Comparative Analysis of Extracellular Polysaccharide Production by Dairy Milk Derived Lactic Acid Bacteria Grown on De Man, Rogosa, And Sharpe Medium

The diverse microbial flora found in dairy cow milk contributes to beneficial effects to human health. A group of microorganisms known as Lactic Acid Bacteria (LAB) are most commonly found and used in fermented dairy products. These bacterial strains embrace the idea of good nutrition by assisting with health maintenance, aiding in the prevention, control and treatment of many diseases. Heteropolysaccharides (HePS) produced by LAB plays an important role in the rheology, texture, body, and “mouthfeel” of fermented milk. HePS such as D-galactose, D-glucose, and L-rhamnose were tested under various conditions for comparative analysis of polysaccharide production efficiency. LAB strains were identified through biochemical tests such as gram stain, catalase, and motility tests. Even further, these strains were cultured in different temperature, pH, and incubation time. (add results).

Introduction

This M.S. thesis will have an emphasis on lactic acid bacteria and their ability to produce extracellular polysaccharides under various conditions. The objectives addressed include 1) Determine LAB strains found in commercially sold dairy milk 2) Identify factors capable of impacting polysaccharide secretion. Addressing these focus points will allow further studies on these strains of bacteria capable of promoting human wellness.

1.1 Milk microbiome

Milk itself is known to contain several types of bacteria with one commonly being lactic acid bacteria (LAB). These group of bacteria are characterized as being Gram- positive, non-sporulating, anaerobic or facultative aerobic cocci or rod-shaped microorganisms. They produce lactic acid as one of the main fermentation products of the metabolism of carbohydrates. In addition to LAB, many other microorganisms are present in milk as it provides high nutrient content such as proteins, fats, carbohydrates, vitamins, minerals, and essential amino acids (10). This provides an ideal environment for the growth of many microbes. It is generally accepted that LAB is the dominant population in milk including Lactococcus, Lactobacillus, Leuconostoc, Streptococcus, and Enterococcus LAB genera (10).

Strains of non-LAB genera are also present in dairy milk including various yeasts and molds. In some cases, milk may be contaminated with microbial pathogens leading to severe illness. One prime example are bacterial strains, known as psychrotrophs, that are capable of surviving in cold storage consisting of Pseudomas and Acinetobacter spp (10). These types of bacteria can proliferate during refrigeration and produce extracellular proteins, such as lipases and proteases, negatively impacting the quality of milk resulting in spoilage (10). Another common example is Helicobacter pylori. These strains of bacteria can be found in raw sheep’s milk or in other contaminated milk products. They are responsible for cancers of the digestive tract known as gastric cancer. These microaerophilic spiral-shaped microbes deploy several mechanisms in surviving the stomach’s acidic environment including enabling their flagella to colonize human gastrointestinal tract, hydrolyzing urea and releasing ammonia with a urease enzyme to neutralize gastric acid, and adhering the gastric epithelium through receptor-mediated adhesion (20).

Several processing techniques such as thermization, Low Temperature Long Time (LTLT) pasteurization, High Temperature Short Time (HTST) pasteurization, sterilization, ultra-high temperature treatment, ultraviolet treatment, microwave treatment, membrane processing and microfiltration are used to treat raw milk for safe human consumption (13).

In contrast, dairy milk microorganisms can provide beneficial contributions to human health aiding in digestion or by reducing allergies (10). They are often defined as probiotics due to their assistance in health maintenance through treatment of diseases. For example, studies have shown that dietary supplementation of probiotic Lactobacillus reuteri to both aged humans and mice have shown to assist in younger appearance compared to their untreated counterparts (17). In addition, consumption of L. reuteri have shown to accelerate healing of skin wounds by up-regulating pituitary neuropeptide hormone oxytocin (17). Moreover, bacteria such as Propionibacterium freudenreichii derived from complex dairy products were shown to induce apoptosis among human colon cancer cell lines. While co-cultured with these cancer cells, P. freudenreichii secretes active compounds to trigger intrinsic mitochondrial apoptotic pathway in the human colorectal cancer cells (18). The release of these anti-carcinogenic metabolites were identified to be short chain fatty acids (SCFAs) and other unknown compounds (18). These studies have led to further investigations on probiotics and their ability to cease cancer development. Milk from cows, sheep, goats and humans all are source of microorganism that play a number of roles in the health and food industry.

1.2 Lactic acid bacteria

As mentioned, LAB is the predominate population in dairy milk. They can be naturally present in milk, cheese, meat, beverages, vegetables and could be isolated from soil, lakes, intestinal tract of animals and humans (6). In the food industry, LAB is highly utilized as a major application in food fermentation. They are grouped as Homofermenters or Heterofermenters in which the Homofermenters produce lactic acid as their main product of fermentation of glucose and Heterofermenters produce lactic acid, carbon dioxide, acetic acid, and ethanol from the fermentation of glucose (6). Hence, these group of bacteria are recognized for their fermentative ability to enhance food safety and supplying health benefits. These microorganisms through metabolic activities, including lipolysis and proteolysis, can produce organoleptic properties of products such as aroma and flavor compounds contributing to overall texture of fermented food (14).

The probiotic properties of LAB play an important role in maintaining undesirable pathogens and harmful bacteria. They have antibacterial aptness against Gram-negative and positive bacteria such as Esherichia coli, Pseudomas aeruginosa, and Staphlococcus aureus (12). In addition, LAB is resistant to lysozyme, gastric acid, gastrointestinal juice, and bile salts (12). Today, these bacteria are gaining attention medically and environmentally as potential tools for pathogenic treatment. LAB also stimulate a wide range of activities of the immune system of the host including the prevention of diarrhea caused by antibiotic treatment or viral infections, vitamin production, and reduction of cholesterol levels in the blood (14).

Recent observations of metagenomic data supported that LAB are a part of the microbiomes of humans and other animals. LAB are classified as gram-positive, non-spore forming bacteria that are microaerophilic or anaerobic. They generally have a low GC content (

Comparative Analysis of Substitutive 3D Models Fragile Watermarking Techniques

Abstract—

Due to the importance of multimedia data and the urgent need to use it in many fields such as industrial, medical and entertainment, protecting them becomes an important issue. Digital watermarking is considered as an efficient solution for multimedia security as it preserves the original media content’s as it is. 3D Fragile watermarking aims to detect any attacks to 3D graphical models to protect the copyright and the ownership of the models. In this paper, we present a comparative analysis between two substitutive 3D fragile watermarking algorithms. The first based on adaptive watermark generation technique using the Hamming code, while the other uses Chaos sequence for 3D models fragile watermarking in the spatial domain. The study uses different assessment measures to show the points of strength and weaknesses of both methods.

Keywords—Adaptive watermarking, hamming code, Chaos sequence, tampering detection, authentication

Introduction

Information security refers to the protection of information from unauthorized access, use, modification, or destruction to achieve confidentiality, integrity, and availability of information. There are two types of information security; information hiding (Steganography) or information encryption (Cryptography). Encryption is the science of protecting information from unauthorized people by converting it into a form that is non-recognizable by its attackers. Information hiding embeds a message (watermark) over a cover signal such that its presence cannot be detected during transmission. There are two categories of information hiding: steganography and watermarking. The main goal of steganography is to protect the message itself and hide as much data as possible in the cover signal, while the goal of the watermarking is to protect the cover signal by hiding data (watermark) in it.

Watermarking may be used for a wide range of applications, such as Copyright protection and content authentication. There are three types of watermarking according to the goal to be achieved; robust watermarking, fragile watermarking and semi-fragile watermarking. The aim of the robust watermark is to protect the ownership of the digital media and keep the embedded watermark detectable after being attacked. On the other hand, the fragile watermark aims to be sensitive to any attack on the model and locate the changed regions and possibly predict how the model was before modification. Therefore, fragile watermarking is used for content authentication and verification. The semi-fragile watermark combines both the advantages of the robust watermark and the fragile watermark so that it is more robust than fragile watermark and less sensitive to classical user modifications that aims to discriminate between malicious and no malicious attack.

After the great interests and works for multimedia contents watermarking like in image, audio, video and text and with the growth of 3D graphical models generation, and the spread of using it in data representations of other applications like fuel or water transferring pip models, 3D cartoon models etc, recently, researchers have a great interest in watermarking of 3D models.

In this paper, we presented a comparative analysis of two adaptive fragile watermarking techniques [1, 2] and clarify their advantages and weakness area. The paper is organized as follows, section 2 previews the fragile watermarking from the state of the art. Section 3 briefly explains the methods used in this study. Section 4 shows the experimental result with empirical analysis. Finally, conclusions are provided in Section 5.

Related work

Watermark embedding strategies primarily are divided into two classes; additive and substitutive. In the case of additive strategy, a watermark is considered as a random noise pattern which is added to the mesh surface as in [3-6]. But in the case of substitutive, the watermark is embedded in the numerical values of the mesh elements by a selective bit substitution as in [1,2,7,8,9]. Based on this embedding style, the watermark may be embedded in different embedding primitives as follows:

A. Data file organization.

This category utilizes the redundancy of polygon models to carry information. Ichikawa et al [10] modified the order of the triangles (the order of the triplet of vertices forming a given triangle). They only use the redundancy of description. Wu et al [11] used the mesh partitioning to divide the mesh into patches with a fixed number of vertices. While the geometrical and topological information of each patch, as well as other properties (color, texture, and material), are used to produce the hash value which represents the signature embedded in the model. The goal of Bennour et al [12] was to protect the visual presentations of a 3D object in images or videos after it has been marked. They also proposed an extension of 2D contour watermarking algorithm to a 3D silhouette. Sales et al [13] presented a method based on the protection of the intellectual rights of 3D objects through their 2D projections.

B. Topological data

These algorithms use the topology of the 3D object to embed the watermark which leads to change the triangulation of the mesh. Ohbuchi et al [14] presented two visible algorithms where the local triangulation density is changed to insert a visible watermark depending on the triangle similarity quadruple (TSQ) algorithm. Whereas the second is to embed a blind watermark by topological ordering TVR (Tetrahedral Volume Ratio) method. Mao et al ’method [15] triangulated a part of a triangle mesh to embed the watermark into the new positions of the vertices, this algorithm is considered a reversible as it allows a full extraction of the embedded information and a complete restoration of the cover signal.

