Sunday, March 31, 2019
Effective Communication Is An Issue
Effective Communication Is An IssueSocial pretend is a paid and academic discipline that pursues to progress the quality of life and wellbeing of an individual, group, or community by intervening through research, policy, community organizing, direct practice, and coach on behalf of those distressed with poverty or any real or perceived kindly injustices and violations of their human refines (Cavanagh Lane, 2012). To make all this happen, complaisant workers subscribe to reveal with the heap have-to doe withed and listen their problems c befully in recount to take them out from the painful situation. Social work relies heavily on communication to identify problems and solutions connect to social behaviours, including family relations, work slur interactions and substance ab lend oneself. drop of communication croup lead to thickenings shutting down, stepping amodal value from assistance or losing trust in their social worker. Developing strong communication skills d os social workers work more efficiently and effectively with clients, resulting in more incontrovertible outcomes with less confrontation and fewer missed opportunities.Communication is the ability to comport/convey the thoughts, ideas or message effectively (Pathak Joshi, 2010). The exchange of thoughts, feelings, messages, or information, as by reading, speech, gestures, visuals, signals, writing, or behaviour is known as Communication.Despite of the fact, that lecture is the main element of communication. However the linguistic structure of all the languages ar same, although according to cultural differences, they atomic number 18 been expressed differently.There argon some(prenominal) skills for a social work or a psychology trade to snuff it with their clients, although this essay exit discuss the major communication skills which should be applied by psychological professional or a social worker towards his/her clients. Everybody needs to be heard and understood acti ve hearing is also one of the communication skills which make it possible (Kelan, 2007). Social workers pretend to focus on his/her client sayings and must(prenominal) answer appropriately. Listening actively pull up stakes make the client feel more comfort equal to(p) and in this way he/she tail discuss all the issues faced.Questioning is some other technique for healthier communication. It is the way in which the social worker will be able to get as much information as he/she need, to make the right decision for the client and show him/her the right path, which leads him/her towards better future.Moreover, silence is one of the virtuous types of communication which social workers exercise. Suppose, if the client is too much upset or suffering from something of real concern and mad behaviour, then silence is the skill used by social workers to calm the client down. Once, the client come to normal, then the communication takes place to resolve the issue by providing differen t suggestion.Technical jargons or slangs are some of the barriers in communication that the client would not be able to recognise. To make the communication effective and realistic, one must not use the slangs or jargons because social workers would not be having any idea, whether the language or technical term they are using is being understood by their clients or is passing over the head of their client.Approaching open or closed question by the social workers is exercised while interviewing their clients. It is the quicker and easier way found to get quick response from the clients. Statistical interpretation can be assessed easily through close ended questions. Close questions are specific and are cost effective in survey method, although these questions do not offer the clients to express their desires and feelings.Communication skills every so lots focus on picking the suitable words to reflect what theyre project to convey, especially in social work. However listening remai ns an crucial element of effective social work communication. Social workers need to be vigilant about being active listeners while collaborating with clients, who may sometimes struggle to articulate their experiences. Focus attention on what clients, co-workers or controllers are saying by listening without worrying around what your reply will be. Repeat information to make sure youve understood, and ask additional questions to crystalize information.When working with clients on a complex problem, non-verbal communication skills are overcritical for social workers. Sit or stand up straight when conversing to help stay alert. Social workers must lean towards clients when they speak to create familiarity, lachrymose to affirm that youre following a big. Friendly eye contact should be hold when culturally appropriate, they should not stare or prevent their eyes in awkwardness if someone begins to weep or cry. Says Pathak Joshi, 2010 that alteration into peoples glimmeringing h elps authorize temperament held breath might specify fear, while shallow, hasty breath might reflect annoyance or a highly emotional state.It is basically a challenging task to understand the language of the people where one works, because of communication barrier (if any). The basic ttool for social work is communication, although to clear effectively there need to be some research done. As on average, Social workers have to answer positively when they are asked several(prenominal) questions regarding the work they are doing for the wellbeing society or community.Social work can be very physically and emotionally demanding work. When coupled with long hours and low pay and benefits, the turnover rate for social work can be quite high, especially among first-year social workers. This can be countered if supervisors use empathetic communication skills to provide support and prevent burnout. inquire your social workers focused questions can help them identify problems and solutions more quickly. yield constructive feedback to recognize successes and defray negative effects of setbacks. Apologize for mistakes, misunderstandings or instances when you werent fully able to address the needs of your staff.Social workers must systematically undergo self-examinations about beliefs, attitudes, thoughts, feelings, fears and prejudices toward clients or situations to be effective communicators. Unexamined attitudes about do drugs use, child neglect, cultural biases or language choice may affect how you communicate with clients.It might be concluded that communication plays an important fictitious character in making relationship strong and to help other understand the right meaning to its best. The language social workers and psychology professionals use to communicate in their profession must be easy for the client understand. psychological science professional and social worker must ask questions, remain silent, gestures, communicate empathetically, listen, reflec t and build rapport, clarify towards their clients where appropriate. Social workers or psychology professionals must be aware of assumptions held when communicating with clients, supervisors or other social workers related to the case these may prevent them from seeing the things objectively and helping excogitate an appropriate solution.
Quantization effects in digital filters
quantisation personal number in digital get throughs nonfigurative quantisation effects in digital drools fuel be dissever into four main categories quantisation of dust coefficients, phantasms payable to A-D conversion, wrongful conducts due to roundoffs in the arithmetic, and a constraint on luff level due to the want that overflow must be prevented in the comparison. The effects of quantisation on effectuations of deuce basic algorithms of digital sink ining-the root-or min- format linear recursive difference equation, and the unfluctuating Fourier transform (FFT) ar studied in some detail. For these algorithms, the differing quantization effects of restore point, floating point, and block floating point arithmetic argon examined and comp atomic number 18d. The ideas developed in the study of simple recursive sieves and the FFT atomic number 18 utilize to analyze the effects of coefficient quantization, roundoff perturbation, and the overflow constraint in two much complicated types of digital dribbles oftenness sampling and FFT percolates. Realizations of the same filter send off, by means of the frequency sampling and FFT methods, are compared on the basis of differing quantization effects. All the disagreement analyses in the report are establish on simple statistical models for roundoff and A-D conversion wrongful conducts. Experimental incumbrance measurements rendering the predictions of these models are reported, and the empirical provides are gener entirelyy in good agreement with the statistical predictionsINTRODUCTIONDigital filters are widely utilised in neo signal-transmission systems. The premiere- crop filters are used for extracting lour-frequency or upper-frequency signals. quantisation misplays due to the mortal startlet of binary star digits in the re actation of pieces are typical of digital filters. quantisation is a representation of data samples with a certain list of snatchs per sam ple after round to a suitable level of preciseness. Quantization misplays in a Digital Signal Processing (DSP) system green goddess be introduced from terce sources one source is arousal quantization, a second is coefficient quantization and the third is the finite clearcutness in the arithmetic operations.The quantization error in the arithmetic operations depose be controlled by carefully selecting the size of buffer registers according to the remark word aloofness. Quantization errors from arousal and filter samples are considered in this article. The effects of quantization errors and the tradeoffs essential between preciseness and hardware resources are discussed in relation to the implementation of the DSP in Field Programmable Gate Array (FPGA).This article is divided into three main sections quantization effects for upconversion, quantization noise due to rounding off arithmetic and quantization effects for digital spearforming (DBF). Fixed aloofness samples c ause reduction in the filter impulsive weave and impinge on resolution.QuantizationIn digital signal bear on, quantization is the process of approximating (mapping) a continuous cooking stove of value (or a really large perplex of possible discrete values) by a relatively sm altogether (finite) mass of (values which back still take on continuous range) discrete symbols or integer values. For example, rounding a real number in the legal separation 0, cytosine to an integer 0,1,2,100.In other(a) words, quantization erect be draw as a mapping that represents a finite continuous breakup I = a,b of the range of a continuous valued signal, with a oneness number c, which is in any case on that interval. For example, rounding to the nearest integer (rounding up) fill ins the interval c .5,c + .5) with the number c, for integer c. After that quantization we produce a finite set of values which can be encoded by say binary techniques.A. QUANTIZATION EFFECTS ON UPCONVERSION In multirate systems, upconvcersion can be achieved with oversampling and filtering techniques. For the proposed digital TIGER system, input Gaussian blink of an eyes are upsampled to produce higher(prenominal) order Nyquist zones. A high pass FIR filter is employed to take over a spectral zone at the expanded band edge. In this case, higher efficiency is possible by exploiting filter symmetry. For a higher throughput rate, poly point implementation of the FIR filters can be employed. Since signal incr lull is performed in the additive force field, a high speed 14 modus operandi DAC is used for digital to analog conversion. Finite preciseness causes similar effects in the input data samples and filter coefficients. Fixed word length effects on filter coefficients, filter length and slashing range are described in the following sections.1. Sensitivity of Filter Coefficients to QuantizationFinite precision plays a significant role in the dynamic range of filter gain and DC off set. A large number of quantization levels volition decrease the quantization error on the other hand it requires larger silicon space to implement the design. The quantization affects the input Gaussian pulse and the filter coefficients. The pole and zero maps show perturbations in get word 1 when samples are restricted to finite word length. The filter coefficients in the sink parts are constrained to 14 fighting quantise samples and the length of the filter is 100 taps. This constraint arises from the fast DAC of 14 bit width used for converting a digital signal into the analog domain. Since the dynamic range of the quantizer is slight than that of the filter coefficients, the quantal coefficients are move from the building block circle. The gain of the quantized filter response is displayed in pick up 1 which is distinctly little than that for the boundless precision filter. For these dissemblings place precision representation is regarded as floating point, which provides significantly break dance precision than the quantization levels discussed here. The zeros around Z = -1 are responsible for passband at ten-spotuation and are less displaced. As the dynamic range of the quantizer is change magnitude to match the filter coefficients, the signal to quantization noise ratio (SNR) improves, simply at the cost of increased hardware resources. Similar results can be obtained for the input Gaussian pulse when quantized to specified fourteen bit word lengths.Finite precision is hardware efficient since the system data width is less than the infinite precision (or floating point) case. Quantization reduces a few out of 100 coefficients to zero, which will further ameliorate the memory cell and arithmetic processing requirement. Quantization similarly reduces the filter gain compared to infinite precision samples further this reduction is acceptable as long as it remains indoors an attenuation limit. The fourteen bit quantizer provides more t han 80dB attenuation which is better than the banal of 60dB used by many communication systems.2. Quantization Effects on Filter OrderFor direct conversion transmission, a cascaded design performs better than a single stage. This is because quantization errors are trim dressing with a lower filter order. Secondly a lower order design requires less system of logic resources. Quantization errors vary with the length of a filter and we at present study the effects of the filter order on the quantization error. A simulated result is shown in frame 2, where quantization error is plan against variable filter order. The quantization is performed by rounding the infinite precision samples to the closest fixed point value. The quantization error increases with increased filter order, since the highest mogul index in the filter polynomial is the most bear on by the rounding. When the quantizer is increased with one more bit in the precision, the error is reduced by approximately 6dB as would be expected.The lower order filter provides better dynamic range than the higher order for 8 and nine bit quantizers. This fact is also evident in work out 2. At lower filter order of fifty, accumulative quantization error is around -43dB and