Monday, September 30, 2019

M.A. English

Each course British Poetry British Drama British Novel Aspects of Language will comprise one assignment of 100 marks. This assignment be tutor marked. Aims: The TMAs are conceffred rrainly with assessing your application and understanding of the course material. You are not required to reproduce chunks of information from the course material but to use the skills of critical appreciation that you may have acquired during the course of study. These assignments airn to teach as well as to assess your performance.Please ensure that you read the texts and the ccompanying study guides that we have prepared for you. Let rne repeat: you must read all the texts prescribed. Do make points as you go along. It there is anything you do not understand, please ask your Counsellor at the Study Centre for clarification. Once you are able to do the assignments satisfactorily, you will be ready to take the exam Nith confidence. Instructions: Before attclnpting the assignment please read the following instructions carefully. 2 3 Read the detailed instructicns about the assignments given in the Programme Guide Elective Courses.Write your roll 1 ro. aflle, full address and date on the top right corner of the first page of your response sheet(s). Write the Course Title, Assignment Number and the Narne of the Study Centre you are attached to in the centre ofthe first page ofyour response sheet(s). The top of the first page of your response sheet should look like this: Use only foolscap size paper for your response and tag all the pages caref-ully. Write the relevant question nuinber with each answer.You should write in your own handwriting Submission: T'he completed assignment should be sent to the Coordinator of the Study Centre allotted to you ty 3tr† March, 2aL4 gar Juty 2013 Session) and 30'h Sept 201 i (for January 2014 Session). Please react the instructions given in the Programme Now read the following guidelines carefully before answering the questions. GUIDELINES FOR T MA You will find it useful to keep the following points in mind: 1. Planning: Read the assignment carefully. Make some points regarding each question and then rearrange these in a logical order.And please write the answers n your own words† Do not not reproduce passages from the units. 2. 0rganisation: Be a little more selective and analytic before drawing up a rough outline of your answer. In an essay-type question, give adequate attention to your introduction and conclusion. The introduction must offer your brief interpretation of the question and how you propose to develop it. The conclusion must summarize your response to the question. In the course of your answer, you may like to make references to other texts or critics as this will add some depth to your analysis.Make sure that your answer: ) is logical and coherent; b) has clear connections between sentences and paragraphs; c) is written correctly giving adequate consideration to your expression, style and presentation ; d) does not exceed the number of words indicated in your question. 3. Presentation: Once you are satisfied with your answers. you can write down the final version for submission, writing each answer neatly arid underlining the points you wish to emphasize. You may be aware that you need to submit your assignment hefore you can appear for the Term End Exams.Please remember to keep a copy of your completed ssignment, Just in case the one you submitted is lost in transit. Good luck with your work! Note: Remember the submission of ussignment is precondition of permission of appearing in examination. If you have not submitted the assignment in time you will not be allowed to appear in examination. MEG-OI: BRITISH POETRY Programme: MEG Max. Marks: 1 Ast code: MEG-OI ,TMA12013-1 4 In a conventional class your teacher would have discussed your assignment with you, pointed out what made a good essay and what a bad one. We have done exactly the same thing in Unit 52 of the British Poetry (M EG-OI) course.Read it carefully and discuss it with your counselor and class-fellows at the Study Centre. Thereafter decide upon a topic, i. e. a period or literary group in the history of British poetry. you may, if you wish, select a topic from the list given in sz. z. t (p. 70) in Block X. Alternatively, you could write on a British poet of your choice. you may write on a poet discussed in the units, i. e. on the syllabus, or even a poet we have not discussed in detail such as Robert Burns, G. M. Hopkins, R. S. Thomas, Ted Hughes or Seamus Heaney. You may have heard some of our lectures on The Movement, Philip Larkin nd Ted Hughes on the EduSat.It may now be available on e-gyankosh on wmw. ignou. ac. in You have yet another choice. Write an essay on a famous poem in English literature. Having decide upon your topic, do your research and then read section 36. 5 in Unit 36 in Block VIII for a model essay and a format for presentation. you may learn how to present your term paper/se ssional essay from 36. 5. You must not quote from unacknowledged sou rces. To sum up, write an essay on a period or a literarv group in British poetry or a British poet or a British poem in about 3000 words on the model provided in 36. (in unit 36).The full marks for the essay is 100. We look forward to reading your sessional essay. Sincerely yours Teacher MEG-02: BRITISH DRAMA (Based on Blocks 1-9) Programme Code: MEG Assignment code: N{EG-02 120 1 3-201 4 Maximum Marks: Answer the fbllowing questions in 300 words each. Discuss 2. the plot ot Dr. Faustus. l{ow would you rate A Mid,cummer Night's Dream 3. Clomment on the indecisive bent of mind of Hamlet. (10) 4. What features make Alchemisl an allegory? 5. How is Playboy relevant as a comedy? today? 6. Comment on Pygmalion as a Shavian play. 7. What fbatures make Murder in the Catherlral a poetic drama? 8.Conrnrent on the title of 9. Waiting. tttr Discuss the theme of Look Back in Anger. 10. Irrorn among the plays you have read cho ose any one that you have liked giving reasons lor your choice.Trace the development of modern English fiction with specific referenc6 to the major shifts in literary perspective during the nineteenth century. 20 2. Would it be correct to say that in Tom Jones, Fielding considers mariage to be a ere socio- economic arrangement under which women feel continuously suppressed?Discuss. 3. Discuss the metaphor of the web in the context of events and people relating to Bulstrode in Middlemarch. 4 Suggest the political and artistic implications ot placing the Orientalist paradigm. 5. How does Realism ftnd expression in ofl Passage to British fiction of the 1960s? Base your answer on your understanding of The Prime of Miss Jean Brodie. MEG. 04: ASPECTS OF LANGUAGE course code: All questions are compulsory Write short notes on any two of the following. Competence and performanceLangue and parole Conversion as a morphological device Falling tone and rising tone the conclusion India within sta ge. brietly the history ot language planning snowing clearly the tocus at each Give your own definiti* of language. What are the characteristics of human communication and how is it different from animal communication? 20 What is foregrounding? Discuss this in terms of deviant examples from your reading of literature. ‘Pick out your own examples; say how they are deviant, and what is the impact on the reader. What is the difference between pure vowels and diphthongs? How do you describe both?

Sunday, September 29, 2019

Authentication

In addition, enhanced computer network defense (CNN) capabilities will enable DoD to teeter anticipate and prevent successful attacks on data and networks. IT procurements, coupled with the relatively low cost of IT hardware, make it possible for many entities within DoD to purchase and operate their own computing infrastructure. As a result, the DoD information environment is overly complex and susceptible to exploitation through these myriad devices, systems, and standards by malicious actors intent on causing harm to national interests.Consolidation will better enable secure mission-driven access to information and services, rendering DoD information securely accessible to all who need it and are authorized access to it. Deploying an enterprise identity, authentication, authorization, and access management service will extend security protection from the network to the data on the network, providing security controls to better enable secure information sharing.Commanders will have access to information available from all DoD resources, enabling improved command and control (CO), increasing speed of action, and enhancing the ability to coordinate across organizational boundaries or with mission partners. Individual service members and government civilians will be provided with a standard IT user experience, enabling them to do their jobs and providing them with the same look, feel, and access to information on reassignment, manipulation, or deployment. . Develop a plan to audit the three identified frameworks for compliance. Centrally manage and restrict the diversity of -?server (development and operational) platforms used throughout DoD and require all commodity hardware (e. G. , servers, server operating systems, and storage area networks) to be purchased through a limited number of consolidated contracts that leverage economies of scale to reduce total cost to the enterprise.Improve Weber security situational awareness and command and control Establish pr ocesses for granting access to networks and systems access using validated cryptographic identity credentials Detect -?anomalous behavioral inside DoD networks (e. G. , malicious software, unauthorized data movement) Establish a Core Computing infrastructure that will provide assured and ubiquitous access to vital enterprise services.Manage configurations and automate compliance monitoring and enforcement Reduce or eliminate the need to manually download information onto removable media to move it to another security domain Streamline certification and accreditation Establish processes and develop capabilities to protect and defend DoD networks as a single information environment Virtual networks were layered on top of physical networks and independent access control approaches were developed as organizations worked to protect their systems and networks.

Saturday, September 28, 2019

Macroeconomics Homework

One of the possible characteristics of the UK national daily newspaper would be the tight competition that exists in the said market due to the availability of the large number of newspaper companies. This characteristic of UK national newspaper causes tight market competition among its member firms. Another characteristic would be the difficulty of market entry in the said industry. This can be attributed to the large number of newspaper companies that already exist in the market. Price competition serves to be one of the major factors that attract more customers based on the given case. Moreover, innovation is also vital to the newspaper industry of UK since newspaper readers now prefer newspapers in a form of either tabloid or any other style that is much different from the conventional broadsheet from of UK’s newspaper. Using the theory of oligopoly, discuss why the Guardian chose to launch a new design of paper in 2005. Read also  Homework Solutions – Chapter 3 On the other hand, the reason why The Guardian launched a new design of newspaper mainly because they have to go with the flow on what other companies has been doing into their products. It was identified that almost all of the competitors of The Guardian has already been shifted from their conventional broadsheet newspapers to smaller design of newspapers like tabloid. One characteristics of Oligopoly would be the fact that any action of one firm in the market may it be price or marketing strategy, always affects other players on the said industry (Tutor2u.com 2007: 1). The fact that The Guardian was forced to make new designs for its newspaper would necessarily mean that they were affected by the strategies of their competitors of transforming the size of their newspapers. Moreover, based on the case, price only matters less or only among the many factors that affects the demand of newspaper readers which is also a part of the traits of Oligopoly. Works Cited Tutor2u.com (2007). Oligopoly [online]. Available: http://tutor2u.net/economics/content/topics/monopoly/oligopoly_notes.htm [Accessed

Friday, September 27, 2019

Brainwashed by Kashonia Carnegie Essay Example | Topics and Well Written Essays - 750 words

Brainwashed by Kashonia Carnegie - Essay Example Dr. Kashonia stated that a person’s heart and the brain were contradictory in decision-making. She explains that the heart can make us decide on things that the head clearly defines wrong ideas. In the text, the writer tells of memories of her childhood and adult life. It helps us to understand the impacts, both positive and negative, of childhood life on developing our personality and behavior. Carnegia has suffered dreadful treatments from others during her lifestyle. Instead of her family being her crying shoulder, they also joined in mistreating her. The stories make her memories more painful. Dr. Kashon uses her knowledge gained from the University and her self-study to tell us how self-discovery helped her choose her ways. She also mentions on acceptance and self-analysis being critical factors in leading the journey of life. The concepts form the basis of a major lesson from the story. In agreement with the author, the way we lead our childhood life greatly influences our character later on in life. Our family shapes our thinking. As a child, one will always take everything from the family positively until later in life when you come to realize that your greatest enemy was your family. Most are only aware of physical violence like rape, forgetting psychological abuse. Our childhood life makes us learn to endure some suffering. If not for her life as a kid, she would not have accepted her very psychologically abusive marriage at the age of 20. It was until sixty-three that she came to realize that her family played a significant role in her future suffering. In disagreement with the writer, Carnegie, being an adult should have tried to find out from her friend what marriage involved. She should have asked for answers why some things happened the way they did. Being intelligent is a gift thing but perseverance is a choice.

