Wednesday, October 30, 2019

Smart refrigeter Essay Example | Topics and Well Written Essays - 500 words - 1

Smart refrigeter - Essay Example One benefit of using smart refrigerator is that it can record the date to monitor the perishable food closely (Jin & Li, 2009). The refrigerator has the capability of sending alerts when foods reach a point of spoilage. The alerts can be sent to a computer through or can be displayed on the refrigerator’s screen. With the list of stock in the refrigerator, the smart refrigerator can create possible recipes. If there are some leftover ingredients and one is not sure of what to do with them, this can be a way to dispose of them before they spoil. This essay discusses how the disruptive vs. sustaining innovations can be applied to smart technology. Many organizations usually misunderstand the difference between disruptive and sustaining technology. Sustaining technology is a result of listening to the customers’ needs in the existing market and developing products that satisfy their needs and requirements. On the other hand, disruptive technology develops new markets that are separate to the mainstream, and they are unknown during the time of technology conception. Disruptive technology is known to produce products that are cheaper, smaller, simple, and more convenient use. They are likely to reach new markets that enable their producers grow rapidly. Smart refrigerators use the disruptive technology in the sense that it has been able to reach new markets; its technology has increased rapidly for the last few years. The smart refrigerator uses the RFID technology that is a disruptive technology. In the smart refrigerator, the RFID technology helps to keep track of the inventory. It is possible to oversee what is going a nd out of the refrigerator. Smart refrigerators are cheaper, simpler, and more convenient to use. Destructive technology has also been used to come up with a smart refrigerator technology in a way that customers do not expect. The smart refrigerator applies the sustainable technology

