Tuesday, August 25, 2020

Film Term Paper Example | Topics and Well Written Essays - 1500 words

Film - Term Paper Example Audit of Chungking Express by Wong Kar-wai in 1994 Chungking Express was a film that was delivered in 1994 by Wong Kar-wai. It was made in Hong Kong and this was during the period when they were giving over to China. The film has such a large number of thing going on in light of the fact that there were political issues en route and again it was during when the residents were beginning to grasp opportunity in the feeling of an adjustment in way of life and the economy. Chungking Express moan to communicate what Hong Kong was experiencing in a way that was identifying with them. Accordingly, this period additionally achieved the worldwide spread of present day business culture to East Asia. This certainly had its focal points and burdens on the grounds that with way of life changes, customary qualities were deserted and the individuals began to receive new good and current qualities. As indicated by the film, the story rotates among two cops; Takeshi Kaneshiro and Brigitte Lin Ching-h sia who have been relinquished and left desolate where they attempt to gain people that they succumb to. Kaneshiro is depicted as desolate in light of the fact that his better half surrendered him he despite everything can hardly imagine how it occurred and she left until the end of time. Lin is identified with drugs and the existence she was living was not advantageous as she tried to get away from the nation since she was in an arrangement that turned sour. At this occurrence is when Kaneshiro meets Lin and attempts to get to her. Another scene would be where the official meets Faye Wong who falls for a cop, who had said a final farewell to his sweetheart, an airline steward. During that time, the cop was desolate and he was depicted as a n person who had just lost pinch of his life. Faye turns into the individual that thinks about him as she sneaks into his home and the outcome is that she trusts that what she was accomplishing for him would alter his perspective and spotlight on her. With no explanation what Faye did with her heart didn't regard effective and therefore she discarded that idea of getting to the cop. As to the film, there is likewise an ascent in the quantity of diversion joints. Clearly, the individuals of Hong Kong were depicted as individuals who love karaoke’s and music and this pattern was obviously expanding consequently the customary idea of such attributes was beginning to vanish as the individuals were beginning to adjust to another culture and way of life. For instance, Faye met with the cop when they were in the bar. Conventional culture did not depend on adoration as such. A man would not meet their likely sweetheart or spouse in amusement places, yet the film looked to take out that hole and take into consideration love to be felt in an assortment of spots and that if why the characters were set to meet in a bar. As to sexual connections, it very well may be presumed that Faye had an aim to have a sexual relationship with the cop. As per customary qualities, attributes, for example, pre-marriage sex and one-night stand were not adequate in the way of life and the main way that one could enjoy sexual connections was the point at which they got hitched. Notwithstanding that, the film depicts viewpoints, for example, steadfastness when the official is surrendered by his better half yet he despite everything contemplates her and feels for her. The Personals by Chen Kuo-fu The Personals was a film coordinated by Chen Kuo-fu. It depends on an opthamologist by the name of Du Jiazhen (Rene Liu) who proceeds to fundamentally scan for a

Saturday, August 22, 2020

Tips for breaking through the barrier - Emphasis

Tips for getting through the boundary Tips for getting through the boundary You most likely share something for all intents and purpose with every other person whos at any point had a temporarily uncooperative mind: you inevitably got moving. The issue is, that may well have been on the grounds that your report was expected first thing the following morning and the option was the Job Center. Yet, envision if some different option from dazzle need could get through that mass of dread. In the event that just there was something you could do to stop yourself spending the whole night before the cutoff time writing in a virus sweat and submitting something inadequate. There is, says Emphasis CEO Rob Ashton. The key is to cause the demonstration of writing to appear to be less compromising. In the creative cycle there comes a tipping point where the torment of not doing it exceeds the apparent agony of doing it, says Rob. The way to defeating a temporarily uncooperative mind is to present that point to now, as opposed to 12 PM before its due in. Attempt these methodologies to assist you with getting through the boundary and youll be done before you know it. Stunt yourself Its really feasible for one piece of your cerebrum to trick another that it isnt apprehensive, as indicated by Mark Forster, creator of Do It Tomorrow and Other Secrets of Time Management. Forster proposes utilizing the method of letting yourself know, Im not so much going to compose the [piece in question] now, Ill just and fill in the clear with a simple starting errand. For instance: Ill simply dispatch Microsoft Word, or Ill simply get the examination organizer out. This basic demonstration can be a discovery. Once youve made that first move, you will have over the underlying advance, says Forster. You may well find that you are not really even mindful that you are proceeding onward to make some extra move. Guide it out Looking down an entire unwritten archive might be sending chills down your back, however the way toward continuing ahead with it can without much of a stretch be separated into non-undermining activities. One of these drawing a psyche map is likewise a valuable apparatus to ensure youve secured each who, what, when, where and how. Know your peruser The best composing knows its crowd, and acknowledging the amount you do think about your peruser is an incredible persuasive apparatus just as helping you to compose a record that will carry out its responsibility. Filling in a peruser profile survey is another sheltered just as exceptionally compelling spot to begin. Work in blasts When getting through the square, youll feel less overpowered on the off chance that you know youre going to stop at one point. Set a clock with a caution for a brief time of strong work, trailed by a couple of moments break, at that point a somewhat longer stretch of work, etc. The more focused on you feel about the errand, the shorter each eruption of work ought to be. Step by step increment the work time between breaks until you arrive at your ideal time allotment for the most part this will be close to around 40 minutes. Halting at the alert even in mid-sentence may really give you the desire to come back to your composition. The brain hungers for culmination and will need to return to the assignment, says Forster. This encourages you to gather up a solid speed. Tune in to the Audio Tips meet with Rob Ashton here. Also, discover whats going on in our minds when a mental obstacle strikes here.

Friday, July 31, 2020

How to Cite a Painting You See in Person or Online

How to Cite a Painting You See in Person or Online (2) When writing a research paper it is important to properly cite your sources. But what if the source you want to cite isn’t a book or website, but a painting? And does it make a difference if you see the painting in person at a museum, or through a secondary source like a webpage? This article will tell you how to cite a painting you see in person or online in MLA, APA and Chicago styles. In the spirit of Independence Day, the painting Washington Crossing the Delaware is used for examples. What you will need Citing a painting typically requires a bit more information than citing a book. The information you will need is: Current location of the piece Size dimensions   The medium (e.g., sculpture, painting, etc.) Artist’s name Title of the piece Date the painting was created If you’re citing a painting you viewed online, you’ll also need: Website URL Website URL Name of the website Date the page was published Date you accessed the page Citing a painting you see online in MLA MLA citation format: Artist’s Last Name, Artist’s First Name. Title of Artwork OR description. Year of creation. Museum, City. Title of Website, Link starting with www. Example: Leutze, Emmanuel. Washington Crossing the Delaware. 1851. Metropolitan Museum of Art, New York City. Metmuseum.org, www.metmuseum.org/art/collection/search/11417. Formatting notes Artist’s name:   Write the artist’s name with their last name first followed by a comma and then their first name, just as you would the author of a book. If they have a middle initial or name list it after the first name. Put a period after the first name or middle name/initial if one is given. If the artist is listed or described as “Anonymous,” put Anonymous. If no artist is credited for the work, just start with the next step, the title of the work. Title of the piece:   After the author’s name, put the title in Italics, followed by a period. Capitalize nouns, verbs, pronouns and adverbs. If there is no title given, provide a short and un-italicized description with regular sentence capitalization. For example, you could write “Untitled portrait of King Henry VIII” or “Red rose on yellow background.” Year and location:   Next you will need to write the year the painting was made followed by a comma. Then put the piece’s current location, first writing the name of the museum or gallery followed by a comma and the city followed by a period. Citing a painting you see online in APA APA citation format:   Artist’s Last Name, Artist’s First Initial. (Year). Title of painting [Description of material]. Museum, City, State Abbreviation/Country. Name of source website (date page was published or n.d. if no date is given). Retrieved from: full URL of website. Example: Leutze, E. (1851). Washington crossing the Delaware [Oil on canvas]. Metropolitan Museum of Art, New York City, NY. The Met (n.d.). Retrieved from: //www.metmuseum.org/art/collection/search/11417. Formatting notes Artist’s name: Write the last name of the artist followed by a comma and then the first initial and middle initial if one is given followed by a period. If the artist is unknown, then skip this step and start the citation with the title of the work as described in the next step. If the artist is listed as Anonymous, use that as the name. Year and title of the piece: After the artist’s name put the year the painting was created in parentheses followed by a period. Then put the title of the painting in italics using sentence case. Then put the medium or materials used in brackets, followed by a period. Location: After the medium put the name of the museum where the piece is currently on display followed by a comma. Then put the city where the museum is located followed by a comma. Next, if the museum is in North America, put the abbreviation for the state followed by a period. For all other countries, put the name of the country instead of the state followed by a period.  Website: Next add the name of the source website followed by the date the page was published and a period. If no date is given, put “n.d.” for “no date.” Then put “Retrieved from:” followed by the direct URL for the webpage where you viewed the painting, including //www. Citing a painting you see online in Chicago Format:   Artist’s Last Name, Artist’s First Name. Title of Painting. Year painting was created. Description of materials. Dimensions. Museum, City. Accessed Month Day, Year. URL. Example: Leutze, Emmanuel. Washington Crossing the Delaware. 1851. Oil on canvas. 149 in. x 255 in. Museum of Modern Art, New York. Accessed July 4th, 2019. //www.metmuseum.org/art/collection/search/11417. Formatting notes Artist’s name: Start with the last name of the artist followed by a comma and then the first name and a period. If the author is listed as Anonymous, use that as the name. If no artist is credited simply skip this step and begin the citation with the title form the next step.   Title of the piece: After the name and a period, write the title of the painting in italics followed by a period. Use title case, so capitalize all nouns, verbs, pronouns, and adverbs.   If no title is given, you may simply skip this step. You do not need to provide a description or write “Untitled.” Year: Next list the year the painting was completed followed by a period. If no date is provided, put “n.d.”  Medium and size: List the materials used to make the artwork in sentence case followed by a period. Then put the dimensions followed by a period. You may use metric or imperial measurements, just be sure to keep it consistent throughout your paper. If this information is not available, simply leave it out. Location: Put the name of the museum where the piece is currently housed followed by a comma and the city where the museum is located. Website and access date: Finish with the URL of the website where you viewed the painting followed by a comma. Then put “accessed” followed by the date you most recently viewed the webpage in day-month-year format without commas, followed by a period. Citing a painting you see in person in MLA To cite a painting you see in person in MLA style, simply follow the same format as online, but leave off the website name and URL. Format: Artist’s Last Name, Artist’s First Name. Title of Artwork OR description. Year of creation, Museum, City. MLA example: Leutze, Emmanuel. Washington Crossing the Delaware. 1851, Metropolitan Museum of Art, New York City.   Citing a painting you see in person in APA Follow the format for APA website citation, but end the citation after the city and state/country information of the museum.     Format:   Artist’s Last Name, Artist’s First Initial. (Year). Title of painting [Description of material]. Museum, City, State Abbreviation/Country. Example:   Leutze, E. (1851). Washington crossing the Delaware [Oil on canvas]. Metropolitan Museum of Art, New York City, NY. Citing a painting you see in person in Chicago Follow the format for a website citation, but leave off the URL and accessed date. Chicago style citation format:   Artist’s Last Name, Artist’s First Name. Title of Painting. Year painting was created. Description of materials. Dimensions. Museum, City. Example:   Leutze, Emmanuel. Washington Crossing the Delaware. 1851. Oil on canvas. 149 in. x 255 in. Museum of Modern Art, New York.  And there you have it! Now you know how to properly cite a painting you see in person or online using the three most common styles of documentation. For your next essay, get a free grammar check with up to 5 free suggestions at ! In addition, you can also read the EasyBib grammar guides and learn how to properly use possessive nouns, linking verbs, an adverb clause, and other parts of speech.  