C. Geometrical Data

Most of the 3D fragile watermarking algorithms embed the watermark by modifying the geometry of the 3D object either in the spatial domain or in the frequency domain. Yeo and Yeung [16] proposed the first 3D fragile watermarking algorithm where each of the vertex information is modified by slightly perturbing the vertex based on a pre-defined hash function to make all vertices valid for authentication. Lin et al. [4], and Chou et al. [17] solved the causality problem raised in Yeo’s method by setting both hash functions depending only on the coordinates of the current vertex [4] and proposed a multi-function vertex embedding method and an adjusting-vertex method [17]. With considering high-capacity watermarks, Cayre and Macq [18] considered a triangle as a two-state geometrical object and classify the triangle edges based on the traversal into entry edge and exit edge, where the entry edge is modulated using Quantization index modulation (QIM) to embed watermark bits.

To immune similarity transformation attacks, Chou et al [19] embedded watermarks in a subset of the model’s faces so that any changes will ruin the relationship between the mark faces and neighboring vertices. Huang et al. [20] translated the 3D model into the spherical coordinate system, then used the QIM technique to embed the watermark into the r coordinate for authentication and verification. Xu and Cai [21] used the Principal Component Analysis PCA to generate a parameterized spherical coordinates mapping square-matrix to embed a binary image (watermark). Wang et al. [1] used the hamming code to calculate the parity bits that embedded in each vertex coordinate with the LSB substitution to achieve verification during the extraction stage. According to the problem of high collision characteristic of hash function used for generating the watermark from the mesh model Wang et al. [2] employed a chaotic sequence generator to generate the embedded watermark to achieve both the authentication and verification of the model.

Substitutive fragile watermarking techniques

Watermarking techniques can be classified into a different category depending on many attributes. Among the different attributes, watermark techniques can be classified according to watermark generation pattern which relays on the application type, the watermark may be an external information specific to the model – that must be kept secured – or may be an information that is not related to the model. Generally, there are two ways of watermark generation pattern:

  1. Self-embedding: which means the watermark embedded in the cover model is a compressed version (the hash of the cover model or error correction code) of the same model by some embedding strategy.
  2. External embedding: means that the watermark is an external information related or not related to the cover model. This external information could be text data, image data or pseudo-random bit sequence. And it is a need to transform the embedded data to binary bit sequence before embedding.

According to this classification, Wang [1, 2] proposed two fragile watermarking techniques based on substitutive embedding method. Where they used the Least Significant Bit (LSB) substitution embedding method. At first technique [1], an adaptive watermark is generated from each cover model by using the Hamming code technique for 3D objects verification. While the hamming code is used to generate three parity bits from each vertex, they are used for verification during the extraction stage. These three parity check bits P1, P2, and P3 are regarded as the watermark, which embedded in each vertex coordinate by the least significant bit (LSB) substitution. Leading to increasing the data hiding capacity but on the other hand, the embedding distortion to the model is uncontrollable. Authors claimed the method to be immune to the causality, convergence and embedding holes problems.

The second technique [2], proposed a novel Chaos sequence based fragile watermarking scheme for 3D models in the spatial domain. Where the authors used the chaotic sequence generated from the Chen-Lee system, which is considered as the embedded watermark. Then they embedded the watermark in each vertex coordinate according to a random sequence of integers generated by using a secret key K, to achieve both the authentication and verification. Instead of the hash function, the tampering region can be verified and located by the Chaos sequence-based watermark check.

Both techniques are simple to implement and don’t need the original model or the watermark for the 3D models verification and tampering detection localization, as they don’t depend on using the hash function for authentication and verification. Also they achieve high embedding capacity, since they used all the vertices of the model for embedding. For the second technique, from the security point of view, finding the Chaos sequence is a challenge for an attacker. Security was also achieved by using secret keys to embed the watermarks

Experimintal result and desscution

The two techniques of Wang et al [1, 2] are were implemented using a multi-paradigm numerical computing environment and a proprietary programming language developed by MathWorks (MATLAB R2018a).

Assessment Methods:

The main requirements to provide an effective watermark are imperceptibility, robustness against intended or non-intended attacks and capacity. Based on these requirements a series of experiments were conducted to measure the imperceptibility robustness. Table 1 illustrates the assessment measures needed to evaluate watermarking systems [22].

Performance Assessment measures used in mesh watermarking

Assessment Type

Assessment measure

Formula

Imperceptibility measures

Hausdorff

distance (HD)

Modified

Hausdorff distance (MHD)

Root mean

square error (RMSE)

Robustness measures

Correlation coefficient

Where, the RMSE measures the differences between the values predicted by the model or an estimator and the values observed. Lower values of RMSE indicate better fit. When the RMS values are small this indicates insignificant positional changes during the watermark embedding. The Hausdorff distance measures “how similar” two sets are in the metric sense. If two sets are in a small Hausdorff distance, they are supposed to “look” almost the same. The Modified Hausdorff distance computes the forward and reverse distances and outputs the minimum of both. The Correlation Coefficient (CC) measures the degree (strength) of the relationship between two variables. The range of values for the correlation coefficient is -1.0 to 1.0., whereby a correlation of -1.0 indicates a perfectly negative correlation and a correlation of 1.0 indicates a perfectly positive correlation. A value of zero indicates that there is no relationship between the two variables. Generally, the correlation coefficient used to measure the change in the bit values of the original watermark and the extracted watermark, meanly it measures how the watermark robust to the attacks. Since in the fragile watermark, the aim is to be sensitive to any attacks, and to detect any tempering to the model, we measured the CC metric between the original watermark W and the extracted watermark W’, and between the original model M and watermarked model M’.

We have applied the measures on both [1] and [2] techniques using 7 models. In the hamming code-based technique, the author normalized the 3D model into the range 0 to 1, to embed the watermark but they didn’t perform the denormalization after embedding. I our experiment, the algorithm has been used as mentioned in the paper [1] and after performing the denormalization step as well. the results of applying the technique on the models without the denormalization step is presented in Table 2. Table 3 shows the measurement metrics after applying denormalization to the 3D model, which obviously show that the values of the RMS are less than the first values which indicates minimal positional changes during the watermark embedding. Fig.1 shows the model before and after embedding the watermark without denormalization while Fig.2 shows the model before and after embedding the watermark after denormalization. Moreover, Fig.3 and Fig.4 show the difference between the X, Y, and Z values of the vertices of the original and the watermarked model without using normalization and with normalization respectively.

Table 4 shows the measurement metrics of the Chaos sequence based fragile technique [2]. Which illustrates that the imperceptibility measures are less than the previous technique. And this technique doesn’t distort the model after watermark embedding. Fig.5 shows the model before and after watermarking and the difference between the vertices I XYZ coordinate system.

Hamming code based fragile technique mesurments without Denormalization

Model

No. vertices/

faces

Imperceptibility measures

Robustness measure

HD

MHD

RMSE

CC (M,M’)

CC (W,W’)

Cow

2904/ 5804

0.9043

0.4848

0.4965

0.8995

1.0000

Casting

5096/ 10224

1.1005

0.4039

0.4912

0.9008

1.0000

Bunny

1355/ 2641

1.2419

0.6803

0.5303

0.9765

1.0000

Bunny_

bent

1355/ 2641

1.4291

0.6760

0.5450

0.9549

1.0000

hemi_

bumpy

1441/ 2816

1.5671

0.7331

0.5592

0.7941

1.0000

Bunny

34835/ 69666

0.9822

0.5176

0.4866

0.9544

1.0000

hand

36619/ 72958

1.0941

0.4169

0.4811

0.8988

1.0000

Hamming code based fragile technique mesurments – After Denormalization

Model

No. vertices/

faces

Imperceptibility measures

Robustness measure

HD

MHD

RMSE

CC (M,M’)

CC (W,W’)

Cow

2904/

5804

1.5685e-15

5.0240e-16

3.4358e-16

1.0000

-0.0050

Casting

5096/

10224

1.8388e-15

5.3842e-16

3.6531e-16

1.0000

0.0056

Bunny

1355/

2641

1.9375e-15

7.2551e-16

4.7291e-16

1.0000

-0.0253

Bunny_

bent

1355/

2641

2.4139e-15

8.4952e-16

5.5116e-16

1.0000

-0.0057

hemi_

bumpy

1441/

2816

3.1563e-15

9.8454e-16

6.5371e-16

1.0000

0.0048

Bunny

34835/

69666

1.7844e-15

5.2505e-16

3.4298e-16

1.0000

0.0011

hand

36619/

72958

1.8113e-15

5.1365e-16

3.5427e-16

1.0000

0.0117

[image: c1][image: c2]

(a) (b)

(a) Original Caw model, (b) Stego Caw model after implementing Hamming technique without denormalization

[image: c1] [image: c2]

(a) (b)

(a) Original Caw model, (b) Stego Caw model after implementing Hamming technique after denormalization

[image: c3][image: c4][image: c5]

(a) (b) (c)

Change in x,y and z coordinates after applying Hamming code technique [1] without denormalization

[image: c3][image: c4][image: c5]

(a) (b) (c)

Change in x,y and z coordinates after applying Hamming code technique [1] then applying the denormalization

Chaos sequence based fragile technique mesurments

Model

No. vertices/

faces

Imperceptibility measures

Robustness measure

HD

MHD

RMSE

CC (M,M’)

CC (W,W’)

Cow

2904/ 5804

8.9034e-16

2.8523e-16

1.9411e-16

1

1

Casting

5096/ 10224

1.0270e-15

2.7498e-16

1.8997e-16

1

1

Bunny

1355/ 2641

3.9374e-16

1.5555e-15

2.6232e-16

1

1

Bunny_

bent

1355/ 2641

4.0792e-16

1.6542e-15

2.8374e-16

1

1

hemi_

bumpy

1441/ 2816

1.6514e-15

5.3170e-16

3.5182e-16

1

1

Bunny

34835/ 69666

9.0876e-16

2.3628e-16

1.6133e-16

1

1

hand

36619/ 72958

8.7595e-16

2.4214e-16

1.6964e-16

1

1

[image: ][image: ]

(a) (b)

[image: ][image: ][image: ]

(c) (d) (e)

(a) Original Caw model, (b) Stego Caw model after implementing Chaos based technique, (c) , (d) and (e) the change in x,y and z coordinates.

