Thursday, December 26, 2019

Factors Affecting Performance Management Systems Business Essay - Free Essay Example

Sample details Pages: 7 Words: 2186 Downloads: 6 Date added: 2017/06/26 Category Management Essay Type Cause and effect essay Did you like this example? In order to achieve common recognition of work prospects, areas and opportunities that exist for the growth of the employees as well as for the organization by appraising performance outcomes, an evolving concept of performance management is on the rise. Performance management is a systematic process that links means that enable organizations to foster a common image related to the goals set by the organization and in providing direction to workers so that they can comprehend and preserve for both, individual as well as companys performance (Holton, 2002). According to (Salem, 2003) , performance management can be stated as a methodology that is integrative and orderly for the purpose of enlightening organizational performance that encourages a philosophy focused towards the attainment of planned aims, mission, vision and principles. Don’t waste time! Our writers will create an original "Factors Affecting Performance Management Systems Business Essay" essay for you Create order More precisely, it is concerned with evaluating the performance of workforces so that development can be carried in by relating suitable assessment and rewards for the efforts of the employees and by simplifying the flow of communication, boosting learning prospects and explicatory work engagements (Salem, 2003). OBJECTIVES OF PERFORMANCE MANAGEMENT SYSTEM: Lockett has underlined a number of performance managements goals. They are as follows: The main aim of performance management is to facilitate the workforce of an organization to achieve higher standards of performing their job responsibilities. Performance management enables the employees to improve the level of their current performance by authorizing, encouraging and executing an operative reward mechanism. Facilitating smooth flow of communication so that potentials regarding roles, tasks, reporting are simplified between the managers and the employees. It enables the communication of corporate, business and functional goals alongside providing a systematic and apparent opinion about performance of the employee. Ensures constant supervision and coaching. The key aim for performance management is to identify and resolve the barriers that prevent effective performance. This can be done by way of providing instructions, active governance, close monitoring and change interventions. Building a foundation for numerous organizational assessments deliberate arrangements, succession planning, advancements and rewards linked with performance. Providing employees with the opportunity to prosper by exploiting the opportunities that exist so as to achieve personal growth and improvement in their career (Lockett, 1992). FACTORS AFFECTING PERFORMANCE MANAGEMENT SYSTEMS: For performance management system to be implemented, there are a number of conditions that must exist prior to its execution. These factors include: Ability of manager to mobilize the organization. Effectively communicating the roles, duties and responsibilities of all such individuals who are the participants in the process of bringing about change. Transparency and Simplicity Practicality and Participation Equality and Objectivity (Amatayakul, 2005). STYLE OF PERFORMANCE MANAGEMENT In the views of Joseph R. Grima, performance management should be: Participative: Performance management is a two way process and must encourage the participation of both supervisor and employee. This participation should be there for establishing objectives at the very start of the assessment period and at the end, evaluating results. Task-oriented: Performance should be measured on the basis of business objectives and the outcomes, personal traits and pre-defined areas and targets. Developmental: The process should be implemented not only to evaluate and rate employees but also to help the employees to advance their future career paths by way of personal growth and development. It should also identify the areas where employee needs further training (Grima, 2000). It is essential for performance management system to be participative, task-oriented as well as developmental. If the performance management system of an organization doesnt provides the employees opportuniti es to learn and develop when deficiencies from the results are identified, than such system is of no use. The main focus of performance management is to identify and to address vital people issues that exist in an organization. It leads towards building relationship with the people employed by the organization. It creates an environment or work setting that enables the employed people to best perform the abilities that they possess (Heathfield, 2012). PERFORMANCE MANAGEMENT MODEL An integrated model of performance management is presented by (Thomas G. Cummings C. G., 2005). (Thomas G. Cummings C. G., 2005) pg #421. For effective implementation of performance management, it is important to consider three appropriate factors that exist in the larger organizational perspective and affects performance organization wide. These factors include: Business Strategy: It includes internal and external environment within which the company operates. It also includes all those policies, procedures, plans, objectives, environment that enables an organization to compete in the most successful manner and the focus that organization has on effective performance of its employees. Workplace Technology: Workplace technology has a huge impact on performance of individuals and groups. It depends upon whether the technology is high or low in interdependence. In case technology is highly interdependent, work structures are preferably designed for work groups rather than individuals and performance management in such a case is aimed at work group behavior (Thomas G. Cummings C. G., 2005). Employee Involvement: Level of involvement depends upon the control that exists in an organization varying from bureaucratic to flexible. Organizations rigid controls discourage participation and the setting of goals, appraisal of performance are formalized and inflexibly administered by management. On the other hand, when organizations are supportive and flexible, participation from employees is encouraged, sense of ownership increases and performance management becomes a two way process for employees as well as for the employer (Thomas G. Cummings C. G., 2005). GOAL SETTING: Goal setting specifies the acceptable level of performance. It is a two way process in which employee and the employer establishes and gain understanding of the goals set for the employee to achieve. Goal setting involves: Establishing challenging goals: An organization should set goals by encouraging participation from the employees, setting challenging and clear goals that are specifically defined and realistic (Thomas G. Cummings C. G., 2005). Clarifying goal measurement: When the goals set by the organization are specific, each employee has a clear understanding of what is expected from him. However to achieve clarity in goal measurement, goals should be operationally defined (Thomas G. Cummings C. G., 2005). Management by objectives: Another way of setting goals is by way of management by objectives (MBO); focusing on alignment of personal goals with the business strategy by facilitating the flow of communication between the manager and the subordinate and by unificat ion of conflicts where it exists(Thomas G. Cummings C. G., 2005). . This process of MBO can be implemented by following the below mentioned steps: Step1: Group along with individual goals is defined and action plans are developed for the achievement of the set goals. Step2: Job duties, responsibilities and accountabilities are stated so that the individual has a clear understanding of what is to be done and what not. Step3: A course of action for the execution of goals is determined known as action plans. Step4: At this stage, the acceptable criteria for success and performance are agreed upon between the manager and the subordinate. This has to be a two way process so that a mutual understanding of goals and success criteria is achieved. Step5: From time to time, manager reviews the performance of the subordinate or in other words review the progress of the work assigned. This step can be broken down into three sub-steps. First step is when the subordinate takes the initiative to talk with the manager about the opportunities, hurdles, achievements accomplished. Second step is when manager initiates a dialogue or meeting with the subordinate to discuss about the work plans for the future. In the last step, coaching and analysis usually takes place. Step6: All the documents related to goal setting, success criterion, priorities, rewards and due dates are forwarded to a senior management (Thomas G. Cummings C. G., 2005). PERFORMANCE APPRAISAL Discussing and reviewing the performance of an employee in context of the tasks and responsibilities assigned to him as part of his job. Appraisal is based on job performance rather than personal characteristics of an employee. It provides an employee with the chance of identifying areas that needs improvement and also directs as to what are the strengths to capitalize on and weaknesses to avoid (Lee, 2007). Process of performance appraisal: According to (Egan, 1995), the process of performance appraisal is as follows: Establishing standards: First and foremost step in performance appraisal process is to set standards based upon which actual and desired performance can be compared. For this purpose, the standards set should be simple, clear and measureable. Communicating standards: Standards set but not well communicated will be of no use. Thus it is essential that the employees must be communicated about the set standards so that they have a clear idea as to what is expected of them (Egan, 1995). Measuring actual performance: This stage in the process of performance appraisal is the most difficult because to quantify the level of actual performance is complex. Appropriate measurement tools must be selected so that the performance measured is objective and realistic (Egan, 1995). Comparing actual with preferred performance: This comparison is important so that deviation from preferred performance is quantif ied. If the actual performance is below the desired level, result is negative deviation (Egan, 1995). Discussing results: Upon comparing the actual with the preferred performance, the result of the comparison whether it is positive or negative is communicated to the employee. Employer also pays attention as to why this deviation is taking place. At this stage, pragmatic solutions are determined and evaluated with each employee individually (Egan, 1995). Decision making: At this stage, decision is made i.e. what needs to be done in order to improve the performance and what corrective actions need to be taken. Performance appraisal must be consistent, timely, precise and conventional to users, focused on important control points and economically realistic (Thomas G. Cummings C. G., 2005). REWARD SYSTEM: The importance of designing and implementing reward systems in organization is increasing at a rapid pace. It is a matter of common observation that when employee performs a good job, they expect to receive some kind of reward in turn. Thus reward system of any organization plays an important role in motivating employees towards performance (Thomas G. Cummings C. G., 2005).Following are some of the reward systems: Job Based: According to this system, pay structure is designed in which salary schedules are determined according to the position range based upon responsibilities and tasks assigned. This system minimizes the likelihood of probable biased pay practices (Kokemuller, 2007). Performance Based: It is important for this kind of system to be successful, performance must be linked with the rewards that individuals receive such as for good performances salary may increase, a bonus may be rewarded (Thomas J. Atchison, 2010). Skill and Knowledge-Based Pay System: Accordin g to this system, employees must be rewarded according to the knowledge, skills and abilities that they possess often called skills inventory. As employees are paid on this basis, it results in increased motivation, improved productivity, lower absenteeism and turnover (Paren, 1994). Gain Sharing Systems: This is a form of remuneration. It offers a good deal for both employer as well as employee. Since employer are willing to negotiate deals in terms of improved performance and employees are willing to negotiate deals in terms of fair returns for their efforts (Bowey, 2008). Promotion Systems: This system enables employees to grow their position and acquire higher-status positions in the organization. Nowadays, open job posting has become a norm and enables employees who believe in their abilities to suggest their names (Thomas G. Cummings C. G., 2005). GUIDELINES FOR IMPROVING PERFORMANCE MANAGEMENT SYSTEM: At times the best considered performance management system is subject to collapse if it is improperly managed. Fraser has provided a number of guidelines for improving the performance management system and is as follows: An article for the purpose of internal affairs such as an internal manual should be produced that explains the PM system and must be done on consistent basis. The employees must have a clear idea as to how PM system works and must be able to understand its connection with their individual performance. In order to bring in efficiency and to avoid potential biases, senior management should be trained in this regard. Good performance should be recorded in a formal document and be rewarded accordingly. On the other hand, poor performance should be recorded and opportunities to improve must be offered alongside monitoring whether improved performance is evident or not. Key performance indicators should be developed that are simple and clear to the employe es. Most importantly, organizations should avoid developing too many key performance indicators otherwise the focus on important issues can be abstracted (Fraser, 2007). CONCLUSION With reference to the above mentioned sources, we can conclude that the integrated process of performance management aims to identify, assess and strengthen employee work behaviors and outcomes. Involvement of the employees of the organization is crucial to make the performance management system a success. Goal setting, performance appraisal and reward systems form part of the performance management system. Organizations who dont emphasize on the effectiveness of performance management system fails to understand the importance of employee involvement and all those benefits resulting for the employer as well as for the employee. For a company to be a success in the long run, a well designed and implemented performance management system should exist in the organization.