Friday, May 22, 2020

Walt Disney The Influential Person That Has Ever Existed

Darryl Butler 5/27/16 English Period:7 Walt Disney The influential person that I have chosen to write about is Walt Disney. Walt Disney is the most influential person that has ever existed. Walt Disney is influential because of the way he impacted the world. Some of the reason Walt Disney is influential is because of his perseverance and his ability to dream big. Walt Disney’s legacy will live on for ever. Doing the impossible Doing the impossible is one of the things that makes Walt so influential. Throughout his whole life he did things that people said were impossible. People told Walt that he could never make a carton with fully synchronized sound. Even though nobody believed in Walt he still made Steamboat Wille which is the first cartoon to have synchronized sound(Fortune,2014). One of Walt biggest claim to fame is doing the impossible. Incredible perseverance. Throughout his whole life Walt Disney showed great perseverance when every he encountered an obstacle.(Postma,20)6 When ever Walt wanted to do something that had never been done before people told him that he would never be able to accomplish it. When Walt wanted to make the first full length animation feature (Snow White and The Seven Dwarfs.)nobody believed he could do it. Even his own brother thought that the movie would flop and that it would have wasted a lot of money. But Walt still preserved and made the movie. Then ended up being so successful that it evenShow MoreRelatedWalt Disney : The Man Behind The Mouse1011 Words   |  5 Pages 29 May 2016 Walt Disney â€Å"The man behind the mouse† The influential person that I have chosen to write about is Walt Disney. Walt Disney is the most influential person that has ever existed. Walt Disney is important because of the way he impacted the world. Some of the reason Walt Disney is influential is because of his perseverance and his ability to dream big. Walt Disney’s legacy will live on for ever. Doing the impossible is one of the things that makes Walt so influential. Throughout hisRead MoreDiscuss the Postive and Negative Influences of Corporate Culture4289 Words   |  18 Pagesand the ideology to which member defer, as well as in the strategic choices made by the organisation as a whole. Basically, organisation culture is often regarded as â€Å"the ways we do things around here.† Interest in the concept of corporate culture has exploded in the past two decades. Researchers have approached the topic with a wide array of theoretical interests, methodological tools and definitions of the concept itself. Sorensen (2001) mentions that debate over fundamental issues of theoryRead MoreEuro Disney Case Study12599 Words   |  51 Pagescase fourteen Euro Disney: From Dream to Nightmare, 1987–94 Robert M. Grant At the press conference announcing Euro Disneyland SCA’s financial results for the year ended September 30, 1994, CEO Philippe Bourguignon summed up the year in succinct terms: â€Å"The best thing about 1994 is that it’s over.† In fact, the results for the year were better than many of Euro Disneyland’s long-suffering shareholders had predicted. Although revenues were down 15 percent – the result of falling visitor numbersRead MoreThe Walt Disney Company and Disney Management25371 Words   |  102 PagesSCA opened its doors to European visitors. Located by the river Marne some 20 miles east of Paris, it was designed to be the biggest and most lavish theme park that Walt Disney Company (Disney) had built to date—bigger than Disneyland in Anaheim, California; Disneyworld in Orlando, Florida; and Tokyo Disneyland in Japan. Much to Disney management’s surprise, Europeans failed to â€Å"go goofy† over Mickey, unlike their Japanese counterparts. Between 1990 and early 1992, some 14 million people had visitedRead MoreSteve Jobs: A Leader Who Defied the Rule Book6762 Words   |  28 Pages______________________________________________________________________________ Steve Jobs is no more. Surely, his accomplishments are far-reaching and impossible to easily summarise. Apart from revolutionising the computer, music and publishing industries in his lifetime, Steve Jobs’ death has pointed out that he may have transformed just one more – the leadership industry. Here’s one way of looking at the scope of his achievement: It is the dream of any entrepreneur to effect change in an industry. Well, Jobs transformed half a dozen ofRead MoreThe Studio System Essay14396 Words   |  58 Pagesfilm making. The main issues raised within the text will be summarised concisely within the conclusion. Before a film reaches the cinema screen, and its audience it must go through a three stage process. Firstly and most obviously it has to be produced, following this it must then be distributed, and finally exhibited. Before the introduction of the studio system in the 1920s all of these processes were controlled separately. Although this gave the makers of films, suchRead MoreMarketing Mistakes and Successes175322 Words   |  702 Pagesmistakes, and more recently successes also, it might seem a challenge to keep these new editions fresh and interesting. The joy of the chase has made this an intriguing endeavor through the decades. Still, it is always difficult to abandon interesting cases that have stimulated student discussions and provoked useful insights, but newer case possibilities are ever contesting for inclusion. Examples of good and bad handling of problems and opportunities are forever emerging. But sometimes we bringRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 Pagesbusiness innovation in companies at a far faster rate than would have been the case if there had been no boom; that is, without those effects, innovation might not have taken place at all. All this business growth has caused increasing complexity in business action and decision making. It has presented chief executive officers (CEOs) and management leaders in all markets and industries with new intricacies in deciding how to weigh and time the business decisions—and the quality of those decisions—thatRead MoreInnovators Dna84615 Words   |  339 Pagesin strategy and business journals and was the fourth most cited management scholar from 1996–2006. is a professor of leadership at INSEAD. He consults to organizations around the world on innovation, globalization, and transformation and has published extensively in leading academic and business journals. is the Robert and Jane Cizik Professor of Business Administration at Harvard Business School and the architect of and the world’s foremost authority on disruptive innovation. Read MoreOrganisational Theory230255 Words   |  922 PagesMcAuley et al. provide a highly readable account of ideas, perspectives and practices of organization. By thoroughly explaining, analyzing and exploring organization theory the book increases the understanding of a field that in recent years has become ever more fragmented. Organization theory is central to managing, organizing and reflecting on both formal and informal structures, and in this respect you will find this book timely, interesting and valuable. Peter Holdt Christensen, Associate Professor

Sunday, May 10, 2020

Indian Polity and Social Issue - 16628 Words

Polity, Constitution and Social Issues Polity Constitution Constitution of India is the supreme law of India. It lays down the framework defining fundamental political principles, establishing the structure, procedures, powers and duties, of the government and spells out the fundamental rights, directive principles and duties of citizens. Passed by the Constituent Assembly on 26 November 1949, it came into effect on 26 January 1950. The date 26 January was chosen to commemorate the declaration of independence of 1930. It declares the Union of India to be a sovereign, democratic republic, assuring its citizens of justice, equality, and liberty and to promote among them all fraternity. The words socialist, secular and integrity†¦show more content†¦The Mission discussed the framework of the constitution and laid down in some detail the procedure to be followed by the constitution drafting body. Elections for the 296 seats assigned to the British Indian provinces were completed by August 1946. The Constituent Assembly first met and began work on 9 December 1946. (Indian Independence Act 1947): The Indian Independence Act, which came into force on 18 July 1947, divided the British Indian territory into two new states of India and Pakistan, which were to be dominions under the Commonwealth of Nations until their constitutions were in effect. The Constituent Assembly was divided into two for the separate states. The Act relieved the British Parliament of any further rights or obligations towards India or Pakistan, and granted sovereignty over the lands to the respective Constituent Assemblies. When the Constitution of India came into force on 26 January 1950, it overturned the Indian Independence Act. India ceased to be a dominion of the British Crown and became a sovereign democratic republic. Constituent Assembly The Constitution was drafted by the Constituent Assembly, which was elected by the elected members of the provincial assemblies. Jawaharlal Nehru, C. Rajagopalachari, RajendraShow MoreRelatedBorn into Brothels a Documentary by Zana Briski Essay examples1199 Words   |  5 Pagesâ€Å"I am not a social worker. I am not a teacher, even. That is my fear, you know, that I really can’t do anything. Helping them to get and education is not going to do anything, but without help they are doomed (Born into Brothels, 2004).† Zana Briski made this statement in her documentary Born into Brothels, referring to the children of sex workers in Sonagachi. This statement exemplifies child saving, a dominant theme in children’s discourse, that portrays children as vulnerable, innocent, and inRead MoreUttar Hindu Politics Essay888 Words   |  4 Pagesthat it brought along itself, thereby giving congress a national identity whose legacy could not be challenged by the merge opposi tion. Uttar Pradesh due to its sheer size and historical importance has always remained to be a key state within the Indian union. The first UP assembly was held in 1951-52. Congress kept on changing ministers to an extent that UP saw the change of five chief ministers in 15 years including the first woman CM Sucheta Kriplani. Fresh elections were called in 1969 afterRead MoreIndividual Cultural Communication: Study of Indian Culture1426 Words   |  6 PagesIntroduction Introduction Indian population seems to be based on two groups, which are genetically dissimilar from each another. This is because they tend to be from other Asians, according to the main DNA survey conducted concerning the Indian heritage to present times. Nowadays, though, most Indians are known to be genetic hotchpotch of both lineages. This is despite the crowded nations known stratified social structure. India comprises of one-sixth of worldwide population, nevertheless theRead MoreNative American Self Determination Movement1441 Words   |  6 Pageson from this last point the Native American self-determination movement has achieved almost all of its victories without outside help. Indeed many organisations such as the National Congress of American Indians (NCAI), Native American Rights Fund (NARF) and National Alaska Native American Indian Nurses Association (NANAINA) are run by and for Native Americans and their interests. As with most civil rights movements but even more the case as Na tive Americans have their own sovereign citizenship, forRead More History of Latino/a Immigration to the U.S. Essay1475 Words   |  6 Pagesnew immigrants, are â€Å"excessively fertile, reluctant to assimilate, lazy and unwilling to learn English† (History 324, 10/19/10). This statement is important because the formation of negative comments toward the newcomers places them in an unwanted social bracket, which influences people to conceptualize that immigrants are bad for America. This is also the case for many Latino/a immigrants because there are people who believe that Latino/a immigrants to the U.S. should be restricted. The experienceRead More Struggle Between Hindu and Secular Nationalisms in India Essay examples4524 Words   |  19 Pages making their experience important for Americans concerned with these issues. India faces growing action of governing which invites the use of violence to achieve political objectives. In spite of Indias size and importance, it is hard for an American to gain an understanding of the issues and conflicts which have set the stage for the most recent revival of Hindu nationalism. The central feature of this new reform in Indian federal politics is the clash between Hindu and secular nationalists. Read MoreImmigration Act : On Asian American Cultural Politics1060 Words   |  5 Pageseconomy, polity, and civil society. She claims that the political demands that are left unmet of the terrain of political participation â€Å"erupt into culture†. It is my belief that this eruption into culture Lowe references is the constant disregard of minorities and how it is left unobserved because there has not been any attention paid toward the issue. Lowe makes note that throughout history, people native of the large Asian countries such as the China, Japanese, Korean, (Asian) Indian, have longRead MoreModernization Theory Of India s Democracy1722 Words   |  7 Pagesagrarian and rural population characterized by vast linguistic and ethnic diversity. However, India was able not only to transition to but also consolidate a robust democratic system that has survived for over sixty years. The historical process of Indian democratization challenges the central premise of modernization theory that economic development must precede democratization. The case disproves or refutes the modernization theory, which in term raises questions about its validity. In the contextRead MoreCaste and Politics in India1330 Words   |  6 Pagesprotection from the tyranny of the majority. In the 1930s, he fought for them to have a separate electoral identity and the British made what was known at the time as a communal award. After India’s independence, Ambedkar led the drafting of the Indian Constitution. Dalits were reserved 17.5 per cent of seats in Parliament and state assemblies. However, when he stood in an election in Mumbai, Ambedkar was defeated by a coalition of high-caste Hindus. In subsequent years, many Dalit leaders wereRead MoreRole of Panchayati Raj Institutions in the Assessment and Identification of Disability1575 Words   |  7 Pages Dr. Seema Singh*, Mrs. Paromita chaubey The 73rd amendment to the Indian constitution (1992) is a landmark in the evolution of Panchayats in India which carved out the third tier of the Indian Political System. Earlier we had only two Tiers - the union and the State governments. Now we have the third tier – the panchayats at the village block and district levels. Panchayats have been the backbone o f Indian Villages. From ages they had mainly performed the role of imparting justice