Thursday, September 26, 2019

Decision Making Method Essay Example | Topics and Well Written Essays - 1000 words

Decision Making Method - Essay Example An advantage of the benefit-cost framework is that it leads to a positive or negative (or zero) number for each program or practice evaluated and, therefore, does not require knowledge of a cost-effectiveness cutoff level to decide whether a particular practice should be undertaken. Finally, a limitation of both approaches is that the benefits and costs to individual members of society need to be aggregated. If the equitable distribution benefits and costs across individuals or groups are of concern, a single cost-effectiveness measure will not do. However, as economists are wont to argue, over large numbers of programs and practices the inequities are likely to even themselves out and, with some exceptions, may reasonably be ignored. The main steps in this model include (1) identification of main problems and possible solutions to these problems, (2) analysis of financial costs and financial benefits of proposed programs, (3) selection of the best decision. The first step is a search for alternative solution. The first solution is to buy computers for the training classroom. The second solution is to use company's computers located in different department. The third alternative is to rent a training classroom (in college or university) for the training program. When generating alternative methods for solving the problem, decision makers must determine whether the decision problem should be solved by a single individual or by a group of individuals. Groups usually take more time to make decisions than do individuals; however, group decision methods allow for the pooling of information from many difference sources, which can be particularly beneficial when dealing with ill-structured problems requiring the synthesis of novel solutions. In this case, the decision to find the best solution will involve employees and management. In many situations, members of a group tend to develop an illusion of invulnerability that may encourage excessive optimism and risk taking. Another result of groupthink is that members of a group who express opposing views may be pressured by other group members and ostracized if they resist (Stacey, 1996). The second step is analysis of financial costs and financial benefits of both programs. If we assume that one computer costs $1,250 and the training room needs 10 computers, the company should invest $12,500 in new equipment. Also, installation and cabling will cost $2,500, and support software - $6,500, and 1 server - $2,000. The second solution is to use company's computers located in different department will help to save money spent on new equipment but will cost company the value of time lost from work. It is important to note that to value life years and quality of life in dollars, the traditional approach is to use the annual earnings of a worker as a measure of the value of a productive year of life. The rationale is that society, including the individual in question, would lose potential consumption of goods and services in proportion to lost productivity. Once benefits and costs have been somehow expressed in dollar terms, net benefits are derived as the difference between the two. If the company follows the second approach it will save some money during the first training period. If we assume that the training on software tools takes 10 weeks (2 hours per day (5 working

Illustrate how a positive communication climate contributes to Essay - 3

Illustrate how a positive communication climate contributes to sustaining social, personal, and professional relationships - Essay Example This paper will review the importance of a positive communication climate to individuals irrespective of the relationship that they may be having. In sustaining personal relationships, positive communication climate enables one to feel valued in a relationship. This means that for those in a relationship, the purpose of open communication leads to a better understanding. This creates an avenue for the sharing of intimate thoughts, and ideas for the relationship to blossom (Segrin, 2005). Often, they communicate in a manner that shows affection to the person they are communicating with, and the language is often courteous. The interaction between them could be verbal and/or non-verbal, but it has to be very respectful. Professionally, a good communication climate can lead to the formation of a very conducive working environment. Being involved in the decision making process can enable the subordinate stuff, or employees to feel appreciated, and valued. There, however, should be a line between the employer, and the employee (Troester, 2007). This ensures that each and every organization has effort accountability. Showing support and encouraging fellow workmates can improve this professional relationship. Socially, people will get to communicate, and interact much more often. Approaching someone can be a very hard task, especially if they are new to you. However, all this can change if people were confident enough, and exhumed an aura of good nature around them. Everybody wants to know, and find a loveable person. This is hard nowadays as everyone is interested in doing their own thing, and finding means, and a way of survival (Troester, 2007). Considering personal relationships, it is very easy to meet new people (Wood, 2010). This is due to technological advances made over the past decade. Friendships have been made in social networking sites that exist today. Friendships grow

Wednesday, September 25, 2019

Erikson's theory on child development Essay Example | Topics and Well Written Essays - 2000 words

Erikson's theory on child development - Essay Example mas in the ego’s relations with the family and larger social institutions at significant points in childhood, adolescence, and early, middle and late adulthood (Sadock et al, 2007). The different aspects of child development identified by Erikson (1963) are: biological, social and individual. Erikson’s most important contribution to psychology is his demarcation of the eight psychosocial stages represented by the eight ages constituting the life span of an individual. An individual’s identity is related to each stage of the lifecycle. During adolescence a conflict between identity and role confusion can arise. Ego development occurs through the stages of the life span, and is part of a child’s evolution into adolescence. As a student of Freud, Erikson took a unique perspective on Freud’s work, incorporated Freud’s primary assumptions, and broadened the network of factors considered responsible for influencing development. He extended Freudian psychoanalytic theory to focus on the ego as the fundamental component in an individual’s functioning. Erikson’s (1963) psychosocial theory of personality development is similar to Freud’s psychosexual theory of development with its emphasis on instinctual energy as a determining life force (Sadock et al, 2007). Freud’s viewpoint was that the most important determinants of development occurred during early childhood, but on the other hand Erikson believed that the most important development came later, and that development continued through the lifespan: from childhood till the last stage of life. Other differences between Freud and Erikson’s theories is that: Erikson does not stress on unconscious motives or desires, and he based his ideas on analyses of the functioning of healthy people, whereas Freud studied individuals being treated for mental health problems. Erikson considered key social interactions at each stage of development to be very important. Though he agreed that biological unfolding was

Tuesday, September 24, 2019

Unemployment and Inflation Essay Example | Topics and Well Written Essays - 750 words

Unemployment and Inflation - Essay Example Other countries experience a large number of immigrants that other countries are hence causing this difference. Some countries have rigid protective labor legislation. This has made the employment rate to grow slowly in other industrial countries than other countries. Other countries have small or lack the land to do farming while other states do this business hence increasing the employment rate. The presence of different rules and regulation and different resource in this industrial countries contributes to the difference in the employment rates. 3.Inflation and interest rate Inflation causes the increase in the price of buying goods. Inflation is good for investment since it increases the price of the current investment hence making profits from it. Inflation is good for one who has invested and is selling it, but it is expensive for the buyer. The possibility of inflation rate typically increases the interest rate for borrowers the loans. The creditors are the ones who will get t he benefits of it since they will increase the interest rate hence getting more money that they can invest in the future. On the other hand, the borrowers will accept to take the loan with the high-interest rate simply because of the future inflation. The borrowers will be willing to pay a higher interest for them to invest and gain more when the inflation comes. At the end of it, the creditors will gain, the increased interest at that time will the borrowers will get more money in the future since the value of the investment will be higher.

Monday, September 23, 2019

John Calvin's doctrine in eucharist Research Paper

John Calvin's doctrine in eucharist - Research Paper Example Thereafter, Calvin’s works, writings and doctrines would become quite useful and influential in establishing consensus among various Reformation groups not only in Switzerland, Scotland, Hungary and Germany but also across the expanse of Europe and other far off lands. Born on 10 July 1509, John Calvin, a French cleric and doctor of law, was a key figure in the second generation of reformers. He not only published the theological tome, the Institutes of the Christian Religion, in 1536 but also played an influential role in the development of the system of Christian theology, which would later be renamed Calvinism.2 Calvin became a leading figure in the Reformed church in Geneva, which was the presumed headquarters of Reformed Christianity in the latter parts of the 16th century. Together with other elders, Calvin worked with pastors and elders to ensure that religious discipline reigned among the Genevan populace. An area for which Calvin’s theology is widely read and known are his doctrines of (double) predestination and the Sacrament.3 Although predestination was not the overriding idea in Calvins works, it later became a key issue, more so for most of his Reformation students andsuccessors.After Zwingli’s death on 11 October 1531, Calvin took over the mantle of spiritual leadership among the reformers. The doctrine of theLord’s Supper was surrounded with divergent opinions, contentions, disputes and controversies from the medieval period up to modern times. The Eucharist is viewed differentlyby different cultures and people .4For instance, some people believe thatthe Eucharist is a grace through which sins are forgiven.In the Catholic tradition, the Council of Trent (1545-1563) asserts that, â€Å"by the consecration of the bread and wine there takes place a change of the whole substance of the bread into the

Sunday, September 22, 2019

Cybercrime in Todays World Essay Example for Free

Cybercrime in Todays World Essay I have been asked to write a paper concerning cybercrime in the world today. I will go over what cybercrime is, how much it is affecting the United States, possible ways of enforcement and why or why not enforcement would be effective. What is a cybercrime, in your own words? Cybercrime is using computers or technology in order to steal information or to create fake identities over the World Wide Web. It is a growing problem in the world today, especially in countries like China, Japan and the United States where populations are high. Phone scams are another type of cybercrime as people will try to glean vital information from another by pretending to be a grandchild or a salesman. Cyberspace allows people to invade another person’s or company’s computer and download sensitive materials such as social security numbers, birth certificates and tax information. What is the extent of cybercrime in the United States? Computerescape. om says that â€Å"Cybercrime is widespread throughout the United States with 73% of American internet users being victims of cybercrime, either through viruses, online credit card or identity theft†*. With over 300 million Americans in the US, that comes out to 219 million Americans that have been or are currently victims of a cybercriminal. Most of the victims of identity theft are infants and the elderly. My own infant cousin had his social security number stolen shortly after his death. It took several months to recover it. How do you think we should control / enforce cybercrime? I personally believe that the only way to control cybercrime is to attach a major virus to sensitive files, so that when an unauthorized person tries to access it, it attaches itself to that person’s computer, downloads any information regarding the owner of the computer, sends that information to the authorities, and finally scrambles all data on the computer. The authorities will then be able to make an arrest and unscramble the computer so that evidence can be obtained. The offender should then have an appendage cut from their body on national television, so that others thinking of committing the same crime will hopefully be deterred. If the person should offend again, then they should be stoned until dead by the people that they have stolen from. Do you think enforcement can be effective? Why or why not? I don’t think that any type of enforcement would be effective as tracking anything in cyberspace is time consuming and if the person was determined enough, they would find a way around the enforcement. Security cameras are an excellent point. You can have the main points of a store being watched by cameras, but the only places you have issues with theft is in the cameras blind spots. A security system will alert you if someone comes in through a door or window, but isn’t programmed to respond if a person decides to cut a hole in the wall or ceiling and enter the premises without ever tripping the system. If someone wanted to commit a robbery and they knew that a police patrol car passed by every 45 minutes, they would wait until 10 minutes after the patrol car had passed and then rob the business, knowing that it would be at least another 10 minutes before police could respond. Criminals will always find a way to circumvent the enforcers of the law.

