Saturday, August 31, 2019

The First Day of School Essay

The first day of school is one of a child’s most significant moments of his or her life. Starting off kindergarten can be quite dreadful but a mother’s presence will reassure you that everything will be fine from the very start. In the story, â€Å"The First Day†, the author conveys the story of the mother going to great lengths to prepare her daughter for the start of school. Throughout the story, the author uses narrative techniques such as point of view, foreshadowing, and the main plot in order to convey the meaning of the short story that includes; love, pride and shame. The author uses first person point of view to describe the experiences she went through with her mother while enrolling for school. The narrator includes a series of flashbacks such as mentioning her father, who left them while she was young. This technique gives the readers access to the narrator’s perspective of the events and characters. She includes her thoughts, observations, and feelings about her mother, whom she is ashamed of due to the fact that she is illiterate. The purpose of foreshadowing is to warn or indicate readers of what is to come later in the story. In this case, the story begins with â€Å"In an otherwise unremarkable September morning, long before I learned to be ashamed of my mother, she takes my hand†¦Ã¢â‚¬  The narrator’s shame towards her mother is prevalent when she mentions â€Å"learned to be ashamed of my mother†. This indicates that the memory she is looking back on is not a joyful one. Furthermore in the story, the author makes numerous mentions about the mother’s lack of education by indicating her dialogue. This includes â€Å"If I’da wanted her someplace else, I’da took her there† or â€Å"Would ifou help me with this form? That is, if you don’t mind.† This technique made it obvious to the readers that there is something wrong with the mother. Lastly, the main plot is the most significant technique the author uses to make this short story compelling. It begins with memories of her past, to imagery about her clothing and perfume to introducing the main event: enrolling for Kindergarten. In then furthers to when she could not enroll to  Seaton Elementary School due to her current address. It led to her mother enrolling her to a different school where the climax is revealed that her mother could not fill out the paper work because she did not know how to read nor write. The conclusion came to an end when the daughter found out about her mother’s lack of education and how she realized her mother’s only dream is for her is to go to school and not become like her. The impact of the mother’s only dream for daughter to be able to go to school became the most important point of the story. The narrative techniques the author used showcased the mother’s desperate yearning for a better life for her daughter than the life she endured. It provokes feelings of self-love, pride and shame that unravels throughout the whole story.

Friday, August 30, 2019

Child abuse and neglect Essay

INTRODUCTION Child abuse and neglect can produce serious and long-lasting damage. The range of actions classified as child abuse or neglect is constantly changing as a result of social and economic conditions, political ideology, advances in medicine, improvements in communication and melding of cultures. Today, child abuse and neglect is widely recognized as a major social problem and policy issue throughout much of the world. During the last 50 years, the United States and many of the world’s nations have responded to child abuse and neglect with legislative efforts, a variety of programs and interventions, and organizational efforts to identify, respond to and prevent the abuse and neglect of dependent children. Today, there are innumerable local, national and international organizations, professional societies and advocacy groups devoted to preventing and treating child abuse and neglect. Significance of the Study One case related to child abuse and neglect is pedophilia. Pedophilia affects children of a certain sex and within a certain age, usually under the age of 15 or 16 years. Most pedophiles are not violent toward children, instead leading and enticing children to willingly perform sexual acts, although some are violent to the point of rape and murder. In 1974, the Child Abuse Prevention and Treatment act was passed which provides federal funding at the state level for prevention and response to child abuse. With this act, many states strengthened their response to child abuse and established child statutes in which parents may be prosecuted for abusing their children. Regardless of the legal response on pedophilia, it is clear that much cases never comes to the attention of the criminal justice system and is, unfortunately, never dealt with. This serious and alerting case should be fully characterized and understood for the good of the concerned children, especially the adolescents. What is Phedophilia? As a medical diagnosis, pedophilia is typically defined as a psychiatric disorder in adults or late adolescents characterized by a primary or exclusive sexual interest in prepubescent children (generally age 13 years or younger). In contemporary Western societies, the subject is highly contentious and fraught with strong feelings. The strength of the feelings is readily explained by concern for the welfare of the children and for their healthy, unimpeded development. The child must be at least five years younger in the case of adolescent pedophiles. However, the term pedophile is often used to refer to any adult who is sexually attracted to males or females below the legal age of consent. While there is considerable psychological and sociological literature about pedophilia, philosophers working on the philosophy of sex have given relatively little attention to the subject. As pedophilia is seen as a paradigmatic case of sexual perversion and is generally viewed with strong moral revulsion, it might have been expected to generate more philosophical interest. Experts believe that most pedophiles are males. Some female adults are sexually attracted to boys or girls, but these children are usually at or beyond the age of puberty. Sometimes, however, females sexually abuse children in concert with males, or they will knowingly allow males to abuse their own children or other children. This is more likely to occur if the women are abusing drugs and/or alcohol. Pedophiles may believe that their behavior is normal and that it helps teach children how to become loving and affectionate. Such individuals avoid such words as pedophilia, preferring to use such terms as adult-child sex. They believe that others who do not understand their behavior are unreasonably rigid. Some organizations of pedophiles claim large memberships and actively support the practice of pedophilia. Pedophiles may fail to consider the short- or long-term consequences of their actions; for example, in one case, a pedophile was told by a child whom he had met on the Internet that her mother was a police officer, yet he molested the girl anyway. Most studies of pedophilia are performed on people in jail or prison, and it is also true that many acts of this are never reported. Ephebophilia: Its Opposite Ephebophilia is a variety of male homosexuality. Ephebophiles are attracted to post-pubertal, sexually mature youths. They are sexually attracted to the fully developed, vigorous maleness of adolescence. In the narrow sense, â€Å"pedophilia† refers only to sexual attraction of adults to pre-pubescent and sex with them. When the term is used in this sense, ephebophilia is not included as one of pedophilia’s varieties, but rather distinguished from it, the end of puberty providing the line of demarcation. Characteristics of Pedophiles Pedophiles are age and sex specific. They will normally prefer children of a certain sex and within a certain age. Child molesters fall into several categories. One is the fixated pedophile who never moves beyond the attraction he or she felt for children when he or she was a child. The regressed pedophile often turns to children in response to stressful life events. Although most pedophiles do not physically harm children, the mysoped makes the ritual connection between fatal sexual violence and personal gratification. The sadistic pedophile abducts children for the purpose of torturing and eventually killing them to achieve sexual gratification. Pedophiles come from a variety of backgrounds. Some are well educated, while others are illiterate. Many were not close to their fathers, and many came from homes where alcohol was a problem for at least one parent (usually the father). Pedophiles often have weak verbal skills, and almost 9 out of 10 felt particularly close to their mothers . The short size of the child provides the pedophile with an opportunity to exert power and authority. At the same time, the sex of the child has little to do with the adult sexual orientation of the molester. For example, a male pedophile may be very interested in sex with boys ages 9 or 10 years old, but at the same time be married and consider himself homosexual. Around 80% have been documented as having a history of childhood sexual abuse. The pedophile is known to the child in 90% of cases, 15% or more are relatives of the victim. Homosexual pedophilia does not differ from heterosexual pedophilia. Research on the victim points out that most are female and the molester is usually known. However; when a male is the victim, the molester may be a stranger. The degree of the pedophilia sexual act can vary ranging from simply observing the child, to touching, undressing, exposing of own genitalia, fondling, and sexual intercourse. II. CAUSES OF PEDOPHILIA The causes of pedophilia that have been researched remain unclear. It has been suggested that the pedophilia represents a regression or fixation at an earlier level of sexual development which resulted in an adult repetitive pattern of inappropriate sexual behavior. Therefore, it is suggested that the pedophile returns to a sexual habit that was developed early in life. It is also theorized that the pedophile is expressing revenge regarding a childhood trauma. It is also said that pedophilia is caused by a pleasurable sexual arousal to conditioned objects. The following are identified as possible causes of pedophilia: 1. Parental punishment of a small boy for sustaining an erection 2. Sexual abuse of a young male 3. Fear of sexual performance or intimacy 4. Psychosexual trauma 5. Socio-cultural and/or psychological factors 6. Excessive alcohol intake Previous studies have shown that same-sex child molester is higher than opposite-sex offenders, with offenders against boys being at a higher risk for delinquency, compared to offenders against boys. The number of prior offenses and the intensity of the fixation on children as sexual objects are factors that predict abuse. Another study was done over 111 child molesters. Child molesters included same-sex, opposite-sex, and mixed groups; all responded to stimuli of specific ages and sexes. Findings showed that the degree of sexual reoccupation with children, paraphilia, and number of prior sexual offences were predictors of sexual delinquency. The causes of pedophilia are unknown, but most scientists believe that conditioning in one form or another is involved. The motivation/ learning model can account for the development of pedophilia and can explain its distribution over the life span. A Person to be Declared as Pedophile The diagnosed criteria for a pedophile are as follows: 1. Over a period of at least 6 months, recurrent, intense sexually arousing fantasies, sexual urges, or behaviors including sexual activity with a prepubescent child or children (generally age 13 years or younger) 2. The person has acted on these sexual urges, or the sexual urges or fantasies cause marked distress or interpersonal difficulty 3. The person is at least 16 years of age and at least 5 years older than the child or children molested III. EFFECTS OF PEDOPHILIA The effects of pedophilia to an individual, especially to those who are at a young age, include initial fear, anxiety, depression, anger, aggression and sexually inappropriate behavior. Boys have the same patterns of distress as girls, with symptoms such as fears, sleep disturbances, and distractedness; however, boys tend to be less symptomatic than girls. Additional long-term consequences include self-destructive behavior, isolation, low self-esteem, trust issues, substance abuse, and sexual problems. People who have a history of childhood sexual abuse have increased rates of depressive disorders, anxiety disorders, and alcohol and drug abuse. There is often an increase in psychopathology among victims of childhood sexual abuse and this psychopathology is manifested at times in the form of pedophilia or other inappropriate behaviors with young children. Victims of childhood sexual abuse are more likely than nonvictims of that abuse to manifest sexual hyper-arousal and sexually aggre ssive behavior with a tendency to repeat and reenact sexual victimizations as adults. Physical Damage Injury Depending on the age and size of the child, and the degree of force used, pedophilia may cause internal lacerations and bleeding. In severe cases, damage to internal organs may occur, which, in some cases, may cause death. Herman-Giddens found six certain and six probable cases of death due to child sexual abuse in North Carolina between 1985 and 1994. The victims ranged in age from 2 months to 10 years. Causes of death included trauma to the genitalia or rectum and sexual mutilation. Infections Pedophile acts may cause infections and sexually transmitted diseases. Depending on the age of the child, due to a lack of sufficient vaginal fluid, chances of infections are higher. Vaginitis has also been reported. Neurological Damage Research has shown that traumatic stress, including stress caused by sexual abuse, causes notable changes in brain functioning and development. A study was done on women who took SAT and it was found that the self-reported math Scholastic Aptitude Test scores of the sample of women with a history of repeated sexual abuse were significantly lower than the self-reported math SAT scores of the non-abused sample. Because the abused subjects verbal SAT scores were high, it was hypothesized that the low math SAT scores could â€Å"stem from a defect in hemispheric integration.† A strong association between short term memory impairments for all categories tested (verbal, visual, and global) and the duration of the abuse was also found. Psychological Damage Pedophilia can result in both short-term and long-term harm, including psychopathology in later life. Psychological, emotional, physical, and social effects include depression, post-traumatic stress disorder, anxiety, eating disorders, poor self-esteem, dissociative and anxiety disorders; general psychological distress and disorders such as somatization, neurosis, chronic pain, sexualized behavior, school/learning problems; and behavior problems including substance abuse, self-destructive behavior, animal cruelty, crime in adulthood and the worst, suicide. Long term negative effects on development leading to repeated or additional victimization in adulthood are also associated with child sexual abuse. There are two contrasting adaptive styles in sexual abuse victims. One adaption strategy seeks mastery through active repetition of the trauma, while the other adaption copes by avoiding sexual stimuli. Victims of childhood sexual abuse may exhibit mood disorders including chronic anxiety, depression, delayed post-traumatic stress disorder (PTSD), anxiety attacks, and hysterical symptoms. Victims of sexual abuse may also experience difficulties in intimate relationships and express a sense of alienation, isolation, stigmatization, and a negative self-image. There is a wide variety of psychological conditions that have been documented in sexually abused children, with a higher-than-average tendency toward repetition of either being victimized at the hands of an adult or victimization of children. Arguments that Aroused about Pedophilia In our type of society, pedophile sex is considered both a moral offense and a crime that deserves a truly, serious punishment. There are two further arguments against pedophilia behind both its moral disapprobation and legal prohibition. First, sex with minors is wrong because it is non-consensual; second, it is harmful to those who are concerned. Both of these arguments have been questioned throughout time. Now, let’s look on the way a pedophile is conceived by the public. The pedophile is often visualized as â€Å"a dirty old man†, a stranger to his victims, who forces himself on children and has a matured sexual intercourse, thus putting them through a frightening and painful experience and inflicting serious and long-term damages on them. The drastic effects of the cases explain why pedophiles are usually called child molesters, and why pedophilia seems to be â€Å"the most hated of all the sexual variations†. What is true is that most pedophiles are men but the majority is young or middle-aged. More often than not, they are not strangers; they are likely to be a family, neighbor, or other adults that are known to the victim. The harmful effects of pedophilia on a child’s sexual, emotional and personality development are still a matter of researches and debates; rather than an authorized fact. IV. EXAMPLES OF CASES CONCERNING PEDOPHILIA * A 65-year-old youth minister of the First Baptist Church from Sinton, Texas who admitted to molesting a 6-year-old girl shocked a congregation of followers. The story saw this pedophilic Baptist minister through his 37-year jail sentence. â€Å"I then hooked my thumbs in her waist,† the minister said, â€Å"and put my hands over her groin area, on the outside of her clothing.† â€Å"The first couple of times, she did not say anything,† the minister continued. â€Å"She was more interested in driving. But the second time, when I told her we needed to go home, and she slid over to the passenger seat, the look on her face killed my soul. I felt great remorse for having taken advantage of this child.† * A glam-rocker Gary Glitter was convicted of possessing child pornography, but actual child abuse allegations against him were dismissed because his accuser had sold her story in a newspaper. Glitter seems to be a prime example of the predatory pedophile, continually unrepentant, even after going 27 months of imprisonment in Vietnam for offences against two girls he claimed he was teaching English, after already being permanently barred from Cambodia in 2002 for sex allegations. This case had led for actions to remove passports from sex offenders. * February 11, 2011 – Laval police handled one of the biggest cyber pedophile cases. Sandro Tasillo, 26, is linked to internet sex crimes involving 30 young girls. Police say Tasillo would roam for underage victims on Facebook. He would offer girls money to take off their clothes in front of a webcam. But the money was never delivered, and the photos of the girls were often sold to other pedophiles. Tasillo was formally charged at the Laval courthouse. He faces a total of 40 sex charges. Police believe the 30 victims who have come forward are just the tip of the iceberg. Police are asking other potential victims to contact them as soon as possible. The investigation is still ongoing. V. TREATMENT AND PREVENTION OF PEDOPHILIA Treatment for pedophilia emerged as a means to prevent child molestation or as a way to reduce sexual deterioration. That is, pedophilia is treated either when a person wants to remedy his pedophile tendencies, or when a person has committed a sexual offense against a child and his pedophilic interests addressed to reduce sexual deterioration. This combines preference-based treatment with programs designed to manage other criminogenic needs. Treatment would change factors known to be related to sex offending. Improvement of these factors would correlate highly and negatively with recidivism. Progress in treatment technology would be reflected in greater reductions in sexual deterioration over time. Treatment outcome studies using random assignment would show greater effect, and better-implemented programs would be more successful. In the earliest stages of behavior modification therapy, pedophiles may be narrowly viewed as being attracted to inappropriate persons. Such aversive stimuli as electric shocks have been administered to persons undergoing therapy for pedophilia. This approach has not been very successful. Another common form of treatment for pedophilia is psychotherapy, often of many years’ duration. It does not have a high rate of success in inducing pedophiles to change their behavior. Pedophilia may also be treated with medications. The three classes of medications most often used to treat pedophilia are: female hormones, particularly medroxyprogesterone acetate, or MPA; luteinizing hormone-releasing hormone (LHRH) agonists, which include such drugs as triptorelin, leuprolide acetate, and goserelin acetate; and anti-androgens, which block the uptake and metabolism of testosterone as well as reducing blood levels of this hormone. Most clinical studies of these drugs have been done in Germany, where the legal system has allowed their use in treating repeat sexual offenders since the 1970s. The anti-androgens in particular have been shown to be effective in reducing the rate of recidivism. Making the molester impotent is sometimes offered as a treatment to pedophiles who are repeat offenders or who have pleaded guilty to violent rape. Increasingly, pedophiles are being prosecuted under criminal statutes and being sentenced to prison terms. Imprisonment removes them from society for a period of time but does not usually remove their pedophilic tendencies. Many countries have begun to publish the names of persons being released from prison after serving time for pedophilia. Legal challenges to this practice are pending in various authorities. Some recommendations for the treatment of pedophilia are the following: 1. Risk assessment using a well-supported measure 2. Education of the client, his spouse or partner, family members and close friends 3. Behavioral treatments targeting pedophilic sexual arousal 4. Monitoring of pedophilic clients in terms of access to child pornography, unsupervised contacts with children, and potential disinhibitors such as alcohol or drug use 5. Drug treatments targeting sex drive for higher-risk individuals 6. Cognitive-behavioral and behavioral treatments targeting general risk factors for criminal behavior such as antisocial attitudes and beliefs, association with antisocial peers, and substance abuse Prevention The main method for preventing pedophilia is avoiding situations that may promote pedophilic acts. Children should never be allowed to engage in one-on-one situations with any adult other than their parents or trustworthy family members. Having another youth or adult as an observer provides some security for those who are concerned. Conferences and other activities can be conducted to provide privacy while still within sight of others. Children should be taught to yell or run if they are faced with an uncomfortable situation. They should also be taught that it is acceptable to scream or call for help in such situations. Another basis of preventing pedophilia is education. Children must be taught to avoid situations that make them defenseless to pedophiles. Adults who work with youth must be taught to avoid situations that may promote pedophilia. Many states have adopted legislation that requires background investigations of any adult who works with children. These persons may be paid, such as teachers, or they may be volunteers in a youth-serving organization. VI. CONCLUSION It is very evident that pedophilia is a serious problem of many countries. The alarming rate of pedophile cases must serve as an eye opener to our government, for them to take a serious look and enforce laws that give legal punishment to those who are proven guilty of this crime. Our justice system must be on its track to convict the culprit. Everyone should be responsible in handling this horrible crime. Laws against child abuse and neglect should be strengthened and each one of us should be informed about the terrible effects that this crime would cause. But, let us not only put the pressure to the government in solving this problem. We, in our own families, should be the first to take extra care to our own selves. Our family should be strong and open communication should be observed for the better. Help each other to protect our youth, because; as the saying goes, â€Å"The youth is the hope of our Fatherland.† B I B L I O G R A P H Y American Psychiatric Association. â€Å"Profile of a Pedophile†. Diagnostic and Statistical Manual of Mental Disorders. Arlington, USA: American Psychiatric Publishing, Inc., 2006. Clark, Robin. et al. The Encyclopedia of Child Abuse. New York: Infobase Publishing, 1998. Flisk, Dr. Reverend Louden-Hans. â€Å"Sexual Abuse†. Father, Deliver Us from Evil. USA: By the Author, 2004. Gabbard, Glen. â€Å"Summary and Recommendations on Psychological Treatments†. Gabbard’s Treatments of Psychiatric Disorders. USA: American Psychiatric Publishing, Inc., 2007. Greenberg, Jerrold. et al. â€Å"The Pedophiliac†. Exploring the Dimensions of Human Sexuality. Canada: Jones and Bartlett Publishers, 2011. Laws, D. Richard and O’Donohue, William. â€Å"Pedophilia: Treatment†. Sexual Deviance: Theory, Assessment, and Treatment. USA: The Guilford Press, 2008. Murray, David. â€Å"The Homosexualization of Pedophilia†. Homophobias: Lust and Loathing across Time and Space. USA: Duke University Press, 2009. Primoratz, Igor. â€Å"What’s wrong with Pedophilia?†. Ethics and Sex. London: Routledge, 1999. Soble, Alan. â€Å"Pedophilia†. Sex from Plato to Paglia: A Philosophical Encyclopedia. USA: Greenwood Press, 2006. Vito, Gennaro. et al. â€Å"The Criminal Justice Response†. Criminology: Theory, Research and Policy. Canada: Jones and Bartlett Publishers, Inc., 2007. Internet Sources en.wikipedia.org www.medicinenet.com www.minddisorders.com

