Wednesday, July 31, 2019
Labor Supply and Demand Scenario Custom Research
Area of Employment The area of employment that will be used for this analysis is the real estate industry; more precisely, the specific job function that will be the basis for the analysis is the real estate agent.Ã The hypothetical shift that will shape the subsequent sections of this scenario is a high job growth rate. Why Has the Shift Occurred? The shift has occurred due to an increased demand for real estate, which has led to an increased demand for real estate agents to serve the needs of potential buyers.Ã It should be noted, however, that this shift has emerged in the real estate industry due to the fact that real estate presents an environment of perfect competition, whereby there are many competitors who can freely pursue opportunities in a free market setting (Mankiw, 2004). Direction of Shift in Labor Supply and Demand In a scenario that represents increased numbers of real estate agents due to additional potential buyers of real estate, there are several economic factors at work.Ã First, as demand for the product of real estate increases, so will the price of real estate, given a limited supply.Ã Likewise, the demand for agents to sell the real estate will increase, and the cost of those agents (real wages) will increase while at the same time, the supply of agents will likely decrease. This is a demonstration of the neoclassical theory of distribution (Mankiw, 2004). Effect of the Scenario on Labor Market Equilibrium The effect that this scenario will have on labor market equilibrium is that as the supply of available real estate agents decreases, the price of those agents (wages) will increase. This in turn may slow the demand for agents overall if lower priced alternatives are sought, such as less employees taking on more responsibility.Ã This is a classic example of equilibrium in labor demand (Mankiw, 2004). References (Mankiw N G 2004 Principles of Economics)Mankiw, N. G. (2004). Principles of Economics (3rd ed.). Chicago: Thomson South-Western. Ã Ã
Religion in Ancient China
The earliest information found about religion in ancient China is during the Shang Dynasty and so religion in the Xia dynasty remains unknown. Religious beliefs and rituals were prominent during the Shang Dynasty. The most significant deity was Shang Ti, Ti meaning ââ¬ËDeity Aboveââ¬â¢ or the ââ¬ËLord on Highââ¬â¢. He ruled as a supreme god over all the other gods and spirits. The gods and spirits were believed to symbolize objects found in nature; the sun, the moon, the wind, the rain, everything from mountains and rivers to the stars in the night sky. Ti is believed to have punished those who disobeyed or offended him and rewarded those who pleased him. It is said that Ti formed a noble court in heaven consisting of all deceased worthy ancestors. The Chineseââ¬â¢s belief in family harmony was associated to belief in the afterlife. The ancestors who were considered commendable served Ti, helping him govern the world. Ancestors were also worshipped and were said to act a mediators between the gods and humankind. It was thought that if ancestors were appropriately honoured, respected, and provided for, they would promote the family's prosperity. A favour or grievance to a member of the family was considered a favour or grievance to the ancestors; consequently, people were reluctant to offense or harm descendants of a powerful family. It was believed that in the afterlife they would live in a celestial court in many ways similar to their earthly courts. Each Chinese family was expected to have an ancestral shrine in the centre of their home to honour and venerate their ancestors. Sacrifice to the gods and the ancestors were also a major part of the Shang religion. When a ruler died, slaves and officials were sacrificed with them in order to guarantee that their afterlife would be the same or similar as their life on earth. People were also sacrificed in smaller numbers when significant events, such as the founding of a palace or temple, took place. Along with their deceased ancestors, the Chinese had people on earth who acted as mediators between the celestials and the human race. Priests were among these intermediates and were responsible for a number of tasks including reading prayers and overseeing sacrifices and funerals. An augur is another type of mediator, responsible for asking gods questions on behalf of humans using various practices of foretelling to unearth the answers. The use of oracle bones was the most notable form of divination. The augur would ask the question, punching holes into the bone, usually the shoulder-bone from an ox, and in some cases the shell of a tortoise. The bone would then be held over a fire, until cracks appeared. These cracks would be made more evident by rubbing ink over the bone. The augur could now read the cracks and determine the answer of the god. Records of the questions and answers of readings were engraved on the bone. Questions on these oracle bones included issues of weather, warfare, agriculture, hunting, childbirth, and sacrifice. In reflection with their agricultural nature, the ancient Chinese use to honour the local deities of soil in order to increase the fertility of earth and to promote the growth of crops. Over time, this practice of earth worship began to dwindle and the veneration of Heaven increased. Divination was considered the only way to determine the requests and future actions of the ruler of Heaven who was also seen as a kind of ancestral figure. The Chinese were animistic and so believed that nature had many spirits. Good spirits, referred to as shen, and bad spirits, referred to as gui, were both thought to dwell in Heaven and Earth. The sun and the rooster were believed to have authority over the gui. This concept of shen and gui later influenced the formation of the yin and yang concept. The people of ancient China believed that there were two contrasting forces abiding in everything in nature; that is yin and yang. This concept was thought to be formed with the influence of the shen and gui concept from earlier ancient China. Yin is characterized as slow, soft, yielding, diffuse, cold, wet, or tranquil; and is associated with water, earth, the moon, femininity and nighttime. Yang, on the other hand, is fast, hard, solid, focused, hot, dry, or aggressive; and is associated with fire, sky, the sun, masculinity and daytime. During the time of the Eastern Zhou, religion in China underwent an evolution. The early gods were forgotten and replaced with ideologies that worked as both philosophies and religions. A phenomenon called the ââ¬ËContention of a Hundred Schools of Thoughtââ¬â¢ took place in ancient China. Schools and philosophers flourished around this time and it was dubbed an era of great cultural and intellectual expansion in China. The four most prominent schools of thought that evolved during this epoch were Confucianism, Taoism, Mohism, and Legalism. Confucius was born 551 BC and grew up to become one of the most influential philosophers in Chinese history. Confucianism is a composite philosophy of moral, social, political, philosophical, and quasi-religious thought. He built his philosophy around five virtues: compassion, morality, decorum, wisdom and honesty. Compassion was considered the cornerstone, symbolizing loyalty, filial piety, patience and benevolence. He also believed that everyone should be in harmony with one another and establish a society ruled by standard etiquette and conduct. A legendary philosopher by the name of Laozi is believed to have established the religious philosophy of Taoism. The ââ¬Ëforces of natureââ¬â¢ is the central belief behind the concept of Tao, which is literally translated as ââ¬Å"the pathâ⬠or ââ¬Å"the way. â⬠Taoism is in many ways the contrary of Confucianism, focusing on the individual within the natural realm rather than the individual within society. It also focuses on the affiliation between humanity and the cosmos, vigour and long life, and wu wei, that is action through inaction, which is said to create harmony with the Universe. Mo Di or Mozi was another Chinese philosopher form the Eastern Zhou period. He was strongly opposed to the teachings of Confucianism and Taoism. Mohism was based on the idea of universal love, ââ¬Ëeveryone is equal before heavenââ¬â¢. Mozi believed that everyone should practice communal love in order to create a heaven on earth. He also believed that an individualââ¬â¢s perception should be the basis of human cognition and not imagination or logic. Mozi advocated abstinence, and therefore opposed music, regarding it as excessive and a waste of resources which could instead be used to help those in need of basic necessities such as food, water and shelter. He even opposed elaborate funerals also regarding it as a waste of money which could be used in more useful matters. He also advocated pacifism thus disapproving of offensive war, only accepting aggressive action to defend the weak. Legalism, while the term itself was invented in the Han dynasty, was one of the major doctrines followed during the Contention of a Hundred Schools of Thought. It was established by Han Feizi and Li Si and theorizes that the human race is evil and in order to prevent this evil causing chaos, laws need to be put in place. Legalism wasnââ¬â¢t concerned with the nature or purpose of life, not even the welfare of the public; rather it sought the states prosperity and military aptitude. Out of these four philosophies, only Confucianism and Taoism are considered religions by scholars, as only they contain spiritual elements. Confucianism and Taoism both became part of what is now known as The Three Doctrine. Buddhism is the third doctrine however it was imported from India and flourished during Imperial China.
Tuesday, July 30, 2019
Cause and Effects of Dehydration and Hydration
Erik Lipka Mrs. Van Mierlo English 101 05 21 February 2013 The Effects of Dehydration and Hydration Water is a necessity in our world today but especially involving the health of human beings. Water is so important to human life that we would not survive without it because people become dehydrated when an insufficient supply of fluids are consumed in a day. ââ¬Å"Human survival is dependent on water ââ¬â water has been ranked by experts as second only to oxygen as essential for lifeâ⬠(ââ¬Å"Health Benefits of Waterâ⬠). Proper hydration and the avoidance of dehydration are mainstays for health and well-being.The importance of drinking water is crucial in order to maintain a healthy and proper functioning body. Dehydration is actually quite common in our society today. ââ¬Å"Dehydration occurs when the amount of water leaving your body is greater than the amount being taken inâ⬠(ââ¬Å"Functional Fit Factsâ⬠). Severe dehydration can be deadly which may caus e symptoms such as intense thirst, absence of sweat, heart racing and delirium. More commonly experienced is a mild or moderate form which results in feelings of dizziness, fatigue, headaches and poor concentration.The majority of folks donââ¬â¢t realize they are undergoing symptoms of mild dehydration and that they can cure themselves with the proper intake of fluids, water for example (ââ¬Å"Functional Fit Factsâ⬠). Proper hydration varies depending on many factors such as age, physical condition and even the climate. A commonly recommended amount of fluid intake is a half-ounce of fluid per pound of body weight, daily (Glenn Sabin). Drinking water helps with the regulation of temperature in the body through perspiration. This is especially important when playing sports. Water also plays a key role in the digestion of food.Food cannot be digested without water. Water is needed to break down and to digest food. It helps to eliminate waste and deliver nutrients to where the y are needed. ââ¬Å"If your body lacks water, your heart, for instance, needs to work harder to pump out the oxygenated blood to all cells, so are the rest of the vital organs, your organs will be exhausted and so will youâ⬠(ââ¬Å"The Benefits of Drinking Waterâ⬠). It is amazing how important water is to our health and well-being. Water is also the basis of all of our bodily fluids such as saliva and blood and it dilutes toxins and removes them from the body through urine (ââ¬Å"The Role of Waterâ⬠).Every cell, from head to toe, needs water and this is why it is so important to drink enough water and stay properly hydrated. Dehydration both mild and severe can result in many harmful effects such as tiredness, headaches, constipation and dry skin. One symptom that indicates dehydration and the need to drink more water is the color of the urine. If your urine is dark yellow or orange in color and has a strong smell, this is an indication that the person is not proper ly hydrated. Urine is usually a pale yellow to clear color when the person is properly hydrated.Skin is the largest body organ and needs plenty of water to prevent dryness. One sign that you are dehydrated is thirst however you should not wait until you are thirsty before drinking more water. Your brain consists 90% of water. A headache and fatigue could very well mean someone is dehydrated and the brain is not functioning properly (ââ¬Å"Benefits of Drinking Waterâ⬠). Water is very beneficial and has many positive health effects. Drinking water helps the body break down fats assisting people with weight loss. When they drink a sufficient amount of water, it acts as an appetite suppressant so it helps people eat less.Since the brain consist mainly of water, being hydrated helps people concentrate, think more efficiently and raises awareness. ââ¬Å"Related to the digestive system, some studies show that drinking a healthy amount of water may reduce the risks of bladder cancer and colon cancerâ⬠(Benefits of Drinking Water). Some cancer causing agents are diluted in the urine reducing the time that they are in the bladder. Another benefit of drinking plenty of water is people are less likely to get sick and they feel healthy. Drinking plenty helps fight against kidney stones, heart attack and the flu.It is also said to improve the immune system (ââ¬Å"Benefits of Drinking Waterâ⬠). The effects of dehydration and hydration are essential to the health of the human body. Being dehydrated can be deadly and hydration is vital to human life. Itââ¬â¢s important to stay hydrated for many reasons in order for the body to function to its greatest ability. Many people are not informed as to the importance of water and are not able to identify the effects of mild dehydration. The symptoms of mild dehydration can be helped simply by drinking enough water.These are the main effects of hydration and dehydration. Works Cited ââ¬Å"The Role of Water in the Body and Why It Is Important That We Drink Enough of It. â⬠Water. N. p. , n. d. Web. 04 Apr. 2013. ââ¬Å"What Is the General Effect of Dehydration on the Body? â⬠What Is the General Effect of Dehydration on the Body? N. p. , n. d. Web. 04 Apr. 2013. ââ¬Å"Proper Hydration and Your Health. â⬠FON Therapeutics. N. p. , n. d. Web. 04 Apr. 2013. ââ¬Å"The Health Benefits of Water. â⬠The Health Benefits of Water. N. p. , n. d. Web. 04 Apr. 2013.
