Tuesday, January 28, 2020

Implementation Of Steganography For Audio File Format Computer Science Essay

Implementation Of Steganography For Audio File Format Computer Science Essay Abstract The project entitled Audio Steganography is the application developed to embed an audio file in another audio signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography. Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of Steganography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of Steganography. The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted. 1. Introduction 1.1Synopsis 2 .System configuration 2.1 Software requirements 2.2 Hardware requirements 3. System Analysis 3.1 Feasibility study 3.2 Existing system 3.3 Proposed system 3.4 Analysis report 4. System design 4.1 System description 4.2 Functional requirements 5. UML Diagrams 6. Implementation 7. Testing and Debugging 8. Output Screens 9. Conclusion 10. Bibliography Introduction 1. Introduction Synopsis Encryption of data plays a vital role in the real time environment to keep the data out of reach of unauthorized people, such that it is not altered and tampered and sending the in audio format is most secured way to transfer the data through the network. The Audio Steganography is software, which tries to alter the originality of the file into some encrypted form and embed the file into an audio file. Then the users can easily and securely carry the compressed data wherever he wants. The major task of the Audio Steganography is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. The Application should have a reversal process as of which should be in a position to de embed the data file from audio file and decrypt the data to its original format upon the proper request by the user. While the Encryption and Decryption is done the app lication should confirm the standards of authentication and authorization of the user. The Entire application should strive to achieve a user friendly Graphical User Interface, which need to be in a self-learning mode for the end user. The System Should provide all the functional standards of proper navigation with in the environment, which makes it possible for the users to have a smooth flow while working under the environment. The Overall system should provide proper menu based navigation for easier navigation and operation. The Application should be designed in such a way that, as soon as it starts create a Buffer and associate this buffer to some homogeneous data environment, the application should ask the user for the Encryption Key details and should start its functionality upon the logistics that are provided with in this key. The key should be designed in such a way that it prevents the unauthorized persons from stealing the information at any point of time. This is some part of securing the data from third party people. And the other way of securing the data is using Steganography in which embedding the encrypted file in to a audio file. If any one track that file they only see the audio file not the data. The application of De-embedding, Decryption and de compress should be a reverse process at the other end and should be translated only when the receiver of the data applies the proper reversal key. The Decryption process should have a log-based methodology that will take care of any errors that may be encountered while the system is under utilization and should record all those events, which are above the general standards of security. This system basically uses the Blowfish encryption algorithm to encrypt the passwords. This algorithm is a 64-bit block cipher with a variable length key. This algorithm has been used because it requires less memory. It uses only simple operations, therefore it is easy to implement. 1) Blowfish Algorithm Implementation Module 2) Steganography Module 3) Compression Module 4) GUI Module System Configuration 2. System Configuration 2.1 Software Requirements: Operating System Windows NT/2000 (Client/Server). 2.2 Hardware Requirements: Software requirements Front-end: Java J2SDK 1.5, Swings. System Configuration Pentium III Processor with 700 MHz Clock Speed 256 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card. System Analysis Feasibility Study Fact Finding Techniques In this system we are going to develop a facility to a user that he will not face any difficulty at the time of usage like data missing, one way contacts, one view contacts. As we are developing this system with an encoding technique of images the user will not be bothered on which camera support is using, as well in sound. As we are maintaining one technique of speed controlling the frame relay will not be a problem for the user like over speed display, hanged display. 3.1 Feasibility Study A feasibility study is a high-level capsule version of the entire System analysis and Design Process. The study begins by classifying the problem definition. Feasibility is to determine if its worth doing. Once an acceptance problem definition has been generated, the analyst develops a logical model of the system. A search for alternatives is analyzed carefully. There are 3 parts in feasibility study. 3.1.1 Operational Feasibility: Question that going to be asked are Will the system be used if it developed and implemented. If there was sufficient support for the project from the management and from the users. Have the users been involved in planning and development of the Project. Will the system produce poorer result in any respect or area? This system can be implemented in the organization because there is adequate support from management and users. Being developed in Java so that the necessary operations are carried out automatically. 