Monday, September 30, 2019

The Witch of Blackbird Pond: A Puritan Style of Teaching

The book, The Witch of Blackbird Pond, is about a young girl named Katherine who is forced to leave her elegant home in Barbados to live with relatives in puritan New England after her grandfather†s death. Katherine has a hard time accepting the dramatic difference between the two cultures. For instance, in the beginning of the book Katherine dives into the river to retrieve a toy for a child on the boat. The New Englanders aboard the ship stare at her with disapproval because they were not accustomed to women that knew how to swim. By the end of the book Katherine is charged as a witch because she chose to befriend a Quaker woman and refused to totally reform to the puritan way of life. Education plays a big role in this book in two ways. This novel shows the puritan style of teaching. It also describes the Puritan view of who and what education was meant for. One of Katherine†s jobs during her time in New England was to teache in a dame school. In her class she was suppose to teach the children their alphabet and basic reading skills. The proper way to teach the children was through memorization and repetition. Katherine found this teaching style boring and less effective than her own teaching style which used poetry and acting to keep children† attention. One of Katherine's lesson plans got out of hand. She had the children act out a part of the Bible and it created a fight between a few of the students. As the disruption occurred the head master of the school walked in to the room. He was mortified not only at the misbehavior of the children but also at the activity Katherine had created. Katherine was fired as a result of this incident. This part of the book showed that puritans taught through repetition and memorization and frowned on creativity in the classroom. It is also apparent how much influence their religion had on education. I another part of the book Katherine decides to teach a child, who is unable to go to school, to read. Katherine used a hornbook and later the Bible to teach the child. This part of the story shows the two main materials used to teach children at this time. It also points out that not all children were allowed to go to school. This book gives a good example of how children were taught during the 17th century in the New England colonies. You can also see that religion had a great influence on education during this time period. By reading this book I have realized how much the education system has changed, and in my opinion improved, since this country†s beginning. The Witch of Blackbird Pond: A Puritan Style of Teaching The book, The Witch of Blackbird Pond, is about a young girl named Katherine who is forced to leave her elegant home in Barbados to live with relatives in puritan New England after her grandfather†s death. Katherine has a hard time accepting the dramatic difference between the two cultures. For instance, in the beginning of the book Katherine dives into the river to retrieve a toy for a child on the boat. The New Englanders aboard the ship stare at her with disapproval because they were not accustomed to women that knew how to swim. By the end of the book Katherine is charged as a witch because she chose to befriend a Quaker woman and refused to totally reform to the puritan way of life. Education plays a big role in this book in two ways. This novel shows the puritan style of teaching. It also describes the Puritan view of who and what education was meant for. One of Katherine†s jobs during her time in New England was to teache in a dame school. In her class she was suppose to teach the children their alphabet and basic reading skills. The proper way to teach the children was through memorization and repetition. Katherine found this teaching style boring and less effective than her own teaching style which used poetry and acting to keep children† attention. One of Katherine's lesson plans got out of hand. She had the children act out a part of the Bible and it created a fight between a few of the students. As the disruption occurred the head master of the school walked in to the room. He was mortified not only at the misbehavior of the children but also at the activity Katherine had created. Katherine was fired as a result of this incident. This part of the book showed that puritans taught through repetition and memorization and frowned on creativity in the classroom. It is also apparent how much influence their religion had on education. I another part of the book Katherine decides to teach a child, who is unable to go to school, to read. Katherine used a hornbook and later the Bible to teach the child. This part of the story shows the two main materials used to teach children at this time. It also points out that not all children were allowed to go to school. This book gives a good example of how children were taught during the 17th century in the New England colonies. You can also see that religion had a great influence on education during this time period. By reading this book I have realized how much the education system has changed, and in my opinion improved, since this country†s beginning.

Sunday, September 29, 2019

A Case Study on Formulation of the Information Strategy of Timberlodge Essay

Information strategy is an integral part of a business plan to improve the computer/communications architectures, hardware, software, peripherals, and training. The mentioned changes are targeted at refining business operations (Betz, 396). Accordingly, Timberlodge has benefited from restructuring of the technical aspect specifically its software/hardware architectures. Information strategy (IS) of Timberlodge should yield competitive advantage at a lower cost and higher profitability. IS is composed of three components namely information system (IS) strategy, information technology (IT) strategy, and information management (IM) strategy. In Timberlodge’s case study, they are looking to adapt the same innovative and technological approach into the product area of figurines based on the production driven by demand. The said aim is considered to be the company’s IS Strategy. Given the long business and supplier relationship of Timberlodge and Potterville, the company can meet halfway by integrating the new automated production processing system in their existing factory at Potterville. See more: Homeless satire essay In this way, the company and its highly skilled, experienced, and loyal workforce at Potterville that makes up the IM strategy. The company can make use of the same tool called KAPS Associates’ Systems Planning and Analytical Tool (SPLAT) as its IT strategy. Timberlodge can continue to achieve higher production through efficient, automated production system by integrating the new information technology into the traditional set up. The possible adverse publicity of the closure of its factory in Potterville can be avoided through adapting the new technology and retraining of the staff in Potterville. Timberlodge should also consider their loyalty and long standing job employment with the company. While these people are highly skilled, the new automated system requires low skilled people. Thus, workers must be re-assessed and rehired based on their skills.

Saturday, September 28, 2019

Evaluating and reviewing a piece of pop culture Essay

Evaluating and reviewing a piece of pop culture - Essay Example haps this is the reason why it is so popular because it has a subliminal message that an average guy just like Chuck and everyone else’s could become a super spy through an unexpected circumstance. The weakness of the TV series is that it defies logic and not based on sound science. For example, how could the CIA possibly build a labyrinth of headquarters at Nerd Herd’s basement without being notice by somebody? And also, there is no scientific basis that a person can remember everything (being an intersect) by just opening an email. The TV series became popular because it brought down spy culture to the understanding of the masses. The general audience was able to relate how the life of an average person could turn into a highly adventurous, explosive and secretive life by being a spy. Chuck’s dilemma on how to keep his identity and to fulfill the function of a spy also tickles the fancy and imagination of the audience that made it popular. Because of the theme of the film which is espionage and action, the main audiences of the film are mainstream males who are into espionage films. They can relate themselves as Chuck doing extra ordinary things even if they are just a regular guy. The value of the series is the ability of the main character Chuck, to relate to the subliminal aspiration of an average male to do adventure and secretive work by being a spy. It differentiated from other TV series of the same genre as it strips the work of being a spy as unattainable and making it a possibility as portrayed in the TV series Chuck. Whereas other TV series of the same genre portrays the role of a spy to require superhuman ability such as superior intelligence and athleticism, Chuck removed this barrier by just requiring the protagonist to be at the right place and at the right time and able to do the same and even better by just being lucky. If this will be translated to a game just like other spy films, this will prove to be interesting as those

Friday, September 27, 2019

Financial and Resource Management Essay Example | Topics and Well Written Essays - 3500 words

Financial and Resource Management - Essay Example Therefore the net cost of training amounts to $60 only. But this is a good arrangement as it will save the time taken for the repair of the machine thereby keeping the revenues flowing. As per the Quantitative analysis tools like NPV, IRR etc the new investment proposal is viable. A forecast of the revenue for the four year period highlights that the new investment will generate positive net cash flows. The Leisure and Health Club, the gym facility at Bombay Excelsior is planning to refurbish itself to keep in line with Excelsior International standards. For this the club plans to purchase new equipments, as the equipments currently in use do not meet quality requirements. For the purchase of equipments the hotel has a number of options- it can either buy the equipments outright or it can take a lease. The budgets are designed to direct the organization towards the achievement of the business objectives. There can be three types of budgeting approaches like Incremental Budgeting, Zero-based budgeting and Mixed Approach. The Incremental budgeting is based on the estimates of the last year, Zero-based budgeting is done afresh and Mixed Approach, as the name implies, comprises the elements of both the incremental and zero-based budgeting. The budgeted estimates are then compared with the actual results to identify any deviations. In the event of unfavourable or adverse variance corrective action is initiated. In the financial year 2009 Bombay Excelsior estimated a Total Income of $7421200. But the actual income during the period was $6817500. This shows that there is an Unfavourable variance in the estimated Total Income of $603900. The highest deviation in this regard has been in the case of Room Revenue and Food Revenue whereas actual Beverage and Other Revenue match their budgeted projections. In December 2009 the Planned Total Income was

Thursday, September 26, 2019

Leadership and Management Development Essay Example | Topics and Well Written Essays - 2250 words

Leadership and Management Development - Essay Example As the paper discusses  the dynamism in technology and the overall globalization are attributable to the leadership and management styles in today’s organizations, particularly the corporation under consideration. For instance, Barclays bank has an intensive structure of communication from a centralized point. The global operations of Barclays are monitored from a central location. This has been made possible by embracing technology in networking and programming. In fact, the bank’s management is able to monitor millions of transaction daily. This is one of the primary benefits of technology. This study observes that, Barclays bank embraces a considerable level of virtual management compared to physical. The bank has edged competitively in the banking and investment industries through apt leadership and management skills, which are in line with the latest technological trends.From the discussion it is clear that  Barclays bank’s leadership and management cons ist of numerous departments and sub-departments that act as the overall administration unit of the bank. Some researchers term it as the heart beat of the company. It oversees and coordinates all the activities of the bank in a daily basis. In fact, its absence literally implies absence of the bank’s transactions.  The primary function of the management and leadership team of any organization is to work to ensuring high level of alignment between the company’s structure and the attributed strategies intended for execution.... Some researchers term it as the heart beat of the company (LEES, 1992). It oversees and coordinates all the activities of the bank in a daily basis. In fact, its absence literally implies absence of the bank’s transactions. Consider the following structure. Courtesy of Mumford A. and Gold, J. (2006) Management Development: Strategies for Action, London, CIPD Management Strategy and structure alignment at Barclays bank The primary function of the management and leadership team of any organization is to work to ensuring high level of alignment between the company’s structure and the attributed strategies intended for execution. Alignment of the two instruments is fundamental in the overall realization of a firm’s objectives (MULLINS, 2010). For the case of Barclays bank, strict flow of information in both vertical and horizontal directions as illustrated in the management structure remains the core priority. It enables proper conveyance of information of emerging t rends in diverse sectors of the firm. Such information needs to be relayed frequently due the ever-dynamic business milieu (SCHEIN, 1989). Effective managers should apply informal managerial skills to ensure interactive culture with all the stakeholders to facilitate effective leadership that is characterized by inclusiveness. Management and leadership operations As depicted from the structure above, the Barclays bank’s leadership has become more challenging due to the global dynamism that the industry is facing today. The company has become more flexible to change, responsive and less structured (PERREN, & BURGOYNE, 2002). While the CEO’s have remained the ultimate authority, the bank continues to depend on

