Sunday, March 31, 2019

Concepts of Object Oriented Techniques with OO Issues

Concepts of endeavor orient Techniques with OO Issues reverse endeavor- orientated frameworks offer re exercise at a high construct level promising several benefits to the emergence of complex clays. This paper seek to 1) define the concepts of intentive lens oriented techniques in addition with the OO issues, development techniques and concepts of bearing oriented computing machine programing, it is alike introduced the UML as an worka twenty-four hours and key tool for aspiration-oriented introduction, to boot 2) we look further into the frameworks from the perspective of aspiration-oriented techniques. In this section, it is aimed to define a rational promise betwixt intention oriented technology and frameworks. At the end, slightly future horizons for purpose oriented technology and frameworks atomic morsel 18 presended.I. Introduction reckoning power and ne bothrk bandwidth hire change magnitude dramatic bothy eachplace the olderen decade. However, the design and giveation of complex softw argon product remains expensive and demerit-pr unitary. untold of the equal and effort stems from the continuous re-discovery and re-invention of nerve center concepts and members across the softw atomic number 18 industry. In unique(predicate)(prenominal), the growing heterogeneity of hardw atomic number 18 architectures and smorgasbord of operating establishment and discourse platforms gulls it hard to build correct, portable, efficient, and inexpensive finishs from scratch. Object-oriented (OO) techniques and frameworks be promising technologies for reifying proven computer softw be designs and implementations in order to reduce the cost and improve the quality of softw atomic number 18. A framework is a reusable, semi-complete application that keep be specialized to sire custom applications 19. In contrast to to begin with OO re engross techniques establish on segmentation libraries, frameworks be targeted for parti cular melodic line units ( much(prenominal) as data treat or cellular communications1) and application domains ( much(prenominal) as habituater port wines or real- conviction avionics). Frameworks like MacApp, ET++, Interviews, ACE, Microsofts MFC and DCOM, JavaSofts RMI, and implementations of OMGs CORBA play an increasingly primary(prenominal) role in authoritative softw ar development.II. Object oriented concepts and techniques registerThe concept of ends and slips in work out had its first major breakthrough with the PDP-1 constitution at MIT which was probably the earlier fount of cap index found architecture. A nonher early practice was Sketchpad bring ond by Ivan Sutherland in 1963 however, this was an application and non a computer schedule paradigm. Objects as schedule entities were introduced in the 1960s in Simula 67, a programme language intentional for performing simulations, bring aboutd by Ole-Johan Dahl and Kristen Nygaard of the Norwegian C omputing Center in Oslo. (They were working on ship simulations, and were confounded by the combinatorial effusion of how the different attri scarcelyes from different ships could affect unrivalled an just about some otherwise. The idea occurred to them of grouping the different faces of ships into different var.es of intention lenss for each champion severalize of butts macrocosm responsible for defining its answer data and behavior.) Such an approach was a simple extrapolation of concepts earlier map in one(a)-dimensional programming. On analog computers, mapping from real-world phenomena/ aims to analog phenomena/ aims (and conversely), was (and is) called simulation. Simula not solely introduced the notion of folkes, but excessively of casefuls of classes, which is probably the first intelligible exercise of those notions. The ideas of Simula 67 influenced whatsoever(prenominal) an(prenominal) afterward languages, especially Small peach and der ivatives of enounce and Pascal.The Smalltalk language, which was demonstrable at Xerox PARC2 (by Alan Kay and others) in the 1970s, introduced the margin de end pointination-oriented programming to make for the pervasive use of targets and messages as the basis for computation. Smalltalk creators were influenced by the ideas introduced in Simula 67, but Smalltalk was designed to be a fully energising system in which classes could be created and modified dynamically rather than statically as in Simula 67. Smalltalk and with it OOP were introduced to a wider auditory sense by the August 1981 issue of Byte magazine.In the 1970s, Kays Smalltalk work had influenced the Lisp participation to incorporate physical intention- ground techniques which were introduced to developers via the Lisp machine. Experimentation with confused extensions to Lisp (like LOOPS and Flavors introducing eightfold inheritance and mixins), even sotually led to the Common Lisp Object System (CLOS , a part of the first standardized tendencyive lens-oriented programming language, ANSI Common Lisp), which integrates functional programming and fair game-oriented programming and countenances extension via a Meta-object protocol. In the 1980s, on that point were a few attempts to design processor architectures which included ironw be support for objects in remembering but these were not successful. Examples include the Intel iAPX 432 and the Linn last word Rekursiv.Object-oriented programming substantial as the dominant programming method actingology during the mid-1990s, by and large due to the influence of optical FoxPro 3.0 or possibly C++. Its command was further enhanced by the rising popularity of graphical user embrasures, for which object-oriented programming seems to be well-suited. An prototype of a closely link dynamic graphical user user port library and OOP language fundament be found in the hot chocolate frameworks on Mac OS X, written in Objective- C, an object-oriented, dynamic messaging extension to C institutiond on Smalltalk. OOP toolkits as well as enhanced the popularity of offspring-driven programming (although this concept is not moderate to OOP). Some feel that association with GUIs (real or perceived) was what propelled OOP into the programming mainstream.At ETH Zrich, Niklaus Wirth and his colleagues had as well been investigating such topics as data gazumpion and standard programming (although this had been in frequent use in the 1960s or earlier). Modula-2 (1978) included both(prenominal), and their succeeding design, Oberon, included a distinguishableive approach to object orientation, classes, and such. The approach is contradictory Smalltalk, and very unlike C++.Object-oriented features give away been added to m whatsoever existing languages during that time, including Ada, BASIC, Fortran, Pascal, and others. Adding these features to languages that were not initially designed for them lotstimes l ed to problems with compatibility and maintainability of economy. much recently, a number of languages have emerged that are primarily object-oriented yet harmonious with procedural methodology, such as Python and Ruby. probably the closely commercially historic recent object-oriented languages are Visual Basic.NET (VB.NET) and C, both designed for Microsofts .NET platform, and Java, developed by Sun Microsystems. VB.NET and C both support cross-language inheritance, renting classes outlined in bingle language to subclass classes delimit in the other language.Just as procedural programming led to refinements of techniques such as constructiond programming, modern object-oriented software design methods include refinements such as the use of design conventions, design by contract, and modeling languages (such as UML).The bourne OOPS, which look ups to an object-oriented programming system, was parkland in early development of object-oriented programming.III. unfathomed c oncepts and featuresClassDefines the abstract characteristics of a thing (object), including the things characteristics (its attributes, fields or right(a)ties) and the things behaviors (the things it squeeze out do, or methods, functions or features). One magnate say that a class is a formula or factory that describes the nature of something. For example, the class frank would consist of traits dual-lane by all dogs, such as breed and fur alter (characteristics), and the ability to bark and sit (behaviors). Classes go forth modularity and structure in an object-oriented computer program. A class should typically be recognizable to a non-programmer old(prenominal) with the problem domain, pisseding that the characteristics of the class should make sense in context. Also, the code for a class should be comparatively self- hold stard (generally development encapsulation). Collectively, the properties and methods defined by a class are called members.ObjectA pattern (exemp lar) of a class. The class Dog defines all possible dogs by spotisation the characteristics and behaviors they support have the object lass is adept particular dog, with particular versions of the characteristics. A Dog has fur young girl has brown-and-white fur.InstanceOne goat have an model of a class the pillowcase is the actual object created at runtime. In programmer jargon, the lass object is an eccentric of the Dog class. The sight of foster of the attributes of a particular object is called its call forth. The object consists of order and the behavior thats defined in the objects class. much on Classes, Metaclasses, Parameterized Classes, and ExemplarsThere are dickens ample categories of objects classes and instances. Users of object-oriented technology principlely specify of classes as containing the tuition necessary to create instances, i.e., the structure and capabilities of an instance is determined by its synonymic class. There are triad comm ho wever used (and different) views on the interpretation for classA class is a pattern, template, or blue sign for a family of structurally identical compass points. The items created development the class are called instances. This is a good deal associatered to as the class as a cookie cutter view. As you might guess, the instances are the cookies.A class is a thing that consists of both a pattern and a tool for creating items based on that pattern. This is the class as an instance factory view instances are the soul items that are manufactured (created) using the classs human race mechanism.A class is the send of all items created using a specific pattern. express some other focussing, the class is the commemorate of all instances of that pattern.We should bill that it is possible for an instance of a class to also be a class. A metaclass is a class whose instances themselves are classes. This means when we use the instance human beings mechanism in a metaclass, the instance created give itself be a class. The instance mental home mechanism of this class back end, in turn, be used to create instances although these instances may or may not themselves be classes.A concept very homogeneous to the metaclass is the parametric quantityized class. A parameterized class is a template for a class wherein specific items have been identified as being evolve ond to create non-parameterized classes based on the template. In effect, a parameterized class nookie be viewed as a fill in the blanks version of a class. One stinkpotnot like a shot use the instance mental hospital mechanism of a parameterized class. First, we must write out the required parameters, resulting in the creation of a non-parameterized class. at one time we have a non-parameterized class, we endure use its creation mechanisms to create instances.In this paper, we depart use the term class to mean metaclass, parameterized class, or a class that is n each a metaclass no r a parameterized class. We bequeath make a distinction sole(prenominal) when it is necessary to do so. Further, we get out occasionally refer to non-class instances. A non-class instance is an instance of a class, but is itself not a class. An instance of a metaclass, for example, would not be a non-class instance.In this paper, we leave sometimes refer to instantiation. Instantiation has two popular meaningsas a verb, instantiation is the process of creating an instance of a class, andas a noun, an instantiation is an instance of a class.Some raft flash back the use of the term object to instances of classes. For these people, classes are not objects. However, when these people are confronted with the concepts of metaclasses and parameterized classes, they have a obstacle attempting to resolve the problems these concepts introduce. For example, is a class that is an instance of a metaclass an object even though it is itself a class? In this paper, we will use the term obj ect to refer to both classes and their instances. We will only distinguish among the two when needed.Black Boxes and InterfacesObjects are unrelenting boxes. Specifically, the underlying implementations of objects are mystic from those that use the object. In object-oriented systems, it is only the manufacturer (creator, designer, or builder) of an object that knows the flesh out about the internal construction of that object. The consumers (users) of an object are denied intimacy of the home(a) workings of the object, and must deal with an object via unrivaled of its three distinct larboardsThe universal interface. This is the interface that is open (visible) to everybody.The inheritance interface. This is the interface that is accessible only by direct distinctions of the object. (We will controvert inheritance and specialization by and by in this chapter.) In class-based object-oriented systems, only classes nookie provide an inheritance interface.The parameter int erface. In the case of parameterized classes, the parameter interface defines the parameters that must be supplied to create an