Friday, November 29, 2019

IT Industry Essays - Telecommunications Companies, Telephony

IT Industry There are many changes that occurred in the industrial organization of interexchange telecommunication services in the United States during the 1985-1995 period. Let's look at the general idea of Telecommunications. It is the two-way exchange of info in the form of voice or data messages between tow users at distinct geographic locations" (5, 7). The two-way exchange is now a numerous way exchange through the use of computers and the Internet. There are four important areas of the telecommunication industry in the United States. Technology plays a major role in telecommunications. Before technology, there was no such thing as telecommunications. During the ten year period there are some key advances in telecommunications due to technology. With growing technology, more companies want a piece of the action. There is a significant increase in long distance carriers and an increase in the size of these carriers. There is also a large influx in pricing and competition during this period. Another key factor in the success of the telecommunication industry is the regulations established for individual carriers and the industry as a whole. With the increasing size of the industry and the major technological advances, stricter regulations must be present to keep the structure of the industry. Lastly, there are some differences between local and long distance carriers that must be looked at to fully understand the industry. There is also a fifth major aspect that defines Telecommunications, that is the American Telephone &Telegraph Company (AT&T) and the history behind it. Technology is a key aspect in the growth of telecommunications. If one had to point to the single most important reason for the new competition in local telephone markets. It is the advance of technology. Digitalization has reduced barriers between voice telephone, data, and media services (9, 29). Microprocessors are the principal component of digital switches. So as their performance increases and their price falls, switching costs fall and scale and scope economies increase (9, 13). Scope economies mean that a few companies produce many services. The adoption of digital technology in all aspects of the network has improved performance and lowered costs. Digital transmission, whether over copper of fiber cables or over the airwaves, is cleaner and more secure due to more durable cables(9, 16). Technological advances such as fiber optics and wireless transmission have paved the way for competition in the local exchange. But, new technology alone could not bring competition to the local exchange (9, 10). It takes innovations in communications technology and new service offerings pressure both suppliers and industry regulators to change (9, 2). In 1984, there was a large growth in the size of the industry and of its respective business. Teleport offered competitive local business services in New York City (9, 9). Competition is met with aggressive responses, including price cuts and improved service offerings. The new competitiveness effected rates and offerings of local exchange carriers in years to come. In particular, the integration of local, long distance, cellular and cable services establishes the groundwork for offering innovative service packages at Bundled Rates (9, 11). Two factors are most important for the relative advantages of the various new competitors: The incremental costs of building local telephone networks and the pre-existing goodwill with potential subscribers (9, 37). There were gains and mistakes made by several competitive firms during this period. Instead of divesting itself, Ameritech proposed to interconnect with competitors and unbundled its network services selling services at nondiscriminatory cost-based rates (9, 11). They were trying to be competitive in a world of monopoly. In 1994, MCI decided on a strategy to build its own local networks in selected cities for selected customers. Problems struck when they could not reach households. It proved to be very expensive and MCI quietly scaled back its plans. MCI then decided to grow internally by creating its MCImetro division (9, 11). These firms were trying different approaches to compete with AT&T after the divesture. The cost wars during the period also had an affect on companies entering the market. Since average costs are everywhere declining, strong scale economies prevail. Scope economies occur when a single firm can provide an entire array of services more cheaply than a collection of firms who specialize in just a few of those services. Scope economies stem from the joint use of facilities by several services without substantial congestion problems. Costs of local exchange service is "sub additive" which requires the cost of a given level of local services when supplied by a single firm is less than when parceled out to two or more firms. If production

Monday, November 25, 2019

Science fiction Essays

Science fiction Essays Science fiction Essay Science fiction Essay Science fiction BY Pbhattl 23456 Scientifiction: With Great Power Comes Great Responsibility Going back to the past or even travelling into the future using time travel to alter ones present might be a thing in science fiction movies or books today but it is not an impossible thing to do sometime in the future. Ten years or two hundred years who knows but it will be a part of our lives. Scientifiction might be unrealistic in terms of the technology or mythical/supernatural characters used in them but it is not Just another fictional tale. Scientifiction not only gives inspiration to inventors and innovators, but also warns them about the dangers that might come upon the world due to the new invention/innovation. This insight raises the big question, Where should we draw the line while exploring a topic or technology? Snapping your fingers and having fire or waving your wand and having ready food was considered science fiction several years ago. But today we can do these things easily; not literally but we can flip a switch to turn on heat, press a button on the microwave and have food, and urn on the tap and have clean water. Scientifiction doesnt really give us new inventions and technology but they do give us new ideas or insight to things that could be possible with technological development and by exploring new fields. Today we have motorized vehicles, airplanes, and even spaceshuttles which were inspired in one way or the other from science fiction several years ago. Going to the moon and taking pictures of distant planets as well as galaxies were also possible due to the inspiration that scientists, engineers, and inventors got from science fiction books nd movies. Despite of the many benefits achieved from the development of technology, there are many problems or negative effects due to the newly developed technology. For example, cars are very useful to travel from one place to another but we are also polluting the environment due to the harmful gasses which are released into the atmosphere as a byproduct of combustion. Before people used to walk miles and mile to get some work done but today we feel lazy to even turn on the television without the remote control. Obesity and illnesses due to obesity are rising rapidly in individuals at a very young age. Today we depend on machines more than our instincts. Many of us also do not know how to cook food due to readily available frozen foods. Scientifiction movies and books inspire us for new inventions but also warn us about the dangers of these developments. In the science fiction story, The Ape Cycle by Clare Winger Harris, one of the apes says, Our plan must be kept from men as long as they seem to be our masters. even they must not know that they are ot until the time comes to kill them all. (Harris,331) The author is trying to warn us that our inventions could even cause the end of mankind if we do not think about what we are creating. It also suggests that we should not only look at the short term benefit but also look at the long term dangers. Scientifiction gives inspiration to inventors and innovators as well as warns them about the dangers due to the new invention/innovation. It makes u s think about the many important questions like, Where should we draw the line? Are we really helping the society?