Wednesday, September 25, 2019

Faculty role Essay Example | Topics and Well Written Essays - 750 words

Faculty role - Essay Example Accreditation has the role of validating that a program or an institution meets minimum standards; nonetheless, it does not offer an indication of the degree of program quality in relation to other programs. Program review is done internally at a time interval of every 5-10 years, and considering a broad range of quantitative and qualitative indicators, designed to offer feedback for program improvement. Finally, program assessment is done by public agencies and organizations, where each might require reporting against a particular set of indicators (Shpritz & O'Mara, 2006). Assessment generally focuses on results, entails a narrower set of measures and is always continuous rather than periodic. In this paper out of the many accrediting organizations, we explore Commission on Collegiate Nursing Education (CCNE) and out of the two recognition bodies: US Department of Education-government regulation and council of Higher-Education Accreditation (CHEA)-self-regulation we explore the lat ter. Council of Higher-Education Accreditation (CHEA) In a nutshell, this organization is responsible of accrediting the accreditors of higher education in the US. The national organization was established to take this responsibility after the academy performed it own review of augmenting numbers of accreditors. This is generally referred to as self-regulation, as the academy is regulation itself (Myrick & Yonge, 2007). Nonetheless, accreditation of other accrediting bodies ends reality of the academy regulation, which comprises of the federal government accreditation of accrediting bodies via the department of Education. In doing so, accountability is sought via reliance upon accreditation to perform the evaluation of individual programs and institutions in an almost boundless sea of â€Å"mission†. This accountability is largely sought via evaluation of literally various transactions (assessment of learning, costs, and jobs for graduates, graduation rates) which legislation as well as regulations requires for qualification as an accrediting body commendable of opening gates to benefit from government funding. There are about 20 accrediting bodies responsible for the accreditation of institutions as well as 62 bodies responsible for the accreditation programs (such as in medicine, health professions, and law). The accrediting bodies are independent, non-governmental, as well as non-profit making organization being funded by mainly through annual subscriptions from programs and institutions. The accrediting organizations design minimum requirements, which should be satisfied in order to receive accreditation. Programs and institutions carry out self-studies basing on the standards. They are then reviewed by peers within the profession and via visiting sites and team reports. The accrediting bodies make judgments that are standard referenced via their decision-making commissions leading to awarding or denying accreditation status. Programs and institutio ns undergo periodic review for maintaining accredited status that is needed for accessing the federal and state funds. However, it should be noted that not all organizations are regulated by CHEA. Higher education and accreditation initiate, and drives change in regulation equation by discovering ways to meet the demands of accountability whereas maintaining, to the greatest level possible, the ingredients it deems vital, namely, self-regulation, institutional autonomy and academic freedom (Myrick &

Tuesday, September 24, 2019

Critical Legal Thinking Case Article Example | Topics and Well Written Essays - 500 words

Critical Legal Thinking Case - Article Example This means that a corporation cannot be criminally liable for acts committed by a representative outside the scope of his employment. In law, the representative would be said to have on a frolic of their own. b) When the crime committed is crime that cannot be punished through fines. This is due to the principle that a company cannot be jailed or even punished by corporal punishment. The only punishment available will be a fine. The most common criminal penalty imposed against the corporation is a fine. For this purpose a corporation would be fined a certain amount of money depending on the capital nature of the crime so committed. A corporation would be fined if it commits certain acts which are punishable by fine or if the corporation tolerates the actions of its representatives. Consequently, punishment can be imposed to the perpetrator of the crime but shared amongst other innocent parties. This will be in form of a reduction of wages/salary available to all employees. It also results in reduction of profits hence dividends payable to the shareholders. The corporation can also be punished by way of a forced winding up.

Monday, September 23, 2019

Electromagnetic Waves Principles Assignment Example | Topics and Well Written Essays - 1250 words

Electromagnetic Waves Principles - Assignment Example The waves are usually emitted and absorbed by charged particles. This is exactly how the radio waves are usually transmitted in wireless communication. The waves have got both the magnetic as well as the electric field oscillating perpendicularly to each other and also perpendicular to the direction of wave propagation. Radio waves are usually in the range of 10 kHz to 100 GHz. The smaller ranges of the radio waves are usually used in the deep space telecommunication. However, the frequency as well as the wavelength of a propagated electromagnetic wave depends on its source. The electromagnetic spectrum is the range of all the types of the electromagnetic radiation. Radiation is the type of energy that travels while spreading out as it goes. Some electromagnetic spectrum is invisible to the naked eye. However, they all have the properties of frequency and wavelength. The frequency of the electromagnetic spectrum is defined as the number of cycles of a wave that passes a particular point in one second. It is measured in Hertz. On the other hand, the wavelength of the electromagnetic spectrum is defined as the distance from the peak of a particular wave to the next one. It is measured in meters. The two attributes are however inversely proportional to each other. The longer the wavelength of the electromagnetic spectrum is, the smaller the frequency of the spectrum and vice versa. However, the shorter the wavelength of the electromagnetic spectrum, the more energetic is the light. The frequency and wavelength of the electromagnetic spectrum are related in a precise mathematical formula. The wavelength is normally expressed by the Greek letter lambda (ÃŽ »). On the other hand, the frequency of the electromagnetic spectrum is usually expressed as nu (ÃŽ ½). Their relationship is therefore expressed as: a.) Radio frequency is the rate of oscillation of waves between the ranges of 3 kHz to 300Â  GHz. Very low