By analyzing these techniques we found that they achieved high embedding capacity as they used all of vertices for embedding that also leads to high distortion. To avoid this distortion, we suggested selecting the best vertices for embedding by using one of computational intelligent CI techniques named neural network.

Conclusion

In this paper, we presented a comparative analysis between two substitutive fragile watermarking algorithms, by clarifying the points of strength and weaknesses. The main requirements to design an effective watermark are imperceptibility, robustness against intended or non-intended attacks and capacity. We have used the RMSE, HD, and MHD to measure the imperceptibility, and the Correlation Coefficient was often used to measure the robustness of the watermark, but we use it to measure the sensitivity of the watermark as shown in the experiment result.

References

  1. J. T. Wang, Y. C. Chang, S. S. Yu and C. Y. Yu, Hamming Code Based Watermarking Scheme for 3D Model Verification. 2014 International Symposium on Computer, Consumer and Control, Taichung, 2014, pp. 1095-1098.
  2. J. T. Wang, W. H. Yang, P. C. Wang and Y. T. Chang, A Novel Chaos Sequence Based 3D Fragile Watermarking Scheme. 2014 International Symposium on Computer, Consumer and Control, Taichung, pp. 745-748. 2014
  3. B. L. Yeo and M. M. Yeung, Watermarking 3D objects for verification. IEEE Computer Graphics and Applications, vol. 19, no. 1, pp. 36-45, Jan.-Feb. 1999.
  4. H. S. Lin, H. M. Liao, Chun-Shien Lu and Ja-Chen Lin, Fragile watermarking for authenticating 3-D polygonal meshes. in IEEE Transactions on Multimedia, vol. 7, no. 6, pp. 997-1006, Dec. 2005.
  5. N. Werghi, N. Medimegh, & S. Gazzah. Data embedding of 3d triangular mesh models using ordered ring facets. In 2013 10th international multi-conference on systems, signals & devices (SSD). IEEE pp. 1–6. 2013.
  6. H. T. Wu, & Y. M. Cheung. A fragile watermarking scheme for 3d meshes. In Proceedings of the 7th workshop on multimedia and security. ACM. pp. 117–124. 2005
  7. W. B. Wang, G. Q. Zheng, J. H. Yong, & H. J. Gu. A numerically stable fragile watermarking scheme for authenticating 3d models. Computer-Aided Design, 40(5), 634–645. 2008.
  8. Y. P. Wang, & S. M. Hu. A new watermarking method for 3d models based on integral invariants. IEEE Transactions on Visualization and Computer Graphics, 15(2), 285–294. 2009.
  9. J. T. Wang, C. M. Fan, C. C. Huang, & C. C. Li. Error detecting code based fragile watermarking scheme for 3D models. In 2014 international symposium on computer, consumer and control (IS3C). IEEE .pp. 1099–1102. 2014.
  10. S. Ichikawa, H. Chiyama, & K. Akabane. Redundancy in 3D Polygon Models and Its Ap-plication to Digital Signature. Journal of WSCG, 10(1), 225–232.2002.
  11. [bookmark: _Hlk532642167]H. T. Wu, and Y. M Cheung. Public authentication of 3d mesh models. 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI’06), Hong Kong, 940-948.2006, December.
  12. J. Bennour, & J. L. Dugelay. Protection of 3D object visual representations. 2006 IEEE International Conference on Multimedia and Expo, Toronto, Ont., 1113-1116.2006, July.
  13. M. M. Sales, P. RondaoAlface, & B. Macq. 3D objects watermarking and tracking of their visual representations. The Third International Conferences on Advances in Multime-dia. 2011.
  14. R. Ohbuchi, H. Masuda, & M. Aono. Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE Journal on selected areas in communi-cations, 16(4), 551-560.1998.
  15. X. Mao, M. Shiba, & A. Imamiya. Watermarking 3D geometric models through triangle subdivision. Security and Watermarking of Multimedia Contents III. 4314, 253-260.2001, August.
  16. B. L.Yeo, & M. M. Yeung. Watermarking 3D objects for verification. IEEE Computer Graphics and Applications, 19(1), 36-45. 1999.
  17. C. M. Chou, & D. C. Tseng.A public fragile watermarking scheme for 3D model authen-tication. Computer-Aided Design, 38(11), 1154-1165.2006.
  18. F. Cayre, & B. Macq. Data hiding on 3-D triangle meshes. IEEE Transactions on signal Processing, 51(4), 939-949.2003.
  19. C. M. Chou, & D.C. Tseng. Affine-transformation-invariant public fragile watermarking for 3D model authentication. IEEE computer graphics and applications, 29(2), 72-79.2009.
  20. C. C. Huang, Y. W. Yang, et al. spherical coordinate based fragile watermarking scheme for 3D models. In International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, Springer, Berlin, Heidelberg. 566-571.2013, June.
  21. T. Xu and Z. Cai. A Novel Semi-fragile Watermarking Algorithm for 3D Mesh Models. 2012 International Conference on Control Engineering and Communication Technology, Liaoning, pp. 782-785. 2012.
  22. S. Borah, & B. Borah. Watermarking Techniques for Three Dimensional (3D) Mesh Authentication in Spatial Domain. 3D Research. 9. 10.1007/s13319-018-0194-7.2018

Comparative Analysis of Web Accessibility Standards and Regulations

Abstract

Today websites play important role in our day to day life. It has made our life very easier and approachable to many operations that were a distant dream in the past. Websites allow user to access information from wide range of sources. These web services are available for all including person with disabilities, older people and people living in remote area. But the people with disabilities have several accessibility barriers to access the internet due to poor and improper designing of web interfaces. Accessibility professional are accessing various Accessibility standard, to implement the Accessibility project as per their need. Specific project require specific standard such as USA has ADA, and uses section 508. Indian government have GIGW for their Government portal. European Union has adopted their own standard. WCAG 2.0 is an internationally accepted standard for web accessibility, developed by Wide Web Consortium (W3C). It is difficult to provide smooth project remediation right from the beginning, when asked for particular Accessibility standard implementation. Each standard has different structure to organise and implement the Accessibility guidelines on the website. Implementation of web accessibility standard demands, time, effort and cost estimate. The researcher wants to provide complete analysis of selected web accessibility standards and regulations that has helpful to organization and it will also be helpful for designing accessibility evaluation tools and addressing multiple compliance. The researcher prepared a questionnaire to assess knowledge of web accessibility expert defining certain criteria and parameters. Researcher administered a questionnaire to Accessibility expert as part of Pilot Study. After conducting pilot study, it was found that Accessibility expert were not aware about any tool for comparative analysis of various Accessibility standard and guidelines.

Keywords— Web Accessibility, Accessibility guidelines, analysis, compliance, comparative.

Introduction

The web accessibility movement is started in late nineties in world. United States of America introduced section 508 in US rehabilitation act followed by Americans with disabilities act (ADA). World Wide Web consortium also started web accessibility initiative (WAI) in 1996 and started developing guidelines for content accessibility, authoring tools accessibility, browser accessibility etc. Product based software companies like Microsoft, IBM, Oracle, Adobe etc. also started developing accessibility standards for their own products in late nineties.

First version of Web content accessibility guidelines (WCAG1.0) was released in 2003. Since then accessibility was started to be addressed throughout the globe. Australia passed an act (disability discrimination act) (DDA) in 1998. Several European states like Switzerland, Ireland introduced accessibility standards for their countries. United Kingdom had also the similar laws in late nineties. India also had persons with disabilities act in 1995 but there is no mention about accessibility of website and software application. Accessibility is being addressed in India after signing on United Nations conventions on rights of persons with disabilities (UNCRPD) in 2007. Then India introduced a government of India guidelines for web accessibility (GIGW) in 2009 to address accessibility issues in government web portals.

Managing accessibility projects is a challenge and growing need in the IT industry as there is no tool for generating accessibility projects estimate.[1] Due to this accessibility professionals end up spending more time and efforts to prepare an estimate for the web accessibility projects. [2] The focus is towards developing a tool for generating systematic estimate for the web accessibility projects by using comparative analysis of web accessibility standards across regions and organization that helps in providing similarities and differences in expert the standards. Comparative study has carried out on the various parameters to compare the accessibility standards. [3]

Comparative study of web accessibility standards helps in designing a tool that can generate project estimate which includes efforts, time and cost to implement the specific accessibility standard into client website. [4] Accessibility professionals are facing challenges in preparing the fairly accurate project estimate in case of accessibility remediation and designing from beginning. Only experienced accessibility experts can prepare the project estimate with lot of study and research which is not only time consuming but also an approximate value.

Providing complete analysis of selected web accessibility standard and regulations has helpful to organization and also for designing accessibility estimation tools for addressing multiple compliance. With the help of sample data collected through pilot study it was found that accessibility expert were not aware of any such detailed comparative analysis of various accessibility guidelines and standards, or about availability of any such tool for comparison of accessibility standards. This research application integrates the systematic comparison of accessibility standard. Generating project estimate report for specific accessibility standard considering all parameters of the accessibility guidelines that helps in accessibility remediation of the website.[5] Application can be compatible to adapt newer version of accessibility standards. Initially application can be used to generate report for WCAG, Section 508 and GIGW implementation.[6] Comparative information of various accessibility standards and guidelines is not available for the organisation who wishes to adapt accessibility in their system which creates difficulty for the organisation to make decision. Publicly available web accessibility standards and regulations on web has downloaded and manual comparison has done by aligning and mapping accessibility checkpoints, sections, levels etc for every web accessibility standard that the researcher want s to compare.

