Monday, September 30, 2019

How Powerful Do You Find Atticus Finch’s Closing Speech?

In a final bid to secure freedom for Tom Robinson, Atticus Finch uses several linguistic tools in his last speech to the jury to attempt to sway their opinions of Tom’s guilt in the crime. Emotive language is used in Atticus’s speech to create a powerful effect in his audience. He first uses to make people feel sorry for Mayella Ewell: ‘She is the victim of cruel poverty and ignorance’. Use of the word ‘victim’ is effective in building pity for Mayella, as it implies that she is not at fault for her misfortunes and is instead the poor unfortunate soul suffering due to circumstances that she could not control. This pity is then used as a way for the jurors to feel a connection with Tom, who, as Atticus points out, is ‘a quiet, respectable, humble Negro who had the unmitigated temerity to ‘feel sorry’ for a white woman’. By reminding the jurors that Tom is not so different from them, in that they all pity Mayella, Atticus relates them with Tom. Pity for Tom is also evoked, as Atticus reminds the jurors that Tom was merely ‘a quiet, respectable, humble Negro’. Words such as ‘humble’ builds up an image of an unassuming man and plants a little seed of doubt about Tom’s guilt in the minds of the jurors. Atticus also tries to lead the jury to feel pity for Tom by putting a little emphasis on Tom’s plight: ‘[Tom] has had to put his word against two white people’s. In that time of racial prejudice, for Tom to contradict any white person was a desperate path, as black people are usually assumed to be in the wrong automatically, and therefore, through reminding the jurors of Tom’s testimony, Atticus is attempting to bring forth pity for Tom. The tone of the statement also suggests that such a drastic action was not by choice; with the phrase ‘h as had to’, Atticus is insinuating that it was Tom’s last resort, that Tom was forced by the circumstances to challenge the Ewells’s testimonies. The evidence is presented to the jury in a clear manner: ‘There is circumstantial evidence to indicate that Mayella Ewell was beaten savagely by someone who led almost exclusively with his left†¦ and Tom Robinson now sits before you, having taken the oath with the only good hand he possesses – his right hand. ’ Here, Atticus is very definite on the evidence and leaves no room for ambiguity; he emphasises the fact that Tom had only one functional hand, his right. The effect of this observation is powerful, because it forces the jury to take a moment and reconsider; Atticus’s statement clearly outlines that Mayella was beaten by a left-hander, a feat impossible for the crippled Tom, therefore reinforcing an earlier assertion by Atticus: ‘The defendant is not guilty, but someone in this court-room is. ’ The tone in this allegation adds a little dramatic tension to the atmosphere of the courtroom and helps Atticus gain the interest and attention of the audience as they wait to hear to whom Atticus has assigned the guilt. The tone of Atticus’s speech also brings in another persuasive element. An example of this is seen when Atticus disdains the assumption that all black people are liars and immoral beings not to be trusted around white women: ‘Which, gentlemen, we know is in itself a lie as black as Tom Robinson’s skin, a lie I do not have to point out to you. ’ The words of this statement suggest a rather forceful tone as Atticus asserts that to stereotype is wrong. Through the use of inclusive phrases, such as ‘we know’, Atticus is also able to evoke a slight feeling of shame in the jurors as he indirectly reprimands their prejudice by implying that they ought to have known that their generalisation of black people was simply not true. Atticus tries further to break this long-ingrained prejudice by telling his audience that they are all the same: ‘You know the truth and the truth is this: some Negroes lie, some Negroes are immoral, some Negro men are not to be trusted around women – black and white. But this is a truth that applies to the human race and to no particular race of men. There is not a person in this court-room who has never told a lie, who has never done an immoral thing, and there is no man living who has never looked upon a woman with desire. ’ With this proclamation, Atticus is able to show that Tom is no different in character to anyone else and that the jury should not allow racist perceptions to influence their verdict and cause them to judge Tom basing their opinions on how likely they think those of his race are to commit this terrible offense. Atticus later augments his plea by noting that ideally, justice is blind: ‘But there is one way in this country in which all men are created equal†¦ The institution, gentlemen, is a court†¦ in our courts, all men are created equal. ’ Atticus is beseeching the jurors to look upon the case with an unprejudiced eye, reminding all that everyone deserves justice, regardless of skin colour. His point, that ‘all men are created equal’, is also repeated, to emphasise that a jury, or indeed, anyone at all, should not judge based on race, but on the truth. Personally, I find Atticus’s speech extremely powerful in that it is deeply convincing. The manipulation and use of the words is also incredibly effective, causing the audience to feel exactly as intended and by the end of the speech, one could hardly doubt that Tom was truly innocent of the heinous crime of which he was accused.