Monday, July 29, 2019
Case Study Research in Supply Chain Management Essay
Case Study Research in Supply Chain Management - Essay Example Supply chain management is developing as one major approach in business management together with the administration. Supply chains are sets of organizations and streams of chains. These streams include finances and products. To achieve a competitive position, (Handfield and Nichols, 1999, p.2) notes; supply chain management should be integrated into improved chain relationship. In the research methodology, two issues were looked at, the first analysis of the research content then outline of the research. Through content analysis research process that was conducted was described according to five steps outlined by Stuart et al. (200) suitable for empirical methods. A model of this process has four steps comprising; material collection, descriptive analysis, dimension selection and material evaluation. Case study research definition makes an empirical inquiry that seeks to establish a contemporary phenomenon within the context that pertain real life. The case study can be used for three different purposes. According to (Yin 2003, p. 3) one of those purposes is a determination of the feasibility of the procedure used in that research. Another purpose is describing completely the phenomenon within the context. It also explains the happenings of the data. For contrast, some cases use replication logic. However, they can be used in the selection of typical cases in the set domain (Eisenhardt, 1989). This particular context gives rise to the question whether the whole study was deeply based.
Sunday, July 28, 2019
Innovative lifestyle self-management Essay Example | Topics and Well Written Essays - 750 words
Innovative lifestyle self-management - Essay Example is considered unique, oneââ¬â¢s lifestyle could be considered innovative insofar as it is unusual in comparison to oneââ¬â¢s peers or colleagues in the social circle. In this regard, I can honestly say that I practice a straightforward lifestyle focused on achieving my personal goals. Currently, my ultimate goal is to finish my studies and to prepare myself for a future career. It is only innovative in terms of the application of my study habits while trying to comply with responsibilities as a child, a friend, a colleague, a citizen, and a productive member of society. I have a talent for prioritizing activities that need to be accomplished. College education is basically voluntary and more expensive where students learn how to manage their own time. Students are expected to take accountability and responsibility for their academic performance through prioritizing compliance to requirements. More importantly, I am never apprehensive to seek much needed support (physical, emotional, and mental) as required in diverse scenarios. Timidity, pride, financial considerations, cultural diversity barriers, among others usually get in the way of availing academic support. I acknowledge that there are more benefits that would be derived from seeking ways and means to ensue that I stay in school until graduation than to allow barriers and hindrances to get in the way. Most often, I seek the right advice, at the right time, at the right place. Self-management, on the other hand, is defined as the ability to ââ¬Å"manage oneââ¬â¢s own emotions and be resilient in a range of complex and demanding situations.â⬠(NHS, 1) Self-management is classified as strategic when it is planned and calculated to achieve a well-defined purpose. Self-management is only feasible and effective when one is in control of personal emotions and behavior given a variety of circumstances. In this case, the strategic self-management is directed to get a targeted job. The only complicating matter is that the
Saturday, July 27, 2019
Employment contracts Essay Example | Topics and Well Written Essays - 500 words
Employment contracts - Essay Example documentation that sets the fundamental grounds for identifying the job requirements, job description, payment terms and methods, employer expectations, health benefits and vacation leaves on behalf of the employersââ¬â¢ interests. On the other hand, these contracts include a number of terms that bind the employees with regards to certain and particular performance standards, obligations to the employer as well as conformance to specifications established. The employment contracts are sought to provide benefits for both parties in interest; however it is a debatable subject whether these benefits are equally distributed on the two sides. Employers are provided with the control over the employee job requirements and are in the position to build upon a relationship that favors their own part. In more details, employers can control the ability of the employees to arbitrarily leave their work through the terms of contract duration. Nevertheless this is also the case for the remaining party in account; employees according to the terms and specifications cannot be dismissed from their job duties or fired prior to executing the contract. In other words, contracts act as documented agreements that provide assurance on both sides that the relationship will be in effect for a given period of time (Mumford, 1995) Any breach of the contract is either resolved in the courts or under the scope of issuing and agreed (on the basis of the contract) co nditions any dispute is to be resolved amongst the members themselves. Employers, however, are benefited mostly due to the fact that on the basis of re-organization of the business and functions can alter unilaterally the terms or the specifications of the contracts. This means that employers with or without the consent of employees are able to modify particular conditions by imposing changes that are in favor of the organization/company. In addition to that these changes may insufficiently meet the requirements and the needs or
Friday, July 26, 2019
BP oil company Knowledge management Assignment Example | Topics and Well Written Essays - 2000 words
BP oil company Knowledge management - Assignment Example This is then followed by a discussion on Knowledge management leadership provision and the research reveals that mid-level BP leadership together with excellence coordinators are responsible for tracking dialogue and knowledge exchange initiatives. The paper also contains an extensive assessment of learning cycle, and this illustrates that the learning sequence is prior to, during and subsequent to any experience and is supported by straightforward process tools. The paper recommends that it is crucial for BP to facilitate sharing of knowledge within its highest quality, in order not to sacrifice integrity of the company and the entire knowledge management system. The group needs to assign more individuals who will be responsible for reviewing, approving and enhancing quality of knowledge and learning cycle before it is shared to other personnel. However, the paper acknowledges that knowledge and learning scheme at BP has resulted in gains amounting to more than hundreds of billions of dollars mostly due to informal personnel networks, in addition to supplementary workplace practices. Introduction BP is among the world leading global oil and Gas Company and it offers its clients with energy for transportation, retail services plus petrochemicals products. The company makes annual sales and additional operating revenues amounting to $375,517 million as of last year. BP has over 83.400 employees spread in over 30 nations with retail sites totalling 21800 (BP Global, 2012). The company has two business segments, which are exploration, production/ refining and Marketing. However, a detached business referred to as, Alternative Energy deals with low-carbon businesses as well as future growth alternatives of oil and gas, such as solar, wind, hydrogen, and bio-fuels. The company business activities are structured into four key areas, comprising the upstream, the downstream, the chemicals, and the gas and power divisions. They all add up to around 150 self-directed bus iness units.Ã BP organizational structure has changed considerably to be more of an entrepreneurial emphasized business unit. Thus, the company board sets up the goals, come up with broader policy measures, and monitors the group CEO performance (Groot, 2009). However, the board does not manage the group businesses, but it delegates responsibility and executive authority to a single point, that of the CEO who is then responsible for refining and marketing affairs. The argument by BP is that a flat organization enables faster decisions making, and at the same time encourages entrepreneurial creativity from its employees along with ideas being managed better. Below the chief executive officer there is the group vice president along with the senior group vice president in charge of safety and operations, and below them there are regional vice presidents whereby individuals such as refinery managers report directly to them. Thus, every business unit contains a high level of independe nce. nevertheless they all share logic of interdependence, in addition to awareness that so as to fulfil their performance goals they will have to become skilled at both from and by each-other. The central corporate organization helps and supports individual business units, and as such individual performance contracts play a crucial role. This brings out commitment to a set of
Thursday, July 25, 2019
We are a caring community of well-rounded individuals who embrace Essay
We are a caring community of well-rounded individuals who embrace leadership, learning, service, and global awareness. With this in mind, which of these characteristics appeal most to you, and why - Essay Example Through learning, I have been able to overcome challenging activities such as the high school process and intensive dance training (FSU, par. 1). I also consider learning as a crucial characteristic since personal experiences have taught me that there is an opportunity for leaning in everyday life. As a result of learning, I have competed as well as won competitions at the Youth American Grand Prix in Orlando, FL and NYC. I consider learning a phenomenal aspect; through learning, I have realized that the best way to be successful in life is by putting more effort. This is exemplified by the struggles I have had as a freshman in upper level honors classes. I have also learnt to cope, especially in my association with new people. Learning had been part of my junior levels when I took my first AP classes. I learnt study skills as well as work ethics that made me prepared for college life. I have developed a desire for learning through my curiosity and inquisitiveness. Through my curiosity, I have developed a learning culture, and I have grabbed every learning opportunity that has come in my life. At my junior level, I learnt vocabularies, carried out tests every Friday, wrote lab reports, conducted projects, and prepared for the AP test. I was able to achieve significant success in these aspects given my desire to learn and acquire new knowledge. I also learnt college algebra at Palm Beach State College, where I also learnt how to develop friendships with other students in college, as well as their lifestyles. I consistently put a lot of effort in my work and persevered a lot; this makes me value learning as a highly crucial aspect in the Florida State University. I also consider learning as a crucial characteristic of the Florida State University since it has enabled me to acquire the qualities of a well rounded individual, as embodied in all the characteristics of Florida State
Ron Teachworths Color Field Painting Essay Example | Topics and Well Written Essays - 500 words
Ron Teachworths Color Field Painting - Essay Example The essay "Ron Teachworthââ¬â¢s Color Field Painting" analyzes the paintings of Ron Teachworth. Teachworth continues to call himself a Detroit native and Detroit artist ââ¬â many of his images began as bit of the urban landscape there. By the year 2000, however, these drawn or photographed subjects became abstractions. As an undergraduate student at Central Michigan University and during graduate work at Wayne State University, Teachworth favored the work of Kandinsky and the Abstract Expressionists (especially DeKooning and Diebenkorn). His work is, by his own description, a ââ¬Å"mystery [of] space, light, color, and composition.â⬠Any of these influences can be seen in his work, from Kandinskyââ¬â¢s play with form to DeKooningââ¬â¢s use of brushstroke to evoke movement to Diebenkornââ¬â¢s structural fields of color. Earlier paintings had a surreal quality in which landscape elements were more realistic, but skies took on a major role. They dominated the lands cape in terms of size and color. A critic labeled them ââ¬Å"sky fields,â⬠a term which stuck with Teachworth as he continued to paint. From that point on the sky field was the most important space within the painting and took on brighter color and, finally, pattern. From there, the artist gradually removed any recognizable subject matter in favor of color and pattern, so that by the year 2000 his canvases became solely that. While developing this style, Teachworth had begun to add an impasto element to the patterning: small ââ¬Å"sticksâ⬠of intensely colored paint laid down.