Tuesday, December 17, 2019

Kurt Vonneguts Tragic Path to Success - 1128 Words

Kurt Vonnegut, was born on November 11, 1922 in Indianapolis, Indiana, to American-German parents Kurt Vonnegut (Sr.), and Edith Vonnegut. Vonnegut had an older brother, Bernard and an older sister, Alice. Vonnegut graduated from Shortridge High School in Indianapolis in 1940 and went to Cornell University later that fall. Though he majored in chemistry, he was Assistant Managing Editor and Associate Editor of the Cornell newspaper. While at Cornell, Vonnegut enlisted in the United States Army. The Army then transferred him to the Carnegie Institute of Technology and finally the University of Tennessee to study mechanical engineering. On Mothers Day in 1944, while on leave during WWII, he found out that his mother had committed suicide with sleeping pills. Later in 1984, Vonnegut would also attempt suicide by pills and alcohol and fail. On December 14, 1944, Vonnegut would be captured in the Battle of the Bulge by German soldiers. He was held as a prisoner of war in Dresden, a German city with no major industries or military presence. The bombing of Dresden was unexpected and Vonnegut and the other Prisoners of War were the only survivors after they escaped. They waited out the bombing in a meat cellar deep under the house where they were keep. Vonnegut was taken back to the U.S in May 1945 and afterwards married Jane Marie Cox. He studied anthropology, the study of humans, at the University of Chicago, but the department rejected his Masters thesis. According to theShow MoreRelatedWhat is The Meaning of Free Will in Life Essay1571 Words   |  7 Pages Free will is the idea in which individuals can have the power of acting without the constraint of necessity or fate, and this idea of free will served as a prevalent theme in Kurt Vonnegut’s Slaughterhouse-Five. Vonnegut illustrates the absurdity of no free will in Pilgrim’s world through the book’s nonlinear structure and unorganized plot. The novel is constructed as a series of inconsistent flashbacks and future incidents through the eyes of the protagonist, Billy Pilgrim. Billy Pilgrim is able

Monday, December 9, 2019

History of Muslim Civilisations and Ideas

Question: How limited are we in understanding the past. Discuss in relation to issues and examples arising from your readings about the sources? Answer: In general, there are two types of sources available with us to get information for the past. These two sources are broadly classified as primary and secondary sources. Primary sources also referred to as first-hand sources are the ones which are written during which the specific event must have taken place (Bowen, 1928). These primary sources can include original documents, creative works and relics or artefacts. Original documents can be dairies, speeches, manuscripts, interviews, film footage, autobiographies and also official records. Creative works can include poetry, drama, novels, music etc. Further, relics can include pottery, furniture, clothing and building. Alternatively, secondary sources are second-hand sources. These sources, basically interprets the primary sources and are not written or developed during the original events. However, secondary sources can have pictures, quotes and graphics from primary sources. Commonly used secondary sources to know about past can inc lude publications. By definition, publication is defined as developing literature, journals or information and making it available to general public. Publications can be developed in form of textbooks, magazine articles, encyclopaedia, histories etc (Frye, 1975). One of the critical questions that we usually face while referring to primary and secondary sources to know about past is whether the source is credible or not? It is hard to judge whether the source is trustworthy. In such cases, looking for potential evidences to prove that the sources are trustworthy becomes one of the urgent points. This essay is based on examining various sources available to know about the past of Islam. The easy discusses about what are the sources of understanding the history of Islam and how much can we trust them? For this, we will be talking about two types of sources; traditional and non traditional and criticise them in regards to their trustworthiness. Towards the end, the essay will come down to the fact that compared to other religions the history of Islam is very strong. But there are and will always will be uncertainties and doubts related to it. In general, different aspects of Islam have been derived from Quran and the Sunna. By definition, Sunna refers to the sayings and habits of Mohammed. Besides Quran and Sunna, other factors influencing political aspects of Islam are Muslim history and non-Islamic political movements. Earlier, political concepts of Islam comprised of Caliphs, Sharia and Shura (Wiley, 2004). By definition, Caliphs are defined as the representatives who were elected or selected successors of Prophets. On the other hand, Sharia was defined as the importance of following of Islamic law and Shura was defined as the duty of the rulers to seek consultation from subjects. The abolition of Caliphate in 1924 was a major turning point in the history of Islamic world politically. Muhammad played a crucial in the Islamic religion and was believed to be last prophet sent by God to mankind. Muslims believe that Muhammad unified Arabia in a once polity called Islam (Sicker, 2000). The views about Muhammad differ among Islamic and non-Islamic communities. It was believed that by Islamic communities that Muhammad restored the original monotheistic faith of prophets including Adam, Mosses etc. Alternatively, non-Islamic communities believed that Muhammad was the founder of Islam. Muhammad lost his parents at an early age and hence, brought up by his paternal uncle. He worked as a merchant after his childhood. It was reported that Muhammad would go to a cave and spent many days there alone and praying to god in her early 40s (Wiley, 2004). As believed by Islamic communities, he received his first revelation with god in the caves only. As a result, after three years of this event, he started preaching Muslims that God is one. According to his teachings, one should surrender himself to god if he/she wants to get God. His teachings influenced few people in Islam and hence, he gained few followers. He also met with hostility from some Arabian tribes and to get rid of it, Muhammad and his followers migra ted to Medina. This event is particularly referred to as Hijra. This event led to the formation of Islamic calendar called Hijri calendar (Hanne, 2007). Hence, Quran was formed by revelations of Muhammad that he gathered during his life. The death of Muhammad was a turning point in Islam. With his death, there was a chaos that who would be his successor. Many companions of Muhammad were excited to take over as his successor (Richard, 2009). Traditional Sources Historians usually adopt the concept of Historiography to gather information about the past. By definition, historiography refers to the study of early Islam from the death of Muhammad to disintegration of Rashidun Caliph in 661 AD. Islam, as per Quran is a monotheistic and Abrahamic religion. Quran is a holy book followed by Muslims and is composed of prophetic traditions of Muhammad (Muir, 2005). To know about the history of Islam, there are two kinds of sources used by researchers; traditional sources and non-traditional sources. Traditional sources used by researchers to know about the history of Islam are Quran and Sunnah of the prophet. Quran is an Islamic holy book, which Muslims believe to be a revelation of God. As per the beliefs of Muslims, Quran was revealed to Muhammad by God. Basically, Quran is Arabic word which means recitation. As believed, Quran was written during the life of Prophet Muhammad and was complied after his death. Quran is considered as one of the critic al sources about history of Islam. The holy book consists of 114 chapters (Surahs) and about 6000 versus. Broadly, the scripture comprises of economic, political, social and moral aspects of the Muslim world. Believed by many Muslim scholars that Quran is not a legal code entirely and it just teaches the kind of relationship that the man should have with God. Since Quran comprises of 6000 versus so these have been divided into three categories; science of speculative theology, rules of human conduct and ethical principles. There have been numerous judgements and opinions about the interpretation of Quran. The most authentic interpretation of versus are done by companions of Muhammad for Sunis and Imams of Shias (Muir, 2005). The reason is that they knew the exact time and place of the revelation of every versus. Besides the Muhammads companions, other important aid used to interpret the meaning of Quran is the Hadith. It is the collection of traditions of Islam from which details ab out the Islamic history can be derived. Then Shariah is the foundation of Islam which is derived from versus of Quran. Since Quran consists of a broad vision about the life of Muslims so interpretation of Quran plays a significant role. There have been numerous interpretations by researchers and Muslim thinkers. However, the authenticity of Quran is never doubtful since it is one of the critical sources to know about the history of Islam. There has been a great textual criticism linked with the Quran. Judaism and Christianity have been suffering from long-held questions about the origin of Bible. On the similar lines, many thinkers have also targeted Quran and claim that some parts of the holy book have been taken from stores of Tanakh. The differences in the versions of Quran and biblical texts reveal that some versus of Quran were not taken from texts rather has been part of oral traditions of Arab peninsula (Muir, 2005). However, this explanation appears weird to Muslims. The cri tics who have raised the issue of textual criticism against Quran have also sought to find text evolution in early Islam. However, the beliefs of Muslims in Quran entails that there are no inconsistencies and uncertainties in Quran. Hence, Quran is one of the important Islamic sources to know about the past of Muslim world. Besides Quran, other forms of traditional sources to know about history of Islam include Sunna (tradition of the Prophet), Qiyas or Analogy and Ijma or unanimous agreement (Muir, 2005). The Sunna or tradition of the Prophet The Sunna is one of the important traditional sources of Islamic law. Sunnah is an Arabic word that means Method in English. Sunnah, popularly known as the tradition of Prophet, was a term brought to life by the Prophet Muhammad as a legitimate word to depict what he believed, did and permitted. The Sunna or tradition of the Prophet includes the words, mottos, conducts, known practices, assertions of the Prophet. All the words, as well as, actions of the Prophet were carefully recorded and maintained a Hadith (Muir, 2005). Numerous records of traditions were assembled by the confidants of the Prophet which were then amalgamated with the pools if Hadith of Muslim, Bokhari, etc. The collectors of the Hadith (traditions) implemented a very scientific approach of collecting them. All the traditions they recorded were accompanied with a chain of narrators, back to the Prophet or in some cases Companion of the Prophet. The Sunna is a trusted and reliable set of traditions. The Sunnah and Q uran are interdependent. The Sunnah, mainly, explains the Quran in detail. Qiyas or Analogy Qiyas is another important source of Islamic Law. The literal meaning of qiyas is gauging the length, size, weight or quality of something. However, according to the principles of Islamic jurisprudence, Qiyas is simply the reasoning by applying the process of deductive analogy. It is a process of deducing a rule for a new issue that has similar aim or motive (Illah) to an already existing rule. In this process, the motive of a known role is compared to that of the new issue, and if both are more or less, the Qiyas can be executed. However, the use of reasoning using deductive analogy among scholars was always wide ranging. While some proponents like Spains Ibn Hazm opposed the use of qiyas, others like Imam Abu Hanifa made wide use of them. Ijma or unanimous agreement Ijma, another significant source of Islamic Law, entails a unanimous or undisputed agreement of a group of jury members of same age on a specific issue. It is the fourth and final source of law according to Shafiis practices. In cases where issues or questions of Quranic clarification stood up and there existed no elucidation on them in either Quran or Sunna, jurists or an exclusive panel of proponents of Islam applied their own reasoning (ijtihaj) to come to a conclusion or an understanding. Different people perceive things differently. In the similar way, intellectual elite always had varied thoughts and so unanimous agreement hardly ever happened. Hence, the meaning of ijma and which ijma should be considered effective, as well as, useful was always a well debated issue (Richard, 2000). The Muslim society believed that it needs a rule making power to come across the practical issues and problems for the execution of Islamic Law and so ijma found its existence. Ijma or the unanimou s agreement is thought of as an adequate evidence for action as the Prophet of Islam believed that Muslim could never approve of a wrong matter or deed. These are some of the traditional sources used to know about the history of Islam. The traditions of Prophet have always been questioned due to their validity and authenticity. There were also debates on the issue that on what extend were the traditions religiously imperative. These sources let us know that followers and scholars of Islam believe that Islam has been present since the time of prophet, Adam. However, some literatures mention that Islam came into being in Mecca and Medina. The evolution of Islam state and Muslim state of government went through several stages. Various periods of evolution of Islam state and Muslim state of government comprise of City-state period, Imperial period and Universal period. The City-state period was from 620 to 630. Imperial period lasted from 630 to 750s (Frye, 1975). Finally, Universal period lasted from 750s to 900s. These three periods evolution of Islam state was followed by Decentralization and Fragmentation Period. The Decentralization period was from late 900s to early 1500s whereas the Fragmentation period was from late 1500s to late 1910s. These were followed by the Contemporary period which extends from late 1910s to twenty first century. Historically, the popular prophets in the Islam world comprise of Adam, Moses, Noah, Abraham and Jesus. As a result, the Muslim community has expanded rapidly (Hanne, 2007). The turning point in the Islamic world was the death of Mohammed. This event led to the expansion of Islamic community from Spain to Indus. During the golden age of Islam, the religion gave rise to many centres engaged in culture and science and led to rise of numerous doctors, philosophers, astronomers, mathematicians etc. As a result, there were technological advancements in the Islamic field and more number of people started reading Quran and it rapidly increased the rate of literacy in the field. In 18th and 19th century, regions of Islam feel under the political invasion of European Great Powers (Muir, 2005). Islamic community were also got affected by socialism and secularism. By definition, socialism refers to a political and economic theory, according to which, means of production, distribution and exchange needs to be owned and regulated by an organisation as a whole. On the other hand, secularism is defined as the principle of separation of government and followers that are authorised to represent the state from religious institutions and dignitaries. In spite of being influenced by the theories of socialism and secularism, the Islamic community dominated the political environment in early 20th century. This was the history and origin of Islamic community (Smith, 2002). Non-traditional Sources Second types of sources available to know about the history of Islam are non-traditional or secondary sources. These sources are not developed during past rather have been created using traditional sources of Islam only such as interpretation of Quran, Sunna, Qiyas and Ijmas. There can be numerous questions raised about the authenticity of the secondary source. A researcher can find it difficult to judge if the book or magazine developed using the interpretations of Quran is authentic or not. Non-traditional sources available to know about the history of Islam usually provide analysis, commentary and interpretation (Smith, 2002). High quality non-traditional sources available to retrieve data about the past of Islam are referred from multiple sources rather than one single primary source. Many Muslim and non-Muslim scholars have written about historical events, ideas and people of past Muslim world by taking references from first-hand sources. The authenticity of the sources plays a big role. It is often questioned that how do we know, what we know. Millions of Muslims across world believe that texts provided in the collection of hadith provide authentic words. Hence, the advocates of Muslim sources have come up with a criterion to prove that traditional sources used to know past of Islam are authentic. It is believed that narrators of the traditional sources had been alive some fourteen centuries ago so critics can determine, were they check by contemporaries of their times, by hadith scholars or who? But many scholars argue that it is an unreliable and non-acceptable way to check the authenticity of the sources (Smith, 2002). Considering the traditional and non-traditional sources, it is believed that history of Islam is stronger than other religions. In spite of the textual criticisms that both traditional and non-traditional sources of history of Islam receive from critics and thinkers, these are considered as best sources to know about the history and civilisations of Islam (Wiley, 2004). The sources state that the fundamental concept of Islam is to believe in one God. As per the Islamic sources, Muslims are not required to visualize god but to adore him and worship him like a protector. The sources reveal that although every religion has followers and doubters, pious and pragmatists but Islamic history is one of the stronger histories as Muslims are more committed to their religion than others. As per a poll conducted by a British company in December 2014, it is observed that history of Islam tends to motivate Muslims more than histories of any other religion (Sicker, 2000). However, there have been c onsistent uncertainties and doubts regarding this. References Bowen, H. (1928). The Life and Times of Ê ¿Al Ibn Ê ¿s: The Good Vizier., Cambridge University Press. pp. 385. Frye, N. (1975). The Cambridge History of Iran., Volume Four: From the Arab Invasion to the Saljuqs. Hanne, E. (2007). Putting the Caliph in His Place: Power, Authority, and the Late Abbasid Caliphate., Fairleigh Dickinson Univ Press. pp. 55. Muir, W. (2005). The Caliphate: Its Rise, Decline, and Fall., Management Press, pp. 256 Smith, J. (2002) The Oxford History of the Crusades., Oxford University Press, pp. 213. Wiley, M. (2004). Donald Sidney Richards, The chronicle of Ibn al-AthÄ «r for the crusading period from al-KÄ mil fÄ «'l-ta'rÄ «kh., University Press, pp. 254 Sicker, M. (2000). The Islamic World in Ascendancy: From the Arab Conquests to the Siege of Vienna., Greenwood Publishing Group. Richard, J. (2009). The Latin kingdom of Jerusalem., Volume 1. 1979. Page 36.