Sunday, September 22, 2019

Prophet Mohammad Essay Example for Free

Prophet Mohammad Essay If I could travel back in time to meet a famous person from history, I would want to meet with Prophet Mohammad. He is well known across the world as the person who brought the Islamic religion to the Arab countries. His teachings can be found in the Holy Quran (Madelung, 87). It is said in Islam that Mohammed is the last of all the prophets God will send to all the people on the earth. Mohammed is very famous because he brought a religion to the world by the orders of God and in only a short time, it became well known everywhere. Even today, there are over 1 billion people in the world who are Muslims. Only a great person like Mohammed could have created a religion in his lifetime that would have captured the attention of all people. Islam started when God sent down angel Gabriel to Mohammed at the mountain Hara. He was first told, Okra which means read. The amazing part about this is Mohammed could never read nor write before meeting the angel. From this time at 40 years old until he was 63 years of age, he received many rules and wisdom from God. His instructions were to advise the people of Gods rules and how they should live, for they were living in haram or sin (Watt, 48). Mohammed was born and raised in Mecca. Read more:  How to write an essay about someone you admire His father died before he was born and he lost his mother too at the age of six and thereafter lived with his paternal grandfather Abd al-Muttalib as an orphan (Andrea, 78). Growing up as an orphan in Mecca was never easy even though he was well fed by his guardians. At a tender age of twelve, Mohammed had started engaging in trading journeys with his uncle. He therefore started to develop interest in commercial trade probably because that was the only option he had because he grew up as an orphan. Mohammed took up the career as a merchant in his later youth and was highly regarded as trustworthy and later nicknamed â€Å"al-Amin†. Mohammed’s youthful days are really admirable and inspiring at the same time (Madelung, 59). He not only had an upright character but was also a very hard working young man who tried and beat the odds despite his humble background. It was for his reputation that a forty year old widow called Khadijah who asked for his hand in marriage which he accepted and lived happily thereafter (Turner, 89). After the death of Khadijah, Mohammed married other women numbering about thirteen and he was survived by nine of them. One of them was called Aisha, who according to the Sunni Muslims was Mohammed’s favorite companion. She is known for her instrumental work in bringing together the many scattered Mohammed’s sayings that later formed the Sunni’s hadith literature. As a husband, Mohammed had a great reputation at a time when women were lowly regarded in the society. It is said that he participated in house chores like washing, cooking and even sewing clothes. Although women were never treated fairly during the prophet’s time, Mohammed was extremely exceptional with his women. He not only listened to his wives’ advice but also engaged them in dialogue and arguments. This is worth emulating in today’s Muslim societies where women continue to suffer in the hands of their men (Andrea, 75). Mohammed’s future prophetic life was said to have been prophesized by another Christian monk he met his way to his many caravans from Mecca to Syria (Watt, 56). At the onset of his prophetic life, Mohammed was fond of visiting a cave in Mount Hira every year where he would meditate for weeks. According to Islamic teachings, it was during one of the ritual meditations at Mount Hira when angel Gabriel descended and instructed him to say the following words: â€Å"Proclaim! or read! ) in the name of thy Lord and Cherisher, Who created- Created man, out of a (mere) clot of congealed blood: Proclaim! And thy Lord is Most Bountiful, He Who taught (the use of) the pen, Taught man that which he knew not† (Quran 96: 1-5). Mohammed was very much disturbed by these revelations and knew the task required of him. He went home and shared with his wife Kh adija and Khadijah’s Christian cousin who consoled and reassured him that nothing bad would happen (Ramadan, 45). He was afraid of the news and did not know how he could get others to listen to what he was to say. His wife was the first to tell him she believed him and that Mohammed must do what was told. The amazing thing about Mohammed is his faith and willingness to do what God commanded. He never gave up in his prayers even after a pause of almost three years after the initial revelation. He prayed continuously until God finally commanded him to start preaching the word to his people. He was living in Mekkah of Saudi Arabia when he began his teachings to the people. According to Islamic teachings, Mohammed’s wife was the first person who believed that he was a prophet. His younger cousin called Ali Abi Talib and best friend Abu Bakr as well as his adopted son Zaid were to follow in believing in his prophesies (Turner, 102). Many of people from Mecca did not like or accept this way of life and tried to kill Mohammed. He would be mocked or chased away by the Meccans who could not believe or understand his new way of life. The opposition to Prophet Mohammed in Mecca began when he started preaching against worshiping of the idols that was a common feature in Mecca city. He also became a threat to the wealthy religious leaders who depended on the Kaaba, a major defining traditional feature of the Meccan religion which Mohammed’s teachings would render obsolete. Due to these, most of his new converts were killed by the wealthy merchants and other opposing groups who never wanted their traditional religions interfered with. But Mohammed had to endure insults and ridicules only and could not be harmed or killed because he came from the Banu Hashim clan (Madelung, 56). He left and traveled to different places including Yemen before he went back to Saudi Arabia to live in the city called Medina. The people of Medina were accepting of him and listened to his advice. There were some people there who professed to Jewish or other religions, but they did not fight with Mohammed. He had a good reputation in Medina where he helped to solve a long standing inter-ethnic conflict. A delegation comprising of representatives from all the clans involved in the fight between Jewish and Arabs in the Yathrib was sent to get Mohammed to arbitrate in the conflict. This did not only help him to escape the hostile city of Mecca but also enable him spread his teaching to various communities and clans in the greater Middle East (Ramadan, 83). Mohammed’s teachings really formed the foundation of the Islamic religion. One of the Muslim’s sources of spiritual inspiration is the Sunnah. The sunnah according the Islamic religion are deeds and sayings of the prophet Mohammed as preserved in the hadith and includes a variety of activities as well as beliefs such religious rituals, burial rituals, personal hygiene and the love between man and God. It is supposed to guide every Muslim and so far has been a great influence to the Muslim culture allover the world. For example, Mohammed taught Muslims a greeting to offer one another – â€Å"may peace be upon you† is wide used by Muslims from all corners of the world (Rahman, 69). The Sunnah has played an important role in the establishment and development of the religion’s sciences. Much of the prophet’s deeds and sayings have particularly contributed to the establishment of the Islamic law in the early years of the Islamic religion (Madelung, 78). The Sufis who sought to understand the inner meaning of the holy book, Qur’an and the true nature of the prophet, considered Mohammed not only as a mere prophet but as a perfect saint. Their spiritual descent is traced back to Prophet Mohammed (Rahman, 45). Mohammed was not liked by many of the outside tribes living throughout the Middle East and they wanted to hurt him, they taught their children to throw stones at him during his travels (Andrea, 65). A great quality of Mohammed that I look to is his patience. He taught to others that a very important behavior in life is to have patience with all issues. People would come to Mohammed with many complaints or questions to try and trick him (Madelung, 56). Others would do many things to him so he would go away. In all of these events, he would wait quietly and think before he answered or acted. I admire his ability to restrain himself and not fight small issues. In this world today, I think that everyone could benefit from this lesson of patience. Too many people die and are left hurting from wars between people who have little patience. During the spread of Islam, Mohammed gave people a choice to convert to Islam or if they did not want to, they would need to pay money that is like a tax. The Muslims and other people who would pay could live in harmony, but the tribes who refused to pay and resisted the teaching of Islam would end up in a war. These people had killed family members of Mohammed and wanted to fight him. So Mohammed and a small army would go out to fight, for example the Battle of Badr City (Andrea, 67). The small Muslim army won the battles because God had given them the strength to fight an enemy who hated God and worshipped idols. When the battles were over, Mohammed never took prisoners and killed them on purpose. He showed mercy and compassion. Like the Prophet Jesus had taught the way to live is with mercy, compassion and love. It is the only way to live a correct life. If you look to any of the prophets, they are famous and different from all of the other people because they took chances and were disliked. They had to remain strong in their faith of God and be patient. It was no different for Mohammed. There are many times in my life that I become angry because people are mean or I lose patience with them but I try to look to the example Mohammed made for the Muslims to follow. I sit and read the Quran and hope to find a peace. Conclusion When the word was revealed to Mohammed, the world was in a bad situation. People were worshipping idols and hurting the less fortunate and women. It was like these people were acting like animals. Mohammed was very scared of how he would be accepted by the people and if they would reject the word of God. I admire the strength of Mohammed when he was faced with danger. I sometimes wish to have that strength, so I must remain strong in my faith to God and look to Him for guidance. This was an important teaching of the prophet Mohammed. When I came to America, I was afraid because I was new and did not know many people. Also, the news shows things that can make people afraid of Muslims and I know some people will not like me because of it. I try hard to live by the example Mohammed set for the Muslim people so I may have a good life. It has been good for me in America. By having patience, I have learned many things about this country and also made good friends. I hope that people can look past the bad news media makes for people and discover the good things about Mohammed because there are many lessons a person can learn from his life.

Saturday, September 21, 2019

Surviving on Green Energy Essay Example for Free

Surviving on Green Energy Essay The relationship of humans and fossil fuels can be viewed as a strong and binding one that can only end when another party ceases to exist. The humans have settled and have been depending heavily on fossil fuels, and unfortunately, fossil fuels do not seem to reciprocate the feeling. Fossil fuels, unlike humans, will cease to exist soon, and this departure is slowly but surely felt as gas prices are skyrocketing high in the oil market. Our dependence on fossil fuels is greatly evidenced by the technologies that we have developed that require the products of fossil fuels for them to operate. The transportation, machinery, and appliances are just a couple of the technology that we have made to make our lives easier and to make communication available all through out the world; fossil fuels make their existence possible. However, the existence of these technologies was under the premise that their energy sources are unlimited. Regrettably, fossil fuels are not renewable sources of energy, and it is only a matter of time before we feel the real consequence of their limits. Hence, it is important that we get to find alternative sources of energy that are renewable and whose availability is unlimited, like solar power, geothermal energy, wind energy, hydropower, and biomass. Surviving on green energy or alternative energy sources is not only safe for the environment, but is also cheap and available for a very long time. Nonrenewable sources of energy are those sources that cannot be reused and can be depleted, such as fossil fuels and examples of this are oil, natural gas, and coal (Chapter 8: Fossil Fuels Coal, Oil and Natural Gas). They are called fossil fuels because according to research, they were formed from creatures like planktons, or diatoms whose bodies were preserved through heavy sedimentation with their energies intact (Chapter 8: Fossil Fuels Coal, Oil and Natural Gas). The dependence of humans on fossil fuels can be seen on the American’s daily consumption of one of its forms, oil. Oil is a basic commodity for those who own cars, boats, planes, and any other mode of transportation, to those whose businesses depend on it as a raw material, among many others. According to the Petroleum Basic Statistics website, the United States of America consumes an average of 20,680,000 barrels of oil everyday (Petroleum Basic Statistics). This shows how much dependent this country is to nonrenewable energy, and hence should soon find a different means for energy source before fossil fuels become depleted. The combination of the heavy consumption of oil, the soaring prices of oil in the world market, and the limited sources of this commodity prompted some prominent political figures to suggest the lifting of the ban on offshore drilling. This is because they offer offshore drilling as an answer to the high prices and the limited sources of fossil fuels. However, offshore drilling poses a lot of threat not only to the environment, but also to the current monetary condition of the country. First of all, offshore drilling is harmful to the environment on a number of reasonable accounts. The creation of oil rigs in the ocean will entail excavating the earth and in the process will disturb the natural habitat of the sea creatures because of the erosion, kelp bed, coastal, and reef damage (The Case against Offshore Oil). The technology being used in detecting oil deposits is a seismic tester that releases sound waves with 260 decibel levels, enough to cause brain hemorrhaging, disorientation, and beaching in dolphins and whales (Offshore Drilling – It’s NOT the Answer to High Gas Prices at the Pump). Oil isn’t the only element that is released in the process, mercury, lead, and other radioactive material are also released (Offshore Drilling – It’s NOT the Answer to High Gas Prices at the Pump). The threat of oil spills in these oil rigs is also perilous to the wellbeing of the sea creatures for it can cause reproductive troubles (The Case against Offshore Oil). If truth be told, if oil spills do occur, which is always possible, the event have the most terrible, destructive effect on the environment. When gobbled up by animals, oil can cause death and other severe physiologic effects (The Effects of Oil on Wildlife). The environmental havoc does not stop there. The pollution that the machines contribute to the environment during their operation is also significantly dangerous. However, in spite of all of the qualms made by the environmentalists, the government would not give in. This is also why there have been independent people who have started their own endeavors in the area of researching about decreasing energy consumption and creating and using alternative sources of energy. Energy conservation is an available option to all people who would want to help in the campaign towards decreasing the imminent depletion of fossil fuels. Various suggestions are shared by environmentalists on the internet pertaining to cutting back energy consumption. People are told to purchase technology that are more environment friendly, walk instead of drive, or simply turning off appliances that are not in use. Remodeling houses with glass walls to let the sunlight in during the day is a great way to decrease light consumption. However, these tips cannot account for the long term problem. Even if we are able to slow down the forthcoming depletion of nonrenewable energy sources, it would still be a futile attempt to give energy to the next generations to come. Assortments of solutions are being put forward by scientists and environmentalists today. One suggested idea that could be plausible as an answer to the energy crisis is to tap into renewable energy sources or alternative energy sources (Offshore Drilling – It’s NOT the Answer to High Gas Prices at the Pump). Geothermal energy, wind energy, solar energy, Biomass and hydropower are the five most developed renewable energy sources that are available (Renewable Energy). Heat released from the earth is being utilized as geothermal energy by direct use, geothermal heat pumps and electricity (Geothermal Energy). Basically, geothermal energy is the heat that is being released from the hot springs, geysers, among many others. The nice thing about the usage of geothermal energy as a renewable energy source is that it little impact on the environment pollution-wise and because most of the geysers have been turned into parks, they are protected by the constitution (Geothermal Energy Energy from the Earths Core). The only disadvantage geothermal energy has is that it only emits little, so it can only supply at a limited amount each time (Geothermal Energy Energy from the Earths Core). From heat being released by the earth, the next green energy available for use is wind power. Wind is everywhere; it never runs out, it is the oldest energy source of all as evidenced by the popular windmills being used a hundred years ago. We can see a lot of windmills and wind turbines across the country, and there are even wind farms being put up because of the great energy contribution wind is capable of (Chapter 16: Wind Energy). With great advantage to us, wind power is already used in lighting homes in California. On the other hand, a disadvantage of using wind power is its known disturbance in the migratory patterns of birds (Wind Energy Energy from Moving Air). It could affect their directions and their natural habitats. But nevertheless, wind power is pretty much useful. From wind we go to another object found in the sky, the sun. Solar energy is energy produced by the sun, and can be transformed into usable energy by way of solar cells and solar power plants (Solar Energy Energy from the Sun). The only problem with solar energy is also the only reason it gives us energy, the sun. Since the sun is not consistently shining above us, hence nighttime, we cannot maximize its use for the whole day. Plus, weather changes occur every now and then, which can also alter the effect of solar energy throughout its use (Solar Energy Energy from the Sun). Other than weather disturbances that are naturally occurring, solar energy does not interfere with the environment in any possible way. From the shining sunlight we proceed to natural, physiological waste, Biomass. Biomass is mostly made up of biological material derived from living or recently living organisms (What is BIOMASS? ). Virgin wood, food waste, energy crops, industrial waste, and agricultural residues are the raw materials being used for producing Biomass (What is BIOMASS? ). This is also an excellent green energy alternative source because the raw materials needed to produce this energy can be found anywhere and everywhere. It utilizes waste products, hence, less trash and pollution. Its use can lower down carbon dioxide emissions, provide 15% of the demands of electricity in 2020 in industrialized countries, and can give 400,000 jobs (Biomass Energy). And like any other source of energy, Biomass has its own disadvantage. Utilizing Biomass entails the allocation of land for its production centers. And if this means more plantation of Biomass for its usage, more land will be used up instead of allocating this land for food production (Global Limits of Biomass Energy). Last but certainly not the least is hydropower or water energy. Hydropower seizes the energy of falling water and transforms it into electricity (How Hydropower Works). However, conditions have to be met for this energy transformation to take place. The height of the waterfalls and the quantity of water that is falling is to be taken into account (How Hydropower Works). The water falls should be high enough and it should be releasing a certain amount of water for it to produce enough energy (How Hydropower Works). It seems that of all the five green energy sources, hydropower is the only one that does not offer a disadvantage, which is why it is mostly utilized today. Fortunately, most waterfalls around the world are so named, because of their height and the amount of water that falls, so there can be no problem with that except of course in dessert countries. But it does not mean that hydropower should be the only one that can be invested in. Right now, as this is being read, there are numerous scientists and environmentalists who are keeping their hands full with research and experimentation on how to find renewable energy sources. They are the ones that we should idolize and look up to, because these people do not want just a quick fix to a lifelong problem, they want change. And we all know that change is inevitable and that we should always be ready for it when it comes. Our lives have been dependent on technology, mankind’s answer to making life easier and faster, maximizing time on earth to its full potential. Our dependence on it is making our environment suffer. Maybe it is not yet too late to make the change and go green, go environmental. It doesn’t really mean requiring oneself to go caveman and abandon the city and retreat to the forests. It just means that even in our own little way we can contribute to the solution, instead of contributing to the problem. We all know it’s a jungle out there, and some of us are not equipped to embrace change especially once fossil fuels really run dry. Maybe, as early as now, we should embrace these changes and practice our energy saving methods, and soon enough, we can all survive on green energy. Works Cited: BIOMASS, What is BIOMASS? Biomass Energy Centre. 2008. UK Forestry Commission. 9 December 2008 http://www. biomassenergycentre. org. uk/portal/page? _pageid=76,15049_dad=portal_schema=PORTAL. California Energy Commission, Chapter 16: Wind Energy. Energy Story. California Energy Commission. 9 December 2008 http://www. energyquest. ca. gov/story/chapter16. html. Carnegie Institution of Science. Global Limits Of Biomass Energy. 14 June 2008. ScienceDaily. 9 December 2008 http://www. sciencedaily. com ¬ /releases/2008/06/080611181214. htm. â€Å"The Case against Offshore Oil. † 2002. Rainforest Action Network. 9 December 2008 http://www. culturechange. org/caoe. html. â€Å"Chapter 8: Fossil Fuels Coal, Oil and Natural Gas. † 2006. California Energy Commission. 9 December 2008 http://www. energyquest. ca. gov/story/chapter08. html. â€Å"The Effects of Oil on Wildlife. † 2003. Marine Environment Protection. 9 December 2008 http://www. amsa. gov. au/marine_environment_protection/educational_resources_and_information/teachers/the_effects_of_oil_on_wildlife. asp. Energy Information Administration, Geothermal Energy Energy from the Earths Core. Energy Kids Page. 2008. Energy Information Administration. 9 December 2008 http://www. eia. doe. gov/kids/energyfacts/sources/renewable/geothermal. html. Energy Information Administration, Renewable Energy. Energy Kids Page. 2008. Energy Information Administration. 9 December 2008 http://www. eia. doe. gov/kids/energyfacts/sources/renewable/renewable. html. Energy Information Administration, Solar Energy Energy from the Sun. Energy Kids Page. 2007. Energy Information Administration. 9 December 2008 http://www. eia. doe. gov/kids/energyfacts/sources/renewable/solar. html. Energy Information Administration, Wind Energy Energy from Moving Air. Energy Kids Page. 2008. Energy Information Administration. 9 December 2008 http://www. eia. doe. gov/kids/energyfacts/sources/renewable/wind. html. National Renewable Energy Laboratory, Geothermal Energy. Ren