Thursday, August 29, 2019

IS Security Essay Example | Topics and Well Written Essays - 1250 words

IS Security - Essay Example Therefore, manufacturers have come up with security systems that protect the operating system and application from attackers, but this system do not ensure 100 percent security guarantee. However, those produced for operating system are proving more effective than those developed for application due to various factors addressed in this paper. This has made most people come to a conclusion that there is less attention to applications compared to the operating system, which is not the case. Why a good level of security is achieved in operating systems than applications The frequent patching and updating of operating system limits the chances of attackers from attacking the system. On the contrary, it appears that operating systems get more attention than applications. This section provides information on why there is a perception that operating systems have higher levels of security than applications. ... On2 the same note, other types of threats that should be considered are interceptions, modification, fabrication and interruptions, which are similar to the threats experienced in computer applications.2 Applications run on the operating systems. Therefore, it is easy for an attacker to use the application file or vulnerability to attack the operating system either through one application or by infecting other applications. This enables the user or system administrator to detect the attack before affecting the operating system, hence the misconception that security threats are more prevalent in applications than operating systems. One difference between operating system security issue and application is file permissions. An example of this is when an application misunderstands the semantics of an operating system file or totally omits a check. This problem does not occur in operating systems; this stems from the fact that any attempt to open a given file will prompt a permission chec k as the file permissions link to individual files.2 On the other hand, some operating systems mechanisms result to complex security issues for the applications used today. Operating systems are not flexible in offering support, resulting to a compromised security issue. An example of such operating system is that of UNIX, which violates some privileges by only supporting a two level privilege that includes root and user. To limit these 3limitations, it introduces â€Å"set user id†, â€Å"set group id† and â€Å"chroot (2)† that are particularly limiting and inadequate. These applications aim to become responsible for granting permissions, accepting requests, and managing resources, which

