related to inspection-related code.org.apache.bcel package provides the basic constant definitions. JavaClass is a class which is the starting point of the package. The JavaClass plays a role in accessing the information of the class using the BCEL same as like java,lang.Class does using the regular reflection in java. The JavaClass has a methods to get the information like structural information about the super classes and interfaces, to get the information of the class i.e. information about the field and methods in the class. The JavaClass will provide access to the some internal information about the class, including constant pool and identifiers. It also represents the Byte stream which is the complete binary class representation. If the actual binary class is parcel, then we can create the instance for the JavaClass. To handle the parsing BCEL provides a class called org.apache.bcel.Respository. The representation of the classes are parsed and cached by the BCEL by default, which are on the JVM path, to get the actual binary classes representation from the org.apache.bcel.util.respository instance. org.apache.bcel.util.respository is an interface which is source for binary classes representations. Changing the classes:- Not only the accessing the components of class, org.apache.bcel.Classfile.JavaClass also provide certain methods, in order to provide the liberty to change (or) alter the classes. The class component can be set to the new values by using those methods. Although those are of no direct use much, because the other classes in the package dont support constructing the new versions of the components that are building. There are certain classes in the org.apache.bcel.generic package that will provide the editable versions of the same components there in the org.apache.bcel.classfile classes. Org.apache.bcel.generic.ClassGen is the starting step (or) point for the creating the new classes. This also useful to modify the existing classes, to do this one, there is a constructor that takes a JavaClass Instance in order to initialize ClassGen class information. Once you modified the changes to the class, then we get the usable (or) useful class representation from ClassGen instance, in order get the usable representation of the class, we need to call any method that returns the class called JavaClass. Later it will be converted into the binary class information. It is little bit confusing, in order to eliminate this confusion, it is better to write a wrapper class for eliminating some differences. In order to manage the construction of the various class components, org.apache.bcel.generic provides many other classes apart from the ClassGen. It has a class called ConstantPoolGen , which is used to handle the constant pool. FieldGen, MethodGen classes which are used to handle the Fields and the methods in classes. For the working with the sequence of the JVM instructions there is other class called Instruction List. org.apache.bcel.generic also provides the classes for the each and every type instructions which are executed over JVM. We can create the instance for these classes directly some times and in other times by using the helper class called org.apache.generic.InstrcutionFactory. The main advantage of this helper class is, it handles are the book keeping details of the each and every instruction constructing for us( i.e. adding the items to the constant pool as required for the instructions). Sand Mark:- Sandmark is a tool i.e. developed to measure the performance of the software protection algorithms and effectiveness of the methods that are preventing the software from the piracy issues, water tampering and reverse engineering techniques. Sandmark is also has an ability to find which algorithm is most resiliences to the attacks and have a least performance of over head. There are many software protections are proposed both in software and hardware. The hardware protections are there from the dongle protection and now tamper-proof software. The sandmark tool is developed to evaluating and implementing the software-based techniques such as code obfuscation (making code complex to understand) and water tampering. History of reverse engineering:- Reverse engineering most probably starts with Dos (disk operating system) based computer games. The aim is to have full life and armed for the player to finish the final stage of the game. In that way the technique of reverse engineering came in to picture, it is just to find the memory locations where the life and number of weapons are stored and modifying the values of that memory locations. So that, the player can changes the values and gets through the final stage and win the game. Thats why memory cheating tools such as game hack came in to existence. Reverse Engineering:- Reverse engineering is the process of the understanding the particular aspects of the program, which are listed below To identify the components of the system and the interrelationship between the components. And enhance the components of the system and to improve the performance and scalability of the system (or) subsystem. Software reverse engineering is a technique that converts a machine code of a program (string 0s and 1s usually sent to logic processor) back in to the programmable language statements which is called as source code. Software reverse engineering is done to get the source code of the program because to know how the particular parts of the program performs particular operations in order to improve the program functionality or to fix the bugs in the program or to find malicious block of statements in the software if any. Generally, this reverse engineering will take place in older industries on machines. But now it is frequently used on computer hardware and softwar e. The important contents like data formats, algorithms what the programmer used to implement the software and ideas of the programmer (or) company will be revealed to the 3rd person by violating the security and privacy issues using reverse engineering technique. Reverse engineering is evolving as a major link in the software lifecycle, but its growth is hampered by confusion (Elliot J.chilkofsky James H.Cross ii, Jan 1990). Reverse engineering is generally implemented to improve the quality of the product, to observe the competitors products. Forward engineering is the process of moving from the high level abstracts (or) from the initial requirements stage (objectives, constraints and proper solution to the problem), logical, and independent designs (specification of the solution) to the final product i.e. implementation (coding and testing).; whereas