Monday, September 30, 2019

Pre Natal Diognostic Techniques Health And Social Care Essay

The Pre-natal Diagnostic Techniques ( Regulation and Prevention of Misuse ) Act, 1994, was enacted and brought into operation from 1st January, 1996, in order to look into female foeticide in India. Rules have besides been framed under the Act. The Act prohibits finding and revelation of the sex of fetus i.e. antenatal sex understanding by misapplying different pre-natal diagnostic techniques and processs. It besides prohibits any advertizements associating to pre-natal finding of sex and prescribes penalty for its dispute. Any individual who contravenes the commissariats of this Act is punishable with imprisonment and mulct. Recently, PNDT Act[ 1 ]and Rules[ 2 ]have been amended maintaining in position the emerging engineerings and new pre-natal diagnostic techniques for choice of sex before and after construct and jobs faced in the working of execution of the ACT and certain waies of Hon'ble Supreme Court after a PIL was filed in May, 2000 by CEHAT and Ors, an NGO on slow execution of the Act. These amendments have come into operation with consequence from 14th February, 2003PRE-NATAL DIOGNOSTIC TECHNIQUES AND PROCEDURESPrenatal diagnostic proving involves proving the fetus before the birth ( prenatally ) inorder to find as to whether the fetus has certain abnormalcies, including certain familial or self-generated familial upsets. Some of these trials, such as echography and certain blood trials, are frequently portion of everyday prenatal attention. Ultrasonography and blood trials are safe and sometimes assist find whether more invasive antenatal familial trials ( such as chorionic villus sampling, am niocentesis, and transdermal umbilical blood sampling ) are needed. Prenatal diagnosing enables early diagnosing of inborn anomalousnesss and familial upsets in the underdeveloped embryo. The population hazard of holding a kid with some inborn abnormalcy, whether genetically and/or environmentally determined, varies between 3 and 5 % . In households at hazard of a familial upset the chance of holding an affected kid can transcend several fold the population hazard, hence in these households prenatal diagnostic processs should be purely applied.[ 3 ] Advanced conceive ofing techniques every bit good as cytogenetic and molecular biological science methods provide the agencies to name prenatally legion inborn structural deformities and familial upsets in high- hazard households. Early diagnosing in utero can turn out indispensable to direction of the gestation, antenatal and postpartum medical attention, and intervention. It is besides important to doing informed determinations about go oning or ending the gestation. Familial guidance in association with modern antenatal diagnostic processs constitutes a basic component of bar of inborn anomalousnesss and familial upsets. The procedure of antenatal guidance and diagnosing is committed chiefly to reassigning information which aims to assist the parents: – 1. To understand and admit the indicants for antenatal diagnosing, 2. To understand the medical facets of doing the diagnosing of a familial disease or a inborn abnormalcy ( by qualifying the upset, form of heritage, the hazard of holding an affected kid in consecutive coevalss ) , 3. To do informed picks about the adequate for a given pathology and acceptable diagnostic strategy ( by depicting the possible diagnostic methods and processs, their benefits, restrictions and hazards ) . Harmonizing to World Health Organisation ( WHO ) and European Commission ‘s recommendations, antenatal diagnosing should be voluntary and performed merely in order to get cognition about fetal wellness position ( as described by medical indicants ) . Feasibility of antenatal diagnosing should be equal, just, and available to anyone, irrespective of the twosome ‘s or medical practician ‘s attitude towards expiration of gestation. In instance of having an unnatural consequence, the determination about expiration of the gestation should be made independently by the adult female or the twosome. Peoples doing such determinations should non be discriminated against, whatever determination they have made: either ending the gestation or giving birth to a disabled kid. Methods of antenatal diagnosing can be divided into: – ( a ) Non-Invasive ; and ( B ) Invasive techniques.NON-INVASIVE PROCEDURESNon-Invasive techniques are used for naming inborn anomalousnesss and hazard appraisal of given familial upsets ( testing ) aˆ? Ultrasound: Routine obstetric ultrasound scan: – Everyday obstetric ultrasound scanning performed by the obstetrician pull offing the gestation. Standards for normal gestations provide for four scans carried out at: 11-14 hebdomads, 21-26 hebdomads, 27-32 hebdomads, and 40 hebdomad of gestation. High-resolution ultrasound scan and Doppler surveies: – Performed in any gestation with an increased hazard of fetal structural abnormalcies, isolated or portion of a familial syndrome. Womans are referred for high-resolution ultrasound to specialist Centres pull offing bad gestations. In recent old ages 3-dimensional ultrasound ( 3D ) and 4-dimensional ultrasound ( 4D ) have started to play an increasing function in antenatal diagnosing. They can be applied in measuring facial characteristics, cardinal nervous system abnormalcies and skeletal defects. Fetal bosom echocardiography: – Performed at 18-23 hebdomads of gestation in the presence of an increased hazard of bosom defect ( for illustration: bosom defect in a parent or sibling, unnatural modus operandi ultrasound ) aˆ? Magnetic resonance imagination ( MRI ) MRI is used in combination with ultrasound, normally at or after 18 hebdomads ‘ gestation. MRI provides a tool for scrutiny of fetuss with big or complex anomalousnesss, and visual image of the abnormalcy in relation to the full organic structure of the fetus. Apparently MRI is a riskless method. aˆ? Maternal serum biochemistry provingINVASIVE PROCEDURESInvasive processs involve direct scrutiny of fetal cells or tissues. Classical cytogenetic, molecular and biochemical methods ( performed on artless or civilized cells ) are the most often used in antenatal invasive diagnosing. The processs should take topographic point in specializer Centres that manage bad gestations. When sing invasive methods all indicants and standards need to be carefully evaluated as there is a considerable hazard to the gestation[ 4 ]. Invasive techniques include: aˆ? Chorionic villus sampling ( trophoblast cells analysis ) aˆ? Amniocentesis ( amnionic fluid cells analysis ) aˆ? Cordocentesis ( Percutaneous Umbilical Blood Sampling ) As per The Pre-conception and Pre-natal Diagnostic Techniques ( Prohibition of Sex Selection ) Act, 1994, pre-natal Diagnostic Techniques includes[ 5 ]: – Ultra-sonography Fetoscopy Taking samples of amnionic fluid, embryo, blood or any tissue or fluid of pregnant adult females before or after construct, Testing samples in Genetic Laboratory to observe familial upsets, abnormalcies or sex-linked diseases Out of the above stated antenatal techniques, the most normally used sex-determination trial is ammnicentesis. It was used as an assistance to observe any abnormalcy in the unborn kid. But over the old ages it has been used to find the sex of the fetus. In India since 1978 the trial is being used as a sex finding or sex preselection trial. Since so the trial has become highly popular and has led to a mushrooming of private clinics which perform the trial all over the state. Earlier physicians employed the controversial amniocentesis trial done between 14-18 hebdomads to find the sex of the foetus.The ultrasound technique has besides been improved. The sex of a fetus can be determined by more sophisticated machines within 13-14 hebdomads of gestation by trans-vaginal echography and by 14 to 16 hebdomads through abdominal ultrasound. These methods have rendered sex finding cheap and easy. Some sophisticated method like Erison method which separates the Ten and Y Chromos from the sperm and so Injects back merely Y chromos into the uterus to guarantee a male child have besides been developed. And they cost around Rupees 15,000 to 25,000.[ 6 ]THE PROBLEM OF FOETICIDE IN INDIAThe Women who constitute half of the human population have been discriminated, harassed and exploited irrespective of the state to which they belong, forgetful of the faith which they profess and unmindful of the timeframe in which they live.[ 7 ]Everywhere adult females are confronted with many challenges. Female foeticide is possibly one of the worst signifiers of force against adult females where a adult female is denied her most basic and cardinal right i.e â€Å" the right to life † . The phenomenon of female foeticide in India is non new, where female embryos or fetuss are selectively eliminated after pre-natal sex finding, therefore extinguishing miss kid even before they are born. As a consequence of selective abortion, between 35 and 40 million misss and adult females are losing from the Indian population. In some parts of the state, the sex ratio of misss to boys has dropped to less than 800:1000. The United Nations has expressed serious concern about the state of affairs. The long standing tradition of boy penchant, coupled with medical engineering now gives to the position witting Indian households, the pick between payment of big doweries for their girls or riddance of girls. The traditional method of acquiring rid of the unwanted miss kid was female infanticide, where the female babe was done off with after birth in assorted ways – either by poisoning the babe or allowing her choking coil on chaff or merely by oppressing her skull under a charpoy. With the promotion of medical engineering sophisticated techniques can now be used or instead misused, to acquire rid of her before birth. Through ultrasound scans and amniocentesis, the sex of the fetus can be determined during the gestation of the adult female and so the fetus is aborted if found to be female.[ 8 ] In Indian society, female foeticide has emerged as a firing societal job during the last few old ages. The miss kid in India is treated right from her birth as an extra load, an excess oral cavity to feed, a liability and another adult male ‘s belongings. The birth of a boy is regarded as indispensable in Hinduism and many supplications and munificent offerings are made in temples in the hope of holding a male kid. Modern medical engineering is used in the service of this faith driven devaluating of adult females and misss. Woman is created at par with adult male in all facets. â€Å" Womans have equal rights with work forces upon Earth ; in faith and society, they are a really of import component. Divine Justice demands that the rights of both sexes should be every bit respected since neither is superior to the other in the eyes of Heaven. † These important statements from the Bahai ‘s authorship are regarded by Bahai ‘s as looks of the Divine Will. To depri ve adult females randomly of their rights and privileges, or to strip them to even being born or killing them in babyhood is both immoral and unfair, a misdemeanor of God ‘s jurisprudence. It has a damaging consequence on the society and the persons who are involved in this pattern are responsible for such Acts of the Apostless.[ 9 ]But does the Indian society accept this world? If so why female foeticide and female infanticide are on the addition? The sex ratio has altered systematically in favor of male childs since the beginning of the twentieth century, and the consequence has been most pronounced in the provinces of Punjab, Haryana and Delhi. It was in these provinces that private fetal sex finding clinics were foremost established and the pattern of selective abortion became popular from the late seventiess. Worryingly, the tendency is far stronger in urban instead than rural countries, and among literate instead than illiterate adult females. No uncertainty, if this pat tern continues it will upset the societal balance and it may take to serious jobs like addition in sexual offenses, sharing of adult females within and outside marriage and greater insecurity to adult females.[ 10 ]Female foeticide and Female Infanticide:Female foeticide is aborting the female babe in the female parent ‘s uterus. Whereas female infanticide is killing a babe miss after she is being born. The pattern of killing the female kid after her birth has been predominating in our society for many old ages. But foeticide is the bequest and part of the advancement made by the medical scientific discipline. Amniocentesis was introduced in 1975 to observe fetal abnormalcies but it shortly began to be used for finding the sex of the babe. Ultrasound scanning, being a non-invasive technique, rapidly gained popularity and is now available in some of the most distant rural countries. Both techniques are now being used for sex finding with the purpose of abortion if the fetus tur ns out to be female. With the coming of denationalization and commercialisation, the usage of pre-natal diagnostic engineerings is turning into a thriving concern in India. This is chiefly for the intent of sex finding selective abortion of the female fetus. The abuse of engineering merely reinforces the secondary position given to girl kids in such a manner that they are culled out even before they are born.