Monday, September 30, 2019

Business Statistical Analysis Scenario Essay

A GMC manager recently noticed that there is a production difference between the early shift and the late shift. The manager would like to determine why there is a difference in production between the shifts and asked for research on the issue. The research team came up with the following research question: Is there a reason for the different production levels between the day and evening shifts. Our team has come up with the following two null hypotheses: H0 – There is a significant difference in employee productivity between shifts due to worker age. Ha – There is no significant difference in employee productivity between shifts due to worker age. In order to accomplish this, we need to find the average number of errors along with the standard deviation. By doing so, we can set up a confidence interval to see if the late shift is truly doing better when it comes to quality. If they are, we can make the nomination that the manager has the late shift supervisors provide guidance to the early shift supervisors. There are various statistical reports that outsource the relationship between the independent variable(s) and the dependent variable. Here we will realize how GMC will translate the organization problem into a statistical problem, provide a solution to the problem statistically, and then translate the statistical solution into an actionable solution for the company. Literature Review General Motors realized that to stay competitive a number of changes would have to be made starting with production efforts. Based on economic  uncertainty and gas price volatility, adjustments were made to accommodate the needs of the population interested in purchasing vehicles during times of uncertainty. After the fall of the three leading automotive giants, coming back would have to be well thought-out and cost beneficial to the consumer. GM got to work. Production in most plants was one shift, Monday – Friday, 8 hours per-day. At one facility adding a third shift let the plant produce more than 26,000 vehicles within three months, more than it had previously done when it produce 20,000 vehicles. Before incorporating a third shift the plant had approximately 3,300 workers who averaged fewer than 14,000 vehicles per month (Funk, 2011). In another plant that focused on the production of only one vehicle, this plant employed eight hundred production workers who were a one- shift, eight hour Monday-Friday production facility. Another GM plant that makes the Chevrolet Tahoe and Suburban, GMC Yukon and Cadillac Escalade add a third shift and 800 new jobs was created, the assembly plant employed approximately 2,500 hourly and salaried employees and operates two production shifts. In 2011, the plant produced nearly 270,000 vehicles. â€Å"Demand for full-size SUVs remains stable.† The third shift enable the Assembly plant to meet market demand for the current generation of full-size SUVs and provide relief for employees who have worked extensive overtime since the fourth quarter of 2009. The installation of new tooling and equipment required to build GM’s new line of SUVs limited vehicle production in 2013. A third shift will provide the plant needed production capacity during this transition time (Funk, 2012). There was a time when working a straight day-shift was enough to meet the production demands for General Motors products, however with the versatility and the types of vehicle’s being produced third shift help to meet and exceed demand and provide relief for employees working extensive overtime. Many years, companies have pursued to advance worker output and labor settings. One approach is substitute toil schedules, which comprise flextime, work division, and a compacted workweek. Sleep-related aids are mainly supportive for the salaried period; insufficient sums of nap reduce work output and general well-being. Statistics shows consistent amounts of sleep Improved performance and alertness in the workplace. Therefore, we propose creating work-sleep equilibrium, comparable to work-life stability, as a standard for planning and refining work plans. Prolonging operational times outside nine periods per day did not effect in equal growths in GMC manufacturing. Production increased as working hours increased. According to the survey 1977 Quality of Employment, the impact of unusual toil plans on workers’ personal time has resulted with: Fewer periods in household parts.  Advanced plans of particular forms of struggle among family life besides work. One of the amendments is the decision by GMC to implement twelve-hour work days for all Union employees. This decision did not do well with the Union because most were used to working 8-hour days with weekends off. GMC decision is based on new lines and the demand to cope up with production forecasts. This forecast demands the organization to switch to a 24/7 hour operation. Union employees disagree, as they have a feeling that working 12-hour days will lower their morale. They view the alternative schedule as time that they will be missing from their family. While there has been deep research on the subject of scheduled overtime on the productivity of construction labor, there is little research available that looks at the efficiency, or lack of efficiency that is associated with work accomplished on the second shift. In 2008, Hanna, Chang, Sullivan and Lackey in the Journal of Construction Engineering and Management, looked at why and how shift work impacts worker productivity, and they attempted to find a relationship between the length of shift work and resulting efficiency. Their objective was to quantify the effects of shift work on labor productivity. Their results showed the potential of shift work can be both beneficial and detrimental to productivity. Small amounts of well-organized shift work can perform very effectively in response to schedule compression (p.203), but the study also showed that prolonged use of a second shift can lead to a negative impact on efficiency and productivity. The author addresses the attitudes of workers as it relates to the question of productivity of the employee’s in the U.S. automobile industry. Norsworthy and Zabala (1985), attempt to explain the effect on direct labor efficiency (a measure of labor productivity) and product quality of industrial relations performance, as measured by grievances, disciplinary actions, absenteeism, contract demands, negotiations length, and the climate of industrial relations. Their finding state grievance rates are associated with low productivity of production workers which results in high unit costs of production. The study also â€Å"offers strong exhibit that the benefit of improving workers behavior can be enormous† (p.557). The line between labors policies and workers can lead to improved worker attitudes and a rise of productivity. Shift work is the way of life for those who work within the manufacturing industry. Depending on what type of schedule workers on required to be on can have an effect on employee risk or costs to the company. In a report done by Circadian, who specialize in workforce solutions, having those that will be doing the labor work for that manufacturer involved in the decision making with respect to what type shift schedule they are on can go a long ways in having happier, more productive workforce. A resounding message throughout the reports was that one of mostly commonly seen things that affect such things as errors during particular shifts was fatigue. Research methodology Efficiency is an integral requirement in the workplace as it encompasses proper input, output, and high returns for the company (Anderson, 2013). An analysis conducted at GMC, a manufacturing firm, has revealed some inconsistency in the levels of productivity resulting from the activities of its workforce. The early shift workers or employees have posted better output and results more than the late shifts. Two main hypotheses have been supplemented to explain this anomaly. First, the disparity has been linked to machine failure but this has been ruled out due to the routine upgrades and checks, which are usually done on the machines. Secondly, employees in the late night shift may be under-performing as they are making a higher quality product, which takes more time. Management believes there are discrepancies in the quality and quantity of work being produced. Our team was brought in to conduct data analysis to solve and/or assist with the decisions to be made. After listening to their concern the following two variables were developed: Population and Size Collectively, the early and late night shift is composed of 385 employees with twenty in each shift. The population selected for this research activity will be the members of the workforce involved in the early and late night shifts of the company. Target Population and Justification The target populations are the employees who are involved in both the late and early shifts. Their involvement in the research process is based on the fact that they are involved in the activity or area where a problem has been identified in GMC. The equal representation of the employees in the research’s sample size is meant to ensure uniformity in the findings and the recommendations channeled or communicated to the company’s management (Anderson, 2013). Sampling Method The sampling will be conducted through observation and a survey actualized through the administration of a 5-question questionnaire. One research officer will be expected to carefully observe the activities of workers who are part of the early shift while another one will observe the same number of employees in the late night shift. The observation process will be conducted randomly over a 2-week period, with emphasis on the motivation levels of the employees, their input and subsequent output. To supplement the observation process, questionnaires will then be given to employees involved in the analysis process. The questionnaire will contain 5 questions which are listed below: 1. Age: 20-25 26-35 36-45 46-55 >55 2. Sex: F M 3. How many years have you worked nights? 0-5 6-10 11-15 16-20 >20 4. Do you feel management is available to assist with your needs? Yes No 5. Are all the tools and supplies necessary for your jobs accessible? Yes No The two sampling techniques will be pivotal in establishing the problems, which are leading or contributing to the company’s low levels of productivity. Random Sampling Technique used and Justification The research will use the simple random sampling technique to obtain people who are supposed to be involved in the study. The rationale behind using the random sampling method is the fact that it gives all the members of the population an equal opportunity to be involved in the research process. The use of this random sampling technique leads to the elimination of bias in the research process thus enhancing the credibility and integrity of the study’s findings and subsequent recommendations (Oliver, 2010). Protection of Human Subjects The 384 employees involved in the research or study process will be protected by ensuring the anonymity of their responses, comments, and conduct on the company’s premises. Where necessary, alphabetical numbers will be assigned to the various subjects involved in the research process. This will prevent any cases of victimization or witch-hunt, which may result from the remarks communicated by the employees. Data Collection As mentioned earlier, the data will be collected through the observation and survey methods. The survey will be conducted using a 5-question questionnaire as shown above. Data or information collected from the analysis process will be recorded into the soft copy format and then stored in the researchers’ Drop Box account. This is an online information storage service, which is preferred for its top-notch security measures (May, 2011). The secure storage of the data will make certain that it cannot be tampered with to influence the recommendations that are meant to be obtained from the findings. According to Anderson (2013), password protection where cloud or online storage is involved is integral, Drop Box provides this option to all its users. Only authorized individuals will be allowed or able to access the data stored in this online service. Challenges Faced It was difficult and time consuming to reach all the selected employees as some ware available only during night shift. The researchers had to work at night. Descriptive Statistics Interpretation Employees Early and Late Shift 384 employees from the early and late shift were randomly selected. The sample size was 192 employees being selected from each shift. Random sampling was conducted to afford all of the 384 employees an opportunity of being selected and to eliminate bias. Their ages ranged between 20 and 55 years, with variations of plus or minus 19 years. One half or more of the employees were 37.5 years of age or older. The middle half of those selected fell between 28 and 47 years. The most frequent age was 37 years. Their ages were considered to help gage motivation, maturity, and productivity of the employees on both shifts. Interpretation of the results Employees with the least experience (0-5 years) work night shift with those with much experience work (over 20 years) day shift. From the results it’s clear that experience is not affecting productivity. Notably, employees with working experience of 11-15 years’ work day shift. This implies that most night shift workers are youth while those for day shift are aged. This is supported by the number of years night shift employees have spent in the company (Less than 5). Results and Findings Age Almost seventy-eight percent of the workers were between the ages of 26-45. 15.8% were between 20-25, 36.4% were from 26-35, 31.2% were from 36-45, 14% were from 46-55 and only 2.6% were over 55 years of age. Sex Just over twenty-five percent (25.2%) of workers sampled were women and the remaining 74.8% were men. We did not tie worker gender to which shift the worker was employed. Years of Experience The majority of workers selected had either less than 5 years of experience (36.4%) or between 11-15 years of experience (28.6%). Of the 140 workers with less than 5 years of experience, 30% worked day shift and 70% worked night shift. Of the 110 with 11-15 years of experience, 70% worked day shift and 30% worked night shift. See Appendix B for further details. Management Availability and Resources Almost ninety percent (89.9) of workers sampled felt that management was available to assist with any problems and 80% felt they had the required tools to perform their job successfully. Conclusion Team B’s research was not able to show a specific correlation to productivity based on age. There is however, a difference in productivity between the two shifts. Our research appears to show that the day shift, with a larger percentage (65.1%) is more productive and that the decrease in production at night could be related to less experience. Recommendations The management should mix the young employees with the aging ones in both the day and night shift. This does not necessarily need to be a permanent change in shifts but by moving some of the more experienced workers around they can aid in the mentorship of the lesser experienced workers. Doing this can speed the development of those with less experience in order to strengthen the respective shift if management decides alter the shifting in the future when significant ground has been made with evening out the productivity of both shifts. Area for further study Further study should be done to tie and evaluate the impact of age on productivity. Management could also look at better working conditions as an indicator of productivity. Lastly, look age and experience of the employees across the two shifts and how to better mix the levels of both. References Anderson, N. G. (2013). Practical Process Research & Development (Revised ed.). San Diego: Academic Press. Basu, C. (n.d.). Examples of independent variables in business. . Retrieved August 1, 2014, from http://www.scribd.com/doc/141597585/Scienc Boudreau, N. S., & McClave, J. T. (2011). Student’s Solutions Manual, Statistics for Business, 11th edition, Boston, MA: Prentice Hall. Davis, W., & Aguirre, A. (2009). Shift Scheduling and Employee Involvement: The Key to Successful Schedules. Retrieved August 7, 2014. Lankford, W. M. (1998, June 21). Changing Schedules: A Case for Alternative Schedules of Work. Career Development international, 3.4, 161-163. Retrieved October 8, 2013, from Miller Library. May, T. (2011). Social Research Issues, Methods and Process (4th ed.). Maidenhead, Berkshire, England: McGraw Hill, Open University Press. Oliver, P. (2010). Understanding the Research Process. Los Angeles: SAGE. Staines, G. L., & Pleck, J. H. (1984). Nonstandard Work Schedules and Family Life. Journal of Applied Psychology, 69(3), 515-523. doi:10.1037/0021-9010.69.3.515. Takahashi, M. (2012, March 13). Prioritizing Sleep for Healthy Work Schedules. Physiological Anthropology. Retrieved October 8, 2013, from Miller Library. Taylor, E. (n.d.). Dependent and independent variables Retrieved August 1, 2014, from http://de.cyclopaedia.net/wiki/Dependent_and_independent_variables. Hanna, A.S., Chang, C., Sullivan, K.T. and Lackney, J. A. (2008, March). Impact of Shift Work on Labor Productivity Contractor. Journal of Construction Management, 134(3), 197-204. Norsworthy, J. and Zabala, C. (1985). Worker Attitudes, Worker Behavior, and Productivity in The U.S. Automobile Industry, 1959-1976. Industrial & La bor Relations Review, 38(4), 544-557. Robert Schoenenberger, 2011, General Motors Sets Overtime Shift for Lordstown to Meet Growing Chevrolet Cruze demand. Retrieved from http://www.cleveland.com/business/index.ssf/2011/08/general_motors_sets_overtime_s.html GM News. 2012, GM to Add Third Shift, 800 Jobs at Arlington Assembly, http://media.gm.com/media/us/en/gm/news.detail.html/content/Pages/news/us/en/2012/Jun/0622_arlington.html

