Wednesday, December 25, 2019

WWII The White Rose Society

The White Rose was a non-violent resistance group based in Munich during World War II. Comprised largely of University of Munich students, the White Rose published and distributed several pamphlets speaking out against Third Reich. The group was destroyed in 1943 when many of its key members were caught and executed. Origins of the White Rose One of the most noteworthy resistance groups operating within Nazi Germany, the White Rose was initially led by Hans Scholl. A student at the University of Munich, Scholl had previously been a member of the Hitler Youth but left in 1937, after being influenced by the ideals of the German Youth Movement. A medical student, Scholl became increasing interested in the arts and inwardly began to question the Nazi regime. This was reinforced in 1941 after Scholl attended a sermon by Bishop August von Galen with his sister Sophie. An outspoken opponent of Hitler, von Galen railed against the Nazis euthanasia policies. Moving to Action Horrified, Scholl, along with his friends Alex Schmorell and George Wittenstein were moved to action and began planning a pamphlet campaign. Carefully growing their organization by adding like-minded students, the group took the name The White Rose in reference to B. Travens novel about peasant exploitation in Mexico. Through the early summer of 1942, Schmorell and Scholl wrote four leaflets which called for both passive and active opposition to the Nazi government. Copied on a typewriter, approximately 100 copies were made and distributed around Germany. As the Gestapo maintained a strict system of surveillance, distribution was limited to leaving copies in public phonebooks, mailing them to professors and students, as well as sending them by secret courier to other schools. Typically, these couriers were female students who were able to travel more freely around the country than their male counterparts. Quoting heavily from religious and philosophical sources, the leaflets attempted to appeal to the German intelligentsia who the White Rose believed would support their cause. As this initial wave of pamphlets was unleashed, Sophie, now a student at the university, learned of her brothers activities. Against his wishes, she joined the group as an active participant. Shortly after Sophies arrival, Christoph Probst was added to the group. Remaining in the background, Probst was unusual in that he was married and the father of three children. In the summer of 1942, several members of the group, including Scholl, Wittenstein, and Schmorell were sent to Russia to work as physicians assistants at German field hospitals. While there, they befriended another medical student, Willi Graf, who became a member of the White Rose upon their return to Munich that November. During their time in Poland and Russia, the group was horrified to witness the German treatment of Polish Jews and Russian peasants. Resuming their underground activities, the White Rose was soon aided by Professor Kurt Huber. A teacher of philosophy, Huber advised Scholl and Schmorell and aided in editing text for leaflets. Having obtained a duplicating machine, the White Rose issued its fifth leaflet in January 1943 and ultimately printed between 6,000-9,000 copies. Following the fall of Stalingrad in February 1943, the Scholls and Schmorell asked Huber to compose a leaflet for the group. While Huber wrote, members of the White Rose launched a risky graffiti campaign around Munich. Carried out on the nights of February 4, 8, and 15, the groups campaign struck twenty-nine sites in the city. His writing completed, Huber passed his leaflet to Scholl and Schmorell, who edited it slightly before mailing it out between February 16 and 18. The groups sixth leaflet, Hubers, proved to be its last. Capture and Trial On February 18, 1943, Hans and Sophie Scholl arrived on campus with a large suitcase full of leaflets. Hurriedly moving through the building, they left stacks outside of full lecture halls. Having completed this task, they realized that a large number remained in the suitcase. Entering the upper level of the Universitys atrium, they tossed the remaining leaflets in the air and let them float down to the floor below. This reckless action was seen by custodian Jakob Schmid who promptly reported the Scholls to the police. Quickly arrested, the Scholls were among eighty people seized by the police over the next few days. When he was captured, Hans Scholl had with him a draft of another leaflet which had been written by Christoph Probst. This led to Probsts immediate capture. Moving swiftly, Nazi officials convened the Volksgerichtshof (Peoples Court) to try the three dissidents. On February 22, the Scholls and Probst were found guilty of political offenses by the notorious Judge Roland Freisler. Sentenced to death by beheading, they were taken to the guillotine that afternoon. The deaths of Probst and the Scholls were followed on April 13 by the trial of Graf, Schmorell, Huber, and eleven others associated with the organization. Schmorell had nearly escaped to Switzerland but had been forced to turn back due to heavy snow. Like those before them, Huber, Schmorell, and Graf were sentenced to death, however, the executions were not carried out until July 13 (Huber Schmorell) and October 12 (Graf). All but one of the others received jail terms of six months to ten years. A third trial for White Rose members Wilhelm Geyer, Harald Dohrn, Josef Soehngen, and Manfred Eickemeyer began on July 13, 1943. Ultimately, all but Soehngen (6 months in jail) were acquitted due to a lack of evidence. This was largely due to Gisela Schertling, a White Rose member who had turned states evidence, recanting her previous statements about their involvement. Wittenstein managed to escape by transferring to the Eastern Front, where the Gestapo did not have jurisdiction. Heroes of the New Germany Despite the capture and execution of the groups leaders, the White Rose had the last say against Nazi Germany. The organizations final leaflet was successfully smuggled out of Germany and received by the Allies. Printed in large numbers, millions of copies were air-dropped over Germany by Allied bombers. With the wars end in 1945, the members of the White Rose were made heroes of the new Germany and the group came to represent the peoples resistance to tyranny. Since that time, several movies and plays have portrayed the groups activities. Sources â€Å"Holocaust Resistance.†Ã‚  Suleyman, www.jewishvirtuallibrary.org/the-white-rose-a-lesson-in-dissent.Gill, ANTON. â€Å"Protest of the Youth.†Ã‚  Literature of the Holocaust, www.writing.upenn.edu/~afilreis/Holocaust/gill-white-rose.html.Wittenstein, George J. â€Å"Memories of the White Rose .†Ã‚  The History Place - World War II in Europe Timeline, www.historyplace.com/pointsofview/white-rose1.htm.

Tuesday, December 17, 2019

Bronfenbrenner s Ecological Systems, Nature And Nurture...

Development psychology has many ideas of how humans are influence during their development. The ones that this paper will be covering are the Bronfenbrenner’s Ecological Systems, nature and nurture influences and cultural influences. I have also given my own personal influence to further demonstrate my understanding of each idea. The Bronfenbrenner’s Ecological Systems is a model created by psychologist Urie Bronfenbrenner that refers to five structures of which an individual interacts with that impacts their development. The structures are referred to as systems in the model and there are five systems: Microsystem, Mesosystem, Exosystem, Macrosystem, Chronosystem. The Microsystem refers to the environment that has a direct influence on an individual; school, home, place of worship, teachers, and peers are included in the Microsystem. A personal example is that my mother, an extremely prominent figure in any person’s Microsystem, noticed that I had a rather good potential for working on creative stories. As a direct influence on me, she gave me praise on the stories that I showed her and gave me encouragement to continue working on my writing. Therefore, she directly influenced my psychological development since her praise heightened my self-esteem and allowed me to have a good self-image of myself thanks to the environment I was raised in. The Mesosystem refers to the interactions that occur between the systems, such as how one’s school life interacts with one’s home life.Show MoreRelatedCompare and contrast the developmental life span theories742 Words   |  3 PagesUrie Bronfenbrenner perspective on lifespan development was the bio-ecological approach which suggest that five levels if the environment simultaneously influence indviduals. He tagged different aspects or levels of environment that influences a child’s development. Urie Bronfenbrenner five major systems are called microsystem; which is everyday immediate environment in which children lead their daily lives. Second is the mesosystem; which provides connections between the various aspects of the microsystemRead MoreNormative Development3160 Words   |  13 Pagesthe most accurate predictor of normative data. All humans have endocrine and neural systems, which are essentially involved in growth, maturation, ageing and functioning ove r the lifespan (Sigelman amp; Rider 2012). These systems typically identify that an individual will progress from infancy to adulthood through a number of maturational stages. Whilst genetic endowment and environmental factors do influence physical growth, it remains possible to forecast with relative accuracy that certainRead MoreHuman Development Theories Essay1649 Words   |  7 PagesHuman Development Theories In addition to Freud’s psychodynamic theory there are four other human development philosophies; biological, cognitive, behavioral and systems model. Even though these theories differ they all contain the same basic assumptions. People will continue to grow. People exhibit both stability and flux as they pass through life. People are holistic, of mind body and spirit. Lastly, individual people must be understood in the context of relationships and setting (Cash White,Read MoreLeadership And Education : Nicholas Beers And Amanda Sullivan3316 Words   |  14 Pagesdiscussing research on implications of different leadership techniques and effective school systems. Discussions of various leadership strategies and their real-world applications within school systems are implemented throughout this paper along with considerations of teacher retention and multiculturalism. Personal experience is also a key element of discussion in this paper. With all faculty and staff of school syst ems considered and being represented. Keywords: leadership, retention, education, multiculturalismRead MorePoverty Influences Children s Early Brain Development1521 Words   |  7 Pages Poverty Influences Children’s Early Brain Development Children have been the topic of many research studies and debates throughout history. Scientists, educators, social workers and teachers have debated the importance of nature and nurture in children s development. Our ideas of children are shaped greatly by the portrayal of children through media. Producers, journalists, and writers have the power to either portray children as passive or active agents in their development of social, academicRead More Bronfenbrenner’s Ecological Systems Theory Essay example1788 Words   |  8 Pagesthrough Bronfenbrenner’s Ecological Systems Theory (Bronfenbrenner and Evans 2000); a theory which focuses on gaining insight into human development through identifying the circumstances and considering the environmental influences of which a child is raised not just the genetic components. This essay will endeavour to encompass my understanding of Bronfenbrenner’s theory by incorporating the effect of the theory in child development and the significance of the nested systems with the purpose ofRead MoreLifespan Development And Communication Development Essay1536 Words   |  7 Pagesidentifies and discusses the relevant theory and theorists and discusses the influences possible on lifespan development from the time of conception to 20 years of age. I will analyse my own life story in relation to theories of lifespan development participating my understanding of the domains of development and the age old argument of nature versus nurture concerning the Biological and Environmental influences on one s development and whether they may or may not have influenced my development duringRead MoreThe Effects Of High School Bullying On American Youths1808 Words   |  8 PagesYouths This report aims to introduce and discuss the history of high school bullying in American youths, identifying and explain its origins and causes, and provide recommendations on how to prevent this issue and optimise development. The Bronfenbrenner s Bioecological Model will be employed to highlight the interaction between American bullied youths and their environmental contexts. Part A: Introduction and Background Bullying is not a new problem, it is the most frequent type of victimization