Wednesday, July 24, 2019
Consciousness Essay Example | Topics and Well Written Essays - 1250 words
Consciousness - Essay Example This is disturbing only if we assume that states of consciousness are mutually exclusive. Insofar as the same subject can experience different forms of consciousness (dreams and waking reality) they need not be mutually exclusive; rather, the fear is that a totally different worldview, and therefore a totally different mode of operating in the world, may be appropriate. For example, it would be unsettling if someone managed to convince us that feudalism is the correct worldview and therefore the correct modus operandi. Our defence of the current worldview (industrial capitalism) would be motivated not only by apprehensions of the alteration in our individual condition (from factory-owner to serf) but perhaps even more by our belief in the props (e.g. belief in free speech and free enterprise) of the current worldview. Our values and beliefs are ultimately determined by our social existence; our knowledge of the world is based on our social relations and conditions. The thesis he posited in contradistinction to Rene Descartes' "Cogito ergo sum" and which is central to Karl Marx's body of work is that "It is not the consciousness of men that determines their existence, but their social existence that determines their consciousness" (Critique of Political Economy 2). Existence itself does not depend on consciousness, much less on meta- consciousness; neither does life or productivity depend on consciousness. Rather, given a certain social structure and an individual's relations to it, subjective consciousness arises from physical reality. Physical reality encompasses everyday material activity (Burke 3), which is determined by the configuration of the individual or socioeconomic class in the current relations of production. An early 21st century American farmer's consciousness arises from the sum of all the activities and relationships he enters as a farmer (planting with a seed-drill, selling his grain to a corporate miller, buying seeds from a transnational biotechnology giant); it is different from the consciousness of the miller or the biotech company, and also from that of a farmer in Soviet Russia. It is different and unique not only because of his position in a salient mode of production (industrial capitalism versus socialism), but also, and equally importantly, because of the non-economic institutions that reflect and propagate that mode of production. Thus the early 21st century American farmer's consciousness is determined also by the media, the church, the system of education, the family - in short, by all that can be summed up as 'culture.' Althusser calls these cultural institutions the Ideological State Apparatuses (ISAs) - in contrast to the Repressive State Apparatuses (Althusser 3) which operate by direct force (law, police, army). The ISAs grow up on the base of the mode of production, reflect it, and reinforce it; they represent the ideology of the dominant mode of production. This is true of every human society under every mode or production: it can be understood, not as a conspiracy (Burke 4), but as reflections in ideology of the mode of production. By reflecting the mode of production, ideology also propagates it: every time the status quo is mirrored in culture (e.g. in advertisements or
Tuesday, July 23, 2019
The utilization of ACE inhibitors in Congestive Cardiac Failure Essay
The utilization of ACE inhibitors in Congestive Cardiac Failure - Essay Example Renin release is followed by conversion of hepatic angiotensinogen to angiotensin I which is subsequently converted to angiotensinogen II by the enzyme angiotensin converting enzyme (ACE). ACE is found in high concentrations in the pulmonary circulation, systemic vasculature and kidney. Angiotensinogen in turn carries out two important independent actions to bring the hemostasis back to normal: the direct vasoconstrictve effect to improve the blood pressure and stimulation of adrenal cortex to secrete aldosterone which results in sodium retention and potassium excretion. Aldosterone also responds to adrenocorticotrpic hormone (ACTH) and potassium excess for its release. The aldosterone action for sodium resorption by the distal convoluted involves the mineralocorticoid receptor (MR); the induction of the basolateral sodium-potassium ATPase pump and the apical sodium channel (Stewart pp1-10) (Weber 2001). Congestive cardiac failure is the condition when heart is unable to carry out its normal function of pumping blood to supply oxygen and nutrients to different parts of the body including vital organs, in other words there is an insufficient cardiac out to meet the demand of the body. Human body, initially, responses to this pathology by the expansion of the intravascular volume. The renin-angiotensin-aldosterone system comes into action to bring back the perfusion pressure and then maintain it. Renin stimulation increases the level of angiotensinogen II in the blood, which in turn increases the peripheral resistance to improve blood pressure and thus perfusion of the tissue. Secondly, it also stimulates the adrenal cortex to secrete aldosterone. Some other major stimuli, like angiotensinogen act to increase the secretion of aldosterone, which include: elevated potassium levels in exchange for sodium excretion and plasma corticotrophin level which increases in the congestive cardiac failure on long term basis. These two stimuli are very strong and eventually result in high levels of aldosterone in the circulation (Weber 2001) (Peterson 2002). Another factor which keeps aldosterone in very high concentration in the circulation is its decreased degradation in the liver because of reduced perfusion of liver in congestive cardiac failure. This reduction causes many fold increase in aldosterone level. So increase in angiotensinogen II due to overactivity of the renin-angiotensin-aldosterone system results in the resorption of sodium from the proximal nephron and aldosterone release increases the resorption from the distal nephron. This also results in decreased serum level of potassium and magnesium. As body respond to the congestive cardiac failure on long-term basis so these changes in the renin-angiotensin-aldosterone system may result in remodeling of various tissues in the body (Weber 2001). There are some morphological changes which occur as a result of the remodeling of various tissues. In response to increased aldosterone secretions, Na+ /K+-ATPase activity increases to maintain the osmolarity between extracellular and intracellular compartments. Some morphologic changes also occur resulting in perivascular, atrial and ventricular fibrosis. Thus may be due to increase in
Monday, July 22, 2019
Phases of vietnamese buddhism Essay Example for Free
Phases of vietnamese buddhism Essay The history of Buddhist education in Vietnam can be studied by dividing it into four separate phases or periods. The formation of Buddhism in Vietnam. This started from the common era and lasted till the end of Chinese dominion Climax of Buddhism. Buddhism was at its peak during the independence The decadence after the Le Dynasty Revival period. This started in the beginning of the 20th century and has not ended yet. The period before the Common Era lays the foundation for the beginning and development of Buddhist education in Vietnam. It was the time when Siddhartha Gautama, who will later attain enlightenment and will be called as ââ¬ËBuddhaââ¬â¢ was born. As he was born in India, Indians were the first to learn Buddhism. Later when Buddhism came to China, many Chinese monks went to Vietnam in order to spread Buddhism. However, it believed that the Chinese and Indian merchants came to Vietnam for trading. They brought monks with them saying that the monks were the ââ¬Å"calmer of the seaâ⬠These monks started preaching their religion in Vietnam. It was easy for them to teach their religion to many people at a time, as Luy-Lau, later known as Ha-Bac was the centre of all trading activities. All the merchants who came here to trade, and merchants who were travelling between India and China, stopped here to rest, therefore, monks were able to spread their religion very easily. Many missionary activities were started as a result. Monasteries were built and Buddhism became important. This was the first time ever in the history of Vietnam, that monasteries were built . The next period or phase proved to be best for Vietnamese Buddhism. In this period Buddhist studies were at their peak and many famous people and rulers converted to this religion. It was when King Dinh Tien Hoang came in to power. Buddhism has its own hierarchy of monks and priests who were accepted by the court. Buddhism was now supported by the royal court and this helped many positive changes to take place. Buddhists were now respected and were considered as learned people. They were asked advice by the royal court and the rulers before taking decisions. This helped them get involved in many political and religious decisions and hence providing many decisions to be taken according to them. This era truly proved to be the best for Buddhist studies and it became one of the most predominant religions. After this, many kings and emperors converted to Buddhism. Many laws came into practice in this era, which were influenced by Buddhism, and hence were in favor of the Buddhists. Van Hanh became a Buddhist in this period. He is known as the meditation master and has influenced many people to convert to Buddhism. Any ruler who was not Buddhists was at least the supporter of Buddhism and this was a very positive point for the Buddhists. In 1010 A. D, almost eight monasteries were built in Ha Bac. All other monasteries and Buddhist temples were also repaired. Tripitaka texts, which were in China initially, were brought in Vietnam. Thousands of Buddha statues and paintings were made and set up. Festivals were set up. Many new monasteries such as Sung Kharh monastery and monastery at Mount Ba were built. In 1086 A. d Dai Lam monastery was built in Ha Bac. Later in 1118 A. D Thien Phat was built which had almost 1,000 Buddha statues . BUDDHIST STUDIES The entire Buddhist education comes from the studies of Buddha, who is the supreme teacher. All of the studies root from saddha, which is the faith in triple Gem. Depdnding upon these studies the students are taught according to the five rules. The students should know the rules, their reason and their appliance in daily lives. Most importantly, they should appreciate all these rules and believe in them. The students should know what is generosity and self sacrifice. These are essential elements that help the students overcome their worldly desires, their selfishness and greed. These five moral rules are dependent on each other. A student can gain by suta, which is by extensive reading of Buddhism texts. According to Buddhist studies the knowledge of a person is dependent on his inside belief of truth i. e. Dhamma. Calm and insight are the two main elements of any Buddhist teaching. In Buddhist education tasks and wisdom are dependent on each other. A student can attain wisdom by deep investigation, discussion and intelligence. This wisdom was the basic instruments which lead Buddha to salvation. This wisdom is the crown of all educations of Buddhism. Without wisdom, education is incomplete. Before French, people were chosen based on their education. These were officials known as ââ¬Å"mandarinsâ⬠. Learning was very important in those times. It was not just education but it lead a person to intellectual understanding, social standing, wealth and power. Buddhism came directly from India, hence there are many words in Vietnamese Buddhism which are influenced or are taken directly from India. The word Buddha is also taken as it is. However, as the Vietnamese culture is influenced a lot from the Chinese, hence when Chinese monks came to Vietnam, the word Buddha was replaced by the word Phat. In those days, Buddhism in Vietnam was influenced by Theravada Buddhism. It was seen as religion which helped good people and punished the bad. It was very difficult to teach Buddhism at that time as very little literature was available. Vietnamese had no written script; hence a few translations were made in Chinese. The era between 544 and 602 was an independent era and was helpful in spreading Buddhism.