Sunday, September 29, 2019

Huckleberry Finn’s Road to Maturation

Huck states to Judge Thatcher â€Å"Please take it, and don't ask me nothing—then I won't have to tell no lies† (16). That quote is said by Huck to Judge Thatcher when Huck finds his pap is in town and pap will try to take his money. The Maturation of Huckleberry Finn is important because its about Huck making the right decisions to help him and Jim to freedom. The Adventures of Huckleberry Finn, by Mark Twain, begins with Huck introducing himself. He is wild and carefree, playing jokes on people and believing them all to be hilarious.When his adventures grow to require more maturity than ever, there is a drastic change in his opinions, thoughts, and his views of â€Å"right and wrong†. By the time the book is over, it is apparent that he has matured greatly since the introduction of the novel. Mark Twain is making a point about Huck’s maturation; the specific point he is making is that even though Huck had a rough past he still does his best to make himse lf and his friend Jim a bright future. This analysis will include Hucks loyalty to Jim, Hucks bravery, and when Huck feels bad about his actions. Huckleberry Finn’s Road to Maturation

Saturday, September 28, 2019

Business proposal for Papadeaux

Pudenda is a successful upscale casual restaurant concept with a loyal following. But no restaurant is immune to the highly competitive climate of the industry. Recent studies have shown the upscale casual segment losing market share to both fast and traditional casual restaurants. They also show that consumers find value in upscale casual dining by weighing the food quality and the overall experience against the relatively higher price (Techno, Inc. 2013). We analyzed customer reviews to discern what Pederasty's guests are responding to In terms of value. Based on this analysis, customers respond overwhelmingly positively to food quality, and food quality Is the most critical factor In their value calculation. Price Is still an issue, even those delighted by food quality comment on high prices. Customer comments also suggest that portion sizes may be overly large, and that the investment in large portions is out of step with its importance to the guests.Pudenda may benefit from feat uring new menu items with reduced portion and price. Such offerings at other restaurants have led to increased traffic, revenue, and per person average (APP) (Jennings 2008). . Industry background Casual dining has grown over the last thirty years along with tremendous growth in American's restaurant spending. Half of every food dollar In this country is spent in restaurants, which Is double the spending level In the ass's (Pocket Fastback, 2013). The recession has made a competitive Industry even more competitive.A recent Techno survey on casual dining revealed a three tiered system divided Into fast casual, traditional casual, and upscale casual, with consumers trading up and down between these levels based on their needs and perceptions of value. 5% of those surveyed reported visiting a fast casual restaurant in the past month, 80% had visited a traditional casual restaurant, and 40% reported eating at an upscale casual restaurant. 41% of those surveyed reported finding value in upscale casual when weighing food quality and overall experience against the relatively higher price (Techno, Inc. 2013). The issue for operators in upscale casual is getting consumers to trade up, and to trade up more frequently. 3. Pudenda Seafood Kitchen Pappas Restaurants began In 1 966, when brothers Chris and Harris Pappas opened Dot's Coffee Shop In Houston. Today they operate over eighty restaurants across an array of concepts Including BBC, Tex-Meg, and fine dining. All Pappas restaurants are guided by the Standards of Excellence: Providing superior quality food, providing Kitchen, founded in 1986, is an upscale casual dining restaurant featuring gulf coast seafood and Cajun dishes.It has become the company's largest concept, and is set to absorb Pappas Seafood House, the company's first upscale casual seafood concept, growing its size in the Houston area by five stores. 4. Review Analysis 4. 1 . Methodology One of the most influential ways information is transmitted is wor d-of-mouth (Manikin & Goods, 2002). Word-of-month has an effect on not only potential customers, but also the satisfaction level of current guests. One of the most powerful methods to generate word-of-mouth is online customer review (Dollars, 2003). A total of 441 postings from Yelp. Mom made between September 2012 and September 2013 for all Pudenda locations, were reviewed for this analysis. Chin et al. (2004) found that recommendations have a positive relationship with sales, while consumer ratings were shown to be unrelated. Therefore our analysis focused on content rather than ratings. Content was divided into four main categories: food, service, value and environment/atmosphere. Each of these was further divided into subcategories, which were then coded positive or negative based on comment content. 4. 2. Food Food was the most commented on of the major categories.As displayed in Figure 2, the response to food quality was overwhelmingly positive. Comments such as, â€Å"the co cktail shrimp is well seasoned and super fresh,† â€Å"Just about everything on the menu is delicious,† and â€Å"the crayfish fondue is amazing as well as everything on the menu,† indicate that the customers are not only satisfied but also highly delighted. There were more positive comments on food than comments in any of the other categories. 4. 3. Service Restaurants always receive both positive and negative comments and Pudenda is not an exception.A calculation of the number of positive and negative comments on service, however, shows customers are mostly satisfied by the service. Over 75 percent of comments are positive (see Figure 3). Based on the graph and actual comments, we concluded that the gap between expectation and service delivery is mall in Pudenda case. 4. 4. Environment When commenting on environment and atmosphere, guests tended to be less specific when they were positive. Negative comments focused on noise level, crowding complaints, and wait time.The number of these complaints is relatively high compared with the number of positive comments (see Figure 4). This suggests that the atmosphere of Pudenda is more crowded and noisy than guests expect. 4. 5. Value determined by factors such as price and food quality. As seen in Figure 5, roughly half of all comments in this category stated that Pudenda is expensive. Only 37% recent of comments relate that the price is worth the overall experience, however, the percentage of comments stating that the experience is â€Å"not worth it† is much lower.While the latter two categories are mutually exclusive, significant overlap exists between both and the former category. This suggests that while guests' subjective view of value is affected by the service delivery, their objective view of price is left unaltered. 5. SOOT Analysis 5. 1 . Strengths Pederasty's greatest strength is consistently providing high quality food and service. Doing so is a stated goal of the company, and guest reviews confirm that Pudenda succeeds in following through on that goal. This achievement has garnered the concept a strong reputation.Many reviewers mentioned being repeat customers, or called the experience, â€Å"excellent as always. † This again speaks for the consistency many strive for in this industry, but few are able to attain. 5. 2. Weaknesses Pederasty's main competitive weakness is it's comparatively high prices. Providing high quality food requires an investment in quality products and labor. Seafood is often associated with high costs, because freshness is key to its quality. Additionally, he review analysis found complaints about the atmosphere.Its prices are more similar to lower end fine dining restaurants than its casual dining peers. Pudenda' more family friendly atmosphere may be at odds with what some expect from the environment when they look at the menu prices. 5. 3. Opportunities Despite high prices, Pudenda receives higher average ratings than its competitors. Its greatest opportunity lies in leveraging its high quality against competitors. Strategies that focus on attracting new customers to trade up from lower priced competitors so that they can experience the difference in quality may rove successful.Based on the high rating and positive comments from the Albuquerque and Phoenix locations, further expansion in the Southwest may be worthwhile. 5. 4. Threats Pederasty's faces threats from lower priced competitors. High price is a major component leading consumers to dine at upscale casual restaurants less frequently. Large competitors in this group, like Red Lobster, use nationwide promotions offering greater value to increase traffic at their stores. More similarly priced restaurants tend to have a different market focus, and provide a more elegant and less family oriented atmosphere. Guest Perception of Value Figure 6 GAP Analysis A GAP analysis revealed that there was little mismatch between guest expectations and per ceptions. The only area for concern was the atmosphere. As stated, complaints in this category were relatively high in proportion to positive comments, suggested the atmosphere is louder and more crowded than many guests expect. Relation to value based comments than any type of complaint about atmosphere. Further, price is important factor driving consumers to trade down in the casual dining spectrum. As recommendations are related to sales, comments about price would be taken seriously.While reviews indicate that guests are satisfied, these may not be enough. Oh (2000) found that customers' perceived value has a greater effect on their intention to return, and, more importantly has a greater effect on their long term patronage. In order to further analyze guests' perception of value, we returned to online customer reviews. This time, we focused our research on the Houston area locations. Houston was selected because it has more locations than any other area, and, as the place of it s founding, the area has the greatest familiarity with both Pudenda and the Pappas brand.We analyzed reviews from both Yelp. Com and Trip Advisor from the same time period, September 2012 through September 2013, a total of 490. Two methods were employed. First, the same coding method as before was used to compare against the early data in order to check for differences. Second, quotes relating to value were pulled from the reviews in order to better understand the range of guest attitudes and determine possible trends. The data from the content analysis was similar to what we saw previously. Roughly half of all value related comments referenced high prices.No new issues turned up in any of the other disagrees, so we proceeded to review quotes pulled from the article. 6. 