Tuesday, December 24, 2019

Erp Project - 1032 Words

The project’s main characteristics and challenges identified by Jean Roberge are: Identify functionalities for all of ABS Business Systems and integrate for real time data exchange. Simplify system maintenance, achieving better management of ABS’ IT potential. With more and more ensuing â€Å"global businesses† ABS wants the conversion to improve their information exchanges to set them up as strong â€Å"global† contenders. Roberge also noted that â€Å"harmonization†, and consolidation of the three companies was top priority. In my opinion, I don’t think Jean Roberge took into consideration a â€Å"business as usual† rule. Managers in all of the departments will be concerned that â€Å"status quo† is maintained. For example, they will need to be†¦show more content†¦I think the PM failed to realize it was not necessarily the technical part of his resume he needed at the start, but his people skills before the lan dslide of managers topple the conversion with the negative results occurring. The second scenario at this point of no return would be to scrap the current plan of a single Project Manager and adopt a â€Å"team† of Project Managers. One that a â€Å"PM† would be sent to each location and analyze the needs of each newly acquired company and each newly acquired departments within the companies, and each newly acquired employee within those departments. A kind of â€Å"wine ‘em and dine ‘em† thought. Sometimes a â€Å"memo† or word of mouth doesn’t work on all people when the change is this drastic. I would have the â€Å"team† PM’s break down the timeline for each phase and travel to the specific location and present the timeline for the conversion reassuring the department heads status quo is understood, in other words there will be growing pains but not to interfere with business as usual. The â€Å"PM’s† would need to continue with this reassurance and measuring progress for each department head through to the end. On a side note there have been many potential Project Leaders that Kirby 4 forgot about the need of â€Å"friends and allies† when vying for â€Å"on time and under budget† credentials. The new candidate, Andre Gagne has the accounting, IT and insurance industryShow MoreRelatedCompany Analysis : Pb And The Erp Re Engineering Project1365 Words   |  6 Pagestopic; the company summary of PB and the ERP re-engineering project which they are undergoing; the objectives and scope as well as the structure of this thesis project. The problem definition will show its importance and rationale to this topic as well as PB. The company summary will provide contextual and valuable background. The objectives and scope will illustrate the key deliverables considering the limitation of resource and time duration of this project as well as how they will be acquired. 1Read MoreProject Management : Erp System Implementation2993 Words   |  12 Pages ERP SYSTEM IMPLEMENTATION PROJECT CHARTER Version 1.0 10/14/2014 Job Title Name Project Manager Shamsa Kiran Syed Project Coordinator / Temporary Project Manager Naveed Qamar Director IT Support Amit Katariya Administration and Finance Manager Dilsher Bhangal Manager Academic Support, Student Interface Ikechukwu Chikere IT Consultant from XYZ ERP Solutions Ricardo Urrutia Note (for educational purpose only):Read MoreApplication of Project Management Tools on the City Schools Erp Project12946 Words   |  52 PagesIntroduction to the Project 9 1.8 Current Financial Status of the Project 10 1.9 Activities 10 1.10 Current Activities 11 1.11 Vendor 11 1.12 Authorization/Personnel Involved 12 1.13 Duration of Tasks 12 1.14 Future Tasks 13 1.15 Challenges 13 1.16 Project Research Methodology 13 Chapter 02: Literature Review 14 2.1 Project 14 2.2 Project Management 14 2.3 Importance of Project Management 15 2.4 Project Management Process 19 2.5 Project Management Life CycleRead MoreInitial Erp Implementation Project And Assess The Value Of The Investment At This Time1631 Words   |  7 Pages1. Introduction Thank you for this opportunity to study your recent ERP implementation project and assess the value of the investment at this time. I will provide you a data brief of the current status, and I’ll offer guidance to propel you toward full realization of your investment. In short, the current status of your project is not projected to realize its planned ROI. In fact, you’ve incurred additional costs that could have been avoided. I will guide you through my findings about past effortsRead MoreCisco ERP Project Assessment1727 Words   |  7 PagesCisco ERP Project Assessment Introduction Cisco rapidly grew from a start-up to $500M global corporation by January, 1993 when the case begins with Pete Solvick, CIO of the company faced with the daunting task of upgrading its transaction systems and data warehouse. Cisco had exponential growth through the 1990s, averaging at one point an 80% compound annual growth rate while also accelerating new product development and introductions throughout its direct and indirect sales channels. SystemsRead MoreMmis 621 Assignment 4 Information Systems Project Management Plan Erp System Implementation Mmis 621: Information Systems Project Management1189 Words   |  5 PagesInformation Systems Project Management Plan ERP system implementation MMIS 621: Information Systems Project Management Fall 2015 Click Link Below To Buy: http://hwcampus.com/shop/mmis-621-assignment-4-information-systems-project-management-plan-erp-system-implementation/ Purpose: The purpose of this paper is to give you an opportunity to apply and demonstrate your understanding of the tools and principles covered in the class to a project of your choice. Section 1: Project Definition (5-6Read MoreMba Project Report Erp Implemetaion12267 Words   |  50 PagesERP Project implementation Case Study | | | | | | | | | Version: 1.0 TABLE OF CONTENTS Introduction to ERP 5 Advantages of ERP 9 Disadvantages of ERP 10 ERP Packages Feature Comparison 12 Microsoft 28 Oracle 28 PeopleSoft 29Read MoreCase Study : Without An Erp Project1812 Words   |  8 PagesAccording to Keda’s case, without an ERP project, a company will run into many problems such as business performance, redundancy, ill formed decisions, losing potential financial gains, and not having a sturdy business process. Zhu says, â€Å"In managing the enterprise, our most important task is to provide the needed information for every decision maker every step of the way in the decision-making process.† One of the challenges faced by Keda was not being able to keep track of the many â€Å"unique, individualRead MoreIbm s The Erp Implementation Project2217 Words   |  9 Pagesfrom inertia when an attempt was made to engage business management in selecting software for their individual areas, and/or agreeing to participate in the ERP implementation project. List and explain reasons why management would hesitate to become engaged in the IT process/project. The management hesitates to get engaged with the IT project because of the few reason like the first was that they had the fear of decentralization, Cisco is always well known for the standardization in the company andRead MoreApplication of Project Management Tools on the City Schools Erp Project12955 Words   |  52 Pagesto the Project 9 1.8 Current Financial Status of the Project 10 1.9 Activities 10 1.10 Current Activities 11 1.11 Vendor 11 1.12 Authorization/Personnel Involved 12 1.13 Duration of Tasks 12 1.14 Future Tasks 13 1.15 Challenges 13 1.16 Project Research Methodology 13 Chapter 02: Literature Review 14 2.1 Project 14 2.2 Project Management 14 2.3 Importance of Project Management 15 2.4 Project Management Process 19 2.5 Project Management Life Cycle 21 2.5 Projects and Operations