Wednesday, May 6, 2020

Roman Construction Free Essays

The ancient Romans were known for their brilliant engineering that have  stood the test of time. They were brilliantly manufactured to make the ancient Romans  more comfortable. Most of the inventions were improvements of older engineering ideas,  inventions, and concepts. We will write a custom essay sample on Roman Construction or any similar topic only for you Order Now The Romans improved the recipe of cement, which was  invented in Egypt, and created concrete. The Romans were greatly influenced by the Greek and the Estrusan. The construction and technology for bringing running water into the cities  were invented in the East. The construction of roads, were common then as it is now.  The Romans improved the design and perfected the construction so well it is used today.  The three examples I choose to write about Roman Engineering are first the Roman  aqueduct.   This construction was used to supply water to the people in the city. The  aqueduct is one of the most brilliant engineering constructions in the ancient world. It set a standard that has not been equaled Centuries after the fall of Rome.  Many of the cities in Rome, today still use the aqueducts to supply water for the city.  The aqueduct is estimated to be between 40 and a little over 500km in length. It is  29miles (47) km; above ground because most Roman aqueducts ran beneath the surface  of the ground. To build underground makes the water disease free as well as helped the  aqueducts from being attacked by enemies. The Roman aqueducts were sophistically built and remarkably thinly  technically standard. It has a gradient of only 34cm per km, lowering 17m vertically with  its entire length of 50km. Largely powered by gravity, it moves large amounts of 6  million gallons of water a day. The combined aqueducts in Rome supplied around  1million cubic meters which supplied 30 million gallons to the city each day. This is  great engineering feat has not been equaled until the 19th Century. The construction of the Roman aqueducts is the use of Chorobates. The  Chorobates used in this engineering were used to level terrain before construction. The  Chorobates was a wooden object that was supported by four legs. It had a flat broad top  with an engraved half circle. The half circle was filled with water to make the angle  which there is no water will be measured. The Groma is another tool used in the construction of the aqueduct. It  was used to measure right angles. It consisted of stones that hung off four sticks and was  perpendicular to one another. Distant objects marked out against the group of stones are  placed horizontally. There were nine aqueducts built, in ancient Rome supplying 38  million gallons a day to Rome.  A second example of Roman engineering is the Roman roads. These   roads were an essential to the growth of Rome because they supplied the Roman Empire  to move enemies in War. They were also created to hinder the enemies organizing to  attack Rome. The road, in its greatness was 85,000 km containing 372 links. The  Romans became adept at constructing the roads for political, military and commercial  reasons. The roads were long and important for the stability and expansion of the Roman Empire.   The Roman Roads were built first with Roman Army builders who  cleaned the ground of trees and rocks. They then build a trench where the road was  going to be laid and then filled it with large rocks. They put the large stones, pebbles,  cement and also sand and packed it down making a firm base. They added a layer of  cement that was mixed with broken tiles, paving stones creating the surface of the road. The stones were cut to fit tightly together. They placed kerbstones at the side  of the road to hold the paving stones and create a channel were the water can run.  The third example of Roman engineering, are Roman Bridges. The Romans  were first to build these bridges and make them long lasting. The Roman bridges were  built with stones with an Arch as its basic structure. The Romans used a new form of  cement called concrete to build the bridge. The Bridges were built in 142 BC, and was  named the Ponte Rotto. It is the oldest Roman stone bridge built in Rome. The Roman Bridge  characteristics are many they are 5 meters wide. Many have a slope and lean slightly.  Roman bridges have rustic work. The Roman Bridges stonework has a changing stretcher  as well as header courses which consist of a layer of square stones that are laid  horizontally. The end faces outwards, in the next layer of square stones.  The stones are connected with dovetail joint or with metal bars.  Indentions found in the stones were created by the gripping tools used for the  workers to hold onto.   The Romans also used tools such as slaves to move building  blocks of stones as well as levers and pulleys. They used chisels, concrete, plumb bob, a  bronze square, bronze dividers, and bronze foot ruler to build the bridges and the  powerful, and mighty city of Rome. Works Cited Roman Architecture- http://www.iol.ie/~coolmine/typ/romans/archie2.html The Roman’s Page. Mark Warner, 2007-Roman Roads-The Downs FM; The amazing podcast Of the downs CE Primary School-Teaching Ideas; Subject: History. http://www.teachingideas.co.uk/history/romanrd.htm Chris Trueman; The History of Ancient Rome- History learning site; http://www.historylearningsite.co.uk/roman_engineering.htm Chris Trueman; Roman Roads-The History of Ancient Rome-History learning site; http://www.historylearningsite.co.uk/roman_roads.htm How to cite Roman Construction, Essay examples

Wednesday, April 29, 2020

Market Entry Mode Essay Example

Market Entry Mode Essay The classical economic theory states that globalization relies on competition to drive down prices and increase product and service quality† (Lamb, Hair McDaniel 2008). The country that operates more efficiently and has the technology to produce what is needed is likely to attract more investment than a country that does not (Lamb, Hair McDaniel 2008). Most firms prefer to invest in countries where they can access cheap labor, advanced technology, stable economic climate, and good infrastructure among other factors facilitating effective performance of a business (Lamb, Hair McDaniel 2008). Globalization consequently expands economic freedom, spurs competition and raises competition for international companies and offers access to foreign capital, global export markets and advanced technology while breaking the monopoly of often inefficient and protected domestic producers (Lamb, Hair McDaniel 2009). A Consequent move by Catexhaust to establish a new plant in the Asian region requires the firm to evaluate the effectiveness with reference to its resources as well as the advantages and costs that it would incur on undertaking to open a plant in this region. ___________________________________________________________ SWOT ANALYSIS ____________________________________________________________ Catexhaust Company benefits from Germany’s impressive economic performance evident from its total GDP in 2008 of $ 3649 billion making it the fourth highest country in the world (The Economist 2010). The company stands to gain access to a larger market base resulting from its in vestment in foreign regions (Standard Bank n d). We will write a custom essay sample on Market Entry Mode specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Market Entry Mode specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Market Entry Mode specifically for you FOR ONLY $16.38 $13.9/page Hire Writer However, the company is likely to face the challenges prevalent in the automotive industry such as the industry’s expensive fixed costs as well as huge volumes of investment and the high cost required to train and retain skilled labor in the company. In addition, the company faces threat of competition from other more efficient companies as well as the fluctuating prices of raw materials. ____________________________________________________________ __________ WHY CATEXHAUST SHOULD OPEN A PLANT IN THAILAND ____________________________________________________________ Geographically, Thailand is well endowed with natural beauty, favorable tropical climate and consists of a friendly and hospitable population which makes the region generally accommodative and favorable for doing business (Communicaid 2009). The country holds a population over sixty million people has its capital city at Bangkok which is the key economic and political city (Communicaid 2009). In terms of economic compatibility, Thailand’s economy is in the process of growth and heavily relies on exports trade with the major markets situated in the North America Japan and Europe (Communicaid 2009). Thailand enjoyed economic boom in late 80s and early 90s but in 1997, the country was highly influenced by economic crisis that hit various countries of Southern Asia nation substantially discouraging FDI in the country (Communicaid 2009). However, the current Thailand market is vibrant with economic activities of both large and small nature which has played a major role in ensuring that the economy is dominated by increased competition which prompts international and local corporations to exploit the benefits provided by the market (Standard Bank n d). Catexhaust Company can borrow from Thailand’s technology and skills consequently reaching higher levels of output (Standard Bank n d). Further, establishment of a new plant in the region would significantly reduce transportation cost for inputs allowing the firm to produce at efficient levels. Based on the performance of the automotive industry in Germany, Catexhaust should consider the overall performance of the Thailand’s automotive industry. Thailand’s automotive industry is among the largest automotive market and assembler in the Asian region (Runckel 2005). The country’s automotive industry generates considerably large export revenue and the domestic demand for automobiles is relatively high due to widespread credit availability as well as excise tax reduction in certain automobiles which reduces overall prices (Runckel 2005). Further, double digit export growth achieved over the recent past is a clear indication of Thailand’s impressive performance as the regional automotive manufacturer and supplier (Runckel 2005). This serves to promote efficient performance of the new industry in the region. This would be highly facilitated by free trade agreements that Thailand has signed with such countries as Australia, China, and India among others as well as the marketing opportunities emerging in the Southern Eastern Asia facilitated by Asia free trade agreement (Runckel 2005). Thailand is friendly to its investors and has developed well outlined investment policies which aim at market liberalization and promotion of free trade (Thailand Board of Investment 2004). The government of Thailand promotes foreign investment through provision of a business environment that eases the process of doing business in the country as well as offering attractive investment locations in the region (Thailand Board of Investment 2004). Through the country’s board of investment, the government offers tax incentives support systems, duty exemptions and reductions especially to foreign companies that contribute to development of skills, technology and innovations to Thailand economy (Thailand Board of Investment 2004). The country’s attitude and treatment of foreign investment provides a condusive environment for Catexhaust to establish its plant in the region and exploit the incentives provided by the government to promote its performance in the industry. Catexhaust’s plant is therefore likely to receive considerable incentives from the government of Thailand if it decides to establish its plant in the region which improves overall business performance. In erms of infrastructure, Thailand has modernized and highly advanced transportation facilities as well as upgraded communication and information technology networks which promote efficiency in business and improve overall living conditions in the region (Thailand Board of Investment 2004). This would facilitate effective transportation of the plant’s raw materials and finished products which would promote efficiency and lead to increased profitability. In 1997, when the Asian currency crisis occurred, the government embarked on implementing measures geared towards attracting foreign investment which had drastically fallen at the time (Jetro 1999) Net FDI inflow in Thailand on balance of payment basis [pic] Prepared by JETRO from Bank of Thailand statistics. Source: http://training. itcilo. it/actrav_cdrom1/english/global/jetro2/inv1-2. html The graph above shows the amount of FDI in Thailand in the period between 1995 and1998. There is a sharp decrease in FDI evident between 1997 and 1998. The yellow portion represents the total fraction of Japan’s investment in Thailand which is one of the major foreign investor in the country. ____________________________________________________________ REASONS FOR FDI MARKET ENTRY MODE ____________________________________________________________ In direct foreign investment, the company stands to gain the highest rewards or incur the highest potential risk (McDaniel 2008). Catexhaust may choose this market entry mode due to lack of suitable investors to engage in joint venture or primarily to avoid communication problems and conflicts of interest prevalent in joint ventures (McDaniel 2008). Further through establishment of a plant in Thailand, the company is able to directly control the activities of the plant in line with its policy which may not be possible under other market entry modes such as joint venture (McDaniel 2008). In addition, through establishment of its own plant in Thailand, Catexhaust is able to reduce the risks of merger failures common in joint ventures and it is therefore the preferred mode of entry into the Thailand market. On the other hand, Catexhaust may choose to engage in a joint venture where the company seeks to buy a part of Thailand’s company consequently merging into one entity (McDaniel 2008). Although this market entry mode consumes relatively less time and resources to access the global market, it is a very risky endeavor and if it is not approached carefully it can lead to devastating effects to the new entity such as bankruptcy or business failure. ____________________________________________________________ __________SHOULD CATEXHAUST ESTABLISH A PLANT IN INDONESIA ____________________________________________________________ ____ The country of Indonesia is located at the crossroads of the Indian and Pacific oceans and it is among the highly populated countries of the world with the largest number of Muslims (Communicaid 2009). The country has an authoritarian system of governance and is constantly dominated by widespread political instability emanating from corruption, terrorism as well as wide spread civil unrests (Communicaid 2009). These factors have negatively impacted on the country’s development consequently slowing down economic progress efforts as well as discouraging foreign investors from venturing in the region (Communicaid 2009). Although major political reforms have taken place in the recent parts, the country still has untapped potential which hinders growth in the economic sector (Communicaid 2009). Indonesia was among the top 20 recipients of inward direct investment in the 1990s (Pecotich 2006) The country further lags behind other major Asian countries in manufacturing production which would negatively impact on establishment of the new plant in the region (OECD 1999). The export platform in the country is growing but at a slow rate and foreign investors still perceives the region as an export location further limiting the overall market potential (OECD 1999). Further, the government of Indonesia still retains a considerable discretion to reject foreign investment despite the liberalization of investment regime in the region and foreign investment approvals involve numerous procedures which are blurred with irregularities and discriminatory behavior against foreign candidates (OECD 1999). This cumbersome process discourages the company from establishing a plant in the region. Moreover, the government tightened restrictions on market access in the automotive sector leading to lack of consistency in the industry which sends confusing signals to potential foreign investors consequently discouraging the German company from establishing its plants in the region (OECD 1999). The automotive industry in the region has also faced great difficulties through out its development and Indonesian automotive manufacturers are constantly facing difficulties brought about by the effects of globalization of manufacturing production and liberalization (Setiono n d). The financial crisis as well as the ensuing IMF- led manufacturing programme impacted great pressure on domestic market rapidly leading to flooding of the domestic market with imported goods and this further limit the market for investors (Setiono n d). Indonesia was also adversely affected by the Asian crisis of 1997 and also implemented measures such as easing the restrictions in mergers and acquisitions by foreign firms and foreign equity ownership since the investment levels had fallen by 29. during the period (Jetro 1999). The graph below represents the trend of foreign direct investment in Indonesia in 1996 and 1997. It indicates the fall in the amount of FDI from the first quarter of 1997 with the third and the fourth quarter recording negative balance of payment. Net FDI Inflow to Indonesia on balance of payment basis |[pic] | Prepared by JETRO from Bank of Indonesia statistics Source: http://training. tcilo. it/actrav_cdrom1/english/global/jetro2/inv1-2. html It is clear that Indonesia’s investment climate and competitiveness is poor relative to the emerging regional economies though the country has achieved remarkable improvement since 2000 (Brondolo et al 2008) In fact, in 2007, Indonesia outranked Thailand and Philippines in terms of investment volumes (Brondolo et al 2008). However, business surveys indicate that the prevalent macro economic instability as well as economic and regulatory olicy uncertainty is a major hindrance to foreign investment and is followed by corruption, labor issues , infrastructural hindrances among other issues (Brondolo et al 2007). Consequently, Thailand is the most suitable location for the German company to set up its plant since it provides a condusive economic environment for its business to thrive. Since Indonesia is characterized by political and economic inst abilities which are likely to affect the overall performance of the company, Catexhaust should establish its plant in Thailand since it is the location that maximizes returns for FDI. However, clear lines of management control are essential to ensure successful establishment and maintenance of the new plant (Weigel 1997). ____________________________________________________________ _________KEY CULTURAL DIFFERENCES A GERMAN MANUFACTURER SHOULD BE CONSIDERING WHEN INVESTING OUTSIDE EUROPE ____________________________________________________________ Every society has its set rules and values which are shared among the citizen and defines the society’s social orientations (McDaniel 2008). The culture of a particular society underlies the family set up, prevalent education systems, religion as well as the social class systems (McDaniel 2008). The German investors must ensure that they uphold these values in their business and marketing strategy of the foreign regions in which it wants to expand its market since they have tremendous effect on consumer preferences (McDaniel 2008). Countries outside Europe have their own customs and traditions that dictate the way they conduct business and this considerably varies from the German business culture (McDaniel 2008). Catexhaust should therefore take into considerations such factors as holiday periods observed in the regions they are investing in, personal and business relationships dominant in these region as well as general attitude of the people towards the products that the company is offering (McDaniel 2008). Failure to put these factors into consideration may result in culture clash which may lead to poor performance of the business in the region. ____________________________________________________________ __________CONCLUSION ____________________________________________________________ ___ As a result of globalization, investing in foreign markets is a commonly preferred means of penetrating markets in the global economy. Companies’ prefer to invest in foreign regions in order to expand their output and consequently benefit from economies of scale. It is therefore important for Catexhaust to establish a plant in Thailand in order to reap the benefits associated with globalization. _ ___________________________________________________________ __________ REFERENCE LIST International Monetary Fund, Fiscal affairs Dept, Silvani, C, Le 2008, Tax Administration Reform And Fiscal Adjustment: The Case Of Indonesia 2001-2007, IMF. Communicaid, 2009. Doing Business in Thailand-Thai Social and Business [Online]. Available at: http://www. communicaid. com/access/pdf/library/culture/doing-business-in/Doing%20Business%20in%20Thailand/. pdf [Accessed11th November 2010] Jetro 1999. White Paper on Foreign Direct Investment; Crisis Hit Countries Deregulate to Attract Foreign Capital. Tokyo, Japan external trade organization. Lamb, C. W. , Hair, F J. , McDaniel C, 2008. Essentials of Marketing, NY: Cengage learning. McDaniel, C. , Gitman, J, L, 2008. The Future of Business: the Essentials, NY: Cengage learning. OECD. 1999. Foreign Direct Investment and Recovery in Southeast Asia. London, OECD publishing. Pecotich, A, 2006. Handbook of Markets and Economies; East Asia, Southeast Asia, Australia, and New Zealand, NY: M. E. Sharpe. Runckel, W. C, 2005. Thailand Automotive Industry Update 2005, Runckel Associates [Online]. Available at: http://www. business-in-asia. com/auto_article2. html [Accessed 11th November 2010] Setiono, M, not dated. Indonesia: Current Situation in the Auto Industry and Its Trade Potential [Online]. Available at: http://www. nescap. org/tid/publication/part_two2223_indo. pdf [Accessed 11th November 2010] Standard Bank, not dated. Organization; Growing a Business [Online]. Available at: http://tutor2u. net/business/gcse/organisation_growing_a_business. htm [Accessed 11th November 2010] Thailand board of investment, 2004. Thailand’s Advantages; The Board of Investment of Thailand [Online]. Available at: http://www. boi. go. th/english/why/thailand_advantages. asp [Accessed 11th November 2010] The Economist, 2010. Pocket World in Figures, 2011 edition, London: profile book ltd. Weigel, R. D, 1997. Foreign Direct Investment. London, World Bank publications.