2. Related Work:

This work comes from these main criteria, 1. Person with disabilities face many challenges to access the website, 2. Accessibility expert are unaware about the availability of tool to compare various web accessibility standard, 3. Organisation seeks comparison of various web accessibility standards in order for smooth implementation of the guidelines.

3. Objectives of the study:

  1. To gather and analyze available web accessibility standards and regulations in world to understand their specific context.
  2. To provide systematic comparative information of each web accessibility standards and regulations in terms of similarities and differences.
  3. To find out usability of selected accessibility standards and regulations for users with disabilities.

4. Hypothesis:-

  • Systematic Comparative information of various accessibility standards and regulations of latest versions is unavailable.
  • Comparative study of various web accessibility standards and regulations are helpful in addressing multiple compliance.

5. Research questions:-

Question pertaining to objective 3.1

  • Q.1 How many accessibility standards are available in world.
  • Q.2 What is the specific objective of each accessibility standards and regulations?
  • Q.3 What is the scope of each accessibility standards and regulations?

Question pertaining to Objective 3.2

  • Q.1 How comparative analysis can be presented and made available?
  • Q.2 What is the similarities and differences in each selected accessibility standard and regulations?
  • Q.3 What is co-relation of each accessibility standards and regulations?
  • Q.4 How addressing one accessibility standard or regulation will fulfill other compliance?

Questions pertaining to objective 3.3

  • Q.1 How effective is the selected accessibility standards and regulations?

6. Research methodology:-

The experimental method has used for comparative analysis.

6.1 Manual analysis:

Publicly available web accessibility standards and regulations on web has downloaded and manual comparison has done by aligning and mapping accessibility checkpoints, sections, levels etc. in each web accessibility standards taken under study.

6.2 Checking effectiveness:

Selected web accessibility standards has implemented one after other in the experimental portal and usability has checked each time from 5 selected web accessibility experts. Their structured feed back in the form of short questionnaire has noted and usability before implementation, usability of the experimental portal after implementation of each accessibility standards has taken.

7. Data collection:-

Primary data:

The primary data has collected in the first stage of the research. Primary data has collected from the selected sample of experts that are accessibility professionals. In the second stage of the research for checking effectiveness. The sample size has 10 experts.Geographical area selected for research sample is Maharashtra. Approximately 100 Accessibility professionals in various district. Sample size is 50 out of 100 for entire research.10 samples has taken for pilot study. Source of Sample-NGO, Institution, IT sector.

Researcher has used Google Docs to collect the data from experts.

Secondary data:

Secondary data from various sources from web has collected and analyzed.

8. Tools used:-

  • a. Microsoft Excel is used for mapping each web accessibility standards simultaneously.
  • b. Questionnaire is used to collect feedback of the expert.
  • c. T test is used to record and analyze user feedback before and after implementation of each web accessibility standards.

9. Pilot Study Design:

We designed a questionnaire to assess knowledge of Accessibility expert on various parameters related to comparison tool for S Web Accessibility standards. This questionnaire was administered on 10 Accessibility professional the researcher formulated 38 questions for the questionnaire. The parameters considered for the study were

  • a) Total number of accessibility standards
  • b) Objectives of accessibility standards
  • c) Difference between accessibility standard
  • d) Similarities between accessibility standard
  • e) Availability of tool to compare accessibility standard.

Thus the study was carried out on 10 accessibility expert. 38 Questions pertaining to above parameters were framed and designed in 3 Point Likert Scale. The responses included ‘Yes’, ‘No’ and can’t Say or Agree, Disagree and strongly agree depending upon the question. In the first part the participant filled in the demographic information. The questions included were about their academic qualifications, their age and experience in this field. The questions were also framed on awareness about objectives, similarities and differences of various accessibility standards. The respondents were also asked if they are aware about any tool to compare different web accessibility standard.

The researcher designed questionnaire that assessed knowledge of Accessibility expert pertaining to information about tools to conduct comparative analysis of various web accessibility standards

Question Frame

Demographic Information

Gender, Age, Educational qualifications, experience

Designation ,

Accessibility standard

Knowledge about availability of tool to compare web accessibility standard

The 3 Point Likert Scale was administered to 10 Accessibility expert each gave us completed response to every question. 50% of the respondent were female and 50% were male they belong to age group of 23-28 years most of them were high school passed. Almost all respondent belong to physical accessibility sector, almost all respondent were accessibility tester. Most respondent were experienced in the field of implementation of web accessibility standard, almost all of them had experience of one or two years. Almost all the respondents were aware about the objectives of web accessibility standard.

10. Pilot Study Results

10.1 Findings

The finding of the pilot study was very interesting. Almost all the respondents were not aware about web accessibility standards. Almost all the participants were aware about anyone accessibility standard. Almost all the respondent agreed that they are aware about objectives of web accessibility standard. But the almost all participant replied that they cannot elaborate objectives of web accessibility standard. 70% of web accessibility expert had experience between zero to five years.20% of accessibility expert had experience between five to ten years. 10% expert had more than ten years of experience. Almost all the expert holds certification in web accessibility standard. 70% of respondent had an attended training on accessibility whereas 30% had not attended any training on accessibility. 50% of participants were not aware about difference between available web accessibility standard. 40% participants were partly aware about difference between available web accessibility standards whereas 10% of the participants were fully aware about difference between different web accessibility standards. Almost all the respondents were partly aware about the similarities between different web accessibility standards. 50% of the participants never tried to compare any web accessibility standard, whereas 30% of respondent were partially sure whether they tried to compare different web accessibility standard. 20% respondents actually compared different web accessibility standards. 60% of the respondent replied they don’t think comparison of web accessibility standards is needed. 20/% felt the need for comparison of web accessibility standards. 70% respondent felt that comparison of web accessibility standard has helpful in addressing multiple compliance. 30% were partial whether comparison of web accessibility standard has helpful in addressing in multiple compliance or not. 60% of respondents were not aware about availability of any tool to compare web accessibility standards. 20% were not aware about availability of any tool to compare web accessibility standards whereas 20% were aware about tool to compare web accessibility standards.

Almost all the participant felt that availability of tool to compare web accessibility standard has useful to them. Almost 90% said as there are no much difference in different web accessibility standard there is no need for a tool for comparison. 10% of the participant felt the need of comparison of web accessibility standards. 80% respondent replied that they came across common errors while implementing web accessibility standard. 20% said they didn’t come across any common errors while implementing web accessibility standard. Almost 80% replied that they can name common accessibility problem. 20% respondent said they were not able to name common accessibility problem. Almost all respondent said that they were aware about accessible content. 80% respondent said that they can name some common accessibility barriers. 20% said they cannot name some common accessibility barriers. 70% respondents were aware about accessibility training courses. 30% respondents were partially aware about accessibility training course. 80% respondents were partially able to follow guidelines for implementing accessibility standard given in English. 10% were able to follow accessibility guidelines given in English. 10% respondents were not able to follow guidelines given in English.60% respondent felt provision of comparison of various accessibility standard is required by the client. 20% respondent disagreed that comparison of various accessibility standard is required by the client. 20% of the respondent strongly agreed that comparison of various web accessibility standards is required by the client. 50% felt that Principal, Success Criteria, Check Point and Level can be used as parameters to compare web accessibility standard. 20% respondent felt that Principal, Success Criteria, Check Point and level cannot be used as parameters to web accessibility standards. 30% respondent replied that they can’t say whether Principal, Success Criteria, Check Point and Level can be used as parameters to compare web accessibility standards. 70% respondents were not aware about parameters to compare web accessibility standards. 30% respondents were aware about parameters to compare web accessibility standards. 80% respondents were not able to describe parameters in detail to compare web accessibility standards. 20% respondents were able to describe parameters in detail to compare web accessibility standards. 50% were able to identify factor in deciding time estimate to implement specific web accessibility standards. 50% were not able to identify factor in deciding time estimate to implement specific web accessibility standards. 50% respondents were not able to identify factors to consider in deciding cost estimate to implement specific web accessibility standards. 30% respondents were able to identify factors to consider in deciding cost estimate to implement specific web accessibility standards. 20% respondents said they were not able to say whether they are able to identify factors to consider in deciding cost estimate to implement web accessibility standards. 60% respondent said that they are partially aware that efforts in implementing web accessibility standards are measurable. 40% respondent said that they were not aware that efforts in implementing web accessibility standards are measurable. 60% respondents were aware that addressing one accessibility standard or regulations will fulfil other compliance. 40% respondents were not aware that addressing one accessibility standards or regulations will fulfil other compliance.

Results and Discussions

Parameters

Questions

Mean

Number of Web Accessibility Standards

Are you aware about web accessibility standard

.882

How many web accessibility standard do you know

.882

Do you know exact number of web accessibility standard available in the world.

.873

Details about web accessibility standards

Do you know objectives of web accessibility standard

.882

If yes can you elaborate objectives of web accessibility standard briefly?

.882

Do you know difference between web accessibility standard in detail.

.869

Do you know similarities between available web accessibility standard in detail.

.882

Efforts in implementing web accessibility standard are measurable

.882

Availability of tool for comparison

Do you know about any tool to compare web accessibility standard

.872

If a tool is made available to compare web accessibility standard will it be useful to you?

.882

Can we use following parameters to compare web accessibility standard

  1. Principal
  2. Section criteria
  3. Check point
  4. Level

.863

Problem related to implementation of web accessibility standard

Do you come across common errors while implementing web accessibility standard.

.873

Can you name some common accessibility problem

.873

Can you name some common web accessibility barriers?

.873

Can you identify factors to consider in deciding time estimate to implement specific web accessibility standard

.872

Can you identify factors to consider in deciding cost estimate to implement specific web accessibility standard.

.867

The result of the questionnaire test positive on reliability as it showed .882

Conclusion:

With the above conducted pilot study the researcher came to conclusion that the accessibility expert are not aware about availability of tool to compare various web accessibility standards and if the tool is made available to them in near future it has useful to them in implementing the web accessibility standard in clients website.

