Featured Post
The butterfly and the banana skin
The banana skin lay slap blast in the street. Tommy a jail superintendent, riding his bicycle on his way once more from the shops. Where he ...
Thursday, October 31, 2019
Homeland Security - Predaredness & Prevention Assignment - 1
Homeland Security - Predaredness & Prevention - Assignment Example The same is the case with the US government, which has established various law enforcing agencies as well as collective security programs and strategies to strictly observe and enforce the writ of law as well as security measures to combat with any challenges occurred in the country. National Incident Management System (NIMS) and Incident Command System (ICS) are also included in the list of security providing models of the USA, which are working at local, state and country levels, introduced and established in the aftermath of 9/11 catastrophe in order to tackle with the terrorist attacks and natural disasters. â€Å"The National Incident Management System (NIMS) provides a systematic, proactive approach to guide departments and agencies at all levels of government, nongovernmental organizations, and the private sector to work seamlessly to prevent, protect against, respond to, recover from, and mitigate the effects of incidents, regardless of cause, size, location, or complexity, in order to reduce the loss of life and property and harm to the environment.†Since NIMS and its subsidiary agency i.e. ICS concentrate their attention upon rapid flow of communication between different agencies and authorities to act swiftly in order to cope up with any emergency situation, they are rendering extraordinary services on the security plans launched by the government. These agencies are highly supportive in responding to the call of the individuals and institutions undergoing any disturbance and turmoil at national, regional, local or community levels. Both these models lay stress upon applying modern equipments to provide a platform from which the rescue and security organizations remain in close contact with one other, and can abruptly lend a helping hand to one another at the hour of need. It is therefore, the institutions and organizations request NIMS from controlling the fire break out to flood rescue, and from hurricane disaster to the terrorist attacks. It is a
Tuesday, October 29, 2019
Energy Efficient Middleware for Networking Protocols Essay
Energy Efficient Middleware for Networking Protocols - Essay Example This is to do with low-power design in all layers of the wireless network protocol. With integration of new technology with time, the modern infrastructure calls for efficient measures in the field of Network Protocols. The published work is critical in ascertaining the relevance of wireless services expansion in cellular voice; personal communication services (PCS), mobile data and wireless LANs. The authors to this work are researchers with extinguished experience in technology advancement. Christine E. Jones is an expert in Computer Science with a Masters in Computer Science form Washington State Universty, Pulliman. She currently works with BBN technologies in Cambridge doing extensive research computing and application in mobile and networking. Krishna M. Sivalingam is a computer scientist with a PhD. and Msc. Degrees from Staten University of New York at Buffalo. He has extensive research work in Electrical and Computer Science that has gave him interest in wireless network, op tical wavelength division multiplexed networks and performance evaluation. He has published and edited a number of works inclusive of optical WDM networks in 2000. His extensive work has been recognised by getting patents in wireless networks- 3 patents and several papers including 18 journal publications. Prathima Agrawal is an extinguished scholar and is the Vice-president of the Internet Architecture Research Laboratory and Executive Director of the Computer Network in Research Development at Telcordia Technologies. She heads research studies and has been involved with ITUSMO joint research: which is a third generation wireless access system research between Telcordia and Toshiba Corp. Her major research interests fall in computer networks, mobile and wireless computing and communication system and parallel process. She has over 150paper publications and received or applied for over 50 patents. Jyn Cheng Chen is a computer and electrical engineer academician. He has been a resear ch scientist since 1998 in Applied Research at Telcordia technologies. He has participated in ITSUMO as a senior architect and implementer working on QoS for mobile and wireless IP networks, IP-based station design, SIP-based mobility management and multimedia applications. He has also researched on energy efficient MAC protocols for wireless ATM networks at AT&T Labs and Whippany, NJ. The review of Research under Consideration The survey for energy efficient network protocols for wireless networks has been sought after and compiled with respect to a rich source of references. The study incorporates the works of notable researchers and scientists with respect to network protocols and wireless networking. With increased use of mobile networking, there greater need for efficiency in energy consumption owing to the complexity of the shortage and aftermath of energy use. The effective works cited in this study include Agrwal et al. (1998) and (1996) that clearly enhance the mobile power efficiency in video processing and mobile radio systems respectively. Energy efficiency is critical to enhance data passage and storage; therefore, improving the reliability in transportation and hand off is greatly influenced by the energy consumption, availability and reliability. Balakrishnam et al. (1995); Feeney (1999a,b); Gordon et al. (1996) among others has well been used to illustrate this. The use of
Sunday, October 27, 2019
Impact of Internet Usage on the Academic Performance
Impact of Internet Usage on the Academic Performance INTRODUCTION Problem Statement: The impact of internet usage on the academic performance of adolescent students at St. Stephens College . Statement of Problem: The study investigates how students of St Stephens College are affected by the use of the internet. St. Stephens College, located in Princes Town, Trinidad is known as one of the highest ranked academic institutions in the country. The school comprises of approximately 750 students, most of which excel at their studies. Most, if not all of the students attending the school has had some contact with the internet which could have an effect on their academic performance. It is believed that the internet helps students to be more involved academically, therefore improving the quality of work done by the student. There is also the fact that students can misuse the internet, be it cyber bullying or being distracted by it, which can negatively impact on them. Purpose of Study: This study is geared towards determining if the use of the internet by students of St. Stephens College has impacted upon their academic performance and if so, how. Educational Value: The information gained from this study can be used to re-assess the importance and significance of the use of the internet by students. The information can help to inform individuals of how to designate their time on the internet and also help promote proper use of the internet throughout various schools or even throughout the country. Research Questions: Is there a relationship between the use of the internet and academic performance of students? Have students become dependent on the internet? Has the use of the internet promote or hinder the academic performance of students? DEFINITION OF KEY TERMS Internet A global system of interconnected computer networks which bear a variety of information and services. Academic performance- How well a student is accomplishing his or her tasks and studies. Student A person studying to obtain a higher education LITERATURE REVIEW The internet is a global linking of devices that allow information transfer. The internet was established in the early 1960s by the U.S department of defence (Schneider, Evans and Pinard, 2006) for military purposes. It is a fact that the internet is one of the greatest advancement in the world of information technology as it has become a useful instrument that has fostered the process of making the world a global village. The Internet provides an environment in which millions of people participate and engage in the creation and exchange of information (Rose Fernlund, 1997). It allows for the exchange of information and for interaction among individuals in real time, making transport and distance no longer a problem. There are approximately 2.4 billion people on earth who has access to the internet with over 70 percent of them using the internet at least once a day. This amounts to a total of 144 billion emails being sent every 24 hours (internet world statistics, 2012). What started out as a hobby for some computer literate people has become a social norm and way of life for people around the globe (Boyd, 2007). The Caribbean consist of approximately 42 million people, 32.4% of which, use the internet (internet coaching library , 2012). Internet use has become very popular in many areas as well as in education in recent years. Accordingly, Internet access in schools has increased greatly over the last 20 years (Berson, 2000). In a research article, Ying-Fang Chen and Samuel S. Peng (2005-2006 academic year juniors) A study done on a variety of randomly selected University students in Taiwan showed that heavy Internet users and non-heavy Internet users differed significantly on a number of dimensions. Non-heavy users had better relationships with administrative staff, academic grades and learning satisfaction than heavy Internet users. Tuckman (1975) defined academic performance as the apparent demonstration of understanding concepts, skills, ideas and knowledge and proposed that grades clearly depict the performance of students. Heavy users were more likely than non-heavy Internet users to be depressed, physically ill, lonely, and introverted. According to a journal of Education and Sociology done in Pakistan, Muhammad Musaud Asdaque, December, 2010. The use of the internet is one of the major factors affecting the academic performance and social life of university students. The number of hours spent on internet will affect the grades of students depending on if the internet is used for study purpose or social purposes. Many studies have been conducted regarding the type of information the end-users seek and obtain on the Internet and in which circumstances they prefer electronic sources to paper sources(Tenopir et al.2003).Also , students can gain from others knowledge and experiences, participate in chatrooms, share ideas and solutions. Teens spend approximately 2.3 hours online a day, 80 percent of that time, on social networking sites (Roiworld, 2010). Students who multi-task between social networking sites and homework are likely to have 20% lower grades than a student who does not have a social networking site in visual range (Lenhart, A, 2009, April). Also , many researchers believe that excessive use of the internet has the potential to become an addiction (Griffiths, 1995, 2000). Some, involvement on the Internet begins to have serious, negative consequences. When such consequences are minimized or ignored while Internet use increases, Internet dependence is occurring. As of 2005, it is estimated that 6% of users are Internet dependent (Villanova Counseling Center). The internet can act as a major distraction to students if not properly managed. However, some studies show that students primary use the internet for school work specifically, searching the web for information needed for school projects (Kraut et al, 1996). This in turn, can improve the academic performance of a student. METHODS OF DATA COLLECTION PRIMARY SOURCES: In order to carry out the internal assessment on the impact of internet usage on the academic performance of adolescence students of St. Stephens College, research had to be done using both primary and secondary sources of data. The primary data collection source used was a questionnaire since it allowed the person time to answer questions and it was also cost effective. The questionnaire was also used because it allowed for data to be analysed easily and was not time consuming. A questionnaire is a means of research, consisting of a series of questions and other prompts for the purpose of gathering information from respondents. The questionnaire used consisted of 14 questions, 3 of which were open ended questions. The open ended questions were used to obtain qualitative data from the respondents. The other 11 questions were closed ended and were used to obtain quantitative data on the topic. A total of 60 questionnaires were distributed randomly across forms 1 to 6 students. The ran dom distribution ensured that there was no bias in the selection of candidates since each person had an equal chance of being chosen. SECONDARY SOURCES: The secondary sources of data included the internet, books and texts. This was done to gain a better understanding of the problem which was being investigated PRESENTATION OF DATA Map Showing Location Of Princess Town In Trinidad figure 1 figure 2 figure3 figure 4 figure 5 figure 6 figure 7 Figure 8: Diagram showing students who use the internet for aid in research Figure 9: Diagram showing other means of research used by students INTERPRETATION OF DATA Based on the results obtained from the 60 students investigated at St. Stephens College, it was found that most students ( 68% ) partake in online activities more than once per day while only 4% of them do not partake at all. This shows that while most students do have internet access , some do not and are therefore not affect by the effects of the internet. As indicated by figure 2, a majority of the students who do have access to the internet also spend between 1 and 3 hours online everyday ( 45 ) while 12 spend more than 4 hours online. The internet is used by students in various fashions as seen from figure 3. The number of students using the internet for education, entertainment, and communicating with others are almost corresponding. Coupled with the other activities as, passing time, shopping and work/business, it can be seen that most time spent on the internet is not for educational purposes. When the data from figure 2 and 3 are combined , it can see that 33 students students spend more than 2 hours online everyday and that most of that time would be spent idle and not constructive. However , from figures 8 and 9 , it can clearly be seen that all of the students that were selected, use the internet for aid in research, while in figure 9, students use more than one souurce of research. This included 32 choosing books, 21 using newspapers and 7 use journal as their source. Figures 8 and 9 show that students do accomplish work on the internet but not all information can be sourced there. Figure 4 shows that while there are 21 students scoaring acceptable grades at end of the term examinations (60-100%), there is still an overwhelming number of students performing under par (0-60%). This includes 39 of the 60 students. The table show that there is likely a link between the use of the internet and academic performance of the students. Larger quantities of students idle online resulting in greater quantities of students scoaring below average. The location of internet usage usually used by students are shown on figure 5. Most students use the internet either at their homes oor by a family members home. This accounts for 52 of the 60 students. The home is a place where most students relax and feel free and this may lead to them allocating more time idle on the internet as compared to a student who uses the internet at school where the use of the internet is controlled. The large quantities of students using the internet at home may be directly linked to the below average end of term examinations grades. Many of the students indicated that the internet was useful when it came towards academic work (95%), while the other 5% said otherwise according to figure 6. On figure 7, almost equal quantities of students both disagree and agree with the statement that the advantages of the internet outweigh the disadvantages. A total of 23 students agreed while 22 students disagreed , 15 students were neutral about the topic. The data shown from both figures 6 and 7 indicate that while large quantities of students do believe that the internet is useful towards academic work , it is easy to be distracted and held at an disadvantage instead of focus and be at an advantage . DISCUSSION OF FINDINGS The main objective of this study was to carry out an investigation about the impact of internet usage on the academic performance of students at St. Stephens College. The findings from the research done, inficated that the increased quantity of students using the internet corresponded to the high numbers of students whith low academic scores. This also corresponded to the research article done by Ying-Fang Chen and Samuel C.Peng (2005-2006) as their candidates who had heavy internet usage performed poorly with respect to academics. From the research done it was also found that students with internet access spend more time online, idle than doing assignments. Therefore students without internet access would spend more time constructive. One of the objectives of the research was to determine if students had become dependent on the internet . Althought many students admitted that the internet does help with research, many of them also refer to sources such as books and journals. This data lead to the conclusion that while students are quite heavily dependent on the internet , they are not totally dependent and are capable of using varyous sources for research. Overall, the results of this study compared to the literature review show that students are more negatively impacted upon by internet use as the internet, althought helpful at times, it a distraction to students. CONCLUSION The research study has clearly outlined the impact of the internet on the students of ST. Stephens College. It can be concluded that althought internet usage does have its benefits, the internet impacts more negatively on students as they are more distracted by online activities and spend less time doing work. Also, it can be concluded that althought students are heavily dependent on the internet, they are not fully dependant since they are capable of using various sources for information. LIMITATIONS Firstly, the sample for the study was selected from only one institute, therefore generalization of the findings to the total population is limited. Also, the study investigates the impact of the internet on academic performance. Other variables such as health, gender and social well-being may also affect performance, therefore future studies should not be as limited. RECOMMENDATIONS To improve the study done, more questionnaires could have been distributed to improve the accuracy of the study. Also, some students could have been interviewed to obtain a better qualitative report. To reduce the negative effect of the internet on students, schools can inform parents to manage supervise their childs internet usage to ensure that time is not wasted. BIBLIOGRAPY: APPENDICES Questionnaire This questionnaire is designed to evaluate the relationship between internet usage and academic performance. Your cooperation in completing this study, your honest answers to the following questions would be greatly appreciated. As all responses are confidential, please do not sign your name. What is your age? ____________________________ Gender? Male Female How often do you use the internet? More than once per day Once a day Not at all Per week On average how many hours per day do you spend on the internet? Less than 1 hour 1-2 hours 2-3 hours More than 3 hours Where do you use the internet? Home School Family members home Cafà © Library What do you primarily use the Web for? (Please check all that apply.) Education Shopping/gathering product information Entertainment Work/Business Passing time Communication with others (not including email) Gathering information for personal needs Do you use the internet for aid in research? Yes No If so please state why. _______________________________________________________________________ How much does the internet help you academically? Very little Not at all A moderate amount Very much Do you use any of the following as means of research other than the internet? Books Newspapers Journals The advantages of the internet outweigh the disadvantages. Strongly agree Agree Neutral Disagree Strongly disagree How do you perform in your end of term exams? 0-25 marks 45-60marks 35-45marks 60-85marks 85-100 marks Do you believe that the internet can have an effect on academic performance? _________________________________________________________________ If so please state why?