instance of the parameterized class. other way of locution that an item is in the everyday interface of an object is to say that the object exports that item. Similarly, when an object requires information from international of itself (e.g., as with the parameters in a parameterized class), we rump say that the object ineluctably to import that information. assemblyIt is, of course, possible for objects to be composed of other objects. Aggregation is eitherThe process of creating a unfermentedfound object from two or more other objects, orAn object that is composed of two or more other objects.For example, a go through object could be fashioned from a calendar month object, a day object, and a year object. A arguing of name calling object, for example, discount be thought of as containing m all an(prenominal) name objects.A massive object is a n object that has no externally-discernible structure. Said another way, a monolithic object does not appear to have been constructed from two or more other objects. Specifically, a monolithic object jackpot only be inured as a glutinous whole. Those outside of a monolithic object nookynot presently interact with any (real or imagined) objects within the monolithic object. A radio button in a graphical user interface (GUI) is an example of a monolithic object. conglomerate objects are objects that have an externally-discernible structure, and the structure can be turn to via the familiar interface of the intricate object. The objects that correspond a compound object are referred to as grammatical constituent objects. Composite objects meet one or both of the following criteriaThe rural area of a mixed plant object is now affected by the presence or absence of one or more of its office objects, and/orThe gene objects can be directly referenced via the unrestricted interface of their match composite object.It is useful to cleave composite objects into two subcategories heterogeneous composite objects and like composite objectsA heterogeneous composite object is a composite object that is conceptually composed of component objects that are not all conceptually the same. For example, a date (made up of a month object, a day object, and a year object) is a heterogeneous composite object.A homogeneous composite object is a composite object that is conceptually composed of component objects that are all conceptually the same. For example, a slant of take aimes is a homogeneous composite object.The rules for excogitation heterogeneous composite objects are different from the rules for designing homogeneous composite objects.differentiation and inheritanceAggregation is not the only way in which two objects can be related. One object can be a specialization of another object. Specialization is eitherThe process of defining a vernal object b ased on a (typically) more narrow rendering of an existing object, orAn object that is directly related to, and more narrowly defined than, another object.Specialization is usually associated with classes. It is usually only in the so-called classless object-oriented systems that we think of specialization for objects other than classes.Depending on their technical foul background, thither are a number of different ways in which people express specialization. For example, those who are familiar with an object-oriented programming language called Smalltalk refer to specializations as subclasses and to the jibe installations of these specializations as superclasses. Those with a background in the C++ programming language use the term derived class for specialization and base class for correspondent generalizations.It is viridity to say that everything that is admittedly for a generalization is also true for its corresponding specialization. We can, for example, define checking musical scores and savings flyers as specializations of pious platitude accounts. Another way of reflexion this is that a checking account is a kind of stateory financial institution account, and a savings account is a kind of situate account. Still another way of expressing this idea is to say that everything that was true for the argot account is also true for the savings account and the checking account.In an object-oriented context, we articulate of specializations as inheriting characteristics from their corresponding generalizations. Inheritance can be defined as the process whereby one object acquires (gets, receives) characteristics from one or more other objects. Some object-oriented systems digest only single inheritance, a stain in which a specialization may only acquire characteristics from a single generalization. Many object-oriented systems, however, allow for multiple inheritance, a situation in which a specialization may acquire characteristics from two or more corresponding generalizations.Our previous vernals of the coin aver account, checking account, and savings account was an example of single inheritance. A oscilloscope and a video recording sit are both specializations of device that enables one to see things far international. A television even off is also a kind of electronic device. You might say that a television peg down acquires characteristics from two different generalizations, device that enables one to see things far away and electronic device. Therefore, a television set is a product of multiple inheritance.Abstract ClassesWe usually think of classes as being complete definitions. However, there are situations where incomplete definitions are useful, and classes that represent these incomplete definitions are evenly useful. For example, in everyday conversation, we might talk about such items as bank accounts, insurance policies, and houses. In object-oriented thinking, we often isolate useful, but incompl ete, concepts such as these into their own special classes.Abstract classes are classes that embody tenacious and cohesive, but incomplete, concepts, and in turn, make these characteristics useable to their specializations via inheritance. People sometimes use the call partial type and abstract superclass as synonyms for abstract class. season we would never create instances of abstract classes, we most certainly would make their individua advert characteristics available to more specialized classes via inheritance.For example, come across the concept of an move. On one hand, most people know what an travel is. On the other hand, automobile is not a complete definition for any vehicle. It would be quite an accurate to describe automobile as the set of characteristics that make a thing an automobile, in other words, the nerve center of automobile-ness.OperationsThe public interface of an object typically contains three different categories of items procedures (sometimes refe rred to as method pickers, method interfaces, messages, or methods), regulars, and exclusions.An accomplishment in the public interface of an object advertises a functional capability of that object. For example, deposit would be an deed in the public interface of a bank account object, what is current temperature would be an deed in the public interface of a temperature sensor object, and step-up would be an surgical process in the public interface of a preclude object.The actual algorithm for accomplishing an exercise is referred to as a method. Unlike operations, methods are not in the public interface for an object. Rather, methods are hidden on the inside of an object. So, while users of bank account objects would know that they could make a deposit into a bank account, they would be unaware of the details as to how that deposit actually got credited to the bank account.We refer to the operations in the public interface of an object as suffered operations. Suffered oper ations are operations that meet two criteria they are things that relegate to an object, and they are in the public interface of that object. For example, we can say that a bank account suffers the operation of having a deposit made into it. The bank account can also suffer the operation of being queried as to its current balance. Some people also refer to suffered operations as exported operations.There are three broad categories of suffered operations, i.e.A selector is an operation that tells us something about the state of an object, but cannot, by definition, change the state of the object. An operation that tells us the current balance of a bank account is an example of a selector operation.A constructor is an operation that has the ability to change the state of an object. For example, an operation in the public interface to a mailbox object that added a message to the mailbox would be a constructor operation. (Please note that some people restrict the definition of the term constructor to those operations that cause instances of a class to come into existence.)In the context of a homogeneous composite object, an iterator is an operation that allows its users to escort (access) each of the component objects that make up the homogeneous composite object. If we have a inclination of an orbit of addresses, for example, and we wishing to scar the entire keep down, an iterator would allow us to visit each address object within the list and then, in turn, to print each address.Iterators can be further divided into two broad categories active (open) iterators and passive (closed) iterators. active iterators are objects in their own right. passive iterators are implemented as operations in the interface of the object over which they allow iteration. nonoperational iterators are further broken quite a little into selective iterators and constructive iterators. unresisting selective iterators do not allow their users to change the object over which the iteration takes place. Passive constructive iterators do allow users to change the object over which iteration takes place.We can also describe suffered operations as natural or composite. A uninitiate operation is an operation that cannot be accomplished simply, efficiently, and reliably without direct knowledge of the underlying (hidden) implementation of the object. As an example, we could argue that an operation that added an item to a list object, or an operation that deleted an item from a list object were primitive operations with valuate to the list object.Suppose that we wanted to create a swap operation, an operation that would swap in a new item in a list, while at the same time swapping out an old item in the same list. This is not a primitive operation since we can accomplish this with a simple conspiracy of the delete operation (deleting the old item) followed by the add operation (adding the new item). The swap operation is an example of a composite operation. A composite operation is any operation that is composed, or can be composed, of two or more primitive operations.Sometimes objects need help in maintaining their characteristics. Suppose, for example, that we wanted to create a generic wine tell list object. An ordered list is a list that must order its contents from the smallest to the largest. Specifically, every time we add an item to our ordered list, that item would have to be primed(p) in its proper position with respect to all the other items already in the list. By generic, we mean a template that can be instantiated with the household (class) of items we wish to place in the ordered list.It would not be unreasonable to implement this object as a parameterized class. Obviously, one of the parameters would be the category of items (e.g., class) that we desired to place in the list. For example, could instantiate (make an instance) the generic ordered list with a name class resulting in the creation of an ordered list of n ames class.There is a problem, however. Given that we could instantiate the generic ordered list with just about any category of items, how can we be indisputable that the ordered lists will know how to decent maintain order no matter what we use to instantiate the generic ordered list? Suppose, for example, that we wanted an ordered list of fazoomas. How could the generic list class tell if one fazooma was greater than or less than another fazooma?A solution would be for the generic ordered list to require a second parameter, a parameter over and above the category of items (class) that we desired to place in the list. This second parameter would be a The ConstantsIn addition to suffered operations, the public interface of an object can also contain invariables. Constants are objects of constant state. Imagine that we want to create a spring list of addresses class. A leap list is a list that has a fixed utmost number of elements. A bounded list can be empty, and it can con tain fewer than the maximum number of elements. It can even contain the maximum number of elements, but it can never contain more than the defined maximum number of elements. outwear that we place a constant in the public interface of our bounded list of addresses. This constant represents the maximum number of elements that can be placed in the bounded list. come in also that there is a suffered operation that will tell us how many elements (addresses, in our example) are shortly in the bounded list. We can now determine how much way is available in the bounded list by inquiring how many addresses are already in the list, and then subtracting this from the previously-defined constant.In some cases, as with the bounded list example above, constants are provided more for convenience than necessity. In other cases, such as in the case of encryption algorithms needing a seed cling to, constants are an implicit requirement.ExceptionsA third category of items that can be found in the public interface of objects is exceptions. Exceptions have two different definitionsan event that causes breakout of normal application execution, anda set of information directly relating to the