Monday, December 9, 2019

Generalization Comparative Advantage Theory -Myassignmenthelp.Com

Question: Discuss About The Generalization Comparative Advantage Theory? Answer: Introduction Worldwide cooperation began in the First and Second Framework Programmed as development aid. Currently, it is turning into a more extensive movement, with a major part in the coordination of nations. Global participation is the relationship of associations or gatherings of people speaking to different countries in the quest for a shared objective or intrigue. National development is a procedure of reconstructing ion and advancement in different measurements of a country. This essay argues that the international operation does not threaten the national development this is because of the following: the international cooperation aims to explicitly support the national development priorities. Firstly, world cooperation is necessary for the contribution in disease control and prevention. Secondly, relations between nations will help to improve the financial status of the country. The universal public health surveillance is significant for the prevention and identification of disease that is emerging and keep on re-emerging, the noncommunicable and infectious disease which accounts for the largest disease burden. The public health surveillance has the obligation to provide the health information in a timely manner in order for countries to develop a plan for curbing and preventing the disease now and in the future.[1]There are several public health issues which have effectively addressed by the maintenance and the development systems. It is evident that the world is covered by an integrated system that is effective specimen channeling and to genotyping in a period of days. The public health surveillance has many benefits to the development of a nation. Surveillance identifies the early health emergencies, therefore, acting as a system for early warning. Surveillance serves the purpose of documenting the impact of an intervention towards goals of the public hea lth that are specified. Surveillance is required so that it can monitor and understand the condition epidemiology to set public guide policy and the health strategies. Global public health surveillance is very significant to the vaccine of the preventable diseases. Surveillance is a significant part and an integral immunization program component. Data is collected in many countries, analyzed and on the vaccine-preventable disease, a feedback is given to the program so as to help in the guide activities. The health surveillance is majorly important in monitoring the progress of various programs that are goal oriented. Such as measles elimination and control, polio eradication and maternal. The health surveillance set up in a country can be used as a backbone to the related surveillance immunization for other diseases. The surveillance networks established to provide support to the specific disease site surveillance.[2] There is an importance on the laboratory confirmation for a vaccine-preventable disease which includes polio. For such disease, a laboratory network that is global has been set up, taking advantage of particular capacities of the netw ork laboratories. The worldwide public health surveillance plays a significant role in the mobilization and targeting of the sufficient resources towards the goals impartation of health, this is majorly true in the low setting resources. It is evident that the international operation does not threaten the national development. This is because, with the implementation of the health surveillance in a country, medical practitioner gets training for the clinical, informatics and the public health officers get the practice of using various techniques. The advantage of using the system is that it helps the country on detecting disease and planning on how to curb the disease and various measures are placed in place. Relations between nations will help to improve the financial status of the country. No country is self-sufficient in its economy. Each country involves itself in different levels of the trade so as to sell what it produces, in order for it to get what it lacks, and also have more efficient production in other economic sectors. International trade is the exchange of the goods and products across the national jurisdiction. Trade promotes the financial status of a country through the provision of various goods majorly at a cheaper cost, notably due to economies of scale. A country can produce efficiently in one economic sector using less resource than any other country. A country, therefore, has an absolute advantage. The international operation in the economic sector can be improved through when the nation's trade places its focus on its absolute advantage while importing what the nation lacks and exporting what it has a surplus of.[3]Although many countries have a negative notion of the absolute advantage, that it will gain very little from engaging itself in the activity. The absolute advantage tends to be an enduring characteristic majorly for the resource. Although a country can have an absolute advantage over a variety of economic sectors, the country can focus on the comparative advantages sectors that are ranked the highest. The nation can place its emphasis on the sector that it has a higher comparative advantage as opposed to those that it has a less comparative advantage. The comparative productivity increases the total production level th erefore if a nation has no absolute advantage, it can place its focus on the sectors where the productivity total gains are the most significant. The comparative advantage can cause the temporary characteristic in the change of the labor cost evolution. The financial stability of a country is both a national and multinational concern. [4] The international operation helps a nation in stabilizing its financial sector through trade. Instability can increase the uncertainty and discourage investment and the economic growth. The international operation has improved the national development, this can be measured through the living conditions and economic development of a country. The international operation has impacted positively on the public health of a country and the financial sector of the country. The strongest gains have been made by the developing countries and the advanced countries. The low-income countries have not fully integrated the international operation, this is because of the factors that are beyond their control. The international operation should progress through the strengthening of the international financial system, through trade. References Maes E, Diop O, Jorba J, Chavan S, Tangermann R, Wassilak S. Surveillance Systems to Track Progress Toward Polio Eradication - Worldwide, 2015-2016. MMWR: Morbidity Mortality Weekly Report [serial on the Internet]. (2017, Apr 7), [cited January 20, 2018]; 66(13): 359-365. Available from: Academic Search Complete Wolicki S, Nuzzo J, Blazes D, Pitts D, Iskander J, Tappero J. Public Health Surveillance: At the Core of the Global Health Security Agenda. Health Security. (2016, May), [cited January 20, 2018]; 14(3): 185-188. Available from: MEDLINE with Full Text. Leszek J. The Generalization of the Comparative Advantage Theory. Journal Of Vasyl Stefanyk Precarpathian National University, Vol 4, Iss 3-4, Pp 21-33 (2017). (2017), [cited January 20, 2018]; (3-4): 21. Available from: Directory of Open Access Journals Seretis S, Tsaliki P. Absolute Advantage and International Trade. Review Of Radical Political Economics. (2016, Fall2016), [cited January 20, 2018]; 48(3): 438-451. Available from: Academic Search Complete Ion S, Gabriel C. Romanian Business Environment in the Context of Economic Competitiveness Based on Knowledge. Risk In Contemporary Economy, Vol 1, Pp 225-236 (2012). (2012), [cited January 20, 2018]; 225. Available from: Directory of Open Access Journals

Monday, December 2, 2019

Marketing Strategy and Organizational Effectiveness in Samsung

Samsung is one of the largest electronics companies in the world. The firm’s brand is recognized in many parts of the world and this has strengthened the value of its products in various global markets. In the mid 1990’s, several management initiatives helped the firm to improve the value of its products in the market. The firm’s management positioned it as a global brand which helped the firm to build a strong corporate image.Advertising We will write a custom essay sample on Marketing Strategy and Organizational Effectiveness in Samsung specifically for you for only $16.05 $11/page Learn More During that period, the firm had more than 10 popular products in the market which had strong customer loyalty in different markets. The firm’s rise as a global brand was made easy after it had withstood the Asian financial crisis of 1997. It managed to turn around its operations which helped it register positive results in less than fi ve years (Khanna, Song and Lee 142). This paper will discuss how Samsung can improve its performance in the market. Samsung needs to come up with more competitive strategies to help it deal with the changing market environment. The technology industry is experiencing a lot of changes, which require Samsung to develop new strategies to maintain its competitive edge in the market. Samsung has managed to become one of the largest mobile device manufacturers in the world, surpassing Nokia and other firms. This is because of its focus on high –end smart phones which have superior technological functions compared to substitute models manufactured by its competitors. The firm needs to look at ways of extending its influence into other markets. This is because U.S. and European markets have been projected to experience a slump in consumption patterns in the near future (Khanna, Song and Lee 142). The firm needs to formulate new ways of increasing the value of its products in the mark et to overcome high competition from low priced substitutes. The firm lacks a strong recognized brand which can be compared to Sony’s Walkman or Microsoft’s Windows. The firm’s recent focus on smart phones and L.E.D. television sets has made it stand out as a learning organization, which is ready to take a leading position in the technology industry.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The firm needs to develop a long term value proposition in the market by developing an easily recognizable brand to help it strengthen its market position. Samsung needs to capitalize on emotions of its global customers by giving them a signature product which is capable of making them appreciate other products, manufactured by the firm (Khanna, Song and Lee 143). A strong and easy to recognize brand will have a positive effect on other products which are manufactured by the f irm. This will increase the value attached to them by consumers thereby making them more competitive in the market. Some products which are released by the firm into the market have achieved a mature life cycle within a very short time. This puts more pressure on the firm to release newer versions of similar products into the market. It is necessary for the firm to put in place measures that can help it take advantage of opportunities in lower segments of the market; since the upper income market segments will continue to experience slow growth in revenues. It is projected that the middle and low segments will continue to expand and this will open up potential opportunities for profitability in the firm. The firm needs to reinvent itself to capture lucrative global markets to help it experience more success in its operations (Khanna, Song and Lee 145). It also needs to embrace cross cultural management strategies to help it maintain a competitive edge in different global markets. Sa msung has a diversified business portfolio and this has made it easy for the firm’s management to implement several innovative practices in its operations. It managed to compete favorably against Japanese companies by shifting away from analog to digital technologies in the late 1990’s. Therefore, the firm needs to maintain its strength in manufacturing by building strategic alliances with other global firms, to help it strengthen its value proposition in the market. These strategic alliances will be crucial in helping the firm improve the quality of relationships it has with its customers.Advertising We will write a custom essay sample on Marketing Strategy and Organizational Effectiveness in Samsung specifically for you for only $16.05 $11/page Learn More Samsung needs to take note of the business environment it operates in. Samsung needs to ensure that its operations satisfy different market needs which are served by its wide product ra nge (Khanna, Song and Lee 146).This will help the firm to understand different consumer segments and their needs. The firm’s processes are highly innovative and this has helped the firm to introduce revolutionary concepts into the market. The firm has a good product mix and it needs to extend the market’s attention to other high quality products which it manufactures. A lot of interest in the firm’s products in the market is focused on its mobile devices and L.E.D television products. The firm produces high quality washing machines, refrigerators, microwaves and other household products, which have the ability to bring in more revenues if they are marketed well. The firm needs to increase its market share in household appliances because these products have a longer life cycle in the market compared to mobile devices and L.E.D TV’s. The market for home appliances is not as competitive as other market segments which the firm operates in (Khanna, Song and Le e 147). It needs to market these products in selected markets more aggressively to improve its performance in the market. Samsung can use various management models to improve its performance in the market. The firm needs to adopt Management By Objectives model to improve its internal and external business processes. The MBO model will help Samsung’s management to focus on goals which are easy to achieve to help the firm improve its financial results. The firm’s management needs to track issues that have an impact on its survival in the market, to come up with radical proposals which address them. The MBO approach gives the firm a chance to formulate strategic plans and performance indicators, which help to monitor its operations in the market (Bradley 81). The MBO model will enable the firm’s management to analyze results of various product categories it sells in the market, to assess their value to its operations.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The firm also needs to carry out a value proposition analysis for its target markets and consumer segments. This will help the firm’s management to analyze what motivates specific consumers to purchase its products and the value they get from using these products. The firm needs to come up with new production systems to help it achieve long term organizational goals (Bradley 79). The value proposition analysis should take note of resources, which the firm has set aside to help it achieve its long term goals. Works Cited Bradley, Nigel. Marketing Research: Tools and Techniques. Oxford: Oxford University Press, 2007. Print. Khanna, Tarun, Jaeyong Song, and Kyungmook Lee. â€Å"The Paradox of Samsung’s Rise.† Harvard Business Review (July- August 2011): 142-147. Web. This essay on Marketing Strategy and Organizational Effectiveness in Samsung was written and submitted by user Yoda to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, November 26, 2019

