Friday, November 29, 2019

Can you keep a secret Review Essay Example

Can you keep a secret? Review Paper Essay on Can you keep a secret? was right Mikhail Bulgakov. Such a conversation can lead to anything. I think these words would readily confirmed Emma heroine Sofia novel Kinsella Can you keep a secret? » She blurted out all my secrets fellow traveler on the plane when the aircraft hit turbulence, and she thought. that would not survive. Of course, she could not even imagine that the encounter with this person again. However, life as we know, loves surprises a random fellow traveler found himself the head of the company where she worked as an intern Yes, it seems, poor Emma was in trouble. What will happen now? What happens when womens secrets cease to be? Lets try to imagine a world of absolute truth. So one sleepless night after arrived at work and all the colleagues to greet him, saying, Something sucks you look today Or girlfriend bought a gold-colored dress that you can not stand, and asks how you dress. And you answer, just hate that color and would never imagine such a thing is not bought. Or give you a thing, and you already have it. Well, you and the man replied that he knowingly threw money away I do not know about you, but to change the world of the Absolute Truth is not attractive. And in general, and people, especially women, should have their little secrets. Otherwise dull will to live. The world has lost the aura of mystery We will write a custom essay sample on Can you keep a secret? Review specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Can you keep a secret? Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Can you keep a secret? Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer However, let us return to the same novel by Sophie Kinsella. In terms of story book banal, because the reader can always easy to predict the development of the plot. But, despite this, the product turned out very sincere, and all the characters himself. Especially Emma. Perhaps that is why I occasionally like to give the forehead and Connor and Jack to behave properly. However, Sophie Kinsella always turn out very vivid characters Read this book, I decided on the eve of visiting our city the new novel by the author -. The girl and the ghost. I wonder what will please the writer at this time? Hopefully, it will not change its corporate identity Can you keep a secret Review Essay Example Can you keep a secret? Review Paper Essay on Can you keep a secret? To be honest, I went to the store for a second book Shopaholic yes, throw in my slippers, I read modern bestsellers, yes, horror of horrors, I nekotrye like, and I have them (shame!) I re-read. Confessions of a Shopaholic, perhaps, one of those that re-read (Im talking about the first book), but its not about him. So, you need a book in the store did not have to go to another was too lazy and relying on the easy language and humor Kinsella, I chose this book. Well, in my eyes she is losing Secret world shopaholic. It seems to be once again a simple unpretentious character, good for nothing, the girl in the street, so, again, an unexpected romance with a rich and out of reach, but something is missing The book I read voraciously, for 2 weeks ( for me it is very fast, usually their nightly reading I detain the book for a month and a half). Read and put it on the shelf We will write a custom essay sample on Can you keep a secret? Review specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Can you keep a secret? Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Can you keep a secret? Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer There was something in it secondary, unnatural, fabulous -. And crumpled interchange. Maybe something I do not understand in life, but could not for one head formed a happy ending on a background of complete failure! And Jack and Emmas romance seems too fantastic, unreal. If feelings of Emma can be more or less follow and understand (damn stranger from the plane, which is why something blurted out all my ins and outs where to be, even if the plane fell, but this was an occasion to talk only about relationships and life in general, and not cut and its size it is a multi-chief), in Jacks feelings, I do not believe it. All too sugary Yes and Emma in the match against the Rebecca plays for me some it is flat, schematic Spoon honey:.. I was in the book moments that made me laugh. For example, attempts Emma slip unnoticed office or surgery Jemima. And the story of the face of the heroine always impresses In short, for me this book -. The way the brain relax after a working day, a great book for the aircraft (which, actually, I took it too), but no more. With all my love to the modern (and not so) English literature and sweet novels about ordinary, nothing notable people.

Monday, November 25, 2019

Development f the Atomic Bomb essays

Development f the Atomic Bomb essays In the 1930s, some scientists theorized that bombarding an atom's nucleus with a neutron from another atom would cause the first atom to split in two. The splitting atom would release another neutron, which would then strike a neighboring atom, causing it to split, and so on. It was thought that each splitting atom would release a tiny spark of energy. In a nuclear chain reaction, trillions of atoms would split in less than a millionth of a second, thereby giving forth an awesome burst of power. This process of deriving energy through a chain reaction is called nuclear fission. One of the leading scientists interested in nuclear fission was Leo Szilard. The gifted physicist was born in Hungary and educated at German universities. While visiting London in 1933, Szilard was struck with a monumental idea: "What if he could find an element that would emit two neutrons each time it was bombarded by one neutron? He later wrote, "Such an element could surly sustain a nuclear chain reaction. While Szilard worked to advance his idea, Adolf Hitler and the Nazi party took over Germany. Under Hitler's control, Germany started building tanks, military airplanes, and bombs. At the time, German scientists led the world in nuclear physics. Szilard feared that the Nazis could develop an atomic bomb and become powerful enough to rule the world. Sensing that war would break out in Europe, Szilard moved to the United States in 1938. Shortly after he moved, German scientists shocked the world by announcing that they had split uranium atoms by bombarding them with neutrons. For the first time in history, the atom had been smashed through man-made means. One day in July 1939, Szilard and Edward Teller, another Hungarian born physicist who studied in Germany, went to the home of Albert Einstein. They told Einstein that they believed Germany would soon be able to make an atom bomb. Szilard and Teller felt that that a scientist as famous as Einstein c...