Monday, October 28, 2019

The Types And Techniques Of Steganography Computer Science Essay

The Types And Techniques Of Steganography Computer Science Essay This document focus on an unfamiliar field of study in IT sector i.e. Steganography. This document covers various concepts in Steganography, A brief history of Steganography and introducing few types of techniques available today in Steganography. It also covers other topics like security in Steganography, mobile messaging, MMS Steganography related information. This document closes with a summery and proper solution . The initial footages of Steganography were by the Greek historian Herodotus in hischronicles known as Histories and date back to around 440 BC. Herodotus recorded two stories of Steganographic techniques during this time in Greece. The first stated that King Darius of Susa shaved the head of one of his prisoners and wrote a secret message on his scalp. When the prisoners hair grew back, he was sent to the Kings son in law Aristogoras in Miletus undetected. The second story also came from Herodotus, which claims that a soldier named Demeratus needed to send a message to Sparta that Xerxes intended to invade Greece. Back then, the writing medium was text written on wax-covered tablets. Demeratus removed the wax from the tablet, wrote the secret message on the underlying wood, recovered the tablet with wax to make it appear as a blank tablet and finally sent the document without being detected. Romans used invisible inks, which were based on natural substances such as fruit juices and m ilk. This was accomplished by heating the hidden text, thus revealing its contents. Invisible inks have become much more advanced and are still in limited use today. During the 15th and 16th centuries, many writers including Johannes Trithemius (author of Steganographia) and Gaspari Schotti (author or Steganographica) wrote on Steganagraphic techniques such as coding techniques for text, invisible inks, and incorporating hidden messages in music. Between 1883 and 1907, further development can be attributed to the publications of Auguste Kerckhoff (author of Cryptographic Militaire) and Charles Briquet (author of Les Filigranes). These books were mostly about Cryptography, but both can be attributed to the foundation of some Steganographic systems and more significantly to watermarking techniques. During the times of WWI (World War 1) and WWII (World War 11), significant advances in Steganography took place. Concepts such as null ciphers (taking the 3rd letter from each word in a harmless message to create a hidden message, etc), image substitution and microdot (taking data such as pictures and reducing it to the size of a large period on a piece of paper) were introduced and embraced as great steganographic techniques. In the recent digital world of today, namely 1992 to present, Steganography is being used all over the world on computer systems. Many tools and technologies have been created that take advantage of old steganographic techniques such as null ciphers, coding in images, audio, video and microdot. With the research this topic is now getting a lot of great applications for Steganography in the near future. HOW STEGANOGRAPHY WORKS Steganography replaces unneeded or unused bits in regular computer files (Graphics, sound, text) with bits of different and invisible information. Hidden information can be any other regular computer file or encrypted data. Steganography differs from cryptography in a way that it masks the existence of the message where cryptography works to mask the content of the message. Steganography sometimes used in conjunction with encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered,the hidden information is not seen. . TYPES OF STEGANOGRAPHY There are different ways to hide the message in another, well known are Least Significant bytes and Injection. When a file or an image is created there are few bytes in the file or image which are not necessary or least important. These type of bytes can be replaced with a message without damaging or replacing the original message, by which the secrete message is hidden in the file or image. Another way is a message can be directly injected into a file or image. But in this way the size of the file would be increasing accordingly depending on the secrete message STEGANOGRAPHY IN IMAGE Digital images are the most widely used cover objects for steganography. Due to the availability of various file formats for various applications the algorithm used for these formats differs accordingly. An image is collection of bytes (know as pixels for images) containing different light intensities in different areas of the image. When dealing with digital images for use with Steganography, 8-bit and 24-bit per pixel image files are typical. Both have advantages and disadvantages 8-bit images are a great format to use because of their relatively small size. The drawback is that only 256 possible colors can be used which can be a potential problem during encoding. Usually a gray scale color palette is used when dealing with 8-bit images such as (.GIF) because its gradual change in color would be harder to detect after the image has been encoded with the secret message. 