Wednesday, August 26, 2020

Social Networking Foundation and Age

Question: Examine about theSocial Networking for Foundation and Age. Answer: Presentation Internet based life assumes a vital job in regular day to day existence for the greater part of the individual in the current world. As per the market review it very well may be seen that, the development from novel to common in business is went somewhere around the outline comes about 90% of associations presently use web based systems administration for business purposes. The nearby all inclusive use of web based systems administration for business has incited a creating valuation for workplace threats rising out of its maltreatment the more that people utilize informal communication for business purposes, the more conspicuous the chances that the hardly perceivable distinction between singular use and business use will cloud. There has been a checked augmentation in the amount of associations that have executed web based systems administration draws near. In addition, various associations have familiar measures with area the specific perils rising out of internet organizing maltre atment by their laborers, for instance, tormenting and incitement, maltreatment of private information and the creation of criticizing comments about associations and accomplices. All of which can realize gigantic reputational hurt with a tap of a help, various long periods of wary and expensive stamping and displaying can be sabotaged. Fundamental Body Analysis Long range informal communication administrations (SNS) are dynamically noticeable among Australian youths paying little regard to land region, establishment and age. They join organizations, for instance, Facebook.com, MySpace.com and Bebo.com which have various a tremendous quantities of people each. It similarly fuses organizations, for instance, Elftown.com (for fans of creative mind and science fiction) and Ravelry.com (for enthusiasts of weaving!) with little amounts of people, regularly related by a specific typical intrigue Online systems administration is all around used to delineate helpful media creation and sharing on a really immense scope (that can consolidate SNS moreover other participatory media works out, for instance, news sites) anyway can be loosened up to fuse humbler customer delivered content frameworks or little scope gatherings (for example the 'little media' some portion of the current media condition), and things that every so often fall outside SNS, for i nstance, online diaries, digital broadcasts, wikis, entertainment modding (Rosenblum, 2007). Moreover, various organizations made for media sharing (for example Flickr for photo sharing, Last.FM for music listening penchants and YouTube for video sharing) have joined profile and frameworks organization features and may be considered as an element of this increasingly broad conceptualisation of SNS themselves. No ifs, ands or buts, SNS in a Web 2.0 condition have changed techniques of correspondence and social association particularly with the growing joining of web based systems administration convenience to these organizations. The speedy take-up of both web based systems administration and SNS practices by adolescents infers a crucial development in energetic people's㠢â‚ ¬Ã¥ ¸ usage of the net in a general sense for information and beguilement to one of correspondence. Adolescents are exhausting, conveying, sharing and remixing media. Inside the working environment to keep up successful business program the majority of the association uses their web based life destinations and pages as a compelling correspondence media. To keep data imparting to the next, worker commitment and for powerful correspondence inside the association the Human Resource Management group offers internet based life inclusion inside the working environment. One explicit way supervisors can use web based systems administration as a channel for delegate voice and corporate exchanges is to get to the base of total business issues. By interfacing with their workforces in open, two-way (or multi-directional) talk, they can show they are being reasonable and sustain the relationship with their workforces. Laborers much of the time find web based systems administration stages associating with considering the way that they are natural, reasonable and brisk. It is in this way an ideal channel for laborer voice, routinely exhibiting essentially more notable than traditional techniques for enabling voice, for instance, running agent surveys. Web based systems administration all around is an open, digressive and dynamic channel that brings laborers into discusses their affiliations, and gated undertaking relational associations give a shielded spot to such online conversations. Web based systems administration can energize exceptionally selected correspondences and joint exertion, and nonstop exercises, for instance, specialist portrayal structures (Boyd Ellison, 2012). Having an unrivaled orchestrated affiliation lies at the focal point of most occupations of large business casual networks, yet then again is of regular worth in itself, as it can upgrade delegates' working lives and strengthen their relationship with the affiliation. Having singular posts and what's more master is much of the time seen to add to this. By permitting and encouraging staff to attract with customers through internet organizing, supervisors can harness the devotion of these basic advertisers. Such coordinated effort can similarly strengthen the pride laborers have in their affiliations and add agreeable to them in their work. For a case, Marks and Spencer uses around 70,000 people in the UK, where the association has in excess of 700 shops. Over late years, the affiliation's lifestyle has ended up being increasingly open and communitarian, and its organization more deteriorated. Yammer, used close by an increasingly natural intranet, is a key mechanical assembly in this consistent endeavor to make a progressively positive work environment and become the best out of delegates. Web based systems administration destinations can immeasurably extend the pool from which managers can enroll and make the path toward obtaining progressively beneficial. This is inclined to be of explicit preferred position in fast paced work markets. For a case, Cape UK supplies organizations to the imperativeness fragment, including stage, warm assurance and rope get to. Enlistment is a particularly imperative component in Cape's tasks: it drastically expands the degree of its workforce over the pre-summer months and much of the time needs to enroll at short notification. Using Facebook as a valuable web-based social networking instrument the association has changed Cape's getting strategy and has been used to help specialist relations. Right then and there internet based life has been assuming a key job in the business procedure. At this current second every single business association utilizes internet based life for executing various sorts of business functionalities. As indicated by the analysts; this has been a helpful apparatus for haggling with staffs or customers in the business setting. Scientists and business eyewitnesses have expressed that long range informal communication is the procedure which has changed the customary method of making business. Numerous youngsters are working in the associations and they have distinctive mentality and nature in the business procedure. They have various observations over the authoritative exercises and methodology. Regularly they are forceful and these capacities are far vaster than the current experienced individuals. As indicated by the Australian enactment, a few rules must be kept up by the administration or youth in the organization at the hour of utilizing web ba sed life. Security issue is the greatest issue in any sort of business association. Different dangers can be produced at the hour of utilizing online life for the business procedure. It has been seen through investigation that different business issues are happened because of the poor security the board of an association (Livingstone, 2008). Despite the fact that various innovative headways have been raised, yet bunches of downsides are likewise connected. The executives of any association must need to concentrate on these components for guaranteeing the hierarchical exhibition. Representatives of an association could share their perspectives through internet based life. At past representatives couldnt have the option to share their perspectives and philosophies, yet now workers might share their perspectives and thoughts through various web-based social networking. Through this procedure individuals might improve their insight and ideas. This is a perfect method to improve the abilities of th e staffs. Then again businesses likewise need to concentrate on this issue by keeping up law and rules. Bosses can spur staffs and give them rule through web based life. Web based systems administration accept a fundamental part in customary everyday presence for by far most of the person in the current world (Wink, 2010). As showed by the business area study it very well may be watched that, the advancement from novel to ordinary in business is circumvented the layout works out as expected 90% of affiliations presently use web sorting out for business purposes. The close by comprehensive utilization of web frameworks organization for business has incited a making valuation for working environment dangers creating out of its abuse the more that individuals use individual to individual correspondence for business purposes, the more perceptible the odds that the scarcely conspicuous complexity between singular use and business use will cloud. There has been a checked expansion in the measure of affiliations that have executed web sorting out methodologies. In addition, affiliations have comfortable measures with zone the particular dangers creating out of web frameworks organization abuse by their experts, for example, tormenting and affectation, abuse of private data and the creation of scrutinizing remarks about affiliations and assistants. All of which can accomplish monstrous reputational hurt with a tap of a sponsorship, different long periods of careful and irrational stepping and displaying can be sabotaged. One specific way overseers can utilize web sorting out as a channel for operator voice and corporate trades is to get to the base of tota

Saturday, August 22, 2020

Reflection Report And Learning From An Experience Education Essay Free Essays

string(137) This hebdomad we had a gathering on Friday to work out the issues sing the worry of subjects and their cardinal word usages for hunt. The examination study is a signifier of thought, how to investigate dependent on perception and feeling. As an executive sense of self break down to accept about coming up short and qualities. In this examination, it is have to focus on conveying achievements, cut heading, run bearing, peril course, investigation, self rationale and bearing ( self judgment, self rating, self response, and vanity ) , work goals, crew effectivity and undertaking arranging. We will compose a custom exposition test on Reflection Report And Learning From An Experience Education Essay or then again any comparable subject just for you Request Now The main points of this investigation are expected to talk and focus on following segment: Deep rooted larning after this proposal class understanding Experience and Importance of gathering work and relationship with crew individuals Significance to keep up everyday dairy for long count endeavors, for example, thesiss, look into work considers or any long capable endeavors. Consideration is a progression of measure to see down for future notice and help Significance of investigation and research we accomplished for our task handling of running endeavor Nature of business related to subject Guide and gathering individuals recommendation and prompts so note down in examination dairy Essentially agonizing perception is a technique to break down him/her self image inside and significantly and occurring out the issue of jumpiness, settle somewhere around the experience which makes the noteworthiness of inner self. Furthermore, gains from a similar reiteration experience and transformed him/her conscience effectively by the outcome of encounters. Reflection design is the signifier of sense of self cognizance and conscience evaluation and portrays the outcome and aftereffects of individual ‘s activities. Recognition of Experiences ( Weekly Detailed Dairy ) Week Date Action 01 14 - 06-2010 First hebdomad, we went to the presentation meeting of AMP Module given by Vincent Ong, and larn how to make an investigation and how to follow the arrangement and so forth from strong mentor. After that Academic Liaison Librarian has give the detailed data about way to set the referencing in our examination and module enchiridion of AMP was given to us all. Following twenty-four hours action was about the copyright infringement and turnitinUK. JBK clarified us sing rethinking and normal for turnitinUK. They other than helped us in chase of related articles from advanced library. First clasp, I have discovered that how to set cardinal words in progress chase and secure the journals and articles called discerning examination to distinction and back up our work. Burglarize clarified us about the thought investigation and how it is important with our examination and what makes a decent consideration study and what ought to be the development of study. After that we have gathered enchiridion of AMP subject. During this hebdomad we have framed a gathering of 10 individuals as we as a whole prior cooperated so we knew one another. One thing in support of us that working with known gathering individuals will chop down clasp brought to get down acting and fear of each casing of work. Get bringing down of this hebdomad we as a whole felt energized and idealistic. As we got data about work we turned out to be all the more perceiving, confused and uncertain and our subject other than made us extremely uncertain and passing on. Yet, after two yearss encephalon inclining with bunch individuals and expound treatment with mentor consoled us, and gave us explanation and demonstrated right way. When all is said in done we discovered that wide extent of assets and journals are accessible in our library ; it was investigated that without the mentor guidance might be we would be on the erroneous way. We other than comprehend the significance of refering to. The most effective method to looking into the stuff from various authors and significance of sharing considerations each piece great as we comprehend the significance of optional research. Found out about the significance of the clasp course in embraced and appropriate referencing ; might be some activity will be experienced during the endeavor like in close to home arranging and in pull offing a gathering. Learning arrangement in this hebdomad would resemble how to happen pertinent data all the more practically and scholarly the interest to keep records about everyday exercises of headway. 02 21-06-2010 . This hebdomad, I have perused the enchiridions and all stuff given by mentor. Two articles in enchiridion are extremely much accommodating for understanding the subject. Today we start our endeavor ; we did research and discovered 5-6 articles about imprint advertise decision and contrast somewhere in the range of B2B and B2C designs. Going up against much difficulty in examine about the important subject in light of the fact that our subject is a lot of elusive and jumbling. Following two twenty-four hours battling and with various cardinal words as recommended by mentor, we came at one purpose of start. Need to comprehend the union Main Report like how to pull grounds and assess and present our ain thoughts in Report. It was prompted that the main investigation ought to be amalgamation rather than elucidating. A bunch of hurdlings came while looking for the subjects. To twenty-four hours I got some utile articles and in the wake of perusing got some utile purposes of my requests. This hebdomad we had a gathering on Friday to work out the issues sing the misgiving of subjects and their cardinal word usages for chase. 03 28-06-2010 This hebdomad, encountering a lot of difficulty while perusing, reconsidering and looking at the articles of various journalists and various sides sing my subject and cardinal words. Before begin making the writing reappraisal, I should require to comprehend and break down the Harvard System for legitimate referencing. So Google it and occur and comprehend the numerous methods of seting refering to for article, journals and books, for example, articles with losing day of the month, losing essayist ‘s name, with mutiple or two author ‘s work and so forth. Today, I began my work on proposition and I made a booklet of my all downloaded article and took the print and read two of them so do the combine point from them I have been begun my work from writing reappraisal which is the central natural structure of the investigation where we needs to set our capacity to deliver a nature of work at that place. I had composed my amalgamation point from two articles. This hebdomad we had a second gathering on Friday to work out the issues sing the anxiety of subjects and bit a few considerations each piece great as looked through article with one another other than our endeavor executive direct us some utile subject identified with solicit foring stamp from innovative arrangements. I have chosen to part my work section savvy as guided us by our AMP workforce Coordinator. So we come the point that work ought to be start from writing reappraisal development. 04 05-07-2010 Today I got my outcome ; I had passed my in all resources. Thankss to Almighty GOD. Today I other than audit the one more article which is introduced in a worldwide meeting sing issues identified with ICT looking by SMEs organizations. So separate some main point from this article and note down. In our gathering we talked about the contrast between E-business and E-begin, it found about an intricate perusing that e-start is connected to the B2B and e-business is connected with B2C. Moreover from surveies one thing come out that is advanced related stocks and computerized inconsequential product. Our endeavor crew pioneer clarified and plainly separated that carefully related product for example bundle applications, migrant telephones, advanced cameras were increasingly appropriate for online business, and all the more simple sold over the internet not at all like carefully random stocks like furniture where shoppers must want inspect truly before a buy is made. We other than examined and concentrated further on the cardinal issues and thought sing the stamp greeting for site improvement arrangement. 05 12-07-2010 In writing reappraisal, looking at of all examination laborers and essayists work applicable to point is extremely much hard and distinctive nature of work for me. It is seen that all examination laborer thinking the comparable issue that affecting the activity while organization is making a trip to B2C showcase and recommends a similar interest and cardinal thought. As I am holding the primary involvement with this level of writing reappraisal and work yet it is abundantly intrigued and knowing endeavor for me. It is extremely simple to digress from the first subject during the writing reconsidering technique. Had a feeling that amusement from my unique subject in this bit of work. May God help me to make this in great and most ideal ways identified with request point request. 06 19-07-2010 This hebdomad I was non ready to deal with my examination because of my some close to home fight and some family unit issues so I was out of station. 07 26-07-2010 This hebdomad, I began to comprehend and overhaul a few articles and paperss on offering. As I have to comprehend that how to request the stamp for mechanical and bundle arrangements. Issues come up while making on approach foring stamps for mechanical arrangement. Since greeting of stamps for capable and non capable arrangement are a lot of confounding and related work. However, feel comparable intriguing as I am holding the new expertness and expertness in this new nation of offering. I do n’t hold any understanding of perusing such sort of paperss. As I was stuck on the proportion of ask foring stamp so today I talked with the crew chief of our gathering so she help me out in anxiety of this particular point that what are the cardinal interest for ask foring the stamps as I was accepting on the arrangement like that sing offering yet she illuminated my issue and sent a few articles for writing reappraisal identified with this. She is extremely much helping individual and decent woman and she ought to be a decent crew lead