Friday, November 22, 2019

Psychology of eating Term Paper Example | Topics and Well Written Essays - 1250 words

Psychology of eating - Term Paper Example In other cases, we tend to repent after having consumed a heavy meal, which affects our moods and declines our efficiency in the daily life activities. There is dire need to examine the psychology of eating in order to identify ways in which we can control our food intake, and maintain our good looks, and attitude towards food, which is the fundamental source of energy for us. Driving factors for eating behavior: Booth (1994, p. 1) has presented the psychological definitions of food and drink. According to Booth (1994, p. 1), food is anything that is edible and drink is anything that humans consider potable. In order to understand the psychology of food, understanding of the factors the drive hunger and thirst is important. According to Cleveland Clinic (2005), experts have expressed that factors that influence our attitudes towards food include, but are not limited to cultural, social, individual, evolutionary and familial factors. In certain cultures, food is fundamentally consider ed as a source of pleasure and eating is thought of as a good pastime. There are also cultures which take food as a necessity for survival, but do not consider eating for pleasure a good idea. Likewise, there are other social and personal factors that shape an individual’s attitude towards food. ... 5). Negative psychological effects of poor eating habits: We should be able to control our eating habits instead of letting our eating habits control us in order to maintain positive attitudes towards food and ensure the consumption of healthy diet. We normally take food as a means to regulate our tensions and feel good at least for the portion of time, in which we are eating. If we loose to our timeless and unnecessary cravings and eating temptations, we may in fact end up increasing our tensions. This may happen because the underlying cause of tensions is often not related to the food, yet food is consumed as a means to regulate the tension. This is the same as taking wrong medication to cure a disease that actually requires some other treatment. In such cases, not only does the original disease sustains, but also we acquire negative side effects of undue treatment. In the case of food, this shows up in the form of obesity and ruined looks. Thus, consuming food to regulate tensions not only sustains the original cause of tension, but adds to it by making us feel physically unfit. Overeating makes us feel negative about our self image as we gain weight, and add unnecessary volume to our figure. Human psychology and weight management: Psychology is a field of science that essentially depicts the reasons people indulge in certain activities or display certain behaviors and offers a rationale for the way people do it. Weight management requires deep understanding of the psychology of eating, which can best be explained by two core areas: Behavior: Regulating eating habits requires manipulation of behavior. Behavior can be treated through study of the patterns of eating an individual routinely maintains. Cognition: Human cognition can be controlled with

Wednesday, November 20, 2019

Syllabus Design in the Arena of English Language Learning in South Kor Essay - 2

Syllabus Design in the Arena of English Language Learning in South Korea - Essay Example This strategy would dictate that students would be taught other subjects, such as science and social studies, in English. The idea would require students to be language students of whatever content is being taught. Because I have taught ESL in Korea for 7 years, have taken a course in TESOL, and my experience in my current syllabus writing course, I could have predicted the negative reaction to the program. The content-based syllabus was met with widespread criticism and the program was quickly terminated. This outcome was predictable based on the problematic application of a content-based syllabus at the middle and high school level. Syllabus design has exposed me to the requirements of readiness in second language teaching. As a rookie teacher, the conventional wisdom taught that a good second language teacher would rely on a structural and notional-functional syllabus. A structural syllabus is a collection of forms and structures, while the notional is a collection of the functions that are performed when the language is used. In light of my recent educational experience, I no longer rely on those outdated models nor do I apply them. My daily schedule involves teaching conversational English to classes of students with varying backgrounds. The students may range from middle school level to the business professional. The classes may be all of one level or mixed, which demands a different approach to the question of the syllabus for each class. I approach my classes, and the issue of the syllabus, from the principle of theory meets reality. Beyond simply teaching the class, a key component of the syllabus is to maintain the motivation of the students. For the most basic learners, my approach is to use a mixture of a structural/notional syllabus. For the false beginners, a skill-based/ task-based syllabus is used. For my  intermediate and higher level learners a content-based syllabus is used.

Monday, November 18, 2019

Abortion the topic of debate in the media Essay

Abortion the topic of debate in the media - Essay Example I am prepared to argue that abortion should not be legalized as instead it becomes common, takes away the value of human life, is not a 1 person issue, and it in fact causes women in some countries to be less free. In Mascle’s article she believes that in our society the illegalization of abortion is just another way to keep men at the top and women struggling at the bottom. She believes that taking the woman’s right to say no to giving birth to an unwanted child away gives men the upper hand. This in turn leaves women once a gain feeling powerless. She says, â€Å"Pregnancy and child care have long been ways that men have controlled and dominated women as well as restricted their education and professional lives (Mascle, 2).† She also believes that this not only works to dominate women but it also targets the poor and underprivileged. Mascle also believes that instead of spending a vast amount of money on trying to make sure that abortion is illegal, organizatio ns and individuals should be using this same money to help. She thinks that this money could be used to help the already helpless and needy children and disadvantaged women we have in our world. A third reason Mascle states in her article for the legalization of abortion is that women should not have to be forced to go through the physical procedure of giving birth. She says, â€Å"Pregnancy and child birth is a physical ordeal that can have a lifelong impact on a womans mental and physical health and well being (Mascle, 2).†