Sunday, July 21, 2019
Diseconomies of Scale, and the Law of Diminishing Return
Diseconomies of Scale, and the Law of Diminishing Return Compared to other markets, why do economists consider perfect competition to be the most efficient market structure? Perfect competition is the most efficient market structure because, in the long run, each firm in the market will be producing at its minimum average cost, or per-unit. This means that consumers get desired goods and services at the lowest possible prices, and also that the firms are economizing on societys scarce resources to the greatest extent possible. What is the difference between the concepts of diseconomies of scale, and the law of diminishing return? (4 marks) Law of diminishing return occurs in the short-run when one factor is fixed. If the variable factor of production is increased, there comes a point where it will become less productive and therefore there will eventually be a decreasing marginal and then average product. When long-run average total cost rises as output increases, there are said to be diseconomies of scale. a. Sally owns a ceiling fan company. Last year, she sold 1000 ceiling fans at $50 each, and each fan cost her $20. Before going into the ceiling fan business, she worked as a fan-dancer at $25,000 a year. She used her own money to buy the fans by withdrawing the money from her savings account where it was earning five percent annual interest. Calculate Sallys economic profit and her accounting profit. Should Sally continue with her ceiling fan business? Explain. (6 marks) If her economic profit is at least zero, Sally should stay in business. Her TR = $50,000 and her total accounting cost is $20,000, for an accounting profit of $30,000. She forgoes interest on savings of $20,000 (.05) = $1,000 as well as forgone earnings of $25,000. This leaves $4,000 in economic profit, so she should stay in business. Bob Edwards owns a bagel shop. Bob hires an economist who assesses the shape of the bagel shops average total cost (ATC) curve as a function of the number of bagels produced. The results indicate a U-shaped average total cost curve. Bobs economist explains that ATC is U-shaped for two reasons. The first reason is the existence of diminishing marginal product, which causes it to rise. What is the second reason? Explain your answer. Assume that the marginal cost curve is linear. (4 marks) Average fixed cost always declines as output rises because fixed cost is being spread over a larger number of units, thus causing the average total cost curve to fall. a. Provide two circumstances in which monopoly may offer efficiency advantages over competition. (4 marks) A monopolist might be better positioned to exploit economies of scale leasing to an equilibrium which gives a higher output and a lower price than under competitive conditions. As firms are able to earn abnormal profits in the long run there may be a faster rate of technological development that will reduce costs and produce better quality products for consumers. This is because the monopolist will invest profits into research and development to promote dynamic efficiency. Explain the practice of tying and discuss why it is controversial. (5 marks) Tying is the practice of bundling goods for sale. It is controversial because it is perceived as a tool for expanding the market power of firms by forcing consumers to purchase additional products. However, economists are skeptical that a buyers willingness to pay increases just because to products are bundled together. In other words, simply bundling two products together doesnt necessarily add any value. It is more accurately believed to be a form of price discrimination. Describe the source of tension between cooperation and self-interest in a market characterized by oligopoly. Use an example of an actual cartel arrangement to demonstrate why this tension creates instability in cartels. (5 marks) The source of the tension exists because total profits are maximized when oligopolists cooperate on price and quantity by operating as a monopolist. However, individual profits can be gained by individuals cheating on their cooperative agreement. This is why cooperative agreements among members of a cartel are inherently unstable. a. If the average total cost curve is falling, what is necessarily true of the marginal cost curve? If the average total cost curve is rising, what is necessarily true of the marginal cost curve? (5 marks) When average total cost curve is falling it is necessarily above the marginal cost curve. If the average total cost curve is rising, it is necessarily below the marginal cost curve. Describe the difference between average revenue and marginal revenue. Why are both of these revenue measures important to a profit-maximizing firm? (5 marks) Average revenue is total revenue divided by the amount of output. Marginal revenue is the change in total revenue from the sale of each additional unit of output. Marginal revenue is used to determine the profit-maximizing level of production and average revenue is used to help determine the level of profits. Describe the process by which the market for capital and the market for land reach equilibrium. As part of your description, elaborate on the role of the stock of the resource versus the flow of services from the resource. (6 marks) Equilibrium in the markets for land and capital are governed by the value of marginal product for these factors relative to their supply. One difference between these markets and the market for labor is the distinction between rental value (flow) and purchase price (stock). This difference is reconciled by noting that in efficient markets, the purchase price should reflect the value of the stream of services provided by the land or capital (or the sum of rental values appropriately discounted). a. List and explain two conditions necessary for firms to be able to successfully practice price discrimination. (2 marks) Differences in price elasticity of demand between markets: There must be a different price elasticity of demand from each group of consumers. The firm is then able to charge a higher price to the group with a more price inelastic demand and a relatively lower price to the group with a more elastic demand. By adopting such a strategy, the firm can increase its total revenue and profits. To profit maximize, the firm will seek to set marginal revenue = to marginal cost in each separate (segmented) market. Barriers to prevent consumers switching from one supplier to another: The firm must be able to prevent market seepage or consumer switching defined as a process whereby consumers who have purchased a good or service at a lower price are able to re-sell it to those consumers who would have normally paid the expensive price. This can be done in a number of ways, and is probably easier to achieve with the provision of a unique service such as a haircut rather than with the exchange of tangible goods. Seepage might be prevented by selling a product to consumers at unique and different points in time for example with the use of time specific airline tickets that cannot be resold under any circumstances. Explain how each of the following industries practices price discrimination: (6 marks) restaurant Restaurants sometimes have childrens menus. It can be profitable if adults who come to restaurants with children are, on the average, more sensitive to prices on menus than adults who come to restaurants without children. Children often do not value restaurant food and service, and often waste a large part of their food. Parents know this and do not want to pay a lot for their childs meal. If restaurants treat children like adults, the restaurants may lose customers as families switch to fast-food restaurants. If this explanation is correct, then restaurants price discriminate. airline Airlines charge different prices for seats on the same plane, depending on when the ticket was purchased, how long the traveler will be staying at the destination, etc. Of course, the cost of operating the plane is independent of these variables. Hairdresser A hairdresser may charge a lower price to children than to adults. The reason they do this is that they believe children to have a differing elasticity of demand to adults. In other words, the price needed to maximize revenue from children is not the same as the price needed to maximize revenue from adults. By charging different prices they will maximize revenue from both groups Calculate the total revenue without price discrimination as well as with price discrimination, and complete the table with your calculations. (4 marks) Price Qd TR TR (with perfect price discrimination) 30 0 22 10 220 220 14 16 224 304 10 24 240 464 7 38 266 562 Briefly describe the characteristics of each of the following market types. Give an example of each market type. (8 marks) pure competition The goods being offered for sale must all be the same. The buyers and sellers must be so numerous that no single buyer or seller influences the market price. Buyers and sellers are price takers. An example would be the wheat market. Monopoly A monopoly is a market in which there is only one seller and the seller sets the price of the product, given the demand curve for that product. An example would be a local cable television company. Oligopoly An oligopoly is a market in which there are only a few sellers, and the sellers do not always compete aggressively. An example would be airline routes. monopolistic competition Monopolistic competition is a market containing many sellers offering slightly different products. Because the products are not the same, sellers have some ability to set price. An example would be the software industry. Use the graph below to explain why a profit-maximizing monopolistically competitive firm must operate at excess capacity. Why is a perfectly competitive firm not subject to the same constraint? (6 marks) Competitive firms do not face downward-sloping demand. The graph shows the firm choosing a level of production in which the intersection of marginal revenue and marginal cost occurs at an output level where average total cost is decreasing. This profit-maximizing output level is less than the efficient scale (minimum of average total cost) and therefore the firm is said to be operating at excess capacity. If the monopolist depicted in the graph below sets a price of $10 and sells 100 units, the corresponding marginal revenue is $5 and marginal cost $3. What recommendation regarding price and quantity would you give this monopolist? Explain your answer. (6 marks) Since MR exceeds MC, recommend an increase in output. Greater sales will require a price reduction. So reduce P below $10 and increase Q above 100. The marketing division of a firm has measured demand for its product and reports that it is Q = 24 P, where Q is units and P is price per unit in dollars. The cost is given in the table below. Complete the table and determine the profit-maximizing level of output for this firm. (6 marks) As indicated in the table below, the optimal output is Q = 5, where MR = MC = 5.80. Output Total Cost Price Revenue Profit 0 10 24 0 -10 1 18 22 22 4 2 20 20 40 20 3 22 18 54 32 4 25 16 64 30 5 29 14 70 41 6 34 12 72 38 7 40 10 70 30 8 48 8 64 16 Define the following terms and explain their importance to the study of economics. (9 marks) barriers to entry Barriers to entry make it difficult or impossible for other firms to enter an industry, thus allowing monopoly to continue to exist. Some examples of barriers include legal restriction on entry, patents, control of scarce resources, large sunk costs, technical superiority, and economies of scale. Patent A patent is a government-granted legal monopoly given to the inventor of a new product or process. During the life of the patent, the firm has a protected monopoly position. Thus, it serves as a barrier to entry. natural monopoly A natural monopoly is an industry in which advantages of large-scale production make it possible for a single firm to produce the entire output of the market at lower average cost than a number of firms each producing a smaller quantity. Most natural monopolies are regulated utilities.