[ 11 ] Compared to infanticide, foeticide is likely a more acceptable agencies of disposing off the unwanted miss kids. Infanticide can be an overtly barbarian and cold pattern while foeticide that is carried out by skilled professionals is a medical pattern that uses scientific techniques and accomplishments and reduces the guilt factor associated with the full exercising. The nose count 2001 and the recent intelligence studies informations indicate a inexorable demographic image of worsening female to male ratios. Surprisingly the most affected provinces are progressive provinces like Punjab, Haryana, Delhi and Gujarat. Harmonizing to UN norms, male-female ratio in the universe is normally 1050 females for 1000 males. But in India, this ratio is dropping down to about 850 per 1000. In Human Development Survey Report besides, India is placed in 124th place among 173 states. It is a fact that our state is much behind compared to other states in regard of instruction, wellness and gender discrimination7. The chief causes of worsening sex ratio in India society is due to female foeticide and female infanticide. Foeticide is a misdemeanor of a right of an unborn kid i.e. right to life. It besides has deduction on the wellness of the female parent. At the wider degree, it affects position of adult females and has serious ecological and demographical branching. It is a grave job that affects the life and wellness of society. And yet the job of female foeticide and female infanticide has received small attending.Pre-Natal Sex Selection and the Law:Parliament has realised the grave deductions originating out of the abuse of the pre- natal diagnostic techniques and hence intended to modulate its usage merely for certain medical intents. The Government has realized that maltreatment of techniques for finding of sex of the fetus taking to female foeticide is prejudiced against the female sex and besides affects the self-respect and position of adult females. With the above aims, the Parliamen t has passed the Pre-Natal Diagnostic Techniques ( Regulation and Prevention of Misuse ) Act 1994 ; which came into force from 01.01.1996. Pre-Natal Diagnostic Techniques ( Regulation and Prevention of Misuse ) Act,1994: This Act provides for the ordinance of the usage of pre-natal diagnostic techniques for the intent of observing familial or metabolic upsets or chromosomal abnormalcies or certain inborn deformities or sex-linked upsets and for the bar of the abuse of such techniques for the intent of pre-natal sex finding taking to female foeticide. The statute law seeks to accomplish the undermentioned aims. Prohibition of the abuse of pre-natal diagnostic techniques for finding of sex fetus, taking to female foeticide. Prohibition of advertizement of the techniques for sensing or finding of sex. Regulation of the usage of techniques merely for the specific intent of observing familial abnormalcies or upsets. Permission to utilize such techniques merely under certain conditions by the registered establishment. Punishment for misdemeanor of the commissariats of the Act ; and To supply deterrent penalty to halt such cold Acts of the Apostless of female foeticide[ 12 ] The PNDT Act, nevertheless, for all purposes and intents has proved to be a toothless piece of statute law. The job with the Act is twofold: – Interpretation of the Act and Execution of the Act. Despite the purpose and intent of the Act being broad and all encompassing, it has been interpreted by the ultrasonologists, the abortionists, the physicians and more shockingly the authorities likewise, to except pre-conceptual sex choice. A PIL request was filed in the Supreme Court by the Centre for Enquiry into Health and Allied Themes ( CEHAT ) , Mahila Sarvangeena Utkarsh Mandal ( MASUM ) and Dr. Sabu M. George pressing effectual execution of the Act. The Supreme Court passed an order on 4th may 2001[ 13 ]which aims at guaranting the execution of the Act, stop uping the assorted loopholes and establishing a broad media run on the issue. The 2nd end of registering the PIL is the amendment of the Act to include pre-and during construct techniques, like X and Y chromosome separation Pre-implantational Genetic Diagnosis ( PGD ) . The order mostly concerns merely the execution of the Act and seting the needed substructure in topographic point. However, the order entrusts the duty of analyzing the necessity to amend the Act to the Central Supervisory Boards, maintaining in head emerging engineerings and the troubles encountered in the execution of the Act and to do recommendations to the Cardinal Government.[ 14 ]The Su preme Court besides observed: – â€Å" It is unfortunate that for one ground or the other, the pattern of female infanticide still prevails despite the fact that soft touch of a girl and her voice has comforting consequence on the parents. One of the grounds may be the matrimony jobs faced by the parents coupled with the dowry demand by the alleged educated and/or rich individuals who are good placed in the society. The traditional system of female infanticide whereby female babe was done off with after birth by poisoning or allowing her choking coil on chaff continues in a different signifier by taking advantage of progress medical techniques. Unfortunately, developed medical scientific discipline is misused to acquire rid of a girl kid before birth † . B ) Pre-Conception And Pre-Natal Diagnostic Techniques ( Prohibition of sex choice ) Act 2002: Based on the Supreme Court order and the recommendations of the Central Supervisory Board, the Parliament on December 20 passed the Pre- construct and Pre-Natal Diagnostic Techniques ( Prohibition of Sex Selection ) Act 2002. Some of the relevant commissariats of this Act are stated below: The Act provides for the prohibition of sex choice, before or after construct. It regulates the usage of pre-natal diagnostic techniques, like ultrasound and amniocentesis by leting them their usage merely to observe: a ) Genetic abnormalcies B ) Metabolic upsets degree Celsius ) Chromosomal abnormalcies vitamin D ) Certain inborn deformities vitamin E ) Haemoglobinophathies degree Fahrenheit ) Sexual activity linked upsets. No research lab or Centre or clinic will carry on any trial including echography for the intent of finding the sex of the fetus. No individual, including the 1 who is carry oning the process as per the jurisprudence, will pass on the sex of the fetus to the pregnant adult female or her relations by words, marks or any other method. Any individual who puts an advertizement for pre-natal and pre-conception sex finding installations in the signifier of a notice, round, label, wrapper or any papers, or advertises through inside or other media in electronic or print signifier or engages in any seeable representation made by agencies of billboard, wall picture, signal, light, sound, smoke or gas, can be imprisoned for up to three old ages and fined Rs. 10,000. Right to Life of Foetus: Our Constitution provides for the Right to Equality under Article 14 and right to populate with self-respect under Article 21. Sexual activity – sensing trials violate both these rights. Right to life is a well- established right and is recognized by assorted international instruments. Now the inquiry is, Does a fetus enjoy this right? We do non hold a definite reply. Globally, Constitutions recognize the holiness of life, yet have failed to adequately protect the life of fetus. Judicial dictums are besides non conclusive and vary in different legal powers. In India the right to life is guaranteed to every individual under the Constitution of India. The construct of personhood complicates the place of legal position of fetus. Often tribunals shy from replying this inquiry due to complex issues that arise in finding this inquiry – like when does foetus attains personhood? This inquiry is perplexing the tribunals worldwide. There is a despairing demand for the tribunals t o come clear on this critical issue and acknowledge the rights of the fetus.[ 15 ] In India, Article 21 of the Constitution guarantees the life and autonomy of every individual.[ 16 ]But it is dubious if this would include the life of fetus as the significance is restricted by the usage of the word individual. The Indian Constitution has recognized the right to life under Article 21 as besides recognized in several cases.But this is barely available to the unwanted miss kid. Hence the right of the miss kid may be construed in broader footings and should be inferred as: – Right to be born and non to be aborted merely because she is a miss. Right to stay alive after birth and non to be killed at any minute after birth. Right of the miss kid to her head her organic structure, right to childhood and compensate to a healthy household environment.[ 17 ] However there are a figure of legislative acts that indirectly provide protection to the life of fetus. The Indian penal codification under assorted commissariats makes doing miscarriage an offense.[ 18 ].DecisionPeoples both in rural every bit good as in urban countries have to be made cognizant about the demand of a female kid in the societal surroundings as that of a boy. A progressive statute law entirely can non work out societal jobs. The people must be cognizant of the progressive statute law which has certain deterrent facts. Many adult females are compelled to undergo trials and seek abortion on acceptable every bit good as unacceptable evidences under irresistible impulse. A new spirit has to be imbibed propagating that a female kid is non a expletive. It is non a liability. It is non a drain on the economic system. It is non an instrument through which dowery has to be given. A feeling has to be nurtured that she is the girl, she is the female parent and she is the life sp ouse.[ 19 ] Foeticide can non be controlled unless the equation alterations and households begin to value their girls more than they do at nowadays. It does non take much to kill an infant girl even without the assistance of engineering, if she is unwanted. Among all the factors, which need attending, instruction is the most of import. In parts of South Asia where instruction and employment chances for adult females are comparatively high, the female to male ratio is comparable to that the developed states. For case in Sri Lanka the sex ratio is 102 adult females per 100 work forces and in Indian province of Kerala 104 adult females per 100 work forces. This reflects towards the deep frozen manifold, short and long-run effects of instruction on the outlook and life form of people. If we want to halt the female foeticide or disregard of adult females, we have to halt looking for speedy holes and alternatively face the job forthrightly. There is no manner to guarantee the healthy endurance of babe misss unless households find them deserving fostering. That is so a complex undertaking, which allows for no easy short-run solutions. Militants ‘ intercession has non led to controling sex finding trials. The existent challenge before us is to calculate out ways in which a realisation of the value of girls can be enhanced in the eyes of their ain households. All those who have a interest in it apart from the authorities governments, like adult females ‘s group, wellness groups, non-governmental organisations, the academe, the media and most significantly the medical professionals have to play their portion to see that the commissariats are implemented and the commissariats are strengthened by amendments of the act. Unless societal action is supplemented wi th prompt execution of the commissariats and the ordinances under the jurisprudence meant to halt female foeticide, such patterns will go on to boom. To guarantee smilings on the faces of our young person, both male childs and misss, allow us escalate joint attempts to root out unhealthy societal elements, ‘Now ‘ since future depends upon what we do in the present. Dayss are non so far, when there may be outgrowth of the state of affairs where brides will non be available for the matrimony of the boies to keep line of descent and go on the human race of even those people who believe on long standing tradition of boy penchant, that â€Å" lone boies can offer Pyre Pindadana, Mukhagni, among others and non the girls † . Therefore it is felt that the mentalities of the people should be changed right from now towards the importance of the miss kid in the household. There is an pressing demand to change the demographic composing of India ‘s population and to undertake this barbarous signifier of force against adult females. The passage of any jurisprudence is non sufficient, Torahs must be adhered to and applied strictly, before any alteration in the position of adult females can take topographic point. Inspite of the Pre-natal Diagnostic Techniques ( Prohibition of Sex Selection ) Act umteen incidences of female foeticide are taking topographic point in India. There is still extreme contention as to who will function as the watchdog to command the abuse of the pattern of female foeticide. Promoting gender balanced society involves aiming behavioral alterations in society which in bend involves a long term community based intercession, consciousness programmes, programmes to advance girl kids ‘s right, turn toing myths related to sons/ girls and concerted attempts to alter the mentality of people. Sensitization of medical practicians , implementing a system of moralss in the medical profession and monitoring of medical services available to people is an pressing demand. It is so clip to stimulate attempts to set genders equality at the top of development docket and contribute in whatever manner we can to give chances to girl kids to blossom and reflect. Apart from the above, a feeling has to be inculcated in the heads of the people that she is the girl, she is the sister, she is the female parent and she is the life spouse of a adult male.