Saturday, November 16, 2019

Implementation Of Steganography For Audio File Format Computer Science Essay

Implementation Of Steganography For Audio File Format Computer Science Essay Abstract The project entitled Audio Steganography is the application developed to embed an audio file in another audio signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography. Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of Steganography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of Steganography. The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted. 1. Introduction 1.1Synopsis 2 .System configuration 2.1 Software requirements 2.2 Hardware requirements 3. System Analysis 3.1 Feasibility study 3.2 Existing system 3.3 Proposed system 3.4 Analysis report 4. System design 4.1 System description 4.2 Functional requirements 5. UML Diagrams 6. Implementation 7. Testing and Debugging 8. Output Screens 9. Conclusion 10. Bibliography Introduction 1. Introduction Synopsis Encryption of data plays a vital role in the real time environment to keep the data out of reach of unauthorized people, such that it is not altered and tampered and sending the in audio format is most secured way to transfer the data through the network. The Audio Steganography is software, which tries to alter the originality of the file into some encrypted form and embed the file into an audio file. Then the users can easily and securely carry the compressed data wherever he wants. The major task of the Audio Steganography is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. The Application should have a reversal process as of which should be in a position to de embed the data file from audio file and decrypt the data to its original format upon the proper request by the user. While the Encryption and Decryption is done the app lication should confirm the standards of authentication and authorization of the user. The Entire application should strive to achieve a user friendly Graphical User Interface, which need to be in a self-learning mode for the end user. The System Should provide all the functional standards of proper navigation with in the environment, which makes it possible for the users to have a smooth flow while working under the environment. The Overall system should provide proper menu based navigation for easier navigation and operation. The Application should be designed in such a way that, as soon as it starts create a Buffer and associate this buffer to some homogeneous data environment, the application should ask the user for the Encryption Key details and should start its functionality upon the logistics that are provided with in this key. The key should be designed in such a way that it prevents the unauthorized persons from stealing the information at any point of time. This is some part of securing the data from third party people. And the other way of securing the data is using Steganography in which embedding the encrypted file in to a audio file. If any one track that file they only see the audio file not the data. The application of De-embedding, Decryption and de compress should be a reverse process at the other end and should be translated only when the receiver of the data applies the proper reversal key. The Decryption process should have a log-based methodology that will take care of any errors that may be encountered while the system is under utilization and should record all those events, which are above the general standards of security. This system basically uses the Blowfish encryption algorithm to encrypt the passwords. This algorithm is a 64-bit block cipher with a variable length key. This algorithm has been used because it requires less memory. It uses only simple operations, therefore it is easy to implement. 1) Blowfish Algorithm Implementation Module 2) Steganography Module 3) Compression Module 4) GUI Module System Configuration 2. System Configuration 2.1 Software Requirements: Operating System Windows NT/2000 (Client/Server). 2.2 Hardware Requirements: Software requirements Front-end: Java J2SDK 1.5, Swings. System Configuration Pentium III Processor with 700 MHz Clock Speed 256 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card. System Analysis Feasibility Study Fact Finding Techniques In this system we are going to develop a facility to a user that he will not face any difficulty at the time of usage like data missing, one way contacts, one view contacts. As we are developing this system with an encoding technique of images the user will not be bothered on which camera support is using, as well in sound. As we are maintaining one technique of speed controlling the frame relay will not be a problem for the user like over speed display, hanged display. 3.1 Feasibility Study A feasibility study is a high-level capsule version of the entire System analysis and Design Process. The study begins by classifying the problem definition. Feasibility is to determine if its worth doing. Once an acceptance problem definition has been generated, the analyst develops a logical model of the system. A search for alternatives is analyzed carefully. There are 3 parts in feasibility study. 3.1.1 Operational Feasibility: Question that going to be asked are Will the system be used if it developed and implemented. If there was sufficient support for the project from the management and from the users. Have the users been involved in planning and development of the Project. Will the system produce poorer result in any respect or area? This system can be implemented in the organization because there is adequate support from management and users. Being developed in Java so that the necessary operations are carried out automatically. 3.1.2 Technical feasibility Does the necessary technology exist to do what is been suggested Does the proposed equipment have the technical capacity for using the new system? Are there technical guarantees of accuracy, reliability and data security? The project is developed on Pentium IV with 256 MB RAM. The environment required in the development of system is any windows platform The observer pattern along with factory pattern will update the results eventually The language used in the development is JAVA 1.5 Windows Environment 3.1.3 Financial and Economical Feasibility The system developed and installed will be good benefit to the organization. The system will be developed and operated in the existing hardware and software infrastructure. So there is no need of additional hardware and software for the system. Existing and Proposed System 3.2 Existing System In the traditional architecture there existed only the server and the client. In most cases the server was only a data base server that can only offer data. Therefore majority of the business logic i.e., validations etc. had to be placed on the clients system. This makes maintenance expensive. Such clients are called as fat clients. This also means that every client has to be trained as to how to use the application and even the security in the communication is also the factor to be considered. Since the actual processing of the data takes place on the remote client the data has to be transported over the network, which requires a secured format of the transfer method. How to conduct transactions is to be controlled by the client and advanced techniques implementing the cryptographic standards in the executing the data transfer transactions. Present day transactions are considered to be un-trusted in terms of security, i.e. they are relatively easy to be hacked. And also we have to consider the transfer the large amount of data through the network will give errors while transferring. Nevertheless, sensitive data transfer is to be carried out even if there is lack of an alternative. Network security in the existing system is the motivation factor for a new system with higher-level security standards for the information exchange. 