Saturday, September 21, 2019

Intrusion Detection System Using Node-Predictive Attack

Intrusion Detection System Using Node-Predictive Attack Intrusion Detection System Using Node-Predictive Attack Graph Model for Cloud Ambikavathi C Dr.S.K.Srivatsa Abstract- The role of Intrusion Detection System (IDS) in security world is considered as a key requirement for any computing model. This traditional methodology can add its own contribution of security to the distributed Cloud environment. The purpose of this paper is to clarify the steps that are needed to be taken in order to efficiently implement the IDS in cloud environment. The proposed system uses node predictive attack graph to correlate the newly occurred attacks with known attacks. The prediction steps are used to later monitor the environment and control the attacks. Keywords-Attack Graph; Cloud Computing; IDS ,; I. INTRODUCTION A. What is Cloud computing? Cloud computing is â€Å"a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction†[1]. This cloud model is co mposed of three service models, four deploy ment models and five essential characteristics . The three service models are So ftware as a Service (SaaS), Platfo rm as a Se rvice (PaaS) and Infrastructure as a Service (IaaS). The four deployment models are private cloud, public cloud, hybrid cloud and community cloud. The five essential characteristics of cloud are on-demand self-service, broad network access, resource pooling, rapid elasticity and measured service. B. What is IDS? Intrusion detection systems are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for malicious activities or policy violations and produces reports to a management station. IDSs a rehost-based, network-based and distributed IDSs. Hos t based IDS (HIDS) monitors specific host machines, network-based IDS (NIDS) identifies intrusions on key network points and distributed IDS (DIDS) operates both on host as well as network [7]. IDS can be a valuable addition to the security arsenal. IDS performs the following functionalities : Monitoring and analyzing both user and system activities .Analyzing system configurations and vulnerabilities .Assessing system and file integrity.Ability to recognize patterns typical of attacks.Analysis of abnormal activity patterns.Tracking user policy violations.The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service. Virtualization alters the relationship between the OS and underlying hardware. This introduces an additional layer virtualization that itself must be properly configured, managed and secured. Specific concerns include the potential to compromise the virtualization software, or hypervisor. So virtual machine security is essential in cloud environment. C. Attack Graph Attack graphs are used to determine how vulnerable their systems are and to determine what security measures to deploy to defend their systems. In the predictive attack graph, a node represents a host and an edge represents vulnerability. The predictive attack graph representation accurately forecasts the effect of removing vulnerabilities by removing edges from the attack graph. The predictive attack graph is the full attack graph with redundant paths removed. A path is considered redundant if the path contains the same vulnerability-host pair in two or mo replaces along the same attack path. In node predictive attack graph, a node can be host or a group of hosts, and an edge can be vulnerability or a group of vulnerabilities. The node predictive attack graph is a simplified version of the predictive attack graph. The node predictive attack graph’s purpose is to mitigate the effects of â€Å"firewall explosion.† Firewall explosion causes redundancy in the predictive gr aph. Thus, the node predictive attack graph mitigates this issue by merging nodes of the attack graph. Two nodes are merged if the attacker can compromise the two hosts from all hosts the attacker has already compromised. [16] Rest of the paper is organized as follows. Section II discusses about the related work done. Proposed system is described briefly in section III. Section IV, presents the implementation part of EIDS and section V concludes with references at the end. II. RELATED WORK In this section, we present related research to our proposed work: Intrusion detection in cloud and attack graph models. A. Anomaly based IDS Anomaly or behavior based detection [7] refers to techniques that define and characterize normal or acceptable behaviors of the system (e.g., CPU usage, job execution time , system ca lls). Behaviors that deviate fro m the expected normal behavior are considered intrusions. Generation of high false alarms is the major drawback of this type which leads to low detection efficiency. But it is able to detect new attack patterns. Here, Input parameter selection and analysis of ciphered data are tedious processes . It attains low throughput but high cost. Metrics and frame work to evaluate this IDS and compare with alternate IDS techniques is in need. Also it is poor in defending themselves from attacks. To avoid false alarms in anomaly based systems the system must be trained to create the appropriate user profiles. It requires extensive training to characterize normal behavior patterns. B. Signature based I DS Signature or Misuse based detection refers to techniques that characterize known methods to penetrate a system. These penetrations are characterized as a ‘pattern’ or a ‘signature’ that the IDS looks for. The pattern/signature might be a static string or a set sequence of actions[9]. It can only detect known attacks. Frequent updation is needed in the database for signatures of new attacks. The advantages of this IDS are, it generates less number of false alarms. A single signature can detect a group of attacks. It does not require extensive training. C. Fuzzy based IDS Fuzzy logic can be used to deal with inexact description of intrusions. It provides some flexibility to the uncertain problem of intrusion detection. Fuzzy logic techniques[5] are used for classification techniques. The classification algorithm is applied to audit data collected which learns to classify new audit data as normal or abnormal data. It allows greater complexity for IDS while it provides some flexibility to the uncertain problem of IDS. Most fuzzy IDS require human intervention to determine fuzzy sets and set of fuzzy rules . D. Artificial Neural Network based The goal of using ANNs for intrusion detection[5] is to be able to generalize data from incomplete data and to be able to classify data as being normal or intrusive. It is best because of it’s self learning capabilities , quick processing and can find small behaviour deviations. But it’s downside is it requires more tra ining sa mples and time consuming. E. Data Mining based IDS Some intrusion attacks are formed based on known attacks or variant of known attacks. To detect such signatures or attacks, signature apriori algorithm can be used, which finds frequent subset (containing some features of original attack) of given attack set. In Cloud, association rules can be used to generate new signatures. Using newly generated signatures, variations of known attacks can be detected in real time[5]. F. Profile based IDS In VM profile based IDS[12], a profile is created for each virtual machine in cloud that describes network behavior of each clouduser. The behavior gathered is then used for detection of network attacks on cloud. It detects the attacks early with robustness and minimum complexity. G. Entropy based IDS Entropy is, in general, used for measuring the data’s degree of impurity using a Threshold value. Entropy based anomaly detection system[14] is mainly proposed to prevent DDoS attacks. This is done in two steps. First users are allowed to pass through a router in network site. It detects for legitimate user using detection algorithm. Second again it passes through a router in cloud site. In this methodology confirmation algorithm is incorporated to detect the intruder by checking a threshold value. H. Multithreaded IDS Multithreading technique improves IDS performance within Cloud computing environment to handle large number of data packet flows. The proposed multi-threaded NIDS[8][4] is based on three modules named: capture module, analysis module and reporting module. The first one is responsible of capturing data packets and sending them to analysis part which analyzes them efficiently through matching against pre-defined set of rules and distinguishes the bad packets to generate alerts. Finally, the reporting module can read alerts and immediately prepare alert report. The authors conducted simulation experiments to show the effectiveness of their proposed method and compared it with single thread which presented high performance in terms of processing and execution time. However, the problem of detecting new types of attacks still needs many works to be done. I. Integrated model IDS It uses the combination two or more o f above techniques. It is advantageous since each technique has some advantages and drawbacks. Grid and Cloud Computing Intrusion Detection System (GCCIDS)[10] proposed the integration of knowledge and behavior analysis to detect specific intrusions. However, the proposed prototype cannot discover new types of attacks or create an attack database which must be considered during implementing IDS. A new integrated intrusion detection approach, called FCA NN[13] is proposed based on ANN and fuzzy clustering. Through fuzzy clustering technique, the heterogeneous training set is divided to several homogenous subsets. Thus complexity of each sub training set is reduced and consequently the detection performance is increased. J. Graph based IDS A graph is constructed in which nodes represent state of attack and edges represent the correlations between attacks. Queue graph, Dependency graph and Attack graph are the existing works done on IDS. To prevent vulnerable virtual machines from be ing compromised in the cloud, a multiphase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE[2] is proposed, which is built on attack graph-based analytical models and reconfigurable virtual network-based countermeasures. III. PROP OSED WORK In this section, we describe how to construct and utilize node predictive attack graph model to handle vulnerabilities in cloud environ ment. Any attack has some set of predefined steps to incorporate it. An attack can only be accomplished when all its pre-conditions are met [11]. So that by keen monitoring the attack can be prevented. An attack graph is an abstraction that represents the ways an attacker can violate a security policy by leveraging interdependencies among discovered vulnerabilities. An attack graph can be generated from network configuration details and known vulnerabilities within the network. An attack path is a sequence of steps that starts from an attacker’s initial state to the attacker’s goal state (security policy violation) in an attack graph. Every virtual machine has it’s own logfile for recording the actions of that virtual machine. Th is logfile along with the knowledge base provides information for constructing attack graph. Fig. 1. Proposed Architecture IV. IMPLEMENTATION EIDS is implemented using Openebula[15] and OSSIM (Open Source – Security Information Management)[3] which comprises of traffic analyzers, vulnerability scanners. OS-SIM is embedded as a virtual mach ine in the c loud environment. The ro le of this virtual machine is to monitor all other virtual machines running in the environment. OSSIM provides a Security Information and Event Management (SIEM) solution. It is a one-stop solution and integrated the open source software’s NTOP, Mrtg, Snort, Open VAS, and Nmap. OSSIM is a cost effective solution in the area of monitoring network health and security of network/hosts compared to other propriety products[6]. A. Attack Analyzer Attack Analyzer is built on the top the traffic Analyzer of OS-SIM. It uses each virtual machine’s logfile to analyze and extract attack trace steps. Whenever an attack occurs it is added to the attack graph as a node along with its state and correlation function is invoked. Attack Graph Attack Graph Generator Alert System Knowledge Base Attack Analyzer B. Correlation function Correlation function correlates this new attack with known attacks and gives the prediction steps for this attack. These prediction steps for each attack are used to monitor the further attacks in future. C. Attack Graph Generator Each node in the graph defines an attack and the edge between nodes represent the correlation between that two attacks. V. CONCLUSION Defending distributed environment is difficult. Always prevention is better than cure. Prediction of Intrusions in prior enhances the security of cloud environment. So that predictive attack graph model is chosen for providing security to the distributed cloud environment. At any point the known attacks are correlated with each other to predict new attacks. REFERENCES: [1] NIST (National Institute of Standards and Technology ) http://csrc.nist.gov/p ublications/nistp ubs/800-145/SP800-145.p df [2] Chun-Jen Chung, Pankaj Khatkar, Tiany i Xing Jeongkeun Lee, Dijian g Huan g, â€Å"NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems†, IEEE Transactions On Dependable And Secure Computing, Vol. 10, No. 4, pp. 198 – 211, July /August 2013. [3] â€Å"OSSIM †, https://www.alienvault.com/ [4] Ms. Parag K. Shelke, M s. Sneha Sontakke, Dr. A. D. Gawande, â€Å"Intrusion Detection Sy stem for Cloud Comp uting†, International Journal of Scientific Technology Research Volume 1, Issue 4, M ay 2012. [5] M odi, C., Patel, D., Patel, H., Borisaniy a, B., Patel, A. Rajarajan, M ., â€Å"A survey of intrusion detection techniques in Cloud†, Journal of Network and Computer App lications. [6] â€Å"OSSIM †, http ://www.op ensourceforu.com/2014/02 /top -10-op en-source-security -tools/ [7] Amirreza Zarrabi, Alireza Zarrabi, â€Å"Internet Intrusion Detection Sy stem Service in a Cloud† IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, No 2, Sep tember 2012. [8] I. Gul and M . Hussain, â€Å"Distributed Cloud Intrusion Detection M odel†, International Journal of Advanced Science and Technology, vol. 34, pp. 71-82, 2011. [9] R. Bhadauria, R. Chaki, N. Chak i, and S. Sany al â€Å"A Survey on Secur ity Issues in Cloud Comp uting†, Available at: http ://arxiv.org/abs/1109.5388 [10] K. Vieira, A. Schulter, C.B. Westp hall, and C.M . Westphall, â€Å"Intrusion Detection for Grid and Cloud comp uting†, IT Professional, Volume: 12 Issue: 4, p p. 38-43, 2010. [11] X. Ou and A. Singhal, â€Å"Quantitative Secur ity Risk Assessment of Enterp rise Networks†, Sp ringerBriefs in Comp uter Scien ce, DOI 10.1007/978-1-4614-1860-3_2,  © The Author(s) 2012 [12] Sanchik a Gupta, Padam Kumar and Ajith Abraham, â€Å"A Profile Based Network Intrusion Detection and Prevention System for Secur in g Cloud Env ironment†, International Journal of Distributed Sensor Networks, Feb 2013 [13] Swati Ramteke, Rajesh Dongare, Ko mal Ramteke, â€Å"Intrusion Detection System for Cloud Network Using FC-ANN Algorithm†, Int. Journal of Advanced R esearch in Comp uter and Communication En gineeringVo l. 2, Issue 4, April 2013. [14] A.S.Sy ed Navaz, V.San geetha, C.Prabhadevi, â€Å"Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud†, Int. Journal of Computer Applications (0975 – 8887) Volume 62– No.15, January 2013 [15] â€Å"Op ennebula†, http ://opennebula.org [16] Nwokedi C. Idika, â€Å"Characterizin g and A ggregating Attack Grap h-based Security M etrics†, CERIAS Tech Rep ort 2010