Friday, March 20, 2020

Kenneth Slessor Essays

Kenneth Slessor Essays Kenneth Slessor Essay Kenneth Slessor Essay Poem 1: Beach burial Kenneth Slessor wrote the poem Beach Burial whilst he completed his occupation as the official Australian Correspondent in the Middle East. Due to Slessors observations of the war at close quarters he soon learnt about the horrific horrors of war. During Slessor’s stay in El Alamein a small village found on the Egypt Mediterranean coast he wrote the poem to describe the realities of war and what realistically happens after heroes are killed. Kenneth Slessor has used imagery and various poetic techniques to establish his purpose to the audience in his poem Beach Burial. Slessor has successfully conveyed his purpose to create a high depth of sympathy and pity for the soldiers who have washed up to the shore after being killed in action or died during the voyage at sea. the poem beach burial is not a typical war poem; there are no celebrations of heroics or patriotic notions. It’s a somber recount slash tribute to soldiers of all nations whether friend or foe who where all united by the common enemy war and death. the poem reflects upon the loss of identity as the soldiers became part of a machine. Which relates to all Australians as at this time in history everyone was affected by the loss of lives fighting for what Slessor though an unnecessary occurrence, which is demonstrated in the poem. The language used in the poem explores a soft tone of onomatopoeic sounds such as HUMBLY SWAYS SOFTLY lulling us into a false sense of calm as the poem continues and uses harsher strident tones such as CHOKE GHOSTLY BEWILDERED PITY to further illuminate the emotional impact the poem carries. Slessor uses Rhyme to create an intense emotional reaction from the audience through the use of the rhyming pattern ABCB as it creates a sense of flow for the audience. Slessors use of half rhyme creates standstills in the poem where the audience are forced to stop and reflect on the realities of war and realize how many men are forgotten after they have served their time and fought humbly for their countries. The line â€Å" wavers and fades, the purple drips the breath of the wet season washed their inscriptions as blue as drowned men’s lips† describes the way the men are forgotten after death. Slessor really tries to make the audience recognise.

Wednesday, March 4, 2020

How to Write a Business Essay

How to Write a Business Essay How to Write a Business Essay Purpose of a Business Essay Writing a business essay is for the purpose of conveying a message, giving information, or convincing the readers to take some sort of action. So, the business essay must be clear and to the point. It is a good idea to make sure you know your audience before you start. This will assist you in creating a good outline that will keep you focused on the task and topic. This also ensures that you effectively demonstrate your point to your audience. Segments of a Business Essay In order to write an effective business essay, you need to be organized and create the essay in relevant segments. These segments are: Purpose of the Essay The Title The Introduction The Body The Conclusion Purpose of the Essay The purpose of your essay is what your topic is about which should be established before you start writing. This is where you come up with your topic, unless you have already been assigned a topic. If you are charged with choosing your own topic, then you will want to write about something you know of, keeps your interest, or sparks your passion. After you choose a topic, then use it to craft your thesis statement, which should be a single sentence about the main idea of your essay. The Title Your title is another important element of your essay because it is what most people will use to decide if they want to read your essay. The title should express the main idea of the essay and be persuasive. For example, â€Å"Get 50% More Traffic to Your Website with these Tips!† is more persuasive than, â€Å"Websites Need Plenty of Traffic.† The Introduction The introduction of your business essay reconfirms your thesis statement and introduces the main idea of your essay to your audience. This should be one paragraph and should give the reader a good idea about the topic covered in the essay. This is another segment where many readers will look to decide if your essay is worth reading. The Body The body of your essay is the meat of the essay. This is where the main content is located and is where you go on to develop your story, based on your research or notes. The body should contain all relevant key points about the topic and it should be informative. The body should also give the reader a call to action, if necessary. The body of the essay should contain a paragraph on each key point about the topic. The Conclusion The conclusion of your essay should sum up the purpose and topic, as well as tie back into your introduction. The introduction contains a purpose statement but the conclusion summarizes the purpose and all relevant key points in the essay. Feel free to get professional Business essay help from top-rated academic writers at our custom writing service. All Business essay papers are written from scratch. Plagiarism-free and high quality are guaranteed.