3.3 Proposed System The proposed system should have the following features. The transactions should take place in a secured format between various clients in the network. It provides flexibility to the user to transfer the data through the network very easily by compressing the large amount of file. It should also identify the user and provide the communication according to the prescribed level of security with transfer of the file requested and run the required process at the server if necessary. In this system the data will be send through the network as a audio file. The user who received the file will do the operations like de embedding, decryption, and decompress in their level of hierarchy etc. Analysis Report 3.4 System Analysis People for long time have tried to sort out the problems faced in the general digital communication system but as these problems exist even now, a secured and easy transfer system evolved and came to be known as the Encryption and Decryption of the data and converting the file to audio format to be transferred using the cryptographic standards and Steganography. The advantages of this Audio Steganography are: High level Security Cost effective transfer In this fast growing world where every individual free to access the information on the network and even the people are technically sound enough in hacking the information from the network for various reasons. The organizations have the process of information transfer in and out of their network at various levels, which need the process to be in a secured format for the organizational benefits. If the organizations have the Audio Steganography System, then each employee can send the information to any other registered employee and thus can establish communication. The audio file that the employee sends reaches the destinations within no time in an audio file format where the end user need to de embed the file, decrypt it and de compress and use for the purpose. The various branches of the organization can be connected to a single host server and then an employee of one branch can send files to the employee of another branch through the server but in a secured format. System Design 4. System Design The System Design includes the maintenance of the secure file transfer service with a prescribed encryption format and split at the interested level of encryption, and embed process and the receiving service at the other end with de-embed and decryption process. The design also includes the provision of facility to the user to manipulate the concerned information according to his personal use and communication process. The design also needs to provide the communication channel to the user to communicate with other registered users through the mailing services in a reliable and secured format. Authorization and authentication services are preferred most for this purpose. The System Design includes the maintenance authorization services, File and directory services with a prescribed encryption format at the interested level of encryption and the receiving service at the other end with decryption process. The design also includes the provision of facility to the user to manipulate the concerned information according to his personal use. The design of Audio Steganography system, basically involve the interface architecture, Security services, and communication system. In the interface design we involve with the design of the user interface with GUI standards and a proper navigation system where the user need to enter into the flow of transactions authorization services are check and further access is provided into the system. Then the user needs to select into the operations provided through the GUI where compression, encryption, embedding, de-embedding, Decryption, Decompressing and sending of the file, General information and exit are provided. Here the Encryption and decryption and services are provided connecting to the security services module where the encryption and decryption are carried out using the cryptographic standards implementing the Blowfish algorithm. After the compression process is completed the user is selecting the file for encryption. After encryption of the file is completed the user is to select the file for embedding it to the audio file and sending through the network to the desired user by specifying the targeted users system IP address in the panel designed. Then the system gets connected to the targeted user and delivers the file in audio format after which the user working with the Audio Steganography software should go for the option De-Embed Files and decrypt the file by selecting the file path by which the file gets decrypted and decompress the file and is viewed on the system. 4.1 System Description The Audio Steganography system is designed basically in four different modules they are GUI module, Compression Module, Security System module, Steganography Module, Connection Manager Module. GUI Module basically deals with the design of the interface which include the service of providing the user with the flexibility of accessing the file system and selecting the required file for the transfer. It should also provide the system to collect the information from the user to check the authorization in providing the access to the file system. The interface is also to consider the design, which include the services of sending and receiving of the files with encryption and decryption standards. The Compression module basically deals with the compress and decompresses the file, which is used to send the file very easily which reduces the uploading time. Security implementation module considers the implementation of the encryptions and decryption standards in transfer the files from one system to another in a distributed environment. The system design, even need to support the user to select the level of encryption he/she needs to perform depending upon the file to be transferred. The basic algorithm used in this purpose is the Blowfish where the user can enter the key depending upon level encryption he is interested. The Connection Manager