Friday, November 22, 2019

Aspects of power in organisations Literature review

Aspects of power in organisations - Literature review Example Based on this context, it is evident that the consideration of organisational politics can offer a basis for challenging the existing paradigm (Sparks, Faragher & Cooper 2001, p. 503). This paper seeks to report the existing literature on power in the context of a noteworthy branch of organisation management, human resource management. The rationale of this paper is informed by the need to raise the profile of the politics of power in HRM. Literature Review The fundamental question that informs this literature review concerns what power has to do with HRM. Reading through HRM textbooks, it quickly becomes clear that power as an idea is rarely examined explicitly (Rigg & Trehan 2004, p. 157). Whenever the issue of power is tackled directly, it is mostly as a question of negotiating power between the organisation and its labour force, the responsibility of empowerment, or the power of organisational leaders to execute punishment or rewards (Ali 2012, p. 983). However, indirectly, power can be termed as an interesting topic in the HRM literature since it prompts the question of the status or influence of HRM as a critical function in organisations. In the context of HRM in organisations, power refers to the deliberate influence over the behaviours, emotions and beliefs of the workforce. However, according to Witt, Andrews & Kacmar (2000, p. 343) power is largely ubiquitous since without power (typified through influence) it is impossible to have cooperation and stability within the organisation. However, by and large, the execution of power often results in problems, which typically stem from the visions of people with power, as well as the way they use their power. Observations have been made regarding the growing significance of HRM in organisations in the last few decades. The human resource (HR) department has become the central figure of organisations, and the question of the influence and role of the HR department has come to the forefront (De Leede & Looise 2005, p. 115). Historical accounts have analysed the emergence of power among HR specialists in organisations, there is no empirical work specifically related to the application of power by HR specialists (Harley & Hardy 2004, p. 378). The ideal of organisations where the entire workforce works collaboratively toward a mutually acceptable goal is common in most HRM rhetoric. However, the reality is quite different since although teamwork is often regarded as one of the most significant organisational virtues, the workplace is often shrouded in demerits such as competition, antagonism and conflict. It is within this context that an in-depth appreciation of influence and power proves essential. All organisations are comprised of individuals with diverse tasks, personal interests and careers (Gotsis & Kortezi 2010, p. 499). According to Sparks, Faragher & Cooper (2001, p. 494) in order to be successful in getting things done, HR specialists need to appreciate the importance of their c apacity to exert influence on the organisation’s entire workforce. In the execution of their power, a vast majority of conventional HRM programs have taken on, whether knowingly or unknowingly, managerialist or functionalist perspectives. Managing typically encompasses the exertion of influence through the use of power. In the contemporary

Wednesday, November 20, 2019

Understanding Workflow Design Research Paper Example | Topics and Well Written Essays - 500 words

Understanding Workflow Design - Research Paper Example As a means to expound upon the process, this brief analysis will seek to three different concepts that were related in the workflow assessment of healthcare IT toolkit as well as seeking to summarize the article in question, â€Å"Developing a mentor program for our cardiovascular ICU†, and providing key ways that these techniques could be utilized within the given context. Firstly, with reference to the three techniques for workflow assessment, the ones that this student has selected for being the most pressing involve the following: determining system requirements, creating and maintaining checklists for work flow and completion, and discussion of systems operation with affected shareholders. With respect to the first and third steps, these act as a type of relay within which the director of change can help to categorize the process and make sure that it adequately addresses the needs of the component parts (Rose 127). All too often when change is initiated, regardless of context, it very often takes place at the very upper echelons of management with no forethought with regards to how that change will affect the individuals upon whom it relates. Secondly, with regards to implementing plans and change mechanisms, it is necessary to determine the overall system requirements and seeking to make the workflow match the given needs that are exemplified (R ouse 4). Lastly, writing down a checklist of goals and integrations helps to force the process to portray something that will take careful consideration of all facets that the workflow process will touch upon. As a means of implementing the aforementioned three components, the article that was reviewed, â€Å"Developing a Mentor Program for Our Cardiovascular ICU† helps to acquaint the reader with the needs of providing a paradigm shift in training for the cardiovascular ICU (Bredeger 112). In

Monday, November 18, 2019

Business plan for a restaurant Assignment Example | Topics and Well Written Essays - 2500 words