Sunday, September 29, 2019

Favorite Sport Football

CONSUMER PREFERENCE AND SATISFACTION TOWARDS VARIOUS CELLPHONE SERVICE PROVIDES CHAPTER-I INTRODUCTION CONSUMER A consumer is an individual who purchase or has the capacity to purchase goods and services offered for sale by marketing institutions in order to satisfy  personal or household needs,wants or desires. According to a statement made by Mahatma Gandhi, ‘consumer refers to the following, â€Å"A consumer is  the most important visitor on our premises. He is not dependent on us. We are dependent on him. He is not an outsider to our  Ã‚  business.He is part of it. We are not doing him a favour by serving him. He is doing us a favour by giving us an opportunity to do so†. So  consumer  is  like  the  blood  of  our  business  and  also  a satisfedcustomer is a word of mouth advertisement of a product / services. The consumer is the one who pays to consume the goods and services produced. As such, consumers play a vital role in the economic system of a nation. In the absence of effective consumer demand, producers would lack one of the key motivations to produce to sell to consumers.Typically, when  business  people and economists talk of  consumers, they are talking about  the person as consumer, an aggregated  commodity item with little  individuality  other than that expressed in the decision to buy or not to buy. However, there is a trend in  marketing  to individualize the concept. Instead of generating broad  demographic profiles  and  psycho-graphic profiles  of  market segments, marketers have started to engage in personalized marketing,  permission marketing, and  mass customization.There is increasing backlash from the public over use of the label â€Å"consumer† rather than â€Å"customer†, with many finding it offensive and derogatory. Consumer choice  is a theory of  microeconomics  that relates preferences  for consumption goods  and services to con sumption expenditures and ultimately to   consumer demand curves. The link between personal preferences, consumption, and the demand curve  is one of the most closely studied relations in economics. Consumer choice theory is a way of analyzing how consumers may achieve  Ã‚  equilibrium between preferences and expenditures by maximizing  utility  as subject to consumer   budget constraints.Preferences are the desires by each individual for the consumption of goods and services that translate into choices based on income or wealth  for purchases of goods and services to be combined with the consumer's time to define consumption activities. Consumption is separated from production, logically, because two different consumers are involved. In the first case consumption is by the primary individual; in the second case, a producer might make something that he would not consume himself. Therefore, different motivations and abilities are involved.The  Ã‚  models that make up consumer theory are used to  represent  prospectively observable demand patterns for an individual buyer on the  hypothesis  of constrained optimization. Prominent variables used to explain the rate at which the good is purchased (demanded) are the price per unit of that good, prices of related goods, and wealth of the consumer. The fundamental theorem of demand states that the rate of consumption falls as the price of the good rises. This is called the  substitution effect.Clearly if one does not have enough money to pay the price then they cannot buy any of that item. As prices rise, consumers will substitute away from higher priced goods and services, choosing less costly alternatives. Subsequently, as the wealth of the individual rises, demand increases, shifting the demand curve higher at all rates of consumption. This is called the  income effect. As wealth rises, consumers will substitute away from less costly inferior goods and services, choosing higher priced al ternatives. CONSUMER SATISFACTIONEvery human being is a consumer of different produces. If there is no consumer,  there  is  no  business. Therefore,  consumer  satisfaction  is   very important to every business person. According to Philip Kotler consumer satisfaction is defined on, â€Å"personal feeling of pleasure resulting from comparing a product’s pursued performance in relation to his /her expectations†. Consumer attitude measurements are taken on either potential buries or  existing client’s buries in order  to identify their characteristics. Why should the competent market engineer conduct consumer research?Consumer’s surverys  can provide the researcher with a wealth of information, valuable of the marketing funchion. Detailed information regarding the customer in a market will provide the  basic platform for all marketing decisions. Marketing decision maker needs descriptive information about the total potential unit an d dollar sales in each segment. Perhaps the most important one is that a seller need to be  aware of the relevant objective and need  of consumer and  how their objectives  might best reserved by the products.Customer satisfaction, a term frequently used in  marketing, is a measure of how products and services supplied by a company meet or surpass customer expectation. Customer satisfaction is defined as â€Å"the number of customers, or percentage of total customers, whose reported experience with a firm, its products, or its services (ratings) exceeds specified satisfaction goals. †Ã‚  In a survey of nearly 200 senior marketing managers, 71 percent responded that they found a customer satisfaction metric very useful in managing and monitoring their businesses.It is seen as a key performance indicator within business and is often part of a balanced scorecard. In a competitive marketplace where businesses compete for customers, customer satisfaction is seen as a key differentiator and increasingly has become a key element of business strategy. â€Å"Within organizations, customer satisfaction ratings can have powerful effects. They focus employees on the importance of fulfilling customers’ expectations. Furthermore, when these ratings dip, they warn of problems that can affect sales and profitability. . . These metrics quantify an important dynamic. When a brand has loyal customers, it gains positive word-of-mouth marketing, which is both free and highly effective. † Therefore, it is essential for businesses to effectively manage customer satisfaction. To be able do this, firms need reliable and representative measures of satisfaction. â€Å"In researching satisfaction, firms generally ask customers whether their product or service has met or exceeded expectations. Thus, expectations are a key factor behind satisfaction.When customers have high expectations and the reality falls short, they will be disappointed and will likely r ate their experience as less than satisfying. For this reason, a luxury resort, for example, might receive a lower satisfaction rating than a budget motel even though its facilities and service would be deemed superior in ‘absolute' terms. † The importance of customer satisfaction diminishes when a firm has increased  bargaining power. For example,   cell phone  plan providers, such as AT;T  and  Verizon, participate in an industry that is an  oligopoly , where only a few suppliers of a certain product or service exist.As such, many cell phone plan contracts have a lot of  fine print with provisions that they would never get away if there were, say, a hundred cell phone plan providers, because customer satisfaction would be way too low, and customers would easily have the option of leaving for a better contract offer. There is a substantial body of empirical literature that establishes the benefits of customer satisfaction for firms. PURPOSE â€Å"Customer satisfaction provides a leading indicator of consumer purchase intentions and loyalty.   Ã¢â‚¬Å"Customer satisfaction data are among the most frequently collected indicators of market perceptions. Their principal use is two fold. † 1. â€Å"Within organizations, the collection, analysis and dissemination of these data send a message about the importance of tending to customers and ensuring that they have a positive experience with the company’s goods and services. † 2. â€Å"Although sales or market share can indicate how well a firm is performing currently, satisfaction is perhaps the best indicator of how likely it is that the firm’s customers will make further purchases in the future.Much research has focused on the relationship between customer satisfaction and retention. Studies indicate that the ramifications of satisfaction are most strongly realized at the extremes. † On a five-point scale, â€Å"individuals who rate their satisfaction l evel as ‘5' are likely to become return customers and might even evangelize for the firm. (A second important metric related to satisfaction is willingness to recommend. This metric is defined as â€Å"The percentage of surveyed customers who indicate that they would recommend a brand to friends. When a customer is satisfied with a product, he or she might recommend it to friends, relatives and colleagues. This can be a powerful marketing advantage. ) â€Å"Individuals who rate their satisfaction level as ‘1,' by contrast, are unlikely to return. Further, they can hurt the firm by making negative comments about it to prospective customers. Willingness to recommend is a key metric relating to customer satisfaction. † MARKET The term market is derived from Latin Word ‘Mercatus’, which means ‘totrade’ that is purchasing and selling of goods.It also means merchandise truthic   place of business. According to Pyle, â€Å"Market includes bo th place and region in which  buyers and sellers or in free competition with one another†. A  market  is one of many varieties of  systems,  institutions,  procedures,  social relations  and  infrastructures whereby parties engage in exchange. While parties may exchange goods and services by  barter, most markets rely on sellers offering their goods or services (including labor) in exchange for  money  from buyers. It can be said that a market is the process by which the prices of goods and services are established.For a market to be competitive, there must be more than a single buyer or seller. It has been suggested that two people may trade, but it takes at least three persons to have a market, so that there is competition on at least one of its two sides. However,competitive  markets, as understood in formal economic theory, rely on much larger numbers of both buyers and sellers. A market with single seller and multiple buyers is amonopoly. A marke t with a single buyer and multiple sellers is a  monopsony. These are the extremes of imperfect competition.MARKETING Marketing includes all the impacts involved in the exchange process of   transferring  the  possession  and  ownership  of  goods  or  services  from   the  producer to the ultimate consumer’s. Marketing  is the process of  communicating  the value of a product or service to  customers. Marketing might sometimes be interpreted as the art of selling products, but selling is only a small fraction of marketing. As the term â€Å"Marketing† may replace â€Å"Advertising† it is the overall strategy and function of promoting a product or service to the customer.The American Marketing Association defines marketing as â€Å"the activity ,set of institutions,and processes for creating, communication, delivering,and exchanging offerings that have value for customers,clients,partners,and society at large. † From a so cietal point of view, marketing is the link between a society’s material requirements and its economic  patterns of response. Marketing satisfies these needs and wants through exchange processes and building long term relationships. The process of communicating the value of a product or service through positioning to customers.Marketing can be looked at as an organizational function and a set of processes for creating, delivering and communicating value to customers, and managing customer relationships in ways that benefit the organization and its  shareholders. Marketing is the science of choosing  target markets  through market analysis and  market segmentation, as well as understanding consumer buying behavior and providing superior customer value. MARKETING FORMULA A)The foremost step is business aims at profit. B)For profit making he can sell the products. C)For selling the product he should create customers.D)For  creating the  customer’s,  custom er’s needs  of  preferences  to  beidentified and satisfied. E). To satisfy the customer’s new product to be produced. Marketing is trying to learn, * Who buy the products or services? * How do they buy? * When do they buy? * Where do they buy? * Why do they buy? * How often they buy? It  is  otherwise  called  understand  and  predict  human  actions  in  their  Ã‚   buying role. A marketer is act as consumers while them purchasing any goods/services, and try to market that product to an ultimate consumer. So, marketingis starts with consumer and ends with consumer. So, today’s market is called on consumer market.It can be defined on,â€Å"All the individuals and households who buy goods and services for personal consumption. SKILLS OF MARKETERS Marketers have 4 main skill sets that they bring to an enterprise: 1)Opportunity Identification: Marketing begins before there is a product to sell. Many people think marketing is just sel ling whatever comes out of the manufacturing  plant. It's the job of marketing to decide WHAT comes out of the manufacturing  plant in the first place. Before a business can make money there must be opportunities for money to be made and it's marketing's job to define what those opportunities are.Marketers analyze markets, market gaps, trends, products,competition, and distribution channels to come  up with opportunities to make money. 2)  Competitive strategy/positioning: Markets consist of groups of competitors  competing for a customer's business. The job of  marketing is to decide how to create a defensible sustainable competitive advantage against competitors. Marketers conceive strategies, tactics, and business models to make it hard if not impossible for competition to take away customers from their business. 3)  Demand generation/management It's the job of marketing to create and sustain demand for a company's products.Marketers manage demand for a company's pr oducts by influencing the probability and frequency of their customer's purchase behavior. 