the reverse engineering is the process of moving from the final product to the initial requirements stage in order to under the system logically, why particular function (or) action is being performed. By knowing the system logically, the flaws and errors in the system can be rectified and helps to improve the systems functionality when the source code of the application is not available. For this sake the concept of the reverse engineering techniques is evolved. Fig 1: reverse engineering and related process are transformations between or within the abstract levels, represented here in terms of life cycle phases. (Elliot J.chilkofsky James H.Cross ii, Jan 1990) Reverse engineering in and of itself doesnt mean changing the subsystem or developing the new system based on the existing. It is a process of examination (or) understanding the program (or) software but not replication (or) change. Reverse engineering involves very broad range of aspects such as starting from the existing implementation, recreating or recapturing the design ideas and extracts the actual requirements of the existing system. Design recovery is the most vital subset of the reverse engineering because in which knowledge of the domain, external (or) outer side information and deduction or fuzzy reasoning are added to the investigated (or) subjected system in order to find the high level abstract of the system, normally which is not obtained by directly observing the system. According to the Ted BiggerStaff: Students Paper: Ted BiggerStaff: design recovery recreates design abstractions from a combination of code, existing design documentation(if available), personal experience, and general knowledge about problem and application domains. Design recovery must reproduce Re-engineering is termed as renovation and reclamation, is the examination and altering the subjective system again to construct in the new form and the implementation of the new system. Re-engineering involves some form of reverse engineering i.e. to obtain the high level of the abstract of the existing system followed by forward engineering. This may be changes according to the new requirements that were not previously implemented in the system. While re-engineering is not super type of the forward engineering and reverse engineering but it uses the forward engineering and reverse engineering. Objectives:- The primary goal of the reverse engineering is to enhance the overall comprehensibility of the system for the both maintenance and new development. Cope up with the complexity. In order to meet the complexity and shear volumes of the system we have to develop a better methods i.e. automated support. In order to extract the relevant information reverse engineering methods and tools should be combined with the CASE environments. So that decision makers can control the process and product in system evolutions. Alternative views should be generated. Comprehension aids such as graphic representation as been accepted for long time. However maintaining and creating them is becoming difficult in the process. Reverse engineering facilitates the generation or regeneration of the graphical representation in the other forms. While many designers work on single diagrams such as data flow diagrams where as the reverse engineering tools will give the other graphical representations such as control flow diagrams, entity relation diagrams and structure charts to aid the review and verification process. To identify the side effects. Both haphazard initial design and intentional modifications to the system can lead to unintentional ramifications and side effects that affect the system performance. Reverse engineering can provide better observation than we can observe by forward engineering perspective. So it makes us to solve that ramifications and anomalies before users intimate them as bugs. Component reuse. Software reusability is becoming the more essential part in developing the new products in the software field. Reverse engineering can be able to help to detect the candidates for reusable components from the present system. To recover the lost information. When the continuous evolution of the long lived system which will lead to loss of information. In order to preserve the old information of the system design; design recovery of reverse engineering techniques is used. Many reverse engineering tools try to extract the structure of the legacy systems with the intension to pass this information to software engineers in order to re-engineer or to reverse engineer the existing component. Code reverse engineering:- During the evolution of the software, many changes will apply to the code, to add any functionality which is to be added and to change the code in order to rectify the defect and enhance the systems performance (or) quality. Systems with the poor documentation only the code will be reliable solution to get information about the system. As a result, the process of reverse engineering is focused on understanding the code. Thus reverse engineering has good and bad ends. Obfuscation:- Java provides platform independence to the software programs so that software programs will run independently on any platform. All the programs are compiled in order get intermediate code format i.e. A class file consists of a stream of very large amount of information regarding the program methods, variable and constant enough to do reverse engineering. When a company develops the program (or) software in java and sell this product in intermediate code format to the other organization by not giving the original software. The organization who buys the program (or) software will simply change (or) modify the software by violating the security and privacy issues of authorised company; by simply applying the reverse engineering technique. This reverse engineering will be done by the software developers, automated tools and decompilers. Java byte code can be easily decompiled, which makes reverse engineering technique easier in java. In programming context Obfuscation is described as, making program code more difficult to read and understand for security and privacy purposes of the software. Decompilers can easily extract the source code from the compiled code, in that point of view protecting the code secretly will make impossible. So the growth of obfuscators increased rapidly in order to keep effectively smoke screen around the code. Code obfuscation is the one of the most prominent and best method to protect the java code securely. Code obfuscation makes program to understand difficult. So that code will be more resistant to the reverse