Friday, September 20, 2019

The Woman In Black Sound Analysis

The Woman In Black Sound Analysis How Sound is Used in The Woman In Black I saw a production of the play The Woman In Black at the Theatre Royal in Windsor. The play is set in England in Victorian times. This play really put me on the edge of my seat in some scenes and terrified the life out of me in others, the sound in the play really did go a long way to achieving this. Sound is very important in this production as it creates tension, makes the play nerve-shredding and really helps to tell the story as the stage is set as a minimalistic stage so the sound is vital to the story telling. The director (Robin Hearford) hired Rod Mead as the designer of sound. One scene Rod Mead uses sound effectively is where Kipps was sleeping at Eel Marsh house. The sound used here was non-diegetic and was a low rhythmical thudding. Thiss was a very good use of sound as it created an eerie atmosphere. This sound was played from speakers positioned around the audience to make the audience feel involved in the play. I thought this was a great use of sound as it really created a sense mystery and the audience didnt know what would happen next. Rod Mead used sound effectively in many ways. Often he used it to legitimise the location of a scene for example in the graveyard where Jerome and Kipps are paying their respects to Mrs. Drablow. There was a recorded sound of ravens which is a noise associated with death and hauntings. The non-diegetic sound was played from speakers which were behind the actors. This makes it realistic for the audience because Rod Mead is making us use our senses to make us more in depth and into the story, its making the audience experience what The Actor, who in this scene is playing Kipps, experienced. This is clever as it builds tension because it is bringing the audience deeper and deeper into the story and is enhancing the separation from the real world and as it was a minimalistic stage setting the sound was really important as it was the main sense the audience had to picture the scene.I thought this was a brilliant use of choosing to place the sound and it really supported the action that wa s going on, onstage. Also there is a reverb on the vicars voice. This is implying that the church was mostly empty and makes the audience wonder about why Mrs. Drablow was so unpopular. Another way sound is used effectively is in the office scene where Kipps and Jerome are talking at Jeromes desk. In this scene Rod Mead uses non-diegetic sound really well to create an extremely clear atmosphere. In the background there was the sound of the busy market place, which include the voices of traders, the footsteps of people walking through the market and in the office there were sounds of light murmuring from employees and chairs being moved etc. This was very smart from Rod Mead as it gave the sense that the audience were really in an office scene and it drew the audience in to the story. These distant sound effects had been mixed cleverly to create a background and atmosphere for the scene. I think this was a very good way of supporting the action of this scene and I think it really helped the audience paint a picture in their heads. Near the start of the play when Kipps and Sam Dailey are in the train, Rod Mead creatively uses non-diegetic to give real sense of the atmosphere of the train carriage. If you listened, you could hear sound effects that had been mixed cleverly to create a background for the scene. There were sounds of the steam puffing out of the steam engine, the clickety clack of the wheels rolling away on the track, and the gentle hum of the engine. These sounds were amplified around the room with a speaker at the front.This was a very clever technique as it gave the impression that we were really in a train carriage in these scenes. I thought this was a brilliant use of choosing where to place the sound. It also gave a brilliant atmosphere for the upcoming jump scare because it involved you in the play and it felt as if you were actually there on the train and it seemed normal. So when the climax, a loud train horn (which was recorded sound coming out from the speakers), accompanied by a straw ge lled rotating gobo, which simulated a passing train, actually came it was extremely scary because it came from nowhere and was a sudden unexpected shock. Also there was very little on so the location and the atmosphere was created through sound. So in conclusion, I can see how recorded music as well as live and recorded sound effects are all used together to communicate and tell the story of The Woman In Black, Robin Hearford and Rod Mead clearly worked together well to help one another and the overall effect was fantastic.

Thursday, September 19, 2019

The Great Gatsby: The Integrity of Nick Carraway :: essays research papers

The Great Gatsby: The Question of Nick Carraway's Integrity In pursuing relationships, we come to know people only step by step. Unfortunately, as our knowledge of others' deepens, we often move from enchantment to disenchantment. Initially we overlook flaws or wish them away; only later do we realize peril of this course. In the novel "The Great Gatsby" by F. Scott Fitzgerald, the journey from delight to disappointment may be seen in the narrator, Nick Carraway. Moving from initial interest to romantic allure to moral repugnance, Nick's relationship with Jordan Baker traces a painfully familiar, all-to-human arc. Nick's initial interest in Jordan is mainly for her looks and charm. Upon first sight of her at the Buchanan's mansion, he is at once drawn to her appearance. He Notes her body "extended full length" on the divan, her fluttering lips, and her quaintly tipped chin. He observes the lamp light that "glinted along the paper as she turned a page with a flutter of slender muscles in her arms." He is willing to overlook her gossipy chatter about Tom's extra- marital affair, and is instead beguiled by her dry witticisms and her apparent simple sunniness: "Time for this good girl to go to bed," she says. When Daisy begins her matchmaking of Nick and Jordan, we sense that she is only leading where Nick's interest is already taking him. It is Jordan, then, who makes Nick feel comfortable at Gatsby's party, as we sense what Nick senses: they're becoming a romantic couple. As they drive home a summer house-party, Nick notes her dishonesty but forgives it, attributing it to her understandable need to get by in a man's world. She praises his lack of carelessness, tells him directly "I like you"--and he is smitten, After Jordan tells him the tale of Gatsby and Daisy's past, Nick feels a "heady excitement" because she has taken him into her confidence. Attracted by her "universal skepticism" and under the influence of his own loneliness, Nick-- overlooking this time her "wan, scornful mouth"--seals their romance by planted a kiss on Jordan's lips. But the attraction can't last and is, by summer's end, replaced by repugnance. The smallest of details, at first, heralds this falling-apart: "Jordan's fingers, powdered with white over their tan, rested for a moment in mine." Here Fitzgerald has dropped a subtle hint that their liaison is to be the matter of only a moment, and that Jordan's "integrity" may be a matter of mere cosmetics. But it is Jordan's failure to feel the gravity of the real falling- apart--among Tom, Daisy, and Gatsby--that most rankles Nick, and he reacts with

Wednesday, September 18, 2019

Othello: the Abnormal Essay -- Othello essays

Othello: the Abnormal Five Works Cited  Ã‚  Ã‚   William Shakespeare’s tragic drama Othello presents to the audience a very abnormal character in the person of Iago. Also can one classify the epileptic seizure of Othello as normal? Let us in this essay consider the abnormal in the play. The abnormal behavior of the ancient is partly rooted in his misogynism. In â€Å"Historical Differences: Misogyny and Othello† Valerie Wayne implicates Iago in sexism. He is one who is almost incapable of any other perspective on women than a sexist one: Iago’s worry that he cannot do what Desdemona asks implies that his dispraise of women was candid and easily produced, while the praise requires labour and inspiration from a source beyond himself. His insufficiency is more surprising because elsewhere in the play Iago appears as a master rhetorician, but as Bloch explains, ‘the misogynistic writer uses rhetoric as a means of renouncing it, and, by extension, woman.’ (163) And how about epilepsy? In Act 4 the evil Iago works up Othello into a frenzy regarding the missing kerchief. The resultant illogical, senseless raving by the general is a prelude to an epileptic seizure or entranced state: Lie with her? lie on her? – We say lie on her when they belie her. – Lie with her! Zounds, that’s fulsome. – Handkerchief – confessions – handkerchief! – To confess, and be hanged for his labor – first to be hanged, and then to confess! I tremble at it. [. . .] (4.1) Cassio enters right after the general has fallen into the epileptic trance. Iago explains to him: IAGO. My lord is fall’n into an epilepsy. This is his second fit; he had one yesterday. CASSIO. Rub him about the temples. IAGO. No, forbear. The lethargy must have his quie... ...l find Iago peeping out from many of its pages. Still more, Iago’s name will be found appearing occasionally in bold print in books on abnormal psychology. (89-90)    WORKS CITED    Bevington, David, ed. William Shakespeare: Four Tragedies. New York: Bantam Books, 1980.    Campbell, Lily B. Shakespeare’s Tragic Heroes. New York: Barnes and Noble, Inc., 1970.    Coles, Blanche. Shakespeare’s Four Giants. Rindge, New Hampshire: Richard Smith Publisher, 1957.    Shakespeare, William. Othello. In The Electric Shakespeare. Princeton University. 1996. http://www.eiu.edu/~multilit/studyabroad/othello/othello_all.html No line nos.    Wayne, Valerie. â€Å"Historical Differences: Misogyny and Othello.† The Matter of Difference: Materialist Feminist Criticism of Shakespeare. Ed Valerie Wayne. Ithaca, NY: Cornell University Press, 1991.