24-bit images offer much more flexibility when used for Steganography. The large numbers of colors (over 16 million) that can be used go well beyond the human visual system (HVS), which makes it very hard to detect once a secret message, has been encoded. Large amount of data can be encoded in to 24-bit images as it is compared to 8-bit images. The drawback of 24-bit digital images is their size which is very high and this makes them suspicious our internet due to their heavy size when compared to 8-bit images. Depending on the type of message and type of the image different algorithms are used. Few types in Steganography in Images: Least significant bit insertion Masking and filtering Redundant Pattern Encoding Encrypt and Scatter Algorithms and transformations Least significant bit insertion Least Significant Bit (LSB) insertion is most widely known algorithm for image steganography ,it involves the modification of LSB layer of image. In this technique,the message is stored in the LSB of the pixels which could be considered as random noise.Thus, altering them does not have any obvious effect to the image. Masking and filtering Masking and filtering techniques work better with 24 bit and grey scale images. They hide info in a way similar to watermarks on actual paper and are sometimes used as digital watermarks. Masking the images changes the images. To ensure that changes cannot be detected make the changes in multiple small proportions. Compared to LSB masking is more robust and masked images passes cropping, compression and some image processing. Masking techniques embed information in significant areas so that the hidden message is more integral to the cover image than just hiding it in the noise level. This makes it more suitable than LSB with, for instance, lossy JPEG images. Redundant Pattern Encoding Redundant pattern encoding is to some extent similar to spread spectrum technique. In this technique, the message is scattered through out the image based on algorithm. This technique makes the image ineffective for cropping and rotation. Multiple smaller images with redundancy increase the chance of recovering even when the stegano-image is manipulated. Encrypt and Scatter Encrypt and Scatter techniques hides the message as white noise and White Noise Storm is an example which uses employs spread spectrum and frequency hopping. Previous window size and data channel are used to generate a random number.And with in this random number ,on all the eight channels message is scattered through out the message.Each channel rotates,swaps and interlaces with every other channel. Single channel represents one bit and as a result there are many unaffected bits in each channel. In this technique it is very complex to draw out the actual message from stegano-image. This technique is more secure compared to LSB as it needs both algorithm and key to decode the bit message from stegano-image. Some users prefer this methos for its security as it needs both algorithm and key despite the stegano image. This method like LSB lets image degradation in terms of image processing, and compression. Algorithms and transformations LSB modification technique for images does hold good if any kind of compression is done on the resultant stego-image e.g. JPEG, GIF. JPEG images use the discrete cosine transform to achieve compression. DCT is a lossy compression transform because the cosine values cannot be calculated exactly, and repeated calculations using limited precision numbers introduce rounding errors into the final result. Variances between original data values and restored data values depend on the method used to calculate DCT STEGANOGRAPHY IN AUDIO Implanting secrete message into an audio is the most challenging technique in Steganography. This is because the human auditory system (HAS) has such a vibrant range that it can listen over. To put this in perspective, the (HAS) recognize over a range of power greater than one million to one and a range of frequencies greater than one thousand to one making it extremely hard to add or remove data from the original data structure. The only weakness in the (HAS) comes at trying to differentiate sounds (loud sounds drown out quiet sounds) and this is what must be exploited to encode secret messages in audio without being detected. Below are the lists of methods which are commonly used for audio Steganography. LSB coding Parity coding Phase coding Spread spectrum Echo hiding LSB coding Using the least-significant bit is possible for audio, as modifications usually would not create recognizable changes to the sounds. Another method takes advantage of human limitations. It is possible to encode messages using frequencies that are indistinct to the human ear. Using frequencies above 20.000Hz, messages can be hidden inside sound files and can not be detected by human checks. Parity coding Instead of breaking a signal down into individual samples, the parity coding method breaks a signal down into separate regions of samples and encodes each bit from the secret message in a sample regions parity bit. If the parity bit of a selected region does not match the secret bit to be encoded, the process flips the LSB of one of the samples in the region. Thus, the sender has more of a choice in encoding the secret bit, and the signal can be changed in a more unobtrusive fashion. Phase coding Phase coding attends to the disadvantages of the noise inducing methods of audio Steganography. Phase coding uses the fact that the phase components of sound are not as audible to the human ear as noise is. Rather than introducing perturbations, this technique encodes the message bits as phase shifts in the phase spectrum of a digital signal, attaining an indistinct encoding in terms of signal-to-perceived noise ratio. Spread spectrum In the context of audio Steganography, the basic spread spectrum (SS) method attempts to spread secret information across the audio signals frequency spectrum as much as possible. This is comparable to a system using an implementation of the LSB coding that randomly spreads the message bits over the entire audio file. However, unlike LSB coding, the SS method spreads the secret message over the sound files frequency spectrum, using a code that is independent of the actual signal. As a result, the final signal occupies a bandwidth in excess of what is actually required for broadcast. Echo hiding In echo hiding, information is implanted in a sound file by introducing an echo into the separate signal. Like the spread spectrum method, it too provides advantages in that it allows for a high data transmission rate and provides superior strength when compared to the noise inducing methods. If only one echo was produced from the original signal, only one bit of information could be encoded. Therefore, the original signal is broken down into blocks before the encoding process begins. Once the encoding process is completed, the blocks are concatenated back together to create