deals with the architecture, which supports the system to identify the end users for the communication and establish the communication. Connection and disconnection of the communication channel between the users for the access of file system and file transfer services. The Connection Manager receives the IP address to be connected and the file to be sent then establishes the connection and transfers the file. Functional Requirements: The Modules of the system are: 1) Blowfish Algorithm Implementation Module 2) Steganography Module 3) Compression Module 4) GUI Module Blowfish Algorithm: Blowfish is a block cipher that encrypts data in 8-byte blocks. The algorithm consists of two parts: a key-expansion part and a data-encryption part. Key expansion converts a variable-length key of at most 56 bytes (448 bits) into several sub key arrays totaling 4168 bytes. Blowfish has 16 rounds. Each round consists of a key-dependent permutation, and a key- and data-dependent substitution. All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookups per round. Sub keys: Blowfish uses a large number of sub keys. These keys must be precomputed before any data encryption or decryption. The P-array consists of 18 32-bit sub keys: P1, P2,, P18. There are also four 32-bit S-boxes with 256 entries each: S1,0, S1,1,, S1,255; S2,0, S2,1,..,, S2,255; S3,0, S3,1,, S3,255; S4,0, S4,1,..,, S4,255. Encryption and Decryption: Blowfish has 16 rounds. The input is a 64-bit data element, x. Divide x into two 32-bit halves: XL, xR. Then, for i = 1 to 16: XL = XL XOR Pi xR = F (XL) XOR xR Swap XL and xR After the sixteenth round, swap xL and xR again to undo the last swap. Then, xR = xR XOR P17 and XL = XL XOR P18. Finally, recombine xL and xR to get the cipher text. Function F looks like this: Divide XL into four eight-bit quarters: a, b, c, and d. Then, F (xL) = ((S1, a + S2, b mod 232) XOR S3, c) + S4, d mod 232. Decryption is exactly the same as encryption, except that P1, P2, P18 are used in the reverse order. Generating the Sub keys: The sub keys are calculated using the Blowfish algorithm: 1. Initialize first the P-array and then the four S-boxes, in order, with a fixed string. This string consists of the hexadecimal digits of pi (less the initial 3): P1 = 0x243f6a88, P2 = 0x85a308d3, P3 = 0x13198a2e, P4 = 0x03707344, etc. 2. XOR P1 with the first 32 bits of the key, XOR P2 with the second 32-bits of the key, and so on for all bits of the key (possibly up to P14). Repeatedly cycle through the key bits until the entire P-array has been XORed with key bits. (For every short key, there is at least one equivalent longer key; for example, if A is a 64-bit key, then AA, AAA, etc., are equivalent keys.) 3. Encrypt the all-zero string with the Blowfish algorithm, using the sub keys described in steps (1) and (2). 4. Replace P1 and P2 with the output of step (3). 5. Encrypt the output of step (3) using the Blowfish algorithm with the modified sub keys. 6. Replace P3 and P4 with the output of step (5). 7. Continue the process, replacing all entries of the P array, and then all four S-boxes in order, with the output of the continuously changing Blowfish algorithm. In total, 521 iterations are required to generate all required sub keys. Applications can store the sub keys rather than execute this derivation process multiple times. Steganography: Steganography is art of hiding information in ways that prevent the detection of hidden messages. Steganography derived from Greek, literally means Covered Writing. It includes a vast array of secret communications methods that conceal the messages very existence. Theses methods are including invisible inks, microdots, character arrangement, digital signature, and covert channels and spread spectrum communications. In this technology, the end user identifies an audio file, which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and audio file are sent. Prior to this the data is embedded into the audio and then sent. The image if hacked or interpreted by a third party user will open up in any audio player but not displaying the data. This protects the data from being invisible and hence is secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the audio file. The module deals with identifying the hidden data in the audio file. The module receives the audio file that is then browsed to remove the associated data. The data is then removed from the audio file. Compression and Decompression: Compression reduces the average code length used to represent the symbols of an alphabet. Symbols of the source alphabet, which occur frequently, are assigned with short length codes. The general strategy is to allow the code length to vary from character to character and to ensure that the frequently occurring character has shorter codes. We use utility package for compression. This technique maps arbitrary input into printable character output. The form of encoding has the following relevant characteristics. The range of the function is a character set that is universally re-presentable at all sites, not a specific binary encoding of that character set. Thus, the characters themselves can be encoded into whatever form is needed by a specific system. For instance, the character E is represented in ASCII system as a hexadecimal 45 and in EDCDIC- based system as hexadecimal- c5. The character set consists of 65 printable characters, one of which is used for padding. With 2^6 = 64 available characters, each character can be used to represent 6 bits of input. No control characters are included in the set. Thus, the message encoded in Radix-64 can traverse mail-handling system. That scans the data stream for control characters. The hyphen character - is not included. Graphical User Interface: This project is developed using graphics in java swings. The options available are displayed in a menu format, like in an online editor. Clicking on any particular menu item through mouse or through keyboard a dropdown menu is displayed, listing all the options available under that menu item and the user can select the needed actions according to their wish. UML Diagrams Use case Diagram Sender: Receiver: Use case Description: Use case name Compress Participating actors Sender Flow of events The user selected file will be compressed Entry Condition User must select the file. Exit condition Successful or Un Successful Compression of file. Quality Requirements Display proper error messages while compression. Use case name De Compress Participating actors Receiver Flow of events The user selected file will be de compressed Entry Condition User must select the file. Exit condition Successful or Un Successful De-Compression of file. Quality Requirements Display proper error messages while de-compression. Use case name Encrypt Participating actors Sender Flow of events The user-selected file will be encrypted with a given key. Entry Condition User must select the file and must give the key for encryption. Exit condition Successful or Un Successful