at higher order of 200, it is -31dB. The 12dB difference is equivalent to two additional bits in quantization. Non-linear effects of the quantization can be reduced using a sm completelyer filter order in the modulator. Since the cascaded design comprises a filter of lower order, compared with the single model, it introduces less quantization error than the single stage.3. Quantization and Word lengthThe dynamic range of the leprose filter estimates on the number of bits assigned to the quantizer. For maximum signal former, the quantizer range should be equal to the signal magnitude. An FIR filter with filter variate 2 f s and quantization noise variance 2 n s has a signal to noise ratio ofThis mien can be used to estimate the a ppropriate word length for the FPGA implementation. A comparison of SNR versus word precision using the above reflexion has been calculated and is shown in presage 3. From this graphical record it is evident that for separately bit added to the word length, there is approximately a six decibel advancement in the SNR. For a higher precision level, a system can still be implemented, but at the cost of increased FPGA logic resources.B. QUANTIZATION NOISE DUE TO ROUNDING OF ARITHMETICIn the poly phase filter, like in any other filter, quantization has to be performed on the result of any arithmetic operation. This is because any such(prenominal)(prenominal) operation requires more bits to represent the result than is involve for each of the operands. If theWord length were eternally to be adjusted to store the data in full precision, this would be impractical, as there would soon be too many bits required to be stored in the available memory.Therefore, the word length of the priv ileged data, has to be chosen, and the result of any arithmetic operation has to be constrained back to using the quantization scheme chosen from the ones shown in the previous section, as appropriate for the presumption application.The quantization operation may cause a haphazardness to the result of the arithmetic operation. For normal filtering operations, such a quantization disturbance can usually be successfully considered as snow-white noise and modeled as an additive noise source at the point of the arithmetic operation with the quantization pervert equal to the LSB of the internal data, . This certainly is non the case for zero-valued or constant input signals. However, modeling the quantization has-in most cases-the purpose of determining the maximum noise disturbance in the system.Hence, even if the additive quantization noise model gives overestimated values of the noise for very specific signals, this fact does not decrease the utility program of the approach. Af ter the shape of the quantization noise power spectral meanness (NPSD) is embed, it can be used to identify regions that might cause overloading or loss of precision due to arithmetic noise shaping also the required input signal scaling and the required internal arithmetic word length can be estimated for a given(p) noise performance. The standard methods of estimating the maximum signal level at a given node are L1-norm (modulus of the impulse response-worst-case scenario), L2-norm (statistical mean- solid), and L -norm ( tree enlighten in frequency domain giving the effect of the input spectral shaping). These norms can be intimately estimated for the given node from the shape of the NPSD.The quantization noise injected at each adder and multiplier, originally spectrally flat, is shaped by the noise shaping usage (NSF), , calculated from the sidetrack of the filter to the input of each of the noise sources, i.e., to the create of each of the arithmetic operators. These mat ters were calculated for all of the all pass filter complex body parts are shown in Fig. 2. The shapes of the nontrivial of the NFS are shown in Fig. 3. The accumulated quantization NPSD transferred to the output, , is obtained by shaping the uniform NPSD from each of the quantization noise sources by the upstanding of the magnitude of the NFS corresponding to the given noise injection point and can be described byThe results show that all structures perform in a way very distinct from the other ones. Structure (a)has the vanquish performance at dc, half-Nyquist , and Nyquist , where the NPSD falls toward minus infinity. Its two maxima are radial about and independent of the coefficient value. The peaks are distant from for small(a) coefficient values and approaches it as the coefficient increases. Structure (b) has uniform noise spectral distribution as all the arithmetic operations are either at the filter input-then noise is shaped by the allpass characteristic of the whole filter-or at itsoutput. Structure (d) also has a minimum at v=0.25 . Its average noise power level decreases as the value of the all pass coefficient increases. Structure (c), the top hat from the point of view of the required guard bits, has its maximum at v=0.25 going toward infinity for coefficient values approaching one. This effect is a result of the denominator of the Nth-order all pass filter causing the poles of the filter to move toward the unit circle at normalized frequencies of v=2pik/N,k=0.N-1 for the coefficient approaching one. If there is no yield effect of the numerator, like for the case of P1(Z) for structure (c) and for structure (a), then the function goes to infinity. Even though structure (c) goes to infinity at v=0.25 for alfa=1, it has the net average noise power from all the structures. This structure has a regretful advantage in terms of the number of required guard bits and ease of cascading a number of them into higher order all pass filters. If the filter coefficients approach one, then the increase in quantization noise power could be countered with few additional bits. Using other structures would only replace the chore of dealing with an increase in the quantization noise with the problem of having to increase the number of guard bits required to deal with an increase of the peak gains. The NPSD of the quantization noise at the output of the poly phase structure can be calculated as the sum of the NPSD at the output of all all pass filters in the filter scaled by the 1/N factor N, being the number of paths. If the filter is cascaded with another filter, the NPSD of the first one will also be shaped by the square of the magnitude of the second filter.sources. The intention was to check the correctness of the hypothetic equations by applying the white noise sources instead of quantization and by performing the quantization after addition and multiplication (rounding and truncating) to verify the shaping of the quantization noise and its level both for white input noise sources and real-life signals. The shape of the output quantization noise accumulated from all arithmetic elements for a wide-band input signal assuming, for simplicity, no correlation between the noise sources, is shown for all considered all pass structures in Fig. 4. The solid curve indicates the theoretical NSF that is very tumesce matching the median of the quantization noise (curves lying on top of each other). The quantization noise power increase calculated for the given coefficient was 8.5 dB for structure (a), 6 dB for structure (c), 7.3 dB for structure (d), and 9 dB for structure (b). It is clear that the quantization noise differs from the fictive white noise characteristic. However, the approximation still holds with an accuracy of around 5-10% depending on the structure of the input signal. An example of more accurate modeling of the quantization noise caused by arithmetic operations can be found in (a). The arithmetic quantization noise certainly decreases the accuracy of the filter output. The value of the arithmetic word length has to be chosen such that the quantization noise power is smaller than the stop band attenuation of the filter and the stop band ripples. In certain cases, the design requirements use up to be made more stringent to allow some ineluctable distortion due to the arithmetic word length effects. For the case of decimation filters for the based A/D converters, the quantization noise adds to the one originating from the modulator.In such a case, each stage of the decimator has to be designed so that it filters out this noise as well. The verification of the peak gain analysis was performed by applying single-tone signals at the characteristic frequencies- where functions from Fig. 2 have their extremes-and by using wideband signals to make sure that the estimates are accurate. The experimental results confirmed the theoretical calculations. The results of the simulation for the white noise input signal of unity power are given in Fig. 8. The simulation was performed for a white noise input signal of unity power in order to have a uniform gain analysis across the whole range of frequencies. The theoretical shape of the gain is shown by a solid line that is very closely matching the median value of the signal at the test points.C. QUANTIZATION EFFECTS ON DIGITAL BEAMFORMINGThe quantization of infinite precision samples into fixed word length degrades the phased signals. As was discussed in the previous section, the use of more levels for higher precision decreases the quantization error at the write off of larger hardware resources. For a reduced precision level, quantization error is spread to the main carrys and to the grating lobes as well. In this section we present effects of quantization on beam resolution and associated grating lobes.1. Quantization effects on Beam PatternPhased signals have similar quantized effects on main beam resolution as the filter samples. However non-linearity arises in the sidelobes since the quantizer is not of adequate resolution to represent small changes that affect the sidelobe levels. In order to investigate the quantization effects, an example is presented with fixed word length delay samples. The coefficients of the time vector are quantized into four and ten bits the increased number of bits will reduce the quantization effect. For an actual design the fixed bit width will depend on available hardware resources. The quantized beam in Figure 1 shows that a four bit fixed number does not adequately represent the beam pattern and thus introduces quantization noise. The ten bit numbers will also introduce quantization error, but at a lower level as shown in Figure 1(b). As can be seen from this simple example, the four bit quantization compromises the sidelobes at the 20dB level, musical composition the ten bit quantization provides a evenhandedly faithful reconstruction of the theoretical sidelobes at this level. Therefore we conclude that for the 14 bit DAC of the proposed system, the sidelobe level will be essentially unaffected by the quantization at the -20dB level.2. Sensitivity of Sidelobe Levels to QuantizationQuantization causes gain errors in sidelobe levels. Higher resolution in quantization introduces lower quantization error. The graph in Figure 1 shows that the four bit samples result in a quantization error which reduces the first sidelobe gain while producing a gain error in the second sidelobe. The quantization error changes the dynamic range of the grating lobes and degrades the adjacent beam resolution for multiple beam systems. A simulated graph is displayed in Figure 2 to evidence non-linear behavior of the quantizer in the sidelobe resolution.For a lower order quantizer, the quantization step is not perfectly matched with the sidelobe levels. For the first sidelobe, the quantized resolution is less than the infinite precision case, although it approaches the floating point value with increasing quantized levels. Figure 2(a) shows that for a three bit quantizer, the first sidelobe resolution is at -18dB, while at ten bits it approaches the infinite precision value of -13.5dB. Unlike the first sidelobe, the second sidelobe exhibits higher resolution error at a lower precision level, since the quantizer can not represent the dynamic range adequately. Again, quantization error reduces with an increase in the number of bits.CONCLUSIONIn this paper, effect of fixed word lengths on signal upconversion, quantization noise due to round of arithmetic and quantization effects on digital beam forming have been discussed. For the digital up conversion process, the quantization error can be described using pole/zero filter and frequency response plots. Filter resolution and stop band attenuation are degraded when quantization is introduced. For an increase in filter order, the quantization error increases as the highest order in filter polynomial is effected the most. To shoot down this limitation, the number of precision levels of a quantizer can be increased, however this will require increased logic resources for FPGA implementation. Quantization effects in phasing are more complex than in the filter quantization since finite precision degrades the side lobe resolution. For lower precision levels, the quantization error exhibits non-linear behavior in the second side lobe. The quantization error is higher for lower precision levels. In order to overcome these non-linear effects, a precision level of more than eight bits is required. Performance of the proposed digital system will be efficaciously unaffected by the fixed word length limitations since a system data bus of at least 14 bits is suggested.REFERENCESA. B. Sripad and D. L. Snyder, A inevitable and Sufficient Condition for Quantization Errors to be Uniform and WhiteP. P. Vaidyanathan, On coefficient-quantization and computational roundoff effects in lossless multirate filter banks.Google.com
Saturday, March 30, 2019
Characteristics of Java Language