Islam and terrorism
Islam and terrorism INTRODUCTION When the terrorists attacked the United States on the morning of September 11, 2001, they set in motion a sequence of events that demonstrated unequivocally the power and influence ofterrorism. Less than two hours of unimaginable violence by nineteen terrorists led to repercussions felt around the world. Beyond the death and destruction that the terrorists caused more than 3,000 people were killed in the suicide attacks on the World Trade Center and the Pentagon. They also inflicted a deep psychological wound upon United States and the rest of the world.[1] Although the United States had experienced major terrorist attacks on its soil in the past, including the 1993 bombing of the World Trade Center and the 1995 bombing of the Alfred P. Murrah Federal Building in Oklahoma City, the September 11 attacks were beyond most peoples worst nightmare. Hijacked planes crashing into U.S. landmarks and live television coverage of the twin towers of the World Trade Center collapsing images that will likely be etched in ones mind forever. The tragedy of September 11, 2001, has revealed the roots of deep planetary contradictions that threaten the world community and indeed life itself on planet Earth. This act of unprecedented terror against thousands of innocent people ought, at last, to start humanity thinking about the stark incompatibility of modern achievements in the areas of scientific knowledge, human rights, and the establishment of human moral standards with ideological, nationalistic, or religiousfanaticism in any form. Lately, most of the terrorismseems to be about Islam, and it all seems to be the same. By all accounts the specter of jihadism looms large. Even if we suspend the belief for a moment and simply cast aside all those terrorist groups that clearly have nothing at all to do with the Islamic religionthe Tamil Tigers in Sri Lanka, the FARC in Colombia and the IRA in Ireland (to name but a few)we are still left with a slew of seemingly similar groups all motivated by and distorting Islam to suit their own ends[2]. The anatomy of propaganda The document found in a suitcase belonging to leading September 11, 2001, terrorist Muhammed Atta further strengthens this belief. The suitcase document is reproduced below and analysed in the ensuing paragraph: Pray during the previous night. Remember God frequently and with complete serenity. Visualize how you will respond if you get into trouble. Read verses of the Quran into your hands and rub them over your luggage, knife, and all your papers. Check your weapons, perform ablution before you leave your apartment, and remember God constantly while riding to the airport. Take courage and remember the rewards which God has promised for the martyrs. [3] The suitcase document is remarkable for four reasons. First, it embodies a classic ascetical strategy for applying formulaic principles to intended actions. Second, it shares much in common with repetitive techniques for self-hypnosis. Third, it bears a striking resemblance to mainstream traditions such as Catholicism in ascetical manuals like The Spiritual Exercises of St. Ignatius of Loyola or The Rule of St. Benedict that says, keep death daily before ones eyes. Whether or not such manuals threaten human freedom depends, of course, on the various contexts in which they have been presented. If in the wrong hands they can function as formulas and meditations both for indoctrination and for fighting holy wars. Fourth, the document from the suitcase directly connectsreligiousformulas and meditations with intentions to perpetrate mass murder. Practical checklists of objectives, terrifying in magnitude, are interwoven withreligiousstatements and then repeated and applied as mantras of s elf-indoctrination. Religion The Terrorists Best Weapon Whileterrorism even in the form of suicide attacks is not an Islamic phenomenon by definition, it cannot be ignored that the lions share of terrorist acts and the most devastating of them in recent years have been perpetrated in the name of Islam. This fact has sparked a fundamental debate both in the West and within the Muslim world regarding the link between these acts and the teachings of Islam. Most Western analysts are hesitant to identify such acts with the bona fide teachings of one of the worlds great religions and prefer to view them as a perversion of a religion that is essentially peace-loving and tolerant. Western leaders such as George W. Bush and Tony Blair have reiterated time and again that the war againstterrorismhas nothing to do with Islam. It is a war against evil[4]. Modern International Islamistterrorismis a natural offshoot of twentieth-century Islamic fundamentalism. The Islamic Movement emerged in the Arab world and British-ruled India as a response to the dismal state of Muslim society in those countries: social injustice, rejection of traditional mores, acceptance of foreign domination and culture. It perceives the malaise of modern Muslim societies as having strayed from the straight path (as-sirat al-mustaqim) and the solution to all ills in a return to the original mores of Islam. The problems addressed may be social or political: inequality, corruption, and oppression. But in traditional Islamand certainly in the worldview of the Islamic fundamentalistthere is no separation between the political and thereligious. Islam is, in essence, both religion and regime (din wa-dawla) and no area of human activity is outside its remit. Be the nature of the problem as it may, Islam is the solution.[5] The role of religion of Islam needs closer examination since the majority of terrorists of contemporary times are practising the religion of Islam. One of the enduring questions is what religion of Islam has to do with this. Put simply, does religion of Islam cause terrorism? Could these violent acts be the fault of religion-the result of a dark strain of religious thinking that leads to absolutism and violence? Is religion the problem or the victim? When one looks outside ones faith it is easier to blame religion. In the current climate of Muslim political violence, a significant sector of the American and European public assumes that Islam is part of the problem. The implication of this point of view is the unfortunate notion that the whole of Islam has supported acts of terrorism. Most Muslims refused to believe that fellow members of their faith could have been responsible for anything as atrocious as they September 11 attacks-and hence the popular conspiracy theory in the Muslim world that somehow Israeli secret police had plotted the terrible deed. Recently, however, Islam and fundamentalism are tied together so frequently in public conversation that the term has become a way of condemning all of Islam as a deviant branch of religion. But even in this case the use of the term fundamentalism allows for the defenders of other religions to take comfort in the notion that their kind of non-fundamentalist religion is exempt from violence or other extreme forms of public behaviour.[6] CHAPTER II METHODOLOGY Statement of Problem Terrorism has been a persistent feature of warfare and the international security environment for centuries. The magnitude and impact of terrorism has not remained consistent but rather has ebbed and flowed over the course of time. Today terrorism has emerged as one of the most significant international and regional security issues. The terror attacks of Sep 11 have brought about a lasting change in the way contemporary society perceives the religion of Islam. The perception of the people all across the globe has been that Islam is source of violence. Scope Islam is a vast religion and consists of various facets. The dissertation would aim to study the historical perspective of terrorism, conceptualise terrorism and then determine how religion is used as a motivator for terrorism before studying the Quranic interpretations associated with the violence and finally aim to answer the question Is there a link between Terrorism and Islam. The scope does not cover the causes and motivators of terrorism like cultural conflict, globalisation, and economic disparity e.t.c. but is limited to investigate the general belief that Islam is associated with the terrorism. Methods of Data Collection Data for this research has been collected from the following sources: Books, journals, periodicals and studies on the subject. Authenticated information from selected web sites. A bibliography of the books, periodicals and web sites referred to is appended at the end of text. Organisation Of The Dissertation Topic is intended to be dealt in the sequence enumerated below: Introduction Methodology The Genesis of Terrorism A historical perspective. Conceptualising terrorism Definitions. How religion is used as a motivator for terrorism. Interpretations of Quran and Terrorism. Conclusion Is there a link between Islam and terrorism? CHAPTER III THE GENESIS OF TERRORISM A HISTORICAL PERSPECTIVE Introduction The terrorism is as old as the human civilization. Although the use of violence has been integral to the human beings in the entire process of evolution. Zealots of Judea. The earliest known organization that exhibited aspects of a modern terrorist organization was the Zealots of Judea. Known to the Romans as sicarii, or dagger-men, they carried on an underground campaign of assassination of Roman occupation forces, as well as any Jews they felt had collaborated with the Romans. Eventually, the Zealot revolt became open, and they were finally besieged and committed mass suicide at Masada fortress. The Assassins. The Assassins were the next group to show recognisable characteristics of terrorism, as we know it today. A breakaway faction of Shia Islam called the Nizari Ismalis adopted the tactic of assassination of enemy leaders because the cults limited manpower prevented open combat. Their leader, Hassam-I Sabbah, based the cult in the mountains of Northern Iran. Their tactic of sending a lone assassin to successfully kill a key enemy leader at the certain sacrifice of his own life (the killers waited next to their victims to be killed or captured) inspired fearful awe in their enemies. The Zealots of Judea and the Assassins were forerunners of modern terrorists in aspects of motivation, organisation, targeting, and goals. Although both were ultimate failures, the fact that they are remembered hundreds of years later, demonstrates the deep psychological impact they caused. The period between 14th and 18th century was of relative calm. From the time of the Assassins (late 13th century) to the1700s, terror and barbarism were widely used in warfare and conflict, but key ingredients for terrorism were lacking. Until the rise of the modern nation state after the Treaty of Westphalia[8] in 1648, the sort of central authority and cohesive society that terrorism attempts to influence barely existed. Communications were inadequate and controlled, and the causes that might inspire terrorism (religious schism, insurrection, ethnic strife) typically led to open warfare. By the time kingdoms and principalities became nations, they had sufficient means to enforce their authority and suppress activities such as terrorism. The French Revolution. The French Revolution provided the first uses of the words Terrorist and Terrorism. Use of the word terrorism began in 1795 in reference to the Reign of Terror initiated by the Revolutionary government. The agents of the Committee of Public Safety and the National Convention that enforced the policies of The Terror were referred to as Terrorists. The French Revolution provided an example to future states in oppressing their populations. It also inspired a reaction by royalists and other opponents of the Revolution who employed terrorist tactics such as assassination and intimidation in resistance to the Revolutionary agents. The Parisian mobs played a critical role at key points before, during, and after the Revolution. Such extra-legal activities as killing prominent officials and aristocrats in gruesome spectacles started long before the guillotine was first used. The 19th Century Narodnya Volya. The terrorist group from this period that serves as a model in many ways for what was to come was the Russian Narodnya Volya (Peoples Will). They differed in some ways from modern terrorists, especially in that they would sometimes call off attacks that might endanger individuals other than their intended target. Other than this, they showed many of the traits of terrorism for the first time. These traits included clandestine tactics, cellular organisation, impatience and inability for the task of organising the constituents they claim to represent and a tendency to increase the level of violence as pressures on the group mount. Internationalisation of Terrorism Modern Terrorism. The age of modern terrorism might be said to have begun in 1968 when the Popular Front for the Liberation of Palestine (PFLP) hijacked an El Al airliner en route from Tel Aviv to Rome. While hijackings of airliners had occurred before, this was the first time that the nationality of the carrier (Israeli) and its symbolic value was a specific operational aim. Also a first was the deliberate use of the passengers as hostages for demands made publicly against the Israeli government. The combination of these unique events, added to the international scope of the operation, gained significant media attention. The founder of PFLP, Dr. George Habash observed that the level of coverage was tremendously greater than battles with Israeli soldiers in their previous area of operations. At least the world is talking about us now.