Encryption of file. Quality Requirements Display proper error messages while Encryption. Use case name Decrypt Participating actors Receiver Flow of events The user-selected file will be decrypted with a proper key. Entry Condition User must select the file and must give the key for decryption. Exit condition Successful or Un Successful Decryption of file. QualityRequirements Display proper error messages while Decryption. Use case name Embed Participating actors Sender Flow of events The user-selected encrypted file will be embedding with selected audio file. Entry Condition User must select the one encrypted file and one audio file for embedding. Exit condition Successful or Un Successful Embedding process. Quality Requirements Display proper error messages while Embedding two files. Use case name De-Embed Participating actors Receiver Flow of events The user-selected audio file will be de-embedding to encrypted file. Entry Condition User must select the audio file for de-embedding. Exit condition Successful or Un Successful De-embedding of file. Quality Requirements Display proper error messages while De-embedding. Use case name Send File Participating actors Sender Flow of events The user-selected file will be send to the given host. Entry Condition User must select the file to send and must know the IP address of the destination host. Exit condition Successful or Un Successful sending of file to the destination host. Quality Requirements Display proper error messages while Sending the file. Class Diagram: Sequence Diagrams Sender: Receiver: Activity Diagram for Compression, Encryption, Embedding Sending Encryption System Sender Activity Diagram for De-Embed, Decrypt Decompress Receiver Decryption System Software Overview FEATURES OF THE LANGUAGE USED About Java Initially the language was called as oak but it was renamed as Java in 1995. The primary motivation of this language was the need for a platform-independent (i.e., architecture neutral) language that could be used to create software to be embedded in various consumer electronic devices. Java is a programmers language. Java is cohesive and consistent. Except for those constraints imposed by the Internet environment, Java gives the programmer, full control. Finally, Java is to Internet programming where C was to system programming. Applications and Applets An application is a program that runs on our Computer under the operating system of that computer. It is more or less like one creating using C or C++. Javas ability to create Applets makes it important. An Applet is an application designed, to be transmitted over the Internet and executed by a Java -compatible web browser. An applet is actually a tiny Java program, dynamically downloaded across the network, just like an image. But the difference is, it is an intelligent program, not just a media file. It can react to the user input and dynamically change. FEATURES OF JAVA Security Every time you that you download a normal program, you are risking a viral infection. Prior to Java, most users did not download executable programs frequently, and those who did scanned them for viruses prior to execution. Most users still worried about the possibility of infecting their systems with a virus. In addition, another type of malicious program exists that must be guarded against. This type of program can gather private information, such as credit card numbers, bank account balances, and passwords. Java answers both of these concerns by providing a firewall between a networked application and your computer. When you use a Java-compatible Web browser, you can safely download Java applets without fear of virus infection or malicious intent. Portability For programs to be dynamically downloaded to all the various types of platforms connected to the Internet, some means of generating portable executable code is needed .As you will see, the same mechanism that helps ensure security also helps create portability. Indeed, Javas solution to these two problems is both elegant and efficient. The Byte code The key that allows the Java to solve the security and portability problem is that the output of Java compiler is Byte code. Byte code is a highly optimized set of instructions designed to execute by the Java run-time system, which is called the Java Virtual Machine (JVM). That is, in its standard form, the JVM is an interpreter for byte code. Translating a Java program into byte code helps makes it much easier to run a program in a wide variety of environments. The reason is, Once the run-time package exists for a given system, any Java program can run on it. Although Java was designed for interpretation, there is technically nothing about Java that prevents on-the-fly compilation of byte code into native code. Sun has just completed its Just In Time (JIT) compiler for byte code. When the JIT compiler is a part of JVM, it compiles byte code into executable code in real time, on a piece-by-piece, demand basis. It is not possible to compile an entire Java program into executable code all at once, because Java performs various run-time checks that can be done only at run time. The JIT compiles code, as it is needed, during execution. Java Virtual Machine (JVM) Beyond the language, there is the Java virtual machine. The Java virtual machine is an important element of the Java technology. The virtual machine can be embedded within a web browser or an operating system. Once a piece of Java code is loaded onto a machine, it is verified. As part of the loading process, a class loader is invoked and does byte code verification makes sure that the code thats has been generated by the compiler will not corrupt the machine that its loaded on. Byte code verification takes place at the end of the compilation process to make sure that is all accurate and correct. So byte code verification is integral to the compiling and executing of Java code. Javac Java Virtual Machine Java byte code Java Source .Java .Class The above picture shows the development process a typical Java programming uses to produce byte codes and executes them. The first box indicates that the Java source code is located in a. Java file that is processed with a Java compiler called JAVA. The Java compiler produces a file called a. class file, which contains the byte code. The class file is then loaded across the network or loaded locally on your machine into the execution environment is the Java virtual machine, which interprets and executes the byte code. Java Architecture Java architecture provides a portable, robust, high performing environment for development. Java provides portability by compiling the byte codes for the Java Virtual Machine, which is then interpreted on each platform by the run-time environment. Java is a dynamic system, able to load code when needed from a machine in the same room or across the planet. Compilation of Code When you compile the code, the Java compiler creates machine code (called byte code) for a hypothetical machine called Java Virtual Machi