Monday, December 16, 2019

A Life Full of Snails Free Essays

300 Word Essay On Freedom Of Religio 300 Word Essay I chose freedom of religion because it is the one bill of rights that I believe has the broadest expansion in the constitution. I believe that†¦ Premium Use At Least Five Adverbs And Five Adjectives To Write a 150- To 300-Word Review Of a Movie, Sporting Event†¦ 6 Assignment Use at least five adverbs and five adjectives to write a 150- to 300-word review of a movie, sporting event, musical performance, or television show†¦ Premium Describe Your Role, Responsibilities, And Boundaries In Terms Terms Of The Teaching Cycle. 300 Words). We will write a custom essay sample on A Life Full of Snails or any similar topic only for you Order Now your role, responsibilities, and boundaries in terms terms of the teaching cycle. (300 words). Being facilitator you need to be well controlled, well manner†¦ Premium 1000 Word Essay going to alarm his/her head and student kept wondering about the length of 1000 words essay. Students want to complete the tricky assignment as soon as possible†¦ Premium 250 Word Essay cannot simply be an easy task. Still for some students, a 250 word essay may mean too much because there are also some people who do not want to waste their time†¦ Premium Explain Ways To Embed Elements Of Functional Skills In Your Specialist Area. (Recommended Word Count: 200-300 Words) elements of Functional Skills in your specialist area. (Recommended word count: 200-300 words) What are functional skills? The best description of functional†¦ Premium Write 200-300 Words Explanation Of How Atoms Make Up Organic Compounds, Which Make Up The Living Organism†¦ capacity of population to change over time, | Part III: Write a 200- to 300-word explanation of how atoms make up organic compounds, which make up all living†¦ Premium Ap Lit Words Essay Mark G. Period 6 01. 24. 12 AP Literature Othello Words Essay The word heaven is one of the most frequently used words in the play Othello. Throughout the play†¦ Premium Compare And Contrast Packet And Circuit Switching In 250 To 300 Words. Which Is More Commonly Used? What Are†¦ Compare and contrast packet and circuit switching in 250 to 300 words. Which is more commonly used? What are the advantages and disadvantages of each? Packet†¦ Premium Explain The Differences Between Data, Voice, And Video Signals In 200 To 300 Words. Include a Description†¦ Explain the differences between data, voice, and video signals in 200 to 300 words. Include a description comparing the differences between a private branch†¦ Premium a 3000 Word Essay Identifying Two Public Health Issues Pertinent To Clinical Placement Area; Analyse These†¦ Module Code MID 314 Assignment – A 3000 word essay identifying two public health issues pertinent to clinical placement area; analyse these with reference to†¦ Premium 800 Word Essay 800 Word Essay Food, health and medical technologies have a large impact on individuals and communities today and in the future. Throughout this paper, discussion†¦ Premium 500 Word Essay 500 word essay† The changing points to my life have been important. My life could have drastically changed if I wouldn’t have done something†¦ Premium 600 Word Essay I wrote to friends, my writing is like two different languages. For essays, I would write every single word out and my letters to my friends would have almost every†¦ Premium 1000 Word Essay Table Of Content Army Programs †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 ASAP – Army Substance Abuse Program †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9 ACS – Army Community Service†¦ Premium Article 92 1000 Word Essay PFC Thiel Dillon F 26 October 2012 Article 92 Essay 760th ORD CO (EOD) While at his NTC rotation PFC Thiel was tasked by SFC Graff with being at the trucks at†¦ Premium 1,000 Word Essay On The Love Story in the importance of the Postal Office in the story. Although the story seems more simple in the â€Å"word† sense, it also leaves a lot of room for the mind to wonder†¦ Premium â€Å"n† Word Essay when I hear it on the radio or in a movie it doesn’t bother me. When I play Socom I may hear the â€Å"N† word 50 times in a two hour playing period. It is usually said†¦ Premium 300 Movie Essay and 33,000 Greeks into the Battle of Platea, Give thanks to Leonidas and the brave 300. TO VICTORY! This quote really sticks with the viewer in many ways. The first†¦ Premium 500 Word Essay On Responsibilty to quote a few references whose information seems to fit very well with this essay: We must be effective members of the Joint team. We need to think of our Army as†¦ How to cite A Life Full of Snails, Essays

