Monday, September 30, 2019

Nokia †Internal Analysis Essay

Financial performance We start our internal analysis by looking at Nokia’s sales and profitability. Strong sales and profitability results can indicate that the previous strategies were successful and changes in either can implicate a change in the market viability (Aaker, Mcloughlin, 2007). In 2007, Nokia realized total sales of about 435 million units and a net profit of â‚ ¬7,205 million. Although it has only a market share of 9.8% in the United States market, Nokia has a worldwide market share of 37,8%. This makes Nokia the market leader in the telecom industry and hereby a dominant player in the market. Nokia has 10 manufacturing facilities in 9 countries, and from these locations she distributes her products to more than 150 countries and different segments. With sales growing considerably compared to 2006, Nokia’s large customer base has only increased. Assuming new customers will create loyalty, future earnings are brought in. However, growth in the industry is declining, making it a difficult task for Nokia to keep their customers with the company. In 2007, Nokia’s total assets were â‚ ¬35,599 million (annual report Nokia, 2007), resulting in a Return On Assets (ROA) of â‚ ¬7,205/â‚ ¬35,599 = 20.24%. Nonfinancial performance Financial performance measures are primarily a reflection of the short-term business results. Because of this, nonfinancial performance measures must also be considered. Nonfinancial performance measures often provide better measures of long-term business health (Aaker, Mcloughlin, 2007). Relative costs Since 2004, Nokia is offering cheaper phones for the emerging markets. By using her economies of scale, Nokia was able to lower her costs, resulting in an average building price of only 69 euros per handset. This was giving Nokia a dominant position because it was very difficult for Nokia’s rivals to keep up with this cost reduction. However, Nokia’s produces most of its production volume in high-wage countries, leading to considerable extra costs in the manufacturing process. Brand/firm associations Over the years, Nokia has created a strong brand by listening to her customers and understanding customer needs. Nokia is often associated with high quality phones and this isn’t going unnoticed. In 2011, Superbrands, the world’s leading independent arbiter of brands, declared Nokia the leading brand in China. And in 2010, Nokia won the Economic Times award for most trusted brand in India (Nokia.com). Effective marketing campaigns helped creating a strong brand Nokia nowadays is. Customer Satisfaction With sales increasing year by year, Nokia managed to create a large customer base which is expanding every year. Nokia produces a wide range of phones with great differences in price, design and features. Because of this, Nokia can offer products that suits different customers desires and keep every customer satisfied. New product activity Nokia is developing new products year by year. In 2007, Nokia improved her research and development department and introduced some mobile-related services and software. She also went in some partnerships with companies like Vodafone and Orange and integrated its Internet services under one brand, named Ovi. However, Nokia’s is really affected by her competitors bringing innovative products to the market. Products of companies like Apple and Samsung are far ahead of Nokia in some fields, which weakens Nokia’s position in the market. In an industry with a declining growth, it is very hard for Nokia to keep up with these innovations.

Sunday, September 29, 2019

Baderman Island Family Vacations Essay

Baderman Island Family Vacations: Advertising, Creative, and Media Strategies Advertising not only works but is often unmatched in its capacity to reach major audiences, build brand awareness and personality, as well as stimulate curiosity and desire. But, more than ever, companies today [in this very competitive environment] need the right creative messages and media choices in an effort to break through the â€Å"noise† in order to get noticed, and therefore, remembered. This paper will outline Baderman Island’s Family Vacations advertising plan, further expanding on creative decisions and effective media strategies in an effort to increase market share. Baderman Island – Family Vacations Analysis Family getaways are one of the top reasons that guests stay at Baderman Island, regardless of whether the stay is a seven day excursion or a weekend family reunion. With so many activities to choose from such as: boat rentals, water skiing, snorkeling, scuba diving, tennis, golf, five secluded beaches, Oasis Spa, and gallery touring there is truly something for everyone in the family to enjoy, not to mention all the activities on the island are appropriate for visitors of all ages. The many unique selling points of Baderman Island Family Vacations consist of the island being self contained, all-inclusive, hosting an array of restaurants, three different hotels, and unlimited activities to entertain and relax all guests. Currently, the marketing situation consists of a website that is an excellent tool for attracting guests and showing them all the perks of the island through pictures and blogs. The blog is a new advancement to the website, but should prove to attract positively more guests through the testimonials of previous visitors. Target Audience The target audience for Baderman Island is the typical â€Å"family vacationers† who are looking for a resort that offers a variety of activities without having to leave the premises. These families will consist of parents with at least one child. The target family will be the family who consists of two adults within the household with at â€Å"least† 2-3 children to help maximize profits. All races, ethnicities and cultures are welcome. The target market will be an adult who enjoy warm weather vacations with family, spending quality time with each other enjoying activities and who have a love for the beach and fine art. The target audience will also consist of consumers who fall within the lower to middle class and above demographics searching for a family destination that does not require leaving the United States (U.  S. ). Not all families can afford the cost of securing passports and expensive air travel to the Caribbean. Creative Strategies A creative strategy is important to the overall execution of an advertising campaign. Team C will use a â€Å"positioning† approach as its creative strategy. In this approach Baderman Island will be clearly defined as the number one â€Å"all inclusive† destination for family travel. Brand image approach will also be incorporated into the strategy. This will help consumers correlate the Baderman Island brand as a top notch, high quality destination. This approach will be accomplish by using an easy to remember slogan, such as â€Å"Baderman Island Family Vacations, the Finest Place to Reconnect,† as well as further using the ever popular slogan, â€Å"Relax, Enjoy, Indulge. † Increased emphasis will be placed on marketing the concept that Baderman Island is a unique destination specializing in family activities. This will enable Baderman Island to distinguish themselves from other competitive resorts in the marketplace. All creative advertisement associated with the resort will be colorful and eye catching; it will feature pictures that depict happy families vacationing and spending time together, further providing a visual of what family vacationing could be for the potential customer. On radio spots sound bites will be used of customer testimonials of how happy they were when they vacationed on the island. TV ads will also depict families enjoying themselves on the beach, playing golf, in the spa, visiting the museums and art galleries, and participating in the many sports activities offered on the island. The television ads will also highlight the many pricing plans and payment options where applicable. Positioning Statement Baderman Island’s positioning concept will explain that Baderman Island Family Vacations is for vacationers with families who are seeking a luxury resort â€Å"experience† to reenergize from their busy lives and reconnect with family and friends, and that Baderman Island Family Resorts is one of the most luxurious destinations in the world. The island offers four star accommodations that highlight a world-class spa featuring a full range of treatments designed around the resort’s natural springs, sophisticated purpose-designed meeting facilities, and an assortment of other amenities all delivered with a high level of personalized service (University of Phoenix, 2008). All of this is made available on this self-contained, all-inclusive resort island that is surrounded by the beautiful Kelsey River. Golfing, fishing, spa facilities, museum excursions and a beautiful beach are all available to vacationers of this island. Message Platform Baderman’s message platform is to develop Baderman’s brand and when potential guest see the logo, they will envision the beautiful crystal clear waters, which symbolizes peacefulness as well as relaxation. Presently, Baderman Island is expanding the brand on the 1,600 acres of land they own. 750 acres are operational. See map below. (University of Phoenix, 2008). In an effort to increase brand recognition Baderman Island will rely heavily on word-of-mouth marketing. The expectation will be that satisfied guest will continuously sell the brand for the resort while Baderman Island continues to make capital improvements. Once the Baderman Island’s guest vacation experience is over and they leave, the hope is that they will tell their friends about the wonderful experience during their stay. Word-of-mouth advertising is one of the most effective advertising vehicles when feedback is 100% positive. Baderman Island will strive to be the number one vacationing spot. Baderman Island will be well known for the following attributes: Owning an island, which exclusively promotes their brand, and having facilities that offer excellent customer service. Baderman Island makes a point of listening to guests who have enjoyed previous stays and will continue to develop innovative ideas that include customer feedback on how to improve future stays. Media Strategies and Objectives Print media is one of the most efficient ways to reach potential customers. For example, magazines are a medium that has a number of special-interest publications segments that can reach Baderman target audience (Wisconsin Department of Tourism, 2009). As a result, print ads, billboards, and brochures will be Baderman Island’s priority media vehicles of choice. Baderman Island will also use a number of advertising campaigns which will run a variation of television commercials, all emphasizing family fun. An additional strategy that Baderman will use in order to develop a relationship with potential guests is through the use of [developing] creative brochures which will assist with enticing guest towards booking a vacation on Baderman’s Island property. After all, they are inquiring about Baderman’s vacationing experience, so brochures will bring Baderman’s Island Vacations upfront and personal to future guest. Guests will be able to look at full color ads while reading a wealth of information regarding services, pricing plans, recreation packages, spa schedules and a host of activities used to keep children occupied during the day. The objective is to have future guest pick-up and carry brochures with them so they can view the material at their leisure and share it with family and friends. Baderman will capitalize on the idea that the brochure is portable which gives the upper hand rather then relying on guest to remember a 60 second commercial. Lastly, radio air time will also be explored as a media option. There are seven times as many radio stations as television stations in the U. S. (Wisconsin Department of Tourism, 2009) therefore; this is a medium that Baderman will seek to explore with the assistance of a limited-service agency. Strategy RationaleThe rationale behind the creative strategies and campaign message is to ensure that Baderman Island Vacations stands out over the competition. Creating the easy to remember message of â€Å"Baderman Island Family Vacations, the Finest Place to Reconnect,† will capture the image of Balderman Island at its fullest. In addition, using vibrant colors within ads and â€Å"real† people will not only be an eye catcher, but also illustrates the fun side of Balderman Island. Using photos of smiling and happy families doing fun activities together as part of advertisement features will say it all. Baderman Island will use similar stock photos in all advertisements. By placing the emphasis on â€Å"family† the brand image that Baderman Island will be known for will be something that both existing and potential customers will relate too. The resort will also seek to create a feeling of nostalgia where people who see the billboards, magazines, website, or hear radio advertisements will wish and want to experience what Baderman Island offers. An addition strategy will be to choose air time during busy traffic hours to advertise services. What better time to dream being somewhere else than when a person is stuck in a traffic jam. As a family resort, Baderman Island believes in getting and giving the best. As customers, Baderman personnel staff expects the best on both products and services from providers, and it is only right that the resort gives the same respect, treatment and consideration to their customers. Baderman Island stands on the priority objective of treating customers â€Å"just like family. †Supportive ResourcesAlthough many companies have opted towards using outside advertising agencies exclusively for assistance with creative ideas, Balderman Island prefers to do it themselves. Baderman Island’s in-house creative teams provide a range of services depending on the resorts needs and are familiar with the resorts rich history and many products and services. The in-house team is also better equipped to handle adhoc problems regarding advertisements within a timely manner. Keeping creative development in-house will provide the resort more control with lower risks of having proprietary confidential information leaking into the wrong hands, also keeping in mind that external agencies have other clients to assist. In addition to risk management, in-house creative resources for creative support make it easier to coordinate and have a more â€Å"personal† touch with the service versus an outside agency. In addition to in-house support Baderman Island will seek advice from limited-services agencies which specializes in one aspect of creative process; usually providing creative production work or the purchase of media space (Wisconsin Department of Tourism, 2008). A limited-services agency will be used in order to coordinate radio air time and in some instances magazine space. ConclusionAs stated earlier, Baderman Island Family Vacations is striving to continue to compete in a very competitive environment. With the consistent advertising message, â€Å"Baderman Island Family Vacations, the Finest Place to Reconnect,†Ã¢â‚¬ ¦ Baderman will further expand on that message by building upon a media strategy that emphasis family, fun, relationships, and value. Therefore, a media strategy that focuses on â€Å"awareness advertising,† where the attempts to build Baderman Island’s image and familiarity with the resort brand and excellent services will be their ticket towards marketing success. Baderman Island is confident that by using multi-media vehicles of print ads, billboards, brochures, television commercials, and radio spots their target audience will be effectively reached. Six months post campaign launch, Baderman will evaluate their advertising effectiveness through monitoring and post-evaluation tools and re-evaluate their marketing plan accordingly based on results.