4)Sales: The ultimate goal of marketing is to make money for a business. In most company’s sales is a different discipline and department from marketing. But in order for  sales people to have any long term success in a company they must be led by marketing. The better job a company does of identifying opportunities, creating a differential sustainable competitive advantage, and generating demand for their products the easier it will be for sales people to make sales.MARKET SHARE OF PUBLIC AND PRIVATE INDUSTRY The fixed line and mobile segments serve the basic needs of local calls, long distance callsand the international calls, with the provision of broadband services in the fixed line segment and GPRS in the mobile arena. Traditional telephones have been replaced by the codeless and the wireless instruments. Mobile phone providers have also come up with GPRS-enabled multimedia messa ging, Internet surfing, and mobile-commerce. The much-awaited 3G mobile technology is soon going to enter the Indian telecom market. TheGSM,CDMA,WLLservice  providers  are  all  upgrading  them  to  provide  3G  mobile  services.Along  with improvement in telecom services, there is also an improvement in manufacturing. In the  beginning, there were only the Siemens handsets in India but now a whole series of newhandsets, such as Nokia's latest N-series, Sony Ericsson's W-series, Motorola's PDA phones,etc. have come up. Touch screen and advanced technological handsets are gaining popularity. Radio services have also been incorporated in the mobile handsets, along with other applications like high storage memory, multimedia applications, multimedia games, MP3 Players, video generators,Camera's, etc.The value added services provided by the mobile service operators contribute more than 10% of the total revenue. THE GLOBAL CELLULAR MOBILE INDUSTRY Global telecom s ector Earnings visibility Earnings  growth  is  being  driven  by  improving  pricing  conditions, stabilizing  operating trends, aggressive cost cutting initiatives, a positive regulatory environment, strong wireless growth, and  new market  opportunities. This has  translated into  greater visibility  of  forward earnings as evidenced by recent increased analyst upgrades within the sector. Merger synergiesGiven the substantial amount of excess capital available in the sector and in private equity we expect to see additional merger and acquisition activity, albeit at a slower pace than recently witnessed. Global  telecom  M;A deals  over  the  past  two years  have  reflected  market expansion but have also had a positive effect on the buyers’ balance sheets. Partnering companies have  begun  realizing their  synergies through cost reductions and  economies of  scale. In the US, the largest three companies now account for over 70% of the sector market cap; this compares to 34% in 1990.Trends in bundled services are also paving the way for  additional M;A  activity. Sector  consolidation will  further  increase  the importance  of stock  selection. METHODS TO CUSTOMER SATISFACTION Companies use the following methods to measure  customer satisfaction. 1 ) Complaints and suggestion system: Companies obtaining complaints through their  customer service centres, and further suggestions were given by customers to satisfy their  desires. 2) Customer satisfaction surveys: Responsive  companies  obtain  a  direct  measure  of  customer  satisfaction  by  periodic surveys.They send questionnaires to random sample of their customers to find out how they feel  about  various  aspects of  the company’s performance and also  solicit views  on their competitor’s performance. It is useful to measure the customer’s willingness to recommen d the company and brand to other persons. 3 )Lost Customer Analysis: Companies should contact customers who have stopped buying or who have switched to another supplier to learn why this happened. 4 )Consumer Behavior Vs  Consumption Behavior:Consumer behavior refers to the manner in which an individual reaches decision related to the selection, purchases and use of goods and services. Walters and Paul says that,consumer behavior is the process where by the individuals decides what, when, how and from whom to purchase goods ; services. Consumer  behavior  relates  to  an  individual  person  (Micro  behavior)  where  asconsumption behavior relates to and to the mass or aggregate of individuals. (Macro  behaviour) consumers   behavior   as  a  study  focuses  on  the  decision  process  of  the individual consumer or consuming unit such as the  family.In contrast the consumption behavior as a study is to do with the explanation of the  behavior of the aggregate of consumers or the consuming unit. Consumer is a pivot,around which the entire system of marketing revolves. The study of buyer behavior is one of the most important keys to successful mark. 1. 2. IMPORTANCE OF CONSUMER SATISFACTION The needs to satisfy customer for success in any commercial enterprise is very obvious. The income of all commercial enterprise is derived from the  payments received for the products and services supplied to its customers.If  there is no customer there is no income and there is no business. Then the coreactivity of any company is to attract and retain customers. It is therefore no surprise that Peter Drucker the renowned management Guru, has said â€Å"to satisfy the customers is the mission and purpose of every business†. Satisfaction of customer is essential for retention of customer’s and for  continuous sales of the products and services of the company to customers. This  establishes  the needa fo r and the importance of customer satisfaction. The  satisfaction  of  consumers  is  different  from  onto another.Became,  each consumer has the different behaviour in their life. So, the marketer satisfy the consumer, he must very well know the behaviour of consumer. 1. 4. CONSUMER BEHAVIOUR The  term  consumer  behaviour  may  be  defined  as  the  behaviour   that consumer displays in searching for purchasing, using, evaluating, producing,services and ideas which they expect will satisfy their needs. In other words, â€Å"It is a study of physiological, social, physical, behaviours of all potential customer  as they become aware of evaluation, purchase and consumption and ell other  about products and services† 1. 5. OBJECTIVES OF THE STUDY: * To study the evaluation of cell phones with particular reference to India. * To ascertain the attributer which influenced the customer’s in selecting a  particular cell phone services provider. * To study  the consumer’s satisfaction towards different cell  phone service  providers. * To assess the problems faced by the cell phone users in services. * To offer valuable suggestions to improve the services of cell phones in each companies. INRODUCTION TO TELECOM INDUSTRY The Indian Telecommunications network with 110. 1 million connections is the fifth largest in the world and the second largest among the emerging economies of Asia. Today, it is the fastest growing market in the world and represents unique opportunities for U. S. companies in the stagnant global scenario. The total subscriber base, which has grown by 40% in 2005,is expected to reach 250 million in 2007. According to Broadband Policy 2004, Government of India aims at 9 million broadband connections and 18 million internet connections by2007. The wireless subscriber base has jumped from 33. 69 million in 2004 to 62. 57 million in FY2004- 2005.In the last 3 years, two out of every three new telephone subscribers were wireless  subscribers. Consequently, wireless  now accounts for  54. 6% of  the total  telephone subscriber base, as compared to only 40% in 2003. Wireless subscriber growth is expected to  bypass 2. 5 million new subscribers per month by 2007. The wireless technologies currently in use are Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA). There are primarily 9 GSM and 5 CDMA operators providing mobile services in 19 telecom circles and 4 metro cities, covering 2000 towns across the country. . 6. NEED OF THE STUDY Exchange of information becomes the necessity of life to a common man. In the modern world an individual tends to communicate anything to everything right from the place where he/she stands. Even while riding vehicle he / she wants communicate within a  fraction of second at quick speed with clear  voice,without any disturbance. Like line crossing, out of order, etc. most of which lack in the connection given by the department of tele-communictions. Cell  phones emerges as a boon quench such a thirst, the by providing facilities,which a common man cannot imagine.Though cell phone industry has its originin the recent past and the growth has been excellent Day by day many new competitors enter the market with new attractive schemes,  provide additional facilities, add new  features to existing ones, reduce the charges her incoming and outgoing calls, introduce varieties of handsets,models  a  healthy  competition  that  benefits  the  subscribers. Hence  in  this context, it is important to study the functioning of cellular phone services and the utilization of their services by the telephonesation. 1. 8. STATEMENT OF PROBLEMIn our country the growth of service marketing especially mobile phone industry is still in its infancy stage, as compared to the industrially advanced countries. It is for the fact that the economy of our country has been i n the developing stage. There are various mobile phones services provider’s in our  country and they are playing an essential role in fulfilling the needs of the customers. Now-a-days, the customers are more dynamic. Their taste, needs and  preference can the changing as per current scenario. Hence the development of  cellular industry mainly depends on the customer satisfaction.However the following questions may arise regarding customer satisfaction. CHAPTER II REVIEW OF LITERATURE India is the world’s fastest growing industry in the world in terms of number of wireless connections after China, with 811. 59 million mobile phone subscribers. According to the world telecommunications industry, India will have 1. 200 billion mobile subscribers by 2013. Furthermore, projections by several leading global consultancies indicate that the total number of subscribers in India will exceed the total subscriber count in the China by 2013.In 1850 experimental electric teleg raph started for first time in India between  Calcutta (Kolkata) and Diamond Harbor (southern suburbs of Kolkata, on the banks of the Hooghly River). In 1851, it was opened for the use of the British East India Company. Subsequently construction of telegraph started through out India. A separate department was opened to the public in 1854. Dr. William O’Shaughnessy, who pioneered the telegraph and telephone in India, belonged to the Public Works Department, and worked towards the development of telecom.Calcutta or the-then Kolkata was chosen as it was the capital of British India. In early1881, Oriental Telephone Company Limited of England opened telephone exchanges at Calcutta (Kolkata), Bombay (Mumbai), Madras (Chennai) and Ahmedabad. On the 28th January 1882 the first formal telephone service was established with a total of 93 subscribers. From the year 1902 India drastically changes from cable telegraph to wireless telegraph, radio telegraph, radio telephone, trunk dial ing. Trunk dialing used in India for more than a decade, were system allowed subscribers to dial calls with operator assistance.Later moved to digital microwave, optical fiber, satellite earth station. During British period all major cities and towns in India were linked with telephones. In the year 1975 Department of Telecom (DoT) was responsible for telecom services in entire country after separation from Indian Post ; Telecommunication. Decade later Mahanagar Telephone Nigam Limited (MTNL) was chipped out of DoT to run the telecom services of Delhi and Mumbai. In 1990s the telecom sector was opened up by the Government for private investment.In1995 TRAI (Telecom Regulatory Authority of India) was setup. This reduced the interference of Government in deciding tariffs and policy making. The Government of India corporatized the operations wing of DoT in 2000 and renamed Department of Telecom as Bharat Sanchar Nigam Limited (BSNL). In last 10 years many private operator’s espe cially foreign investors successfully entered the high potential Indian telecom market. Globally acclaimed operators like Telenor, NTT Docomo, Vodafone, Sistema, SingTel, Maxis, Etisalat invested in India mobile operators. Wireless CommunicationPager Services Pager communication successful launched in India in the year 1995. Pagers were looked upon as devices that offered the much needed mobility in communication, especially for businesses. Motorola was a major player with nearly 80 per cent of the market share. The other companies included Mobilink, Pagelink, BPL, Usha Martin telecom and Easy call. Pagers were generally worn on the belt or carried in the pocket. The business peaked in 1998 with the subscriber base reaching nearly 2 million. However, the number dropped to less than 500,000 in 2002.The pager companies in India were soon struggling to maintain their business. While 2-way pagers could have buffered the fall, the pager companies were not in a position to upgrade their i nfrastructure to improve the ailing market. The Indian Paging Services Association was unable to support the industry. Pager companies in India also offered their services in regional languages also. However, the end had begun already. By 2002, Motorola stops making or servicing pagers. When mobile phones were commercially launched in India, the pager had many advantages to boast.Pagers were smaller, had a longer battery life and were considerably cheaper. However, the mobile phones got better with time and continuously upgraded themselves. Mobile Communication First mobile telephone service on non-commercial basis started in India on 48th Independence Day at country’s capital Delhi. The first cellular call was made in India on July 31st, 1995 over  Modi Telstra’s MobileNet GSM network of Kolkata. Later mobile telephone services are divided into multiple zones known as circles. Competition has caused prices to drop and calls across India are one of the cheapest in th e world.Most of operator follows GSM mobile system operate under 900MHz bandwidth few recent players started operating under 1800MHz bandwidth. CDMA operators operate under 800Mhz band, they are first to introduce EVDO based high speed wireless data services via USB dongle. In spite of this huge growth Indian telecom sector is hit by severe spectrum crunch, corruption by India Govt. officials and financial troubles. In 2008, India entered the 3G arena with the launch of 3G enabled Mobile and Data services by Government owned MTNL and BSNL. Later from November 2010 private operator’s started to launch their services.Broadband communication After US, Japan, India stands in third largest Internet users of which 40% of Internet used via mobile phones. India ranks one of the lowest provider of broadband speed as compared countries such as Japan, India and Norway. Minimum broadband speed of 256kbit/s but speed above 2Mbits is still in a nascent stage. Year 2007 had been declared as â€Å"Year of Broadband† in India. Telco’s based on ADSL/VDSL in India generally have speeds up to 24Mbit max while those based on newer Optical Fiber technology offer up to 100Mbits in some plans Fiber-optic communication (FTTx).Broadband growth has been plagued by many problems. Complicated tariff structure, metered billing, High charges for right of way, Lack of domestic content, non implementation of Local-loop unbundling have all resulted in hindrance to the growth of broadband. Many experts think future of broadband is on the hands of   wireless factor. BWA auction winners are expected to roll out LTE and WiMAX in India in 2012. Next Generation Network (NGN) Next Generation Networks, multiple access networks can connect customers to a core network based on IP technology. These access