Sunday, September 29, 2019

Jailbreaking

When Apple designs these products, they come with a redesigned firmware that restricts certain capabilities that otherwise the device would be able to do, such as wife mobile hotshots, direct downloading capabilities, and more Insignificant features, like moving screen savers. Along with the understandable, â€Å"deserved† capabilities Jailbreak offers, It also enables the ability for the user to access and download APS, and settings that Apple's firmware protected against due to their Illegal content. Thus the question on the topic Is If jailbreak is the â€Å"right† thing for a user to do with his/her device.Due to the fact hat the user purchases the device outright, they should have the right to do whatever they please with the firmware and device itself even if it enables illegal activities, the user should be able to decide whether or not to obey the law, and the user should have full control of their apple device. When someone purchases any material object, it is the assumption that the buyer has the right to do as he/she pleases with the purchased object, and the situation should not be any different for the ‘Touch, Phone, or Pad, Thus making the process of Jailbreak morally acceptable, as well as legally Just.If a restriction Is put on a person's own property, then the property really Is not owned, which Is okay, If that Is pre-deloused to the buyer so that they know that everything about the purchased object must maintain its original construct. In the case of these Apple products, stipulations were not pre-disclosed to the buyer, and instead Apple attempted to put restrictions on the process of jailbreak after the products were sold, which is morally unacceptable, as well as unfair to the user.When someone goes to the electronics store, or apple vendor to purchase the phone, r one of its cousin devices it is always the situation that the device is purchased outright, even if it is purchased with an attached cell phone contract, the device belongs to the buyer, but for some reason Apple still believes that although they have sold their product outright, they should still be able to control what the purchaser does with the device sold. This idea that Apple has Is completely ludicrous, and to put the situation In perspective, let's change the scenario, being the object purchased, and the business selling.Suppose someone went to a typical car dealership and purchased a brand new rives home in his new car, and starts tinkering with the engine, installing a blower through the hood, and a super charger for the extra speed. If the dealership called the buyer and told him that these modifications aren't allowed by their company, the buyer would be thoroughly confused and upset, for it is policy that once an object is purchased the buyer can do as they please with the object.Although there is a great difference between a car and an phone, the concepts involved with the two of them are essentially the same, when someone buys a car they can tinker, and add on to the icicle as much as they want, and the situation should be no different for any of the Apple products under discussion. The main point that Apple tried to use when trying to make the process of jailbreak illegal was when they stated that the process was in violation of copyright laws because it modifies the boatload they had designed, and have complete ownership of.Unfortunately for Apple, their case was lost in court, and the process of Jailbreak was proved to be legal, an article written about the case took an excerpt from the trial's outcome, writing, â€Å"Federal regulators lifted a cloud of uncertainty when they announced it was lawful to hack or â€Å"Jailbreak† an phone, declaring Monday there was ‘no basis for copyright law to assist Apple in protecting its restrictive business model. â€Å"(wired. Com).After losing their case in court, Apple decided to make a policy for Jailbreaks devices that disavowed any Apple Care (insurance) on the Jailbreaks pods. Apple's main reasoning for the policy they made, is that the modifications to the SO that Jailbreak does causes system errors, and other minor problems to the devices performance, Apple states (when speaking of why Jailbreak should not be permitted), â€Å"Disruption of services: Services such as Visual Biochemical, Youth, Weather, and Stocks have been disrupted or no longer work on the device.Additionally, third-party APS that use the Apple Push Notification Service have had difficulty receiving notifications or received notifications that were intended for a different hacked device. Other push-based services such as Mobile and Exchange have experienced problems synchronizing data with their respective servers. â€Å"(Redmond). Although what Apple states about how Jailbreak an hinder the devices performance, and cause otherwise non-existent problems may be true, it is not Justification to put a limitation on what a user can do to the devic e.Even if Jailbreak made the Apple product completely break without hope for repair, the act of doing it should always be the user's choice. Another aspect to look into when considering if the devices in question should be allowed to be Jailbreaks, is the illegal side of the capabilities Jailbreak offers. It is a known fact that once an phone is Jailbreaks, due to the fact it can connect online ritually anywhere due to the cell service, it can be one of the most devastating tools for a hacker.The significant difference between one of the Apple devices hacking, and a computer hacking, is this difference in internet connection, as well as mobility and concealment. After all, someone sitting outside of a house with a laptop and an encoder attached to the computer would look a lot more conspicuous than a passerby that seems to Just be testing on an phone, when in fact they could be using one of the many wife hacking APS like â€Å"rickrack† to access the files on your amputees, o r in your â€Å"cloud† trying to get social security numbers, credit card electronic storage.The fact that an phone alone could give hackers and identity thieves the Holy Grail they have awaited is a fact that Apple tried to exploit when giving reasons as to why Jailbreak should be illegal. Apple stated, â€Å"Security compromises have been introduced by these modifications that could allow hackers to steal personal information, damage the device, attack the wireless network, or introduce mallard or viruses. † (Redmond).Although every claim Apple made is a act, and there are security risks that come along with the legalization of Jailbreak, it is very obvious once the situation is examined, that if a hacker truly wished to us an Apple device to his/her evil ends, it really would not matter whether or not the process was legal or not for hackers and identity thieves are already doing illegal things, thus even if Jailbreak was â€Å"illegal† they would still do it .Although the negative aspects to Jailbreak are often magnified, there are actually more benefits than risks to the process. When a device is Jailbreaks, its full attention is reached. An entirely new app store is revealed to the user, APS that could not/ would not contract with the Apple app store are available for purchase, and sometimes for free.Along with thousands of new APS, Jailbreak also allows the user to customize the load out (home screen) and dock (bottom toolbar) to their liking, while still being connected to the original Apple app store. In an article about the pros and cons of Jailbreak PC world wrote, â€Å"Acadia and its newer, lighter competitor Icy are the unofficial app stores available only to Jailbreaks. In these tortes, you'll find hundreds of terrific APS that have been rejected from the App Store for providing features that Apple would rather you not have.Examples? Accorder is a camera app that enables video-recording on pre-ASS phones; Pedant allows tethe ring of your 36 connection to your laptop; and Gobble is an app for the Google Voice service. Plus, you can still get free and paid APS from the official App Store, so Jailbreaks get the best of both worlds. â€Å"(popcorn). With this substantial advantage given to Jailbreaks, it is understandable why it is done, and why it is the est. thing to do if the user truly wants complete control of their device without limitation.This reasoning for Jailbreak also proves that malice is not attached to every reason for Jailbreak, the process can, and more often than not is simply done to access APS, and customizations restricted by the app store, and as long as the reasoning is pure and without foul intention Jailbreak is the right thing to do. After every aspect of Jailbreak is examined, the pros and cons, the risks, and legalities, it is more than apparent that the process is morally acceptable to do, as Eng as the Jailbreak is also the owner, or has permission from the owner of the device .The process is also acceptable because of the simple fact that as of today it is legal, despite Apples efforts to make it otherwise. Through the use of the situation between Apple and Jailbreak people can be reminded of the importance of owning anything in life, the responsibility that comes along with the situation, as well as the great satisfaction, for when anything in life is truly owned the only person/ thing that can make the rules is the owner, a situation that is too often taken for granted in today's society.

Friday, September 27, 2019

Animal Use In Medical Research Essay Example | Topics and Well Written Essays - 2000 words

Animal Use In Medical Research - Essay Example Medical research includes acquirement of new knowledge and using animals for testing chemicals and compounds for ensuring safety and guarantee. According to them, no new medicine or drug can be introduced to the market or the patients, until and unless it is tested on an animal. The new drug, medicine or treatment all over the world is confirmed effective based on the tests done on animals (Green, Guyer & Institute, 2011). The surgery on animals is supporting the techniques of transplantation of organ and open-heart surgery. Experiments done on animals do the introduction of vaccines against diseases like polio, rabies, mumps, tuberculosis, and rubella. Also, advancement of antibiotics, insulin, HIV and cancer treatments are done on animals first. The animal research has made the most significant development in reproductive medicine like Vitro fertilization, oral contraceptives, and therapy of hormonal replacement (World Medical Association, 2001). Though many people are of the view that medical research done on the animal is brutal, there would be no possibility to develop so many medications that are found today.The researchers found that the benefits accrued by humans through the research on animals are much more, compared to the losses suffered due to the less number of animals. According to a report by American Medical Association, 99% of the doctors in the US believe that use of animals in medical research has lead to increase in the advancement of the medical sector.

The Book of job Essay Example | Topics and Well Written Essays - 1000 words

The Book of job - Essay Example ’s friends, Eliphaz, the Temanite, begins his counsel by asserting the idea that the innocent are free from suffering while the wicked face constant affliction. Eliphaz reinforces his opinion by presenting a vision he had in the past. Reprimanding Job, Eliphaz commands Jobs to ask for God to forgive him, while reminding Job of the potential benefits that would accrue to him if he repented (4.1–5.22). However, Job defends his remarks by referring to all his agonies and reaffirms his longing for death. Accusing his friends as a â€Å"deceitful brook,† Job challenges them to identify where he has sinned, and then proceeds to complain to God, asking him numerous questions (6.1–7.21). The second friend of Job, Bildad, the Shuhite, comes into the scene rebuking Job for his strong altercation. Bildad emphasizes that God acts justly, by claiming that Job’s sons perished out of their own wrongdoings. He recommends purity to Job so that Job can receive God’s Blessings. Bildad further argues that the wicked have no God’s support whereas the blameless shall forever remain in God’s grip. According to Bildad, God would restore the laughter and rejoice that had deserted Job, upon repentance (8.1–22). In his counsel, Bildad reassures Job that â€Å"God will not cast away a perfect man, neither will he help the evil doers† (8.20). After Bildad’s counsel, Job concurs with him, but his main worry is what it takes for a person to be righteous before God owing to his wisdom and power. To this point, Job continues with his complaint citing God’s inaccessibility and holds that God annihilates the wicked and the blameless equa lly. Job laments about the absence of a mediator as his main reason to reach God, and lets out more questions to God (9.1–10.22). Job’s persistent complaint brings in his third friend, Zophar, the Naamathite, who rebukes Job for his harsh and strong words. He says that Job has faced less agony than he deserves, and should seek ways of casting

Thursday, September 26, 2019

School uniforms Research Paper Example | Topics and Well Written Essays - 3250 words

School uniforms - Research Paper Example Traditionally, school uniforms were meant for the private sector and it is only recently that a viable policy was introduced for uniforms in public schools in the United States of America. It is for this reason that public school administrators are now considering uniform policies in a bid to improve the school environment and subsequently the overall performance of the students in these schools. School uniforms are universal attires worn by students while in school. On most occasions, these uniforms are designed as simple clothes that can be easily distinguished from ordinary attires. Sometimes school uniforms include simple neckties while some schools prefer to have uniforms without neckties. There have been mandatory uniform principles and policies focused on the recent push for reforms in public school especially in the United States of America. Proponents of the adoption of school uniforms in public schools emphasize the importance of these outfits. They relate the uniforms to specific academic outcomes and behaviors amongst not just students but also teachers in charge of teaching the students (Jamison, 2006). A number of researches have been conducted to ascertain the significance of school uniforms. Some researchers have found out that these attires have a considerable impact on the academic performance of students and their behavior as well. Nonetheless, these research findings have been subject to heated debates (Anthony, 2006). Critics have claimed that school uniforms have impacts on neither academic performance nor behavior of students both at school and in their homes. They claim that uniform policies may have adverse effects on student outcomes and school environments by offering a public and visible representation of strict rules and utter control (Wilken, & Van, 2012). One ought to note that the public policies revolving around education reforms

Wednesday, September 25, 2019

Is our election process fair Essay Example | Topics and Well Written Essays - 1500 words