Saturday, September 28, 2019

Five Levels of Maslow’s Hierarchy in Cast Away

Pysiological Needs, includes the most basic needs that are vital at survival, like the need for water, air food and sleep. Security needs, includes needs for safety and security. Security needs are important for survival, but they are not as demanding as the physiological needs. Some examples are health insurance, shelter from the environment. Social needs, includes needs for belonging, love and affection. Examples of Social needs are friendship and families help fulfill this needs for companionship and acceptance. Esteem needs, becomes increasingly important after the first three needs have been contented.It includes the needs for things that reflect on self-esteem, such as social recognition, accomplishment, social recognition. Self-actualizing needs, is the highest level of Maslow’s hierarchy of needs. People that are self-actualizing are self-aware, concerned with personal growth, less concerned with the opinions of others and interested fulfilling their potential. The nee ds that appeared to be most urgent and necessary were the Physiological needs; Chuck Noland’s actions agreed with Maslow’s Hierarchy when we got on the island, he immediately sought food.The items that were already present on the island were Coconuts, Rocks, Sticks, and Palmetto Leaves. They met the needs of Physiological and Safety. The items that Chuck Noland used from the FedEx boxes were Clothing, Volleyball, Ice Skates, and VHS tapes. The needs that these items met were Physiological and Love. The movie Cast Away, Chuck Noland was stranded on an island. He was stuck there for about four years. As the years went by, he became more aware of how to survive.He knew how to find food, how to make shelter, and how to keep himself company. He used his volleyball that was in a FedEx box as a friend to talk to. He used leaves and sticks and sunlight to build a fire. He used porta potty as shelter. He also used anything for food. He was the only one who survived on that isla nd from all of his co-workers. He finally built a boat and went in the water. Soon he found a huge ship that he climbed onto and sent home. When he got home nobody recognized him. Also when he got home, he got told bad news.His fiance that he was planning on marrying thought he was dead and fell in love with his dentist, and ended up marrying him. In my opinion I do think Chuck Noland met his need for self-actualization during his stay on the island. For example, self-actualization means self-aware, concerned with personal growth, and less concerned with the opinions of others. He honestly didn’t care what other people that about him, he thought he was successful and a hard worker. All in all, the movie Cast Away was very good movie that represented the five levels of Maslow’s Hierarchy.

Friday, September 27, 2019

History of economic thought Essay Example | Topics and Well Written Essays - 3000 words

History of economic thought - Essay Example Agricultural production also required the bigger number of workers if pursued in a highly organized manner, on a countrywide scale. Adam Smith (1776) in his The Wealth of Nations noted that it was this misconceived plan for economic development in Europe, which could have been initiated by private interests, that gave rise to widely divergent theories and schools of economic thought. Questions on the validity of an old development strategy became parent to new economic ideas and theories. Over time, these divergent ideas clashed on the multiple facets and problems of economic activity - labor, employment, capital, wages, production. But these conflicting views remarkably coincide on one bottomline: the need to distribute wealth equitably. Such is the case with the theses of Smith, Karl Marx and John Maynard Keynes, three intellectuals who tinkered with economic law and sought to bring it into accord with the rapidly changing workplace. The three lived and worked a full century apart from each other but all three saw the same ineffectuality of economic systems everywhere to let the proceeds of industry and the land flow to the working class. Smith published his The Wealth of Nations in 1776. Marx came up with his Capital: A Critique of the Political Economy in 1867 which appeared to have been undertaken to refute Smith's views. Keynes followed with his The General Theory of Employment, Interest and Money in 1936 which drew its own conclusions based on the two theories set forth by Smith and Marx.Smith represented the classical economist who looked up to the precept of laissez-faire, which believes that the economy works best when you leave it alone and just let the market forces work out solutions to such problems as uneven distribution of wealth. Marx stood at the opposite pole, the chief proponent of the classless society which calls for state interventions in the marketplace. Keynes was somewhere in between, moderating the two extreme views on how to ameliorate the conditions of the laboring class. Incidentally, both Marx and Keynes agreed that prolonged and persistent failure to bridge the gap between the rich and the poor is likely to cause social upheavals, even armed revolutions. Their views differed on everything else. In their times, Smith, Marx and Keynes saw and described the disfranchisement of the lowly workers and peasants in almost the same manner. Smith, quoting someone else, observed that "150 landlords own half of England while 12 controlled half of Scotland's soil." Marx: "The wealth of nation flows into a few people's pockets." Keynes shared that sentiment and added that this income disparity is especially pronounced in prosperous countries. He said: "This is the paradox of poverty in the midst of plenty - the richer the community, the wider the gap between its potential and actual production, thus the more obvious and outrageous the effects of the economic system (on the poor)." Smith Economics The whole purpose of Smith's thesis was to improve the conditions of the lower ranks of people - the servants, workmen, laborers. Said he: "No society can flourish and be happy if the greater part

Thursday, September 26, 2019

Overweight Children Essay Example | Topics and Well Written Essays - 500 words

Overweight Children - Essay Example Most cases children are left for the nannies to take care of them who in turn do not bother much with diet. The children whose parents do not monitor their food intake tend to take more junk food as snacks at all times of the day even after meals. The other causal reason to blame parents is the lack of exercise for their children. There are numerous playing grounds in neighborhood where children can play after school or on weekends to burn the fat and be healthy. However, parents buy them video games and they spend unlimited time on them hence not getting enough exercise. The other blame party is the influx of fast food outlets around the neighborhoods. Fast food attracts not only children but adults and they are convenient for most people with the busy life of work. Children are left money to order meals and they order fast food such as pizza and burgers which are full of starch and not enough vegetables. The end result is the children increasing in weight. The fast food owners should not sell the fast food to children without supervision of an adult. They should also include healthy food such as vegetables and fruit salads in their menu to encourage healthy eating. Majority of the blame however even though both parties have participated is towards the parents. They should try to be more careful about the health of their children. It is understandable that they are busy but they should find time to ensure that their children eat healthy food. As children grow, they understand what they are taught and will practice. Parents should talk to their children about the negative effects of eating a lot of unhealthy food and do this with numerous examples. The parents should also practice what they are saying and ensure themselves are not eating unhealthy food and especially in front of the children. Lastly, the parents should make it a point of making regular visits to the doctor to have their children weight and growth

Research Proposal on the topic Effects of substance abuse on prisoners Assignment