engineering. There are 2 byte code obfuscation techniques that are: source code obfuscation byte code obfuscation Source code technique is simply changing the source code of the program, where as byte code obfuscation is changing the classfile of the program (functionality is same as the source code). There several obfuscation techniques to prevent java byte code from decompilation. For example consider a set of class files, S, becomes another set of class files S through an obfuscator. Here the set of class files of s and s are different, but they produce the same output. Example:- class OHello { public OHello() { int num=1; } public String gHello(String hname){ return hname; } when the above code is passed through the simple obfuscator (such as Klass Master), the following code will be generated. class aa { public static boolean aa; public aa() { int aa=1; } public String aa(String ba){ return ba; } By observing the above code the class name OHello is changed to the aa and the gHello method name is changed to the aa. It is more difficult to read the program with aa than a OHello. By this way less information will be interpreted and understand to the reverse engineers. This is just a simple example by renaming the class variables and class method names. Categories of obfuscation techniques:- Description of Obfuscation techniques:- One way of obfuscating the source program by the obfuscators is replacing a symbol of a class file by illegal string. The replacement might be the private are even worst ***. Other techniques usually obfuscator will use targeting the specific decompilers (Mocha and Jode) is inserting a bad instruction in the code. The example is Let us taken an example with bad instruction, lets take the original code (decompiled): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return and after obfuscation the code is as follows (names are not changed, not to make complex): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return 7 pop By observing the above routine we notice that a pop instruction is added after the return statement. The last and final statement in the method that has return type should be return statement, but in the above routine a pop keyword is inserted which make the routine not to be executed for ever. Lexical obfuscation:- Lexical obfuscation changes the lexical structure of a program by scrambling the identifiers. All the names of classes, fields and methods which are meaningful symbolic information of java program, is renamed with meaningless name i.e. useless names. An example obfuscator for lexical obfuscation is crema. Obfuscator is defined as the program that automatically makes the transformation in the classfile in order obfuscate the classfile, to undo the reverse engineering technique to produce the source code from the class file. Layout obfuscation:- Layout obfuscation dealt with changing the layout structure of the program i.e. done by 2 basic methods Renaming the identifiers Removing the debugging information. Above 2 will make program code less informative to the reverse engineers. Layout obfuscation techniques use the one way functions such renaming the identifiers by random symbols, removing the comments, unused methods and debugging information. Though the reverse engineers can understand the obfuscated code i.e. done by layout obfuscation, it consumes the cost of reverse engineering. Layout obfuscation techniques are most commonly used in the code obfuscation. All most all obfuscators of java will use these techniques. Control obfuscation:- Changing the control flow of the program. It is easiest way to do and which make reverse engineer to find the code what exactly. For example consider a code in which a there is a method A(). Here another new method called A_Dummy() will be created and in the program Data Obfuscation:- Data obfuscation mainly deals with breaking up the data structures used in the program and encrypting the literals. This includes changing the inheritance, restructuring the arrays, making the variable names constant etc. In that way data obfuscation affect the data structures of the program. Thus data obfuscation make impossible to obtain the original source code of the program. More viable source code obfuscation methods are based on composite functions, which are Array Index Transformation, Method Argument Transformation, and Hiding Constant. The obfuscation techniques that are based on composite functions make the computation complex and extensive use of these techniques make the software to respond slowly. Some source code obfuscation methods are directed at the object oriented concept; Class Coalescing, Class splitting, and Type Hiding. Other source code obfuscation techniques may include; false refactoring, restructure arrays, inline and outline methods, clone methods, split v ariables, convert static to procedural data, and merge scalar variables. The obfuscation techniques that work over object oriented concept and other techniques like restructure arrays, split variables, merge scalar variables may distort the logic of the software, so these must be carefully used. The employment of obfuscation technique like outline methods, clone methods, convert static to procedural data increase the size of a class file without providing any significant advantage. In lining a method results in an unresolved method call when some other class calls the in lined method. Advanced obfuscation techniques for byte code:- There are several obfuscation techniques to prevent java byte code from de-compilation. Many of these tools are simply to change the names of the identifiers with the meaningless names which are stored in byte code. Many crackers can understand the actual source code, even though identifier name are changed, but it will take more time to understand. Traditionally, when a program is compiled to machine code, most of the symbolic information will be stripped off, after the compilation of the program. When the program is compiled, the address of the variable and functions of the program will be denoted by the identifiers. Even though de-compilation of such compiled code is difficult, but still it is possible to decompile the code. We say protection techniques are difficult if and only if the time and effort taken by the cracker to crack the software should be with more cost and effort. Cracking time to crack software is more than a re-writing a program, then its of no use and waste of time and valueless. Java became the most popular because of benefits that it is providing. One of the major benefits is portability i.e. compiled program can run on any platform i.e. platform