Friday, October 25, 2019
Lorraine Hansberrys A Raisin In The Sun - Dreams Essay -- English L
A Raisin in the Sun - Dreams Dreams The play A Raisin in the Sun demonstrates the hardships and successes of the members of a black family living in the south side of Chicago during the 50’s. For the Youngers, dreams are life. They are what bring the family together and pull it apart throughout the play. Each member of the family has a particular dream, and each of those dreams is like a wall being built between its owner and various other members of the family. Everyone’s dream straddles the line between selfishness and goodness for the family; however, some, like Walter’s, seem to be pulled more by the gravity of selfishness. Both Mama and Ruth share the same dream, but each has a slightly different reason for her preference. Walter’s dream is the most apparent from the beginning of the play, and he presses his family and himself until he accomplishes his goal. Walter focuses so much on his dream, however, that he leaves no room for his family. One may ask, why is he so intent on his dream? Walter is out to prove something to himself, to his family, and to the world. He needs to show people that he is a man and is responsible. No one ever trusted Walter with anything important as can be seen when he says, â€Å"Ain’t nobody with me! Not even my own mother!†(Hansberry, 85). In all of his life, Walter was not allowed to grow into a man and bear the responsibility of his life and the lives of his family. Mama has always been the head of the family, and Walter never got the chance in his childhood to take responsibility with less important matters; therefore, when he is handed a check for $6500, Walter does what he never had the chance to do before. Walter’s father was a proud man who wanted his family t... ...s possessions in the minds of many people. They can tear apart a family like the Youngers, or they can grasp and control a mind like that of Walter. However, dreams are items not easily left behind, and if they were, what would become of the people who owned them? Dreams make up a part of the life of humans that without, who can say where life may lead a person. Probably nowhere. For without dreams, a human has no ambitions and no desire to make any impact upon the world. Without dreams the human race would be one of idle creatures that desire nothing more than to be like the cockroaches in this play, searching only for the necessities of life between periods of sleep. Maybe that would be better, though, for someone like Walter; after all, what has he done but be a burden upon society? Or will he someday succeed because of a dream, if only through his son?
Thursday, October 24, 2019
Influence of alcohol on youths life Essay
Alcohol abuse among the youths has become a major concern in the recent past in various parts of the world. Alcohol is one of the most abused drugs with more than 60% of homesteads having access to alcohol. While in the past alcohol was not termed as a drug, today it is the leading cause of many deaths in the United States especially among the youths. Alcohol use and abuse by the youths has significant impact on their mental development and other health issues. Alcohol has been known to compromise the capability of a person to perform some of the normal tasks and also other complex tasks, the ability brain cells to retrieve information and it also slows information recording by the brain cells. Alcohol also has the effect of degrading coordination and slowing down reaction process. Apart from destroying the brain, alcohol abuse leads to other physical health problems as well as social and economic problems (Buddy, para 2). Currently, most youths drink due to peer influence or just to appear superior to their peers. Drinking has become a major problem in most colleges as more young people engage in alcohol drinking. In America for example, research has established that almost 50% of all students consume alcohol even before they reach their 8th grade (National Institute on Alcohol Abuse and Alcoholism (NIAAA), para 1). This trend continues as the students continue to 12th grade with the frequency at which alcohol increasing as students’ sets on adolescent and early adulthood. Some of the negative impacts associated with youth drinking include risky sexual activities, high risks to societies and individuals through road accidents and subsequent deaths, alcohol stimulated or induced brain damage, increased crime such as homicide, assaults and rapes all associated with alcohol, poor academic performance and poor general health of youths who take alcohol among other effects (National Institute on Alcohol Abuse and Alcoholism (NIAAA), para 1-2). This research paper will thus evaluate the various negative effects that alcohol abuse has on youths’ lives as well as their families and the society as a whole. Effects of alcohol abuse on youths As mentioned earlier, alcohol abuse is the leading cause of deaths in the United States as well as other parts of the world. Unlike in the past where terminal illnesses were ranked as the first killers in the world, today alcohol has been identified as the major killer around the world a scenario which has been attributed to the exposure of individuals to alcohol. Alcohol is one of the oldest drugs in the world. However, its abuse especially among the youths has increased in the recent past and its effects are felt across all nations (Felsted, pp 16). One of the major impacts of alcohol abuse on youth’s lives is that it interferes with the normal development process of the brains. Current research has established that brain development continues through the early twenties in a person. However, the pre-frontal cortex which is the part which is responsible for controlling cognitive ability and reasoning develops later in life as it takes a longer time to mature. Drinking in the early ages by a person (before the complete development and maturity of the brain) thus affects a person memory as it damages the region of the pre frontal cortex. Most of the youths who begin drinking do so at tender ages when their brain cells are still at the development stages. Brain cells develop when individuals are young and excessive drinking interferes with this development making young people more ineffective and unproductive. Research has established that most of the youths start drinking before the age of 16 (Barnes & Brown, pp 45). During this period, it is the time when brain cells fully mature and intoxication with alcohol reduces or interferes with hormone release and functioning. Excessive use of alcohol reduces the capability of the brain to coordinate and integrate information thus interfering with good decision making process (Barnes & Brown, pp 45). Academic degradation is another effect of alcohol abuse amongst the youths. As mentioned above, alcohol interferes with effective brain development as well as the ability of the brain to integrate and coordinate information to make meaningful translation of assimilated information. The ability of a person to comprehend and perform complex tasks and also to control impulses is controlled by the pre-frontal cortex which is destroyed by early age drinking. Alcohol abuse also slows down a person’s ability to be creative and make mature and meaningful decisions. Most of the youths who abuse alcohol are in their college levels or junior classes. Due to the negative impact alcohol abuse has on brain development and concentration capability, such youths end up performing poorly in their course work. Poor academic performance has various implications both in the short run and long run life of a youth. Mostly, students who perform poorly in class or course work end up getting poor grades which in turn forces the students to retake a course or a unit. Students who are forced to retake a course usually find it to be offensive and end up dropping out of school. This has further implications in their later life as it is difficult to find a descent job without good grades. Also, students who perform poorly in their academics are unlikely to find good jobs to support them and their families in the future. They thus end up with blue collar jobs which are not capable of supporting them financially in the long run (Buddy, para 4-6). Poor academic performance by youths and the subsequent loss of welfare has significant impact not only to the youths but also the communities in which they live in. Youths are the energetic and creative generation which is entitled to take up community development projects and to take care of the younger ones in their families in cases where parents are old or incapacitated. When youths are involved in alcohol abuse, they are unable to bring development in their communities thus affecting the overall development of these areas. Also, the government loses out as there are few youths to employ in more sophisticated careers thus end up importing professionals which can be costly. Alcohol has not only destroyed the future lives of youths but it has also destroyed the welfare of the families, societies and the overall economic growth of a country (Barnes & Brown, pp 76). Another negative impact of alcohol abuse among the youths is that it leads to loss of jobs thus economic welfare. Alcohol is very addictive and once addicted; a person becomes alcohol dependence and cannot work effectively without it. Once in the blood stream, alcohol changes the normal functioning systems and makes it to become dependent on alcohol for functioning. Most of the young adults have lost some prestigious jobs due to alcohol addiction and abuse. Once fully addicted, a person cannot perform his or her duties and thus end up being retrenched or laid off from their work places. Loss of economic welfare renders a person incapable of feeding and taking care of his or her family leading to marital problems which may even lead to divorce or separation. Domestic violence associated with alcohol and drug abuse is the main reason given by most people while filing for a divorce. Alcoholics tend to become violent and unruly which have negative impacts on the children development. Most children who are brought up in families characterized by domestic violence tend to become reserved and perform poorly in class and they may even become violent later in their lives. Young married couples who abuse alcohol are more likely to raise unhealthy families and are even more likely to be violent and disorderly (NIAAA, para 5). Alcohol abuse among the youths also leads to increased crime and homicide cases. In America for example, over 36% cases of homicide which are reported are related to alcohol intoxication and abuse. 0% of these cases are reported to have been committed by young persons under the age of 25 years whose history verify excessive use of alcohol (Felsted, pp 22). Alcohol has different effects on adults and youths which make these two groups of individuals to behave different while under its effects. In adults, alcohol acts as a sedative which makes the adults to be more controlled even after they are totally drunk. On the contrary, alcohol acts as a stimulator for young people which make them to drink past the necessary or legal limits. Alcohol brings some kind of energy in young people which stimulates them to do things they would rather not do while sober. This explains why more homicide cases which are reported to be carried out by young people are linked to alcoholism. Other crimes which are commonly committed by young persons while under the influence of alcohol include rape cases, assaults and robberies. In America for example, over 45% of all rape cases are committed by young adults between the ages of 19 and 23 years while 44% of robberies and over 35% of assaults are all alcohol related. This is still the trend in most of the colleges where over 90% of all college rapes and violence are directly related to alcohol abuse. Most of the young persons who are imprisoned for homicide cases and rape cases attribute their actions to alcohol intoxication (Felsted, pp 25). Alcohol abuse amongst the youths is also an avenue through which most of the young persons are introduced to hard drugs such as cocaine, brown sugar, heroine and bhang. Young people are usually very eager and anxious to try out new things and love being adventurous. However, under the influence of alcohol, they become more vulnerable to be introduced to other dangerous drugs which are more fatal to their health as well as their lives. Under the influence of alcohol, young people are unable to make rational decisions which make it easy for them to fall prey of hard drugs abuse. Most of the young people who are today addicted to drugs say they were first introduced to such drugs during a drinking spree. Once introduced to such drugs, it becomes difficult to quit and even treat. Other health complications may arise which may not only be costly to treat but may lead to death. Drug addiction is hard to quit hence it can easily destroy the live of the youth (Barnes & Brown, pp 109). Death is also another negative impact of alcohol on youths today. Alcohol intoxicates the mind making a person to act and behave irrationally. As already mentioned, youths are in their development stages and they are very energetic, curious and explorative. Unlike their counterpart adults, they tend to make decisions at impulse without thinking of the consequences that may accrue. Most of the youths who commit suicide are said to have prior being intoxicated with alcohol and other drugs. Alcohol is a leading cause of suicide cases which are reported around the world. Apart from suicide, most youths also meet their death while driving under the influence of alcohol. It is normal for the youths to explore and try out different things to satisfy their curiosity. Drinking is one of the means of doing this and at times they end up driving under this condition. This is dangerous as a person is not mentally and physically stable to drive which leads to major road accidents and deaths. Accidents caused by driving under the influence of alcohol are usually fatal and may cause further harm to other motorists and pedestrians as well. Families end up losing their children in such accidents all due to alcohol abuse. Another influence of alcohol on youths is that it leads to increased sexual activity amongst the youths which exposes them to dangers of contracting sexually transmitted diseases some of which may be terminal such as AIDS. Alcohol intoxicates a person and hinders rational thinking and decision making. Under the influence of alcohol, youths engage in sexual activities without reasoning or even taking precaution. This exposes or makes them vulnerable of contracting sexually transmitted diseases. Currently, most of the persons living with HIV/AIDS virus are young people and they attribute it to alcohol and drug abuse. Such diseases are terminal and before a youth realizes he or she is infected, he can pass it over to others especially when drunk. Once infected with sexually transmitted diseases especially those which are terminal, a person feels worthless and may even become ill to an extent that he or she cannot work normally or may even commit suicide. Youths who are energetic, creative and future leaders and pillars of the world thus end up dying due to alcohol abuse (NIAAA, para 7). Alcohol also leads to poverty both for the youths and their families in that once a youth becomes infected with sexually transmitted diseases; their families are forced to cater for him which requires finances. Alcohol also has other health issues in the lives of youths. Alcohol is the leading cause of liver cirrhosis and kidney failure problems. Such diseases require a lot of money to treat and usually lead to diversion of money from other family welfare issues. This may easily lead to family poverty thus further complications in family matters. Alcohol abuse among the youths also leads to stress among the family members as they try to help the addicted person. Apart from economic constraints in the family for medical care, excessive alcohol especially amongst the youths makes them to become unruly and disorderly. They may also become abusive both physically and emotionally and sometimes sexually. This may cause trauma in families and may even attract legal suits against the perpetrator. Most of the youths are incarcerated as a result of alcohol abuse. This is also costly to their families as well as the youths (Felsted, pp 43-46). Alcohol drinking by the youths also affects their reproductive and maturation systems. During puberty and adolescence, young people experience rapid growth and set the onset of maturity to adulthood. During this growth and development process, different hormones are released to aid in maturity of an individual and development of reproductive system. Alcohol destroys or tampers with the production of growth hormones thus slowing growth and development of productive organs, bones, and muscles. Excessive alcohol intake by youths especially in males can cause impotence or immaturity in development of sexual organs. Women who take excessive alcohol during their youth may also become infertile or develop other fertility complications in the future. This affects the future reproductive health of an individual as such people may become incapable of procreating. This is also a major reason for family breakups and divorces in the world (Barnes & Brown, pp 116). Another heath effect of alcohol intake among the youths is that it lowers the immune system. Exposure to alcohol especially during the youthful years leads to suppression of the immune system of an individual making such a person vulnerable to illnesses and diseases. Chronic exposure to alcohol changes the pattern in which hormones are released in the body. Hormones are the ones which stimulate the immune system in the body and once they are altered, the immunity of a person is affected greatly. Low immune system exposes a person to various kinds of health risks and diseases such as liver damage (NIAAA, para 9). Alcohol abuse by youths affects their behavioral development. Usually, youths who are under the influence of alcohol tend to be rowdy and disorganized and pick fights with almost everybody even their parents and teachers. In colleges, such students’ education is terminated which may mean end of their careers and aspirations. Termination of education also means that they cannot get better paying jobs due to lack of proper school qualifications and certificates. Alcohol makes the youths behave in an immature and irresponsible manner despite where they are. Behaving irresponsibly also has legal implications on youths. Most of the rowdy youths who become a public nuisance are picked up by the authorities and may be taken to rehabilitation centers or juvenile courts. This delays their education and prolongs their time in school which in some instances can be humiliating especially when a student is schooling with younger students. Such students may end up dropping out of school which further decreases their chances of getting good jobs. Alcohol generally leads to poverty in the long run for the youths (Felsted, pp 67-68). Conclusion Youth drinking has become a major concern in most parts of the world due to the negative impact alcohol has had on the young generation. The youth comprise of over 30% of the total population and they comprise the future generational leaders. Alcohol has however changed some of the youths and corrupted their energetic and agile minds rendering such youths almost useless to the global economy. Alcohol abuse among the youths is the leading cause for their deaths, poor performance thus poor paying jobs for the youths, diversion of family financial resources to cater for huge medical bills associated with alcohol related ailments, diseases and rehabilitation costs. Effects of alcohol on youth’s awareness campaigns should be planned to ensure that the future generation is protected.