3.1.2 Technical feasibility Does the necessary technology exist to do what is been suggested Does the proposed equipment have the technical capacity for using the new system? Are there technical guarantees of accuracy, reliability and data security? The project is developed on Pentium IV with 256 MB RAM. The environment required in the development of system is any windows platform The observer pattern along with factory pattern will update the results eventually The language used in the development is JAVA 1.5 Windows Environment 3.1.3 Financial and Economical Feasibility The system developed and installed will be good benefit to the organization. The system will be developed and operated in the existing hardware and software infrastructure. So there is no need of additional hardware and software for the system. Existing and Proposed System 3.2 Existing System In the traditional architecture there existed only the server and the client. In most cases the server was only a data base server that can only offer data. Therefore majority of the business logic i.e., validations etc. had to be placed on the clients system. This makes maintenance expensive. Such clients are called as fat clients. This also means that every client has to be trained as to how to use the application and even the security in the communication is also the factor to be considered. Since the actual processing of the data takes place on the remote client the data has to be transported over the network, which requires a secured format of the transfer method. How to conduct transactions is to be controlled by the client and advanced techniques implementing the cryptographic standards in the executing the data transfer transactions. Present day transactions are considered to be un-trusted in terms of security, i.e. they are relatively easy to be hacked. And also we have to consider the transfer the large amount of data through the network will give errors while transferring. Nevertheless, sensitive data transfer is to be carried out even if there is lack of an alternative. Network security in the existing system is the motivation factor for a new system with higher-level security standards for the information exchange. 3.3 Proposed System The proposed system should have the following features. The transactions should take place in a secured format between various clients in the network. It provides flexibility to the user to transfer the data through the network very easily by compressing the large amount of file. It should also identify the user and provide the communication according to the prescribed level of security with transfer of the file requested and run the required process at the server if necessary. In this system the data will be send through the network as a audio file. The user who received the file will do the operations like de embedding, decryption, and decompress in their level of hierarchy etc. Analysis Report 3.4 System Analysis People for long time have tried to sort out the problems faced in the general digital communication system but as these problems exist even now, a secured and easy transfer system evolved and came to be known as the Encryption and Decryption of the data and converting the file to audio format to be transferred using the cryptographic standards and Steganography. The advantages of this Audio Steganography are: High level Security Cost effective transfer In this fast growing world where every individual free to access the information on the network and even the people are technically sound enough in hacking the information from the network for various reasons. The organizations have the process of information transfer in and out of their network at various levels, which need the process to be in a secured format for the organizational benefits. If the organizations have the Audio Steganography System, then each employee can send the information to any other registered employee and thus can establish communication. The audio file that the employee sends reaches the destinations within no time in an audio file format where the end user need to de embed the file, decrypt it and de compress and use for the purpose. The various branches of the organization can be connected to a single host server and then an employee of one branch can send files to the employee of another branch through the server but in a secured format. System Design 4. System Design The System Design includes the maintenance of the secure file transfer service with a prescribed encryption format and split at the interested level of encryption, and embed process and the receiving service at the other end with de-embed and decryption process. The design also includes the provision of facility to the user to manipulate the concerned information according to his personal use and communication process. The design also needs to provide the communication channel to the user to communicate with other registered users through the mailing services in a reliable and secured format. Authorization and authentication services are preferred most for this purpose. The System Design includes the maintenance authorization services, File and directory services with a prescribed encryption format at the interested level of encryption and the receiving service at the other end with decryption process. The design also includes the provision of facility to the user to manipulate the concerned information according to his personal use. The design of Audio Steganography system, basically involve the interface architecture, Security services, and communication system. In the interface design we involve with the design of the user interface with GUI standards and a proper navigation system where the user need to enter into the flow of transactions authorization services are check and further access is provided into the system. Then the user needs to select into the operations provided through the GUI where compression, encryption, embedding, de-embedding, Decryption, Decompressing and sending of the file, General information and exit are provided. Here the Encryption and decryption and services are provided connecting to the security services module where the encryption and decryption are carried out using the cryptographic standards implementing the Blowfish algorithm. After the compression process is completed the user is selecting the file for encryption. After encryption of the file is completed the user is to select the file for embedding it to the audio file and sending through the network to the desired user by specifying the targeted users system IP address in the panel designed. Then the system gets connected to the targeted user and delivers the file in audio format after which the user working with the Audio Steganography software should go for the option De-Embed Files and decrypt the file by selecting the file path by which the file gets decrypted and decompress the file and is viewed on the system. 