Business plan for a restaurant - Assignment Example This group of eight family run restaurants operating in northern California has been undergoing difficulties dealing with human resource issues. The operations manager doubles up as the human resource manager and embarks on a tedious process of physical inspection of the human resource requirements and problems of all the eight restaurants. Not only is this a time consuming and tiring process, the operations manager has also realized that it is costly and very inefficient. Therefore this plan presents a possible solution to the problem in the form of the implementation of an information system which will effectively aid the human resource manager with his operations thus allowing for efficiency and company growth. The restaurant industry is quite competitive with northern California being a haven for great restaurants. It is essential for one to cut a niche in the market and this can only be done if the various organizational resources are effectively managed. The replacement of the current manual system with an automated one will enable the company to manage its employees effectively allowing for good record handling, proper and easy scheduling, and effective communication within the organization. This will see an improvement in business processes which will culminate in the growth of the business reflected as higher profits. Introduction The implementation of an Information system is a vital part of business process transformation. For a business to succeed various steps must be taken to ensure that business process support and improvement is achieved. The use of a Human resource information system is a sure way of attaining this. A human resource information system will ensure that human resource functions are effectively managed by information technology hence creating an environment for profit making and business growth through efficient service provision and management. The human resource department is charged with the responsibility of payroll processing , employee recruitment and employee appraisals. These functions are increasingly becoming complex and thus require sufficient support. Automation of such a department, through the use of information technology, will ensure that the workload is sufficiently reduced and access to information is easy and quick. This business plan examines the effective role of implementing a human resource information system by performing a business analysis that will present the inefficiency of a manual system, and presenting a possible solution in the form of a human resource information system that can be implemented. Company Review The Castle Family Restaurants, a group of eight restaurants in northern California run by the Castle family, is a big employer of both part time and full time employees. It has employed more than 300 employees most of whom are on a part time basis as only 30% of these employees work on a full time basis. The operations manager usually has her hands full as she makes seve ral visits to all the restaurants managed by the group to perform human resource administrative duties such as employee recruitment, appraisals, payroll processing among other functions. This manual process of performing human resource functions is quite costly and very inefficient. Therefore there is a great need for improvement in order to eliminate the