1 . General Perceptions Guests tended to have a favorable impression of value while also acknowledging the high price, for example, â€Å"Pudenda is a little pricey but very good,† â€Å"The price is not low but it is worth the price for good food and service,† and â€Å"The prices are high but the food is excellent. † These responses are in line with the results from the Techno survey (2013) discussed earlier.It is important to note that over 70% of these quotes specifically mentioned food quality and linked it with a positive impression of value. 6. 2. Price and Negative Behavioral Intention Guests with a negative impression of value tended to express their view in terms of price. Quotes such as, â€Å"Overpriced but okay I guess†¦ â€Å", â€Å"†¦ Over priced mediocre food†, and â€Å"†¦ A little overpriced for what you get,† were typical of this group. In addition, negative comments about price were frequently linked with a negative behavioral intention to return.Most interesting was a subgroup of almost 30%, who specifically expressed that while satisfied, they would return less frequently due to price. Typical quotes in this range includ ed, â€Å"I'll be back but Rajah Cajun is definitely more affordable and so will be a more frequent stop for me! † and â€Å"The prices have increased steadily and I don't go as often†¦ â€Å". These quotes are representative of consumers who find value in the quality of the experience, and do trade up to upscale casual, but do so less frequently based solely on price. . 3. Food Quality as the Most Critical Factor Whether guests express a positive or negative perception of value they most frequently link value with their perception of food quality. 70% of positive value impression quotes mentioned food quality, as did 44% of the negative value laity (â€Å"WITH happened to good quality food†¦ â€Å") to those underwhelming with the quality based on price (â€Å"Decent seafood but overpriced†, â€Å"Food was fine, but the prices are nuts†), the latter being the most common.Guest comments also suggest that food quality may trump other aspects of the experience in terms of value: â€Å"Great service! Food was okay†¦ Wasn't worth the $30†, and â€Å"The waiter was nice though†¦ But that still doesn't make up for the lack in quality. † Combined with the results from the content analysis, it appears that food quality is the most critical factor for these viewers, and by extension Pederasty's guests. 6. 4. Identifying an Aspect for Improvement As mentioned previously, recommendations matter more than ratings, and recommendations are based on perceptions of value.Positive recommendations tend to be based on positive perception of food quality, however, these recommendations also tend to mention high prices. High prices are why many consumers report visiting upscale casual restaurants less frequently (Techno, Inc. , 2013), and our observations from online reviews confirm price can impact guests' stated behavioral intention. Based on this, it seems reasonable to assume that lowering prices while maintaining food quality, should lead to improved behavioral intentions and more positive recommendations.But before we explore the validity of that idea, we need to determine if there is any factor that can be changed to allow such a strategy to be entertained. Once again, we turned to the customer reviews, this time examining portion size. 6. 5. Portion Size Pappas Restaurants are known for large portions. Like food quality, it is factor into which money is invested in order to â€Å"wow† the guest. As we saw in the customer views, being â€Å"wowed† is often the line between finding value in the experience and feeling that it is overpriced.Portion size logically contributes to price; therefore we pulled quotes and analyzed them as we did with value-based quotes above. We aimed to determine if the investment in portion size was having the desired effect on guests. Not surprisingly, the reviewers found the portion size to be large: â€Å"the portions were generous†¦ â€Å", â €Å"Huge portions†, and â€Å"†¦ The baked potato is HUGE†¦ â€Å". 30% of the quotes expressed delight. These referred to portions as â€Å"ample† and â€Å"filling†, or mentioned aging a to-go box home (â€Å"l was very happy to have leftovers from this meal! ). 22% were factual statements such as, â€Å"The portion sizes are big like most restaurants in the states†¦ â€Å", or â€Å"l forgot how big the portions are†¦ â€Å". 48%, while not explicitly negative, did express that portion sizes may be overly large. Quotes like, â€Å"†¦ It was Just too big for me to finish! † suggest that portions are too large for guests to finish. One guest felt that they had â€Å"made the mistake of ordering a side salad†, because he was too full to finish his entree.In addition, guests may be lining like they are wasting food they wished to enjoy, a feeling that may be exacerbated by price (â€Å"l felt bad leaving half my lobs ter on my plate because I was full and it was a bit pricey'). Most of the quotes that fell in this category, and 39% of the overall portion size quotes, dealt with guest behaviors based on large portion have developed ordering behaviors to limit portion size, for example, â€Å"The portions are large, so I always split†, â€Å"l usually have to order a lunch size†, and â€Å"My son and I split a salad and catfish/shrimp plate. Perhaps the most important quote in this roof comes from a review posted on Yelp. Com on January fifteenth, 2013. The guest begins the review by giving background on their relationship with Pudenda: â€Å"As a Native Historian, I've enjoyed one of my family's great traditions of dining at Pudenda to celebrate most any occasion – birthdays, graduations, or Just- because-it's-the-weekends. Over the years, we've gathered at various locations throughout the greater Houston area, but as of lately, this is my frequent location of this chain. T hey go on to give a glowing paragraph long endorsement of food quality, which concludes with this quote: FYI Just about every dish here has monstrous portions so you wouldn't be the first to share a plate with someone. † The person writing this article is a champion for the Pudenda brand. She feels a connection to the concept and actively recommends visiting the restaurant. This is meaningful, because in online reviews, recommendations relate to sales, and her recommendation is to share.Guests did not link portion size to value as strongly as they did with food quality. Additionally, explicit complaints portion size was rare, including comments about portion size being too small. This suggests guests view portion size as an enhancement rather than a critical factor when calculating value. While it may be possible that large portion size contributes more greatly to guest delight and it is obscured by reviewers' choice of language, the fact that almost half of the quotes point t o portions being oversized, suggests that they are, in actuality, oversized. . Conclusion 7. 1 . Recommendation Based on our analysis of customer reviews, the investment placed into providing large portions exceeds its relative importance to guests. Guests also report that while they have a largely favorable perception of value, they still find prices to be gig. Food quality was identified by guests as the most critical factor effecting impressions of value. Figure 7 shows their relative positions in terms of investment from the company versus relative importance to guests.By decreasing portion size and lowering prices proportionally, both can be set at new, more appropriate levels without changing food quality. Figure 7 Performance vs.. Importance to Customers Similar strategies have been shown to increase traffic, revenue, and APP. In 2007, they termed â€Å"right portion, right price. † Within a year, these new items were contributing up to 15% of sales per month. They als o saw an increase in APP, as more customers were ordering appetizer and deserts.Their success led to the adoption of similar strategies by others, such as Cheesecake Factory and Minim's Cafe © Innings, 2008). Research from outside the industry suggests that Pudenda may benefit more greatly than others by the implementation of such a strategy. Studies have shown that it grocery stores, high quality food brands gain the most running a promotion with lower prices (Sparkman, 1997). Pudenda has a reputation for high food quality, and it is possible that consumers would view lower prices as a reason to read up, similarly to how they have been shown to behave in grocery stores. . 2. Implementation As large portions are a part of the Pappas brand, and some guests continue to express delight, we suggest maintaining the current menu. New menu items featuring reduced portion and price should be developed and offered separately as has been done by other companies. Tests should be conducted at select locations, and sales can determine their success. In addition, tickets with the new items should be analyzed to determine if they are contributing to an increase APP. Customer dieback should also be utilized, and can be used to refine the new menu.

Friday, September 27, 2019

The Role Of Nursing In The Solutions Of The Smoking Issues Research Paper

The Role Of Nursing In The Solutions Of The Smoking Issues - Research Paper Example The reason behind the selection of the hospital is that the healthcare centers in the US are notified to have vast diversion and a large number of subjects, which can provide an opportunity to put quality care to the individuals available herein. In relation to this particular research study, sampling method will be selected as the approach for the data collection to ensure reliability and validity by enduring the research in the real environment with reference to data collected from the selected participants. Moreover, in order to conduct the research and address the importance of nursing education in smoking cessation, the template will be designed in order to input all the necessary information of individuals habituated to smoking. In this regard, as affirmed above, different healthcare centers will be selected for ascertaining the research objectives. The particular research study aims towards promoting education in the individuals who are addicted to smoking cessation and assist them by presenting valuable information regarding the various ill effects of such habit. Thus, the questionnaire survey will be conducted for the sample size of 200 individuals, which will include 100 in the study group and 100 in the control group from different healthcare centers of the US. The fundamental reason behind utilizing this approach, as the methodology to collect data was to draw appropriate conclusions in alignment to the aforesaid aim of the research. Moreover, in order to derive the ultimate research aims, certain questions regarding age, gender, marital status, education level, the period since they are addicted to smoke and any education sessions attended or not will be framed. Nevertheless, this data will significantly assist in providing a detailed view of the way they perceived education.