Saturday, September 28, 2019

Night World : Black Dawn Chapter 18

Maggie stared at her wildly. â€Å"You†¦what?† â€Å"I shouldhave told you earlier,† Aradia said. â€Å"ButI didn't realize he was your brother until my mind became clearer. You're a lot alike, but I couldn'tthink properly to put it together.† She added,quickly and with terrible gentleness, â€Å"But, Maggie, I don't want to get your hopes up. I don't thinkthere's much chance he's all right.† Maggie went still. â€Å"Tell me.† â€Å"He actually saved me before you ever did. I wascoming to this valley, but I wasn't alone-therewere several other witches with me. We didn'tknow where the pass was exactly-we'd only man aged to get incomplete information from our spiesin Hunter Redfern's household.† Maggie controlled her breathing and nodded. â€Å"It was Samhain evening-Halloween. We werewandering around in the general area of the pass,trying to find a spell that would reveal it. All wedid was set off an avalanche.† Maggie stopped breathing entirely. â€Å"An avalanche?† â€Å"It didn't hurt your brother. He was on the road,the place we should have been, if we'd only known.But it did kill the others in my party.† â€Å"Oh,†Maggie whispered. â€Å"Oh, I'm sorry†¦Ã¢â‚¬  â€Å"I wasn't seriously hurt, but I was completely dazed. I could feel that the others were dead, butI wasn't sure where I was anymore. And that waswhen I heard your brother shouting. He and Sylvia had heard the avalanche, of course, and they cameto see if anyone was caught in it.† â€Å"Miles would always stop to help people,† Maggiesaid, still almost in a whisper. â€Å"Even if they only needed batteries or socks or things.† â€Å"I can't tell you how grateful I was to hear him.He saved my life, I'm sure-I would have wandered around dazed until I froze. And I was so happy torecognize that the girl with him was a witch †¦ â€Å"She grimaced. â€Å"Huh,† Jeanne said, but not unsympathetically.†I bet that didn't last.† â€Å"She recognized me, too, immediately,† Aradiasaid. â€Å"She knew what she had. A hostage to bargainwith all the other witches. And to buy credit withHunter Redfern. And of course, she knew that she could stop me from seeing Delos.† â€Å"All she cares about is power,† Maggie said quietly. â€Å"I heard hertalking-it'sall about her, and how the witches have given her a bad deal becauseshe's not a Harman or something.† Aradia smiled very faintly. â€Å"I'm not a Harman byname, either. But all true witches are daughters of Hellewise Hearth-Woman-if they would just realize it.† She shook her head slightly. â€Å"Sylvia was so excited about finding me that she couldn't resist explaining it all to your brother. And he †¦ wasn't happy.† â€Å"No,† Maggie said, burning with such fierce pride that for a moment the cold cell seemed warm to her. â€Å"She'd only told him before that she was taking him to some secret place where legends were stillalive. But now she told him the truth about theDark Kingdom, and how she wanted him to be apart of it. She told him that it could be theirstheir own private haven-after Delos left with Hunter Redfern. He could become a vampire orshapeshifter, whichever he liked better. They wouldboth be part of the Night World, and they couldrule here without any interference.† Maggie lifted her hands helplessly, waving themin agitation because she couldn't find words. How stupid could Sylvia be? Didn't she know Miles atall? â€Å"Miles wouldn't care about any of that,† she finally got out in a choked voice. â€Å"He didn't. He told her so. And I knew right awaythat he was in trouble with her.† Aradia sighed.†But there was nothing I could do. Sylvia played it very cool until they got me down the mountain.She pretended all she cared about was getting meto a doctor and telling the rangers about my friends. But once we were in her apartment, everything changed.† â€Å"I remember her apartment,† Maggie said slowly.†The people there were weird.† â€Å"They were Night People,† Aradia said. â€Å"And Sylvia's friends. As soon as we were inside she toldthem what to do. I was trying to explain to Miles,to see if we both could get away, but there weretoo many of them. He put himself in between meand them, Maggie. He said they'd have to kill himbefore getting to me.† Maggie's chest felt not so much tight now asswollen, like a drum barrel full of water. She couldfeel her heart thudding slowly inside, and the wayit echoed all through her. She steadied her voice and said, â€Å"Did they killhim?† â€Å"No. Not then. And maybe not ever-but that'sthe part that I don't know. All I know is that theyknocked him out, and then the two slave tradersarrived. Bern and Gavin. Sylvia had sent for them.† And they must have come fresh from kidnappingP.J., Maggie thought. What wonderful guys. â€Å"They knocked me out. And then Sylvia boundme with spells and practiced with her truth potions on me. She didn't get much information, becauseI didn't have much information. There was no armyof witches coming to invade the Dark Kingdomright now, I wish there were. And she already knew that I was coming to see Delos.† Aradia sighed again and finished quickly. â€Å"Thetruth potion poisoned me, so that for days afterwards I was delirious. I couldn't really understandwhat was going on around me -I just faded in andout. I knew that I was being kept ina warehouse until the weather cleared enough to take me to thevalley. And I knew that Miles had already been disposed of-Sylvia mentioned that before she left mein the warehouse. But I didn't know what she haddone with him-and I still don't.† Maggie swallowed. Her heart was still thumping in that slow, heavy way. â€Å"What I don't understandis why she had to set up a whole scenario to explainwhere he went. She let some rangers find her onthe mountain, and she said that he fell down acrevasse. But if he was dead, why not just let himdisappear?† â€Å"I think I know the answer to that, at least,† Aradia said. â€Å"When Miles was fighting them off he saidthat his roommates knew he'd gone climbing withher. He said that if he didn't come back, they'dremember that.† Yes. It made sense. Everything made sense-except that Maggie still didn't know what had becomeof him. There was a long silence. `†Well, he was brave,† Jeanne said finally, andwith unexpected seriousness. â€Å"If he did die, he wentout the right way. We just ought to hope we cando the same.† Maggie glanced at her, trying to read the angularfeatures in the darkness. There was no trace ofmockery or sarcasm that she could see. Well, Cady's changed into Aradia, Maiden of allthe witches, and I've changed into the Deliverernot that I've been much good at it, she thought. But I think maybe you've changed the most afterall, Jeanne â€Å"You know, I don't even know your last name,† she said to Jeanne, so abruptly and so much offthe subject that Jeanne reared back a little. â€Å"Uh-McCartney. It was-it is?CMcCartney.† Sheadded, â€Å"I was fourteen when they got me. I was at the mall playing Fist of Death at the arcade. And Iwent to go to the bathroom, and it was down this long empty corridor, and the next thing I knew Iwas waking up in a slave trader's cart. And now you know everything,† she said. Maggie put out a hand in the dimness, â€Å"Hi,Jeanne McCartney.† She felt the cold grip of slen der, callused fingers, and she shook Jeanne's hand.And then she just held on to it, and to Aradia's soft warm fingers on the other side. The three of themsat together in the dark cell, slave, human, andwitch Maiden-except that we're really all just girls,Maggie thought. â€Å"You didn't tell me one thing,† Maggie said suddenly. â€Å"What'd they callyou when you started working here? What was your job?† Jeanne snorted. â€Å"Second Assistant Stable Sweeper.And. now you know everything. â€Å" Maggie didn't think she could possibly sleep in aplace like this, but after the three of them had sat quietly for a long time she found herself dozing. And when the rattle of the dungeon door startledher, she realized that she'd been asleep. She had no idea what time it was-the flare wasburning low. She could feel Aradia and Jeannecome awake beside her. â€Å"Dinner?† Jeanne muttered. â€Å"I just hope it's not PJ.-† Maggie began, and then broke off as firm, determined steps sounded on the stone floor of the corridor. She recognized the stride and she stood up tomeet Delos. He stood outside the cell, the dying torchlightflickering on his dark hair, catching occasionalsparks off his golden eyes. He was alone. And he didn't waste time getting to the point. â€Å"I came to see if you've decided to be reasonable,† he said. â€Å"I've been reasonable from the beginning,† Maggie said quietly and completely seriously. She was searching his face and the slight link she felt between their minds at this distance, hoping to findsome change in him. But although she felt turmoilthat was almost anguish, she also felt the steel ofhis resolve. I won't let you be killed. Nothing else matters. Maggie felt her shoulders sag. She turned slightly. Aradia and Jeanne were stillsitting on the bench, Aradia motionless, Jeannecoiled and wary. But she could tell that they bothfelt this was her fight. And they're right. If I can't do it, nobody can†¦But how? â€Å"They're people,† she said, gesturing toward theother girls, but watching Delos's face. â€Å"I don't knowhow to get you to see that. They matter, too.† He hardly glanced back at them. â€Å"In the time ofdarkness that is coming,† he said, as carefully as ifreciting a lesson, â€Å"only the Night People will survive. The ancient forces of magic are rising. They'vebeen asleep for ten thousand years, but they'rewaking up again.† A low voice, not belligerent, but not afraid either,came from the back of the cell. â€Å"Some of us believethat humans can learn to live with magic.† â€Å"Some of you are idiots and fools and are goingto die,† Delos said, without even looking. He stared at Maggie. She stared back at him.They were willing each other ashard as possible to understand. And I think he's got a stronger will, Maggiethought, as she broke the locked gaze and looked away, thumping the heel of a clenched fist against her forehead. No. That's not right. I'm Steely Neely and I nevergive up. If I tell him that some things are worth dyingfor†¦ But I don't think he's afraid to die. He's justafraid for me. And he just won't listen if I say that I'd rather die than see some things happen. Butthat's the truth. There are some things that you just can't allow to happen, whatever the cost. There are some things that have just got to be stopped. She froze, and the cell seemed to disappeararound her. She was seeing, in her mind's eye, an equallydark and uncomfortable little cart. And her ownvoice was saying, Jeanne. It's got to stop. Feeling very light-headed, she turned toward thebench. â€Å"Jeanne? Come over here.† Jeanne straightened and walked up doubtfully.She looked into Maggie's face. Maggie looked at her and then at Delos. â€Å"Now you show him,† she said in a voice thatwas like her own voice, but older and much grimmer, â€Å"what his Night People do to slaves who try to escape. Like you showed me.† Jeanne's expression was inscrutable. She went onstaring at Maggie for a moment, then she raisedher eyebrows and turned around. She was wearing the same slave tunic she hadbeen wearing for the last four days. She lifted it upin the same way and showed Delos her back. He took one look and reeled back as if she'd hit him. Maggie was braced, but even so the backlash ofhis shock and horror nearly swamped her. Shegrabbed on to the iron bars of the cell and waitedit out, teeth gritted while her vision went fromblack to red to something like a normal gray. â€Å"Who did this?†Delos managed finally, in a voice like ground glass. He was dead white, except forhis eyes, which looked black in contrast. â€Å"Who?† Jeanne dropped her tunic. â€Å"I thought you didn't care about vermin.† And she walked away without answering him, leaving him speechless. Maggie watched her sit down, then turned back. â€Å"Some things have got to be stopped,† she saidto Delos. â€Å"Do you see what I mean? Some thingsyou just can't let go on.† And then she waited. I knew he didn't know that kind of thing washappening, she thought, feeling vaguely glad in avery tired, sad, and distant way. But it's good to see it proved. The silence stretched endlessly. Delos was still staring at Jeanne. He had run ahand through his hair at some point; it was disheveled and falling over his forehead. The skin of hisface seemed to be stretched, very tight and his eyeswere burning gold. He looked as if he'd completely lost his bearings,and he didn't know what to trust anymore. And then he looked at Maggie. She was still standing there, waiting and watching. Their eyes met and she realized suddenly thatshe'd never seen him so vulnerable-or so open. But if there was one thing Prince Delos had, it was resolution. After another moment of helplessness, she saw him straighten his shoulders and draw himself up. And, as usual, he got directly to the point.†You're right,† he said simply. â€Å"And I was wrong. There are some things that have got to be stopped.†Maggie leanedagainst the bars and smiled.†I'll get the key,† he said, and then went on,briskly planning. â€Å"I want the three of you out ofthe castle, at least, before I confront Hunter.†Ã¢â‚¬ You can't do it alone,† Maggie began.Sheshould have known he'd immediately start arranging everybody's life again. â€Å"Especially not with yourpower blocked-â€Å" â€Å"There's no reason for you to be in any moredanger than you have to be,† he said. â€Å"I'll send youoff with some of my people who can be trusted-â€Å" â€Å"I'm afraid that won't be possible,† a voice saidfrom the corridor. It gave Maggie a horrible jolt. They were all tired,and all caught up in the moment, and none of themhad seen the figure until it was almost behindDelos. Hunter Redfern was standing there smiling. Sylvia was behind him. And behind them,crowdedtogether, were armed guards. â€Å"We've had to dispose of the few idiots who insisted on remaining loyal to you,† Hunter said amiably. His eyes were shining like the purest gold.†The castle is now under our control. But do go onwith your plans, it's very sweet to hear you trying to save each other.† â€Å"And it's no use trying to pretend,† Sylvia addedspitefully. â€Å"We heard everything. We knew you couldn't be trusted, so we let you come down here on purpose, to see what you'd say.† For someone who'd known Delos a while, shedidn't understand him very well, Maggie thought.Maggie could have told her that pretending was thelast thing that would occur to Delos. Instead he did what Maggie knew he would; he launched himself at Hunter Redfern's throat. Delos was young and strong and very angry but it was no contest. After Sylvia had squeaked and withdrawn, the guards all came to help Hunter. After that it was over quickly. â€Å"Put him in with his friends,† Hunter said, brushing off his sleeves. â€Å"It's a real pity to see my onlysurviving heir come to this,† he added, once Deloshad been kicked and thrown into the cell. For amoment there was that note of genuine feeling in his voice that Maggie had heard before. Then the golden eyes went cold and more bitter than ever. â€Å"I think tomorrow morning we'll have a very special hunt,† he said. â€Å"And then there will be onlythree Wild Powers to worry about.† This time, when the guards left, they took all theflares with them. â€Å"I'm sorry,† Maggie whispered, trying to inspectDelos's bruises by touch alone. â€Å"Delos, I'm sorry†¦I didn't know †¦ â€Å" â€Å"It doesn't matter,† he said, holding her hands.†It would have happened eventually anyway.† â€Å"For a vampire, you didn't put up much of afight,† Jeanne's voice came from the back of the cell. Maggie frowned, but Delos turned toward herand spoke without defensiveness. â€Å"That witch bound more than just the blue fire when she putthis spell on my arm,† he said. â€Å"She took all myvampire powers. I'm essentially a human until she removes it.† â€Å"Aradia?† Maggie said. â€Å"Can you do anything? Imean, I know only Sylvia is supposed to be able totake the spell off, but †¦Ã¢â‚¬  Aradia knelt beside them, graceful in the darkness. She touched Delos's arm gently, then sighed. â€Å"I'm sorry,† she said. â€Å"Even if I were at full power, there's nothing I could do.† Maggie let out her breath. â€Å"That's the only thing I regret,† Delos said. â€Å"ThatI can't save you.† â€Å"You have to stop thinking about that,† Maggiewhispered. She was filled with a strange resignation. Itwasn't that she was giving up. But she was very tired, physically and emotionally, and there wasnothing she could do rightnow†¦. And maybe nothing ever, she thought dimly. Shefelt something steadying her and realized it was Delos's arm. She leaned against him, glad of hiswarmth and solidity in the darkness. There was a tremendous comfort in just being held by him. Sometimes just having fought is important, shethought. Even if you don't win. Her eyelids were terribly heavy. It felt absolutely wonderful to close them, just for a moment †¦ She only woke up once during the night, and thatwas because of Delos. She could sense something in himsomething in his mind. He seemed to beasleep, but very far away, and very agitated. Was he calling my name? she wondered. I thought i heard that †¦ He was thrashing and muttering, now. Maggieleaned close and caught a few words. â€Å"I love you†¦ I did love you †¦always remember that †¦Ã¢â‚¬  â€Å"Delos!† She shook him. â€Å"Delos, what are youdoing?† He came awake with a start. â€Å"Nothing.† But she knew. She remembered those wordsshe'd heard them before she had actually met Deloson the mountain. â€Å"It was my dream. You were †¦ going back intime somehow, weren't you? And giving me thatdream I had, warning me to get away from thisvalley.† She frowned. â€Å"But how can you? I thought you couldn't use your powers.† â€Å"I don't think this took vampire powers,† he said,sounding almost guilty. â€Å"It was more-I think itwas just the bond between us. The soulmate thing.I don't even know how I did it. I justwent to sleepand started dreaming about the you of the past. Itwas as if I was searching for you-and then I foundyou. I made the connection. I don't know if it's ever been done before, that kind of time travel.† Maggie shook her head. â€Å"But you already know it didn't work. The dream didn't change anything.I didn't leave as soon as I woke up in the cart,because I'm here. And if I had left, I would never have met you, and then you wouldn't have sentthe dream†¦.† â€Å"I know,† he said, and his voice was tired and abit forlorn. He sounded very young, just then. â€Å"Butit was worth a try.†