Essay on American History 1865 - PresentEssay Writing Service

Essay on American History 1865 - PresentEssay Writing Service Essay on American History 1865 Present Essay on American History 1865 PresentThe period of Reconstruction (1865-1877) can be characterized by considerable changes in political and social life of the country. Blanche K. Bruce’s Speech in the Senate (March 31 1876) highlights the significant role of the state and political rights of all people (Bruce, 1876). The major goals of Radical Reconstruction were not feasible ones. Â  The three major issues to solve by the government were dealing with the states after their joining to the Union; treating southern whites, and dealing with the freed slaves. Lincoln’s plan for reconstruction was opposed by Congress (Bowles, 2011). Â  It is hardly possible to transform a society drastically by government action, especially if the Radical Republicans failed to agree with Johnson’s plan and developed their own Reconstruction plan. Actually, the might attempts to do so prove to be counterproductive. The process of reconstruction and its consequences is demonstrated in the documentary Slavery by Another Name directed by Sam Pollard. The film challenges the assumption that slavery in the United States ended with Abraham Lincoln’s Emancipation Proclamation of 1863. The documentary shows the emergence of absolutely new forms of slavery after the Civil War, including the deceptive forms of forced labor in the South, involving thousands of black people, who were kept in perpetual bondage. The violence of slavery would continue until the WWII (Pollard, 2012).As a matter of fact, a more gradualist approach to extending rights to and establishing freedom for African Americans could have been more successful. However, the costs and dangers of such an approach could have been dramatic. The struggle for freedom has always been a complex task. African Americans would have been more successful in achieving their goals, if they had had enough support and power to protest against slavery and discrimination.

Saturday, November 23, 2019

Appeasement and the Munich - Smart Custom Writing Samples

Appeasement and the Munich - Smart Custom Writing Heat and TemperatureIn order to understand about heat and temperature, it is of great importance to introduce the meaning of matter as well as the Kinetic Theory of Matter. This is because heat can be seen to exist when its effects are observed on matter. Without matter heat and temperature could not be realized. Matter can be defined as anything that has mass and that can occupy space. Matter is composed of substances, and these can be seen being made up of atoms, ions and molecules. Atoms, ions and molecules are the building blocks of matter; such that the behaviors of different types of substances are determined by these primary particles. The atoms of substances contain minute particles which are referred to as protons and electrons. These subatomic particles are also considered matter since they both have weight and occupy space (Atkins Paula, 2002).   Matter exists in three distinct states namely, solid state, liquid state and gaseous state. The three state of matter are inter-convertible such that one state can be converted into another state by changing the immediate environmental conditions especially temperature. The solid state of matter is characterized by having its own volume as well having a definite shape. Liquid state of matter is characterized by having its own volume but assumes the shape of the container it occupies. Gaseous state of matter does not have both its own volume and shape but occupies entire volume of the container and as well assumes the shape of the container it occupies (Atkins Paula, 2002). Kinetic Theory of Matter states that matter is made up of very many minute particles that are in a constant state of motion. The theory can also be referred to as the Kinetic Molecular Theory of Matter.   The theory forms the basis to explain the behavior that different forms of matter exhibit simply by making simple assumptions, for example, the idea that matter is composed of widely spaced particles which are in a constant motion. The significant areas in this case are transfer or flow of heat as well as the relationship between temperature, pressure, and volume of gases. The Kinetic Theory of matter is a mere prediction regarding the behavior of matter, based on particular approximations and assumptions. These assumptions and approximations are made from experiments and observations, for instance, the fact that objects are made up of atoms or small molecules (Burshtein, 1996).   Heat can be defined as a form of energy that is associated with the motion of molecules or atoms and that can be conveyed through fluid and solid media by the process of conduction, through vacuum by the process of radiation, and through fluid media by convection process.   There are different sources of heat, for instance, heat due to friction, heat due to nuclear reactions, heat due to sun, heat due to burning of fossil fuels, and heat due to electricity. This transmission of energy from one substance to another is determined by a change in phase or a difference in temperature. Therefore temperature can be defined as the measure of the mean kinetic energy of the molecules or atoms in a given sample of matter, and it is usually expressed in degrees or units chosen on a typical scale. The relationship between heat and temperature is depicted from the definitions. Temperatures of substances rise when heat is supplied. Intense heat is characterized by high temperature (Turns, 2006). Now it will be very clear, if in the discussion of converting substances from one state to another immediate state, heat and temperature are involved. From the Kinetic Theory of Matter, it is evident that matter is made up of small particles that are in a constant state of motion. These particles may consist of molecules, ions or atoms which are held together by strong forces of attraction. In the solid state, the particles are closely packed together in fixed positions. The particles cannot move from one position to another but can vigorously vibrate within their fixed positions, and this is because the forces of attraction between the particles are very strong. With the increase in the temperature of a substance in solid state, the particles gain heat energy gradually and the kinetic energy of the particles increases. A point is reached when the particles start to move more vigorous until the forces of attraction between them weakens.   The particles can now move from one place t o another as the substance changes state from solid to liquid. The substance loses its definite shape but it still has its own volume (Atkins Paula, 2002). In the liquid state, the particles are not as closely held together as in the solid states since the forces of attraction between the particles are a bit weaker. The particles are free to move from one place to another within the structure. When the temperature of the substance is increased further, the particles gradually absorb heat energy. The kinetic energy of the particles further increases as the particles move more vigorous. A point reaches when the forces of attraction between the particles are overcome and the particles move far apart from one another. At this point the substance changes its state from liquid to gaseous state (Turns, 2006).   Reduction in temperature reverses the processes, such that the substance in gaseous state changes into liquid state and finally into solid state. This is because, as the temperature reduces, the kinetic energy of the particles goes down and the forces of attraction become stronger. Thus the particles of the substance attract one another. Heat capacity of a substance is defined as a measurable physical quantity that portrays the amount of heat needed to change the temperature of a body by a particular amount. The SI units for heat capacity are joules per Kelvin. In substances heat capacity is determined by various properties for example the amount of matter in the substance expressed in terms of its mass, the type of material of which the substance is composed of, the temperature of the substance, and the atmospheric pressure (White, 1999).  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚   References Atkins, P., Paula, J. (2002). Atkins' Physical Chemistry. Oxford Oxfordshire: Oxford University Press. Burshtein, a., (1996). Introduction to Thermodynamics and Kinetic Theory of Matter.   London: J. Wiley. Turns, S., (2006). Thermal-Fluid Sciences. Cambridge: Cambridge University Press. White, G., (1999). Heat Capacity and Thermal Expansion at Low Temperatures. New York:   Kluwer Academic/Plenum.

Thursday, November 21, 2019

Describe the period of Globalization in international economic Essay

Describe the period of Globalization in international economic management - Essay Example International Monetary System was formed to overcome the imbalances in economies arising from globalization. The new system took into account the international trade imbalances, investment, finance, and exchange markets. The international monetary system also took into account the imbalances in international payments which as a result of globalization were settled through financing, changing domestic economic policies, rationing exchange controls, and changes in currency exchange rate. The management of International Monetary System was difficult because it needed full international cooperation which was politically impossible. For the management of the system, the economies agreed on using a set of policies. For instance, mix of adjustment mechanisms were developed such as floating exchange rates or linking currencies to dollar under fixed exchange rate. Many political and economic crises arose in the midst of globalization. Reformation of International Monetary System was required. Many countries relaxed controls, opened domestic markets and removed regulatory barriers. As a result, financial markets became integrated into one global market influencing floating exchange rate system making it the central part of the new monetary system. Such an exchange rate could provide effective account adjustments by increasing exports and lowering imports and thus creating a trade balance. Many new treaties and pacts were made within countries as well as amongst others. For instance, the United States-Japan Enhanced Initiative on Deregulation and Competition Policy for Framework was signed to reduce trade deficits between US and Japan. The European Union introduced a single currency known as Euro under the Economic and Monetary Union had significant impact on the currency exchange transactions. In addition, almost all countries set up private banks, made the more central banks more independent, liberalized their financial systems and also joined the IMF

Tuesday, November 19, 2019

Dissertation Example | Topics and Well Written Essays - 14250 words

Dissertation Example However, several barriers hinder the route to successful implementation of cross-border acquisitions. Different authors and scholars have provided many factors hindering cross border acquisitions. In its entirety, cultural factors need the biggest attention because of their influence in changing the fate of the merger or acquisition activity. Cross border M&A are termed as ‘marriage between two culturally separate entities’ and endeavours to manage M&A’s arise more from the tenets of cross-cultural management than any other factor. Cultural knowledge has been found to facilitate organizations to come together for M&A with their partners. This view has been propounded by various theories like Hofstede’s and Trompenaars dimensions, Schwartz Value survey, Kluckhohn and Strodbeck Framework , and many others. Application of cultural factors are involved across various activities and different functions that include expatriate management, leadership, motivation, decision making, managing diversity and developing intercultural communications through managerial competencies. Taking examples of some successful and unsuccessful cross-border mergers and acquisitions and relating these with related theories and models, a study has been conducted to determine how cross-cultural knowledge, awareness and responsiveness helped the successful parties and vice versa. This research has investigated the cultural issues which are often not given utmost importance in regard to cross border M&A. The study has helped to gain an understanding of the significance of determination of cultural factors affecting cross border M&A and the necessity to deal with them before entering into a merger or an acquisition. Also, with perceived and identified gaps, recommendations have been suggested which might improve upon the way cross-border mergers and acquisitions should be implemented and dealt with. The research has been based completely on secondary sources and case studies. Real life M&A have been taken into consideration based on which a detailed analysis has been done thus determining the cultural factors that may affect cross border M&A. Recommendations have been provided for those organizations that tend to ignore the importance of such cultural differences, often leading to failure. Table of Contents Topic Page no. Introduction 7 Research Aims and Objectives 10 -Aim of the research 10 -Objectives of the research 10 Literature Review 11 Limitations of the Study 30 Research Methodology 31 -Research Philosophy 31 -Research technique 32 -Sources of information 32 -Credibility & Verification 33 Findings & Analysis 35 -Study of real life M&A 36 -Key features of success or failure 43 -Comparison of actual scenario with theoretical models 44 -Discussion 49 Conclusion 51 Recommendation 54 References 57 List of Figures Figure Page no. Figure 1. Different types of mergers and acquisitions 15 Figure 2. Consequences of differences in individualist or collectivist scores for work and organizations 18 Figure 3. Consequences of differences in power distance cores for work and organizations 19 Figure 4. Consequences of differences in masculinity or femininity scores for work and organizations 20 Figure 5. Consequences of differences in uncertainty avoidance scores for work and organizations 21 Figure 6. Acculturative model for the implementation of mergers 23 Figure 7. Reasons