Tuesday, September 17, 2019

Research on Consumer Behavior

CHAPTER 1: INTRODUCTION 1. 0 THE INTRODUCTION OF THE STUDY The topic of the research is ‘Customer Loyalty towards Fast Food Industry’. The introduction will discuss the background of study that is planned by researcher. This includes problem statement, objective of study, research question, research hypothesis, the theoretical framework and also scope of the study. This proposal consist the introduction part, the literature review and research methodology. Each of these chapters is explained in detail with the sub topic that discusses the essential procedures and steps in completing this study.Customers are the purpose of what marketers. We very much depend on them. That is the main reason why organizations today are focusing on customer loyalty. Customer loyalty is actually the result of an organization creating a benefit for a customer so that they will maintain or increase their purchase from the organization. Loyalty has become important over the past few years becau se of increased competition within respective industries. To be successful, organization must look into the needs and wants of their customers.That is the reason why many researchers and academicians have continuously emphasizes on the importance of customer loyalty and retention. Building customer loyalty towards fast food industry or other business of four factors that is product quality, the important of relation between people that involve in management of the store and lastly are brand image of the product itself. (Kumar, Batista and Maull, 2011) 2. 1 BACKGROUND OF FASTFOOD INDUSTRY Fast food restaurants or outlets today are either kiosks or elaborate quick service restaurants.The franchise operations have generated restaurant chains that offer standardized meals across the globe. On account of a low capital requirement and popularity of fast food, fast food restaurants and drive-through outlets are common throughout the world. Also known as sit-ins and upscale kiosks, these re staurants cater to the dry food demands of the younger generation, extremely tight adult work schedule and distinct ambiance preferences across the globe. An overview of the fast food industry highlights the availability of meals that suffice the need to eat amidst tight work schedule.This has offered great respite to parents who shuttle between work and home for major part of the day. Delicacies like fish and fries, vegetarian and non-vegetarian burgers and pizzas are washed down with great relish, with ales and aerated drinks served complimentary at many of these fast food restaurants. Though accompaniments like coleslaw, baked potatoes and mushy peas satisfy the established and widely accepted compulsion for vegetable-intake, the fried foods are becoming addictive, depriving the modern child of a balanced diet.There is no dearth with regards to the variety available at these outlets. Fast food franchise chains such as Subway, Burger King, McDonald's, Kentucky Fried Chicken and Pi zza Hut cater to demands for seafood, lean meat, special diet meal components, and other considerable regional variations. Snacks such as sandwiches and baguettes are the result of experiments within the fast food industry. Most clientele indulge in the semi-dry and dry meals, to avoid interruption while working or to fulfill a family commitment that otherwise requires a considerable amount of time to be spent in the kitchen . 1. 1Fast food industry in Malaysia In recent years, the major food consumption trend in urban parts of developing countries is that more consumers are eating increasingly more meals outside of their homes and most of growth in away from home eating has been in the fast food sector (Kaynak et al, 2006). The interest shown at the national and international levels concerning the fast food is derived from the scarcity of time in the competitive, dynamic and urban fast life (Platania and Donatella, 2003).According to Arkins and Bowler (2001), emphasis is increasing ly being placed in quick meals solution due to the busier consumer life style and dual working families with children. Consumer lead increasingly busy life meaning that the time available to cook meal is being squeezed between works and leisure commitment. Cooking for many has ceased to be a leisure activity and instead is a core. Consequently, this has placed more emphasis on fast food items. Fast food is rapidly growing industry in the world as well as in Malaysia, especially in the urban areas.Moreover, the food diversity in Malaysia is an implicit characteristic of the diversified culture of the country amongst the different region within the state. 1. 1. 2Background of KFC KFC, founded and also known as Kentucky Fried Chicken, is a chain of fast food restaurants based in Louisville, Kentucky, United States. The company was founded as Kentucky Fried Chicken by Colonel Harland Sanders in 1952. KFC is present in 110 countries and territories around the world. It has in excess of 5 ,200 outlets in the United States and more than 15,000 units in other parts of the world.KFC prides itself as a fast-food restaurant that give customers great tasting chicken with a selection of home-styled side dishes and desserts to make a wholesome, complete and satisfying meal. Kentucky Fried Chicken Corporation (KFC) was the world's largest chicken restaurant chain and third largest fast-food chain in 2000. KFC had a 55 percent share of the U. S. chicken restaurant market in terms of sales and operated more than 10,800 restaurants in 85 countries. KFC was one of the first fast-food chains to go international in the late 1950s and was one of the world's most recognizable brands.KFC's early international strategy was to grow its company and franchise restaurant base throughout the world. By early 2000, however, KFC had refocused its international strategy on several high-growth markets, including Canada, Australia, the United Kingdom, China, Korea, Thailand, Puerto Rico, and Mexi co. 1. 1. 3Background of KFC in Malaysia The first KFC restaurant in Malaysia was opened in 1973 on JalanTunku Abdul Rahman. Today there are more than 390 KFC Restaurants nationwide and still counting. Great tasting chicken has become synonymous with KFC; and has been enjoyed by Malaysians ever since.In fact, KFC Malaysia has developed a distinctive Malaysian personality of its own. The reason KFC is run by Malaysians and managed by Malaysians; they took it upon themselves to create a selection of food that would make Malaysia proud on the international scene. 1. 2PROBLEM STATEMENT Nowadays, it would be challenging to retain customers and maintaining customers as loyal customer. It would give paramount of challenges to researcher to ensure customers are loyal to them. This is because customer nowadays are have knowledge to choose the best for them and what will make customer become a loyal customer to certain product.It is important for researcher to know how attract customer to bec ome loyal customer. Customer tends to change product if the product can’t give them satisfaction. The right foundation for maintaining a long-standing relationship with customers will increase the chance to the customer loyalty. In this recent economy, put strong pressure on customer loyalty. According to Leon. G Shiffman (2010), company might have big disadvantage when not having loyal customer, because need more marketing efforts aimed at attracting new customers are expensive; indeed, in saturated markets, it may be impossible to find new customers.For example, not popular bookstore might find problem in having new customer because it will cost them a lot. Generally, customer because loyal to companies when they’re reach higher level of satisfaction in their selves after using products or services that offered to them. It is because reach customer has different level of satisfaction that will bring them to become loyal to companies and the unique relationship betwee n customer and company may be a viable contact point for firms to build loyalty. 1. 3THEORETICAL FRAMEWORKCUSTOMER LOYALTY | PRICE| SERVICE| PRODUCT| BRAND IMAGE| 1. 4PURPOSE OF STUDY 1. 4. 1 To determine whether price affect customers loyalty 1. 4. 2To examine relationship between service to customer loyalty 1. 4. 3 To measure whether brand image are important in customer loyalty 1. 4. 4 To investigate the product role in the customer loyalty 1. 5RESEARCH QUESTION 1. 5. 1Does price contribute to customer loyalty? 1. 5. 2Does service give impact to customer loyalty? 1. 5. 3Does brand image influencing customer loyalty? 1. 5. Does product affecting the customer loyalty? 1. 6HYPOTHESIS 1. 6. 1Hypothesis 1 Ho: Price does not contribute to the customer loyalty H1: Price does give high contribute to customer loyalty 1. 6. 2Hypothesis 2 Ho: Service not gives impact to customer loyalty H1: Service gives impact to customer loyalty 1. 6. 3Hypothesis 3 Ho: Brand image does not influencing the customer loyalty H1: Brand image is a big influencer the customer loyalty 1. 6. 4Hypothesis 4 Ho: Product does not affecting customer loyalty H1: Product gives effect to the customer loyalty . 7SIGNIFICANT TO STUDY Businessman One of the alternatives to the businessman to find a way to improve the response from the customers. Besides that, they also will know the weaknesses from all aspects such as services, preparation of the menu, personnel, and others. By knowing all this weaknesses, the management can find the best way to overcome these weaknesses as well as can enhance the image of KFC. Researcher This study also important to the researcher in getting more information besides can gain more knowledge from the study that has done.These findings can be made as references to the people that responsible in promoting this fast food restaurant as well as can improve the economy of the country. Customers Findings from the study that has done can give opportunity to the customers in ex pressing their satisfaction to the service that was provided by this fast food restaurant. 1. 8LIMITATION OF THE STUDY Time constraints Researchers really affected with the time period to finish this study because researcher need some time to get accurate info and study the info.However, researcher able to produce this research report with guidelines. Budget Researcher also facing budget constraint because researcher only student and yet not gain sufficient money pocket. Respondents Researcher focus to distributed question at UiTM Kota Bharu because researcher not able to distribute at other site. CHAPTER 2: LITERATURE REVIEW 2. 0INTRODUCTION This chapter focuses on issues related to the customer loyalty in the fast food industry. The literature review in this chapter will present understanding of factors influencing the customer loyalty in the fast food industry.Customer loyalty can be defines as â€Å"customer behavior characterized by a positive buying pattern during an extended period (measured by means of repeat purchase, frequency of purchase, wallet share or other indicators) and driven by a positive attitude towards the company and its products or services† (Looy, Gemmel & Dierdonck, 2003). Dimitriades (2006), define a loyal customer as one who holds a favorable attitude toward the service provider, recommends the service provider to other consumer and exhibits repurchase behavior.In fact that loyal customers buy more products, loyal customers are less price sensitive and pay less attention to competitors’ advertising, servicing loyal customers is cheaper and last is loyal customer will spread positive word of mouth and refer other customers. Loyalty and experience gained over the relationship are positively related (Wang, Liang and Wu, 2006) Price is the amount of money charged for a product or service, or the sum of all the values that customers give up in order to gain the benefits of having or using a product or service.The firm can c hoose between two broad strategies, market-skimming pricing and market-penetration pricing. Market-skimming pricing is setting a high price for a new product to skim maximum revenues layer by layer from the segments willing to pay the high price, the company makes fewer but profitable sales. Market-penetration pricing is setting a low price for a new product in order to attract a large number of buyers and a large market share. (Philip Kotler, Gary Armstrong). There are several measurement variables to qualify a person's product-price knowledge.Price mechanisms, price consciousness, the use of a shopping list, and shopping frequency, as determinants of the accuracy and size of, and confidence in, one's product-price knowledge, even though the impact structure is not uniform. There are some indications that formerly encountered price stimuli represent a relatively obsolete part of a consumer's product-price knowledge. (Hans Pechtl). Product is the key element in the overall market of fering. According to Clayton Brown, Contributor, the product definition should be dynamic and reflect the needs of the company and the customer.A product definition at least includes the elements of product positioning, product differentiation and product life cycle. (Brown, C. (2012). Product also can be defined as anything that can be offered to a market for attention, acquisition, use or consumption that might satisfy a want or need (Philip Kotler, Gary Armstrong). Brand image can be defined as â€Å"set of perceptions about a brand as reflected by the brand associations held in consumers’ memory† (Philip Kotler, 2006). Jeffrey E. Danes and Jeffrey S.Hess and York (2010) most agree that brand image is a mental constructs that customers form based on their connections and associations with the brand. Services are form of product that consists of activities, benefits, or satisfactions offered for sale that are essentially intangible and do not result in the ownership of anything (Philip Kotler, Gary Armstrong). CHAPTER 3: RESEARCH METHODOLOGY 3. 