Friday, August 21, 2020

Big Data How to Manage Hadoop

Big Data How to Manage Hadoop In the era of Big Data, IT managers need robust and scalable solutions that allow them to process, sort, and store Big Data. This is a tall order, given the complexity and scope of available data in the Digital Era. However, several solutions exist, though perhaps none more popular than Apache Hadoop (“Hadoop for short”).If you do not work in IT, and/or do not keep up-to-date with the latest in IT trends, you may not have heard of Hadoop; but the open source framework is used by firms ranging from social networking sites like Facebook to phone companies like ATT to energy companies like Chevron. These firms must not only store and process the data from both their internal operations and a wide variety of other sources; they must be able to leverage that data in order to develop a strong competitive advantage. And while leveraging Big Data requires vision, firm-wide buy-in, and skilled personnel, Hadoop provides arguably the most robust and versatile technical solution to a firm†™s Big Data needs. © Shutterstock.com | is am areIn this article, we will cover 1) what is Hadoop,  2) the components of Hadoop,  3) how Hadoop works,  4) deploying Hadoop,  5) managing Hadoop deployments,  and 6) an overview of common Hadoop products and services for Big Data management,  as well as 7) a brief glossary of Hadoop-related terms.WHAT IS HADOOP?Hadoop is an open-source big-data management framework, developed by the Apache Software Foundation, written in Java. Hadoop is a cross-platform distributed file system that allows individuals and organizations to store and process Big Data on commodity hardware â€" computing components used for optimized parallel computing. Doug Cutting (then a Yahoo software engineer) and Mike Carafella created Hadoop in 2005 to support Nutch, an open-source search engine. Hadoop is scalable and allows for the processing of both a large volume and a wide variety of datatypes and dataflows.Hadoop is a file system, not, as often thought, a database management solu tion as it lacks certain traditional database features. Indeed, many relational databases provide a wealth of business intelligence applications that the base package lacks. Hadoop’s core benefits lie in its abilities to store and process large volumes of diverse data (both structured and unstructured), and provide end-users with advanced analytical tools, such as machine learning and mathematical modeling, which can be applied to the data that Hadoop stores and processes. COMPONENTS OF HADOOPWhen one speaks of Hadoop, they are usually speaking about the Hadoop ecosystem, which includes a base package, as well as a variety of other software products that can be used in conjunction with the base package. The base package itself is composed of four modules:Hadoop Distributed File System (HDFS): This distributed file system is where the data is stored within the Hadoop framework.Hadoop YARN: This module provides a framework for both cluster resource management and job scheduling.Hado op MapReduce: Using YARN, this Java-based module allows for the parallel processing of large data sets.Hadoop Common: This consists of utilities that support the other three modules.Beyond the base package, there are many other software packages, collectively comprising the Hadoop ecosystem. These include:Apache Pig â€" a programming platform for creating MapReduce programs;Apache Spark â€" an open-source cluster computing framework; andApache Hbase â€" a non-relational distributed database designed to store large quantities of sparse data, among others.Hadoop is also modular and allows IT personnel to replace different components for different software applications, depending on the deployment and the desired functionality.HOW HADOOP WORKSFundamentally, HDFS ingests data through batch and/or interactive data processing. As a distributed file system, all data and the MapReduce system are housed on every machine in a Hadoop cluster, which creates redundancy and increased processing s peed. In a Hadoop cluster, a single machine is designated as a NameNode while others are designated as DataNodes: these track where data is stored throughout the cluster. HDFS duplicates the data on each machine. The more machines added, the more space is gained. Further, multiple machines, each containing DataNodes, mitigates against the failure of any single component of the cluster.MapReduce is used to process the data, and it does so through two components, a JobTracker in the MasterNode in a Hadoop cluster, and the TaskTrackers on the DataNodes. The JobTracker splits a computing job into its component parts and distributes them to the TaskTrackers on the machines to carry out the components. The data is then returned, or reduced, to the central node. In addition to the space, the more machines added, the more processing power is gained.YARN, which stands for “Yet Another Resource Negotiator” packages MapReduce’s CPU and memory resource management functionality, allowing t hem to be run by other engines, and allowing one to run multiple applications in Hadoop.Further, the architecture and features of the base package allow for rebalancing data on multiple nodes, allocation of storage and task scheduling based on node location, versioning of the HDFS, and high availability. It is designed to be cost-effective, flexible and scalable as well as fault-tolerant.IMPLEMENTING HADOOPFor IT managers, Hadoop deployment involves configuring, deploying and managing a Hadoop cluster. This assumes that the firm has the in-house talent, or resources to recruit and retain the in-house talent to do so. Assuming the firm has neither, there are firms that specialize in outsourcing and insourcing this function; though long-term, it remains to be seen whether one can commoditize the innovation, creativity of firm-specific insights that can come from in-house talent.If the firm does decide to deploy Hadoop and manage its data itself, it must ask the same questions necessit ated by any Big Data deployment â€" questions requiring cross-departmental and cross-functional teams to answer them. These include:What the overall goals for Big Data integration at the firm are;How the use of Big Data will be aligned with the firm’s strategic business objectives;What the firm’s overall data needs are, based on existing and needed data infrastructure;What processes and procedures will be implemented to ensure that the firm’s goals and the data science unit achieve their organizational goals;What human resources are needed; andWhat technical resources are needed, among others.The firm must determine whether they will use a managed service provider or deploy it on-premises. The benefits of integrating Hadoop into business operations through a managed service provider are many, and include backup/recovery, automated upgrades, data security tools, technical support, automated configuration and provisioning, query analysis tools, data visualization tools, and test ing environments, among others. In essence, managed service providers allow firms to focus on the data analysis aspects of Big Data without the necessity of managing a Hadoop environment. However, the firm must have a solid plan for managing data inflows and outflows to and from the managed service provider, as well as the analytics; both will require human capital and training resources.If the usage of Hadoop is likely to be sporadic or low volume, then a cloud deployment makes sense, from both a cost and human capital perspective. If, however, there is regular high volume usage, and the firm envisions the need for rapid scaling, then an on-premises install is recommended. In such an instance, usage would likely drive the costs of using the managed service provider up. Further, firms with on-premises installations may find it easier to innovate and enter new markets, especially in data-intensive industries. For example, an entertainment website with a branded social network, may de cide to start selling branded merchandise through an online storefront. An on-premises installation may allow the firm to scale its new data collection needs more rapidly, and less expensively, then a firm using a managed services provider. Moreover, depending on the Internet of Things â€" the connection of both objects and living organisms through embedded computing technologies, affects a firm’s existing operations, and/or is harnessed to create new opportunities, the rapid scaling of data available throughout on-premises deployments may be the best option.From a technical perspective, the firm must consider the design and architecture of the Hadoop cluster for an on-premises deployment. This starts with setting up and configuring a cluster, on which Hadoop will be installed. This must be carefully thought-out in terms of: choice of operating system; the number of map/reduce slots needed; memory and storage requirements; the number of hard drive disks and their capacity; and the optimal network configuration. These must be chosen with scalability in mind. The cluster install must be evaluated and tested before Hadoop installation. Once it is installed, IT managers also must consider which Hadoop applications to deploy and/or develop to meet the firm’s specific data needs, and map out a plan to obtain or create them.From a human resources perspective, an on-premises deployment includes the personnel to deploy and maintain the Hadoop cluster, as well as the data scientists (either in a standalone data science department, dispersed throughout strategic business units, or a combination of the two), and other staff who will serve as end-users. From an implementation perspective, it is recommended to hire a consultant/consulting firm to design the architecture and assist in the deployment due to the complexity of enterprise-level Hadoop implementations, and the paucity of professionals versed in the latest Hadoop-specific technologies and products. And from a process standpoint, IT managers must work with department heads to determine what legacy systems should be phased out as well as training for end-users.MANAGING HADOOPOnce deployed, firms must ensure that the environment operates with low latency, processes dynamic data in real-time and supports both data parallelism and high computing intensity. The deployment must be able to handle analytics tasks that place a high demand on computing resources without failure or necessitating further customization/server space, and the attendant loss of data center space and financial resources. Instead, IT managers must use Hadoop’s framework to improve server utilization and ensure load balancing. They must also optimize data ingestion to ensure the integrity of the data; and perform regular maintenance on the various nodes throughout the cluster, replacing and upgrading nodes and operating systems when necessary, to minimize the effects of drive failures, overheating servers, obsolete techno logies, and other developments that can create service interruptions. When scaling the firm’s Hadoop deployment, they should use open source frameworks to ensure flexibility, compatibility, and innovative approaches to common data processing and storage problems. Of course, they also must ensure that common business analytics programs such as SAS and Revolution R can easily pull data from Hadoop for the use of internal data scientists, with minimal service interruptions.Further, IT managers, whether utilizing an on-premises deployment or a managed services provider, must ensure the security of the data. Many managed service providers, such as Cloudera, offer security options like Project Rhino and Sentry, now both open source Hadoop security initiatives. Like Cloudera’s Cloudera Navigator, some other managed service providers offer governance solutions to ensure legal compliance. Given the volumes of data and prevalence of hackers, viruses, and other security threats, this is on e responsibility that cannot be taken too lightly.HADOOP PRODUCTS AND SERVICES FOR BIG DATA MANAGEMENTIt is important to note that while Hadoop is open source, it is not free. Deployment, customization and optimization can drive up costs. However, since it is open source, any firm can offer Hadoop-based products and services. The firms offering the most robust releases of Hadoop-based services for Big Data management include Amazon Web Services, and Cloudera, Hortonworks, with Cloudera (which counts Doug Cutting as an employee) arguably being the most popular. Hortonworks is also well-known for counting many former Hadoop experts who formerly worked at Yahoo â€" a heavy Hadoop user.The Apache Foundation offers many open source packages that can be appended to a Hadoop installation. Further, many third-party business intelligence providers, like SAP AG, SAS, IBM, and Oracle provide support for Hadoop implementations, regardless of the managed service provider.GLOSSARY OF HADOOP-RELAT ED TERMSThe following are a few of the terms critical to understanding how Hadoop can be deployed at a firm to harness its data.Commodity computing: this refers to the optimization of computing components to maximize computation and minimize cost, and is usually performed with computing systems utilizing open standards. This is also known as cluster commodity computing.DataNode: this is what stores data in Hadoop. In a Hadoop cluster, there are multiple dataNodes with replicated data in each.Database management system: a system that allows a user to order, store, retrieve and manipulate data from a database. HDFS is commonly referred to as a database management system when in reality it is a file systemELT (Extract, Load and Transform): an acronym describing the processes, in order, which comprise a data manipulation method before data is uploaded into a file system or a database management system.File system: a directory-based system that controls how data is stored and retrieved.H adoop cluster: this is a computational cluster designed to store, process and analyze large volumes of unstructured data in a distributed computing environment.Hive: An Hadoop-based open source data warehouse that provides many relational database features, such as querying and analysis. Hive uses a programming language similar to SQL, called HiveQL.HUE: a browser-based interface for Hadoop end-users.JobTracker: this is a service that distributes MapReduce subtasks to specific nodes, once a client application has submitted a job.NameNode: the repository of the directory tree of all files in the HDFS, that also tracks where data is kept throughout the Hadoop cluster.Parallel processing: the concurrent use of one or more CPUs to run a program, which increases computing speed.Pig: a programming language used to create MapReduce programs in Hadoop.Unstructured data: data that lacks a predesigned data model, such as social media comments, or one that is not organized in a prearranged man ner, such as tags in a number of documents.Zookeeper: Hadoop-based infrastructure and services that allow cluster-wide synchronization.