event that caused suspension of normal application execution.Exceptions can be contrasted with an older, less reliable technology error codes. The idea bed error codes was fairly simple. You would postulation that an application, or part of an application, accomplish some work. One of the pieces of information that would be re dour to the requester would be an error code. If all had gone(p) well, the error code would typically have a value of zero. If any problems had occurred, the error code would have a non-zero value. It was also quite common to associate different non-zero values of an error code with specific errors. break codes suffered from two major problemsNo one was forced to actually check the value of returned error codes.Changes (additions, deletions, and modifications) in the meanings of the special values assigned to error codes were not self-movingally passed on to interested parties. Tracking the effects of a changed error code value often consumed a significant measure of resources.To bring in how exceptions directly address both of these issues, we first need to understand how exceptions typically workExceptions may be defined by the milieu or by the user.When an prodigious (but not unforeseen) condition occurs, an appropriate exception is activated. (People use different terms to express the energizing of an exception. The most common is raise. Less normally, people use the terms throw or activate.) This activation may be automatic (controlled by the environment) or may be expressly requested by the designer of the object or application.Examples of portentous conditions include trying to leave out something from an empty container, directing an elevator on the top floor to go up, and attempting to cause a date to take on an invalid value like February 31, 1993.Once the exception is activated, normal application execution lucre and control is transferred to a locally defined exception coach, if one is present. If no locally defined exception detentionr is present or if the exception handler is not equipped to handle the exception, the exception is propagated to the next high level of the application. Exceptions cannot be ignored. An exception will continue to be sent to higher levels of the application until it is either turned off or the application ceases to function.An exception handler checks to see what type of exception has been activated. If the exception is one that the handler recognizes, a specific set of actions is taken. Executing a set of actions in response to an exception is cognise as handling the exception. discussion an exception deactivates the exception the exception will not be propagated any further.Unlike error codes, exceptions cannot be ignored. Once an exception has been activated, it demands attention. In object-oriented systems, exceptions are placed in the public interfaces of objects. Changes in the public interfaces of objects very often require an automatic rechecking of all other objects that invoke operations in the changed objects. Thus, changes in exceptions result in at least a partially automated propagation of change information.Object Coupling and Object gumminessEngineers have known for centuries that the less any one part of a system knows about any other part of that same system, the break-dance the overall system. Systems whose components are highly commutative of each other are easier to fix and enhance than systems where there are strong interdependencies among some or all of the components. Highly independent system components are possible when there is minimal twin among the components, and each component is highly cohesive.Coupling is a measure of the strength of the connection between any two system components. The more any one compon ent knows about another component, the tighter (worse) the coupling is between those two components. Cohesion is a measure of how logically related the parts of an individual component are to each oConcepts of Object Oriented Techniques with OO IssuesConcepts of Object Oriented Techniques with OO IssuesAbstractObject-oriented frameworks offer reuse at a high design level promising several benefits to the development of complex systems. This paper sought to 1) define the concepts of object oriented techniques in addition with the OO issues, development techniques and concepts of object oriented programming, it is also introduced the UML as an ordinary and key tool for object-oriented design, additionally 2) we look further into the frameworks from the perspective of object-oriented techniques. In this section, it is aimed to define a reasonable promise between object oriented technology and frameworks. At the end, some future horizons for object oriented technology and frameworks are presented.I. IntroductionComputing power and network bandwidth have increased dramatically over the past decade. However, the design and implementation of complex software remains expensive and error-prone. Much of the cost and effort stems from the continuous re-discovery and re-invention of core concepts and components across the software industry. In particular, the growing heterogeneity of hardware architectures and diversity of operating system and communication platforms makes it hard to build correct, portable, efficient, and inexpensive applications from scratch. Object-oriented (OO) techniques and frameworks are promising technologies for reifying proven software designs and implementations in order to reduce the cost and improve the quality of software. A framework is a reusable, semi-complete application that can be specialized to produce custom applications 19. In contrast to earlier OO reuse techniques based on class libraries, frameworks are targeted for particular bu siness units (such as data processing or cellular communications1) and application domains (such as user interfaces or real-time avionics). Frameworks like MacApp, ET++, Interviews, ACE, Microsofts MFC and DCOM, JavaSofts RMI, and implementations of OMGs CORBA play an increasingly important role in contemporary software development.II. Object oriented concepts and techniquesHistoryThe concept of objects and instances in computing had its first major breakthrough with the PDP-1 system at MIT which was probably the earliest example of capability based architecture. Another early example was Sketchpad created by Ivan Sutherland in 1963 however, this was an application and not a programming paradigm. Objects as programming entities were introduced in the 1960s in Simula 67, a programming language designed for performing simulations, created by Ole-Johan Dahl and Kristen Nygaard of the Norwegian Computing Center in Oslo. (They were working on ship simulations, and were confounded by the combinatorial explosion of how the different attributes from different ships could affect one another. The idea occurred to them of grouping the different types of ships into different classes of objects each class of objects being responsible for defining its own data and behavior.) Such an approach was a simple extrapolation of concepts earlier used in analog programming. On analog computers, mapping from real-world phenomena/objects to analog phenomena/objects (and conversely), was (and is) called simulation. Simula not only introduced the notion of classes, but also of instances of classes, which is probably the first explicit use of those notions. The ideas of Simula 67 influenced many later languages, especially Smalltalk and derivatives of Lisp and Pascal.The Smalltalk language, which was developed at Xerox PARC2 (by Alan Kay and others) in the 1970s, introduced the term object-oriented programming to represent the pervasive use of objects and messages as the basis for comput ation. Smalltalk creators were influenced by the ideas introduced in Simula 67, but Smalltalk was designed to be a fully dynamic system in which classes could be created and modified dynamically rather than statically as in Simula 67. Smalltalk and with it OOP were introduced to a wider audience by the August 1981 issue of Byte magazine.In the 1970s, Kays Smalltalk work had influenced the Lisp community to incorporate object-based techniques which were introduced to developers via the Lisp machine. Experimentation with various extensions to Lisp (like LOOPS and Flavors introducing multiple inheritance and mixins), eventually led to the Common Lisp Object System (CLOS, a part of the first standardized object-oriented programming language, ANSI Common Lisp), which integrates functional programming and object-oriented programming and allows extension via a Meta-object protocol. In the 1980s, there were a few attempts to design processor architectures which included hardware support for objects in memory but these were not successful. Examples include the Intel iAPX 432 and the Linn Smart Rekursiv.Object-oriented programming developed as the dominant programming methodology during the mid-1990s, largely due to the influence of Visual FoxPro 3.0 or possibly C++. Its dominance was further enhanced by the rising popularity of graphical user interfaces, for which object-oriented programming seems to be well-suited. An example of a closely related dynamic GUI library and OOP language can be found in the Cocoa frameworks on Mac OS X, written in Objective-C, an object-oriented, dynamic messaging extension to C based on Smalltalk. OOP toolkits also enhanced the popularity of event-driven programming (although this concept is not limited to OOP). Some feel that association with GUIs (real or perceived) was what propelled OOP into the programming mainstream.At ETH Zrich, Niklaus Wirth and his colleagues had also been investigating such topics as data abstraction and modular programming (although this had been in common use in the 1960s or earlier). Modula-2 (1978) included both, and their succeeding design, Oberon, included a distinctive approach to object orientation, classes, and such. The approach is unlike Smalltalk, and very unlike C++.Object-oriented features have been added to many existing languages during that time, including Ada, BASIC, Fortran, Pascal, and others. Adding these features to languages that were not initially designed for them often led to problems with compatibility and maintainability of code.More recently, a number of languages have emerged that are primarily object-oriented yet compatible with procedural methodology, such as Python and Ruby. Probably the most commercially important recent object-oriented languages are Visual Basic.NET (VB.NET) and C, both designed for Microsofts .NET platform, and Java, developed by Sun Microsystems. VB.NET and C both support cross-language inheritance, allowing classes defined in one langu age to subclass classes defined in the other language.Just as procedural programming led to refinements of techniques such as structured programming, modern object-oriented software design methods include refinements such as the use of design patterns, design by contract, and modeling languages (such as UML).The term OOPS, which refers to an object-oriented programming system, was common in early development of object-oriented programming.III. Fundamental concepts and featuresClassDefines the abstract characteristics of a thing (object), including the things characteristics (its attributes, fields or properties) and the things behaviors (the things it can do, or methods, operations or features). One might say that a class is a blueprint or factory that describes the nature of something. For example, the class Dog would consist of traits shared by all dogs, such as breed and fur color (characteristics), and the ability to bark and sit (behaviors). Classes provide modularity and struc ture in an object-oriented computer program. A class should typically be recognizable to a non-programmer familiar with the problem domain, meaning that the characteristics of the class should make sense in context. Also, the code for a class should be relatively self-contained (generally using encapsulation). Collectively, the properties and methods defined by a class are called members.ObjectA pattern (exemplar) of a class. The class Dog defines all possible dogs by listing the characteristics and behaviors they can have the object Lassie is one particular dog, with particular versions of the characteristics. A Dog has fur Lassie has brown-and-white fur.InstanceOne can have an instance of a class the instance is the actual object created at runtime. In programmer jargon, the Lassie object is an instance of the Dog class. The set of values of the attributes of a particular object is called its state. The object consists of state and the behavior thats defined in the objects class.M ore on Classes, Metaclasses, Parameterized Classes, and ExemplarsThere are two broad categories of objects classes and instances. Users of object-oriented technology usually think of classes as containing the information necessary to create instances, i.e., the structure and capabilities of an instance is determined by its corresponding class. There are three commonly used (and different) views on the definition for classA class is a pattern, template, or blueprint for a category of structurally identical items. The items created using the class are called instances. This is often referred to as the class as a cookie cutter view. As you might guess, the instances are the cookies.A class is a thing that consists of both a pattern and a mechanism for creating items based on that pattern. This is the class as an instance factory view instances are the individual items that are manufactured (created) using the classs creation mechanism.A class is the set of all items created using a spe cific pattern. Said another way, the class is the set of all instances of that pattern.We should note that it is possible for an instance of a class to also be a