independent. When the program is compiled it produces independent byte code. Java uses the symbolic references rather than the traditional memory addresses. Therefore, the names of methods and, variables and types are stored in a constant pool with in a byte code file. There are many commercial de-compilers (P C, 2001, Vliot 1996, hoeniche 2001 etc.). When the program is decompiled, it extracts the program almost identical to the source code. Making use of decompiler to extract the source code becomes the lethal weapon to intellectual property piracy. Obfuscation technique is used to stop de-compilation of the byte code. The main aim of obfuscation technique is to make decompiled program harder to understand i.e. more time and effort to understand the obfuscated code. Obfuscation scope:- Java application consists of one or more packages. A programmer might divide the program in to packages. He can also use the packages that are in standard library and proprietary libraries. Only the part of the program developed by the developer will be given outside. The proprietary library is not distributed due to the copyright restrictions. Obfuscation scope termed as the part of the program obfuscated by the obfuscation techniques, i.e. the part of the program/software developed by the developer is protected not the entire software. The package that serves as the utilities for the standard library and proprietary libraries not obfuscated. Candidates considered for identifiers scrambling:- An identifier will denote the following terms in java http://www.cis.nctu.edu.tw/~wuuyang/papers/Obfuscation20011123.doc the bytecode file. By default, parameters and local variables are stripped and deleted (or) removed from the byte code. The names of the local variables and parameters are stored in the LocalVariableTable in the byte code, if the debug info is enabled. But, by default the de-bug info is enabled in java compiler. If the local variable is not found, de-compilers itself create the names for local variable and parameter, which makes program after reverse somewhat understandable. Even, if we rename the names of the variables and parameter in LocalVariableTable, good decompiler will simply Characteristics of Java Language Characteristics of Java Language Chapter 2 Literature review About Java:- Initially java language is named as Oak in 1991, which is designed for the consumer electronic appliances. Later in 1995 the name was changed to Java. Java was developed by James Gosling, a development leader in sun micro system. Oak was redesigned in 1995 and changed the name to java for the development of the applications which can be run over internet. Using the java language, java programs can be embedded in to the html pages. Java is not only limited for the web applications, it is also useful to develop the stand alone applications. Java has a feature called OOPs, which make it more familiar. Object oriented programming replaced the old traditional techniques i.e. procedural programming. Characteristics of java:- Simple:- Java language is simple than the previous languages such as c and c++. Java eliminates the pointers concept which is earlier present in c and c++. Java also has a properties i.e. automatic allocation of memory and garbage collection, where as in c/c++ the garbage collection and allocation of memory will be done by the programmer which is a complex task. Object oriented:- All the programming languages apart from the c++ are procedural languages which are paradigm of procedures. Java programming language is object oriented because java uses the concept of the object. In java everything will depend on objects i.e. creating the objects and making objects to work together. The overall functionality of the high level program will depends on the objects. Because java is object oriented program it provides great range of reusability, modularity and flexibility. Distributed:- Java uses the http and ftp which are internet protocols, in order to have access the files over the network. So by using this libraries which are in java can easily make file transfers over the network which is connected to internet. Interpreted:- In order to run the java programs we need interpreter. When the java programs are compiled it produces the byte code, which is machine understandable language. The byte code which is produced after the compilation is machine independent, so that it can run on any system using java interpreter. Most of the compilers will convert the high level language instructions to the low-level machine understandable language as machine cant understand the high level instruction. The machine code can only be executed on that compiled native machine. For example a source code is compile on windows platform, the executable file produced after cant be executed on other platforms apart from the windows. But, coming to java it is different i.e. the source code is compiled once and the executable byte code can be run on any platform using java interpreter. The main functionality of the interpreter is, it converts the byte code to the machine language of the target machine. Robust and secure:- Java programming is more reliable. At the time of the execution time java shows all the errors. In java bad and error prone language constructs are eliminated. Java eliminated the concepts such as pointers, due to this there is no corruption of data and overwriting the memory locations. In the same way java supports the exception-handling, which makes java more reliable and robust. Java forces the programmer to write the code for the exceptions, which may occur during the execution of the program. So that program can be terminated successfully, without any error stopping the execution flow of the program. Java also provides the lot of security. Security is important over the network because the computer will be attacked by the external program. Java provides the security that; it encounters the applets for the un-trusted sources. Architecture- neutral:- Java is a interpreted language, which enables java as a architectural neutral i.e. platform independent. We can write the program once and it can be executed on any platform with the help of the Java Virtual Machine (JVM). The java virtual machine can be embedded on the operating system or on web browser. Once the part of the java code is loaded into the machine, it is verified. Byte code verification play a major role, as it check all the code generated by the compiler will not corrupt the machine on which the code is loaded. At the end of the compilation, byte code verification will be done; in order to make sure thats the code is