Research Proposal on the topic Effects of substance abuse on prisoners in Austin, Texas - Assignment Example The qualitative data shall be coded, enumerated and listed. Averages, percentages and chi square testing shall be used to analyze quantitative data. Photographs and matrix maps shall be used in the presentation of qualitative data. The quantitative data shall be presented in tables and graphs. Introduction Substance abuse among the prisoners in Texas has been on the rise in the recent past. The detrimental impacts that substance abuse has on prisoners cannot be underestimated since they present challenges to the victims and other stakeholders such as the society and correctional institutions. The high rate of consumption of drugs by inmates in prisons, impact negatively on their health, and in the extreme cases leads to death. Substance abuse in Austin prisons is not a new trend, and it requires maximum attention, as the effects on the inmates are severe. Prisons are places meant to rehabilitate and reform the inmates, rather than to destroy them, in one way or the other. Therefore, the high incidences of substance abuse in correctional facilities have led to questions raised about the effectiveness of criminal justice systems in Austin, Texas. The high numbers of prisoners in Texas and the increasing cases of substance is a major cause of concern. Hence, there is a need for close attention to avert negative effects. Purpose Statement The study focuses on impacts of substance abuse to prisoners and the society. A major focus was on establishing reasons behind the high incidences of substance abuse in the correctional facilities. Through the study, negative impacts of substance abuse on prisoners and the community as well as other stakeholders would be determined. The effectiveness of mechanisms put in place to treat substance abuse and rehabilitate victims is examined. This would help in identification of loopholes, which result in negative outcomes. Literature Review Literature Review The number of inmates in the US prisons has continued to increase with about 2 million people imprisoned (Neubauer, 2012). The issue of incarceration in the United States is faced with a number of challenges due to the high numbers of Blacks, Latin Americans, and Native Americans. According to Stuntz, (2011), this has been met with many questions concerning the effectiveness of the criminal justice system in the US. Texas has the highest prison population. This being the case, Austin its capital City is of major concern. According to Jennifer et al. (2012), there are many problems faced by inmates in most prisons in Austin, ranging from social to psychological problems. Some of these problems arise because of under-provision of programs and policies by the criminal justice system. Substance abuse in prisons is widely spread among many inmates (Texas Statistical Report, 2012). Despite the negative impacts that it brings, some inmates continue to abuse drugs for personal or other reasons. This has been associated with under-provision of treatment for drug abu sers in prisons, which make them, engage in this activity that deteriorates their health ,as well as their social lives. It has been noted that approximately 85% of prisoners in the US meet the criteria for diagnosis in drug abuse (Frakt, 2012). This is because this population has a problem of substance abuse. Texas has a wide range of correctional facilities, and this are meant to change the individual’s behavior as well as attitudes towards actions that may have led him or her to engage in criminal

Wednesday, September 25, 2019

Article Summery Example | Topics and Well Written Essays - 750 words

Summery - Article Example Like any new system that is being implemented, the implementation provided several challenges. The greatest challenging issue was intrinsic cross functional knowledge space existing between the organizations IT department, the tax department and software vendor. The people working with the software vendor understand their product well, likewise to the organization IT department that has unique infrastructure, and tax department understand how to handle tax regulations worldwide. Connecting the three entities that has different knowledge and professionalism is quite challenging and it demands a cross functional knowledge across the three areas, also very talented workers is needed. As the organization started working on the project, they know well that successful implementation is significant in organization success. A good option in the implementation is employing a third party or leveraging the service provider. The third party should be someone who has inside knowledge about Vertex . It should not only be a party that applies business and IT knowledge, but it should also be in a position of identifying problems and rally the required vertex resources to bring a solution to a problem. In preparation for the system implementation, the IT department had strict support requirements for the interruption to avoid system failure and business disturbance. Vertex provided 2 support IT specialist before implementation to assist in transferring knowledge on tax link extension that support several Oracle modules in different countries. For the cut over time, vertex support worked together with organization Tax and It members to tailor the support hours and give direct access to high level team members. Liaising with a service provider which has been proven to be successful specifically on Tax is important for Starbuck. The collaboration between Vertex and Starbuck has gone beyond the initial stages of system implementation and it has empowered the organization IT departme nt and adds lines to business products. The services currently going on are significant in Tax system. The vertex Oracle Tax system will be used to manage tax requirements which continuously changes. It is not a situation where software is installed and those who did it leave. In Tax system, a partner is needed to be constantly monitoring the system since taxation changes frequently. Vertex has been found to be the best partner, the organization went through ERP implementation at first but right now they are in a state of upgrading and resolving new problems that are emerging since the IT infrastructure are constantly being changed or business trend is changing. This means that vertex should be adjusted along the way and this will require experts to monitor the system. Reference Starbucks. (2013). Starbucks Finds Vertex’s Service is the Differentiator for a Successful ERP and Vertex Upgrade. Vertex Indirect Tax Solutions. London: Vertex

Tuesday, September 24, 2019

Concept of Virillio and Klein on globalization Assignment

Concept of Virillio and Klein on globalization - Assignment Example Armitage (2011) reports that an analysis of the professor's work reveals expressions that tend to link the globalization concept to internationalism, a term with a close association to communism and a distance a way from the unifying capitalistic market concept preached by preachers of pro westernized philosophies. Virillio rejects the globalization concept as perpetuator of a success of over free trade over totalitarian Marxism. According to Armitage (2011), his rejection of this view is in reaction to his claim that the definition lacks the aptitude to address the present loss of time gaps, the telescoping inherent in industrial and post industrial actions. Furthermore, the extensive concept of globalization is leading to the upper echelons of human modernity which is cultivated by technology and media coercion. In Armitage (2011), it is clear that Virillio believes that past these levels human beings can only encounter the backward tightening to a spectacle characterized by an inf inite density and dilapidated to personified humans permitting only existence through a phantom space. Armitage (2011) reports that Virillio arguments as supported by the recent fiscal catastrophes that brought countless nations to the brink of bankruptcy while putting countable multinationals out of business. Virillio suggest that the comprehension of the present fiscal predicaments should take a school of thought that hat views it as a hypermodern catastrophe. A misfortune characterized by hypermodern speed flanking the entire global civilization which is a bout to rupture, (Armitage, 2011).Evidently, this proposition is inline with the well comprehended economic perception that any form of advancement as a corresponding face of a catastrophe. This has the implication that progress has an equivalent face which is an upheaval and is analogous to the double faces of a coin. Armitage (2011) cites such pundits like Walter Benjamin who furthered the theoretical conceptualization of cat astrophic attributes of globalization to have influenced Virilio's perception of globalization. Armitage (2011) cites Virilio's assertion that the westernization forged by Benjamin Franklin which over the decades supported rampart capitalistic globalization has finally reached its conclusive phase. Consequently, the present persistent fiscal negativity evident globally impeccably confirms these propositions. According to Klein (2008), globalization which has in the past years prompted the free global trade has over years profited multinationals at the expense of the disadvantage populace around the globe. From both books, Klein (2008) and Klein (2000), it is evident that corporations have over the years advanced sizably to levels that they presently supersede state organizations. Klein (2000) suggests that presently, corporate commands such elevated echelon of influence that they dictate the direction taken by political regimes across the globe. Klein (2000) argues that while they h ave in time indirectly captured governance, they are not obligated to nations' citizens but to their self centered shareholders. Klein (2000) claims that the events have adversely affected the tri pillars of civic space resulting in highly constricted social liberties and increasingly restricted employment prospects. According to Klein (2000), the maiden pillar that the corporate through state agencies have taken away from the common populace is the constricted liberty. Klein

Monday, September 23, 2019

Starting a Business Assignment Example | Topics and Well Written Essays - 500 words

Starting a Business - Assignment Example Since the biotechnology firm will be involved in the manufacturing and selling of cancer drugs, it will also be subject to the regulation by the National Cancer Institute (NCI). The NCI falls under the National Institutes of Health (an agency within the United States Department of Health and Human Services). It is tasked with the responsibility of coordinating the national cancer program, conducting and supporting research activities on cancer and dissemination of information regarding causes, diagnosis, prevention and treatment of the disease (Lusk, 2009). The web design business amongst will be regulated by the Federal Trade Commission amongst other agencies. This commission is responsible for enforcing federal consumer protection laws. It does this through carrying out investigations on consumer complaints against the companies in question and taking the necessary actions where appropriate (Lusk, 2009). There are several laws that will govern the setting up and running of the three kinds of business. For the pizza delivery business and the biotechnology firm, the laws that will govern the running of their activities (such as the Public Health Service Act) will mostly be aimed at protecting the consumers of the products of these businesses from purchasing and consuming harmful products that might be detrimental to their health such as contaminated food or poisonous drugs that instead of curing ailments, they only makes them worse. For the case of the web design business, the law that deals with this type of business is the Intellectual Property Law. This branch of law deals with the creation of intellectual property trademarks, patents and copyright (Burrow, 2003). There are several legal steps that one will have to encounter before setting up each of the three businesses mentioned. The first step will be to determine the