Sunday, December 8, 2019

A Comparison of Poems Essay Example For Students

A Comparison of Poems Essay On reading the poems it is clear that My Box is about a positive and good relationship and in contrast Valentine is quite the opposite in that it is about a bad relationship. The structure of the two poems is different. My Box has three Stanzas, of eight lines each. Whereas Valentine is structured in a pattern of, single lines and blocks of four or five lines. The different structures might be a clue to the type of relationships in that My Box represents a solid relationship, by the blocks of eight lines. Whereas Valentine is a broken structure, indicating a weak relationship. I have tried to analyse what each of the poems are trying to tell the reader and have compared and contrasted details where possible. We will write a custom essay on A Comparison of Poems specifically for you for only $16.38 $13.9/page Order now My Box A woman recollects on how wonderful, fulfilling and fruitful her life has been, using the box to illustrate this. Made of golden oak suggests that it is an item of great value like Gold, but also one of honesty and practicality (like the wood used). The item, a box in itself a solid object with sides, a lid and a base with a lock of brass and a bright key. This could be the house and home that the lover is describing. The giver has taken care in its construction, it has hinges, it has been sanded, oiled and planned and great care has been taken to ensure it is perfect. Everything about it is solid, well made and durable, this will last for a very long time, again this is referring to the relationship. The engraved golden tree inside the lid again suggests something very precious, and the fact that it is inside the box, it is very safe. The tree is a symbol, a symbol of life, with its own solid roots and foundations, strong branches, leaves and seeds, just like a solid relationship these people appear to have. They have grown like the tree together, strongly and their relationship can be considered golden. In the second stanza, more information is given about how this relationship metaphorically was achieved. Twelve black books could signify the months of the year, which were used as diaries to record lifes toil. Black is a bad, dark and evil colour and it suggest even more that the diaries will have been used to record problems that their relationship has gone through. It suggests a time span, over which the sanding, oiling, planing, planting a garden, building a wall, took place and how this relationship grew with time with both of these people working at it. Not only did they build, they shared the good time experiences, seen jays and goldcrests and rare red kites, in other words they found time for each other. Similarly, they explored together and found the wild heartsease herb. This may mean they explored each other and found comfort in each other. They have drilled a well. Water being necessary for growth of life and this poem again suggests fruitfulness the harvesting of apples, which could be children. A timespan where words and days are shared, enjoyed and experienced. A golden tree is planted, nurtured, bears fruit, takes solid roots and foundations and flourishes to last for a long time. In the final stanza, On an open shelf I keep my box, suggests an open relationship. There are no secrets here, the key is in the lock and the contents of this box, the solid relationship, is there for all to see by future generations or anyone who cares to look, and reminds us that everything takes time to grow and flourish, but it needs a solid foundation and effort. .u643f3dd3cfad86176cb64e51b530b320 , .u643f3dd3cfad86176cb64e51b530b320 .postImageUrl , .u643f3dd3cfad86176cb64e51b530b320 .centered-text-area { min-height: 80px; position: relative; } .u643f3dd3cfad86176cb64e51b530b320 , .u643f3dd3cfad86176cb64e51b530b320:hover , .u643f3dd3cfad86176cb64e51b530b320:visited , .u643f3dd3cfad86176cb64e51b530b320:active { border:0!important; } .u643f3dd3cfad86176cb64e51b530b320 .clearfix:after { content: ""; display: table; clear: both; } .u643f3dd3cfad86176cb64e51b530b320 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u643f3dd3cfad86176cb64e51b530b320:active , .u643f3dd3cfad86176cb64e51b530b320:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u643f3dd3cfad86176cb64e51b530b320 .centered-text-area { width: 100%; position: relative ; } .u643f3dd3cfad86176cb64e51b530b320 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u643f3dd3cfad86176cb64e51b530b320 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u643f3dd3cfad86176cb64e51b530b320 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u643f3dd3cfad86176cb64e51b530b320:hover .ctaButton { background-color: #34495E!important; } .u643f3dd3cfad86176cb64e51b530b320 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u643f3dd3cfad86176cb64e51b530b320 .u643f3dd3cfad86176cb64e51b530b320-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u643f3dd3cfad86176cb64e51b530b320:after { content: ""; display: block; clear: both; } READ: Pre-1914 Poetry EssayValentine A sad bitter reflection of a woman reliving a disappointing relationship. It begins negatively, with a single line. Not a red rose or a satin heart. The woman speaks to herself, and she interprets the gift that she has received which could be imaginary, this tells us that this is not going to be something affectionate, usually associated with care and devotion. It is a moon wrapped in brown paper, she continues bitterly. A moon appears at night, we cannot see in the dark, it is a dangerous time. The brown paper wrapping suggests something secretive, like certain magazines being sold over the counter or sent through the post in brown paper wrapping because they are rude. Unlike The Box there is no togetherness, no sharing and no growth, there is only a promise of light, which we associate with warmth and comfort and clarity but we know that the light from the moon is not warm. The rest of the line sates Like the careful undressing of love. This suggests an expectation with each layer of something more than is actually received. The causes could be seen as promises that were broken and probably ending in tears like an onion can bring when removing the layers. The one word line, Here, indicates the tone and manner of the lovers behaviour in the relationship. It will blind you with tears, like a lover. This could mean that the relationship was based on blind love, which turned out to be painful. It will make your reflection a wobbling photo of grief. The woman has suffered from the relationship to the extent her grief and pain has prevented her seeing clearly. The woman continues to torture herself by reminding herself that this is Not a cute card or a kissogram, both examples of emotional love. The fierce kiss will stay on your lips, possessive and faithful as we are, for as long as we are. This is a relationship that is going nowhere. The ferocity of the kiss suggests a quick intense encounter, full of passion, hence, fierce and possessive. The word faithful does not mean a strong solid commitment but one that is only, as long as we are, probably until they tire or get fed up with each other and end it. In the final stanza, Take it, referring the onion is expressed without much care, and even the woman bitterly relives the uncaring lovers words who is no more. The platinum, a hard precious metal, wedding ring, which she can wear, if she likes. There is very little evidence of commitment. A one word line, Lethal, captures the essence of this persons relationship. This could mean emotional if not actual physical death. Unlike the box, growth and fruitfulness are not in this poem, only an end. If this woman married this person it would have been Lethal. The final lines states Its scent will cling to your finger, cling to your knife. This woman through her own vision, living on hope, has been promised empty promises and been left unfilled and bitter she can still smell the onion on her fingers and the knife. It symbolises the end of the when she cuts the relationship off, but the memories of this painful relationship still linger like the scent of the onion.