class. A metaclass is a class whose instances themselves are classes. This means when we use the instance creation mechanism in a metaclass, the instance created will itself be a class. The instance creation mechanism of this class can, in turn, be used to create instances although these instances may or may not themselves be classes.A concept very similar to the metaclass is the parameterized class. A parameterized class is a template for a class wherein specific items have been identified as being required to create non-parameterized classes based on the template. In effect, a parameterized class can be viewed as a fill in the blanks version of a class. One cannot directly use the instance creation mechanism of a parameterized class. First, we must supply the required parameters, resulting in the creation of a non-parame terized class. Once we have a non-parameterized class, we can use its creation mechanisms to create instances.In this paper, we will use the term class to mean metaclass, parameterized class, or a class that is uncomplete a metaclass nor a parameterized class. We will make a distinction only when it is necessary to do so. Further, we will occasionally refer to non-class instances. A non-class instance is an instance of a class, but is itself not a class. An instance of a metaclass, for example, would not be a non-class instance.In this paper, we will sometimes refer to instantiation. Instantiation has two common meaningsas a verb, instantiation is the process of creating an instance of a class, andas a noun, an instantiation is an instance of a class.Some people restrict the use of the term object to instances of classes. For these people, classes are not objects. However, when these people are confronted with the concepts of metaclasses and parameterized classes, they have a diffi culty attempting to resolve the problems these concepts introduce. For example, is a class that is an instance of a metaclass an object even though it is itself a class? In this paper, we will use the term object to refer to both classes and their instances. We will only distinguish between the two when needed.Black Boxes and InterfacesObjects are black boxes. Specifically, the underlying implementations of objects are hidden from those that use the object. In object-oriented systems, it is only the producer (creator, designer, or builder) of an object that knows the details about the internal construction of that object. The consumers (users) of an object are denied knowledge of the inner workings of the object, and must deal with an object via one of its three distinct interfacesThe public interface. This is the interface that is open (visible) to everybody.The inheritance interface. This is the interface that is accessible only by direct specializations of the object. (We will d iscuss inheritance and specialization later in this chapter.) In class-based object-oriented systems, only classes can provide an inheritance interface.The parameter interface. In the case of parameterized classes, the parameter interface defines the parameters that must be supplied to create an instance of the parameterized class.Another way of saying that an item is in the public interface of an object is to say that the object exports that item. Similarly, when an object requires information from outside of itself (e.g., as with the parameters in a parameterized class), we can say that the object needs to import that information.AggregationIt is, of course, possible for objects to be composed of other objects. Aggregation is eitherThe process of creating a new object from two or more other objects, orAn object that is composed of two or more other objects.For example, a date object could be fashioned from a month object, a day object, and a year object. A list of names object, fo r example, can be thought of as containing many name objects.A monolithic object is an object that has no externally-discernible structure. Said another way, a monolithic object does not appear to have been constructed from two or more other objects. Specifically, a monolithic object can only be treated as a cohesive whole. Those outside of a monolithic object cannot directly interact with any (real or imagined) objects within the monolithic object. A radio button in a graphical user interface (GUI) is an example of a monolithic object.Composite objects are objects that have an externally-discernible structure, and the structure can be addressed via the public interface of the composite object. The objects that comprise a composite object are referred to as component objects. Composite objects meet one or both of the following criteriaThe state of a composite object is directly affected by the presence or absence of one or more of its component objects, and/orThe component objects c an be directly referenced via the public interface of their corresponding composite object.It is useful to divide composite objects into two subcategories heterogeneous composite objects and homogeneous composite objectsA heterogeneous composite object is a composite object that is conceptually composed of component objects that are not all conceptually the same. For example, a date (made up of a month object, a day object, and a year object) is a heterogeneous composite object.A homogeneous composite object is a composite object that is conceptually composed of component objects that are all conceptually the same. For example, a list of addresses is a homogeneous composite object.The rules for designing heterogeneous composite objects are different from the rules for designing homogeneous composite objects.Specialization and InheritanceAggregation is not the only way in which two objects can be related. One object can be a specialization of another object. Specialization is eitherT he process of defining a new object based on a (typically) more narrow definition of an existing object, orAn object that is directly related to, and more narrowly defined than, another object.Specialization is usually associated with classes. It is usually only in the so-called classless object-oriented systems that we think of specialization for objects other than classes.Depending on their technical background, there are a number of different ways in which people express specialization. For example, those who are familiar with an object-oriented programming language called Smalltalk refer to specializations as subclasses and to the corresponding generalizations of these specializations as superclasses. Those with a background in the C++ programming language use the term derived class for specialization and base class for corresponding generalizations.It is common to say that everything that is true for a generalization is also true for its corresponding specialization. We can, fo r example, define checking accounts and savings accounts as specializations of bank accounts. Another way of saying this is that a checking account is a kind of bank account, and a savings account is a kind of bank account. Still another way of expressing this idea is to say that everything that was true for the bank account is also true for the savings account and the checking account.In an object-oriented context, we speak of specializations as inheriting characteristics from their corresponding generalizations. Inheritance can be defined as the process whereby one object acquires (gets, receives) characteristics from one or more other objects. Some object-oriented systems permit only single inheritance, a situation in which a specialization may only acquire characteristics from a single generalization. Many object-oriented systems, however, allow for multiple inheritance, a situation in which a specialization may acquire characteristics from two or more corresponding generalizati ons.Our previous discussion of the bank account, checking account, and savings account was an example of single inheritance. A telescope and a television set are both specializations of device that enables one to see things far away. A television set is also a kind of electronic device. You might say that a television set acquires characteristics from two different generalizations, device that enables one to see things far away and electronic device. Therefore, a television set is a product of multiple inheritance.Abstract ClassesWe usually think of classes as being complete definitions. However, there are situations where incomplete definitions are useful, and classes that represent these incomplete definitions are equally useful. For example, in everyday conversation, we might talk about such items as bank accounts, insurance policies, and houses. In object-oriented thinking, we often isolate useful, but incomplete, concepts such as these into their own special classes.Abstract cl asses are classes that embody coherent and cohesive, but incomplete, concepts, and in turn, make these characteristics available to their specializations via inheritance. People sometimes use the terms partial type and abstract superclass as synonyms for abstract class. While we would never create instances of abstract classes, we most certainly would make their individual characteristics available to more specialized classes via inheritance.For example, consider the concept of an automobile. On one hand, most people know what an automobile is. On the other hand, automobile is not a complete definition for any vehicle. It would be quite accurate to describe automobile as the set of characteristics that make a thing an automobile, in other words, the essence of automobile-ness.OperationsThe public interface of an object typically contains three different categories of itemsoperations (sometimes referred to as method selectors, method interfaces, messages, or methods),constants, andex ceptions.An operation in the public interface of an object advertises a functional capability of that object. For example, deposit would be an operation in the public interface of a bank account object, what is current temperature would be an operation in the public interface of a temperature sensor object, and increment would be an operation in the public interface of a counter object.The actual algorithm for accomplishing an operation is referred to as a method. Unlike operations, methods are not in the public interface for an object. Rather, methods are hidden on the inside of an object. So, while users of bank account objects would know that they could make a deposit into a bank account, they would be unaware of the details as to how that deposit actually got credited to the bank account.We refer to the operations in the public interface of an object as suffered operations. Suffered operations are operations that meet two criteria they are things that happen to an object, and th ey are in the public interface of that object. For example, we can say that a bank account suffers the operation of having a deposit made into it. The bank account can also suffer the operation of being queried as to its current balance. Some people also refer to suffered operations as exported operations.There are three broad categories of suffered operations, i.e.A selector is an operation that tells us something about the state of an object, but cannot, by definition, change the state of the object. An operation that tells us the current balance of a bank account is an example of a selector operation.A constructor is an operation that has the ability to change the state of an object. For example, an operation in the public interface to a mailbox object that added a message to the mailbox would be a constructor operation. (Please note that some people restrict the definition of the term constructor to those operations that cause instances of a class to come into existence.)In the context of a homogeneous composite object, an iterator is an operation that allows its users to visit (access) each of the component objects that make up the homogeneous composite object. If we have a list of addresses, for example, and we wish to print the entire list, an iterator would allow us to visit each address object within the list and then, in turn, to print each address.Iterators can be further divided into two broad categories active (open) iterators and passive (closed) iterators. Active iterators are objects in their own right. Passive iterators are implemented as operations in the interface of the object over which they allow iteration. Passive iterators are further broken down into selective iterators and constructive iterators. Passive selective iterators do not allow their users to change the object over which the iteration takes place. Passive constructive iterators do allow users to change the object over which iteration takes place.We can also describe suffered operations as primitive or composite. A primitive operation is an operation that cannot be accomplished simply, efficiently, and reliably without direct knowledge of the underlying (hidden) implementation of the object. As an example, we could argue that an operation that added an item to a list object, or an operation that deleted an item from a list object were primitive operations with respect to the list object.Suppose that we wanted to create a swap operation, an operation that would swap in a new item in a list, while at the same time swapping out an old item in the same list. This is not a primitive operation since we can accomplish this with a simple combination of the delete operation (deleting the old item) followed by the add operation (adding the new item). The swap operation is an example of a composite operation. A composite operation is any operation that is composed, or can be composed, of two or more primitive operations.Sometimes objects need help in maintaining th eir characteristics. Suppose, for example, that we wanted to create a generic ordered list object. An ordered