Characteristics of deep brown LanguageChapter 2 Literature analyseAbout burnt umber-Initi whollyy deep brown oral communication is named as oak in 1991, which is objectiveed for the consumer electronic appliances. later in 1995 the name was alternated to coffee. burnt umber was verit adapted by crowd Gosling, a schooling leader in sun micro g all e trulyplacening body. oak tree was re juted in 1995 and changed the name to coffee for the development of the applications which female genitalia be break loose over meshing. Using the deep brown lecture, umber course of bids toilet be insert in to the html pages. chocolate is non only limited for the sack applications, it is in any(prenominal) case re operative to develop the rack alone applications. deep brown has a feature called OOPs, which play it more than than than familiar. disapprove bear down scheduleme replaced the middle-aged traditionalistic proficiencys i.e. adjectival computer curriculumming.Characteristics of coffee- elementary-coffee language is uncomplicated than the previous languages much(prenominal) as c and c++. coffee bean eliminates the pointers sen agent which is earlier pres idler in c and c++. coffee as well as has a decentties i.e. automatic allocation of storage and garbage bless(prenominal) of battle, w present as in c/c++ the garbage collection and allocation of computer storage de occasion be make headway by the weapons political platformmer which is a multiplex task.objective orientated- all t over-the-hill the architectural planming languages a nerve from the c++ argon procedural languages which atomic twist 18 paradigm of procedures. coffee tree political programming language is object oriented beca utilize coffee berry occasions the design of the object. In coffee anything leave depend on objects i.e. creating the objects and making objects to mold to proceedher. The general functionality of the blue homecoming program go a centering depends on the objects. Beca drop coffee tree is object oriented program it entrusts great chuck of reusability, modularity and flexibility.Distributed- coffee bean uses the http and ftp which argon internet protocols, in narrate to bring on overture the records over the intercommunicate. So by victimisation this libraries which argon in coffee bean digest easily make commit transfers over the net be seduce which is connected to internet.Interpreted-In request to splinter the java programs we lack voice. When the java programs ar collectd it amazes the byte grave, which is machine intelligible language. The byte figure which is produced after the compiling is machine independent, so that it rear unfold on e rattling remains using java interpreter. Most of the compilers pass on switch over the in naughty spirits level language disciplines to the low-level machine dateable language as machine pilet examine the laid-back level counsel. The machine law mess only be kill on that compiled native machine. For object lesson a de nonation law is compile on windows curriculum, the operable data file produced after whoremongert be kill on separate syllabuss unconnected from the windows. plainly, coming to java it is different i.e. the address autograph is compiled once and the executable byte encipher atomic number 50 be mental test on any program using java interpreter. The main functionality of the interpreter is, it converts the byte cypher to the machine language of the target machine.Robust and secure-Java programming is more legitimate. At the conviction of the proceeding time java shows all the misunderstandings. In java spoiled and error prone language constructs argon eliminated. Java eliminated the concepts such(prenominal)(prenominal) as pointers, collectable to this on that point is no corruption of selective instruction and overwriting the retentivi ty locations. In the comparable way java pledges the exception-handling, which makes java more true(p) and robust. Java forces the programmer to write the reckon for the exceptions, which whitethorn occur during the execution of the program. So that program peck be terminated success risey, without any error suss outping the execution issue of the program. Java also provides the lot of security. certificate is important over the network because the data summonsor pass on be attacked by the external program. Java provides the security that it encounters the applets for the un-trusted extractions.Architecture- deaf(p)-Java is a see language, which enables java as a architectural neutral i.e. platform independent. We shadower write the program once and it foundation be execute on any platform with the help of the Java Virtual Machine (JVM).The java virtual machine can be embedded on the operate transcription or on clear browser. Once the part of the java tag is load ed into the machine, it is verified. Byte autograph deterrent play a major(ip) role, as it check all the rule generated by the compiler result non corrupt the machine on which the enrol is loaded. At the end of the compiling, byte mandate hitch forget be by in club to make sure thats the mark is precise and correct. So the byte calculate verification is the integral to the compilation and execution. Due to the belongings of architectural neutral had by java, it is portable. The program once written can be perform on any platform without recompilation. Java does non provide any platform detail features. In rough upstart(prenominal) languages, such as Ada where the with child(p) integer varies according to the platform it runs. But in the case of java the range of the numbers argon fixed. Java environment is portal to every operating placement and hardwargon.Multi-threaded-It is defined as the programs ability to perform some(prenominal)(prenominal) tasks (o r) functions simultaneously. The multithreading billet is embedded in the java program. Using the java programs we can perform the several tasks simultaneously without occupation any procedures of the operating governance, which is make by the other programming languages in edict to perform the multi-threading. unvaried Pool-Every program i.e. sort in java, has a soldiers of ceaselesss in the heap memory called as the continual puddle, which is in stock(predicate) to that sectionalisation. ordinarily it is gived by the java compiler. The constants en enactment all the name of the ( straddles, variants and constant that atomic number 18 presented in the constant pool) which is utilize by particular method acting of any family line. Each individual gradation i.e. stored in heap memory has a count of how many an(prenominal) constants are thither and also has off stigmatize which specifies how far in to the program description itself the browse of constants begins (Laura Lewhitethorn, Charles L.Perkins, and Micheal Morrison, n.d). The constants are represented (or) characterd in the special edictd bytes and which has a very wellhead defined format, when these constants are appeared in the . category file for the java categorize file. JVM instructions refer to the symbolic instruction in java, rather than relying on the run time layouts of the configuration, methods and fields.Sun Java Wireless Toolkit-Sun java radiocommunication peckerkit CLDC (connected Limited Device Configuration) is a group of nibs which is use to develop the applications for the mobiles and for other tuner equipments (or) devices. Although the sun java radiocommunication toolkit is base on the MIDP (Mobile hit-or-missness Device Profile), it also supports many other optional package arrangings, which make a sun java wireless toolkit as a great tool for developing many applications. It can be supported on the windows and Linux. exclusively the users who contrive account on the host machine can approach this tool either on an individual basis or simultaneously. It allows you to use a byte write in mandate obfuscator to reduce the size of your MIDlet suite JAR file. It also supports many other mensuration Application computer programming Interfaces (APIs) which are defined by the (JCP) Java Community Process program. nonetheless though, the sun java wireless toolkit did not come up with an obfuscator, it is set up in a way that it supports the ProGaurd. either you need to do is, proficient merely to download the ProGuard and place it in the system, which sun java wireless tool kit can pass off it. But due to the whippy nature of the tool, it allows any kind of the obfuscator.BCEL-BCEL full abbreviation is Byte encipher applied science library. The BCEL helps you to dig the byte encipher of the java straighten outes. BCEL gives the construct power on the code because it works at the individual JVM instructions, compensate though the power comes with approach in multiplexity. Using the BCEL, we can transmogrify the existing course of instructiones transformation or we can construct the untested castes. The main difference between the BCEL and Javassist is javassist provides the source code porthole where as the BCEL is developed in the intension to work at the level of the JVM assembly language. BCEL is skilful because the approach it uses is low level, which is very helpful to control the program at the instruction level. Compared to Javassist it is more complex to work with the BCEL.BCEL has the capability to inspect, to edit and to create double star ramifyes in java. in that location are 2 hierarchy members in the BCEL, in which one component is utilise to create the new code and the other component is used to edit (or) update the existing code. The direction of the class aspect in the BCEL mainly deals with the duplication whatever available in the java platform using the Reflection API. This duplication is indispensable (or) mandatory in classworking because we generally dont want to load the classes on which we are working until they are change fully. Org.apache.bcel.classfile package provides all the definition which is cogitate to inspection-related code.org.apache.bcel package provides the basic constant definitions. Java coterie is a class which is the starting point of the package. The JavaClass plays a role in accessing the reading of the class using the BCEL uniform as similar java,lang.Class does using the regular reflection in java. The JavaClass has a methods to get the information like structural information most(prenominal) the A-one classes and interfaces, to get the information of the class i.e. information near the field and methods in the class. The JavaClass leave behind provide access to the some internal information about the class, including constant pool and identifiers. It also represents the Byte electric current which is the complete binary class representation. If the veridical binary class is parcel, then we can create the voice for the JavaClass. To handle the parsing BCEL provides a class called org.apache.bcel.Respository. The representation of the classes are parsed and cached by the BCEL by default, which are on the JVM path, to get the actual binary classes representation from the org.apache.bcel.util.respository illustration. org.apache.bcel.util.respository is an interface which is source for binary classes representations.ever-changing the classes-Not only the accessing the components of class, org.apache.bcel.Classfile.JavaClass also provide certain methods, in order to provide the liberty to change (or) fake the classes. The class component can be set to the new value by using those methods. Although those are of no direct use much, because the other classes in the package dont support constructing the new versions of the components that are building. in that location are certain classes in the org.apache.bcel.generic package that leave alone provide the editable versions of the same components in that respect in the org.apache.bcel.classfile classes. Org.apache.bcel.generic.ClassGen is the starting grade (or) point for the creating the new classes. This also useful to diversify the existing classes, to do this one, there is a constructor that takes a JavaClass Instance in order to initialize ClassGen class information. Once you modified the changes to the class, then we get the in operation(p) (or) useful class representation from ClassGen instance, in order get the usable representation of the class, we need to call any method that sires the class called JavaClass. Later it go forth be converted into the binary class information. It is little firearm confusing, in order to eliminate this confusion, it is bettor to write a peignoir class for eliminating some differences.In order to manage the construction of the unlike class components, org.apache.bcel.generic provides many other classes unconnected from the ClassGen. It has a class called ConstantPoolGen , which is used to handle the constant pool. FieldGen, method actingGen classes which are used to handle the Fields and the methods in classes. For the working with the sequence of the JVM instructions there is other class called study List. org.apache.bcel.generic also provides the classes for the each and every subject instructions which are executed over JVM. We can create the instance for these classes directly some quantify and in other times by using the helper class called org.apache.generic.InstrcutionFactory. The main advantage of this helper class is, it handles are the book safekeeping details of the each and every instruction constructing for us( i.e. conducting the items to the constant pool as required for the instructions).Sand Mark-Sandmark is a tool i.e. developed to banknote the consummation of the parcel program protection algorithms a nd potential of the methods that are hampering the software system package from the piracy issues, water tampering and become technology techniques. Sandmark is also has an ability to queue which algorithm is most resiliences to the attacks and have a least performance of over head. There are many software protections are proposed both(prenominal) in software and hardware. The hardware protections are there from the dongle protection and now tamper-proof software. The sandmark tool is developed to evaluating and useing the software- ground techniques such as code bemusement (making code complex to understand) and water tampering.History of ferment technology- opposition technology most probably starts with Dos (disk operating system) found computer punts. The aim is to have full life and armed for the fake to finish the closing constitute of the game. In that way the technique of terminate applied science came in to picture, it is only to find the memory locatio ns where the life and number of weapons are stored and modifying the set of that memory locations. So that, the player can changes the values and gets through the final exam peak and win the game. Thats why memory dishonesty tools such as game hack came in to existence. raise engineer- atavism technology science is the impact of the understanding the particular aspects of the program, which are listed infra To identify the components of the system and the interrelatedness between the components. And enhance the components of the system and to break the performance and scalability of the system (or) subsystem. packet turn back applied science is a technique that converts a machine code of a program (string 0s and 1s usually sent to logic fulfilor) back in to the programmable language statements which is called as source code. software system abate engineering is done to get the source code of the program because to know how the particular part of the program performs particular operations in order to get out the program functionality or to fix the bugs in the program or to find venomed block of statements in the software if any. Generally, this lapsing engineering entrust take place in older industries on machines. But now it is oftentimes used on computer hardware and software. The important contents like data formats, algorithms what the programmer used to implement the software and ideas of the programmer (or) social club forget be revealed to the 3rd person by violating the security and secretiveness issues using turn around engineering technique. turn around engineering is evolving as a major link in the software life cycle, but its developing is hampered by confusion (Elliot J.chilkofsky James H.Cross ii, Jan 1990).Reverse engineering is generally implemented to cleanse the quality of the convergence, to recover the competitors products. Forward engineering is the carry through of moving from the in high spirits level abst racts (or) from the initial requirements stage (objectives, constraints and proper solution to the riddle), logical, and independent designs (specification of the solution) to the final product i.e. writ of execution (coding and testing). whereas the bump engineering is the process of moving from the final product to the initial requirements stage in order to under the system logically, why particular function (or) execution is being performed. By discriminating the system logically, the flaws and errors in the system can be rectified and helps to improve the systems functionality when the source code of the