Wednesday, August 28, 2019

Environment Research Paper Example | Topics and Well Written Essays - 1250 words

Environment - Research Paper Example The issue does not just end here with the high temperature; the area receives thunderstorms and very heavy rainfall in the second half of the year which disrupts the lifestyle of the people, and the area goes through a period of drought in the spring season (Climas). In Figure 1, the image shows that the southwest has very high average annual temperatures because the area of Arizona is marked by red spots, indicating that it is the area which experiences the highest temperatures. Considering that area is already experiencing such harsh weather and worse conditions are predicted in the future, there is a high probability that the people will be reluctant to move in Phoenix. Recently, there was a forum named On Point with Tom Ashbrook which discussed the issue of the changing climate in the American Southwest. The implications presented regarding the changing weather in Southwest was that the year 2011 was when there was record number of bushfires which unfortunately were also the most dangerous ones in the history of the area. It was also the hottest and the driest year in the area in its history with temperatures soaring above the mid-40C mark and periods of severe droughts in the first half of the period. (Ashbrook) If our organization goes ahead with the project, it is likely that many of the subdivisions go unsold at least in the foreseeable future. This is because people are unwilling to move in a state which is experiencing such a harsh climate accompanied by water problems. The area has been stated by many experts as overgrown and the state authorities have been reluctant to issue more licenses for housing projects. Figure 2 shows this fact by the graph where the state authorities have reduced the authorization of construction of housing units since the past few years. This action has been taken from the observation that the population is already far greater than the water resources available in the area. (Ackerman, 2011) William deBuys has gone as far as stating that the droughts of Southwest will potentially be so devastating that it will create the greatest water crisis known to the humans (deBuys). The writer has stated that the people need to get ready for a period which he states as the â€Å"Age of Thirst† and that if appropriate steps are not taken swiftly such as improving the water supply system and constructing additional reservoirs, then the whole of the civilization in the area will disappear as a result of the shortage of water. The writer has also presented some suggestions in his book out of which one suggestion is that the population in the area needs to be shifted out gradually because according to the author, it seems unlikely that the area will be able to survive this century given it fast changing climate. (deBuys, A Great Aridness: Climate Change and the Future of the American Southwest, 2011) Many authors and analysts have stated the construction and settlement of Phoenix as one of the biggest mistakes ever simply because it is not sustainable. Author Andrew Ross in his book has said that other cities need to learn from the mistake made by the developers of Phoenix, which he has stated as a horrible mistake (Ross, 2011). Also, the author Simon Winchester said in an interview that the city was not really a nicely planned city because it was never a sustainable project considering that it does not

Tuesday, August 27, 2019

BORDER SECURITY ISSUES RESEARCH PROJECT # 2 Essay

BORDER SECURITY ISSUES RESEARCH PROJECT # 2 - Essay Example The CPJ report shows that Iraq has held this position since 2008, when there was another survey (Witchel, 2014). In 2012, when there was a U.S invasion, journalists were not killed because of their relation to their work. However, because of increasing terrorists groups in the country, there were 10 journalists killings of which nine were unresolved murders. In total, the report shows that there 166 journalist murder cases since year 1992, with 103 of these cases murdered with impunity. The second country ranked as the worst is Somalia, where there were four new murders last year. According to the report, there are elusive armed insurgent gangs who terrorize the media to the point that the law agencies do not follow-up the cases (Witchel, 2014). There were 53 journalists’ deaths since 1992. Out of these deaths, 35 journalists were murdered with impunity. In Philippines, there are 51 murders of journalists that are still unresolved. The country has remained number 3 after Iraq and Somalia since year 2010 (Witchel, 2014). According to the CPJ report, there are 53 journalists killed since 1992 and 35 of these journalists were murdered with impunity. In Sri Lanka, there was no progress made in the unresolved cases of journalist murders. However, CPJ notes that it did not record any of the murders from year 2009 to 2013. CPJ notes that out of 19 journalists killed since 1992m 10 of these journalists are murdered with impunity and go unreported in Sri Lanka. Colombia falls in the fifth category with 45 cases of journalists killed since 1992. 36 of the 45 cases were murdered with impunity. Nonetheless, it records so many cases of death threats of journalists in different states of Columbia. In Afghanistan, journalists who are also from other states are usually jailed for many years such as the Pakistani reporter who was sentenced to 4 years in prison in July, this year. In total, Afghanistan records 26 cases of journalists murdered since 1992, with

Monday, August 26, 2019

Adam Smith Wealth of Nations Essay Example | Topics and Well Written Essays - 250 words

Adam Smith Wealth of Nations - Essay Example Smith is actually considered to be the Father of Modern Economics.Adam Smith's ideas as reflected in his work are still relevant today. His concept of free-trade is still what majority of the world's economy is practicing. Free trade, according to Smith, is the ability of the economy to produce the sufficient amount of goods and provide different varieties with the guidance of what he calls "the invisible hand." If there is a shortage of a certain product, price tends to increase which, in turn, gives higher profit to the producers. This entices more producers to enter the market which leads to the increase in supply of the product and more competition among the producers. Given this condition, price naturally gets lower. Once the price gets too low that the producers would incur losses than profits, they will be out of business. Although this competition can be due to human's pursuit of self-interest, this benefits the society as a whole by keeping the prices of goods at a low level and, at the same time, having a variety of products and services.This idea is what happens in our modern economic society. Businesses get into the market because they can see a potential profitable market. And what prevents these businesses to monopolize in their field is the fact that there will be other businesses or individuals who would want to get into the same market and have a fair competition.

Sunday, August 25, 2019

Theology (The Bible and Archeology) questions Research Paper

Theology (The Bible and Archeology) questions - Research Paper Example Because of this need, aspects of the political, economic, and commercialized powers had to be held in check in order to create fair trade. Ashlar construction is a method of cutting stone in a rectangular shape with a very even symmetry of cut and using the material instead of brick for building. The stone is usually a smooth finish, although it can be decorated with a scraped in design. The Latin root of the word citadel is the civis, which is also the root of the words city and citizen. A citadel is a part of the means of protecting the city through the use of barriers, most commonly walls, that are surrounding a central fortified structure that is the last means of protection against invaders. This last structure, the citadel, is usually taller than the other buildings, can act as the location of the highest political power, and is built to withstand a great assault. Within the citadel the citizens could wait out a siege with the hope that the invader did not have the strength to breach this last hold. Because the city of Jerusalem is built on a mountain it has a great amount of protection from invaders. However, the availability of water during a siege is greatly hampered by this construction. The Siloam Tunnel, built by Hezekiah in 701 B.C., is beneath the Ophel and can act as a aqueduct to transport water to the city. There is evidence of cro-magnon and Neanderthal remains within the area of Canaan from the Paleolithic era. Neanderthal remains date from the Middle Paleolithic age, while Cro-magnon remains date from around 40,000 - 10,000 B. C. There is also evidence that man settled in the area of Jericho as early as 9000 B.C. within agricultural communities. Earlier civilizations were hunting gathering communities. The two Neolithic phases are defined by the pre-pottery stage and the pottery stage. The pre-pottery phase of the Neolithic phase is distinguished by the emergence of Jericho as

Midterm Essay Example | Topics and Well Written Essays - 3250 words

Midterm - Essay Example To this end, the paper will critically examine the concept of philosophy and what it actually means in the general sense. From there, the Indian philosophy will be examined in-depth. This will involve the critical review of elements and aspects of Indian thought and what really matters to the Indian people in terms of philosophy. Afterwards, the paper will examine traditional Greek philosophy, which forms the basis of Western philosophical thought. This will lead to a comparison between the Greek and Indian philosophical ethos. This discussion will make way for an introduction of Chinese philosophical worldview. This will involve the reconciling of Chinese philosophy and Indian philosophy as the Eastern or Oriental school of philosophical thought and the assessment of their differences. The discussion will also compare how the two philosophies differ from each other. In order to analyze and evaluate the core concepts and ideas of this study, there is the need to make meaning of the world "philosophy". This will provide an answer to the central features and concepts in the discussion to be undertaken. There are various definitions of philosophy that can be used to describe the concept. Philosophy can be viewed as the fundamentals related to the study of human thought and a conception of things around human beings. In other words, philosophy is about how to provide a documentation and definition of various ideas and principles that describe things that exist and things that happens around people in the

Saturday, August 24, 2019

Organizations digital investigation process Essay - 1

Organizations digital investigation process - Essay Example The occurrences can be triggered by internal and external factors and can cause considerable damage or loss to an organization directly or indirectly. For instance A contingency plan should be devised to mitigate such incidences. A framework formulated will prepare for both low frequency/high impact as well as high frequency/low impact events in the organization. This paper details investigation procedure at Salford university school of computing science and Engineering. Our case study will focus on server intrusion in the university school department. An incident of server intrusion to the university system occurred, and a contingency plan formulated to authenticate the suspicion, respond and analyze the incident. Due to the delicate nature of digital evidence improper handling may lead to damaged or compromised data. The idea of having to start an investigation in this department can lead to a crisis. Proper procedures need to be laid down to manage the crisis. There are general qu estions, which the CFA will need to address in order to carry out the investigation successfully. A digital investigation divided into different stages according to the model adopted. Researchers at the U. S. Air Force studied various models and came up with common characteristics that characterize these models. They then incorporated them in a single model known as Abstract Process Model. It contains different phases; this model has 17 phases classified into 5 major groups. (Gilbert Peterson, 2009).

Friday, August 23, 2019

Grant proposal for skagit conty to prepare Flood awareness brochure in Essay

Grant proposal for skagit conty to prepare Flood awareness brochure in Spanish - Essay Example The project plan helps in sensitizing the people on the response to an emergency and the steps necessary to ensure that they are safe. The plan is expected to capture the audience that mostly do not understand English and feel let put on the local authority disaster management plan due to language barrier. The projects objectives include the Hispanic and Latino community living in Skagit County, Washington for flood disaster that looms in their neighborhood. To achieve the goal, there is a need for the community to understand the sub objectives that supplement the main goal. Identify the warning systems. The warning systems are the media of communication that is accessible to many people. The systems include the radio stations weather channels and warnings from people in the authority. Identify members of the Hispanic and Latino community and create a community directory. Discuss the evacuation procedures in place with the community in regard of what to carry like medicines and clean water. The procedures should be encouraged to be on family levels where the head of the family is to ensure that if an alert is given all the family members are together and leave as a family (Veenema, 2003). The community level involves familiarizing the Hispanic and Latino community on the roles of the police during an evacuation. To discuss the precautions to take during and after a flood in order to avert waterborne diseases. The community will be advised on how the best practices to avert water bone diseases that are common during and after floods in the area. Community resilience is essential and critical in any community. It ensures that when disaster strikes the community recovery and restoration be fast tracked in terms of essential services (OLeary 2004). Community resilience involves identifying and evacuation route in Skagit County. This is done in collaboration with the residents and the authority that best know the area. The process of community