Wednesday, October 23, 2019
Economics Internal Assessment Essay
The article discusses the effects of a severe flood in the areas of Thailand to the rice production. The rice production falls to 22 from 23 million metric tons. Supply is quantity of goods and services that producers are willing and able to produce at a given price and time period. The decrease in supply of rice in Thailand is shown by the following graph: The graph above shows that the effect of flood in Thailand decreased the rice crop’s supply. The supply curve shifted to the left from S1 to S2, moving the equilibrium point from point E1 to point E2. The equilibrium price then rises from P1 to P2 and the equilibirum quantity moves to the left by 1 million metric ton. The increase in the price of rice brought advantages to the country. One of it is the increase in the total revenue of rice producers. Rice is a commodity good where the price elasticity demand is inelastic. Price elasticity demand is the responsiveness of quantity demand to the change of price. Inelastic refers the condition where the quantity demanded is less responsive to the change in price. The following graph shows an inelastic demand curve of rice market. As the total of producer’s gain is greater than the total number of loss, the producer receives an advantage of higher revenue from the tragedy in Thailand. Total revenue is the result of the multiplication of the quantity sold to the price of the product. Despite the advantage, the rise in price of rice has brought disadvantage to the customers. As the quantity supplied of rice is decreased, therefore they are unable to buy a larger quantity of rice and as its price goes up it increases their portion of real income spent on rice, as it is a staple food. Thus, it results to the opportunity cost of decreased remaining real income that could be spent on other goods. Opportunity cost is the cost of the best alternative good sacrificed when a choice is made. Due to opportunity cost, the producers of non-commodity products would then be harmed as the quantity demanded for their product falls and therefore their total revenue decreases. To survive, producers will raise the price and thus harm the consumers. Thus, a solution shall be made to avoid further loss of customers. One of them is to apply a maximum price of rice in the country. Maximum price is the price set up by the government below the equilibrium price in order to help the customers, due to the high prices of certain commodity products. As seen on the graph, the maximum price is set at Pmax, below the equilibrium price of Pe. With the imposition of the policy, the customers are able to purchase rice at low price. However, with rice supplied at the maximum price, customers are demanding rice at point QD, while the quantity supplied is at Qe, which leads to a shortage. Shortage is the excess demand of goods and services. In consequence, to satisfy the demand of customers, black market might arise. Black market is a situation where the product is sold illegally at a higher price than Pmax. The seller of the rice might also apply unfair practices to customers such as rationing, where the amount of product is shared equally among customers, creating limitation of consumption. Another solution to avoid shortage is to import the supply of rice from overseas. Import is when a country purchase goods and services overseas. The supply curve then shifts to the right and Pmax becomes the new equilibrium price, thus black market and rationing would not arise. Though it would still bring disadvantage to the domestic producers of rice. The imported rice would be a new substitute good to the high-priced domestic rice. The quantity demanded for locally produced rice will decrease and thus the total revenue of the local producer decreases. Another disadvantage is the occurrence of trade deficit, because the country’s import increases and we assume the export remains constant. Trade deficit is the negative balance where the country’s import is greater than it’s export. Looking at the advantage given by maximum price solution, it is more beneficial for Thailand to increase the producer’s revenue rather than to prevent illegal practices. Thus, implying maximum price as a solution is more effective compared to importing supply of rice.
Tuesday, October 22, 2019
Unit 4 Discussion Example
Unit 4 Discussion Example Unit 4 Discussion – Coursework Example Unit 4 Discussion It takes an average of five seconds in order to decide whether to continue using the site or leave. Therefore, websites should not only be appealing to the user, but also have clear purpose, user friendly, and quick to load. Such a website should persuade visitors to visit the page in future. On the other hand a bad website usually has confusing layout, user unfriendly, unclear, use of and unbearable colors. An example of an excellent website is YouTube. YouTube is a video sharing website and supports different video technologies. This is a good website because it contains good animation aspects, attractive color coding, good template and it is user friendly. The site also opens fast and provides the user with different options of the subject one is searching for. The layout of the site is excellent and one is able to select the item being searched easily. The website has meaningful graphics and compatible on dissimilar browsers (Hurley, Chen, & Karim, 2014). Heaven .internetarchaeology.org is an example of a bad website. The website is disorganized with poor color scheme. The website is slow to load with poorly laid out content. Visually, it is extremely unappealing and it is poor to navigate. This means that the site is user unfriendly due to poorly optimized images. Additionally, the website has left out crucial information. One cannot tell exactly what it entails thus inconclusive (Heaven.internetarchaeology, 2014). It is evident that an excellent website attracts the intended target audience easily. There are excellent tips for designing excellent websites like, selecting and sticking to a good color scheme. This means that one should not change colors on every single page. One should select three principal colors to utilize. Secondly, the navigation system should be user friendly. Lastly, it is imperative o ensure that the content of the website is easy to understand and with the right font. By following these tips, one will be ensured of designing an excellent website (Martin, 2012).ReferencesHeaven.internetarchaeology. (2014). Love You. http://heaven.internetarchaeology.org/heaven.html#button Hurley, C., Chen, S., & Karim, J. (2014). YouTube. Retrieved from https://www.youtube.com/Martin A. (2012). 1O Tips: Designing a Good Responsive Website. Retrieved from basenew.net/2012/12/11.html
Monday, October 21, 2019
PhD proposal - The human rights in the middle east before and after Arab revolutions The WritePass Journal
PhD proposal - The human rights in the middle east before and after Arab revolutions Executive Summary PhD proposal The human rights in the middle east before and after Arab revolutions , written by the Human Rights Watch organisation, looked specifically at the uprisings in the Middle East and raised questions as to how this would potentially impact on human rights, within the region[6]. According to the report, it was recognised that the Arab Spring was hugely influential in the development of human rights, in the region; however, it was also stated that creating a democratic, self-respecting state was not something that would happen in a matter of a few months, despite the revolutionary nature of the changes. It was noted in this report that a region which has previously been subject to a dictatorial regime, when left to behave independently, does not necessarily mean that there will be an automatic improvement in human rights; therefore, the difficulty for the path from the current situation to creating a democratic and fair society should not be underestimated[7]. Other research in this area has suggested that the dramatic events which took place in 2009 and 2011 actually arose over a prolonged period of time and did not suddenly arise from nowhere, as the media reports may have suggested, at the time. By looking at instances of human rights’ violations prior to the uprisings and the way in which various different third-party organisations were becoming increasingly involved in providing security within the region, it could be argued that the events which took place, in December 2010, were merely the final step towards liberalisation and were not actually as dramatic as originally suggested[8]. The issues that have arisen in the Middle East will be considered in the context of wider theoretical perspectives of human rights and how these rights emerge within modern society as well as how they should be protected. For example in the case of Marx it was argued that the only reason that human rights needed to be established at all was to support the capitalist developments and this reliance on natural rights should be viewed as paramount[9]. Other appropriate theories that will be drawn on in the wider discussion is that of the socialist concept which suggests that basic human rights area duty of society and basic levels should be established as a matter of political urgency[10]. When looking towards the future, there is considerable uncertainty from academics and practitioners as to how this revolutionary period is likely to play out, in the future and whether or not these dramatic changes in the region are going to create a suitable framework for the protection of human rights, or whether there is a danger that the situation will become worse, before it gets better. This presents the argument that whilst dictatorial rule can be damaging to human rights, creating such a high level of uncertainty within the region can also create similar problems[11]. Proposed Time Frame It is anticipated that the research will take place over a period of three years, with the timeframe being necessary, in order to explore the potential changes and to observe how the region develops, in the coming months, which may be hugely influential to the ultimate findings of this research. The main period of the research will be spent analysing the existing position, drawing on all current literature in this area, before identifying how the situation is now developing and whether or not the suggested theories associated with the development of human rights in the region are being experienced or not, in practice, as time goes on. Due to the transient nature of this research, it is anticipated that several aspects will need to be revisited, on an ongoing basis, and it is therefore a relatively time-consuming project, albeit crucially important, at this dynamic period of time. Ethical Issues and Potential Problems Dealing with issues such as human rights, particularly in a volatile political arena, has substantial ethical issues and care must be taken to ensure anonymity, particularly when collecting any primary research that may be available. Gathering data in this area is likely to be emotive and personal; therefore, ensuring sufficient balance of research will be a critical aspect of presenting the most balanced viewpoint possible, as regards to future options[12]. Indicative References The references identified here are the starting point of the research and it is likely that this will be extended substantially, as the research is undertaken. Arthur, Paige. 2009. How transitions Reshaped Human Rights: A Conceptual History of Transitional Justice. In Human Rights Quarterly, 31:2, May, pp. 321- 46. Bentham, Jeremy 1987 Anarchical Fallacies; being an examination of the Declaration of Rights issues during the French Revolution, in Jeremy Waldron (ed.),Nonsense Upon Stilts: Bentham, Burke and Marx on the Rights of Man, New York: Methuen, p.69. Berger, Lars. 2011. The Missing Link? US Policy and the International dimensions of Failed Democratic Transitions in the Arab World. In Political Studies, 59:1, March, pp. 38-55 Bevernage, Berber. 2010. Writing the Past out of the Present: History and the Politics of time in Transitional Justice. In History Workshop Journal, 69, Spring. Blackbum, Robin. 2011. Reclaiming Human Rights. In New Left Review, 69, May-June. Dembour, Marie-Benedicte. 2010. What Are Human Rights? Four Schools of Thought. In Human Rights Quarterly, 32:1, February, pp.1-20. Fletcher, L., Weinstein, H. Rowen, J. 2009. Context, Timing and the Dynamics of Transitional Justice: A Historical perspective. In Human Rights Quarterly, 31, pp. 163-220. Human Rights Watch (2013) Annual Report 2013 Available at: hrw.org/news/2013/01/31/world-report-2013-challenges-rights-after-arab-spring Husak, Douglas 1985 The Motivation for Human Rights, 11 Social Theory and Practice, 249-255 Langlois, Anthony J. 2003. Human Rights without Democracy? A Critique of the Separationist Thesis. In Human Rights Quarterly, Vol 25: 4, November. MacQueen, Benjamin. 2009. Democracy Promotion and Arab Autocracies. In Global Change, Peace and Security, 21:2, June, pp. 165-178. Meister, Robert. 2011. After Evil: A Politics of Human Rights. New York: Columbia University Press.