Sunday, November 17, 2019

The Normalising Machine Essay Example for Free

The Normalising Machine Essay The normalising machine has two parts to it and I am going to talk about the first part that is what we did in the lessons. We started off by looking at the characters. We had to make a little improvisation up about how the characters are put across to us. We used still images, role plays and prepared improvisations. We had to make it obvious that the characters were greedy, manipulative and just plain stupid. The lessons then progressed and we started to take scenes from the normalising machine book. We made it, again obvious that the characters were greedy, manipulative and plain stupid. We took each lesson one at a time and kept trying to make it more and more obvious that the characters are who they are and people had to guess who was who in the play. We looked at everyone elses performances and discussed their ideas and attitudes towards the play. Some examples of the other groups ideas are: Using different levels, pushing people down to make it seem like they are in control, using still images to emphasise the point they are putting across and using split staging to make it obvious of what they are doing. We discussed how these ideas helped the drama to progress onto the next stage which was trying to be over the top within the role of a character from the normalising machine. I found it very hard to be over the top and I think a lot of other people in the class did too. The drama had to be over the top because the play is very comical and if we werent over the top then it would have just been plain, simple, boring and totally rubbish. I thought that being over the top was a good thing to do but it is also a very hard thing to do. For instance, when Rudolf met Trudy at the tube station, he was so over the top and so outrageous that some people actually got worried that they were too over the top. Also when Rudolf met Mr and Mrs Tolerant he was also very over the top. This was very effective because the Mr Tolerant wanted to beat Rudolf up and he actually got scared of Rudolf because the character was full of beans and giddy as some people said, and when Mrs Tolerant said Rudolf was em barrassing her he got frustrated and worked up as some people said and he told Mr Tolerant to ask him to leave but Mr Tolerant insisted that he stayed. The only thing with Rudolf is that he sometimes gets worked up and feels frustrated because he is doing things wrong when he actually isnt but he thinks he is. Ben percent is Grace Beverly Brices P.R agent. He is the manipulated, sly and cunning character in the play. He swindles his way into the eyes of Grace Beverly Brice and becomes the official spokes person of Judge Juniper Jones. In the scene were he meets Grace Beverly Brice he shows her the contracts of some other people who arent actually celebrities any more but Grace Beverly Brice doesnt realise this and as Ben Percent manipulates her into agreeing to draw up a contract, he gave a sly grin and walks away only wanting 10% of the money she makes from the normalising machine. Also, Ben Percent was the person who finalised Doctor Michael Molecule because Ben got very worked up that Michael Molecule was spreading rumours about Grace Beverly Brice. In this scene we see that when Doctor Michael Molecule enters the room with Ben Percent in it that whoever was in control of the other person would stand up and the person who had no control had been pushed down onto a chair. This is a very effective way of doing things because the audience could see who was and who wasnt in control at that point, and as Ben percent offers for Doctor Michael Molecule to come back on the project of the normalising machine with the excuse that they need something to clear the dust from inside the machine and asks him what he wants to do, Ben Percent pushes Doctor Michael Molecule into the normalising machine and finalises him and gives a very sly and cunning laugh. This was also very effective because the book play shows that Ben percent is a very manipulating any character even if it means finalising them. Grace Beverly Brice is the character that completed the normalising machine because Doctor Michael Molecule got frustrated and couldnt finish it because he didnt know what to add to sedate the radicals and the badicals so Grace Beverly Brice stepped in to finish the project and completed the machine to become a billionaire. Grace Beverly Brice is a manipulated character and a very innocent character who knows what she wants to do with her life but when it all boils down to it she is manipulated by Ben Percent. All the scenes in this play were sometimes complicated to put together and to drop thoughts on, on how to bring the scene together so it looked like the person who was in charge was in charge and the person who was being manipulated was manipulated and the person who was manipulating was manipulating. I think some people found it very hard to be the character they was meant to be playing and to make it seem like they was in charge etc but the groups the people were in dropped some good thoughts and put it all together brilliantly and it looked very professional. I am now going to talk about the development and presentation that the class did. Both groups based their plays on the normalising machine but changed the lines a bit except for my group. We based half of our development and presentation on the normalising machine. This part was the head teachers scene in the normalising machine book. We then went from that scene to a Blind Date scene which was called now been normalised and that was based on the characters from the normalising machine who had been normalised in the normalising machine and wanted to take Trudy on a romantic date. The characters we used are: Trudy, Ben Percent, Doctor Michael Molecule, Rudolf Right and Anthony Badlad. We used these characters because they are the most manipulating, over the top and vile characters in the book. We then used another scene from the book were Trudy takes Rudolf home to meet her parents. This scene is so over the top that even Rudolf was nearly laughing at himself because it was so funny a nd then we went back to the Head teacher who finished the whole play off by using smart and witty comments to make it so that he was put across as evil and cruel. We did this by making him have a very deep voice and made him to shout at the top of his voice for further credit to the character. Over all I think this project was very good fun and we used a lot of skills to put across our point that the characters are who they are. Some of the skills we used are: still images, Role play, development and presentation, role within a role, hot seating, split staging and many more. All the plays that the other groups made were very good. They used all the skills that were needed in the scenes they were acting and even used more skills that werent needed but they put them in any way to make it even better for the audience to watch.

Thursday, November 14, 2019

A Rhetorical Examination of The Homeless and Their Children Essay

In â€Å"The Homeless and Their Children†, author Jonathon Kozol explains how poverty and homelessness can go hand in hand, but he also shows his readers that the government in New York City during the 1980’s did not really attempt to assist those in need. The author shows us how the homeless and illiterate struggled by sharing with us an interview with a young woman called Laura who resided in a massive welfare hotel. Kozol did not find it necessary to write this piece in a persuasive tone, or a compassionate tone, or even an angry tone to get his message across. He did not need to include a multitude of statistics to convince his readers that homelessness, illiteracy, and governmental apathy were issues. As stated in the introductory paragraph that precedes Kozol’s excerpt, â€Å"Instead of arguing indignantly for literacy programs to save the lives of the poor and illiterate, Kozol simply reports the case of a single illiterate woman trying to raise her f our children† (Kozol 304). When the different aspects of this wring are studied, it can be found that Kozol successfully utilized subtlety and refinement, along with vivid imagery, to address this issue in order to inform and motivate his readers to take a stand against homelessness and illiteracy. As this was mostly an emotional piece, there are very little references to logos. However, Kozol begins with a very important statistic at the beginning: â€Å"Nearly four hundred homeless families, including some twelve hundred children, were lodged in the hotel, by arrangement with the city’s Human resource Administration† (Kozol 304). This statistic is significant because it builds the author’s credibility by providing tangible facts from the author’s research, and it also exercises our... ...his intentions well. He utilized each piece of the rhetorical triangle to build a story that was easy to read, informative, and emotive. By using the methods he did, such as staying refined and unemotional, he allows his readers to feel their own emotions and fuel their own motivation. Sometimes, this approach can be stronger than when someone tells you what you should do. Kozol has indeed created a very moving story, which no doubt has motivated, informed, and maybe even changed some minds on this topic since its publication. Works Cited Kozol, Jonathon. â€Å"The Homeless and Their Children.† The Prentice Hall Guide for College Writers. Ed. Stephen Reid. 8th ed. Upper Saddle River, N.J.: Pearson, 2008. Print. Weathers, Barbara. "Rachel and Her Children (Book Review)." School Library Journal 34.7 (1988): 226. MasterFILE Premier. EBSCO. Web. 11 Feb. 2011.