Sunday, September 22, 2019

Native American Indians Then and Now Essay Example for Free

Native American Indians Then and Now Essay Native American Indians Native American Indians have not changed much in hundreds of years. The Natives still have the same belief as they did from the beginning of time. They are still forced to live on reserved lands that do not seem livable and are in worse conditions now than ever before. Even though people think due to casinos that the American Indians have it made, the Natives are still being mistreated, many tribes are well below poverty levels, highest in death rates, have the most number of preventable diseases, the highest of teen suicide than anywhere in the Nation. Native American Indians traditions go back to the beginning of time. The Native religion is more about sacred and ceremonies. The Native people do not have a word for religion it is more a way of life to them than a religion. According to one researcher, â€Å"There is not one Native tradition to represent Native religion. Just as there are numerous Christian beliefs the Native people have many different beliefs. The Native ceremonies are so similar that it is impossible to discuss them as one† (Burbar, and Vernon 2006) The Natives have always been connected to the lands. Most of their ceremonies and sacred objects come from the lands and has everything to do with how they feel about them. Native people do not believe they can own the lands that people are merely caretakers of it. The Native believe that the land is a gift from the Creator, put here to give them tools for survival. They believe if they take something from the land that they must give thanks for the gift given. They do this by offering sacred herbs, prayer, and dance. Native American Indians The Native people give each member roles to keep the villages running smoothly. The Native men hunt and protect the village, while the women gather fruits, berries, and keep the camps, the children gathered wood, help clean hides, look after the younger children and clean the camps. One researcher studies tells stories of how some tribes are at certain times in the tribal life. â€Å"On the Northwest coast, young women were taught that the wives of Makah whale hunters must very still in bed while their husbands hunted, since their movement influenced the whale’s behaviors. In a Navajo story Black God had all animals penned up until his wife opened the gate. The animals escaped and thereafter had to be hunted, (Kidwell, 1998). All of this became threatened with the arrival of foreigners. With the foreigners coming and bringing there Christian beliefs the Native traditions were going to be challenged. With the start of the White Mans government the Natives faced having several ceremonial rights taken away for hundreds of years. The Natives were stopped from worshiping in manners they were accustomed. The Natives were forced to worship the Christian belief and if they refused they were put to death or imprisoned. Many of the Native traditional ceremonies were stopped completely. Two of those rights at this time were the Ghost Dance, and the Sun dance. The Natives found ways around this; they would go to places they knew white men would not to have ceremonies that had been band. Due to so many of the Native rights being taken away the Natives formed a group called â€Å"American Indian Movement† (AIM). AIM in the early years was called â€Å"Indian wars†. After fighting the government for several years and fighting for their right to religious freedom President Jimmy Carter signed the American Indian Religious freedom Act, Native American Indians (AIRFA). Burke, and Vernon, 2006), AIRFA was one of the very few times when congress gave the Natives the legislative right to worship in the manner he or she feels fit. (Burke, and Vernon, 2006). After a few more decades of being mistreated and having rights taken and treaties broken Aim reformed again. AIM’s early and best known leaders, Russell Means, Dennis Banks, Clyde and Vernon Bellecourt, these Native men formed together to fight for the rights of all indigenous peoples across the world. According to one research study, the â€Å"Trail of Broken Treaties† was â€Å"AIM’s first national pretest event of the 1970’s. AIM’s best-known and controversial protest action began February 1973 in Wounded Knee, South Dakota, a small town in Pine Ridge Reservation†, (Encyclopedia Race and Racism p. 82) better known now as the â€Å"Siege at Wounded Knee†. The siege lasted 71 days and when it was over several of the AIM members were arrested for causing riots. Many of the AIM leaders spent years in legislation, exile, or prison. One of the best known cases is that of Leonard Peltier. Peltier was imprisoned for killing two FBI agents. Several years later it was proven that Peltier did not receive a fare trial. Much of the evidence was not allowed in court and was suppressed from the jurors. After decades of trying to get Peltier freed from prison he was finally deemed the only American political prisoner in 1984. Peltier is still in prison to this day and the Natives are still fighting for his release. A more resent less known case August 22, 2008 of the Natives not receiving justice is the case of Robert Whirlwind Horse 23 and Calonnie Randall 26. These two Natives was struck and killed by a drunk driver Timothy Hotz while walking on a reservation road. This was Hotz Native American Indians fourth DUI, one year prior Hotz had his third DUI. After striking the Natives Hotz continued to drive home without stopping. The next morning Hotz noticed hair on his bumper and turned him self in to authorities. Mr. Hotz received 51 months for killing the Native men. This infuriated the Natives once again. (Means, Russell, Republic of Lakota 2009, April 22). Another case of a young native boy went to the Bureau of Indian Affairs (BIA) and was upset at the justice received over Hotz actions and was outraged. He shot one bullet into the radiator of the BIA agent’s car and received 20 years imprisonment. The Natives are still being forced to live on reservations. The reservations are in such horrendous conditions almost all the reservations are in worse conditions than most third world countries, (Republic of the Lakotah, conditions); According to one Native â€Å"It is like living in Hattie’s†,(Means Russell). The Pine Ridge Reservation in South Dakota is one such reservation. â€Å"The United States Government has not upheld many of it promises to the Lakotah people and the results to this is astonishing†, (Means, Russell, Republic of the Lakotah). Due to the conditions the Lakotah people are forced to live in has caused them to have the highest death rates than anywhere else in the Nation. Reservations across the country are well below the poverty level. (Figure 3 below) The average life span of a Lakotah Male is 44 years. (Figure 1 below) The Lakotah people have the most preventable diseases than anywhere in the nation. Much of the disease could be stopped if the government would allow the Natives have vaccines and medications. The teen suicide rates are the highest of anywhere in the nation.