Sunday, May 24, 2020

Durga Puja Observation - 882 Words

Durga Puja I attended Durga Puja on Friday, September 29 at Monrovia High School. The event was put on by the Bengali Association of Southern California. I had no background information of Durga Puja before I arrived, so I learned by experience. Professor Arnab Banerji was one of the individuals organizing the event, and he requested that my Theatre History class attend Durga Puja for one evening so that we could observe first hard the similarities between religious rituals and performances. I arrived alone to Durga Puja at around 7:30 PM. As I was entering the festival, I immediately noticed the beautiful sarees the women were wearing. I felt like I stood out tremendously because even though I was dressed nicely, I was not wearing a†¦show more content†¦Most notably he deciphered the Brahmi script on the stone edicts of the Ancient Indian ruler, Emperor Ashoka. Prinsep also restored temples, improved the drainage systems, introduced uniform coinage, and reformed the Indian system of weights and measures. Prinsep is a major figure and due to his architectural abilities a ghat was erected in India to honor his memory. At this specific Durga Puja festival the puja mandap was erected to resemble the Prinsep Ghat as a way of honoring his memory. In the center of the puja mandap was a striking Durga statue. She had ten arms, long, black hair, and a bindi on her forehead. There were other smaller statues of other women that are representations of Durga’s other forms, but it was clear that Durga was the main focus. In front of the puja mandap were vases of flowers seated on fabric that resembled a rug. I believe people were leaving flowers on the rug as a sign of worship to Durga. The rest of the gym’s floor space was taken up by many rows of black chairs. Floor space was only present in the aisles, and in front of the puja mandap. In the gym, I observed many people walking up to Durga, whispering a quick prayer, and then take a picture before exiting the gym again. After the festival Professor Banerji explained the purpose of Durga Puja. He informed me that Durga Puja is a Hindu festival/ritual that honors and celebrates Durga as the mother of life and creation. The festival marks the battleShow MoreRelatedHinduism : An Indian Religion1265 Words   |  6 Pagesculturally and regionally embedded religion compared to other religions. Hinduism indicates the amalgam of spiritual traditions originating in South Asia (Esposito, 310). For this report, I visited the Durga Temple located in Fairfax to observe the temple s prayer hall, the statues of deities and puja. I also had an opportunity to interview one of the congregants from the temple named Nikki about Hinduism, the myth of liberation, symbols, traditions and rituals, and the impact of the modernity. Read MoreEmployee Compensation3762 Words   |  16 PagesDescriptions may be developed for jobs individually or for entire job families. †¢ Job Analysis: The process of analyzing jobs from which  job descriptions  are developed. Job analysis techniques include the use of interviews, questionnaires, and observation. †¢ Job Evaluation:  A system for comparing jobs for the purpose of determining appropriate compensation levels for individual jobs or job elements. There are four main techniques:  Ranking,  Classification,  Factor Comparison, and  Point Method.Read MoreEmployee Compensation3771 Words   |  16 PagesDescriptions may be developed for jobs individually or for entire job families. †¢ Job Analysis: The process of analyzing jobs from which  job descriptions  are developed. Job analysis techniques include the use of interviews, questionnaires, and observation. †¢ Job Evaluation:  A system for comparing jobs for the purpose of determining appropriate compensation levels for individual jobs or job elements. There are four main techniques:  Ranking,  Classification,  Factor Comparison, and  Point MethodRead MoreMarketing Management130471 Words   |  522 Pagesenvironmental influences and why marketing proactive To assess the impact created by each influence on the organizations has to be 3. MARKETING ENVIRONMENT: Environmental scanning helps in assessing the impact the environment could create the business. Observation played a minor, but non-negligible role. Visits to the premises, including the factory plants in some cases, meals in the canteens of some of the organizations, attention paid to the way-of-doing-things in the several companies - how visitors were

Thursday, May 14, 2020

My Inside Look At Disability - 906 Words

My Inside Look at Disability When you think of the term disability do you get uncomfortable? Do you shy away from people with physical or mental disabilities? Sadly, this is the opinion that a majority of people in society has; however, I completely disagree. To me, everyone has disabilities, whether that is a severe disorder or not varies from person to person. Disabilities can occur from several different events, including: birth defects, car accidents, battles, etc. The term disability gives the connotation that a person is unable to do something based on their intellectual or physical state of being, but to me it means so much more. We all have things that we are not as good at as others, or things that we struggle with, so to categorize people because of the things they can and cannot do is completely ignorant. Disabilities, to me, are not measured by a person s intellectual or physical capabilities, such as media portrays it, but more based on the type of person you are. I feel that being crude, cunning, and cynical is a disability all in its own. There are several different forms of technology that can aid those with vision, hearing, mental, and physical differences, such as walking canes, wheel chairs, hearing aids, etc.; however, it is hard to change a person s character. Until recent years, as we talked about in class, the media has given those with disabilities a bad stigma. People with differences are sometimes identified as stupid, a mistake, or the worst toShow MoreRelatedFirst Impressions Are Not Last Impressions1608 Words   |  7 Pagesthoughts that enter our minds when we see an individual that has a visual disability are negative and cause us to formulate a disapproving impression about their person as a whole. The question lies in what happens with the initial impression. Do we even move past that negative perception to get to know the person or do we make the decision not to even bother? Or if we do pursue a relationship with a person that has a disability, do those first impressions still affect how we view them? All of theseRead MoreAttitude, Legislation and Litigation1049 Words   |  5 PagesAttitude, Legislation, and Litigation The education of students with disabilities has changed over the years. During the B.C. era students with disabilities were consider a disgrace, were shun by society, and the Greek philosopher Aristotle openly declared, â€Å"As to the exposure and rearing of children, let there be a law that no deformed child shall liveâ€Å"(Hardman, Drew, amp; Egan, 2009, p. 4) When children with disabilities were denied access from the public school system, they were taught separatelyRead MoreCharacters In The Curious Incident Of The Dog In The Night-Time1170 Words   |  5 Pagesthe narrator, have a disability. Although Christophers disability isn’t explicit in the novel, one can assume that he has some form of Autism or Asperger syndrome. Haddon never exemplified or went into detail about his disability, as said in an interview, Haddon wanted to make Christopher, â€Å"...a believable human being† and not focus on the fact that he has a disability. As a reader, Christopher’s character serves a very impactful purpose to how we view people with disabilities. The audience canRead MoreReflection On My Genius Hour Project1212 Words   |  5 Pagesand welcome to my Genius hour project! This is a project I have chosen because I am a very intuitive person, and with an abstract object such as the brain to study, I feel inspired to learn more and investigate the brain’s actions, jobs, abilities, and the overall science behind it. The human brain shapes the way we perceive and think about our everyday lives based on the experiences we gather and live through. My genius hour project is about where the best learning happens. For my genius hour infographicRead MoreInclusion Is Not Everyone Getting The Same Thing996 Words   |  4 Pagesis everyone getting what he or she needs to be successful. My definition of inclusion is being a part of what everyone else is in and being welcomed as a member who belongs. It can occur on playgrounds, in churches, at work, and even in a school’s classroom. Inclusion in the classroom is the idea that all children, including special education students, should and can learn in a regular classroom. It does not have a set look and will look different depending on each school and student. Inclusion isRead MoreMy Grandmother And Unexpected Dementia954 Words   |  4 PagesMy G randmother and unexpected Dementia Due to many excuses such as not having enough time to spare to observe unknown person, and having actually no one to observe gave me hard time to think who I should do observation for this assignment. As I was thinking about people that were around me who do have disability, I remember my grandmother was going through the phases of dementia. However, the problem was that she is living in Korea and it is impossible to having a face-to-face talk with her. YetRead MoreDiscrimination Against the Disabled Essay1489 Words   |  6 Pagesyou look like on the outside, it’s what’s on the inside that counts, but our society today lacks to understand that. In today’s time different is not accepted, people that are different are discriminated, looked down upon and usually picked on. People with disabilities are seen as different creatures by most people, the disabled don’t choose to be the way they are, but still our society alienates them. There are different types of disabilities, some type of disabilities are; mental disability, physicalRead MoreAdolescents with Disabilities790 Words   |  4 PagesStrategies for Adolescents with Disabilities Adolescence is a time of change. It is a universal fact, meaning that everyone experiences a time of â€Å"growing up†. Physical maturation as it first occurs around age 12 or 13 has its own definitive term—puberty. There are also marked changes in cognitive processing, emotional maturity, and social interactions. The influx of changes can be overwhelming at best, tumultuous at worst. The additional stress of having a disability or chronic illness while growingRead MoreMy Future Career Has Changed844 Words   |  4 Pagesago about my future plans, I would have said that I just wanted to have a job working in the healthcare field. Now, after having gone through some classes, the idea I once had about my future career has changed. I still would like to work in healthcare to an extent but I want to become a lawyer and specialize in health law that way I can help those who cannot help themselves. The career that I am planning for myself is one that will require many hours of hard work and dedication inside and outsideRead MoreI Attend The University Of California938 Words   |  4 Pages I attended the University of California at Santa Cruz from 2004-2007 and was awarded my bachelor’s degree in World Literature and Cultural Studies. In addition to my major coursework, I completed sixty units of minor coursework in Education. This coursework laid the foundation for future academic coursework in education. While the coursework was mainly focused on education theory and reform, I completed a course in instructional pedagogy which included practicum hours at an alternative charter high

Wednesday, May 6, 2020

The Advocacy Of Women s Rights On The Grounds Of...

Feminism. The advocacy of women s rights on the grounds of political, social, and economic equality to men. Why are some people so angry or offended when they hear this word? Why does the idea of women being equal to men annoy and infuriate them? Do they not believe that women should have the same rights as men? Should women have to cover up to avoid being cat called by disgusting men? Should women have to cover up to avoid being molested or raped? Should women have to stay quiet when they are raped or abused because no one would ever believe them? Should woman be told what to wear, say, or do with their body? I ask myself these questions every day. The question that I ask myself the most is, â€Å"Why are women of color, gay, and transgender women constantly being disrespected?† Woman as a whole get disrespected on a daily basis. We get cat called, get told what to do with our bodies, victim blamed, our bodies are over sexualized, and were viewed as weak and just a piece of meat. Being a woman is already scary enough but being a gay, transgender, or woman of color is the most terrifying experience. Its seems as if the more melanin your skin contains, the more disrespect you receive. Why is that? Although being a woman is hard, being a white woman gives you so much more privilege than what a woman of color gets. First of all, white woman are seen as beautiful and attractive because of their skin. They aren’t constantly told that their skin is too dark or ugly because ofShow MoreRelatedFeminism : The Advocacy Of Women s Rights On The Grounds Of Political, Social, And Economic Equality1694 Words   |  7 Pages English 2 2/29/16 Jane Eyre and Feminism Feminism is defined as the â€Å"advocacy of women s rights on the grounds of political, social, and economic equality to men† (Oxford Dictionary). In the past century, the standards of what is considered feminism have changed. At the time Jane Eyre was published, feminism per se did not exist yet. In the Victorian Era any actions done by women that went against the norms for women for that time period were likely considered atrocious more than rebelliousRead MoreFeminism, The Advocacy Of Women s Rights On The Grounds Of Political, Social, And Economic Equality1391 Words   |  6 PagesFeminism, a word defined as, â€Å"the advocacy of women s rights on the grounds of political, social, and economic equality to men,† a word that provokes strong feelings of either support or strong hate. (Webster) The people who do agree with feminism claim that it has helped them with their experiences of oppression because they are female, while others argue that it is against men a nd promotes hostility. While many argue over what feminism really means, the reputation feminism receives from peopleRead MoreFeminism Is The Advocacy Of Women s Rights On Grounds Of Political, Social, And Economic Equality Essay1068 Words   |  5 PagesFeminism is the advocacy of women’s rights on grounds of political, social, and economic equality to men. Charlotte Perkins Gilman was an advocate for women’s rights. She was involved in Progressive Era reform culture. Gilman, author of â€Å"The Yellow Wallpaper†, illustrates in the short story that women can overcome the weight patriarchy puts on them mentally. The narrator’s husband, John, displayed paternal behavior towards her which was belittling. Gilman uses metaphors, specifically personificationRead MoreFeminism And Equality Between Men And Women956 Words   |  4 PagesFeminism and Equality Between Men and Women Feminism, the advocacy of women’s rights on the grounds of political, social, and economic equality to men (Webster’s Thesaurus Dictionary). Feminist seek to find impartiality between the genders, in not only the work force, but many different aspects of their lives. Feminist are spectated to be individuals who believe in female domination, and that is not precise. Feminist believe that women and men should be treated equal to each other, neither sexRead MoreThe Moral Of The Story By Nina Rosenstand865 Words   |  4 Pagesthe Story† by Nina Rosenstand; feminism is defined as the advocacy of women’s rights on the grounds of political, social, and economic equality to men. The feminist movement has been aiming to achieve equality for women for decades. Equity of the genders (regarding rights) and the promoting of ladies rights are apparent constructive goals; yet individuals have a tendency to depict women s liberation utilizing negative terms, and women s liberation today has procured an awful notoriety. RadicalRead MoreThe Discovery Of A Radical Movement995 Words   |  4 Pageslife. Feminism, or the women’s movement, is the advocacy of women’s rights on the grounds of political, social, and economic equality to men. Before feminism, my life was full of body negativity and ignorance of the patriarchal society, but after a major breakthrough I became an equal rights advocate and an open minded person which progressed my human capital. Before encountering the feminist movement, my self-esteem and the awareness of women s oppression was almost non existent. Throughout myRead MoreFeminism And The Feminist Movement Essay1292 Words   |  6 Pagescentury. Over all, the push for women s suffrage and rights was strong, but further enhanced by leaders like Alice Paul and Jane Addams. The idea of equal rights for all was further scrutinized and contested after civil rights were granted to former slaves. Women began to push for similar equality as illustrated through the feminist movement. The feminist movement became very large and sprouted subsections, one being a subsection of feminism known as social feminism. This branch of feminismRead MoreWomen s Rights On The Grounds Of Political, Social, And Economic Equality1052 Words   |  5 Pagescom) noun the advocacy of women s rights on the grounds of political, social, and economic equality to men. Now what does this mean? This means that women deserve to be treated the same as men because we are on grounds that â€Å"women are inferior to men† in other words â€Å"men have it better off than women†. This is not only wrong but it is a movement for something doesn’t exist and fights sexism with sexism. Now most feminist would tell me I’m absolutely right for saying that â€Å"women have is worst offRead MoreFeminism Is For Everyone By Bell Hook958 Words   |  4 Pagesthe advocacy of women s rights on the grounds of political, social, and economic equality to men.Where she simply define and shows that being feminism does not mean women have to become mean or they are better than men,she simply saying that men and women need to be equal like the civil right movements. The book begins with a brief statement of feminist political positions, then discusses some history of the movement.She discusses the change in the movement from personal to groups wher e women haveRead MoreAfrican Women During The 1800s1369 Words   |  6 PagesFrom Rags to Riches: Womens Roles in the 1800s No one can make you feel inferior without your own consent Women most likely had this inspiring quote in mind during the 1800s. In this 19th century, you can see the changing roles and perspectives of women as they struggle to form their own identity. Women were supposed to be seen and not heard. They cared for the home, their husband, and their children. Anything outside of those 3 areas stumbled upon by women were frowned against. Such as politics