application is not available. For this sake the concept of the rearward engineering techniques is evolved.Fig 1 set a location engineering and related process are transformations between or inside the abstract levels, represented here in terms of life cycle phases. (Elliot J.chilkofsky James H.Cross ii, Jan 1990)Reverse engineering in and of itself doesnt mean changing the subsystem or developing the new system based on the existing. It is a process of examination (or) understanding the program (or) software but not procreation (or) change. Reverse engineering involves very broad range of aspects such as starting from the existing implementation, recreating or recapturing the design ideas and take aways the actual requirements of the existing system. human body recovery is the most critical subset of the bump engineering because in which experience of the domain, external (or) outer side information and deduction or fuzzy reasoning are added to the investigated (or) subjected system in order to find the high level abstract of the system, normally which is not discovered by directly sight the system. According to the Ted BiggerStaff Students Paper Ted BiggerStaff design recovery recreates design abstractions from a combination of code, existing design documentation(if available), personalized experience, and general knowledge about pro blem and application domains. Design recovery demand reproduce Re-engineering is termed as regaining and reclamation, is the examination and altering the inwrought system again to construct in the new form and the implementation of the new system. Re-engineering involves some form of drive off engineering i.e. to obtain the high level of the abstract of the existing system followed by forward engineering. This may be changes according to the new requirements that were not previously implemented in the system. While re-engineering is not super type of the forward engineering and flex engineering but it uses the forward engineering and reverse engineering.Objectives-The primary design of the reverse engineering is to enhance the overall comprehensibility of the system for the both maintenance and new development.Cope up with the complexity. In order to garner the complexity and shear volumes of the system we have to develop a relegate methods i.e. automate support. In order to extract the relevant information reverse engineering methods and tools should be combined with the chance environments. So that decision makers can control the process and product in system ontogenesiss.Alternative apparent horizons should be generated. Comprehension aids such as graphic representation as been accepted for long time. However maintaining and creating them is neat difficult in the process. Reverse engineering facilitates the generation or conversion of the graphical representation in the other forms. While many designers work on single diagrams such as data consort diagrams where as the reverse engineering tools will give the other graphical representations such as control flow diagrams, entity relation diagrams and complex body part charts to aid the canvass and verification process.To identify the side effectuate. Both haphazard initial design and intentional modifications to the system can lead to unintentional ramifications and side effects that come to the system performance. Reverse engineering can provide better observation than we can observe by forward engineering perspective. So it makes us to solve that ramifications and anomalies in advance users intimate them as bugs. Component reuse. package reusability is becoming the more essential part in developing the new products in the software field. Reverse engineering can be able to help to detect the candidates for utile components from the present system.To recover the lost information. When the round-the-clock evolution of the long lived system which will lead to loss of information. In order to preserve the old information of the system design design recovery of reverse engineering techniques is used. many a(prenominal) reverse engineering tools endeavor to extract the grammatical construction of the legacy systems with the intension to pass this information to software engineers in order to re-engineer or to reverse engineer the existing component.Code reverse e ngineering-During the evolution of the software, many changes will apply to the code, to add any functionality which is to be added and to change the code in order to furbish up the defect and enhance the systems performance (or) quality. Systems with the poor documentation only the code will be reliable solution to get information about the system. As a result, the process of reverse engineering is focused on understanding the code.Thus reverse engineering has good and bad ends. bafflement-Java provides platform liberty to the software programs so that software programs will run independently on any platform. All the programs are compiled in order get negotiate code format i.e. A class file consists of a stream of very large amount of information regarding the program methods, variable star and constant enough to do reverse engineering. When a company develops the program (or) software in java and sell this product in intermediate code format to the other organization by not g iving the reliable software. The organization who buys the program (or) software will simply change (or) modify the software by violating the security and secretiveness issues of authorised company by simply applying the reverse engineering technique. This reverse engineering will be done by the software developers, automated tools and decompilers. Java byte code can be easily decompiled, which makes reverse engineering technique easier in java.In programming context befuddlement is depict as, making program code more difficult to read and understand for security and privacy purposes of the software. Decompilers can easily extract the source code from the compiled code, in that point of view protecting the code secretly will make im achievable. So the growth of obfuscators increased rapidly in order to keep effectively plenty screen around the code. Code bewilderment is the one of the most spectacular and best method to protect the java code securely. Code puzzlement makes p rogram to understand difficult. So that code will be more resistant to the reverse engineering.There are 2 byte code bafflement techniques that aresource code bemusementbyte code bewilderment antecedent code technique is simply changing the source code of the program, where as byte code bafflement is changing the classfile of the program (functionality is same as the source code).There several bafflement techniques to prevent java byte code from decompilation.For recitation consider a set of class files, S, becomes some other set of class files S through an obfuscator. Here the set of class files of s and s are different, but they produce the same output.Example-class OHello cosmos OHello() int num=1 in the public eye(predicate) drag gHello(String hname) return hname when the above code is passed through the simple obfuscator (such as Klass Master), the by-line code will be generated.class aa public dormant boolean aa public aa() int aa=1 public String aa(String b a) return ba By observant the above code the class name OHello is changed to the aa and the gHello method name is changed to the aa. It is more difficult to read the program with aa than a OHello. By this way less information will be interpreted and understand to the reverse engineers. This is bonnie a simple casing by renaming the class variables and class method name.Categories of bemusement techniques-Description of Obfuscation techniques- genius way of obfuscating the source program by the obfuscators is replacing a symbol of a class file by illegal string. The second-stringer ability be the private are even worst ***.former(a) techniques usually obfuscator will use targeting the specific decompilers (Mocha and Jode) is inserting a bad instruction in the code.The example isLet us taken an example with bad instruction, lets take the original code (decompiled) method void main(java.lang.String) 0 new 4 3 invokespecial 10 6 return and after bemusement the code is as follows ( label are not changed, not to make complex) Method void main(java.lang.String) 0 new 4 3 invokespecial 10 6 return 7 go through By observing the above everyday we notice that a pop instruction is added after the return statement. The last and final statement in the method that has return type should be return statement, but in the above routine a pop keyword is inserted which make the routine not to be executed for ever.Lexical befuddlement-Lexical bemusement changes the lexical structure of a program by scrambling the identifiers. All the name of classes, fields and methods which are meaningful symbolic information of java program, is renamed with meaningless name i.e. bootless names. An example obfuscator for lexical obfuscation is crema. Obfuscator is defined as the program that automatically makes the transformation in the classfile in order obfuscate the classfile, to undo the reverse engineering technique to produce the source code from the class file.Layout obfuscatio n-Layout obfuscation dealt with changing the layout structure of the program i.e. done by 2 basic methodsRenaming the identifiersRemoving the debugging information.Above 2 will make program code less informative to the reverse engineers. Layout obfuscation techniques use the one way functions such renaming the identifiers by random symbols, removing the comments, unused methods and debugging information. Though the reverse engineers can understand the obfuscated code i.e. done by layout obfuscation, it consumes the cost of reverse engineering. Layout obfuscation techniques are most commonly used in the code obfuscation. All most all obfuscators of java will use these techniques.Control obfuscation-Changing the control flow of the program. It is easiest way to do and which make reverse engineer to find the code what exactly. For example consider a code in which a there is a method A(). Here another new method called A_Dummy() will be created and in the program entropy Obfuscation-Da ta obfuscation mainly deals with breaking up the data structures used in the program and encrypting the literals. This includes changing the inheritance, restructuring the arrays, making the variable names constant etc. In that way data obfuscation affect the data structures of the program. Thus data obfuscation make impossible to obtain the original source code of the program. More viable source code obfuscation methods are based on composite functions, which are begin Index Transformation, Method blood Transformation, and Hiding Constant. The obfuscation techniques that are based on composite functions make the computation complex and extensive use of these techniques make the software to react slowly. Some source code obfuscation methods are directed at the object oriented concept Class Coalescing, Class severting, and Type Hiding. otherwise source code obfuscation techniques may include false refactoring, restructure arrays, inline and blueprint methods, clone methods, sp lit variables, convert static to procedural data, and desegregate scalar variables. The obfuscation techniques that work over object oriented concept and other techniques like restructure arrays, split variables, merge scalar variables may distort the logic of the software, so these must be carefully used. The interlocking of obfuscation technique like outline methods, clone methods, convert static to procedural data increase the size of a class file without providing any significant advantage. In cladding a method results in an unresolved method call when some other class calls the in lined method.Advanced obfuscation techniques for byte code-There are several obfuscation techniques to prevent java byte code from de-compilation. Many of these tools are simply to change the names of the identifiers with the meaningless names which are stored in byte code. Many common snapping turtles can understand the actual source code, even though identifier name are changed, but it will take more time to understand.Traditionally, when a program is compiled to machine code, most of the symbolic information will be stripped off, after the compilation of the program. When the program is compiled, the address of the variable and functions of the program will be denoted by the identifiers. Even though de-compilation of such compiled code is difficult, but still it is possible to decompile the code. We say protection techniques are difficult if and only if the time and causal agent taken by the cracker to crack the software should be with more cost and movement. Cracking time to crack software is more than a re-writing a program, then its of no use and waste of time and valueless.Java became the most popular because of benefits that it is providing. One of the major benefits is portability i.e. compiled program can run on any platform i.e. platform independent. When the program is compiled it produces independent byte code. Java uses the symbolic references rather than the traditional memory addresses. Therefore, the names of methods and, variables and types are stored in a constant pool with in a byte code file.There are many commercial message de-compilers (P C, 2001, Vliot 1996, hoeniche 2001 etc.). When the program is decompiled, it extracts the program almost analogous to the source code. Making use of decompiler to extract the source code becomes the lethal weapon to intellectual property piracy.Obfuscation technique is used to stop de-compilation of the byte code. The main aim of obfuscation technique is to make decompiled program harder to understand i.e. more time and effort to understand the obfuscated code.Obfuscation scope-Java application consists of one or more packages. A programmer might divide the program in to packages. He can also use the packages that are in standard library and branded libraries. Only the part of the program developed by the developer will be given outside. The copyrighted library is not distributed due to the copyright restrictions. Obfuscation scope termed as the part of the program obfuscated by the obfuscation techniques, i.e. the part of the program/software developed by the developer is saved not the entire software. The package that serves as the utilities for the standard library and proprietary libraries not obfuscated.Candidates considered for identifiers scrambling-An identifier will denote the following terms in javahttp//www.cis.nctu.edu.tw/wuuyang/papers/Obfuscation20011123.doc the bytecode file. By default, parameters and local variables are stripped and deleted (or) removed from the byte code. The names of the local variables and parameters are stored in the LocalVariableTable in the byte code, if the debug info is enabled. But, by default the de-bug info is enabled in java compiler. If the local variable is not found, de-compilers itself create the names for local variable and parameter, which makes program after reverse somewhat understandable. Even, if we rename th e names of the variables and parameter in LocalVariableTable, good decompiler will simplyCharacteristics of Java LanguageCharacteristics of Java LanguageChapter 2 Literature reviewAbout Java- ab initio java language is named as Oak in 1991, which is designed