This is pilot study

References:

  1. Baowaly,M.K.,Hossain,J.M.,Bhuiyan, M.,2012.Accessibility analysis and evaluation of government website in developing countries: case study Bangladesh
  2. Mankoff,J., Fait,H., and Tu Tran., 2005. Is Your Web Page Accessible? A Comparative Study of Methods for Assessing Web Page Accessibility for the Blind. In Proceedings of SIGCHI Conference on Human Factors In Computing Systems (pp.41-50), Portland,USA
  3. Klein,D.W.,Kresowik,D.,and McCoy.,2005.A Study of the Accessibility of Ten States’ Web Services and their Policies on Web Accessibility for People with Disabilities.
  4. Richards,J.T.,Hanson,V.L.,2004. Web Accessibility: A Broader View.Proceedings of the 13th international conference on World Wide Web.
  5. S.Lujana-Mora.2013.Web Accessibility Among the Countries of the European Union: A Comparative Study. Actual problems of Computer Science.,vol.1,no.3,pp..18-27,ECCC Foundation.
  6. Cullen, K., Kubitschke, L., Boussios, T., Dolphin, C., Meyer, I., 2009. Study report: Web accessibility in European countries: level of compliance with latest international accessibility specifications, notably WCAG 2.0, and approaches or plans to implement those specifications. European Commission. Internet: http://ec.europa.eu/digital-agenda/en/news/study-report-web-accessibility-european-countries-level-compliance-latest-international (visited November 2 2013)
  7. Slatin, J., & Rush, S. (2003). Maximum Accessibility: Making Your Web Site More Usable for Everyone. Boston, USA: Addison-Wesley.
  8. USA government, Americans with disabilities act document, internet:http://www.ada.gov/enforce_current.htm(visited 17th November 2015)
  9. USA government, rehabilitation act document, internet:http://www.section508.gov/content/about-us(visited 18th November 2015)
  10. World wide web consortium, Web accessibility initiative, article designing for inclusion, internet:http://www.w3c.org/wai/designingforinclusion(visited on 17 november 2015)
  11. World wide web consortium, resources document, internet:http://www.w3.org/WAI/Resources/Overview(visited 02 november 2015)
  12. Oracle corporation inc, corporate policy document, internet:http://www.oracle.com/us/corporate/accessibility/policies/index.html(visited on 23 september 2015).
  13. Adobe corporation inc, corporate accessibility document, internet:http://www.adobe.com/accessibility(29 november 2015)
  14. Government of India, ministry of information and communication technology, government of India Guidelines for web accessibility document, internet:http://web.guidelines.gov.in/#&panel1-3 (visited 23 september 2015)
  15. Web accessibility in mind, Uta state university initiative, laws throughout the world, internet:http://webaim.org/articles/laws/world/(visited on 25 november 2015)

Comparative Analysis on Advertising Techniques of Selected Barbecue Businesses in Liputan Meycauayan City of Bulacan

Introduction

“There is a great deal of advertising that is much better than the product. When that happens, all that the good advertising will do is put you out of business faster”.

-Jerry Della Femina

Advertising is the action of calling something to the attention of the public especially by paid announcement technique is a way of doing something by using special knowledge or skills (Merriam Webster Dictionary, 2018).

The term advertising is derived from the latin word “advertere” which means to turn the attention. When you advertise you try to caught the absorption of the consumer. The must widely accepted definition of advertising, it is a way of presenting different product by a famous personality Kazmi and Bafra, (2008). But the definition has some limitation because it does not talk about the persuasion aspect of advertising without which it is very difficult to achieve advertising objectives. There is no generally accepted definition of advertising, however advertising may take any form, oral or written to promote a product through persuasive communication to achieve a pre determined objectives changing and reinforcing the desired attitude of the consumers of the point of purchase. The advertising message is considered as important in advertising communication process. It is the idea, attitude, image, or other information that the advertiser wishes to convey to the target consumer. The effectiveness of advertising is based on its message. To persuade your audience you need to build the concept of your product to their mind (Gupta, 2012).

The researchers want to know the different advertising techniques of different Barbecue Businesses and the reason behind its success. This research can help those people to know more about the importance and the risk of establishing a Barbecue Business.

Conceptual Framework

This study focuses on the comparative analysis of advertising techniques and the theoretical similarities between the two Barbecue Businesses within the barangay of Liputan Meycauayan City. The figure below shows the framework of the study.

1. The mediation of 2. The magic of reality theory. meaning theory.

Barbecue Business 1

Advertising Barbecue Business 4

Advertising Barbecue Business 2

Advertising Barbecue Business 3

Advertising

Figure 1: Conceptual Framework

This focuses on the comparative analysis of the different advertising techniques and their theoretical analysis used in the business. The researchers used two rectangles above the four circles that is connected with an arrow which shows that the two theory is both connected to the analysis of the study. The researchers also used venn diagram to compare and contrast the two Barbecue Business which belongs to the rectangles, the four circles composed of four parts, the differences of four Barbecue Businesses’ advertising techniques and the theoretical similarities between the two Barbecue Businesses. The venn diagram shows that there are four Barbecue Businesses listed and these four are the respondents in collecting data about their advertising techniques, in order to proceed to the study the research must critically analyze their techniques and find out if there are theoretical similarities among those techniques.

Theoretical Framework

The mediation of reality theory. Promotions are successful when directed with other media and setting in which they are completely submerged. Obviously what makes the advertisements convincing is the product. What the media do with respect to publicizing, the media defines the excitement and addiction of what me are watching.

The magic of meaning theory. This clarifies how promotions are utilized in mixing the importance of the items to the client not with standing offering. It indicates how promotion impacts the qualities and other essential convictions of the shoppers. This theory is like putting a tagline in every business. A business became catchy by using a unique tagline that can remember by the costumer and by just knowing the tagline your business may be known.

These two theories are the theories that were going to use by the researchers to compare and contrast their similarities in terms or the usage of media as a technique in advertising. The magic of meaning was used to identify and analyze if taglines and names given by the business can help the business to increase its popularity and catch the eyes and mind of the consumers specifically to distinguish ones business to the other competitors.

Statement of the Problem

The goal of the research is to compare and contrast the different advertising technique used by Barbecue Businesses. Specifically this study will answer the following questions.

  1. What are the different advertising techniques of the different owners of Barbecue Business?
  2. What are the factors that sole proprietors consider in choosing Barbecue Business than others?
  3. How do these advertising techniques help in order to maintain the business?
  4. What are the challenges encountered by the owner of a Barbecue Business?

Scope and Delimitation

The purpose of this study attempts to know the differences and similarities on advertising technique of selected Barbecue Businesses. Four (4) Barbecue Businesses were chosen within Liputan, Meycauayan City that are purposively selected. The researchers conducted an interview and questionnaire as an instrument. This research study piloted of Barbecue Businesses in Liputan, Meycauayan City, within the academic year 2019-2020.

Significance of the Study

The outcome of this study will be beneficial to Barbecue Business and future advertisers to know their strength and weaknesses in implementing their technique and aids to provide guidelines on how to improve the performance of the business. The study will benefit the following.

Customers. As the customer of the Barbecue products they are the people supporting the business stability. This study will provide them insights about their level of satisfaction about the product.

Barbecue Business Owners. To provide basic information on how to increase sales by telling potential customers about the product or service and also to minimize the impartiality of the business decision. This will help generate awareness of the business stability and also the awareness of the customers about your business.

Other Business Owners. To maintain their businesses and to give additional guideline and recommendations on how to improve their businesses in order to complete with other competitors.

Investors. This study will help the investors to build a point of view of the business and gives them prior knowledge about the strength and weaknesses of the brokers. This will further assist them in deciding if they are going and support the business.

Future Researchers. To provide additional information to the body of knowledge and helps the future researchers to identify the techniques and procedure used by other business in building their names and reputation.

Definition of terms

For further clarifications and understand more about the terminologies used in the study, the following terms are being defined:

Customer. The people who consumes products, good or services and has the ability to choose between different products and suppliers (Business Dictionary.com 2018).

Barbecue. Barbecue is a cooking method in meat that grilled and served. Barbecue can refer to the cooking method itself. Barbecuing is usually done outdoors by smoking the meat over wood or charcoal. In the Philippines, Barbecue is one of the famous dishes in fiesta, party and in every occasion. (Cambridge Dictionary 2019).

Sole Proprietor: The sole proprietorship is the simplest form under which one can operate a business. It simply refers to a person who owns the business and personally responsible for its debts. A sole proprietorship can operate under the name of its owner or it can do business under an ideal name is simply a trade name (Encylopedia 2018).

Business Stability. is the ability to fight a temporary problem, such as a decrease in sales, lack of capital or loss of a key employee or customer. Analyzing your cash flow and a variety of negative scenarios will help you determine whether or not your business is financially stable (Hearst Newspaper 2019).

Persuasion. As stated in the researchers’ persuasion was defined of process of convincing a person towards the product or services using different way.

Impartiality. Impartiality is a principle of justice holding that decisions should be based on objective criteria, rather than on the basis of bias, prejudice, or preferring the benefit to one person over another for improper reasons (Merriam Webster 2018).

Advertising. As stated in the researchers advertising was defined as breaking down of concepts into customers.

Business. Its is the practice of making one’s living by engaging in commerce. It is an organization or economic system where goods and services are exchanged for one another or for money (Business Dictionary, 2018). It is used in the study as an entity that creates its own profit and engage in the market.

Comparative Analysis. Also described as comparison analysis, is used to measure the financial relationship between variables over two or more reporting periods. Business use comparative analysis to identify their competitive positions and operating over a defined period (Wilkinson 2013). It is used in the research as finding the similarities and differences of different businesses.

Techniques. Carrying out a particular task, especially the execution or performance of an artistic work or a scientific procedure. It is a skillful or efficient way of doing achieving something. (Cambridge Dictionary, 2018). It is used in the research as ways to pursue goals and objectives and way to advertise.

Comparative Analysis of Google and Bing

Google, in 1996, started of as a thesis project at Stanford University by three PhD students Larry Page, Sergey Brin, and Scott Hassan (who did most of the programming but left the project before it was founded as a company). Their aim was to improve the horrible Internet search conditions back then.