4.1 System Description The Audio Steganography system is designed basically in four different modules they are GUI module, Compression Module, Security System module, Steganography Module, Connection Manager Module. GUI Module basically deals with the design of the interface which include the service of providing the user with the flexibility of accessing the file system and selecting the required file for the transfer. It should also provide the system to collect the information from the user to check the authorization in providing the access to the file system. The interface is also to consider the design, which include the services of sending and receiving of the files with encryption and decryption standards. The Compression module basically deals with the compress and decompresses the file, which is used to send the file very easily which reduces the uploading time. Security implementation module considers the implementation of the encryptions and decryption standards in transfer the files from one system to another in a distributed environment. The system design, even need to support the user to select the level of encryption he/she needs to perform depending upon the file to be transferred. The basic algorithm used in this purpose is the Blowfish where the user can enter the key depending upon level encryption he is interested. The Connection Manager deals with the architecture, which supports the system to identify the end users for the communication and establish the communication. Connection and disconnection of the communication channel between the users for the access of file system and file transfer services. The Connection Manager receives the IP address to be connected and the file to be sent then establishes the connection and transfers the file. Functional Requirements: The Modules of the system are: 1) Blowfish Algorithm Implementation Module 2) Steganography Module 3) Compression Module 4) GUI Module Blowfish Algorithm: Blowfish is a block cipher that encrypts data in 8-byte blocks. The algorithm consists of two parts: a key-expansion part and a data-encryption part. Key expansion converts a variable-length key of at most 56 bytes (448 bits) into several sub key arrays totaling 4168 bytes. Blowfish has 16 rounds. Each round consists of a key-dependent permutation, and a key- and data-dependent substitution. All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookups per round. Sub keys: Blowfish uses a large number of sub keys. These keys must be precomputed before any data encryption or decryption. The P-array consists of 18 32-bit sub keys: P1, P2,, P18. There are also four 32-bit S-boxes with 256 entries each: S1,0, S1,1,, S1,255; S2,0, S2,1,..,, S2,255; S3,0, S3,1,, S3,255; S4,0, S4,1,..,, S4,255. Encryption and Decryption: Blowfish has 16 rounds. The input is a 64-bit data element, x. Divide x into two 32-bit halves: XL, xR. Then, for i = 1 to 16: XL = XL XOR Pi xR = F (XL) XOR xR Swap XL and xR After the sixteenth round, swap xL and xR again to undo the last swap. Then, xR = xR XOR P17 and XL = XL XOR P18. Finally, recombine xL and xR to get the cipher text. Function F looks like this: Divide XL into four eight-bit quarters: a, b, c, and d. Then, F (xL) = ((S1, a + S2, b mod 232) XOR S3, c) + S4, d mod 232. Decryption is exactly the same as encryption, except that P1, P2, P18 are used in the reverse order. Generating the Sub keys: The sub keys are calculated using the Blowfish algorithm: 1. Initialize first the P-array and then the four S-boxes, in order, with a fixed string. This string consists of the hexadecimal digits of pi (less the initial 3): P1 = 0x243f6a88, P2 = 0x85a308d3, P3 = 0x13198a2e, P4 = 0x03707344, etc. 2. XOR P1 with the first 32 bits of the key, XOR P2 with the second 32-bits of the key, and so on for all bits of the key (possibly up to P14). Repeatedly cycle through the key bits until the entire P-array has been XORed with key bits. (For every short key, there is at least one equivalent longer key; for example, if A is a 64-bit key, then AA, AAA, etc., are equivalent keys.) 3. Encrypt the all-zero string with the Blowfish algorithm, using the sub keys described in steps (1) and (2). 4. Replace P1 and P2 with the output of step (3). 5. Encrypt the output of step (3) using the Blowfish algorithm with the modified sub keys. 6. Replace P3 and P4 with the output of step (5). 7. Continue the process, replacing all entries of the P array, and then all four S-boxes in order, with the output of the continuously changing Blowfish algorithm. In total, 521 iterations are required to generate all required sub keys. Applications can store the sub keys rather than execute this derivation process multiple times. Steganography: Steganography is art of hiding information in ways that prevent the detection of hidden messages. Steganography derived from Greek, literally means Covered Writing. It includes a vast array of secret communications methods that conceal the messages very existence. Theses methods are including invisible inks, microdots, character arrangement, digital signature, and covert channels and spread spectrum communications. In this technology, the end user identifies an audio file, which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and audio file are sent. Prior to this the data is embedded into the audio and then sent. The image if hacked or interpreted by a third party user will open up in any audio player but not displaying the data. This protects the data from being invisible and hence is secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the audio file. The module deals with identifying the hidden data in the audio file. The module receives the audio file that is then browsed to remove the associated data. The data is then removed from the audio file. Compression and Decompression: Compression reduces the average code length used to represent the symbols of an alphabet. Symbols of the