Thursday, August 22, 2019

Best Buys Problems Essay Example for Free

Best Buys Problems Essay 1. After Anderson took over Best Buy in 2002, he pursued four pivotal strategic initiatives, what prompted him to do so – his rationale? After Brad Anderson became the CEO of Best Buy in 2002 his team of executives came up with and emphasized four main central strategic initiatives, which are customer-centricity, promoting an efficient enterprise, win with providing the best service, and win in entertainment. As we all know, customer-centricity being by far the most important initiative. One major reason that prompted Brad Anderson and Best Buy to come up with these strategic initiatives was the main threat of imitation by competitors for example the emergence of Wal-Mart, Target as mass merchandisers/wholesalers and other forms of retail such as Amazon (online retailers). In the past, most of Best Buy’s competition focused on customers whose main concern is pricing, without providing anything extra such as advice, support and services. However as the competition began to emulate or imitate Best Buy’s strategy/business model by delving into the higher-end consumer domain (electronics) which is of course Best Buy’s bread n’ butter, Brad Anderson and his team of executives had to come up with a new way to do business by focusing on customer-centricity instead of just focusing on the product (or the selling of it) itself. For example Wal-Mart is poaching or headhunting talented Best Buy salespeople or their rising stars by offering them better benefits which will in turn cause a high turnover rate of Best Buy staff and hinder their sales force and development program. Another reason, which is also vital and in turn prompted change in Best Buy’s strategic initiative is the key concept that the environment or the world we live in as well as the people/customer will continually change. One who understands this concept will ultimately grasp the fact that people’s needs are constantly evolving and changing over time. For example as mentioned briefly above whereas in the past clients tended to be more function and price-conscious, in the modern world of today customers will tend to value service and support and put more of an emphasis on those elements rather than just the pricing itself so instead of trying to just sell the product/service, a company must in essence place more emphasis on the customers themselves, thus creating a customer-centric worldview by centering on individual needs instead of the â€Å"one style fits all† approach and by redefining its value proposition in a coherent way which aligns with the central strategic initiative of customer-centricity. 2. What are the key elements of Anderson’s most important strategic initiative – customer centricity? One of Best Buy’s core goals is to create a customer-centric culture by developing a better understanding of customer’s needs or requirements and by providing them with attention, care, excellent service and knowledge. Therefore one crucial element in Anderson’s customer centricity strategic initiative is the introduction of customer segmentation. He firmly believed that Best Buy would do well if it could concentrate on the most profitable segments and deter the unprofitable segments altogether. Because of this Anderson aimed to build customer loyalty with the profitable segments and in doing so, the company’s existing assets can then be leveraged. Therefore 5 different customer segments were introduced and implemented; Barry, Buzz, Ray, Jill and BB4B (for businesses) each led by a segment leader whose primary purpose was to deeply understand his/her segment’s buying behavior, attitudes and tendencies, armed with insight into consumer needs. By focu sing on customer segmentation, Best Buy can come up with or improve its system and products catered to the specific needs of each group thereby also enhancing differentiation to meet long-term trends or needs. Another key element in Best Buy’s customer centricity model is the concept of Best Practice Sharing and instead of just focusing on the selling of the product, staff (sales) must also focus on offering customers solutions. For example instead of just offering to sell a single product, the informed staff can offer to sell the â€Å"whole deal† such as video conferencing, digital signage, and technology lifecycle management packaged altogether for a business client. Because of this I believe that HR has a very important role to play in providing development/training programs for the employee as well as identifying and recruiting â€Å"star† employees, providing them with the benefits so that their services can be retained on a long-term basis. A central element in Best Buy’s customer centricity initiative is a change in its labor force or model. Because of this new specialized positions were added into the Best Buy labor force. So instead of solely having skilled salespeople, Best Buy also employs Geek Squad agents (technology experts valuable to small businesses and well equipped to deal with the BB4B Best Buy for Business segment), home-theater/technological product installers, and even personal shopping assistants. This focuses on extensive training regarding the different customer segments, addresses the need to recognize the different necessities of many types of customers and also finally to identify customers most likely to buy which product from a particular segment/domain (scope). In addition to the change in labor force or model, leveraging prior acquisitions is also an important element in Best Buy’s customer centric ideology. By leveraging the two, Best Buy can pool its resources and put its custo mers first and in turn offer them more options as well as solutions. Customer relationships can also be leveraged to create customer loyalty fostering long-term relationships with the client. For the sake of brevity I would like to briefly mention the last important element in Best Buy’s customer centric ideology/strategy, which is the empowering element. This calls for empowering sales staff to make wholesome, informed merchandizing decisions. With a proper training and development programs, employees can use their knowledge about customer behavior, form hypotheses and test it out in a real world setting to see what works. After they can discuss about the results and if something yields favorable results (promoting and meeting a variety of needs with more choices for customers), new ideas can be implemented to promote and attain the perfect customer experience and customer satisfaction. By empowering its employees new and worthy ideas can be attained. The ever-comprehensive Best-Buy reporting system and its â€Å"chalk-talks† are also vital in obtaining important information (customer centric vs. non-centric stores) and trends as well as teaching its employ ees good business practices. 3. How would you recommend Brad Anderson for further actions? I believe that Best Buy’s problem lies in its function of a flawed business model, which in turn led to a function of poor execution. The poor model being where the merchant organization, segment/domain leaders, and GMs were forced to coexist and work wholly together as a business group. Before the customer centricity initiative kicked in, the merchant organization was in charge of everything such as buying, pricing, marketing/merchandizing, etc. The new model however forced merchants to work together with segment leaders. This in turn forced the merchants to switch out of their comfort zone and take a more holistic view of the business, focusing more on customer needs. The company’s growth path now expected merchants to put the customer first and foremost and grow the business by offering more than just the product itself, it must also identify customer trends. While the merchant organization was used to controlling everything, now they have to listen to and work with the segment leaders who have all the insight regarding customers, where they tended to focus on the opportunity solely from the consumer’s point of view. Ron Boire (VP GM) himself believed that their loss in the third-quarter results was because there was no camaraderie between the three business units (GMs, Merchants, and Segment leaders). Coexistence between the business units is difficult, therefore contributing to a flawed model. For positive further action, one thing Anderson could do is eliminate the risk of fragmentation altogether. Fragmentation can lead to a â€Å"focus on everything† strategy, which in turn can harm the business by trying to do too much, and wasting away valuable resources. It should concentrate and have at all times 3-5, but never more than 5 customer segments, which will create confusion and loss of focus. Best Buy should ultimately focus its assets on its â€Å"angel† group or most profitable customer niche. For example it can separate its most successful segment that being BB4B (Best Buy for Business) and establish an individual unit. This is because that segment in itself can be a separate yet focused unit because it will inevitably also encompass various segments in the business as well, cross-cutting. Another element that Best Buy can focus on is (I know that this has been said and done over and over again) having a proper staff development program in place, which of course, focuses on customer centricity. I’m sure this element is and has been addressed before however I would like to emphasize the importance of having a proper system to measure the results of the program itself. Training can be done repeated again however what is most important is that there is a system that directly measures the results of effects of staff development initiative. Another way to go would be to cut costs and heavily promote online sales. Best Buy has been slow in capturing the online market share. It also has to improve its image as it suffers from price comparison issues. Best Buy should ultimately focus on these factors, which it is of course currently doing in its â€Å"Renew Blue† strategy: * Reinvigorate the customer experience. Best Buys plans include offering customers unique benefits and exclusive membership programs, and continuing to develop a leading edge, multi-channel shopping experience through a highly relevant and effective system. * Attract and grow transformational leaders who will inevitably energize employees to deliver extraordinary results.

Wednesday, August 21, 2019

Literature Review Of Tourism In Gujarat

Literature Review Of Tourism In Gujarat Gujarat is a state of India, geographically situated in the western tip of India and surrounded by Arabian Sea coastline. This is the only state that has longest coastline. Pakistan to the north-west borders, Arabian Sea to the southwest, Rajasthan state to the northeast and Madhya Pradesh state to the East. People of the state and the local language are known as Gujarati. The state has some of largest businesses of the India such as diamond, cement, denim cloth manufacturing, grassroots oil refining, agriculture etc. Worlds largest ship braking yard at Alang existed in the Gujarat near Bhavnagar district. Major cities of the state Ahmedabad, Surat, Baroda (Vadodara), Rajkot, Jamnagar, Bhavnagar are playing main roles to grow the economy rates and increasing name and fame for the various businesses in the world. Gujarat state has various factors to attract foreigner as well as national and local tourists. History tourism, Medical tourism, Business tourism, Culture tourism, Adventure tourism and many more are most attractions. Gujarat state has different mode of transportations such as buses, railway, auto and taxies, aeroplane, boat, ship. Above all transportations is easy, cheaper and faster in compare to other states of India. About the political view Gujarat is governed by Legislative Assembly of 182 members, Legislative Assembly members terms is for five years and the administrations of the state is led by the honourable Chief Minister. Main Body Gujarat have different festivals and they play an important role to call foreign tourists, major of the festivals are Diwali, Navratri, Raksha Bandhn, Janmastmi, Holi, Kite Festival and many more. Diwali is the festival of light, on that day lot of sweets are cooked and at the evening people enjoy with fireworks. Navratri is the longest festival of the India and the world as well. It is a nine nights dancing festival, it is called Dandia or Garba. On the festival of Rakshabandhan, sister tie a band on the right hand of her brother, that is a holy band, belief is like the band will defence of the brother. Janmastmi is one of the holiest festivals, because it is the birth day of lord Krishna, the most worshiped god of India. Holi is called a festival of colours, on that day people spoil one to another with different colours. Every 14th of the January is celebrated as a Kite festival, international kite flying contests is also organised in the Gujarat. Most of the contestants are foreig ners. These all festivals are big attractions for foreign tourist. Food, festivals and lifestyle are famous of Gujarat state. Local people are used to eat spicy but very tasty food. Simply thinking and high living is the basic life slogan of them; they are enthusiastic, active, and adventurous. Gujarat is having different communities, such as Hinduism, Islam, Jainism, Sikhism, etc. Different religions have different food, belief and lifestyle, tradition and god. Gujarat state is famous for various kind tourisms, such as A) Medical Tourism B) History and Heritage Tourism C) Cultural Tourism D) Business Tourism E) Recreational Tourism F) Spiritual Tourism In detail explanation A) Medical Tourism Medical tourism is a new force of the tourists, who visit abroad for their medication or medical treatment. For an example, dental treatment or surgeries are costly in the United Kingdome but it is very cheap in the India (also in Gujarat) so patient from UK travel to India for their dental medication or surgery is called medical tourism. In Gujarat there are number of hospitals with high tech equipment and numbers of medicines. There are two types of tourists leisure tourists, who travel abroad for their minor treatment that is part of their vacation and tourists travelling especially for their medical treatments. In compare to medical treatment in UK/USA/CANADA/New Zealand, cheaper medical treatment plus airfare, tourist can save excluding the visit cost and accommodation in Gujarat. B) History and Heritage Tourism Gujarat has world-class history and heritage, in previous time, Gujarat was ruled by many kings, they left something as memorable which is known as golden heritage. This historical heritage attracts not only to the national tourists but also tourists from different countries as well. Some of them are world famous tourists places such as Lothal an ancient port city of old age, existed near the river Sabarmati (Ahmedabad city). Dholavira Kutch is a small village, an archaeological site, situated in Kutch district of Gujarat which is surrounded by dessert of Kutch. This is a massive site, belongs to about 5000 years old Mohenjo-Daro Harappan Civilization. Another place is Champaner (The UNESCO -listed world heritage site) this is the one of the most remarkable archaeological site of the Gujarat with Hindu temples and step wells, existed nearby Pavagadh (about 70kms from Vadodara a metropolitan city). Rani-Ki-Vav (step well) was built in the 11th century, It was built by Queen Udyamat i as a memory of her husband King Bhimdev. It has seven galleries which are laid out in east-west direction. Steps corridors and wall-borders are carved with divine glory and deep understanding. That is established near Patan Taluka Mahesana district of Gujarat. These all sites are just examples of old age time and now they are under preservation because of famous historical tourists places. D) Business Tourism Gujarat earned name and fame in the world for its business sector. Many of them are in worlds top ten business, for example, diamond industries in the Surat city is the biggest diamond production hub of the world even though there is no any diamond mine found. Gujarat state has worlds 2nd largest grassroots refinery. Biggest cement productions plants, biggest denim production plants that is why Gujarat is known as the Manchester of the East and Denim city. One of the states of India produce and export cotton in largest amount, Gujarat is worlds 3rd largest denim producer. This state has fastest growth of economy, especially in the chemical sector; it has a complete portfolio of chemical products that includes petrochemical and downstream products, dyes and intermediates. Gujarat has also big name for the producing pharmaceuticals, this is the most developed and the same type competitive sector with about 3245 manufacturing license and 42% pharmaceutical turnover of the India and 22% of Indias export. Not only industries are increasing the economy of the Gujarat but the agriculture is supporting same type. Cotton, sugarcane, banana, onion, potatoes, groundnuts (peanuts), grains and beans are the main corps of Gujarat. There is a long queue of foreign investors to invest in the state, by that way Gujarat has been earning business tourism income, and expanding economy growth. C) Recreational Tourism Festival is the synonym of recreation, when Gujarat has numbers of festival. Fairs are organised during some festivals, and those fairs are most attraction of tourists. Many if fairs are famous in tourist list, namely Bhavnath Fair, Kavant Fair, the grant fair -Vautha, Shamlaji Fair, and Tarnetar Fair. During those fair there are various activities and competitions are organised. People get together at a place of fair and enjoy different food, shopping, rides and colours. Fairs are most famous among national and local tourists rather than foreigners. Except the fairs Gujarat state has wildlife and adventurous forests. Gujarat is 7.46% covered by forest, Gir (Junagadh District) is the most famous forest and the only home of Asiatic Lions, outside Africa this forest in Gujarat is only natural habitat of lions and hot spot of foreigner as well as national tourists. D) Spiritual Tourism Gujarat has several of devotional places which attract tourism. Most of them are Hindus holy places; they visit at least once in their lifetime. Their religious belief and devotional interest influence to the foreigners and mostly western people. It makes them to visit those holy places too. Dwarkashish temple at Dwarka, Dakor temple, Somnath, Gopnath, Ambaji, Girnar those are holy places for spiritual tourism. Conclusion Gujarat is the state of India, I can say, has numbers of tourists visit in a year. Except of the tourists places mostly the state is well known for the food, festivals, people their life style. Mainly foreign tourists influence by the state because of geographical location and having suitable atmosphere. Simple life style but high quality food influences them more to visit it often. Honesty, enthusiasm, calm and humbleness are the natural in the temperament of Gujarati people. Various type of tourism is involved in a same place that is the awesome thing in the Gujarat. This state has been changing to the infrastructure. Latest technologies and equipment keep the state update all the time. Most admiral thing is Gujarat state remain safe while facing many natural disasters. Even there is none any major damages or harm in the history of the state. Tourism is a very big developing sector of the Gujarat state. Longest coastline attracts to the foreigners, moreover cosmopolitan cities, long river banks, colourful festivals, food with novelty but unchanged culture, speedy-easy but cheapest transportation system those are all main sources for to has success and vibrant tourism spot. That is why Gujarat is called VIBRANT GUJARAT.