the final signal. STEGANOGRAPHY IN VIDEO In video steganography, a video file would be embedded with supplementary data to hide secret messages. In the process, an intermediate signal which is a function of hidden message data and data of content signal would be generated. Content data (video file) is then combined with this intermediate signal to result encoding. The supplementary data can include copy control data which can be brains by consumer electronic device and used to disable copying. The intermediate signal may also contain a pseudo arbitrary key data so as to hide encoding and decode needs corresponding key to extract hidden information from encoded content. In some implementations regulation data is embedded in the content signal with auxiliary data. This regulation data consists of known properties enabling its identification in the embedded content signal. This encoding is robust against scaling, resampling and other forms of content degradation, so that the supplementary data can be detected from the content which might have been degraded. There are different approaches for video steganography apart from the above mentioned. Most widely known are listed and discussed below. Least Significant Bit Insertion This is the most simple and popular approach for all types of steganography. In this method the digital video file is considered as separate frames and changes the displayed image of each video frame. LSB of 1 byte in the image is used to store the secret information. Effecting changes are too small to be recognized by human eye. This method enhances the capacity of the hidden message but compromises the security requirements such as data integrity. Real time video steganography This kind of steganography involves hiding information on the output image on the device. This method considers each frame shown at any moment irrespective of whether it is image; text .The image is then divided into blocks. If pixel colors of the blocks are similar then changes color characteristics of number of these pixels to some extent. By labeling each frame with a sequence number it would even be easy to identify missing parts of information. To extract the information, the displayed image should be recorded first and relevant program is used then. STEGANOGRAPHY IN DOCUMENT Steganography in documents just focuses on altering some of its characteristics. They can either be characteristics of text or even text formatting. Below are few ways listed and discussed to implement the same. Since everyone can read, encoding text in neutral sentences is doubtfully effective. But taking the first letter of each word of the previous sentence, one can see that it is possible and not very difficult. Hiding information in plain text can be done in many different ways. One way is by simple adding white space and tabs to the ends of the lines of the document .The last technique was successfully used in practice and even after a text has been printed and copied on paper for ten times, the secret message could still be retrieved. Another possible way of storing a secret inside a text is using a publicly available cover source, a book or a newspaper, and using a code which consists for example of a combination of a page number, a line number and a character number. This way, no information stored inside the cover source leads to the hidden message. Discovering it depends exclusively on gaining knowledge of the secret key. Setting background color and font color is one of the mainly used staganographic approach. This method is focused for Microsoft word documents. Choose predefined colors and set font and background colors of invisible characters such as space, tab or the carriage return characters. R,G,B values are 8 bits means we have allowed range of 0 to 255.Most of the viewers would not feel interested about color values of these invisible characters hence 3 bytes of information is easily hidden in each occurrence of space,tab or carriage return.This approach needs no extra information to hide required bits. SECURITY IN STEGANOGRAPHY PURE KEY STEGANOGRAPHY Pure Steganography is a Steganography system that doesnt require prior exchange of some secret information before sending message; therefore, no information is required to start the communication process: the security of the system thus depends entirely on its secrecy .The pure Steganography can be defined as the quadruple (C, M, D, and E) where: C: the set of possible covers. M: the set of secret massage with |C| à ¢Ã¢â‚¬ °Ã‚ ¥ |M|. E: CÃÆ'-Mà ¢Ã¢â‚¬  Ã¢â‚¬â„¢C the embedding function. D: Cà ¢Ã¢â‚¬  Ã¢â‚¬â„¢M of the extraction function with the property that D (E(c,m))=m for all m à Ã¢â‚¬Å¾ M and c à Ã¢â‚¬Å¾ C. Cover (C) Message (M) Embedding (E) Extracting (D) Strgo-Object Message(M) In most applications, pure Steganography is preferred, since no stego-key must be shared between the communication partners, although a pure Steganography protocols dont provide any security if an attacker knows the embedding method PRIVATE KEY STEGANOGRAPHY A Private Key Steganography system is similar to a symmetric cipher, where the sender chooses a cover and embeds the secret message into the cover using a secret key. If the Private Key used in the embedding process is known to the receiver, he can reverse the process and extract the secret message. Anyone who doesnt know the Private Key should not be able to obtain evidence of the encoded information. The Private Key Steganography can be defined as the quintuple (C, M, K, DK, and EK) where: C: the set of possible covers. M: the set of secret message. K: the set of secret keys. Ek: CÃÆ'-MÃÆ'-Kà ¢Ã¢â‚¬  Ã¢â‚¬â„¢C With the property that DK (EK(c,m,k),k)=m for all m à Ã¢â‚¬Å¾ M, c à Ã¢â‚¬Å¾ C and k à Ã¢â‚¬Å¾ K KEY KEY Strgo-Object Cover (C) Embedding (E) Message (M) Extracting (D) Message (M) PUBLIC KEY STEGANOGRAPHY Public key Steganography does not depend on the swapping of a private key. It necessitates two keys, one of them private (secret) and the other public: the public key is stored in a public database, whereas the public key is used in the embedding process. The