Friday, September 27, 2019

Marketing Research assignment 2 Example | Topics and Well Written Essays - 250 words

Marketing Research 2 - Assignment Example The benefit of this test is that it is cheaper to implement compared to other standard market tests. The effectiveness of the test will be measured by the number of additional customers that are attracted by the free buffet offer. These can be considered as the dependent variables DV), and their number will indicate the success rate of the market test. It will also indicate the number of return clients, who can be associated with the offer of the free breakfast snack. 2. Design a test of a new pricing strategy for orange juice concentrate. The brand is an established brand, and we are only interested in testing the effect of a 5 percent price increase and a 5 percent price decrease. All other elements of the marketing mix will remain the same. This can be achieved through a standard market test. It is good to select specific outlets within the company’s distribution channels. The best way is to implement 5 per cent price increase in at least 10 major outlets, and implement a 5 per cent price decrease in a similar number of outlets. The selected outlets should be scattered adequately to represent the national market outlook. The selected outlets represent the Independent Variables. The best timeline that can give a clear response should be about 20 days. The performances of the selected outlets should be used to determine market response. Therefore, any increase or decrease in the number of customers represents the dependent variables (DV). This should then be compared to the performance of the other outlets that were not involved in the study within the same time

Thursday, September 26, 2019

History Women's History Museums Essay Example | Topics and Well Written Essays - 2000 words

History Women's History Museums - Essay Example Consequently, museums have become forums for different voices and viewpoints to be heard.2 With this, a new space for determining what constitutes museum artifacts and displays has emerged in the late 20th century on to the 21st century where historical research, the communities which they are located and museum standards interact to give way to dynamic representations of objects, people and ideas. Nowhere has the impact of these developments originated and in turn continue to enrich and widen in scope than in the field of women's history. In taking advantage of the opportunities presented by museums to carry women's history (the Museum of Victoria for example is visited by one million people), Lisa Dale wrote that we should all be involved in how history is presented.3 Interpreting and presenting women's history however according to Dale should go beyond being an intellectual sport. Museum historians need to work hand in hand with academic historians and scholars to devise methods so as to present to the public complex historical realities. A case of such cooperation is seen in the current oral history project of the Museum and La Trobe Library where students of Women Studies will conduct interviews in South Melbourne covering the period from the 1920s to 1970.4 The application of feminist theory has largely driven the changes the way historical realities are portrayed in museums, not... Seeing history through the lens of feminism and feminist theory Treating museums as text, curator as author and visitors as readers has enabled historian Gaby Porter to critique the set-up of museums where the representation of objects in display take precedence over unraveling of historical truth. She takes off from poststructuralist theory and on to a feminist approach where the relations of women and women are analyzed in the context of museums. 5 In traditional museums, relative to men's representation which are active, highly developed, articulated - women's historical History-Women's History Museums contributions are passive, shallow, muted and undeveloped.6 When viewed from a feminist perspective, museums ought to go beyond the seeming objectivity of displays to subjective spaces of interaction between visitors and the museum space and all its underlying processes of selection and representation. The historical truth becomes less solid as meanings are never permanent and are negotiable. The scientific and the artistic disciplines tend to blend, and themes depart from strictly chronological orientation7. For example in the exhibition called Putting on the Style at the Geffrye Museum in London, the display of homes in the 1950s resonated more of the personal lives of those who lived there rather than of the people's respective social status.8 On the other hand, the Story of Hull and Its People, the permanent exhibition at Hull Museum traces history over the last two hundred years yet shows more notably the cyclical passage from birth to death of people who were relatively unknown. 9 An even more forward

The Reality of Work Cultures in the Modern Economy Essay - 1

The Reality of Work Cultures in the Modern Economy - Essay Example Protestant work ethic and its impact upon the lives and attitudes to work of employees Sennett refers in his book to the Max Weber’s The Protestant Ethic and the Spirit of Capitalism as to an important illustration of two contrary ethical standards: self-fashioning and self-discipline (1998, 102). Based on this book, the Protestant work ethic implies that employees should not harry with their desire for self-fulfillment and gratification, rather, they should delay this desire to the end. According to the Protestant concept which is based on the religious pillars, people should have practiced self-denial in the present and sacrifice themselves every day thus proving their worthiness in the sight of God (Sennett 1998, 103). This ideology has been transformed into the â€Å"worldly asceticism† and in the workplaces people were focused on saving instead of spending, pursuing the long-term result and achievements (Sennett 1998, 103). Discipline as an act of self-punishment also was an integral element of the Protestant’s work ethic. The Protestant emplo yee was taking fully a responsibility for his/her lived time and judged morally based on this key criterion. Based on this concept every individual was morally responsible for the time and quality of work he/she performed during the working hours as well as for time he/she spent out of work: at home, with family and children, sleeping, having a rest, etc.