[9] Cooperation. Another aspect of this internationalisation is the cooperation between extremist organizations in conducting terrorist operations. Cooperative training between Palestinian groups and European radicals started as early as 1970, and joint operations between the PFLP and the Japanese Red Army (JRA) began in 1974. Since then international terrorist cooperation in training, operations, and support has continued to grow, and continues to this day. Motives range from the ideological, such as the 1980s alliance of the Western European Marxist-oriented groups, to financial, as when the IRA exported its expertise in bomb making as far afield as Colombia. Current State of Terrorism The roots of todays terrorism began to grow in 1990s. The largest act of international terrorism occurred on September 11, 2001 in set of coordinated attacks on the United States of America where Islamic terrorists hijacked civilian airliners and used them to attack the World Trade Center towers in New York City and the Pentagon in Washington, DC. After September 11, it is very easy to be nostalgic about the 1990s. In fact, the post Cold War decade was a very chaotic period. Americans were absorbed by domestic issues and lulled by the fact that the Cold War was over[10]. Summary There were two great forces at work through the 1990s. First, there were the forces of integration, including global economic growth, cross-border development, the communications revolution and the spreading of democracy. The power of these forces was captured in the popular phrase, The End of History. Thats what seemed to be happening after the fall of the Berlin Wall and all of the other great events that were affecting world history. But there was also a second set of equally powerful forces-the forces of disintegration-including religious and ethnic conflict, an ever-widening North-South gap, religious fundamentalism (Islamic and otherwise) and terrorism. The power of these forces was captured in the phrase, the Clash of Civilizations. While I disagree with the ultimate conclusion of Samuel Huntington, the author of that phrase, that the clash is inevitable, Huntingtons words nonetheless capture the import of the forces that were producing post-Cold War conflicts. CHAPTER IV CONCEPTUALISING TERRORISM A few terms that are important to the study of violence in Islam are: terrorism, religious terrorism and Islamic terrorism. A discussion of these terms will permit a comprehensive analysis on the way in which the use of violence sanctioned by the Quran and its interpretations amounts to Islamic terrorism. Terrorism Terrorism is a non-political act of aggression in which the extent of violence used is outside the realm of normative behavior[11]. Terrorists use or threaten to use this violence against combatants and non-combatants to achieve political, social, economical or religious change within a given community. These reforms appeal to the terrorists and do not represent popular opinion of the society from which terrorism arises and terrorists are no respecters of borders[12]. Thus Omar Abdullah, the Chief Minister of Jammu and Kashmir says that there are no well defined or internationally accepted criteria to designate an organization as terrorist. However the UN Security Council has, on occasion, adopted resolutions putting in place specific sanctions and measures against individual countries orcertain terrorist organizations[13]. According to Kofi Annan the Ex Secretary General of the United Nations, the manifestations of terrorism are limitless. The only common denominator among different variants of terrorism is the calculated use of deadly violence against civilians[14]. Terrorists are those who violate the right to life, liberty and security[15] vested in each civilian by the UNs Universal Declaration of Human Rights Resolution: 217 A (III). Thus the Foreign and Commonwealth Office (FCO) of the United Kingdom defines terrorism as a movement in which terrorists directly challenge the authority of democratically elected governments to manage their countrys affairs peacefully, according to the rule of law and internationally accepted fundamentals of human rights[16], to satisfy their own liking. Religious Terrorism Religious terrorism occurs when the use of terrorism is systematized by an ideological and fanatical interpretation of a religious text. Religious terrorist groups functioning in the absence of this pretext, create junk terrorism[17]. According to Charles Kimball, religious terrorism functions on the basis of five essential principles. These are: means justify the end, holy war, blind obedience, absolute truth claims and the ideal times. Kimball explains that truth claims are essential points in a religion at which divergent interpretations arise[18]. Extreme interpretations of truth claims provoke the ideology upon which religious terrorism is based. However the authentic religious truth claims are never as inflexible and exclusive as zealous adherents insist[19]. The staunch truth claims professed by religious terrorists, allow them to use religious structures and doctrinesalmost like weapons[20] for their movement. In the process, religious convictions that become locked into absolute truths can easily lead people to see themselves as Gods agents. People so emboldened are capable of violent and destructive behaviour in the name of religion[21]. This conviction creates fanatical interpretations and ideologies that give rise to religious terrorism. Nancy Connors Biggos[22], states that foreign observers are unfamiliar with the extreme interpretations of religious terrorists. Thus scholars often dismiss the rhetoric of religious terrorism as one that is devoid of any strategic motivation. This creates a dearth of quantifiable data that can be used to assess religious terrorism. However Biggo explains that the lack of understanding or data cannot dismiss the fact that religious terrorism is systematized by extreme interpretations of a religious text. Therefore Wener Ruf, states, where God was pronounced dead all notions of morality have been turned into nihilism[23]. Islamic Terrorism Islamic terrorism is a movement in which the violence caused by terrorism is derived from and used to preserve extreme interpretations of the Quran, in an Islamic community. An in-depth discussion of the how Islamic terrorism is invoked from the Quran, will be discussed in a separate chapter. However, preliminarily speaking Islamic terrorism exists where there is a controversy over sacred space[24]or a Kuranic tenet has been violated. Participants of this movement call for unquestioned devotion and blind obedience[25] to the word of God in order to ameliorate un-Islamic conditions. Islamic terrorism is itself a controversial phrase, although its usage is widespread throughout the English-speaking world. Ordinary Muslims who have nothing to do with terrorism find it reprehensible because it forces upon them a label simply because they, too, are believers of Islam. In fact, the common Muslim believes that you are making him a racial hate target by using the word Islam with terrorism. Bernard Lewisbelieves that the phrase Islamic terrorism is apt, because although Islam, as a religion is not particularly conducive to terrorism or even tolerant of terrorism. In his own words: Islam has had an essentially political character from its very foundation to the present day. An intimate association between religion and politics, between power and cult, marks a principal distinction between Islam and other religions. In traditional Islam and therefore also in resurgent fundamentalist Islam, God is the sole source of sovereignty. God is the head of the state. The state is Gods state. The army is Gods army. The treasury is Gods treasury, and the enemy, of course, is Gods enemy. CHAPTER V RELIGION AS A MOTIVATOR FOR TERRORISM The overwhelming problem in the world today, everyone knows, is terrorism, where people in the name of religion kill each other, kill others just to go to heaven, and thinking only they will go to heaven. . Introduction. The dynamics whereby religion becomes a motivator for terrorism is complex but highly understandable. What terrorists groups using this dynamic have begun to understand is that most ordinary citizens are not highly interested in politics nor dedicated to working for social change. Many ordinary citizens are however interested in religion as it relates to their personal lives and morals and because of this they can be emotionally manipulated when they learn of social injustices particularly if they view them through the lens of religious rhetoric. This is specifically true in todays world of instantaneous news coverage where it is possible to whip up political and religious outrage over events that are seen to be bordering on religious threshold. This is certainly true in the case of al Qaeda and its loosely affiliated groups within what is now commonly referred to as the global salafi jihadist movement[26]. Religious Brainwash. Following the Afghan war in which Islamic peoples from many nations came together to successfully throw out the Russian infidel, Osama bin Laden and similar groups have successfully managed to continue to widen their global appeal by showcasing social injustices against Muslims. This helps to create within a wide group of otherwise less connected Muslim ethnic groups identification with the victims and with each other as a caring and responsive community for their Muslim brothers. Typically, these groups make use of the human rights abuses occurring within the Israeli/Palestinian and Russian/Chechen conflicts and now also include the occupations in Iraq and Afghanistan. The making of a Terrorist. While instantaneous and repetitive satellite coverage of worldwide events is enough to show injustices and to even create identification with victims sharing similar ethnic or religious backgrounds it is not sufficiently enough to fuel terrorism. However, with the addition of religious rhetoric it is transformed into a potent mix. This transformation is achieved via the following means:- Great Moral Wrong. First the event is presented as a great moral wrong, a threat to religious morality or purity and as one that must be corrected. The message, which is crafted for unhappy persons, social outcasts or those who are already suffering from religious guilt, is framed as one of good and evil and the listener is admonished to be on the side of good. Mind of God. The second tactic in which religion is used to motivate terrorism is convincing the person that it is possible to know the mind of God. For this purpose scriptures are used, and misused, to clearly identify the social wrongs as evil, immoral or impure. Once identified as threats to morality, this tactic is used to take it a step further with additional scriptures that are used to justify violence in order to destroy the evil. In this way religion is co-opted as the means to morally justify violence in the pursuit of social change. While the world debated about the first strike in the Iraq War (to be carried out by the U.S., Great Britain and their coalition forces), moralists all over the world debated about the doctrine of just wars, thereby holding forth about the mind of God on these matters. Overcoming Guilt. Thirdly, because nearly all religions hold human life as sacred and forbid murder the scriptures are used to break down these prohibitions against taking innocent human lives. Islamic rhetoric for example refers to the infidels, nonbelievers, defiled, impure, outsiders, and sinners. In this manner the intended terrorist act in ways that take innocent human lives without suffering guilt for having done so. Common Cause Fourthly, by using religion as a motivator the terrorist group creates a sense of cohesion and belonging to a higher cause. They prey upon individuals who are alienated and disenfranchised. When these individuals find a cause to belong to, especially when it espouses religious rhetoric of brotherhood, love and hope for the future life they can become powerfully motivated to act in behalf of the group simply for the sense of identity.