source alphabet, which occur frequently, are assigned with short length codes. The general strategy is to allow the code length to vary from character to character and to ensure that the frequently occurring character has shorter codes. We use utility package for compression. This technique maps arbitrary input into printable character output. The form of encoding has the following relevant characteristics. The range of the function is a character set that is universally re-presentable at all sites, not a specific binary encoding of that character set. Thus, the characters themselves can be encoded into whatever form is needed by a specific system. For instance, the character E is represented in ASCII system as a hexadecimal 45 and in EDCDIC- based system as hexadecimal- c5. The character set consists of 65 printable characters, one of which is used for padding. With 2^6 = 64 available characters, each character can be used to represent 6 bits of input. No control characters are included in the set. Thus, the message encoded in Radix-64 can traverse mail-handling system. That scans the data stream for control characters. The hyphen character - is not included. Graphical User Interface: This project is developed using graphics in java swings. The options available are displayed in a menu format, like in an online editor. Clicking on any particular menu item through mouse or through keyboard a dropdown menu is displayed, listing all the options available under that menu item and the user can select the needed actions according to their wish. UML Diagrams Use case Diagram Sender: Receiver: Use case Description: Use case name Compress Participating actors Sender Flow of events The user selected file will be compressed Entry Condition User must select the file. Exit condition Successful or Un Successful Compression of file. Quality Requirements Display proper error messages while compression. Use case name De Compress Participating actors Receiver Flow of events The user selected file will be de compressed Entry Condition User must select the file. Exit condition Successful or Un Successful De-Compression of file. Quality Requirements Display proper error messages while de-compression. Use case name Encrypt Participating actors Sender Flow of events The user-selected file will be encrypted with a given key. Entry Condition User must select the file and must give the key for encryption. Exit condition Successful or Un Successful Encryption of file. Quality Requirements Display proper error messages while Encryption. Use case name Decrypt Participating actors Receiver Flow of events The user-selected file will be decrypted with a proper key. Entry Condition User must select the file and must give the key for decryption. Exit condition Successful or Un Successful Decryption of file. QualityRequirements Display proper error messages while Decryption. Use case name Embed Participating actors Sender Flow of events The user-selected encrypted file will be embedding with selected audio file. Entry Condition User must select the one encrypted file and one audio file for embedding. Exit condition Successful or Un Successful Embedding process. Quality Requirements Display proper error messages while Embedding two files. Use case name De-Embed Participating actors Receiver Flow of events The user-selected audio file will be de-embedding to encrypted file. Entry Condition User must select the audio file for de-embedding. Exit condition Successful or Un Successful De-embedding of file. Quality Requirements Display proper error messages while De-embedding. Use case name Send File Participating actors Sender Flow of events The user-selected file will be send to the given host. Entry Condition User must select the file to send and must know the IP address of the destination host. Exit condition Successful or Un Successful sending of file to the destination host. Quality Requirements Display proper error messages while Sending the file. Class Diagram: Sequence Diagrams Sender: Receiver: Activity Diagram for Compression, Encryption, Embedding Sending Encryption System Sender Activity Diagram for De-Embed, Decrypt Decompress Receiver Decryption System Software Overview FEATURES OF THE LANGUAGE USED About Java Initially the language was called as oak but it was renamed as Java in 1995. The primary motivation of this language was the need for a platform-independent (i.e., architecture neutral) language that could be used to create software to be embedded in various consumer electronic devices. Java is a programmers language. Java is cohesive and consistent. Except for those constraints imposed by the Internet environment, Java gives the programmer, full control. Finally, Java is to Internet programming where C was to system programming. Applications and Applets An application is a program that runs on our Computer under the operating system of that computer. It is more or less like one creating using C or C++. Javas ability to create Applets makes it important. An Applet is an application designed, to be transmitted over the Internet and executed by a Java -compatible web browser. An applet is actually a tiny Java program, dynamically downloaded across the network, just like an image. But the difference is, it is an intelligent program, not just a media file. It can react to the user input and dynamically change. FEATURES OF JAVA Security Every time you that you download a normal program, you are risking a viral infection. Prior to Java, most users did not download executable programs frequently, and those who did scanned them for viruses prior to execution. Most users still worried about the possibility of infecting their systems with a virus. In addition, another type of malicious program exists that must be guarded against. This type of program can gather private information, such as credit card numbers, bank account balances, and passwords. Java answers both of these concerns by providing a firewall between a networked application and your computer. When you use a Java-compatible Web browser, you can safely download Java applets without fear of virus infection or malicious intent. Portability For programs to be dynamically downloaded to