accurate and correct. So the byte code verification is the integral to the compilation and execution. Due to the property of architectural neutral had by java, it is portable. The program once written can be run on any platform without recompilation. Java does not provide any platform specific features. In other languages, such as Ada where the large integer varies according to the platform it runs. But in the case of java the range of the numbers are fixed. Java environment is portal to every operating system and hardware. Multi-threaded:- It is defined as the programs ability to perform several tasks (or) functions simultaneously. The multithreading property is embedded in the java program. Using the java programs we can perform the several tasks simultaneously without calling any procedures of the operating system, which is done by the other programming languages in order to perform the multi-threading. Constant Pool:- Every program i.e. class in java, has a array of constants in the heap memory called as the constant pool, which is available to that class. Usually it is created by the java compiler. The constants encode all the name of the (methods, variables and constant that are presented in the constant pool) which is used by particular method of any class. Each individual class i.e. stored in heap memory has a count of how many constants are there and also has offset which specifies how far in to the class description itself the array of constants begins (Laura Lemay, Charles L.Perkins, and Micheal Morrison, n.d). The constants are represented (or) typed in the special coded bytes and which has a very well defined format, when these constants are appeared in the .class file for the java class file. JVM instructions refer to the symbolic information in java, rather than relying on the run time layouts of the class, methods and fields. Sun Java Wireless Toolkit:- Sun java wireless toolkit CLDC (connected Limited Device Configuration) is a group of tools which is used to develop the applications for the mobiles and for other wireless equipments (or) devices. Although the sun java wireless toolkit is based on the MIDP (Mobile Information Device Profile), it also supports many other optional packages, which make a sun java wireless toolkit as a great tool for developing many applications. It can be supported on the windows and Linux. All the users who have account on the host machine can access this tool either singly or simultaneously. It allows you to use a byte code obfuscator to reduce the size of your MIDlet suite JAR file. It also supports many other standard Application Programming Interfaces (APIs) which are defined by the (JCP) Java Community Process program. Even though, the sun java wireless toolkit did not come up with an obfuscator, it is configured in a way that it supports the ProGaurd. All you need to do is, just simply to download the ProGuard and place it in the system, which sun java wireless tool kit can find it. But due to the flexible nature of the tool, it allows any kind of the obfuscator. BCEL:- BCEL full abbreviation is Byte Code Engineering library. The BCEL helps you to dig the byte code of the java classes. BCEL gives the utmost power on the code because it works at the individual JVM instructions, even though the power comes with cost in complexity. Using the BCEL, we can transform the existing classes transformation or we can construct the new classes. The main difference between the BCEL and Javassist is javassist provides the source code interface where as the BCEL is developed in the intension to work at the level of the JVM assembly language. BCEL is good because the approach it uses is low level, which is very helpful to control the program at the instruction level. Compared to Javassist it is more complex to work with the BCEL. BCEL has the capability to inspect, to edit and to create binary classes in java. There are 2 hierarchy components in the BCEL, in which one component is used to create the new code and the other component is used to edit (or) update the existing code. The inspection of the class aspect in the BCEL mainly deals with the duplication whatever available in the java platform using the Reflection API. This duplication is necessary (or) mandatory in classworking because we generally dont want to load the classes on which we are working until they are modified fully. Org.apache.bcel.classfile package provides all the definition which is related to inspection-related code.org.apache.bcel package provides the basic constant definitions. JavaClass is a class which is the starting point of the package. The JavaClass plays a role in accessing the information of the class using the BCEL same as like java,lang.Class does using the regular reflection in java. The JavaClass has a methods to get the information like structural information about the super classes and interfaces, to get the information of the class i.e. information about the field and methods in the class. The JavaClass will provide access to the some internal information about the class, including constant pool and identifiers. It also represents the Byte stream which is the complete binary class representation. If the actual binary class is parcel, then we can create the instance for the JavaClass. To handle the parsing BCEL provides a class called org.apache.bcel.Respository. The representation of the classes are parsed and cached by the BCEL by default, which are on the JVM path, to get the actual binary classes representation from the org.apache.bcel.util.respository instance. org.apache.bcel.util.respository is an interface which is source for binary classes representations. Changing the classes:- Not only the accessing the components of class, org.apache.bcel.Classfile.JavaClass also provide certain methods, in order to provide the liberty to change (or) alter the classes. The class component can be set to the new values by using those methods. Although those are of no direct use much, because the other classes in the package dont support constructing the new versions of the components that are building. There are certain classes in the org.apache.bcel.generic package that will provide the editable versions of the same components there in the org.apache.bcel.classfile classes. Org.apache.bcel.generic.ClassGen is the starting step (or) point for the creating the new classes. This also useful to modify the existing classes, to do this one, there is a constructor that takes a JavaClass Instance in order to initialize ClassGen class information. Once you modified the changes to the class, then we get the usable (or) useful class representation