[27] Heroic Martyrdom. The One of the ultimate uses of religion to motivate terrorism is to hold forth a view of the afterlife, promising rewards in the hereafter for sacrificing oneself in the here and now. This is a particularly potent tactic used with those who feel guilty about their actions in this life and uncertain of their standing with God, and with those marginal members of society who suddenly find themselves centered in a group with a purpose. The Muslim interpretation of afterlife while dying for jihad states that the Prophet will be waiting to welcome the martyr with thousands of virgins lined up for his pleasure. Referring to afterlife one martyr also states, I will have God welcome me with open arms. I will be a true hero in the sky.[28] Between the two recent wars in Chechnya (1994-96 and 1999) similar means were used to convince vulnerable Chechen individuals to sign on the new Chechen jihad which began making use of suicide terrorism in 2000. During this time period terrorist sponsored schools used were opened in the capital Grozny which recruited young boys and girls who lost their fathers in the Russian/Chechen conflicts promising their widowed mothers a good education for their sons and daughters. Unknown to their families these vulnerable young students were indoctrinated into militant Islamic ideas foreign to Chechen experiences of Sufi Islam and some became convinced that the price of belonging to higher glory is to be willing to sacrifice oneself for the group. In the words of a hostage who conversed with one of the Chechen terrorists :- He explained to me that while his greatest dream was to continue his education and go to university and that while he wished to live, even more important for him was to die a martyr. He had become totally convinced that martyrdom was his highest calling in life.[29] Conclusion. Religion has always been used as a means of constructing social justice, expiating wrongdoing or sins, and of modulating emotional states. These means however can also be used to manipulate vulnerable individuals into taking social actions that they might otherwise never have considered or consented to take part in. For instance a colleague in Chechnya reports that the children who attended terrorist based schools were taught to rock and chant repeating Koranic verses that invoke jihad, ideas that their masters consider important to instil. This practice can easily make use of inducing a suggestive hypnotic state; a light trance in which susceptible children who have already reason to want to avenge a murdered parent might be induced to do so. People interacting with such persons mentioned that these young terrorists were brainwashed, rocking, singing and praying often, and readily embracing death.[30] CHAPTER VI QURANIC INTERPRETATIONS AND TERRORISM Approximately fourteen hundred years ago, Prophet Muhammad, the last in the line of the prophets of Islam, received revelation from God known as the Quran, which is the Final Testament. He came with a message of peace and reconciliation, mercy and compassion. Yet, ever since the beginning of the call of Islam, its image and that of Muslims has been subject to distortion, misconceptions, and misinterpretations. This chapter aims at establishing the link between Quran and the distortions in its interpretation which has manifested itself in the form of jihad or the holy-war. Quran and Sanction of Violence The Quran permits violence as an act of defence waged to protect the Shariat in an Islamic community. The Shariat can be explained as a system of ordinances outlined in the Quran and Hadis[31] through which God lays down for mankind the rules of conduct[32]. The Shariat is the guidance for all walks of life individual and social, material and moral, economic and political, legal and cultural, national and international[33]. Muslims are advised to closely follow the Shariat to acquire the well being that God has envisioned for the Islamic community. Preservation of the Shariat is an obligation of every able-bodied individual[34]. Oppression, despotism, injustice and criminal abuse of power[35] of the Shariat by Muslims or non-Muslims[36], must be punished. Quran and Jihad The Quran identifies three main kinds of Jihad that can be used for the punishment of oppression and injustice. These are: internal[37], external[38] and inter-communal[39]. The Quran permits the use of violence as an optional method for all three forms of Jihad but it limits the use of violence in internal[40] and external Jihad. It expands on its doctrine of Jihad and violence, mainly in the context of inter-communal conflicts. In these cases, Muslims can individually determine the nature and extent of Jihad based on the freedom of interpretations, and the geopolitical conditions in which the conflict arises. However the most essential prerequisite in the Qurans discourse on violence is that, force should be used only when the Shariat has been violated and needs to be persevered as the very
Saturday, July 20, 2019
Knowledge, Power and Control :: Philosophy Religion Papers
Knowledge, Power and Control In this paper, I propose to examine some of the issues that arise as a result of the relationship between knowledge and power, and specifically those that concern who should control knowledge and disseminate it in society. This subject is discussed in the writings of Plato and is also commented on by such medieval thinkers as Averroes (Ibn Rushd), Moses Maimonides and St. Thomas Aquinas from the Islamic, Jewish and Christian traditions respectively and their views will be briefly outlined here. Despite the religious, historical and cultural differences which distinguish their approaches from one another, what is remarkable is the similarity in the conclusions that they reach about how noetic power and control is acquired and exercised. They all insist that knowledge should be made selectively available to certain individuals and groups according to noetic ability and social position in the context of the envisaged socio-political model of community that is in operation. Knowledge is perceived as a conserving influence on individual and political life, to be transmitted preferably in an essentially unaltered state in order to maintain sustain the desired socio-cultural value system and power structure. The emphasis is on respect for tradition and for the origins and status of the noetic content to be transmitted through the expertise of those delegated to act as transmitting agents. The content of knowledge is frequently portrayed as mysterious and mystifying, only capable of proper interpretation by appointed specialists. The role of teaching is consequently important since the teacher is the community's appointed expert for disseminating knowledge, as and when appropriate, according to the receptive abilities of those who learn. This epistemological approach appears to be in sharp contrast to the contemporary view of someone like Paulo Freire who insists that knowledge must be democratically available to everyone in order to politically transform society transformation through social justice.(1) This aim is achieved when the noetic process becomes a critical reading of reality, a reflection in action which is applied so that traditional ways of thinking constitute a permanent subject for reinterpretation. Knowledge is perceived in Freirean epistemology as a medium of communication between human beings, a process in which there is no permanently unaltered noetic data but rather an ongoing dialectic strategically pursued through contradiction and constantly aimed at radically redefining how people can coexist in a state of social equality. According to this view, knowledge offers everyone the possibility to think more critically about the world so as to act on it in a more humanising way.
Friday, July 19, 2019
THE LEGACY OF A KING :: essays research papers
Dr. Martin Luther King Jr., brother to morality and father to reform, was a man of remarkable courage whose belief in nonviolence never stammered. Standing before the Lincoln Memorial on August 28th, 1963, King stated, à à à à à ââ¬Å"So I say to you my friends, that even though we must face the difficulties à à à à à of today and tomorrow, I still have a dream. It is a dream deeply rooted in the American dream that one day this nation will rise up and live out the true meaning of its creed-we hold these truths to be self-evident, that all men are created equal.â⬠à à à à à (Siebold 212) à à à à à These inspiring words are the basis for which all of society needs contemplate in order to achieve racial fellowship, civil rights, and civil liberties. Maybe then, people of different ethnicity, not only inhabiting the same area, but all around the world, can coincide with one another without dispute. National equality cannot rest solely on the advocacy of one man, it must involve citizen participation and governmental action. Such engagements are effecting present-day issues such as voter manipulation tactics, the policies of a new attorney general, and Native American Housing. à à à à à One issue Civil rights and voting rights advocates are currently addressing is the concern of voter suppression and intimidation. These manipulations, specifically aimed at minority and disabled voters, include requiring identification at polling stations; supplying wrong polling information to potential voters; and initiating background checks on newly-registered voters. Latinoââ¬â¢s nationwide are being told to provide proof that they are U.S. citizens, solely because they are Latinoââ¬â¢s. A person with a mental disability may not vote in Ohio, if a judge rules him/her incompetent. The voting rights advocates call upon the Republican National Committee to put an end to these tactics or to investigate them further so that a change may occur in the near future. à à à à à Another concern of Civil rights advocates was initiated when President Bush replaced attorney general John Ashcroft, who resigned Nov. 2004, with Roberto R. Gonzales. Wade Henderson, executive director of the Leadership Conference on Civil Rights stated, ââ¬Å"In a country as diverse as ours, this appointment acknowledges the importance of both substance and symbolism in the selection of our nation's highest offices.â⬠Civil rights groups want a close examination of Gonzalesââ¬â¢ formulation of administration policies performed by Henderson and other necessary persons. Gonzales' role in such policies could undermine the system of checks and balances, therefore, creating a stagger in power among the branches of government; the unbalanced power among the branches may cause tyranny in any one branch.
Thursday, July 18, 2019
Voltaires Candide as Vehicle to Discredit Optimism Essay -- Candide e
Voltaire's Candide as Vehicle to Discredit Optimism à à Optimism was an attractive to many because it answered a profound philosophical question: if God is omnipotent and benevolent, then why is there so much evil in the world? Optimism provides an easy way out: God has made everything for the best, and even though one might experience personal misfortune, God (via your misfortune) is still helping the greater good. à à à à à à à à à à à à Voltaire's experiences led him to dismiss the idea that this is the best of all possible worlds. Examining the death and destruction, both man-made and natural (including the Lisbon earthquake) Voltaire concluded that everything was not for the best. Voltaire uses Candide as the vehicle to attack optimism. Pangloss is meant not to attack Leibnitz, but rather optimism as a philosophy. Thus the reader cannot forget that all of Pangloss's ramblings are not Voltaire's personal attacks on Leibnitz, but in some way represent a characterization of the "typical" optimist. Pangloss, writes Voltaire, "Proved admirably that there cannot possibly be an effect without a cause, and that in this best of all possible worlds the Baron's castle was the most beautiful of all castles and his wife the best of all possible baronesses" (Voltaire 2). Thus we have established Pangloss as the champion of optimism. à à à à à à à à à à à à Yet just as quickly, Voltaire points out the absurdity of this doctrine. "Observe," says Pangloss, seeking to demonstrate that everything has a cause and effect, "noses were made to support spectacles, hence we have spectacles. Legs, as anyone can plainly see, were made to be breeched, and so we have breeches" (Voltaire 3). The sheer stupidity of these illogical conclusions will likely... ... Candide respond, in closing, to his friend the Optimist? à "That is very well put, said Candide, but we must cultivate our garden" (Voltaire 75). à Works Cited and Consulted: Bottiglia, William. "Candide's Garden." Voltaire: A Collection of Critical Essays. New Jersey: Prentice-Hall, Inc., 1968. Durant, Will, Ariel Durant. The Story of Civilization: Part IX: The Age of Voltaire. New York: Simon and Schuster, 1965. Frautschi, R.L. Barron's Simplified Approach to Voltaire: Candide. New York: Barron's Educational Series, Inc., 1968. Lowers, James K, ed. "Cliff Notes on Voltaire's Candide". Lincoln: Cliff Notes, Inc. 1995. Richter, Peyton. Voltaire. Boston: Twayne Publishers, 1980. Voltaire's Candide and the Critics. California: Wadsworth Publishing Company, Inc., 1996. Voltaire. Candide. New York: Viking Publishers, 1998.