Saturday, November 16, 2019

Literature Survey On Steganography

Literature Survey On Steganography In this chapter, the literature survey on the steganography and various network security mechanisms are described. Many existing algorithms for steganography since 1991 to 2009 are studied and presented in this literature survey. Numbers of web sites as well as research papers are referred on virtualization, ARP Spoofing, IDS Architectures. The description of the research papers referred pertaining to steganography and network security are given in the subsequent sections. The literature is presented in chronological order for these two areas separately. 2.2 Literature survey on steganography Bender et al. [6] in this paper, the authors describe the techniques of data hiding like low bit rate data hiding in detail. Johnson, N. and Jajodia S. [34] This article explores the different methods of steganography such as LSB, Masking and Filtering and also explains about different software tools present in the market for Steganography, such as Stego Dos, White Noise Storm, S-tool etc. Marvel et al. [38] It is proposed that (Spread Spectrum Image Steganography) SSIS is a blind scheme where the original image is not needed to extract the hidden information unless the receiver possesses the secret key to extract the secret message, otherwise it is virtually undetectable.Thus making this technique reliable and secure. Jessica Fridrich et al.[32] This paper proposes a highly accurate steganalysis technique which can even estimate the length of secret message embedded in LSB method. In this method, the test image is divided into groups of n consecutive or disjoint pixels. This method exploits the modified pixel values to determine the content of secret message. A discriminating function is applied on the group of pixels. This discriminating function determines the regularity or smoothness of pixels. Then a permutation function called flipping is applied on the pixel groups. By using discriminating function and flipping, Pixels groups are classified in to three categories, i.e Regular groups, Singular groups and Unused Groups. For a given mask, fraction of Regular groups Rm and fraction of singular groups Sm are calculated. Presence of noise in the image causes Rm to be greater than Sm. R. Chandramouli and N. Memon[49] It gives the analysis of various methods of LSB techniques for image steganography. Tseng, Y.C et al. [63] This paper presents a secure steganographic scheme which makes sure that if any modified bit in the cover image should be adjacent to another bit that has the same value as the formers new value. By this way the detection becomes extremely difficult. But for achieving this, data hiding space has to be reduced. Da-Chun Wu, and Wen-Hsiang Tsai [23] proposed a differencing steganographic method that uses the difference between two consecutive pixels in the same block to determine the number of secret bits to be stuffed. In this method a range table is used which ranges from 0-255. The difference value is subsequently adjusted to the difference in the same range to embed the secret bits, and the difference between the original difference value and the new one is shared between the two pixels. Extraction scheme in this method is quite simple and it do not requires cover image. Sorina Dumitrescu et al.[55] This paper proposes a new steganalysis technique to detect LSB steganography in digital signals such as image and audio. This technique is based on statistical analysis of sample pairs. By this technique the length of hidden message embedded via LSB steganography can be estimated with high precision. C.-C.Chang and H.-W. Tseng [9] this paper proposes a novel steganographic technique, which modifies the pixel values. This method does not replace the LSBs of pixel value directly, but changes the pixel value into another similar value. In a word, this steganographic method provides a large embedding capacity with little perceptual distortion. Mei-Yi Wu et al. [40] this paper presents a new iterative method of image steganography based on palette which reduces the Root Mean Square error between an original image and its corresponding stego-image. Based on a palette modification scheme, which can embed one message bit into each pixel in a palette-based image iteratively. The cost of removing an entry color in a palette and the profit of generating a new color to replace the old color are calculated. If the maximal profit exceeds the minimal cost, an entry color is replaced in iteration. C.-K. Chan and L.M. Cheng [11] this paper proposes LSB technique in which the secrete data is embedded in the Least Significant bits of the image pixel. Huaiqing wang and Shuozhong wang [29] Different techniques of steganography and steganalytic methods were discussed in detail in this paper. This paper focuses on LSB modification techniques, Masking techniques, Transformation domain techniques, Techniques incorporated in compression algorithms, and spread spectrum techniques. Then the important attributes of a steganographic system are presented, security, payload and robustness. This paper also presents various steganalytic methods such as, RS steganalysis, Chi-square test, Histogram analysis and universal blind detection. Xinpeng Zhang and Shuozhong Wang [65] this paper proposes the steganalysis of PVD method proposed by Wu and Tsai. This steganalysis is based on Histogram analysis. The zigzag scan of the image pixels produces a vector called Image Vector and the difference of every pair of pixels in this vector produces another vector called Substitute vector. An image from Substitute vector is built which is named as substitute image. Histogram of substitute image is constructed and analyzed. Andrew D. Ker [4] Detecting LSB matching steganography is quiet difficult compared to the LSB replacement steganography. In this paper Histogram characteristic function (HCF) is used for the detection of steganography in color images, but it cannot be used for gray scale images. Alvaro Martà ­n et al. [3] Authors have experimentally investigated three different steganographic algorithms. steg, MHPDM, and one of the algorithm used in S-tools. Jsteg embeds a message in the least significant bit of JPEG DCT coefficients. The MHPDM (Modified Histogram preserving Data Mapping) algorithm, which is developed from HPDM (Histogram Preserving Data Mapping), works by altering the least significant bit of a subset of the JPEG DCT coefficients of an image. Chin-Chen Chang et al. [15] this paper proposes two efficient steganographic methods for gray-level images by utilizing the run-length concept. The two methods embed bits of the secret data in each two-pixel block. In addition, the modular operation is applied in both methods to control image quality. The experimental results demonstrate that both methods in this study perform better than all previous methods, in terms of image quality and embedding capacity. Chin-Chen Chang and Tzu-Chuen Lu [13] the method proposed in this paper exploit the difference in the expansion of the pixels to conceal large amount of message data in a digital image. The payload capacity of the proposed scheme is higher than Tians scheme and Fridrichs scheme.In addition, the quality of the embedded image of the proposed scheme is even higher than those of the other schemes. Chin-Chen Chang and Tzu-Chuen Lu [14] SMVQ (Side Match Vector Quantization) exploits the correlations between the neighbouring blocks to predict the index of an input block that improves not only the block effect of VQ, but also the compression performance of VQ. Owing to the good compression performance and image quality, more concerns are given to SMVQ. Suk-Ling Li et al. [56] In this scheme, the best match cover-image block of the secret-image block is first selected based on the block difference. Then, the error-matrix, the normalized error- matrix, the difference-degree and the quantized-error matrix between the cover-image block and the secret-image block are computed. The block header information is embedded into the cover-image by the simple LSB substitution method. Chin-Chen Chang et al. [17] this new scheme classifies the host image pixels into two groups of pixels according to the pixel values. For each group of pixels, the corresponding secret pixel values go through an optimal substitution process and are transformed into other pixel values by following the dynamic programming strategy. Then, embed the transformed pixel values in the host pixels by using the modulus functions and obtain the stego-image. Hideki Noda et al. [27] The JPEG compression using the discrete cosine transform (DCT) is still the most common compression standard for still images. QIM(Quantization Index Modulation) is applied in DCT(Discrete Cosine Transformation) Domain. DCT based steganographic techniques are immune to Histogram based attacks. Two different quantizers are used with QIM, one for embedding 0 and another for embedding 1. Another method called HM-JPEG(Histogram Matching JPEG) Steganographic method is also presented along with QIM-JPEG Steganography. In these two methods embedding of secret message takes place during quantization of DCT coefficients only, not by modifying quantized DCT coefficients. Chin-Chen Chang et al. [12] it presents a reversible data hiding scheme for compressed digital images based on side match vector quantization (SMVQ). In Vector Quantization or SideMatch Vector quantization based methods VQ and SMVQ Compression codes are damaged by the secret data embedded in the message. And they cannot be constructed completely after extracting the secret data. By using this method, the original Side Match Vector Quantization compression Codes can be completely reconstructed, after extracting the embedded secret data. Ran-Zan Wang and Yeh-Shun Chen [51] this paper presents a new steganography method for images which use a two-way block-matching procedure to find for the maximum similarity block for each block of the image. The indexes which get along with some non matched blocks are noted in the least significant bits of the carrier image, using a hop scheme. This algorithm provides a high data payload capacity. C.