Thursday, September 26, 2019

Commodity Chain Research Paper with Map of Chain

Commodity Chain with Map of Chain - Research Paper Example Some of the production factors considered when evaluating a business process entails the availability of raw materials and all the factors that surround the raw materials like the required transport charges and the nearness to the raw materials source. On the other hand, the consumption process has to be analyzed to evaluate the various factors that influence the market pattern of the products. This brings us to the juncture of studying the production commodity chain (Bair 46). Commodity Chain of China’s Honey This commodity chain is focusing on the production of Chinese honey, its export process and all the social, economical and the political aspect surrounding it (Gereffi 75). Chinese honey is produced in the central Guangzhou province. Guangzhou province is the second largest and most populated province in the People’s Republic of China. The leading economic activity in this region is crop production. Guangzhou province is also the leading producer of Chinese honey that is illegally transported to the US through India. The exact location of honey production in Guangzhou province is the Xue Xing County. The residents in this region have been practicing honey production as their major cultural activity (Gereffi 88). Bee keeping in this region is facilitated by the environmental conditions, which include availability of water from the great Xue Xing River. Since honey production evolved into a lucrative business in China, many venture capitalists have invested in mass production honey exercises. Honey production proved to respond to the economic needs of the local population. Mass production of honey in this region has maintained the cultural practices of the local community (Stringer and Heron 241). The province is also known to attract political attention in the country because of the population and the economic strength attributed to honey exports. The local workers benefits from the wages they collect and most of them are known to be practici ng small scale bee farming and selling the honey to large companies for processing. Therefore, honey production is a social as well as an economic activity in this Xue Xing County (Hu-DeHart 76). Honey production is encouraged by the local authorities because of the economic viability of the honey industry. Mass honey production is carried out by large established local companies in Xue Xing County. The largest producer of honey is the Xue Xing Honey Company. Honey production and harvesting is carried out by local casual workers employed who are the local residents. Upon maturity, honey is harvested and taken to the company’s processing facilities near the harvesting sites where they are processed and packed in large quantities. After packing and branding, the honey is loaded into train containers and transported to New Delhi, India. India allows the importation of Chinese honey into their country. The honey imported to India is meant for local human consumption and other ind ustrial uses of honey. However, the price of honey in India is not high compared to the market in Australia and America. Therefore, the honey barons from China would want to secure another lucrative market in the international platform. The labeling process is suspected to be carried out in Xue Xing subordinate company in India’s New Delhi (Hu-DeHart 34). The honey is removed from the containers and repacked into small quantity cans meant for export product. This process of labeling is not authentic and is normally carried out

The Role of the Bahamas Development Bank in the Bahamian Economy Coursework

The Role of the Bahamas Development Bank in the Bahamian Economy - Coursework Example State of the Bahamian economy Before exploring the role played by the Bahamas Development Bank in the Bahamian economy, it is imperative to look at the state of the Bahamian economy: its strengths and weak points before addressing how the Bahamas Development Bank plays a role in addressing these weak points. Being among the best offshore global banking centers, Bahamas has come up with a non-simple banking structure that caters for the services of both domestic and foreign investors. Both the central bank of Bahamas and the Bahamian international banks and Trust have a complete list of about 272 financial institutions that are legally mandated to conduct business with the public (US Department of Commerce, 1992, p. 40). The states in the Caribbean went through several challenges in 2004. Examples of these include declining real sector production, a reduction in their export trade, pressure from other parties regarding the exportation of sugar and bananas, increased indebtedness and a season highly characterized by natural perils and catastrophes. Moreover, though categorized as middle – class economies, majority of these nations have a good score of their citizens who are poor. Statistics from the Caribbean Development Bank indicate that the poor form between one and twenty six percent of the population. In a bid to deal with these challenges, Bahamas has had to conserve economic stability, strengthen the tourism and fiscal financial sectors, enhance the security of citizens, and support family islands and growth of small businesses through buttressing social services and improvement of the transport sector (Commonwealth Secretariat, 2006, p. 16). The Bahamas authority plays this role through its financial institutions like the Bahamas Development Bank, among others that get their external sources of finance from other lending agencies such as the Caribbean Development Bank. In the recent years, there has been a reported rapid growth in both the financia l, Nassau and tourism sectors. In the recent years, Bahamas has become popularly known as a center for offshore banks and trusts apart from being a strategic location for carrying out international currency business (Khambata, 1996, p. 95; Bernardi, 2008, p. 107). This has been facilitated by the overall openness of the economy, proximity to the United States and The Bahamas’ tax haven state. Apart from generating income and employment for the country, financial services enhance the nation’s tax haven image. The attainment of the nation’s high-level per capita income can be attributed to the growth in the service sector that has really increased the national income of Bahamas (Karagiannis and Witter, 2004, p. 150). The major cause of the post war growth in the Bahamian economy can be attributed neither to structural reforms neither in the country’s production base nor to any changes in the functioning of its economy. The change can rather be attributed to the enlargement of the tourism and financial sectors. In fact, the pattern

Wednesday, September 25, 2019

Employment law Assignment Example | Topics and Well Written Essays - 2750 words

Employment law - Assignment Example Importantly, the laws are not the same in all the companies rather they differ depending on the cultural, political and economical factors of the countries. The employment law entails the relation between employees, employers, trade unions and the government. The employment law in relation to employees constitutes their rights at work. For instance in the UK Employment law; employment contracts, unfair dismissal, the Working Time Regulations, flexible working rights and equality aspects are outlined. With respect to the law, an employee is able to figure out the rights at work and how to acquire legal advice when discriminated against or unfairly dismissed from work. The UK employment law enables employers to comply with it thus treat their employees fairly and lawfully. Pauls dismissal due to his misbehavior is a controversial issue since other people may support or oppose the act. The employment law of UK outlines the procedure to be followed when an employee is to be sacked. As an HR manager in the store where Paul works, I will effectively advise the General Manager on what to do. This is because Paul has presented an unfair dismiss al claim to his Employment Tribunal Office. The course of action to be taken by the organization should therefore comply with the UK employment law. The organization should have considered Pauls source of the misconduct in order to proceed with the dismissal. A thorough and effective investigation was to be carried out before the dismissal. Therefore, Paul has a right to claim for the unfair dismissal to the local Employment Tribunal Office. The organization should have issued Paul a notice or warning before the dismissal. It did not follow the correct procedure of dismissal despite Paul involving himself into fighting which is considered fair enough for dismissal. According to the UK employment law, the organization should have carried out a proper investigation about Pauls misconduct instead of issuing

Tuesday, September 24, 2019

Legalization of drugs Term Paper Example | Topics and Well Written Essays - 2250 words

Legalization of drugs - Term Paper Example It is often argued that alcohol and cigarettes also have the reputation of being an addictive drug, yet both are legalized. Furthermore, those that want drugs will take the steps necessary to get them, so instead of making them criminals and continuing to overcrowd jails, it might be better to allow them to take the legalized form of the drug, which would probably be much weaker, and regulated, making addiction more difficult. Those who oppose this concept worry about increased addiction as well as the moral and ethics of society. There is a strong Christian movement that is against legalizing drugs, led by the Christian Coalition. Rangel (1998) puts this argument and view forth in his journal article. This coalition has a strong influence on politics, especially the Republican party, and thus this issue has been brought to the forefront many times. Krajicek (1998) discusses the power of the Christian Coalition to influence crime laws in his article, thus backing up the point that re ligion often does cross over into law and politics. While morality is an understandable concern, this same moral question already exists with alcohol and cigarettes. Therefore, what is the best approach to this concept The War on Drugs seems to be failing. No matter how hard the United States tries as a country, we still struggle with stopping the crossing of drugs into the country, and it is very apparent that this practice continues. If we have not been able to adequately stop this drug problem after trying for so many years, is there another way to end this issue? Davey (1998) makes a point of this issue in his arguments. ... The answer would be yes, and it would focus on the legalization of drugs. Thus, this researcher feels that the answer lies in legalizing drugs. This would not only end the War on Drugs, it would also clear jails (getting rid of drug crimes and opening up overcrowded prisons for those who have committed serious crimes like rape and murder), and it would also allow individuals freedom of choice. Silen (1994) agrees with the concept that adults who do want these drugs, of course if they desire them, will find a way to get them, one way or another. Therefore, it seems that it would be a good idea to take advantage of the situation. The United States already sells damaging and addictive drugs to its people in the form of cigarettes and alcohol. This would only give individuals more of a choice, and people would still be expected to use drugs responsibly-for instance, drinking while intoxicated on any drug is not acceptable. Shapiro (2003) argues, in his journal article, that our country i s based on freedom of will and choice, as long as others are not harmed. Therefore, the overall point is that there are several benefits to both people and the government when legalizing drugs, and this step should be taken in order to take advantage of the several advantages present in the situation. One important notion to consider is the fact that the legalizing of drugs also promises to reduce crime. How can this be so, when so many crimes are attributed to drug use First, the regulation of the drug itself promises that the drug will be less potent, and that the amount obtainable can be limited. This makes it more difficult for