Back in the day, a relevant result to a search would be found under several pages. It was difficult to decide which links were more relevelent than others. The goal of this was not to search what information was inside a link but to search which links other people found valuable.

Both Larry and Sergey came from educational family backgrounds hence were very familiar with how citations of scientific literature work. Footnotes pointing to a certain paper relate to its popularity. The more a certain paper or thesis is footnoted in other papers the more relevant or popular it is. This inspired them to create a similar structure where the more a page is linked the more relevant it was considered to be. As said by Eric Schmidt, CEO of Google (2001- 20011), in an interview with Discovery UK that, “The idea was to build a system that you could reliably count how popular something was”.

The idea to make money through this business model was by providing links to relevant ads for specific search terms. They would have an unlimited ad inventory and if a word or term was searched, ads relevant and related to the search term would show up. Which is still the basic concept used by Google as an income source, through ad revenues.

One could say is not the internet but Google who gathered all the world’s information and gave it to us.

Bing, launched in 1998 as MSN Search which only had three tabs search, index and web crawler, which was replaced by Windows Live Search in 2006 which was more interactive with Web, News, Images, Music, Desktop, Local and Microsoft Encarta, which was transformed into Live Search which now had an ad platform, which was replaced by Bing in 2009.

Even though it may seem that Bing might not be popular among internet users. 33.33% of the US, 26% of the UK and 17% of Canada’s of internet searches are done on Bing. Similar to Google, Bing’s main source of income is through ad revenue.

Windows OS is run on 82% of the worlds computers, this gives Microsoft an incredibly powerful tool to use and rely on. Even the smallest adjustment to Windows has a huge effect among hundreds of millions of people. Even Though Microsoft allows its users to change its default settings most of the users don’t actually change theirs. This makes defaults an incredibly important tool for companies as such. Internet Explorer may not be universally liked, but it came with Windows, so the opinions don’t actually matter to Microsoft. This is why they are going to do anything to make Edge to get more users.

Hence as Edge is the default browser of Microsoft and Bing is the default search engine of Edge. Users willingly or unwillingly use Bing, let it be for downloading another browser or searching for another search engine or sending feedback to a bug report.

The success of Bing is not really about Bing, it’s about the power of control. The distinction between a $5 billion company and a failed business is the ability to decide what consumers see. The wider objective of microsoft is to shift up the pyramid of power. The strategy of entire companies, entire industries,The lower something is on the pyramid of power, the more companies it relies on, and the greater its risk of being shut down. It’s the same reason that for so long Windows Phone had refused to quit.

Hence we can say both companies, Google and Microsoft having search engines Google and bing respectively but they serve similar and different purposes to the companies on the one hand, both Google and Bing’s purpose is to give out the most relevant page to the relevant search term and both the companies and both companies rely on ad revenue through search terms, but on the other hand as Google’s search engines only purpose is to give relevant results to a search term and provide an ad revenue income but where as Bing’s only purpose even though universally not liked very much is to not only act as a search engine but to help Microsoft step up the hierarchy of control.

Comparative Leadership Analysis: Transformational Theory Vs Machiavelli’s Theory

Machiavellian principles are deemed to be more practical in today`s society and have been believed to offer not only critical advice in terms of management but also a decisive course on change. This paper takes particular interest in revisiting Machiavellian original arguments on management and compares it to the modern transformational theory. It scrutinizes its relevance and impact on a leader’s perspective of environmental scanning, strategy formulation, strategy implementation, and evaluation and control.

Transformational is a type of leadership that believes in motivating and encouraging employees to create change and shape the organization. The leaders achieve this by creating a good working environment and a sense of ownership and independence among the employees. Machiavellians, on the other hand, can be described as a group of people who are goal-driven and willing to achieve their desired dreams with any means necessary (Kirkpatrick, 2010). These principles strongly assert that a good leader should be feared rather than loved, should have good morals, should be intelligent and should have the support of their people. When this is translated into the modern transformational leadership theory, a good leader should be respected and supported by his people and the leader should authentically know and trust and flourish the skills of the people they are working with.

The transformational leader takes time to understand, nurture and cultivates the skills of their employees and supports them. They motivate their employees and do not necessarily micromanage them. Such leaders trust their trained and highly qualified employees to make informed decisions on their assigned jobs. This type of leadership focuses more on building their team, empowering them and aligning them with the goals of the organization. They as well motivate their team y acting as role models and exemplification of good morals and code of conduct. Driven by the rule that it is better being feared than loved, Machiavellian style of motivation is quite different (Rego, Lopes & Simpson, 2017). Employees have to adhere to strict rules and harsh punishments. Employees are motivated and driven by the fear of losing their jobs. They are as well-motivated as beating their competitors. It works on the principle of the survival for the fittest. It, therefore, attracts a team of people that can quickly think on their feet and get the job done regardless of the situation.

Machiavellians believe in authenticity and believes and that good leader should be honest. He believed that openness is an integral part of good leadership. Transformational leaders as well rely mostly on good communication. They communicate openly with all the stakeholders as they source for support, assistance as well as knowledge in regards to the superlative business practices in terms of leading an organization.

Change is an inevitable process that every organization must face at one point. Transformational leaders are the champions of change. Just as the name implies, transformation changes people; and when people are transformed, the company can as well transform itself. With strategies such as clear vision and trust, it can provide direction to their employees with predefined goals. This leadership style offers direction to the people from top to bottom as they develop a conducive working environment and culture (Shapira, 2019). In terms of change, Machiavellian believes that change is a process and is not a one-time event. It is therefore hard for people to believe in something they do not know. He, therefore, believes that is it equally important that change comes with a lot of resistance as it alters the power dynamics across the organization’s boundaries. To reduce the level of resistance, it is therefore important to build support.

Both leadership style may impact a leader`s perspective of environmental scanning, strategy formulation, strategy implementation, and evaluation and control. A good leader should always develop an effective course and direction for their team with a strategic agenda. The acquisition of these characteristics forms the part of a transformational leader as it places emphasis on monitoring and evaluating external opportunities. Transformational leaders are vision-oriented and as such, before embarking on any venture, they always evaluate the market environment using different strategies such as pestle, Porter’s five and SWOT framework to determine the profitability of the new venture (Kirkpatrick, 2010). They focus more on identifying the best solution for any problem. These leaders shift the power of decision-making to their employees and this consequently inspires employees to come up with new ideas. This creates intellectual stimulation among employees as well as giving them more room to be creative. They then formulate an effective strategy as they implement it. Such leaders implement change by developing ways to collaborate with their team.

Machiavellian leadership theory, however, believes that the implementation of change is dangerous since one is met with a lot of resistance and opposition. Therefore, for one to succeed, change needs support and ownership and courage. Implementing innovative strategies, therefore, require a lot of collaboration, research, and consensus from people. As a result, for any leader to be able to implement, they need to convince their followers through proper scanning of the environment and successfully evaluating and monitoring control.

The Impact of Waste Management on Economy: Comparative Analysis of South Korea and India

Introduction

The rise in environmental issues has led to the field of environmental economics which deals with the relationship between the economy and environment becoming extremely important. India as a country generates 62 million tons of municipal solid waste (MSW) each year. (Wikipedia contributors,2019, October 16). However, only about 30% of the waste collected is actually treated (Livemint, Mar 1, 2018). South Korea has one of the most efficient waste management systems in the world, even after having 5 times the per capita generation of MSW than India. In this paper, I look at the decoupling link between the economy and environment of South Korea and whether the policies implemented by its government have been more successful than that of the Indian government.

Literature Review

There have been multiple attempts made to gauge the impact that consumption of natural resources and the waste that is generated has on the economy. Natural resources are the essential inputs of production, the scarcity of which can very harmfully impact the economy of any country. Hence, India cannot afford to ignore effective usage of its natural resources if it doesn’t want to jeopardize its developmental plans (OECD, material resources, productivity and the environment). In this paper, the authors show that India faces the problem of rapid population growth, urbanization and increased demand while simultaneously facing immense pollution. However, the paper doesn’t draw any comparative with an Asian country facing similar issues that has been able to deal with it.

The Volume-Based Waste Fee System aims at reducing household wastes by introducing economic incentive system in waste disposal. (Kim et al., 2012) The government levies a waste collection fee based on the volume of waste discharged (Kim et al., 2012). The waste generation per capita following the implementation of the Volume-based Waste Fee System has been reduced to a level equivalent to the developed world, and the amount of recyclable waste collected has doubled (Kim et al., 2012). In this paper, the authors determine the impact it has had on the environment of South Korea which has been largely positive. It was implemented in 1995 in South Korea. However, this paper doesn’t take into account the effect that it has on the economy of the country.

Theoretical Background

In order to estimate the impact that an effective waste management can have on the GDP of a country, it is imperative to introduce a few key concepts and variables. Resource productivity is the effectiveness with which an economy is able to convert the resources it extracts into monetary gain.

The ratio of domestic extraction to domestic material consumption indicates the dependence of the physical economy on domestic raw material supply (Weisz et al., 2006). Decoupling is a type of economy in which the economy is able to grow without increasing the pressure on the environment. In this paper, we plot the data available for different years in terms of material productivity and material consumption in order to find out whether the economy is able to grow without putting substantial pressure on the environment.

Objective of the Paper

Waste management in South Korea is based on the model of waste generation reduction and recycling and its Volume-Based Fee System is one of the key policies that it has taken. While subsidiary policies have also been taken in the further years, this is the most large-scale policy taken by the government, hence for the sake of the paper it will be assumed to be the sole policy. India’s waste management system has largely focused on segregation and collection that is largely undertaken by the municipals of the respective states (DTE Staff, ‘Rewind 2018: How India dealt with its waste’, 2019). The objective of this paper hence becomes to compare the monetary fine to traditional waste management systems.

Research Question and Hypotheses

The question of this paper is to understand the effectiveness of South Koreas waste management system in terms of material productivity, if it was successful or not and whether it is a viable option for India to follow.

Data and Methodology

This is a quantitative research paper and it is a descriptive correlation design. The data has been collected from reliable secondary sources. The data has been formulated into tables and converted into scatter plots using excel. The data has been collected for the decade of 2007-2017 as further data wasn’t available.