Tuesday, November 12, 2019

Government Invasion of Privacy Essay

Facebook has become the largest social media site with over 1 billion active users as of September 14, 2012. Of those 1 billion users on average for June 2012, 552 million were considered daily active users. (Potalinski, Oct 4, 2012) The world has gone crazy with social media. The ability to update one’s status on anything that has an internet connection has been enhanced through technological advances in both phones and tablets. The Federal Government deemed it necessary to monitor social sites on October 26, 2001 with the inception of the Patriot Act. The liberties given to the government since the Patriot Act was signed into law has been debated over the potential violation of an individual’s privacy. This author believes the Patriot Act does not violate individual privacy rights. The individuals violate their own rights by what they post. The Federal Government monitors for potential national security threats through watch words. The Patriot Act affords them this right. An individual has the ability to speak their mind. The Federal Government is only concerned with posts that show potential threats to national security. There have been 50 cases of threats to national security since the Patriot Act’s inception in 2001 that have been stopped. Jason from Austin Texas was questioned and released hours following a seemingly harmless personal opinion post on Facebook. Did the Federal Government overstep the liberties given by the Patriot Act to even question Jason? Let us find out what the research reveals. Jason from Austin Texas simply commented on a political post one of his friends had made on Facebook regarding the former Senator Rick Santorum. Jason did not reveal his full name to the reporter Jason Brashear who writes for CivilinWars.com with his story. For the lack of confusion from here on out, the reporter will be noted as Brashear. The comment that got Jason in trouble was â€Å"I wish there was a magic wand to make Santorum disappear†¦Ã¢â‚¬  This post was taken directly off of the post thread on February 20, 2012. The Austin Police and two Williamson County Sherriff’s deputies were alerted to the post and tried to locate Jason. After unsuccessfully finding Jason at his work, the officers called Jason and set up a meeting later that evening at Jason’s home. The officers explained they were there because of a possible threat to Senator Santorum. Jason did not know that Senator Santorum had a visit planned for Austin in the next few days. The visit was far enough in the future from the post for the local law enforcement to be sent to Jason’s house to investigate the potential threat. The officers were there to look around the house for any pictures of the Senator or evidence of anything planned against the Senator. The local authorities deemed that Jason was not a threat and no further action was taken against him. Jason’s Facebook security settings were set up as private. The private settings mean the posts are treated like a private e-mail amongst friends. (Brashear, Feb 25, 2012) It was the perfect storm for Jason a seemingly harmless post, the subject of the post coming to town in a short time, and the Federal Government monitoring for key words or phrases. The Federal Government only reacted to key words that pinged through their tracking system. The individual privacy rights of Jason were not violated due to the contents of his post and the potential national security risk to the presidential candidate former Senator Santorum. Jason’s post threw up red flags through the Department of Homeland Security social media monitoring system with the use of one word. Because the post contained the word Santorum, the remaining words became relevant to any investigations that followed. Because the former Senator was a potential presidential candidate for the Republican Party his name became a red flag item for the Department of Homeland Security. Had Jason make the same post, but eliminate the use of Santorum’s name, it is the belief of this author that there would have been no visit from the local authorities. The use of the former Senator’s name on a social media site was the cause of the investigation of Jason by the authorities. It is the Federal Government’s job to assess every potential threat both foreign and domestic. By Santorum attempting to become the Republican Party’s candidate for President of the United States, he became a potential target for acts of terrorism or violence against that required protection. If the monitoring of social media by the Federal Government was not in place, Jason may have been plotting an attack on former Senator Santorum and executed a plan of attack without notice. It is because of the Patriot Act and the liberties to monitor the world through social media sites that enabled the Federal Government to investigate Jason as a potential threat, make a decision that he was not a threat, and allow him to return to his everyday life. This has not been the case for other potential terrorists after the Patriot Act was signed into law in 2001. Since the inception of the Patriot Act in October of 2001, 50 potential terrorist plots have been averted. (Carafano, Bucci, Zuckerman, Apr 25, 2012) All 50 of the potential threats vary with how technology aided in the information being obtained by the Federal Government. Every one of the threats were directly affected by the Patriot Act. The Patriot Act is Uniting and Strengthening America by Providing Appropriate Tools Required to Interrupt and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001. (Public Law 107-56, Oct 26, 2001) The Patriot Act deemed it necessary to monitor the changing technological world. It covers everything from national to international threat, banking to social media, and terrorist to good citizen. Through the years the Federal Government has created a buzz word database that generates a â€Å"red flag† when seen or heard. The Department of Homeland Security released a copy of their Analyst’s Desktop Binder in 2011 which houses 337 words or phrases that are considered buzz words. The words or phrases that are contained in the Analyst’s Desktop Binder are considered a baseline or the beginning. This means that at a minimum the 337 words or phrases listed are monitored on a daily basis. Words or phrases are added to and removed from the list on a daily basis. The list is modified based on current events happening. Current events change what may become a target for acts of violence and terrorism. These words are monitored through the Department of Homeland Security’s National Operations Center. The Department of Homeland Security’s website (http://www.dhs.gov/about-office-operations-coordination-and-planning) describes the National Operations Center. â€Å"Through the National Operations Center, the Office provides real-time situational awareness and monitoring of the homeland, coordinates incidents and response activities, and, in conjunction with the Office of Intelligence and Analysis, issues advisories and bulletins concerning threats to homeland security, as well as specific protective measures. The NOC – which operates 24 hours a day, seven days a week, 365 days a year – coordinates information sharing to help deter, detect, and prevent terrorist acts and to manage domestic incidents. Information on domestic incident management is shared with Emergency Operations Centers at all levels through the Homeland Security Information Network (HSIN).† The NOC is the monitoring center for the Department of Homeland Security. They are the responsible for monitoring and communicating potential threats to other agencies within the Federal Government. Most if not all potential threats that are stopped by the Federal Government are a direct result of the NOC monitoring and communication system. The Federal Governments need to monitor the increasing popularity of social media is based on some of the numbers discussed earlier. As of November 19, 2012 there was an estimated 7 billion people in the world. (www.census.gov, November 19, 2012) That means that over 14% of the world’s population are considered active users of Facebook and 7% are active daily users. Active users are individuals that have accounts but may not log on every day. The active daily user numbers describe an individual logging onto their account each day. If an account holder’s privacy settings are not strict, they have the ability to post anything for anyone to see. Let us think back to Jason for a moment, his security settings were strict and he was questioned by the local authorities for his post. Without the Patriot Act allowing for the monitoring of social media sites like Facebook, Jason’s post would not have been seen by anyone but whom he allows to view his information. The Patriot Act enables Federal Government agencies like NOC to view an individual’s information regardless of the security settings. On an account holder’s Facebook page, they are invited to post â€Å"What’s on your mind† upon first logging on to the site. The individual privacy is compromised when the individual actually writes what is on their mind. If any of the 337 words or phrases are used in a post, e-mail, or blog the NOC will know. The NOC will then notify the appropriate local, state, or national authorities to investigate the potential threat. Jason may have been unfortunate enough to have received a visit from the local authorities, but what if he actually posed a potential threat to the presidential candidate and nothing was done about it? The Patriot Act and the Federal Government’s need to monitor technology and social media has aided in removing potential harm to the vast majority of our nation. Some may argue that the Patriot violates individual privacy and their right to freedom of speech. This author believes that without the Patriot Act and the liberties granted to the Federal Government to monitor the people of this world through the social media sites like Facebook, there would be a lot more terrorist actions that have succeeded. The Federal Government’s ability to identify and be afforded enough time to react to potential threats through monitoring the social media sites like Facebook has made this country a safer place to live. References Brashear, J, (Feb 25, 2012), Retrieved from: http://www.citizenwars.com/facebook-user-interrogated-authorities-post/ Carafano, J., Bucci, S., Zuckerman, J, (Apr 25, 2012), Retrieved from: http://www.heritage.org/research/reports/2012/04/fifty-terror-plots-foiled-since-9-11-the-homegrown-threat-and-the-long-war-on-terrorism Department of Homeland Security, 2011, Analyst’s Desktop Binder, Retrieved from: https://www.dhs.gov Patriot Act, (2001), Retrieved from: http://www.justice.gov/archive/ll/highlights.htm, (Select â€Å"Text of the Patriot Act†) Potalinski, E, (Oct 4, 2012), Retrieved from: http://thenextweb.com/facebook/2012/10/04/facebook-hits-1-billion-active-users/

Sunday, November 10, 2019

Smuckers Case Study

Scope of competitive rivalry- Competition among the industry is dominated by larger more diverse companies offering many efferent products in the processed foods industry. Number of Buyers – The number of users has been steadily increasing over the past few decades. With consumers looking for ways to simplify creating meals and snacks they are more apt to purchase processed foods in order to quickly prepare and serve foods when eating at home or eating meals on the go. Degree of product differentiation- Rivals in the processed foods market are fighting for more of the market.Without either expanding or acquiring new lines some of these businesses are having a hard time keeping their share of the market. Product innovation; The industry is always looking to innovate. This is pretty easy to see from just browsing the grocery store aisles. There are always new and improved products or existing products that are just packaged better for easy on the go eating. Demand-Supply Conditi ons- Processed foods are, plus or minus, 70 percent of what most of us eat. 2) The demand for processed foods does not look like it is going to subside any time soon. There are many suppliers out there but they are also dealing with negotiations to get their products into the top five grocers in America who have the power of choosing hat products they can negotiate for the lowest price, this can be detrimental to smaller manufacturers. Pace of Technological Change- Technological advances in producing these products can help cut costs over time, therefore making more profit on the foods that they are making.Vertical Integration- With acquisitions becoming a necessity of staying in the processed foods playing field these companies need to integrate any way that they can in order to stay competitive in the growing market. Economies of Scale- The processed foods industry is dominated by the top five brands. These brands are making it harder for the smaller companies to gain more of a ma rket share without acquiring more businesses or increasing their product line to gain a share of the market.Learning/Experience Curve Effect- Processed foods make up about 70% of an average Americans diet. It is imperative for their survival that they try to gain a cost advantage over their competitors in order to maintain or increase their share of the processed foods market. Competitive Analysis S. W. O. T. Analysis Strengths Started back in 1897 by Jerome Monroe Smacker, this has been a well-known ND recognized brand for over 115 years. (4) With the acquisitions they have made they are climbing up the processed foods top 100 list.Strong Financial Standings – from 2009 to 201 3 Income before expenses went from $ 396. 1 Million to $ 817. 3 Million. Innovation- they are always looking for new ways of presenting their product in order to make the consumers life easier. Company was listed in the top quartile of Fortune's â€Å"1 00 Best Companies to work for† every year since the magazine created the ranking in 1997. (1) Weaknesses Smaller size in the processed foods market may limit their bargaining power tit grocery retailers.Peanut Butter and Jelly – with most schools now banning any peanut products because of allergies the days of bringing a BP to school for lunch are almost extinct. Volume declined 6% and 1 1 % for Jiff and Smacker's fruit spread respectively. (6) Opportunities Innovating their products to appeal to more consumers such as their creation of the Jiff To Go Lunchbox snacks. More acquisitions of smaller processed food companies when their finances allow. Expanding more internationally pushing the products that have a successful presence in other countries. The retreatsCompetition from larger processed foods manufactures. Lesser bargaining power with the top five grocery retailers who make up about 40% of the grocery sales in the United States. Fear of a decreased market share could lead them to make bad financial decisions in regards to pricing, acquisitions and other expenses that they can control. Healthier Eating habit by people in the U. S. May lessen the already smaller share of their stake in the processed foods market. Financial Analysis Gross Profit Margin- The profit Margin was increasing from 2009 to 2010.Since 201 0 it has gone down a little bit to now being . 457 in 2013. This should be a concern for Smacker's even though over the past two years it has stayed stealing and also slightly increased in 201 3 so far, this is something that they should be putting great attention into. Current Ratio- With a Current Ratio oaf mere 1. 3181 in 2009 transforming into a current ratio in 2013 being 2. 6729 it is showing that Smacker's is financially sound and the fluctuations have not been too severe over the past five years again reiterating their stability in the processed foods market.They are sufficiently able to pay current liabilities without concern. Long Term debt-to-equity Ratio- Smacker's Lon g Term Debt to Equity ratio has fluctuated some over the past five years. In 201 1 the ratio was at its lowest indicating that during that time they were at a better standing to borrow funds if needed. In January 2012, the company closed its purchase of a foddering coffee and hot beverage business from Sara Lee. (7) Without this acquisition to show the jump in ratio from 201 1 to 2012 the company would seem to be in financial distress.Working Capital- The working capital was rapidly increasing from 2009 to 2011. In 201 2 the company saw a decrease in working capital. With the gain of the Sara Lee acquisition there was more funds being used for day to day operations, while this went down it does not mean that the Company is failing – it just means that they have more operating costs than previous and need to work more on the cost of manufacturing these goods to increase revenues more in the future.Strategic Recommendation Smaller Market Share – With the bigger processed foods companies such as Kraft and Nestle gaining a large portion of this market I would recommend that Smackers continue to acquire smaller companies or subsidies of already established companies to continue the growth and success that they have over the more than a century that they have been in business. Peanut Butter and Jelly- With the Healthy and Natural Foods movement going on and also the increase in schools banning peanut butter Smacker's two most well- known products are now fighting for 2nd and 3rd place for the company's sales contributions by product line.They are remaining steady over the past 3 years. In 201 3 Peanut Butter was at 13% (a 1% gain over 201 2) and Fruit Spreads went from 8% in 201 1 to 6% in 2013. One of their newer acquisitions f coffee is booming with a 4% gain over the past 3 years going from 44% in 2011 to a whopping 48% in 2013. I would recommend focusing more advertising and marketing dollars on the products with a decrease in product line sales in order to save what they had originally started their company with.Increasing International Expansion – With the well-known brand name and similarity Of products that people use in other countries I believe that by exporting more of their products Smackers can grow in to a larger and better recognized brand globally. If they started out just shipping and not creating acclivities overseas they could save money in the beginning by not having the overhead of a brand new facility and all of the expenses that come along with it. Also they could easily pull out of the markets that they are not able to penetrate successfully.