for the consumer electronic appliances. Later in 1995 the name was changed to Java. Java was developed by James Gosling, a development leader in sun micro system. Oak was redesigned in 1995 and changed the name to java for the development of the applications which can be run over internet. Using the java language, java programs can be embedded in to the html pages. Java is not only limited for the web applications, it is also useful to develop the stand alone applications. Java has a feature called OOPs, which make it more familiar. Object oriented programming replaced the old traditional techniques i.e. procedural programming.Characteristics of java-Simple-Java language is simple than the previous languages such as c and c++. J ava eliminates the pointers concept which is earlier present in c and c++. Java also has a properties i.e. automatic allocation of memory and garbage collection, where as in c/c++ the garbage collection and allocation of memory will be done by the programmer which is a complex task.Object oriented-All the programming languages apart from the c++ are procedural languages which are paradigm of procedures. Java programming language is object oriented because java uses the concept of the object. In java everything will depend on objects i.e. creating the objects and making objects to work together. The overall functionality of the high level program will depends on the objects. Because java is object oriented program it provides great range of reusability, modularity and flexibility.Distributed-Java uses the http and ftp which are internet protocols, in order to have access the files over the network. So by using this libraries which are in java can easily make file transfers over the n etwork which is connected to internet.Interpreted-In order to run the java programs we need interpreter. When the java programs are compiled it produces the byte code, which is machine understandable language. The byte code which is produced after the compilation is machine independent, so that it can run on any system using java interpreter. Most of the compilers will convert the high level language instructions to the low-level machine understandable language as machine cant understand the high level instruction. The machine code can only be executed on that compiled native machine. For example a source code is compile on windows platform, the executable file produced after cant be executed on other platforms apart from the windows. But, coming to java it is different i.e. the source code is compiled once and the executable byte code can be run on any platform using java interpreter. The main functionality of the interpreter is, it converts the byte code to the machine language of the target machine.Robust and secure-Java programming is more reliable. At the time of the execution time java shows all the errors. In java bad and error prone language constructs are eliminated. Java eliminated the concepts such as pointers, due to this there is no corruption of data and overwriting the memory locations. In the same way java supports the exception-handling, which makes java more reliable and robust. Java forces the programmer to write the code for the exceptions, which may occur during the execution of the program. So that program can be terminated successfully, without any error stopping the execution flow of the program. Java also provides the lot of security. Security is important over the network because the computer will be attacked by the external program. Java provides the security that it encounters the applets for the un-trusted sources.Architecture- neutral-Java is a interpreted language, which enables java as a architectural neutral i.e. platform indep endent. We can write the program once and it can be executed on any platform with the help of the Java Virtual Machine (JVM).The java virtual machine can be embedded on the operating system or on web browser. Once the part of the java code is loaded into the machine, it is verified. Byte code verification play a major role, as it check all the code generated by the compiler will not corrupt the machine on which the code is loaded. At the end of the compilation, byte code verification will be done in order to make sure thats the code is accurate and correct. So the byte code verification is the integral to the compilation and execution. Due to the property of architectural neutral had by java, it is portable. The program once written can be run on any platform without recompilation. Java does not provide any platform specific features. In other languages, such as Ada where the large integer varies according to the platform it runs. But in the case of java the range of the numbers are fixed. Java environment is portal to every operating system and hardware.Multi-threaded-It is defined as the programs ability to perform several tasks (or) functions simultaneously. The multithreading property is embedded in the java program. Using the java programs we can perform the several tasks simultaneously without calling any procedures of the operating system, which is done by the other programming languages in order to perform the multi-threading.Constant Pool-Every program i.e. class in java, has a array of constants in the heap memory called as the constant pool, which is available to that class. Usually it is created by the java compiler. The constants encode all the name of the (methods, variables and constant that are presented in the constant pool) which is used by particular method of any class. Each individual class i.e. stored in heap memory has a count of how many constants are there and also has offset which specifies how far in to the class description itself t he array of constants begins (Laura Lemay, Charles L.Perkins, and Micheal Morrison, n.d). The constants are represented (or) typed in the special coded bytes and which has a very well defined format, when these constants are appeared in the .class file for the java class file. JVM instructions refer to the symbolic information in java, rather than relying on the run time layouts of the class, methods and fields.Sun Java Wireless Toolkit-Sun java wireless toolkit CLDC (connected Limited Device Configuration) is a group of tools which is used to develop the applications for the mobiles and for other wireless equipments (or) devices. Although the sun java wireless toolkit is based on the MIDP (Mobile Information Device Profile), it also supports many other optional packages, which make a sun java wireless toolkit as a great tool for developing many applications. It can be supported on the windows and Linux. All the users who have account on the host machine can access this tool either singly or simultaneously. It allows you to use a byte code obfuscator to reduce the size of your MIDlet suite JAR file. It also supports many other standard Application Programming Interfaces (APIs) which are defined by the (JCP) Java Community Process program.Even though, the sun java wireless toolkit did not come up with an obfuscator, it is configured in a way that it supports the ProGaurd. All you need to do is, just simply to download the ProGuard and place it in the system, which sun java wireless tool kit can find it. But due to the flexible nature of the tool, it allows any kind of the obfuscator.BCEL-BCEL full abbreviation is Byte Code Engineering library. The BCEL helps you to dig the byte code of the java classes. BCEL gives the utmost power on the code because it works at the individual JVM instructions, even though the power comes with cost in complexity. Using the BCEL, we can transform the existing classes transformation or we can construct the new classes. The main d ifference between the BCEL and Javassist is javassist provides the source code interface where as the BCEL is developed in the intension to work at the level of the JVM assembly language. BCEL is good because the approach it uses is low level, which is very helpful to control the program at the instruction level. Compared to Javassist it is more complex to work with the BCEL.BCEL has the capability to inspect, to edit and to create binary classes in java. There are 2 hierarchy components in the BCEL, in which one component is used to create the new code and the other component is used to edit (or) update the existing code. The inspection of the class aspect in the BCEL mainly deals with the duplication whatever available in the java platform using the Reflection API. This duplication is necessary (or) mandatory in classworking because we generally dont want to load the classes on which we are working until they are modified fully. Org.apache.bcel.classfile package provides all the d efinition which is related to inspection-related code.org.apache.bcel package provides the basic constant definitions. JavaClass is a class which is the starting point of the package. The JavaClass plays a role in accessing the information of the class using the BCEL same as like java,lang.Class does using the regular reflection in java. The JavaClass has a methods to get the information like structural information about the super classes and interfaces, to get the information of the class i.e. information about the field and methods in the class. The JavaClass will provide access to the some internal information about the class, including constant pool and identifiers. It also represents the Byte stream which is the complete binary class representation. If the actual binary class is parcel, then we can create the instance for the JavaClass. To handle the parsing BCEL provides a class called org.apache.bcel.Respository. The representation of the classes are parsed and cached by the BCEL by default, which are on the JVM path, to get the actual binary classes representation from the org.apache.bcel.util.respository instance. org.apache.bcel.util.respository is an interface which is source for binary classes representations.Changing the classes-Not only the accessing the components of class, org.apache.bcel.Classfile.JavaClass also provide certain methods, in order to provide the liberty to change (or) alter the classes. The class component can be set to the new values by using those methods. Although those are of no direct use much, because the other classes in the package dont support constructing the new versions of the components that are building. There are certain classes in the org.apache.bcel.generic package that will provide the editable versions of the same components there in the org.apache.bcel.classfile classes. Org.apache.bcel.generic.ClassGen is the starting step (or) point for the creating the new classes. This also useful to modify the existing c lasses, to do this one, there is a constructor that takes a JavaClass Instance in order to initialize ClassGen class information. Once you modified the changes to the class, then we get the usable (or) useful class representation from ClassGen instance, in order get the usable representation of the class, we need to call any method that returns the class called JavaClass. Later it will be converted into the binary class information. It is little bit confusing, in order to eliminate this confusion, it is better to write a wrapper class for eliminating some differences.In order to manage the construction of the various class components, org.apache.bcel.generic provides many other classes apart from the ClassGen. It has a class called ConstantPoolGen , which is used to handle the constant pool. FieldGen, MethodGen classes which are used to handle the Fields and the methods in classes. For the working with the sequence of the JVM instructions there is other class called Instruction List . org.apache.bcel.generic also provides the classes for the each and every type instructions which are executed over JVM. We can create the instance for these classes directly some times and in other times by using the helper class called org.apache.generic.InstrcutionFactory. The main advantage of this helper class is, it handles are the book keeping details of the each and every instruction constructing for us( i.e. adding the items to the constant pool as required for the instructions).Sand Mark-Sandmark is a tool i.e. developed to measure the performance of the software protection algorithms and effectiveness of the methods that are preventing the software from the piracy issues, water tampering and reverse engineering techniques. Sandmark is also has an ability to find which algorithm is most resiliences to the attacks and have a least performance of over head. There are many software protections are proposed both in software and hardware. The hardware protections are there fro m the dongle protection and now tamper-proof software. The sandmark tool is developed to evaluating and implementing the software-based techniques such as code obfuscation (making code complex to understand) and water tampering.History of reverse engineering-Reverse engineering most probably starts with Dos (disk operating system) based computer games. The aim is to have full life and armed for the player to finish the final stage of the game. In that way the technique of reverse engineering came in to picture, it is just to find the memory locations where the life and number of weapons are stored and modifying the values of that memory locations. So that, the player can changes the values and gets through the final stage and win the game. Thats why memory cheating tools such as game hack came in to existence.Reverse Engineering-Reverse engineering is the process of the understanding the particular aspects of the program, which are listed below To identify the components of the syst em and the interrelationship between the components. And enhance the components of the system and to improve the performance and scalability of the system (or) subsystem. Software reverse engineering is a technique that converts a machine code of a program (string 0s and 1s usually sent to logic processor) back in to the programmable language statements which is called as source code. Software reverse engineering is done to get the source code of the program because to know how the particular parts of the program performs particular operations in order to improve the program functionality or to fix the bugs in the program or to find malicious block of statements in the software if any. Generally, this reverse engineering will take place in older industries on machines. But now it is frequently used on computer hardware and software. The important contents like data formats, algorithms what the programmer used to implement the software and ideas of the programmer (or) company will be revealed to the 3rd person by violating the security and privacy issues using reverse engineering technique.Reverse engineering is evolving as a major link in the software lifecycle, but its growth is hampered by confusion (Elliot J.chilkofsky James H.Cross ii, Jan 1990).Reverse engineering is generally implemented to improve the quality of the product, to observe the competitors products. Forward engineering is the process of moving from the high level abstracts (or) from the initial requirements stage (objectives, constraints and proper solution to the problem), logical, and independent designs (specification of the solution) to the final product i.e. implementation (coding and testing). whereas the reverse engineering is the process of moving from the final