Tuesday, May 5, 2020

James clerk maxwell Essay Example For Students

James clerk maxwell Essay Have you ever left a football outside? If you have you probably noticed it got smaller. And when you took it inside and set it next to a furnace or a vent blowing hot air, the ball tends to get a little bigger. This process can be best described by the Kinetic Molecular theory. James Clerk Maxwell thought up this theory. Maxwell is a scientist who led an interesting life and along the way developed the Kinetic Molecular theory. James Clerk Maxwell was born on June 13, 1831 in Scotland, England quote â€Å"R.G. Jordan page 1of 5†. According to Jordan he was eight years old when his mother passed away. His parents’ plans of trying to home school him to the age of 13 fell through after the tragic event. So his dad hired a sixteen year old boy to tutor him. And that failed so he went to the Edinburgh Academy. At the school his schoolmates often thought of him as odd and taunted him by calling him â€Å"Daffy†. Though he got off to a slow start at the academy he started showing that he had some extraordinary talents. His talents were shown through his mathematic skill and the writing of English verse. And when he was 15 he received from the academy medals for a paper he published about mathematics over drawings generalized ovals with pins and thread. At the age of 16 he visited William Nicol who was the inventor of the polarizing prism. When he went home he made some colored drawings of pola rized light. He was rewarded with a set of polarizing prisms. Bibliography:

Sunday, April 5, 2020

Scarlet Essays (468 words) - Film, English-language Films

Scarlet Letter Philosophy The book The Scarlet Letter is all about symbolism. People and objects are symbolic of events and thoughts. Throughout the course of the book, Nathaniel Hawthorne uses Hester, Pearl, and Arthur Dimmesdale to signify Puritanic and Romantic philosophies. Hester Prynne, through the eyes of the Puritans, is an extreme sinner; she has gone against the Puritan ways, committing adultery. For this irrevocably harsh sin, she must wear a symbol of shame for the rest of her life. However, the Romantic philosophies of Hawthorne put down the Puritanic beliefs. She is a beautiful, young woman who has sinned, but is forgiven. Hawthorne portrays Hester as "divine maternity" and she can do no wrong. Not only Hester, but the physical scarlet letter, a Puritanical sign of disownment, is shown through the author's tone and diction as a beautiful, gold and colorful piece. Pearl, Hester's child, is portrayed Puritanically, as a child of sin who should be treated as such, ugly, evil, and shamed. The reader more evidently notices that Hawthorne carefully, and sometimes not subtly at all, places Pearl above the rest. She wears colorful clothes, is extremely smart, pretty, and nice. More often than not, she shows her intelligence and free thought, a trait of the Romantics. One of Pearl's favorite activities is playing with flowers and trees. (The reader will recall that anything affiliated with the forest was evil to Puritans. To Hawthorne, however, the forest was beautiful and natural.) "And she was gentler here [the forest] than in the grassy-margined streets of the settlement, or in her mother's cottage. The flowers appeared to know it" (194) Pearl fit in with natural things. Also, Pearl is always effervescent and joyous, which is definitely a negative to the Puritans. Pearl is a virtual shouting match between the Puritanical views and the Romantic ways. To most, but especially the Puritans, one of the most important members of a community is the religious leader; Arthur Dimmesdale is no exception. He was held above the rest, and this is proven in one of the first scenes of the book. As Hester is above the townspeople on a scaffold, Dimmesdale, Governor Wilson, and others are still above her. But, as the reader soon discovers, Arthur Dimmesdale is his own worst enemy. He hates himself and must physically inflict pain upon himself. "He thus typified the constant introspection wherewith he tortured, but could not purify, himself" to never forget what he has done (141). To Dimmesdale, it is bad that Hester is shown publicly as a sinner, but people forget that. What is far worse than public shame is Dimmesdale's own cruel inner shame. Knowing what only he and Hester know, the secret eats away at every fiber of Dimmesdale's being. As the Puritans hold up Dimmesdale, the Romantics level him as a human. The Scarlet Letter is a myriad of allegorical theories and philosophies. Ranging from Puritanic to Romantic, Nathaniel Hawthorne embodies his ideas to stress his Romantic philosophies through Pearl, Hester, and Dimmesdale throughout all of this.

Sunday, March 8, 2020

Did Your SAT Score Go Down Whats a Normal Drop and Whats Not

Did Your SAT Score Go Down What's a Normal Drop and What's Not SAT / ACT Prep Online Guides and Tips Trying to figure out why your SAT score went down on a retake? Or are you just wondering how much an SAT score can drop if you retake the test? Find out the likelihood of an SAT score decrease, how much your SAT score could decrease by, and how to make sure your score goes up, not down. Also, learn how to compare a score from the Old SAT (which was scored out of 2400) with a current SAT score (which is out of 1600) to see if your score decreased in the transition. How Likely Is an SAT Score Drop? College Board released data specifically on juniors who retook the old version of the SAT as seniors – so if you’re younger this might not apply exactly to you, though you can expect the same general principles to hold. According to that data on SAT retakes: 55 percent of juniors taking the test improved their scores as seniors 35 percent had score drops 10 percent had no change So while we don't have any data yet about the New SAT, it's important to keep this information from the old SAT in mind. Basically, the higher a student's scores were as a junior, the more likely it was that the student's subsequent scores would drop. The lower the initial scores, the more likely it was that the scores will go up. On average, juniors repeating the SAT as seniors improved their combined Critical Reading, Mathematics, and Writing scores by approximately 40 points. About 1 in 25 gained 100 or more points on Critical Reading or Mathematics, and about 1 in 90 lost 100 or more points. So the odds are if you retake the SAT, your score will increase – just over half of these students had a score increase. But this increase isn't huge, just 40 composite points. Plus, it’s also not unlikely that your score will either stay the same or drop (45% of retakes in College Board’s study). It’s unlikely you’ll lose more than 100 points on one section – meaning a 200 point decrease is about the max you should expect, and anything larger is cause for serious concern. Be Careful if You Start Out With a Higher Score (680+) According to this table from College Board, if you initially earned a section score of 680 or higher, you're the most likely to lose points on an SAT retake. The Writing section has the biggest average drop, of 15 points. The average drop in Critical Reading is 4 points, and there is actually an average gain in Math of 4 points. However, looking at the breakdown of score increases and decreases, students who scored 680 or higher the first time are the most likely to see SAT point decreases of 20 to 40 or even 50 to 70 points. So if your section scores are 680 or higher, since you’re in the category most likely to see a score decrease, you should be very careful when studying for your retake. Did My Score Drop Between the Old and New SAT? If you took the Old SAT and the current SAT, it can be hard to interpret and compare your two scores. As a brief refresher, the Old SAT had three sections (Critical Reading, Math, and Writing) each worth 800 points, for a total of 2400 possible points. The current SAT has two sections, Math and Evidence-Based Reading and Writing. Each section is worth 800 points for a total of 1600 possible points. (Get a complete guide to SAT scoring right here.)Let's take an example. Say you took the old SAT in January 2016 and got the following scores:Critical Reading: 640Math: 620Writing: 680Total Composite: 1940You decide to retake the SAT. On the current SAT, you get the following scores:Evidence-Based Reading and Writing (EBRW): 660Math: 740Total Composite: 1400Just eyeballing it, it's clear that your Math performance went way up between the two tests. After all, 740 is much higher than 620! But comparing the other sections is a bit murkier. Your EBRW score of 660 is higher than your old SAT C ritical Reading performance but lower than your old SAT Writing performance. So which test did you do best on? How does a 1940 out of 2400 compare to a 1400 out of 1600? Using our New SAT Score conversion chart, we can get an idea.Based on these estimates, a 1940 old SAT score would map to a 1360current SAT score. Meanwhile, a 1400 current SAT score would map to a 2060 old SAT score. So it turns out the new SAT score is stronger than the old one.If you're comparing an old SAT score with a current score, compare the individual section scores Math with Math and Critical Reading/Writing with Evidence-Based Reading and Writing. But also use the conversion chart to compare your final composite scores.To take another example, if you got a 2000 on the old SAT and a 1200 on the current SAT, your score would have actually gone down in the transition. (A 2000 composite maps to a 1430 current SAT score, while a 1200 maps to just an 1660 on the old SAT.) So make sure to use the conversion chart to compare your performance on the two tests! Why Would My Score Decrease? We’ll separate this discussion into smaller score drops (up to 100 points off your composite) and larger drops. Essentially, the bigger the score drop, the more serious the issue you have to address. We'll discuss what could have gone wrong on your retake, and how to make sure a subsequent SAT retake goes better. Statistically Likely Drops (Up to 100 Points Down) The first thing to consider, even though it may seem counterintuitive, is that maybe you did better than expected the first time you took the SAT. Maybe you had particularly good luck and guessed correctly on lots of questions, or you connected better with the Reading passages. So your lower SAT retake score, rather than being a sign that you got worse, could just be a correction to your surprisingly high first time score. However, it’s also possible you had decent luck the first time but bad luck on your retake. For example, if you earned 50 raw points on Math last time for a score of 700, but ran out of time and missed six more Math questions the second time, your raw score of 44 would get you a 650 – a 50-point drop. In other words, missing just six questions can translate to a 50-point section drop. Even small score changes can have a large effect on your final composite. This can easily happen if you face a tough Reading passage you don’t vibe with or a few tougher math questions. How unlucky you get is also affected by how long you studied for your retake – the less time you put in, the more likely it is you’ll make the same mistakes and additionally be open to bad luck. Or you may forget about mistakes you are prone to making. Also, how did you study? If you didn’t include enough strictly-timed test practice, you could have struggled with timing on your retake, which leads to point drops. Plus, if you spent all your time studying for your worst section, you may see score drops on the other one, leading to an overall composite drop. Putting in a bunch of time to improve a low Math score won't help your overall composite if your EBRW score is much lower the second time. Also, did your test center have problems? Not getting the proper amount of time on a few sections or dealing with noise or uncomfortable temperature can affect your score (learn how to report a test center here). Finally, the reason could have been more personal – maybe you slept less before your SAT retake or weren’t feeling well that day. Whatever the case, you should try and figure out what could have gone wrong for you if you’re thinking about retaking the SAT for a third time. Large Drops (Between 100 and 200 Points Down) If your composite drops by this much, you likely have a more serious problem you should identify. It could be you’re using a new strategy that doesn’t work for you, especially if the point drop came mainly from one section. For example, did you try going straight to the questions on the Reading section rather than reading the passage first, or plugging in answers for Math instead of solving with algebra? A strategy that works for one student could cause another to waste time and lose points. (This is why we recommend doing a ton of practice problems as part of your SAT study regimen: so you can try out different strategies and find what works for you.) If the point drops were spread out between the two sections, it could be your guessing strategy and/or timing were worse this time around. Or maybe your testing conditions were markedly worse this time – again, read about possible test center violations here. Or perhaps you were feeling particularly stressed, sick, or nervous on your retake. In short, something happened to affect your overall test performance. You should work on identifying what you think went wrong before retaking the SAT again (if you decide to) if you saw a point drop this large. Very Large Drops (200 Points or More) From the data above, only 1 in 90 students will see a score decrease this dramatic. In other words, something is very seriously going wrong for you – whether it’s your test strategy, a bad test center, or maybe even a mis-scoring. If your SAT score is in free fall, you have a serious problem... If you saw the score drop on just one section – say your Math score fell from 660 to 460 – that’s a huge red flag. You may have tried out a new strategy on that section that was very ineffective. But it’s more likely that you might have messed up filling in your answers – maybe you got off by one line when bubbling in, for example. This could cause you to get a ton of questions wrong, resulting in an enormous score drop. If the score drop was spread between sections – roughly a 100-point drop in each – that speaks to a test-wide problem. Maybe you struggled with timing, used an ineffective guessing strategy, or were feeling unwell on test day. Or maybe your test center was particularly bad this time around. You need to figure out what went wrong so that if you do attempt to retake the SAT again, you can increase your odds of getting a better score. Finally, consider College Board’s Score Verification program if you saw a huge score drop on an SAT retake but can’t figure out what could have caused it. You’ll have to pay extra for the service, but the amount will be refunded if College Board did in fact mis-score your test. So definitely consider this option if you think your test was mis-scored. How to Prevent an SAT Score Decrease We've discussed why an SAT score can drop on a retake. But how can you make sure that your SAT score goes up if you retake the test? Follow our advice below to make sure your retake is successful. 1. Focus on Your Weak Points One benefit of retaking the SAT is that you can use your score report from the first time around to analyze your weak spots. You want to make sure you get the points you missed the first time around when you retake the SAT, so spend some time analyzing your first score report. To take an example, if your Math score was a 650 the first time, and your goal is to get 700 or higher on your retake, look closely at your score report. The SAT score report not only gives your final composite score, it breaks down how many questions you got correct and incorrect and in what areas. For example, you'll be able to see if you missed more Math questions in Heart of Algebra or Passport to Advanced Math. Based on that knowledge, work on filling the knowledge gaps that prevented you from getting a higher score. The more point gains you can make, the less likely your score will decrease on a retake. So what can you do to improve a low section score? Check out these section-by-section guides: SAT Reading The Ultimate Study Guide for SAT Reading How to Stop Running Out of Time on SAT Reading SAT Math The Best SAT Math Prep Books Browse Math Help by Topic: Statistics, Fractions, and More SAT Writing The Complete Prep Guide for SAT Writing The Best SAT Writing Prep Books 2. Don’t Neglect Your Strong Areas Even though it’s important to improve your weak points, don’t ignore the parts of the SAT you think you have in the bag. It’s not unlikely that your highest section score could drop if you don’t study for it. Especially if you did fairly well on your first SAT (680 or higher on any section), it’s pretty likely you will see some score decreases the second time around. So you need to be practicing for the entire test to prevent your overall SAT composite from dropping. To continue our example, even if you get your Math score up to 700, if your EBRW score drops by 50 points (which is a statistically likely drop), your composite won’t improve. Or it could drop! So how do you practice for the entire test? Make sure you’re familiar with SAT timing and SAT scoring so you know how much time you can spend per question, and the raw points you need on each section to reach your score goal. Also, make taking full, strictly-timed practice tests a regular part of your study routine. Which brings us to the third point... 3. Practice, Practice, Practice Don’t underestimate your second try at the SAT! Even though you’ve taken (and studied) for the test once before, you’ll need to keep working hard if you want to earn a higher score on your retake. Getting lots of SAT practice in will reduce the score variation caused by harder/easier test questions or good/bad luck on test day. Time yourself carefully whenever you take practice SAT sections (or full practice exams). Set target raw scores for each section and keep practicing until you hit them consistently. Also, be ruthless about analyzing your mistakes. Don’t just grade practice problems quickly and then move on. Figure out why you got a question wrong and what you can do to make sure you never get it wrong again. (For more on analyzing your wrong answers, I highly recommend Allen Cheng's guide to getting a perfect SAT score.) 4. Don't Forget Logistics Finally, you should make sure outside factors don’t mess with your SAT retake score. Even if you study effectively, a bad test center or lack of sleep could hurt your score. Make sure you’re using the best test center for you. Also be sure that you’re getting enough sleep and following the guidelines to be ready the morning of the test. Last-minute cramming the night before the SAT won’t improve your score! Finally, give yourself enough time before a retake – if you retake the SAT on the next possible test date, you might not give yourself enough time to practice and improve. Consider giving yourself between two to four months to study for your retake to ensure your score will go up. What’s Next? Check out SAT tips from our resident full-scorer. If you follow these guidelines, even if you’re not going for a 2400, your score will almost certainly increase. Learn more about how the SAT is scored to know how many questions you need to get correct for a score increase. Also read more about SAT timing to make sure your pacing is fast enough. Want some more motivation for studying for an SAT retake? Read about SAT scores for the Ivy League and scholarships you can earn for high SAT scores. Do you have a hard time sticking to your SAT study plan? Learn how to beat procrastination once and for all! Want to improve your SAT score by 160 points?We have the industry's leading SAT prep program. Built by Harvard grads and SAT full scorers, the program learns your strengths and weaknesses through advanced statistics, then customizes your prep program to you so you get the most effective prep possible. Check out our 5-day free trial today: Have friends who also need help with test prep? Share this article! Tweet Halle Edwards About the Author Halle Edwards graduated from Stanford University with honors. In high school, she earned 99th percentile ACT scores as well as 99th percentile scores on SAT subject tests. She also took nine AP classes, earning a perfect score of 5 on seven AP tests. As a graduate of a large public high school who tackled the college admission process largely on her own, she is passionate about helping high school students from different backgrounds get the knowledge they need to be successful in the college admissions process. Get Free Guides to Boost Your SAT/ACT Get FREE EXCLUSIVE insider tips on how to ACE THE SAT/ACT. 100% Privacy. No spam ever. hbspt.forms.create({ portalId: '360031', formId: '2167ba30-e68e-4777-b88d-8bf3c84579af', formInstanceId: '2', submitButtonClass: 'btn-red-light btn', target: '#hubspot-container2', redirectUrl: 'http://ww2.prepscholar.com/blog-subscribe-thank-you', css: '.post-bottom .hs-form.stacked label {display:none;} .post-bottom .hs-form.stacked .field div.input {padding-top: 55px; padding-left: 300px;} .post-bottom .hs-input {width: 220px} .post-bottom .btn-primary, .hs-button.primary {margin-top:0px; padding-left:350px} .post-bottom .hs-form-field {margin-bottom:5px}' }); $(function(){ $(".exclusive-tip-form #hubspot-container2 label").hide(); }); function replace_tag(a, b){ $(a).each(function(index) { var thisTD = this; var newElement = $(""); $.each(this.attributes, function(index) { $(newElement).attr(thisTD.attributes[index].name, thisTD.attributes[index].value); }); $(this).after(newElement).remove(); }); } $(function(){ replace_tag($(".posts-by-topic h3"), "h2"); }) Ask a Question BelowHave any questions about this article or other topics? Ask below and we'll reply! Search the Blog Search jQuery(function(){ var $ = jQuery; var url = 'http://google.com/search?q=site:' + location.protocol + '//' + location.hostname + ' '; var $searchModule = $('.hs-search-module.2cd9c2b8-16cc-4149-8208-04af7ef694a6'); var $input = $searchModule.find('input'); var $button = $searchModule.find('.hs-button.primary'); if (false) { $input.val(decodeURIComponent(location.pathname.split('/').join(' ').split('.').join(' ').split('-').join(' ').split('_').join(''))); } $button.click(function(){ var newUrl = url + $input.val(); var win = window.open(newUrl, '_blank'); if (win) { //Browser has allowed it to be opened win.focus(); } else { //Browser has blocked it location.href = newUrl; } }); $input.keypress(function(e){ if (e.keyCode !== 13) return; e.preventDefault(); $button.click(); }); }); Improve With Our Famous Guides SATPrep ACTPrep For All Students The 5 Strategies You Must Be Using to Improve 160+ SAT Points How to Get a Perfect 1600, by a Perfect Scorer Series: How to Get 800 on Each SAT Section: Score 800 on SAT Math Score 800 on SAT Reading Score 800 on SAT Writing Series: How to Get to 600 on Each SAT Section: Score 600 on SAT Math Score 600 on SAT Reading Score 600 on SAT Writing Free Complete Official SAT Practice Tests What SAT Target Score Should You Be Aiming For? 15 Strategies to Improve Your SAT Essay The 5 Strategies You Must Be Using to Improve 4+ ACT Points How to Get a Perfect 36 ACT, by a Perfect Scorer Series: How to Get 36 on Each ACT Section: 36 on ACT English 36 on ACT Math 36 on ACT Reading 36 on ACT Science Series: How to Get to 24 on Each ACT Section: 24 on ACT English 24 on ACT Math 24 on ACT Reading 24 on ACT Science What ACT target score should you be aiming for? ACT Vocabulary You Must Know ACT Writing: 15 Tips to Raise Your Essay Score How to Get Into Harvard and the Ivy League How to Get a Perfect 4.0 GPA How to Write an Amazing College Essay What Exactly Are Colleges Looking For? Is the ACT easier than the SAT? A Comprehensive Guide Should you retake your SAT or ACT? When should you take the SAT or ACT? Michael improved by 370 POINTS! Find Out How Stay Informed Get the latest articles and test prep tips! Looking for Graduate School Test Prep? Check out our top-rated graduate blogs here: GRE Online Prep Blog GMAT Online Prep Blog TOEFL Online Prep Blog