-C.Chang and W.-C. Wu [8] this paper provides a technique to improve the embedding capacity without reducing the quality of cover file. That technique is called an adaptive VQ-based data hiding scheme based on a codeword clustering technique. Adaptive embedding method is superior to the fixed embedding method in terms of embedding capacity and stego-image quality. Xinpeng Zhang and Shuozhong Wang [64] a novel method of steganographic embedding in digital images is illustrated in this paper. In this method each secret digit in a (2n+1)-ary notational system is carried by n cover pixels, where n is a system parameter. This method offers a high embedding efficiency than that of previous other techniques. Mehdi Kharrazi et al. [39] this paper gives the experimental evaluation of various steganographic and steganalytic techniques. Chin-Chen Chang et al. [18] in this paper, a new watermarking based image authentication scheme is implemented. The feature extraction process of the proposed scheme is block-based, and the feature of a block is obtained by performing a cryptographic hash function. Then, the bit stream of the feature is folded and embedded into some least significant bits of the central pixel in the corresponding block. Po-Yueh Chen and Hung-Ju Lin [48] this paper proposes a new image steganographic method based on frequency domain embedding. The frequency domain transform applied in this method is Haar-DWT. There are three regions i.e., low frequency region, middle frequency region and high frequency region. And embedding occurs in Middle frequencies. Tse-Hua Lan and Ahmed H. Tewfik [61] the authors have proposed an algorithm which is based on the quantized projection embedding method. Quantized Projection (QP), combines elements from quantization that is QIM and spread-spectrum methods. It is based on quantizing a host signal diversity projection, encouraged in the statistic used for detection in spread-spectrum algorithms. Yuan-Hui Yu a et al. [67] in this method, a color or a grayscale secret image is hided in a true color host image. Procedures to different secret image types are independent. There are three image-hiding types, which depend on the type of secret image. The second type is a palette- based 256-color secret image. The third type is a grayscale secret image. Ran-ZanWang, and Yao-De Tsai [52] This paper presents an efficient image-hiding method that provides a high data hiding capacity that allows the embedded image to be larger than the cover image. In this method the image to be hidden is divided into a series of non-overlapping blocks. A block matching procedure is adapted for each block of the image to search for the best matching block from a pool of candidate blocks. This selection of best matching block is done by K-means clustering method. Then the indices of secret image are hidden in the LSBs of best matching block in the cover image. Bibhas Chandra Dhara and Bhabatosh Chand [7] Block truncation coding and vector quantization are the two widely used spatial domain compression techniques. In the proposed method the inter-plane redundancy is reduced by converting RGB to a less correlated triplet. The spatial redundancy is reduced by block quantization using BTC-PF method and the code redundancy by entropy coding using Huffman code. Nan-I Wu and Min-Shiang Hwang [41] this paper presents a survey of current methods of steganography in Gray scale images. The following methods are compared and analyzed in this paper. 1. The simple LSB method : Secret data is hidden in the Least Significant Bits of the Cover image. Quality of 3-bit LSB stego image is merely acceptable. 2. The optimal LSB methods: To improve the quality of stego image optimal procedure is adapted in LSB embedding. When data is hidden the nearest value is hidden in the cover image so that cover image distortion is minimized. 3. PVD method (Pixel Value Differencing): In this method the image is divided into non-overlapping blocks of two pixels in zig-zag manner. The amount of secret data to be embedded is determined by the difference in pixel values of two adjacent pixels. More amount of data can be hidden when the difference of pixel value is high, and less amount of data is hidden when the difference is low. In this method the cover image is not required for extraction of the secret message. 4. MBNS method (Multiple Based Notation System method): This method is based on Human vision sensitivity(HVS). The amount of secret data that can be hidden in a pixel is determined by a parameter called local variation. Local variation depends on Human Vision Sensitivity, and it is determined by three surrounding pixel values. Greater the value of Local variation, more amount of data can be hidden in that pixel. And less amount of data can be hidden in pixel if local variation value is small. When these methods are compared for low capacity hiding PVD and MBNS approaches produce better stego images than LSB based methods. Zhe-ming-lu et al. [68] this paper proposes an image retrieval scheme based in BTC based Histograms. BTC (Block Truncation Coding) is simple and easy to implement image compression technique. To reduce the bit rate of each part of BTC coded triple data, Vector Quantization is applied. Chin-Chen Chang et al. [19] this paper proposes a reversible data-hiding scheme for embedding secret data in VQ-compressed codes based on the de-clustering strategy and the similar property of adjacent areas in a natural image. This method has more flexibility and higher embedding capacity than other schemes. H. Motameni et al. [25] the authors have proposed a novel technique for hiding text message in a grayscale image. In this method different colors in the cover image are labeled in order to identify dark regions in the image. Data embedding in the these darker regions results in high quality stego images. This method offers more security than other LSB techniques. Zhensong Liao et al. [69] this paper summarizes the present techniques of data hiding capacity techniques. Various Communication channel models and host data models are discussed in this paper. H. Arafat Ali [24] the author, proposes a spatial domain steganographic scheme for JPEG images. This technique is based on statistical analysis and called IVSP (Improving Visual Statistical Properties) Method. This proposed method enhances the statistical properties of the stego image and also reduces the quantization error, which creeps in with JPEG format. And this method is also more secure when compared to the other techniques which are in use presently. Youngran et al. [66] this paper proposes a new method which is able to provide high quality stego image. According to pixels characteristics, number of bits can be embedded in stego image is varying and also providing the integrity of original data. Andrew D. Ker [5] Batch steganography problem deals with spreading payload in multiple covers. Author has proved that the secure steganographic capacity is proportional to the square root of the total cover size. Hong -juan zhang and Hong-jun tang [28], Proposed a novel method of image Steganography which can withstand for statistical analysis tests like RS and Chi-Square steganalysis techniques. Kazuya Sasazaki et al. [35] this paper proposes scheme for hiding data that loss lessly stuffs a data bits into a carrier image using the two differences. In this scheme, a three-pixel block in an image contains two absolute differences-the difference between pixels one and two, and the difference between pixels two and three. Such a difference is called block difference. Chung-Ming Wang et al. [21] this work is an improvement over Wu and Tsai scheme of pixel value differencing (2003). In this method the image is divided in to the blocks of two consecutive pixels and the number of bits that can be embedded is determined from the width of the range table. The reminder of sum of two pixel values with width of suitable range is calculated and modulus of pixel values is