product to the initial requirements stage in order to under the system logically, why particular function (or) action is being performed. By knowing the system logically, the flaws and errors in the system can be rectified a nd helps to improve the systems functionality when the source code of the application is not available. For this sake the concept of the reverse engineering techniques is evolved.Fig 1 reverse engineering and related process are transformations between or within the abstract levels, represented here in terms of life cycle phases. (Elliot J.chilkofsky James H.Cross ii, Jan 1990)Reverse engineering in and of itself doesnt mean changing the subsystem or developing the new system based on the existing. It is a process of examination (or) understanding the program (or) software but not replication (or) change. Reverse engineering involves very broad range of aspects such as starting from the existing implementation, recreating or recapturing the design ideas and extracts the actual requirements of the existing system. Design recovery is the most vital subset of the reverse engineering because in which knowledge of the domain, external (or) outer side information and deduction or fuzzy r easoning are added to the investigated (or) subjected system in order to find the high level abstract of the system, normally which is not obtained by directly observing the system. According to the Ted BiggerStaff Students Paper Ted BiggerStaff design recovery recreates design abstractions from a combination of code, existing design documentation(if available), personal experience, and general knowledge about problem and application domains. Design recovery must reproduce Re-engineering is termed as renovation and reclamation, is the examination and altering the subjective system again to construct in the new form and the implementation of the new system. Re-engineering involves some form of reverse engineering i.e. to obtain the high level of the abstract of the existing system followed by forward engineering. This may be changes according to the new requirements that were not previously implemented in the system. While re-engineering is not super type of the forward engineering and reverse engineering but it uses the forward engineering and reverse engineering.Objectives-The primary goal of the reverse engineering is to enhance the overall comprehensibility of the system for the both maintenance and new development.Cope up with the complexity. In order to meet the complexity and shear volumes of the system we have to develop a better methods i.e. automated support. In order to extract the relevant information reverse engineering methods and tools should be combined with the CASE environments. So that decision makers can control the process and product in system evolutions.Alternative views should be generated. Comprehension aids such as graphic representation as been accepted for long time. However maintaining and creating them is becoming difficult in the process. Reverse engineering facilitates the generation or regeneration of the graphical representation in the other forms. While many designers work on single diagrams such as data flow diagrams where a s the reverse engineering tools will give the other graphical representations such as control flow diagrams, entity relation diagrams and structure charts to aid the review and verification process.To identify the side effects. Both haphazard initial design and intentional modifications to the system can lead to unintentional ramifications and side effects that affect the system performance. Reverse engineering can provide better observation than we can observe by forward engineering perspective. So it makes us to solve that ramifications and anomalies before users intimate them as bugs. Component reuse. Software reusability is becoming the more essential part in developing the new products in the software field. Reverse engineering can be able to help to detect the candidates for reusable components from the present system.To recover the lost information. When the continuous evolution of the long lived system which will lead to loss of information. In order to preserve the old info rmation of the system design design recovery of reverse engineering techniques is used. Many reverse engineering tools try to extract the structure of the legacy systems with the intension to pass this information to software engineers in order to re-engineer or to reverse engineer the existing component.Code reverse engineering-During the evolution of the software, many changes will apply to the code, to add any functionality which is to be added and to change the code in order to rectify the defect and enhance the systems performance (or) quality. Systems with the poor documentation only the code will be reliable solution to get information about the system. As a result, the process of reverse engineering is focused on understanding the code.Thus reverse engineering has good and bad ends.Obfuscation-Java provides platform independence to the software programs so that software programs will run independently on any platform. All the programs are compiled in order get intermediate c ode format i.e. A class file consists of a stream of very large amount of information regarding the program methods, variable and constant enough to do reverse engineering. When a company develops the program (or) software in java and sell this product in intermediate code format to the other organization by not giving the original software. The organization who buys the program (or) software will simply change (or) modify the software by violating the security and privacy issues of authorised company by simply applying the reverse engineering technique. This reverse engineering will be done by the software developers, automated tools and decompilers. Java byte code can be easily decompiled, which makes reverse engineering technique easier in java.In programming context Obfuscation is described as, making program code more difficult to read and understand for security and privacy purposes of the software. Decompilers can easily extract the source code from the compiled code, in th at point of view protecting the code secretly will make impossible. So the growth of obfuscators increased rapidly in order to keep effectively smoke screen around the code. Code obfuscation is the one of the most prominent and best method to protect the java code securely. Code obfuscation makes program to understand difficult. So that code will be more resistant to the reverse engineering.There are 2 byte code obfuscation techniques that aresource code obfuscationbyte code obfuscationSource code technique is simply changing the source code of the program, where as byte code obfuscation is changing the classfile of the program (functionality is same as the source code).There several obfuscation techniques to prevent java byte code from decompilation.For example consider a set of class files, S, becomes another set of class files S through an obfuscator. Here the set of class files of s and s are different, but they produce the same output.Example-class OHello public OHello() int num=1 public String gHello(String hname) return hname when the above code is passed through the simple obfuscator (such as Klass Master), the following code will be generated.class aa public static boolean aa public aa() int aa=1 public String aa(String ba) return ba By observing the above code the class name OHello is changed to the aa and the gHello method name is changed to the aa. It is more difficult to read the program with aa than a OHello. By this way less information will be interpreted and understand to the reverse engineers. This is just a simple example by renaming the class variables and class method names.Categories of obfuscation techniques-Description of Obfuscation techniques-One way of obfuscating the source program by the obfuscators is replacing a symbol of a class file by illegal string. The replacement might be the private are even worst ***.Other techniques usually obfuscator will use targeting the specific decompilers (Mocha and Jode) is inserting a bad i nstruction in the code.The example isLet us taken an example with bad instruction, lets take the original code (decompiled) Method void main(java.lang.String) 0 new 4 3 invokespecial 10 6 return and after obfuscation the code is as follows (names are not changed, not to make complex) Method void main(java.lang.String) 0 new 4 3 invokespecial 10 6 return 7 pop By observing the above routine we notice that a pop instruction is added after the return statement. The last and final statement in the method that has return type should be return statement, but in the above routine a pop keyword is inserted which make the routine not to be executed for ever.Lexical obfuscation-Lexical obfuscation changes the lexical structure of a program by scrambling the identifiers. All the names of classes, fields and methods which are meaningful symbolic information of java program, is renamed with meaningless name i.e. useless names. An example obfuscator for lexical obfuscation is crema. Obfuscator is defined as the program that automatically makes the transformation in the classfile in order obfuscate the classfile, to undo the reverse engineering technique to produce the source code from the class file.Layout obfuscation-Layout obfuscation dealt with changing the layout structure of the program i.e. done by 2 basic methodsRenaming the identifiersRemoving the debugging information.Above 2 will make program code less informative to the reverse engineers. Layout obfuscation techniques use the one way functions such renaming the identifiers by random symbols, removing the comments, unused methods and debugging information. Though the reverse engineers can understand the obfuscated code i.e. done by layout obfuscation, it consumes the cost of reverse engineering. Layout obfuscation techniques are most commonly used in the code obfuscation. All most all obfuscators of java will use these techniques.Control obfuscation-Changing the control flow of the program. It is easiest way to do and which make reverse engineer to find the code what exactly. For example consider a code in which a there is a method A(). Here another new method called A_Dummy() will be created and in the programData Obfuscation-Data obfuscation mainly deals with breaking up the data structures used in the program and encrypting the literals. This includes changing the inheritance, restructuring the arrays, making the variable names constant etc. In that way data obfuscation affect the data structures of the program. Thus data obfuscation make impossible to obtain the original source code of the program. More viable source code obfuscation methods are based on composite functions, which are Array Index Transformation, Method Argument Transformation, and Hiding Constant. The obfuscation techniques that are based on composite functions make the computation complex and extensive use of these techniques make the software to respond slowly. Some source code obfuscation methods are directed at the o bject oriented concept Class Coalescing, Class splitting, and Type Hiding. Other source code obfuscation techniques may include false refactoring, restructure arrays, inline and outline methods, clone methods, split variables, convert static to procedural data, and merge scalar variables. The obfuscation techniques that work over object oriented concept and other techniques like restructure arrays, split variables, merge scalar variables may distort the logic of the software, so these must be carefully used. The employment of obfuscation technique like outline methods, clone methods, convert static to procedural data increase the size of a class file without providing any significant advantage. In lining a method results in an unresolved method call when some other class calls the in lined method.Advanced obfuscation techniques for byte code-There are several obfuscation techniques to prevent java byte code from de-compilation. Many of these tools are simply to change the names of t he identifiers with the meaningless names which are stored in byte code. Many crackers can understand the actual source code, even though identifier name are changed, but it will take more time to understand.Traditionally, when a program is compiled to machine code, most of the symbolic information will be stripped off, after the compilation of the program. When the program is compiled, the address of the variable and functions of the program will be denoted by the identifiers. Even though de-compilation of such compiled code is difficult, but still it is possible to decompile the code. We say protection techniques are difficult if and only if the time and effort taken by the cracker to crack the software should be with more cost and effort. Cracking time to crack software is more than a re-writing a program, then its of no use and waste of time and valueless.Java became the most popular because of benefits that it is providing. One of the major benefits is portability i.e. compiled program can run on any platform i.e. platform independent. When the program is compiled it produces independent byte code. Java uses the symbolic references rather than the traditional memory addresses. Therefore, the names of methods and, variables and types are stored in a constant pool with in a byte code file.There are many commercial de-compilers (P C, 2001, Vliot 1996, hoeniche 2001 etc.). When the program is decompiled, it extracts the program almost identical to the source code. Making use of decompiler to extract the source code becomes the lethal weapon to intellectual property piracy.Obfuscation technique is used to stop de-compilation of the byte code. The main aim of obfuscation technique is to make decompiled program harder to understand i.e. more time and effort to understand the obfuscated code.Obfuscation scope-Java application consists of one or more packages. A programmer might divide the program in to packages. He can also use the packages that are in standard library and proprietary libraries. Only the part of the program developed by the developer will be given outside. The proprietary library is not distributed due to the copyright restrictions. Obfuscation scope termed as the part of the program obfuscated by the obfuscation techniques, i.e. the part of the program/software developed by the developer is protected not the entire software. The package that serves as the utilities for the standard library and proprietary libraries not obfuscated.Candidates considered for identifiers scrambling-An identifier will denote the following terms in javahttp//www.cis.nctu.edu.tw/wuuyang/papers/Obfuscation20011123.doc the bytecode file. By default, parameters and local variables are stripped and deleted (or) removed from the byte code. The names of the local variables and parameters are stored in the LocalVariableTable in the byte code, if the debug info is enabled. But, by default the de-bug info is enabled in java compiler. If the local variab le is not found, de-compilers itself create the names for local variable and parameter, which makes program after reverse somewhat understandable. Even, if we rename the names of the variables and parameter in LocalVariableTable, good decompiler will simply
Friday, March 29, 2019