Sunday, October 20, 2019
Understanding Delphi Project and Unit Source Files
Understanding Delphi Project and Unit Source Files In short, a Delphi project is just a collection of files that make up an application created by Delphi. DPR is the file extension used for the Delphi Project file format to store all the files related to the project. This includes other Delphi file types like Form files (DFMs) and Unit Source files (.PASs). Since its quite common for Delphi applications to share code or previously customized forms, Delphi organizes applications into these project files. The project is made up of the visual interface along with the code that activates the interface. Each project can have multiple forms that let you build applications that have multiple windows. The code thats needed for a form is stored in the DFM file, which can also contain general source code information that can be shared by all the applications forms. A Delphi project cannot be compiled unless a Windows Resource file (RES) is used, which holds the programs icon and version information. It might also contain other resources too, like images, tables, cursors, etc. RES files are generated automatically by Delphi. Note: Files that end in the DPR file extension are also Digital InterPlot files used by the Bentley Digital InterPlot program, but they have nothing to do with Delphi projects. DPR Files The DPR file contains directories for building an application. This is normally a set of simple routines which open the main form and any other forms that are set to be opened automatically. It then starts the program by calling the Initialize, CreateForm, and Run methods of the global Application object. The global variable Application, of type TApplication, is in every Delphi Windows application. Application encapsulates your program as well as provides many functions that occur in the background of the software. For example, Application handles how you would call a help file from the menu of your program. DPROJ is another file format for Delphi Project files, but instead, stores project settings in the XML format. PAS Files The PAS file format is reserved for the Delphi Unit Source files. You can view the current projects source code through the Project View Source menu. Although you can read and edit the project file like you would any source code, in most cases, you will let Delphi maintain the DPR file. The main reason to view the project file is to see the units and forms that make up the project, as well as to see which form is specified as the applications main form. Another reason to work with the project file is when youre creating a DLL file rather than a standalone application. Or, if you need some startup code, such as a splash screen before the main form is created by Delphi. This is the default project file source code for a new application that has one form called Form1: program Project1;uses Forms, Unit1 in Unit1.pas {Form1};{$R *.RES}begin Application.Initialize; Application.CreateForm(TForm1, Form1) ; Application.Run; end. Below is an explanation of each of the PAS files components: program This keyword identifies this unit as a programs main source unit. You can see that the unit name, Project1, follows the program keyword. Delphi gives the project a default name until you save it as something different. When you run a project file from the IDE, Delphi uses the name of the Project file for the name of the EXE file that it creates. It reads the uses clause of the project file to determine which units are part of a project. {$R *.RES} The DPR file is linked to the PAS file with the compile directive {$R *.RES}. In this case, the asterisk represents the root of the PAS file name rather than any file. This compiler directive tells Delphi to include this projects resource file, like its icon image. begin and end The begin and end block is the main source code block for the project. Initialize Although Initialize is the first method called in the main source code, it isnt the first code thats executed in an application. The application first executes the initialization section of all the units used by the application. Application.CreateForm The Application.CreateForm statement loads the form specified in its argument. Delphi adds an Application.CreateForm statement to the project file for each form thats included. This codes job is to first allocate memory for the form. The statements are listed in the order that the forms are added to the project. This is the order that the forms will be created in memory at runtime. If you want to change this order, do not edit the project source code. Instead, use the Project Options menu. Application.Run The Application.Run statement starts the application. This instruction tells the pre-declared object called Application, to begin processing the events that occur during the run of a program. Example of Hiding the Main Form/Taskbar Button The Application objects ShowMainForm property determines whether or not a form will show at startup. The only condition for setting this property is that it has to be called before the Application.Run line. //Presume: Form1 is the MAIN FORM Application.CreateForm(TForm1, Form1) ; Application.ShowMainForm : False; Application.Run;
Saturday, October 19, 2019
The Heart Symbol Essay Example | Topics and Well Written Essays - 750 words
The Heart Symbol - Essay Example As a religious symbol, it entails a powerful tug to express and convey a message to the observer the greatness of God’s love for his children. In the Christian religion, the symbol of the Sacred Heart stands for the three trilogies; faith, hope and charity. It conveys four great messages; God’s movement towards humankind through Jesus’ pure heart, the movement of the human hearts toward God, the joining together of human heart with God, and the joining together of human hearts in sacred friendship and brotherhood. Ancient Egyptians called the heart symbol Ieb (â€Å"Heart†), believing it was the center of all consciousness, the center of life itself. The heart religion is also used as an icon in other religions like Buddhism, Islam, Taoism and etc. Generally, the heart was depicted and understood as the center of a human’s being and consciousness. In more realistic depictions of the human heart though, morbid messages of death and violence are conveyed, which is in contrast to the usual messages associated with the symbolic heart. Unusual presentations of the heart symbol also exist. For example, people from Sweden associate the heart symbol to restrooms or toilets and defecation. The heart symbol has evolved from being religious icons. The heart symbol has also evolved in its use of slang language, the slang expression â€Å"I â™ ¥ U†(I love you or I heart you) is gaining popularity today in expressing love or affection with occasionally an implication that the feeling is shallow or immature. The slogan "I NY" (I love New York), is a well known pop-style icon that directly promotes the urban pride of New York. No matter how the heart symbol is depicted or illustrated, its impact and power on religion and contemporary views is undeniable. A brief look at a heart symbol brings an unmistakable instant message of affection, totaling to love. For that, it is continually used over time, slowly evolving and taking different forms, bringing with them new ideas. List of References "Symbols 20:18". Online Encyclopedia of Western Signs and Ideograms. 7 May 2006.
Friday, October 18, 2019
Risk Assessment For nonprofit hospital Essay Example | Topics and Well Written Essays - 1750 words
Risk Assessment For nonprofit hospital - Essay Example Evidently, the industry is highly vulnerable to information theft more than ever before. In modern healthcare settings, risk factors are impulsive and hence comprehensive risk assessment programs are essential to meet the challenges. According to the current day concept, risk assessment is not simply a precaution but a preventive healthcare approach that mitigates the impacts of a number of risk factors (The National Patient Safety Agency, 2007). Why Risk Assessment It has been stated that â€Å"each technical advance brings new security holes†(Rogers, 2011, p. 2). According to the writer, storing data over the internet involves incessant threat from hackers and malware. Burger (2010) describes the Kern medical center’s intense struggle with computer virus to regain its data, for the virus had downloaded ‘tons of porn documents’ and crashed all computers causing great dilemma. The incident has been cited by many experts to show that hospital data is always vulnerable to identity theft. For instance, Fell (2010) also points out that hospital computer systems are under the threat of information theft referring to the mayhem caused by virus at Kern Medical Center. According to the officials of UC Davis Police Department, the author says that "Hospitals are a soft target where a cyber attack can cause a lot of damage quite easily†(as cited in Fell, 2010). ... 3-5), the business environment highly involves intense competition and technical complexity which raise considerable amount of vulnerability risk to organizations of every type. Hence it is important to have a reliable risk assessment program for every firm to ensure the security of their data and other areas of organizational functions. And risk assessment in the view of the writers is â€Å"a systematic process for describing and quantifying the risks associated with hazardous substances, processes, action, or events†(Covello & Merkhoher 1993, p.3). Risk Assessment Tools There are certain effective free vulnerability scanning tools that can help non-profit organizations to address this issue. Nessus is one of the most important security vulnerability scanning tools. The website gives very detailed information about the vulnerability scanning tool-Nessus. The site has included several frequently asked questions and their answers along with the basic instructions for its user s. A close analysis of Nessus’ official website gives a clear picture of its total functions (Nessus). The relevance of Nessus has been well described in Rogers (2011). According to the author, tools like Nessus have been helping organizations to assess the vulnerability of their systems. It can also be used to check for misconfiguration vulnerabilities like open mail relay and missing patches (p.291). Evidently, Nessus is widely accepted as the most comprehensive vulnerability scanning program available today, for it helps clients to assess the level of their system’s vulnerability to data theft or virus attack (Nessus: online encyclopedia). The website, SecTools.Org conducts regular surveys to identify and list the community’s favorite software through multiple
Sexual Assault of Children and Youth and Other Sexual Offenses Essay
Sexual Assault of Children and Youth and Other Sexual Offenses - Essay Example Sexual assault is not common only in women. Today, wives, children, grandmothers, mothers, and even boys and men face sexual assault. The belief is that co-workers, classmates, neighbors, or a stranger would commit a sexual assault, but it is also possible that a family member or friend, or relative to sexually assault someone. "Sexual assault of children is a crime that our society abhors in the abstract, but tolerates in reality" (Burgess and Groth 15). Incest is one of the forms of sexual assault of children. Incest is when there is sexual activity between close relatives, which is illegal or taboo in the society. Sexual abuse of children can include trickery, sexual contact by force, bribery where there is a difference in age, power, size, or knowledge. Sexual abuse in a particular child could be once or multiple incident over a long period of time. It is found that abuse is usually committed by a person who knows the child. The abuse committed on a child can increase over time, especially if the abuser is a part of the family or a close relative. Prostitution, exhibitionism, and pornography are some ways in which children are abused other than the sexual assaults mentioned above. When people think of a child molester, they imagine an ugly old man taking children away by giving them some candy. No one pictures their neighbor, mom, dad, or uncle. This misconception has been dismissed. A child molester can come from all walks of life and all social and economic groups. They can be rich, poor, male, female, religious or non-religious, from any race or culture. Children can be molested by strangers or people they don't know and by people they know, like friends, relatives, or caregivers. Though majority of the people found guilty of sexual offence to children are men, women also molest children. Child molesters can be divided into two groups based on their behavioral patterns. A small percentage of child molesters who have a life long attraction to children, these people do not get attracted to adults. Majority of child molesters have adult partners and do not have an exclusive attraction towards children, also, they do not molest children multiple times. Sometim es an adult molests a child of the same sex, however, they need not be homosexual. Though it is believed that child molestation occurs when children are picked up from the street and molested forcibly, in the majority of child molestation cases, adults seduce children through delicate persuasion and intimidation and are usually known to the child. Child molesters who do not know their victims use methods like force, tricks, or bribery, or pretend to be friendly, to attract their victim. A child molester has many different characteristics. The child molester is usually married, prefers the company of children than adults, are often homosexuals and sometime bisexuals as well, they often wish to work for programs involving children, feel the want to have an emotional relationship with children, sometimes collect photographs of their victims and also collect child-adult pornography and child erotica, may be alcoholic, or a drug addict, may offer to take children out for walks or picnics, and many more such traits are examples of characteristics of child molesters. There are various definitions of the term pedophilia or paedophillia found in law enforcement, the
Managing Diversity at Cityside Financial Services Essay
Managing Diversity at Cityside Financial Services - Essay Example Ethical issues in organizations touch on the workers honesty, respect and trust. Ethics also deal with the way an organizations leadership conducts its affairs and the type of leadership adopted and the culture in the organization. An example of an ethical issue is whether the managers should seek the views of the other workers or who should make decisions. Failure to engage all members of the staff in decision making is an ethical issue in which the managers should reflect on whether what they are doing is good or bad. The choice of management’s decision cannot be resolved in a court of law although this influences the motivation in an organization. The other example of an ethical issue is on how an employee behaves towards their seniors. For instance when the opinion of an employee is ignored in a meeting despite this observation being helpful to organization can strain the relationship between the management and the other workers but one cannot be resolved in court. Impacts of diversity on human capital management and development in an organization According to Choi and Rainey (2010), the American workforce is continuously becoming more diversified due to greater access of equal employment opportunities for the minorities and women. Choi and Rainey (2010) describe that early research on workplace diversity focused on the individual and organizational outcomes; concluding that diversity provides a great opportunity and challenge to the organization. Consequently they argue that understanding the impacts of diversity on the organizational results such as employee satisfaction and organizational performance is critical. Choi and Rainey (2010) affirms that researchers have come to a... Diversity at workplace is can be an important aspect in ensuring organizational effectiveness. However, if diversity is not properly managed it could lead to conflicts and miscommunication leading to poor team work and problems in management. The laws require all organizations to be diverse by complying with the provisions of equal opportunities commission. Discrimination may not be intentional in all circumstances since implementation of some organizational policies may lead to disparate impact and disparate treatment. In the case study of CitySide Financial Services, the bank is locking out African-American from holding managerial positions in the External Deposits units in a claim of trying to be responsive to the kind of customers served in the unit. To deal with ethical and legal issues that can arise in an organization, businesses need to seek the opinion of a legal expert. Moreover, organizations can manage diversity through adoption of a lean management hierarchy that coordin ates and resolves conflicts with it.