adjusted to the decimal value of binary string to be embedded in the block of two consecutive pixels. This method also addresses the falling-off boundary problem and produces high quality stego images than any other technique of spatial domain steganography. But the hiding capacity is low in this method when compared to other methods. Chien-Ping Chang et al. [20] Authors have proposed a novel data hiding scheme that embeds a message into a cover image. This method uses Tri way pixel value differencing method. In this method blocks of four pixels are considered at a time. This four pixel block is divided into three pairs. And the PVD method is applied separately to these three pairs. From the modified pairs on pair is chosen as a reference pair and other two are adjusted. By this method the hiding capacity enormously increases over Pixel Value Differencing Method. But the quality of stego image when expressed in terms of PSNR value decreases. Adem Orsdemir et al. [1] this method is based on the Higher Order Statistics Steganalysis. Generally any steganographer focuses more on undetectability and payload but not about the statistical difference between the stego image and cover image. When the steganographer is well aware of the steganalysis methods HOS steganalyzer and by formulating statistical in distinguish ability requirement, visual quality requirement, and detect ability requirement the method of steganography can withstand the steganalysis methods based on statistical differences. Chin-Chen Chang et al. [16] It is proposed in this method that digital images can be compressed using Block Truncation Coding (BTC). BTC is the most efficient spatial domain method with simple computations and acceptable compression rates. Zhiyuan Zhang et al. [71] generally in two-description image coding the image are partitioned into two parts and each description is produced by alternatively concatenating a finely coded bit stream of the other part. Multi Description Coding is a reliable method for robust transmission over unreliable networks. H.B.Kekre et al. [26] This paper proposes a new improved version of Least Significant Bit (LSB) method. Before embedding the data a 8 bit secret key used and XORed with all the bytes of the message to be embedded. Message is recovered by XOR operation, by the same key. Depending on the MSBs the number of bits of LSB utilized for data embedding are calculated. This method is simple to implement and offers high payload than other methods like PVD. Sathiamoorthy Manoharam [54] analyzes the steganalysis of LSB technique using the RS Steganalysis technique. The two classes of images- natural photographic images and synthetic images are taken as the cover medium. Ahmad T. Al-Taani and Abdullah M. AL-Issa [2] the proposed method provides good quality and high embedding capacity of stego image. Here the carrier image is divided into blocks of equal sizes and then stuffs the original data bits in the edge of the block depending on the number of ones in left four bits of the pixel. Experimental results of this method are compared with Pixel Value Differencing method and Gray Level Modification Method. P. Mouli and M. Mihcak [45] described the data hiding capacities of various image sources. Hong -juan zhang and Hong-jun tang [28] Proposed a novel method of image Steganography which can withstand for statistical analysis tests like RS and Chi-Square steganalysis techniques. 2.3 Literature survey on Network Security John McHugh et al. [33] this paper describes the role of an IDS in an enterprise and also gives survey on mostly used intrusion detection techniques. This paper also describes the various representative systems from the commercial, public, and research areas. Ray Spencer et al. [53] this paper, proposed a Flask micro kernel based operating system, security architecture which provides the solutions for the access rights sort of problems and it is suitable for many operating environments. Clive Grace [22] it gives a detailed understanding of various types of attacks possible and also various types of intrusion detection systems and soft wares. Nong Ye et al. [42] this work paper gives an investigation on a multivariate quality control technique. This method is finds a long-term profile of normal activities in the profiles in order to detect intrusions. Tal Garfinkel and Mendel Rosenblum [59] it proposes the Intrusion detection architecture and also the results are demonstrated to detect the attacks using the IDS which are completely isolated from the monitored host. Tal Garfinkel et al. [58] This architecture provides a tamper resistant trusted hardware platform where each and every application will be running on either the open platform that is general purpose platform or the closed platform that is general purpose platform with security and integrity properties. P. Englund et al. [43] this paper describes the trusted platform which provides a strict control over the software and hardware platforms to withstand the various vulnerabilities. Suresh N.Chari and Pau-Chen Cheng [57] Blue box, the host based IDS, is designed based on the system call introspection. They designed some set of fine grained rules for access control to the system resources. M. Rosenblum and T. Garfinkel.[37] It describes the virtual machine monitor and also how the VMM is useful to provide security. It also looks after the various implementation issues and future directions for the VMM. James E. Smith and Ravi Nair [30] in this paper various levels of abstractions of virtualization and also the architecture of virtual machines are described. Process and system virtual machines are also described over here. Peyman Kabiri and Ali A. Ghorbani [47] it gives a review on current trends and technologies implemented by re- searchers and also elucidated the applications of honey pots to detect attacks. Petar Cisar and Sanja Maravic Cisar [46] this paper describes a flow based algorithm combined with data mining techniques for intrusion detection. Jenni Susan Reuben [31] this paper gives a literature survey on various security issues as well as threats which are common for all virtualization technologies. Zhenwei Yu et al. [60] this paper gives an experimental result for an automatically tuning intrusion detection system which controls the number of alarms output to the system operator and according to the feedback mechanism provided by the system operator, tunes the detection model when false alarms are identified. The Flask architecture of security enhanced Linux for red hat is described in detail in this website [81]. 2.4 CONCLUSION This literature described the various methods and algorithms existing for the steganography and network security. Based on the existing algorithms, the conclusions are proposed to provide the efficient methods for the below 1. Data Security 2. Network Security 2.4.1 Data Security For providing the data security, there are many cryptography and as well as steganography methods existing for the data to be transmitted on the channel. But for any algorithm, it is has its own disadvantages. In the case of Steganography, the basic algorithm is LSB algorithm and some variations on the spatial domain techniques. But at any point of instance, algorithm is public. Once the algorithm is known, attacker will be trying to get the secure data. In this thesis two algorithms are proposed to provide the data security, which were not presented so far, which are as follows: Highly Secured, High Payload and Randomized Image Steganographic Algorithm using Robust Key: In this proposed method, the algorithm used for steganography process is either the PVDM or LSB algorithms depending on the inter pixel difference value in order to increase the data stuffing capacity with out disturbing the quality of the stego image. The position of pixels where to stuff bits will be decided by the stego key which is randomly selected by the user and this key is transmitted to the other party in encrypted form. So the key is robust. Highly Secured, High Quality, High Payload and Randomized Image Steganographic Algorithm using Robust key based on Tri way PVDM Method : In this proposed method, the algorithm used for steganography process is the Tri way PVD with Modulus which is an extension of Tri way PVD [20] in order to increase the stego image quality. The position of pixels where to stuff bits will be decided by the stego key which is randomly selected by the user and transmitted to the other party in encrypted form. So the key is robust. 2.4.2 Network Security For Providing the Network Security, There are many software and hardware devices available like firewalls, IDS etc.,. Generally an intrusion is detected by the IDS, immediately that can be patched by using the available techniques, meanwhile the applications are to be stopped temporarily, where as the proposed trusted architecture for providing network security will provide a self healing intrusion detection system without disturbing the actual state of the system, and trust can be taken back to the system by using the virtualization concepts.