all the various types of platforms connected to the Internet, some means of generating portable executable code is needed .As you will see, the same mechanism that helps ensure security also helps create portability. Indeed, Javas solution to these two problems is both elegant and efficient. The Byte code The key that allows the Java to solve the security and portability problem is that the output of Java compiler is Byte code. Byte code is a highly optimized set of instructions designed to execute by the Java run-time system, which is called the Java Virtual Machine (JVM). That is, in its standard form, the JVM is an interpreter for byte code. Translating a Java program into byte code helps makes it much easier to run a program in a wide variety of environments. The reason is, Once the run-time package exists for a given system, any Java program can run on it. Although Java was designed for interpretation, there is technically nothing about Java that prevents on-the-fly compilation of byte code into native code. Sun has just completed its Just In Time (JIT) compiler for byte code. When the JIT compiler is a part of JVM, it compiles byte code into executable code in real time, on a piece-by-piece, demand basis. It is not possible to compile an entire Java program into executable code all at once, because Java performs various run-time checks that can be done only at run time. The JIT compiles code, as it is needed, during execution. Java Virtual Machine (JVM) Beyond the language, there is the Java virtual machine. The Java virtual machine is an important element of the Java technology. The virtual machine can be embedded within a web browser or an operating system. Once a piece of Java code is loaded onto a machine, it is verified. As part of the loading process, a class loader is invoked and does byte code verification makes sure that the code thats has been generated by the compiler will not corrupt the machine that its loaded on. Byte code verification takes place at the end of the compilation process to make sure that is all accurate and correct. So byte code verification is integral to the compiling and executing of Java code. Javac Java Virtual Machine Java byte code Java Source .Java .Class The above picture shows the development process a typical Java programming uses to produce byte codes and executes them. The first box indicates that the Java source code is located in a. Java file that is processed with a Java compiler called JAVA. The Java compiler produces a file called a. class file, which contains the byte code. The class file is then loaded across the network or loaded locally on your machine into the execution environment is the Java virtual machine, which interprets and executes the byte code. Java Architecture Java architecture provides a portable, robust, high performing environment for development. Java provides portability by compiling the byte codes for the Java Virtual Machine, which is then interpreted on each platform by the run-time environment. Java is a dynamic system, able to load code when needed from a machine in the same room or across the planet. Compilation of Code When you compile the code, the Java compiler creates machine code (called byte code) for a hypothetical machine called Java Virtual Machi

Sunday, January 19, 2020

Governements Bureaucratic Half-witted Laws :: essays research papers fc

Governement's Bureaucratic Half-Witted Laws Todays big government is a typical display of bureaucracy in its most creative state. Due to the enormous bureaucracy within todays state governments, many laws have been passed through legislation that really didn't need to be passed. These laws are a display of the way government likes to show power over the people using legal suppression. Governments have created laws governing almost anything that the people do as an act of blatant suppression, even if the laws my never be able to be unforced. In reviewing many law books, many laws were found that did not seem to do anything but annoy the general populous. These laws and ordinances are used by the government to show power without having to be confronted by any particular person who might have been affected, because these legal suppressors will most likely not be enforced by the local law-enforcement agencies. In Alabama it is legal to drive a motor vehicle while you are blindfold. Most of the people in our nation most likely would not decide to drive with a blindfold on. Yet, the Alabama state government needs to have power so it passed the "no driving while blindfold" law. Alabama is not the only state with laws that seem useless. In California community leaders passed an ordinance that makes it illegal for anyone to try to stop a child from playfully jumping over puddles of water. The fine for such a crime is fifty dollars and up to ten days in jail. Once again a government decided it didn't have enough power and thought that it might as well impose a new law to show its "immense" power over the people. In Connecticut you can be stopped be the police for bike riding over sixty-five miles an hour. You can also be arrested for walking across a street on your hands. These laws will probably not be enforced due to the fact that the odds of biking over sixty-five miles an hour or walking across a street on one's hands seems unlikely. Florida may be one of the most creative legal suppressors in the Unites States. One law reads "Women may be fined up to 150 dollars if they fall asleep under a hair dryer, as can the salon owner." Another law states that if an elephant is tied to a parking meter, the parking fee has to be paid just as it would for a vehicle. A special law in Florida also prohibits unmarried women from parachuting on Sunday or she shall risk arrest, fine, or sometimes jailing. Men may not be seen publicly wearing any type of strapless

Saturday, January 11, 2020

The use of online digital resources and educational digital libraries