Monday, December 2, 2019

Hitler Good leader Compared to Odysseus Essay Example

Hitler Good leader Compared to Odysseus Paper The Odyssey Was Hitler a good leader? He was a good leader; Hitler was well spoken, very charismatic and very persuasive. He had a way to get others to follow and believe in his visions and beliefs. 1. He is both a good leader and hero. Hero he never backed down from a fight, he left Ithaca not knowing he will return. He is a leader because he is fearless, cautious and sneaky. Fearless in any obstacle he has to face, he has everything he has against monsters, gods. He fought Circe when she turned his men into pigs, and facing all those suitors that try and take his place as king. We will write a custom essay sample on Hitler Good leader Compared to Odysseus specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Hitler Good leader Compared to Odysseus specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Hitler Good leader Compared to Odysseus specifically for you FOR ONLY $16.38 $13.9/page Hire Writer As he approaches obstacles, he always finds a solution. As he approaches the Sirens, he orders his men to put beeswax in their ears to prevent them from crashing their ships due to their beautiful and enchanting songs. Without Odysseus cautiousness, his crew would have risk everyones lives by going into dangerous situations. A hero is someone who does something courageous or valiant, anyone can be a hero. A leader is someone who can easily take control of a situation and direct, take charge of people, or motivate people; only a select few people are truly natural leaders. Not all heroes are leaders, some in situations think of themselves and not the big picture. Most leaders can be heroes, it takes a lot of courage to take upon a responsibility and carry that throughout. Like Odysseus he was both a hero and a leader. He saved his men multiple times making him a hero and he was a great leader in which everyone respected him for. When trapped in the cave of Polymers Odysseus acts like a leader coming up with a brilliant plan that help his men escape, making him a hero in the end. Leaders need to have certain attributions such as Honesty- Leaders have o be honest, those under your charge must trust you, and if they do not then they will not follow. Responsibility- Making decisions and living up to the consequences. Good leaders do not blame others for what they have done, they deal with the situation. Confidence- Believing in one self is important for a leader because if you do not and others see they will not trust or follow. Enthusiasm-Having energy and emphasizing the importance of what you mean. If you cannot get a crowd to move or get their attention then no one will listen or follow. Reliability- Being a leader people kook for you to be the back support of a group. They rely on you to get them to the situation. Patience- Needed in order to be able to explain, teach, and demonstrate the charges or simple things to anyone. Determination- See tasks through to the bitter end, and keeps your charges motivated to continue. Loyalty- Being committed to whatever you believe and making people have the faith in you. Courage- As a leader, you must have courage in order to be decisive. You cant be afraid of failure, or else you will not be able to function as a leader. Have the courage to stick to your invocations or go with a gut instinct. Dont be afraid to try a new approach. Cyclops, you ask my honorable name? Remember the gift you promised me, I shall tell you. My name is Nobody: mother, father, and friends, everyone calls me Nobody (9. 395-398) Steer wide; keep well to seaward; plug your oarsmans ear with beeswax kneaded soft; none of the rest should hear that song (12. 57-60). Mimi took my house to still alive. Contempt was all you had for the gods who rule wide heaven, contempt for what men say of you hereafter. Your last hour has come. You die in blood (12. 38-43).