Monday, September 23, 2019

Bram Stoker's Dracula Compared to Mary Shelly's Frankenstein Essay

Bram Stoker's Dracula Compared to Mary Shelly's Frankenstein - Essay Example aim being awarded to Shelley, who pioneered in brining a literary concept to light, which was initially an unchartered territory for most authors as she combined elements of Goth and Horror with that of science fiction. Although, Dracula and Frankenstein are essentially from the same genre with some overlapping themes, but the concept and the depiction of themes contain some stark dissimilarity as well. The substance of this prose will delve into each of the aspects one by one: Dracula and Frankenstein both entailed a similar theme about life, death and resurrection. Both creatures possess a strong fascination for the human world, which drives Frankenstein to read books by eminent authors, whereas Dracula reads English magazines to gain a deeper understanding of the human world. This is the prime reason as to why both Dracula and Frankenstein are known to have sophisticated intellect and are capable of making conversation on any subject, which adds to Dracula’s charisma in the society, but doesn’t help Frankenstein’s case because of his horrifying appearance. In fact the monster created by Frankenstein had grown miserable of his life and expressed it in the following words: â€Å"Cursed, cursed creator! Why did I live? Why, in that instant, did I not extinguish the spark of existence which you had so wantonly bestowed? I know not; despair had not yet taken possession of me; my feelings were those of rage and revenge† (Shelley, 2004, p. 137) Moreover, the stories are centered on the same theme that involves a group of men trying to eliminate a monster that is nothing but scourge for the society. Besides the character, the literary technique used to project the story is also quite similar as both authors wrote their novels in an epistolary form; in simpler word, the story is told through the correspondences of the main characters with each other. However, it is a clear indication that the entire story is told from a one-sided perspective of the protagonist

Sunday, September 22, 2019

Urbanization increases Essay Example for Free

Urbanization increases Essay Golf courses also use fertilizers and chemicals in watering and maintaining the area which also contribute to the contamination of water. According to 1FAOs estimate of changes of forest area cover in developing countries, the world’s forest area had significantly decreased during the period of 1980 to 1995 largely brought about by development and the demands of urbanization. The developing countries have contributed to the natural forests as much as 25%, an average of 12% in Latin America, 5% in Asia and 8% in Africa (FAO, 1997). It has to be stressed that the figures correspond to only 15 years span. Gornitz and colleagues also found that vegetation clearing accounts for a one percent reduction of annual stream flow and an average of 10% decrease in the annual volume of freshwater used by humans (Gornitz et. al, 1997 page 148). The most direct physical impact of urbanization to the interruption of the water cycle is the general increase in the impervious cover (IC). The increase in IC due to urbanization affects the water cycle in these ways: 1. Urbanization increases impermeable land covers such as sidewalks, roads, roofs and parking lots. These urban structures decrease the amount of water to be absorbed by the soil as infiltration process is hardly possible to occur in these areas. In highly urbanized areas, more half of the volume of rainwater flows as run-off (Center for Watershed Protection, 2003). Studies also reveal that in cases where impervious cover is less than 10%, streams to where run-off flows remain protected. On the other hand, if IC is above 10% run-off that goes to the streams will cause the ecosystem to be degraded (American Society of Civil Engineers, 1996). Center for Watershed Protection said some of the evidences of this damage are bank erosions, sedimentation and the loss of stream bank tree covers. 2. Urbanization significantly increases annual floods. As infiltration and transpiration is reduced much of the surface precipitation is diverted to the drainage system. In a pre-urban setting, precipitation is intercepted by the natural vegetation through the process of absorption. Ground cover and forest canopy naturally absorbs rainfall through their roots. The wider the ground cover and the denser the forest canopy, infiltration and transpiration of precipitation are held in its natural state as more water is stored in the water table. This way water storage deep down into the ground as reservoir. With the clearing of vegetation and deforestation, urbanization becomes directly liable for the increase in annual floods. Because of the increase in the volume of run-off water in highly urbanized areas, the construction of drainage systems have been the nearest possible solution made by the government. Such drainage systems were designed to regulate the flow of run-off directly to the watercourse. However localized flash flooding seemed aggravated the problem with the construction of such sewage systems. The problem with this development projects is that the volume that watercourse and the drainage systems can contain is limited. The speed or velocity of runoff brought about by high peak storm water. Another vital factor is time which is relatively not enough for water to be absorbed and contained by the drainage systems and so flash floods are always possible. With flash floods, water contamination is highly possible because the excess water that runs in the streets catches much of the contaminants in the land surface which will then be carried to the bodies of water as flood find its way to leave the area. Because highly urbanized areas do have little ground cover like trees to absorb storm water, run off will likely stay longer in the surface as infiltration is hardly possible. Because imperviousness is directly related to water dynamics, highly urbanized areas have the high risk of containing high peak storm discharges. In urban areas, collection in combined sewerage systems may impose increased hydraulic and pollutant loads on conventional wastewater treatment facilities (Perry and McIntyre 1986).