Tuesday, August 20, 2019

Virtual Reality Applications and Universal Accessibility

Virtual Reality Applications and Universal Accessibility 1. Abstract The conception of Virtual Reality, a divinatory three-dimensional, computer-generated environs that allows a individual or multiple users to interact, pilot, react, and feel a compounded world modeled from the virtual world, has provided social, scientific, economic and technological change since its origin in the early 1960s. The environs do not necessarily need the same properties as the real world. Most of the present virtual reality environments are principally visual experiences, displayed either on a computer desktop or through peculiar or stereoscopic displays, but some pretences admit additional sensory information, such as sound through speakers or headphones. Virtual reality is a technology, which allows a user to interact with a computer-imitated environment, whether that environment is a feigning of the real world or an imaginary world. Virtual Reality brings the vision as close and realistic as reality itself. In present world virtual reality is useful in variety of fiel ds like Information Systems, Military, Medicine, Mathematics, Entertainment, Education, and Simulation Techniques. Most of the Virtual Reality systems allow the user to voyage through the virtual environs manipulate objects and experience the upshots. The supreme promise of virtual reality is universal accessibility for one and all. In this project, everyone will welfare people across all the fields. And the dispute is to develop a well-informed virtual reality systems with design and smart commonsense rule that are useful to people and those that provide great value and real meliorations to the quality of life. If this can be accomplished, tomorrows information society technology could be bidding greater exclusivity through atmosphere, intelligence and universal accessibility. 2. Background Virtual reality may obliterate into the main headlines only in the retiring few years, but its roots reach endorse four decades. The nation was shaking in the late 1950s because off palatable traces of McCarthyism and was agitating to the sounds of Elvis, that an idea arose and would change the way people interacted with computers and make possible VR. At the emerging time, computers were looming colossi locked in air-conditioned rooms and used only by those familiar in abstruse programming languages. More than glorified adding machines few people considered them. But a former naval radar technician named Douglas Engelbart young electrical engineer viewed them differently. Rather than limit computers to number crunching, Engelbart visualize them as tools for digital display. He knew from his past experiences with radar that any digital information could be viewed on a screen. He then reasoned and connects the computer to a screen and uses both of them to solve problems. At first, his ideas were disregarded, but by the early 1960s other people were also thinking the same way. Moreover, the time was right for his vision of computing. Communications technology was decussate with computing and graphics technology. At first computers based on transistors rather than vacuum tubes became avail. This synergy yielded more user-friendly com puters, which laid the fundament for personal computers, computer graphics, and later on, the emergence of virtual reality. Fear of nuclear attack motivated the U.S. military to depute a new radar system that would process large amount of information and immediately display it in a form that humans could promptly understand. The ensuing radar defense system was the first real time, or instantaneous, feigning of data. Aircraft designers began experimenting with ways for computers to graphically display, or model, air flow data. Computer experts began provide with new structure computers so they would display these models as well as compute them. The designers work covered with a firm surface the way for scientific visualization, an advanced form of computer modeling that expresses multiple sets of data as images and the technique of representing the realworld by a computerprogram. Massachusetts Institute of Technology The process of extracting certain active properties by steeping self-styled computer wizards strove to lessen the condition that makes it difficult to make progress to human interactions with the computer by replacing keyboards with capable of acting devices that have confidence on images and motion hands to emphasize or help to express a thought or feeling to manipulate data. The idea of virtual reality has came into existence since 1965, when Ivan Sutherland expressed his ideas of creating virtual or imaginary worlds. With three dimensional displays he conducted experiments at MIT. He outlined the images on the computer by developing the light pen in Ivan Sutherland in 1962. Sketchpad, is the Sutherlands first computer-aided design program, opened the way for designers to create blueprints of automobiles, cities, and industrial products with the aid of computers. The designs were operating in real time by the end of the decade. By 1970, Sutherland also produced an early stage of te chnical development, head-mounted display and Engelbart unveiled his crude pointing device for moving text around on a computer screen which is the first mouse. War games The flight simulator is one of the most influential antecedents of virtual reality. Following World War II and through the 1990s, to simulate flying airplanes (and later driving tanks and steering ships) the military and industrial complex pumped millions of dollars into technology. Before subjecting them to the hazards of flight it was safer, and cheaper, to train pilots on the ground. In earlier times flight simulators consisted of mock compartments where the pilot sits while flying the aircraft which built on motion platforms that pitched and rolled. However, they lacked visual feedback which is a limitation. When video displays were coupled with model cockpits this was changed. Computer-generated graphics had replaced videos and models by the 1970s.These flights are imitating the behavior of some situation which was operating in real time, though the graphics which belongs to an early stage of technical development. The head-mounted displays were experimented by military in 1979. These creation resulting from study and experimentation were driven by the greater dangers associated with training on and flying the jet fighters that were being built in the 1970s. Better software, hardware, and motion-control platforms enabled pilots to navigate through highly detailed virtual worlds in the early 1980s. Virtual video games, Movies and animation The entertainment industry for natural consumer was computer graphics, which, like the military and industry, as the source of many valuable spin-offs in virtual reality. Some of the Hollywood most dazzling special effects were computer generated in 1970s, such as the battle scenes in the big-budget, blockbuster science fiction movie Star Wars, which was released in 1976. Later movies as Terminator and Jurassic Park came in to scene, and .The video game business boomed in the early 1980s. The data glove is the one direct spin-off of entertainments venture into computer graphics, a computer interface device that detects hand movements. It was invented to produce music by linking hand movements to communicate familiar or prearranged signals to a music synthesizer. For this new computer input device for its experiments with virtual environments NASA Ames was one of the first customers. The Mattel Company was the biggest consumer of the data glove, which changed in order to improve it into the Power Glove, the spreading mitt with which children are put down by force adversaries in the popular Nintendo game. As pinball machines gave way to video games, the field of scientific visualization has the experience of its own striking change in appearance from bar charts and line drawings to dynamic images. For transforming columns of data into images, scientific visual perception uses computer graphics. This image of things or events enables scientists to take up mentally the enormous amount of data required in some scientific probes. Imagine trying to understand DNA sequences, molecular models, brain maps, fluid flows, or cosmic blowups from columns of numbers. A goal of scientific mental image that is similar to visual perception is to capture the dynamic qualities of systems or processes in its images. Borrowing and as well as creating many of the special effects techniques of Hollywood, scientific visual perception moved into animation in the 1980s. NCSAs award-winning animation of smog decreasing upon Los Angeles have the exert influence or effects on air pollution legislation in the state in 1990. This animation was a tending to persuade by forcefulness of argument and stamen of the value of this kind of imagery. Animation had severe limitations. At First, it was costly. After developing with richness of details computer simulations, the smog animation itself took 6 months to produce from the resulting data; individual frames took from several minutes to an hour. Second, it did not allow for capable of acting for changes in the data or conditions responsible for making and enforcing rules, an experiment that produce immediate responses in the imagery. If once the animation is completed it could not be altered. Interactivity would have remained aspirant thinking if not for the development of high-performance computers in the mid-1980s. These machines provided the speed and memory for programmers and scientists to begin developing advanced visualization software programs. Low-cost, high-resolution graphic workstations were linked to high-speed computers by the end of the 1980s, which made visualization technology more accessible. The basic elements of virtual reality had existed since 1980, but it took high-performance computers, with their powerful image translating capabilities, to make it work. To help scientists comprehend the vast amounts of data pouring out of their computers daily Demand was rising for visualization environments. Drivers for both computation and VR, high-performance computers no longer served as mere number derived from, but became exciting vehicles for systematic search and discovery. 3. Introduction to Virtual reality Virtual Reality is the computer generated stereoscopic environment. It gives capable of being treated as fact and contribution to interactive learning environments it combines attribute of accepting the facts of life with, manipulative reality like in simulation programs. Most of the Virtual Reality systems allow the user to voyage through the virtual environment manipulate objects and experience the outcome of an event. Virtual Reality brings the imagination as close and realistic as reality itself. This environment does not necessarily need the same properties as the real world. There can be different forces, gravity, magnetic fields etc in dissimilarity of things to the real solid objects. It is the technique of representing the real world by a computer program or imagined environment that can be experienced visually in the three dimensions of width, height, and depth. It implicates the use of advanced technologies, including computers and various multimedia peripherals, to produc e a simulated (i.e., virtual) environment that users became aware of through senses as comparable to real world objects and events. Virtual reality can be delivered using variety of systems. Devote fully to oneself into virtual world, manipulating things in that world and facing the important effects as like that in a real world, involves future development of devices and complex simulations programs. In virtual systems, movements in internet are simulated by shifting the optics in the field of vision in direct response to movement of certain body parts, such as the head or hand. Human-computer interaction is a discipline in showing worry with the design, act of ascertaining and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. Many users have physical or relating to limitations at the same time to handle several different devices. Virtual reality is a new medium brought about by technological advances in which much experimentation is now taking place to find practical applications and more effective ways to communicate. A virtual world is everything that is included in a collection of a given medium. I may involve without any others being included but exist in the mind of its originator or be broadcast in such a way that it can be shared with others. The key elements in experiencing virtual reality or any reality for that matter are a virtual world, having intense mental effort with sensory feedback (responding to user input), and interactivity. In virtual reality the effect of entering the world begins with physical rather than mental, concentration. Because Immersion is a necessary component of virtual reality. Virtual reality is more closely consociated with the ability of the participant to move physically within the world. Telepresence, Augmented Reality, and Cyberspace are closely associated with virtual reality. The recipient can access the content by virtual world through the interface which can be associated with it. At the boundary between the self and the medium the participant interacts with the virtual world. For the study of good user interface design much effort has been put forth. For many media and virtual reality will require no less effort. 4. Applications of Virtual reality The Virtual Reality had shown its applicability in early 1990s and its exposure went beyond the expectations and it just started with some of the blocky images. Coming to the entertainment, the applications will involve in games, theatre experiences and many more. The application of the Virtual Reality come into the picture in Architectures where the virtual models of the buildings are created where the users can visualise the building and they can even walk into it. This may help to see the structure of the building even before the foundation is laid. in this way the clients or the user can checkout the whole building and even they can change the design if there are any alterations in the plan, this makes the planning and modifications very realistic and easy. This Virtual Reality is applicable even in medicine, information systems, military and many more. Further discussion will give a detailed explanation of all the applications. 