Friday, February 21, 2020

Reading response in language discrimination Essay

Reading response in language discrimination - Essay Example In these chapters Lippi Green discussed openly through examples that how language subordination had negatively affected the speakers of different languages resides in the United States. Since the 18th century this is the problem that persists in the United States where people are still facing discrimination due to their non-American accent. The author raised several evidences to support her arguments therefore; she used several authentic information and facts and figures in her findings from 1800 to onward. America has been the house for several immigrants and people are visiting this country for several reasons, but no matter how long they lived in the United States they are unable to learn the accent of Native Americans. Lippi Green had strongly opposed discrimination on the basis of language and accent and called it just a myth. The topic has been researched by several well known researchers and authors across the world in different eras and they did their level best to discuss di fferent aspects of language discrimination. The effect of such efforts can be seen in the modern society where people have learned to ignore some traditional questions such as race, ethnicity, culture, accent, etc. unfortunately, such things are not completely eliminated from the American society and authors like Lippi Green still needs to work on this issue. To look at the issue of language discrimination in the United States, the Author Lippi Green used several authentic and genuine sources. To discuss the issue clearly, Lippi Green used a comparison of political cartoons, US census, historical data of World War II to understand the types of immigrants to the US and an in-depth analysis of the literature of other well known authors. Apart from such sources, the author used a group of frameworks to further clarify this topic. The author used to include her casual observation, legitimated data taken from journals and many latest tools to sketch the

Wednesday, February 5, 2020

SLP - WORK MOTIVATION Essay Example | Topics and Well Written Essays - 500 words

SLP - WORK MOTIVATION - Essay Example In acquiring addition skills in training, I have applied them in my work place to make it more presentable. When encountering some hardships and problems, I always consult my boss regularly regarding any troubling issues though not all the time he is ready with an answer. Being inventive with some ideas to which I share with my boss before tackling my job, has contributed to the current success. Regular meetings with him aimed at discussing as well as highlighting how I can improve my working skills has also played a significant role, which aligns with my scores so far obtained. Based on the content and figures above depicting my commitment and the freedom I enjoy at my work place, I believe, if my employer starts giving rewards and appraisals to employees, this score would rapidly improve. For instance, incentives like new promotions opportunities if one achieves a certain goal set by the employer. This will motivate a healthy competition among employees to vie for the new positions though in terms of outstanding respective performances (McGregor). Another aspect encompasses if the employer regularly increases employees’ based on merit, this will motivate one to work extra hard and do a presentable job accordingly. This is especially in introducing overtime remunerations for extra worked hours will encourage employees to work even hard. Praising and recommending employees work will motivate and encourages one to keep on working hard within a working institution. Management should involve employees in decision making by listening to their suggestions about what they feel and think (Chapman, 2014). This will be a great privilege towards making employees feel honored and thought of positively by their superiors. If the employer comes up with a plan to pay for extra training for employees to acquire additional skills to improve, their work quality I strongly believe this can improve the personal score of an