Wednesday, November 27, 2019

3 Comma Splices and How to Repair Them

3 Comma Splices and How to Repair Them 3 Comma Splices and How to Repair Them 3 Comma Splices and How to Repair Them By Mark Nichol A comma often serves to link two independent clauses, but it does so in partnership with a conjunction (as shown in this sentence). When a pair of independent clauses butt up against each other with a comma but no conjunction, the grammatical infraction is known as a comma splice- the name refers to the writer’s effort to splice the clauses together with a comma, which is the wrong use of the tool. Which tool is the correct one? Several are available in your writer’s toolbox: The semicolon (a supercomma of sorts) is usually the best choice, but depending on the interrelationship of the clauses, you could, alternatively, employ a period (creating two distinct sentences) or even a dash (showing an abrupt break in thought). Here are three sentences containing a comma splice and their revisions. 1. â€Å"You can sense the frustration, their morale is down,† Smith said of his colleagues. â€Å"‘You can sense the frustration; their morale is down,’ Smith said of his colleagues† is the technically correct solution, but a semicolon is overly formal for a quotation. In this case, use the more casual dash: â€Å"‘You can sense the frustration- their morale is down,’ Smith said of his colleagues.† Another option is to break the statement into two sentences; but insert the attribution between them: â€Å"‘You can sense the frustration,’ Smith said of his colleagues. ‘Their morale is down.’† (Do not use a semicolon or a dash after an attribution.) 2. The devices themselves don’t use logarithms, rather they are tools to reduce multiplication and division of natural numbers to simple addition and subtraction operations. A transitional word such as rather between two independent clauses is a clear signal that a stronger punctuation mark than a comma is required, because one should follow the word, and a stronger punctuation mark should set the clauses off from each other. A semicolon will suffice: â€Å"The devices themselves don’t use logarithms; rather, they are tools to reduce multiplication and division of natural numbers to simple addition and subtraction operations.† (Rather can also begin a separate sentence, but the second clause is so closely related to the first that a semicolon seems more suitable.) 3. The frame was finished two years later- a little behind schedule, the structure was supposed to open in 1989. The inclusion of a dash in this sentence complicates it, because it introduces confusion about which phrase deserves the most emphasis. A simple solution is to demote the â€Å"Hey, look at me!† dash to a more workmanlike comma and use a semicolon to tack on the final phrase as an independent clause: â€Å"The frame was finished two years later, a little behind schedule; the structure was supposed to open in 1989.† One could use a dash in place of the semicolon, but the information that follows isn’t surprising enough to merit the attention-seeking punctuation mark. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Punctuation category, check our popular posts, or choose a related post below:50 Synonyms for â€Å"Leader†Proved vs. Proven20 Movies Based on Shakespeare Plays

Saturday, November 23, 2019

Definition of Work in Physics

Definition of Work in Physics In  physics, work is defined as a  force  causing the movement- or displacement- of an object. In the case of a constant force, work is the scalar product of the force acting on an object and the displacement caused by that force. Though both force and displacement are vector quantities, work has no direction due to the nature of a scalar product (or dot product) in vector mathematics. This definition is consistent with the proper definition because a constant force integrates to merely the product of the force and distance. Read on to learn some real-life examples of work as well as how to calculate the amount of work being performed. Examples of Work There are many examples of work in everyday life.  The Physics Classroom  notes a few: a horse pulling a plow through the field; a father pushing a grocery cart down the aisle of a grocery store; a student lifting a backpack full of books upon her shoulder; a weightlifter lifting a barbell above his head; and an Olympian launching the shot-put. In general, for work to occur, a  force has to be exerted on an object causing it to move. So, a frustrated person pushing against a wall, only to exhaust himself, is not doing any work because the wall does not move. But, a book falling off a table and hitting the ground would be considered work, at least in terms of physics, because a force (gravity) acts on the book causing it to be displaced in a downward direction. Whats Not Work Interestingly, a waiter carrying a tray high above his head, supported by one arm, as he walks at a steady pace across a room, might think hes working hard. (He might even be perspiring.) But, by definition, he is not doing  any  work. True, the waiter is using force to push the tray above his head, and also true, the tray is moving across the room as the waiter walks. But, the force- the waiters lifting of the tray- does not cause the tray to move. To cause a displacement, there must be a component of force in the direction of the displacement, notes The Physics Classroom. Calculating Work The basic calculation of work is actually quite simple: W Fd Here, W stands for work, F is the force, and d represents displacement (or the distance the object travels).  Physics for Kids  gives this example problem: A baseball player throws a ball with a force of 10 Newtons. The ball travels 20 meters. What is the total work? To solve it, you first need to know that a Newton is  defined as the force necessary to provide a mass of 1  kilogram (2.2 pounds)  with an acceleration of 1  meter (1.1 yards) per second. A Newton  is generally abbreviated as N. So, use the formula: W Fd Thus: W 10 N * 20 meters (where the symbol * represents times) So: Work 200 joules A  joule,  a term used in physics, is equal to the  kinetic energy  of 1 kilogram moving  at 1 meter per second.

Thursday, November 21, 2019

Public Law Thesis Example | Topics and Well Written Essays - 1000 words

Public Law - Thesis Example Public law is further divided into different sub-categories to include constitutional law, criminal law, and administrative law. The public law in the United States is greatly influenced by the English law, called the â€Å"common law.† The common law has its roots in England where it is the legal tradition. This law evolved in England starting from the 11th Century. It is also the basis of private law of different countries, including Ireland, Wales, and the United States, with an exception of the state of Louisiana, whose state law is based on civil law (Carper McKinsey & West, 2008). The common law and civil law have different histories. The common law came into existence in 1066 because of the unification of the customs of the Norman conquerors and the older Saxon law. The civil law however, has a longer history than that of the common law and traces its roots from the Romans. The spread and adoption of these law systems in other world countries was mainly influenced by colonization and conquests. Nonetheless, the core distinction between these two legal systems lies in their structure, history, and legislation. While the common law system lacks a clear comprehensible structure, the civil law system puts more emphasis on the organization and clarity of its structure (Allen, 2010). Law in society is made up of a variety of rules, which are enforced by law courts, and play the role of government regulation, as well as the control of relationships between the state and its citizens, and between the citizens themselves. Public law and private law is a crucial categorization of the law, as these primarily address different relationships in a country, which are paramount in ensuring stability. As noted earlier, public law regulates the relationships between a country and its citizens. This law is further divided into the constitutional law, the administrative law, and the criminal law. These are enacted by the Congress, and enforced by a

Tuesday, November 19, 2019

Marketing Plan for Saigontourist travel services Coursework

Marketing Plan for Saigontourist travel services - Coursework Example The "Marketing plan Saigontourist Travel Services" describes the way in which the service quality of the tourism industry will improve. Saigontourist is a renowned organisation which is observed to deliver continuous concentration over research and development initiatives in order to introduce innovative tour packages for its customers at frequent periodic intervals. It is worth mentioning that this might be considered as a major strength of the company which can facilitate the organisation to sustain in this fiercely competitive era of globalisation in the tourism industry. For this reason, it can introduce a travelling trip named ‘Cosy Viet’, including outstanding quality of services along with experienced consultants for its customers with the intention to provide them with highly satisfactory experience of travelling to all the implausible regions of Vietnam. It is in this context that the core product in terms of ‘Cosy Viet’ and similar other tour packa ges might assist Saigontourist to attain a higher level of customers’ satisfaction resulting in the overall augmentation of its profitability and its efficiency in relation to customer relationship management. Saigontourist is a state-owned travelling enterprise which desires to attain the largest section of market share in the tourism industry of Vietnam. Therefore, the organisation has been observed to deliberately attempt towards enhancing its brand image by improving its eminence and characteristics of services offered to the target groups. 3. Moreover, the introduction of ‘Cosy Viet’ is also expected to enhance the brand equity of Saigontourist resulting in the overall improvement of its prosperity. Based on this aspect, Saigontourist can also offer the facility of a knowledge tour guide in order to offer value added services at an efficient cost to its customers. This might significantly help the customers of ‘Cosy Viet’ to attain an overall view about the culture, beauty, nature and history of Vietnam and its neighbouring areas such as Dalat-Nha Trang, Da Nang-Hue and others. This in turn is most likely to facilitate in enhancing the dependency and satisfaction level of the customers further resulting in the ascendancy of Saigontourist4. In ‘Cosy Viet’ package, the consumers can also be rendered with extra facilities namely couple passes for luxury cruise day outs, old war site touring packages, river cruising tours and trips for Indochina. Moreover, varied types of insurances c an also be offered at a reasonable cost, in order to enhance customer gratification. Hence, it might facilitate Saigontourist to augment its brand value in the long run5. Price Pricing is the second most important aspect of marketing mix. In order to enhance the corporate image of Saigontourist, it shall be highly beneficial for the organisation to follow value-based pricing techniques, at the introduction stage of its new product, i.e. ‘

Sunday, November 17, 2019

Resistance of a Wire Essay Example for Free

Resistance of a Wire Essay Will changing the length and type of wire affect the resistance? What is my aim of this project: To set up an electric circuit to measure the resistance of the wire. What are my Variables:   Nichrome coil What is resistance? Resistance is measured in (OHMS). It is the hindrance to the flow of charge. Why did we get resistance? An electric current flows when electrons move through a conductor. The electrons that are moving can collide with the atoms of the conductor. This then means that it is more difficult for the current to flow, which causes resistance. On the other hand, electrons have a collision with atoms more often in a longer wire than they do in a short one, however, a thin wire has fewer electrons to carry the current than a thick wire. In a thin wire there is less space, but more resistance and in a long wire there is more space, yet less resistance. The flow of electrons: Hypothesis: Before I do my experiment I predict that the resistance in the wire will increase as the length of the wire increases. I also predict that if the resistance in the wire increases, then the thickness of the wire will decrease. My diagram of my circuit: For my first investigation task I will be doing a preliminary test to find out which are the best wires to use for my investigation. This task was completed and threw my results I realised that using the Nichrome would be better for my investigation. This is what was done before the main experiment. Preliminary test: Length Apparatus Test1 Test2 Test3 Test4 Average Resistance 10cm Ammeter   The graph shows that the data is positive.  From observing this graph above I can see that my data is close fitted along my line of best fit and that the data increases a lot, showing that this is a . as well as this there is s apiece of anomaly data, which is my outlier, circled in black. For my experiment, I will be taking account the differences in resistance between the different lengths of Nichrome wires. This will be tested against copper which, has a low resistance and high current and is thinner than the Nichrome wire that has high resistance and low current. Method. In order for me to complete my investigation, I will need to gather the equipment listed above and set up my electric circuit. This will be done by the use of connecting my wires to the volt meter and ammeter and then attaching crocodile clips on each ends of the wires. It is necessary for the wires to be in this position, as the crocodile clips play an important role in griping the coil firmly whilst the investigation takes place. After doing this I will cut the chosen coil to the measurement I desire. These measurements will be of 10cm, 20cm, 30cm, 40cm and 50cm. With these different measurements, I will attach the coil to the circuit to make it complete. Then, I will turn on the power pack and take down the readings from the voltmeter and ammeter, reading off the voltage and current. From these readings, I will calculate the resistance and average. My results from my readings will be presented in a table. With this experiment, I will keep all the equipment the same however my variables will be the type of wire, the length and the thickness. Repeating my test makes my investigation more reliable. Temperature is a factor that affects the resistance. For each reading I take I will switch off the power pack between each test, making my investigation much more reliable. Below are my table results for Nichrome wire Test (1) The wires length (cm) Voltage (V) Current (A) Resistance (? ) Below is my graph on my results From my line graph I created, I can see that my readings from each test were very alike for each time the experiment was being done. From looking at my results in the graph, there were no outliers. However, it also shows that my hypothesis predicted was correct, because the longer the wire was the more resistance there was it had a low current and a high resistance. Evaluation: I think my investigation worked well against my method and my hypothesis. I was able to complete my aim of this investigation, which enabled me to take down my readings of the current and voltage easily. I found the circuit easy to manipulate with no obstructions, which enabled me to record my results accurately for the resistance of the different lengths of wires. If I had the chance to re-do this project, I would have used a smaller current, because then I wouldnt affect the wires temperature in heating. This would then mean that it wouldnt affect the resistance of the wire being tested. As well as this I would use longer measurements of wire instead of just testing up to 50cm and test more different types of wires. Lastly, I feel that my experiment went well, which achieved its aim. Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Electricity and Magnetism section.