Domestic Material Consumption (DMC) is based on the Economy-Wide Material Flow Accounts (EW-MFA) which includes compilations of the overall material inputs into national economy, the changes of material stock within the economy and the material outputs to other economies or to the environment and covers all solid, gaseous, and liquid materials, except water and air (Eurostat, ‘Your key to European statistics’, 2019). The indicator is defined as the total amount of material directly used in an economy (Eurostat, ‘Your key to European statistics’, 2019).

The domestic material consumption has increased from 4.425 in 2007 to 5.53 in 2017. The material productivity has increased from 0.817 in 2007 to 1.14 in 2017. Per capita consumption of materials in India is still low compared to the rest of the world. With an average of 4.2 tons per capita, India ranked 151 out of 193 countries in the world in 2009, consuming less than half of the global average of around 10 tons. In comparison, in the same year, average resource consumption per capita in OECD countries was about 15.7 tons, while it was around 3.5 tons in the least developed countries (Dittrich, 2012). But it is important to keep in mind that due to the large population that India has, its materials consumed in absolute terms is a huge amount, which is why it is in this country to generate the most municipal solid waste at 150,000 tons per day.

For South Korea, the domestic material productivity has increased from 1.718 in 2007 to 3.207 in 2017, which is a rise of approximately 1.5 tons per capita, while the material consumption has fallen from 16.194 in 2007 to 11.291 in 2017, which is a decrease of approx. of 5 tons/capita.

Result Analysis

As we can see from the above data, the decreasing trend in the DMC can be taken as a positive sign that Korea is well on its way to decoupling its economy while India still has a long way to go as its DMC is still increasing. India’s increase in material productivity has also not seen a substantial increase as it’s just a meagre 0.323 rise which means that there is urgent need of a revamp of India’s approach to waste management and its usage of natural resources.

Conclusion

Due to the large population that India has and taking into consideration that it is a fast economy, in order to achieve efficient waste management, it is important to firstly, reduce the overall material consumption and secondly to increase the productivity of its resources.as seen from the south Korean case, putting a monetary fine on waste generated acts as an incentive for consumers as well as producers to either reduce their consumption or to more efficiently use the available resources. It is only then that India’s economy can move to decoupling. Hence India needs to move away from focusing on collection of waste to incentivizing its citizens to reduce waste.

References

  1. Your key to European statistics. (n.d.). Retrieved October 20, 2019, from https://ec.europa.eu/eurostat/web/products-datasets/product?code=t2020_rl110&lang=en.
  2. Waste management in India. In Wikipedia, the Free Encyclopedia. Retrieved 00:00, October 20, 2019, from https://en.wikipedia.org/w/index.php?title=Waste_management_in_India&oldid=921641492.
  3. Rewind 2018: How India dealt with its waste. (2019, January 3). Retrieved October 20, 2019, from https://www.downtoearth.org.in/news/waste/rewind-2018-how-india-dealt-with-its-waste-62620.
  4. Weisz, H., Krausmann, F., Amann, C., Eisenmenger, N., Erb, K., Hubacek, K., & Fischer Kowalski, M. (2006). The physical economy of the European Union: Cross-country comparison and determinants of material consumption. Ecological Economics, 58(4), 676- 698.
  5. OECD (2019), Material consumption (indicator). doi: 10.1787/84971620-en (Accessed on 20 October 2019).
  6. Kwang, K. (2012),”Volume based waste fee system in Korea”, Korea Environment Institute (KEI).

Differences in Language Use by Men and Women

In using a language, men and women have their own different ways. In an interaction, women tend to use linguistic devices that focus more on the affective functions than men do. Women communicate in such ways to increase their solidarity while men tend to communicate in such ways which focus on the masculinity and power. Stylistically men are less flexible than women. The language of men and women has a number of differences in some ways (Lakoff, 1975). This paper focuses on the differences in the language use by men and women which are noticed in terms of their intonation, use of vocabulary, pronunciation, syntactic pattern, non verbal utterance and social class.

To start with, biologically, women have high pitched voice whereas men have low pitched voice. This physical explanation is only a part of gender differences in voice pitch. However, the social and cultural explanation about voice pitch is different. Speaking in a low pitched voice is the indication of masculinity and speaking in a high pitched voice is the indication of gentleness and politeness. Men prefer to use falling intonation to show their level of confidence of what they are saying and at times power. Conversely, women prefer to use high pitched voice to signify their womanly behavior.

In order to express feelings or to state something, men and women use different sets of vocabulary. To describe things, women mostly tend to use adjectives, such as: adorable, sweet, lovely etc. to show more sensitivity to their surrounding than men. Furthermore, women are polite in using language and they use more words and gestures, but men tend to use direct words. While talking, unlike men, women take the thought of others into consideration rather than imposing their own claims or ideas. Swear words and expletives are mostly used by men. To express shock in everyday life, men tend to use more swear words than women. Alternatively, women pay more attention to grace their manners to express their feelings and emotions and they may believe that using swear words make others uncomfortable as well as give an impression of indecency. In addition, to indicate affection, women tend to use words like, ‘so sweet’, ‘oh dear’ etc more than men. Beside this, women tend to appreciate politeness by saying ‘sorry’, ‘please’ more often than men do. It is definite that in order to get emphatic effects, men and women choose different sets of vocabularies.

Men place a high value on vernacular speech to show their power and masculinity, whereas women tend to use the forms which are considered as correct. In term of pronunciation, in English speaking communities, men have the tendency of dropping /h/ and /r/ sounds which is similar to the vernacular form. On the other side, women have lesser tendency of dropping these sounds. According to the context of Bangladesh, men have the tendency of using vernacular sound, whereas, women tend to use the standardized sound in their speech. This indicates that women focus more on the correct form of grammar by using clear utterances. Next, the syntactic pattern used by men and women differ from each other. While asking for help, women use more indirect and polite form of sentence with respect, whereas men use more direct and simple language, for example, a woman might say, “I was wondering if you can help me”. On the contrary, a man might say, “Please, help me in solving this matter”. From this example, it is understood that men tend to ask something directly, while women tend to be more indirect and polite.

In term of non verbal utterances, women use more gestures than men in a conversation. Men and women tend to have different styles while expressing their thoughts. By moving hands, fingers, face and other parts of the body women signify on their psychological state, emotion and feelings.

Next, the level of class reflects in the linguistic usage of men and women. In most of the societies, the use of vernacular form is very common among the men. However, women tend to use standard speech in their conversation. Men express positive to the vernacular form of language more than the female. Other than this, Labov (1981) points out that the highest status of group in society usually adopts a formal style. Women have a tendency to use language to show their social status than men do. In societies, women are considered as the subordinate groups, for which they try to secure their position in the society through their use of standard language. Socially, while men are rated on their power and position, women are rated primarily on how they appear and consequently their use of language seems more important. From the data of Trudgill(1983), it is known that, the percentage of standard form used by the women of middle class is closer to the men of one class higher than them rather than to that of men from their own social class.

To sum up, this paper has showed the differences between the use of language of men and women from some aspects like, vocabulary, as they are brought up in different ways since their childhood. And the differences I roles in the society has also an affect. Language, as a tool of human communication, will be improving day by day, and this needs the effort of both men and women. Women, with more participation into the academic field, business, social life, and so on, there will be other changes in the future. The changes in the language can show the improvement in women’s social status.

References

  1. Holmes, Janet. (2013). An Introduction to Sociolinguistics (FourthEdition). Routledge.
  2. Xiufang, Xia. (2013) Theory and Practice in Language Studies, Vol. 3, No. 8, pp. 1485-1489, August 2013
  3. Lakoff, R. (1975). Language and Women’s Place. New York: Harper&Row Publishers, Inc.
  4. Labov, W. (1981). What Can Be Learned about Change in Progress from Synchronic Descriptions? Variation Omnibus. Edmonton: Linguistic Research Inc.

Comparative Analysis of Usability of Media Players

Nowadays computer systems are playing a vital role in almost every aspect of human life with the help of complex and user-friendly software systems. Multimedia players are one of the application of computers system used to watch videos and listen audios. In this paper, we conduct a comparative analysis of four media players i.e. VLC, QQ player, Windows media player class and Pot Player. We conduct a survey from exerts of different organizations on usability of media players, containing parameters i.e. learnability, efficiency, memorability, error, satisfaction. According the mention parameters we compare the given media players with each other.

Introduction

Computer and computerized devices have become an eminent element of our society. They increasingly influence many aspects of our lives; for example, the way we communicate, the way we perform our actions, and the way we interact with our environment. There are a number of quality software applications which provide many facilities and human life easy. Multimedia is one the application of software system which enables the user to play audio and video. People switched from one media player to other because there are some issues in media player or software. This paper will help the user to select an interactive media player.

VLC media player is one of the world open-source media players used by millions of users in the world. It was released 16 years ago. VLC is available on all the major operating systems such as Windows operating system and Mac OS. It is also available on Android.

Windows media player classic is an extremely light-weight, open source media player for Windows. It supports all common video and audio file formats available for playback.

QQ Player software is a free application for Windows that helps you play videos, movies and music. You can play all video and audio formats without the need for external codex packages. QQ Player helps you play videos, movies and music, snapshot video as digital images, converting video and music, play 3D movies and convert the normal 2D movies to 3D movies in one click.

Daum Pot player is a free media player that supports a variety of different video codecs and format. Pot player already includes built in codecs, eliminating the need for manual installation. It also supports Digital TV devices, Webcams, Analogs, DXVA, live broadcasts and more.

The rest of the paper is organized as follow. In section II, we summarized our literature review. Proposed methodology of our survey is explained in section III. Our results are mentioned in the section IV and section V present the conclusion and summary.