Wednesday, September 25, 2019

Discuss Tennessees labor laws and how these laws impact employers and Research Paper

Discuss Tennessees labor laws and how these laws impact employers and employees - Research Paper Example Since then no major changes took place in the current labor laws (Gould 47). The labor laws of the United States of America are mixture of federal and state laws. The labor laws of the US extend limited rights to the employees of federal government. The laws in vogue safeguard the interest of employees irrespective of federal or state laws and regulations. It provides protection to the employees of federal and state against any discrimination based on race, gender, cast, creed and age (Gould 62). The Lawful Employment Act came into being on 1st Jan, 2012 ensuring that all employers hired employees in Tennessee through rigorous selection process and strictly in accordance with the legal parameters (Tennessee: Wage and Hour Laws). Under the mentioned act, employees may take up the matter with the concerned authority for removing the work place employment discrimination and receiving unemployment compensation since it falls under the employment law. Further, employers are responsible to maintain safety and security standards work premises, ensuring fair wages, pre retirement and post retirement benefits etc., being part of legally provided rights (Tennessee: Wage and Hour Laws). Cited laws deal with the employer, employee’s action, legally entrusted rights and responsibilities. The laws in question could be a useful instrumental in maintaining cordial relationship between the employee and the employer (Tennessee: Wage and Hour Laws). Employers Tennessee laws are not bound to provide vacation benefits to the employees. However, if it is a part of approved policy of the employer or part of employment contract, it shall be honored. In approved policy of an employer permits accrued vacation pay to its employees, the company has to fulfill its commitment. An employer may offer its employees utilization of accumulated leave within the

Tuesday, September 24, 2019

Instructional Design Skills and Competencies Dissertation

Instructional Design Skills and Competencies - Dissertation Example This includes internal training courses, formal and informal mentoring, certification programs, and externally run training courses. Unfortunately, this is not the case for all faculty. Although these numbers have increased nationwide, when analyzing data from individual schools, there are many faculty who do not receive this training. The specific topic for this research is the skills that are needed for faculty who are involved in online course development, and the training that is needed to assist in this development. 1.4 Research Problem Write a brief statement that fully describes the problem being addressed. Present this in one sentence or no more than one clear concise paragraph. Through the past decade, the number of higher education institutions that offer online courses has increased, and there has been an increase of enrollment in these courses (Allen and Seaman, 2011). In specific colleges and universities, faculty members are faced with developing these courses without f ormal training in many cases. This lack of knowledge indicates a need for increased knowledge and skill building for all teachers developing and teaching online course. According to Allen and Seaman (2011), 65% of institutions surveyed indicated that online course delivery is critical to an institution’s long-term plans. Also, there has been an increase in acceptance of online courses (Carliner & Driscoll, 2009). Faculty is often responsible for creation, development, and management of online classes (Carliner & Driscoll, 2009), without formal training. Devries (2007) states that there is an assumption that ready-made software automates part of course development processes, leaving only the contributions of subject matter experts (SMEs), who are the faculty-designers. This usually is not true in practice. Although the software may use templates and other tools, faculty may lack understanding of how to use them (De Vries, 2007). Faculty-designers are often met with the tasks o f developing and managing course content, facilitating and recording student activity, providing consultation sessions for students with questions and concerns and developing meaningful learning activities (Ally, 2008). The need for faculty training in these areas is well documented (Ally, 2008; De Vries, 2007) and an effective training program to enhance the skills needed must be found. 1.5 Research Purpose Write a brief statement that fully describes the intent of the study or the reason for conducting the study. Present this in one sentence or no more than one clear concise paragraph. The purpose of this study is to understand the needs of faculty designers who teach and design online courses. The findings from this study will provide insight into instructional design skills currently used by faculty-designers of online higher education courses. It will also provide information about skills required to develop and manage online courses from the faculty-designer perspective. The f uture purpose of this research is to design a training program for a higher education institution where faculty need training. 1.6 Research Question(s) (What do you really want to know? The rest of this form derives from and should constantly be

Monday, September 23, 2019

Plutarch - Fall of the Roman Republic Research Paper

Plutarch - Fall of the Roman Republic - Research Paper Example Despite the person based accounts, which to an extent seem like a mere collection of biographies, Plutarch provides a detail discussion on the underlying forces and factors that undermined and eventually ended the Roman Republic. Plutarch discusses historical figures not as mere personages of history but as prime movers of events. Plutarch’s style in which discussions of historical events are pegged on the lives of individuals has influenced historical references up to today. An example is the analysis of the Agricultural Crisis in Rome where â€Å"Hannibal’s invasion had destroyed farms and farmland.†3 At the center of the Agricultural Crisis were the Gracchus4 Brothers, â€Å"Tiberius Gracchus elected tribune in 133 B. C. promised to help the farmers. He called for taking of public land and distributing it among the landless farmers.†5 This clearly contains Plutarch’s style wherein individual persons are at the center of major events most especially events that precipitated to the decline and eventual end of the Roman Republic. Moreover, analysis of the period of decline up to the end of the Roman Republic centers on the personas of the individuals that were identified to being so influential and powerful that their personality, life and ideas forged the destiny of Rome. â€Å"The disintegration of the Roman Republic is the first example in European history of the collapse of a constitutional system. One school of thought contends that individual generals and would be dictators like Julius Caesar and Pompey destroyed the traditional political system of Rome through ruthless ambition. According to this view, the Commanders of the Roman army, acting like feuding Mafia dons, turned their armies inward upon the Constitutional system.† 6 From another source, â€Å"Julius Caesar's adoptive son, Octavian, became, like Augustus, the first  emperor of Rome. According to modern ways of looking at things, this or the assassination of Julius Caesar on the Ides of March 44 B.C. marked the official end of the Republic of Rome.

Sunday, September 22, 2019

Merced County Health Status Essay Example for Free

Merced County Health Status Essay A community’s health can be established through a myriad of differing factors. Three specific factors that will help to determine the health of the county in which I live are community safety, disaster preparedness, as well as an analysis of the population. The community under review, Merced, is located in central California and made up of seventeen cities and communities whose individual populations do not exceed more than 75,000 and covers an area of approximately 1,972 square miles (United States Census Bureau, 2010) with a total population of approximately 255,793 people in 2010 (Merced County California, 2012). The first area of importance is community safety. It is important to beginning discussion with the one of the most basic of health indicators; the air we breathe. The air quality index in Merced County is 48, a median value that takes into account only the most hazardous air pollutants (Air Now, 2012). This value is only slightly lower than the air quality index of California, but is approximatly 30% higher than the national average (Air Now, 2012). Another important area that must be addressed is the water we drink. In Merced County most of our drinking water comes from groundwater sources which are collected by two public water systems. Most all areas in Merced County are affected by three different pollutants: Nitrates, Ethylene Dibromide (EDB), and Dibromochloropropane (DBCP) (Air Now, 2012). Although all three of the pollutants fall below the water standard or eliminated through the public water systems, these pollutants will continue to be an issue because EDB and DBCP were used by farmers for many years to fumigate crops. Another area of concern in community safety is the safety hazards within the sociocultural environment. The ability to work, shop, or simply ride your bike and feel protected within the area in which you live are important features in determining the health of a community. With 1. 2 police officers and 4. 4 sheriff officers per 100,000 people and an average response time of 3 minutes (Merced County Office of Economic Development, 2012); most people can be fairly confident that they and their property are protected. However, crime rates have risen in the past few years. In 2009, Merced County experienced 1,658 violent crimes; the majority of which involved aggrivated assult but also included 26 murders, 78 forcible rapes, and 276 robberies (United States Department of Justice, 2012). There were also 4,390 property crimes and 90 cases of arson (United States Department of Justice, 2012). Rate of offenses per 100,000 are as follows: violent 568. 3, property 567. 3, drug 512. 9, sex 37. 9, other 489. 1, and totaling 2,175. 5 per 100,000 (United States Department of Justice, 2012). Considering there are only 5. law enforcement officers per 100,000 people, it would appear as though crime will continue to rise for the foreseeable future. These numbers are especially troublesome considering budget cuts that will surely affect all public safety departments (Layoff Watch, 2011). There are a couple of ethnic groups within Merced County that feel especially vulnerable, the Hispanic community and the Asian community. The Hispanic community nearly makes-up 50 percent of the population and is congrigated in the poorest of neighborhoods. Yet another concern involving public safety is the ability to obtain medical services. Within Merced County there are only two hospitals that offer emergency medical service, Memorial hospital of Los Banos and Dignity Health of Merced. Memorial hospital of Los Banos is a relatively small hospital with the ability to admit a total of 46 patients (Memorial Hospital Los Banos, 2008). The emergency room has the ability to care for a total of 6 patient’s requiring immediate emergency care, but has the capability to fly patients out to other facilities if required. Dignity Health of Merced is the larger of the two facilities and cares for the majority of the population of Merced County. Dignity Health has a total of 194 beds available. Dignity Health has approximately 10,900 admissions per year and total emergency room visits equaling around 66,000 per year. On a typical weekend the emergency room will see about 250 patients between the hours of 7 a. m. and7 p. m. (M. Parker RN, personal communication, June 8, 2012). Also serving the community are 8 primary clinics. The majority of these clinics are located within the city limits of Merced and Los Banos. Those located outside of these locations will have to drive upto 30 minutes to obtain medical services. Merced County also has five psychiatric facilities, only 2 of which are capable of admitting patients. Country Villa Merced Behavioral Health Center has 96 beds available for the community and has the ability to care for long-term patients between the ages of 18 to 65 years of age (Country Villa Merced Behavioral Health Center, 2012). Marie Green Psychiatric Center is a smaller facility that has the ability to admit upto 20 patients between the ages of 18 to 65 years of age, but this is a short term facility that can only care for patients for up to 90 days. Currently, in the Merced County area there are no psychiatric facilities that have the capability to care for psychiatric patients under the age of 18 or over the age of 65. Emergency preparedness within Merced County is primarily controlled by the Department of Public Health. Merced County’s emergency preparedness was last updated in 2003 and in general addresses â€Å"preparedness, response, recovery, and mitigation activities† (City of Merced California, 2012). In the preparedness phase, activities are concentrated in advance of a disaster. Actions are focused on â€Å"implementing hazard mitigation projects, developing hazard analyses, developing and maintaining emergency plans and procedures, conducting general and specialized training, conducting exercises, developing mutual aid agreements, and improving emergency public education and warning systems† (Merced County California, 2003). In the response phase an emergency situation is imminent or likely to occur. During this stage the county initiates actions to increase its readiness. In the recovery phase the focus is to return public services to Merced county residents and return any area affected by the emergency to its previous condition. The mitigation phase occurs before and after emergencies. After a disaster or emergency, mitigation or alleviation, includes â€Å"reducing the impact of hazards that exist within Merced County† (Merced County California, 2003). Although Merced County Public Health Department concerns itself with the county as a whole, it must also make provisions for areas more susceptable to emergencies or areas where there is an increased difficulty to disseminate information. Within these areas there are disproportionate ethnic minorities. The two primary ethnic groups, hispanic and asian americans, are particularily at risk because of transportational and housing issues as well as dysfunctional attitudes toward disaster planning or preparedness. Within Merced County the Hispanic community makes up nearly 50% of the population and constitutes the majority of those living below poverty level. This translates into the majority of the population within the economically depressed areas having inadequate housing or malfunctioning transportation. When a disaster does occur, this group will be the hardest hit as they will not have the financial means to recover what they have lost. This group also has the highest potential for harm due to the inability to relocate to an area that is safe due to transportational issue. What places this group at highest risk are their attitudes toward disaster planning or preparedness. After speaking with six different families from a depressed area, all but one family put any thought into a potential emergency, and none of these families had money set aside for such a disaster (personal communication, June 1, 2012).