Private Key is used to reconstruct the secret message One way to build a public key Steganography system is to use a public key crypto system. The sender and the receiver can exchange public keys of some public key cryptography algorithm before imprisonment. Public key Steganography utilizes the fact that the decoding function in a Steganography system can be applied to any cover, whether or not it already contains a secret message. The public key Steganography relies on the fact that encrypted information is random enough to hide in plain sight. The sender encrypts the information with the receivers public key to obtain a random-looking massage and embeds it in a channel known to the receiver, thereby replacing some of the natu ral arbitrariness with which every communication process is accompanied. Assume that both the cryptographic algorithms and the embedding functions are publicly known. The receiver who cannot decide a priori if secret information is transmitted in a specific cover suspect the arrival of message and simply try to extract and decrypt it using his private key. If the cover actually contained information, the decryption information is the senders message OTHER TYPES MOBILE MESSAGING STEGANOGRAPHY Mobile Messaging Service enables mobile users to send and receive messages containing image, audio and video. These messages are exchanged ultimately through a component known as Mobile Switching Center. MMS messages have several benefits like communicating even when the server is busy, exchanging messages while making calls, sending offline messages. They also provide services like eCommerce. As there is possibility of disclosure of confidential and personal information between various systems, information security has got immense importance. MMS Steganography provides confidentiality and integrity with subtle unremovability.Users can profit from concealed channels in order to send and receive hidden messages and keys. Multimedia objects may contain hidden information embedded to them using steganography techniques. The steganography technique used must satisfy following: Reliability of secreted information after it has been embedded inside the content should be correct. Content object should remain intact or almost unchanged to the human eyes. There can be mainly two types of steganography techniques possible for MMS objects. Fragile steganography comprises of implanting information into a file which is destroyed if the file is modified. Video Technique: Works over video files. Combinations of sound and image techniques are used to implement this as whole. The scope of adding lots of data is much greater. Sound Technique: Works over audio files like Mp3 files. Encode data as binary to sound like noise and can be identified by receiver with correct key. Data being added is in narrow bandwidth compared to the medium. Robust techniques aim to embed information into a file which cannot easily be destroyed. Image Hiding: Works over images. Lease Significant Bit Least significant bits of each pixel in one image are used to hide the most significant bits of another. Simple and easy way of information hiding. Direct Cosine Transform Transformed DCT coefficients would be altered. Image would be made robust by scattering the hiding information evenly. Wavelet Transform Dividing whole image into small wavelets and then hide the information. Coefficients of wavelets are altered with tolerable noise. Text Technique: Works over documents.Just by changing some of the characteristics of the content information can be embedded. Alterations would not be visible to user. As MMS Steganography becomes more widely used now there must be a clear definition of robustness. This definition helps to prevent detection and removal of embedded data. Below are the few properties a good technique should hold: Quality of media should not perceptibly degrade after embedding secret data. Secret data should be imperceptible with out secret knowledge, typically the key. If several data are there, they should not hamper with each other. Secret data should survive which dont degrade the perceived quality of work. MMS STEGANOGRAPHY RELATED WORK As MMS carries multi formatted data such as Text, Audio, Video and images, it has got more chances of sending secret messages and can implement various methodologies in order to keep the message safe and secret. Currently this study is all about Text and Video based Steganography. An MMS capable mobile with inbuilt cameras and customized applications has high importance in terms of steganography creation and extraction Capacity Efficiency Processing time Resource time consumption Advantage Text technique Less More Less Less Easy and simple to implement Video technique More More More More Holds lot of information compared to text technique Table -1- comparison between Text and Video steganography Techniques PROPER SOLUTION MMS Messages can hold any of video, audio, image and text encapsulated with in Synchronized Multimedia Integration Language (SMIL) . The recommended steganography deals with three major parts of MMS which can provide us with maximum capacity possible and not compromising main aim which is total security. The most important issues in steganography are secrecy, payload, robustness and speed. Below steps describes proposed steganography working model: First part of the process hides stegno key in SMIL using white space algorithm. Then Least Significant Bit algorithm is used to hide the secret message in video. Rest of the information would be hidden inside text of the MMS using abbreviation algorithm. Ratio of information hiding in video part to text part is 6:1 hence I bit stored in text corresponds to 6 bits stored in 3gp video. High security can be granted with reasonable processing speed and without affecting the performance of mobile. 2.10 CHAPTER SUMMERY This document is all about available Steganography techniques and methodologies. It has listed down the various methodologies and their uses. Along with these, it has also included about the MMS Steganography importance and ways to do that.