Is our election process fair - Essay Example This paper will highlight the unfairness that exists in the election process citing examples. The college vote is one of the critical aspects that determine whether a presidential candidate clinches the top seat or not. Contrary to many emerging democratic nations that rely on the popular vote, the American nation decides the president using the college vote. Apparently, all citizens participate in the popular vote of the president and vice president, but also elect a representative of each state to the Electoral College (Ryden 56). Usually, the individuals chosen as electors in the college are people who express allegiance to a certain party. In other cases, they operate under state laws that vary from state to state. It is worth noting that each of the 52 states has a different number of representatives in the Electoral College depending on their population. The Electoral College then determines who wins the presidential race. The candidate who secures a majority of the 538 college votes becomes the designated president. There is limited fairness in this process as will be discussed below. The popular vote is of little regard in the United States. However, it is of essence to highlight that the popular vote represents the opinion of each American who is eligible and chooses to vote. Despite the fact that the popular vote represents the voice of the majority, the elections system disregards it and relies on the college votes to determine the president. This is an indirect implication that an individual’s vote is irrelevant. Considering the 2000 presidential elections where Gore and Bush were competing for the top seat and Gore won the popular vote. However, the popular vote decided that Bush had won. The irony in this is that the majority voice represented by the popular vote had proved less significant. For the many people who voted in this election, this was unfair (Ryden 56). The Electoral College does not adequately represent the voice of the majori ty of the Americans. The electors are highly partial, and their opinion does not have to reflect the pledges they made to parties. This leaves them with the opportunity to vote according to individual preference. This compromises the level of democracy because 538 people shoulder the responsibility of electing a president for everyone. With the advancing level of understanding and participation in presidential debates, the defense that the electoral colleges serves as a fair opinion because of the level of information that the electors have is no longer valid. Majority of Americans exhibit the potential to hold an independent opinion contrary to buying the opinion of the national media. Although the media expresses its opinion on the preferred candidates, Americans know better than blindly buying the waves on popular media. This explains why the opinion expressed in the popular vote when electing the president needs consideration. The popular vote represents the opinion of 315,000,0 00 votes. Each of the electors in the college does not necessarily vote in conformity to the popular vote in their state (Rush, and Engstrom 66). It would be fair if the United States scrapped off the Electoral College. This would leave the popular vote to determine the candidate who wins the presidential race. The Electoral College superiority denies the people the free will of choice expected in a nation that claims to be a mature

Tuesday, September 24, 2019

Marketing plan Essay Example | Topics and Well Written Essays - 500 words - 3

Marketing plan - Essay Example Since the customers go to Pizza Restaurant for quality, changes in prices are not that important to them. Therefore the price elasticity of demand is not important in this case. Demand for the products and services would be influenced to the minimal extent by price. The company is located in a rich city where the customers are richer than the customers in other parts of the country. Therefore the most influential demand factors are lifestyles and cultural considerations (Kotler and Keller, 2006, p. 65). The demand would be more influenced by price if the customers came to the company to get lower prices. However they purchase the products and services because the products and services deliver quality of taste. 60% of the customers are from rich families who will be more concerned about the quality. Therefore demand in this case will not be affected by price to any great extent. Answer to Question 2 The unique selling proposition is the quality of products and services. Therefore the recommended pricing strategy is premium pricing. This will ensure favorable perception among the customers (Armstrong and Kotler, 2005, p. 34). In this case, it is recommended that the management should maintain high prices in order to maintain the brand reputation which is the source of its unique selling proposition.

Monday, September 23, 2019

Nursing - Staffing Issue Essay Example | Topics and Well Written Essays - 1750 words

Nursing - Staffing Issue - Essay Example Although the government has attempted to develop robot nurses, the scientists are yet to succeed in that front. Up to date all nurses are still human thus the need to adopt staffing policies in consideration that the players are human in nature (Roussel, 2011). Staff ratio Staffing ratio entails the number of registered nurse per patient. The ratio could compare the registered nurse per surgical or hospitalized patient. Further, the ratio could be a registered nurse per shift or per patient day. It is imperative for the proportion to be as low down as feasible so that a lesser number of patients is assigned to registered nurses. Nurses being human, also suffer fatigue and exhaustion. When exhausted, a nurse’s effectiveness deteriorates and could lead to the death or atrophication of the patient’s health (Finkelman & Kenner, 2012). Shift rotation and duration Nursing can be structured in shifts whereby the nurses have specific times when they would be on duty. The length and time of the shift is critical in the effectiveness of the nurse. Ideally, the nurse should be on duty for the duration in which s/he is able to concentrate fully. Patients whether surgical or hospitalized would need attention and the nurse should be at her/his best to give attention. When a shift takes too long, the nurse would suffer from fatigue and lose concentration (Griffin, 2011). This gives leeway for the occurrence of procedural or medical errors. The duration must therefore, be long enough to cover for the economic ability of the hospital management but also short enough to guarantee the concentration of nurses. The shifts must also be rotated among the nurses. It is prudent to spread the shifts to all the nurses so that everyone enjoys the burdens in a particular shift. This especially relates to the night shifts which is usually less convenient for most nurses. It is important to provide incentives that would encourage participation by nurses in the night shifts. The management must however consider other factors such as the age of the nurses, marital status and family commitments in electing the night shift nurses (Griffin, 2011). Overtime and weekend staffing Nurses may be forced to work overtime due to strained resources. However, this is risky and should be a measure of last resort. An overtime worker has never been productive in any industry. The nursing profession is more delicate as it deals with the life of patients. It is proper to avoid working nurses overtime as this compromises their effectiveness hence poor delivery which translates to higher risk of hospital mortality. The management should adopt the more difficult option of hiring more nurses rather than opting for overtime (Fernandez, 2010). Weekend staffing is inevitable considered that patients do not cure during weekends. Policy formulators need to appreciate that packages must be friendlier to attract nurses to work over the weekends. The effectiveness of a nurse working ove r the weekend is however not compromised by the fact that the days are weekends (Fernandez, 2010). Empirical evidence Research has attempted to estimate the ratio of hospital mortality to nursing hours. In this analysis, hospital mortality refers to death in the hospital or within thirty days after admission in the hospital. Research has proven that an increase in the

Sunday, September 22, 2019

Cultures in Conflict Essay Example for Free

Cultures in Conflict Essay The pleadings of the Duncc-za and Cree Indians on a fiduciary claim on January 12th 1987, which is known as â€Å"Aspassin versus the Queen†, basically evolved from Robin Riddington’s (1988) case presentation. In this regard, the article, Cultures in Conflict: the Problem of Discourse, laid down the question as to whether the court should resolve the case or just reproduce it. Basically, this paper will examine and analyze the underlying circumstances in the presented case. Review of Literature The Aspassin v. The Queen lawsuit was a legal claim from the Government of Canada by two Indian Chiefs, Joseph Aspassin and Gerry Attachie, who served as representatives of Blueberry River and Doig River bands of the Duncc-za and Cree Indian tribes. The claim historically referred to the Indian Act, Treaty No. 8 of 1899 (Riddington, 1988). The claimant’s counsel pleaded the Court to merit the fiduciary obligation emanating from the September 22nd 1945 meeting proceedings of authenticated documents from British Columbia to corroborate the evidence that suggested that the Department of Indian Affairs deviated from the proper transferring of title to the legal claimants and instead was awarded by the Veterans Land Administration to the soldier’s settlement program. Based on the decision of Justice Dixon of the Supreme Court of Canada, it was concurred that a breach of fiduciary obligation of the Federal Crown has resulted in the failure the granting of the estate to its legal claimants and real heirs. The claim was incorporated with the legal claimant’s and heirs’ uncompromised land use of the estate wherein the Indians’ primitive economic sourcing are fishing, hunting, and trapping only. In effect, a surrendering requirement for the land use must be enjoined and be recognized by the Court. However, on November 4th 1987, the claim became futile by the Court’s dismissal for the reasons that the Indians were grossly handicapped to be able develop the estate for a progressive and sustainable economic base. Testimonial Findings The September 1945 occupancy of the IR-72, Indians’ land, which called as a place where happiness dwells, was purposely for exploration of mineral resources, wherein the band of Indians area were promised by the government to be compensated with a initially payment of $10 each. The governments has then continuously engaged in oil and gas mining and expanded areas of exploration all throughout Fort St. John by encouraging Indian families to sell their landholdings. Moreover, the trial has extensively addressed the pleadings on the problem of discourse as it may affect to the Court’s interpretation of the issue. In addition, the cross-examination of the witnesses, involving elders of the Duncc-za and Cree Indians, have supported and merited the articulation of their counsel. In effect, the Supreme Court has derived its decision together with its recognition on the breach of fiduciary obligation by the Federal Crown, as likewise addressed to the Canadian Government being the liable government entity in the transition of estate’s the transfer to the questioned beneficiaries. Merits of Articulation The merits of articulation of the claimant’s counsels, Leslie Pinder and Arthur Pape, was supplemented in the case proceeding and substantiated the Supreme Court decision, which was acknowledged as a matter of legal inquiry and argument on the fiduciary obligation of the Federal Crown, so that the Canadian Government would recognize the â€Å"surrender requirement† in the Indian Act in order to prevent further mediation and meddling with the claimant. In other words, the Federal Crown has duly surrendered the claim without compromise of conveyance and meddling over the claimant’s disposition for the use of the estate that has been re-claimed. Further implied on the merits of articulation by the claimant’s counsels was their presumption that a problem of discourse was â€Å"central† to the case. It implied that the discourse, as a matter of understanding, traverses with different recognition, interpretation and way of thinking from cultural perspectives. In this connection, the Supreme Court has interpreted and understood the merits of articulation on the land use with inadequate consideration to the cultural life of the Indians. In other words, the Supreme Court’s decisions was solely meant for the Indians to able live their economic lives in what they called â€Å"the place where happiness dwells†, as referred to the estate being an economic base for fishing, hunting, and trapping. Adverse Claim The Supreme Court decision in dismissing the claim favors the government’s occupancy to landholdings of ancestral domain. It may be noted that the estate, upon deviation of land transfer to the soldiers land program by the Veterans Land Administration, has had oil reserve dated back from 1950’s to 1960’s. In which case, the merits of articulation on surrendering the land without prejudice to claimants has an adverse claim on Supreme Courts decision in dismissing the case that was causal to the reason of Indian’s inability to develop the being claimed estate. Obviously, meriting the â€Å"surrendering requirement† could isolate the chances of pre-disposal to government’s exploration of land resources. Furthermore, a conflict of interest may result from the adverse claim of the Supreme Court. The litany of the claimant’s counsels, Pinder and Pape, on the issue of â€Å"discourse† has long been acknowledged by the Supreme Court as a matter of pleading and interpellation of various witnesses and has exposed the conflict of cultures from the social lives of Indians as they were found to be unable defend themselves in legal disputes being illiterates. In short, this exposition may have further given the Court a leeway to recognize the problem of discourse and therefore discovered the incapability of Indians. The adverse claim of the Court may be interpreted in both legal and moral perceptions in social perspective. On the first ground, acknowledging the plea of breach in fiduciary obligation of the Federal Crown, which was a disadvantage of the Canadian Government, has basically merited the claim. On the succeeding legal argument, the plea may have been in accordance to the jurisprudential aspects of claim on the issue of discourse, but upon recognition, it has resulted in the adverse claim. It may be perceived that the Court studied well the merits of articulation—from the day the trial ended on March 27th 1987 until the Court rendered decision on November 4th 1987— which is about 8 months. To give contrast to the adverse claim, as previously presumed above, the moral obligation of the Court may have contested the issue of discourse for the reason that the Indians may be imposed with challenges on their capability to promulgate stewardship of the land, in which the witnesses have found the ability to recall or remember events then may determine how far the ability to acquire skills of making the land more productive is possible. With this pretext, the merits of articulation may have gone far from treatise on issue of discourse. Conclusion The case of ancestral domain reclamation is a continuing issue in most countries where governments insatiably and constantly expand economic occupancy, political jurisdiction, exploration of land resources and nationalizing the overall geopolitical system. These ancestral domains are descendants of communities that have outlived the inhabitants of present societies. The tribal communities and indigenous culture pose the problem of discourse specifically brought about by conflicts of cultural heritage. Throughout the overall discussion on this paper, the problem of discourse is presented in a complex environment of representation as it evolved in a court proceeding. The testimony of characters, as depictive of their roles, has long argued the issue of discourse, and yet the bottom line was the long struggle of the native Indians to have their place of happiness in a land taken away from them in 1945. Being native and indigenous people who have been drenched by the Whiteman’s conquest, the native Indians likewise seek their cultural identity in a land they only borrowed from their children. Because it is the children that will continuously dwell in their place of happiness. What the trial resolve is the merit of articulation on the issue of discourse. It was conclusive that the adverse claim of the Supreme Court has been founded upon the exposition of the articulation, with so much evidence that the Indians were incapable of tilling and giving welfare for their land. The stewardship of the land may oppose the preservation of ecology—in which the Indians’ source of living depended on fishing, hunting and trapping. Thus, it may be perceived from the Court’s decision was its moral authority that may however lie beneath the advantage of the Whiteman. Upon resolving the issue of discourse, the merit of articulation was judged by the historical struggle of the Indians in pursuit of the place where their happiness dwells. References Riddington, R. (1988). Cultures in Conflict: The Problem of Discourse. Page 273-289, International Summer Institute for Structural and Semiotic Studies (ISISSS), University of British Columbia.