Saturday, September 21, 2019

Steganography Using Lsb Insertion Technique Computer Science Essay

Steganography Using Lsb Insertion Technique Computer Science Essay Steganography is a method used for hiding a message by fixing in a carrier data. There are two types of data. They are internal data and external data .The external information contains visible part or audible part of data which is not useful for data owner and the internal information contains embedded data. The techniques used in Steganography makes hard to detect hidden message within an image file. By this technique we are not only sending a message but also we are hiding the message. Steganography system is designed to encode and decode a secret file embedded in image file with a random Least Significant Bit (LSB) insertion technique. By using this technique the secret data are spread out among the image data in a random manner with the help of a secret key. The key generates pseudorandom numbers and identifies where and in which order hidden message is laid out. Steganography includes cryptography which is an advantage for Steganography .In cryptography, diffusion is applied to secret message.   INTRODUCTION: The Data transmitted comes in many forms and it is used for more than one application. Communications should be done secretly. Secret communication varies from bank transfers, corporate communications and credit card purchase. Steganography is an art of embedding a secret message into a normal message. Steganography is used in watermarking for protecting data copyrights .Unsurprisingly, methods of Steganography change because innocuous spam contents are growing frequently by embedded texts Cryptography is technique used to make secret message scribbled for third party and are normally used in internet. The encrypted message is targeted by attackers in cryptography because it hides the message content. An another data hiding technique known as watermarking used for embedding and hiding, some symbol data or digital manifest in the digital valuable data like photo picture, digital movie, musical sound etc. Watermarking purpose is mainly used to protect ownership or copyrights of the data. In this technique, hardness of embedded evidence and hidden evidence are very small and is important. In this technique the important information is present in external information which is visible or audible. In the Steganography technique, confidential information is made invisible to a human eye by embedding it as a dummy data such as a speech sound and a digital image. Steganography contains another research topic called as steganalysis which is used to find a stego file from the available files. Steganalysis is used in detecting suspicious image file. The suspicious image files are embedded with the crime associated information All traditional Steganography techniques have limited information-hiding capacity. These techniques can hide 10% or less than 10% data of a carrier data. The principle of these techniques is to replace frequency components of carrier or to replace LSB bits of multivalued image with secret information. Steganography uses image as a carrier data and it embeds secret information in bit planes .We can replace all noise like regions in the bit planes without disturbing the quality of image and is termed as B.P.C.S Steganography .BPCS Steganography is known as Bit plane complexity segmentation Steganography. BACKGROUND HISTORY: Steganography is derived from a Greek word which means as a covered writing or hidden writing. In Steganography stegos means cover and grafia means writing. THEORY: Steganography is used to hide confidential information from human eyes by embedding it in a carrier data such as digital image or speech sound. A carrier data is a color image having RGB color components in a multi-bit data structure. The embedded information is extracted using special extracting program and key .The techniques of Steganography are different from file camouflage or file deception technique. File deception is a technique used for hiding secret data in computer file and it almost looks like a Steganography. But, it is an trick to disguise a secret-data file as a normal file and is possible in files which have dont care option. For example, Word file or JPEG image OR MPEG will allow for adding an extra data (extension) at the end of a regular file. Even an extra data (which can be encrypted) are added, the JPEG image, word file or MPEG looks like the original image and original sound, or document on the computer. People may think this is due to Steganography. The lengthy files are easily detected by engineers. So, file deception and Steganography are different. The Steganography softwares that are available in the market are based on file deception. In Steganography, if output file size is increased by embedding the information then the program is called as File deception. A secret data can be made unreadable by encrypting the data. The secret data should be encrypted to make it unreadable for third party. With the help of data encryption, secret data can be safe. Data encryption is based on data scrambling and it uses a secret key. Data encryption can create a doubt to the people that owner of the data is hiding something in an image. In data encryption we can find easily that he is hiding something in a image. Therefore encryption of data is not enough. Steganography is the solution for data encryption. There are two types of data in Steganography .they are secret data and carrier data. Secret data is very valuable when compared to the carrier data. Carrier data is a type of dummy data which is not so important but it is needed. The data which is embedded is called as stego data.If we want to recover the secret data , we can extract that data from stego data.We need a special program or a key for data extraction.. The carrier is image data which has color components of red green and blue colors in 24 bit pixel structure. The figure below shows an example of carrier image and stego image. The secret data is embedded in stego image. Steganography is a method of hiding the secret data by fixing it in media data .For example in the figure a secret data is embedded but we cant find in which place the secret data is embedded. The Embedded data will be very safe in the Steganography because it will hide content of the message and location of hidden image. There are many methods to embed the data .but; it is very hard to find about the method used in embedding the message.. Steganography can co-operate with cryptography to embed the encrypted data safely. In Steganography , Stego data will not have any evidence about the embedded data. The Steganography user should discard the original carrier data after embedding such that it will not allow comparison of stego and original data. Embedded capacity should be larger. BPCS method is the method available method for image Steganography. If anyone detect the Steganography image, it is very difficult for him to retrieve the hidden image. There are three basic ways to hide a message in image. They are Injection, substitution and generation. Using Injection method we can find in which place data to be inserted and using substitution we can find least significant bits for hiding the message. Using generation method we can create a new file based on the hidden information. Method of implementation: Least significant bit insertion is one of the important methods of implementation. In this method, the LSB bits of byte are altered so that it form bit string and represents an embedded file. By changing the LSB bits, it will cause some small differences in color which are not noticeable to human eye. After that an image is compressed and a text message is hidden in image .In LSB method, LSB bits of the covered image is altered such that they form embedded information. Embedding a message into cover image will result a stego image. For normal vision, stego image looks identical as cover image; this is because of only small changes of pixel values. Therefore there is no significant difference. The embedded message is sequentially embedded in covered image so that it is easy for a third party to recover the message by retrieving the pixels sequentially starting from the first pixel of the image. Steganography uses a key which as a better security. It is difficult to recover the embedde d image without valid key. LEAST SIGNIFICANT BIT INSERTION Least significant bit insertion is the common technique used in Steganography. In LSB method, an image is used. An image is more than strings and string of bytes. Each byte in an image represents different colors. The last few bits in a color byte do not hold much significance as the first few bits. Therefore only two bits differ in last few bits that represent a color which is undistinguishable to human eyes. In LSB method, least significant bits of a cover image are altered such that we can embed information. The example shows how letter A is hidden in first 8 bytes of 3 pixels in a 24 bit image. Since the 8 bit letter A requires only 8 bytes to hide it, ninth byte of the 3 pixels used to hide the next character of the hidden message. Example shows that in a 24 bit image, letter A can be hidden in first 8 bytes of 3 pixels Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A: 01000010 Result: (00100110  11101001 11001000) (00100110  11001000 11101000) (11001001  00100110  11101001) The five underlined bits are the 5 bits which were altered. With LSB insertion technique, on an average half of the bits of an image are changed. A is a 8 bit letter and requires 8 bytes for hiding. The ninth byte of 3 pixels is used for hiding next character of secret message. The slight variations of this technique allows a message to embed into two or more least significant bits per bytes, and increases the information hidden capacity of the cover object .but cover object is degraded and easily detectable.LSB insertion is easy to implement and is also easily attacked if the modifications are done wrongly. Improper modifications in color palette and simple image calculations will destroy hidden message. Image resizing and image cropping are some examples of image manipulations. Applications of Steganography: Steganography is applicable the following areas. 1).Private communication and secret data storing. 2).Security of data. 3).Accessing the control system for distributing the digital content 4).Media data base systems. The application area of Steganography differs based on the features utilized in a system. 1).Private communication and secret data storing: The secrecy of embedded data is important in this area. Steganography provides capacity for hiding the existence of secret data and Steganography makes very hard to detect the embedded data in a image and Steganography strengthens the encrypted data. In Steganography, select a carrier data according to the size of embedded data. Carrier data should not be effective. Now embed the secret data using an embedding program with the help of a key. To recover the embedded data, an extracting program is used with a key. Before starting the communication in this case, Key negotiation is used 2).Security for a data: Steganography is used in military applications for maintaining the secret data .In military secret information should be very secure to avoid sudden attacks on them from enemies. Steganography can hide the existence of contents of data but it cannot hide the presence of data. Data should not be larger than carrier image .Steganography strengthens the secrecy of the data. Fragility of the embedded data is advantage for this application area. Embedded data can be rather fragile than robust. But embedded data is fragile in most of the Steganography programs. No one can change or tampered the data .If anyone changes or tampers the data, and then it can be easily detected by the extraction program. 