Friday, September 20, 2019

Review of Data Duplication Methods

Review of Data Duplication Methods Mandeep Singh Abstract: -The cloud storage services are used to store intermediate and persistent data generated from various resources including servers and IoT based networks. The outcome of such developments is that the data gets duplicated and gets replicated rapidly especially when large numbers of cloud users are working in a collaborative environment to solve large scale problems in geo-distributed networks. The data gets prone to breach of privacy and high incidence of duplication of data. When the dynamics of cloud services change over period of time, the ownership and proof of identity operations also need to change and work dynamically for high degree of security. In this work we will study the concepts; methods and the schemes that can make the cloud services secure and reduce the incident of data duplication with use of cryptography mathematics and increase potential storage capacity. The purposed scheme works for deduplication of data with arithmetic key validity operations that redu ce the overhead and increase the complexity of the keys so that it is hard to break the keys. Keywords: De-duplication, Arithmetic validity, proof of ownership. INTRODUCTION Organizations that focus on providing online storage with strong emphasizes on the security of data based on double encryption [1] (256 bit AES or 448 bit), managed along with fish key algorithm and SSL encryption [2] based connections are in great demand. These organizations need to maintain large size data centers that have a temperature control mechanism, power backups are seismic bracing and other safeguards. But all these safeguards, monitoring and mechanism becomes expensive, if they do not take care of data duplication issues and problems related to data reduction. Data Deduplication [3] occurs especially when the setup is multi-users and the users are collaborating with each others work objects such as document files, video, cloud computation services and privileges etc. and volume of data grows expensively. In a distributed database management systems special care is taken to avoid duplication of data either by minimizing the number of writes for saving I/O bandwidth or de normalization. Databases use the concept of locking to avoid ownership issues, access conflicts and duplication issues. But even as disk storage capacities continue to increase and are becoming more cheaper, the demand for online storage has also increased many folds. Hence, the cloud service providers (CSP) continue to seek methods to reduce cost of DE-duplication and increase the potential capacity of the disk with better data management techniques. The data managers may use either compression or deduplication methods to achieve this business goal. In broad terms these technologies can be classified as data reduction techniques. The end customers are able to effectively store more data than the overall capacity of their disk storage system would allow. For example a customer has 20 TB storage array the customer may bet benefit of 5:1 which means theoretically 5 times the current storage can be availed. [(5*20 TB) = 100 TB]. The next section defines and discussed data reduction methods and issues of ownership to build trustful online storage services. Fig: Deduplication Process The next section defines and discussed data reduction methods and issues of ownership to build trustful online storage services. The purpose is to obtain a reducedrepresentation of a data set file that much smaller in volume yet provide same configure even, if the modified data in a collaborative environment. The reduced representation does not necessarily means a reduction in size of the data, but reduction in unwanted data or duplicates the existence of the data entities. In simple words the data reduction process would retain only one copy of the data and keep pointers to the unique copy if duplicates are found. Hence data storage is reduced. Compression [4]: It is a useful data reduction method as it helps to reduce the overall resources required to store and transmit data over network medium. However, computational resources are required for data reduction method. Such overhead can easily be offset due to the benefit it offers due to compression. However, an subject to the space time complexity trade off; for example, a video compression may require expensive investment in hardware for its compression-decompression and viewing cycle, but it may help to reduce space requirements in case there is need to achieve the video. Deduplication [3]: Deduplication is processed typically consist of steps that divide the data into data sets of smaller chunk sizes and use an algorithm to allocate each data block a unique hash code. In this, the deduplication process further find similarities between the previously stored hash codes to determine if the data block is already in the storage medium. Few methods use the concept comparing back up to the previous data chunks at bit level for removing obsolete data. Prominent works done in this area as follows: Fuse compress compress file system in user space. Files-depot Experiments on file deduplication. Compare A python-based deduplication command line tool and library. Penknife its used to DE duplicate informations in shot messages Opendedup A user space deduplication file system (SDFS) Opendedupe A deduplication based filesystem (SDFS) Ostor Data deduplication in the cloud. Opensdfs A user space deduplication file system. Liten Python based command line utility for elimination of duplicates. Commercial: 1). Symantec 2). Comm Vault. 3). Cloud Based: Asigra, Baracuda, Jungle Disk, Mozy. Before we engross further into this topic, let us understand the basic terms involved in the DE duplication process having in built securely features. Security Keys [5]: The security keys mainly consist of two types, namely first is Public Key and second is Private Key. The public keys are essentially cryptographic keys or sequences that can be obtained and used by anyone to encrypt data/messages intended for particular recipient entity and can be unlocked or deciphered with the help of a key or sequence in knowledge of recipient (Private Key). Private Key is always paired with the public key and is shared only with key generator or initiator, ensuring a high degree of security and traceability. Key Generation: It is a method of creating keys in cryptography with the help of algorithms such as a symmetric key algorithm (DES or AES) and public key algorithm (such as RSA) [6]. Currently systems such as TLS [7], SSH are using computational methods of these two. The size of the keys depends upon the memory storage available on (16, 32, 64, 128 bits) etc. Key Distribution: Before, any authentication process can happen both the parties need exchange the private and public keys. In typical public key cryptography, the key distribution is done using public server keys. The key generator or initiator keeps one key to himself/herself and uploads the other key to server. In case of SSH the algorithm used is Diffie-Hellman key [6] exchange. In this arrangement, if the client does not possess a pair of public and private key along with published certificate. It is difficult for the client to proof ownership. The Figure [1] shows the life cycle of Keys used for the sake of security. Fig 1: Life Cycle of Key Key Matching and Validation: Since, in most cases the private key is intended to reside on the server. And, the key exchange process needs to remain secure with the use of secure shell, this is a need to have a robust key matching algorithm so that no spoofing or manipulation occur in transient. Moreover, it is always recommended that a public key validation must be done before these keys are put into operation. Public key validation tests consist of arithmetic test [8] that ensure that component of candidate informs to key generation standard. Hence, a certificate authority [9] (CA) helps in choosing the trusted parties bound by their individual identities with the help of public key. This is stated in Certificate Produce Standards. Some third party validators use the concept of key agreements and others may use the concept of proof of possession mechanism. In POP mechanism [10], for the proper establishment of keys, the user interacting is required to work with CA using a natural function of the keys (either key agreement for encryption) or by using zero-proof knowledge algorithms [11] to show possession of private key. POP shows that user owns the corresponding private key, but not necessarily, that the public key is arithmetically valid. The Public key validation (PKV) methods show that public key is arithmetically valid, but not necessary that anyone who owns the corresponding key. Combination of these (POP and PKV) methods gives a greater degree of security confidence that can be useful for Deduplication operation. However, the only issues needs to be addressed is the overhead involved in public key validation. Improvements in arithmetic validity test can be done to improve the validation process, especially in concept of DE duplication area; where the message to be encrypted in data chunks and need to arithmetic validation and proof of ownership is to be done multiple times due to the collaborative nature of the data object. Most of the arithmetic tests validity are based on the generation and selection of prime numbers. It was in late 1989s many people came up with an idea of solving key distribution problem for exchanging information publicly with a use of a shared or a secret cipher without someone else being able to compute the secret value. The most widely used algorithms DiffieHellman key exchange takes advantage of prime number series. The mathematics of prime numbers (integer whole numbers) shows that the modulus of prime numbers is useful for cryptography. The Example [Table no. 1] clearly illustrates the prime number values gets the systematically bigger and bigger, is very usefu l for cryptography as it has the scrambling impact. For example: Prime Numbers in Cryptography and Deduplication: Prime numbers [13] are whole numbers integers that have either factors 1 or same factor as itself. They are helpful in choosing disjoint sets of random numbers that do not have any common factors. With use of modular arithmetic certain large computations can be done easily with reduced number of steps. It states that remainder always remain less than divider, for example, 39 modulo 8, which is calculated as 39/7 (= 4 7/8) and take the remainder. In this case, 8 divides into 39 with a remainder of 7. Thus, 39 modulo 8 = 7. Note that the remainder (when dividing by 8) is always less than 8. Table [1] give more examples and pattern due this arithmetic. 11 modulus 8=3 17 modulus 8=1 12 modulus 8=4 18 modulus 8=2 13 modulus 8=5 19 modulus 8=3 14 modulus 8=6 20 modulus 8=4 15 modulus 8=7 21 modulus 8=5 16 modulus 8=0 So onà ¢Ã¢â€š ¬Ã‚ ¦. Table 1: Example of Arithmetic of modus To do modular addition [14], two numbers are added normally, then divided by the modulus and get the remainder. Thus, (17+20) mod 7 = (37) mod 7 = 2. The next section illustrates, how these computations are employed for cryptographic key exchange with typical example of Alice, Bod and Eva as actors in a typical scenario of keys exchange for authentication. Step1: Sender (first person) and receiver (second person) agree, publicly, on a prime number X, having base number Y. Hacker (third person) may get public number X access to the public prime number. Step 2: Sender (first person) commits to a number A, as his/her secret number exponent. The sender keeps this secret. Receiver (second person), similarly, select his/her secret exponent. Then, the first person calculates Z using equation no. 1 Z = YA (mod X) à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. (1) And sends Z to Receiver (second person). Likewise, Receiver becomes calculate the value C using equation no. 2 Z= YB (mod X) à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ (2) And sends C to Sender (first person). Note that Hacker (third person) might have both Y and C. Step 3: Now, Sender takes the values of C, and calculate using equation no. 3 CA (mod X). à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. (3) Step 4: Similarly Receiver calculates using equation no. 4 ZB (mod X). à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. (4) Step 5: The value they compute is same because K = YB (mod X) and sender computed CA (mod X) = (YB) A (mod X) = YBA (mod X). Secondly because Receiver used Z = YA (mod X), and computed ZB (mod X) = (YA) B (mod X) = YAB (mod X). Thus, without knowing Receivers secret exponent, B, sender was able to calculate YAB (mod X). With this value as a key, Sender and Receiver can now start working together. But Hacker may break into the code of the communication channel by computing Y, X, Z C just like Sender and Receiver. Experimental results in cryptography, show that it ultimately becomes a discrete algorithm problem and consequently Hacker fails to breaks the code. The Hacker does not have any proper way to get value. This is because the value is huge, but the question is how did sender and receiver computed such a large value, it is because of modulus arithmetic. They were working on the modulus of P and using a shortcut method called repeated squaring method. The problem of finding match to break the code for the hacker becomes a problem of discrete algorithm problem. [15] From the above mention in this paper, it can be deduced that the athematic validity part of the security algorithm computations can also be improved by reducing number of computational steps. For this purpose Vedic mathematical methods such as [17], especially where the resources (memory to store and compute) keys are constrained. Example: Base Type Example on how compute exponents using Vedic Maths If the base is taken less than 10 9^3= 