Saturday, November 30, 2019

William Shoemaker Essay Example For Students

William Shoemaker Essay To my Children’s Children,September 18, 1800I am writing this to you on the anniversary of my father’s passing, out of a deep concern for your future. My desire is that, by reading this, you may avoid some of the pain that my generation has experienced. Many things have come and gone in my lifetime, for God has granted me a long 60 years. I wish to tell you all that I have experienced, before I too pass on, that you may learn from the mistakes of the past, and that our losses may not be in vain. I suppose the best spot to start is in the beginning. I was born on August 15, 1740 in a small farming community outside of Boston, Massachusetts. My mother died shortly after I was born; do to complications with my birth, so I was never given an opportunity to know her. As soon as I was able, I helped out on the farm, for we had no slaves and my father needed all the help he could get. Mostly, we raised corn and hogs on our 100-acre farm, along with a small amount of cotton and tobacco. The later two were to be sold for money and supplies, since my father had no access to credit. My father often dreamt of one day becoming a large planter himself, however, despite his dreams he taught me to be grateful, for the small farmers, further south, had no market to speak of, and lacked many of the conveniences we were blessed with. We will write a custom essay on William Shoemaker specifically for you for only $16.38 $13.9/page Order now In the summer before my fifteenth birthday my father left for war. He had joined the militia to raise some extra money to help support the farm, and was called to go and fight the French and Indians, for they had taken up arms against us, and mother Britain. The next news I received concerning my father devastated me, on October 22, 1759 I received a letter from the general, who led the Boston militia into battle. It read as follows:On September 18, 1759 during the battle for Quebec Mr. Shoemaker was badly wounded. All was done in an effort to save him, but infection overtook him and he passed on. He fought bravely in our victory over the French and you should all be proud. Please accept my deepest condolences for your loss. The farm belonged to me now, as I had no living brothers or sisters, and I felt I had to keep it going in my father’s memory. I thought everything would be fine now that the war was over. I had believed, as many others did, that the end of the war would bring the end to high taxes and that Britain would respect us more for our contribution to the war effort. However, this was not the case. Britain levied even more taxes, as they thought it was solely our responsibility to pay off the war debt. I started to feel as if my father’s death had been in vain. I started to hate Britain. In the summer of 1761, I found my wife, Anne. Shortly after meeting we were married. It was nice to have a woman around the house, to cook, clean and sew. Up and till this time I had attempted to do this myself, failing miserably I might add. Soon after marriage the children started to come, your fathers, and with them came a tight squeeze on our pocket book. I decided, as my father had done bef ore me, to join the militia. I enlisted in the fall of 1764 shortly after my twenty-fourth birthday. After completing my initial training, I was given the opportunity to be a minuteman. I felt honored as only a quarter of the militia is usually awarded this chance. Also the title minuteman is synonymous for enthusiasm, reliability, and physical strength. Anne did not share my enthusiasm, for minutemen were also the first armed militia to arrive at a battle. I tried to calm her fears, but to no avail. In fact her fears would only grow greater as time progressed and tension between the colonies and Britain mounted. .ub7b1941d4fa8e632bef4a0c637fa927e , .ub7b1941d4fa8e632bef4a0c637fa927e .postImageUrl , .ub7b1941d4fa8e632bef4a0c637fa927e .centered-text-area { min-height: 80px; position: relative; } .ub7b1941d4fa8e632bef4a0c637fa927e , .ub7b1941d4fa8e632bef4a0c637fa927e:hover , .ub7b1941d4fa8e632bef4a0c637fa927e:visited , .ub7b1941d4fa8e632bef4a0c637fa927e:active { border:0!important; } .ub7b1941d4fa8e632bef4a0c637fa927e .clearfix:after { content: ""; display: table; clear: both; } .ub7b1941d4fa8e632bef4a0c637fa927e { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ub7b1941d4fa8e632bef4a0c637fa927e:active , .ub7b1941d4fa8e632bef4a0c637fa927e:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ub7b1941d4fa8e632bef4a0c637fa927e .centered-text-area { width: 100%; position: relative ; } .ub7b1941d4fa8e632bef4a0c637fa927e .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ub7b1941d4fa8e632bef4a0c637fa927e .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ub7b1941d4fa8e632bef4a0c637fa927e .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ub7b1941d4fa8e632bef4a0c637fa927e:hover .ctaButton { background-color: #34495E!important; } .ub7b1941d4fa8e632bef4a0c637fa927e .