Saturday, September 21, 2019

Larkins use of language Essay Example for Free

Larkins use of language Essay The poems that I have chosen to comment on from the collection The Whitsun Weddings by Philip Larkin are Here, Nothing to be said and Faith Healing. I have chosen to write about these three because they are all very different in terms of theme, language, verse form and Larkins message and purpose. Here is the opening poem of The Whitsun Weddings. It locates the reader in Larkins England and centres around a journey the protagonist is making from London to Northumberland via Larkins hometown of Hull. Larkin uses a range of language and writing devices to express his feelings and at times his prejudices through his poetry and he does this especially well in Here. The first stanza begins with swerving east. The word swerving suggests a dangerous movement and a lack of control from the person or thing that is swerving. When someone swerves it is usually to avoid something so by using the word swerving Larkin is immediately presenting the reader with a sense of avoidance and lack of control. Larkin then goes on to say that the fields are too thin and thistled to be called meadows. This shows that he is passing through an area of land, which cannot quite be classed as countryside but is not quite urban. This could possibly be a representation of how Larkin is feeling at the time about life because even the countryside is not genuine; therefore Larkin may be commenting on the falsity of life because of its in-between state. The words Thin and thistled are harsh sounding words that make up alliteration. This alliteration may have been used to mimic the gentle hissing sound of the train or can moving along the track or road. The harsh sounding words are probably applied as a vent for Larkins disdain on a philosophical level for the falsity and lack of true meaning in life and on a smaller level for the land he is passing through that is not quite beautiful enough to be countryside. A technique that interests me is used in the line harsh-named halt. This phrase uses a repetition of the /h/ sound, which is quite a hard sound to pronounce and therefore actually halts the readers rhythm. This includes alliteration of the /h/ sound but also a kind of onomatopoeia because the word halt is actually a word that sounds like a stoppage or halt and actively brings the reader to a momentary pause. The word harsh is actually a harsh word, which adds more emphasis to the phrase. This technique is very effective because it immerses the reader in the journey of the protagonist as it actually halts their flow when the protagonists train comes to a halt. Larkin uses a lot of alliteration in Here, an example of this occurs in the first stanza when alliteration occurs four times in the space of two lines: Swerving to solitude of skies and scarecrows, haystacks, hares and pheasants. There is a repetition of the word swerving which reiterates the lack of control of the protagonist. It also shows the part of the journey that is taking him through the countryside and he is swerving east away from the towns and towards the countryside. The repetition of the /s/ hissing sound gives a sense of speed and also replicates the sound of the train or car moving. The /s/ sound runs throughout two lines which links them together and helps demonstrate the onward movement of the protagonist and the passage of time. The actual shape of the letter /s/ is flowing and therefore mimics the journey flowing onward. In the last line of the first stanza Larkin describes the entrance to a town by saying the shining gull-marked mud gathers to the surprise of a large town. Gull-marked mud can be used as a comparison to harsh-named halt a few lines previously and demonstrates the difference between town and country. The comparison between harsh-named halt and gull-marked mud can also be drawn through the hyphen between the first two words (which could be used to show the onward motion of the journey) and the alliteration used of the /h/ and /m/ sounds.