This survey aimed to understand the usage of educational digital libraries by module members and teachers With respect to the usage, motives and barriers. Furthermore this survey investigates the find and usage of educational digital beginning sing the turning desire on the portion of module members and teachers to utilize them, and an increasing trouble in their ability to happen, entree and utilize them. It besides examines connote the hypotheses of the usage of the changeable type of on-line educational beginning would change based on figure of demographic variables, Most specifically, sort of establishment, sort of assignment or learning experience degree. The hypotheses is really specific due to the inquiries good be asked to faculty members and teachers such asThe importance of this survey is summarizedThis survey is really of import in term of bettering the digital educational beginning, therefore it is finishing the other attempts which were adapted by such as National Science Foundation ( NSF ) in US which has spent over 150 1000000s to this betterment [ 29 ] . Issues about the digital libraries ‘ users and about how do they utilize them hold became the highest cost in order to better and keep the educational digital libraries [ 23,37 ] . The justification of this investing, the existent usage and impact of educational digital libraries ‘ contents have become really important to stakeholders. Due to all of that some inquiries have risen: What do faculty members and teachers perform with the digital beginnings which they get from the educational digital libraries? Do module members tread these beginnings as a worthwhile beginning? How do the usage them in poke bettering their instruction? What are the obstructions which are confronting the module members when they use them?Methodology:In this paper, the writers report based on the Outcome of a national study of American module members and the teachers regard to the usage and non-use of on-line digital beginning. This survey looked profoundly into the obstructions of the usage for illustration the restrictions of clip and resource, the issues of accessing to high quality stuffs, deficiency of flexibleness of the stuffs themselves, and academic belongings [ 17,23 ] . Two groups were conducted at one research university, one at a community college, three were conducted at chiefly learning universities, one group each at two historically black colleges, one group at a broad humanistic disciplines college and two groups at theMERLOT International Conference2 whose participants represented awide assortment of institutions.We sought input from this scope of module members and teachers because we assumed that several factors would be critical to understanding their demand for on-line digital resources and their hunt and usage behaviours, such as, type of establishment, learning experience, learning burden, type of classs taught, etc. Analysis of the focal point group transcripts provided some grounds of the importance of these factors and the study was designed to further prove the value of these factors in foretelling user behaviour. Our focal point groups confirmed Harley et Al. ‘s [ 23 ] findings that faculty members did non cognize what educational digital libraries were. Furthermore, these module members and teachers did non separate between a curated aggregation, such as the BEN scientific discipline web ( hypertext transfer protocol: //www.bioscienet.org ) where merely those points that have been peer reviewed aremade available and that of a simple of list of URLs that might be found at a co-worker ‘s web site. These findings, in add-on to Harley ‘s, highlight how of import it is to utilize the linguistic communication that possible respondents understand when planing study instruments. So similar Harley, we avoided utilizing linguistic communication in the study questions3 associated with digital libraries, e.g. , aggregation, metadata, etc. Alternatively, in order to better the face cogency of the instruments, we carefully described the contents of aggregations, e.g. , scholarly articles , ocular images, historical paperss, etc. and asked respondents how they searched for and used these stuffs. The study instrument consisted of 105 points that included demographic information, inquiries about motives for usage of stuffs, barriers to utilize and descriptions of usage. To minimise study weariness, the study design employed skip logic so that respondents were asked inside informations about their usage of stuffs merely after bespeaking they used them. Questions covered how an single module member or teacher used peculiar sorts of on-line stuffs, e.g. , lifes, simulations, scholarly resources, images, etc. ( see Table 3 for a definition of thesematerials ) , if they modified thesematerials in any manner and their motives for the usage of these stuffs. Survey participants were asked to rank their likeliness of usage of a digital aggregation as compared to other hunt engines such as Google or Yahoo.com. Respondents were besides asked a series of demographic inquiries sing their instruction experience, type of establishment in which they work and so forth. External cogency was determined by pre-testing the study with about 20 module members from the different types of establishments represented in the sample.3.1 The study sampleTo make the survey Ã¢â‚¬Ë œs population, we approached establishments to help us in reaching their module members and teachers. Using the Carnegie Foundation 2000 list ofUS establishments of higher instruction, a wide invitation to take part was issued to the bulk of higher instruction establishments in the United States. A likely contact was identified at each establishment by sing the establishment ‘s web site. Contacts were by and large head bibliothecs, caputs of module development, or academic deans. Of the about 3,500 establishments contacted,4 more than 250 responded, and in the terminal, 119 establishments agreed to take part. Table 1 shows howthis study ‘s sample of establishments comparisons to the existent distribution of types of establishments in the Carnegie list. For the intents of the disposal of the study, the sample was non stratified with respects to institutional type because we felt that trying to make so would negatively impact institutional buy-in and execution of the study . United States at the full spectrum of establishments. However, because issues of usage