9-1 / 1ÃÆ'-1 / (1ÃÆ'-9) / 1ÃÆ'-1ÃÆ'-9 = 8 /1 / -9 / 9 = 81 / -9 / 9 = 81 9 / 9 = 72 / 9 = 729 If the base is taken greater than 10 12^3= 12 + 2 / 2 ÃÆ'- 2 / + (2 ÃÆ'- 12) / 2ÃÆ'- 2 ÃÆ'- 12 = 14 / 4 / + 24 / 48 = 144 / +24 / 48 = 144 +24 / 48 = 168/ 48 = 1728 Life Cycle of Data and Deduplication: The life cycle of digital material is normally prove to change from technological and business processes throughout their lifecycle. Reliable re-use of this digital material, is only possible. If the curation, archiving and storage systems are well-defined and functioning with minimum resource to maximum returns. Hence, control to these events in the Life Cycle is Deduplication process and securely of data. Table: 1 recent works in key management applied in De duplication area S. No. Authors Problem undertaken Techniques used Goal achieved Junbeom Hur et al. [1] Build a secure key ownership schema that work dynamically with guaranteed data integrity against tag inconsistency attack. Used Re-encryption techniques that enables dynamic updates upon any ownership changes in the cloud storage. Tag consistency becomes true and key management becomes more efficient in terms of computation cost as compare to RCE (Randomized convergent encryption). However the author did not focused their work on arithmetic validity of the keys. Although the lot of work has been done on ownership of keys. Chia-Mu Yu et al. [18] Improve cloud server and mobile device efficiency in terms of its storage capabilities and of POW scheme. Used improved of flow of POW with bloom filter for managing memory without the need to access disk after storing. Reduced server side latency and user side latency. Jorge Blasco et al. [19] Improve the efficiency of resources (space, bandwidth, efficiency) and improve security during the DE duplication process. Improved the working of bloom filter implementation for its usage in POW scheme and thwart a malicious client attack for colluding with the legitimate owner of the file. Experimental resources suggest the execution time increase when size of file grows but in case of proposed scheme it helps in building a better trade off between space and bandwidth. Jin Li et al. [20] Build an improved key management schema that it more efficiency and secure when key distribution operation access. The user holds an independent master key for encrypting the convergence keys and outsourcing them to could this creates lot of overhead. This is avoided by using ramp secret sharing (RSSS) and dividing the duplication phase into small phase (first and block level DE duplication). The new key management scheme (Dekey) with help of ramp scheme reduces the overhead (encoding and decoding) better than the previous scheme. Chao Yang et al. [21] Overcome the problem of the vulnerability of client side deduplication operation, especially when the attacker trys to access on authorized file stored on the server by just using file name and its hash value. The concept spot checking in wheel the client only needs to access small functions of the original files dynamic do efficient and randomly chosen induces of the original file. The proposed scheme creates better provable ownership file operation that maintains high degree of detection power in terms of probability of finding unauthorized access to files. Xuexue Jin et al. [11] Current methods use information computed from shared file to achieve. DE duplication of encrypted. Data or convergent encryption into method is Vulnerable as it is based well known public algorithm. DE duplication encryption algorithm are combined with proof of ownership algorithm to achieve higher degree of security during the DE duplication process. The process is also argument with proxy re-encryption (PRE) and digitalize credentials checks. The author achieved anonymous DE duplication encryption along with POW test, consequently the level of protection was increased and attacks were avoided. Danny Harnik et al. [22] Improve cross user (s) interaction securely with higher degree of privacy during DE duplication. The authors have described multiple methods that include:- (a). Stop cross over user interaction. (b). Allow user to use their own private keys to encrypt. (c). Randomized algorithm. Reduced the cost of operation to secure the duplication process. Reduced leakage of information during DE duplication process. Higher degree of fortification. Jingwei Li et al. [23] The authors have worked on the problem of integrity auditing and security of DE duplication. The authors have proposed and implemented two methods via Sec Cloud and Sec Cloud+, both systems improve auditing the maintain ace with help of map reduce architecture. The Implementation provided performance of periodic integrity check and verification without the local copy of data files. Better degree of proof of ownership process integrated with auditing. Kun He et al. [24] Reduce complications due to structure diversity and private tag generation. Find better alternative to homomorphic authenticated tree. (HAT) Use random oracle model to avoid occurrence of breach and constructs to do unlimited number of verifications and update operations. DeyPoS which means DE duplicable dynamic proof of storage. The theoretical and experimental results show that the algorithm (DeyPoS) implementation is highly efficient in conditions where the file size grows exponentially and large number of blocks are there. Jin Li et al. [25] The provide better protected data, and reduce duplication copies in storage with help of encryption and alternate Deduplication method. Use hybrid cloud architecture for higher degree of security (taken based) , the token are used to maintain storage that does not have Deduplication and it is more secure due to its dynamic behavior. The results claimed in the paper shows that the implemented algorithm gives minimal overhead compared to the normal operations. Zheng Yan et al. [26] Reduce the complexity of key management step during data duplication process But implement less complex encryption with same or better level of security. This is done with the help of Attribute Based Encryption algorithm. Reduce complexity overhead and execution time when file size grows as compared to preview work. Summary of Key Challenges Found The degree of issues related to implementation of Crypto Algorithms in terms of mathematics is not that difficult as compared to embracing and applying to current technological scenarios. Decentralized Anonymous Credentials validity and arithmetic validity is need to the hour and human sensitivity to remain safe is critical. In certain cases, the need to eliminate a trusted credential issuers can help to reduce the overhead without compromising the security level whole running deduplication process. Many algorithms for exponentiation do not provide defense against side-channel attacks, when deduplication process is run over network. An attacker observing the sequence of squaring and multiplications can (partially) recover the exponent involved in the computation. Many methods compute the secret key based on Recursive method, which have more overhead as compared methods that are vectorized. Some of the vectorized implementations of such algorithms can be improved by reducing the number of steps with one line computational methods, especially when the powers of exponent are smaller than 8. There is a scope of improvement in reducing computational overhead in methods of computations of arithmetic validity methods by using methods such as Nikhilam Sutra, Karatsuba. CONCLUSION In this paper, sections have been dedicated to the discussion on the values concepts that need to be understood to overcome the challenges in De-duplication algorithms implementations. It was found that at each level of duplication process (file and block) there is a needs for keys to be arithmetically valid and there ownership also need proved for proper working of a secure duplication system. The process becomes prone to attacks, when the process is applied in geo-distributed storage architecture. The complexity for cheating ownership verification is at least difficult as performing strong collision attack of the hash function due to these mathematical functions. Finding the discrete algorithm of a random elliptic curve element with respect to a publicly known base point is infeasible this is (ECDLP). The security of the elliptic curve cryptography depends on the ability to the compute a point multiplication and the mobility to compute the multiple given the original and product po ints. The size of the elliptic curve determines the difficulty of the problem. FUTURE SCOPE As discussed, in the section mathematical methods such as Nikhilam Sutra, Karatsuba Algorithm [27] may be used for doing computations related to arithmetic validity of the keys produced for security purpose as it involves easier steps and reduce the number of bits required for doing multiplication operations etc. Other than this, the future research work to apply to security network need of sensors that have low memory and computational power to run expensive cryptography operations such public key validation and key exchange thereafter. [1] J. Hur, D. Koo, Y. Shin and K. Kang, Secure data deduplication with dynamic ownership management in cloud storage, IEEE Transactions on Knowledge and Data Engineering, vol. 28, pp. 31133125, 2016. A. Kumar and A. Kumar, A palmprint-based cryptosystem using double encryption, in SPIE Defense and Security Symposium, 2008, pp. 69440D69440D. M. Portolani, M. Arregoces, D. W. Chang, N. A. Bagepalli and S. Testa, System for SSL re-encryption after load balance, 2010. W. Xia, H. Jiang, D. Feng, F. Douglis, P. Shialane, Y. Hua, M. Fu, Y. Zhang and Y. Zhou, A comprehensive study of the past, present, and future of data deduplication, Proceedings of the IEEE, vol. 104, pp. 1681-1710, 2016. J. Ziv and A. Lempel, A universal algorithm for sequential data compression, IEEE Transactions on information theory, vol. 23, pp. 337343, 1977. P. Kumar, M.-L. Liu, R. Vijayshankar and P. Martin, Systems, methods, and computer program products for supporting multiple contactless applications using different security keys, 2011. S. Gupta, A. Goyal and B. Bhushan, Information hiding using least significant bit steganography and cryptography, International Journal of Modern Education and Computer Science, vol. 4, p. 27, 2012. K. V. K. and A. R. K. P. , Taxonomy of SSL/TLS Attacks, International Journal of Computer Network and Information Security, vol. 8, p. 15, 2016. J. M. Sundet, D. G. Barlaug and T. M. Torjussen, The end of the Flynn effect?: A study of secular trends in mean intelligence test scores of Norwegian conscripts during half a century, Intelligence, vol. 32, pp. 349-362, 2004. W. Lawrence and S. Sankaranarayanan, Application of Biometric security in agent based hotel booking system-android environment, International Journal of Information Engineering and Electronic Business, vol. 4, p. 64, 2012. N. Asokan, V. Niemi and P. Laitinen, On the usefulness of proof-of-possession, in Proceedings of the 2nd Annual PKI Research Workshop, 2003, pp. 122127. X. Jin, L. Wei, M. Yu, N. Yu and J. Sun, Anonymous deduplication of encrypted data with proof of ownership in cloud storage, in Communications in China (ICCC), 2013 IEEE/CIC International Conference on, 2013, pp. 224229. D. Whitfield and M. E. Hellman, New directions in cryptography, IEEE transactions on Information Theory, vol. 22, pp. 644654, 1976. H. Riesel, Prime numbers and computer methods for factorization, vol. 126, Springer Science Business Media, 2012. R. A. Patel, M. Benaissa, N. Powell and S. Boussakta, Novel power-delay-area-efficient approach to generic modular addition, IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 54, pp. 12791292, 2007. Repeated Squaring, Wednesday March 2017. [Online]. Available: http://www.algorithmist.com/index.php/Repeated_Squaring. [Accessed Wednesday March 2017]. Table of costs of operations in elliptic curves, Wednesday March 2017. [Online]. Available: https://en.wikipedia.org/wiki/Table_of_costs_of_operations_in_elliptic_curves. [Accessed Wednesday March 2017]. Calculating Powers Near a Base Number, Wednesday March 2017. [Online]. Available: http://www.vedicmaths.com/18-calculating-powers-near-a-base-number. [Accessed Wednesday March 2017]. C.-M. Yu, C.-Y. Chen and H.-C. Chao, Proof of ownership in deduplicated cloud storage with mobile device efficiency, IEEE Network, vol. 29, pp. 5155, 2015. J. Blasco, R. D. Pietro, A. Orfila and A. Sorniotti, A tunable proof of ownership scheme for deduplication using bloom filters, in Communications and Network Security (CNS), 2014 IEEE Conference on, 2014, pp. 481489. J. Li, X. Chen, M. Li, J. Li, P. P. Lee and W. Lou, Secure deduplication with efficient and reliable convergent key management, IEEE transactions on parallel and distributed systems, vol. 25, pp. 16151625, 2014. C. Yang, J. Ren and J. Ma, Provable ownership of files in deduplication cloud storage, Security and Communication Networks, vol. 8, pp. 24572468, 2015. D. Harnik, B. Pinkas and A. Shulman-Peleg, Side channels in cloud services: Deduplication in cloud storage, IEEE Security Privacy, vol. 8, pp. 4047, 2010. J. Li, J. Li, D. Xie and Z. Cai, Secure auditing and deduplicating data in cloud, IEEE Transactions on Computers, vol. 65, pp. 23862396, 2016. K. He, J. Chen, R. Du, Q. Wu, G. Xue and X. Zhang, Deypos: deduplicatable dynamic proof of storage for multi-user environments, IEEE Transactions on Computers, vol. 65, pp. 36313645, 2016. J. Li, Y. K. Li, X. Chen, P. P. Lee and W. Lou, A hybrid cloud approach for secure authorized deduplication, IEEE Transactions on Parallel and Distributed Systems, vol. 26, pp. 12061216, 2015. Z. Yan, M. Wang, Y. Li and A. V. Vasilakos, Encrypted data management with deduplication in cloud computing, IEEE Cloud Computing, vol. 3, pp. 2835, 2016. S. P. Dwivedi, An efficient multiplication algorithm using Nikhilam method, 2013.