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ub7b1941d4fa8e632bef4a0c637fa927e .ub7b1941d4fa8e632bef4a0c637fa927e-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ub7b1941d4fa8e632bef4a0c637fa927e:after { content: ""; display: block; clear: both; } READ: Child Abuse EssayOn March 5, 1770 it all seemed to climax. I had gone into town to get some much-needed supplies, as our supplies had been depleted by the long winter. When I walked passed the customhouse, I saw the usual crowd gathered around giving the redcoats hell. I must confess, that on occasion I would participate in this juvenile behavior, however on this occasion I had little time, for my wife was waiting for me to return with the supplies. After I got what I needed from the store, I headed back on the road, which passed by the customhouse, and I was surprised with the high level of intensity emitting from the crowd. It seemed more antagonistic than normal, and th en it happened, either the redcoats had just had enough or they feared that this time the riot was getting out of control, and they fired into the crowd. Needless to say, the crowd quickly dispersed. The next day the talk of the town was how the soldiers had massacred the town’s people. I knew this was not right. I had been there, and it certainly did not happen the way, Mr. Adams, said it did. However, at the time I cared little, for I beginning to dislike Britain anyway, but it started to make me question the motives of those who were pushing us into war. Tension between the colonies and Britain seemed to be mounting higher daily. On April 19, 1775, the battle at Lexington began as the British were marching to Concord to capture our military supplies, in order to prevent us from defending our state and ourselves. They would not take them freely, as my fellow minutemen in Lexington stood between the British and their target. The inevitable happened, shots were fired, and do to their supreme numbers the British quickly broke through the few minutemen that were there, and headed for Concord. The men in Concord were ready for them, and stood their ground, causing the British to retreat to Boston. As they marched back to Boston, militias waited to ambush them as they passed by. They were to pass near our farm, and many of us hid behind the fences waiting for them. As they came near we began to fire, inflicting heavy casualties on the British, but not without our own. Many of us were killed, and even more wounded. Also some of the livestock were caught by stray rounds, and killed.I, personally, suffered a shot to the lower leg. Initially, I didn’t think my injury looked bad, but after infection set in my leg had to be amputated. This led to my obvious dismissal from the militia. I started to wonder if the many promise, of a new life under a new government, would be worth all that my family and I had lost. When the war was in its infancy, I couldnâ₠¬â„¢t help but get caught up in the vision, that the new government that was to come out of the war, would mean an equal playing field for all, and that my children and their children would have a chance to be equal with the gentry. This had become my dream, as it had been my father’s dream also. Despite my delusions of grandeur, the light at the end of the tunnel started to fade in my mind. The new confederacy appeared too weak to offer what was promised, and skirmishes amongst the states broke out. It appeared that my dream would never become a reality, and that all was lost. In some attempt to overcome the quarreling amongst the states, a few men gathered and wrote out their own â€Å"constitution†. It appeared as though a controlling government was in our future, in order to overcome the anarchy. I failed to see how the minds of a few could come up with something better than what we had developed from years of tradition in England, but it appeared I and my family h ad little choice, but to obey it, and in retrospect I suppose a more powerful government was needed. .u51271c4effdaa8877247b6230cab37da , .u51271c4effdaa8877247b6230cab37da .postImageUrl , .u51271c4effdaa8877247b6230cab37da .centered-text-area { min-height: 80px; position: relative; } .u51271c4effdaa8877247b6230cab37da , .u51271c4effdaa8877247b6230cab37da:hover , .u51271c4effdaa8877247b6230cab37da:visited , .u51271c4effdaa8877247b6230cab37da:active { border:0!important; } .u51271c4effdaa8877247b6230cab37da .clearfix:after { content: ""; display: table; clear: both; } .u51271c4effdaa8877247b6230cab37da { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u51271c4effdaa8877247b6230cab37da:active , .u51271c4effdaa8877247b6230cab37da:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u51271c4effdaa8877247b6230cab37da .centered-text-area { width: 100%; position: relative ; } .u51271c4effdaa8877247b6230cab37da .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u51271c4effdaa8877247b6230cab37da .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u51271c4effdaa8877247b6230cab37da .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u51271c4effdaa8877247b6230cab37da:hover .ctaButton { background-color: #34495E!important; } .u51271c4effdaa8877247b6230cab37da .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u51271c4effdaa8877247b6230cab37da .u51271c4effdaa8877247b6230cab37da-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u51271c4effdaa8877247b6230cab37da:after { content: ""; display: block; clear: both; } READ: Why The United States Dropped The Atomic Bomb: Per EssayAll said and done it appears to me that we are not much farther down the road than were we started from, and at such a cost. We simply have a different, controlling government to levy taxes, and become absorbed by similar corruption. I don’t know what the future holds for you all, but I leave you with this note, and I hope and pray that you learn from it. I urge you to not be blinded by hate, and the emotions of the moment, but instead step back and look at the big picture. Only then can you truly weigh out the costs and see if the end justifies the means. I wish you all the best and God bless. Bibliography:Bib liographyFoner, Eric, The Rally Cry, W.W. Norton Publishing, 1998Ronemus, Andrew, Who were the Minutemen?, Independence Hall Association Publishing, 1999. BibliographyFoner, Eric, The Rally Cry, W.W. Norton Publishing, 1998Ronemus, Andrew, Who were the Minutemen?, Independence Hall Association Publishing, 1999.