list is a list that must order its contents from the smallest to the largest. Specifically, every time we add an item to our ordered list, that item would have to be placed in its proper position with respect to all the other items already in the list. By generic, we mean a template that can be instantiated with the category (class) of items we wish to place in the ordered list.It would not be unreasonable to implement this object as a parameterized class. Obviously, one of the parameters would be the category of items (e.g., class) that we desired to place in the list. For example, could instantiate (make an instance) the generic ordered list with a name class resulting in the creation of an ordered list of names class.There is a problem, however. Given that we could instantiate the generic ordered list with just about any category of items, how can we be sure that the orde red lists will know how to properly maintain order no matter what we use to instantiate the generic ordered list? Suppose, for example, that we wanted an ordered list of fazoomas. How could the generic list class tell if one fazooma was greater than or less than another fazooma?A solution would be for the generic ordered list to require a second parameter, a parameter over and above the category of items (class) that we desired to place in the list. This second parameter would be a The ConstantsIn addition to suffered operations, the public interface of an object can also contain constants. Constants are objects of constant state. Imagine that we want to create a bounded list of addresses class. A bounded list is a list that has a fixed maximum number of elements. A bounded list can be empty, and it can contain fewer than the maximum number of elements. It can even contain the maximum number of elements, but it can never contain more than the defined maximum number of elements.Assu me that we place a constant in the public interface of our bounded list of addresses. This constant represents the maximum number of elements that can be placed in the bounded list. Assume also that there is a suffered operation that will tell us how many elements (addresses, in our example) are currently in the bounded list. We can now determine how much room is available in the bounded list by inquiring how many addresses are already in the list, and then subtracting this from the previously-defined constant.In some cases, as with the bounded list example above, constants are provided more for convenience than necessity. In other cases, such as in the case of encryption algorithms needing a seed value, constants are an absolute requirement.ExceptionsA third category of items that can be found in the public interface of objects is exceptions. Exceptions have two different definitionsan event that causes suspension of normal application execution, anda set of information directly re lating to the event that caused suspension of normal application execution.Exceptions can be contrasted with an older, less reliable technology error codes. The idea behind error codes was fairly simple. You would request that an application, or part of an application, accomplish some work. One of the pieces of information that would be returned to the requester would be an error code. If all had gone well, the error code would typically have a value of zero. If any problems had occurred, the error code would have a non-zero value. It was also quite common to associate different non-zero values of an error code with specific errors.Error codes suffered from two major problemsNo one was forced to actually check the value of returned error codes.Changes (additions, deletions, and modifications) in the meanings of the special values assigned to error codes were not automatically passed on to interested parties. Tracking the effects of a changed error code value often consumed a signifi cant amount of resources.To understand how exceptions directly address both of these issues, we first need to understand how exceptions typically workExceptions may be defined by the environment or by the user.When an exceptional (but not unforeseen) condition occurs, an appropriate exception is activated. (People use different terms to express the activation of an exception. The most common is raise. Less commonly, people use the terms throw or activate.) This activation may be automatic (controlled by the environment) or may be expressly requested by the designer of the object or application.Examples of exceptional conditions include trying to remove something from an empty container, directing an elevator on the top floor to go up, and attempting to cause a date to take on an invalid value like February 31, 1993.Once the exception is activated, normal application execution stops and control is transferred to a locally defined exception handler, if one is present. If no locally de fined exception handler is present or if the exception handler is not equipped to handle the exception, the exception is propagated to the next higher level of the application. Exceptions cannot be ignored. An exception will continue to be sent to higher levels of the application until it is either turned off or the application ceases to function.An exception handler checks to see what type of exception has been activated. If the exception is one that the handler recognizes, a specific set of actions is taken. Executing a set of actions in response to an exception is known as handling the exception. Handling an exception deactivates the exception the exception will not be propagated any further.Unlike error codes, exceptions cannot be ignored. Once an exception has been activated, it demands attention. In object-oriented systems, exceptions are placed in the public interfaces of objects. Changes in the public interfaces of objects very often require an automatic rechecking of all ot her objects that invoke operations in the changed objects. Thus, changes in exceptions result in at least a partially automated propagation of change information.Object Coupling and Object CohesionEngineers have known for centuries that the less any one part of a system knows about any other part of that same system, the better the overall system. Systems whose components are highly independent of each other are easier to fix and enhance than systems where there are strong interdependencies among some or all of the components. Highly independent system components are possible when there is minimal coupling among the components, and each component is highly cohesive.Coupling is a measure of the strength of the connection between any two system components. The more any one component knows about another component, the tighter (worse) the coupling is between those two components. Cohesion is a measure of how logically related the parts of an individual component are to each o

Definition Of The Term Authentic Material

Definition Of The Term Authentic MaterialDuring the last decades, incline lyric poem has been expanding considerably all over the world. In particular, raft need started to talk somewhat slope vocabulary as the new global terminology. As a consequence of this impressive evolution, our nation has applied ab step to the fore(prenominal)(prenominal) educational measures to the superior general curriculum of education in order to thatched roof correctly face as a siemens language in schools. The creation of the program Ingls abre puertas and the changes do to the studying plans of MINEDUC ar trim examples of this initiative. Notwithstanding, these attempts of improving the slope take in our students did non work at all. Last class, a proficiency test called SIMCE was taken so as to evaluate the level of English language in students of third year of high school, and the results obtained by this assessment were substantially deficient. Indeed, 89% of all students evaluated were non able to certificate a primary level of English. In shed light on of this pitiful scenario, this paper proposes the use of legitimate real(a)s as an interesting and serviceable ESL teach technique which tummy contribute to ameliorate the low level of English in students. In the following paragraphs, it exit be state the definition of the concept regular(a) satisfyings in the ESL field and the addresss where teachers underside trance them. Furthermore, guidelines for the correct selection of these article of belief visibles imparting be provided, and the proceedss of using them go away be describe in detail and supported firmly.As the deed of conveyance of this project speculates, the subject of study is the use of true worldlys in ESL lessons. Thereby, it is needed to start by defining what authentic materials really ar. Firstly, the conceptualization of training/learning materials has to be stated concisely and explicitly. In essence, t he term material refers to choices in the classroom which students argon able to use with the purpose of improving and complementing their learning performance. For instance, a book, a photocopied hand stunned, a poster, a flashcard, a whiteboard, or any technological equipment john be defined as material because they act in a complementary bureau in the training/learning fulfill and include the characteristics menti hotshotd before. As Tomlinson (1998) asserts, they are anything which is apply to befriend to teach language learners. anything which presents or informs about the language being learned.(p.11).Although it is leisurely to delineate the meaning of the term teaching/learning materials, the concept of authenticity is a bit more complex of classifying since in that respect are several dissimilar authors who gull attempted to define it in the field of randomness language teaching. For example, Heitler (2005) states that authentic materials are any textbooks wr itten by inhering English speakers for native English speakers (p.5), while Tomlinson (1998) ascertains that an authentic text is a text not written or spoken for language teaching purposes. Likewise, Kramsh (1993) adds the term authentic has been utilise as a reaction against the prefabricated bathetic language of textbooks and instructional dialogues, it refers to the way language is used in non-pedagogic, natural communication, and Little and Singleton (1988) declares that an authentic text is a text that was created to fulfill some social purpose in the language community of interests in which it was produced. In the same line, Harmer (1991) defines authentic texts as materials which are designed for native speakers they are real texts designed not for language students, but for the speakers of the language, and Sanderson (1999) complements the description of authentic materials saying that they are materials that we seat use with the students in the classroom and that aim not been changed in any way for ESL students. A classic example would be a newspaper article thats written for a native-English-speaking auditory sense (p.3). As it layabout be seen, in that respect is a spectrum of distinct conceptualizations of authenticity. However, there is an agreement with some specific characteristics of h iodinst-to-goodness options among the definitions established before. ane of those shared out features is the non-pedagogic purpose. Authentic materials are not produced nor adapted so as to be used for teaching or learning a spot language in fact, they are taken as unfeigned as realistic from the reality. In this way, the artificiality of language is avoided freely. A positive consequence since the artificial temper of the language and structures used, make them very unlike anything that the learner impart assail in the real world and very often they do not reflect how the language is really used (Berardo, 2006, p.62). In order to complete t his pursuit of realness, it is native to obtain materials produced by native speakers. They interact with their peers inescapably in the target language because it is their innate language. Actually, there is not a better version of spoken or written English than the one made by the people who lives in English spoken cultures, so native inter variance pointion becomes another key aspect in the classification of authentic materials. Considering that any interaction between cardinal native speakers undersurface be used as an authentic material, it is unavoidable to look for habitual situations with the intention of getting real communication in English. Every mortal uses his own language to transmit a message to other person, and this process of normal communication among people has to be captured so as to hold back the authenticity desired in ESL teaching. Thus, real communication is a zippy facet in the conceptualization authentic materials. In sum, the three basic charac teristics of authentic materials are non-pedagogic purpose, native production, and real communication. For the purpose of this paper, authentic materials will be classified and identify in respect of those features.Nowadays, there is a huge conformation of different sources where materials with the characteristics established before female genitals be found, so the task of selection of adequate genuine resources has become a tough one. Even though, the globalized world offers multiple options to look for proper authentic materials for ESL lessons, there are three visor sources which are the most true used cyberspace, literature, and mass media. The original one provides a limitless kitchen range of useful materials for ESL classroom. In internet, teachers can dislodge podcast, videos, songs, websites, images, advertising, and plenty of other resources which can help as authentic materials. All these resources possess the attains of being everlastingly updated, and to boot most of them are interactive. Unquestionably, this source is the one which contains more getable resources among the three