are non alone to STEM subjects, we felt that restricting the study to merely those faculty members and teachers would do it excessively hard for establishments to take part in the research. Consequently, we encouraged establishments to include their full module in their invitation to take part in the study. The bulk of take parting establishments sent the study to their full module organic structure, though some sent it to a random sample of their module. By the terminal of the study period ( September 2006-January 2007 ) 4,678 persons from the 119 take parting establishments responded. Of those respondents, 4,439 instructed pupils ; the majority of the analysis was conducted on this group of teachers. The demographics of the study respondents can be found in Table 2. About a 3rd ( 30 % ) came from Masters allowing establishments, a 4th from biennial or associate grade allowing schools ( 26 % ) , followed by four-year Baccalaureate or Liberal Arts College or Universities ( 22 % ) and, Doctoral Granting Institutions ( 21 % ) . The respondents were besides chiefly tenured module ( 41 % ) with somewhat over 10 per centum describing that they held accessory position ( 13 % ) , or were chiefly teachers, lectors or held other non-tenure path places ( 12 % ) . The bulk by far, held full-time places ( 81 % ) and 40 % had term of office. It is likely that these module members were over-represented in the sample given that 46 % of all US module members hold parttime places [ 1 ] . Most of the participating establishments chose to administrate the study to their full module instead than insulating STEM merely module. When asked to bespeak in which subjects they taught, more than one tierce of the responses ( 38 % ) represented a traditional STEM field ( biological scientific disciplines, chemical science, computing machine scientific discipline, technology, geoscience, wellness scientific disciplines, mathematics, or natural philosophies ) . Approximately 45 % represented the humanistic disciplines, humanistic disciplines or the societal scientific disciplines while approximately 20 % represented the professional schools, e.g. , instruction, concern, etc. This dislocation may non reflect the teachers ‘ disciplinary preparation and respondents were allowed to choose multiple subjects. The sample was besides made up of module who were extremely experient teachers, with merely one 4th holding less than 7 old ages of learning experience. This approximates the age distribution of higher instruction teachers with about 65 % being older than 45 old ages old [ 25 ] . Slightly over half of the sample ( 54 % ) reported utilizing class direction systems or had a class web site. Almost all ( 95 % ) of the respondents reported learning face to face classs, though about a fifth ( 21 % ) reported learning distance instruction or online classs. Merely 12 % reported learning intercrossed classs, that is, classs that both fitting face to face and are conducted online. If a respondent noted he or she did non instruct pupils, they were skipped to the terminal of the study replying a inquiry on the services offered by aggregations of digital resources, and concluding demographics4.1 What sorts of on-line digital resources do module usage?To analyze the relationship between the value of digital resources and their usage more closely, we went back to our focal point group informations. For although these participants tended to value digital resources extremely, they besides failed to separate between the different types of online digital resources, e.g. , educational digital libraries, web pages, on-line diaries, and were non witting of utilizing a digital library specifically [ 38 ] . Focus group participants defined educational digital libraries and digital resources loosely doing few differentiations between for illustration, a loose aggregation of PowerPoint slides ( available from a well known or trusted co-worker ‘s web site ) and a aggregation of stuffs such as MERLOT. Rather than coerce a definition of digital library for the study onto a group of respondents who most likely non equate educational digital libraries or aggregations as beginnings for these extremely valued on-line digital resources, we alternatively used merely linguistic communication depicting the digital resources. We so sub-divided the resources into five classs as described in Table 3. To analyze how faculty members reported utilizing these stuffs on the study, we looked at the â€Å" top box † mark, i.e. , the resource which module indicated they â€Å" really often used † . Survey consequences indicated that themost popular types of stuffs used by module members and teachers included on-line scholarly resources ( 51 % ) and digital images/visual stuffs ( 43 % ) . About a one-fourth of the respondents ( 29 % ) reported frequent usage of instruction and acquisition activities or on-line datasets ( 23 % ) . On-line simulations and lifes were used the least with merely 11 % of the respondents describing frequent usage.

Friday, January 3, 2020

Current Events And U.s. Diplomacy - 1412 Words

Current Events and U.S. Diplomacy Abu M. Shahjahan Strayer University POL 300 – International Problems Dr. Angela Agboli-Esedebe December 6, 2015 Current Events and U.S. Diplomacy Over time the United States has had many different presidents, each serving one or two terms in office and that same tradition still continues today. Once elected the president spends the majority of his time in the White House with his family while serving the people of his country, and when his presidency is over, he goes back to living his normal life. While in office presidents deal with more than their share of problems and conflicts of interest whether they are domestic or international. To alleviate these situations, the president with the help of his administration comes up with solutions for these problems whether they are deals, treaties, or presidential doctrines. Presidents create presidential doctrines because of the conflicts of interest that arise, relationships that exist among each other, and provide the solution to the conflict. Definition and Summary A presidential doctrine is a collection of