Tuesday, January 28, 2020

Image Based Steganographyusing LSB Insertion Technique

Image Based Steganographyusing LSB Insertion Technique ABSTRACT Steganography is a technique used to hide the message in vessel data by embedding it. The Vessel Data which is visible is known as external information and the data which is embedded is called as internal information.The extrenal information is not much useful to the data owner. The techniques used in Steganography makes hard to detect hidden message within an image file. By this technique we are not only sending a message but also we are hiding the message. Steganography system is designed to encode and decode a secret file embedded in image file with a random Least Significant Bit(LSB) insertion technique. By using this technique the secret data are spread out among the image data in a random manner with the help of a secret key. The key generates pseudorandom numbers and identifies where and in which order hidden message is laid out. The advantage of using this method is that it includes cryptography. In cryptography, diffusion is applied to secret message. INTRODUCTION: The information communicated comes in number of forms and is used in various number of applications. In large number of these applications, it is desired that the communication has to be done in secrete. Such secret communication ranges from the obvious cases of bank transfers, corporate communications, and credit card purchases,and large percentage of everyday e-mail. Steganography is an ancient art of embedding a message in such a way that no one,except the sender and the recipient,suspects the existence of the message. Most of the newer applications use Steganography as a watermark, to protect a copy right on information. The forms of Steganography vary, but unsurprisingly, innocuous spam messages are turning up more often containing embedded text. A new transform domain technique for embedding the secret information in the integer wavelet which is transformed on a cover image is implemented here. A technique which is used to scramble a secrete or a confidential message in order to make it unreadable for a third party is known as the Cryptography.Now-a-days its commonly used in the internet communications.cryptography can hide the content of the message but it cant hide the location of the secrete message.This is how the attackers can target even an encrypted message.Water marking is the another information of hiding the digital data or a picture or musical sound.The main purpose of this watermarking information is to protect the copyright or the ownership of the data.In this technique the robustness of the embedded evidence,that can be very small, is the most important.The external information which is visible is the valuable information in the watermarking technique. steganography is a technique which is used to make the confidential information imperceptible to the human eyes by embedding the message in some dummy data such as the digital image or a speech sound.There is a research topic about the steganography known as the steganalysis.The main objective of this steganalysis is to find out the stego file among the given files.It is a technique which is used to detect the suspicious image or sound file which is embedded with the crime related information.So,we need to make a sniffer-dog-program to break the steganography.However,it is too difficult to make a program that really works. All the traditional steganography techniques have very limited information-hiding capacity.They can hide only 10% (or less) of the data amounts of the vessel.This is because the principle of those techniques which were either to replace a special part of the frequency components of the vessel image, or to replace all the least significant bits which are present in a multivalued image with the secrete information.In the new steganography which we are using uses an image as the vesel data, and we need to embed the secrete information in to the bit planes of the vessel.The percentage of information hiding capacity of a true color image is around 50.All the noise-like regions in the bit planes of the vessel image can be replaced with the secret data without deteriorating the quality of the image,which is known as BPCS-Steganography, which stands for Bit-Plane Complexity Segmentation Steganography. BACKGROUND HISTORY: The word Steganography is of Greek origin and means â€Å"covered, or hidden writing†. Its ancient origins can be traced back to 440BC. THEORY: Steganography is a technique which is used now a days to make confidential information imperceptible to the human eyes by embedding it in to some innocent looking vessel data or a dummy data such as a digital image or a speech sound.In a multi bit data structure a typical vessel is defined as a color image having Red,Green and blue components in it.By using a special extracting program and a key the embedded information can be extracted,the technique of steganography is totally different from file deception or file camouflage techniques. A technique to hide the secrete data in a computer file which almost looks like a steganography is known as a file deception or file camouflage.But actually, it is defined as a trick which is used to disguise a secret-data-added file as a normal file.This can be done as most of the computer file formats have some dont-care portion in one file.For instance if we take some file formats as jpeg,mpeg3 or some word file these looks like the original image,sound or document respectively on the computer.Some of them could have misunderstood that such a trick is a type of Steganography.However,such files can have an extra lengthy file sizes, and they can be easily detected by most of the computer engineers.So, by this we can understand that the file deception is totally different from that of the steganographic techinque which we are discussing here. Many of the Steganography software which is in the market today is based on the file decepetion.If we find a steganography program that increases the output file size just by the amount we have embedded, then the program is obviously a file deception.If there is some secrete data then we should encrypt in such a way that it is not readable for the third party.A solution to Keep secrete information very safe is known as Data Encryption.It is totally based on scrambling the data by using some type of the secrete key. However,encrypting the data will draw more attention of the people who have not encrypted the data.So, it is very to the owner to know whether the data is encrypted or not.By, this we can know that the encrypting is not enough. There is another solution which is known steganography. There are two types of data in steganography, one is the secret data that is very valuable and the other is a type of media data vessel or carrier or dummy data.Vessel data is essential, but it is not so valuable.It is defined as the data in which the valuable data is embedded. The data which is already embedded in the vessel data is called stego data.By using the stego data we can extract the secret or the valuable data. For embedding and extracting the data we need a special program and a key. A typical vessel is an image data with Red, Green, and Blue color components present in it in a 24 bits pixel structure. The illustration below shows a general scheme of Steganography. Steganography is a technique which is used to hide secret data by embedding it in some innocent looking media data like Mona lisa in the above picture.The data which is embedded is very safe because Steganography hides both the content and the location of the secret information.In the media data there are many different methods to embed the data.It is highly impossible to detect which method is used for embedding the data.Steganography can co-operate with cryptography in the sense that it can embed the encrypted secret data and make it much safer. The most important point in the steganography technique is that the stego data does not have any evidence that some extra data is embedded there.In other way, the vessel data and the stego data must be very similar.The user of the steganography should discard the original vessel data after embedding,so that no one can compare the stego and the original data. It is also important that the capacity for embedding the data is large.As it is larger it is better.Of all the currently available steganography methods the BPCS method is the best. LEAST SIGNIFICANT BIT INSERTION One of the most common techniques used in Steganographytoday is called least significant bit (LSB) insertion. This method is exactly what it sounds like; the least significant bits of the cover-image are altered so that they form the embeddedinformation. The following example shows how the letter A can be hidden in the first eight bytes of three pixels in a 24-bit image. Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A: 01000001 Result: (00100110 11101001 11001000) (00100110 11001000 11101000) (11001000 00100111 11101001) The three underlined bits are the only three bits that were actually altered. LSB insertion requires on average that only half the bits in an image be changed. Since the 8-bit letter A only requires eight bytes to hide it in, the ninth byte of the three pixels can be used to begin hiding the next character of the hidden message. A slight variation of this technique allows for embedding the message in two or more of the least significant bits per byte. This increases the hidden information capacity of the cover-object, but the cover-object is degraded more, and therefore it is more detectable. Other variations on this technique include ensuring that statistical changes in the image do not occur. Some intelligent software also checks for areas that are made up of one solid color. Changes in these pixels are then avoided because slight changes would cause noticeable variations in the area .While LSB insertion is easy to implement, it is also easily attacked. Slight modifications in the color palette and simple image manipulations will destroy the entire hidden message. Some examples of these simple image manipulations include image resizing and cropping. Applications of Steganography : Steganography is applicable to, but not limited to, the following areas. Confidential communication and secret data storing. Protection of data alteration Access control system for digital content distribution. Media Database systems. The area differs in what feature of the Steganography is utilized in each system. 1. Confidential communication and secret data storing: The â€Å"secrecy† of the embedded data is essential in this area. Historically, Steganography have been approached in this area.Steganography provides us with: (A).Potential capacity to hide the existence of confidential data. (B).Hardness of detecting the hidden (i.e., embedded ) data. (C).Strengthening of the secrecy of the encrypted data. In practice , when you use some Steganography, you must first select a vessel data according to the size of the embedding data.The vessel should be innocuous.Then,you embed the confidential data by using an embedding program (which is one component of the Steganography software ) together with some key .When extracting , you (or your party ) use an extracting program (another component) to recover the embedded data by the same key (â€Å"common key â€Å" in terms of cryptography ).In this case you need a â€Å"key negotiation â€Å" before you start communication. 2. Protection of data alteration: We take advantage of the fragility of the embedded data in this application area. The embedded data can rather be fragile than be very robust. Actually, embedded data are fragile in most steganography programs. However, this fragility opens a new direction toward an information-alteration protective system such as a Digital Certificate Document System. The most novel point among others is that no authentication bureau is needed. If it is implemented, people can send their digital certificate data to any place in the world through Internet. No one can forge, alter, nor tamper such certificate data. If forged, altered, or tampered, it is easily detected by the extraction program. 3. Access control system for digital content distribution: In this area embedded data is hidden, but is explained to publicize the content. Today, digital contents are getting more and more commonly distributed by Internet than ever before. For example, music companies release new albums on their Webpage in a free or charged manner. However, in this case, all the contents are equally distributed to the people who accessed the page. So, an ordinary Web distribution scheme is not suited for a case-by-case and selective distribution. Of course it is always possible to attach digital content to e-mail messages and send to the customers. But it will takes a lot of cost in time and labor. If you have some valuable content, which you think it is okay to provide others if they really need it, and if it is possible to upload such content on the Web in some covert manner. And if you can issue a special access key to extract the content selectively, you will be very happy about it. A steganographic scheme can help realize a this type of system. We have developed a prototype of an Access Control System for digital content distribution through Internet. The following steps explain the scheme. (1) A content owner classify his/her digital contents in a folder-by-folder manner, and embed the whole folders in some large vessel according to a steganographic method using folder access keys, and upload the embedded vessel (stego data) on his/her own Webpage. (2) On that Webpage the owner explains the contents in depth and publicize worldwide. The contact information to the owner (post mail address, e-mail address, phone number, etc.) will be posted there. (3) The owner may receive an access-request from a customer who watched that Webpage. In that case, the owner may (or may not) creates an access key and provide it to the customer (free or charged). In this mechanism the most important point is, a selective extraction is possible or not. 4. Media Database systems: In this application area of steganography secrecy is not important, but unifying two types of data into one is the most important. Media data (photo picture, movie, music, etc.) have some association with other information. A photo picture, for instance, may have the following. The title of the picture and some physical object information. The date and the time when the picture was taken. The camera and the photographers information. DIGITAL IMAGE PROCESSING BACKGROUND: Digital image processing is an area that is characterized by the need for extensive experimental work to establish the viability of the proposed solutions to a given problem. An important characteristic which is underlying in the design of image processing systems is the significant level of testing the experimentation that normally required before arriving at an acceptable solution. This characteristic implies that the ability to formulate approaches quickly prototype candidate solutions generally plays a major role in reducing the cost time required to arrive at a viable system implementation. What is DIP? An image is defined as a two-dimensional function f(x, y), where x y are the spatial coordinates, the amplitude of function â€Å"f† at any pair of coordinates (x, y) is called the intensity or gray level of the image at that particular point. When both the coordinates x and y the amplitude values of function â€Å"f† all have finite discrete quantities, then we call that image as a digital image. The field DIP refers to processing a digital image by the means of a digital computer. A image which is composed of finite number of elements,each element has particular location and value is named as a digital image.These elements are called as pixels. As we know that vision is the most advanced of our sensor,so image play the single most important role in human perception.However, humans are limited to the visual band of the EM spectrum but the imaging machines cover almost the entire EM specturm,ranging from the gamma waves to radio waves.These can operate also on the images generated by the sources that humans are not accustomed to associating with the image. There is no agreement among the authors regarding where the image processing stops and other related areas such as the image analysis and computer vision start.Sometimes a difference is made by defining image processing as a discipline in which both the input output at a process are the images. This is limiting somewhat artificial boundary.The area which is present in between the image processing and computer vision is image analysis(Understanding image). There are no clear-cut boundaries in the continuum from the image processing at one end to complete vision at the other end . However, one useful paradigm is to consider the three types of computerized processes in this continuum: low-level, mid-level, the high-level processes.The Low-level process involves the primitive operations such as image processing which is used to reduce noise, contrast enhancement image sharpening. A low- level process is characterized by the fact that both the inputs outputs are images. Tasks such as segmentation, description of an object to reduce them to a form suitable for computer processing classification of individual objects is the Mid level process on images. A mid-level process is characterized by the fact that the inputs given to the image are generally images but the outputs are attributes extracted from those images. Finally the higher- level processing involves â€Å"Making sense† of an ensemble of recognized objects, as in image an alysis at the far end of the continuum performing the cognitive functions normally associated with human vision. As already defined Digital image processing, is used successfully in broad range of areas of exceptional social economic value. What is an image? An image is defined as a two-dimensional function f(x, y), where x y are the spatial coordinates, the amplitude of function â€Å"f† at any pair of coordinates (x, y) is called the intensity or gray level of the image at that particular point. Gray scale image: A grayscale image can be defined as a function I (xylem) of the two spatial coordinates of the image plane. Assume I(x, y)as the intensity of the image at the point (x, y) on the image plane. I (xylem) takes all non-negative values assume that the image is bounded by a rectangle [0, a]  ´[0, b]I: [0, a]  ´ [0, b]  ® [0, info) Color image: It can be represented by the three functions, as R (xylem) for red, G (xylem) for green andB (xylem) for blue. An image may be continuous with respect to x and y coordinates of the plane and also in the amplitude.Converting such an image into a digital form requires the coordinates and the amplitude to be digitized.Digitizing the values of the coordinates is called sampling. Digitizing the values of the amplitude is called quantization. Coordinate convention: The result which is generated by using sampling and quantization is a matrix of real numbers.There are two principal ways to represent the digital images.Assume that an image with function f(x,y) is sampled in such a way that the resulting image has M rows and N columns.then the size of the image is MXN.The values of coordinates (xylem) are the discrete quantites.For the notational clarity and convenience, we can use the integer values for these discrete coordinates. In many of the image processing books, the image origin is defined at (xylem)=(0,0).The values of the next coordinate along with the first row of the image are (xylem)=(0,1).It is very important to keep in our mind that the notation (0,1) is used to signify the second sample along with the first row. It does not mean that these are the actual values of the physical coordinates,when the image was sampled.The figure below shows the coordinates convention. Note that the x ranges from 0 to M-1 and y ranges from 0 to N-1 in i nteger increments. The coordinate convention which is used in the toolbox to denote arrays is different from that of the preceding paragraph in two minor ways. Firstly, instead of using (xylem) in the toolbox it uses the notation (race) to indicate the rows and the columns. Note:However,the order of coordinates are the same as in the previous paragraph, in the sense the first element of the coordinate topples, (alb), refers to a row and the second one to a column. The other difference