Friday, October 25, 2019

Ed Gein :: Free Essays

Ed Gein The people of Plainfield, considered Ed Gein a gentle man who everybody trusted. Ed had a very strict childhood. His father died when he was very young. His mother then decided that she would raise her children and not marry or be involved in any relationship. Mrs. Gein told Ed and his brother Henry that all women were bad and that sex would lead to heart breaks and diseases. Later in life, Ed confessed he felt his mother was good in every manner (deranged,wierd,sick, http.//www.deranged.com). Authorities suspected he had a sexual relationship with his mother. Within a matter of time Ed's mother and brother had died, leaving Ed desolate on a farm which didn't even have electricity. Ed worked odd jobs like a handyman and baby-sitting. In his free time, Ed conducted psychotic experiments. Fascinated with the female body, Ed often indulged himself in anatomical textbooks. To actually see and feel for himself, he went to the graveyard and exhumed several bodies, including his mothers'. H e found pleasure in handling dead women's sex organs. Even worse, he skinned the corpses and dissected the bodies. The inventory inside his home consisted of heads, hearts, livers, intestines, and skin scattered about. At night he would take off all of his clothes, put on his mothers skin, and dance around the house. Seeking yet more sexual gratification Ed made furniture and musical instruments from body parts. Some of these items included lampshades, tom toms, and bracelets. Gein then moved on to killing other people. Even though he only killed two women (Mary Hogan and Bernice Wordan), Ed was still considered a serial killer. After killing Bernice Wordan, the evidence left behind lead to Ed Gein. When the authorities arrived they were welcomed by an assortment of human artifacts. Shrunken heads, drinking glass skulls, and skin furniture. Ed didn't realize that what he had done was wrong so he invited the police in for coffee. Ed Gein :: Free Essays Ed Gein The people of Plainfield, considered Ed Gein a gentle man who everybody trusted. Ed had a very strict childhood. His father died when he was very young. His mother then decided that she would raise her children and not marry or be involved in any relationship. Mrs. Gein told Ed and his brother Henry that all women were bad and that sex would lead to heart breaks and diseases. Later in life, Ed confessed he felt his mother was good in every manner (deranged,wierd,sick, http.//www.deranged.com). Authorities suspected he had a sexual relationship with his mother. Within a matter of time Ed's mother and brother had died, leaving Ed desolate on a farm which didn't even have electricity. Ed worked odd jobs like a handyman and baby-sitting. In his free time, Ed conducted psychotic experiments. Fascinated with the female body, Ed often indulged himself in anatomical textbooks. To actually see and feel for himself, he went to the graveyard and exhumed several bodies, including his mothers'. H e found pleasure in handling dead women's sex organs. Even worse, he skinned the corpses and dissected the bodies. The inventory inside his home consisted of heads, hearts, livers, intestines, and skin scattered about. At night he would take off all of his clothes, put on his mothers skin, and dance around the house. Seeking yet more sexual gratification Ed made furniture and musical instruments from body parts. Some of these items included lampshades, tom toms, and bracelets. Gein then moved on to killing other people. Even though he only killed two women (Mary Hogan and Bernice Wordan), Ed was still considered a serial killer. After killing Bernice Wordan, the evidence left behind lead to Ed Gein. When the authorities arrived they were welcomed by an assortment of human artifacts. Shrunken heads, drinking glass skulls, and skin furniture. Ed didn't realize that what he had done was wrong so he invited the police in for coffee.