Friday, September 20, 2019

Characteristics of Java Language

Characteristics of Java Language Chapter 2 Literature review About Java:- Initially java language is named as Oak in 1991, which is designed for the consumer electronic appliances. Later in 1995 the name was changed to Java. Java was developed by James Gosling, a development leader in sun micro system. Oak was redesigned in 1995 and changed the name to java for the development of the applications which can be run over internet. Using the java language, java programs can be embedded in to the html pages. Java is not only limited for the web applications, it is also useful to develop the stand alone applications. Java has a feature called OOPs, which make it more familiar. Object oriented programming replaced the old traditional techniques i.e. procedural programming. Characteristics of java:- Simple:- Java language is simple than the previous languages such as c and c++. Java eliminates the pointers concept which is earlier present in c and c++. Java also has a properties i.e. automatic allocation of memory and garbage collection, where as in c/c++ the garbage collection and allocation of memory will be done by the programmer which is a complex task. Object oriented:- All the programming languages apart from the c++ are procedural languages which are paradigm of procedures. Java programming language is object oriented because java uses the concept of the object. In java everything will depend on objects i.e. creating the objects and making objects to work together. The overall functionality of the high level program will depends on the objects. Because java is object oriented program it provides great range of reusability, modularity and flexibility. Distributed:- Java uses the http and ftp which are internet protocols, in order to have access the files over the network. So by using this libraries which are in java can easily make file transfers over the network which is connected to internet. Interpreted:- In order to run the java programs we need interpreter. When the java programs are compiled it produces the byte code, which is machine understandable language. The byte code which is produced after the compilation is machine independent, so that it can run on any system using java interpreter. Most of the compilers will convert the high level language instructions to the low-level machine understandable language as machine cant understand the high level instruction. The machine code can only be executed on that compiled native machine. For example a source code is compile on windows platform, the executable file produced after cant be executed on other platforms apart from the windows. But, coming to java it is different i.e. the source code is compiled once and the executable byte code can be run on any platform using java interpreter. The main functionality of the interpreter is, it converts the byte code to the machine language of the target machine. Robust and secure:- Java programming is more reliable. At the time of the execution time java shows all the errors. In java bad and error prone language constructs are eliminated. Java eliminated the concepts such as pointers, due to this there is no corruption of data and overwriting the memory locations. In the same way java supports the exception-handling, which makes java more reliable and robust. Java forces the programmer to write the code for the exceptions, which may occur during the execution of the program. So that program can be terminated successfully, without any error stopping the execution flow of the program. Java also provides the lot of security. Security is important over the network because the computer will be attacked by the external program. Java provides the security that; it encounters the applets for the un-trusted sources. Architecture- neutral:- Java is a interpreted language, which enables java as a architectural neutral i.e. platform independent. We can write the program once and it can be executed on any platform with the help of the Java Virtual Machine (JVM). The java virtual machine can be embedded on the operating system or on web browser. Once the part of the java code is loaded into the machine, it is verified. Byte code verification play a major role, as it check all the code generated by the compiler will not corrupt the machine on which the code is loaded. At the end of the compilation, byte code verification will be done; in order to make sure thats the code is accurate and correct. So the byte code verification is the integral to the compilation and execution. Due to the property of architectural neutral had by java, it is portable. The program once written can be run on any platform without recompilation. Java does not provide any platform specific features. In other languages, such as Ada where the large integer varies according to the platform it runs. But in the case of java the range of the numbers are fixed. Java environment is portal to every operating system and hardware. Multi-threaded:- It is defined as the programs ability to perform several tasks (or) functions simultaneously. The multithreading property is embedded in the java program. Using the java programs we can perform the several tasks simultaneously without calling any procedures of the operating system, which is done by the other programming languages in order to perform the multi-threading. Constant Pool:- Every program i.e. class in java, has a array of constants in the heap memory called as the constant pool, which is available to that class. Usually it is created by the java compiler. The constants encode all the name of the (methods, variables and constant that are presented in the constant pool) which is used by particular method of any class. Each individual class i.e. stored in heap memory has a count of how many constants are there and also has offset which specifies how far in to the class description itself the array of constants begins (Laura Lemay, Charles L.Perkins, and Micheal Morrison, n.d). The constants are represented (or) typed in the special coded bytes and which has a very well defined format, when these constants are appeared in the .class file for the java class file. JVM instructions refer to the symbolic information in java, rather than relying on the run time layouts of the class, methods and fields. Sun Java Wireless Toolkit:- Sun java wireless toolkit CLDC (connected Limited Device Configuration) is a group of tools which is used to develop the applications for the mobiles and for other wireless equipments (or) devices. Although the sun java wireless toolkit is based on the MIDP (Mobile Information Device Profile), it also supports many other optional packages, which make a sun java wireless toolkit as a great tool for developing many applications. It can be supported on the windows and Linux. All the users who have account on the host machine can access this tool either singly or simultaneously. It allows you to use a byte code obfuscator to reduce the size of your MIDlet suite JAR file. It also supports many other standard Application Programming Interfaces (APIs) which are defined by the (JCP) Java Community Process program. Even though, the sun java wireless toolkit did not come up with an obfuscator, it is configured in a way that it supports the ProGaurd. All you need to do is, just simply to download the ProGuard and place it in the system, which sun java wireless tool kit can find it. But due to the flexible nature of the tool, it allows any kind of the obfuscator. BCEL:- BCEL full abbreviation is Byte Code Engineering library. The BCEL helps you to dig the byte code of the java classes. BCEL gives the utmost power on the code because it works at the individual JVM instructions, even though the power comes with cost in complexity. Using the BCEL, we can transform the existing classes transformation or we can construct the new classes. The main difference between the BCEL and Javassist is javassist provides the source code interface where as the BCEL is developed in the intension to work at the level of the JVM assembly language. BCEL is good because the approach it uses is low level, which is very helpful to control the program at the instruction level. Compared to Javassist it is more complex to work with the BCEL. BCEL has the capability to inspect, to edit and to create binary classes in java. There are 2 hierarchy components in the BCEL, in which one component is used to create the new code and the other component is used to edit (or) update the existing code. The inspection of the class aspect in the BCEL mainly deals with the duplication whatever available in the java platform using the Reflection API. This duplication is necessary (or) mandatory in classworking because we generally dont want to load the classes on which we are working until they are modified fully. Org.apache.bcel.classfile package provides all the definition which is related to inspection-related code.org.apache.bcel package provides the basic constant definitions. JavaClass is a class which is the starting point of the package. The JavaClass plays a role in accessing the information of the class using the BCEL same as like java,lang.Class does using the regular reflection in java. The JavaClass has a methods to get the information like structural information about the super classes and interfaces, to get the information of the class i.e. information about the field and methods in the class. The JavaClass will provide access to the some internal information about the class, including constant pool and identifiers. It also represents the Byte stream which is the complete binary class representation. If the actual binary class is parcel, then we can create the instance for the JavaClass. To handle the parsing BCEL provides a class called org.apache.bcel.Respository. The representation of the classes are parsed and cached by the BCEL by default, which are on the JVM path, to get the actual binary classes representation from the org.apache.bcel.util.respository instance. org.apache.bcel.util.respository is an interface which is source for binary classes representations. Changing the classes:- Not only the accessing the components of class, org.apache.bcel.Classfile.JavaClass also provide certain methods, in order to provide the liberty to change (or) alter the classes. The class component can be set to the new values by using those methods. Although those are of no direct use much, because the other classes in the package dont support constructing the new versions of the components that are building. There are certain classes in the org.apache.bcel.generic package that will provide the editable versions of the same components there in the org.apache.bcel.classfile classes. Org.apache.bcel.generic.ClassGen is the starting step (or) point for the creating the new classes. This also useful to modify the existing classes, to do this one, there is a constructor that takes a JavaClass Instance in order to initialize ClassGen class information. Once you modified the changes to the class, then we get the usable (or) useful class representation from ClassGen instance, in order get the usable representation of the class, we need to call any method that returns the class called JavaClass. Later it will be converted into the binary class information. It is little bit confusing, in order to eliminate this confusion, it is better to write a wrapper class for eliminating some differences. In order to manage the construction of the various class components, org.apache.bcel.generic provides many other classes apart from the ClassGen. It has a class called ConstantPoolGen , which is used to handle the constant pool. FieldGen, MethodGen classes which are used to handle the Fields and the methods in classes. For the working with the sequence of the JVM instructions there is other class called Instruction List. org.apache.bcel.generic also provides the classes for the each and every type instructions which are executed over JVM. We can create the instance for these classes directly some times and in other times by using the helper class called org.apache.generic.InstrcutionFactory. The main advantage of this helper class is, it handles are the book keeping details of the each and every instruction constructing for us( i.e. adding the items to the constant pool as required for the instructions). Sand Mark:- Sandmark is a tool i.e. developed to measure the performance of the software protection algorithms and effectiveness of the methods that are preventing the software from the piracy issues, water tampering and reverse engineering techniques. Sandmark is also has an ability to find which algorithm is most resiliences to the attacks and have a least performance of over head. There are many software protections are proposed both in software and hardware. The hardware protections are there from the dongle protection and now tamper-proof software. The sandmark tool is developed to evaluating and implementing the software-based techniques such as code obfuscation (making code complex to understand) and water tampering. History of reverse engineering:- Reverse engineering most probably starts with Dos (disk operating system) based computer games. The aim is to have full life and armed for the player to finish the final stage of the game. In that way the technique of reverse engineering came in to picture, it is just to find the memory locations where the life and number of weapons are stored and modifying the values of that memory locations. So that, the player can changes the values and gets through the final stage and win the game. Thats why memory cheating tools such as game hack came in to existence. Reverse Engineering:- Reverse engineering is the process of the understanding the particular aspects of the program, which are listed below To identify the components of the system and the interrelationship between the components. And enhance the components of the system and to improve the performance and scalability of the system (or) subsystem. Software reverse engineering is a technique that converts a machine code of a program (string 0s and 1s usually sent to logic processor) back in to the programmable language statements which is called as source code. Software reverse engineering is done to get the source code of the program because to know how the particular parts of the program performs particular operations in order to improve the program functionality or to fix the bugs in the program or to find malicious block of statements in the software if any. Generally, this reverse engineering will take place in older industries on machines. But now it is frequently used on computer hardware and softwar e. The important contents like data formats, algorithms what the programmer used to implement the software and ideas of the programmer (or) company will be revealed to the 3rd person by violating the security and privacy issues using reverse engineering technique. Reverse engineering is evolving as a major link in the software lifecycle, but its growth is hampered by confusion (Elliot J.chilkofsky James H.Cross ii, Jan 1990). Reverse engineering is generally implemented to improve the quality of the product, to observe the competitors products. Forward engineering is the process of moving from the high level abstracts (or) from the initial requirements stage (objectives, constraints and proper solution to the problem), logical, and independent designs (specification of the solution) to the final product i.e. implementation (coding and testing).; whereas the reverse engineering is the process of moving from the final product to the initial requirements stage in order to under the system logically, why particular function (or) action is being performed. By knowing the system logically, the flaws and errors in the system can be rectified and helps to improve the systems functionality when the source code of the application is not available. For this sake the concept of the reverse engineering techniques is evolved. Fig 1: reverse engineering and related process are transformations between or within the abstract levels, represented here in terms of life cycle phases. (Elliot J.chilkofsky James H.Cross ii, Jan 1990) Reverse engineering in and of itself doesnt mean changing the subsystem or developing the new system based on the existing. It is a process of examination (or) understanding the program (or) software but not replication (or) change. Reverse engineering involves very broad range of aspects such as starting from the existing implementation, recreating or recapturing the design ideas and extracts the actual requirements of the existing system. Design recovery is the most vital subset of the reverse engineering because in which knowledge of the domain, external (or) outer side information and deduction or fuzzy reasoning are added to the investigated (or) subjected system in order to find the high level abstract of the system, normally which is not obtained by directly observing the system. According to the Ted BiggerStaff: Students Paper: Ted BiggerStaff: design recovery recreates design abstractions from a combination of code, existing design documentation(if available), personal experience, and general knowledge about problem and application domains. Design recovery must reproduce Re-engineering is termed as renovation and reclamation, is the examination and altering the subjective system again to construct in the new form and the implementation of the new system. Re-engineering involves some form of reverse engineering i.e. to obtain the high level of the abstract of the existing system followed by forward engineering. This may be changes according to the new requirements that were not previously implemented in the system. While re-engineering is not super type of the forward engineering and reverse engineering but it uses the forward engineering and reverse engineering. Objectives:- The primary goal of the reverse engineering is to enhance the overall comprehensibility of the system for the both maintenance and new development. Cope up with the complexity. In order to meet the complexity and shear volumes of the system we have to develop a better methods i.e. automated support. In order to extract the relevant information reverse engineering methods and tools should be combined with the CASE environments. So that decision makers can control the process and product in system evolutions. Alternative views should be generated. Comprehension aids such as graphic representation as been accepted for long time. However maintaining and creating them is becoming difficult in the process. Reverse engineering facilitates the generation or regeneration of the graphical representation in the other forms. While many designers work on single diagrams such as data flow diagrams where as the reverse engineering tools will give the other graphical representations such as control flow diagrams, entity relation diagrams and structure charts to aid the review and verification process. To identify the side effects. Both haphazard initial design and intentional modifications to the system can lead to unintentional ramifications and side effects that affect the system performance. Reverse engineering can provide better observation than we can observe by forward engineering perspective. So it makes us to solve that ramifications and anomalies before users intimate them as bugs. Component reuse. Software reusability is becoming the more essential part in developing the new products in the software field. Reverse engineering can be able to help to detect the candidates for reusable components from the present system. To recover the lost information. When the continuous evolution of the long lived system which will lead to loss of information. In order to preserve the old information of the system design; design recovery of reverse engineering techniques is used. Many reverse engineering tools try to extract the structure of the legacy systems with the intension to pass this information to software engineers in order to re-engineer or to reverse engineer the existing component. Code reverse engineering:- During the evolution of the software, many changes will apply to the code, to add any functionality which is to be added and to change the code in order to rectify the defect and enhance the systems performance (or) quality. Systems with the poor documentation only the code will be reliable solution to get information about the system. As a result, the process of reverse engineering is focused on understanding the code. Thus reverse engineering has good and bad ends. Obfuscation:- Java provides platform independence to