Tuesday, November 26, 2019

Free Essays on Diagonal Intersections

State law Indicates that drivers must yield the right-of-way to pedestrians crossing the street in a marked or unmarked crosswalk at intersections or designated mid-block crossings (that are marked). However, a pedestrian must also take due care for his or her own safety. Pedestrians cannot suddenly enter the street and walk or run in the path of a moving vehicle, especially when entering the street will cause an immediate hazard. Also, while in the crosswalk, pedestrians cannot unnecessarily stop or delay traffic. Problem In our case, at the intersection of Etiwanda and Plummer, they have all way STOP signs. During school hours (as shown in the charts), traffic can be at its highest at certain times during the day. At the same time the amount of pedestrians crossing the intersection multiply. The problem is the pedestrians don’t have a cross walk to tell them when they should go, they automatically cross the intersection. At times they kitty cross the intersection, holding up traffic. Mainly 10 min before class the intersection get highly populated and many people cross the intersection, creating a line of cars down Etiwanda and Plummer. So what can we do? High Budget Solution For the people who have even been to Old Town Pasadena, instead of having just rgular traffic lights with cross walks, there are two intersections that allow pedestrians to cross diagonally thereby reducing the pedestrian wait when crossing more than one approach. When WALK is displayed at these traffic signals, only pedestrians are allowed to move through the intersection at that time. These intersections also provide benefits to drivers in that right and left turns are not hindered by pedestrian traffic flow. Therefore, pedestrians shall not enter the intersection when DON'T WALK is displayed even if the pedestrian is going in the same direction as the traffic flow (for example, westbound and not diagonally). It is beneficial to both d... Free Essays on Diagonal Intersections Free Essays on Diagonal Intersections State law Indicates that drivers must yield the right-of-way to pedestrians crossing the street in a marked or unmarked crosswalk at intersections or designated mid-block crossings (that are marked). However, a pedestrian must also take due care for his or her own safety. Pedestrians cannot suddenly enter the street and walk or run in the path of a moving vehicle, especially when entering the street will cause an immediate hazard. Also, while in the crosswalk, pedestrians cannot unnecessarily stop or delay traffic. Problem In our case, at the intersection of Etiwanda and Plummer, they have all way STOP signs. During school hours (as shown in the charts), traffic can be at its highest at certain times during the day. At the same time the amount of pedestrians crossing the intersection multiply. The problem is the pedestrians don’t have a cross walk to tell them when they should go, they automatically cross the intersection. At times they kitty cross the intersection, holding up traffic. Mainly 10 min before class the intersection get highly populated and many people cross the intersection, creating a line of cars down Etiwanda and Plummer. So what can we do? High Budget Solution For the people who have even been to Old Town Pasadena, instead of having just rgular traffic lights with cross walks, there are two intersections that allow pedestrians to cross diagonally thereby reducing the pedestrian wait when crossing more than one approach. When WALK is displayed at these traffic signals, only pedestrians are allowed to move through the intersection at that time. These intersections also provide benefits to drivers in that right and left turns are not hindered by pedestrian traffic flow. Therefore, pedestrians shall not enter the intersection when DON'T WALK is displayed even if the pedestrian is going in the same direction as the traffic flow (for example, westbound and not diagonally). It is beneficial to both d...