Thursday, October 24, 2019

Where to use mean, median or mode to make a decision

Measures of average are also called measures of central tendency. Their purpose is to provide a numerical figure which may describe the level of entire distribution. For example let five students be awarded marks as follows. 10, 11,9,12 and 13. All these scores are different from each other but at least there is one such score to which the rest of the scores standby or nearby. There are three measures of central tendency as follows; mean, median and mode (Srivastava et al. , 1989). These are used at different occasions when making a decision for example when the administration of the state is requiring to collect and analyze data related to population and material wealth of the country for the purpose of planning and finance. Mean can be used when making the instructional decisions. This can be used by a teacher to get the knowledge about the student’s entry behavior and background; in this case the distribution should be normal meaning all the scores should be present. By getting the mean of the student’s scores, the teacher will be able to identify the teaching technique to use according to their strengths and weaknesses. Consequently, the mean should be used when the teacher is evaluating the degree to which the objectives have to be achieved so that he/she will be able to encourage good study behavior among the students. Incase the scores are scattered the mean must be used so that all the scores are brought together to enable decision making to take place may be about the performance. Median should be used for guidance decisions. Students should be guided in their vocational choices; educational performance and their personal problems therefore median can be used to determine the average performer in class and can be advised accordingly. At the same time, median is used to make guidance decisions especially when a quick and easily computed measure is required to provide the data about significant characteristics which can help a certain group of people to understand themselves better. Mode should be used in research decisions in the sense that for any research to be carried out there must be collecting of the data on the issue at hand. After collecting the data, scoring, and analysis should be done and interpretation of the whole information given. When the information is incomplete mode must be used. It is also used when one wants to know the fashion of the most recurring measure or score.

Wednesday, October 23, 2019

Bread Mold Experiment Lab Report

Title: Bread Mold Lab Purpose: The purpose of this lab was to test the effect of water on bread mold growth. Hypothesis: I hypothesized bread mold would grow faster if the bread was exposed to water. Materials: BreadPlastic cupWaterRubber bandPlastic wrapLightScaleSeizers Procedures: Day 1.Cut two pieces of bread 1 by 1Place the beard in two separate cupsPut 11 drops of water on one of the pieces of breadCover cups with plastic wrapPut rubber bands around each cupPlace cups on scale to weigh themDay 2. Observe the mold or any changes to the breadReweigh bread to see the difference in weightRecord your dataDispose of the bread and/or of the moldData: Both pieces of bread were stale. There was no bread mold on ether pieces of bread. The bread stayed the same size. No change in the color of the bread. Weight of bread before and after a week: Before one week: 5. 5 grams After one week: 5. 5 grams Dry bread: 5. 5 grams Moist bread: 6. 0 grams Questions: 1. What does your data show about the effect of your Variable on Rhizopus growth?The data from my experiment show that 11 drops of water does not help the growth of bread mold. Â  2. Were you surprised by the results of your experiment?Yes, I was surprised because I thought water would accelerate the growth of bread mold. Â  3. What part of designing and carrying out an experiment did you find difficult?This was not that hard of an experiment, I did not find one part to be more difficult than the any of the other parts. Â  4. If you were to do further research into bread mold growth, which of the other variables would you be interested in testing.I would be interested in air as a variable because I think it affected my research on water and bread mold. Â  Conclusion: The data does not support my hypothesis on water making bread mold grow faster. I don’t think this was a good experiment because we put the bread in an airtight cup by covering the top with plastic wrap and putting a rubber band around it. If this was useable data it would show the 11 drops of water was not near enough water to make bread mold grow any faster.