from ClassGen instance, in order get the usable representation of the class, we need to call any method that returns the class called JavaClass. Later it will be converted into the binary class information. It is little bit confusing, in order to eliminate this confusion, it is better to write a wrapper class for eliminating some differences. In order to manage the construction of the various class components, org.apache.bcel.generic provides many other classes apart from the ClassGen. It has a class called ConstantPoolGen , which is used to handle the constant pool. FieldGen, MethodGen classes which are used to handle the Fields and the methods in classes. For the working with the sequence of the JVM instructions there is other class called Instruction List. org.apache.bcel.generic also provides the classes for the each and every type instructions which are executed over JVM. We can create the instance for these classes directly some times and in other times by using the helper class called org.apache.generic.InstrcutionFactory. The main advantage of this helper class is, it handles are the book keeping details of the each and every instruction constructing for us( i.e. adding the items to the constant pool as required for the instructions). Sand Mark:- Sandmark is a tool i.e. developed to measure the performance of the software protection algorithms and effectiveness of the methods that are preventing the software from the piracy issues, water tampering and reverse engineering techniques. Sandmark is also has an ability to find which algorithm is most resiliences to the attacks and have a least performance of over head. There are many software protections are proposed both in software and hardware. The hardware protections are there from the dongle protection and now tamper-proof software. The sandmark tool is developed to evaluating and implementing the software-based techniques such as code obfuscation (making code complex to understand) and water tampering. History of reverse engineering:- Reverse engineering most probably starts with Dos (disk operating system) based computer games. The aim is to have full life and armed for the player to finish the final stage of the game. In that way the technique of reverse engineering came in to picture, it is just to find the memory locations where the life and number of weapons are stored and modifying the values of that memory locations. So that, the player can changes the values and gets through the final stage and win the game. Thats why memory cheating tools such as game hack came in to existence. Reverse Engineering:- Reverse engineering is the process of the understanding the particular aspects of the program, which are listed below To identify the components of the system and the interrelationship between the components. And enhance the components of the system and to improve the performance and scalability of the system (or) subsystem. Software reverse engineering is a technique that converts a machine code of a program (string 0s and 1s usually sent to logic processor) back in to the programmable language statements which is called as source code. Software reverse engineering is done to get the source code of the program because to know how the particular parts of the program performs particular operations in order to improve the program functionality or to fix the bugs in the program or to find malicious block of statements in the software if any. Generally, this reverse engineering will take place in older industries on machines. But now it is frequently used on computer hardware and softwar e. The important contents like data formats, algorithms what the programmer used to implement the software and ideas of the programmer (or) company will be revealed to the 3rd person by violating the security and privacy issues using reverse engineering technique. Reverse engineering is evolving as a major link in the software lifecycle, but its growth is hampered by confusion (Elliot J.chilkofsky James H.Cross ii, Jan 1990). Reverse engineering is generally implemented to improve the quality of the product, to observe the competitors products. Forward engineering is the process of moving from the high level abstracts (or) from the initial requirements stage (objectives, constraints and proper solution to the problem), logical, and independent designs (specification of the solution) to the final product i.e. implementation (coding and testing).; whereas the reverse engineering is the process of moving from the final product to the initial requirements stage in order to under the system logically, why particular function (or) action is being performed. By knowing the system logically, the flaws and errors in the system can be rectified and helps to improve the systems functionality when the source code of the application is not available. For this sake the concept of the reverse engineering techniques is evolved. Fig 1: reverse engineering and related process are transformations between or within the abstract levels, represented here in terms of life cycle phases. (Elliot J.chilkofsky James H.Cross ii, Jan 1990) Reverse engineering in and of itself doesnt mean changing the subsystem or developing the new system based on the existing. It is a process of examination (or) understanding the program (or) software but not replication (or) change. Reverse engineering involves very broad range of aspects such as starting from the existing implementation, recreating or recapturing the design ideas and extracts the actual requirements of the existing system. Design recovery is the most vital subset of the reverse engineering because in which knowledge of the domain, external (or) outer side information and deduction or fuzzy reasoning are added to the investigated (or) subjected system in order to find the high level abstract of the system, normally which is not obtained by directly observing the system. According to the Ted BiggerStaff: Students Paper: Ted BiggerStaff: design recovery recreates design abstractions from a combination of code, existing design documentation(if available), personal experience, and general knowledge about problem and application domains. Design recovery must reproduce Re-engineering is termed as renovation and reclamation, is the examination and altering the subjective system again to construct in the new form and the implementation of the new system. Re-engineering involves some form of reverse engineering i.e. to obtain the high level of the abstract of the existing system followed by forward engineering. This may be changes according to the new requirements that were not previously implemented