ideas and a group of actions that are used to alleviate or remedy the conflicts of interest in a certain geographical area of the world (Jones, 2011). As the World War II was gradually coming to a close in 1945, the USSR or the Soviet Union, who was once an ally of the United States began placing Communist governments in its former countries. The actions of the Soviet Union caughtShow MoreRelatedPol 300 Assignment 2: Current Events and U.S. Diplomacy705 Words   |  3 PagesPOL 300 Assignment 2: Current Events and U.S. Diplomacy Click Link Below To Buy: http://hwcampus.com/shop/pol-300-assignment-2-current-events-and-u-s-diplomacy/ This paper will be a revised and expanded version of the first research paper. Based on your instructor’s feedback, you will first revise the first paper. Write three-to-four (3-4) new pages that address the following: Define presidential doctrine and summarize the regional or global events during the Cold War leading up to the formationRead MoreThe Legacy Of The Reagan Doctrine Essay1150 Words   |  5 Pagesprovided open and private support to guerrilla and resistance movements during the Regan years. In addition, explicate the diplomatic doctrine specific events that occurred in Afghanistan when the Soviet Union invaded. Finally, this assignment will describe the advantages and disadvantages based on the Regan Doctrine. Summarize The Situation of U.S. Diplomatic of The Regan Doctrine Throughout the opening years of the Cold War, Presidents Richard Nixon, Gerald Ford, and Jimmy Carter all sanctionedRead MoreThe Iraq War1487 Words   |  6 PagesIn his 1988 Republican National Convention acceptance speech former U.S. President George H.W. Bush proclaimed that, â€Å"Weakness and ambivalence lead to war.†. For better or worse a states ability to influence world politics is primarily base d on much power they have. In purely academic terms, power is the ability of Actor A to get Actor B to do something that B would otherwise not do; the ability to get the other side to make concessions and to avoid having to make concessions oneself (Frieden PRead MoreThe Defence Of Defence Diplomacy828 Words   |  4 Pagesincreasingly involved in defence diplomacy. The Indonesian Defence White Paper issued by the current administration in 2015 expresses clearly how defence diplomacy will be used to further Indonesia’s national interests in the defence sector. In its implementation, international cooperation will be employed as its key instrument. Defence diplomacy itself was first included in the Indonesian Defence White Paper in 2008. However, the document only included one mention of defence diplomacy. In the latest 2015 versionRead MoreThe Conflict in Darfur and United States Involvement877 Words   |  4 Pagesshould use diplomacy to help end the conflict happening in Darfur. A genocide is the systematic attempt to eliminate a group of people based on race, religion, ethnicity, or other defining group characteristic. This should not be misconstrued with a war between two groups where each group is of a different religious, ethnic, or racial group. Even though a large number of people in a common group die, that would not be a genocide because the two groups are fighting each other. The events happeningRead MoreU.s. Department Of State And The United States Agency Of International Development Essay915 Words   |  4 PagesThe U.S. Department of State and the United States Agency of International Development (USAID) has published five strategic goals.1 Under these goals they have formulated a total of thirteen objectives to give the strategy a more specific direction. In these strategic objectives there is representation of Wilsonian, Hamiltonian, Jeffersonian, and Jacksonian ideals. Current U.S. foreign policy certainly has a strong Wilsonian flavor. However, Wilson’s theory alone does not accurately portray U.S. foreignRead MoreDiplomacy in the United States and Saudi Arabia1331 Words   |  5 Pagesbe receiving a check for something I already love to do. However it is not only about the traveling this job has many benefits including being able to resolve world issues and help un-developed countries with their issues. Being a diplomat for the U.S government requires many requirements. There are not many educational requirements a college degree is sufficient enough. What is really needed is to pass the Foreign Service Exam. This exam consists of a written exam, oral interview, and a negotiatingRead MoreNuclear Capabilities And Bargaining Process869 Words   |  4 PagesIn this memo I will discuss the Iran nuclear deal in 2015. Firstly, I will summarize this event and come up with the questions about each actor’s action and preference; then I will analysis the theory behind this issue--Nuclear Capability and Bargaining Process; thirdly, I will analysis the actors’ preferences and interests; finally, I will discuss why did they sign an agreement at that particular time. Puzzle: On July 14,2015 the Iran nuclear deal was signed between the Islamic Republic of IranRead MoreThe Geopolitical Challenges Of America1616 Words   |  7 Pageseven the simplest of issues overseas can drive the price of oil up and endanger our way of life. The potential return of Cold War relations with Russia also leads to concerns for us as Americans. The potential is there for the relations between the U.S. and Russia to extend even further than just a war of words. We must address these issues before our way of life and democracy are at risk. America has been trying to get away from our dependency on foreign oil, but we are not there yet. Oil is essentialRead MoreRelationship Between The United States And The Peoples Republic Of China1671 Words   |  7 Pagesclaimed Exclusive Economic Zone are recent examples of the posing threats to U.S. and regional interests. Increasing Anti-Access/Area Denial capabilities and computer network exploitation capabilities further allow China to covertly advance its defense and industries and gain insight on United States security policies and military capabilities. Additionally, these events and the evolving security environment are drawing U.S. forces into closer and more frequent contact with the Chinese military leading