Monday, February 17, 2020

Markets and Division of Labor Essay Example | Topics and Well Written Essays - 2500 words

Markets and Division of Labor - Essay Example This paper illustrates that social cohesion and division of labour market are the two aspects that have come under association that dates back to several decades. From the olden times to the modern times, the ideas and notion about the market and division of labor whether encourage or discourage has come under numerous discussions and various opinions. Social cohesion comes under classification when the people within a society work in collaboration with each other for a common goal that includes the people coming from cultural diversity. Besides, dedication, acquaintance, and creation of a community are the pivotal aspects that form the social cohesion. Here the people have a shared approach as a single unit surrounded by a committed system, so that the strategies and guiding principles incorporating the economic, social, health and educational assist and support to the society and its members. While the other aspect of the report exhibit the division of labour, which is no new conce pt as it has its origination back to late eighteen century. Although various thinkers and philosophers considered it as a significant principle, but history reveals the fact that Adam Smith was one of the initial people who made an effort to undertake a theory of it. However, this phenomenon in the contemporary time of today has come under vast development that everybody is very much aware of this trend. The division of the labour refers to the area of interest that defines the productive output of the labor that aids in improving the economical growth. This comes under implementation from breaking the bigger activities into smaller chunks that the labor can perform as his expertise that can increase his productivity (Zupi and Puertas, 2010). Historical and authentic substantiation indicates that the few countries of European region initiated an experiment with a core purpose to make its economy liberated from other aspects of life including the social and political control that adm inistered the economic conditions, in order to free the socially rooted markets that subsisted for a very long time. Therefore, the development of the free market came into institution by splitting up the markets that has the origins on social factors. As consequence, a new type of economy came into emergence that did not considered the impacts on society and modified and transformed value of several components including the goods price and labor (Wood, 1984). The Adam’s idea of division of labour articulates that the larger jobs must be divided and break down into small components that can come under relation to the specialized workforce. This makes each worker and labour a proficient and specialist for the areas of production, and hence the efficiency and output of the labour boosts. Nevertheless, this idea of division of labour also hoards quite a few resources including capital and time, as the labours being an expert in a particular component would not have to make excha nge tasks and responsibilities. However, this also leads to an unanticipated issue that the propensity increases that a worker may become ignorant and disappointed from the work because the technological advancements would lead and induce the individuals to perform mundane and repetitious tasks (Reisman, 1976). Smith also states that in order to have a productive labour, they must be assigned the tasks that best fit their capabilities and abilities. This is for the reason that this assignment of labour according to their expertise would lead them to produce substantial and surplus products that can come under reinvestment into the production process. Adam Smith also has a leading concern towards the origins of the value, which has come under recognition in two different forms: use value and exchange value, and concluded that labour is the primary source of value (Reisman, 1976). The data and records provide clear evidences that the division of

Monday, February 3, 2020

How Does the Legacy of Colonialism Contribute to Some of the Economic Essay

How Does the Legacy of Colonialism Contribute to Some of the Economic Issues Facing Caribbean Countries Today - Essay Example Colonialism can be defined as â€Å"the domination of people another country† (Osterhammel & Frisch, 1997, p15). This involves suppressing the inferior culture. These Caribbean countries include Jamaica, Haiti, Cuba, Dominican Republic, and Puerto Rico among others. Caribbean countries have common problems, which include financial stress and lack of sufficient investment; as a result, they face crisis in the credit markets. Nevertheless, colonialism impact on the Caribbean countries is felt up to date. Cuba and Puerto Rico gained independence in 1901 whilst Jamaica and Trinidad gained their independence in 1962 (History of the Caribbean 2012). Colonial governments were mostly undemocratic, and emphasized on divide and rule, which weakened the local power institutions. This paper will discuss the legacy of colonialism in relation to some of the economic issues facing the Caribbean countries. Legacy of colonialism and its contribution to some of the economic issues facing Caribb ean countries today The Caribbean countries struggled, but were full of courage for many years to attain their freedom and democracy as well. These countries have been a target to many developed countries due to their natural resources. However, the Caribbean countries have, over the years, tried to improve their economy to no avail; they have also tried to engage in clothes production, processing of food, and manufacturing of sugar, all of which have ended up in failure. The effects of colonialism have been felt on the Caribbean economy, which have contributed to its weakness. Though the Caribbean countries have attained their independence, some colonial policies hinder the Caribbean economy from excelling, posing as a ground for exploitation. According to The Michael Manley foundation (2006), colonizers of the Caribbean countries benefited greatly from controlling these countries; for instance, slave trade impacted positively on the industrialization of Britain, and as a result, e merging as the wealthiest nation. The colonized countries did advanced partially, as all the profits extracted from their resources benefited the mother countries of the colonizers. In addition, the Caribbean countries were not in a position to produce what they required, but they produced what the colonizers needed (The Michael Manley foundation, 2006). Today, the developed nations continue to benefit from the natural resources of the Caribbean countries with insignificant returns. For instance, Trinidad produces oil while Jamaica produces coffee, bananas, and sugar, all of which are exported to the developed countries. The developed nations use these raw materials to the benefit of their countries, and export the finished goods to the Caribbean countries; as a result, they make huge profits, while the Caribbean countries receive fewer returns. Colonialism encouraged the exportation of agricultural goods; as a result, the Caribbean countries have continued to lay more emphasis on t he exportation of such goods rather than investing in their manufacturing industries by expanding them. If the Caribbean countries would expand on their manufacturing industries, they would gain more profits through exporting finished goods, rather than raw goods, and as a result, boosting their economy. Importing more and exporting less is the trend of the Caribbean countries, this trend began in the colonialism era, where these colonized nations imported goods from the colonizing