0INTRODUCTION Research methodology includes all the data and analysis phases for the research paper. It includes the data collection method from primary data like questionnaire and the secondary data which is from internet or website.On the other hand, the other data collection methods are from observation and sampling. In order to analyze the data, the methods are frequency analysis, reliability test, regression analysis, and Pearson correlation analysis 3. 1 RESEARCH DESIGN Methodology can be defined as an approach used in the research process to assess the data. Methods are also such things as study design, population and sample, the study procedures and analysis methods data. Its aims to ensure data collection methods used in research studies is compatible with the objectives of the research objectives to be achieved.According to Malhotra (2007) research design is a frame work or blueprint for conduc ting the marketing research project. It details the procedures necessary for obtaining the information needed to structure or solve marketing research problem. The researcher is the type of conclusive research that has as its major objective the description of something, usually the market characteristics or functions. 3. 2DATA COLLECTING METHOD Collection is the process of gathering, assembling and accumulation of information. There are two methods of data collection generating has been implemented, that is the primary data and secondary data.For the purpose of this study, the researcher will gather the data from both primary and secondary data to complete this study. 3. 2. 1Primary Data The primary data sources are from the distribution of questionnaire. Researcher will build a set questionnaire that is related to the study and distribute to the respondent a) Questionnaire Researcher will use questionnaire method in order to gather the information. The questions contain the indepe ndent variables and dependent variable. A set questionnaire will be distributed to the respondent which is the customer of KFC KBMall. The respondent consists of 50 customers.There are three sections in the questionnaire, which include personal detail of respondent. Section B will be including the question about independent variables that are, price, product, service and brand image. The last section is regarding the dependent variable which is customer loyalty. i. Nominal Question The questionnaire is based on the independent variable that researcher found through literature review and other information. In section A, the respondents need to answer nominal question. The respondents need to choose only one answer because in section A is about respondents’ profile such as gender, marital status or age. i. Likert Scale Question Other than that, researcher use Likert Scale in the section B and C where the respondents need to circle the answer which include the degree acceptance with factors that lead to customer loyalty. 3. 2. 2Secondary Data In this research, the data of secondary sources were obtained from both internal and external secondary data such as books, company’s reports, journals and also through selected websites. 3. 3SAMPLING METHOD 3. 3. 1Collecting the Sample of Respondents For this study, the researcher has selected 50 respondents who come to KFC KBMall by using the simple random method. 3. 4METHOD OF DATA ANALYSISIn conducting the research, after respondents were determined, the researcher has analyzed the data using the Statistical Packages for Social Science (SPSS) version 17. 0. SPSS is also used to identify the relationship between two or more variables. Meaning that, it involves the process of hypothesis testing. By using the SPSS, ordinary simple linear regression model and multiple regression model analysis are selected in order to analyze and the test hypothesis. This technique is commonly used in business and economics for estimating the relationship between two or more values of dependent and independent variable.CHAPTER 4: FINDING AND DATA ANALYSIS 4. 0INTRODUCTION This chapter will discuss the results and findings of this study by using frequency distribution, reliability, Pearson correlation, and multiple regression analysis. Before the analyses were thoroughly done, all data were edited and passes through the reliability analysis. At the end of the chapter, discussions about decision on hypothesis were reported. 4. 1 FREQUENCIES In the Section A, demographic session in questionnaire, the data will be calculated in the frequency distribution. 4. 1. 1Frequency Distribution Analysis by GenderResponds to Gender| | | Frequency| Percent| Valid Percent| Cumulative Percent| Valid| Male| 14| 28. 0| 28. 0| 28. 0| | Female| 36| 72. 0| 72. 0| 100. 0| | Total| 50| 100. 0| 100. 0| | Table 4. 1 : Table of frequency analysis gender Figure 4. 1: Pie chart of frequency by gender Based on the table above, shows th at 50 respondents that give feedback through questionnaire, there are 35 were female and the remaining 14 were male. From the frequency analysis result, the majority of respondent who dealing with KFC KB Mall were female rather than male. 4. 1. 2Frequency Analysis by Age Responds to Age| | Frequency| Percent| Valid Percent| Cumulative Percent| Valid| 18-24 years| 22| 44. 0| 44. 0| 44. 0| | 25-29 years| 5| 10. 0| 10. 0| 54. 0| | 30-35 years| 8| 16. 0| 16. 0| 70. 0| | 36-41 years| 4| 8. 0| 8. 0| 78. 0| | 42 years and above| 11| 22. 0| 22. 0| 100. 0| | Total| 50| 100. 0| 100. 0| | Table 4. 2: Frequency analysis by age Figure 4. 2: Bar chart of frequency analysis by age Meanwhile, the result of the frequency analysis of 18 – 24 years is 44. 0% or 22 respondents. Furthermore, about 5 respondents are 25 – 25 years and the percentage of it is 10. 0%. For 30 – 35 years old respondents are about 8 respondents which are about 16. % And for 36 – 41 years old, by whi ch the lowest frequency analysis of age used KFC services at KB Mall, about 4 respondents of it is 8%. The second higher percentage followed by respondent’s age 42 years and above or about 11 respondents which are about 22%. 4. 1. 3Frequency Analysis by Race Responds to Race| | | Frequency| Percent| Valid Percent| Cumulative Percent| Valid| Malay| 40| 80. 0| 80. 0| 80. 0| | Chinese| 9| 18. 0| 18. 0| 98. 0| | Indian| 1| 2. 0| 2. 0| 100. 0| | Total| 50| 100. 0| 100. 0| | Table 4. 3: Frequency analysis by race Figure 4. 3 : Pie chart of frequency analysis by raceThe result from Figure 4. 3 shows the customers of KFC KB Mall is multiple races, which the rrespondents were Malay, Chinese, Indian and others. Malay’s respondents are the biggest percentage among the others which take 40 respondents or 80. 0%. Therefore, most of KFC KB Mall customer is Malay meanwhile Chinese respondent is the highest, which takes 10 of respondents or 20. 0%. Indian show the respondent is only 1 respondent or 2. 0% that used KFC KB Mall. 4. 1. 4Frequency Analysis by Marital Status Responds to Status| | | Frequency| Percent| Valid Percent| Cumulative Percent| Valid| Single| 27| 54. 0| 54. | 54. 0| | Married| 23| 46. 0| 46. 0| 100. 0| | Total| 50| 100. 0| 100. 0| | Table 4. 4 : Frequency analysis by marital status Figure 4. 4 : Pie chart of frequency analysis by marital status Table 4. 4 shows frequency analysis of marital status for 50 respondents. From 50 respondents, there are 27 of respondents or 54. 0% were single and about 23 of respondents or 46. 0% are married. Therefore, the researcher concluded that the customer of KFC KB Mall is single person because have higher percentage in the frequency distribution analysis. 4. 1. 5Frequency analysis by Education Level Responds to Education| | Frequency| Percent| Valid Percent| Cumulative Percent| Valid| SPM/SPV/MCE| 5| 10. 0| 10. 0| 10. 0| | Diploma/STP/STPM/HSE| 4| 8. 0| 8. 0| 18. 0| | Bachelor Degree| 37| 74. 0| 74. 0| 92. 0| | Master Degree and above| 4| 8. 0| 8. 0| 100. 0| | Total| 50| 100. 0| 100. 0| | Table 4. 5 : Frequency analysis by education level Figure 4. 5 : Pie chart of frequency analysis by education level Table 4. 5 indicates that most of customer is at Bachelor Degree of education, which’s covered 37 respondents or 74. 0% of respondents. It is followed by customer from SPM/SPVM/MCE level with 5 respondents or 10. 0% respondents.On the other hand, there are about 4 respondents or 8. 0% respondents who are having the qualification of from Diploma/STP/STPM/HSE and 4 other respondents from Master Degree and above Responds to Income| | | Frequency| Percent| Valid Percent| Cumulative Percent| Valid| Below RM1,000| 17| 34. 0| 34. 0| 34. 0| | RM 1,000 – RM 1,499| 6| 12. 0| 12. 0| 46. 0| | RM 1,500 – RM 1,999| 5| 10. 0| 10. 0| 56. 0| | RM 2,000 – RM 2,499| 1| 2. 0| 2. 0| 58. 0| | RM 2,500 – RM 2,999| 4| 8. 0| 8. 0| 66. 0| | RM 3,000 and above| 17| 34. 0| 34. 0| 100. 0| | Total| 50| 100. 0| 100. 0| | Table 4. 6 : Frequency analysis by income levelFigure 4. 6 : Bar chart of frequency analysis by income level Table 4. 6 indicates that 34% of the respondents have the personal income ranging below RM1,000. While, the next 34% of respondents have an income from RM3,000 and above. There are 12% of respondents have income ranging from RM1,000 to RM1,499, 10% of respondents have income from RM1,500 to RM1,999, 8% respondents from RM2,500 to RM2,999 and the last is 2% of the respondents’ income level is RM2,000 to RM2,499. 4. 1. 7Frequency Analysis by Occupation Responds to Occupation| | | Frequency| Percent| Valid Percent| Cumulative Percent| Valid| Government| 22| 44. | 44. 0| 44. 0| | Private| 3| 6. 0| 6. 0| 50. 0| | Business| 2| 4. 0| 4. 0| 54. 0| | Retired| 1| 2. 0| 2. 0| 56. 0| | Housewives| 1| 2. 0| 2. 0| 58. 0| | Student| 21| 42. 0| 42. 0| 100. 0| | Total| 50| 100. 0| 100. 0| | Table 4. 7 : Frequency analysis by occupation Figure 4. 7: Pie chart of frequency analysis by occupation Table 4. 7 indicates that most of respondents are working at a government sector with 44% or 22 respondents. It is follow by respondents who are students with 42% or 21 respondents. And for private sector, it contribute respondents at 6% or 3 respondents, follow by 4% from business.Lastly is follow by retired and housewives which are each of them with 2% each. 4. 1. 8Frequency Analysis by frequency goes to KFC KB Mall per month Responds to Frequency| | | Frequency| Percent| Valid Percent| Cumulative Percent| Valid| Once per month| 26| 52. 0| 52. 0| 52. 0| | Two times per month| 8| 16. 0| 16. 0| 68. 0| | Three times per month| 10| 20. 0| 20. 0| 88. 0| | Four times per month| 3| 6. 0| 6. 0| 94. 0| | Five times per month| 1| 2. 0| 2. 0| 96. 0| | More than above| 2| 4. 0| 4. 0| 100. 0| | Total| 50| 100. 0| 100. 0| | Table 4. 8 : Frequency Analysis by frequency goes to KFC KBMall per month Figure 4. : Pie chart of Frequency Analysis by fre quency goes to KFC KBMall per month Table 4. 8 shows that respondents who goes once per month to KFC KB Mall is the highest contribution to respondents which covered 52% or 26 of respondents. It is followed by three times per month which covered 20% or 10 of respondents. In the other hand, there are about 16% or 8 of respondents who goes to KFC KB Mall two times per month. Next is followed with more than above which 4% or 2 of respondents and the last is five timer per month which is 2% or 1 of respondents. 4. 1. 9Frequency Analysis by spending at KFC KB Mall Responds to Spent| | Frequency| Percent| Valid Percent| Cumulative Percent| Valid| Below RM15| 11| 22. 0| 22. 0| 22. 0| | RM16 – RM30| 14| 28. 0| 28. 0| 50. 0| | RM31 and above| 25| 50. 0| 50. 0| 100. 0| | Total| 50| 100. 0| 100. 0| | Table 4. 9 : Frequency Analysis by spending at KFC KBMall Figure 4. 9 : Bar chart of Frequency Analysis by spending at KFC KB Mall Table 4. 9 indicate that the highest spending by responden ts are RM31 and above which 50% or 25 of respondents. The second is from RM16 to RM30 which 28% or 14 of the respondents and lastly is the lowest, spending below RM15 which is 22% or 11 of the respondents. . 1. 10Frequency Analysis by Types of Products at KFC KB Mall Responds to Products| | | Frequency| Percent| Valid Percent| Cumulative Percent| Valid| Kids meal| 4| 8. 0| 8. 0| 8. 0| | Family meal| 15| 30. 0| 30. 0| 38. 0| | Individual meal| 19| 38. 0| 38. 0| 76. 0| | Burger| 7| 14. 0| 14. 0| 90. 