Thursday, November 7, 2019

buy custom Adoption of Community Outreach Health Policy Plan essay

buy custom Adoption of Community Outreach Health Policy Plan essay This report will be directed to the public relations manager McDonalds Corporation, seeking to explain and recommend a community outreach health program aimed at proposing change in the companys outreach policy to accommodate rising health issues specifically the rising case of overweight and obese people. Topic: community health outreach policy program review The program will recommend a get back to the people program that will facilitate healthy living among the people many of whom are potential as well as existing customers. The health policy of the company ensures that the foods promote healthy living for example through low calorie foods. Even with these standards, it has emerged in the recent past that there is increasing number of overweight and obese people because of individual unhealthy practices regarding eating habits and choice of foods. Since the community forms an integral part of the McDonalds Corporation, the public relations manager should adopt this community outreach review program in the companys outreach policies(CDC, 2010). Purpose of the report The purpose of the report is to give a recommendation on the best way to deal with obesity and related overweight problem in the community. According to the Natioal Health and Nutrition Survey, one in every three Americans is obese. Obesity has resulting complications like diabetes, cardiovascular diseases, high blood pressure, heart diseases, stroke and even high cholesterol. The rate is more alarming too in children and therefore as part of giving to the community, this recommendation will add to other existing outreach programs and will therefore will assist in trying to get a permanent solution to the problem(CDC, 2010). Resources required To implement this future community health program recommendation, resources will be required to facilitate it. The McDonalds Corporation will have to review its budgetary allocations to the community outreach programs since this will an additional program with its own unique financial requirements. The adoption of the program will need public education and awareness programs as well as assisting those already affected. Public awareness can be through advertisements or specific area to area training. The company can also get involved in getting other corporate bodies to get involved including influencing insurance companies to offer remuneration to affected people by covering in their insurance policies. All these require financial input from the MacDonald Corporation dedicated to each activity(Egeland, 2010). Information gathering techniques For the justification report recommending this new health outreach program, information will be gathered to give data and details for the proposed change. Some of the ways of collecting this information include direct observation, for example for the case of observing an affected groups of people with associated problems since obesity results in other problems like diabetes. A one-on-one interview with the person affected is yet another method. The internet has proven to an important research tool and this will help in reviewing the outreach policy. Facilitated sessions can also help collect information because they involve bringing a larger group of people with weight problems together with an aim of getting information faster (Egeland, 2010). Information evaluation criteria Some of the factors to consider in the evaluation criteria include the direct effect of the program to the community. These include checking the healthy living of the people who might have gone through weight loss programs, the measure of reduced obese cases and even the reduced obesity related complications and deaths. Another evaluation criterion is motivational concept of the consumer or customer reaction. This includes the direct effect of the program on the McDonald Corporation in terms of sales as well as the community reaction to the program(Egeland, 2010). Buy custom Adoption of Community Outreach Health Policy Plan essay

Tuesday, November 5, 2019

How to Get Free Cat and Dog Food

How to Get Free Cat and Dog Food If youre having trouble affording dog food and cat food, you may have a variety of solutions to check out before re-homing your companion animal. Animal shelters increasingly recognize they can avoid contributing to shelter overpopulation by thinking outside the box. Food programs are popping up in many different venues to help you keep your cat or dog right at home. Why Keeping a Pet Matters When personal finances tank, putting food on the table is challenging enough without adding a few furry faces to feed. But it’s when things are at their lowest point that when the true value and worth of animals become crystal clear. Writing for Webmd.com, Dr. Ian Cook, psychiatrist and director of the Depression  Research and Clinic Program at UCLA, says: Pets offer an unconditional love that can be very helpful to people with  depression†¦ Taking care of a pet can help give you a sense of your own value and importance. It will remind you that you are capable that you can do more than you might think. A little boost in attitude and outlook could mean a lot to someone who is feeling pretty hopeless. Looking for an alternative to giving up your companion animal will not only give you a mission, it will remind you of the kindness of other humans; something of which we all need to be reminded from time to time, but especially in cases of misfortune. Where to Find Free Pet Food If youre in search of sources of free pet food, youre not alone. In fact, many organizations are aware of the issue and have created resources to help. For example: Some animal shelters maintain a pet food bank. When a distraught companion animal guardians visit the shelter with the intent to surrender their animal, instead of signing a surrender form they are given an application for food subsistence.Meals on Wheels found that pets are the only family that some seniors have and that some of their clients were sharing their meals with their pets when they couldnt afford pet food. In 2006, Meals on Wheels started the We All Love Our Pets (WALOP) initiative. Not all local Meals on Wheels programs offer pet food, so check with your local program.The Humane Society of the United States maintains a  list of national and local organizations that offer free pet food, low-cost spay/neuter services, and temporary foster care if you need help. How to Request Or Provide Help with Finding Pet Food If youre not sure where to start looking for or providing free pet food, you may find these suggestions help to break the ice. Ask your local shelter if they have a pet food bank. If you are not in need of one at the moment, offer to start one.Use search engines to research â€Å"pet food banks and meals on wheels programs in (your city). You may be surprised at all the good things that are happening in your own community.Talk to your grocer about saving dented and newly out-of-date pet food items and donating them to a shelter where you may be able to avail yourself of same.Use social media to let everyone you know you are taking up a collection to build a food bank and ask for donated food items once intended for a now-deceased animal.

Sunday, November 3, 2019

Look under my guidelines file Essay Example | Topics and Well Written Essays - 750 words

Look under my guidelines file - Essay Example Here are five great advertisers’ capturing tricks that will amaze you. First, have you ever wondered why advertisers place the products and objects being promoted on the right hand of the promoting artists? I bet you have never realized this fact. What this achieve is the power to identify with. Majority of people in the world, as so is in every random population, are right-handed. Having the object being promoted, say a new drink, held in the right-hand makes the advertisement easy to identify with for a large portion of the population. It makes the audience feel that they can also comfortably do the same. This is as opposed to having them imagine a drink in their non-predominant hand. Try to imagine a popular drink advertisement with the product in your left hand. It feels awkward, doesn’t it? Buying is all about decision. Whether planned or impulsive, decisions arise from a attraction of the mind. One great trick that elicit decision is emotions. Advertisers bring out the emotional attraction in advertisements through the use of color. Different colors call for different emotions. When it is red, excitement and happiness is expected. When blue, serenity and some level of seriousness is expected. Similarly, when it is green, healthy and freshness are the audience’s expectations. Think of an advertisement for fresh vegetables done in brown. It seems wrong from the start. Advertisers know what you perceive to be right and expected. They will use this to their advantage and you will find yourself buying the product. Advertisers are also known to create simple threats that are rather innocent per se. For instance, a basic product may be labeled ‘must have’. To create the threat aspect, a limited offer of reduced price is imposed. A label like â€Å"For Today Only† will be embedded to ensure instant purchase by all those who see the advertisement. However, have you ever gone back to a store that had a â€Å"For Today Only†

Friday, November 1, 2019

Literature by U.S. Women of Color Research Paper

Literature by U.S. Women of Color - Research Paper Example It is based on these stories that this research will focus on the difficulties women of color experience in different territories and how they respond to such challenges (Wang 12). Particular emphasis is placed on women faculty of color within a classroom environment dominated by white students. The paper majorly focuses on oppression among women faculty of color in institutions of higher learning such as universities and colleges. Information on the research is based on a comprehensive interview with women faculty of color in a large research institution that is dominated by whites (Aguirre 100). The study identifies how male students challenge the authority of female colored professors during classroom interactions. Research studies indicate that an oppressive environment in a classroom has the negative effect of impairing learning and academic performance. This is especially widespread among students who suffer from oppressed identities. Such research studies only reveal whether a n oppressive environment affects learning effectiveness but tends to ignore the faculty perceptions of their classrooms. A lot of literature material points out that women faculty of color spend different time periods teaching. However, the material does not concentrate much on the classroom experiences of the colored women. Sociologists provide adequate knowledge to students on how to examine racial disparities in different areas of society such as health care and religion. They offer real world examples that are used to illustrate the cultural and interpersonal social oppression that exists in the world that we are living. There has been a widespread use of the oppressive classroom environment in demonstrating different forms of racial disparities. Research studies indicate that fostering faculty diversity and effectiveness can be achieved through the support of faculty who are women of color rather than being hostile towards. This means that it is important that we understand and appreciate the perception of the classroom environment in retaining a diverse faculty (Bonilla-Silva 200). This research applies an intersectional oppression framework in exploring faculty perceptions towards colored women teachers. Oppression can be defined to as the obstacles and actions that maintain the privileges of a dominant group. Research studies indicate that there is widespread and cumulative oppression among women faculty of color. This is evidenced by the small number of recruitment or promotion of women of color in institutions of higher education. Racism based on gender is a unique kind of oppression that women of color experience (Morrison 120). This experience is based on their position in at the intersection of race and gender matrix of domination. On the basis of the above mentioned insight, this research study examines the perception of classroom experiences among women of color at the intersection of racial and gendered oppression. In this research study, the w omen of color have adequate knowledge that their experiences in the classroom are influenced by gendered racism, and that white male students have the tendency of undermining their authority because of their color. I will majorly concentrate on how structural inequality is evidenced during interpersonal interactions. This is because teaching is a major part of the lives of faculty women of color and that it is import