Thursday, October 17, 2019
Copyright Research Paper Example | Topics and Well Written Essays - 1250 words
Copyright - Research Paper Example This is usually for a short period, with the aim of allowing the inventor to get reimbursement for their unique work. Inventors are individual like an author of a book, music artist, software designer, video producer, among others. Moreover, copyright is a technique of intelligent assets used to any expressed illustration of imaginative work. It is frequently shared between numerous authors, who individually hold a set of authorizations to license or practice the work. This individual is known as rights holders. These authorizations often comprise of distribution, control over derivative work, public performance, ethical sanctions such as attribution and lastly reproduction. Copyright violation or infringement has had a substantial effect on the global economy. This is the illegal use of works that are governed by a copyright statute, violating certain exclusive privileges given to the rights holder. Furthermore, for work to be considered as infringing copyright, its usage must have befallen in a state that has local copyright rules or obeys a joint tragedy or recognized global agreements. Inappropriate usage of materials outside the law is not considered as copyright infringement rather it is considered as unauthorized edition (Cockburn, 2005). The violation of copyrights frequently happens with music, film and software. Nevertheless, copyright infringement on books and other writing are normal, particularly for scholastic reasons. However, statistics concerning the impacts of copyright infringement are hard to find out. Millions of jobs and billions of dollars are lost each and every year to copyright violation. Research has tried to find out whether businesses affected by the infringement of copyrights are prone to financial loss by forecasting what quota of pirated share would have been acquired legally if it were not easily available.
Shouldice Hospital case Essay Example | Topics and Well Written Essays - 250 words
Shouldice Hospital case - Essay Example However, inclusion of other services may be helpful to the practice financially as well increase its market relevance. Prior to expansion, the institution requires funds that would cater for the expansion effectively. In addition, using the funds it generates from business may be disadvantageous and limit the effectiveness of the transition One major concern of considering extension in this case is the control and management of the new institution. Expansion would require a change in the management system. If not effectively managed, the change may hinder the quality of operation and services rendered to clients. The expansion to weekend has caused a rift in the institution since the issue has not been formally discussed. However, the expansion to weekends should be done only if the institution increases its human resources. The current staff has expressed concerns since they have been required to embrace an organizational culture they are not used to. In addition, the concerns revolve the decision by the facility to embrace change. A global expansion should be a viable option. The institution has been in existent for a long time thus having demand in foreign countries. The organization should consider utilizing this market (Heskett& Hallowell
Wednesday, October 16, 2019
Copyright Research Paper Example | Topics and Well Written Essays - 1250 words
Copyright - Research Paper Example This is usually for a short period, with the aim of allowing the inventor to get reimbursement for their unique work. Inventors are individual like an author of a book, music artist, software designer, video producer, among others. Moreover, copyright is a technique of intelligent assets used to any expressed illustration of imaginative work. It is frequently shared between numerous authors, who individually hold a set of authorizations to license or practice the work. This individual is known as rights holders. These authorizations often comprise of distribution, control over derivative work, public performance, ethical sanctions such as attribution and lastly reproduction. Copyright violation or infringement has had a substantial effect on the global economy. This is the illegal use of works that are governed by a copyright statute, violating certain exclusive privileges given to the rights holder. Furthermore, for work to be considered as infringing copyright, its usage must have befallen in a state that has local copyright rules or obeys a joint tragedy or recognized global agreements. Inappropriate usage of materials outside the law is not considered as copyright infringement rather it is considered as unauthorized edition (Cockburn, 2005). The violation of copyrights frequently happens with music, film and software. Nevertheless, copyright infringement on books and other writing are normal, particularly for scholastic reasons. However, statistics concerning the impacts of copyright infringement are hard to find out. Millions of jobs and billions of dollars are lost each and every year to copyright violation. Research has tried to find out whether businesses affected by the infringement of copyrights are prone to financial loss by forecasting what quota of pirated share would have been acquired legally if it were not easily available.
Tuesday, October 15, 2019
Discussion on Quantitative Reasoning for Business Course Essay Example for Free
Discussion on Quantitative Reasoning for Business Course Essay Discussion on Quantitative Reasoning for Business Course Self Reflection Paper 10/15/08 Discussion on Quantitative Reasoning for Business Course For many years, the quantitative or mathematical approach to business problem solving was the cornerstone of MBA programs worldwide. The traditional approach has been a rational analysis: information is collected, collated, analyzed and interpreted, alternatives are formulated, and a logical choice is consciously arrived at (Bagchi, 2005). In practice this means: â€Å"the more information, the better; ‘cool and calm’ strategic thinking should not be ‘debased’ by feelings; efficient thought and behavior must be called upon to subjugate emotion†(Sadler-Smith, 2004). The Quantitative Reasoning for Business course would provide me with the prerequisites necessary to master the rational analysis. In recent years, however, the usefulness of the quantitative analysis training for future managers has been put into doubt. The requirement for fast decisions and the limits of human beings’ rational information-processing capacities may combine to impose severe demands upon executives’ cognitive capabilities to handle masses of information at the necessary speed (Sadler-Smith, 2004). That is when intuition comes into play. Intuition is difficult to describe but easy to recognize. Many of us will be intimately familiar with our own intuitions and will probably be able to identify, and may even envy or admire, those individuals who confidently display a ‘gut feel’ for complex situations and who appear to have an ‘instinct’ for grasping key issues quickly. This quality can be nurtured through life experience. The optimal solution thus, might be a combination of two approaches depending on circumstances. The relationship between intuition and rationality can work in two ways. For example, proceeding from intuition to rational analysis represents a ‘validation’ sequence in which gut feeling may be checked out by rational analysis by posing questions such as ‘Do the data support my hunch? Proceeding from rational analysis to intuition represents an ‘incubation’ sequence in which intuition provides an expertise-based or feelings-based validation for judgments arrived at through rational analysis (Sadler-Smith, 2004). In summary, quantitative training will probably benefit me by preparing me for the future courses in economics, finance, accounting, operations, and research (Quantitative Reasoning for Business Overview, nd). More importantly though, it will prepare me for the future ‘real world’ w ork, even when its direct usefulness is not as extensive as often believed its proponents.
Monday, October 14, 2019
Image Based Steganographyusing LSB Insertion Technique
Image Based Steganographyusing LSB Insertion Technique ABSTRACT Steganography is a technique used to hide the message in vessel data by embedding it. The Vessel Data which is visible is known as external information and the data which is embedded is called as internal information.The extrenal information is not much useful to the data owner. The techniques used in Steganography makes hard to detect hidden message within an image file. By this technique we are not only sending a message but also we are hiding the message. Steganography system is designed to encode and decode a secret file embedded in image file with a random Least Significant Bit(LSB) insertion technique. By using this technique the secret data are spread out among the image data in a random manner with the help of a secret key. The key generates pseudorandom numbers and identifies where and in which order hidden message is laid out. The advantage of using this method is that it includes cryptography. In cryptography, diffusion is applied to secret message. INTRODUCTION: The information communicated comes in number of forms and is used in various number of applications. In large number of these applications, it is desired that the communication has to be done in secrete. Such secret communication ranges from the obvious cases of bank transfers, corporate communications, and credit card purchases,and large percentage of everyday e-mail. Steganography is an ancient art of embedding a message in such a way that no one,except the sender and the recipient,suspects the existence of the message. Most of the newer applications use Steganography as a watermark, to protect a copy right on information. The forms of Steganography vary, but unsurprisingly, innocuous spam messages are turning up more often containing embedded text. A new transform domain technique for embedding the secret information in the integer wavelet which is transformed on a cover image is implemented here. A technique which is used to scramble a secrete or a confidential message in order to make it unreadable for a third party is known as the Cryptography.Now-a-days its commonly used in the internet communications.cryptography can hide the content of the message but it cant hide the location of the secrete message.This is how the attackers can target even an encrypted message.Water marking is the another information of hiding the digital data or a picture or musical sound.The main purpose of this watermarking information is to protect the copyright or the ownership of the data.In this technique the robustness of the embedded evidence,that can be very small, is the most important.The external information which is visible is the valuable information in the watermarking technique. steganography is a technique which is used to make the confidential information imperceptible to the human eyes by embedding the message in some dummy data such as the digital image or a speech sound.There is a research topic about the steganography known as the steganalysis.The main objective of this steganalysis is to find out the stego file among the given files.It is a technique which is used to detect the suspicious image or sound file which is embedded with the crime related information.So,we need to make a sniffer-dog-program to break the steganography.However,it is too difficult to make a program that really works. All the traditional steganography techniques have very limited information-hiding capacity.They can hide only 10% (or less) of the data amounts of the vessel.This is because the principle of those techniques which were either to replace a special part of the frequency components of the vessel image, or to replace all the least significant bits which are present in a multivalued image with the secrete information.In the new steganography which we are using uses an image as the vesel data, and we need to embed the secrete information in to the bit planes of the vessel.The percentage of information hiding capacity of a true color image is around 50.All the noise-like regions in the bit planes of the vessel image can be replaced with the secret data without deteriorating the quality of the image,which is known as BPCS-Steganography, which stands for Bit-Plane Complexity Segmentation Steganography. BACKGROUND HISTORY: The word Steganography is of Greek origin and means â€Å"covered, or hidden writing†. Its ancient origins can be traced back to 440BC. THEORY: Steganography is a technique which is used now a days to make confidential information imperceptible to the human eyes by embedding it in to some innocent looking vessel data or a dummy data such as a digital image or a speech sound.In a multi bit data structure a typical vessel is defined as a color image having Red,Green and blue components in it.By using a special extracting program and a key the embedded information can be extracted,the technique of steganography is totally different from file deception or file camouflage techniques. A technique to hide the secrete data in a computer file which almost looks like a steganography is known as a file deception or file camouflage.But actually, it is defined as a trick which is used to disguise a secret-data-added file as a normal file.This can be done as most of the computer file formats have some dont-care portion in one file.For instance if we take some file formats as jpeg,mpeg3 or some word file these looks like the original image,sound or document respectively on the computer.Some of them could have misunderstood that such a trick is a type of Steganography.However,such files can have an extra lengthy file sizes, and they can be easily detected by most of the computer engineers.So, by this we can understand that the file deception is totally different from that of the steganographic techinque which we are discussing here. Many of the Steganography software which is in the market today is based on the file decepetion.If we find a steganography program that increases the output file size just by the amount we have embedded, then the program is obviously a file deception.If there is some secrete data then we should encrypt in such a way that it is not readable for the third party.A solution to Keep secrete information very safe is known as Data Encryption.It is totally based on scrambling the data by using some type of the secrete key. However,encrypting the data will draw more attention of the people who have not encrypted the data.So, it is very to the owner to know whether the data is encrypted or not.By, this we can know that the encrypting is not enough. There is another solution which is known steganography. There are two types of data in steganography, one is the secret data that is very valuable and the other is a type of media data vessel or carrier or dummy data.Vessel data is essential, but it is not so valuable.It is defined as the data in which the valuable data is embedded. The data which is already embedded in the vessel data is called stego data.By using the stego data we can extract the secret or the valuable data. For embedding and extracting the data we need a special program and a key. A typical vessel is an image data with Red, Green, and Blue color components present in it in a 24 bits pixel structure. The illustration below shows a general scheme of Steganography. Steganography is a technique which is used to hide secret data by embedding it in some innocent looking media data like Mona lisa in the above picture.The data which is embedded is very safe because Steganography hides both the content and the location of the secret information.In the media data there are many different methods to embed the data.It is highly impossible to detect which method is used for embedding the data.Steganography can co-operate with cryptography in the sense that it can embed the encrypted secret data and make it much safer. The most important point in the steganography technique is that the stego data does not have any evidence that some extra data is embedded there.In other way, the vessel data and the stego data must be very similar.The user of the steganography should discard the original vessel data after embedding,so that no one can compare the stego and the original data. It is also important that the capacity for embedding the data is large.As it is larger it is better.Of all the currently available steganography methods the BPCS method is the best. LEAST SIGNIFICANT BIT INSERTION One of the most common techniques used in Steganographytoday is called least significant bit (LSB) insertion. This method is exactly what it sounds like; the least significant bits of the cover-image are altered so that they form the embeddedinformation. The following example shows how the letter A can be hidden in the first eight bytes of three pixels in a 24-bit image. Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A: 01000001 Result: (00100110 11101001 11001000) (00100110 11001000 11101000) (11001000 00100111 11101001) The three underlined bits are the only three bits that were actually altered. LSB insertion requires on average that only half the bits in an image be changed. Since the 8-bit letter A only requires eight bytes to hide it in, the ninth byte of the three pixels can be used to begin hiding the next character of the hidden message. A slight variation of this technique allows for embedding the message in two or more of the least significant bits per byte. This increases the hidden information capacity of the cover-object, but the cover-object is degraded more, and therefore it is more detectable. Other variations on this technique include ensuring that statistical changes in the image do not occur. Some intelligent software also checks for areas that are made up of one solid color. Changes in these pixels are then avoided because slight changes would cause noticeable variations in the area .While LSB insertion is easy to implement, it is also easily attacked. Slight modifications in the color palette and simple image manipulations will destroy the entire hidden message. Some examples of these simple image manipulations include image resizing and cropping. Applications of Steganography : Steganography is applicable to, but not limited to, the following areas. Confidential communication and secret data storing. Protection of data alteration Access control system for digital content distribution. Media Database systems. The area differs in what feature of the Steganography is utilized in each system. 1. Confidential communication and secret data storing: The â€Å"secrecy†of the embedded data is essential in this area. Historically, Steganography have been approached in this area.Steganography provides us with: (A).Potential capacity to hide the existence of confidential data. (B).Hardness of detecting the hidden (i.e., embedded ) data. (C).Strengthening of the secrecy of the encrypted data. In practice , when you use some Steganography, you must first select a vessel data according to the size of the embedding data.The vessel should be innocuous.Then,you embed the confidential data by using an embedding program (which is one component of the Steganography software ) together with some key .When extracting , you (or your party ) use an extracting program (another component) to recover the embedded data by the same key (â€Å"common key â€Å" in terms of cryptography ).In this case you need a â€Å"key negotiation â€Å" before you start communication. 2. Protection of data alteration: We take advantage of the fragility of the embedded data in this application area. The embedded data can rather be fragile than be very robust. Actually, embedded data are fragile in most steganography programs. However, this fragility opens a new direction toward an information-alteration protective system such as a Digital Certificate Document System. The most novel point among others is that no authentication bureau is needed. If it is implemented, people can send their digital certificate data to any place in the world through Internet. No one can forge, alter, nor tamper such certificate data. If forged, altered, or tampered, it is easily detected by the extraction program. 3. Access control system for digital content distribution: In this area embedded data is hidden, but is explained to publicize the content. Today, digital contents are getting more and more commonly distributed by Internet than ever before. For example, music companies release new albums on their Webpage in a free or charged manner. However, in this case, all the contents are equally distributed to the people who accessed the page. So, an ordinary Web distribution scheme is not suited for a case-by-case and selective distribution. Of course it is always possible to attach digital content to e-mail messages and send to the customers. But it will takes a lot of cost in time and labor. If you have some valuable content, which you think it is okay to provide others if they really need it, and if it is possible to upload such content on the Web in some covert manner. And if you can issue a special access key to extract the content selectively, you will be very happy about it. A steganographic scheme can help realize a this type of system. We have developed a prototype of an Access Control System for digital content distribution through Internet. The following steps explain the scheme. (1) A content owner classify his/her digital contents in a folder-by-folder manner, and embed the whole folders in some large vessel according to a steganographic method using folder access keys, and upload the embedded vessel (stego data) on his/her own Webpage. (2) On that Webpage the owner explains the contents in depth and publicize worldwide. The contact information to the owner (post mail address, e-mail address, phone number, etc.) will be posted there. (3) The owner may receive an access-request from a customer who watched that Webpage. In that case, the owner may (or may not) creates an access key and provide it to the customer (free or charged). In this mechanism the most important point is, a selective extraction is possible or not. 4. Media Database systems: In this application area of steganography secrecy is not important, but unifying two types of data into one is the most important. Media data (photo picture, movie, music, etc.) have some association with other information. A photo picture, for instance, may have the following. The title of the picture and some physical object information. The date and the time when the picture was taken. The camera and the photographers information. DIGITAL IMAGE PROCESSING BACKGROUND: Digital image processing is an area that is characterized by the need for extensive experimental work to establish the viability of the proposed solutions to a given problem. An important characteristic which is underlying in the design of image processing systems is the significant level of testing the experimentation that normally required before arriving at an acceptable solution. This characteristic implies that the ability to formulate approaches quickly prototype candidate solutions generally plays a major role in reducing the cost time required to arrive at a viable system implementation. What is DIP? An image is defined as a two-dimensional function f(x, y), where x y are the spatial coordinates, the amplitude of function â€Å"f†at any pair of coordinates (x, y) is called the intensity or gray level of the image at that particular point. When both the coordinates x and y the amplitude values of function â€Å"f†all have finite discrete quantities, then we call that image as a digital image. The field DIP refers to processing a digital image by the means of a digital computer. A image which is composed of finite number of elements,each element has particular location and value is named as a digital image.These elements are called as pixels. As we know that vision is the most advanced of our sensor,so image play the single most important role in human perception.However, humans are limited to the visual band of the EM spectrum but the imaging machines cover almost the entire EM specturm,ranging from the gamma waves to radio waves.These can operate also on the images generated by the sources that humans are not accustomed to associating with the image. There is no agreement among the authors regarding where the image processing stops and other related areas such as the image analysis and computer vision start.Sometimes a difference is made by defining image processing as a discipline in which both the input output at a process are the images. This is limiting somewhat artificial boundary.The area which is present in between the image processing and computer vision is image analysis(Understanding image). There are no clear-cut boundaries in the continuum from the image processing at one end to complete vision at the other end . However, one useful paradigm is to consider the three types of computerized processes in this continuum: low-level, mid-level, the high-level processes.The Low-level process involves the primitive operations such as image processing which is used to reduce noise, contrast enhancement image sharpening. A low- level process is characterized by the fact that both the inputs outputs are images. Tasks such as segmentation, description of an object to reduce them to a form suitable for computer processing classification of individual objects is the Mid level process on images. A mid-level process is characterized by the fact that the inputs given to the image are generally images but the outputs are attributes extracted from those images. Finally the higher- level processing involves â€Å"Making sense†of an ensemble of recognized objects, as in image an alysis at the far end of the continuum performing the cognitive functions normally associated with human vision. As already defined Digital image processing, is used successfully in broad range of areas of exceptional social economic value. What is an image? An image is defined as a two-dimensional function f(x, y), where x y are the spatial coordinates, the amplitude of function â€Å"f†at any pair of coordinates (x, y) is called the intensity or gray level of the image at that particular point. Gray scale image: A grayscale image can be defined as a function I (xylem) of the two spatial coordinates of the image plane. Assume I(x, y)as the intensity of the image at the point (x, y) on the image plane. I (xylem) takes all non-negative values assume that the image is bounded by a rectangle [0, a]  ´[0, b]I: [0, a]  ´ [0, b]  ® [0, info) Color image: It can be represented by the three functions, as R (xylem) for red, G (xylem) for green andB (xylem) for blue. An image may be continuous with respect to x and y coordinates of the plane and also in the amplitude.Converting such an image into a digital form requires the coordinates and the amplitude to be digitized.Digitizing the values of the coordinates is called sampling. Digitizing the values of the amplitude is called quantization. Coordinate convention: The result which is generated by using sampling and quantization is a matrix of real numbers.There are two principal ways to represent the digital images.Assume that an image with function f(x,y) is sampled in such a way that the resulting image has M rows and N columns.then the size of the image is MXN.The values of coordinates (xylem) are the discrete quantites.For the notational clarity and convenience, we can use the integer values for these discrete coordinates. In many of the image processing books, the image origin is defined at (xylem)=(0,0).The values of the next coordinate along with the first row of the image are (xylem)=(0,1).It is very important to keep in our mind that the notation (0,1) is used to signify the second sample along with the first row. It does not mean that these are the actual values of the physical coordinates,when the image was sampled.The figure below shows the coordinates convention. Note that the x ranges from 0 to M-1 and y ranges from 0 to N-1 in i nteger increments. The coordinate convention which is used in the toolbox to denote arrays is different from that of the preceding paragraph in two minor ways. Firstly, instead of using (xylem) in the toolbox it uses the notation (race) to indicate the rows and the columns. Note:However,the order of coordinates are the same as in the previous paragraph, in the sense the first element of the coordinate topples, (alb), refers to a row and the second one to a column. The other difference is that the origin of the coordinate system is at (r, c) = (1, 1); r ranges from 1 to M and c from 1 to N in the integer increments.The documentation of the IPT refers to the coordinates. Less frequently toolbox also employs another coordinate convention called spatial coordinates, which uses x to refer to column and y to refer to row. This is the quite opposite of our use of variables x and y. Image as Matrices: The discussion which we have done leads to the following representation for a digitized image function: f (0,0) f(0,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. f(0,N-1) f(1,0) f(1,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ f(1,N-1) f(xylem)= . . . . . . f(M-1,0) f(M-1,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ f(M-1,N-1) The right side of this equation represents a digital image by the definition. Each element which is in this array is called an image element, picture element, pixel or a pel. The terms image or pixel are used throughout the our discussions from now to denote a digital image and its elements. A digital image can be represented by a MATLAB matrix naturally as : f(1,1) f(1,2) †¦Ã¢â‚¬ ¦. f(1,N) f(2,1) f(2,2) †¦Ã¢â‚¬ ¦.. f(2,N) . . . f = . . . f(M,1) f(M,2) †¦Ã¢â‚¬ ¦.f(M,N) Where f(1,1) = f(0,0) (note use of a monoscope font to denote the MATLAB quantities). We can see clearly that the two representations are identical, except for the shift in the origin. The notation f(p ,q) denotes that the element is located in row p and the column q. For example f(6,2) denotes that the element is in the sixth row and second column of the matrix f. Typically here we use the letters M and N to denote the number of rows and columns respectively in a matrix. A 1xN matrix is known as a row vector whereas an Mx1 matrix is known as a column vector. A 11 matrix is a scalar matrix. Matrices in the MATLAB are stored in variables with different names such as A, a, RGB, real array etc All variables in Matlab must begin with a letter and can contain only letters, numerals and underscores. As noted previously,all the MATLAB quantities are written using the mono-scope characters. We use the conventional Roman or italic notation such as f(x ,y), for the mathematical expressions Reading Images: Using the function imread the images are read into the MATLAB environment. The syntax for this is: imread(‘filename) Format name Description recognized extension TIFF Tagged Image File Format .tif, .tiff JPEG Joint Photograph Experts Group .jpg, .jpeg GIF Graphics Interchange Format .gif BMP Windows Bitmap .bmp PNG Portable Network Graphics .png XWD X Window Dump .xwd Here filename is a string containing the complete image file(including applicable extensions if any).For example the command line >> f = imread (‘8. jpg); reads the JPEG (in the above table) image chestxray into image array f. Note that the use of the single quotes (‘) is to delimit the string filename. The semicolon at the end of a command line is used for suppressing output in the MATLAB. If the semicolon is not includedthen the MATLAB displays the results of the operation(s) specified only in that line. The prompt symbol(>>) says that it is the beginning of the command line, as it appears in the MATLAB command window. When in the preceding command line there is no path included in the filename, imread reads the file from current directory and if that fails then it tries to find the file in MATLAB search path. An easy way to read an image from a specified directory is to include a full or relative path to that directory in filename. For example, >> f = imread ( ‘E:myimageschestxray.jpg); This reads an image from a folder called myimages on the E: drive, whereas >> f = imread(‘ . myimageschestxray .jpg); It reads an image from myimages subdirectory of the current of the current working directory. Current directory window on the MATLAB desktop toolbar displays the MATLABs current working directory and provides a simple and a manual way to change it. The table above lists some of the most popular image/graphics formats supported by imread and imwrite. Function size gives the row and the column dimensions of an image: >> size (f) ans = 1024 * 1024 The above function is particularly useful in programming when used in the following form to automatically determine the size of an image: >>[M,N]=size(f); The syntax above returns the number of rows(M) and columns(N) present in the image. On whole the function displays the additional information about an array. For instance ,the statement >> whos f gives Name size Bytes Class F 1024*1024 1048576 unit8 array Grand total is 1048576 elements using 1048576 bytes The unit8 entry shown refers to one of the several MATLAB data classes. A semicolon at the end of a line has no effect ,so normally one is not used. Displaying Images: To diplay images on the MATLAB desktop we can use a function called imshow, which has the basic syntax: imshow(f,g) Where f is referred as an image array, and g as the number of intensity levels which are used to display it. If g is omitted here ,then by default it takes 256 levels .using the syntax imshow(f,{low high}) By using the above syntax it displays an image as black all values less than or equal to low and as white all values greater than or equal to high. The values which are in between are displayed as intermediate intensity values using the default number of levels .The final syntax is Imshow(f,[ ]) Sets the variable low to the minimum value of array f and high to its maximum value. This form of imshow is useful in displaying the images that have a low dynamic range or that have positive and negative values. Function named â€Å"pixval†is used frequently in order to display the intensity values of the individual pixels interactively. This function displays a cursor which is overlaid on an image. As and when the cursor is moved over the particular image with the mouse the coordinates of the cursor position and the corresponding intensity values are shown on the display that appears below the figure window .When working with the color images, the coordinates as well as the red, green and blue components are also displayed. If the left button of the mouse is clicked and then