Thursday, September 19, 2019

Essay --

La à ©tica puede ser observada de diferentes formas y niveles, donde cada quien tiene una diferente percepcià ³n de lo que es la à ©tica para uno, ya sea desde un punto de vista acadà ©mico, social, familiar o laboral; el tema es tratado desde temprana edad, pero conforme uno va creciendo, el concepto que uno tiene de à ©ste puede que se vaya degradando o intensificando a causa de los à ¡mbitos en los que se desenvuelve uno. Ahora, vivimos en una sociedad en la que la corrupcià ³n es algo muy comà ºn entre nosotros y seguido escuchamos noticias sobre el tema, pues se hace fà ¡cil tomar una decisià ³n que traerà ¡ algà ºn beneficio aunque se tenga que hacer algo mal. Por lo que he decidido hablar de cà ³mo es que la à ©tica toma una parte en la vida profesional de un ingeniero civil. Para empezar, quisiera preguntar  ¿Quà © es la à ©tica? Pues bien, segà ºn la definicià ³n de la Real Academia Espaà ±ola, la à ©tica es una parte de la filosofà ­a que trata de la moral y de las obligaciones del hombre. La palabra à ©tica a menudo la usamos como sinà ³nimo de moral, es decir, el conjunto de principios, normas, preceptos y valores que rigen la vida de los individuos (Cortina & Martà ­nez, 2001, pà ¡g. 21). Ahora, la pregunta es:  ¿Cuà ¡l es la relacià ³n que tiene la à ©tica con la Ingenierà ­a Civil?  ¿Por quà © un Ingeniero Civil aplique la debe aplicar la à ©tica en todos sus trabajos como profesionista?, o  ¿a quà © se enfrentarà ¡ el ingeniero civil durante la prà ¡ctica de su profesià ³n? Con el tiempo se ha observado cà ³mo llegan a fallar obras que han sido diseà ±adas y construidas por ingenieros, incluso antes de que se pusieran en servicio, ya sea por un mal uso de materiales o un mal cà ¡lculo estructural, entre otras cosas. Pero quà © pasa cuando estos problemas se hubiesen podido evitar de no se... ...ncipios que cada uno como profesionista tenga y como los aplica en su vida diaria. Tenemos que conocer todas estas normas à ©ticas que existen no sà ³lo dentro de nuestra profesià ³n, tambià ©n en la de las otras con las que congeniamos en la vida profesional, ya que de estos conocimientos de la à ©tica y profesionalismo depende nuestro futuro no solo como buenos profesionales sino tambià ©n como buenos mexicanos. El ingeniero civil no solo debe manejar las ciencias y las tà ©cnicas que se le enseà ±Ãƒ ³ en un salà ³n de clase, tambià ©n debe ver por la integridad y el desarrollo del ser humano en su conjunto. Aquà ­ es donde toman parte los valores à ©ticos y morales de un profesional, donde el ingeniero debe respetar el marco legal y tomar responsabilidad por cualquier problema que llegue a surgir dentro de su supervisià ³n, actuando con respeto hacia su persona, a la sociedad y a su entorno.