Saturday, September 21, 2019

Literature Survey On Steganography

Literature Survey On Steganography In this chapter, the literature survey on the steganography and various network security mechanisms are described. Many existing algorithms for steganography since 1991 to 2009 are studied and presented in this literature survey. Numbers of web sites as well as research papers are referred on virtualization, ARP Spoofing, IDS Architectures. The description of the research papers referred pertaining to steganography and network security are given in the subsequent sections. The literature is presented in chronological order for these two areas separately. 2.2 Literature survey on steganography Bender et al. [6] in this paper, the authors describe the techniques of data hiding like low bit rate data hiding in detail. Johnson, N. and Jajodia S. [34] This article explores the different methods of steganography such as LSB, Masking and Filtering and also explains about different software tools present in the market for Steganography, such as Stego Dos, White Noise Storm, S-tool etc. Marvel et al. [38] It is proposed that (Spread Spectrum Image Steganography) SSIS is a blind scheme where the original image is not needed to extract the hidden information unless the receiver possesses the secret key to extract the secret message, otherwise it is virtually undetectable.Thus making this technique reliable and secure. Jessica Fridrich et al.[32] This paper proposes a highly accurate steganalysis technique which can even estimate the length of secret message embedded in LSB method. In this method, the test image is divided into groups of n consecutive or disjoint pixels. This method exploits the modified pixel values to determine the content of secret message. A discriminating function is applied on the group of pixels. This discriminating function determines the regularity or smoothness of pixels. Then a permutation function called flipping is applied on the pixel groups. By using discriminating function and flipping, Pixels groups are classified in to three categories, i.e Regular groups, Singular groups and Unused Groups. For a given mask, fraction of Regular groups Rm and fraction of singular groups Sm are calculated. Presence of noise in the image causes Rm to be greater than Sm. R. Chandramouli and N. Memon[49] It gives the analysis of various methods of LSB techniques for image steganography. Tseng, Y.C et al. [63] This paper presents a secure steganographic scheme which makes sure that if any modified bit in the cover image should be adjacent to another bit that has the same value as the formers new value. By this way the detection becomes extremely difficult. But for achieving this, data hiding space has to be reduced. Da-Chun Wu, and Wen-Hsiang Tsai [23] proposed a differencing steganographic method that uses the difference between two consecutive pixels in the same block to determine the number of secret bits to be stuffed. In this method a range table is used which ranges from 0-255. The difference value is subsequently adjusted to the difference in the same range to embed the secret bits, and the difference between the original difference value and the new one is shared between the two pixels. Extraction scheme in this method is quite simple and it do not requires cover image. Sorina Dumitrescu et al.[55] This paper proposes a new steganalysis technique to detect LSB steganography in digital signals such as image and audio. This technique is based on statistical analysis of sample pairs. By this technique the length of hidden message embedded via LSB steganography can be estimated with high precision. C.-C.Chang and H.-W. Tseng [9] this paper proposes a novel steganographic technique, which modifies the pixel values. This method does not replace the LSBs of pixel value directly, but changes the pixel value into another similar value. In a word, this steganographic method provides a large embedding capacity with little perceptual distortion. Mei-Yi Wu et al. [40] this paper presents a new iterative method of image steganography based on palette which reduces the Root Mean Square error between an original image and its corresponding stego-image. Based on a palette modification scheme, which can embed one message bit into each pixel in a palette-based image iteratively. The cost of removing an entry color in a palette and the profit of generating a new color to replace the old color are calculated. If the maximal profit exceeds the minimal cost, an entry color is replaced in iteration. C.-K. Chan and L.M. Cheng [11] this paper proposes LSB technique in which the secrete data is embedded in the Least Significant bits of the image pixel. Huaiqing wang and Shuozhong wang [29] Different techniques of steganography and steganalytic methods were discussed in detail in this paper. This paper focuses on LSB modification techniques, Masking techniques, Transformation domain techniques, Techniques incorporated in compression algorithms, and spread spectrum techniques. Then the important attributes of a steganographic system are presented, security, payload and robustness. This paper also presents various steganalytic methods such as, RS steganalysis, Chi-square test, Histogram analysis and universal blind detection. Xinpeng Zhang and Shuozhong Wang [65] this paper proposes the steganalysis of PVD method proposed by Wu and Tsai. This steganalysis is based on Histogram analysis. The zigzag scan of the image pixels produces a vector called Image Vector and the difference of every pair of pixels in this vector produces another vector called Substitute vector. An image from Substitute vector is built which is named as substitute image. Histogram of substitute image is constructed and analyzed. Andrew D. Ker [4] Detecting LSB matching steganography is quiet difficult compared to the LSB replacement steganography. In this paper Histogram characteristic function (HCF) is used for the detection of steganography in color images, but it cannot be used for gray scale images. Alvaro Martà ­n et al. [3] Authors have experimentally investigated three different steganographic algorithms. steg, MHPDM, and one of the algorithm used in S-tools. Jsteg embeds a message in the least significant bit of JPEG DCT coefficients. The MHPDM (Modified Histogram preserving Data Mapping) algorithm, which is developed from HPDM (Histogram Preserving Data Mapping), works by altering the least significant bit of a subset of the JPEG DCT coefficients of an image. Chin-Chen Chang et al. [15] this paper proposes two efficient steganographic methods for gray-level images by utilizing the run-length concept. The two methods embed bits of the secret data in each two-pixel block. In addition, the modular operation is applied in both methods to control image quality. The experimental results demonstrate that both methods in this study perform better than all previous methods, in terms of image quality and embedding capacity. Chin-Chen Chang and Tzu-Chuen Lu [13] the method proposed in this paper exploit the difference in the expansion of the pixels to conceal large amount of message data in a digital image. The payload capacity of the proposed scheme is higher than Tians scheme and Fridrichs scheme.In addition, the quality of the embedded image of the proposed scheme is even higher than those of the other schemes. Chin-Chen Chang and Tzu-Chuen Lu [14] SMVQ (Side Match Vector Quantization) exploits the correlations between the neighbouring blocks to predict the index of an input block that improves not only the block effect of VQ, but also the compression performance of VQ. Owing to the good compression performance and image quality, more concerns are given to SMVQ. Suk-Ling Li et al. [56] In this scheme, the best match cover-image block of the secret-image block is first selected based on the block difference. Then, the error-matrix, the normalized error- matrix, the difference-degree and the quantized-error matrix between the cover-image block and the secret-image block are computed. The block header information is embedded into the cover-image by the simple LSB substitution method. Chin-Chen Chang et al. [17] this new scheme classifies the host image pixels into two groups of pixels according to the pixel values. For each group of pixels, the corresponding secret pixel values go through an optimal substitution process and are transformed into other pixel values by following the dynamic programming strategy. Then, embed the transformed pixel values in the host pixels by using the modulus functions and obtain the stego-image. Hideki Noda et al. [27] The JPEG compression using the discrete cosine transform (DCT) is still the most common compression standard for still images. QIM(Quantization Index Modulation) is applied in DCT(Discrete Cosine Transformation) Domain. DCT based steganographic techniques are immune to Histogram based attacks. Two different quantizers are used with QIM, one for embedding 0 and another for embedding 1. Another method called HM-JPEG(Histogram Matching JPEG) Steganographic method is also presented along with QIM-JPEG Steganography. In these two methods embedding of secret message takes place during quantization of DCT coefficients only, not by modifying quantized DCT coefficients. Chin-Chen Chang et al. [12] it presents a reversible data hiding scheme for compressed digital images based on side match vector quantization (SMVQ). In Vector Quantization or SideMatch Vector quantization based methods VQ and SMVQ Compression codes are damaged by the secret data embedded in the message. And they cannot be constructed completely after extracting the secret data. By using this method, the original Side Match Vector Quantization compression Codes can be completely reconstructed, after extracting the embedded secret data. Ran-Zan Wang and Yeh-Shun Chen [51] this paper presents a new steganography method for images which use a two-way block-matching procedure to find for the maximum similarity block for each block of the image. The indexes which get along with some non matched blocks are noted in the least significant bits of the carrier image, using a hop scheme. This algorithm provides a high data payload capacity. C.-C.Chang and W.-C. Wu [8] this paper provides a technique to improve the embedding capacity without reducing the quality of cover file. That technique is called an adaptive VQ-based data hiding scheme based on a codeword clustering technique. Adaptive embedding method is superior to the fixed embedding method in terms of embedding capacity and stego-image quality. Xinpeng Zhang and Shuozhong Wang [64] a novel method of steganographic embedding in digital images is illustrated in this paper. In this method each secret digit in a (2n+1)-ary notational system is carried by n cover pixels, where n is a system parameter. This method offers a high embedding efficiency than that of previous other techniques. Mehdi Kharrazi et al. [39] this paper gives the experimental evaluation of various steganographic and steganalytic techniques. Chin-Chen Chang et al. [18] in this paper, a new watermarking based image authentication scheme is implemented. The feature extraction process of the proposed scheme is block-based, and the feature of a block is obtained by performing a cryptographic hash function. Then, the bit stream of the feature is folded and embedded into some least significant bits of the central pixel in the corresponding block. Po-Yueh Chen and Hung-Ju Lin [48] this paper proposes a new image steganographic method based on frequency domain embedding. The frequency domain transform applied in this method is Haar-DWT. There are three regions i.e., low frequency region, middle frequency region and high frequency region. And embedding occurs in Middle frequencies. Tse-Hua Lan and Ahmed H. Tewfik [61] the authors have proposed an algorithm which is based on the quantized projection embedding method. Quantized Projection (QP), combines elements from quantization that is QIM and spread-spectrum methods. It is based on quantizing a host signal diversity projection, encouraged in the statistic used for detection in spread-spectrum algorithms. Yuan-Hui Yu a et al. [67] in this method, a color or a grayscale secret image is hided in a true color host image. Procedures to different secret image types are independent. There are three image-hiding types, which depend on the type of secret image. The second type is a palette- based 256-color secret image. The third type is a grayscale secret image. Ran-ZanWang, and Yao-De Tsai [52] This paper presents an efficient image-hiding method that provides a high data hiding capacity that allows the embedded image to be larger than the cover image. In this method the image to be hidden is divided into a series of non-overlapping blocks. A block matching procedure is adapted for each block of the image to search for the best matching block from a pool of candidate blocks. This selection of best matching block is done by K-means clustering method. Then the indices of secret image are hidden in the LSBs of best matching block in the cover image. Bibhas Chandra Dhara and Bhabatosh Chand [7] Block truncation coding and vector quantization are the two widely used spatial domain compression techniques. In the proposed method the inter-plane redundancy is reduced by converting RGB to a less correlated triplet. The spatial redundancy is reduced by block quantization using BTC-PF method and the code redundancy by entropy coding using Huffman code. Nan-I Wu and Min-Shiang Hwang [41] this paper presents a survey of current methods of steganography in Gray scale images. The following methods are compared and analyzed in this paper. 1. The simple LSB method : Secret data is hidden in the Least Significant Bits of the Cover image. Quality of 3-bit LSB stego image is merely acceptable. 2. The optimal LSB methods: To improve the quality of stego image optimal procedure is adapted in LSB embedding. When data is hidden the nearest value is hidden in the cover image so that cover image distortion is minimized. 3. PVD method (Pixel Value Differencing): In this method the image is divided into non-overlapping blocks of two pixels in zig-zag manner. The amount of secret data to be embedded is determined by the difference in pixel values of two adjacent pixels. More amount of data can be hidden when the difference of pixel value is high, and less amount of data is hidden when the difference is low. In this method the cover image is not required for extraction of the secret message. 4. MBNS method (Multiple Based Notation System method): This method is based on Human vision sensitivity(HVS). The amount of secret data that can be hidden in a pixel is determined by a parameter called local variation. Local variation depends on Human Vision Sensitivity, and it is determined by three surrounding pixel values. Greater the value of Local variation, more amount of data can be hidden in that pixel. And less amount of data can be hidden in pixel if local variation value is small. When these methods are compared for low capacity hiding PVD and MBNS approaches produce better stego images than LSB based methods. Zhe-ming-lu et al. [68] this paper proposes an image retrieval scheme based in BTC based Histograms. BTC (Block Truncation Coding) is simple and easy to implement image compression technique. To reduce the bit rate of each part of BTC coded triple data, Vector Quantization is applied. Chin-Chen Chang et al. [19] this paper proposes a reversible data-hiding scheme for embedding secret data in VQ-compressed codes based on the de-clustering strategy and the similar property of adjacent areas in a natural image. This method has more flexibility and higher embedding capacity than other schemes. H. Motameni et al. [25] the authors have proposed a novel technique for hiding text message in a grayscale image. In this method different colors in the cover image are labeled in order to identify dark regions in the image. Data embedding in the these darker regions results in high quality stego images. This method offers more security than other LSB techniques. Zhensong Liao et al. [69] this paper summarizes the present techniques of data hiding capacity techniques. Various Communication channel models and host data models are discussed in this paper. H. Arafat Ali [24] the author, proposes a spatial domain steganographic scheme for JPEG images. This technique is based on statistical analysis and called IVSP (Improving Visual Statistical Properties) Method. This proposed method enhances the statistical properties of the stego image and also reduces the quantization error, which creeps in with JPEG format. And this method is also more secure when compared to the other techniques which are in use presently. Youngran et al. [66] this paper proposes a new method which is able to provide high quality stego image. According to pixels characteristics, number of bits can be embedded in stego image is varying and also providing the integrity of original data. Andrew D. Ker [5] Batch steganography problem deals with spreading payload in multiple covers. Author has proved that the secure steganographic capacity is proportional to the square root of the total cover size. Hong -juan zhang and Hong-jun tang [28], Proposed a novel method of image Steganography which can withstand for statistical analysis tests like RS and Chi-Square steganalysis techniques. Kazuya Sasazaki et al. [35] this paper proposes scheme for hiding data that loss lessly stuffs a data bits into a carrier image using the two differences. In this scheme, a three-pixel block in an image contains two absolute differences-the difference between pixels one and two, and the difference between pixels two and three. Such a difference is called block difference. Chung-Ming Wang et al. [21] this work is an improvement over Wu and Tsai scheme of pixel value differencing (2003). In this method the image is divided in to the blocks of two consecutive pixels and the number of bits that can be embedded is determined from the width of the range table. The reminder of sum of two pixel values with width of suitable range is calculated and modulus of pixel values is adjusted to the decimal value of binary string to be embedded in the block of two consecutive pixels. This method also addresses the falling-off boundary problem and produces high quality stego images than any other technique of spatial domain steganography. But the hiding capacity is low in this method when compared to other methods. Chien-Ping Chang et al. [20] Authors have proposed a novel data hiding scheme that embeds a message into a cover image. This method uses Tri way pixel value differencing method. In this method blocks of four pixels are considered at a time. This four pixel block is divided into three pairs. And the PVD method is applied separately to these three pairs. From the modified pairs on pair is chosen as a reference pair and other two are adjusted. By this method the hiding capacity enormously increases over Pixel Value Differencing Method. But the quality of stego image when expressed in terms of PSNR value decreases. Adem Orsdemir et al. [1] this method is based on the Higher Order Statistics Steganalysis. Generally any steganographer focuses more on undetectability and payload but not about the statistical difference between the stego image and cover image. When the steganographer is well aware of the steganalysis methods HOS steganalyzer and by formulating statistical in distinguish ability requirement, visual quality requirement, and detect ability requirement the method of steganography can withstand the steganalysis methods based on statistical differences. Chin-Chen Chang et al. [16] It is proposed in this method that digital images can be compressed using Block Truncation Coding (BTC). BTC is the most efficient spatial domain method with simple computations and acceptable compression rates. Zhiyuan Zhang et al. [71] generally in two-description image coding the image are partitioned into two parts and each description is produced by alternatively concatenating a finely coded bit stream of the other part. Multi Description Coding is a reliable method for robust transmission over unreliable networks. H.B.Kekre et al. [26] This paper proposes a new improved version of Least Significant Bit (LSB) method. Before embedding the data a 8 bit secret key used and XORed with all the bytes of the message to be embedded. Message is recovered by XOR operation, by the same key. Depending on the MSBs the number of bits of LSB utilized for data embedding are calculated. This method is simple to implement and offers high payload than other methods like PVD. Sathiamoorthy Manoharam [54] analyzes the steganalysis of LSB technique using the RS Steganalysis technique. The two classes of images- natural photographic images and synthetic images are taken as the cover medium. Ahmad T. Al-Taani and Abdullah M. AL-Issa [2] the proposed method provides good quality and high embedding capacity of stego image. Here the carrier image is divided into blocks of equal sizes and then stuffs the original data bits in the edge of the block depending on the number of ones in left four bits of the pixel. Experimental results of this method are compared with Pixel Value Differencing method and Gray Level Modification Method. P. Mouli and M. Mihcak [45] described the data hiding capacities of various image sources. Hong -juan zhang and Hong-jun tang [28] Proposed a novel method of image Steganography which can withstand for statistical analysis tests like RS and Chi-Square steganalysis techniques. 2.3 Literature survey on Network Security John McHugh et al. [33] this paper describes the role of an IDS in an enterprise and also gives survey on mostly used intrusion detection techniques. This paper also describes the various representative systems from the commercial, public, and research areas. Ray Spencer et al. [53] this paper, proposed a Flask micro kernel based operating system, security architecture which provides the solutions for the access rights sort of problems and it is suitable for many operating environments. Clive Grace [22] it gives a detailed understanding of various types of attacks possible and also various types of intrusion detection systems and soft wares. Nong Ye et al. [42] this work paper gives an investigation on a multivariate quality control technique. This method is finds a long-term profile of normal activities in the profiles in order to detect intrusions. Tal Garfinkel and Mendel Rosenblum [59] it proposes the Intrusion detection architecture and also the results are demonstrated to detect the attacks using the IDS which are completely isolated from the monitored host. Tal Garfinkel et al. [58] This architecture provides a tamper resistant trusted hardware platform where each and every application will be running on either the open platform that is general purpose platform or the closed platform that is general purpose platform with security and integrity properties. P. Englund et al. [43] this paper describes the trusted platform which provides a strict control over the software and hardware platforms to withstand the various vulnerabilities. Suresh N.Chari and Pau-Chen Cheng [57] Blue box, the host based IDS, is designed based on the system call introspection. They designed some set of fine grained rules for access control to the system resources. M. Rosenblum and T. Garfinkel.[37] It describes the virtual machine monitor and also how the VMM is useful to provide security. It also looks after the various implementation issues and future directions for the VMM. James E. Smith and Ravi Nair [30] in this paper various levels of abstractions of virtualization and also the architecture of virtual machines are described. Process and system virtual machines are also described over here. Peyman Kabiri and Ali A. Ghorbani [47] it gives a review on current trends and technologies implemented by re- searchers and also elucidated the applications of honey pots to detect attacks. Petar Cisar and Sanja Maravic Cisar [46] this paper describes a flow based algorithm combined with data mining techniques for intrusion detection. Jenni Susan Reuben [31] this paper gives a literature survey on various security issues as well as threats which are common for all virtualization technologies. Zhenwei Yu et al. [60] this paper gives an experimental result for an automatically tuning intrusion detection system which controls the number of alarms output to the system operator and according to the feedback mechanism provided by the system operator, tunes the detection model when false alarms are identified. The Flask architecture of security enhanced Linux for red hat is described in detail in this website [81]. 2.4 CONCLUSION This literature described the various methods and algorithms existing for the steganography and network security. Based on the existing algorithms, the conclusions are proposed to provide the efficient methods for the below 1. Data Security 2. Network Security 2.4.1 Data Security For providing the data security, there are many cryptography and as well as steganography methods existing for the data to be transmitted on the channel. But for any algorithm, it is has its own disadvantages. In the case of Steganography, the basic algorithm is LSB algorithm and some variations on the spatial domain techniques. But at any point of instance, algorithm is public. Once the algorithm is known, attacker will be trying to get the secure data. In this thesis two algorithms are proposed to provide the data security, which were not presented so far, which are as follows: Highly Secured, High Payload and Randomized Image Steganographic Algorithm using Robust Key: In this proposed method, the algorithm used for steganography process is either the PVDM or LSB algorithms depending on the inter pixel difference value in order to increase the data stuffing capacity with out disturbing the quality of the stego image. The position of pixels where to stuff bits will be decided by the stego key which is randomly selected by the user and this key is transmitted to the other party in encrypted form. So the key is robust. Highly Secured, High Quality, High Payload and Randomized Image Steganographic Algorithm using Robust key based on Tri way PVDM Method : In this proposed method, the algorithm used for steganography process is the Tri way PVD with Modulus which is an extension of Tri way PVD [20] in order to increase the stego image quality. The position of pixels where to stuff bits will be decided by the stego key which is randomly selected by the user and transmitted to the other party in encrypted form. So the key is robust. 2.4.2 Network Security For Providing the Network Security, There are many software and hardware devices available like firewalls, IDS etc.,. Generally an intrusion is detected by the IDS, immediately that can be patched by using the available techniques, meanwhile the applications are to be stopped temporarily, where as the proposed trusted architecture for providing network security will provide a self healing intrusion detection system without disturbing the actual state of the system, and trust can be taken back to the system by using the virtualization concepts.