Wednesday, November 13, 2019

Emily Bronte :: Essays Papers

Emily Bronte Emily Bronte was born on July 30th, 1818, the 5th child of the Reverend Patrick Bronte, a stern Evangelical curate, and his wife Maria. When Emily was three years old, her mother died of cancer, and her Aunt Branwell, a strict Calvinist, moved in to help raise the children. They lived in a parsonage in Haworth with the bleak moors of Yorkshire on one side and the parish graveyard on the other. When Emily was 6 years old she went to a boarding school run by charity. The students were kept hungry, cold, tired, and often ill. In 1825 Maria and Elizabeth both died of tuberculosis, the disease that was later to claim Emily's own life, and that of her younger sister Anne. Following these new bereavements, the surviving sisters Charlotte and Emily were taken home, but they would never forget the terrors and the hardship of their lives at school. Life at home was much better for Emily and her siblings. In their isolated childhood on the moors, they developed an extremely close relationship partly based on their mutual participation in a vibrant game of make-believe. They developed two empires. They were Angria and Gondal. She left home to be a governess in 1837 and to study in Belgium in 1842, but both times she found she was unable to bear being away from home and her beloved, wild countryside. In 1845 Charlotte, Emily, and Anne published a book of poetry under the names Currer, Ellis, and Acton Bell. They sold only two copies, but did not give up writing. Wuthering Heights was probably written in 1845. Wuthering Heights (by Ellis Bell), was published in 1847, and attracted considerable critical attention. Many people were shocked and horrified by sheer violence of Emily's novel. Emily Bronte :: Essays Papers Emily Bronte Emily Bronte was born on July 30th, 1818, the 5th child of the Reverend Patrick Bronte, a stern Evangelical curate, and his wife Maria. When Emily was three years old, her mother died of cancer, and her Aunt Branwell, a strict Calvinist, moved in to help raise the children. They lived in a parsonage in Haworth with the bleak moors of Yorkshire on one side and the parish graveyard on the other. When Emily was 6 years old she went to a boarding school run by charity. The students were kept hungry, cold, tired, and often ill. In 1825 Maria and Elizabeth both died of tuberculosis, the disease that was later to claim Emily's own life, and that of her younger sister Anne. Following these new bereavements, the surviving sisters Charlotte and Emily were taken home, but they would never forget the terrors and the hardship of their lives at school. Life at home was much better for Emily and her siblings. In their isolated childhood on the moors, they developed an extremely close relationship partly based on their mutual participation in a vibrant game of make-believe. They developed two empires. They were Angria and Gondal. She left home to be a governess in 1837 and to study in Belgium in 1842, but both times she found she was unable to bear being away from home and her beloved, wild countryside. In 1845 Charlotte, Emily, and Anne published a book of poetry under the names Currer, Ellis, and Acton Bell. They sold only two copies, but did not give up writing. Wuthering Heights was probably written in 1845. Wuthering Heights (by Ellis Bell), was published in 1847, and attracted considerable critical attention. Many people were shocked and horrified by sheer violence of Emily's novel.

Monday, November 11, 2019

Real Customer Service Problems

REAL CUSTOMER SERVICE PROBLEM This essay outlines what customer service really is and what are the problems associated with it. To understand these problems let us first understand how to define Customer service. Customer service is that process by which a company provides services, provisions to its customers during a purchase, after the purchase is done and even prior to the purchase. How important a customer is depends upon the deliverance of the type of product or service involved. The success of customer service depends upon the employees who can accustom themselves to what the customers want and give them a service based on that.Thus, if the customer is satisfied, the customer service flourishes. Further, it becomes important to understand the dilemmas that can be faced while serving a customer. The first real problem with customer service is this that, while serving the customer, organizations end up in a trap rather than actually giving the customer the substance of the servi ce. Secondly, the tools and techniques used to serve the customer better are misused on a wider scale. And, it so appears that these tools are used to serve the symptom and not the proper sickness.An example can be quoted here of the hospitals that people run for children. These organizations also believe in customer service and because of that they paint the walls of the children’s ward with clowns and animals and other things that they think might cheer up the kids. But what actually happened is, that rather than making the things therapeutic in nature for the children, they end up making the children scared as the children are more scared of clowns and animals than needles and medicines. Thus, here a better customer service would be to leave the walls as plain.A failure to providing proper customer service always results in a low customer loyalty, a low satisfaction of the customer and hence a bad reputation of the organization that causes a huge loss. Hence, the proper el ements in customer service lie in the fact that which parts of customer service are important and which parts are to be neglected. Also, the services should be provided to those customers who value them and not to those who do not value them. Therefore an alignment is to be maintained between the capabilities of service that are to be provided to the customer as well as the strategies of market that are being maintained.

Saturday, November 9, 2019

Scientific Method Essay

Scientific Method Essay Scientific Method Essay Scientific Method The scientific method is a systematic, organized series of steps that ensures maximum objectivity and consistency in researching a problem. Step 1 – Define the problem: Clearly state what you hope to investigate. Develop an operational definition, which is an explanation of an abstract concept that is specific enough to allow a researcher to assess the concept. Step 2 – Review the literature: Researchers refine the problem under study, clarify possible techniques to be used in collecting data and eliminate or reduce avoidable mistakes. Step 3 – Formulate a testable hypothesis: After reviewing the research and drawing on the contributions of sociological theorists, the researchers may then formulate the hypothesis. A hypothesis is a speculative statement between two or more factors known as variables. A variable is a measurable trait or characteristic that is subject to change under different conditions. One variable is called the independent variable. The other is called the dependent variable. Identifying independent and dependent variables is a critical step in clarifying cause-and-effect relationships. Casual logic involves the relationship between a condition or variable and a particular consequence, with one event leading to the other. A correlation exists when a change in one variable coincides with a change in the other. Correlations are an indication that causality may be present; they do not necessarily indicate causation. Step 4 – Select a research design: To determine if a hypothesis is supported or refuted, you need to collect information by using a research design. The research design guides the researcher in collecting and analyzing data. In most studies, social scientists must carefully select a sample. The one social scientists use most is the random sample.