Thursday, November 14, 2019

A Primitive Civilization In A Failed Utopia Essay -- essays papers

A Primitive Civilization In A Failed Utopia Symbolism can be used to represent many aspects of a person place or thing. Throughout the novel the boys lose all symbols that represent there civilization such as there clothes and uniforms. In this novel symbolism is used to show how the boys change their outlook on their primitive society and rules. They are used in the novel Lord of the Flies to show the deterioration and destruction of the boys society and rules. The conch, the glasses and the masks all have a greater meaning in the novel. The conch is used throughout the novel Lord of the Flies to symbolize law and order of the adult world which the boys try to recreate. "The conch. I got the right to speak." (p 45,Piggy) this was a rule made by the boys to keep order. " The conch exploded into a thousand white fragments and ceased to exist" (p200, narrator). Near the end of the novel jack and his group go against the rules and once the conch is broken there is no hope for recovery. "There isn't a tribe for you anymore! The conch is gone."(p201, Jack), and Ralph lose...

Tuesday, November 12, 2019

Nature and Materialism in Walden

Henry David Thoreau, an American author, lived alone in a small cabin which he himself built on the banks of Walden Pond near Concord, Massachusetts   for two years and two months starting in July 4, 1845. He gave an interesting account of this experience and experiment in living alone in a place close to nature and away from civilization in his book entitled Walden published in 1854. I especially liked Thoreau’s philosophical ideas and reflections that he learned while living in Walden. His experiences in living in Walden Pond encourages people to slow down and reflect on the kind of life that they are living whether they are supposedly living the kind of life that was meant to be. According to Miller, â€Å"He [Thoreau] endeavored to find the foundation for a more simple, honest, and pure life which he contrasted to the lives of â€Å"quiet desperation† led by most of his contemporaries† (Miller 1995). In relating his experiences, Thoreau also used wit and humor so that he made life away from civilization an interesting idea. What I do not like is that Thoreau can be extreme in his advocacy for simplicity. For example, he believed that â€Å"water is the only drink for a wise man; wine is not a noble liquor; and think of dashing the hopes of a morning with a cup of warm coffee, or of an evening with a dish of tea!† (Thoreau 182).   I do not agree that moderate drinking of tea and coffee is harmful to man. Throughout the book, Thoreau praised the life living in simplicity close to nature. For him life with nature is like living life in innocence. Every morning with nature, he felt renewed as he was far from noise and disturbance. In the cabin, he felt remote from the life that he had left behind with civilization and in so doing, he had the time to think about life in its purer form, to have an effective intellectual exertion. I do agree with Thoreau that nature had its positive effect of renewing the inner spirit of man for in their presence one felt relaxed and calm. Life away from nature can be very stressful and demanding and with time, one no longer knew what was important about living. Modern civilization in particular can be very stressful as more emphasis is put on the acquisition of material wealth. One is caught in the never-ending web of earning money as much as he can to live a supposed comfortable life so that he had no time to stop and smell the flowers. Yet the truth in most cases is that oftentimes modern man would not be able to enjoy what he worked so hard for either because he had no   time to do so or that he got sick for working too hard so that his money was spend in medical expenses ( Medical Science News 2005). According to Thoreau â€Å"Most of the luxuries, and many of the so-called comforts of life, are not only not indispensable, but positive hindrances to the elevation of mankind (Thoreau 10)†. I totally agree in this judgment because I have noticed that some of the inventions of modern man only deprived him of the exercise that he needs for healthy living. For example in cleaning the house he had floor polisher that replaced manual floor scrubbing so that in return he sweats less than he used to. Also, man had used the luxury of cars at his disadvantage for even in a short distance he will not take a walk. No wonder Thoreau had concluded, â€Å"the nation itself †¦ its so-called internal improvements, which, by the way, are all external and superficial†¦ is cluttered by furniture and tripped by its own traps †¦ (Thoreau 75)†. In my life, these ideas had largely opened my eyes to the reality that I do not have to compete for the acquisition of wealth for in so doing I may fail to really live. I believe now that many people who only spend their whole lifetime gaining possessions never actually lived after all. Their bodies and minds are like machines that are employed to acquire many of the supposed luxuries of life. For me, to avoid such a mistake, I must see to it that I spend sometime with nature in order to reflect and to be renewed. Thoreau’s Walden therefore revealed to man the need for simple living and to be close to nature and avoid the extreme need to acquire life’s luxuries. In order to really live and enjoy life man needs time to relax, to be calm, to reflect and be renewed by nature. Works Cited Medical Science News. Garvan scientists explain stress and sickness. Canadian Online Pharmacy. December 2005. Accessed April 7, 2008 < http://www.news-medical.net/?id=14885> Miller, Jakob. Two Truths in Thoreau's Inconclusive â€Å"Conclusion.   Hanover College Department of History. 1995. Accessed April 7, 2008 from Thoreau, Henry David. Walden. New York: Holt, Rinehart, and Winston, 1966.               

Sunday, November 10, 2019

Learning from Mistake, Agree or Disagree

I don't like to make mistake. Everything to me has to be perfect because I felt that if one person made a mistake the first time, how they would be able to do anything. That is why learning from mistake is impossible to me. When you make mistake and try to learn something from your mistake, you will waste lots of things, ruin the way that people look about you. In addition, learning from mistakes will make you regret much. First of all, learning from our mistakes will waste you lots of things. You will waste your time because you have to do again everything that you did in the wrong way.It seems too hard to start something again which is done one time already. By doing again, you will feel bored and tired. Not only doing it over, but also, you have to find where you did it wrong and give yourself a lesson in order to prevent from making that mistake once more. Studying in this school is an example. If you failed, you had to spend 16 weeks in fall or spring semester and 8 weeks in sum mer semester. You have to study again. In addition, learning from your mistake will waste your money. Failing in this school is an instance.You have to spend lots of money on the subject that you failed to study again. Spending 75 US dollar for each subject in ELS program and 150 US dollar for each subject in AAS program is the result. In learning, you always have many chances to fix your mistake but how about in working, will you have any opportunity? In reality, the real world, you will not have second chance. Especially, in the business world, where everything is a competition, you do not have the time to learn from mistakes. So, you are forced to do everything completely.Even though you can learn from your mistakes, you do not have chance to fix them. It means that you will be going to end up your career. That is the reason why I don't like to learn from my mistakes. Secondly, in daily life, learning from mistakes will ruin the way that your friends and family look or feel about you. Everyone will look at you with a strange way if you learn from your mistakes. In addition, they will laugh at you as a silly person. Even though you learn from mistakes, they will make you feel uncomfortable. My cousin is as an illustration.She failed high school exam. She said to me that her old friends looked at her with their curious eyes; her neighbor and her relative always annoyed her with their questions. She seemly lost her hope though she had a lesson from her mistakes and knew how to overcome this hard situation. In life, learning from your mistakes will affect your job and your ability to success. When you work in a company and you always say that I have lots of experience from my mistakes. Then, you continue making mistakes. What will your boss and you co-worker think about your ability?Of course, they will suspect your capability. In addition, does the company want to hire employees that always make mistake and say that they learn a lot from their mistakes? In my point of view, people do not care about if you learn from your mistakes or not. They just look at your mistake because caring about your learning from mistakes dose not bring any benefits to them. In a company, the boss just wants to have perfect employees- hard working and aâ‚ ¬? no-mistakeaâ‚ ¬? employees. More over, your boss may think that if he allows employees to make mistakes, how will they ever learn?They will just keep on making even more mistakes. Further more, when you learn from your mistakes, people who do not like you will know where you are weak. It will be easy for them to let you down. They can seize your status in your company. Everything that you have will not belong to you any more. It belongs to people who want to harm you. So, learning from your mistakes will deteriorate yourself and bring disadvantages to your life. Thirdly, learning from mistakes will make you regret much. You may think that you do not willing to do any things that you face.You have not enough experience to overcome your challenges. Further more, you will be diffident when you face some hard situations. So, you do not concern much about what you are doing. Students who learn from their mistakes will be discouraged because they used to not to pay more attention to their study. They do not prepare any things for their future. In addition, felling ashamed and giving up their goal is the affect of learning from mistakes. The more complicated mistakes they learn, the more shameful they feel. To me, if I do something, you I will do it for a reason and I will not regret.I find that regretting is a bad way. If you know results that will not good for you, why donaâ‚ ¬Ã¢â€ž ¢t you try to prevent that? To me, I before doing something will always attempt to think about what Iaâ‚ ¬Ã¢â€ž ¢m going to do first. In addition, I usually consider about the result of doing something. I ask myself that if doing some things will bring benefit to me or not. So, I may choose the way that will not make me regret. Right now, we are living in an achievement and success oriented world. So, a popular rule is whenever you do anything, try to do it right.That is why, to me, learning from mistakes is something unacceptable. In conclusion, I do not like learning from mistakes. Everybody can reduce as much mistake as possible. By preparing yourself and hard working, I believe that you can overcome everything in your life. In addition, do not think about learning from your mistakes because it just brings disadvantages to your life. It not only makes you spend lots of things, but also lays down the way that your relative look at you and makes you regret much. Hopefully, you will be strong and confident to overcome every hard situation.