Friday, September 20, 2019

Uses of the Internet

Uses of the Internet INTRODUCTION For our current generation, the internet has nearly become a necessity with all of the luxuries it provides. Just about anyone can find at least one use for the internet. But what makes the internet so useful to us? Some people can hardly live without it! The following report will discuss the internets many uses: Communication, File Sharing, and Media. COMMUNICATION The internet is used primarily for communication; people of all ages take advantage of this. What makes internet communication so useful is its speed, and most of it is free. Internet communication varies, there are different methods and different ways to take advantage of your three senses; touch, sight, and hearing. ELECTRONIC MAIL. Electronic Mail, also known as e-mail, is similar to real mail, but instead of writing on stationary and sending them in envelopes, you can type up whatever message you want to send, and it will be sent immediately. You can also send e-mails on portable devices such as a phone, making emailing increasingly popular. Because of this, the post offices may struggle, however people still mail physical objects. However, you can attach files, such as your favorite music, pictures, text documents and more. But be careful when opening messages sent from an unknown user, viruses can also be attached to emails. INSTANT MESSAGING. Instant Messaging (IM) is very similar to e-mailing, and often may be confused for one another. Instead of sending a message and waiting for a reply, IMing is â€Å"real-time,† and you must log on to a Messenger to message other users who you have added to your buddy list. This is almost like chatting, except with typing, since you can immediately send and receive messages without waiting. Instant messaging can also be done on most mobile devices, and offers live webcam or calling on the computer. This is a free alternative to using a telephone, but requires a microphone for your computer. Files can also be transferred through IMing, just like e-mailing, you can also open up picture sharing in order to share pictures saved on your computer. Usually you dont have to worry about viruses if you add people to your messenger that you trust. There are 3 primary Messenger services, they are: †¢ AIM †¢ MSN Messenger †¢ Yahoo Messenger INTERNET FORUMS. Internet Forums or message boards are online discussion sites where a user signs up for an account and posts messages, usually concerning the theme of the forum. Internet Forums are good ways to meet new people via the internet, sometimes they may be all the way on the other side of the world! Forums are usually divided into different sections, which divide into different topics, which divide into different subtopics, which contain different threads concerning the theme of the subtopics. Here, people can post replies with their opinions on the threads. The creator of the forum will assign positions to the members of the forum, in most cases they come in these categories: 1. Administrator 2. Global Moderator 3. Section Moderator Moderators are the ones who enforce the rules of the forum and have the ability to ban members or take away privileges (global moderators having access to the whole forum, section moderators being limited to a section), and administrators who have power over the moderators. Administrators can sometimes even change the forum the same way the creator can, or assign moderator positions. There are also a few more privileges assigned to members by the founder: †¢ Graphic Artist †¢ Affiliate †¢ Members who contribute to the forum in some way †¢ Members who have access to restricted areas Anyone in the world has access to what you write on forums if theyre open to the public, so be careful about what you say. If you make negative comments for bad reasons, people may respond in a negative way as well. RESEARCH AND INFORMATION The internet is also commonly used to obtain information or used for research. With its speed and relevancy, most people would prefer to use the internet for research rather than doing it the old fashioned way by using books. Also, some information may not be recorded in books, or may not be easily found in books, so the internet would also be the better alternative. Some schools even require students to use computers for schoolwork and homework, which is also why some schools provide computer labs and computer classes to help students become more computer savvy in order to do this work. ONLINE ENCYCLOPEDIAS. Online encyclopedias are like regular encyclopedias, except information can be immediately found by typing in the key words to what you are looking for. Like normal encyclopedias, online encyclopedias contain many articles on many topics. Online enclyclopedias are constantly growing and being updated, due to more information being generated every day. Two popular forms of online encyclopedias are: †¢ Wikipedia †¢ Other Wikias WIKIPEDIA. Wikipedia is probably one of the most popular online encyclopedias. People viewing articles can sometimes make edits to the articles, or even add new articles. Sometimes articles require more information or cleaning up, and anyone can edit Wikipedia. This comes to the problem that the information on Wikipedia isnt always accurate, so most teachers at schools dont encourage students to use it for research. However, it can be used for research when researching a generic idea. OTHER WIKIAS. Wikias are free webhosting for wikis, where anyone can create their own wiki based on a specific topic, narrowing down the information in the articles. Wikias can be based on long-running TV series, Video games, Companies, anything that contains a large amount of imformation that can be well organized. ONLINE DICTIONARIES. Online dictionaries are like normal dictionaries, and a useful tool for students. Instead of having to flip through several pages of a dictionary to find the definition of a word, all you have to do is type in a word and it will immediately tell you its definition. There are also online thesauruses, Spanish-to-English and vice versa dictionaries, and much, much more. WEB SEARCH ENGINES. Search engines are tools designed to search for information on the web. There is usually a search bar for you to key in what youre looking for, then a page with a list of anything relevant to your search will pop up. You can narrow down your searches to images, files, websites, and more by using advanced search options. Searching on a search engine may even take you to an online dictionary or encyclopedia! Search engines will take you anywhere on the internet, and have the largest variety for finding information. There are many search engine sites, but some websites have a search bar in them that will take you to a search engine. A few popular search engines are: †¢ Google †¢ Yahoo Search †¢ MSN Search †¢ Bing.com (newest this year) MULTIMEDIA Multimedia is different from traditional hand-produced media, and is usually accessed via a computer device. â€Å"The term is used in contrast to media which only uses traditional forms of printed or hand-produced material. Multimedia includes a combination of text, audio, still images, animation, video, and interactivity content forms.† (Wikipedia.) Multimedia can be a useful way to display information or instructions, but can also be used for entertainment purposes. Although multimedia can be purchased or found on things such as disks in stores, it can also be obtained through the internet, which would be more preferable. HOSTING. Hosting is where you can upload multimedia and then have someone else download it to their computer. Basically, you submit a file (or multiple files) to hosts server, and is then hosted on the server where anyone on the web can download it for their own. Your file may even appear on a search engine if someone is looking for it. These are the different kinds of hosting: †¢ Image hosting †¢ Video Hosting †¢ File Hosting Most of the time, content will be removed from the hosting if it is too explicit or offensive. However, there are even some sites that are limited only to explicit or adult material. WEBCAMS. Webcams allow people to use live video. Two primary uses for webcams would be: †¢ Video Chatroom †¢ Video Chat Conference (messengers) Webcams can mainly be used in messengers, but are also used in online video chatrooms, which is also similar to chat conferences. There will be a window where several users can talk by typing text simultaneously, and one or more of those users will be visible through a webcam. These chatrooms are sometimes open to the public at all times, some require a password, and some require an invite, where chat conferences usually always require a invite (unless you make the room yourself.) WEBCASTS. Webcasting is pretty much broadcasting media over the internet. Webcasting involves streaming media technology, so the webcast will be broadcasted from one content source so that several people can listen and/or view the webcast simultaneously. Webcasts can involve video and audio, where podcasts only include audio, making them very similar to radios. Webcasts and Podcasts can also be downloaded, or viewed on video hosting websites. Obviously, these arent live broadcasts. FILE SHARING. File sharing is similar, in a way, to file hosting and transfering files on messengers. Originally, the only way to share files was with removable media (such as flashdrives, floppy disks etc.) But now there is a much more convenient way to download several files of any kind at once. This is how file sharing works; first you must download a program that allows you to have access to P2P (peer to peer) networking. When you download the program, it usually lets you browse through media shared by other users on their computers, and lets you download it. You can share any kind of files this way, making it a popular and convenient way to download. CONCLUSION The internet is one of the most useful tools we could have ever imagined. Even with all the things mentioned in this report, there are still other various uses, but this report did cover the basics that can be broken down into these specific things. Our society will probably never outgrow the internet; we will continue to find ways to advance it. Hopefully if you dont use the internet, or take it for granted, youll now be able to see its significance.