Wednesday, November 13, 2019

A Comparison of Shakespeares Prince Hamlet and Machiavelli’s The Princ

A Comparison of Prince Hamlet and Machiavelli's The Prince  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚        Ã‚   Machiavelli states that "it is necessary for a prince, who wishes to maintain himself, to learn how not to be good, and use this knowledge and not use it, according to the necessity of the case." Machiavelli's ideas both compare and contrast to the methods used by Hamlet. Hamlet's desire to drive the king mad and eventually kill him, is what he thinks he must do in order to set things right. Hamlet struggles to maintain his position as prince. Perhaps he lacks the essential qualities of a prince outlined by Machiavelli.    According to Machiavelli, the pursuit of all things regarded as virtuous and praiseworthy will only lead to the prince's ruin. This is completely true in the case of Hamlet, because he is on a quest to avenge his father's death. The battle between good and evil is constantly in the forefront of Hamlet's mind, as he wavers between acting civil or getting revenge outright. In the beginning, Hamlet struggles to remain good at all times, but this causes him extreme anguish. Hamlet is an honest man, who grieves for his father. He suffers because of the dishonesty of the others in the court, especially his mother and his uncle, and later, Rosencrantz and Guildenstern. Hamlet is able to see through them all, and realize that they're dishonest. He speaks these words to Guildenstern: "Anything but to th' purpose. You were sent for, and there is a kind of confession in your looks, which your modesties have not craft enough to colour. I know the good King and Queen have sent for you." (Hamlet, II, ii., 278-280)    Hamlet's honesty is also seen when he is speaking with his mother. In act I, scene ii, Gertrude asks him why the de... ...e his goal was to get and retain power. He wanted to prove Claudius to be an unfit king, and he did so, but only as Hamlet himself was about to die. Hamlet had to cause grief by killing the king, but in the end, he is seen as a hero, because he unmasked his father's killer.    Sources Cited and Consulted: Gray, Terry A. "Mr. William Shakespeare and the Internet." http://www.palomar.edu/Library/shake.htm. Jones, W. T. Masters of Political Thought. Ed. Edward, McChesner, and Sait. Vol. 2. Boston: Houghton Mifflin, 1947. Lee A. Jacobus.   A World of Ideas: Essential Readings for College Writers.   5th edition. Boston, MA: Bedford/St. Martin's, 1998. Machiavelli, Niccolo. The Prince. Trans. Hill Thompson. Norwalk: The Easton Press, 1980. Shakespeare, William. The Three-Text Hamlet. Eds. Paul Bertram and Bernice Kliman. New York: AMS Press, 1991.

Monday, November 11, 2019

Melody in the Middle Ages Essay

In the early Middle Ages, melodic or textual embellishments added to plainchant were referred to as prosulae. In your own words, summarize the types of plainchant to which prosulae were most often added and the reasons for those additions. The Book of Hymns is one prime example of a prosulae. Plainchant was being sung day in and day out by the monks, who had already added some slight melody, but was still not easy to memorize. By adding some rhythm and separation in syllables throughout the melody, a new way to not only memorize the verses, but also present them, was born. In the early Middle Ages, melodic or textual embellishments added to plainchant were referred to as prosulae. In your own words, summarize Notker’s description of how and why he came to add words to melismas, and his teacher Iso’s response. Notker realized as a young child that he wanted to find a way to remember the words to certain melodies, but with them being so long, he could not. When he came across a man with sequenced verses he was at first excited, but soon disappointed as they did no better than the long, monotonous melodies he remembered as a child. When he decided to add words to these verses and took them to his teacher, Iso, he both appreciated and pitied Notker. He went back and corrected some mistakes pointed out by his teacher, and these changes proved to be successful. The new verses were deemed worthy and copied to a roll for the all of the boys to sing.