Thursday, November 7, 2019

29 Memorable Quotes From Elf

29 Memorable Quotes From 'Elf' Since it was released in 2003, the movie Elf  has become a Christmas classic. Directed by Jon Favreau and written by  David Berenbaum, the film tells the story of Buddy (Will Ferrell), an orphan who is adopted and raised by elves at the North Pole. Believing himself to be an elf, Buddy begins to encounter trouble as he gets older and becomes too large to use the toy-making machines. He eventually learns that he is human and sets out for New York City in search of his birth father. Of course, hilarity ensues as Buddys childlike innocence meets the cynicism of the big city. Elf was a box-office hit, winning praise from critics and audiences for its quotable lines and Ferrells high-energy performance. Its refreshing take on innocence, goodness, and Christmas cheer still resonates with audiences. The quotes below include Buddys most famous lines. Swirly Twirly Gumdrops Buddys journey from the North Pole to Manhattan is one of the most famous scenes in Elf.  The sequence places live-action Ferrell within the stop-motion animated world of the classic  Rankin/Bass Christmas specials. Buddys description of his trip is one of the most famous quotes in the movie: I passed through the seven levels of the candy cane forest, through the sea of swirly-twirly gum drops, and then I walked through the Lincoln Tunnel. Encountering the Human World Much of the comedy  comes from the contrast between Buddys boundless cheer and the gritty realities of New York. Buddy has no experience in the human world. All he knows are ice skating and reindeer, candy canes and toys. Hes not prepared for the Big Apple. [On seeing a sign that says  Worlds Best Cup of Coffee]  You did it! Congratulations! Worlds best cup of coffee! Great job, everybody! Its great to be here. Good news! I saw a dog today! Im a  cotton-headed ninny-muggins. [To a doctor  performing  a paternity test] Can I listen to your necklace? [To a man on the elevator] Oh, I forgot to give you a hug. Its just nice to meet another human that shares my affinity for elf culture. Francisco! Thats fun to say! Francisco.  Frannncisco.  Franciscooo. [Answering the phone] Buddy the Elf! Whats your favorite color? Have you seen these toilets? Theyre GINORMOUS! [On cabs] Watch out, the yellow ones dont stop! [On the mail room] Its just like Santas workshop! Except it smells like mushrooms...and everyone looks like they wanna hurt me. [After chasing half-brother Michael] Wow, youre fast. Im glad I caught up to you. I waited five hours for you. Why is your coat so big? So, good news - I saw a dog today. Have you seen a dog? You probably have. How was school? Was it fun? Did you get a lot of homework? Huh? Do you have any friends? Do you have a best friend? Does he have a big coat, too? [From a note on an Etch A Sketch]  Im sorry  I ruined your  lives and crammed 11 cookies into the VCR. The best way to spread Christmas  cheer is singing loud for all to hear. We elves try to stick to the four main food groups: candy, candy canes, candy  corns, and syrup. Does somebody need a hug? I just like to smile! Smilings my favorite. Son of a nutcracker! Falling in Love Elf wouldnt be a Christmas classic if it didnt have a love story. After moving to Manhattan, Buddy begins hanging around the department store Gimbels, where he meets Jovie (Zooey Deschanel), one of the stores employees. At first, Jovie doesnt know what to make of Buddy, but she soon falls in love with his Christmas spirit. First, well make snow angels for two hours, then well go ice skating, then well eat a whole roll of Tollhouse cookie-dough as fast as we can, and then well snuggle. I think youre really beautiful and I feel really warm when Im around you and my tongue swells up. I thought maybe we could make gingerbread houses, and eat cookie dough, and go ice skating, and maybe even hold hands. Fake Santa at Gimbels Buddy is a kind, good-natured man. The only time we see him get angry in the movie is when a Santa comes to Gimbels and Buddy takes him to be an imposter, loudly insulting him. Buddy doesnt treat Santas elf much better. [Seeing a sign that Santa is coming to the toy store]  Santa! Oh my god! Santas coming! I know him! I know him! [To the fake Santa]  You stink. You smell like beef and cheese! You dont smell like Santa. What about Santas cookies? I suppose parents eat those, too? You sit on a throne of lies. Im in a store and Im singing! Hes an angry elf. [After getting beaten up by a little person, played by Peter Dinklage]  He must be a South Pole elf.

Tuesday, November 5, 2019

The Life and Work of Albert Einstein

The Life and Work of Albert Einstein Born on March 14, 1879, Albert Einstein is one of the worlds most famous scientists. He received the 1921 Nobel Prize in Physics for his contributions to the field of theoretical physics.   Albert Einsteins Early Work In 1901, Albert Einstein received his diploma as a teacher of physics and mathematics. Unable to find a teaching position, he went to work for the Swiss Patent Office. He obtained his doctoral degree in 1905, the same year he published four significant papers, introducing the concepts of special relativity and the photon theory of light. Albert Einstein and the Scientific Revolution Albert Einsteins work in 1905 shook the world of physics. In his explanation of the photoelectric effect he introduced the photon theory of light. In his paper On the Electrodynamics of Moving Bodies, he introduced the concepts of special relativity. Einstein spent the rest of his life and career dealing with the consequences of these concepts, both by developing general relativity and by questioning the field of quantum physics on the principle that it was spooky action at a distance. In addition, another of his 1905 papers focused on an explanation of Brownian motion, observed when particles seem to randomly move when suspended in a liquid or gas. His use of statistical methods implicitly assumed that the liquid or gas was composed of smaller particles, and thus provided evidence in support of the modern form of atomism. Prior to this, though the concept was sometimes useful, most scientists viewed these atoms as merely hypothetical mathematical constructs rather than actual physical objects. Albert Einstein Moves to America In 1933, Albert Einstein renounced his German citizenship and moved to America, where he took a post at the Institute for Advanced Study in Princeton, New Jersey, as a Professor of Theoretical Physics. He gained American citizenship in 1940. He was offered the first presidency of Israel, but he declined it, though he did help found the Hebrew University of Jerusalem. Misconceptions About Albert Einstein The rumor began circulating even while Albert Einstein was alive that he had failed mathematics courses as a child. While it is true that Einstein began to talk late - at about age 4 according to his own accounts - he never failed in mathematics, nor did he do poorly in school in general. He did fairly well in his mathematics courses throughout his education and briefly considered becoming a mathematician. He recognized early on that his gift was not in pure mathematics, a fact he lamented throughout his career as he sought out more accomplished mathematicians to assist in the formal descriptions of his theories.

Sunday, November 3, 2019

Evil, a Challenge to Philosophy and Theology Essay

Evil, a Challenge to Philosophy and Theology - Essay Example As one of the giants of his field Ricoeur once again sets us thinking in his deep and mystical fashion which is so characteristic of his continental philosophy. His major works include masterpieces on existentialism, phenomenology, psychoanalysis, politics, religion and the theory of language. In Figuring the Sacred, Paul Ricoeur offers a "hermeneutic critique of different responses to evil,lament and blame,myth wisdom and theodicy."3 "Lament and blame ..Differentiates between evil as suffering and evil as wrongdoing if lament sees us as victims blame makes culprits of us Ricoeur observes that infact these two categories are always intertwined .We can feel guilty for committing an evil act while simultaneously experiencing seduction or invasion by an over whelming force outside us".4 Ricoeur's work discusses the entire intellectual and religious history of the west. In his essay "Evil, a Challenge to Philosophy and Theology" (1985) Ricoeur discusses how evil is symbolised and the problems behind such symbolisation. He has pointed out how the concept of "theodicy" becomes inadequate during such an analysis. Ricoeur deals with the haunting human dilemmas like guilt and lament and goes to profound depths making conclusions which are often subtle yet familiar to the seasoned critic who is almost always left speechless by his understanding of realms not yet explored in religious psychology and theology. The bo The book forms along with its essays a very thoughtful reading for religious people as well as the common lay people .Ricoeur reminds us of many things which we ignore like to the role of God in everyday philosophy and thought. With Ricoeur the title speaks for itself when life becomes the very tumultuous path to "figuring the sacred". The book constantly invokes a subtle awareness in the minds of the reader, reminding us to shield our thoughts from negativity and trivialization while we "figure the sacred" who actually lives within our hearts and minds. Bibliography 1. Book review by Walter Brueggemann, Columbia Theological Seminary,Decatur, GA available at http://theologytoday.ptsem.edu/apr1996/v53-1-bookreview4.htm 2. Figuring the Sacred: Religion, Narrative, and Imagination ,By Paul Ricoeur,Minneapolis, Fortress, 1995. 3. On Paul Ricoeur: The Owl of Minerva By Richard F. Kearney,pp

Friday, November 1, 2019

Organizational Communication Assignment Example | Topics and Well Written Essays - 250 words - 1

Organizational Communication - Assignment Example He encouraged them to ask questions or complaints either directly or through a fishbowl kept in the companys cafeteria. He displayed great willingness and enthusiasm to answer questions quickly and on the spot (p. 85). These changes proved to be highly effective because of various factors such as effective leadership headed by the new CEO Jim Sims; a significant boost in employee morale and in the words of one of the technical directors at CTP, development of â€Å"a critical mass of committed people† (p. 86). There is ample evidence which suggests a direct relationship between effective leadership and employee productivity as well as between employee morale and productivity. Furthermore the manner in which a leader behaves and communicates with the followers during challenging periods directly affects their relationship with the employees resulting in improved performance and commitment on the part of the employees (Kasper-Fuehrer and Ashkanasy, 2001; Connell et al., 2003; Costa, 2003; Dirks and Ferrin, 2002; Corbitt and Martz, 2003, Conrad and Poole, 2012). The effectiveness of the new leadership could be observed from the fact that immediately after the new policy (the three rules) was implemented a significant and apparent change in there was a marked improvement in the employee morale, the company was able to hire more employees, secure more contracts, and stabilize the financial position of the company through improved performance (p.