Tuesday, October 29, 2019

Marketing Plan Essay Example | Topics and Well Written Essays - 3000 words

Marketing Plan - Essay Example This essay is aimed at discussing the various aspects of and issues related to marketing plan. In this context, first the role and nature of a marketing plan is discussed. Next, the structure of a standard marketing plan is explained. After that, there are the sections in which elements of marketing plan are elaborated sequentially. The links between marketing plan elements are discussed in the following section. In the section of assumptions, there is a discussion related to the common misconceptions regarding the marketing plan as a whole. Reputable journal, text, and Internet based sources have been used throughout the paper. Role and Nature of Marketing Plan What is a Marketing Plan? A marketing plan is used in backend and management operations. It is aimed at the potential consumers and also the public at large. The complete plan is kept like a guiding document for personnel involved in advertising, sales, and marketing. Marketing plans contain the results obtained by research, which help in identifying tactics and strategies for communicating with the consumers. Hence, it must have an ethical but persuasive orientation. (Solomon et al, 2012; Kang et al, 2002) What is the relationship between a Marketing Plan and a Business Plan? Marketing and business plans have a significant number of elements and subsections in common. In drafting the overall strategic plan, both marketing and business plans may lead to common or overlapping implications. Business plans cover market analyses and marketing research in the context of the whole business including the fiscal affairs. Nevertheless, there are certain differences between a marketing plan and a business plan. Differences between a Marketing Plan and a Business Plan Marketing Plan Business Plan The plan is intended for the potential customers and general public. It is implemented by the personnel involved in sales, advertising, distribution and promotion. (Solomon et al, 2012) Potential investors are shown a bus iness plan as a first step to help them decide whether or not to invest. According to Mason and Stark (2004, p. 227), â€Å"Bankers stress the financial aspects of the proposal and give little emphasis to market, entrepreneur or other issues.† Marketing plan has a customer or consumer oriented persuasive approach (Cravens et al, 2009) Business plan has a financier or investor oriented persuasive approach (Chen et al, 2009) The planner must concentrate more on preparing milestone charts, sales forecasts, marketing research, etc. (Wood, 2011) The planner must refer to the marketing plan but adequately cover the financial information and other details related to the organization. It must be used along with the business plan to draft the strategic plan Business planning is precondition to strategic planning Helps in the processes like â€Å"product line asset development† (Kang et al, 2002, p. 203) Helps in a variety of processes such as management accounting, cash flows, preparing financial statements, etc. Table – 1: Marketing Plan versus Business Plan What are Marketing Plans used for? The marketing plan includes various kinds of analyses to determine marketing strategies like pricing, distribution, and perks that are to be rewarded to the salespeople and retailers who generate better sales for the company. Further, strategic incentives are provided on the basis of market plans. These incentives include different types of offerings, special packages, free gifts, etc. to retain the existing clients and/or attract new clients particularly for service-oriented businesses. In sum, a marketing plan is drafted for achieving sales & distribution targets, winning customers, achieving competitive advantage,