Friday, November 22, 2019

10 Roommate Gift Ideas That Wont Blow Your Budget

10 Roommate Gift Ideas That Wont Blow Your Budget Even though you sometimes know more about your roommate than anyone else on campus, finding the perfect gift can still be challenging. Fortunately, with a little creative thinking, you can get your male or female roommate the perfect holiday, birthday, or farewell gift without blowing your budget. Something OnlyYou Know They Need You may see your roommate struggling with something that has been well-loved for a little too long. It could be a new hair dryer, a new towel set, a new shower caddy, or generally anything they use frequently. Something of Yours That They're Always Borrowing Your rain boots, favorite shirt, jeans, cute black pumps, or basketball may technically be yours, but seem to have been adopted by your roommate lately. Give them a new, similar product of their own so they can enjoy it without worrying- and without having to check with you first. A Gift Certificate to Their Favorite Restaurant On or Off Campus Does your roommate always walk around with a Starbucks coffee, Jamba Juice smoothie, or burger from the place across the street? Consider getting a small gift certificate to a place you know they already love. A Gift From the Campus Bookstore Because honestly, who minds having another t-shirt, sweatshirt, or pair of comfy pants with your school logo on them? A Small Gift Every Day of Their BirthdayWeek This is a great option if youre a little short on cash. You can surprise your roommate with something fun every day of their birthday week: their favorite candy bar placed on their computer keyboard one day, a box of their favorite cereal the next. A New Laptop Bag/Backpack/Gym Bag/Purse/etc College students are notoriously rough on their bags. And, given that you share living quarters, youve probably seen the worst of the worst when it comes to how your roommate treats their backpack, gym bag, etc. Consider getting them a replacement or even just an extra one for when things get really ugly. Some of Their Favorite Personal Products Does your roommate have a favorite perfume? Cologne? Brand of flip-flops theyre always wearing? Grab an extra one, throw it in a gift bag, and ... voila! Instant personal roommate gift. A Book by Their Favorite Author or on Their Favorite Topic Chances are, your roommate has some passions and interests that they dont get the chance to read about just for pleasure. Surprise them with something theyll enjoy without having to worry about writing a paper on later. A Simple Electronic Device to Make Life Easier You can never have too many thumb drives, phone chargers, or earphones. These inexpensive electronics make for great, inexpensive gifts. A Gift Certificate to Their Favorite Website Does your roommate love iTunes? An online game? Consider getting them a gift certificate that they can use electronically. Added bonus: These make great last-minute gifts since theyre often delivered instantly.

Wednesday, November 20, 2019

Game Theory Research Paper Example | Topics and Well Written Essays - 2000 words

Game Theory - Research Paper Example The theorem is generally used in economics studies, when there is a repetition of the number of games (Policonomics, â€Å"Game theory III: Folk theorem†). Game Theory has major contribution on repetitive games, wherein individual players have complete knowledge regarding the strategies of the other players. In Folk Theorem, there is a concept i.e. Nash Equilibrium. This concept is identified to have an outcome of one in a game, as the players are not facilitated with the opportunity of having an incentive by deviating from their choice on the basis of the choices of opponents. Contextually, players are not able to have incremental benefits, as others are identified to be grounded on their strategies (MIT, â€Å"Game Theory†). The objective of the current study is to attain comprehensive understandings regarding Folk Theorem by understanding its applications and citing examples prevalent to the real life world. This comprehensive understandings regarding Folk Theorem would eventually abolish all the myths relevant to it. The origin of Folk Theorem is still uncertain, however, it is believed by most of the researchers that the theorem has originated during the late fifties of the 20th century. However, in a very short period of time, the theorem has gained extensive popularity. Since, there is an uncertainty regarding the origin of the theorem, it is therefore termed as Folk Theorem. In mathematical conception, Folk Theorem is the one, which is believed and discussed as well as used extensively, however it is not published. Therefore, the theorem is also known as General Feasibility Theorem, but, the name Folk Theorem is popularly renowned (Policonomics, â€Å"Game theory III: Folk theorem†). Folk Theorem is a decisive part of the Game Theory, which is majorly related to economics. The theorem has an extensive role in the Game Theory that has repeated number of events (MIT, â€Å"Game Theory†). In this regard, it is elaborated that the theorem suggests that