Wednesday, October 30, 2019

Describe what set the Young, Middle and Old Guards apart from each Essay

Describe what set the Young, Middle and Old Guards apart from each other and from the Grand'Armee in general - Essay Example The Old Guards were the most prominent and were the creme de la creme of Napoleon’s infantry. In order to be admitted to this group, the aspirant should have at least 10 years of service, not exceeding 35 years of age, can read and write, with exemplary conduct, recognized for a brave act, and must at least have a height of 5’10 and 5’8 for grenadier and chasseur, respectively. Men who have received the Legion of Honor Award are admitted even without reaching the height marks. With this set of requirements, it is not surprising to learn that they were the battle-hardened veterans, the most bold, and the strongest amongst the guards. In fact, they were labeled as â€Å"The Grumblers,† â€Å"The Eagles,† â€Å"The Gaiter Straps,† or â€Å"The Supporters of the Usurper† (Yudice et al., French Guard n. pag). Another group is that of the Middle Guards, which was formed between 1806 and 1809. This group includes veterans with at least 6 years of service – the 3rd Grenadiers, the Amsterdam Veteran Company, corporals and privates of the 2nd Grenadiers, 2nd Chasseurs and Fusiliers, and the Velites of Florence and Turin (â€Å"The Young Guard in Action† 4). In 1811, after the disbandment of 1806 regiment units, this division was restored by admitting 500 men with 5 years of service along with 1,000 men coming from the battalions. The most notable account for Middle Guards was concerning their exceptional skills in artillery (Macready, qtd in Yudice et al., Napoleon’s Guard n. pag). Last of all three groups was the Young Guard, formed around 1809. This group was composed of â€Å"newly raised regiments† (Haythornthwaite 7), rigorously trained by Cadres who came from the Old Guards, as well as by the strongest and best educated Privates. The first trained regiments came out as strong and healthy men, as they flushed their martial air with their great stamina. Moreover, the Young Guards consisted of the best