4.1 Virtual Reality in information system: For generating the direct or the indirect view of the physical real world environment the Augmented Reality is used. In this the elements will be in mixed up way with two things and finally create a mixed reality. The two things are Virtual Computer and the Generated imagery. Let us consider an example of Sports Channel on the TV where the scores are the real time examples of the semantic context in the elements of the environments. The Advancement in the Augmented Reality (AR) the real world entities can be digitized and even the user can interact with the surrounding in the digital world itself. This can be achieved by adding computer vision and object recognition to the Augmented Reality (AR) technology. Through this technology the information related to the surrounding and different objects present in it can be obtained and that will be similar to the real world information. Here the information is retrieved in the form of information layer. In the present scenario the Augmented Reality (AR) research is been populated through the applications of the computer generated imagery. This application is replicating the real world where live video streams are been used. For the purpose of the Visualisation to the real world different displays are been used, they are Head Mounted Displays and Virtual Retinal Displays. Not only the displays but also the research also constructs the environment in a controlled way in which it replicates the real world. for this many number of sensors and actuators are used. The two definitions of the Augmented Reality (AR) that are widely accepted in present days are: The Augmented Reality (AR) is a combination of real and virtual and it is interactive in the real time i.e., real world and this is registered in 3D. This definition is given by Ronald Alums in 1997. Paul Milligram and Fumio Kishinev define Augmented Reality (AR) as A it is a continuous extent of the real world environment into a pure virtual or digital environment. Due to the development in the Augmented Reality (AR) the general public are also getting attracted to this and interest is been increased in it. Hardware: Coming to the Main Hardware components that are used in Augmented Reality (AR) are as follows: Display Tracking Input Devices Computer. Combination of powerful CPU Camera accelerometers GPS solid state compass Smart Phones. Displays: Augmented Reality (AR) uses different display techniques to visualize the real world entities Head Mounted Displays Handheld Displays Spatial Displays Head Mounted Displays: Head Mounted Display (HMD) is one the display techniques used for visualizing the both the physical entities as well as the virtual graphical objects and the main thing that is to be concentrated is that all the entities and the objects moist replicate the real world. The Head Mounted Display (HMD) work in two ways i.e., through optical se-through and video see-through. Here half-silver mirror technology is used for optical see-through technology. This half-silver mirror technology first considers the physical world to pass through the lens of the optical since and then the graphical overlay information is to reflect these physical entities in the virtual world i.e. visualizing the physical entices in the virtual world. For this sensing the Head Mounted Display (HMD) uses tracking which should have six degree of freedom sensors. The main usage of tracking is that it allows the physical information to be registered in the computer system where that information will used in the virtual worlds information. The experience that an used gets is very impressive and effective. The products of this Head Mounted Display (HMD) are Micro Vision Nomad, Sony Plastron, and I/O Displays. Handheld Displays: Handheld Augment Reality is also one of the displaying technique used for the visualizing the virtual entities from the physical world. Handheld Augment Reality is a small devices that is used for computing and it is so small that it will fit in the users hand. This Handheld Augment Reality uses video see-through techniques that helps to convert the physical entities or information into virtual information i.e., into graphical information. The different devices that are used in this are digital compasses and GPS in which six degree sensors are used. This at present emerged as Retool Kit for tracking. Spatial Displays: Instead of wearing or carrying the display such as head mounted displays with handheld devices; pertaining to Augmented Reality digital projectors are used to display graphical information through physical objects. The key difference in spatial augmented reality is that from the users of the system the display is separated. Because these displays are not assorted with each user, SAR graduated naturally up to groups of users, thus allowing for strong tendency collaboration between users. It has over traditional head mounted displays and handheld devices and several advantages. And for the user there is no such requirement to carry equipment or wear the display over their eyes. This makes spatial AR a good candidate to work together on a common project, as they can see each others faces. At the same time a system can be used by multiple people and there is no need for every individual to wear a head mounted display. In current head mounted displays and portable devices spatial AR does not suffer from the limited display resolution. To expand the display area a projector based display system can simply incorporate more projectors. Portable devices have a small window into the world for drawing, For an indoor setting a SAR system can display on any number of surfaces at once. The persistence nature of SAR makes this an ideal technology to support design, for the end users SAR supports both graphical visualisation and passive hep tic sensation. People are able to touch physical objects, which is the process that provides the passive hap tic sensation. Tracking: In modern world the set of reasons that support the reality systems use the following tracking technologies. Some of the tracking system is digital cameras, optical sensors, accelerometers, GPS, gyroscopes, solid state compasses, RFID, wireless sensors. All these technologies have different levels of exactness and accuracy. The most important in this system is to track the pose and position of the users head. Virtual Reality Tracking Systems In VR system tracking devices are intrinsic components. And these tracking devices communicate with the system processing unit and telling it the orientation of the users. In this system the user allows to move around within a physical world, and the trackers can detect where the user is moving his directions and speed. In VR systems there are various kinds of tracking systems in use, but very few thing are common in all the tracking systems, which can detect six degrees of freedom(6-DOF).These are nothing but the objects position with x, y and z coordinates in space. This includes the orientation of objects yaw, pitch, and roll. From the users point of view when u wear the HMD, the view changes as you look up, down, left and right. And also the position changes when you tilt your head or move your head forward or backward at an angle without changing the angle of your gaze. The trackers which are on the HMD will tell the CPU where you are looking and sends the right images to your HMD screens. All the virtual tracking system has a device that generates a signal, the sensor will detects the signal and the control unit will process the signal and transfer the information to CPU. Some tracking system required to attach the sensors components to the user. In such kind of system we have to place the signal emitters at fixed points in the surrounding environment. The signals which are sent from emitters to sensors can take many forms, which admit electromagnetic signals, acoustic signals, optical signals and mechanical signals. Each and every technology has its own set of advantages and disadvantages. Electromagnetic tracking systems It measure magnetic fields to bring forth by running an electric current continuously through three coiled wires ordered in a perpendicular orientation with one another. Each coil becomes an electromagnet, and the systems sensors measure how the magnetic field affects the other coils. This measurement tells the direction to the system and also predilection of the emitter. An efficientelectromagnetictracking system is very reactive, with low levels of latent period. One disadvantage of this system is that anything that can yield a magnetic field can intervene in the signals sent to the sensors. Acoustic tracking systems Acoustic tracking system emit and sense ultrasonicsound wavesto ascertain the position and orientation of a target. Most of the tracking systems measure the time it takes for the ultrasonic sound to reach a sensor. Generally the sensors are fixed in the environment and the user wears the ultrasonic emitters. The system estimate the position and orientation of the target based on the time it took for the sound to reach the sensors. The rate of updates on a targets position is equally slow for Acoustic tracking systems which is the main disadvantages because Sound travels relatively slowly. The speed of sound through air can change depending on the temperature, humidity or barometric pressure in the environment which adversely affects the systems efficiency. Optical tracking devices The name itself indicates that it uselight to measure a targets position and orientation. The signal emitter in an optical tracking device typically consists of a set of infraredLEDs. The sensors which we use here are camerasthat can sense the emitted infrared light. The LEDs light up in continuous pulses. The cameras will record the pulsed signals and send information to the systems processing unit. The unit can then draw from specific cases for the data to determine the position and orientation of the target. Optical systems have a fast upload rate, which means it minimises the time taken by the specific block of data. The disadvantages are that the line of sight between a camera and an LED can be blurred, interfering with the tracking process. Ambient light or infrared radiation can also make a system less effective. Mechanical tracking systems Mechanical tracking rely on a physical connection between the fixed reference point and a target. The VR field in the BOOM display is a very common example of a mechanical tracking system. A BOOM display is an HMD mounted on the end of a mechanical arm that has two points of articulation. The system detects the position and starts orientation through the arm. In mechanical tracking systems the update rate is very high, but the only disadvantage is that they limit a users range of motion. 4.2 Virtual Reality in military simulations: VR technology extends a likely economically and efficient tool for military forces to improve deal with dynamic or potentially dangerous situations. In a late 1920s and 1930s,almost simulations in a military surroundings was the flight trainers established by the Link Company. At the time trainers expected like cut-off caskets climbed on a stand, and were expended to instruct instrument flying. The shadow inside the trainer cockpit, the realistic interpretations on the instrument panel, and the movement of the trainer on the pedestal mixed to develop a sensation similar to really flying on instruments at night. The associate trainers were very effective tools for their proposed purpose, instructing thousands of pilots the night flying skills they involved before and during World War II. To motivate outside the instrument flying domain, simulator architects involved a way to get a view of the beyond world. The initial example of a simulator with an beyond position seemed in the 1950s, when television and video cameras became in market. With this equipment, a video camera could be fled above a scale model of the packet around an airport, and the leading image was sent to a television monitor directed in front of the pilot in the simulator. His movement of the assure stick and limit produced corresponding movement of the camera over the terrain board. Now the pilot could experience visual resubmit both inside and outside the cockpit. In the transport aircraft simulators, the logical extension of the video camera/television monitor approach was to use multiple reminders to simulate the total field of notion from the airplane cockpit. Where the field of notation requires being only about 60 degrees and 180 degrees horizontally vertically. For fighter aircraft simulators, the field of view must be at least 180 degrees horizontally and vertically. For these applications, the simulator contains of a cockpit directed at the centre of a vaulted room, and the virtual images are projected onto the within surface of the dome. These cases of simulators have established to be very in force training cares by themselves, and the newest introduction is a project called SIMNET to electronically paired two or more simulators to produce a distributed simulation environment. [McCarty, 1993] Distributed simulations can be used not only for educating, but to improve and test new combat strategy and manoeuvre. A significant improvement in this area is an IEEE data protocol standard for distributed interactive simulations. This standard allows the distributed simulation to include not only aircraft, but also land-based vehicles and sh ips. Another recent development is the use of head- climbed displays (HMDs) to decrease the cost of wide field of perspective simulations. Group of technologies for military missions: Applying applications of virtual reality which are referred by military, the Military entropy enhancement in a active combat environment, it is imperative to provide the pilot or tank commander with as much of the demand information as possible while cutting the amount of disordering information. This aim contributed the Air Force to improve the head-up display (HUD) which optically merges important information like altitude, airspeed, and heading with a clear position through the advancing windscreen of a fighter aircraft. With the HUD, the pilot advancing has to look down at his instruments. When the HUD is paired with the aircrafts radar and other sensors, a synthetic image of an enemy aircraft can be exposed on the HUD to show the pilot where that aircraft is, even though the pilot may not be able to see the actual aircraft with his unaided eyes. This combination of real and virtual views of the outside world can be broad to night time procedures. Using an infrared camera mounted in the nose of the aircraft, an increased position of the terrain ahead of the aircraft can be designed on the HUD. The effect is for the pilot to have a daylight window through which he has both a real and an enhanced position of the night time terrain and sky. In some situations, the pilot may need to concentrate fully on the virtual entropy and completely omit the actual view. Work in this field has been started by Thomas Furness III and others at Wright Laboratories, Wright-Patterson Air Force Base, and Ohio. This work, dubbed the Super Cockpit, demanded not only a virtual view of the beyond world, but also of the cockpit itself, where the pilot would select and manipulate virtual controls using some Applications of Virtual Reality. Automobiles based companies have used VR technology to build virtual paradigms of new vehicles, testing them real before developing a single physical part. Designers can make changes without having to scrap the entire model, as they often would with forcible ones. The growth process becomes more efficient and less expensive as a result. Smart weapons and remotely- piloted vehicles (RPVs): Many different types of views in combat operations, these are very risky and they turn even more dangerous if the combatant attempts to improve their performance. But there are two clear obvious reasons have driven the military to explore and employ set of technologies in their operations; to cut down vulnerability to risky and to increase stealth. So here peak instances of this principle are attacking weapons and performing reconnaissance. To execute either of these tasks well takes time, and this is the normal time when the combatant is exhibited to unfriendly attack. For this reasons â€Å"Smart weapons and remotely- piloted vehicles (RPVs) â€Å"were developed to deal this problems. Loosely smart weapons are autonomous, while others are remotely controlled after they are established. This grants the shooter and weapon controller to set up the weapon and immediately attempt cover, thus minifying this exposure to return fire. In the case of RPVs, the person who controls the vehicle not only has the advantage of being in a safer place, but the RPV can be made smaller than a vehicle that would carry a man, thus making it more difficult for the enemy to detect. 