is that the origin of the coordinate system is at (r, c) = (1, 1); r ranges from 1 to M and c from 1 to N in the integer increments.The documentation of the IPT refers to the coordinates. Less frequently toolbox also employs another coordinate convention called spatial coordinates, which uses x to refer to column and y to refer to row. This is the quite opposite of our use of variables x and y. Image as Matrices: The discussion which we have done leads to the following representation for a digitized image function: f (0,0) f(0,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. f(0,N-1) f(1,0) f(1,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ f(1,N-1) f(xylem)= . . . . . . f(M-1,0) f(M-1,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ f(M-1,N-1) The right side of this equation represents a digital image by the definition. Each element which is in this array is called an image element, picture element, pixel or a pel. The terms image or pixel are used throughout the our discussions from now to denote a digital image and its elements. A digital image can be represented by a MATLAB matrix naturally as : f(1,1) f(1,2) †¦Ã¢â‚¬ ¦. f(1,N) f(2,1) f(2,2) †¦Ã¢â‚¬ ¦.. f(2,N) . . . f = . . . f(M,1) f(M,2) †¦Ã¢â‚¬ ¦.f(M,N) Where f(1,1) = f(0,0) (note use of a monoscope font to denote the MATLAB quantities). We can see clearly that the two representations are identical, except for the shift in the origin. The notation f(p ,q) denotes that the element is located in row p and the column q. For example f(6,2) denotes that the element is in the sixth row and second column of the matrix f. Typically here we use the letters M and N to denote the number of rows and columns respectively in a matrix. A 1xN matrix is known as a row vector whereas an Mx1 matrix is known as a column vector. A 11 matrix is a scalar matrix. Matrices in the MATLAB are stored in variables with different names such as A, a, RGB, real array etc All variables in Matlab must begin with a letter and can contain only letters, numerals and underscores. As noted previously,all the MATLAB quantities are written using the mono-scope characters. We use the conventional Roman or italic notation such as f(x ,y), for the mathematical expressions Reading Images: Using the function imread the images are read into the MATLAB environment. The syntax for this is: imread(‘filename) Format name Description recognized extension TIFF Tagged Image File Format .tif, .tiff JPEG Joint Photograph Experts Group .jpg, .jpeg GIF Graphics Interchange Format .gif BMP Windows Bitmap .bmp PNG Portable Network Graphics .png XWD X Window Dump .xwd Here filename is a string containing the complete image file(including applicable extensions if any).For example the command line >> f = imread (‘8. jpg); reads the JPEG (in the above table) image chestxray into image array f. Note that the use of the single quotes (‘) is to delimit the string filename. The semicolon at the end of a command line is used for suppressing output in the MATLAB. If the semicolon is not includedthen the MATLAB displays the results of the operation(s) specified only in that line. The prompt symbol(>>) says that it is the beginning of the command line, as it appears in the MATLAB command window. When in the preceding command line there is no path included in the filename, imread reads the file from current directory and if that fails then it tries to find the file in MATLAB search path. An easy way to read an image from a specified directory is to include a full or relative path to that directory in filename. For example, >> f = imread ( ‘E:myimageschestxray.jpg); This reads an image from a folder called myimages on the E: drive, whereas >> f = imread(‘ . myimageschestxray .jpg); It reads an image from myimages subdirectory of the current of the current working directory. Current directory window on the MATLAB desktop toolbar displays the MATLABs current working directory and provides a simple and a manual way to change it. The table above lists some of the most popular image/graphics formats supported by imread and imwrite. Function size gives the row and the column dimensions of an image: >> size (f) ans = 1024 * 1024 The above function is particularly useful in programming when used in the following form to automatically determine the size of an image: >>[M,N]=size(f); The syntax above returns the number of rows(M) and columns(N) present in the image. On whole the function displays the additional information about an array. For instance ,the statement >> whos f gives Name size Bytes Class F 1024*1024 1048576 unit8 array Grand total is 1048576 elements using 1048576 bytes The unit8 entry shown refers to one of the several MATLAB data classes. A semicolon at the end of a line has no effect ,so normally one is not used. Displaying Images: To diplay images on the MATLAB desktop we can use a function called imshow, which has the basic syntax: imshow(f,g) Where f is referred as an image array, and g as the number of intensity levels which are used to display it. If g is omitted here ,then by default it takes 256 levels .using the syntax imshow(f,{low high}) By using the above syntax it displays an image as black all values less than or equal to low and as white all values greater than or equal to high. The values which are in between are displayed as intermediate intensity values using the default number of levels .The final syntax is Imshow(f,[ ]) Sets the variable low to the minimum value of array f and high to its maximum value. This form of imshow is useful in displaying the images that have a low dynamic range or that have positive and negative values. Function named â€Å"pixval† is used frequently in order to display the intensity values of the individual pixels interactively. This function displays a cursor which is overlaid on an image. As and when the cursor is moved over the particular image with the mouse the coordinates of the cursor position and the corresponding intensity values are shown on the display that appears below the figure window .When working with the color images, the coordinates as well as the red, green and blue components are also displayed. If the left button of the mouse is clicked and then held pressed, pixval displays the Euclidean distance between the initial and the current cursor locations. The syntax form of interest here is Pixval which shows a cursor on the last image displayed. Clicking the button X on the cursor window turns it off. The following statements read from a disk an image called rose_512.tif extract basic information about that image and display it using imshow : >>f=imread(‘rose_512.tif); >>whos f Name Size Bytes Class F 512*512 262144 unit8 array Grand total is 262144 elements using 262144 bytes >>imshow(f) A semicolon at the end of an imshow line has no effect, so normally it is not used. If another image named g, is displayed using imshow, MATLAB replaces the image which is in the screen with the new image. To keep the first image and output the second image, we use a function figure as follows: >>figure ,imshow(g) Using the statement >>imshow(f),figure ,imshow(g) displays both the images. Keep in mind that more than one command can be written on a line ,as long as different commands are properly delimited by commas or semicolons. As mentioned, a semicolon is normally used whenever it is desired to suppress screen outputs from a command line. Suppose that we have just read an image h and find that using imshow produces an image. It is clearly understood that this image has a low dynamic range, which can be remedied for display purposes by using the statement. >>imshow(h,[ ]) WRITING IMAGES: By using the function imwrite images are written to disk ,which has the following basic syntax: Imwrite (f,filename) With the above syntax, the string which is contained in the filename must include a recognized file format extension.Alternatively, a desired format can be specified explicitly with a third input argument. >>imwrite(f,patient10_run1,tif) Or >>imwrite(f,patient10_run1.tif) In the above example the command writes f to a TIFF file named patient10_run1: If filename contains no information on the path of the file, then imwrite saves the file in the current working directory. The imwrite function can have some other parameters depending up on the e file format selected. Most of the work in the following chapter deals either with JPEG or TIFF images ,so we focus attention here on these formats. More general imwrite syntax which is applicable only to JPEG images is imwrite(f,filename.jpg,,quality,q) where q is an integer which is in between 0 and 100(the lower the number higher the degradation due to JPEG compression). For example, for q=25 the applicable syntax is >> imwrite(f,bubbles25.jpg,quality,25) The image for q=15 has false contouring which is barely visible, but this effect becomes quite applicable for q=5 and q=0.Thus, an expectable solution with some margin for error is to compress all the images with q=25.In order to get an idea of compression achieved and to obtain other image file details, we can use the function imfinfo which has syntax. Imfinfo filename Here filename implies the complete file name of the image stored in the disk. For example, >> imfinfo bubbles25.jpg outputs the following information(note that some fields contain no information in this case): Filename: ‘bubbles25.jpg FileModDate: 04-jan-2003 12:31:26 FileSize: 13849 Format: ‘jpg Format Version: ‘ ‘ Width: 714 Height: 682 Bit Depth: 8 Color Depth: ‘grayscale Format Signature: ‘ ‘ Comment: { } Where size of the file is in bytes. The number of bytes in the original image is simply corrupted by multiplying width by height by bit depth and then dividing the result by 8. The result is 486948.Dividing file size gives the compression ratio:(486948/13849)=35.16.This compression ratio was achieved. While maintaining the image quality consistent with the requirements of the appearance. In addition to obvious advantages in storage space, this reduction allows the transmission of approximately 35 times the amount of uncompressed data per unit time. The information fields which are displayed by imfinfo can be captured to a so called structure variable that can be for the subsequent computations. Using the receding example and assigning the n Image Based Steganographyusing LSB Insertion Technique Image Based Steganographyusing LSB Insertion Technique ABSTRACT Steganography is a technique used to hide the message in vessel data by embedding it. The Vessel Data which is visible is known as external information and the data which is embedded is called as internal information.The extrenal information is not much useful to the data owner. The techniques used in Steganography makes hard to detect hidden message within an image file. By this technique we are not only sending a message but also we are hiding the message. Steganography system is designed to encode and decode a secret file embedded in image file with a random Least Significant Bit(LSB) insertion technique. By using this technique the secret data are spread out among the image data in a random manner with the help of a secret key. The key generates pseudorandom numbers and identifies where and in which order hidden message is laid out. The advantage of using this method is that it includes cryptography. In cryptography, diffusion is applied to secret message. INTRODUCTION: The information communicated comes in number of forms and is used in various number of applications. In large number of these applications, it is desired that the communication has to be done in secrete. Such secret communication ranges from the obvious cases of bank transfers, corporate communications, and credit card purchases,and large percentage of everyday e-mail. Steganography is an ancient art of embedding a message in such a way that no one,except the sender and the recipient,suspects the existence of the message. Most of the newer applications use Steganography as a watermark, to protect a copy right on information. The forms of Steganography vary, but unsurprisingly, innocuous spam messages are turning up more often containing embedded text. A new transform domain technique for embedding the secret information in the integer wavelet which is transformed on a cover image is implemented here. A technique which is used to scramble a secrete or a confidential message in order to make it unreadable for a third party is known as the Cryptography.Now-a-days its commonly used in the internet communications.cryptography can hide the content of the message but it cant hide the location of the secrete message.This is how the attackers can target even an encrypted message.Water marking is the another information of hiding the digital data or a picture or musical sound.The main purpose of this watermarking information is to protect the copyright or the ownership of the data.In this technique the robustness of the embedded evidence,that can be very small, is the most important.The external information which is visible is the valuable information in the watermarking technique. steganography is a technique which is used to make the confidential information imperceptible to the human eyes by embedding the message in some dummy data such as the digital image or a speech sound.There is a research topic about the steganography known as the steganalysis.The main objective of this steganalysis is to find out the stego file among the given files.It is a technique which is used to detect the suspicious image or sound file which is embedded with the crime related information.So,we need to make a sniffer-dog-program to break the steganography.However,it is too difficult to make a program that really works. All the traditional steganography techniques have very limited information-hiding capacity.They can hide only 10% (or less) of the data amounts of the vessel.This is because the principle of those techniques which were either to replace a special part of the frequency components of the vessel image, or to replace all the least significant bits which are present in a multivalued image with the secrete information.In the new steganography which we are using uses an image as the vesel data, and we need to embed the secrete information in to the bit planes of the vessel.The percentage of information hiding capacity of a true color image is around 50.All the noise-like regions in the bit planes of the vessel image can be replaced with the secret data without deteriorating the quality of the image,which is known as BPCS-Steganography, which stands for Bit-Plane Complexity Segmentation Steganography. BACKGROUND HISTORY: The word Steganography is of Greek origin and means â€Å"covered, or hidden writing†. Its ancient origins can be traced back to 440BC. THEORY: Steganography is a technique which is used now a days to make confidential information imperceptible to the human eyes by embedding it in to some innocent looking vessel data or a dummy data such as a digital image or a speech sound.In a multi bit data structure a typical vessel is defined as a color image having Red,Green and blue components in it.By using a special extracting program and a key the embedded information can be extracted,the technique of steganography is totally different from file deception or file camouflage techniques. A technique to hide the secrete data in a computer file which almost looks like a steganography is known as a file deception or file camouflage.But actually, it is defined as a trick which is used to disguise a secret-data-added file as a normal file.This can be done as most of the computer file formats have some dont-care portion in one file.For instance if we take some file formats as jpeg,mpeg3 or some word file these looks like the original image,sound or document respectively on the computer.Some of them could have misunderstood that such a trick is a type of Steganography.However,such files can have an extra lengthy file sizes, and they can be easily detected by most of the computer engineers.So, by this we can understand that the file deception is totally different from that of the steganographic techinque which we are discussing here. Many of the Steganography software which is in the market today is based on the file decepetion.If we find a steganography program that increases the output file size just by the amount we have embedded, then the program is obviously a file deception.If there is some secrete data then we should encrypt in such a way that it is not readable for the third party.A solution to Keep secrete information very safe is known as Data Encryption.It is totally based on scrambling the data by using some type of the secrete key. However,encrypting the data will draw more attention of the people who have not encrypted the data.So, it is very to the owner to know whether the data is encrypted or not.By, this we can know that the encrypting is not enough. There is another solution which is known steganography. There are two types of data in steganography, one is the secret data that is very valuable and the other is a type of media data vessel or carrier or dummy data.Vessel data is essential, but it is not so valuable.It is defined as the data in which the valuable data is embedded. The data which is already embedded in the vessel data is called stego data.By using the stego data we can extract the secret or the valuable data. For embedding and extracting the data we need a special program and a key. A typical vessel is an image data with Red, Green, and Blue color components present in it in a 24 bits pixel structure. The illustration below shows a general scheme of Steganography. Steganography is a technique which is used to hide secret data by embedding it in some innocent looking media data like Mona lisa in the above picture.The data which is embedded is very safe because Steganography hides both the content and the location of the secret information.In the media data there are many different methods to embed the data.It is highly impossible to detect which method is used for embedding the data.Steganography can co-operate with cryptography in the sense that it can embed the encrypted secret data and make it much safer. The most important point in the steganography technique is that the stego data does not have any evidence that some extra data is embedded there.In other way, the vessel data and the stego data must be very similar.The user of the steganography should discard the original vessel data after embedding,so that no one can compare the stego and the original data. It is also important that the capacity for embedding the data is large.As it is larger it is better.Of all the currently available steganography methods the BPCS method is the best. LEAST SIGNIFICANT BIT INSERTION One of the most common techniques used in Steganographytoday is called least significant bit (LSB) insertion. This method is exactly what it sounds like; the least significant bits of the cover-image are altered so that they form the embeddedinformation. The following example shows how the letter A can be hidden in the first eight bytes of three pixels in a 24-bit image. Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A: 01000001 Result: (00100110 11101001 11001000) (00100110 11001000 11101000) (11001000 00100111 11101001) The three underlined bits are the only three bits that were actually altered. LSB insertion requires on average that only half the bits in an image be changed. Since the 8-bit letter A only requires eight bytes to hide it in, the ninth byte of the three pixels can be used to begin hiding the next character of the hidden message. A slight variation of this technique allows for embedding the message in two or more of the least significant bits per byte. This increases the hidden information capacity of the cover-object, but the cover-object is degraded more, and therefore it is more detectable. Other variations on this technique include ensuring that statistical changes in the image do not occur. Some intelligent software also checks for areas that are made up of one solid color. Changes in these pixels are then avoided because slight changes would cause noticeable variations in the area .While LSB insertion is easy to implement, it is also easily attacked. Slight modifications in the color palette and simple image manipulations will destroy the entire hidden message. Some examples of these simple image manipulations include image resizing and cropping. Applications of Steganography : Steganography is applicable to, but not limited to, the following areas. Confidential communication and secret data storing. Protection of data alteration Access control system for digital content distribution. Media Database systems. The area differs in what feature of the Steganography is utilized in each system. 