Literature Review

Usability is an important quality attribute to be considered during software architecture design. Many usability benefits link directly to a variety of architectural tactics in addition to separation of the user interface and these benefits can be discovered early in the life cycle [1]. There are several techniques to evaluate software usability, these evaluations being quantitative and qualitative. The main way to quantitatively evaluate a software product is by using software usability metrics [2]. The success of any software or product depends on many factors and the usability is one of the most important factors. Usability is considered as the quality of software [3]. for assuring and improving quality, it is necessary to ensure quality attributes such as usability, efficiency, learnability and many more. Among of them, usability is the key quality attribute of any kind of software. With the same time, evaluation of usability is also necessary for improving the quality of the software [4]. Usability is one of the most important aspects of software quality, several methods have been developed in order to establish techniques capable of evaluating this attribute from early phases of the software development process [5].

Methodology

In this paper, we conduct our survey on usability of four media players i.e. VLC, QQ player, Windows media classic and Pot player on the basis of five parameters: learnability, efficiency, memorability, error and satisfaction.

Each media player is assigned its own matrix table. In this table rows present parameters of usability and columns represents the feedback of experts. Each column is assigned a value starting from 1-5. Media players have values near to 5 will be considered the best media player and the values near to 1 will be considered the less reliable media player. If the user is strongly satisfied means the value is five or closer to five and if the user is not satisfied means the value is one or near to one.

The media player will be considered the best if it scores 5 out of 5. Our evaluation technique is for a media player is adding up all the values of parameters and divide it by five e.g. 5+5+5+5+5/5=5 means strongly satisfied.

In this survey, experts provide scores to media players according to their experience mentioned in the example. For example, if a media player A scores 4.3 and another media player B scoring 3.9, the media player A will be said better than media player B.

Results and Discussions

After conducting our survey, we collect the scores of media player mentioned in section III. After collecting these values, we calculate the mean of these values by dividing the total score of media player by total number of users. We get the values of all the media players by using this method.

According to the opinion of our experts and our calculation. VLC media player has highest scores i.e. 3.66, Windows media classic placed second position scoring 3.44, third QQ player 3.18 and last Pot player with 3.1 scores. According to this survey VLC media player is more usable and a best solution for the users.

Conclusion

In this paper, the authors conduct a survey from the experts on the usability of four different media players i.e. VLC, QQ player, Windows media classic and Pot Player. Our survey parameters are learnability, efficiency, memorability, error and satisfaction. Our evaluation method was taking the mean of the score of each media player. After calculating the scores, we found that the VLC media player has the highest value and we proposed VLC media player as the best choice and solution the users.

References

  1. B. E. J. Len Bass, ‘Linking usability to software architecture patterns through general scenarios,’ The Journal of Systems and Software, 2003.
  2. J. P.-S. Jose Pow-Sang, ‘A Systematic Mapping Review of Software Usability Metrics,’ International Journal of Engineering & Technology,, 2018.
  3. T. M. A. R. M. Qurat-Tul-Ain, ‘Usability Practices in Software Development Life Cycle A Review,’ Usability Practices in Software Development Life Cycle A Review, 2016.
  4. S. I. M. Md Alamgir Kabir and Muaan Ur Rehman, ‘An Analytical and Comparative Study of Software Usability Quality Factors,’ IEEE , 2016.
  5. J. A. P.-S. Freddy Paz, ‘A Systematic Mapping Review of Usability Evaluation Methods A Systematic Mapping Review of Usability Evaluation Methods,’ International Journal of Software Engineering and Its Applications, 2016.

Comparative Analysis of Uber and OLA

Meru Cabs introduced organized rental cab service in the Indian market in 2004. It soon became popular amongst consumers in urban or metropolitan areas. However, the real revolution came in 2010 with the introduction of app based cab aggregators. OLA was launched in 2011 and Uber followed in 2013. With technological advancements and door to door service becoming the industry standard, customers chose the comfort of being able to book a cab with one click and gave a push to app based cab aggregators. With many cab aggregators competing for market share, consumers became demanding and it became difficult to acquire new customers and retain old ones. These app based cab aggregators have seen tremendous potential for growth in countries like India, where population density is high and parking space is a precious commodity. With public transport being over-crowded during peak hours, this convenient mode of transport gained popularity rapidly.

As customers have become more demanding and the market place is flooded with cab aggregators, it’s a challenging job for rental cab services to satisfy the customer. Not only price but service quality also plays an important role in customer satisfaction. Using a smartphone, it’s easy for a consumer to access, compare, evaluate and buy a service. Most of the cab aggregators offer various kinds of services ranging from basic to luxury.

OLA Cabs, is an Indian transportation network company and was started in 2010 in Mumbai by ANI Technologies Pvt. Ltd. It is based on online app based cab aggregator concept. It offers a range of services that include peer-to-peer ridesharing, ride service hailing, taxi and food delivery. As of May 2019, it was valued at $6.2 billion with a variety of venture capitalists like Softbank holding large stakes in the company. Currently it has a network of 15,00,000 drivers across 250 cities.

Uber Technologies Inc. is an American multinational ride-hailing company. It offers peer-to-peer ridesharing, ride service hailing and food delivery. It expanded to the Indian market in August 2013 and began operations in Bangalore. According to a report in 2016, OLA showed to capture 70% of the Indian market.

This research is focused on doing a comparative analysis of the major cab aggregators in India, namely, Uber and OLA on the basis of various brand characteristics.

Methodology

With growing competition, both companies are offering a variety of services to make the consumer’s journey comfortable. The consumer is spoilt with choices and quickly switches over to the one with better offerings. The technique used to carry out the research was a mix of questionnaire and secondary data. It included some multiple choice questions along with a rating scale addressed to the respondents. The two brands were rated on various characteristics common to them. A sample size of 22 was taken which included students, homemakers, businessmen and professionals. Secondary data, on the other, included data collected from published articles, newspaper and the Internet. The respondents were asked to rate both OLA and Uber on a scale of 1 to 5 (with 1 being extremely dissatisfied and 5 being extremely satisfied) on the following characteristics.

  • Ease of use: how easy the app and service it to use;
  • Consumer safety: how safe do the consumers feel while travelling or availing the services;
  • Value for money: how pocket friendly the service is or does the service quality justify its cost;
  • Ease of payment: how easy and simple it is to make payments on the apps;
  • Customer support: do the cab aggregators provide quality customer service or not;
  • Availability: whether the services are readily available or not;
  • Overall service provided: how the overall experience of the respondent is while using the services;
  • Preferred cab aggregator for daily use: which app the respondents will prefer to use in their daily life.

Results and Discussions

According to the data collected from the respondents, majority of them were male (59.1%) and 86.4% belonged to the age group of 18-25 years. Majority of the respondents have completed their Intermediate or Graduation (40.9%). The data collected also suggests that 63.6% of the respondents were students, while 31.8% were either self-employed or salaried professionals. Most of the respondents were aware about various cab aggregators like Uber, OLA, Meru etc.

  1. The data suggests that more people found Uber easier to use than OLA. Majority of the people gave Uber a 4 star rating while OLA got a 3 star or a 4 star rating.
  2. The data suggests that the respondents found Uber to be safer than OLA. Uber fared slightly better than OLA in terms of consumer safety.
  3. The data suggests that the respondents found Uber to be more pocket friendly than OLA. Uber was given 5 star or 4 star ratings for pocket friendliness. On the other hand, a majority gave OLA a 3 star rating.
  4. The data suggests that the respondents found it easier to make payments on Uber than OLA. Uber took the lead in terms of ease of payment and was given a 5 star rating by majority of the respondents. OLA scored a 4 star rating on the contrary.
  5. The data suggests that the respondents preferred Uber’s customer service over OlA’s. Uber got more 5 star rating from respondents as compared to OLA. OLA remained consistent at 4 star ratings.
  6. The data suggests that the respondents found Uber to be more available than OLA. Uber received slightly better ratings than OLA.
  7. The data suggests that most respondents prefer Uber’s service over OLA’s service.
  8. The data suggests that majority of the respondents prefer Uber over OLA for their day to day use.

Conclusion

Companies are attracted to India because of the sheer size of its market and increasing purchasing power resulting in an uplifting lifestyle. However, the consumers are smart, demanding and highly price sensitive. They are also not very brand loyal. This makes managing such a market an extremely difficult task. Companies need to be on their toes, constantly looking out for new opportunities to grab and for areas to innovate. They need to keep on designing new packages or offers to acquire or retain customers. However, this comes at the cost of a huge cash burn. Thus making it difficult for both Uber and OLA to operate. They constantly need to find ways and areas to minimize costs while developing customer centric, innovate and socially acceptable offerings or packages. It is clearly visible from the results that Uber has excelled in gaining popularity in the age group of 18-24 years. It has also successfully designed an easy to use user interface which has helped enrich the user experience. It has also provided for a secure and easy payment gateway which the doesn’t hassle the consumers. Uber’s services are readily available and are deemed safe by the consumers. It also provides for a decent customer support and provides an overall good experience. It has managed to provide this package at reasonable, consumer friendly rates. OLA on the other hand, is equally popular amongst the consumers. However, it scores lower than Uber in terms ease of use, consumer safety, customer service and value for money. Drivers are the image of the brand and misbehaving drivers causes OLA to score less on the overall service experience of the consumer. As a result, very few consumers are likely to prefer OLA over Uber for their daily use. However, OLA has greater market share due it being available at more locations than Uber. ‘Customer is king’ and it is the reason why companies are striving to make customer’s experience the best. This promotes healthy competition which in turn benefits the end user.

Bibliography

  1. https://en.wikipedia.org/wiki/Uber
  2. https://en.wikipedia.org/wiki/Ola_Cabs
  3. https://www.forbes.com/sites/krnkashyap/2016/09/21/its-uber-vs-ola-for-the-battle-of-supremacy-in-the-indian-market/#2ed4dfbbd99f
  4. https://en.wikipedia.org/wiki/Uber
  5. https://en.wikipedia.org/wiki/Ola_Cabs
  6. https://www.forbes.com/sites/krnkashyap/2016/09/21/its-uber-vs-ola-for-the-battle-of-supremacy-in-the-indian-market/#2ed4dfbbd99f
  7. https://www.forbes.com/sites/krnkashyap/2016/09/21/its-uber-vs-ola-for-the-battle-of-supremacy-in-the-indian-market/#2ed4dfbbd99f