4.3 Virtual Reality in Medicine Virtual reality is being used today in many ways, one of the importa Virtual Reality Applications and Universal Accessibility Virtual Reality Applications and Universal Accessibility 1. Abstract The conception of Virtual Reality, a divinatory three-dimensional, computer-generated environs that allows a individual or multiple users to interact, pilot, react, and feel a compounded world modeled from the virtual world, has provided social, scientific, economic and technological change since its origin in the early 1960s. The environs do not necessarily need the same properties as the real world. Most of the present virtual reality environments are principally visual experiences, displayed either on a computer desktop or through peculiar or stereoscopic displays, but some pretences admit additional sensory information, such as sound through speakers or headphones. Virtual reality is a technology, which allows a user to interact with a computer-imitated environment, whether that environment is a feigning of the real world or an imaginary world. Virtual Reality brings the vision as close and realistic as reality itself. In present world virtual reality is useful in variety of fiel ds like Information Systems, Military, Medicine, Mathematics, Entertainment, Education, and Simulation Techniques. Most of the Virtual Reality systems allow the user to voyage through the virtual environs manipulate objects and experience the upshots. The supreme promise of virtual reality is universal accessibility for one and all. In this project, everyone will welfare people across all the fields. And the dispute is to develop a well-informed virtual reality systems with design and smart commonsense rule that are useful to people and those that provide great value and real meliorations to the quality of life. If this can be accomplished, tomorrows information society technology could be bidding greater exclusivity through atmosphere, intelligence and universal accessibility. 2. Background Virtual reality may obliterate into the main headlines only in the retiring few years, but its roots reach endorse four decades. The nation was shaking in the late 1950s because off palatable traces of McCarthyism and was agitating to the sounds of Elvis, that an idea arose and would change the way people interacted with computers and make possible VR. At the emerging time, computers were looming colossi locked in air-conditioned rooms and used only by those familiar in abstruse programming languages. More than glorified adding machines few people considered them. But a former naval radar technician named Douglas Engelbart young electrical engineer viewed them differently. Rather than limit computers to number crunching, Engelbart visualize them as tools for digital display. He knew from his past experiences with radar that any digital information could be viewed on a screen. He then reasoned and connects the computer to a screen and uses both of them to solve problems. At first, his ideas were disregarded, but by the early 1960s other people were also thinking the same way. Moreover, the time was right for his vision of computing. Communications technology was decussate with computing and graphics technology. At first computers based on transistors rather than vacuum tubes became avail. This synergy yielded more user-friendly com puters, which laid the fundament for personal computers, computer graphics, and later on, the emergence of virtual reality. Fear of nuclear attack motivated the U.S. military to depute a new radar system that would process large amount of information and immediately display it in a form that humans could promptly understand. The ensuing radar defense system was the first real time, or instantaneous, feigning of data. Aircraft designers began experimenting with ways for computers to graphically display, or model, air flow data. Computer experts began provide with new structure computers so they would display these models as well as compute them. The designers work covered with a firm surface the way for scientific visualization, an advanced form of computer modeling that expresses multiple sets of data as images and the technique of representing the realworld by a computerprogram. Massachusetts Institute of Technology The process of extracting certain active properties by steeping self-styled computer wizards strove to lessen the condition that makes it difficult to make progress to human interactions with the computer by replacing keyboards with capable of acting devices that have confidence on images and motion hands to emphasize or help to express a thought or feeling to manipulate data. The idea of virtual reality has came into existence since 1965, when Ivan Sutherland expressed his ideas of creating virtual or imaginary worlds. With three dimensional displays he conducted experiments at MIT. He outlined the images on the computer by developing the light pen in Ivan Sutherland in 1962. Sketchpad, is the Sutherlands first computer-aided design program, opened the way for designers to create blueprints of automobiles, cities, and industrial products with the aid of computers. The designs were operating in real time by the end of the decade. By 1970, Sutherland also produced an early stage of te chnical development, head-mounted display and Engelbart unveiled his crude pointing device for moving text around on a computer screen which is the first mouse. War games The flight simulator is one of the most influential antecedents of virtual reality. Following World War II and through the 1990s, to simulate flying airplanes (and later driving tanks and steering ships) the military and industrial complex pumped millions of dollars into technology. Before subjecting them to the hazards of flight it was safer, and cheaper, to train pilots on the ground. In earlier times flight simulators consisted of mock compartments where the pilot sits while flying the aircraft which built on motion platforms that pitched and rolled. However, they lacked visual feedback which is a limitation. When video displays were coupled with model cockpits this was changed. Computer-generated graphics had replaced videos and models by the 1970s.These flights are imitating the behavior of some situation which was operating in real time, though the graphics which belongs to an early stage of technical development. The head-mounted displays were experimented by military in 1979. These creation resulting from study and experimentation were driven by the greater dangers associated with training on and flying the jet fighters that were being built in the 1970s. Better software, hardware, and motion-control platforms enabled pilots to navigate through highly detailed virtual worlds in the early 1980s. Virtual video games, Movies and animation The entertainment industry for natural consumer was computer graphics, which, like the military and industry, as the source of many valuable spin-offs in virtual reality. Some of the Hollywood most dazzling special effects were computer generated in 1970s, such as the battle scenes in the big-budget, blockbuster science fiction movie Star Wars, which was released in 1976. Later movies as Terminator and Jurassic Park came in to scene, and .The video game business boomed in the early 1980s. The data glove is the one direct spin-off of entertainments venture into computer graphics, a computer interface device that detects hand movements. It was invented to produce music by linking hand movements to communicate familiar or prearranged signals to a music synthesizer. For this new computer input device for its experiments with virtual environments NASA Ames was one of the first customers. The Mattel Company was the biggest consumer of the data glove, which changed in order to improve it into the Power Glove, the spreading mitt with which children are put down by force adversaries in the popular Nintendo game. As pinball machines gave way to video games, the field of scientific visualization has the experience of its own striking change in appearance from bar charts and line drawings to dynamic images. For transforming columns of data into images, scientific visual perception uses computer graphics. This image of things or events enables scientists to take up mentally the enormous amount of data required in some scientific probes. Imagine trying to understand DNA sequences, molecular models, brain maps, fluid flows, or cosmic blowups from columns of numbers. A goal of scientific mental image that is similar to visual perception is to capture the dynamic qualities of systems or processes in its images. Borrowing and as well as creating many of the special effects techniques of Hollywood, scientific visual perception moved into animation in the 1980s. NCSAs award-winning animation of smog decreasing upon Los Angeles have the exert influence or effects on air pollution legislation in the state in 1990. This animation was a tending to persuade by forcefulness of argument and stamen of the value of this kind of imagery. Animation had severe limitations. At First, it was costly. After developing with richness of details computer simulations, the smog animation itself took 6 months to produce from the resulting data; individual frames took from several minutes to an hour. Second, it did not allow for capable of acting for changes in the data or conditions responsible for making and enforcing rules, an experiment that produce immediate responses in the imagery. If once the animation is completed it could not be altered. Interactivity would have remained aspirant thinking if not for the development of high-performance computers in the mid-1980s. These machines provided the speed and memory for programmers and scientists to begin developing advanced visualization software programs. Low-cost, high-resolution graphic workstations were linked to high-speed computers by the end of the 1980s, which made visualization technology more accessible. The basic elements of virtual reality had existed since 1980, but it took high-performance computers, with their powerful image translating capabilities, to make it work. To help scientists comprehend the vast amounts of data pouring out of their computers daily Demand was rising for visualization environments. Drivers for both computation and VR, high-performance computers no longer served as mere number derived from, but became exciting vehicles for systematic search and discovery. 3. Introduction to Virtual reality Virtual Reality is the computer generated stereoscopic environment. It gives capable of being treated as fact and contribution to interactive learning environments it combines attribute of accepting the facts of life with, manipulative reality like in simulation programs. Most of the Virtual Reality systems allow the user to voyage through the virtual environment manipulate objects and experience the outcome of an event. Virtual Reality brings the imagination as close and realistic as reality itself. This environment does not necessarily need the same properties as the real world. There can be different forces, gravity, magnetic fields etc in dissimilarity of things to the real solid objects. It is the technique of representing the real world by a computer program or imagined environment that can be experienced visually in the three dimensions of width, height, and depth. It implicates the use of advanced technologies, including computers and various multimedia peripherals, to produc e a simulated (i.e., virtual) environment that users became aware of through senses as comparable to real world objects and events. Virtual reality can be delivered using variety of systems. Devote fully to oneself into virtual world, manipulating things in that world and facing the important effects as like that in a real world, involves future development of devices and complex simulations programs. In virtual systems, movements in internet are simulated by shifting the optics in the field of vision in direct response to movement of certain body parts, such as the head or hand. Human-computer interaction is a discipline in showing worry with the design, act of ascertaining and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. Many users have physical or relating to limitations at the same time to handle several different devices. Virtual reality is a new medium brought about by technological advances in which much experimentation is now taking place to find practical applications and more effective ways to communicate. A virtual world is everything that is included in a collection of a given medium. I may involve without any others being included but exist in the mind of its originator or be broadcast in such a way that it can be shared with others. The key elements in experiencing virtual reality or any reality for that matter are a virtual world, having intense mental effort with sensory feedback (responding to user input), and interactivity. In virtual reality the effect of entering the world begins with physical rather than mental, concentration. Because Immersion is a necessary component of virtual reality. Virtual reality is more closely consociated with the ability of the participant to move physically within the world. Telepresence, Augmented Reality, and Cyberspace are closely associated with virtual reality. The recipient can access the content by virtual world through the interface which can be associated with it. At the boundary between the self and the medium the participant interacts with the virtual world. For the study of good user interface design much effort has been put forth. For many media and virtual reality will require no less effort. 4. Applications of Virtual reality The Virtual Reality had shown its applicability in early 1990s and its exposure went beyond the expectations and it just started with some of the blocky images. Coming to the entertainment, the applications will involve in games, theatre experiences and many more. The application of the Virtual Reality come into the picture in Architectures where the virtual models of the buildings are created where the users can visualise the building and they can even walk into it. This may help to see the structure of the building even before the foundation is laid. in this way the clients or the user can checkout the whole building and even they can change the design if there are any alterations in the plan, this makes the planning and modifications very realistic and easy. This Virtual Reality is applicable even in medicine, information systems, military and many more. Further discussion will give a detailed explanation of all the applications. 