0| | Snacks and desserts| 5| 10. 0| 10. 0| 100. 0| | Total| 50| 100. 0| 100. 0| | Table 4. 10 : Frequency Analysis by Types of Products at KFC KBMall Figure 4. 10 : Pie chart of Frequency Analysis by Types of Products at KFC KB Mall Table 5. indicates that most of respondents are enjoy to choose individual meals where 19 respondents which are 38% of respondents. It was follow by family meals of 15 respondents where 30% of respondents. Meanwhile, the result for snack and dessert are 5 respo ndents where 10%. Furthermore about 7 respondents or 14% would buy burger. And lastly is follow by kids’ meal with 4 respondents or 8% respondents. 4. 2RELIABILITY ANALYSIS Reliability analysis is a measure of the internal consistency of a set of scale items. The more reliable a set of scale items, the more confidence score the researcher obtained.According the Rules of Thumb about Cronbach’s Alpha Coefficient Size, there is value between 0 until 1. The closer result to 1, the more reliable the scale of variable. When the result is below than 0. 5, the reliability is not effective. Alpha Coefficient Range| Strength of Association| ; . 6| Poor| .6 to ; . 7| Moderate| .7 ; . 8| Good| .8 to ; . 9| Very Good| .9| Excellent| Table 4. 11 Rules of Thumb about Cronbach’s Alpha Coefficient Size Based on Hair et al (2003), the reliability test can be interpreted according to the strength using Rules of Thumb. 4. 2. 1Reliability Analysis for Customer Loyalty Reliability St atistics|Cronbach's Alpha| N of Items| .774| 5| Table 4. 12 Reliability analysis for customer loyalty This is the reliability test for customer loyalty, which the Cronbach’s Alpha value is 0. 774. It means that the questions are good to be asked to the respondents. 4. 2. 2Reliability Analysis for Price Reliability Statistics| Cronbach's Alpha| N of Items| .796| 5| Table 4. 13 Reliability analysis for price This is the reliability test for price, which the Cronbach’s Alpha value is 0. 796. It means that the questions are good and reliable to be asked to the respondents. 4. 2. 3Reliability Analysis for Service Reliability Statistics|Cronbach's Alpha| N of Items| .990| 4| Table 4. 14 Reliability analysis for service This is the reliability test for service, which the Cronbach’s Alpha value is 0. 990. It means that the questions are excellent and reliable to be asked to the respondents 4. 2. 4Reliability Analysis for Brand Image Reliability Statistics| Cronbach's Al pha| N of Items| .685| 3| Table 4. 15 Reliability analysis for brand image This is the reliability test for brand image, which the Cronbach’s Alpha value is 0. 685. It is means that the questions are moderate and reliable to be asked to the respondents. 4. 2. 5Reliability Analysis for ProductReliability Statistics| Cronbach's Alpha| N of Items| .721| 5| Table 4. 16 Reliability analysis for product This is the reliability test for product, which the Cronbach’s alpha value is 0. 892. It is means that the questions are very good and reliable to be asked to the respondents. The finding result for reliability analysis Variable| Cronbach’s Alpha| Strength of Association| Customer Loyalty| 0. 856| Very good| Price| 0. 916| Excellent| Service| 0. 720| Good| Brand Image| 0. 930| Excellent| Product| 0. 892| Very good| Table 4. 17 The finding result for reliability analysis 4. 3PEARSON’S CORRELATION OF COEFFICIENTThe researcher used this method to analyze if there i s a measure relationship between two variables. The researcher used Pearson Correlation Matrix to test hypothesis because the questionnaire is an interval measurement of scale. Correlations| | | Price| Service| Image| Product| Response of customer| Price| Pearson Correlation| 1| . 938**| . 972**| . 986**| . 969**| | Sig. (2-tailed)| | . 000| . 000| . 000| . 000| | N| 50| 50| 50| 50| 50| Service| Pearson Correlation| . 938**| 1| . 949**| . 951**| . 926**| | Sig. (2-tailed)| . 000| | . 000| . 000| . 000| | N| 50| 50| 50| 50| 50| Image| Pearson Correlation| . 972**| . 49**| 1| . 984**| . 967**| | Sig. (2-tailed)| . 000| . 000| | . 000| . 000| | N| 50| 50| 50| 50| 50| Product| Pearson Correlation| . 986**| . 951**| . 984**| 1| . 979**| | Sig. (2-tailed)| . 000| . 000| . 000| | . 000| | N| 50| 50| 50| 50| 50| Response of customer| Pearson Correlation| . 969**| . 926**| . 967**| . 979**| 1| | Sig. (2-tailed)| . 000| . 000| . 000| . 000| | | N| 50| 50| 50| 50| 50| **. Correlation is signif icant at the 0. 01 level (2-tailed). | Table 4. 18 Summary of correlation data Correlations| | | Price| Response of customer| Price| Pearson Correlation| 1| . 969**| | Sig. (2-tailed)| | . 000| | N| 50| 50|Response of customer| Pearson Correlation| . 969**| 1| | Sig. (2-tailed)| . 000| | | N| 50| 50| **. Correlation is significant at the 0. 01 level (2-tailed). | Table 4. 19 Correlation between price and customer loyalty Hypothesis 1 Ho: Price does not contribute to the customer loyalty H1: Price does give high contribute to customer loyalty The finding from the data released that customer loyalty and price value is 0. Even the result shows that the value is significant and high relationship between two variables. Correlations| | | Response of customer| Service| Response of customer| Pearson Correlation| 1| . 926**| | Sig. (2-tailed)| | . 00| | N| 50| 50| Service| Pearson Correlation| . 926**| 1| | Sig. (2-tailed)| . 000| | | N| 50| 50| **. Correlation is significant at the 0. 01 le vel (2-tailed). | Table 4. 20 Correlation between service and customer loyalty Hypothesis 2 Ho: Service not gives impact to customer loyalty H1: Service gives impact to customer loyalty The finding from the data released that customer loyalty and service value is 0. Even the result shows that the value is significant and high relationship between two variables. Therefore the H1 will be accepted and H0 will be rejected. Correlations| | | Service| Image| Service| Pearson Correlation| 1| . 49**| | Sig. (2-tailed)| | . 000| | N| 50| 50| Image| Pearson Correlation| . 949**| 1| | Sig. (2-tailed)| . 000| | | N| 50| 50| **. Correlation is significant at the 0. 01 level (2-tailed). | Table 4. 21 Correlation between Brand image and customer loyalty Hypothesis 3 Ho: Brand image does not influencing the customer loyalty H1: Brand image is a big influencer the customer loyalty The finding from the data released that customer loyalty and brand image value is 0. Even the result shows that the valu e is significant and high relationship between two variables. Therefore the H1 will be accepted and H0 will be rejected. Correlations| | Product| Response of customer| Product| Pearson Correlation| 1| . 979**| | Sig. (2-tailed)| | . 000| | N| 50| 50| Response of customer| Pearson Correlation| . 979**| 1| | Sig. (2-tailed)| . 000| | | N| 50| 50| **. Correlation is significant at the 0. 01 level (2-tailed). | Table 4. 22 Correlation between product and customer loyalty Hypothesis 4 Ho: Product does not affecting customer loyalty H1: Product gives effect to the customer loyalty The finding from the data released that customer loyalty and product value is 0. Even the result shows that the value is significant and high relationship between two variables.Therefore the H1 will be accepted and H0 will be rejected. 4. 3REGRESSION ANALYSIS Model Summary| Model| R| R Square| Adjusted R Square| Std. Error of the Estimate| 1| . 980a| . 960| . 956| . 459| a. Predictors: (Constant), Product, Servi ce, Image, Price| Table 4. 18 Model Summary From the table of model summary above, the value of r square 0. 980. This means that 0. 980 of dependent variable are explain by independent variable that has been use in the research. This indicates the high percentage which means that almost all of the independent variables can be used in this research. ANOVAb| Model| Sum of Squares| df| Mean Square| F| Sig. | | Regression| 225. 636| 4| 56. 409| 267. 647| . 000a| | Residual| 9. 484| 45| . 211| | | | Total| 235. 120| 49| | | | a. Predictors: (Constant), Product, Service, Image, Price| b. Dependent Variable: Response of customer| Table 4. 18 ANOVA Regarding to the above table, the F-test is significant which is P value 0. 00 < 0. 05. It means that all the variables validated and accepted since the p-value less than 0. 05. Therefore the model is significant to other words at least one of independent variable is significant to predict the dependent variable. Coefficientsa| Model| Unstandardi zed Coefficients| Standardized Coefficients| t| Sig. | B| Std. Error| Beta| | | 1| (Constant)| . 015| . 266| | . 057| . 955| | Price| . 104| . 180| . 105| . 580| . 565| | Service| -. 057| . 080| -. 072| -. 718| . 476| | Image| . 146| . 159| . 158| . 917| . 364| | Product| . 727| . 225| . 788| 3. 232| . 002| a. Dependent Variable: Response of customer| Table 4. 19 Standard Coefficients The t-test shows the significant result for the dependent variable which is 0. 047 < 0. 05. Besides that, for the other variable which are corporate reputation and service quality where p value is < 0. 05 and it means there is significant relationship. CHAPTER 5: CONCLUSION AND RECOMMENDATIONS 5. INTRODUCTION For this chapter, the researchers will concludes all the information that had been mention from chapter one until chapter four. The researchers also included the suggestion and recommendation for KFC at KB Mall based on the finding in chapter four for future research in order to help other researc hers make improvement and thus provide useful information. 5. 1 CONCLUSION This research had been conduct to identify customer loyalty at KFC KB Mall. Customer is the most important asset for every business in the world. All the companies do not want to lose their own customer especially if customers turn away to the competitors.The researchers had found that the factors of customer loyalty based on price, service, brand image and product. Besides that, there have four hypotheses for this study, which can be prove. The result for hypotheses shows that all the independent variables that are price, service, brand image and product have significant relationship with customer loyalty but the most significant variable is product. In terms of the independent variables, the researchers found that product plays important factor that affecting to the customer loyalty because it has strong correlation which is, 0. 79. 5. 2 RECOMMENDATION Nowadays, there are many fast food restaurant have been built in Malaysia. So existence of the new fast food restaurants such as RasaMas, Chicken Rice Shop, and McDonald exist and they are really make good competition among them. Therefore, to reduce customer loyalty, it is important to KFC to be maintained as a number one in the fast food industry. Thus, through this study researchers willing to make some suggestions for KFC KB Mall and hope it can help in the future. 5. 2. 1 Training the StaffStaff at KFC KB Mall is very important to create long term relationship because they are person who meet customers and treats the order from customers. Therefore, KFC at KB Mall branch’s staff should be giving training maybe twice a year on how to overcome and how to communicate with the customers. Although it takes high cost for the company, KFC need to scarify to create high customer satisfaction. Through training, KFC’s staff can control their emotion when faces different customers who are uncontrollable and have different charac teristics.Furthermore, the staff also should have basic knowledge that can help customers to solved problems. 5. 2. 2 Faster counter services Counter service is important to increase customer loyalty. This is because customer always rushes for their time. Therefore, KFC KB Malls’ staffs need to limit time serving one customer. It can be done if KFC KB Malls’ staff can serve the customers’ immediately and not waste time. Besides that, KFC also need to improve in term of time taken order for one customer. This is because from the researcher observation, customer always complaint that they need to wait until 6 until 10 minutes for taken an order.Sometimes, customers urgently want to order the menu. So, KFC need to improve their process and use another way when make the serving menu. 5. 2. 3 Change the location Location also plays the important factors in giving the best service to the customer. Basically location at KB Mall is crowded because in front of KFC is Mc Donald, RasaMas, Chicken Rice Shop. So, there are many competitors there and customers hard to make choice to go to the fast food restaurant. KFC should find the places that surrounding the building do not have too many competitors that will affected their business.REFERENCES Kotler, P. , & Armstrong, G. (2012). Principles of Marketing. (14th ed. ). England: Pearson Education Limited. (n. d. ). Retrieved from http://www. kfc. com. my/about-kfc-malaysia. php (n. d. ). Retrieved from http://www. fastfoodmarketing. org/fast_food_facts_in_brief. aspx freedownload. is. (2011). Retrieved from http://freedownload. is/pdf/consumers-preference-and-consumption-13515192. html Jeffrey A. Krug. (2001). KFC and Global Fast Food Industry. Retrieved from http://www. oppapers. com/essays/Kfc-Global-Fast-Food-Industry/168890