in the system. While re-engineering is not super type of the forward engineering and reverse engineering but it uses the forward engineering and reverse engineering. Objectives:- The primary goal of the reverse engineering is to enhance the overall comprehensibility of the system for the both maintenance and new development. Cope up with the complexity. In order to meet the complexity and shear volumes of the system we have to develop a better methods i.e. automated support. In order to extract the relevant information reverse engineering methods and tools should be combined with the CASE environments. So that decision makers can control the process and product in system evolutions. Alternative views should be generated. Comprehension aids such as graphic representation as been accepted for long time. However maintaining and creating them is becoming difficult in the process. Reverse engineering facilitates the generation or regeneration of the graphical representation in the other forms. While many designers work on single diagrams such as data flow diagrams where as the reverse engineering tools will give the other graphical representations such as control flow diagrams, entity relation diagrams and structure charts to aid the review and verification process. To identify the side effects. Both haphazard initial design and intentional modifications to the system can lead to unintentional ramifications and side effects that affect the system performance. Reverse engineering can provide better observation than we can observe by forward engineering perspective. So it makes us to solve that ramifications and anomalies before users intimate them as bugs. Component reuse. Software reusability is becoming the more essential part in developing the new products in the software field. Reverse engineering can be able to help to detect the candidates for reusable components from the present system. To recover the lost information. When the continuous evolution of the long lived system which will lead to loss of information. In order to preserve the old information of the system design; design recovery of reverse engineering techniques is used. Many reverse engineering tools try to extract the structure of the legacy systems with the intension to pass this information to software engineers in order to re-engineer or to reverse engineer the existing component. Code reverse engineering:- During the evolution of the software, many changes will apply to the code, to add any functionality which is to be added and to change the code in order to rectify the defect and enhance the systems performance (or) quality. Systems with the poor documentation only the code will be reliable solution to get information about the system. As a result, the process of reverse engineering is focused on understanding the code. Thus reverse engineering has good and bad ends. Obfuscation:- Java provides platform independence to the software programs so that software programs will run independently on any platform. All the programs are compiled in order get intermediate code format i.e. A class file consists of a stream of very large amount of information regarding the program methods, variable and constant enough to do reverse engineering. When a company develops the program (or) software in java and sell this product in intermediate code format to the other organization by not giving the original software. The organization who buys the program (or) software will simply change (or) modify the software by violating the security and privacy issues of authorised company; by simply applying the reverse engineering technique. This reverse engineering will be done by the software developers, automated tools and decompilers. Java byte code can be easily decompiled, which makes reverse engineering technique easier in java. In programming context Obfuscation is described as, making program code more difficult to read and understand for security and privacy purposes of the software. Decompilers can easily extract the source code from the compiled code, in that point of view protecting the code secretly will make impossible. So the growth of obfuscators increased rapidly in order to keep effectively smoke screen around the code. Code obfuscation is the one of the most prominent and best method to protect the java code securely. Code obfuscation makes program to understand difficult. So that code will be more resistant to the reverse engineering. There are 2 byte code obfuscation techniques that are: source code obfuscation byte code obfuscation Source code technique is simply changing the source code of the program, where as byte code obfuscation is changing the classfile of the program (functionality is same as the source code). There several obfuscation techniques to prevent java byte code from decompilation. For example consider a set of class files, S, becomes another set of class files S through an obfuscator. Here the set of class files of s and s are different, but they produce the same output. Example:- class OHello { public OHello() { int num=1; } public String gHello(String hname){ return hname; } when the above code is passed through the simple obfuscator (such as Klass Master), the following code will be generated. class aa { public static boolean aa; public aa() { int aa=1; } public String aa(String ba){ return ba; } By observing the above code the class name OHello is changed to the aa and the gHello method name is changed to the aa. It is more difficult to read the program with aa than a OHello. By this way less information will be interpreted and understand to the reverse engineers. This is just a simple example by renaming the class variables and class method names. Categories of obfuscation techniques:- Description of Obfuscation techniques:- One way of obfuscating the source program by the obfuscators is replacing a symbol of a class file by illegal string. The replacement might be the private are even worst ***. Other techniques usually obfuscator will use targeting the specific decompilers (Mocha and Jode) is inserting a bad instruction in the code. The example is Let us taken an example with bad instruction, lets take the original code (decompiled): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return and after obfuscation the code is as follows (names are not changed, not to make complex): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return 7 pop By observing the above routine we notice that a pop instruction is added after the return statement. The last and final statement in the method that has return type should be return statement, but in the above routine a pop