1. Confidential communication and secret data storing: The â€Å"secrecy† of the embedded data is essential in this area. Historically, Steganography have been approached in this area.Steganography provides us with: (A).Potential capacity to hide the existence of confidential data. (B).Hardness of detecting the hidden (i.e., embedded ) data. (C).Strengthening of the secrecy of the encrypted data. In practice , when you use some Steganography, you must first select a vessel data according to the size of the embedding data.The vessel should be innocuous.Then,you embed the confidential data by using an embedding program (which is one component of the Steganography software ) together with some key .When extracting , you (or your party ) use an extracting program (another component) to recover the embedded data by the same key (â€Å"common key â€Å" in terms of cryptography ).In this case you need a â€Å"key negotiation â€Å" before you start communication. 2. Protection of data alteration: We take advantage of the fragility of the embedded data in this application area. The embedded data can rather be fragile than be very robust. Actually, embedded data are fragile in most steganography programs. However, this fragility opens a new direction toward an information-alteration protective system such as a Digital Certificate Document System. The most novel point among others is that no authentication bureau is needed. If it is implemented, people can send their digital certificate data to any place in the world through Internet. No one can forge, alter, nor tamper such certificate data. If forged, altered, or tampered, it is easily detected by the extraction program. 3. Access control system for digital content distribution: In this area embedded data is hidden, but is explained to publicize the content. Today, digital contents are getting more and more commonly distributed by Internet than ever before. For example, music companies release new albums on their Webpage in a free or charged manner. However, in this case, all the contents are equally distributed to the people who accessed the page. So, an ordinary Web distribution scheme is not suited for a case-by-case and selective distribution. Of course it is always possible to attach digital content to e-mail messages and send to the customers. But it will takes a lot of cost in time and labor. If you have some valuable content, which you think it is okay to provide others if they really need it, and if it is possible to upload such content on the Web in some covert manner. And if you can issue a special access key to extract the content selectively, you will be very happy about it. A steganographic scheme can help realize a this type of system. We have developed a prototype of an Access Control System for digital content distribution through Internet. The following steps explain the scheme. (1) A content owner classify his/her digital contents in a folder-by-folder manner, and embed the whole folders in some large vessel according to a steganographic method using folder access keys, and upload the embedded vessel (stego data) on his/her own Webpage. (2) On that Webpage the owner explains the contents in depth and publicize worldwide. The contact information to the owner (post mail address, e-mail address, phone number, etc.) will be posted there. (3) The owner may receive an access-request from a customer who watched that Webpage. In that case, the owner may (or may not) creates an access key and provide it to the customer (free or charged). In this mechanism the most important point is, a selective extraction is possible or not. 4. Media Database systems: In this application area of steganography secrecy is not important, but unifying two types of data into one is the most important. Media data (photo picture, movie, music, etc.) have some association with other information. A photo picture, for instance, may have the following. The title of the picture and some physical object information. The date and the time when the picture was taken. The camera and the photographers information. DIGITAL IMAGE PROCESSING BACKGROUND: Digital image processing is an area that is characterized by the need for extensive experimental work to establish the viability of the proposed solutions to a given problem. An important characteristic which is underlying in the design of image processing systems is the significant level of testing the experimentation that normally required before arriving at an acceptable solution. This characteristic implies that the ability to formulate approaches quickly prototype candidate solutions generally plays a major role in reducing the cost time required to arrive at a viable system implementation. What is DIP? An image is defined as a two-dimensional function f(x, y), where x y are the spatial coordinates, the amplitude of function â€Å"f† at any pair of coordinates (x, y) is called the intensity or gray level of the image at that particular point. When both the coordinates x and y the amplitude values of function â€Å"f† all have finite discrete quantities, then we call that image as a digital image. The field DIP refers to processing a digital image by the means of a digital computer. A image which is composed of finite number of elements,each element has particular location and value is named as a digital image.These elements are called as pixels. As we know that vision is the most advanced of our sensor,so image play the single most important role in human perception.However, humans are limited to the visual band of the EM spectrum but the imaging machines cover almost the entire EM specturm,ranging from the gamma waves to radio waves.These can operate also on the images generated by the sources that humans are not accustomed to associating with the image. There is no agreement among the authors regarding where the image processing stops and other related areas such as the image analysis and computer vision start.Sometimes a difference is made by defining image processing as a discipline in which both the input output at a process are the images. This is limiting somewhat artificial boundary.The area which is present in between the image processing and computer vision is image analysis(Understanding image). There are no clear-cut boundaries in the continuum from the image processing at one end to complete vision at the other end . However, one useful paradigm is to consider the three types of computerized processes in this continuum: low-level, mid-level, the high-level processes.The Low-level process involves the primitive operations such as image processing which is used to reduce noise, contrast enhancement image sharpening. A low- level process is characterized by the fact that both the inputs outputs are images. Tasks such as segmentation, description of an object to reduce them to a form suitable for computer processing classification of individual objects is the Mid level process on images. A mid-level process is characterized by the fact that the inputs given to the image are generally images but the outputs are attributes extracted from those images. Finally the higher- level processing involves â€Å"Making sense† of an ensemble of recognized objects, as in image an alysis at the far end of the continuum performing the cognitive functions normally associated with human vision. As already defined Digital image processing, is used successfully in broad range of areas of exceptional social economic value. What is an image? An image is defined as a two-dimensional function f(x, y), where x y are the spatial coordinates, the amplitude of function â€Å"f† at any pair of coordinates (x, y) is called the intensity or gray level of the image at that particular point. Gray scale image: A grayscale image can be defined as a function I (xylem) of the two spatial coordinates of the image plane. Assume I(x, y)as the intensity of the image at the point (x, y) on the image plane. I (xylem) takes all non-negative values assume that the image is bounded by a rectangle [0, a]  ´[0, b]I: [0, a]  ´ [0, b]  ® [0, info) Color image: It can be represented by the three functions, as R (xylem) for red, G (xylem) for green andB (xylem) for blue. An image may be continuous with respect to x and y coordinates of the plane and also in the amplitude.Converting such an image into a digital form requires the coordinates and the amplitude to be digitized.Digitizing the values of the coordinates is called sampling. Digitizing the values of the amplitude is called quantization. Coordinate convention: The result which is generated by using sampling and quantization is a matrix of real numbers.There are two principal ways to represent the digital images.Assume that an image with function f(x,y) is sampled in such a way that the resulting image has M rows and N columns.then the size of the image is MXN.The values of coordinates (xylem) are the discrete quantites.For the notational clarity and convenience, we can use the integer values for these discrete coordinates. In many of the image processing books, the image origin is defined at (xylem)=(0,0).The values of the next coordinate along with the first row of the image are (xylem)=(0,1).It is very important to keep in our mind that the notation (0,1) is used to signify the second sample along with the first row. It does not mean that these are the actual values of the physical coordinates,when the image was sampled.The figure below shows the coordinates convention. Note that the x ranges from 0 to M-1 and y ranges from 0 to N-1 in i nteger increments. The coordinate convention which is used in the toolbox to denote arrays is different from that of the preceding paragraph in two minor ways. Firstly, instead of using (xylem) in the toolbox it uses the notation (race) to indicate the rows and the columns. Note:However,the order of coordinates are the same as in the previous paragraph, in the sense the first element of the coordinate topples, (alb), refers to a row and the second one to a column. The other difference is that the origin of the coordinate system is at (r, c) = (1, 1); r ranges from 1 to M and c from 1 to N in the integer increments.The documentation of the IPT refers to the coordinates. Less frequently toolbox also employs another coordinate convention called spatial coordinates, which uses x to refer to column and y to refer to row. This is the quite opposite of our use of variables x and y. Image as Matrices: The discussion which we have done leads to the following representation for a digitized image function: f (0,0) f(0,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. f(0,N-1) f(1,0) f(1,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ f(1,N-1) f(xylem)= . . . . . . f(M-1,0) f(M-1,1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ f(M-1,N-1) The right side of this equation represents a digital image by the definition. Each element which is in this array is called an image element, picture element, pixel or a pel. The terms image or pixel are used throughout the our discussions from now to denote a digital image and its elements. A digital image can be represented by a MATLAB matrix naturally as : f(1,1) f(1,2) †¦Ã¢â‚¬ ¦. f(1,N) f(2,1) f(2,2) †¦Ã¢â‚¬ ¦.. f(2,N) . . . f = . . . f(M,1) f(M,2) †¦Ã¢â‚¬ ¦.f(M,N) Where f(1,1) = f(0,0) (note use of a monoscope font to denote the MATLAB quantities). We can see clearly that the two representations are identical, except for the shift in the origin. The notation f(p ,q) denotes that the element is located in row p and the column q. For example f(6,2) denotes that the element is in the sixth row and second column of the matrix f. Typically here we use the letters M and N to denote the number of rows and columns respectively in a matrix. A 1xN matrix is known as a row vector whereas an Mx1 matrix is known as a column vector. A 11 matrix is a scalar matrix. Matrices in the MATLAB are stored in variables with different names such as A, a, RGB, real array etc All variables in Matlab must begin with a letter and can contain only letters, numerals and underscores. As noted previously,all the MATLAB quantities are written using the mono-scope characters. We use the conventional Roman or italic notation such as f(x ,y), for the mathematical expressions Reading Images: Using the function imread the images are read into the MATLAB environment. The syntax for this is: imread(‘filename) Format name Description recognized extension TIFF Tagged Image File Format .tif, .tiff JPEG Joint Photograph Experts Group .jpg, .jpeg GIF Graphics Interchange Format .gif BMP Windows Bitmap .bmp PNG Portable Network Graphics .png XWD X Window Dump .xwd Here filename is a string containing the complete image file(including applicable extensions if any).For example the command line >> f = imread (‘8. jpg); reads the JPEG (in the above table) image chestxray into image array f. Note that the use of the single quotes (‘) is to delimit the string filename. The semicolon at the end of a command line is used for suppressing output in the MATLAB. If the semicolon is not includedthen the MATLAB displays the results of the operation(s) specified only in that line. The prompt symbol(>>) says that it is the beginning of the command line, as it appears in the MATLAB command window. When in the preceding command line there is no path included in the filename, imread reads the file from current directory and if that fails then it tries to find the file in MATLAB search path. An easy way to read an image from a specified directory is to include a full or relative path to that directory in filename. For example, >> f = imread ( ‘E:myimageschestxray.jpg); This reads an image from a folder called myimages on the E: drive, whereas >> f = imread(‘ . myimageschestxray .jpg); It reads an image from myimages subdirectory of the current of the current working directory. Current directory window on the MATLAB desktop toolbar displays the MATLABs current working directory and provides a simple and a manual way to change it. The table above lists some of the most popular image/graphics formats supported by imread and imwrite. Function size gives the row and the column dimensions of an image: >> size (f) ans = 1024 * 1024 The above function is particularly useful in programming when used in the following form to automatically determine the size of an image: >>[M,N]=size(f); The syntax above returns the number of rows(M) and columns(N) present in the image. On whole the function displays the additional information about an array. For instance ,the statement >> whos f gives Name size Bytes Class F 1024*1024 1048576 unit8 array Grand total is 1048576 elements using 1048576 bytes The unit8 entry shown refers to one of the several MATLAB data classes. A semicolon at the end of a line has no effect ,so normally one is not used. Displaying Images: To diplay images on the MATLAB desktop we can use a function called imshow, which has the basic syntax: imshow(f,g) Where f is referred as an image array, and g as the number of intensity levels which are used to display it. If g is omitted here ,then by default it takes 256 levels .using the syntax imshow(f,{low high}) By using the above syntax it displays an image as black all values less than or equal to low and as white all values greater than or equal to high. The values which are in between are displayed as intermediate intensity values using the default number of levels .The final syntax is Imshow(f,[ ]) Sets the variable low to the minimum value of array f and high to its maximum value. This form of imshow is useful in displaying the images that have a low dynamic range or that have positive and negative values. Function named â€Å"pixval† is used frequently in order to display the intensity values of the individual pixels interactively. This function displays a cursor which is overlaid on an image. As and when the cursor is moved over the particular image with the mouse the coordinates of the cursor position and the corresponding intensity values are shown on the display that appears below the figure window .When working with the color images, the coordinates as well as the red, green and blue components are also displayed. If the left button of the mouse is clicked and then held pressed, pixval displays the Euclidean distance between the initial and the current cursor locations. The syntax form of interest here is Pixval which shows a cursor on the last image displayed. Clicking the button X on the cursor window turns it off. The following statements read from a disk an image called rose_512.tif extract basic information about that image and display it using imshow : >>f=imread(‘rose_512.tif); >>whos f Name Size Bytes Class F 512*512 262144 unit8 array Grand total is 262144 elements using 262144 bytes >>imshow(f) A semicolon at the end of an imshow line has no effect, so normally it is not used. If another image named g, is displayed using imshow, MATLAB replaces the image which is in the screen with the new image. To keep the first image and output the second image, we use a function figure as follows: >>figure ,imshow(g) Using the statement >>imshow(f),figure ,imshow(g) displays both the images. Keep in mind that more than one command can be written on a line ,as long as different commands are properly delimited by commas or semicolons. As mentioned, a semicolon is normally used whenever it is desired to suppress screen outputs from a command line. Suppose that we have just read an image h and find that using imshow produces an image. It is clearly understood that this image has a low dynamic range, which can be remedied for display purposes by using the statement. >>imshow(h,[ ]) WRITING IMAGES: By using the function imwrite images are written to disk ,which has the following basic syntax: Imwrite (f,filename) With the above syntax, the string which is contained in the filename must include a recognized file format extension.Alternatively, a desired format can be specified explicitly with a third input argument. >>imwrite(f,patient10_run1,tif) Or >>imwrite(f,patient10_run1.tif) In the above example the command writes f to a TIFF file named patient10_run1: If filename contains no information on the path of the file, then imwrite saves the file in the current working directory. The imwrite function can have some other parameters depending up on the e file format selected. Most of the work in the following chapter deals either with JPEG or TIFF images ,so we focus attention here on these formats. More general imwrite syntax which is applicable only to JPEG images is imwrite(f,filename.jpg,,quality,q) where q is an integer which is in between 0 and 100(the lower the number higher the degradation due to JPEG compression). For example, for q=25 the applicable syntax is >> imwrite(f,bubbles25.jpg,quality,25) The image for q=15 has false contouring which is barely visible, but this effect becomes quite applicable for q=5 and q=0.Thus, an expectable solution with some margin for error is to compress all the images with q=25.In order to get an idea of compression achieved and to obtain other image file details, we can use the function imfinfo which has syntax. Imfinfo filename Here filename implies the complete file name of the image stored in the disk. For example, >> imfinfo bubbles25.jpg outputs the following information(note that some fields contain no information in this case): Filename: ‘bubbles25.jpg FileModDate: 04-jan-2003 12:31:26 FileSize: 13849 Format: ‘jpg Format Version: ‘ ‘ Width: 714 Height: 682 Bit Depth: 8 Color Depth: ‘grayscale Format Signature: ‘ ‘ Comment: { } Where size of the file is in bytes. The number of bytes in the original image is simply corrupted by multiplying width by height by bit depth and then dividing the result by 8. The result is 486948.Dividing file size gives the compression ratio:(486948/13849)=35.16.This compression ratio was achieved. While maintaining the image quality consistent with the requirements of the appearance. In addition to obvious advantages in storage space, this reduction allows the transmission of approximately 35 times the amount of uncompressed data per unit time. The information fields which are displayed by imfinfo can be captured to a so called structure variable that can be for the subsequent computations. Using the receding example and assigning the n