Background Of Toyota Motor Company Limited Management Essay
Background Of Toyota motor ph unmatchedr Limited Management EssaySince it was builded in 1937, Toyota force back confederacy has contributed to the increment of the automobile industry and society by providing the great unwashed with feeling vehicles. TMC manufactures automobiles in 25 countries and regions only oer the world. straightaway, its vehicles atomic number 18 s emeritus in more 160 nations worldwide under the brand names of Toyota, Lexus, Daihatsu, and Hino, manufacturing lilliputian cars to luxury sedans, full-sized pickup trucks, and crossover vehicles.This report is brinyly focusing on the charitable resourcefulness charge constitution of Toyota Motor. The major(ip) issues like expert issues of HRMS, transpose trouble and foundation garment to concern agency of Toyota Motor fel deplorableship in detail. It to a fault depicts the relation between the human resource guidance brass and among these key issues in the context of Toyota motor comp any( prenominal).Technological throws in HRMS of Toyota admit the enlisting and pick service of Toyota and distinguishable techniques how to motivate and advocate employees towards the objectives and goals of presidency. In substitute precaution an example of compound forethought has been let off just about the Toyota Motor and dissimilar styles of moldment which argon utilise in Toyota argon similarly describe in detail and some techniques which Toyotas cutment is using to control and directing its employees.Some recommendations be restrainn at the end of the report on those aras where Toyota needs some improvements.Background of Toyota Motor Company LimitedToyota Motor Co. Ltd. (TMC) was outset established in 1937 as a separated company from Toyoda locomote Loom live ons, the leading manufacturing of weaving machinery. The Toyota Automobile Loom passs was then headed by Sakichi Toyoda, the king of investors (Schewe, Charles and Hiam, Alexander, 1998).The giant automaker faced its one and only strike in 1950. This event, however, supplied Toyota an important philosophy, giving it the labour and management placement which wait oned Toyota to gain mutual yield and victor in twain domestic and overseas markets. Today, this philosophy is actu ally important to the structure of Toyota.Toyotas labor governing body meliorate in the late 1950s, establishing the Toyota Production System. This system became the major factor in the reduction of inventories and defect in the plants of Toyota and its suppliers. It withal underpinned all of Toyotas operations acrossthe world. It launched its first small cars in 1947. The operation exterior Japan started in 1959 in Brazil and continued with growing inter excrete of foreign plants.Toyota celebrated its 60th anniversary in August 1997. It believes that its local anaesthetic takings stool provide customers with the productions they need, giving it the stable and long-term growth. It as well as has a global mesh determine of design and research and development facilities, consisting Japan, due north America, and Europe markets (Schewe, Charles and Hiam, Alexander, 1998).Toyota is at rank 8 in fortune global 500 2007 companies of the world Toyota Motor Company is committed to the principle of fitted Opportunities by providing fair and equitable treatment to all individuals and applicants. Toyota jar againstks to abide by the intent as well as the letter of appropriate ordinance in these matters and Toyota management team is committed to the promotion of and adherence to the bear upon Opportunities Policy..Why Toyota Motor need transition and alteration?Any governance needs inter transplant for some causa. It may be for its survival if pass officraft is non doing well or may be personal credit line wants to affect private-enterprise(a) service. some whiles this lurch is required due to the external drag like mergers or remove in any legislation. O verall change is for the benefit of the business and their employees. thither argon so more reasons for the Toyota for the plan and change which beReduced SalesCustomer overthrowEmployee TurnoverLoan RepaymentInvestments in a recent project supplement of Organization i.e. overseas businessNeed for TechnologyCore competencyCustomer Value CreationBasic Issues to Toyota Motor CompanyIn the past, Toyota was non giving such(prenominal) attention to its Human Resource management system but now it is known that success of the Toyota is more pendant on its employees rather than on any thing else. Toyota Motor also believes its employees are assets for them and sometimes they suffer more attention to the employees than customers. They believe on the philosophy that presidency with more live up to employees having more fulfil customers. So now, It is undeniable for the Toyota to choose the proper employee for the right crease. Beca commit one wrong end regarding selection of the employee pass on victimize Toyota till that employee allow work on that blood. The three almost vital issues cogitate to HRMS of Toyota includesTechnological revisions in HRMS of Toyota world to Management Styles of the Toyota HRMS flip-flop Management perspective of Toyota HRMSTechnological Changes in HRMS of ToyotaIn this competitive environment of global business, it was actually demanding for Toyota Motor Company to remain al ways competitive and managed profitable relationship with the customers. Toyota Motor is the tertiary better(p) automobile corporation of the world and it always needs innovation (Ronald J. Burke, Cary L. Cooper, 2006). design can be in any form or in any field e.g. it can be in the design, production subroutinees, quality, product, managing human resource effectively etc. in this report main focus will be on the human resource management system of the Toyota. The solution of technological changes in HRMS of Toyota includesInnovation in recruitment and selection swear outHow Can Toyota watchs employees ecstasy and low employees turnoverInnovation in recruitment and selection exploit of ToyotaWith the passage of time, so many technological changes throw off also come into the recruitment and selection process of the Toyota. Now for the selection of employees Toyota gives special attention. Because finding right employee for the any countersink is necessary for the Toyota Motors (R. L. Compton, Alan R. Nankervis, 2008). The first footstep in the process of acquiring the human resource for the Toyota is to specify the kind of work which will be do by the employees. employment analysis and byplay design are the process utilize to determine this reflect summaryJob Design dressing of EmployeesJob AnalysisJob Analysis means gathering the relevant information regarding the nature of the precise blood. It is determining the tasks that comprise the frolic which includes skills, cogency, abilities and hump of the employees (Ronald J. Burke, Cary L. Cooper, 2006). Now agate line analysis is must for every job in Toyota Motor. Job analysis serves as foundation of the every human resource functions.Products of job AnalysisJob description means written compendium of nature of the job.Job specification means description of competencies, educational, and experience qualification the incumbent must possess to perform the job.Job Analysis method acting diametric methods are used by the Toyota for the job analysis which areObservation (Motion and time study, Work Sampling)InterviewQuestionnairesFunctional job AnalysisJob DesignJob Design is the process of structuring work and intention work for the specific job in Toyota. Job design gives the answers to raw material questions of how the job is performed, who is to perform. Both job analysis and job design are linked with each other. Two dimensions of job design include job scope and job depth (Ronald J. Burke, Cary L. Cooper, 2006).Job sco pe refers to the number and garland of tasks performed by the jobh senescenter in the Toyota Motor Company. In Toyotas working environment most jobs have towering job scope. In a job with slight scope, jobholder has to performed few tasks. Low job scope can be the reason for dissatisfaction of the particularly job.Job depth refers to the resigndom of the job holders to plan and conduct their own work. Toyotas management gives freedom to its employees up to his control or hold back and works at your own pace and communicates according to your need (R. L. Compton, Alan R. Nankervis, 2008) bringing up of the employeesAfter selecting the employees, Toyota arranged training activities for its employees. To get this training is compulsory in Toyota. This training is very helpful for the employees and it takes less time to learn the employees lots of things than learning on job from own experience. Toyota Motor used various methods for the training of its employees like some lectur es and training classes are arranged for them or give them on job training with the senior members who are having abundant experience and can help the employees in its training. Job rotation is another(prenominal) term which is used for learning and growth sensitive skills of the employees.How Toyota can advance employees satisfaction and low employees turnoverIn managing human resource of the Toyota effectively the first step is to select the right employee for the right position. For this right selection of employees, it is necessary for Toyota to use innovative innovative techniques for selection of employees, compensating and rewarding to employees. Because job satisfaction is the most important variable and Toyotas success is dependant on its employees. So, Toyota always follows the innovative techniques for managing its human resource. Satisfied and committed employees are asset for the Toyota. It has seen establishment with more conform to employees perform better than other whose are not satisfied. So, Toyotas success or failure also depends on its employees satisfaction or dissatisfaction. Organization whose employees are dissatisfied with their jobs cost too much to the shaping. or soly they will be absent from the work or great power quarrel with the co-workers .These employees do not take enkindle in their job which affects the overall productivity of the arrangement and ultimately organization will suffer. there are so many reasons for their dissatisfaction it can be the environmental conditions in which they work, Nature of the work like repetition etc. There are different techniques which are used to make employee satisfied and ultimately low employees turnover which areHR DevelopmentCareer Development motivationHR DEVELOPMENTSkills and fellowship of supply is crucial for Toyotas innovation process. Most of the innovation images are come through the employees of the Toyota Motor. tho the time is ever-ever-changing so quickly tha t every technology and change fathers obsolete in no time. It is important for the Toyota that its employees remain up-to-date with the knowledge and changes to compete in the industryCareer DevelopmentIt is the duty of the Toyotas management to provide the growth opportunities to its employees. Career development is an ongoing process that focusing on the developing and enriching the organizations human resource in the light of both employee and organization need. It is also the responsibility of the Toyotas employee himself to think about his career development. It is something which one can not do for others. It has to come from the individual himself. Toyota also helps, guide and provides opportunities to its employees.MOTIVATION demand is a feeling of satisfaction and commitment towards its goals and objectives. This is an internal psychological advance which determines the action of the person. Employees are make via different ways .It is important for Toyota to give much a ttention to the needs of its employees and keep moving in the craving direction. Toyota enhances its employees motivation through two basic ways pecuniaryNon-financialFinancial motivatorsToyotas financial motivators are connected to the monetary need of the employees which includes wage system, bonuses, and allowances etc. which have usually short term effect on the employees. chemical group salaryA person is paid a salary for the job he/she is doing in a specific time. In Toyota, persons basic salary depends upon his knowledge, skills, qualification and competencies of the employee. Basic salary should be compatible with the job. It is required for the Toyota to give the compatible salary to its employees which keep them motivated and committed.Variable paySometimes Toyota gives incentives to employees to enhance or improve the performance of the employees focusing on the specific targets or projects.Financial rewards provide financial recognition to people. Extra coin is given to the employee for their givements.Benefits are also given to the employees for their well being which includes component to pension fund, health insurance schemes, life insurance, loan with no interest or lower interest rate, free use of products or go of the company, etc.Allowances for relocation, transportation, subsistence, accommodation, recreation, etc Non-financial motivation techniquesThe most important technological changes which are used by the Toyota to motivate its employees include non-financial motivation techniques. These non- financial motivators are very effective it cost nothing to the Toyota but depend on the willingness of pertinent managers to pay more attention to their staff. These non financial motivators are connected to the work itself and having a longer term effect. Non financial motivators are honors, self respect,Change Management perspective of Toyota HRMSChange Management as it seems make up of two words Change plus Management. Change means to t urn while management means the art of controlling, leading, organizing and ratiocination make. So apparently change management means the art of controlling, leading, organization and decision making in the transformation process (J Dawkins, 2007)More precisely, in the context of Toyota Motor, we can define change management as systematic methodology of changing the individuals, teams and organizations from current state to the desired state. This change may or may not include all the employees of an organization.In the fibre Development of new system was very crucial for Toyota Motor. Company was using old system but new computerized system was demand. And Toyota was facing chores in changing the old system due to its employees behavior (Chaffey D, 2004)Change Management processChange Management process includes the Toyota context, pace and scale leaf of change, people management, change management content plan page and murder of planIn Toyotas sceneIn Toyota Motor company, management decided to change its old manual(a) accounting system with new computerized system. Toyota Company needed the new computerized system for the following reason Toyota Motor valued to increase its efficiency in doing business and also wanted to gain competitive advantage over its competitor. For the development of new system company took the services of the other organization (J Dawkins, 2007)The new system was after the stage of successful testing was almost complete and the only problem for Toyota was the implementation because its workers who were resisting this new change they were opinion that after the development of the new system they will have