held pressed, pixval displays the Euclidean distance between the initial and the current cursor locations. The syntax form of interest here is Pixval which shows a cursor on the last image displayed. Clicking the button X on the cursor window turns it off. The following statements read from a disk an image called rose_512.tif extract basic information about that image and display it using imshow : >>f=imread(‘rose_512.tif); >>whos f Name Size Bytes Class F 512*512 262144 unit8 array Grand total is 262144 elements using 262144 bytes >>imshow(f) A semicolon at the end of an imshow line has no effect, so normally it is not used. If another image named g, is displayed using imshow, MATLAB replaces the image which is in the screen with the new image. To keep the first image and output the second image, we use a function figure as follows: >>figure ,imshow(g) Using the statement >>imshow(f),figure ,imshow(g) displays both the images. Keep in mind that more than one command can be written on a line ,as long as different commands are properly delimited by commas or semicolons. As mentioned, a semicolon is normally used whenever it is desired to suppress screen outputs from a command line. Suppose that we have just read an image h and find that using imshow produces an image. It is clearly understood that this image has a low dynamic range, which can be remedied for display purposes by using the statement. >>imshow(h,[ ]) WRITING IMAGES: By using the function imwrite images are written to disk ,which has the following basic syntax: Imwrite (f,filename) With the above syntax, the string which is contained in the filename must include a recognized file format extension.Alternatively, a desired format can be specified explicitly with a third input argument. >>imwrite(f,patient10_run1,tif) Or >>imwrite(f,patient10_run1.tif) In the above example the command writes f to a TIFF file named patient10_run1: If filename contains no information on the path of the file, then imwrite saves the file in the current working directory. The imwrite function can have some other parameters depending up on the e file format selected. Most of the work in the following chapter deals either with JPEG or TIFF images ,so we focus attention here on these formats. More general imwrite syntax which is applicable only to JPEG images is imwrite(f,filename.jpg,,quality,q) where q is an integer which is in between 0 and 100(the lower the number higher the degradation due to JPEG compression). For example, for q=25 the applicable syntax is >> imwrite(f,bubbles25.jpg,quality,25) The image for q=15 has false contouring which is barely visible, but this effect becomes quite applicable for q=5 and q=0.Thus, an expectable solution with some margin for error is to compress all the images with q=25.In order to get an idea of compression achieved and to obtain other image file details, we can use the function imfinfo which has syntax. Imfinfo filename Here filename implies the complete file name of the image stored in the disk. For example, >> imfinfo bubbles25.jpg outputs the following information(note that some fields contain no information in this case): Filename: ‘bubbles25.jpg FileModDate: 04-jan-2003 12:31:26 FileSize: 13849 Format: ‘jpg Format Version: ‘ ‘ Width: 714 Height: 682 Bit Depth: 8 Color Depth: ‘grayscale Format Signature: ‘ ‘ Comment: { } Where size of the file is in bytes. The number of bytes in the original image is simply corrupted by multiplying width by height by bit depth and then dividing the result by 8. The result is 486948.Dividing file size gives the compression ratio:(486948/13849)=35.16.This compression ratio was achieved. While maintaining the image quality consistent with the requirements of the appearance. In addition to obvious advantages in storage space, this reduction allows the transmission of approximately 35 times the amount of uncompressed data per unit time. The information fields which are displayed by imfinfo can be captured to a so called structure variable that can be for the subsequent computations. Using the receding example and assigning the n Image Based Steganographyusing LSB Insertion Technique Image Based Steganographyusing LSB Insertion Technique ABSTRACT Steganography is a technique used to hide the message in vessel data by embedding it. The Vessel Data which is visible is known as external information and the data which is embedded is called as internal information.The extrenal information is not much useful to the data owner. The techniques used in Steganography makes hard to detect hidden message within an image file. By this technique we are not only sending a message but also we are hiding the message. Steganography system is designed to encode and decode a secret file embedded in image file with a random Least Significant Bit(LSB) insertion technique. By using this technique the secret data are spread out among the image data in a random manner with the help of a secret key. The key generates pseudorandom numbers and identifies where and in which order hidden message is laid out. The advantage of using this method is that it includes cryptography. In cryptography, diffusion is applied to secret message. INTRODUCTION: The information communicated comes in number of forms and is used in various number of applications. In large number of these applications, it is desired that the communication has to be done in secrete. Such secret communication ranges from the obvious cases of bank transfers, corporate communications, and credit card purchases,and large percentage of everyday e-mail. Steganography is an ancient art of embedding a message in such a way that no one,except the sender and the recipient,suspects the existence of the message. Most of the newer applications use Steganography as a watermark, to protect a copy right on information. The forms of Steganography vary, but unsurprisingly, innocuous spam messages are turning up more often containing embedded text. A new transform domain technique for embedding the secret information in the integer wavelet which is transformed on a cover image is implemented here. A technique which is used to scramble a secrete or a confidential message in order to make it unreadable for a third party is known as the Cryptography.Now-a-days its commonly used in the internet communications.cryptography can hide the content of the message but it cant hide the location of the secrete message.This is how the attackers can target even an encrypted message.Water marking is the another information of hiding the digital data or a picture or musical sound.The main purpose of this watermarking information is to protect the copyright or the ownership of the data.In this technique the robustness of the embedded evidence,that can be very small, is the most important.The external information which is visible is the valuable information in the watermarking technique. steganography is a technique which is used to make the confidential information imperceptible to the human eyes by embedding the message in some dummy data such as the digital image or a speech sound.There is a research topic about the steganography known as the steganalysis.The main objective of this steganalysis is to find out the stego file among the given files.It is a technique which is used to detect the suspicious image or sound file which is embedded with the crime related information.So,we need to make a sniffer-dog-program to break the steganography.However,it is too difficult to make a program that really works. All the traditional steganography techniques have very limited information-hiding capacity.They can hide only 10% (or less) of the data amounts of the vessel.This is because the principle of those techniques which were either to replace a special part of the frequency components of the vessel image, or to replace all the least significant bits which are present in a multivalued image with the secrete information.In the new steganography which we are using uses an image as the vesel data, and we need to embed the secrete information in to the bit planes of the vessel.The percentage of information hiding capacity of a true color image is around 50.All the noise-like regions in the bit planes of the vessel image can be replaced with the secret data without deteriorating the quality of the image,which is known as BPCS-Steganography, which stands for Bit-Plane Complexity Segmentation Steganography. BACKGROUND HISTORY: The word Steganography is of Greek origin and means â€Å"covered, or hidden writing†. Its ancient origins can be traced back to 440BC. THEORY: Steganography is a technique which is used now a days to make confidential information imperceptible to the human eyes by embedding it in to some innocent looking vessel data or a dummy data such as a digital image or a speech sound.In a multi bit data structure a typical vessel is defined as a color image having Red,Green and blue components in it.By using a special extracting program and a key the embedded information can be extracted,the technique of steganography is totally different from file deception or file camouflage techniques. A technique to hide the secrete data in a computer file which almost looks like a steganography is known as a file deception or file camouflage.But actually, it is defined as a trick which is used to disguise a secret-data-added file as a normal file.This can be done as most of the computer file formats have some dont-care portion in one file.For instance if we take some file formats as jpeg,mpeg3 or some word file these looks like the original image,sound or document respectively on the computer.Some of them could have misunderstood that such a trick is a type of Steganography.However,such files can have an extra lengthy file sizes, and they can be easily detected by most of the computer engineers.So, by this we can understand that the file deception is totally different from that of the steganographic techinque which we are discussing here. Many of the Steganography software which is in the market today is based on the file decepetion.If we find a steganography program that increases the output file size just by the amount we have embedded, then the program is obviously a file deception.If there is some secrete data then we should encrypt in such a way that it is not readable for the third party.A solution to Keep secrete information very safe is known as Data Encryption.It is totally based on scrambling the data by using some type of the secrete key. However,encrypting the data will draw more attention of the people who have not encrypted the data.So, it is very to the owner to know whether the data is encrypted or not.By, this we can know that the encrypting is not enough. There is another solution which is known steganography. There are two types of data in steganography, one is the secret data that is very valuable and the other is a type of media data vessel or carrier or dummy data.Vessel data is essential, but it is not so valuable.It is defined as the data in which the valuable data is embedded. The data which is already embedded in the vessel data is called stego data.By using the stego data we can extract the secret or the valuable data. For embedding and extracting the data we need a special program and a key. A typical vessel is an image data with Red, Green, and Blue color components present in it in a 24 bits pixel structure. The illustration below shows a general scheme of Steganography. Steganography is a technique which is used to hide secret data by embedding it in some innocent looking media data like Mona lisa in the above picture.The data which is embedded is very safe because Steganography hides both the content and the location of the secret information.In the media data there are many different methods to embed the data.It is highly impossible to detect which method is used for embedding the data.Steganography can co-operate with cryptography in the sense that it can embed the encrypted secret data and make it much safer. The most important point in the steganography technique is that the stego data does not have any evidence that some extra data is embedded there.In other way, the vessel data and the stego data must be very similar.The user of the steganography should discard the original vessel data after embedding,so that no one can compare the stego and the original data. It is also important that the capacity for embedding the data is large.As it is larger it is better.Of all the currently available steganography methods the BPCS method is the best. LEAST SIGNIFICANT BIT INSERTION One of the most common techniques used in Steganographytoday is called least significant bit (LSB) insertion. This method is exactly what it sounds like; the least significant bits of the cover-image are altered so that they form the embeddedinformation. The following example shows how the letter A can be hidden in the first eight bytes of three pixels in a 24-bit image. Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A: 01000001 Result: (00100110 11101001 11001000) (00100110 11001000 11101000) (11001000 00100111 11101001) The three underlined bits are the only three bits that were actually altered. LSB insertion requires on average that only half the bits in an image be changed. Since the 8-bit letter A only requires eight bytes to hide it in, the ninth byte of the three pixels can be used to begin hiding the next character of the hidden message. A slight variation of this technique allows for embedding the message in two or more of the least significant bits per byte. This increases the hidden information capacity of the cover-object, but the cover-object is degraded more, and therefore it is more detectable. Other variations on this technique include ensuring that statistical changes in the image do not occur. Some intelligent software also checks for areas that are made up of one solid color. Changes in these pixels are then avoided because slight changes would cause noticeable variations in the area .While LSB insertion is easy to implement, it is also easily attacked. Slight modifications in the color palette and simple image manipulations will destroy the entire hidden message. Some examples of these simple image manipulations include image resizing and cropping. Applications of Steganography : Steganography is applicable to, but not limited to, the following areas. Confidential communication and secret data storing. Protection of data alteration Access control system for digital content distribution. Media Database systems. The area differs in what feature of the Steganography is utilized in each system. 1. Confidential communication and secret data storing: The â€Å"secrecy†of the embedded data is essential in this area. Historically, Steganography have been approached in this area.Steganography provides us with: (A).Potential capacity to hide the existence of confidential data. (B).Hardness of detecting the hidden (i.e., embedded ) data. (C).Strengthening of the secrecy of the encrypted data. In practice , when you use some Steganography, you must first select a vessel data according to the size of the embedding data.The vessel should be innocuous.Then,you embed the confidential data by using an embedding program (which is one component of the Steganography software ) together with some key .When extracting , you (or your party ) use an extracting program (another component) to recover the embedded data by the same key (â€Å"common key â€Å" in terms of cryptography ).In this case you need a â€Å"key negotiation â€Å" before you start communication. 2. Protection of data alteration: We take advantage of the fragility of the embedded data in this application area. The embedded data can rather be fragile than be very robust. Actually, embedded data are fragile in most steganography programs. However, this fragility opens a new direction toward an information-alteration protective system such as a Digital Certificate Document System. The most novel point among others is that no authentication bureau is needed. If it is implemented, people can send their digital certificate data to any place in the world through Internet. No one can forge, alter, nor tamper such certificate data. If forged, altered, or tampered, it is easily detected by the extraction program. 