Saturday, September 21, 2019

Simone De Beauvoir: Gender and Sex

Simone De Beauvoir: Gender and Sex Simone de Beauvoir’s Insights Towards Gender and Status Is there any wonder that Simone de Beauvoir rejected the idea that gender  has innate characteristics from birth? As a woman philosopher living in a man’s world I believe she fully understood what she was talking about. The writings in her world renowned book ‘The Second Sex’ written in 1947 give us a historical and cultural lesson of what women have had to overcome to exist as women in a man’s world. Men and women are both influenced by their conditioning the main difference is that man has been attributed the leading role. Times are changing and Simone de Beauvoir has played an important role in our attempt to undo the erroneous programming. Today’s leading ladies have proven their capacities at playing the part. Simone de Beauvoir’s example of what a woman that is intelligent can do in life by her straightforward, honest approach may be the stepping stones for other women to fearlessly do the same. As far back as the 10th century ideas of antifeminism have haunted the women of the world. The handful of women that were in the limelight were usually obliterated for witchcraft as in the case of Jeanne D’Arc or publicly ridiculed or at worse martyred. Women as the lesser sex have been depicted as temptresses from Bible days which at the same time undermined their intelligence. This dual image which has conditioned women to see themselves as passive beings who lie in wait for men to save, them or come and love them and their counterparts the devouring temptresses who take what they want and leave the rest behind including their intelligence is what Simone de Beauvoir sees as our conditioning. This conditioning starts at a very early age when there are no apparent differences between baby girls and baby boys. They are both at this early age totally in need of nurturing and physical contact which they thrive upon. This loving care is exactly the same up until a certain moment w hen the baby is weaned. According to Simone De Beauvoir from that point on boys are taught to become little men and they receive less physical contact and affection than their girl counterparts; They are also a product of their conditioning just as we are. This is an important thing to remember throughout this reading. Boys and girls alike are part of their environmental conditioning through family heritage, cultural traditions, religious beliefs and historical beliefs. As children we all have the same attitudes of temper tantrums, pouting, charming our parents then we are in fact the same until our environment gives us another outlook upon ourselves. Little girls quickly learn that they need to be careful. They need to act like little ladies not climbing trees and skinning knees as their brothers are encouraged to do. This myth starts very early with the family attitude about the physical differences between sexes. Boys have an outward expression of their masculinity which turns th em rapidly into having something to be proud of. This expression of self that has, in the eyes of the parents, a value becomes what the boy measures himself to other boys with. It’s a tactile indicator of their manliness and gives them the instinct of measurability. How long their sex is and how far they can urinate. The inevitable presence of their extension gives them a power of object. Women are inwardness. All of their discoveries are inward and therefore left unsaid. You can’t see much of the sex of a little girl so it is not made a fuss over as boy’s sexes are. Girls try to express their transfer towards an object to a doll for example. This treating a doll as herself gives her the idea that the substance is the same and therefore she is someone to dress up to cater to, that has an existence because others make her exist. Later on in life she will eventually become that doll thing that sits home waiting for her husband and children to pick her up and do as they please with her. Just as she idled away her childhood she idles away the hours of her parenthood, or wifehood at home staving off boredom with no particular goals or worlds to conquer. Boys grow up with the idea that they are going somewhere and have something to accomplish and will assume responsibilities along the way. They learn at around 13 yrs. old that the answer may not come out in words but through violence. A girl wills repress her own violence because girls don’t do that sort of thing. This violence turns into neurosis which in part is violence unexpressed which comes back to oneself eventually. Simone De Beauvoir was avant guard when she recognized the fact that women have their own part of violence at that age but we do not allow ourselves to express it. We are simply not encouraged socially, historically or culturally to express it. Where progress has been made is that more and more women are training in martial arts which are a positive way to express their inner violence. What upset our mothers, and depending on what conditioning you were also given, was the pre- established path chosen for us no matter what we would like to become. Once the path was set then fear was quickly to follow. What path? The path that says no matter what education you receive you will end up a wife and mother then grandmother. This is a frightening aspect of the growing girl’s plight. She will not only have to learn to become a woman, a wife, a mother and a grandmother. She can study all that she would like but there is no real asking of her to do so or to assume the responsibilities that this implies. She’ll marry then stop working to have children and her husband’s career will prevail and take on the traditional role of breadwinner. Perhaps today’s economy has obliged young women to be career assertive but maybe not for the right reasons. Career minded because families are not withstanding without two good salaries to support them. The outer exp ression of sexual pride may still be baring the road. The fact that a young woman can be a productive and important member of our society and that she also has her contribution to make does not seem to impress upon girls as it does on boys. There are so many frightening biological events in the life of a young girl who is becoming a woman that possessing her own inward sexuality is a complicated task. Young men can see theirs, be proud of it, and use it where as young girls have to deal with what biologically is imposed upon them. Their menstrual cycles which alter their characters for several days a month is in itself part of the mystery of womanhood. The changes in her body that may lead her to withdrawal because now she is becoming the object so desired by men. The doll has come of age and can now be manoeuvred accordingly. This is a moment in time when many young women become anorexic keeping their bodies at bay and stopping the menstrual cycle as if time would stand still. The onset of an eventual pregnancy, abortion risk, risks during pregnancy, menopause and all the choices that implies has made being a woman probably more complicated than being a man. What is very interesting to remark according to statistics there are a large majority of women that would prefer being men. Men in a very small minority if they had the choice would have preferred being a woman. There is the unfortunate, radical, feminist view of continuously proving that women can be more or better than men by doing the same things and acting the same way.. I find this unfortunate. If we want equality then we should be striving for equal respect and equal rights not superiority and domination which are what has made us suffer from the ages. Women finding ways to be assertive, well-balanced, brilliant, and effective is what can give us our strength in today’s world. It was unthought-of at the time of French sculpt rice Camille Claudel that a woman could surpass the master. Camille Claudel would never have broken through the layers of men to get to where she did in the arts if she hadn’t had the support of her father firstly and Rodin. Once Rodin retracted she lost all prestige and control over her life. There is the great Mexican artist Frida Kahlo who also had the support of her father interestingly enough and that of a great Mexican artist as well. Both fathers in these two examples gave their support to their daughters which were probably what they would have received if they were sons instead of daughters. In the face of talent and genius these men were supportive and able to recognize potential. How many other Sunday morning painters got left by the roadside because they were not recognized in virtue of their talents but because of their gender? What did the world wars teach us about women? It taught us that in the absence of brothers, cousins, fathers, and husbands they were capable of running a country from industry to education the national health Women kept their families fed, clothed, and sheltered during the war. We are not warriors are heart but have the same potential. There are examples in history like Amazons and Jeanne d’Arc of women capable of leading armies and warring. We could have been cultivated as war lords also but weren’t. Women are givers of life and that is probably what gives us the incentive to promote peace culture instead of war. No woman wants to see her sons, daughters, husband, brothers or sisters go off to war and not come back. The peace movement has a majority of women supporters and that seems to go with the fact that life giving is still our realm. The political world has opened up it’s doors to women within the last twenty years. Before that time there was usually a woman behind a great man in the shadows and there to decorate the photographs for the press more than for her opinions. In France there were three woman ministers elected in the late 70’s. This was a turning point. The paradox comes in when women fought in the French resistance showing their bravery and didn’t obtain the right to vote until two years after the war was over. The equality act was also pronounced shortly after women’s right to vote. This maintaining of women in a conditioned status has been painful for us and is now becoming painful to our male counterparts who are seeking the limits of their own identity. Women are now brought up and beginning to think for themselves, what they want out of life, what they are going to do to get what they need. This is a true cultural revolution. If the conditioning has begun to change then women shall become women and know themselves. Thus knowing themselves they will become decision makers, and active citizens not through man’s making but through their own. This fundamental step has been operating since May 1968 even though precursors since ancient times have been trying to change this. Simone de Beauvoir succeeded in starting the league for Women’s Rights and was a militant for family planning. Giving back to women the right to do what they need to do with their own bodies was an essential step in accepting the responsibilities that are incumbent for every human being either man or woman. The big waking up of our society started with her book and has continued to live on inspiring women to take the responsibility for their lives as a person and an equal which gives them a lot more freedom than it did our mothers. The social role was encouraging us look pretty but please don’t say anything. Mediocrity amongst woman rose as her only idea of self was stemming from what others mirrored her. Her husband and her family were her only mirrors and connection with the world. He went out in the world she quietly stayed home or followed in the shadows. If an intelligent woman did express herself she was ridiculed in public and could not be accepted for her thoughts. The Marie Curie’s and other thinkers are a small handful of the potential that women have been suppressing since the beginning of time. Women are beginning to realize that no matter what their conditioning since birth they can change the course of events in their lives. Taking their own responsibility for their own lives and what is to become of them is the next chapter in our evolution. Women are finally starting to be raised to believe in themselves and their capacities. Ask a little girl today what she wants to become later and she might surprise you and answer â€Å"an astronaut, a research worker, an architect â€Å". We are far from the days of Simone de Beauvoir’s struggle to live in a man’s world. I think that men are having trouble adjusting to this change. They are becoming more and more aware of women’s presence in the work field and their contribution as fellow citizens. Their own identity has been questioned and ours is beginning to grow and develop. This cleavage will be difficult to stabilize  since all related gender problems have finally come to the surface, the debate is whether or not women that are raising their children can make the ‘shift’ to raising their sons and daughters alike. The story perhaps begins and ends with women. Are we going to keep attributing to ourselves the role models that went before us? Or are we finally going to break the bondage of what we have been made to think of ourselves? There has come a time when the individual man or woman will begin to raise his consciousness and choose him or herself first. Not in and egotistical way but to ask oneself the question ‘†What do I need for myself right now to be in agreement with myself?† When finally women and men have worked on themselves enough to be able at any moment to ask themselves that question then it is definitely not a question of gender but autonomy. Do women want their autonomy? Is the easy way out or women to continue a mediocre existence to take the easy way out and let this be a man’s world and a state of dependency and submission? Men take their independence and unfortunately women think or have been taught to think theirs is to be earned. Men believe it is their right from the beginning. Women ask permission for it and in most circumstances and it never comes. Leaving behind all the social prejudice and family prejudice and historical and cultural prejudice can only be the choice of women. Simone de Beauvoir showed us that a woman is herself and can dare to be herself if she so chooses. Although this idea will not appeal to some, women are running for presidential office these days and hold important functions within our highest auspices while Simone’s message has probably hit home. Women are accepting to be themselves without asking permission to do so. Men are battling with their own conditioning and their own identity problems due to this conditioning. In order to create a balance it will take time and courage. Women for peace, for children’s rights, for non-vi olence, for equal education and career rights have united all over the world to speak their piece. A beautiful French song that implies women as being men’s future. could hold a lot of truth in these words. Thinking back on the historical events and cultural ideas about gender it must have taken great incentive for a woman like Simone de Beauvoir de openly and honestly explore the femaleness and the contradictions of our times. It is also easy to comprehend why men find it so difficult to understand us when we are on the brink of finding ourselves as people and as women. Perhaps if our own opinion of self changes then the worlds opinion can also evolve. Starting with individual awareness can only lead to universal awareness in time. Simone de Beauvoir in her rejection of gender has put back the sparkle in the eyes of women and helped us overcome the conditioning of the years. References Simone de Beauvoir ‘ Le Deuxieme Sexe’ Galiard, Paris 1947 Nancy Bauer Contributor ‘Simone de Beauvoir Philosophy and Feminism’ Columbia University press N.Y. 2001 Isabelle De Courtivron Contributor ‘ New French Feminism’ An Anthology ED. Elaine Marks ED. Publisher University of Massachusetts press,Amherst ma. 1980 www.lang.soton.ac.uk/students/french/FrenchThought/beauvoir/ Reference to song written and sung by Jean Ferrat ‘La Femme est l’avenir de l’homme’