Wednesday, September 18, 2019

The Janissaries Of The Ottoman/Turkish Empire Essay -- essays research

The Janissaries of the Ottoman/Turkish Empire   Ã‚  Ã‚  Ã‚  Ã‚  The Janissaries was an elite corp. in the standing army of the Ottoman Empire from the late 14th century to 1826. Highly respected for their military prowess in the 15th and 16th centuries, the Janissaries became a powerful force to be reckoned with on the battlefield, and in government administrations. The janissaries were organized into three unequal divisions: the cemaat, bà ¶là ¼khalki, and segban. The Janissary corps was originally staffed by Christian youths from the Balkan provinces who were converted to Islam on being drafted into the Ottoman service. Another way the Janissaries found new soldiers was by enslaving their enemies and forcing them into service. The sultans gained a great deal by using slave soldiers because they had no ties to family or land and they were remarkably resilient in accepting the ways of Islam. All soldiers must be converted into Islam and taught the proper code of the elite before service. Religious conversion was mandatory an d all soldiers were subject to strict rules, including celibacy. In the late 16th century the celibacy rule and other restrictions were relaxed, and by the early 18th century the original method of recruitment was abandoned.   Ã‚  Ã‚  Ã‚  Ã‚  Whenever the Turks invade foreign lands and capture their people an imperial scribe follows immediately behind them, and whatever boys there are, he takes them all into the janissaries and sends ... The Janissaries Of The Ottoman/Turkish Empire Essay -- essays research The Janissaries of the Ottoman/Turkish Empire   Ã‚  Ã‚  Ã‚  Ã‚  The Janissaries was an elite corp. in the standing army of the Ottoman Empire from the late 14th century to 1826. Highly respected for their military prowess in the 15th and 16th centuries, the Janissaries became a powerful force to be reckoned with on the battlefield, and in government administrations. The janissaries were organized into three unequal divisions: the cemaat, bà ¶là ¼khalki, and segban. The Janissary corps was originally staffed by Christian youths from the Balkan provinces who were converted to Islam on being drafted into the Ottoman service. Another way the Janissaries found new soldiers was by enslaving their enemies and forcing them into service. The sultans gained a great deal by using slave soldiers because they had no ties to family or land and they were remarkably resilient in accepting the ways of Islam. All soldiers must be converted into Islam and taught the proper code of the elite before service. Religious conversion was mandatory an d all soldiers were subject to strict rules, including celibacy. In the late 16th century the celibacy rule and other restrictions were relaxed, and by the early 18th century the original method of recruitment was abandoned.   Ã‚  Ã‚  Ã‚  Ã‚  Whenever the Turks invade foreign lands and capture their people an imperial scribe follows immediately behind them, and whatever boys there are, he takes them all into the janissaries and sends ...

Tuesday, September 17, 2019

History Of Rock And Roll: The Beatles Essay

If there were would be one band that achieved fame more than any other else, this band is on the top of the list. This band reached the pinnacle and forever left their mark not just in the Rock and Roll scene but in the whole music industry. Not only did they made a lasting impact on music, but they also served as one of the most unforgettable people or group in the history of the world. Their music served influential and created a social impact as well. Composed of John Lennon, Paul McCartney, George Harrison and Ringo Starr, this group is arguably the most popular band of all time, the Beatles. THE BEATLES A group that originated in the small bars of Liverpool, the Beatles started off as one and only band who led the â€Å"British Invasion† into the United States. Their musical style can be easily attributed to the 1950s early rock and roll but eventually they grew into different genres that ranged from pop to psychedelic rock. They became trend-setters and their clothes, statements and styles became widely popular during that era. They even became a major influence in the 1960s’ social and cultural revolutions. â€Å"Their arrival in the United States marked such a wide recognition and frenzy. Like an approaching thunderstorm, the Beatles’ arrival in America was preceded by a few low rumbles and flashes of light, none of them giving more than the slightest hint of the potency to follow. Noting the saturation coverage in England of the Beatles’ Royal Command Performance two weeks earlier, Newsweek magazine offered one of the first American impressions of the band and its music. The tone of condescension and contempt in an article in the issue of November 18, 1963, would set a standard that virtually all American media would follow for months† (Goldsmith, 2004, p. 115) They have been one of the most successful bands commercially and has been noted as a critically acclaimed band that ruled the entire music scene. The Beatles has become the band that tops the charts among the best selling musical groups of all time. They had made almost more than 40 different songs that reached the top of the charts. And not were they only famous in the United States and the United Kingdom, but they were famous in almost every continent of the world. It has been estimated that they have already sold a billion records. The music of The Beatles displayed an array of songs depicting various messages and lyrics that ranged from different emotions. They were just made up of 2 guitars, 1 bass guitar and 1 drum set, though sometimes they use other musical instruments to create variations with their music. They also incorporated the Piano in some of their songs. The Beatles were influenced by R&B music and they kept on continuing to take different influences even if they have received initial success. Most of the time, they find new lyrical and musical ideas by listening to contemporary music. Some of these influences include Bob Dylan, who made an influence on songs as â€Å"Norwegian Wood (This Bird Has Flown)†, and â€Å"You’ve Got to Hide Your Love Away†. There are many other influential contemporary bands that made an impact on the Beatles, some of them are the Beach boys and the Byrds. The album of the Beach Boys’ named â€Å"Pet Sounds† was strongly liked by Paul McCartney and the band’s producer claimed that without that album, the album of the Beatles’ â€Å"Sgt. Pepper† won’t even exist as good as it did. While McCartney loved the Beach Boys, John Lennon gave high praise to the King of Rock, Elvis Presley. Lennon claimed that Elvis inspired him to buy records. He thought that the early music of Elvis was just phenomenal. John Lennon got hooked on Elvis’ beat music and when he hear the song â€Å"Heartbreak Hotel†, he wanted to fall in love with music and wanted to have something to do with it. The Beatles created variations with their music. They used sound effects but â€Å"Along with studio tricks such as sound effects, unconventional microphone placements, tape loops, double tracking and vari-speed recording, The Beatles began to augment their recordings with instruments that were unconventional for rock music at the time. These included string and brass ensembles as well as Indian instruments such as the sitar as in â€Å"Norwegian Wood (This Bird Has Flown)† and the swarmandel as in â€Å"Strawberry Fields Forever†. They also used early electronic instruments such as the Mellotron, with which McCartney supplied the flute voices on the intro to â€Å"Strawberry Fields Forever†, and the ondioline, an electronic keyboard that created the unusual oboe-like sound on â€Å"Baby You’re a Rich Man†. Starting off with the utilization of a string quartet organized by George Martin with ideas form Paul McCartney on â€Å"Yesterday† during the year 1965, the Beatles spearheaded a modern kind of art song, represented by the arrangement of a double-quartet string on the song â€Å"Eleanor Rugby†, â€Å"She’s Leaving Home†, and â€Å"Here There and Everywhere† during the year 1966. McCartney was also inspired by the television performance of Brandenburg Concerto No. 2 by Bach which in turn influenced him to utilize a piccolo trumpet on â€Å"Penny Lane’s† arrangement. Moving towards psychedelia with the songs â€Å"Tomorrow Never Knows† and â€Å"Rain† in the year 1966, while â€Å"Strawberry Fields Forever†, â€Å"Lucy in the Sky with Diamonds†, and â€Å"I Am the Walrus† during 1967, the Beatles turned on a new leaf. Each member of the band provided almost an equal contribution. Due to the numerous songs, each member of the Beatles have created their own impact on songs whether be it heard with the rifts, the vocals, the beat or just simply by the over-all presence of the song. John Lennon and Paul McCartney provided the added lift with regards to ingenuity with their songs. Their capability to adapt with the times and even produce music that seems ahead of their time has made the Beatles as one of the best bands of all time in the world. Their performance style during the 60s’ somehow are just simple but very catchy. The crowds roar and women drool over the band member while listening to them rocking the stage. There are times where the Beatles are just performing at TV stations and most of the time they are also performing in huge stadiums, which is a first in the Rock and Roll scene. They spearheaded the stadium-performances which hosted magnanimous number of people, which by the way were all sold-out right from the get go. During the 70s, the Beatles somehow showed a correlation with art and even intertwined pop culture with mass media. Also, during one time in the 70s, they performed on one of the rooftops of a building. The crowd below listened and stopped and even caused mayhem. Police had to get up and fetch the Beatles while they were still singing â€Å"Get Back†. This is one of the most awesome performances that they have done. As the Beatles have mentioned themselves, the Beatles have been influenced by American music. One of the notable inspirations that they always mention is Elvis Presley. There’s no better influence other than the king of rock. Their music somehow professed a mixture of style and tempo of Gospel music and also a little bit of jazz. But all in all, they created a different and seemingly diverse music, a result of different influences. The Beatles reinvented social values in their music. Their style of Rock and Roll and Pop changed the social landscape. It is widely regarded that the Beatles were influenced by jack Kerouac. This American poet, writer and artist somehow made an impact on the band. â€Å"One of the key myths surrounding the Beatles’ is that their music was so artistically strong it could not fail to get to number one. This belief fails to take into account their huge ambition for fame and its rewards. In today’s usual reckoning of the Beatles as pop `artists’, we tend not to examine any of their baser motives, preferring to see them as purely motivated by a love of music and a need to communicate with the world. The Beatles themselves, it should be noted, have attempted to point out that not all their motives were pure. John in particular wielded the biggest attack against the Beatles myth – as he himself referred to it – in his 1970 Rolling Stone interview. To make it to the top he said you had to be a `bastard’ and the Beatles were in such a context the `biggest bastards on earth’. Albert Goldman’s The Lives Of John Lennon seems to have taken this remark to heart and pursued it relentlessly, missing the point of what John was trying to achieve with this comment. By making such knowingly sensational remarks, he sought to counter what he saw as widely held misconceptions of the Beatles. His remarks also served to emphasise that the Beatles were not gods, but ordinary human beings. It is from the last perspective that I have written this book – the Beatles not as four gods, but as four highly motivated, but otherwise normal, Liverpool lads. † (Rowley, 2002, p. 11). CONCLUSION If there would be one band that have made such a magnanimous impact all over the world, it has got to be the Beatles. Their musical style that ranged from variations of different genres displayed their flexibility. Their ability to adapt with the times and influence contemporary bands and the bands of today has been unmatched. Not only were they successful in the field of music but they also gained a huge following with regards to the trends that they have utilized. No other band sold more concerts or at least satisfied more people other than the Beatles. Their music has been a wonder of the world and still has that impact until today. The Beatles, unparalleled, unbeatable, unforgettable. They are just simply phenomenal. REFERENCES Goldsmith, M. (2004). The Beatles Come to America. Hoboken, NJ: Wiley. Rowley, D. (2002). Beatles for Sale: The Musical Secrets of the Greatest Rock ‘n’ Roll Band