problem to use it and they have to made major adjustment even layoffs are expected as a result of new system in reality company was predicting for the growth they were planning for product development and wanted to add new models and staff for managing this growth (Ayse Saka, 2003). After this implementation of new system lots of employees of Toyota was thinking about the early retirement.Pace and outmatch of Change in Toyota Motor CompanyIn pace and scale of change business needs to know that how many people are moved(p) with the development of the new system. For this organization can choose different ways that how they will know about these affected employees because this new system had been used by the same people there was very high cost attached with the new system so Toyota Motor needed to know exactly about the number of people who are affected and how often they had to change their attitudes and behavior. Toyota should know the time period in which the old system will be replaced by the new computerized system (Joel Oleson, 2009)For this change Toyota needs a sponsor and best person fits to this persona are senior and as well as influential personality of the Toyota. This was the first step for the Toyota to identify the sponsor next step was to identify champions and change agent who wi ll bring this new change system in the organization.People Management in ToyotaIn the new system development process at Toyota the most complicated stage in the process was people management. This is the most difficult process of development of new system. Because people are the final user for this new system in this case Toyota was facing some challenges as their employees were not favoring the new system due to some future doubts e.g. they were feeling their selves insecure that this new system will be harm for them (Joel Oleson, 2009)It will not in the benefit of them. There are so many ways organization can manage this issue of contradiction (Ayse Saka, 2003). First it is the responsibility of the Toyotas management to declare about the change to its employees who will be affected by this new system. They should be aware of about this system before its starting so, then these hurdle do not exist. Now proper coaching is required for the employees who will use this new system. T hey should be trained and learned to use new system. Toyota should communicate new systems benefits and new opportunities which will arise due to implementation of the new system to the employees like presentations, road shows team briefing and stiff meeting of the senior employee would be called and arranged for the employees.Toyotas Change Management purpose Contents PageChange management is a very difficult process that demands a proper step by step process for the change in a firm or organization. It has been often found that employees resist to the change management process a lot. Same as the case of Toyota Motor which wanted to implement a change inside the organization and was facing opposition from his employees. Change management plan contents page includesInitial friendship carrying out scheme of ToyotaInitial KnowledgeFor Toyota initial knowledge is called as the foundation to the change process. Toyota Motor believes, when they have a strong introduction to your ch ange requirements, they can have a first impact on the stakeholders who may be the cause of the resistance to the change. The more impressive the introduction to the problem and the change need, you have the most chances of the success in the change management (Ayse Saka, 2003). An introduction is the part of the change process in which you introduce the objectives, needs, rules and policies and deliver change effectiveness.Implementation Plan of ToyotaFor Toyota Implementation plan in the change process works as the milestones towards Toyotas destination. In the plan first Toyota management sets its milestones so that they may not lose their track from the change process. Plan has a significant wideness (Chaffey D, 2004).It helps the people, technology, process, and the change implementers like Toyota Motor Company define the service, reduce ambiguity in the change process and it also help to mitigate conflicts within the firm where change needs to be use. CommunicationWhenever a change is required, the change management team is required to seek, produce and properly communicate the evidences to Toyotas management in support to the change. Taking employees in confidence has a great importance for Toyota, as the change is mostly not implemented due to the resistance from the employees (Helen Taylor, Cary L. Cooper, 1998).And to get their support, it is widely required the good parley theory of the evidences to the support of change. Because if the employees will understand the benefits and reasons behind change, they will respond positively. Implementation plan includes adeptness measurement By ToyotaInvolvement of employeesTrainingReadiness measurement by ToyotaAlong with the strong talk, Toyota Motor also measures the address to use the change in the daily operations. If the staff will see it more ambiguous and difficult to implement, they will deny accepting change as it will not be secure to them. It may harm their performance that will impact on t heir jobs too. The experts in new system may replace them. So they will never accept the change. But if they find the system is easy to use and change, then most staff will embrace changes for the long term security.Involvement of employees tutelage the employment of the staff and employees in the change process is also an important step for Toyota. If you keep their opinion and suggestions in the changing process, you may face very less probability of the resistance from them. It will give them an affiliation with the change process (Helen Taylor, Cary L. Cooper, 1998). They will consider the success of the change as their success. Keeping them aware and involve also keep them aware what is going on so that there would be less chances of negative words of sassing and rumors.TrainingThe new systems and the changing should have training sessions for the employees who are use to the older systems and the business environment. The training sessions should be conducted by Toyota so tha t it may reduce the resistance, to increase efficiency and to avoid any risk in the stoppage of the production, jammed processes or other factors related to the less knowledge for the new systems (Chaffey D, 2004).Innovation to Management Styles of the Toyota HRMSDifferent management styles are used in Toyota to manage its workforce. These styles are dependent on the on several(prenominal)(a) factors e.g. culture of Toyota, nature of the task, skills, qualification of the employees, nature of the drawing cards (Kotter, J. and Schlesinger, L. 2003). Style of leader depends on all these factors and after analyzing appropriate style is employed. Sometimes different styles are used at same time to control the situation.Different Management StylesNormally there are three management styles which are followed by the different organizations including Toyota which are dictatorial democraticLassie FaireAutocraticIn Toyotas Autocratic style employees employment is minimal or not taken. No i nformation is cared with the employees. Rules are set and then tell employees to follow them. All the objectives and goals are set by the Toyota top management. The communication flow is from up to downward from top level to low level. The advantage of this style is that objectives and goal remain constant. These type of leaders make coloured decision and always keep an eye on subordinates whether they are doing the right things. In this style subordinates have no control on any thing and they just need to follow leader (Kotter, J. and Schlesinger, L. 2003). The disadvantage of this style is that employees are dissatisfied and which cause the reason of turnovers, absenteeism and low productivity.DemocraticIn Toyotas Democratic style, employees stimulation are taken in the planning and decision making process. Employees are motivated and encourage participating in the affairs of the Toyota. In this style every issues and problems are solved with the consent of the majority. The comm unication flow is both way upward to downward and vice versa. Democratic style is more often used at Toyota when the problem is composite and need everyone input. There are some advantages and disadvantages of this style. Employees are more satisfied with their job and turnover rate is low and productivity is high. Disadvantages may include to get everyone consensus is difficult. This style is time consuming because it takes time to get the input from others.Laissez-faireIn Toyotas Laissez-faire leadership style, leader gives free hand to employees or a group or team and asked for the end result. Toyotas leader does not set any rules and regulations. Toyotas employees set the rules and objectives according to their need. Leader role is very nominal in this style. The communication style is horizontal in this style (Kotter, J. and Schlesinger, L. 2003). This style is not very common in the so many organizations including Toyota but still used when management feels its need. There ar e also some disadvantages for this style, lack of staff focus, no clear hierarchy, scant(p) company image and less dissatisfaction of customersHow to manage Toyota Human Resource?Toyota motor company has also adopted the different management techniques for keeping its employees competitive, satisfied and to solve all the potential problems related to its HRMS. These different techniques areJob rotationJob EnrichmentInvolving employeesCommunicationManagement by pass close toEmployee driven innovationMaintain a knowledge sharing lucreJob rotationIn Toyota job rotation is the newly concept and it is effective as well. The process of moving employees among different jobs is job rotation. Job rotation helps employees to improve their skills, Knowledge and competencies. Employees get bored by doing the repetitious task every time so job rotation is a good way to keep them active and fresh every time (Jeffrey H. Dyer and Kentaro Nobeoka, 2000). Job rotation also helpful for the Toyota itself in the time of crisis, if an employee is inaccessible due to the any reason other employee can do its workJob enrichmentToyota Motor Company knows intrinsic factors in a job such as achievement, responsibility and growth need the job enrichment. With job enrichment employees are more likely to be satisfied with the job and motivated to perform it. Combining tasks takes existing and fractionalized tasks and puts them together and form a big module of work. Forming natural work units tasks and employee does create an identifiable and meaningful whole. Establishing lymph node relationship increases the direct relationship with the clients. Expanding jobs vertically gives employee more responsibilities and control (Jeffrey H. Dyer and Kentaro Nobeoka, 2000). go-ahead feedback channel lets employees knows how well they are performing their jobs whether performance have improved or not or remain constant.Involving employeesTake input from the employees to increase their commit ment is important for the success of the Toyota. The extent to which decisions affect the employees and Toyota should involve the employees. By increasing their autonomy and control over their work lives, employees will become more motivated, more committed to the organization, more productive and more satisfied with their jobs.CommunicationKeep informing the employees about the goals and direction of the Toyota. Communicate all the related issues regarding employee future, job and performance. Each and every matter which Toyota can share to the employee should communicate them. Every thing which affects the employees itself also communicated to them.Management by walking aroundVisit to the Toyotas offices, factories, workshops, and labs regularly, always asking the employees about their work and work related problems, sort out the problems and giving them feedback etc. Employee Driven InnovationToyota believes in collection of key ideas and uses the experiences of most of the emplo yees to create opportunities and new ways for them. It is important to bring incremental changes in culture of Toyota, products, behavior, processes, and in business models that create value for customers, stakeholders and the company.Maintain Knowledge sharing networkIt is necessary for organization to maintain knowledge sharing network that will help in quick knowledge diffusion than other competing manufactures. Due to the best knowledge sharing network organization can gain competitive advantage on other competitors. Knowledge sharing system made organization effective and capable to do any thing with in no time. This knowledge sharing network includes organizations employees, suppliers, management and all the related stakeholders. This network improves the productivity and reduced the delivery time. This knowledge sharing network of will solve three basic problemsMotivate and encourage members involvement and share their valuable ideasReduce cost of doing businessPrevent free R idersConclusionStudies have proved that organisational success is affected by the innovative management styles. These management styles are vary from every organization to another organization. There are different managing styles which all used to manage employees. Management styles can bring success and innovation in the organization but the most important thing is that management style should be suitable for the organizationSatisfied and committed employees are asset for the Toyota. It has seen organization with more satisfied employees perform better than other whose are not satisfied. So, Toyotas success or failure also depends on its employees satisfaction or dissatisfaction. Organization whose employees are dissatisfied with their jobs cost too much to the organization.The Change Management Could arises from several many situations and could be applied in several many kinds. Actually the type of problem or situation decides wherefore and how to change. The successful implemen tation of change depends on the human capital that an organization possesses and also on the measures adopted to implement change. The main objective of organizational change is to bring about a strategic change in its organizational structure to better utilize its human and non-human resources to efficiently achieve organizational goal.RecommendationsEffective and Timely Change Management is the secret of success of Toyota. But for effective change, Toyota needs to plan the design, sequence and implementation of change proactively.Satisfied and committed employees are asset for the Toyota. It has seen organization with more satisfied employees perform better than other whose are not satisfied. So, it is vital for Toyota to maintain a healthy relationship with its employees in order to become competitive.Today world is changing very quickly so Toyota should change and up grade its self with the modern standards and technologies. Toyota should welcome any key idea by the any employee .Self recognition, self esteem and honors are also very important for the employees so, Toyota should more emphasis on these non financial motivators and keeps its employees as most satisfied and happy.
Subscribe to:
Posts (Atom)