the software programs so that software programs will run independently on any platform. All the programs are compiled in order get intermediate code format i.e. A class file consists of a stream of very large amount of information regarding the program methods, variable and constant enough to do reverse engineering. When a company develops the program (or) software in java and sell this product in intermediate code format to the other organization by not giving the original software. The organization who buys the program (or) software will simply change (or) modify the software by violating the security and privacy issues of authorised company; by simply applying the reverse engineering technique. This reverse engineering will be done by the software developers, automated tools and decompilers. Java byte code can be easily decompiled, which makes reverse engineering technique easier in java. In programming context Obfuscation is described as, making program code more difficult to read and understand for security and privacy purposes of the software. Decompilers can easily extract the source code from the compiled code, in that point of view protecting the code secretly will make impossible. So the growth of obfuscators increased rapidly in order to keep effectively smoke screen around the code. Code obfuscation is the one of the most prominent and best method to protect the java code securely. Code obfuscation makes program to understand difficult. So that code will be more resistant to the reverse engineering. There are 2 byte code obfuscation techniques that are: source code obfuscation byte code obfuscation Source code technique is simply changing the source code of the program, where as byte code obfuscation is changing the classfile of the program (functionality is same as the source code). There several obfuscation techniques to prevent java byte code from decompilation. For example consider a set of class files, S, becomes another set of class files S through an obfuscator. Here the set of class files of s and s are different, but they produce the same output. Example:- class OHello { public OHello() { int num=1; } public String gHello(String hname){ return hname; } when the above code is passed through the simple obfuscator (such as Klass Master), the following code will be generated. class aa { public static boolean aa; public aa() { int aa=1; } public String aa(String ba){ return ba; } By observing the above code the class name OHello is changed to the aa and the gHello method name is changed to the aa. It is more difficult to read the program with aa than a OHello. By this way less information will be interpreted and understand to the reverse engineers. This is just a simple example by renaming the class variables and class method names. Categories of obfuscation techniques:- Description of Obfuscation techniques:- One way of obfuscating the source program by the obfuscators is replacing a symbol of a class file by illegal string. The replacement might be the private are even worst ***. Other techniques usually obfuscator will use targeting the specific decompilers (Mocha and Jode) is inserting a bad instruction in the code. The example is Let us taken an example with bad instruction, lets take the original code (decompiled): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return and after obfuscation the code is as follows (names are not changed, not to make complex): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return 7 pop By observing the above routine we notice that a pop instruction is added after the return statement. The last and final statement in the method that has return type should be return statement, but in the above routine a pop keyword is inserted which make the routine not to be executed for ever. Lexical obfuscation:- Lexical obfuscation changes the lexical structure of a program by scrambling the identifiers. All the names of classes, fields and methods which are meaningful symbolic information of java program, is renamed with meaningless name i.e. useless names. An example obfuscator for lexical obfuscation is crema. Obfuscator is defined as the program that automatically makes the transformation in the classfile in order obfuscate the classfile, to undo the reverse engineering technique to produce the source code from the class file. Layout obfuscation:- Layout obfuscation dealt with changing the layout structure of the program i.e. done by 2 basic methods Renaming the identifiers Removing the debugging information. Above 2 will make program code less informative to the reverse engineers. Layout obfuscation techniques use the one way functions such renaming the identifiers by random symbols, removing the comments, unused methods and debugging information. Though the reverse engineers can understand the obfuscated code i.e. done by layout obfuscation, it consumes the cost of reverse engineering. Layout obfuscation techniques are most commonly used in the code obfuscation. All most all obfuscators of java will use these techniques. Control obfuscation:- Changing the control flow of the program. It is easiest way to do and which make reverse engineer to find the code what exactly. For example consider a code in which a there is a method A(). Here another new method called A_Dummy() will be created and in the program Data Obfuscation:- Data obfuscation mainly deals with breaking up the data structures used in the program and encrypting the literals. This includes changing the inheritance, restructuring the arrays, making the variable names constant etc. In that way data obfuscation affect the data structures of the program. Thus data obfuscation make impossible to obtain the original source code of the program. More viable source code obfuscation methods are based on composite functions, which are Array Index Transformation, Method Argument Transformation, and Hiding Constant. The obfuscation techniques that are based on composite functions make the computation complex and extensive use of these techniques make the software to respond slowly. Some source code obfuscation methods are directed at the object oriented concept; Class Coalescing, Class splitting, and Type Hiding. Other source code obfuscation techniques may include; false refactoring, restructure arrays, inline and outline methods, clone methods, split v ariables, convert static to procedural data, and merge scalar variables. The obfuscation techniques that work over object oriented concept and other techniques like restructure arrays, split variables, merge scalar variables may distort the logic of the software, so these must be carefully used. The employment of obfuscation technique like outline methods, clone methods, convert static to procedural data increase the size of a class file without providing any significant advantage. In lining a method results in an unresolved method call when some other class calls the in lined method. Advanced obfuscation techniques for byte code:- There are several obfuscation techniques to prevent java byte code from de-compilation. Many of these tools are simply to change the names of the identifiers with the meaningless names which are stored in byte code. Many crackers can understand the actual source code, even though identifier name are changed, but it will take more time to understand. Traditionally, when a program is compiled to machine code, most of the symbolic information will be stripped off, after the compilation of the program. When the program is compiled, the address of the variable and functions of the program will be denoted by the identifiers. Even though de-compilation of such compiled code is difficult, but still it is possible to decompile the code. We say protection techniques are difficult if and only if the time and effort taken by the cracker to crack the software should be with more cost and effort. Cracking time to crack software is more than a re-writing a program, then its of no use and waste of time and valueless. Java became the most popular because of benefits that it is providing. One of the major benefits is portability i.e. compiled program can run on any platform i.e. platform independent. When the program is compiled it produces independent byte code. Java uses the symbolic references rather than the traditional memory addresses. Therefore, the names of methods and, variables and types are stored in a constant pool with in a byte code file. There are many commercial de-compilers (P C, 2001, Vliot 1996, hoeniche 2001 etc.). When the program is decompiled, it extracts the program almost identical to the source code. Making use of decompiler to extract the source code becomes the lethal weapon to intellectual property piracy. Obfuscation technique is used to stop de-compilation of the byte code. The main aim of obfuscation technique is to make decompiled program harder to understand i.e. more time and effort to understand the obfuscated code. Obfuscation scope:- Java application consists of one or more packages. A programmer might divide the program in to packages. He can also use the packages that are in standard library and proprietary libraries. Only the part of the program developed by the developer will be given outside. The proprietary library is not distributed due to the copyright restrictions. Obfuscation scope termed as the part of the program obfuscated by the obfuscation techniques, i.e. the part of the program/software developed by the developer is protected not the entire software. The package that serves as the utilities for the standard library and proprietary libraries not obfuscated. Candidates considered for identifiers scrambling:- An identifier will denote the following terms in java http://www.cis.nctu.edu.tw/~wuuyang/papers/Obfuscation20011123.doc the bytecode file. By default, parameters and local variables are stripped and deleted (or) removed from the byte code. The names of the local variables and parameters are stored in the LocalVariableTable in the byte code, if the debug info is enabled. But, by default the de-bug info is enabled in java compiler. If the local variable is not found, de-compilers itself create the names for local variable and parameter, which makes program after reverse somewhat understandable. Even, if we rename the names of the variables and parameter in LocalVariableTable, good decompiler will simply Characteristics of Java Language Characteristics of Java Language Chapter 2 Literature review About Java:- Initially java language is named as Oak in 1991, which is designed for the consumer electronic appliances. Later in 1995 the name was changed to Java. Java was developed by James Gosling, a development leader in sun micro system. Oak was redesigned in 1995 and changed the name to java for the development of the applications which can be run over internet. Using the java language, java programs can be embedded in to the html pages. Java is not only limited for the web applications, it is also useful to develop the stand alone applications. Java has a feature called OOPs, which make it more familiar. Object oriented programming replaced the old traditional techniques i.e. procedural programming. Characteristics of java:- Simple:- Java language is simple than the previous languages such as c and c++. Java eliminates the pointers concept which is earlier present in c and c++. Java also has a properties i.e. automatic allocation of memory and garbage collection, where as in c/c++ the garbage collection and allocation of memory will be done by the programmer which is a complex task. Object oriented:- All the programming languages apart from the c++ are procedural languages which are paradigm of procedures. Java programming language is object oriented because java uses the concept of the object. In java everything will depend on objects i.e. creating the objects and making objects to work together. The overall functionality of the high level program will depends on the objects. Because java is object oriented program it provides great range of reusability, modularity and flexibility. Distributed:- Java uses the http and ftp which are internet protocols, in order to have access the files over the network. So by using this libraries which are in java can easily make file transfers over the network which is connected to internet. Interpreted:- In order to run the java programs we need interpreter. When the java programs are compiled it produces the byte code, which is machine understandable language. The byte code which is produced after the compilation is machine independent, so that it can run on any system using java interpreter. Most of the compilers will convert the high level language instructions to the low-level machine understandable language as machine cant understand the high level instruction. The machine code can only be executed on that compiled native machine. For example a source code is compile on windows platform, the executable file produced after cant be executed on other platforms apart from the windows. But, coming to java it is different i.e. the source code is compiled once and the executable byte code can be run on any platform using java interpreter. The main functionality of the interpreter is, it converts the byte code to the machine language of the target machine. Robust and secure:- Java programming is more reliable. At the time of the execution time java shows all the errors. In java bad and error prone language constructs are eliminated. Java eliminated the concepts such as pointers, due to this there is no corruption of data and overwriting the memory locations. In the same way java supports the exception-handling, which makes java more reliable and robust. Java forces the programmer to write the code for the exceptions, which may occur during the execution of the program. So that program can be terminated successfully, without any error stopping the execution flow of the program. Java also provides the lot of security. Security is important over the network because the computer will be attacked by the external program. Java provides the security that; it encounters the applets for the un-trusted sources. Architecture- neutral:- Java is a interpreted language, which enables java as a architectural neutral i.e. platform independent. We can write the program once and it can be executed on any platform with the help of the Java Virtual Machine (JVM). The java virtual machine can be embedded on the operating system or on web browser. Once the part of the java code is loaded into the machine, it is verified. Byte code verification play a major role, as it check all the code generated by the compiler will not corrupt the machine on which the code is loaded. At the end of the compilation, byte code verification will be done; in order to make sure thats the code is accurate and correct. So the byte code verification is the integral to the compilation and execution. Due to the property of architectural neutral had by java, it is portable. The program once written can be run on any platform without recompilation. Java does not provide any platform specific features. In other languages, such as Ada where the large integer varies according to the platform it runs. But in the case of java the range of the numbers are fixed. Java environment is portal to every operating system and hardware. Multi-threaded:- It is defined as the programs ability to perform several tasks (or) functions simultaneously. The multithreading property is embedded in the java program. Using the java programs we can perform the several tasks simultaneously without calling any procedures of the operating system, which is done by the other programming languages in order to perform the multi-threading. Constant Pool:- Every program i.e. class in java, has a array of constants in the heap memory called as the constant pool, which is available to that class. Usually it is created by the java compiler. The constants encode all the name of the (methods, variables and constant that are presented in the constant pool) which is used by particular method of any class. Each individual class i.e. stored in heap memory has a count of how many constants are there and also has offset which specifies how far in to the class description itself the array of constants begins (Laura Lemay, Charles L.Perkins, and Micheal Morrison, n.d). The constants are represented (or) typed in the special coded bytes and which has a very well defined format, when these constants are appeared in the .class file for the java class file. JVM instructions refer to the symbolic information in java, rather than relying on the run time layouts of the class, methods and fields. Sun Java Wireless Toolkit:- Sun java wireless toolkit CLDC (connected Limited Device Configuration) is a group of tools which is used to develop the applications for the mobiles and for other wireless equipments (or) devices. Although the sun java wireless toolkit is based on the MIDP (Mobile Information Device Profile), it also supports many other optional packages, which make a sun java wireless toolkit as a great tool for developing many applications. It can be supported on the windows and Linux. All the users who have account on the host machine can access this tool either singly or simultaneously. It allows you to use a byte code obfuscator to reduce the size of your MIDlet suite JAR file. It also supports many other standard Application Programming Interfaces (APIs) which are defined by the (JCP) Java Community Process program. Even though, the sun java wireless toolkit did not come up with an obfuscator, it is configured in a way that it supports the ProGaurd. All you need to do is, just simply to download the ProGuard and place it in the system, which sun java wireless tool kit can find it. But due to the flexible nature of the tool, it allows any kind of the obfuscator. BCEL:- BCEL full abbreviation is Byte Code Engineering library. The BCEL helps you to dig the byte code of the java classes. BCEL gives the utmost power on the code because it works at the individual JVM instructions, even though the power comes with cost in complexity. Using the BCEL, we can transform the existing classes transformation or we can construct the new classes. The main difference between the BCEL and Javassist is javassist provides the source code interface where as the BCEL is developed in the intension to work at the level of the JVM assembly language. BCEL is good because the approach it uses is low level, which is very helpful to control the program at the instruction level. Compared to Javassist it is more complex to work with the BCEL. BCEL has the capability to inspect, to edit and to create binary classes in java. There are 2 hierarchy components in the BCEL, in which one component is used to create the new code and the other component is used to edit (or) update the existing code. The inspection of the class aspect in the BCEL mainly deals with the duplication whatever available in the java platform using the Reflection API. This duplication is necessary (or) mandatory in classworking because we generally dont want to load the classes on which we are working until they are modified fully. Org.apache.bcel.classfile package provides all the definition which is related to inspection-related code.org.apache.bcel package provides the basic constant definitions. JavaClass is a class which is the starting point of the package. The JavaClass plays a role in accessing the information of the class using the BCEL same as like java,lang.Class does using the regular reflection in java. The JavaClass has a methods to get the information like structural information about the super classes and interfaces, to get the information of the class i.e. information about the field and methods in the class. The JavaClass will provide access to the some internal information about the class, including constant pool and identifiers. It also represents the Byte stream which is the complete binary class representation. If the actual binary class is parcel, then we can create the instance for the JavaClass. To handle the parsing BCEL provides a class called org.apache.bcel.Respository. The representation of the classes are parsed and cached by the BCEL by default, which are on the JVM path, to get the actual binary classes representation from the org.apache.bcel.util.respository instance. org.apache.bcel.util.respository is an interface which is source for binary classes representations. Changing the classes:- Not only the accessing the components of class, org.apache.bcel.Classfile.JavaClass also provide certain methods, in order to provide the liberty to change (or) alter the classes. The class component