4.1 Virtual Reality in information system: For generating the direct or the indirect view of the physical real world environment the Augmented Reality is used. In this the elements will be in mixed up way with two things and finally create a mixed reality. The two things are Virtual Computer and the Generated imagery. Let us consider an example of Sports Channel on the TV where the scores are the real time examples of the semantic context in the elements of the environments. The Advancement in the Augmented Reality (AR) the real world entities can be digitized and even the user can interact with the surrounding in the digital world itself. This can be achieved by adding computer vision and object recognition to the Augmented Reality (AR) technology. Through this technology the information related to the surrounding and different objects present in it can be obtained and that will be similar to the real world information. Here the information is retrieved in the form of information layer. In the present scenario the Augmented Reality (AR) research is been populated through the applications of the computer generated imagery. This application is replicating the real world where live video streams are been used. For the purpose of the Visualisation to the real world different displays are been used, they are Head Mounted Displays and Virtual Retinal Displays. Not only the displays but also the research also constructs the environment in a controlled way in which it replicates the real world. for this many number of sensors and actuators are used. The two definitions of the Augmented Reality (AR) that are widely accepted in present days are: The Augmented Reality (AR) is a combination of real and virtual and it is interactive in the real time i.e., real world and this is registered in 3D. This definition is given by Ronald Alums in 1997. Paul Milligram and Fumio Kishinev define Augmented Reality (AR) as A it is a continuous extent of the real world environment into a pure virtual or digital environment. Due to the development in the Augmented Reality (AR) the general public are also getting attracted to this and interest is been increased in it. Hardware: Coming to the Main Hardware components that are used in Augmented Reality (AR) are as follows: Display Tracking Input Devices Computer. Combination of powerful CPU Camera accelerometers GPS solid state compass Smart Phones. Displays: Augmented Reality (AR) uses different display techniques to visualize the real world entities Head Mounted Displays Handheld Displays Spatial Displays Head Mounted Displays: Head Mounted Display (HMD) is one the display techniques used for visualizing the both the physical entities as well as the virtual graphical objects and the main thing that is to be concentrated is that all the entities and the objects moist replicate the real world. The Head Mounted Display (HMD) work in two ways i.e., through optical se-through and video see-through. Here half-silver mirror technology is used for optical see-through technology. This half-silver mirror technology first considers the physical world to pass through the lens of the optical since and then the graphical overlay information is to reflect these physical entities in the virtual world i.e. visualizing the physical entices in the virtual world. For this sensing the Head Mounted Display (HMD) uses tracking which should have six degree of freedom sensors. The main usage of tracking is that it allows the physical information to be registered in the computer system where that information will used in the virtual worlds information. The experience that an used gets is very impressive and effective. The products of this Head Mounted Display (HMD) are Micro Vision Nomad, Sony Plastron, and I/O Displays. Handheld Displays: Handheld Augment Reality is also one of the displaying technique used for the visualizing the virtual entities from the physical world. Handheld Augment Reality is a small devices that is used for computing and it is so small that it will fit in the users hand. This Handheld Augment Reality uses video see-through techniques that helps to convert the physical entities or information into virtual information i.e., into graphical information. The different devices that are used in this are digital compasses and GPS in which six degree sensors are used. This at present emerged as Retool Kit for tracking. Spatial Displays: Instead of wearing or carrying the display such as head mounted displays with handheld devices; pertaining to Augmented Reality digital projectors are used to display graphical information through physical objects. The key difference in spatial augmented reality is that from the users of the system the display is separated. Because these displays are not assorted with each user, SAR graduated naturally up to groups of users, thus allowing for strong tendency collaboration between users. It has over traditional head mounted displays and handheld devices and several advantages. And for the user there is no such requirement to carry equipment or wear the display over their eyes. This makes spatial AR a good candidate to work together on a common project, as they can see each others faces. At the same time a system can be used by multiple people and there is no need for every individual to wear a head mounted display. In current head mounted displays and portable devices spatial AR does not suffer from the limited display resolution. To expand the display area a projector based display system can simply incorporate more projectors. Portable devices have a small window into the world for drawing, For an indoor setting a SAR system can display on any number of surfaces at once. The persistence nature of SAR makes this an ideal technology to support design, for the end users SAR supports both graphical visualisation and passive hep tic sensation. People are able to touch physical objects, which is the process that provides the passive hap tic sensation. Tracking: In modern world the set of reasons that support the reality systems use the following tracking technologies. Some of the tracking system is digital cameras, optical sensors, accelerometers, GPS, gyroscopes, solid state compasses, RFID, wireless sensors. All these technologies have different levels of exactness and accuracy. The most important in this system is to track the pose and position of the users head. Virtual Reality Tracking Systems In VR system tracking devices are intrinsic components. And these tracking devices communicate with the system processing unit and telling it the orientation of the users. In this system the user allows to move around within a physical world, and the trackers can detect where the user is moving his directions and speed. In VR systems there are various kinds of tracking systems in use, but very few thing are common in all the tracking systems, which can detect six degrees of freedom(6-DOF).These are nothing but the objects position with x, y and z coordinates in space. This includes the orientation of objects yaw, pitch, and roll. From the users point of view when u wear the HMD, the view changes as you look up, down, left and right. And also the position changes when you tilt your head or move your head forward or backward at an angle without changing the angle of your gaze. The trackers which are on the HMD will tell the CPU where you are looking and sends the right images to your HMD screens. All the virtual tracking system has a device that generates a signal, the sensor will detects the signal and the control unit will process the signal and transfer the information to CPU. Some tracking system required to attach the sensors components to the user. In such kind of system we have to place the signal emitters at fixed points in the surrounding environment. The signals which are sent from emitters to sensors can take many forms, which admit electromagnetic signals, acoustic signals, optical signals and mechanical signals. Each and every technology has its own set of advantages and disadvantages. Electromagnetic tracking systems It measure magnetic fields to bring forth by running an electric current continuously through three coiled wires ordered in a perpendicular orientation with one another. Each coil becomes an electromagnet, and the systems sensors measure how the magnetic field affects the other coils. This measurement tells the direction to the system and also predilection of the emitter. An efficientelectromagnetictracking system is very reactive, with low levels of latent period. One disadvantage of this system is that anything that can yield a magnetic field can intervene in the signals sent to the sensors. Acoustic tracking systems Acoustic tracking system emit and sense ultrasonicsound wavesto ascertain the position and orientation of a target. Most of the tracking systems measure the time it takes for the ultrasonic sound to reach a sensor. Generally the sensors are fixed in the environment and the user wears the ultrasonic emitters. The system estimate the position and orientation of the target based on the time it took for the sound to reach the sensors. The rate of updates on a targets position is equally slow for Acoustic tracking systems which is the main disadvantages because Sound travels relatively slowly. The speed of sound through air can change depending on the temperature, humidity or barometric pressure in the environment which adversely affects the systems efficiency. Optical tracking devices The name itself indicates that it uselight to measure a targets position and orientation. The signal emitter in an optical tracking device typically consists of a set of infraredLEDs. The sensors which we use here are camerasthat can sense the emitted infrared light. The LEDs light up in continuous pulses. The cameras will record the pulsed signals and send information to the systems processing unit. The unit can then draw from specific cases for the data to determine the position and orientation of the target. Optical systems have a fast upload rate, which means it minimises the time taken by the specific block of data. The disadvantages are that the line of sight between a camera and an LED can be blurred, interfering with the tracking process. Ambient light or infrared radiation can also make a system less effective. Mechanical tracking systems Mechanical tracking rely on a physical connection between the fixed reference point and a target. The VR field in the BOOM display is a very common example of a mechanical tracking system. A BOOM display is an HMD mounted on the end of a mechanical arm that has two points of articulation. The system detects the position and starts orientation through the arm. In mechanical tracking systems the update rate is very high, but the only disadvantage is that they limit a users range of motion. 4.2 Virtual Reality in military simulations: VR technology extends a likely economically and efficient tool for military forces to improve deal with dynamic or potentially dangerous situations. In a late 1920s and 1930s,almost simulations in a military surroundings was the flight trainers established by the Link Company. At the time trainers expected like cut-off caskets climbed on a stand, and were expended to instruct instrument flying. The shadow inside the trainer cockpit, the realistic interpretations on the instrument panel, and the movement of the trainer on the pedestal mixed to develop a sensation similar to really flying on instruments at night. The associate trainers were very effective tools for their proposed purpose, instructing thousands of pilots the night flying skills they involved before and during World War II. To motivate outside the instrument flying domain, simulator architects involved a way to get a view of the beyond world. The initial example of a simulator with an beyond position seemed in the 1950s, when television and video cameras became in market. With this equipment, a video camera could be fled above a scale model of the packet around an airport, and the leading image was sent to a television monitor directed in front of the pilot in the simulator. His movement of the assure stick and limit produced corresponding movement of the camera over the terrain board. Now the pilot could experience visual resubmit both inside and outside the cockpit. In the transport aircraft simulators, the logical extension of the video camera/television monitor approach was to use multiple reminders to simulate the total field of notion from the airplane cockpit. Where the field of notation requires being only about 60 degrees and 180 degrees horizontally vertically. For fighter aircraft simulators, the field of view must be at least 180 degrees horizontally and vertically. For these applications, the simulator contains of a cockpit directed at the centre of a vaulted room, and the virtual images are projected onto the within surface of the dome. These cases of simulators have established to be very in force training cares by themselves, and the newest introduction is a project called SIMNET to electronically paired two or more simulators to produce a distributed simulation environment. [McCarty, 1993] Distributed simulations can be used not only for educating, but to improve and test new combat strategy and manoeuvre. A significant improvement in this area is an IEEE data protocol standard for distributed interactive simulations. This standard allows the distributed simulation to include not only aircraft, but also land-based vehicles and sh ips. Another recent development is the use of head- climbed displays (HMDs) to decrease the cost of wide field of perspective simulations. Group of technologies for military missions: Applying applications of virtual reality which are referred by military, the Military entropy enhancement in a active combat environment, it is imperative to provide the pilot or tank commander with as much of the demand information as possible while cutting the amount of disordering information. This aim contributed the Air Force to improve the head-up display (HUD) which optically merges important information like altitude, airspeed, and heading with a clear position through the advancing windscreen of a fighter aircraft. With the HUD, the pilot advancing has to look down at his instruments. When the HUD is paired with the aircrafts radar and other sensors, a synthetic image of an enemy aircraft can be exposed on the HUD to show the pilot where that aircraft is, even though the pilot may not be able to see the actual aircraft with his unaided eyes. This combination of real and virtual views of the outside world can be broad to night time procedures. Using an infrared camera mounted in the nose of the aircraft, an increased position of the terrain ahead of the aircraft can be designed on the HUD. The effect is for the pilot to have a daylight window through which he has both a real and an enhanced position of the night time terrain and sky. In some situations, the pilot may need to concentrate fully on the virtual entropy and completely omit the actual view. Work in this field has been started by Thomas Furness III and others at Wright Laboratories, Wright-Patterson Air Force Base, and Ohio. This work, dubbed the Super Cockpit, demanded not only a virtual view of the beyond world, but also of the cockpit itself, where the pilot would select and manipulate virtual controls using some Applications of Virtual Reality. Automobiles based companies have used VR technology to build virtual paradigms of new vehicles, testing them real before developing a single physical part. Designers can make changes without having to scrap the entire model, as they often would with forcible ones. The growth process becomes more efficient and less expensive as a result. Smart weapons and remotely- piloted vehicles (RPVs): Many different types of views in combat operations, these are very risky and they turn even more dangerous if the combatant attempts to improve their performance. But there are two clear obvious reasons have driven the military to explore and employ set of technologies in their operations; to cut down vulnerability to risky and to increase stealth. So here peak instances of this principle are attacking weapons and performing reconnaissance. To execute either of these tasks well takes time, and this is the normal time when the combatant is exhibited to unfriendly attack. For this reasons â€Å"Smart weapons and remotely- piloted vehicles (RPVs) â€Å"were developed to deal this problems. Loosely smart weapons are autonomous, while others are remotely controlled after they are established. This grants the shooter and weapon controller to set up the weapon and immediately attempt cover, thus minifying this exposure to return fire. In the case of RPVs, the person who controls the vehicle not only has the advantage of being in a safer place, but the RPV can be made smaller than a vehicle that would carry a man, thus making it more difficult for the enemy to detect. 4.3 Virtual Reality in Medicine Virtual reality is being used today in many ways, one of the importa