Sunday, January 26, 2020

Characteristics of Java Language

Characteristics of Java Language Chapter 2 Literature review About Java:- Initially java language is named as Oak in 1991, which is designed for the consumer electronic appliances. Later in 1995 the name was changed to Java. Java was developed by James Gosling, a development leader in sun micro system. Oak was redesigned in 1995 and changed the name to java for the development of the applications which can be run over internet. Using the java language, java programs can be embedded in to the html pages. Java is not only limited for the web applications, it is also useful to develop the stand alone applications. Java has a feature called OOPs, which make it more familiar. Object oriented programming replaced the old traditional techniques i.e. procedural programming. Characteristics of java:- Simple:- Java language is simple than the previous languages such as c and c++. Java eliminates the pointers concept which is earlier present in c and c++. Java also has a properties i.e. automatic allocation of memory and garbage collection, where as in c/c++ the garbage collection and allocation of memory will be done by the programmer which is a complex task. Object oriented:- All the programming languages apart from the c++ are procedural languages which are paradigm of procedures. Java programming language is object oriented because java uses the concept of the object. In java everything will depend on objects i.e. creating the objects and making objects to work together. The overall functionality of the high level program will depends on the objects. Because java is object oriented program it provides great range of reusability, modularity and flexibility. Distributed:- Java uses the http and ftp which are internet protocols, in order to have access the files over the network. So by using this libraries which are in java can easily make file transfers over the network which is connected to internet. Interpreted:- In order to run the java programs we need interpreter. When the java programs are compiled it produces the byte code, which is machine understandable language. The byte code which is produced after the compilation is machine independent, so that it can run on any system using java interpreter. Most of the compilers will convert the high level language instructions to the low-level machine understandable language as machine cant understand the high level instruction. The machine code can only be executed on that compiled native machine. For example a source code is compile on windows platform, the executable file produced after cant be executed on other platforms apart from the windows. But, coming to java it is different i.e. the source code is compiled once and the executable byte code can be run on any platform using java interpreter. The main functionality of the interpreter is, it converts the byte code to the machine language of the target machine. Robust and secure:- Java programming is more reliable. At the time of the execution time java shows all the errors. In java bad and error prone language constructs are eliminated. Java eliminated the concepts such as pointers, due to this there is no corruption of data and overwriting the memory locations. In the same way java supports the exception-handling, which makes java more reliable and robust. Java forces the programmer to write the code for the exceptions, which may occur during the execution of the program. So that program can be terminated successfully, without any error stopping the execution flow of the program. Java also provides the lot of security. Security is important over the network because the computer will be attacked by the external program. Java provides the security that; it encounters the applets for the un-trusted sources. Architecture- neutral:- Java is a interpreted language, which enables java as a architectural neutral i.e. platform independent. We can write the program once and it can be executed on any platform with the help of the Java Virtual Machine (JVM). The java virtual machine can be embedded on the operating system or on web browser. Once the part of the java code is loaded into the machine, it is verified. Byte code verification play a major role, as it check all the code generated by the compiler will not corrupt the machine on which the code is loaded. At the end of the compilation, byte code verification will be done; in order to make sure thats the code is accurate and correct. So the byte code verification is the integral to the compilation and execution. Due to the property of architectural neutral had by java, it is portable. The program once written can be run on any platform without recompilation. Java does not provide any platform specific features. In other languages, such as Ada where the large integer varies according to the platform it runs. But in the case of java the range of the numbers are fixed. Java environment is portal to every operating system and hardware. Multi-threaded:- It is defined as the programs ability to perform several tasks (or) functions simultaneously. The multithreading property is embedded in the java program. Using the java programs we can perform the several tasks simultaneously without calling any procedures of the operating system, which is done by the other programming languages in order to perform the multi-threading. Constant Pool:- Every program i.e. class in java, has a array of constants in the heap memory called as the constant pool, which is available to that class. Usually it is created by the java compiler. The constants encode all the name of the (methods, variables and constant that are presented in the constant pool) which is used by particular method of any class. Each individual class i.e. stored in heap memory has a count of how many constants are there and also has offset which specifies how far in to the class description itself the array of constants begins (Laura Lemay, Charles L.Perkins, and Micheal Morrison, n.d). The constants are represented (or) typed in the special coded bytes and which has a very well defined format, when these constants are appeared in the .class file for the java class file. JVM instructions refer to the symbolic information in java, rather than relying on the run time layouts of the class, methods and fields. Sun Java Wireless Toolkit:- Sun java wireless toolkit CLDC (connected Limited Device Configuration) is a group of tools which is used to develop the applications for the mobiles and for other wireless equipments (or) devices. Although the sun java wireless toolkit is based on the MIDP (Mobile Information Device Profile), it also supports many other optional packages, which make a sun java wireless toolkit as a great tool for developing many applications. It can be supported on the windows and Linux. All the users who have account on the host machine can access this tool either singly or simultaneously. It allows you to use a byte code obfuscator to reduce the size of your MIDlet suite JAR file. It also supports many other standard Application Programming Interfaces (APIs) which are defined by the (JCP) Java Community Process program. Even though, the sun java wireless toolkit did not come up with an obfuscator, it is configured in a way that it supports the ProGaurd. All you need to do is, just simply to download the ProGuard and place it in the system, which sun java wireless tool kit can find it. But due to the flexible nature of the tool, it allows any kind of the obfuscator. BCEL:- BCEL full abbreviation is Byte Code Engineering library. The BCEL helps you to dig the byte code of the java classes. BCEL gives the utmost power on the code because it works at the individual JVM instructions, even though the power comes with cost in complexity. Using the BCEL, we can transform the existing classes transformation or we can construct the new classes. The main difference between the BCEL and Javassist is javassist provides the source code interface where as the BCEL is developed in the intension to work at the level of the JVM assembly language. BCEL is good because the approach it uses is low level, which is very helpful to control the program at the instruction level. Compared to Javassist it is more complex to work with the BCEL. BCEL has the capability to inspect, to edit and to create binary classes in java. There are 2 hierarchy components in the BCEL, in which one component is used to create the new code and the other component is used to edit (or) update the existing code. The inspection of the class aspect in the BCEL mainly deals with the duplication whatever available in the java platform using the Reflection API. This duplication is necessary (or) mandatory in classworking because we generally dont want to load the classes on which we are working until they are modified fully. Org.apache.bcel.classfile package provides all the definition which is related to inspection-related code.org.apache.bcel package provides the basic constant definitions. JavaClass is a class which is the starting point of the package. The JavaClass plays a role in accessing the information of the class using the BCEL same as like java,lang.Class does using the regular reflection in java. The JavaClass has a methods to get the information like structural information about the super classes and interfaces, to get the information of the class i.e. information about the field and methods in the class. The JavaClass will provide access to the some internal information about the class, including constant pool and identifiers. It also represents the Byte stream which is the complete binary class representation. If the actual binary class is parcel, then we can create the instance for the JavaClass. To handle the parsing BCEL provides a class called org.apache.bcel.Respository. The representation of the classes are parsed and cached by the BCEL by default, which are on the JVM path, to get the actual binary classes representation from the org.apache.bcel.util.respository instance. org.apache.bcel.util.respository is an interface which is source for binary classes representations. Changing the classes:- Not only the accessing the components of class, org.apache.bcel.Classfile.JavaClass also provide certain methods, in order to provide the liberty to change (or) alter the classes. The class component can be set to the new values by using those methods. Although those are of no direct use much, because the other classes in the package dont support constructing the new versions of the components that are building. There are certain classes in the org.apache.bcel.generic package that will provide the editable versions of the same components there in the org.apache.bcel.classfile classes. Org.apache.bcel.generic.ClassGen is the starting step (or) point for the creating the new classes. This also useful to modify the existing classes, to do this one, there is a constructor that takes a JavaClass Instance in order to initialize ClassGen class information. Once you modified the changes to the class, then we get the usable (or) useful class representation from ClassGen instance, in order get the usable representation of the class, we need to call any method that returns the class called JavaClass. Later it will be converted into the binary class information. It is little bit confusing, in order to eliminate this confusion, it is better to write a wrapper class for eliminating some differences. In order to manage the construction of the various class components, org.apache.bcel.generic provides many other classes apart from the ClassGen. It has a class called ConstantPoolGen , which is used to handle the constant pool. FieldGen, MethodGen classes which are used to handle the Fields and the methods in classes. For the working with the sequence of the JVM instructions there is other class called Instruction List. org.apache.bcel.generic also provides the classes for the each and every type instructions which are executed over JVM. We can create the instance for these classes directly some times and in other times by using the helper class called org.apache.generic.InstrcutionFactory. The main advantage of this helper class is, it handles are the book keeping details of the each and every instruction constructing for us( i.e. adding the items to the constant pool as required for the instructions). Sand Mark:- Sandmark is a tool i.e. developed to measure the performance of the software protection algorithms and effectiveness of the methods that are preventing the software from the piracy issues, water tampering and reverse engineering techniques. Sandmark is also has an ability to find which algorithm is most resiliences to the attacks and have a least performance of over head. There are many software protections are proposed both in software and hardware. The hardware protections are there from the dongle protection and now tamper-proof software. The sandmark tool is developed to evaluating and implementing the software-based techniques such as code obfuscation (making code complex to understand) and water tampering. History of reverse engineering:- Reverse engineering most probably starts with Dos (disk operating system) based computer games. The aim is to have full life and armed for the player to finish the final stage of the game. In that way the technique of reverse engineering came in to picture, it is just to find the memory locations where the life and number of weapons are stored and modifying the values of that memory locations. So that, the player can changes the values and gets through the final stage and win the game. Thats why memory cheating tools such as game hack came in to existence. Reverse Engineering:- Reverse engineering is the process of the understanding the particular aspects of the program, which are listed below To identify the components of the system and the interrelationship between the components. And enhance the components of the system and to improve the performance and scalability of the system (or) subsystem. Software reverse engineering is a technique that converts a machine code of a program (string 0s and 1s usually sent to logic processor) back in to the programmable language statements which is called as source code. Software reverse engineering is done to get the source code of the program because to know how the particular parts of the program performs particular operations in order to improve the program functionality or to fix the bugs in the program or to find malicious block of statements in the software if any. Generally, this reverse engineering will take place in older industries on machines. But now it is frequently used on computer hardware and softwar e. The important contents like data formats, algorithms what the programmer used to implement the software and ideas of the programmer (or) company will be revealed to the 3rd person by violating the security and privacy issues using reverse engineering technique. Reverse engineering is evolving as a major link in the software lifecycle, but its growth is hampered by confusion (Elliot J.chilkofsky James H.Cross ii, Jan 1990). Reverse engineering is generally implemented to improve the quality of the product, to observe the competitors products. Forward engineering is the process of moving from the high level abstracts (or) from the initial requirements stage (objectives, constraints and proper solution to the problem), logical, and independent designs (specification of the solution) to the final product i.e. implementation (coding and testing).; whereas the reverse engineering is the process of moving from the final product to the initial requirements stage in order to under the system logically, why particular function (or) action is being performed. By knowing the system logically, the flaws and errors in the system can be rectified and helps to improve the systems functionality when the source code of the application is not available. For this sake the concept of the reverse engineering techniques is evolved. Fig 1: reverse engineering and related process are transformations between or within the abstract levels, represented here in terms of life cycle phases. (Elliot J.chilkofsky James H.Cross ii, Jan 1990) Reverse engineering in and of itself doesnt mean changing the subsystem or developing the new system based on the existing. It is a process of examination (or) understanding the program (or) software but not replication (or) change. Reverse engineering involves very broad range of aspects such as starting from the existing implementation, recreating or recapturing the design ideas and extracts the actual requirements of the existing system. Design recovery is the most vital subset of the reverse engineering because in which knowledge of the domain, external (or) outer side information and deduction or fuzzy reasoning are added to the investigated (or) subjected system in order to find the high level abstract of the system, normally which is not obtained by directly observing the system. According to the Ted BiggerStaff: Students Paper: Ted BiggerStaff: design recovery recreates design abstractions from a combination of code, existing design documentation(if available), personal experience, and general knowledge about problem and application domains. Design recovery must reproduce Re-engineering is termed as renovation and reclamation, is the examination and altering the subjective system again to construct in the new form and the implementation of the new system. Re-engineering involves some form of reverse engineering i.e. to obtain the high level of the abstract of the existing system followed by forward engineering. This may be changes according to the new requirements that were not previously implemented in the system. While re-engineering is not super type of the forward engineering and reverse engineering but it uses the forward engineering and reverse engineering. Objectives:- The primary goal of the reverse engineering is to enhance the overall comprehensibility of the system for the both maintenance and new development. Cope up with the complexity. In order to meet the complexity and shear volumes of the system we have to develop a better methods i.e. automated support. In order to extract the relevant information reverse engineering methods and tools should be combined with the CASE environments. So that decision makers can control the process and product in system evolutions. Alternative views should be generated. Comprehension aids such as graphic representation as been accepted for long time. However maintaining and creating them is becoming difficult in the process. Reverse engineering facilitates the generation or regeneration of the graphical representation in the other forms. While many designers work on single diagrams such as data flow diagrams where as the reverse engineering tools will give the other graphical representations such as control flow diagrams, entity relation diagrams and structure charts to aid the review and verification process. To identify the side effects. Both haphazard initial design and intentional modifications to the system can lead to unintentional ramifications and side effects that affect the system performance. Reverse engineering can provide better observation than we can observe by forward engineering perspective. So it makes us to solve that ramifications and anomalies before users intimate them as bugs. Component reuse. Software reusability is becoming the more essential part in developing the new products in the software field. Reverse engineering can be able to help to detect the candidates for reusable components from the present system. To recover the lost information. When the continuous evolution of the long lived system which will lead to loss of information. In order to preserve the old information of the system design; design recovery of reverse engineering techniques is used. Many reverse engineering tools try to extract the structure of the legacy systems with the intension to pass this information to software engineers in order to re-engineer or to reverse engineer the existing component. Code reverse engineering:- During the evolution of the software, many changes will apply to the code, to add any functionality which is to be added and to change the code in order to rectify the defect and enhance the systems performance (or) quality. Systems with the poor documentation only the code will be reliable solution to get information about the system. As a result, the process of reverse engineering is focused on understanding the code. Thus reverse engineering has good and bad ends. Obfuscation:- Java provides platform independence to