can be set to the new values by using those methods. Although those are of no direct use much, because the other classes in the package dont support constructing the new versions of the components that are building. There are certain classes in the org.apache.bcel.generic package that will provide the editable versions of the same components there in the org.apache.bcel.classfile classes. Org.apache.bcel.generic.ClassGen is the starting step (or) point for the creating the new classes. This also useful to modify the existing classes, to do this one, there is a constructor that takes a JavaClass Instance in order to initialize ClassGen class information. Once you modified the changes to the class, then we get the usable (or) useful class representation from ClassGen instance, in order get the usable representation of the class, we need to call any method that returns the class called JavaClass. Later it will be converted into the binary class information. It is little bit confusing, in order to eliminate this confusion, it is better to write a wrapper class for eliminating some differences. In order to manage the construction of the various class components, org.apache.bcel.generic provides many other classes apart from the ClassGen. It has a class called ConstantPoolGen , which is used to handle the constant pool. FieldGen, MethodGen classes which are used to handle the Fields and the methods in classes. For the working with the sequence of the JVM instructions there is other class called Instruction List. org.apache.bcel.generic also provides the classes for the each and every type instructions which are executed over JVM. We can create the instance for these classes directly some times and in other times by using the helper class called org.apache.generic.InstrcutionFactory. The main advantage of this helper class is, it handles are the book keeping details of the each and every instruction constructing for us( i.e. adding the items to the constant pool as required for the instructions). Sand Mark:- Sandmark is a tool i.e. developed to measure the performance of the software protection algorithms and effectiveness of the methods that are preventing the software from the piracy issues, water tampering and reverse engineering techniques. Sandmark is also has an ability to find which algorithm is most resiliences to the attacks and have a least performance of over head. There are many software protections are proposed both in software and hardware. The hardware protections are there from the dongle protection and now tamper-proof software. The sandmark tool is developed to evaluating and implementing the software-based techniques such as code obfuscation (making code complex to understand) and water tampering. History of reverse engineering:- Reverse engineering most probably starts with Dos (disk operating system) based computer games. The aim is to have full life and armed for the player to finish the final stage of the game. In that way the technique of reverse engineering came in to picture, it is just to find the memory locations where the life and number of weapons are stored and modifying the values of that memory locations. So that, the player can changes the values and gets through the final stage and win the game. Thats why memory cheating tools such as game hack came in to existence. Reverse Engineering:- Reverse engineering is the process of the understanding the particular aspects of the program, which are listed below To identify the components of the system and the interrelationship between the components. And enhance the components of the system and to improve the performance and scalability of the system (or) subsystem. Software reverse engineering is a technique that converts a machine code of a program (string 0s and 1s usually sent to logic processor) back in to the programmable language statements which is called as source code. Software reverse engineering is done to get the source code of the program because to know how the particular parts of the program performs particular operations in order to improve the program functionality or to fix the bugs in the program or to find malicious block of statements in the software if any. Generally, this reverse engineering will take place in older industries on machines. But now it is frequently used on computer hardware and softwar e. The important contents like data formats, algorithms what the programmer used to implement the software and ideas of the programmer (or) company will be revealed to the 3rd person by violating the security and privacy issues using reverse engineering technique. Reverse engineering is evolving as a major link in the software lifecycle, but its growth is hampered by confusion (Elliot J.chilkofsky James H.Cross ii, Jan 1990). Reverse engineering is generally implemented to improve the quality of the product, to observe the competitors products. Forward engineering is the process of moving from the high level abstracts (or) from the initial requirements stage (objectives, constraints and proper solution to the problem), logical, and independent designs (specification of the solution) to the final product i.e. implementation (coding and testing).; whereas the reverse engineering is the process of moving from the final product to the initial requirements stage in order to under the system logically, why particular function (or) action is being performed. By knowing the system logically, the flaws and errors in the system can be rectified and helps to improve the systems functionality when the source code of the application is not available. For this sake the concept of the reverse engineering techniques is evolved. Fig 1: reverse engineering and related process are transformations between or within the abstract levels, represented here in terms of life cycle phases. (Elliot J.chilkofsky James H.Cross ii, Jan 1990) Reverse engineering in and of itself doesnt mean changing the subsystem or developing the new system based on the existing. It is a process of examination (or) understanding the program (or) software but not replication (or) change. Reverse engineering involves very broad range of aspects such as starting from the existing implementation, recreating or recapturing the design ideas and extracts the actual requirements of the existing system. Design recovery is the most vital subset of the reverse engineering because in which knowledge of the domain, external (or) outer side information and deduction or fuzzy reasoning are added to the investigated (or) subjected system in order to find the high level abstract of the system, normally which is not obtained by directly observing the system. According to the Ted BiggerStaff: Students Paper: Ted BiggerStaff: design recovery recreates design abstractions from a combination of code, existing design documentation(if available), personal experience, and general knowledge about problem and application domains. Design recovery must reproduce Re-engineering is termed as renovation and reclamation, is the examination and altering the subjective system again to construct in the new form and the implementation of the new system. Re-engineering involves some form of reverse engineering i.e. to obtain the high level of the abstract of the existing system followed by forward engineering. This may be changes according to the new requirements that were not previously implemented in the system. While re-engineering is not super type of the forward engineering and reverse engineering but it uses the forward engineering and reverse engineering. Objectives:- The primary goal of the reverse engineering is to enhance the overall comprehensibility of the system for the both maintenance and new development. Cope up with the complexity. In order to meet the complexity and shear volumes of the system we have to develop a better methods i.e. automated support. In order to extract the relevant information reverse engineering methods and tools should be combined with the CASE environments. So that decision makers can control the process and product in system evolutions. Alternative views should be generated. Comprehension aids such as graphic representation as been accepted for long time. However maintaining and creating them is becoming difficult in the process. Reverse engineering facilitates the generation or regeneration of the graphical representation in the other forms. While many designers work on single diagrams such as data flow diagrams where as the reverse engineering tools will give the other graphical representations such as control flow diagrams, entity relation diagrams and structure charts to aid the review and verification process. To identify the side effects. Both haphazard initial design and intentional modifications to the system can lead to unintentional ramifications and side effects that affect the system performance. Reverse engineering can provide better observation than we can observe by forward engineering perspective. So it makes us to solve that ramifications and anomalies before users intimate them as bugs. Component reuse. Software reusability is becoming the more essential part in developing the new products in the software field. Reverse engineering can be able to help to detect the candidates for reusable components from the present system. To recover the lost information. When the continuous evolution of the long lived system which will lead to loss of information. In order to preserve the old information of the system design; design recovery of reverse engineering techniques is used. Many reverse engineering tools try to extract the structure of the legacy systems with the intension to pass this information to software engineers in order to re-engineer or to reverse engineer the existing component. Code reverse engineering:- During the evolution of the software, many changes will apply to the code, to add any functionality which is to be added and to change the code in order to rectify the defect and enhance the systems performance (or) quality. Systems with the poor documentation only the code will be reliable solution to get information about the system. As a result, the process of reverse engineering is focused on understanding the code. Thus reverse engineering has good and bad ends. Obfuscation:- Java provides platform independence to the software programs so that software programs will run independently on any platform. All the programs are compiled in order get intermediate code format i.e. A class file consists of a stream of very large amount of information regarding the program methods, variable and constant enough to do reverse engineering. When a company develops the program (or) software in java and sell this product in intermediate code format to the other organization by not giving the original software. The organization who buys the program (or) software will simply change (or) modify the software by violating the security and privacy issues of authorised company; by simply applying the reverse engineering technique. This reverse engineering will be done by the software developers, automated tools and decompilers. Java byte code can be easily decompiled, which makes reverse engineering technique easier in java. In programming context Obfuscation is described as, making program code more difficult to read and understand for security and privacy purposes of the software. Decompilers can easily extract the source code from the compiled code, in that point of view protecting the code secretly will make impossible. So the growth of obfuscators increased rapidly in order to keep effectively smoke screen around the code. Code obfuscation is the one of the most prominent and best method to protect the java code securely. Code obfuscation makes program to understand difficult. So that code will be more resistant to the reverse engineering. There are 2 byte code obfuscation techniques that are: source code obfuscation byte code obfuscation Source code technique is simply changing the source code of the program, where as byte code obfuscation is changing the classfile of the program (functionality is same as the source code). There several obfuscation techniques to prevent java byte code from decompilation. For example consider a set of class files, S, becomes another set of class files S through an obfuscator. Here the set of class files of s and s are different, but they produce the same output. Example:- class OHello { public OHello() { int num=1; } public String gHello(String hname){ return hname; } when the above code is passed through the simple obfuscator (such as Klass Master), the following code will be generated. class aa { public static boolean aa; public aa() { int aa=1; } public String aa(String ba){ return ba; } By observing the above code the class name OHello is changed to the aa and the gHello method name is changed to the aa. It is more difficult to read the program with aa than a OHello. By this way less information will be interpreted and understand to the reverse engineers. This is just a simple example by renaming the class variables and class method names. Categories of obfuscation techniques:- Description of Obfuscation techniques:- One way of obfuscating the source program by the obfuscators is replacing a symbol of a class file by illegal string. The replacement might be the private are even worst ***. Other techniques usually obfuscator will use targeting the specific decompilers (Mocha and Jode) is inserting a bad instruction in the code. The example is Let us taken an example with bad instruction, lets take the original code (decompiled): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return and after obfuscation the code is as follows (names are not changed, not to make complex): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return 7 pop By observing the above routine we notice that a pop instruction is added after the return statement. The last and final statement in the method that has return type should be return statement, but in the above routine a pop keyword is inserted which make the routine not to be executed for ever. Lexical obfuscation:- Lexical obfuscation changes the lexical structure of a program by scrambling the identifiers. All the names of classes, fields and methods which are meaningful symbolic information of java program, is renamed with meaningless name i.e. useless names. An example obfuscator for lexical obfuscation is crema. Obfuscator is defined as the program that automatically makes the transformation in the classfile in order obfuscate the classfile, to undo the reverse engineering technique to produce the source code from the class file. Layout obfuscation:- Layout obfuscation dealt with changing the layout structure of the program i.e. done by 2 basic methods Renaming the identifiers Removing the debugging information. Above 2 will make program code less informative to the reverse engineers. Layout obfuscation techniques use the one way functions such renaming the identifiers by random symbols, removing the comments, unused methods and debugging information. Though the reverse engineers can understand the obfuscated code i.e. done by layout obfuscation, it consumes the cost of reverse engineering. Layout obfuscation techniques are most commonly used in the code obfuscation. All most all obfuscators of java will use these techniques. Control obfuscation:- Changing the control flow of the program. It is easiest way to do and which make reverse engineer to find the code what exactly. For example consider a code in which a there is a method A(). Here another new method called A_Dummy() will be created and in the program Data Obfuscation:- Data obfuscation mainly deals with breaking up the data structures used in the program and encrypting the literals. This includes changing the inheritance, restructuring the arrays, making the variable names constant etc. In that way data obfuscation affect the data structures of the program. Thus data obfuscation make impossible to obtain the original source code of the program. More viable source code obfuscation methods are based on composite functions, which are Array Index Transformation, Method Argument Transformation, and Hiding Constant. The obfuscation techniques that are based on composite functions make the computation complex and extensive use of these techniques make the software to respond slowly. Some source code obfuscation methods are directed at the object oriented concept; Class Coalescing, Class splitting, and Type Hiding. Other source code obfuscation techniques may include; false refactoring, restructure arrays, inline and outline methods, clone methods, split v ariables, convert static to procedural data, and merge scalar variables. The obfuscation techniques that work over object oriented concept and other techniques like restructure arrays, split variables, merge scalar variables may distort the logic of the software, so these must be carefully used. The employment of obfuscation technique like outline methods, clone methods, convert static to procedural data increase the size of a class file without providing any significant advantage. In lining a method results in an unresolved method call when some other class calls the in lined method. Advanced obfuscation techniques for byte code:- There are several obfuscation techniques to prevent java byte code from de-compilation. Many of these tools are simply to change the names of the identifiers with the meaningless names which are stored in byte code. Many crackers can understand the actual source code, even though identifier name are changed, but it will take more time to understand. Traditionally, when a program is compiled to machine code, most of the symbolic information will be stripped off, after the compilation of the program. When the program is compiled, the address of the variable and functions of the program will be denoted by the identifiers. Even though de-compilation of such compiled code is difficult, but still it is possible to decompile the code. We say protection techniques are difficult if and only if the time and effort taken by the cracker to crack the software should be with more cost and effort. Cracking time to crack software is more than a re-writing a program, then its of no use and waste of time and valueless. Java became the most popular because of benefits that it is providing. One of the major benefits is portability i.e. compiled program can run on any platform i.e. platform independent. When the program is compiled it produces independent byte code. Java uses the symbolic references rather than the traditional memory addresses. Therefore, the names of methods and, variables and types are stored in a constant pool with in a byte code file. There are many commercial de-compilers (P C, 2001, Vliot 1996, hoeniche 2001 etc.). When the program is decompiled, it extracts the program almost identical to the source code. Making use of decompiler to extract the source code becomes the lethal weapon to intellectual property piracy. Obfuscation technique is used to stop de-compilation of the byte code. The main aim of obfuscation technique is to make decompiled program harder to understand i.e. more time and effort to understand the obfuscated code. Obfuscation scope:- Java application consists of one or more packages. A programmer might divide the program in to packages. He can also use the packages that are in standard library and proprietary libraries. Only the part of the program developed by the developer will be given outside. The proprietary library is not distributed due to the copyright restrictions. Obfuscation scope termed as the part of the program obfuscated by the obfuscation techniques, i.e. the part of the program/software developed by the developer is protected not the entire software. The package that serves as the utilities for the standard library and proprietary libraries not obfuscated. Candidates considered for identifiers scrambling:- An identifier will denote the following terms in java http://www.cis.nctu.edu.tw/~wuuyang/papers/Obfuscation20011123.doc the bytecode file. By default, parameters and local variables are stripped and deleted (or) removed from the byte code. The names of the local variables and parameters are stored in the LocalVariableTable in the byte code, if the debug info is enabled. But, by default the de-bug info is enabled in java compiler. If the local variable is not found, de-compilers itself create the names for local variable and parameter, which makes program after reverse somewhat understandable. Even, if we rename the names of the variables and parameter in LocalVariableTable, good decompiler will simply