Friday, September 20, 2019

Cryptography: Theories, Functions and Strategies

Cryptography: Theories, Functions and Strategies Abstract Digital signing is a mechanism for certifying the origin and the integrity of electronically transmitted information. In the process of digitally signing, additional information called a digital signature is added to the given document, calculated using the contents of the document and some private key. At a later stage, this information can be used to check the origin of the signed document. The mathematical base of the digital signing of documents is public key cryptography. This work presents the theory behind digital signatures, signature schemes and attacks on signatures and provides a survey of application areas of the digital signing technology. Moreover, there are lab exercises developed in Mathlab, to reinforce the understanding of this technology. 1. Introduction The Concise Oxford Dictionary (2006) defines cryptography as the art of writing or solving codes, however modern cryptography does not met this definition. Therefore, this work starts with a literature review defining some key concepts, like what cryptography and cryptographic system are and the different types of cryptographic system are presented. The other interesting and preliminary concept is the notion of cryptosystem functions which are also discussed in the introductory section. Furthermore, it is stated that public-key encryption represents a revolution in the field of cryptography, and this work poses some basic definitions on this topic trying to explain the theory behind. The rest of the literature review is concentrated on public key cryptography and it focuses on the theory behind digital signatures, signature schemes and attacks on signatures. And finally, the literature review presents a survey of application areas on digital signatures. One part of the contribution of this work, is an overview of the secure hash standard (SHS) and implementation of the secure hash algorithm (SHA-1), required for use with digital signature algorithms. The main part though, is the implementation of AES and RSA by utilizing Mathlab. The code of all these implementations is thoroughly discussed and explained in this work. Moreover, a comparison is also presented subsequently. 2. Cryptography The Greek words â€Å"krypt ´os† standing for â€Å"hidden† and the word â€Å"l ´ogos† that means â€Å"word†, are in essence the base from where the word cryptology was derived. As these words denote, cryptology can be best explained by the meaning â€Å"hidden word†. In this context, the original purpose behind cryptology is hiding the meaning of some specific combination of words which in turn would insure secrecy and confidentiality. This is a very limited viewpoint in today’s perspective and a wide range of security applications and issues now come under the term of cryptology (rest of the portion of this section will clarify this point of view). As field of mathematical science, Cryptology includes the study of both cryptanalysis as well as cryptography. On one hand, cryptography is a very broad term and represents any process used for data protection. On the other hand, the study of security related issues and the probabilities of breaking the cryptographic systems and a technique is known as cryptanalysis. By making reference to (Shirey, 2000), the field cryptanalysis can be best described as the â€Å"mathematical science that deals with analysis of a cryptographic system in order to gain knowledge needed to break or circumvent the protection that the system is designed to provide.† In simple words, cryptanalyst can be regarded as the opponent of the cryptographer i.e. he/she has to get around the security which cryptographer devised on his/her part. (Buchmann, 2004) claims that a cryptographic system (or in short a cryptosystem) describes â€Å"a set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.† This is a diverse explanation that includes all sorts of cryptographic algorithms as well as protocols. However, hidden parameters like cryptographic keys may or may not be used by a cryptographic system (Delfs, 2007). Similarly, participants of the undergoing communication may or may not share those secret parameters. Thus, cryptographic can be classified into following three types: a cryptographic system in which no secret parameters are employed (called an un-keyed cryptosystem); a cryptosystem which makes use of secret parameters and at the same time shares the parameters between the participants (known as a secret key cryptographic system); and a system that utilizes the secret parameters, but not sharing them with the participants (call ed a public key cryptographic system) (Shirey, 2000; Buchmann, 2004). Cryptography aims at designing and implementing cryptographic systems and utilizing such systems which are secure effectively. The first a formal definition about the term cryptography dates from relatively past time. Back then, the approach known by the name â€Å"security through obscurity† was being used (Dent, 2004). There are a lot of examples based on this approach by which security of the system was improved by keeping internal working and design secret. Majority of those systems do not serve the purpose and security may well be violated. The Kerckhoffs’ principle is a very famous cryptographic principle which states that (Kerckhoffs, 1883): â€Å"Except for parameters clearly defined to be secret, like the cryptographic keys, a cryptosystem must be designed in such a way as to be secure even with the case that the antagonist knows all details about the system†. However, it might be noted that one important aspect is that a cryptosystem is perfectly securing theoretically grounds, but it may not remain the same when implemented practically. Different possibilities of generating attacks on security of such systems can arise while having the practical implementation (Anderson, 1994). Attacks which make use of exploitation of side channel information are the examples of such attacks. If a cryptosystem is executed, it can result in the retrieval of side channel information with unspecified inputs and outputs (Anderson, 1994). In encryption systems, the input is plaintext message plus the key, while the specific output is the cipher text. Thus, there are chances on information leakage. Power consumption, timing characteristics along with the radiation of all types are some examples in this regard. On the other hand, side channel attacks are the types of network attacks which extract side channel information. Since the mid 1990s there were many di fferent possibilities have been found by the researchers in order to build up side channel attacks. A few examples in this regard are the differential power analysis (Bonehl, 1997), and fault analysis (Biham, 1997; Kocher, 1999) as well as the timing attacks (Kocher, 1996). It is a very practical statement that any computation performed on real computer systems represents some physical phenomena which can be examined and analyzed to provide information regarding the keying material being employed. Cryptography does not help to cope with this situation because of the inherent nature of this problem. 2.1 Cryptosystem functions Other than the usual random bit generators as well as the hash functions, there are no secret parameters that are used in cryptosystem functions. These are the junketed functions that characterize the cryptographic system functions. In cryptographic functions, the elements used are usually one-way and it is difficult or almost impossible to invert them. This follows that it is easy to compute a cryptographic function whereas it is hard to invert the functions and also to compute the results of the relationships (Kerckhoffs, 1883). It is difficult to apply any mathematical method for inverting the cryptographic system functions in a way that will be coherent and meaningful. For example, a cryptographic system functions such as F: X → Y is easy to comfortably use mathematical knowledge to compute while it is hard to use the same to invert (Buchmann, 2004; Shirey, 2000). There are many examples of one-way functions that we can use to demonstrate the meaning of the cryptosystems. In a situation where one has stored numbers on the cell phone, computation of the same is possible and easy due to the fact that the names are stored in an alphabetical manner (Garrett, 2001). If one inverts the relationship of these functions, it will be impossible to compute because the numbers are not arranged numerically in the storage phonebook. It is notable that a lot of other things that we do in daily life are comparable to cryptosystem function in the sense that you cannot invert or undo them. For example, if one breaks a glass, the process is one way because it is not possible for these pieces to be restored together again (Goldreich, 2004). Similarly, when one drops something into water, it is not practically possible to reverse the action of dropping this item (Mao, 2003). The English corresponding action would be to un-drop the item as opposed to picking it. Cry ptosystem functions cannot be demonstrated as purely one-way and this is the branching point between cryptosystem functions and the real world of things and circumstances. The only one-way functions in mathematics can be exemplified by discrete exponentiation, modular power and modular square functions. Public key cryptography uses these functions in its operations but it has not been well documented whether they are really one-way or not. There has been debate in practice whether one-way functions really exist in the first place or not (Garrett, 2001). In the recent day cryptographic discussions a lot of care should be applied when referring to the one-way functions so as not to interfere or make false claims to the functional attributes of these parameters. There is a need to look for extra information and knowledge concerning one-way functions so that efficient and meaningful inversions are possible and mathematically coherent. Therefore, functions such as F: X → Y is considered to be a one-way function (Koblitz, 1994; Schneier, 1996). This follows that if F can successfully and coherently inverted, the need for extra information is needed. This will hence bring the notion of the meaning of the other parameters in relation to F. Computer science uses the hash functions in its operations. This is because these functions are computable and generates output dependent on the input that was used (Katz, 2007; Koblitz, 1994). 3. Digital signatures The public-key encryption presents a revolution in the field of cryptography and until its invention the cryptographers had relied completely on common, secret keys in order to achieve confidential communication (Smart, 2003). On the contrary, the public-key techniques, allow for the parties to communicate privately without the requirement to decide on a secret key in advance. While the concept of private-key cryptography is presented as two parties agree on a secret keyk which can be used (by either party) for both encryption and decryption; public-key encryption is asymmetric in both these respects (Stinson, 2005). Namely, in public-key encryption: One party (the receiver) generates a pair of keys (pk, sk), where pk is called the public key and ps is the private key, The public key is used by a sender to encrypt a message for the receiver, and The receiver uses the private key to decrypt that message. There three parts of information form part of public key certificate: Some naming information A Public key Digital signatures (this can be one or more) Encryptions and digital signatures were introduced to make the web transactions secure and manageable. The use of cryptographic techniques was applied to enhance and provide security layer such that the encrypted information and files would remain secure and confidential. Very frequently, a digital signature is mistaken with the inverse of a public-key encryption, but this is not entirely true. In the history, a digital signature could be obtained by reversing, but today in the majority of the situations this process would be impossible to be performed. Basically, a digital signature is a form of a mathematical scheme for signifying the genuineness of a digital message. A valid digital signature would provide a proof to the person that receives the message or the document that these information is indeed created by a specified sender. Moreover, it would prove that message or the document was not altered during the transportation. Digital signatures are usually used for software distribution or mainly money transactions, where it is very important to detect the possibility of forgery. As a part of the field in asymmetric cryptography, it might be noted that a digital signature is somehow equivalent of the traditional handwritten signatures. On the other hand, in order to be effective, a digital signature should be correctly implemented. Another very important concept is the notion of non-repudiation. This means that if somebody signs a document by using a digital signature, they can not say that it was not signed by them, even though their private key remains as a secret. On the other hand, there is a time stamp, so that even if the private key of a sender is compromised in future, the digital signature will remain valid. Examples of such messages are: electronic mail contracts messages sent via some cryptographic protocol A digital signature usually is comprised of: An algorithm for producing a key. This algorithm would find a private key by chance from all the possible private keys available. Then it will output that private key with a matching public key. A signing algorithm that, given a message and a private key, produces a signature. A signature authenticating algorithm that, given a message, public key and a signature, it will accept or reject the message. Primary, a signature produced from a fixed message and a private key verifies that the genuineness of that message is ok, by means of the matching public key. Then, it has to be computationally infeasible to make an appropriate signature for a party that doesn’t have the private key 4. Algorithms 4.1. Introduction to SHS This section provides an overview of the secure hash standard (SHS) and implementation of the secure hash algorithm (SHA-1), required for use with digital signature algorithms. SHA-1 is used for computing a compressed version of a message or a data file. If that data has a length smaller than 264 buts, then the output will be 160-bit and is called a message digest. The message digest used for an input to the Digital Signature Algorithm (DSA). This algorithm will verify the signature for the message. Signing the message digest instead of the originall message itself, might advance the effectiveness of the procedure. This is since the message digest is usually much slighter in size than the original message. Very important is that the same hash algorithm should be used by both the verifier and the digital signature creator. The usage of the SHA-1 with the DSA can be presented as follows: Interesting for SHA-1 is that it is computationally impossible to discover a message which matchs to a given digest. Moreover, it is also impossible to find two dissimilar messages which create an identical message digest. 