Thursday, September 19, 2019

AIDS in Africa :: HIV Disease Epidemic

Africa’s AIDS Epidemic Acquired Immune Deficiency Syndrome (AIDS) has become an epidemic for many underdeveloped regions. Although it does exist in the developed nations, it is more prevalent in places like South America, Asia, the island countries and most heavily of all Africa. There are many aspects to the problem of AIDS in Africa. Public health departments lack the resources to treat patients properly and to control the epidemic through education. Thirty-three million people have AIDS in the world. Africa has two-thirds of that number. According to the United Nations Aids Program on HIV/Aids, and World Health Organization (WHO), estimates, seven out of ten people newly infected with HIV in 1998 live in sub Saharan Africa. Among children under 15, the proportion is nine out of ten. Of all Aids deaths since the epidemic started, eighty-three percent have been in the region. These numbers sound even more astonishing considering only one-tenth of the world’s population lives in Africa, south of the Sahara. The amount of Africans affected by the epidemic is frightening. Since the start of the epidemic, an estimated 34 million people living in sub-Saharan Africa have been infected with HIV. Approximately 11.5 million of those people have already died, one-fourth of them being children. During the course of 1998, Aids has been responsible for an estimated two million deaths in Africa. There is about 21.5 million men and w omen living with HIV in Africa, plus an extra one million being children. Four million of those people contracted the infection in 1998 alone (Mail & guardian). No country in Africa has escaped the virus. Most of the new infections are concentrated in East Africa and especially in the southern part of the continent. In fact, the southern region of Africa holds majority of the world’s most hard-hit countries with the most AIDS cases. According to the Department of Health, South Africa’s current estimates show that over one person out of every five between the age of 15 and 49 is living with HIV or Aids in Botswana, Namibia, Swaziland and Zimbabwe. Zimbabwe was especially hit hard. There are twenty-five surveillance sites in the country where blood taken from pregnant women is tested anonymously as a way of tracking the HIV infection. The most recent data, from 1997, show that HIV prevalence was below ten percent in just two sites.

Wednesday, September 18, 2019

DMX song Slippin’ :: essays research papers

DMX- â€Å"Slippin’†   Ã‚  Ã‚  Ã‚  Ã‚  The song â€Å"Slippin’ â€Å" by artist DMX uses tone, theme and imagery. DMX’s purpose for writing this song was to convey the theme how life in the streets is, and how you can over come life with drugs if you give it all you got. The song begins with the speaker talking about problems he is having with his mom, and that’s when he decides to run away from home. Then it moves on to when he is on the streets by himself, and that is when his problems begin to worsen.   Ã‚  Ã‚  Ã‚  Ã‚  In the first stanza, the speaker starts talking about the problem he is having with his mom. He then decides to leave his house. When he leaves his house he thinks its going to be easy to live alone in the streets and that is when he uses imagery and says â€Å"I’m gonna be that seed that doesn’t need much to succeed â€Å". He then finds out that life in the streets is not so easy and that’s when he says, â€Å" I’m ready for the world, or at least I thought I was†¦ â€Å"In this stanza he also uses tone when he says, â€Å" DAMN, was it my fault something I did†¦.†? Here he is asking himself if it was his fault that his father had left him at age 7 and why did his father leave.   Ã‚  Ã‚  Ã‚  Ã‚  In the chorus the speaker uses the phrase †¦.â€Å"I’m Slippin’ , I’m fallin’, I can’t get up†, which means that the speaker is loosing every hope that will help him survive through all the problems he has. The speaker also uses theme in the chorus when he says, â€Å"See, to live is to suffer, but to survive, well, that’s to find meaning in the suffering.† He uses theme here because he is saying that to him life is nothing but suffering and if you survive the suffering, its just to find meaning in it.   Ã‚  Ã‚  Ã‚  Ã‚  In the middle of the song the speaker talks about how he hit rock bottom. He says that in three years he started showing signs of stress, that he didn’t care how he looked and he didn’t care about anybody. He says that he â€Å"Would get high to get by† or in other words he would get high to forget about the problems he had.   Ã‚  Ã‚  Ã‚  Ã‚  Finally at the end of the song he talks about how his life started to change with the help of his friends.

Tuesday, September 17, 2019

Compare and contrast how the two short story writers use the theme of revenge Essay

The two writers Isabel Allende and Guy de Maupassant both use the theme of revenge in many ways in their short stories ‘The school teacher’s guest’ and ‘Vendetta’. Vendetta’s key theme appears to be revenge because of the title, the word Vendetta meaning ‘A bitter, destructive feud.’ Where as â€Å"The school teachers guest† seems, from its title, to be a pleasant story about a school teachers guest. The opening paragraphs of the stories are also different. The school teacher’s guest introduces the murder straight away by the schoolteacher Ines entering the pearl of the Orient and announcing to the character Turk that she had just cut off the head of one of her guests, Allende then goes back to explain why this happened. This is different in Vendetta as the murder does not happen until the very end and it isn’t until the middle of the story that we learn who the vendetta is for. The revenge in Vendetta is also build up in a different way by setting a depressing scene and working gradually into the son’s murder and the widow’s grieving. It also builds up the widow training the dog Sà ¯Ã‚ ¿Ã‚ ½millante to kill. This is different in the school teacher’s guest, as the murder is announced at the beginning, there is no build up and the killing of the man is more of an act of fate. The reason for the act of revenge is also described more thoroughly in the school teacher’s guest. The accidental murder of Ines’s son is told in lines 24-35 in great detail using phrases such as ‘drilling a black hole in the middle of his forehead through which his life rapidly escaped’. In Vendetta, Maupassant simply states ‘one evening, Antoine Saverini was treacherously stabbed in a quarrel by Nicolas Ravolati, who escaped that same night to Sardinia.’ This is a much shorted but not as thorough way to describe the main rea son for the climax of the story. One thing similar between the two stories is the scene in the aftermath of the son’s murder being described in great detail, although in the school teacher’s guest the act of revenge is almost committed by the towns people rather than swore by the victims mother. The aftermath in the school teachers guest is also more of a community parade, throwing mangoes and marching rather than weeping by the dead boys bedside as the widow does in Vendetta. We are also told more about the murder despite not knowing his name. We know that he is a truck driver and an outsider of Agua Santa. In Vendetta we know nothing of Nicolas Ravolati but his name which does not give him much character to hold a vendetta against. Both Maupassant and Allende use revenge in different ways in their short stories but Allende describes the characters and the reasons for revenge more thoroughly even if she doesn’t set the scene as well. In this way I found the school teachers guest used revenge in better and more high-quality ways.