Monday, September 16, 2019

Critical thinking and computer logic Essay

The goal of this paper is to identify the strengths and weaknesses that I possess and how they relate to my home life, work environment, and learning team at school. I also will layout a plan of action to address the correction of my weaknesses. Becoming aware of some of my weaknesses will be the first step to lead to self improvement. My ability to multitask is probably one of my best qualities as a worker. Being a member of a support team, the ability to multitask is essential. We are very busy department addressing customers with immediate demands. The ability to prioritize and multitask enables these tasks to be accomplished efficiently and successfully. Home life has many tasks; taking care of the dogs, daily maintenance and fixing up the house. My handling the multiple tasks of home life allows my wife flexibility in her work schedule. When working in a team environment at school or on the job, the ability to multitask can be an incredible skill for the group. This allows me to perform multiple tasks for the team I am on. It also gives the leader of the group the flexibility to delegate more to team members. Focus and dedication are other strengths that I possess. The ability to persevere and maintain the course of an assignment or job is a key to success. Being a long term student, this characteristic has enabled me to keep pushing toward the goal of a bachelor’s degree. There have been many times when I’ve wanted to give because the task seemed too hard but I pushed on. I have learned through experience how to bounce back from adversity. You never know what life is going to bring you and this trait can be invaluable. Being in the technical field, the ability to reeducate oneself and adapt is vital. The focus and dedication needed to stay on top of technology is crucial. These characteristics have also assisted me in balancing my home, work and school life. Being able to prioritize and put my family life first has helped me to persevere. My wife tells me and I tend to agree, that one of my greatest weaknesses is impatience. A lot of this is fueled by the good characteristics of  enthusiasm and hyperactivity, but nonetheless is a weakness. This impatience has led me to quit and start school several times. In my work and school life, impatience affects my ability as a team member. I have a very short fuse and do not often work well members who need extra help. This leads to another weakness; intolerance. I consider myself a compassionate person, but where work is related I am not very accepting of others weaknesses. My inability to remember when I was at that point hinders my ability to tutor or mentor a struggling co-worker or classmate. My impatience and intolerance at home is largely addressed towards myself. It has driven me to begin multiple projects around the house only to force myself into pure frustration when I can not finish them all as quickly as I would have liked due to other work and school obligations . I have similar problems at work and school. I tend to take on too many projects and spread myself too thin. I tend to be a person who is very self-critical and therefore I am very critical of my wife, co-workers and classmates. I sometimes have unreasonable expectations of myself and others. This weakness also makes it difficult to work in a team environment without conflict. Recognizing my strengths and becoming aware of my weaknesses is my first step towards self-improvement. The ability to ask for and receive feedback on these defects of character will be a very big asset in improving my personality as a whole. A lot of the impatience and intolerance I express towards others is usually an outward expression of how I feel towards myself. Through my faith and the practice of patience and tolerance towards others will lead me to my ultimate goal of having a servant’s heart. This ability to be unselfish at home, work, school, or wherever life may take me will enable me to achieve far more things than worldly success. Slowing down the number of projects at home will enable me to become less stressed and more focused on the tasks I need to complete. Using my ability to multitask does not mean I have to burn the candle at both ends. With the help, support, and feedback of those I am around, I will be able to improve myself and therefore improve my surr oundings.

Sunday, September 15, 2019

Declining Fish Stock: over-Fishing the World’s Oceans

The world’s oceanic large fish populations are disappearing at an alarming rate and extinction is a growing concern. An estimated 90% are already gone and the situation will continue to get worse if drastic measures are not taken (University of Phoenix, 2007). Even though the fishing industry will suffer, conservation methods should be developed and enforced soon because large fish populations are endangered and their habitats are being destroyed. Various netting techniques not only deplete fish populations, but also destroy habitats for many of the ocean’s species including plants and animals.Growing world populations and commercial fishing have placed an overwhelming demand on the oceans. Drastic steps should be taken soon to allow fish populations to regenerate and to sustain the numbers necessary to maintain the oceans’ natural balance, and to feed the world’s growing human population. Steps should include conservation methods enforced by the United St ates (U. S. ) government, development of massive fish farms, and cooperation from other countries world-wide. Implementation of such measures will require active efforts from several organizations.According to Jeremy Jackson of the Scripps Institute of Oceanography, the damage to the ocean is almost complete but can be reversed (Wiley, 2000-2009). In an effort to bring this issue to the forefront and gain support, a plan must be devised and presented to key groups. In developing the plan, certain action items must be developed and completed prior to presentation to the National Oceanic and Atmospheric Administration (NOAA) and the Environmental Protection Agency (EPA). The NOAA and EPA are strong influences on governmental policy and the public.Action Item One Within nine months, research regarding the effects of over-fishing large fish populations in the world’s oceans will be conducted. Endangered species and habitats will be identified. Research facts and concerns regardin g the current impact on the environment and effects of the continuation of practices will be documented. Commercial fishing techniques and their impact on fish populations and habitats will be outlined, along with other statists related to marketplace demands and commercial fishing industry economics.Research will also include conservation and sustainment statistics and other information to support new and innovative ideas regarding fish farming. Environmental issues related to fish farming will also be identified and addressed. Locations for fish farms and the resources needed will be detailed along with funding issues. Fishing industries and human populations that will be most impacted by the plan will also be identified. Action Item Two Within three months following the completion of the research portion of the plan, a presentation will be developed.The presentation will include the purpose of the presentation and the urgent need for action will be explained. The purpose of the p resentation is to urge the NOAA and EPA to develop and implement the Healthy Oceans Act to improve and sustain the oceans. According to the Natural Resources Defense Council, â€Å"A Healthy Oceans Act would provide a national vision for protecting, maintaining and restoring oceans while encouraging the development and implementation of local ocean plans†, (para. 10, n. d. ).Continuation of current practices and the lack of conservation efforts will result in devastating consequences. Industry changes will be addressed along with a plan for displaced workers. As part of the plan for fish farming, fisherman can be educated and relocated to areas where fish farms are developed and maintained. Fish farms will aid in marine repopulation efforts, provide jobs for displaced fishermen, and provide an alternative food source. Arnold (2009) states, â€Å"Some scientists say the answer is a massive growth of fish farming — a so-called â€Å"blue revolution† to help feed the planet† (para 2).Action Item Three In tandem with action item two, this action item will also be conducted due to the length of time it will take to pull together the target audience for viewing of the presentation and will be ongoing up to the scheduled date. The target audience includes key individuals from the NOAA, EPA, and various other environmental organizations in the U. S. These organizations are influential in Oceanic environmental issues, have much influence in local and global policies, and have far-reaching educational programs already in place. Action Item FourIn month nine or when the date is set with NOAA and the EPA, informational packets and invitations will be created and distributed to key environmentalists to persuade them to attend. Names of key environmentalists will be identified and invitations sent through month 12. The addition of key individuals will serve two purposes. The first purpose is that they will bring to the meeting their experiences w ith local issues, financial concerns, and objections. The second reason is that they will be able to contribute their own ideas of how the implement the plan and what will work best in their areas.Action Item Five Prior to the meeting date, attendance and the location of the meeting will be confirmed. Reminders will be sent to all attendees along with pertinent information. Equipment will be assessed and the presentation completed. Objections to the plan will be anticipated and addressed in a question and answer session. Perception of the Plan and Effects The plan will include specific recommendations for placing at least 40% of the oceans off limits for the next 15 years (Natural Resources Defense Council, n. d. ). After 15 years the off limits zones will decrease to 30% and be maintained indefinitely.Environmentalists will see the necessity of the plan based upon the decreasing fish populations and degradation of habitats for other marine plants and animals. They will also be conc erned about pollution generated by fish farms. Innovative ideas regarding the reduction of pollution will be presented. Commercial fishermen will be hurt the most and objections from industry fishermen will be strong. Fishermen have spent their lives fishing and with that in mind, opportunities for training, funding, and employment will be made available.Other Problems Caused by Commercial Fishing Commercial fisherman cause other problems to the marine populations by the way they catch fish. They catch many other animals unintentionally in their nets called â€Å"bycatch† (University of Phoenix, 2007). Additionally, they destroy many habitats by net-dragging and contribute to water pollution during their processes. Laws should be developed and enforced regarding bycatch and what should be done with the unintentional catch before they are destroyed in the process. Community EffectsThe creation of underwater parks or fish farms will create more jobs in coastal communities and f or displaced fishermen. Lifestyles changes will affect fishermen the most and perhaps they will realize a financial loss on expensive equipment. Additionally, many of the areas where their fishing has been successful will be made off limits which will also cause financial losses.?University of Phoenix. (2007). Declining Fish Stock VLR. Retrieved October 10, 2009, from University of Phoenix, Week Six, SCI/275 – Water Resource Plan.John Wiley ; Sons, Inc. (2000-2009). Visualizing Environmental Science, Chapter 11. Retrieved October 10, 2009, from University of Phoenix, Week Six, SCI/275 – Water Resource Plan. Arnold, Chris. (2009). Feeding the World with Deep-Sea Fish Farms. NPR. Retrieved October 10, 2009, from http://www. npr. org/templates/story/story. php? storyId=5291579Natural Resources Defense Council. (n. d. ). Reviving Our Oceans. Retrieved October 10, 2009, from http://www. nrdc. org/water/oceans/policy. asp