Encryption and Decryption Algorithm
Encryption and Decryption algorithm using ASCII values with substitution approach.First Author: M.Shruthi and Second Author: Gokaraju Rangaraju Institute of Engineering and Technology, Bachupally, Nizampet, 500092www.griet.ac.in I.AbstractThis paper shows the possibility of employing the characteristics of available algorithms with poly-alphabetic substitution techniques in a linear fashion, to produce ASCII values of the typed text and then putting in the translating, transposition techniques in order to get the encrypted text. Before generating the cipher text, the algorithm will result in Message digest of the given text. This algorithm implements the model of symmetric Key cryptography. This algorithm can be implemented in any programming language such as C, C++, Java etc. In poly-alphabetic substitution the plain text's letters are encrypted differently corresponding to their position. The name poly-alphabetic proposes that can be more than one key so we have used two keys combination instead of one, in order that it produces the cipher text. We can also use three or more keys to make the encoding process more complex. In this paper have generated ASCII Codes of the plain text and then we have reversed it say it as reverse ASCII Codes and then we have produced two random keys named K1 and K2. Then these K1 and K2 Keys are alternatively applied on Reverse ASCII codes in order to produce encrypted text. On the other hand Decrypting algorithm is used to generate the plain text again. Our technique generates random cipher text for the same plain text and this is the major asset of our technique.II. IntroductionRelated work:a. IntroductionNow-a-days need of security is essential to make data secure from the unauthorized user to access. Security is needed in many of the organizations like military, budgets of Government, it is also necessary to our general economy and many business applications also. Business application involves the security among the data of the institute in which information about of the employees, manager workers and owner's profit is itself stored and similarly, application i.e, utilised by the user's according to their use also requires security. So security plays an indispensable role in our day to day life. Cryptography is one of the techniques for guarding data.Information Security is a set of thoughts for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital content. The responsibilities of Information security include launching a set of business processes that will safeguard information assets regardless of how information is formatted or whether it is transit, is being processed or is at rest in storage.Important information or data cannot be sent across the internet without implementing any security mechanism, because this data can be seen by any intermediate person in order to change the message.So the command for Information Security across the networks is expeditiously increasing day-by-day. Every business organisation has a burden to secure their data from being loss or theft. A message digest is a cryptographic hash function which includes a group of digits generated by a hash formula. Message digests are intended to secure the integrity of a piece of data or information to identify changes or alterations to any part of a message. Basic terms for secure communication are:Let us consider two parties that want to communicate secretly, A and B. If A wants to send something to B, some information, we call that information a plaintext. After encrypting the plaintext a cipher text is produced. B knows the encryption method since he is the intended receiver and since he must use the same method together with his secret key to decrypt the cipher text and reveal the plaintext.b. Related Work:1. Avinash Sharma and his team have proposed a technique for encryption and decryption. In this paper they have explained about encryption and decryption techniques using ASCII values and substitution approach. (IJASCSE Vol 1, Issue 3, 2012)2. R.Venkateshwaran in his paper shows the possibility of utilizing the features of Genetic techniques with poly substitution methods in a linear way, to produce ASCII values of the given text and then employ transition, substitution with the features of Cryptography. (International Journal of Computer Applications (0975 ââ¬â 8887) Volume 3 ââ¬â No.7, June 2010)3. Sumith Chowdary and his team described about the algorithm in which randomly generated numbers are used with the help of modulus and remainder by making program in any language i.e. c, c++ and java. (IJARCCE Vol. 2, Issue 8, August 2013)III. Basic Mechanism for cryptographyP=Plain text C=Cipher text X= Some Plain text Y=Cipher text of plain text K=Any Random key E(K,X): Encryption of X using key D(K,Y): Decryption of Y using K C=E[K,P] P=D[E,C]IV. History of CryptographyThe art of cryptography is considered to be born along with the art of writing. As civilizations period started, human beings got incorporated in tribes, groups, and kingdoms. This led to outgrowth of ideas such as power, battles, supremacy, and politics. These thoughts further furnished the natural need of people to communicate covertly with discriminative recipient which in turn assured the continuous evolution of cryptography as well. The roots of cryptography are found in Roman and Egyptian civilizations. The word Cryptography has been derived from the Greek word kryptos (hidden) and graphing (writing).Cryptography is the technique with which a plain text can be converted to cipher text so that this cipher text is not understandable by anyone excluding the recipient. Cryptography, the science of encrypting and decrypting information can be traced back all the way to year 2000 BC in Egypt. Here it was first used with the help of the standard hieroglyphics in order to communicate secretly. Julius Caesar (100-44 BC) used a simple substitution cipher which has been named after him today. During the first and the second war the command for confidentiality increased rapidly all kinds of new cryptographic techniques developed.V. Objective of the AlgorithmThe core objective of the research is to safeguard information stealing in what so ever manner it may be, with the use of appropriate technology. To secure information spilling and to provide a high-level integrity and authenticity to data or information using MD5 and Cryptographic algorithm that is sent over the network. Integrity: Ensures that a message is unchanged from the time it sent from the sender and till it is opened by the receiver.Authenticity: It verifies whether the identity of user in the system is a true or genuine user.To check the integration of message/information MAC is verified.VI. Algorithm for EncryptionDecryption and MAC Generation:Algorithm encryption{Generate two random keys k1, K2.Take dataFind ASCII values for each character in the data.Reverse each ASCII value and store it.Add each key alternatively to each reversed ASCII value.//This is the encrypted data.}Algorithm decryption{Take the encrypted data and random numbers.Subtract the keys from the encrypted dataEach alternativelyReverse the obtained values.// The reversed values will be ASCII codes of characters.Print the retrieved ASCII value's corresponding characters.}Algorithm MD5{Firstly append padded bitsThen append lengthInitialise MD BufferLater process message in 16-word blocks.Display the output.}Encryption Process: The above figure (fig 1.1) depicts the procedure of encryption.Let the text be HELLO WORLD.Firstly, generate 2 random keys named k1 and k2. For example let us assumeK1 =1123K2=1452Then translate the each character of message into its corresponding ASCII Code and the we reverse these ASCII codes. (This is shown in table1.1)Next, these keys k1, K2 are added alternatively to reverse ASCII numbers in order to generate cipher text. Table 1.1:Plain text ASCII number Reverse ASCII Number Cipher textH 72 27 1150E 101 101 1553L 108 801 2253L 108 801 1923O 111 111 1563 32 23 1146W 87 78 1530O 111 111 1234R 114 411 1863L 108 801 1923D 100 001 1453Decryption Process: This technique is exactly reverse technique to that of encryption. So in this process, subtract the keys from the obtained cipher text.That is first subtract k1 from first value of encrypted/cipher text and then subtract K2 from second value of cipher text, consecutively. Repeat this step until you reach to the end of the message.Finally we will get the plain text which was sent by user.Following table will depict the process of decryption:Cipher text Reversed ASCII number ASCII code Plain text1150 27 72 H1553 101 101 E2253 801 108 L1923 801 108 L1563 111 111 O1146 23 32 1530 78 87 W1234 111 111 O1863 411 114 R1923 801 108 L1453 001 100 DVII. MAC Generation:The MD5 hashing algorithm is a cryptographic technique that accepts a text of any length as input data and returns as output a constant-length digest parameter to be utilised for authenticating the true message.From past years, there has been exaggerated interest in generating a MAC produced from a Cryptographic hash code, like SHA-1, MD5, etc. Here in this, we have used MD5 algorithm for resulting a 128 bit hash-value. It is employed as a checksum to ascertain data integrity.Ex:1. helloMD5 Hash of your string: 5D41402ABC4B2A76B9719D911017C5922. The attack is at 5 p.m.MD5 Hash of your string: 54759A4BE2031EA6CC8D56B10CD4A9AAVIII. Snap shots of the algorithm implementationHome page: After entering some text: Click on encrypt button: Click on Decrypt button: If the text-box is empty: And if clicked encrypt then it results to a message:IX. Key words and AbbreviationsCryptography: The process of encrypting and decrypting text for securing it.Cryptanalysis: is the art of decoding or obtaining plain text from hidden messages over an insecure channel. It is also known as code cracking.Encryption: The technique of converting plain text into some other format with the help of a key is known as Encryption. Decryption: The technique of altering cipher text or encrypted text into plain (original) text is called as Decryption with the help of same key or other key.Key: An amount of information used for encrypting and decrypting text.Cipher text: The message written in secret code and is not understandable by anyone. Plain text: The original message given by end-user.Encryption Algorithm: An Algorithm for encrypting given text.Decryption Algorithm: An Algorithm for decrypting the encrypted text.MD5 Algorithm: An Algorithm for finding 128 bit Message digest for the given text.Abbreviations used:MAC: Message Authentication CodeASCII: American Standard Code for Information Interchange.MD5: Message Digest v5X. Future scopeThis algorithm is formulated for the sake of security.There are many future scope of substitution approach employing ASCII value for Encryption & Decryption. Firstly it is certified that any intermediate person don't hack the data between the gap of plain text and cipher text. Secondly receiver receives the encrypted text as it's same as the senders send the plain text. Thirdly in the contemporary world, new technologies ameliorate day by day so we can exaggerate changes in this algorithm according to the requirement. This work can be further improvised upon in the future in many different ways.XI. ConclusionThere are many techniques such as RSA, IDEA, AES, DES, DIFFIE-HELLMAN algorithms and much more that can be utilized to modify a plain text into cipher text to transfer over the network so nobody else than an actual recipient can understand the message. But Substitution and Transposition is the ground for every algorithm as each and every algorithm employs Transposition or Substitution or both of them. In this view we have introduced a new technique that is titled as substitution using ASCII Codes. This new method for text encryption and decryption behaves randomly so grouping of the same cipher text and breaks it by just guessing it becomes more difficult. This technique of combining cryptography and Message digest can lead to new area of research on securing data by other mechanisms. This technique of text encrypts and decrypt employing ASCII algorithm is definitely an impelling process when compared with other cryptographic systems. This algorithm is very meteoric, procure and trust worthy.XII. References:1. Stallings W. Cryptography and Network Security: Principles and Practice, 2/3e Prentice hall, 1999; 30-49.2. Author: Vineet Sukhraliya, Sumit Chaudhary, Sangeeta Solanki, Title: Encryption and Decryption Algorithm using substitution array approach. IJARCCE Vol 2 Issue 8 August 2013.3.Author: Avinash Sharma, Anurag Bhatnagar, Nikhar Tak, Anuradha Sharma, Jitendra Avasthi, Prerna Sharma Title: An Approach Of Substitution Method Based On ASCII Codes In Encryption Technique ,IJASCSE Vol 1, Issue 3, 20124.Author: R. Venkateswaran Dr. V. Sundaram, Title: Text Encryption and Decryption with Poly Substitution Method and Combining the Feat ures of Cryptography. IJCA Vol 3 ââ¬â No. 7 June 2010. 5. https://en.wikipedia.org/wiki/Cryptography 6.https://en.wikipedia.org/wiki/MD5XII.
Subscribe to:
Posts (Atom)