the software programs so that software programs will run independently on any platform. All the programs are compiled in order get intermediate code format i.e. A class file consists of a stream of very large amount of information regarding the program methods, variable and constant enough to do reverse engineering. When a company develops the program (or) software in java and sell this product in intermediate code format to the other organization by not giving the original software. The organization who buys the program (or) software will simply change (or) modify the software by violating the security and privacy issues of authorised company; by simply applying the reverse engineering technique. This reverse engineering will be done by the software developers, automated tools and decompilers. Java byte code can be easily decompiled, which makes reverse engineering technique easier in java. In programming context Obfuscation is described as, making program code more difficult to read and understand for security and privacy purposes of the software. Decompilers can easily extract the source code from the compiled code, in that point of view protecting the code secretly will make impossible. So the growth of obfuscators increased rapidly in order to keep effectively smoke screen around the code. Code obfuscation is the one of the most prominent and best method to protect the java code securely. Code obfuscation makes program to understand difficult. So that code will be more resistant to the reverse engineering. There are 2 byte code obfuscation techniques that are: source code obfuscation byte code obfuscation Source code technique is simply changing the source code of the program, where as byte code obfuscation is changing the classfile of the program (functionality is same as the source code). There several obfuscation techniques to prevent java byte code from decompilation. For example consider a set of class files, S, becomes another set of class files S through an obfuscator. Here the set of class files of s and s are different, but they produce the same output. Example:- class OHello { public OHello() { int num=1; } public String gHello(String hname){ return hname; } when the above code is passed through the simple obfuscator (such as Klass Master), the following code will be generated. class aa { public static boolean aa; public aa() { int aa=1; } public String aa(String ba){ return ba; } By observing the above code the class name OHello is changed to the aa and the gHello method name is changed to the aa. It is more difficult to read the program with aa than a OHello. By this way less information will be interpreted and understand to the reverse engineers. This is just a simple example by renaming the class variables and class method names. Categories of obfuscation techniques:- Description of Obfuscation techniques:- One way of obfuscating the source program by the obfuscators is replacing a symbol of a class file by illegal string. The replacement might be the private are even worst ***. Other techniques usually obfuscator will use targeting the specific decompilers (Mocha and Jode) is inserting a bad instruction in the code. The example is Let us taken an example with bad instruction, lets take the original code (decompiled): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return and after obfuscation the code is as follows (names are not changed, not to make complex): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return 7 pop By observing the above routine we notice that a pop instruction is added after the return statement. The last and final statement in the method that has return type should be return statement, but in the above routine a pop keyword is inserted which make the routine not to be executed for ever. Lexical obfuscation:- Lexical obfuscation changes the lexical structure of a program by scrambling the identifiers. All the names of classes, fields and methods which are meaningful symbolic information of java program, is renamed with meaningless name i.e. useless names. An example obfuscator for lexical obfuscation is crema. Obfuscator is defined as the program that automatically makes the transformation in the classfile in order obfuscate the classfile, to undo the reverse engineering technique to produce the source code from the class file. Layout obfuscation:- Layout obfuscation dealt with changing the layout structure of the program i.e. done by 2 basic methods Renaming the identifiers Removing the debugging information. Above 2 will make program code less informative to the reverse engineers. Layout obfuscation techniques use the one way functions such renaming the identifiers by random symbols, removing the comments, unused methods and debugging information. Though the reverse engineers can understand the obfuscated code i.e. done by layout obfuscation, it consumes the cost of reverse engineering. Layout obfuscation techniques are most commonly used in the code obfuscation. All most all obfuscators of java will use these techniques. Control obfuscation:- Changing the control flow of the program. It is easiest way to do and which make reverse engineer to find the code what exactly. For example consider a code in which a there is a method A(). Here another new method called A_Dummy() will be created and in the program Data Obfuscation:- Data obfuscation mainly deals with breaking up the data structures used in the program and encrypting the literals. This includes changing the inheritance, restructuring the arrays, making the variable names constant etc. In that way data obfuscation affect the data structures of the program. Thus data obfuscation make impossible to obtain the original source code of the program. More viable source code obfuscation methods are based on composite functions, which are Array Index Transformation, Method Argument Transformation, and Hiding Constant. The obfuscation techniques that are based on composite functions make the computation complex and extensive use of these techniques make the software to respond slowly. Some source code obfuscation methods are directed at the object oriented concept; Class Coalescing, Class splitting, and Type Hiding. Other source code obfuscation techniques may include; false refactoring, restructure arrays, inline and outline methods, clone methods, split v ariables, convert static to procedural data, and merge scalar variables. The obfuscation techniques that work over object oriented concept and other techniques like restructure arrays, split variables, merge scalar variables may distort the logic of the software, so these must be carefully used. The employment of obfuscation technique like outline methods, clone methods, convert static to procedural data increase the size of a class file without providing any significant advantage. In lining a method results in an unresolved method call when some other class calls the in lined method. Advanced obfuscation techniques for byte code:- There are several obfuscation techniques to prevent java byte code from de-compilation. Many of these tools are simply to change the names of the identifiers with the meaningless names which are stored in byte code. Many crackers can understand the actual source code, even though identifier name are changed, but it will take more time to understand. Traditionally, when a program is compiled to machine code, most of the symbolic information will be stripped off, after the compilation of the program. When the program is compiled, the address of the variable and functions of the program will be denoted by the identifiers. Even though de-compilation of such compiled code is difficult, but still it is possible to decompile the code. We say protection techniques are difficult if and only if the time and effort taken by the cracker to crack the software should be with more cost and effort. Cracking time to crack software is more than a re-writing a program, then its of no use and waste of time and valueless. Java became the most popular because of benefits that it is providing. One of the major benefits is portability i.e. compiled program can run on any platform i.e. platform independent. When the program is compiled it produces independent byte code. Java uses the symbolic references rather than the traditional memory addresses. Therefore, the names of methods and, variables and types are stored in a constant pool with in a byte code file. There are many commercial de-compilers (P C, 2001, Vliot 1996, hoeniche 2001 etc.). When the program is decompiled, it extracts the program almost identical to the source code. Making use of decompiler to extract the source code becomes the lethal weapon to intellectual property piracy. Obfuscation technique is used to stop de-compilation of the byte code. The main aim of obfuscation technique is to make decompiled program harder to understand i.e. more time and effort to understand the obfuscated code. Obfuscation scope:- Java application consists of one or more packages. A programmer might divide the program in to packages. He can also use the packages that are in standard library and proprietary libraries. Only the part of the program developed by the developer will be given outside. The proprietary library is not distributed due to the copyright restrictions. Obfuscation scope termed as the part of the program obfuscated by the obfuscation techniques, i.e. the part of the program/software developed by the developer is protected not the entire software. The package that serves as the utilities for the standard library and proprietary libraries not obfuscated. Candidates considered for identifiers scrambling:- An identifier will denote the following terms in java http://www.cis.nctu.edu.tw/~wuuyang/papers/Obfuscation20011123.doc the bytecode file. By default, parameters and local variables are stripped and deleted (or) removed from the byte code. The names of the local variables and parameters are stored in the LocalVariableTable in the byte code, if the debug info is enabled. But, by default the de-bug info is enabled in java compiler. If the local variable is not found, de-compilers itself create the names for local variable and parameter, which makes program after reverse somewhat understandable. Even, if we rename the names of the variables and parameter in LocalVariableTable, good decompiler will simply Characteristics of Java Language Characteristics of Java Language Chapter 2 Literature review About Java:- Initially java language is named as Oak in 1991, which is designed for the consumer electronic appliances. Later in 1995 the name was changed to Java. Java was developed by James Gosling, a development leader in sun micro system. Oak was redesigned in 1995 and changed the name to java for the development of the applications which can be run over internet. Using the java language, java programs can be embedded in to the html pages. Java is not only limited for the web applications, it is also useful to develop the stand alone applications. Java has a feature called OOPs, which make it more familiar. Object oriented programming replaced the old traditional techniques i.e. procedural programming. Characteristics of java:- Simple:- Java language is simple than the previous languages such as c and c++. Java eliminates the pointers concept which is earlier present in c and c++. Java also has a properties i.e. automatic allocation of memory and garbage collection, where as in c/c++ the garbage collection and allocation of memory will be done by the programmer which is a complex task. Object oriented:- All the programming languages apart from the c++ are procedural languages which are paradigm of procedures. Java programming language is object oriented because java uses the concept of the object. In java everything will depend on objects i.e. creating the objects and making objects to work together. The overall functionality of the high level program will depends on the objects. Because java is object oriented program it provides great range of reusability, modularity and flexibility. Distributed:- Java uses the http and ftp which are internet protocols, in order to have access the files over the network. So by using this libraries which are in java can easily make file transfers over the network which is connected to internet. Interpreted:- In order to run the java programs we need interpreter. When the java programs are compiled it produces the byte code, which is machine understandable language. The byte code which is produced after the compilation is machine independent, so that it can run on any system using java interpreter. Most of the compilers will convert the high level language instructions to the low-level machine understandable language as machine cant understand the high level instruction. The machine code can only be executed on that compiled native machine. For example a source code is compile on windows platform, the executable file produced after cant be executed on other platforms apart from the windows. But, coming to java it is different i.e. the source code is compiled once and the executable byte code can be run on any platform using java interpreter. The main functionality of the interpreter is, it converts the byte code to the machine language of the target machine. Robust and secure:- Java programming is more reliable. At the time of the execution time java shows all the errors. In java bad and error prone language constructs are eliminated. Java eliminated the concepts such as pointers, due to this there is no corruption of data and overwriting the memory locations. In the same way java supports the exception-handling, which makes java more reliable and robust. Java forces the programmer to write the code for the exceptions, which may occur during the execution of the program. So that program can be terminated successfully, without any error stopping the execution flow of the program. Java also provides the lot of security. Security is important over the network because the computer will be attacked by the external program. Java provides the security that; it encounters the applets for the un-trusted sources. Architecture- neutral:- Java is a interpreted language, which enables java as a architectural neutral i.e. platform independent. We can write the program once and it can be executed on any platform with the help of the Java Virtual Machine (JVM). The java virtual machine can be embedded on the operating system or on web browser. Once the part of the java code is loaded into the machine, it is verified. Byte code verification play a major role, as it check all the code generated by the compiler will not corrupt the machine on which the code is loaded. At the end of the compilation, byte code verification will be done; in order to make sure thats the code is accurate and correct. So the byte code verification is the integral to the compilation and execution. Due to the property of architectural neutral had by java, it is portable. The program once written can be run on any platform without recompilation. Java does not provide any platform specific features. In other languages, such as Ada where the large integer varies according to the platform it runs. But in the case of java the range of the numbers are fixed. Java environment is portal to every operating system and hardware. Multi-threaded:- It is defined as the programs ability to perform several tasks (or) functions simultaneously. The multithreading property is embedded in the java program. Using the java programs we can perform the several tasks simultaneously without calling any procedures of the operating system, which is done by the other programming languages in order to perform the multi-threading. Constant Pool:- Every program i.e. class in java, has a array of constants in the heap memory called as the constant pool, which is available to that class. Usually it is created by the java compiler. The constants encode all the name of the (methods, variables and constant that are presented in the constant pool) which is used by particular method of any class. Each individual class i.e. stored in heap memory has a count of how many constants are there and also has offset which specifies how far in to the class description itself the array of constants begins (Laura Lemay, Charles L.Perkins, and Micheal Morrison, n.d). The constants are represented (or) typed in the special coded bytes and which has a very well defined format, when these constants are appeared in the .class file for the java class file. JVM instructions refer to the symbolic information in java, rather than relying on the run time layouts of the class, methods and fields. Sun Java Wireless Toolkit:- Sun java wireless toolkit CLDC (connected Limited Device Configuration) is a group of tools which is used to develop the applications for the mobiles and for other wireless equipments (or) devices. Although the sun java wireless toolkit is based on the MIDP (Mobile Information Device Profile), it also supports many other optional packages, which make a sun java wireless toolkit as a great tool for developing many applications. It can be supported on the windows and Linux. All the users who have account on the host machine can access this tool either singly or simultaneously. It allows you to use a byte code obfuscator to reduce the size of your MIDlet suite JAR file. It also supports many other standard Application Programming Interfaces (APIs) which are defined by the (JCP) Java Community Process program. Even though, the sun java wireless toolkit did not come up with an obfuscator, it is configured in a way that it supports the ProGaurd. All you need to do is, just simply to download the ProGuard and place it in the system, which sun java wireless tool kit can find it. But due to the flexible nature of the tool, it allows any kind of the obfuscator. BCEL:- BCEL full abbreviation is Byte Code Engineering library. The BCEL helps you to dig the byte code of the java classes. BCEL gives the utmost power on the code because it works at the individual JVM instructions, even though the power comes with cost in complexity. Using the BCEL, we can transform the existing classes transformation or we can construct the new classes. The main difference between the BCEL and Javassist is javassist provides the source code interface where as the BCEL is developed in the intension to work at the level of the JVM assembly language. BCEL is good because the approach it uses is low level, which is very helpful to control the program at the instruction level. Compared to Javassist it is more complex to work with the BCEL. BCEL has the capability to inspect, to edit and to create binary classes in java. There are 2 hierarchy components in the BCEL, in which one component is used to create the new code and the other component is used to edit (or) update the existing code. The inspection of the class aspect in the BCEL mainly deals with the duplication whatever available in the java platform using the Reflection API. This duplication is necessary (or) mandatory in classworking because we generally dont want to load the classes on which we are working until they are modified fully. Org.apache.bcel.classfile package provides all the definition which is related to inspection-related code.org.apache.bcel package provides the basic constant definitions. JavaClass is a class which is the starting point of the package. The JavaClass plays a role in accessing the information of the class using the BCEL same as like java,lang.Class does using the regular reflection in java. The JavaClass has a methods to get the information like structural information about the super classes and interfaces, to get the information of the class i.e. information about the field and methods in the class. The JavaClass will provide access to the some internal information about the class, including constant pool and identifiers. It also represents the Byte stream which is the complete binary class representation. If the actual binary class is parcel, then we can create the instance for the JavaClass. To handle the parsing BCEL provides a class called org.apache.bcel.Respository. The representation of the classes are parsed and cached by the BCEL by default, which are on the JVM path, to get the actual binary classes representation from the org.apache.bcel.util.respository instance. org.apache.bcel.util.respository is an interface which is source for binary classes representations. Changing the classes:- Not only the accessing the components of class, org.apache.bcel.Classfile.JavaClass also provide certain methods, in order to provide the liberty to change (or) alter the classes. The class component