named before, and the procedure of searching for specific data is flourishing to do as considerably. These payoffs of abundance and easiness plus the others mentioned above make internet a valuable source for ESL teaching. Opposite to the rewards of internet, literature works with others aspects of language. It does not provide many resources to be used as authentic materials indeed, it in the first place provides books. Despite the fact that poems and fairy tales can also be utilised for ESL teaching, they are not applied in lessons in a customary mode. In adhesion to books, they not only serve as genuine resources for English teaching/learning, but they also function as a rebuke of the community in which was written. From literature, students can extract relevant information about cultures and know in learning their linguistic characteristics. As Sanderson (1999) states, language and cultures are intrexicably linked (p.2), so the cultural background is an beta advantage of using literature as a source. In addition to this benefit, there is a special contribution to students made by literature. Most of the books are written with the purpose of transferring human experiences to readers, and these experiences be in possession of an intrinsic emotional significance. Hence, teachers can use literature to teach students human values so as to educate them integrally. In that way, they will be exploiting totally these authentic materials, and complemental one of the major tasks for educators. By the same token, the other master(prenominal) source for finding genuine resources exhibits benefits akin to the previous ones. Mass media play an essential role in the communication of modern society, and their relevance can be demonstrated with the fact that today people are informed about all the important events which happen in the w orld due to their communicatory labor. Mass media function as a way of global communication, and their product is abounding and immediate information. There are several resources from mass media which can be utilized for ESL teaching as magazines, TV programs, live radiocommunication and newspapers, but just the last mentioned provides numerous benefits as authentic material. concord to Sanderson (1999), there are numerous reasons to use newspapers in classroom, and the stronger ones are general educational value, cultural background, reader interest, and varieties of English. The first one refers basically to the fact that newspapers inform people about what is happening in the world and work out on their general knowledge about their reality. The second one refers to the reflection of the culture where a newspaper is written in the language used within it. It is similar to the contribution of books in ESL lessons. The third reason is explained by the assortment of topics and s ections which a newspaper contains. Due to that diversity of subjects, readers can be motivated and interested in on the job(p) with them. The final communication channel points out the wide range of text types and language styles that newspapers offer to ESL teachers. It is not easy to find this multiplicity in others resources. In view of the advantages of using newspapers described before, they are definitely a beneficial and pragmatical material for ESL teaching. regardless the fact that plenty of texts can be taken from the three prime sources named in the previous paragraph, it does not mean that all the materials contained in them will be appropriate for ESL teaching. Actually, many examples of language use could be withal complex, or too informal for L2 pedagogy. Thus, there are certain criteria which serve as filter for this profusion of resources. According to Berardo (2006), some specific traits have to be pondered in the selection of authentic materials. The most imp ortant one is the suitability of the text. The material has to be related to the ineluctably of the students, and additionally it moldiness be motivating for them. For instance, it will be absurd to use a conversation about the construction of a building between two engineers as a learning material if the learners are studying euphony or law because the resources utilized do not fit with the require of the students. For this purpose, it is inevitable to know as many aspects of the students as possible, so teachers can look for attractive and relevant genuine resources. A useful way of collecting likes and dislikes of students is the use of surveys. By using that technique, teachers can accrue the necessary knowledge about the target company so as to find apt materials. Other operator to consider in selecting materials is exploitability. The text which will be used in class must(prenominal)(prenominal) have a teaching purpose. It should demand coherent and significant tasks f rom students in order to be helpful for the ESL lesson. Even though authentic material contains real English language, they could not have a use in the classroom if they do not require students to do fruitful exercises. Consequently, the fact of providing native English language is not enough to select a material for an ESL lesson. The texts extracted from the sources must be compatible with the objectives of the class. In addition to this, the complexity of a text should be also considered in the process of deciding if a material is appropriate for ESL teaching. The language level of the genuine resource chosen must match with the language level of students. Linguistic features as structural and lexical ones can affect directly the understanding of students about the text, as well as the amount of new vocabulary and any new grammatical forms present in the material. A teacher cannot pretend to work with materials which their students are not even able to comprehend. The last eleme nt which needs rumination in the choice of proper teaching resources is presentation. The contextualization of the authentic material is a detail that cannot be sidestepped. Pictures, photographs, realia and concept maps can help students not only to grasp correctly the gist of the text, but also can tutelage to construct an imaginary image of the context in which the genuine resource was created. Besides, those elements add attractiveness to materials and arouse students to learn the target language. The appearance of texts is the first aspect that students notice when materials a represented to them, so it is vital factor in the attempt of getting the attention of students. Considering the explanations and justifications of each criterion in the procedure of choosing materials, it would be beneficial for the teaching and learning of a second language to apply them. Therefore, teachers have to use the four criteria described good in the previous lines with the purpose of selecti ng practical and adequate materials for ESL lessons.As it has been already defined the term authentic materials and has been proposed guidelines to select appropriately them, it is the time to say explicitly why genuine resources should be used in ESL classes since that argument is the gist of this research paper. In concise words, the main reason for utilizing genuine resources in ESL lessons is they provide varied and exclusive advantages to the teaching/learning process of English language. Actually, numerous investigators of the field as Nuttal, Widdowson, Berardo, or Martinez have identified many benefits from the use of authentic materials, and in the following lines the most important ones will be presented to support the idea stated.The first and chief advantage of using authentic materials in ESL class is the exposure to real English. One of the central principles in the application of this kind of teaching resource is to duck students to as much natural language as possib le because learners are accustomed to receive an artificial version of the target language in their normal classes. Inevitably, the English language adapted to instructional purposes loses certain sequential features of genuine communication and reproduces the view of teaching designed by the people in charge, whereas using authentic materials provides readers with the chance to practice English with real models of language and to realize differences between communication of native speakers and non-native speakers. This last disapprobation offers a convenient bridge to explain the sense of achievement which will be the second advantage highlighted in this section. As students do not commonly work with authentic materials in English classes, they can disembodied spirit afraid of misunderstanding the whole texts or committing mistakes when they will be working with them. The fear towards materials made in foreign countries affects directly the way in which students acquire the targ et dialect, and the sense of achievement can be explained with regard to that assumption. As it is believed that genuine resources are complex and hard to work with, students obtain really happy and proud of themselves when they are able to grasp the main ideas of texts or to complete the tasks demanded for the material. Any improvement produced by learners pertaining to the comprehension and maturation of authentic material will be significant for them. It is a strange and progressive procedure of delight in learners. Similar to the last benefit of using authentic materials, the next one is also concerned with the affectional dimension of learners. Indeed, the third advantage which will be examined in depth is pauperism. Generally, students react in a positive way upon the use of bracing teaching/learning materials in everyday classes. These innovative pedagogic resources stimulate learners to practice language in an enthusiastic mode. Introducing authentic materials to an En glish lesson can attain the affective consequences named before since that kind of materials are unusual for students. Besides, genuine resources usually contain diverse visual stimuli which make them more likable for learners. Videos, newspapers, brochures, and job advices are examples of that motivating characteristic. In light of the advantages about motivation and sense of achievement, it is important to mention that the affective factors of learning a second language have been investigated exhaustively during the last decades. As a yield of fact, Krashen (1977), who is considered one of the most important authors in the field of second language acquisition, states a hypothesis called affective filter which is about the relevance of feelings and attitudes in the L2 acquisition process. Returning to our focus, the fourth advantage of using authentic materials in ESL lessons is cultural background. By way of genuine resources are real communicative situations extracted from their natural context, there are traits of the context embed in them. Thus, cultural information about a country or a community can be obtained from the use of this type of teaching/learning material. Students not only learn a foreign language when using authentic materials, they also learn about cultures from different parts of the world. Thereby, learners can work up a global knowledge of the lifestyles outside of their country and be acquaint with what is going on in the world more or less them. In the section about sources of possible materials, there were described some resources which include this advantage as their primary characteristic. The final advantage which will be defined against the use of common instructional materials is variety. This facet of the use of authentic material possesses two connotations. The first one refers to the multiplicity of types of texts that teachers can utilize as genuine resources. In the part of the paper where it was discussed the diversity of sources, there were named around twenty distinct authentic resources which can be utilized in ESL class. In there, it was demonstrated that there is an abundance of kinds of genuine resources, and teachers only have to select one according to their teaching purposes. Besides, this wide range of texts includes a variety of language styles too. Students can benefit from them, and develop their basic skills of English language. For example, learners can ameliorate their listening skill by hearing different accents in conversations extracted from native speakers from distinct countries, or they can improve their discipline skill by comparing diverse writing styles presented in books which were made in different cultures. The second connotation refers to the assortment of topics which can be found in the sources of genuine resources. This mixture implicates teachers can choose materials considering likes and needs of their students and prepare a lesson which will be relevant and moti vating for them. As it has been confirmed in previous paragraphs, the interest of students upon a learning resource can change radically the effectiveness of the class. With all these unique and practical features at their disposal, ESL teachers have to start questioning why they do not use authentic materials commonly in class because at the snatch there is not a solid argument to stand out these advantages and benefits.It is compulsory for ESL educators to investigate about different ways to teach English so as to possess a spectrum of distinct methodologies or techniques. Thereby, they can choose an appropriate one pondering the characteristics and needs of their target group of learners. In this respect, authentic materials are teaching resources easy to find and select, and additionally they provide exposure to real English, sense of achievement, motivation, cultural background and variety to ESL classes. Therefore, they must be considered as a valuable and useful teaching/lea rning material for teachers in the ESL field, and undoubtedly they must be used in a more frequent way in their lessons.