Sunday, October 27, 2019

Steganography Using Lsb Insertion Technique Computer Science Essay

Steganography Using Lsb Insertion Technique Computer Science Essay Steganography is a method used for hiding a message by fixing in a carrier data. There are two types of data. They are internal data and external data .The external information contains visible part or audible part of data which is not useful for data owner and the internal information contains embedded data. The techniques used in Steganography makes hard to detect hidden message within an image file. By this technique we are not only sending a message but also we are hiding the message. Steganography system is designed to encode and decode a secret file embedded in image file with a random Least Significant Bit (LSB) insertion technique. By using this technique the secret data are spread out among the image data in a random manner with the help of a secret key. The key generates pseudorandom numbers and identifies where and in which order hidden message is laid out. Steganography includes cryptography which is an advantage for Steganography .In cryptography, diffusion is applied to secret message.   INTRODUCTION: The Data transmitted comes in many forms and it is used for more than one application. Communications should be done secretly. Secret communication varies from bank transfers, corporate communications and credit card purchase. Steganography is an art of embedding a secret message into a normal message. Steganography is used in watermarking for protecting data copyrights .Unsurprisingly, methods of Steganography change because innocuous spam contents are growing frequently by embedded texts Cryptography is technique used to make secret message scribbled for third party and are normally used in internet. The encrypted message is targeted by attackers in cryptography because it hides the message content. An another data hiding technique known as watermarking used for embedding and hiding, some symbol data or digital manifest in the digital valuable data like photo picture, digital movie, musical sound etc. Watermarking purpose is mainly used to protect ownership or copyrights of the data. In this technique, hardness of embedded evidence and hidden evidence are very small and is important. In this technique the important information is present in external information which is visible or audible. In the Steganography technique, confidential information is made invisible to a human eye by embedding it as a dummy data such as a speech sound and a digital image. Steganography contains another research topic called as steganalysis which is used to find a stego file from the available files. Steganalysis is used in detecting suspicious image file. The suspicious image files are embedded with the crime associated information All traditional Steganography techniques have limited information-hiding capacity. These techniques can hide 10% or less than 10% data of a carrier data. The principle of these techniques is to replace frequency components of carrier or to replace LSB bits of multivalued image with secret information. Steganography uses image as a carrier data and it embeds secret information in bit planes .We can replace all noise like regions in the bit planes without disturbing the quality of image and is termed as B.P.C.S Steganography .BPCS Steganography is known as Bit plane complexity segmentation Steganography. BACKGROUND HISTORY: Steganography is derived from a Greek word which means as a covered writing or hidden writing. In Steganography stegos means cover and grafia means writing. THEORY: Steganography is used to hide confidential information from human eyes by embedding it in a carrier data such as digital image or speech sound. A carrier data is a color image having RGB color components in a multi-bit data structure. The embedded information is extracted using special extracting program and key .The techniques of Steganography are different from file camouflage or file deception technique. File deception is a technique used for hiding secret data in computer file and it almost looks like a Steganography. But, it is an trick to disguise a secret-data file as a normal file and is possible in files which have dont care option. For example, Word file or JPEG image OR MPEG will allow for adding an extra data (extension) at the end of a regular file. Even an extra data (which can be encrypted) are added, the JPEG image, word file or MPEG looks like the original image and original sound, or document on the computer. People may think this is due to Steganography. The lengthy files are easily detected by engineers. So, file deception and Steganography are different. The Steganography softwares that are available in the market are based on file deception. In Steganography, if output file size is increased by embedding the information then the program is called as File deception. A secret data can be made unreadable by encrypting the data. The secret data should be encrypted to make it unreadable for third party. With the help of data encryption, secret data can be safe. Data encryption is based on data scrambling and it uses a secret key. Data encryption can create a doubt to the people that owner of the data is hiding something in an image. In data encryption we can find easily that he is hiding something in a image. Therefore encryption of data is not enough. Steganography is the solution for data encryption. There are two types of data in Steganography .they are secret data and carrier data. Secret data is very valuable when compared to the carrier data. Carrier data is a type of dummy data which is not so important but it is needed. The data which is embedded is called as stego data.If we want to recover the secret data , we can extract that data from stego data.We need a special program or a key for data extraction.. The carrier is image data which has color components of red green and blue colors in 24 bit pixel structure. The figure below shows an example of carrier image and stego image. The secret data is embedded in stego image. Steganography is a method of hiding the secret data by fixing it in media data .For example in the figure a secret data is embedded but we cant find in which place the secret data is embedded. The Embedded data will be very safe in the Steganography because it will hide content of the message and location of hidden image. There are many methods to embed the data .but; it is very hard to find about the method used in embedding the message.. Steganography can co-operate with cryptography to embed the encrypted data safely. In Steganography , Stego data will not have any evidence about the embedded data. The Steganography user should discard the original carrier data after embedding such that it will not allow comparison of stego and original data. Embedded capacity should be larger. BPCS method is the method available method for image Steganography. If anyone detect the Steganography image, it is very difficult for him to retrieve the hidden image. There are three basic ways to hide a message in image. They are Injection, substitution and generation. Using Injection method we can find in which place data to be inserted and using substitution we can find least significant bits for hiding the message. Using generation method we can create a new file based on the hidden information. Method of implementation: Least significant bit insertion is one of the important methods of implementation. In this method, the LSB bits of byte are altered so that it form bit string and represents an embedded file. By changing the LSB bits, it will cause some small differences in color which are not noticeable to human eye. After that an image is compressed and a text message is hidden in image .In LSB method, LSB bits of the covered image is altered such that they form embedded information. Embedding a message into cover image will result a stego image. For normal vision, stego image looks identical as cover image; this is because of only small changes of pixel values. Therefore there is no significant difference. The embedded message is sequentially embedded in covered image so that it is easy for a third party to recover the message by retrieving the pixels sequentially starting from the first pixel of the image. Steganography uses a key which as a better security. It is difficult to recover the embedde d image without valid key. LEAST SIGNIFICANT BIT INSERTION Least significant bit insertion is the common technique used in Steganography. In LSB method, an image is used. An image is more than strings and string of bytes. Each byte in an image represents different colors. The last few bits in a color byte do not hold much significance as the first few bits. Therefore only two bits differ in last few bits that represent a color which is undistinguishable to human eyes. In LSB method, least significant bits of a cover image are altered such that we can embed information. The example shows how letter A is hidden in first 8 bytes of 3 pixels in a 24 bit image. Since the 8 bit letter A requires only 8 bytes to hide it, ninth byte of the 3 pixels used to hide the next character of the hidden message. Example shows that in a 24 bit image, letter A can be hidden in first 8 bytes of 3 pixels Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A: 01000010 Result: (00100110  11101001 11001000) (00100110  11001000 11101000) (11001001  00100110  11101001) The five underlined bits are the 5 bits which were altered. With LSB insertion technique, on an average half of the bits of an image are changed. A is a 8 bit letter and requires 8 bytes for hiding. The ninth byte of 3 pixels is used for hiding next character of secret message. The slight variations of this technique allows a message to embed into two or more least significant bits per bytes, and increases the information hidden capacity of the cover object .but cover object is degraded and easily detectable.LSB insertion is easy to implement and is also easily attacked if the modifications are done wrongly. Improper modifications in color palette and simple image calculations will destroy hidden message. Image resizing and image cropping are some examples of image manipulations. Applications of Steganography: Steganography is applicable the following areas. 1).Private communication and secret data storing. 2).Security of data. 3).Accessing the control system for distributing the digital content 4).Media data base systems. The application area of Steganography differs based on the features utilized in a system. 1).Private communication and secret data storing: The secrecy of embedded data is important in this area. Steganography provides capacity for hiding the existence of secret data and Steganography makes very hard to detect the embedded data in a image and Steganography strengthens the encrypted data. In Steganography, select a carrier data according to the size of embedded data. Carrier data should not be effective. Now embed the secret data using an embedding program with the help of a key. To recover the embedded data, an extracting program is used with a key. Before starting the communication in this case, Key negotiation is used 2).Security for a data: Steganography is used in military applications for maintaining the secret data .In military secret information should be very secure to avoid sudden attacks on them from enemies. Steganography can hide the existence of contents of data but it cannot hide the presence of data. Data should not be larger than carrier image .Steganography strengthens the secrecy of the data. Fragility of the embedded data is advantage for this application area. Embedded data can be rather fragile than robust. But embedded data is fragile in most of the Steganography programs. No one can change or tampered the data .If anyone changes or tampers the data, and then it can be easily detected by the extraction program. 3). Accessing the control system for distributing the digital content : In this application, embedded data is explained to publicize the content. Here embedded data is hidden data. Digital contents are being commonly distributed by internet. Some music companies release the music for free in some web sites and in some sites it charges for the music downloads. Digital contents are equally distributed to user who accesses the web pages. Even it is possible to send digital content to e-mail messages it takes more time. We can to upload any content on the web page; we can issue a special access key to extract the content. In Steganography a prototype of an access control system is developed for distributing the digital content through internet. This can be explained by following steps. 1).The content owner will classify his digital content in a folder and embeds the folder according to Steganography method by accessing the folder access key and uploads embedded content on web page. 2).On the web page, owner will explains the contents clearly and publicises it worldwide and gives his contact information on web page. 3).The owner will receive access request from the customer who visited that web page. Then owner creates an access key and provides it to the customer for free or charge. 4).Media database systems: In this type of application secrecy of data is not important, converting two types of data into one data is important. Photos, Pictures, movies and music will come under media data. For example the media data for a photograph will contain about the title of the photo and date and time of a photo and it also contain about the camera used to take that photograph. à £Ã¢â€š ¬Ã¢â€š ¬ Data hiding in .bmp images: There are several formats exists for an digital image. .BMP, JPG, GIF are some formats .Each format is associated with advantage and disadvantages. Because of its simplicity, windows BMP file offers more advantages. It has an advantage of widely spreader and the information contained is minimum .Bmp file is a binary file.bmp file is divided into four sections such as file header, image header, color table and pixel data. The file header is used to know about size of the image and to learn where actual image data is located within the file. The Image header gives information about the image and its data format such as width and height of the image. Image header also gives information such as how many bits are used per pixel and checks whether the image data is compressed data or uncompressed data. Depending on the image data, color table will be present. When color table is not present, a set of bit masks are used to extract the color information from the image data. When dealing with 24-bit image, color table is not present. When dealing with 8-bit image, color table consists of 256 entries. Each entry consists of four bytes of data. In these four bytes of data, first three bytes are blue, green and red colors values .The fourth byte must be equal to zero because it is not used. In 8-bit format, each pixel is represented by single byte of the data which is index in to color table. In 24-bit format, each pixel I represented by RGB component values .The pixel data holds entire hidden data and there are changes by one pixel value either positive or negative. MATLAB: The MATLAB is a language for technical computing. MATLAB integrates computation, visualization and programming in a easy way in which problems and solutions are expresses in mathematical notation. Typical uses include Math and computation Data acquisition Algorithm development Modelling, simulation and protyping Data analysis, exploration and visualization Application development MATLAB is a system whose data element is an array without dimensions. It allows in solving computing programs such as Matrix and vectors formulations. It writes program in a scalar language such as FORTRAN within a fraction of seconds. MATLAB can be abbreviated as a matrix laboratory. MATLAB was developed to access matrix software. The matrix software was developed by linpack and eispack projectsdeveloped .MATLAB engine incorporates LAPACK and BLAS libraries by embedding the state of art in software for matrix computation. Matlab has evolved over a period of years with input from many users. MATLAB has become a standard tool for advanced courses such as engineering, maths, and sciences .MATLAB is like a tool for high research productivity, analysis and development. MATLAB SYSTEM: MATLAB system consists of five main parts: 1).desktop tools and development environment 2).MATLAB Mathematical functions library 3).MATLAB language 4).graphics 5).MATLAB application program interface 1).Desktop tools and development environment: MATLAB is a set of tools and facilities that helps to use and to become more productive with MATLAB function and files. In MATLAB most of the tools are graphical user interfaces and includes MATLAB desktop, command window, editor and debugger, code analyzer and browser for viewing help, workspace and folders. 2). MATLAB Mathematical functions library MATLAB is a huge collection of computational algorithms ranging from elementary functions such as sum, sine, cosine and complex arithmetic to more sophisticated functions like matrix inverse, matrix Eigen values, Bessel functions and fast Fourier transforms 3). MATLAB language MATLAB language is an high level matrix language with control flow statements, functions, data structures, and object-oriented programming features. It allows small and large programming .In programming in large is to create complete large and complex application programs and programming in small is to create quick and dirty throw away programs. 4). GRAPHICS:- MATLAB is having extensive facilities to display vectors and matrices as graphs. It includes high level functions for two dimensional and three dimensional data visualization, image processing, and presentation graphics .MATLAB also includes low-level functions and allows in customizing appearance of graphics to build complete graphical user interfaces on MATLAB application. 5).MATLAB Application program interface (API):- It is a library which allows us to write C and FORTRAN programs to interact with MATLAB .It also includes facilities such as calling routines from MATLAB, calling MATLAB as a computational engine and for reading and writing MATA FILES. MATLAB working environment: MATLAB DESKTOP:- It is the main application window in MATLAB. This window consists of five sub windows such as current directory, command history, workspace browser, command window, and a figure which is shown while displaying a graphic. The User types commands in command window and expressions at the prompt. The output of these commands is displayed. In MATLAB, workspace is defined as a set of variables created by user in work session. These variables are shown in workspace browser. The workspace browser launches array editor by clicking on a variable. In array editor, we can edit properties of a variable and we can also get information about the variables. In MATLAB, the current directory tab is above the workspace tab. The Current directory tab shows contents of current directory and its path is shown in current directory window. In windows operating system, the path c:MATLABwork indicates work as a subdirectory and MATLAB as a main directory and is installed in c drive. In current directory window, click on an arrow button to see recently used paths. To change a current directory, click on a button on right side of a window. To find M-files and other MATLAB files, MATLAB uses a search path that is organized in system files. The files that are to be runned in MATLAB should locate in the current directory or in directories available on search path .Math work related tools and files that are supplied by MATLAB are already exist in search path. On desktop from file menu select set path to modify or to add search path or to see which directories are existing on search path. To avoid repeated changing, the current directory adds a commonly used search paths to directory. In MATLAB, the commands used by the user in current and earlier sessions are recorded in command history window. Using right click on command history window, we can select and re-execute previously entered MATLAB then it launches a menu. For execution of the commands select the options from menu. We can select various options from menu for execution of the commands which are useful in implementation of various commands. MATLAB EDITOR TO CREATE M-FILES: The MATLAB editor is used for creating M-files. The graphical window will appear in a separate window or a sub window. The M-files are represented as extension .m on desktop. MATLAB editor is having some options to debug a file and saving a file and to view the file. In differentiating various codes MATLAB editor will perform some simple checkings. In MATLAB, text editor is used to write and to edit M-functions. To edit a text in MATLAB, type as EDIT at prompt then it an M-file is opened with a filename. Therefore it is ready for editing. The files should be in a search path or in a current directory. How to get help in MATLAB: Use the MATLAB help browser for any help in the MATLAB. The help browser will be opened in a separate window when we click on symbol (?) on desktop toolbar or in command window type as help. The Browser Help is displayed separately as a HTML document .HELP browser is incorporated into MATLAB desktop .HELP pane and DISPLAY pane are the two panes that are available in HELP browser. HELP pane is used in finding the information and display pane is used for viewing the information. To perform a search, Navigator pane is used. CONCLUSIONS: This project explains techniques for embedding a data in an color image and also some features are added which include file types excluding bitmap images and Steganography methods. Data extracted from cover image depends on pixel values of an image CODING : %I=imread(sravs.bmp); %%read an image I=uigetfile(.bmp,select the iamge); I=imread(I); b=1; disp(orginal text to be embedded); %txt= textread(message.txt, %c, whitespace , ); fid = fopen(message.txt); A=fread(fid,schar); fclose(fid); A1=char(A); disp(embedding text); txt=A1; txt N = 8*numel(txt); %%%%%%% to find out the total no of elements for the text S = numel(I); %%%% total no of elements for the image if N > S warning( Text truncated to be within size of image );%%%%%%if text size is more than the image size %%%%%% process block segmentation txt = txt(1:floor(S/8));%%%%%% dividing into 8*8 blocks for the text N = 8*numel(txt); end %%%%% initializing the total no of bits for the text and the image p = 2^b; h = 2^(b-1); I1 = reshape(I,1,S);%%%%% resize the elemnts for the new image size %figure ,imshow(I1,truesize); addl = S-N;%%%%%%%take the difference of the elments for the imagfe and the text dim = size(I); I2 = round(abs(I1(1:N)));%%%%%%take the complexity of each block si = sign(I1(1:N)); for k = 1:N if si(k) == 0%%%%%%%replace ment of the bits for the complexity blocks si(k) = 1; end I2(k) = round(I2(k)); if mod((I2(k)),p) >= h I2(k) = I2(k) h; end end bt = dec2bin(txt,8);%%%%%% bint = reshape(bt,1,N); d = h*48; bi = (h*bint) d; %%%%%%remove the complexity blocks of the image and replace with the non complexity blocksof image I3 = double(I2) + bi; binadd = [bi zeros(1,addl)]; I4 = double(si).*double(I3); I5 = [I4 I1(N+1:S)]; intl = reshape(I5,dim);%%%%%%resize the image and display the stego cotents figure,imshow(intl);title(stegnograph image); %return figure,imshow(I);title(original image); I=im2bw(I); %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%decoding%%%%%%%%%%%%%%%%%%%% siz=length(txt); bsiz = 8*siz; n = numel(intl); if bsiz > n error(Size of text given exceeds the maximum that can be embedded in the image) return end dim = size(intl); addl = n-bsiz; I1 = reshape(intl,1,n); I2 = round(abs(I1(1:bsiz))); p = 2^b; h = 2^(b-1); rb = zeros(1,bsiz); for k = 1:bsiz I2(k) = round(I2(k)); r = rem(I2(k),p); if r >= h rb(k) = 1; end end rbi = (dec2bin(rb,1)); rbin = reshape(rbi,siz,8); rectxt = (bin2dec(rbin)); disp(retrived text from the steg image); rextxt=char(rectxt) return