Wednesday, November 6, 2019

A Rejection of Capitalism essays

A Rejection of Capitalism essays The basic ingredient of capitalism is the trading of labor for something else of value. This labor is then used to generate profits for the employer. "Labor power is, therefore, a commodity which its possessor, the wage-worker sells to capital. Why does he sell it? In order to live (p. 204)." This is the fundamental recipe for capitalism in today's system. Marx sees this system as a failure of mankind. This is a system that separates those who own, and those who do not. "The proletarian class feels destroyed in this alienation, seeing in it its own impotence and the reality of an inhuman existence. The possessing class feels satisfied and affirmed in this self-alienation, experiencing the alienation as a sign of its own power (p.133)." What Marx is trying to say, (I can sure tell that English was not his first language) is that "most will work for few." There will be a class of ultra-rich and a very large majority of ultra-poor. When you look back through our last 150 years of history, it is not too hard to see that without some kind of government intervention, Marx's predictions would not be too far off of the target. In fact, I would argue that without government intervention, Marx's ideas were correct. When Marx writes about Freedom, Equality, Property, and Bentham, he is laying out the very rights of man. He then puts those rights in a cause-effect relationship with the theory of absolute capitalism. Capitalists view their system as the system which allows the most freedom to date. In a capitalist system one is a free agent on the labor market. Train yourself, promote yourself, and then sell your labor to the highest bidder. This is a major weight-bearing pillar that holds the roof of capitalism. Marx sees this as the beginning of the end. This is a voluntary method of creating a society based on different social classes. Marx sees this system of social classes as a glass globe. Marx demands that ...

Monday, November 4, 2019

Managerial economics-Ethics assignment Movie Review

Managerial economics-Ethics assignment - Movie Review Example Advertising another bailout package to the people and Congress proves to be a long stretch as suspicion and unwillingness is reasonably a hard sell when it involves companies that eaned billions. While Paulson figures out how to fix the problem, trying hard as he can to resolve it within the private sector, corporations are out for their own interests leading to the inevitable fall of Lehman Brothers. Eventually, the corporation files for bankruptcy and the bigger problems are just starting for big names that include AIG. This movie is ideal in understanding how the financial system in America works, not only that, it emphasizes on the interconnectivity of companies and even of governments that it is essential to appreciate that there must be mutual support instead of everyone only thinking for themselves. The role of managers can be seen to be the bridge that determines whether the company applies social responsibility or not. The relationship of businesses is important in building rapport and goodwill. In my own line of business importing and exporting goods, I find it true that the banks play a major role in the sustainability of trade. I do business internationally where I have to deal with people of different nationalities including the laws that apply to each transaction. The ethical conduct of business is just as important as the business itself. There are a number of ethical dilemmas in the film. Paulson, as a former banker who made his millions in Goldman Sachs, knows how they think and how they will react. At times he had been suspected of advocating for his own interests though the same is not true. He sat down the CEOs to push them to buy and support Lehman Brothers, but Merrill Lynch’s John Thain secretly called to push for the purchase of shares in his own company instead of Lehman Brothers. On the last part of the movie, Paulson managed to convince large banks to accept a nationalization

Saturday, November 2, 2019

Account for changes, ststus and expectations of working class women in Essay

Account for changes, ststus and expectations of working class women in victorian period (england only) - Essay Example Women were beginning to question their allotted place in society as more and more opportunities opened for them in the urban centers of the country, providing them with a means of supporting themselves and freeing themselves from the yoke of male domination. However, at the same time, these positions were not the equal rights positions of modern times, so it was often difficult to determine whether one wanted to sacrifice freedom for comfort or comfort for freedom. Rarely was it possible to attain both and often it was found, too late, that it was possible to attain neither. The Victorian period’s characterization as a time of change is appropriate, particularly when taken in context with the changes occurring in the lives of women. Thanks to advances in technology and a general shift toward the cities, women’s spheres were fundamentally shifted in the home, in society and in work and they became more and more recognized as a force to contend with in the nation’s legislative process. The difficulties faced by women can be traced somewhat through literature, such as George Eliot’s Daniel Deronda (1876). A little knowledge about the author is itself an education in the struggle of women to accomplish their goals. Although the book is published under a male name as the only means by which it could possibly gain the attention of a publisher, the author was actually female, a woman named Mary Ann Evans. This begins to illustrate the inability of women to control their own careers or destinies as well as their struggles to break these bounds. In the Victorian era, the barriers of the class system rigidly defined the role of a woman. At the time women belonged to four distinct classes: nobility and gentry, middle-class, upper working-class, and lower working-class (Levine-Clark, 1991). These women each had their own specific standards and roles within society.