Saturday, November 9, 2019

Psoriasis Treatment essays

Psoriasis Treatment essays Psoriasis is an autoimmune disorder of the skin, which means that the body's defense system has turned on itself. This causes "angry red lesions to appear on the surface of the skin, multiply, and scale over with silvery patches" (1). Not only do they look hideous, but cause terrible itching and discomfort. "The word (psoriasis) comes from ancient Greece, and means 'to itch'" (1). This disease can be present from birth or not show up until a person is well into their adult years. They can also be found anywhere on the body, from the scalp to the elbows. Psoriasis affects about two percent of the population. The severity can range from a few spots to massive outbreaks covering the whole body, requiring hospitalization. Although the disease is genetically inherited, "it has triggers which can cause the body to go from a very mild case to a severe case within days" (1). Strep throat and spicy foods are examples of triggers that increase the severity. "There are also other fact ors, such as sunlight, which help decrease the severity" (1). There are many types of psoriasis including, nail, scalp, plaque, pustular, guttate, inverse, erythrodermic, and psoriatic arthritis. Plaque psoriasis is the most common type. Along with these irritating physical side effects are the emotional factors. This disease can cause its' victims to feel alienated from fellow coworkers and friends. People who have no experience with the disease tend to be distant towards those who do, because they think it is contagious. To compensate, sufferers often wear pants and long sleeves to cover their skin, even in summer heat, or avoid a social life altogether. There is no known cure for psoriasis, only the hope to control its' severity. Each case of psoriasis is different, and may require a certain form of treatment or a combination of treatments to obtain relief. Most of those available now work to lessen the redness and itching, but tend to be price...

Wednesday, November 6, 2019

toni morrisons the bluest eye essays

toni morrison's the bluest eye essays In the novel, The Bluest Eye, by Toni Morrison, the evils inflicted upon blacks by a white society indoctrinated by the inherent beauty of whiteness and ugliness of blackness are thoroughly depicted. Morrisons novel illustrates the disastrous affects racism had on African-Americans during the late nineteen hundreds. The Bluest Eye is a bitter novel that vividly reflects the way in which blacks were treated unfairly, and more important, how most blacks were unable to resist oppression from whites during the late nineteenth century. Blacks believed the sole reason for their unhappiness was due to their dark skin. Sadly, the poverty and discrimination that blacks faced causes them to idealize the white race instead of fight for freedom and equality. Throughout the course of this novel Morrison suggests that if blacks do not take a stand against oppressive whites they will become obsessed with the beauty and happiness of white families and upper-class blacks. According to critic Raymond Hedin, Morrison divides the novel into small excerpts of the Dick and Jane primer to contrast the happiness of upper class white family life, to the despair of poverty-stricken blacks. For instance, the chapter that introduces the Breedlove family to the reader is prefaced by the primers reference to Janes very happy family life: HEREISTHEFAMILYMOTHERFATHERDICKANDJANETHEYLIVEINTHEGREENANDWHITEHOUSETHEYAREVERYH (Morrison 38) The family described in the subsequent pages of the novel is the complete opposite of the ideal (white) American family described in the primer. The family portrayed in this chapter is the Breedlove family, a family that is overwhelmed with scorn and hatred. In this chapter the reader is informed that the Breedlove family is utterly dysfunctional because Cholly is a drunkard, Pauline is a perversely self-serving Christian, Sammy is a runaway, and ...

Monday, November 4, 2019

FEX_HUM310 Essay Example | Topics and Well Written Essays - 1000 words

FEX_HUM310 - Essay Example It is very democratic because having a book about how to become important levels the playing field. This article was important because at the time, everybody thought a Catholic president would basically just do whatever the Pope said without thinking of America first. However, Smiths article argues that this belief was completely against Americas constitution, which allowed for both freedom of religion and the separation of church and state. It influenced American values by drawing peoples attention again to the basic rights set out by the constitution with regards to religious rights. On the Road, like other books and poems published during the Beat Generation, was a book that really called into question the traditional values of America. It represented a big shift in the way people thought about things, and was very liberal or even radical. Once people accepted it America began to accept more liberal ideas. The Feminine Mystique is an important book because it drew attention to the way American women were still mostly a subservient gender. They were unhappy, but because for them to be happy might call into question traditional values about what women were supposed to do in the home, not many people wanted to know about their unhappiness at first. Friedans book brought this problem to the national attention. Martin Luther King Jr. wrote the letter in response to criticism of his protests in Birmingham Alabama. He claimed that unjust laws should be disobeyed because of morals. It is a significant document because it suggests that America was not as good at giving everybody an equal, democratic chance as it wished to believe. It also sets forth an alternative way for the oppressed people like African-Americans to change their country for the better. Bellow was controversial because of his conservative social and political views. He made statements and

Saturday, November 2, 2019

Pop Art and Harlem Renaissance Essay Example | Topics and Well Written Essays - 750 words

Pop Art and Harlem Renaissance - Essay Example Harlem Renaissance was characterized by an overt racial pride that was representing the New Negro idea, who believed through production and intellect of music, art, and literature could challenge the pervading stereotypes and racism to foster socialist or progressive politics, social, and racial integration (Wintz, 2007). The movement sought to break free of bourgeois shame and Victorian moral values about lives’ aspects that may be seen by the whites as reinforcing racist beliefs. It should be noted that a specific school of thought did not dominate the Harlem Renaissance; instead, it was characterized by intense debate that laid the groundwork for subsequent African American art. It attracted a remarkable concentration of talent and intellect and served as an inspiration of cultural awakening. Pop Art Renaissance happened in the mid twentieth century, in the late 1950s in the United States and earlier on in the mid-1950s in Britain. The history of pop art in the Great Britai n and North America developed differently. In the Great Britain, its origin can be traced in the post-war period and employed parody and irony. It was more academic focusing on the dynamic and paradoxically imagery of the American Popular culture as manipulative, powerful symbolic devices that was not only improving society’s prosperity, but also affected patterns of life (Wilkins and Zaczek, 2005). The precursor to the pop art Renaissance in Britain was the formation of the Independent Group in 1952 in London. This group was a gathering of young architects, critics, painters, writers, and sculptors who were challenging modernist approaches that were prevailing to culture and traditional fine art views. The discussions of this group revolved around the