4.2. Implementation of SHA-1 The following functions were implemented for the SHA-1 algorithm: Name of source file: secure_hash_algorithm.m. Function in the source file: secure_hash_algorithm (message). This function takes an input a string of characters. Example: Hello, How are you? How is it going on? Output is the message digest, the hash value of the message. Thus, the hash value of the above message is F418F52AE6DC208599F91191E6C40FA876F33754. Name of source file: arithematic_shift_operations.m. Function in the source file: arithematic_shift_operations (number, position, op). The inputs are: number: it is a hexadecimal large number of any size. The number is represented in base 16 and is stored as a string. Ex: ‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’ position: the number of positions to be shifted by. It is a decimal number in base 10. Op: it is the type of operation done. Inputs are ‘SRA’ -> shift right arithematic and ‘SLA’ -> shift left arithematic. For example, the function: arithematic_shift_operations(‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’, 3, ‘SRA’) would return ‘1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’, and arithematic_shift_operations(‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’, 3, ‘SLA’) would return ‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF8’. Name of source file: bi2hex.m. Function in the source file: bi2hex (number). The input to this function is a vector of ones and zeros and the result is a hexadecimal output represented in string. For example, for the input â€Å"Number = [1 1 1 1]† bi2hex (Number) returns ‘F’ and for â€Å"Number = [1 1 1 1 0 0 0 1 ]† bi2hex (Number) returns ‘F1’. Name of source file: hex2bi.m. Function in the source file: hex2bi (number). The input to this function is a number stored in form of a string in base 16 and the result is a vector containing the binary representation of input string. For example, for the input â€Å"Number = ‘F’ †, hex2bi (Number) returns â€Å"[1 1 1 1]† and for â€Å"Number = ‘F1’ â€Å", bi2hex (Number) returns â€Å"[1 1 1 1 0 0 0 1]†. Name of source file: hexadecimal_big_number_adder.m. Function in the source file: hexadecimal_big_number_adder (number_one, number_two). The inputs to this function are numbers stored in hexadecimal string format. Output is the result, a hexadecimal string and carry, a decimal number. After using this function, it has to be checked if the carry is generated, Incase if it is generated then the carry has to be appended in the beginning to the result. For example: Number_one = ‘FFFFFFFF’ Number_two = ‘EEEEEEEE’ [result, carry] = hexadecimal_big_number_adder (Number_one, Number_two) Result = ‘EEEEEEED’ , carry = 1; Hence the real sum is Result = strcat(dec2hex(0), Result); this results to ‘1EEEEEEED’ Name of source file: hexadecimal_big_number_subtractor.m. Function in the source file: hexadecimal_big_number_subtractor(number_one, number_two). The inputs to this function are numbers stored in hexadecimal string format. Output is the result, a hexadecimal string and sign, a decimal number. If sign is -1, then the result generated is a negative number else is a positive number. . For example: Number_one= ‘EEEEEEEE’ Number_two= ‘FFFFFFFF’ [result, sign] = hexadecimal_big_number_subtractor(Number_one, Number_two) Result = ‘11111111’ Sign = -1. Name of source file: hexadecimal_big_number_multiprecision_multiplication.m. Function in the source file: hexadecimal_big_number_multiprecision_multiplication(multiplicand, multiplier). The input is a multiplicand stored in string format is a hexadecimal number. And so is multiplier. The output is a result and is stored in form of a string. For example: multiplicand= ‘EEEEEEEE’ multiplier= ‘FFFFFFFF’ hexadecimal_big_number_multiprecision_multiplication(multiplicand, multiplier) result is ‘EEEEEEED11111112’ Name of source file: comparision_of.m. Function in the source file: comparision_of(number_one, number_two, index). This function compares two numbers in hexadecimal format stored in form of strings. Always input index as decimal 1. Therefore, it: Returns 1 if Number_one > Number_two, Returns 0 if Number_one = Number_two, and Returns -1 if Number_one For example, if Number_one= ‘EEEEEEEE’ Number_two= ‘FFFFFFFF’, the result would be: comparision_of(Number_one, Number_two, 1) returns -1. Name of source file: hexadecimal_big_number_modular_exponentiation.m. Function in the source file: hexadecimal_big_number_modular_exponentiation (base, exponent, modulus). This function calculates (power(base, exponent) % modulus). Here the input base, exponent and modulus are hexadecimal strings of any size. For example: Base = ‘FFF’ Exponent = ‘EEE’ Modulus = ‘AAAA’ hexadecimal_big_number_modular_exponentiation (Base, Exponent, Modulus) returns ‘8BAB’ Name of source file: hexadecimal_big_number_multiplicative_inverse.m. Function in the source file: Z = hexadecimal_big_number_multiplicative_inverse(number_one, number_two). This function returns multiplicative inverse of number_two modulo number_one. If az = 1 (mod m) then z is the multiplicative inverse of a mod m. Here â€Å"number_one = m†, â€Å"number_two = a†, â€Å"number_one = ‘FFFF’ †, â€Å"number_two = ‘1235’ â€Å" andresult is ‘634D’, which in turn is the multiplicative inverse of number_two.Hence : (result * number_two) mod number_one = 1 Name of source file: hexadecimal_big_number_test_for_primality.m. Function in the source file: hexadecimal_big_number_test_for_primality(number). The input to this function is an ODD number stored in hexadecimal format as a string. This function returns 1 if the input is a prime and returns -1 if input is composite. Name of source file: power_of_two_conversion_to_hexadecimal.m. Function in the source file: power_of_two_conversion_to_hexadecimal(power). The input is the number, the power to which two has to be raised to. It is a decimal number and the output is a hexadecimal number in form of string. For example, power_of_two_conversion_to_hexadecimal(4) returns ‘10’ i.e 16 in decimal system. Name of source file: hexadecimal_big_number_division.m. Function in the source file: hexadecimal_big_number_division (dividend, divisor). This function returns quotient and remainder both in hexadecimal string format. The inputs to this function are strings of hexadecimal format. This function uses other two functions in turn which are defined in source file Get_multiplier.m, multiplication_by_single_digit_multiplier.m. Name of source file: remove_leading_zeros.m. Function in the source file: remove_leading_zeros (number). This function takes number in hexadecimal string format as input and removes the leading zeros in the string and returns it. For example, if â€Å"Number = ‘000000012345’ â€Å", then the function returns ‘12345’. Some of the most prominent functions are presented in Appendix A. 4.3. Introduction to MD5 The MD5 Message-Digest Algorithm is a extensively utilised in cryptographic hash functions. Basically this is the case for cryptographic hash functions with a 128-bit (16-byte) hash value. MD5 is used in many security applications, and in addition it is frequently used to check data integrity. An MD5 hash is typically expressed as a 32-digit hexadecimal number. The following figure represents a schematic view of the MD5 Message-Digest Algorithm. 4.4. Implementation of MD5 This algorithm would compute MD5 hash function for files. For example, if as input is given the d = md5(FileName), then the function md5() will computes the MD5 hash function of the file specified in the string FileName. This function will returns it as a 64-character array dwhere d is the digest. The following methodology that the MD5 algorithm was implemented: Initially, the function Digestis called. This function would read the whole file, and will make it uint32 vector FileName = C:\md5InputFile.txt [Message,nBits] = readmessagefromfile(FileName); Then, it would append a bit in the last one that was read from that file: BytesInLastInt = mod(nBits,32)/8; if BytesInLastInt Message(end) = bitset(Message(end),BytesInLastInt*8+8); else Message = [Message; uint32(128)]; end Consequetly, it will append the zeros: nZeros = 16 mod(numel(Message)+2,16); Message = [Message; zeros(nZeros,1,uint32)]; And a bit length of the original message as uint64, such as the lower significant uint32 first: Lower32 = uint32(nBits); Upper32 = uint32(bitshift(uint64(nBits),-32)); Message = [Message; Lower32; Upper32]; The 64-element transformation array is: T = uint32(fix(4294967296*abs(sin(1:64)))); The 64-element array of number of bits for circular left shift: S = repmat([7 12 17 22; 5 9 14 20; 4 11 16 23; 6 10 15 21].,4,1); S = S(:).; Finally, the 64-element array of indices into X can be presented as: idxX = [0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 6 11 0 5 10 15 4 9 14 3 8 13 2 7 12 5 8 11 14 1 4 7 10 13 0 3 6 9 12 15 2 0 7 14 5 12 3 10 1 8 15 6 13 4 11 2 9] + 1; The initial state of the buffer is consisting of A, B, C and D. such as: A = uint32(hex2dec(67452301)); B = uint32(hex2dec(efcdab89)); C = uint32(hex2dec(98badcfe)); D = uint32(hex2dec(10325476)); The message is reshaped, such as: Message = reshape(Message,16,[]); The look between the blocks, such that X is an extraction of the next block: for iBlock = 1:size(Message,2) X = Message(:,iBlock); The buffer states are stored as: AA = A; BB = B; CC = C; DD = D; The buffer is transformed by utilizing the X block from above, and the parameters from S, T and idxX k = 0; for iRound = 1:4 for q = 1:4 A = Fun(iRound,A,B,C,D,X(idxX(k+1)),S(k+1),T(k+1)); D = Fun(iRound,D,A,B,C,X(idxX(k+2)),S(k+2),T(k+2)); C = Fun(iRound,C,D,A,B,X(idxX(k+3)),S(k+3),T(k+3)); B = Fun(iRound,B,C,D,A,X(idxX(k+4)),S(k+4),T(k+4)); k = k + 4; end end The old buffer state is also being added: A = bitadd32(A,AA); B = bitadd32(B,BB); C = bitadd32(C,CC); D = bitadd32(D,DD); end The message digest is being formed the following way: Str = lower(dec2hex([A;B;C;D])); Str = Str(:,[7 8 5 6 3 4 1 2]).; Digest = Str(:).; The subsequent functionality is performed by the following operations: function y = Fun(iRound,a,b,c,d,x,s,t) switch iRound case 1 q = bitor(bitand(b,c),bitand(bitcmp(b),d)); case 2 q = bitor(bitand(b,d),bitand(c,bitcmp(d))); case 3 q = bitxor(bitxor(b,c),d); case 4 q = bitxor(c,bitor(b,bitcmp(d))); end y = bitadd32(b,rotateleft32(bitadd32(a,q,x,t),s)); And the bits are rotated such as: function y = rotateleft32(x,s) y = bitor(bitshift(x,s),bitshift(x,s-32)); The sum function is presented as: function sum = bitadd32(varargin) sum = varargin{1}; for k = 2:nargin add = varargin{k}; carry = bitand(sum,add); sum = bitxor(sum,add); for q = 1:32 shift = bitshift(carry,1); carry = bitand(shift,sum); sum = bitxor(shift,sum); end end A message is being read frm a file, such as: function [Message,nBits] = readmessagefromfile(FileName) [hFile,ErrMsg] = fopen(FileName,r); error(ErrMsg); Message = fread(hFile,inf,ubit32=>uint32); fclose(hFile); d = dir(FileName); nBits = d.bytes*8; Lastly, the auto test function is the following: function md5autotest disp(Running md5 autotest); Messages{1} = ; Messages{2} = a; Messages{3} = abc; Messages{4} = message digest; Messages{5} = abcdefghijklmnopqrstuvwxyz; Messages{6} = ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789; Messages{7} = char(128:255); CorrectDigests{1} = d41d8cd98f00b204e9800998ecf8427e; CorrectDigests{2} = 0cc175b9c0f1b6a831c399e269772661; CorrectDigests{3} = 900150983cd24fb0d6963f7d28e17f72; CorrectDigests{4} = f96b697d7cb7938d525a2f31aaf161d0; CorrectDigests{5} = c3fcd3d76192e4007dfb496cca67e13b; CorrectDigests{6} = d174ab98d277d9f5a5611c2c9f419d9f; CorrectDigests{7} = 16f404156c0500ac48efa2d3abc5fbcf; TmpFile = tempname; for k=1:numel(Messages) [h,ErrMsg] = fopen(TmpFile,w); error(ErrMsg); fwrite(h,Messages{k},char); fclose(h); Digest = md5(TmpFile); fprintf(%d: %sn,k,Digest); if ~strcmp(Digest,CorrectDigests{k}) error(md5 autotest failed on the following string: %s,Messages{k}); end end delete(TmpFile); disp(md5 autotest passed!); 4.4.1 Results This algorithm is tested with the input: university of Portsmouth department of electronic and computer engineering. This was written on the file: â€Å"C://md5InputFile.txt†. The outpus results are as in the following fugures: Textual description of the output results follows: OUTPUT FileName = C:\md5InputFile.txt Running md5 autotest FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 1: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 2: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 3: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 4: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 5: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 6: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 7: 3129b41fa9e7159c2a03ad8c161a7424 md5 autotest passed! 4.5. Introduction to Caesar cipher The Caesar cipher in cryptography, is in essence a shift cipher. It represents as one of the simplest and most widely known encryption methodologies. The Caesar cipher is a kind of substitution cipher. It means that each letter in a given plaintext is replaced by another letter. This is done due shifting by some fixed number of positions down the alphabet. Julius Caesar was the first to use this ci