3. Access control system for digital content distribution: In this area embedded data is hidden, but is explained to publicize the content. Today, digital contents are getting more and more commonly distributed by Internet than ever before. For example, music companies release new albums on their Webpage in a free or charged manner. However, in this case, all the contents are equally distributed to the people who accessed the page. So, an ordinary Web distribution scheme is not suited for a case-by-case and selective distribution. Of course it is always possible to attach digital content to e-mail messages and send to the customers. But it will takes a lot of cost in time and labor. If you have some valuable content, which you think it is okay to provide others if they really need it, and if it is possible to upload such content on the Web in some covert manner. And if you can issue a special access key to extract the content selectively, you will be very happy about it. A steganographic scheme can help realize a this type of system. We have developed a prototype of an Access Control System for digital content distribution through Internet. The following steps explain the scheme. (1) A content owner classify his/her digital contents in a folder-by-folder manner, and embed the whole folders in some large vessel according to a steganographic method using folder access keys, and upload the embedded vessel (stego data) on his/her own Webpage. (2) On that Webpage the owner explains the contents in depth and publicize worldwide. The contact information to the owner (post mail address, e-mail address, phone number, etc.) will be posted there. (3) The owner may receive an access-request from a customer who watched that Webpage. In that case, the owner may (or may not) creates an access key and provide it to the customer (free or charged). In this mechanism the most important point is, a selective extraction is possible or not. 4. Media Database systems: In this application area of steganography secrecy is not important, but unifying two types of data into one is the most important. Media data (photo picture, movie, music, etc.) have some association with other information. A photo picture, for instance, may have the following. The title of the picture and some physical object information. The date and the time when the picture was taken. The camera and the photographers information. DIGITAL IMAGE PROCESSING BACKGROUND: Digital image processing is an area that is characterized by the need for extensive experimental work to establish the viability of the proposed solutions to a given problem. An important characteristic which is underlying in the design of image processing systems is the significant level of testing the experimentation that normally required before arriving at an acceptable solution. This characteristic implies that the ability to formulate approaches quickly prototype candidate solutions generally plays a major role in reducing the cost time required to arrive at a viable system implementation. What is DIP? An image is defined as a two-dimensional function f(x, y), where x y are the spatial coordinates, the amplitude of function â€Å"f†at any pair of coordinates (x, y) is called the intensity or gray level of the image at that particular point. When both the coordinates x and y the amplitude values of function â€Å"f†all have finite discrete quantities, then we call that image as a digital image. The field DIP refers to processing a digital image by the means of a digital computer. A image which is composed of finite number of elements,each element has particular location and value is named as a digital image.These elements are called as pixels. As we know that vision is the most advanced of our sensor,so image play the single most important role in human perception.However, humans are limited to the visual band of the EM spectrum but the imaging machines cover almost the entire EM specturm,ranging from the gamma waves to radio waves.These can operate also on the images generated by the sources that humans are not accustomed to associating with the image. There is no agreement among the authors regarding where the image processing stops and other related areas such as the image analysis and computer vision start.Sometimes a difference is made by defining image processing as a discipline in which both the input output at a process are the images. This is limiting somewhat artificial boundary.The area which is present in between the image processing and computer vision is image analysis(Understanding image). There are no clear-cut boundaries in the continuum from the image processing at one end to complete vision at the other end . However, one useful paradigm is to consider the three types of computerized processes in this continuum: low-level, mid-level, the high-level processes.The Low-level process involves the primitive operations such as image processing which is used to reduce noise, contrast enhancement image sharpening. A low- level process is characterized by the fact that both the inputs outputs are images. Tasks such as segmentation, description of an object to reduce them to a form suitable for computer processing classification of individual objects is the Mid level process on images. A mid-level process is characterized by the fact that the inputs given to the image are generally images but the outputs are attributes extracted from those images. Finally the higher- level processing involves â€Å"Making sense†of an ensemble of recognized objects, as in image an alysis at the far end of the continuum performing the cognitive functions normally associated with human vision. As already defined Digital image processing, is used successfully in broad range of areas of exceptional social economic value. What is an image? An image is defined as a two-dimensional function f(x, y), where x y are the spatial coordinates, the amplitude of function â€Å"f†at any pair of coordinates (x, y) is called the intensity or gray level of the image at that particular point. Gray scale image: A grayscale image can be defined as a function I (xylem) of the two spatial coordinates of the image plane. Assume I(x, y)as the intensity of the image at the point (x, y) on the image plane. I (xylem) takes all non-negative values assume that the image is bounded by a rectangle [0, a]  ´[0, b]I: [0, a]  ´ [0, b]  ® [0, info) Color image: It can be represented by the three functions, as R (xylem) for red, G (xylem) for green andB (xylem) for blue. An image may be continuous with respect to x and y coordinates of the plane and also in the amplitude.Converting such an image into a digital form requires the coordinates and the amplitude to be digitized.Digitizing the values of the coordinates is called sampling. Digitizing the values of the amplitude is called quantization. Coordinate convention: The result which is generated by using sampling and quantization is a matrix of real numbers.There are two principal ways to represent the digital images.Assume that an image with function f(x,y) is sampled in such a way that the resulting image has M rows and N columns.then the size of the image is MXN.The values of coordinates (xylem) are the discrete quantites.For the notational clarity and convenience, we can use the integer values for these discrete coordinates. In many of the image processing books, the image origin is defined at (xylem)=(0,0).The values of the next coordinate along with the first row of the image are (xylem)=(0,1).It is very important to keep in our mind that the notation (0,1) is used to signify the second sample along with the first row. It does not mean that these are the actual values of the physical coordinates,when the image was sampled.The figure below shows the coordinates convention. Note that the x ranges from 0 to M-1 and y ranges from 0 to N-1 in i nteger increments. The coordinate convention which is used in the toolbox to denote arrays is different from that of the preceding paragraph in two minor ways. Firstly, instead of using (xylem) in the toolbox it uses the notation (race) to indicate the rows and the columns. Note:However,the order of coordinates are the same as in the previous paragraph, in the sense the first element of the coordinate topples, (alb), refers to a row and the second one to a column. The other difference is that the origin of the coordinate system is at (r, c) = (1, 1); r ranges from 1 to M and c from 1 to N in the integer increments.The documentation of the IPT refers to the coordinates. Less frequently toolbox also employs another coordinate convention called spatial coordinates, which uses x to refer to column and y to refer to row. This is the quite opposite of our use of variables x and y. Image as Matrices: The discussion which we have done leads to the following representation for a digitized image function: f (0,0) f(0,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. f(0,N-1) f(1,0) f(1,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ f(1,N-1) f(xylem)= . . . . . . f(M-1,0) f(M-1,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ f(M-1,N-1) The right side of this equation represents a digital image by the definition. Each element which is in this array is called an image element, picture element, pixel or a pel. The terms image or pixel are used throughout the our discussions from now to denote a digital image and its elements. A digital image can be represented by a MATLAB matrix naturally as : f(1,1) f(1,2) †¦Ã¢â‚¬ ¦. f(1,N) f(2,1) f(2,2) †¦Ã¢â‚¬ ¦.. f(2,N) . . . f = . . . f(M,1) f(M,2) †¦Ã¢â‚¬ ¦.f(M,N) Where f(1,1) = f(0,0) (note use of a monoscope font to denote the MATLAB quantities). We can see clearly that the two representations are identical, except for the shift in the origin. The notation f(p ,q) denotes that the element is located in row p and the column q. For example f(6,2) denotes that the element is in the sixth row and second column of the matrix f. Typically here we use the letters M and N to denote the number of rows and columns respectively in a matrix. A 1xN matrix is known as a row vector whereas an Mx1 matrix is known as a column vector. A 11 matrix is a scalar matrix. Matrices in the MATLAB are stored in variables with different names such as A, a, RGB, real array etc All variables in Matlab must begin with a letter and can contain only letters, numerals and underscores. As noted previously,all the MATLAB quantities are written using the mono-scope characters. We use the conventional Roman or italic notation such as f(x ,y), for the mathematical expressions Reading Images: Using the function imread the images are read into the MATLAB environment. The syntax for this is: imread(‘filename) Format name Description recognized extension TIFF Tagged Image File Format .tif, .tiff JPEG Joint Photograph Experts Group .jpg, .jpeg GIF Graphics Interchange Format .gif BMP Windows Bitmap .bmp PNG Portable Network Graphics .png XWD X Window Dump .xwd Here filename is a string containing the complete image file(including applicable extensions if any).For example the command line >> f = imread (‘8. jpg); reads the JPEG (in the above table) image chestxray into image array f. Note that the use of the single quotes (‘) is to delimit the string filename. The semicolon at the end of a command line is used for suppressing output in the MATLAB. If the semicolon is not includedthen the MATLAB displays the results of the operation(s) specified only in that line. The prompt symbol(>>) says that it is the beginning of the command line, as it appears in the MATLAB command window. When in the preceding command line there is no path included in the filename, imread reads the file from current directory and if that fails then it tries to find the file in MATLAB search path. An easy way to read an image from a specified directory is to include a full or relative path to that directory in filename. For example, >> f = imread ( ‘E:myimageschestxray.jpg); This reads an image from a folder called myimages on the E: drive, whereas >> f = imread(‘ . myimageschestxray .jpg); It reads an image from myimages subdirectory of the current of the current working directory. Current directory window on the MATLAB desktop toolbar displays the MATLABs current working directory and provides a simple and a manual way to change it. The table above lists some of the most popular image/graphics formats supported by imread and imwrite. Function size gives the row and the column dimensions of an image: >> size (f) ans = 1024 * 1024 The above function is particularly useful in programming when used in the following form to automatically determine the size of an image: >>[M,N]=size(f); The syntax above returns the number of rows(M) and columns(N) present in the image. On whole the function displays the additional information about an array. For instance ,the statement >> whos f gives Name size Bytes Class F 1024*1024 1048576 unit8 array Grand total is 1048576 elements using 1048576 bytes The unit8 entry shown refers to one of the several MATLAB data classes. A semicolon at the end of a line has no effect ,so normally one is not used. Displaying Images: To diplay images on the MATLAB desktop we can use a function called imshow, which has the basic syntax: imshow(f,g) Where f is referred as an image array, and g as the number of intensity levels which are used to display it. If g is omitted here ,then by default it takes 256 levels .using the syntax imshow(f,{low high}) By using the above syntax it displays an image as black all values less than or equal to low and as white all values greater than or equal to high. The values which are in between are displayed as intermediate intensity values using the default number of levels .The final syntax is Imshow(f,[ ]) Sets the variable low to the minimum value of array f and high to its maximum value. This form of imshow is useful in displaying the images that have a low dynamic range or that have positive and negative values. Function named â€Å"pixval†is used frequently in order to display the intensity values of the individual pixels interactively. This function displays a cursor which is overlaid on an image. As and when the cursor is moved over the particular image with the mouse the coordinates of the cursor position and the corresponding intensity values are shown on the display that appears below the figure window .When working with the color images, the coordinates as well as the red, green and blue components are also displayed. If the left button of the mouse is clicked and then held pressed, pixval displays the Euclidean distance between the initial and the current cursor locations. The syntax form of interest here is Pixval which shows a cursor on the last image displayed. Clicking the button X on the cursor window turns it off. The following statements read from a disk an image called rose_512.tif extract basic information about that image and display it using imshow : >>f=imread(‘rose_512.tif); >>whos f Name Size Bytes Class F 512*512 262144 unit8 array Grand total is 262144 elements using 262144 bytes >>imshow(f) A semicolon at the end of an imshow line has no effect, so normally it is not used. If another image named g, is displayed using imshow, MATLAB replaces the image which is in the screen with the new image. To keep the first image and output the second image, we use a function figure as follows: >>figure ,imshow(g) Using the statement >>imshow(f),figure ,imshow(g) displays both the images. Keep in mind that more than one command can be written on a line ,as long as different commands are properly delimited by commas or semicolons. As mentioned, a semicolon is normally used whenever it is desired to suppress screen outputs from a command line. Suppose that we have just read an image h and find that using imshow produces an image. It is clearly understood that this image has a low dynamic range, which can be remedied for display purposes by using the statement. >>imshow(h,[ ]) WRITING IMAGES: By using the function imwrite images are written to disk ,which has the following basic syntax: Imwrite (f,filename) With the above syntax, the string which is contained in the filename must include a recognized file format extension.Alternatively, a desired format can be specified explicitly with a third input argument. >>imwrite(f,patient10_run1,tif) Or >>imwrite(f,patient10_run1.tif) In the above example the command writes f to a TIFF file named patient10_run1: If filename contains no information on the path of the file, then imwrite saves the file in the current working directory. The imwrite function can have some other parameters depending up on the e file format selected. Most of the work in the following chapter deals either with JPEG or TIFF images ,so we focus attention here on these formats. More general imwrite syntax which is applicable only to JPEG images is imwrite(f,filename.jpg,,quality,q) where q is an integer which is in between 0 and 100(the lower the number higher the degradation due to JPEG compression). For example, for q=25 the applicable syntax is >> imwrite(f,bubbles25.jpg,quality,25) The image for q=15 has false contouring which is barely visible, but this effect becomes quite applicable for q=5 and q=0.Thus, an expectable solution with some margin for error is to compress all the images with q=25.In order to get an idea of compression achieved and to obtain other image file details, we can use the function imfinfo which has syntax. Imfinfo filename Here filename implies the complete file name of the image stored in the disk. For example, >> imfinfo bubbles25.jpg outputs the following information(note that some fields contain no information in this case): Filename: ‘bubbles25.jpg FileModDate: 04-jan-2003 12:31:26 FileSize: 13849 Format: ‘jpg Format Version: ‘ ‘ Width: 714 Height: 682 Bit Depth: 8 Color Depth: ‘grayscale Format Signature: ‘ ‘ Comment: { } Where size of the file is in bytes. The number of bytes in the original image is simply corrupted by multiplying width by height by bit depth and then dividing the result by 8. The result is 486948.Dividing file size gives the compression ratio:(486948/13849)=35.16.This compression ratio was achieved. While maintaining the image quality consistent with the requirements of the appearance. In addition to obvious advantages in storage space, this reduction allows the transmission of approximately 35 times the amount of uncompressed data per unit time. The information fields which are displayed by imfinfo can be captured to a so called structure variable that can be for the subsequent computations. Using the receding example and assigning the n
Subscribe to:
Posts (Atom)