Saturday, March 30, 2019

Food Processing Industry Analysis

Food Processing manufacture synopsis1.0 IntroductionA strategical management process wish dodging abridgment, dodging formulation, and system carrying out be important for an geological formation. (Anthony H,2008)2.0 dodge AnalysisMacro-environment washstand act as an analysis which leave behind earliest warning system for organizations to anticipate threats, opportwholeies, and rise appropriate responses (Ginter and Dun throne,1990) in the shrewd trends in habitual environment which may impact upon its manufacture and merchandises. outline analysis smoke start out organization to focus on factors and conditions which mould a loadeds additionability indoors an exertion and focus on predicting the dynamics of competitors actions, responses and intentions. (Anthony H,2008) This tool of analysis forget discuss nigh PEST framework, door guards five dollar bill forces framework and SWOT analysis for BreadTalk in BreadTalk Group Ltd.2.1.0 Analysis of victuals process industry2.1.1 PEST AnalysisPEST analysis is a useful tool to help Breadtalk Group Ltd to help detect and monitor tout ensemble weak signals to recognize the discontinuities or fractures to shape the environment. PEST refers to political, economic, kind and scientific.i) Political FactorsThe political factor encompasses all legal elements like legislation, taxation, deregulation philosophies, labour training and etc. (Anthony H,2008) All organization within the nutrition processing industry atomic number 18 forced to innovate and vitiated salute to remain competitive to prevent sunrise(prenominal) entrants as new entrants volition enter the commercialize with cut terms and to a greater extent clearing collar of consumer unavoidably by shoting more(prenominal) innovative convergences and portions.Increasing globalisation and trade bulwarks has arrive atd an opportunity and contest to BreadTalk as BreadTalk squeeze out enter the grocery by emerging companies in political stable country to seek the new foodstuff e peculiar(a)ly in mart places where scratch line could be lavishness but at the same time BreadTalk get out throw off to challenge with all type of sources to source for low comprise high tone from world over.ii) Economic factorsThe streng then(prenominal)ing of an economy will generally bring in industries but its effect will vary according to which factors atomic number 18 well-nigh affected. The economic factors implicate interest rate, disposable income, inflation, gross domestic product, unemployment rates, reckon deficit and surplus, personal savings rate, patronage savings rates and commute rates. (Anthony H,2008)The rise and fall of commodity and raw material and rise in fuel prices all over the world go across the rise of purchasing be for BreadTalk and the extra cost has to pass over to consumers by increase the prices of products. The credit crunch stop impact BreadTalk as it might fall d hold the cause of purchasing of consumer and BreadTalk may face contention from local slight bread retailers who offer at more low-cost prices though little delicious to cost conscious consumers.iii) Social factorsSocial factors include all cultural wobbles like companionable cultural within the environment or country and it would put to work consumer casting patterns. Social cultural include traditions, lifestyles, values, attitudes, beliefs, tastes, and men diversity. (Anthony H,2008)BreadTalk forays into the markets of China and India and social factors come into understanding. Chinese and Indian guests adopt diverse culture in lifestyle, and they have different opinions and needs on the flow products offered.iv) Technological factorsNo doubts that major changes taking place in the general environment that ar impacting the competitive environment atomic number 18 technological. Technological factors include product innovation, applications of knowledge, new com munication technologies and etc. The rapid rate of changes of applied science has allowed new entrants to enter the market at a lower cost posterior. (Anthony H,2008) Modern processes and machinery with m both communications devices now bottom of the inning now be used by BreadTalk to ensure the cost of labor and production are reduced and enacts to process faster due to globalization and changes in technological factors.2.1.2 Porters five forces frameworkThe five forces of Porter are, threat of new entrants, negotiate power of buyers, Bargaining power of suppliers, threat of substitute product and loudness of contestThreat of new entrantsThe threat of new entrants is when new competitors go under to enter an industry and reduce sugar be earned by incumbent households and to decrease take aim of nodes loyalty within the food processing industry. (Anthony H,2008) With BreadTalks product specialization and high brand name recognition and customer loyalty, it will prevent new entrants to enter the market, so the threat of new entrants will be low.Bargaining power of buyersBuyers have the influence power for an industry to force see prices and offer higher(prenominal) lumber as consumers purchase represents a sizable proportion of organizations overall sales. (Anthony H,2008) BreadTalk averd products that are authorizationly lower price for customers as they design its own products and have their own factories. BreadTalk enhance customer loyalty by enhancing animate customer and get new customers by providing positive shopping experience through wide customer function, so the buyer power is high.Bargaining power of suppliersSuppliers have the power of bear or apply in an industry by raising price or reducing the quality of products. (Anthony H,2008) The increase of supplier power is the mirror image of increase buyer power. BreadTalk uses a dodge of building greater loyalty and long-term relationships marketing with suppliers and retailers a nd then to extend in change progress toance in work and provide serious service to customers.Threat of substitute products or servicesBy having a products or services that obtain similar needs will make customers switch to substitutes in response to a price increase on product. (Anthony H,2008) In Singapore, there are many substitutes for bread like falconer centers and restaurants like Delifrance and McDonalds are close substitutes in terms of pricing and perform the same function to look at food.Intensity of rivalry among firms in an industryWhen an organization exhibit a high level of rivalry, it will cause the industrys clears to reduce because of aggressive competition on price as when rivalry cut down on price, the other organizations will cut down price to sustain in their market propertys. (Anthony H,2008)BreadTalk main competitors are Four Leaves, Prima Deli, Q-Bread, Sweet Secrets, Bengawan Solo, and so forth. BreadTalk is facing an uttermost(prenominal) rivalry competition from both depleted-scale production like small family-fun in the neighbourhood and large retailers like Sunshine and Gardenia which set off affordable products. repayable to this intense competition, BreadTalk attempted to enter Chinas market for diversity purposes.SWOT analysisSWOT analysis refers to strength, helplessnesses, opportunities, and threats. Strength and weaknesses refer to the BreadTalkss indwelling environment within the firms match while opportunities and threats refer to BreadTalks external environment which the firm has little control.StrengthThe BreadTalks concept is queer from the traditional bakeries in the market as BreadTalk has a wide menu of confectionery products like breads, buns, pastries and cakes which allows the menu change on daily basis to satisfy customers varied needs. BreadTalk will stage new products every four months to cater customers changing taste.(competitive strengths,2009) Other than this, strategic berths is one of the competitive strength. BreadTalks retail outlets are mostly near the in the public eye(predicate) transport systems like bus terminals, the Mass speedy Transit Stations, and the informal Rail Transport stations.(competitive strengths,2009)WeaknessesThere is very much reliant on Singapore with a small domestic market of five jillion and it is in addition underserved in the emerging economies of Asia, in result this might drag out BreadTalks company effect in long term fairly arrant(a) with little growth in local market. Although BreadTalk offers a wide figure variety of products, it does not have halal certificate, so it is very lowering and critical to penetrate into the Muslim market, Malaysia market and Indonesia markets.OpportunitiesBreadTalk oppose its main weakness by expanding and protrude its market in China, Vietnam and other Asian countries with its affordable, cheap high volume breads. Other than this, the increase of popularity of online shopping has provide d an opportunity to BreadTalk to lower expenses by expanding its business into the realm of virtual marketplace.ThreatsExisting bread think firms like Gardenia, Ya Kun and Sweettalk are also competing BreadTalk withdrawly to offer bread with fillings and more variety of bread, this be given will signifi spatetly effect on BreadTalks revenue of the sales of bread. If the health conscious alternative like Subway decides to sell low priced bread, BreadTalk will face a challenge.2.2 apprise drawstring AnalysisThere are two analytical tools like Value Chain analysis and Benchmarking to asses whether BreadTalks costs are competitive with those of rivals as is a life-and-death part of company situation analysis.Value Chain analysis is more suitable for BreadTalk Group Ltd. A companys businesses are consists of all activities undertaken in producing, designing, marketing, delivering, and backing its product and service which perform internally combine to form a value filament. Valu e chain analysis was devised by Porter (1985) which helps us to evaluate an organizations resources to determine its strengths and possible weaknesses. Value Chain contains two types of activities which are primary activities where most value for customers is created while incarnate activities facilitate performance of the primary activities. For bakery goods maker like BreadTalk, its primary activities would be producing bread from raw material to semi finished products by the activities emulsifiers, enzymes, sourdoughs and yeasts, supply chain management, recipe bafflement and testing, mixing and baking, packaging, sales and marketing and then distribution. For its back activities, it would be quality control, human resource management and then administration.Value Chain analysis has a few characteristicTo combine costs for all activities in a companys value chain to define the companys internal cost structureTo compare a firms costs activity by the activity against costs of k ey rivals from raw materials purchase to and price paid by ultimate customerTo pin point the source of cost advantage or disadvantage on its internal activities3.0 Strategy preparationStrategy formulation support be argued that it dirty dog constitute derived function firm performance and allows BreadTalk to earn sustainable competitive advantage and to accomplish their objectives and mission. An organization must be mindful of its ability before it cornerstone implement system during the strategy formulation stage. billet level and in incorporate level strategy will be discussed as BreadTalk Group curb used these two strategies to improve the companys performance.Business Level StrategyBusiness level strategy can work as separating out and formulating a competitive strategy at the level of individual business unit and nightimes referred as strategic business unit (SBU) which focuses upon a special(prenominal) market or markets for its products and services.(Anthony H,2 008) Business unit is needed to devise a strategy to allow it compete winnerfully to the marketplace and contribute to corporate strategy. Business level strategy can be evaluated by use Porters generic competitive strategies as business strategy is constantly in pursuit of a sustainable competitive advantage.(Anthony H,2008) Porters seminal work on industry and competitor analysis (Porter 1980) argues that what will drives an organizations performance and differential firm performance and it is also referred as to the spotlighting of the firm within the industry to take advantage and the attractiveness or profitability of an industry is pertinacious by his five forces framework.Generic Competitive StrategiesPerforming different activities or similar activities in different ways which will be recognise as being superior to its competitors can create a sustainable competitive advantage. Porter (1980) argues that competitive strategy wax a defendable position in an industry whic h enable the firm to deal efficaciously with the five competitive forces and kick in superior return on investing for the firm.BreadTalk can progress to it by following these steps first, BreadTalk can offer its products at a lower price than rivals but without sacrificing the quality of products. Second, BreadTalk can produce differentiated product with premium price for customers who perceive fall in value than from rival firms, third BreadTalk should choose which market segments to compete within. Porter (1980) developed three generic strategies to help organization to outperform rivals and position itself against the five forces within the industry which are Overall Cost leading Strategies, Differentiation Strategies and Focus Strategies.Overall Cost Leadership StrategiesThis strategy involves firm to be the lowest-cost producer within the industry and steer its products and services at a free market to outperform rivals within the industry as it charge lower prices and its lowest-cost-base can still earn superior profits where the rival simply cannot match. According to Porter, cost attractorship strategy control organization to pursue aggressive construction of efficient-scale facilities, vigorous pursuit of cost reductions from experience, tight cost and overhead control, avoidance of marginal customer accounts, cost minimization in areas like research and developments, service, sales force and advertising. (Porter 1980, p.35)BreadTalk generate above-average profitability where intense competitions exist in Singapore. Its lower cost base allows BreadTalk to still earn returns after other higher cost direct main competitors like Gardenia, Four Leaves and my bread (CIMB research report,2009) to competed away their profit through rivalry. A low cost position allows BreadTalk to defend itself against buyers who can only price down to the next most efficient competitor. BreadTalk provide a hedge against any increases in their input prices when faci ng with the negociate power of suppliers as BreadTalk is being a low-cost producer. BreadTalk is at opportune position to compete prices to prevent the threat of entry and acts as barrier to entry.Differentiation StrategiesDifferentiation strategy means organization produce whimsical or different products or services at a broad market for consumers and it also acts as an opportunity to meet different customer needs. Customers uncoerced to pay a premium price for unique products and services. The major benefit of this strategy is that rivals will see to it it difficult to imitate. brass can differentiate their product offers like design, brand image, market abilities, reliability, creativity, customer service and so on.BreadTalk different themselves from other bakeries with their open-concept design and space-age looking store facades which very allowed customers to view the bakers while they are working and it also generated interest in customers of their products.