Monday, September 16, 2019

Compare the Evidence of a Nordic Presence in the Americas

Compare the evidence of a Nordic presence in the Americas before the arrival of Columbus with the evidence of a West African presence during that period. It has been said by historians that the Nordics and the West Africans were in the Americas before Columbus arrived in 1492. Though evidence, such as oral sagas, tracing routes which it was said they took, artifacts, skeletal remains, among others, have been found to prove that they could have been present; there are still debates as to whether or not they actually came to the Americas before Columbus.Some believe that the evidence of the presence of the Nordics is more admissible than that of the West Africans. The Norse (also known as the Vikings) got their name from the language they spoke, ‘Old Norse’. They were originally from Scandinavian countries. It believed that they came to the new world for several reasons such as; the fact that it had a rich supply of salt to preserve their goods, they were explorers, the co untry they lived in, Greenland, soon became over populated and they experienced a great famine in 975. It is also believed that there was a political unrest between the cans in Northern Europe.There has been many pieces of evidence to support the theory that the Vikings were, in fact, present in the new world during the pre-columbian era. Some of the settements of the Vikings were found, still standing, such as ‘York’ and ‘Dublin’. There was not much written records on the Viking so most of their history was passed down orally through sagas, through which we first heard of their exploration into Europe and the Americas, there were two sagas which survived; these are the Greenlander’s Saga and The Saga of Erik the Red. The sagas claim that the Vikings interacted and traded with the native people that they found in the Americas.The sagas led to the finding of some substantial evidence such as the archaeological remains found in ‘Newfoundland†™ and there it was discovered that there was a Viking settlement in the town called ‘L’Anse aux Meadows’, in this town historians discovered that the Vikings did travel further south into the Americas and explored the land they spoke of in their sagas, Vinland. When they ventured further down into Vinland historians discovered butternut wood and butternuts, which were not native to the area so it is believed that the Vikings brought it there from further south (lands surrounding the Gulf of St.Lawrence). Other artifacts such as architectural structures, woodworking items, boat rivets and personal items were found in the region, which historians dated back to about AD 1000 with the use of scientific method. Another hard piece of evidence found in ‘Vinland’ was a Norse coin which was found off the coast of Maine and was dated back to between AD1065-1080 which suggests that there was interaction of these people and the indigenous peoples. This gave hi storians physical evidence that coincided with the oral sagas. All this evidence pre-dates European arrival by as early as 500 years.It is also believed that the West Africans came to the New World centuries before the arrival of Columbus. Ivan Van Sertima is one of many who argue that West Africans made contact with the new World before Columbus. According to Sertima the Africans travelled from the African coast from the north to the west and crossed the Atlantic. According to the famous Egyptian Scholar, Ibn Fadi Al-Umari, in 1342, there were two large voyages across the Atlantic Ocean, before Columbus’ voyage, both of these voyages were pioneered by one man, Mansa (king) Abubakari II. In the year 1311, Abubakari abdicated his thrown to Mansa Musa.Not a son of his son but in fact his brother. He (Abubakari) equipped 1000 of his ships with the finest men, sorcerers, physicians, sailors and navigators. Every ship had supply ship attached to it. The number of ships totalled 20 00. The other 1000 ships were loaded with foodstuffs, drugs, fruits and drinks to last his team for 2yrs. It was believed that Abubakari arrived on the other end of the Atlantic in the year 1312. Proof of the Malian expedition can be noted in the names given to places in Haiti as the Malians renamed places after themselves. Examples of such are Mandinga Port, Mandinga Bay and Sierre de Mali.It is said that the African mariners that came to the western hemisphere were looking for trade and knowledge of what lied beyond their coasts. They brought with them flora and fauna, cloth, their scientific knowledge, technology and the arts. Modern experiments have shown that the ancient African boats could have made the journey across the seas to the new world as they were strong enough. Boat builders in Central Africa’s Lake chad made a papyrus craft that was sailed from North Africa to Barbados in eastern Caribbean in 1969, there were similar journeys that showed that even the small b oats could with have survived these crossings.Some of the evidence that the West African’s were in fact present in the region before Columbus’ arrival are; the linguistic continuities in the region, an example of this is when it was recorded that the indigenous peoples referred to the Africans as ‘guanine’ which was the first piece of evidence that west Africans were in the region, it, however, was not seen as strong enough by many historians to hold up such a theory. There were no written evidence that they were there, it could be assumed that they could have been lost, or destroyed as it was seen that the Europeans were not always tolerant of these other cultures in their explorations.History has recorded some incidents where the writings of natives and precious metals and gems were destroyed (in the case of the precious metals and gems, they were used or melted down) by the Europeans when they came to the land of the natives, as they saw some of these a s pagan items. Another piece of evidence found by historians were the archaeological remains that were found, the age of these remains were dated back according to how deep the archaeologist had to dip for it.The successive layers of dirt only built up over time, so the archaeologists knew the date of the dirt layer then the date of the artifacts to the layer which was found. Additional evidence that supported the thesis that both these cultures came in contact came from clear evidence of the facial features of the images and figures, which were done using various materials such as clay, gold and copper that were found in the relics which were dug up.The images and figures found in the relics were unmistakably inspired by an African as the phenotypical and cultural characteristics were clearly of an African origin, this could be told by â€Å"†¦their colouration, the fullness of lip, prognathism, scarification, tattoo markings, beards, kinky hair, generously fleshed noses, and even in some instances, identifiable coiffures, head kerchiefs, helmets, compound earrings†¦Ã¢â‚¬  (Sertima 1976). † Also, there were huge head sculptures which were discovered in the Central and South America that also had African features.Skeletal remains which belonged is believed to have belonged to Africans were found. Further evidence is seen in the religious rituals of the people in Mexico, as their gods and ceremonies are closely modelled to those of the African society. Also, the use of shells as currency rather than just symbolic items and also the botanical continuities such as the presence of species of African origin, for example; banana, jack bean, yam and others. Other evidence which came directly from the natives themselves when they explained to the Europeans that they â€Å"received an alloy called guanine’ from the Africans†, the alloy which they spoke of consisted of a mix of precious metals. It was also noted that some of the artifacts of the natives which Columbus collected, such as the cloths used by the natives closely matched the weave, colouration and style of cloths used by African communities in Guinea. An explorer, Balboa, also recorded that he came across scattered groups of people who looked very much like Africans in regions that he had ‘discovered’.This shows that the Europeans themselves came across Africans in the region. There is also the scientific evidence (oceanography) which points to the fact that the Africans were very capable of getting to the new world before Columbus, The Atlantic World’s coastline was linked to the African coastline by the ocean currents which moved between the two areas, which meant that the Africans who were seen in the Americas would not have had any problems using these ways to make their way to the new world.In both cases, as relating the presence of the Nordics and the west Africans in the western hemisphere before Columbus, the main problem is t he fact that there are not much written accounts by the people themselves, and so it is easy to call the evidence inadmissible as in the world today facts are based on what is written in the books.There is, however, more admissible evidence for the Nordics as it relates to how they got the western hemisphere as there route can be traced easily, though it is said that the Africans got to the western hemisphere using Pacific current known as the Kouro-Siwo and the Equatorial currents of the Atlantic Ocean. In both case, settlements were uncovered, and evidence of things they left behind such as flora and fauna, personal items among other things.It can be said that though there was not much written accounts of their presence, there is sufficient evidence that they had, indeed, been present in the Americas in the pre-columbian era.BIBLIOGRAPHY Africaspeaks. com Bornblackmag. org Campbell, John and Heather Cateau. History for the Caribbean in the Atlantic World. Ghanaweb. com Shepherd, V erene Liberties Lost. Cambridge University Press, United Kingdom, Worker. org