3). Accessing the control system for distributing the digital content : In this application, embedded data is explained to publicize the content. Here embedded data is hidden data. Digital contents are being commonly distributed by internet. Some music companies release the music for free in some web sites and in some sites it charges for the music downloads. Digital contents are equally distributed to user who accesses the web pages. Even it is possible to send digital content to e-mail messages it takes more time. We can to upload any content on the web page; we can issue a special access key to extract the content. In Steganography a prototype of an access control system is developed for distributing the digital content through internet. This can be explained by following steps. 1).The content owner will classify his digital content in a folder and embeds the folder according to Steganography method by accessing the folder access key and uploads embedded content on web page. 2).On the web page, owner will explains the contents clearly and publicises it worldwide and gives his contact information on web page. 3).The owner will receive access request from the customer who visited that web page. Then owner creates an access key and provides it to the customer for free or charge. 4).Media database systems: In this type of application secrecy of data is not important, converting two types of data into one data is important. Photos, Pictures, movies and music will come under media data. For example the media data for a photograph will contain about the title of the photo and date and time of a photo and it also contain about the camera used to take that photograph. à £Ã¢â€š ¬Ã¢â€š ¬ Data hiding in .bmp images: There are several formats exists for an digital image. .BMP, JPG, GIF are some formats .Each format is associated with advantage and disadvantages. Because of its simplicity, windows BMP file offers more advantages. It has an advantage of widely spreader and the information contained is minimum .Bmp file is a binary file.bmp file is divided into four sections such as file header, image header, color table and pixel data. The file header is used to know about size of the image and to learn where actual image data is located within the file. The Image header gives information about the image and its data format such as width and height of the image. Image header also gives information such as how many bits are used per pixel and checks whether the image data is compressed data or uncompressed data. Depending on the image data, color table will be present. When color table is not present, a set of bit masks are used to extract the color information from the image data. When dealing with 24-bit image, color table is not present. When dealing with 8-bit image, color table consists of 256 entries. Each entry consists of four bytes of data. In these four bytes of data, first three bytes are blue, green and red colors values .The fourth byte must be equal to zero because it is not used. In 8-bit format, each pixel is represented by single byte of the data which is index in to color table. In 24-bit format, each pixel I represented by RGB component values .The pixel data holds entire hidden data and there are changes by one pixel value either positive or negative. MATLAB: The MATLAB is a language for technical computing. MATLAB integrates computation, visualization and programming in a easy way in which problems and solutions are expresses in mathematical notation. Typical uses include Math and computation Data acquisition Algorithm development Modelling, simulation and protyping Data analysis, exploration and visualization Application development MATLAB is a system whose data element is an array without dimensions. It allows in solving computing programs such as Matrix and vectors formulations. It writes program in a scalar language such as FORTRAN within a fraction of seconds. MATLAB can be abbreviated as a matrix laboratory. MATLAB was developed to access matrix software. The matrix software was developed by linpack and eispack projectsdeveloped .MATLAB engine incorporates LAPACK and BLAS libraries by embedding the state of art in software for matrix computation. Matlab has evolved over a period of years with input from many users. MATLAB has become a standard tool for advanced courses such as engineering, maths, and sciences .MATLAB is like a tool for high research productivity, analysis and development. MATLAB SYSTEM: MATLAB system consists of five main parts: 1).desktop tools and development environment 2).MATLAB Mathematical functions library 3).MATLAB language 4).graphics 5).MATLAB application program interface 1).Desktop tools and development environment: MATLAB is a set of tools and facilities that helps to use and to become more productive with MATLAB function and files. In MATLAB most of the tools are graphical user interfaces and includes MATLAB desktop, command window, editor and debugger, code analyzer and browser for viewing help, workspace and folders. 2). MATLAB Mathematical functions library MATLAB is a huge collection of computational algorithms ranging from elementary functions such as sum, sine, cosine and complex arithmetic to more sophisticated functions like matrix inverse, matrix Eigen values, Bessel functions and fast Fourier transforms 3). MATLAB language MATLAB language is an high level matrix language with control flow statements, functions, data structures, and object-oriented programming features. It allows small and large programming .In programming in large is to create complete large and complex application programs and programming in small is to create quick and dirty throw away programs. 4). GRAPHICS:- MATLAB is having extensive facilities to display vectors and matrices as graphs. It includes high level functions for two dimensional and three dimensional data visualization, image processing, and presentation graphics .MATLAB also includes low-level functions and allows in customizing appearance of graphics to build complete graphical user interfaces on MATLAB application. 5).MATLAB Application program interface (API):- It is a library which allows us to write C and FORTRAN programs to interact with MATLAB .It also includes facilities such as calling routines from MATLAB, calling MATLAB as a computational engine and for reading and writing MATA FILES. MATLAB working environment: MATLAB DESKTOP:- It is the main application window in MATLAB. This window consists of five sub windows such as current directory, command history, workspace browser, command window, and a figure which is shown while displaying a graphic. The User types commands in command window and expressions at the prompt. The output of these commands is displayed. In MATLAB, workspace is defined as a set of variables created by user in work session. These variables are shown in workspace browser. The workspace browser launches array editor by clicking on a variable. In array editor, we can edit properties of a variable and we can also get information about the variables. In MATLAB, the current directory tab is above the workspace tab. The Current directory tab shows contents of current directory and its path is shown in current directory window. In windows operating system, the path c:MATLABwork indicates work as a subdirectory and MATLAB as a main directory and is installed in c drive. In current directory window, click on an arrow button to see recently used paths. To change a current directory, click on a button on right side of a window. To find M-files and other MATLAB files, MATLAB uses a search path that is organized in system files. The files that are to be runned in MATLAB should locate in the current directory or in directories available on search path .Math work related tools and files that are supplied by MATLAB are already exist in search path. On desktop from file menu select set path to modify or to add search path or to see which directories are existing on search path. To avoid repeated changing, the current directory adds a commonly used search paths to directory. In MATLAB, the commands used by the user in current and earlier sessions are recorded in command history window. Using right click on command history window, we can select and re-execute previously entered MATLAB then it launches a menu. For execution of the commands select the options from menu. We can select various options from menu for execution of the commands which are useful in implementation of various commands. MATLAB EDITOR TO CREATE M-FILES: The MATLAB editor is used for creating M-files. The graphical window will appear in a separate window or a sub window. The M-files are represented as extension .m on desktop. MATLAB editor is having some options to debug a file and saving a file and to view the file. In differentiating various codes MATLAB editor will perform some simple checkings. In MATLAB, text editor is used to write and to edit M-functions. To edit a text in MATLAB, type as EDIT at prompt then it an M-file is opened with a filename. Therefore it is ready for editing. The files should be in a search path or in a current directory. How to get help in MATLAB: Use the MATLAB help browser for any help in the MATLAB. The help browser will be opened in a separate window when we click on symbol (?) on desktop toolbar or in command window type as help. The Browser Help is displayed separately as a HTML document .HELP browser is incorporated into MATLAB desktop .HELP pane and DISPLAY pane are the two panes that are available in HELP browser. HELP pane is used in finding the information and display pane is used for viewing the information. To perform a search, Navigator pane is used. CONCLUSIONS: This project explains techniques for embedding a data in an color image and also some features are added which include file types excluding bitmap images and Steganography methods. Data extracted from cover image depends on pixel values of an image CODING : %I=imread(sravs.bmp); %%read an image I=uigetfile(.bmp,select the iamge); I=imread(I); b=1; disp(orginal text to be embedded); %txt= textread(message.txt, %c, whitespace , ); fid = fopen(message.txt); A=fread(fid,schar); fclose(fid); A1=char(A); disp(embedding text); txt=A1; txt N = 8*numel(txt); %%%%%%% to find out the total no of elements for the text S = numel(I); %%%% total no of elements for the image if N > S warning( Text truncated to be within size of image );%%%%%%if text size is more than the image size %%%%%% process block segmentation txt = txt(1:floor(S/8));%%%%%% dividing into 8*8 blocks for the text N = 8*numel(txt); end %%%%% initializing the total no of bits for the text and the image p = 2^b; h = 2^(b-1); I1 = reshape(I,1,S);%%%%% resize the elemnts for the new image size %figure ,imshow(I1,truesize); addl = S-N;%%%%%%%take the difference of the elments for the imagfe and the text dim = size(I); I2 = round(abs(I1(1:N)));%%%%%%take the complexity of each block si = sign(I1(1:N)); for k = 1:N if si(k) == 0%%%%%%%replace ment of the bits for the complexity blocks si(k) = 1; end I2(k) = round(I2(k)); if mod((I2(k)),p) >= h I2(k) = I2(k) h; end end bt = dec2bin(txt,8);%%%%%% bint = reshape(bt,1,N); d = h*48; bi = (h*bint) d; %%%%%%remove the complexity blocks of the image and replace with the non complexity blocksof image I3 = double(I2) + bi; binadd = [bi zeros(1,addl)]; I4 = double(si).*double(I3); I5 = [I4 I1(N+1:S)]; intl = reshape(I5,dim);%%%%%%resize the image and display the stego cotents figure,imshow(intl);title(stegnograph image); %return figure,imshow(I);title(original image); I=im2bw(I); %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%decoding%%%%%%%%%%%%%%%%%%%% siz=length(txt); bsiz = 8*siz; n = numel(intl); if bsiz > n error(Size of text given exceeds the maximum that can be embedded in the image) return end dim = size(intl); addl = n-bsiz; I1 = reshape(intl,1,n); I2 = round(abs(I1(1:bsiz))); p = 2^b; h = 2^(b-1); rb = zeros(1,bsiz); for k = 1:bsiz I2(k) = round(I2(k)); r = rem(I2(k),p); if r >= h rb(k) = 1; end end rbi = (dec2bin(rb,1)); rbin = reshape(rbi,siz,8); rectxt = (bin2dec(rbin)); disp(retrived text from the steg image); rextxt=char(rectxt) return