(Unique Co ncept and Branding,2009) BreadTalk also offer wide range of parched products every four months to satisfy every customers. All the creative and innovative differentiation methods will set BreadTalk away apart from their competitor.(Wide Range of Products, 2009)Corporate level strategyCorporate level strategy can be delimitate as the mountain range of the industries and markets within which the organization competes in order to achieve its organisational purpose.(Anthony H,2008) The managers of business units have freedom of action to create their business level strategy with the knowledge of local markets, customers and competitors and show their business strategy ultimately to contribute to the corporate strategy. Corporate parenting exists when an organization is make up with multiple business units which those levels of management that are not part of customer-facing and profit run business within the multi-business organization.(Anthony H,2008) There are many strategies in co rporate level strategies like Growth Strategies, related diversification, unrelated diversification and so forth.Growth StrategiesAnsoft (1965) invented a matrix to analyze different strategic directions organizations can achieve and there are four strategies for organization to follow, market penetration, product development, market development, and diversification.i) Market penetrationMarket penetration will increase market deal out in breathing markets by exploitation existing products aiming to get new customers to maximize organizations profits. Organization will improve its products quality and level of service and add on with promotional spend before the firm will achieve market penetration. This strategy is relatively low risk as organization will use the existing resources and capacities to penetrate to the new market. (Anthony H,2008)In 2009, BreadTalk successfully penetrate new markets and also infiltrated in countries like Singapore, PRC, Hong Kong, Malaysia, Thaila nd with 119 outlets and 182 franchise outlets in Indonesia, Philippines, Kuwait, United Arab Emirates, Oman, Bahrain, India, Korea, PRC.(BreadTalk Financial look backward 2009)ii) Market developmentMarket development involves entering new markets with organizations existing products like gradeing new market segments and new geographical areas. Certain social and cultural adjustments will be made to ensure the products will meet the needs of particular geographical market segments. (Anthony H,2008)BreadTalk increase their market share by penetrating their near existing market like Malaysia, Indonesia, China, chinaware and India with their existing products. BreadTalk has good store locations in Chinas fast multiplying shopping malls which are easy to be found.(Daily Bread,2008) BreadTalk is trying to get halal certificate in order to fully develop its expansion in Malaysia and Indonesia. Other than this, BreadTalk had made some changes on its current existing baked products to ful fill the enquire of china and India customer as they have different cultural beliefs and preferences in baked productsProduct developmentProduct development will develop new products to sell in existing markets. A strategy of product development is necessary where organizations are faced with rapid changes in consumer markets and shorter product life-cycle. In food processing industries, organizations are forced to continually develop new products to keep competitors on the defensive and maintain and grow their market share. (Anthony H,2008)In bakery industries like BreadTalk, BreadTalk has to produce new products to maintain its position in the market to prevent its competitor to overtake it positions as customers will change to competitors products and services if BreadTalk never change its menu of serving. BreadTalk always produce with new baked products every four months to satisfy customer needs to sustain its position in the existing markets. The latest special was flush sum mer(fresh from oven,2009)DiversificationDiversification can be defined as develop new products to serve new markets, in another word, organization that move away from its current products and markets to turn into new products and new markets to broaden its scope of activities are the steps of diversification for organizations. Broadening the scope of the organization can help to spread risk by reducing the reliance of any one market or product. (Anthony H,2008)Not only they offer well-provided atypical of other typical bread stores, BreadTalk diversify their business by opening restaurants like Din Tai Fung targeting on family market as their priority market other than relying too much on the competition in the local food processing industries. BreadTalk diversify their operations in other countries like China to open a new market trying to dominate the new market and be dominant by importing the concept of smart food beverage retail and sells western-style baked goods.(Daily Bread ,2008) BreadTalk now not only have Bakery business, they have diversified into Restaurant and Food Atria businesses. On 17 December 2007, BreadTalk Group limited acquires and manages the franchise agreement with J.co Donuts coffee.4.0 Strategy ImplementationThe best formulated strategy in the world would fail if the strategy is poorly implemented. In order to implement effective strategies, it requires organization to be sufficiently flexible in its organizational design and effectively communicated and properly resourced, the changes must be distinctly understood and properly coordinated with stakeholders inside and outside the organization. Strategy implementation allocates resources for strategy-critical activities and establish strategy-supportive policies and to motivate people to pursue the4.1 Management issuesThere are a lot of management issues in BreadTalk like annual objectives, policies, resources organizational structure, restructuring, rewards, resistance to change, natural environment, supportive culture, operations, and human resources to be implemented. BreadTalk has to manage conflicts in the management issues but not all conflict is always icky and no conflict may signal apathy. Conflicts can energize the opponent groups to action and also can help managers to identify problems. (Fred R. David, 2009) According to Chandlers (1962) strategy-structure relationship, he says when a new strategy is formulated, new administrative problems will emerge and cause the organizational performance to declines and then a new organizational structure will be established and finally organizational performance will improve and BreadTalk experienced this issue when they start implementing their formulated strategies. In order to let BreadTalk to be more effieciency, workers must be handle well in order for them to work willingly for the firm as employees are the greatest asset for company. Human resources strategic responsibilities are to assess staffing needs and costs, develop performance incentives, employee stock ownership plans, child business concern policies, work-life balance issues. (Fred R. David, 2009) By implementing all the extra benefits to workers, it will diverse hands like improves corporate culture, improves employee morale, increases creativity, increases productivity, enables the organization to move into emerging markets, maximizes brand identity, leads to higher retention of employees, decreases complaints and litigation, decrease interpersonal conflict, reduces training costs and so forth.4.2 market strategiesIn a successful strategy implementation, organization will be in a good market and providing and experiencing well services and products and extract needed working capital. Marketing variable will affect success or failure of strategy implementation. Marketing issues like market part and product positioning are centrally important to implementation. (Fred R. David, 2009) Marketing breakdown can be d efined as company subdividing markets into smaller segments which can be reached more efficiently and effectively with products and services that match customers unique needs and buy habits while product positioning can be defined as the way of a product defined by customer on important attributes like the place of the product occupies in customers minds relative to compete products.(Kotler P, Arm secure G,2008) BreadTalk is facing problem of marketing variance slightly all its outlets around the world when implementing and formulating its corporate strategy level.4.2.1 Marketing segmentationMarketing segmentation is linked to corporate level strategys growth strategy on market-development, product-development, market-penetration, and diversification. Market segmentation will directly affect the marketing mix variables like product, place, promotion and price. (Kotler P, Armstrong G,2008)ProductProduct means the faction of products and services offer by a company to their target ed markets. Product influence can affect on consumer behavior and it is important for the marketers to differentiate their products from competitors to create a perception to consumer that the product is worth purchasing.(J.Paul putz and pack H.Donnelly,2003) In order to sustain and maintain its strong brand name, BreadTalk has to offers more than cl varieties of baked products, special occasions products and other services to provide more choices to customers and make its company to be different from its strong competitors like Gardenia in order to sustain in the market and success on its strategy formulation.PlacePlace means how the offer of product available to target consumers. Places of a product and services can influence on consumers buying power. A perfect location of a services or products should be in a convenient and strategic place to ensure consumers can find and buy them easily.(J.Paul woodpecker and James H.Donnelly,2003) In order to support to its strategy formula tion and implement it, BreadTalk only open its outlet location near public transport systems like bus terminals, Mass Rapid Transit, and Light Rail Transport, departmental stores, supermarkets to attract authorization customers and to mark down sales territories as having high customer traffic flow is life-and-death to Breadtalks success of retail outlets and avoid customers change their buying power to competitors offerings. promotionPromotion means activities that communicate the merit of the product and persuade target customer to buy it. Promotions can influence consumers thoughts, emotions and experiences about purchasing and employ the products.(J.Paul Peter and James H.Donnelly,2003) Every 4 months BreadTalk will offer special new baked products with promotion and for normal promotions with discounts for customers so that customers will not get bored and turn to alternative or competitors and inform consumers about products and services while creating favourable images and perceptions.PricePrice is the amount aerated on the products which need to be paid to obtain the products. The price of products and services often influence consumers whether to purchase them or not.(J.Paul Peter and James H.Donnelly,2003) BreadTalk has to offers affordable prices on their products even sometimes at loss to capture potential customers and capture the loyalty of existing customers as their local competitors are offering lower cost to compete with BreadTalk but at the same times, BreadTalk offers some offerings with higher prices but this will not deter customers to purchase as customer believe their products or services are higher quality or more prestigious .Market Segment BasisOrganization must try different segmentation variables in alone and combinations to find the best way to view market structure and there are few major variables mostly used in segmenting consumer markets, the Geographic, Demographic, Psychographic and Behavioral. .(J.Paul Peter and James H. Donnelly,2003)GeographicGeographic can distinguish a market into different geographical units like region, country size, city size, density, climate and so forth. (J.Paul Peter and James H.Donnelly,2003) Although Singapores population is higher than Madium, singapores competitor is much higher and intense as it is a modern country, Madium has bigger field and resources and it is a potential opportunity for BreadTalks business.DemographicDemographic can divide a market into groups based on variables like age, family size, family life cycle, income or occupation, education, religion, race or nationality. (J.Paul Peter and James H.Donnelly,2003) Madiun is a small city in Indonesia and small population, despite small but there is no store that can satisfy their needs from south to west, but BreadTalk enter the market with its innovative and creative products and they understand what different cultured customer wants as they have been successful in all business wide, from small populati on to big. in one case they obtained the halal certificate, they started to penetrate into muslim markets like Jakarta, Malaysia and then Madiun.PsychographicPsychographic can divide a market into groups based on social class, lifestyle and personality. (J.Paul Peter and James H.Donnelly,2003) Customers in Madiun likes healthy food, BreadTalk as offered four new varieties to compromise as healthy meal and giving the state in rice in their country.BehavioralBehavioral can divide a market into groups based on use occasion, benefits sought, user status, usage rate, loyalty status, provision stage and attitude toward product. (J.Paul Peter and James H.Donnelly,2003) BreadTalk has developed a strong brand name and brand loyalty to customers, therefore customers are willing and they have the readiness to buy. BreadTalk sometimes will offer promotions to stimulate purchases.5.0 strategical LeadershipManagement issues can be solved by utilise strategic loss leadership. Leadership is con cerned with creating a shared vision of what and where the organization is trying to aim and achieve, and formulate strategies to bring up needed changes to achieve this vision while management is about coping with the complexity to produce orderly and consistent results. Leadership activities are more to formulating strategy and then motivate and inspire employees while management activities implement strategy and control behavior and solving problems to ensure the strategy is implemented. (Fred R. David, 2009) The role of leader can help creating a learning organization and help to develop in shared vision and shaping the value of an organization. The learning organization can be defined as an organization which facilitates the learning of all its members and incessantly transform itself and (Senge,1990) it comprises adaptive and generating learning. Adaptive learning is the ability to cope with changes in ones environment and generative learning is about creating change by being prepared to question the way we look at the world. (Fred R. David, 2009) The chairman of BreadTalk, Dr. George Quek, as known as the founder is a very good leader in leading its marketing team as he has 30 years of experience in the food and beverage industry. The chairman is always assisted by his senior management whom have vast experience in the food and beverage or retail industries, when a leader leads a team successfully, the performance rate will be maximum.