keyword is inserted which make the routine not to be executed for ever. Lexical obfuscation:- Lexical obfuscation changes the lexical structure of a program by scrambling the identifiers. All the names of classes, fields and methods which are meaningful symbolic information of java program, is renamed with meaningless name i.e. useless names. An example obfuscator for lexical obfuscation is crema. Obfuscator is defined as the program that automatically makes the transformation in the classfile in order obfuscate the classfile, to undo the reverse engineering technique to produce the source code from the class file. Layout obfuscation:- Layout obfuscation dealt with changing the layout structure of the program i.e. done by 2 basic methods Renaming the identifiers Removing the debugging information. Above 2 will make program code less informative to the reverse engineers. Layout obfuscation techniques use the one way functions such renaming the identifiers by random symbols, removing the comments, unused methods and debugging information. Though the reverse engineers can understand the obfuscated code i.e. done by layout obfuscation, it consumes the cost of reverse engineering. Layout obfuscation techniques are most commonly used in the code obfuscation. All most all obfuscators of java will use these techniques. Control obfuscation:- Changing the control flow of the program. It is easiest way to do and which make reverse engineer to find the code what exactly. For example consider a code in which a there is a method A(). Here another new method called A_Dummy() will be created and in the program Data Obfuscation:- Data obfuscation mainly deals with breaking up the data structures used in the program and encrypting the literals. This includes changing the inheritance, restructuring the arrays, making the variable names constant etc. In that way data obfuscation affect the data structures of the program. Thus data obfuscation make impossible to obtain the original source code of the program. More viable source code obfuscation methods are based on composite functions, which are Array Index Transformation, Method Argument Transformation, and Hiding Constant. The obfuscation techniques that are based on composite functions make the computation complex and extensive use of these techniques make the software to respond slowly. Some source code obfuscation methods are directed at the object oriented concept; Class Coalescing, Class splitting, and Type Hiding. Other source code obfuscation techniques may include; false refactoring, restructure arrays, inline and outline methods, clone methods, split v ariables, convert static to procedural data, and merge scalar variables. The obfuscation techniques that work over object oriented concept and other techniques like restructure arrays, split variables, merge scalar variables may distort the logic of the software, so these must be carefully used. The employment of obfuscation technique like outline methods, clone methods, convert static to procedural data increase the size of a class file without providing any significant advantage. In lining a method results in an unresolved method call when some other class calls the in lined method. Advanced obfuscation techniques for byte code:- There are several obfuscation techniques to prevent java byte code from de-compilation. Many of these tools are simply to change the names of the identifiers with the meaningless names which are stored in byte code. Many crackers can understand the actual source code, even though identifier name are changed, but it will take more time to understand. Traditionally, when a program is compiled to machine code, most of the symbolic information will be stripped off, after the compilation of the program. When the program is compiled, the address of the variable and functions of the program will be denoted by the identifiers. Even though de-compilation of such compiled code is difficult, but still it is possible to decompile the code. We say protection techniques are difficult if and only if the time and effort taken by the cracker to crack the software should be with more cost and effort. Cracking time to crack software is more than a re-writing a program, then its of no use and waste of time and valueless. Java became the most popular because of benefits that it is providing. One of the major benefits is portability i.e. compiled program can run on any platform i.e. platform independent. When the program is compiled it produces independent byte code. Java uses the symbolic references rather than the traditional memory addresses. Therefore, the names of methods and, variables and types are stored in a constant pool with in a byte code file. There are many commercial de-compilers (P C, 2001, Vliot 1996, hoeniche 2001 etc.). When the program is decompiled, it extracts the program almost identical to the source code. Making use of decompiler to extract the source code becomes the lethal weapon to intellectual property piracy. Obfuscation technique is used to stop de-compilation of the byte code. The main aim of obfuscation technique is to make decompiled program harder to understand i.e. more time and effort to understand the obfuscated code. Obfuscation scope:- Java application consists of one or more packages. A programmer might divide the program in to packages. He can also use the packages that are in standard library and proprietary libraries. Only the part of the program developed by the developer will be given outside. The proprietary library is not distributed due to the copyright restrictions. Obfuscation scope termed as the part of the program obfuscated by the obfuscation techniques, i.e. the part of the program/software developed by the developer is protected not the entire software. The package that serves as the utilities for the standard library and proprietary libraries not obfuscated. Candidates considered for identifiers scrambling:- An identifier will denote the following terms in java http://www.cis.nctu.edu.tw/~wuuyang/papers/Obfuscation20011123.doc the bytecode file. By default, parameters and local variables are stripped and deleted (or) removed from the byte code. The names of the local variables and parameters are stored in the LocalVariableTable in the byte code, if the debug info is enabled. But, by default the de-bug info is enabled in java compiler. If the local variable is not found, de-compilers itself create the names for local variable and parameter, which makes program after reverse somewhat understandable. Even, if we rename the names of the variables and parameter in LocalVariableTable, good decompiler will simply