Sunday, October 27, 2019

Implementation Of Steganography For Audio File Format Computer Science Essay

Implementation Of Steganography For Audio File Format Computer Science Essay Abstract The project entitled Audio Steganography is the application developed to embed an audio file in another audio signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography. Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of Steganography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of Steganography. The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted. 1. Introduction 1.1Synopsis 2 .System configuration 2.1 Software requirements 2.2 Hardware requirements 3. System Analysis 3.1 Feasibility study 3.2 Existing system 3.3 Proposed system 3.4 Analysis report 4. System design 4.1 System description 4.2 Functional requirements 5. UML Diagrams 6. Implementation 7. Testing and Debugging 8. Output Screens 9. Conclusion 10. Bibliography Introduction 1. Introduction Synopsis Encryption of data plays a vital role in the real time environment to keep the data out of reach of unauthorized people, such that it is not altered and tampered and sending the in audio format is most secured way to transfer the data through the network. The Audio Steganography is software, which tries to alter the originality of the file into some encrypted form and embed the file into an audio file. Then the users can easily and securely carry the compressed data wherever he wants. The major task of the Audio Steganography is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. The Application should have a reversal process as of which should be in a position to de embed the data file from audio file and decrypt the data to its original format upon the proper request by the user. While the Encryption and Decryption is done the app lication should confirm the standards of authentication and authorization of the user. The Entire application should strive to achieve a user friendly Graphical User Interface, which need to be in a self-learning mode for the end user. The System Should provide all the functional standards of proper navigation with in the environment, which makes it possible for the users to have a smooth flow while working under the environment. The Overall system should provide proper menu based navigation for easier navigation and operation. The Application should be designed in such a way that, as soon as it starts create a Buffer and associate this buffer to some homogeneous data environment, the application should ask the user for the Encryption Key details and should start its functionality upon the logistics that are provided with in this key. The key should be designed in such a way that it prevents the unauthorized persons from stealing the information at any point of time. This is some part of securing the data from third party people. And the other way of securing the data is using Steganography in which embedding the encrypted file in to a audio file. If any one track that file they only see the audio file not the data. The application of De-embedding, Decryption and de compress should be a reverse process at the other end and should be translated only when the receiver of the data applies the proper reversal key. The Decryption process should have a log-based methodology that will take care of any errors that may be encountered while the system is under utilization and should record all those events, which are above the general standards of security. This system basically uses the Blowfish encryption algorithm to encrypt the passwords. This algorithm is a 64-bit block cipher with a variable length key. This algorithm has been used because it requires less memory. It uses only simple operations, therefore it is easy to implement. 1) Blowfish Algorithm Implementation Module 2) Steganography Module 3) Compression Module 4) GUI Module System Configuration 2. System Configuration 2.1 Software Requirements: Operating System Windows NT/2000 (Client/Server). 2.2 Hardware Requirements: Software requirements Front-end: Java J2SDK 1.5, Swings. System Configuration Pentium III Processor with 700 MHz Clock Speed 256 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card. System Analysis Feasibility Study Fact Finding Techniques In this system we are going to develop a facility to a user that he will not face any difficulty at the time of usage like data missing, one way contacts, one view contacts. As we are developing this system with an encoding technique of images the user will not be bothered on which camera support is using, as well in sound. As we are maintaining one technique of speed controlling the frame relay will not be a problem for the user like over speed display, hanged display. 3.1 Feasibility Study A feasibility study is a high-level capsule version of the entire System analysis and Design Process. The study begins by classifying the problem definition. Feasibility is to determine if its worth doing. Once an acceptance problem definition has been generated, the analyst develops a logical model of the system. A search for alternatives is analyzed carefully. There are 3 parts in feasibility study. 3.1.1 Operational Feasibility: Question that going to be asked are Will the system be used if it developed and implemented. If there was sufficient support for the project from the management and from the users. Have the users been involved in planning and development of the Project. Will the system produce poorer result in any respect or area? This system can be implemented in the organization because there is adequate support from management and users. Being developed in Java so that the necessary operations are carried out automatically. 3.1.2 Technical feasibility Does the necessary technology exist to do what is been suggested Does the proposed equipment have the technical capacity for using the new system? Are there technical guarantees of accuracy, reliability and data security? The project is developed on Pentium IV with 256 MB RAM. The environment required in the development of system is any windows platform The observer pattern along with factory pattern will update the results eventually The language used in the development is JAVA 1.5 Windows Environment 3.1.3 Financial and Economical Feasibility The system developed and installed will be good benefit to the organization. The system will be developed and operated in the existing hardware and software infrastructure. So there is no need of additional hardware and software for the system. Existing and Proposed System 3.2 Existing System In the traditional architecture there existed only the server and the client. In most cases the server was only a data base server that can only offer data. Therefore majority of the business logic i.e., validations etc. had to be placed on the clients system. This makes maintenance expensive. Such clients are called as fat clients. This also means that every client has to be trained as to how to use the application and even the security in the communication is also the factor to be considered. Since the actual processing of the data takes place on the remote client the data has to be transported over the network, which requires a secured format of the transfer method. How to conduct transactions is to be controlled by the client and advanced techniques implementing the cryptographic standards in the executing the data transfer transactions. Present day transactions are considered to be un-trusted in terms of security, i.e. they are relatively easy to be hacked. And also we have to consider the transfer the large amount of data through the network will give errors while transferring. Nevertheless, sensitive data transfer is to be carried out even if there is lack of an alternative. Network security in the existing system is the motivation factor for a new system with higher-level security standards for the information exchange. 3.3 Proposed System The proposed system should have the following features. The transactions should take place in a secured format between various clients in the network. It provides flexibility to the user to transfer the data through the network very easily by compressing the large amount of file. It should also identify the user and provide the communication according to the prescribed level of security with transfer of the file requested and run the required process at the server if necessary. In this system the data will be send through the network as a audio file. The user who received the file will do the operations like de embedding, decryption, and decompress in their level of hierarchy etc. Analysis Report 3.4 System Analysis People for long time have tried to sort out the problems faced in the general digital communication system but as these problems exist even now, a secured and easy transfer system evolved and came to be known as the Encryption and Decryption of the data and converting the file to audio format to be transferred using the cryptographic standards and Steganography. The advantages of this Audio Steganography are: High level Security Cost effective transfer In this fast growing world where every individual free to access the information on the network and even the people are technically sound enough in hacking the information from the network for various reasons. The organizations have the process of information transfer in and out of their network at various levels, which need the process to be in a secured format for the organizational benefits. If the organizations have the Audio Steganography System, then each employee can send the information to any other registered employee and thus can establish communication. The audio file that the employee sends reaches the destinations within no time in an audio file format where the end user need to de embed the file, decrypt it and de compress and use for the purpose. The various branches of the organization can be connected to a single host server and then an employee of one branch can send files to the employee of another branch through the server but in a secured format. System Design 4. System Design The System Design includes the maintenance of the secure file transfer service with a prescribed encryption format and split at the interested level of encryption, and embed process and the receiving service at the other end with de-embed and decryption process. The design also includes the provision of facility to the user to manipulate the concerned information according to his personal use and communication process. The design also needs to provide the communication channel to the user to communicate with other registered users through the mailing services in a reliable and secured format. Authorization and authentication services are preferred most for this purpose. The System Design includes the maintenance authorization services, File and directory services with a prescribed encryption format at the interested level of encryption and the receiving service at the other end with decryption process. The design also includes the provision of facility to the user to manipulate the concerned information according to his personal use. The design of Audio Steganography system, basically involve the interface architecture, Security services, and communication system. In the interface design we involve with the design of the user interface with GUI standards and a proper navigation system where the user need to enter into the flow of transactions authorization services are check and further access is provided into the system. Then the user needs to select into the operations provided through the GUI where compression, encryption, embedding, de-embedding, Decryption, Decompressing and sending of the file, General information and exit are provided. Here the Encryption and decryption and services are provided connecting to the security services module where the encryption and decryption are carried out using the cryptographic standards implementing the Blowfish algorithm. After the compression process is completed the user is selecting the file for encryption. After encryption of the file is completed the user is to select the file for embedding it to the audio file and sending through the network to the desired user by specifying the targeted users system IP address in the panel designed. Then the system gets connected to the targeted user and delivers the file in audio format after which the user working with the Audio Steganography software should go for the option De-Embed Files and decrypt the file by selecting the file path by which the file gets decrypted and decompress the file and is viewed on the system. 4.1 System Description The Audio Steganography system is designed basically in four different modules they are GUI module, Compression Module, Security System module, Steganography Module, Connection Manager Module. GUI Module basically deals with the design of the interface which include the service of providing the user with the flexibility of accessing the file system and selecting the required file for the transfer. It should also provide the system to collect the information from the user to check the authorization in providing the access to the file system. The interface is also to consider the design, which include the services of sending and receiving of the files with encryption and decryption standards. The Compression module basically deals with the compress and decompresses the file, which is used to send the file very easily which reduces the uploading time. Security implementation module considers the implementation of the encryptions and decryption standards in transfer the files from one system to another in a distributed environment. The system design, even need to support the user to select the level of encryption he/she needs to perform depending upon the file to be transferred. The basic algorithm used in this purpose is the Blowfish where the user can enter the key depending upon level encryption he is interested. The Connection Manager deals with the architecture, which supports the system to identify the end users for the communication and establish the communication. Connection and disconnection of the communication channel between the users for the access of file system and file transfer services. The Connection Manager receives the IP address to be connected and the file to be sent then establishes the connection and transfers the file. Functional Requirements: The Modules of the system are: 1) Blowfish Algorithm Implementation Module 2) Steganography Module 3) Compression Module 4) GUI Module Blowfish Algorithm: Blowfish is a block cipher that encrypts data in 8-byte blocks. The algorithm consists of two parts: a key-expansion part and a data-encryption part. Key expansion converts a variable-length key of at most 56 bytes (448 bits) into several sub key arrays totaling 4168 bytes. Blowfish has 16 rounds. Each round consists of a key-dependent permutation, and a key- and data-dependent substitution. All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookups per round. Sub keys: Blowfish uses a large number of sub keys. These keys must be precomputed before any data encryption or decryption. The P-array consists of 18 32-bit sub keys: P1, P2,, P18. There are also four 32-bit S-boxes with 256 entries each: S1,0, S1,1,, S1,255; S2,0, S2,1,..,, S2,255; S3,0, S3,1,, S3,255; S4,0, S4,1,..,, S4,255. Encryption and Decryption: Blowfish has 16 rounds. The input is a 64-bit data element, x. Divide x into two 32-bit halves: XL, xR. Then, for i = 1 to 16: XL = XL XOR Pi xR = F (XL) XOR xR Swap XL and xR After the sixteenth round, swap xL and xR again to undo the last swap. Then, xR = xR XOR P17 and XL = XL XOR P18. Finally, recombine xL and xR to get the cipher text. Function F looks like this: Divide XL into four eight-bit quarters: a, b, c, and d. Then, F (xL) = ((S1, a + S2, b mod 232) XOR S3, c) + S4, d mod 232. Decryption is exactly the same as encryption, except that P1, P2, P18 are used in the reverse order. Generating the Sub keys: The sub keys are calculated using the Blowfish algorithm: 1. Initialize first the P-array and then the four S-boxes, in order, with a fixed string. This string consists of the hexadecimal digits of pi (less the initial 3): P1 = 0x243f6a88, P2 = 0x85a308d3, P3 = 0x13198a2e, P4 = 0x03707344, etc. 2. XOR P1 with the first 32 bits of the key, XOR P2 with the second 32-bits of the key, and so on for all bits of the key (possibly up to P14). Repeatedly cycle through the key bits until the entire P-array has been XORed with key bits. (For every short key, there is at least one equivalent longer key; for example, if A is a 64-bit key, then AA, AAA, etc., are equivalent keys.) 3. Encrypt the all-zero string with the Blowfish algorithm, using the sub keys described in steps (1) and (2). 4. Replace P1 and P2 with the output of step (3). 5. Encrypt the output of step (3) using the Blowfish algorithm with the modified sub keys. 6. Replace P3 and P4 with the output of step (5). 7. Continue the process, replacing all entries of the P array, and then all four S-boxes in order, with the output of the continuously changing Blowfish algorithm. In total, 521 iterations are required to generate all required sub keys. Applications can store the sub keys rather than execute this derivation process multiple times. Steganography: Steganography is art of hiding information in ways that prevent the detection of hidden messages. Steganography derived from Greek, literally means Covered Writing. It includes a vast array of secret communications methods that conceal the messages very existence. Theses methods are including invisible inks, microdots, character arrangement, digital signature, and covert channels and spread spectrum communications. In this technology, the end user identifies an audio file, which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and audio file are sent. Prior to this the data is embedded into the audio and then sent. The image if hacked or interpreted by a third party user will open up in any audio player but not displaying the data. This protects the data from being invisible and hence is secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the audio file. The module deals with identifying the hidden data in the audio file. The module receives the audio file that is then browsed to remove the associated data. The data is then removed from the audio file. Compression and Decompression: Compression reduces the average code length used to represent the symbols of an alphabet. Symbols of the source alphabet, which occur frequently, are assigned with short length codes. The general strategy is to allow the code length to vary from character to character and to ensure that the frequently occurring character has shorter codes. We use utility package for compression. This technique maps arbitrary input into printable character output. The form of encoding has the following relevant characteristics. The range of the function is a character set that is universally re-presentable at all sites, not a specific binary encoding of that character set. Thus, the characters themselves can be encoded into whatever form is needed by a specific system. For instance, the character E is represented in ASCII system as a hexadecimal 45 and in EDCDIC- based system as hexadecimal- c5. The character set consists of 65 printable characters, one of which is used for padding. With 2^6 = 64 available characters, each character can be used to represent 6 bits of input. No control characters are included in the set. Thus, the message encoded in Radix-64 can traverse mail-handling system. That scans the data stream for control characters. The hyphen character - is not included. Graphical User Interface: This project is developed using graphics in java swings. The options available are displayed in a menu format, like in an online editor. Clicking on any particular menu item through mouse or through keyboard a dropdown menu is displayed, listing all the options available under that menu item and the user can select the needed actions according to their wish. UML Diagrams Use case Diagram Sender: Receiver: Use case Description: Use case name Compress Participating actors Sender Flow of events The user selected file will be compressed Entry Condition User must select the file. Exit condition Successful or Un Successful Compression of file. Quality Requirements Display proper error messages while compression. Use case name De Compress Participating actors Receiver Flow of events The user selected file will be de compressed Entry Condition User must select the file. Exit condition Successful or Un Successful De-Compression of file. Quality Requirements Display proper error messages while de-compression. Use case name Encrypt Participating actors Sender Flow of events The user-selected file will be encrypted with a given key. Entry Condition User must select the file and must give the key for encryption. Exit condition Successful or Un Successful Encryption of file. Quality Requirements Display proper error messages while Encryption. Use case name Decrypt Participating actors Receiver Flow of events The user-selected file will be decrypted with a proper key. Entry Condition User must select the file and must give the key for decryption. Exit condition Successful or Un Successful Decryption of file. QualityRequirements Display proper error messages while Decryption. Use case name Embed Participating actors Sender Flow of events The user-selected encrypted file will be embedding with selected audio file. Entry Condition User must select the one encrypted file and one audio file for embedding. Exit condition Successful or Un Successful Embedding process. Quality Requirements Display proper error messages while Embedding two files. Use case name De-Embed Participating actors Receiver Flow of events The user-selected audio file will be de-embedding to encrypted file. Entry Condition User must select the audio file for de-embedding. Exit condition Successful or Un Successful De-embedding of file. Quality Requirements Display proper error messages while De-embedding. Use case name Send File Participating actors Sender Flow of events The user-selected file will be send to the given host. Entry Condition User must select the file to send and must know the IP address of the destination host. Exit condition Successful or Un Successful sending of file to the destination host. Quality Requirements Display proper error messages while Sending the file. Class Diagram: Sequence Diagrams Sender: Receiver: Activity Diagram for Compression, Encryption, Embedding Sending Encryption System Sender Activity Diagram for De-Embed, Decrypt Decompress Receiver Decryption System Software Overview FEATURES OF THE LANGUAGE USED About Java Initially the language was called as oak but it was renamed as Java in 1995. The primary motivation of this language was the need for a platform-independent (i.e., architecture neutral) language that could be used to create software to be embedded in various consumer electronic devices. Java is a programmers language. Java is cohesive and consistent. Except for those constraints imposed by the Internet environment, Java gives the programmer, full control. Finally, Java is to Internet programming where C was to system programming. Applications and Applets An application is a program that runs on our Computer under the operating system of that computer. It is more or less like one creating using C or C++. Javas ability to create Applets makes it important. An Applet is an application designed, to be transmitted over the Internet and executed by a Java -compatible web browser. An applet is actually a tiny Java program, dynamically downloaded across the network, just like an image. But the difference is, it is an intelligent program, not just a media file. It can react to the user input and dynamically change. FEATURES OF JAVA Security Every time you that you download a normal program, you are risking a viral infection. Prior to Java, most users did not download executable programs frequently, and those who did scanned them for viruses prior to execution. Most users still worried about the possibility of infecting their systems with a virus. In addition, another type of malicious program exists that must be guarded against. This type of program can gather private information, such as credit card numbers, bank account balances, and passwords. Java answers both of these concerns by providing a firewall between a networked application and your computer. When you use a Java-compatible Web browser, you can safely download Java applets without fear of virus infection or malicious intent. Portability For programs to be dynamically downloaded to all the various types of platforms connected to the Internet, some means of generating portable executable code is needed .As you will see, the same mechanism that helps ensure security also helps create portability. Indeed, Javas solution to these two problems is both elegant and efficient. The Byte code The key that allows the Java to solve the security and portability problem is that the output of Java compiler is Byte code. Byte code is a highly optimized set of instructions designed to execute by the Java run-time system, which is called the Java Virtual Machine (JVM). That is, in its standard form, the JVM is an interpreter for byte code. Translating a Java program into byte code helps makes it much easier to run a program in a wide variety of environments. The reason is, Once the run-time package exists for a given system, any Java program can run on it. Although Java was designed for interpretation, there is technically nothing about Java that prevents on-the-fly compilation of byte code into native code. Sun has just completed its Just In Time (JIT) compiler for byte code. When the JIT compiler is a part of JVM, it compiles byte code into executable code in real time, on a piece-by-piece, demand basis. It is not possible to compile an entire Java program into executable code all at once, because Java performs various run-time checks that can be done only at run time. The JIT compiles code, as it is needed, during execution. Java Virtual Machine (JVM) Beyond the language, there is the Java virtual machine. The Java virtual machine is an important element of the Java technology. The virtual machine can be embedded within a web browser or an operating system. Once a piece of Java code is loaded onto a machine, it is verified. As part of the loading process, a class loader is invoked and does byte code verification makes sure that the code thats has been generated by the compiler will not corrupt the machine that its loaded on. Byte code verification takes place at the end of the compilation process to make sure that is all accurate and correct. So byte code verification is integral to the compiling and executing of Java code. Javac Java Virtual Machine Java byte code Java Source .Java .Class The above picture shows the development process a typical Java programming uses to produce byte codes and executes them. The first box indicates that the Java source code is located in a. Java file that is processed with a Java compiler called JAVA. The Java compiler produces a file called a. class file, which contains the byte code. The class file is then loaded across the network or loaded locally on your machine into the execution environment is the Java virtual machine, which interprets and executes the byte code. Java Architecture Java architecture provides a portable, robust, high performing environment for development. Java provides portability by compiling the byte codes for the Java Virtual Machine, which is then interpreted on each platform by the run-time environment. Java is a dynamic system, able to load code when needed from a machine in the same room or across the planet. Compilation of Code When you compile the code, the Java compiler creates machine code (called byte code) for a hypothetical machine called Java Virtual Machi