Monday, September 16, 2019

Grant and Lee a Study in Contrasts Essay

â€Å"Grant and Lee: A Study in Contrasts,† written by Bruce Catton compares and contrasts the characteristics and lives of two leaders of the Civil War. Ulysses S. Grant and Robert E. Lee, two very strong and very different generals, met on April 9, 1865 at Appomattox Court House in Virginia to bring to a close the Civil War. By this time, America had become a country that was starting over with the simple core belief in equal rights for everyone. Lee, who is from Virginia, had very traditional and old fashioned beliefs. He strongly believed in the idea that having unequal, leadership, and social categories provided an advantage to society. The Confederacy embraced Lee as their leader as well. Furthermore, Confederate soldiers considered Lee the symbol of everything for which they had been willing to die for. On the other hand, Grant was raised very differently from Lee, his father had been a tanner on the Western frontier, and he was brought to be a hardworking man and to make something of himself. Grant primarily focused on democracy and believed that no individual was born into any type of class. Moreover, he believed that society should have privileges that each man should win for themselves and not just have privileges because you were born into an aristocratic family. He is seemingly the complete opposite of Lee in his belief that each person has the ability to work hard and gain their own good fortunes. Grant believed in a balanced social structure that did not limit anyone to any particular fate. He believed that life was a competition and everyone should get the chance to reach their limits. Grant had a more modern outlook on life and Lee would rather live in accordance with the past. Also, Lee and Grant were most different when it came to loyalty. Lee saw himself very much in relation to his own region. He was brought up in a static society where change was not known. Therefore, his loyalty would only be to the society in the location he lived and would fight to the limit to defend it because he believed that it gave his life the deepest meaning. On the other hand, Grant would fight for a broader concept of society so that there could be growth and expansion. He would fight for the Union with everything he had because he strongly believed in the Western way of living he was raised in. Although Grant and Lee had individual beliefs that clashed with one another they also had a few things in common. For example, Catton points out they were both great fighters that displayed a lot of tenacity and fidelity to their separate causes. Grant battled and endured his way down the Mississippi Valley despite his military handicaps and personal discouragements while Lee still had faith at Petersburg after all hope was lost. Also, their fighting qualities were very similar and they both refused to give up as long as they were able to fight. They were both also very daring and resourceful in that they had the ability to move quickly and think faster than the enemy. Most importantly, they were alike in the sense that they had the ability to turn away from war and come to peace once the fighting had ended. As a result, this helped the nation become whole and united again. Their gathering at Appomattox was a great moment in American history. In our modern society today I think that we can now discuss our political differences and beliefs in peace and overall our nation is one that is very united as a whole. We live in a country that strongly follows Grant’s belief in equal rights for everyone in which citizens are able to vote for who they want as President of the United States. Also, although people will always disagree and agree on some things we carry on the beliefs of Lee and Grant in that we can always come together and discuss things in a peaceful manner much like they did at Appomattox on April 9, 1865.

Sunday, September 15, 2019

Persuasive Fishing

General purpose: To Persuade Specific purpose: To persuade the audience to go fishing this summer. Central Idea: Fishing is fun and easy Pattern: Topical Pattern Introduction: I have been fishing for 10+ years and really enjoy it and would love to share this hobby of mine with others. Body: There are so many ways to fish and I would like to share with you some information on my favorite ways to fish. Bow fishing is my favorite way to catch fish and it begins around May when the temperature is constantly warm and last thru ought the summer.Some gear you will have to have is a bow a recurve or a compound it doesn’t matter but if you are not the best with a bow the best bow for you would be the compound because you have sights on the bow. A retriever reel and an arrow with any kind of tip will work. And the way the fish is swimming threw the water you must aim below where you see the fish at, it’s difficult at first but it gets easier. Cat fishing can be done anytime durin g the summer day or night.I prefer night time because there are less people fishing and the fish are more active. But the down side to fishing at night you must then bring a light or build a fire to see the end of your poles. The first thing you will need is a fishing pole with a heavy weight on the end of the fishing line with a treble hook around half a foot up from the weight you do this because cat fish usually stay toward the bottom of the lake or river.What I found works the best and smells the worst is punch bait and you push the treble hook down into the punch bait with a stick because if you get it on your hands they will stink for a while. And another good bait to catch the catfish with is chicken livers and they are a little more difficult to put on the hook. Conclusion: Fishing is a great and relaxing hobby to try out.

Saturday, September 14, 2019

Energy Drinks Research Essay

Many energy drinks are found in the market and many people are consuming them without knowing the bad effects on their health, having the misconception that they help in enhancing and boosting the body energy. Ingredients: Other than the caffeine and carbohydrates energy drinks contain: B vitamins: Energy drinks contain B vitamins that exceed the daily-recommended amounts. Gingko: German pharmacological studies suggest that this herb increases blood flow to the brain and may be effective in treating depression and short-term memory loss. Guarana: An herbal stimulant popular in Brazil. The reason guarana is so stimulating is that it contains two to three times the caffeine of coffee. Carnitine: A compound generally found in animal foods that’s theorized to enhance fat burning and improve endurance performance. Mechanism: Energy drinks cause many things that include: Insomnia and alertness: Most energy drinks contain caffeine and herbal stimulants that stimulate the central nervous system, giving a sense of alertness. This stimulation can cause a person who is sleepy to wake up. However, it can also prevent a person desiring to sleep from dozing off. In addition, the caffeine in energy drinks blocks the effects of adenosine, a chemical in the brain involved in sleep. This in turn activates neurons in the brain as though there were an emergency, often preventing sleep and causing insomnia. Increased heart rate: When caffeine blocks adenosine and the neurons are activated, the pituitary gland releases adrenaline. This hormone makes the heart beat faster and consuming the large dosage of caffeine found in energy drinks can lead to high blood pressure and heart palpitations. Increased blood sugar: When adrenaline is released into the system, this causes the liver to release extra sugar in to the bloodstream for energy. In addition, energy drinks contain high amounts of sugar, which can be digested easily and also used as a quick source of energy. When consumed, the body experiences a sugar high then often crashes. The sugar enters the bloodstream, provides a blast of energy and when the sugar is burned up, 30 to 45 minutes later, the body usually experiences a sugar crash. At this time feelings of dizziness, slowed reflexes and decreased performance may occur. Dehydration: Caffeine is a diuretic or a substance, which causes urination. The caffeine in energy drinks causes the kidneys to move extra fluid into the urine, which can lead to dehydration if done while sweating during exercise. The high levels of sugar in energy drinks slow the absorption of water that dilutes the sugar in the bloodstream, enhancing dehydration. Also, consuming a drink with a high sugar concentration before an athletic performance can cause gastric distress and diarrhea, resulting in dehydration. Energy: Most energy drinks contain large amounts of caffeine, which can provide a temporary energy boost. Some energy drinks contain sugar and other substances. The boost is short-lived, however, and may be accompanied by other problems. Side Effects: Energy drinks can cause inflammation in the stomach; bleeding and ulcerations in the duodenum. While consuming energy drinks alone will not damage your liver immediately, prolonged consumption of certain ingredients in popular energy drinks may have ill long-term effects on your liver. For example, many energy drinks contain herbal concentrate products like kava kava or taurine. An overabundance of either of these herbal supplements can lead to liver damage or liver failure. For example, consuming large amounts of taurine may lead to complications in individuals with type-2 diabetes. Caffeine and Guarana affect the adenosine receptors in the brain. Caffeine also cause dopamine to be released in greater amounts which makes you feel more alert and energetic and happy though it does not provide any energy. Resources: http://www. deseretnews. com/article/635202412/What-ingredients-do-energy-drinks-have. html? pg=all http://www. ehow. com/about_5256218_do-energy-drinks-affect-body. html Books: â€Å"The Nutrition Bible,† by Jean Anderson.

Friday, September 13, 2019

Chinese Economy Research Paper Example | Topics and Well Written Essays - 1000 words

Chinese Economy - Research Paper Example of Foreign Trade and Economic Relations (Import/Export License System, 2008). International organizations have displayed keen interest in investing in China, notwithstanding its restrictive policies. China has displayed good business sense in spite of its negative political rhetoric. 400 of the top fortune 500 companies have invested in China. Cheap labor and improved working conditions appear to spur economic radiance. However, it is good to keep fingers crossed. Economic gains have yielded little political reforms. In case flight of foreign capital starts taking place there will be problems of unemployment and uncertainties in finance (Overall Evaluation of WTO Entry's Influence on China). While on the subject, it is also pertinent to remember China's growth is spurred by exports. Its domestic market may find it very difficult to survive should exports come down significantly or vanish altogether. For the moment, China faces little competition in the manufacturing sector, thanks to its political ideologies. China's imports and exports "China's major exports consist of machinery and transport equipments constituting to nearly half of the total exports. Another major portion of the exports comprise of textile, rubber and metallurgical products constituting to 18%. Chemical products, food, mineral and fuel materials made of up 10% of the total exports. There is an exponential increase in the machinery and transport equipments segment of the exports from a mere 5% to 47% in 2007" (China exports by category of commodities, 2010). "For year 2007, machinery and transport equipments made up the majority of the imports, accounted for USD 412 billion or 43% of total import volume. Next major imported products were chemical products which took 11.3%; mineral and raw material accounted for 11.0%; and textile, rubber and metallurgical products were 10.8%" (China imports by category of commodities, 2010). China's reputation as the number one manufacturer of world products today has enabled it capture myriad markets from all over the world, notably the United States (US) and the European Union (EU). Corporations in the US and the EU who found their fortunes dwindling in their own countries rose like the proverbial phoenix by establishing their enterprises in China. China's Economic System China's new-found euphoria as a major contributor may also prove to be a setback in certain quarters. As socialist economy, China observes the "rule-of-the-thumb" and cannot digest the principles of