can be set to the new values by using those methods. Although those are of no direct use much, because the other classes in the package dont support constructing the new versions of the components that are building. There are certain classes in the org.apache.bcel.generic package that will provide the editable versions of the same components there in the org.apache.bcel.classfile classes. Org.apache.bcel.generic.ClassGen is the starting step (or) point for the creating the new classes. This also useful to modify the existing classes, to do this one, there is a constructor that takes a JavaClass Instance in order to initialize ClassGen class information. Once you modified the changes to the class, then we get the usable (or) useful class representation from ClassGen instance, in order get the usable representation of the class, we need to call any method that returns the class called JavaClass. Later it will be converted into the binary class information. It is little bit confusing, in order to eliminate this confusion, it is better to write a wrapper class for eliminating some differences. In order to manage the construction of the various class components, org.apache.bcel.generic provides many other classes apart from the ClassGen. It has a class called ConstantPoolGen , which is used to handle the constant pool. FieldGen, MethodGen classes which are used to handle the Fields and the methods in classes. For the working with the sequence of the JVM instructions there is other class called Instruction List. org.apache.bcel.generic also provides the classes for the each and every type instructions which are executed over JVM. We can create the instance for these classes directly some times and in other times by using the helper class called org.apache.generic.InstrcutionFactory. The main advantage of this helper class is, it handles are the book keeping details of the each and every instruction constructing for us( i.e. adding the items to the constant pool as required for the instructions). Sand Mark:- Sandmark is a tool i.e. developed to measure the performance of the software protection algorithms and effectiveness of the methods that are preventing the software from the piracy issues, water tampering and reverse engineering techniques. Sandmark is also has an ability to find which algorithm is most resiliences to the attacks and have a least performance of over head. There are many software protections are proposed both in software and hardware. The hardware protections are there from the dongle protection and now tamper-proof software. The sandmark tool is developed to evaluating and implementing the software-based techniques such as code obfuscation (making code complex to understand) and water tampering. History of reverse engineering:- Reverse engineering most probably starts with Dos (disk operating system) based computer games. The aim is to have full life and armed for the player to finish the final stage of the game. In that way the technique of reverse engineering came in to picture, it is just to find the memory locations where the life and number of weapons are stored and modifying the values of that memory locations. So that, the player can changes the values and gets through the final stage and win the game. Thats why memory cheating tools such as game hack came in to existence. Reverse Engineering:- Reverse engineering is the process of the understanding the particular aspects of the program, which are listed below To identify the components of the system and the interrelationship between the components. And enhance the components of the system and to improve the performance and scalability of the system (or) subsystem. Software reverse engineering is a technique that converts a machine code of a program (string 0s and 1s usually sent to logic processor) back in to the programmable language statements which is called as source code. Software reverse engineering is done to get the source code of the program because to know how the particular parts of the program performs particular operations in order to improve the program functionality or to fix the bugs in the program or to find malicious block of statements in the software if any. Generally, this reverse engineering will take place in older industries on machines. But now it is frequently used on computer hardware and softwar e. The important contents like data formats, algorithms what the programmer used to implement the software and ideas of the programmer (or) company will be revealed to the 3rd person by violating the security and privacy issues using reverse engineering technique. Reverse engineering is evolving as a major link in the software lifecycle, but its growth is hampered by confusion (Elliot J.chilkofsky James H.Cross ii, Jan 1990). Reverse engineering is generally implemented to improve the quality of the product, to observe the competitors products. Forward engineering is the process of moving from the high level abstracts (or) from the initial requirements stage (objectives, constraints and proper solution to the problem), logical, and independent designs (specification of the solution) to the final product i.e. implementation (coding and testing).; whereas the reverse engineering is the process of moving from the final product to the initial requirements stage in order to under the system logically, why particular function (or) action is being performed. By knowing the system logically, the flaws and errors in the system can be rectified and helps to improve the systems functionality when the source code of the application is not available. For this sake the concept of the reverse engineering techniques is evolved. Fig 1: reverse engineering and related process are transformations between or within the abstract levels, represented here in terms of life cycle phases. (Elliot J.chilkofsky James H.Cross ii, Jan 1990) Reverse engineering in and of itself doesnt mean changing the subsystem or developing the new system based on the existing. It is a process of examination (or) understanding the program (or) software but not replication (or) change. Reverse engineering involves very broad range of aspects such as starting from the existing implementation, recreating or recapturing the design ideas and extracts the actual requirements of the existing system. Design recovery is the most vital subset of the reverse engineering because in which knowledge of the domain, external (or) outer side information and deduction or fuzzy reasoning are added to the investigated (or) subjected system in order to find the high level abstract of the system, normally which is not obtained by directly observing the system. According to the Ted BiggerStaff: Students Paper: Ted BiggerStaff: design recovery recreates design abstractions from a combination of code, existing design documentation(if available), personal experience, and general knowledge about problem and application domains. Design recovery must reproduce Re-engineering is termed as renovation and reclamation, is the examination and altering the subjective system again to construct in the new form and the implementation of the new system. Re-engineering involves some form of reverse engineering i.e. to obtain the high level of the abstract of the existing system followed by forward engineering. This may be changes according to the new requirements that were not previously implemented in the system. While re-engineering is not super type of the forward engineering and reverse engineering but it uses the forward engineering and reverse engineering. Objectives:- The primary goal of the reverse engineering is to enhance the overall comprehensibility of the system for the both maintenance and new development. Cope up with the complexity. In order to meet the complexity and shear volumes of the system we have to develop a better methods i.e. automated support. In order to extract the relevant information reverse engineering methods and tools should be combined with the CASE environments. So that decision makers can control the process and product in system evolutions. Alternative views should be generated. Comprehension aids such as graphic representation as been accepted for long time. However maintaining and creating them is becoming difficult in the process. Reverse engineering facilitates the generation or regeneration of the graphical representation in the other forms. While many designers work on single diagrams such as data flow diagrams where as the reverse engineering tools will give the other graphical representations such as control flow diagrams, entity relation diagrams and structure charts to aid the review and verification process. To identify the side effects. Both haphazard initial design and intentional modifications to the system can lead to unintentional ramifications and side effects that affect the system performance. Reverse engineering can provide better observation than we can observe by forward engineering perspective. So it makes us to solve that ramifications and anomalies before users intimate them as bugs. Component reuse. Software reusability is becoming the more essential part in developing the new products in the software field. Reverse engineering can be able to help to detect the candidates for reusable components from the present system. To recover the lost information. When the continuous evolution of the long lived system which will lead to loss of information. In order to preserve the old information of the system design; design recovery of reverse engineering techniques is used. Many reverse engineering tools try to extract the structure of the legacy systems with the intension to pass this information to software engineers in order to re-engineer or to reverse engineer the existing component. Code reverse engineering:- During the evolution of the software, many changes will apply to the code, to add any functionality which is to be added and to change the code in order to rectify the defect and enhance the systems performance (or) quality. Systems with the poor documentation only the code will be reliable solution to get information about the system. As a result, the process of reverse engineering is focused on understanding the code. Thus reverse engineering has good and bad ends. Obfuscation:- Java provides platform independence to the software programs so that software programs will run independently on any platform. All the programs are compiled in order get intermediate code format i.e. A class file consists of a stream of very large amount of information regarding the program methods, variable and constant enough to do reverse engineering. When a company develops the program (or) software in java and sell this product in intermediate code format to the other organization by not giving the original software. The organization who buys the program (or) software will simply change (or) modify the software by violating the security and privacy issues of authorised company; by simply applying the reverse engineering technique. This reverse engineering will be done by the software developers, automated tools and decompilers. Java byte code can be easily decompiled, which makes reverse engineering technique easier in java. In programming context Obfuscation is described as, making program code more difficult to read and understand for security and privacy purposes of the software. Decompilers can easily extract the source code from the compiled code, in that point of view protecting the code secretly will make impossible. So the growth of obfuscators increased rapidly in order to keep effectively smoke screen around the code. Code obfuscation is the one of the most prominent and best method to protect the java code securely. Code obfuscation makes program to understand difficult. So that code will be more resistant to the reverse engineering. There are 2 byte code obfuscation techniques that are: source code obfuscation byte code obfuscation Source code technique is simply changing the source code of the program, where as byte code obfuscation is changing the classfile of the program (functionality is same as the source code). There several obfuscation techniques to prevent java byte code from decompilation. For example consider a set of class files, S, becomes another set of class files S through an obfuscator. Here the set of class files of s and s are different, but they produce the same output. Example:- class OHello { public OHello() { int num=1; } public String gHello(String hname){ return hname; } when the above code is passed through the simple obfuscator (such as Klass Master), the following code will be generated. class aa { public static boolean aa; public aa() { int aa=1; } public String aa(String ba){ return ba; } By observing the above code the class name OHello is changed to the aa and the gHello method name is changed to the aa. It is more difficult to read the program with aa than a OHello. By this way less information will be interpreted and understand to the reverse engineers. This is just a simple example by renaming the class variables and class method names. Categories of obfuscation techniques:- Description of Obfuscation techniques:- One way of obfuscating the source program by the obfuscators is replacing a symbol of a class file by illegal string. The replacement might be the private are even worst ***. Other techniques usually obfuscator will use targeting the specific decompilers (Mocha and Jode) is inserting a bad instruction in the code. The example is Let us taken an example with bad instruction, lets take the original code (decompiled): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return and after obfuscation the code is as follows (names are not changed, not to make complex): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return 7 pop By observing the above routine we notice that a pop instruction is added after the return statement. The last and final statement in the method that has return type should be return statement, but in the above routine a pop keyword is inserted which make the routine not to be executed for ever. Lexical obfuscation:- Lexical obfuscation changes the lexical structure of a program by scrambling the identifiers. All the names of classes, fields and methods which are meaningful symbolic information of java program, is renamed with meaningless name i.e. useless names. An example obfuscator for lexical obfuscation is crema. Obfuscator is defined as the program that automatically makes the transformation in the classfile in order obfuscate the classfile, to undo the reverse engineering technique to produce the source code from the class file. Layout obfuscation:- Layout obfuscation dealt with changing the layout structure of the program i.e. done by 2 basic methods Renaming the identifiers Removing the debugging information. Above 2 will make program code less informative to the reverse engineers. Layout obfuscation techniques use the one way functions such renaming the identifiers by random symbols, removing the comments, unused methods and debugging information. Though the reverse engineers can understand the obfuscated code i.e. done by layout obfuscation, it consumes the cost of reverse engineering. Layout obfuscation techniques are most commonly used in the code obfuscation. All most all obfuscators of java will use these techniques. Control obfuscation:- Changing the control flow of the program. It is easiest way to do and which make reverse engineer to find the code what exactly. For example consider a code in which a there is a method A(). Here another new method called A_Dummy() will be created and in the program Data Obfuscation:- Data obfuscation mainly deals with breaking up the data structures used in the program and encrypting the literals. This includes changing the inheritance, restructuring the arrays, making the variable names constant etc. In that way data obfuscation affect the data structures of the program. Thus data obfuscation make impossible to obtain the original source code of the program. More viable source code obfuscation methods are based on composite functions, which are Array Index Transformation, Method Argument Transformation, and Hiding Constant. The obfuscation techniques that are based on composite functions make the computation complex and extensive use of these techniques make the software to respond slowly. Some source code obfuscation methods are directed at the object oriented concept; Class Coalescing, Class splitting, and Type Hiding. Other source code obfuscation techniques may include; false refactoring, restructure arrays, inline and outline methods, clone methods, split v ariables, convert static to procedural data, and merge scalar variables. The obfuscation techniques that work over object oriented concept and other techniques like restructure arrays, split variables, merge scalar variables may distort the logic of the software, so these must be carefully used. The employment of obfuscation technique like outline methods, clone methods, convert static to procedural data increase the size of a class file without providing any significant advantage. In lining a method results in an unresolved method call when some other class calls the in lined method. Advanced obfuscation techniques for byte code:- There are several obfuscation techniques to prevent java byte code from de-compilation. Many of these tools are simply to change the names of the identifiers with the meaningless names which are stored in byte code. Many crackers can understand the actual source code, even though identifier name are changed, but it will take more time to understand. Traditionally, when a program is compiled to machine code, most of the symbolic information will be stripped off, after the compilation of the program. When the program is compiled, the address of the variable and functions of the program will be denoted by the identifiers. Even though de-compilation of such compiled code is difficult, but still it is possible to decompile the code. We say protection techniques are difficult if and only if the time and effort taken by the cracker to crack the software should be with more cost and effort. Cracking time to crack software is more than a re-writing a program, then its of no use and waste of time and valueless. Java became the most popular because of benefits that it is providing. One of the major benefits is portability i.e. compiled program can run on any platform i.e. platform independent. When the program is compiled it produces independent byte code. Java uses the symbolic references rather than the traditional memory addresses. Therefore, the names of methods and, variables and types are stored in a constant pool with in a byte code file. There are many commercial de-compilers (P C, 2001, Vliot 1996, hoeniche 2001 etc.). When the program is decompiled, it extracts the program almost identical to the source code. Making use of decompiler to extract the source code becomes the lethal weapon to intellectual property piracy. Obfuscation technique is used to stop de-compilation of the byte code. The main aim of obfuscation technique is to make decompiled program harder to understand i.e. more time and effort to understand the obfuscated code. Obfuscation scope:- Java application consists of one or more packages. A programmer might divide the program in to packages. He can also use the packages that are in standard library and proprietary libraries. Only the part of the program developed by the developer will be given outside. The proprietary library is not distributed due to the copyright restrictions. Obfuscation scope termed as the part of the program obfuscated by the obfuscation techniques, i.e. the part of the program/software developed by the developer is protected not the entire software. The package that serves as the utilities for the standard library and proprietary libraries not obfuscated. Candidates considered for identifiers scrambling:- An identifier will denote the following terms in java http://www.cis.nctu.edu.tw/~wuuyang/papers/Obfuscation20011123.doc the bytecode file. By default, parameters and local variables are stripped and deleted (or) removed from the byte code. The names of the local variables and parameters are stored in the LocalVariableTable in the byte code, if the debug info is enabled. But, by default the de-bug info is enabled in java compiler. If the local variable is not found, de-compilers itself create the names for local variable and parameter, which makes program after reverse somewhat understandable. Even, if we rename the names of the variables and parameter in LocalVariableTable, good decompiler will simply