Tuesday, November 19, 2019

International Relations Essay Example | Topics and Well Written Essays - 1500 words - 2

International Relations - Essay Example Such research can bring the certain contribution also to the discussion about political "realism". The realistic theory usually is considered as the most consecutive interpretation of the essence and the reasons of political events such as confrontations, military alliances, diplomatic negotiations and international relations as a whole. Realists have managed to create the elegant theory of the international relations, having specified that the conflict of interests between various political communities is internally inherent in the international system, and having shown that uniqueness of the international relations is caused by the nature of the political communities, which are representing themselves as the parties in these relations. From our point of view, problematic part of the realistic theory consists in the way of conceptualisation of these communities, namely the national states. There are different forms of realism, but behind all of them there is one uniting idea: on the stage of the international relations act uniform "characters" named states. Further these states are considered as discrete units, which functioning almost in the same way as individuals in a society. This idea generates the whole complex of representations about the state and its activity on the international scene. ... This discourse considering the state as a uniform and independent rational character creates the general frameworks for reflections on something that is usually described as "the international system". Thereof the realistic theory reduces the international relations to the stage, on which the states pursue their egoistical interests. The end of the Cold War has called into existence a number of trial attempts to define new world order. Meanwhile the only obvious fact is that the world community has entered a grandiose global transformation process, which at least till now has generated more social problems, rather than solutions. The end of rivalry between super-states and an increasing break in wealth and access to resources between states have contemporized with disturbing growth of violence, poverty and unemployment, number of homeless persons, and erosion of ecological stability. The world also became the witness of one of the deepest, since times of Great depression of thirties, global economic recessions. At the same time isolated before nations get more and more close both voluntary and against their will due to growing integration of markets, formation of the new regional political unions, remarkable successes in the field of telecommunications, biotechnology and transport, which have stimulated unprecedented demographic shifts.As a result of such a merger of people and cultures nowadays we may observe the world, characterized by increasing integrity, cultural variety, and supersaturated with intensity, confusion, and conflicts during the adaptation to pluralism. Now let us consider the differences, which exist in the viewpoints of realists and those of liberalists. Liberals after the World War I have formulated the

Saturday, November 16, 2019

Jim’s Training Needs Analysis Essay Example for Free

Jim’s Training Needs Analysis Essay Introduction In this case study the training needs analysis is lacking in job duties and responsibilities that create an unsafe environment. The training program is not consistent or is it cost effective in the trial and error method in backhoe procedures. Jim needs the organization to create a training objective in KSAs. Management needs to review the workplace methods in safe practices, regulations and work conditions that meet the goals and objectives of the organization. Potential Cost to Lack of Training This method in trial and error for a day to check an employee’s skills can mean they are doing well, but improvement is needed in their progress to determine their KSAs. Jim is adaptable to changing situations, but truly does not know the backhoe equipment, safety precautions, or the operating techniques of digging a hole. This type of training does not align in cost effective measures, the supervisor should observe and mentor Jim in his position as a backhoe operator and teamwork is essential to get the job done. There is no transfer of training to the task. It appears the organization is small and lacks resources to train their employees in new skills. There was no development phase of formulating an instructional strategy (Blanchard Thacker, 2013). The organization lacked high quality services, and continued to grow and Jim’s job satisfaction to a large degree is dependent on input from other co-workers. The crew chief and Bill Granger, gave credible advice, standards of performance and guidelines by providing proper instructions in operating the backhoe. However, Jim’s work quality was deficient in breaking waterlines or digging up underground telephone lines. According to Blanchard Thacker  (2013, p. 151) table 5-4 would have been cheaper in a training program, then constantly paying for the damage Jim imposed upon the company. It was as if there were no rules to work by, and Jim did not have a clear sense of appropriate behavior. In addition, his crew members were not happy in Jim’s operating techniques and they strived to get the job done safely and effectively. This type of non-training is detrimental to the organization, and can create a hostile work environment with individuals needing proper skills. Jim is performing inefficiently and lacks the application to perform the job satisfactorily. Recommended Methods and Training for the Organization The employee selection process starts with the job description. The employee employed is interviewed and other applicable testing for the position. This will include the pre and post-test method in screening the applicant according to the organizations policies and state, federal regulations. In addition, consider a ninety day probationary period. This would help the organization to determine if Jim’s performance, attitude, attendance measures to the organization’s standards. The business stakeholders want to know that the employees and training matches the experience, benchmarks and performance metrics (Saunderson, 2012). According to Saunderson (2012) the training needs to be transparent, solve problems, how to operate equipment and relay information and not provide redundant skills. According to Blanchard Thacker (2013, p. 155) table 5-6 verbs is transferring the training: Knowledge to analyze, cite explain and reproduce tasks. Skills to assemble, operate install and demonstrate. Attitudes align with the organization in commitment. Jim was deficient in these skills as the operator of the backhoe and the crew chief and team members realized he was not prepared for this position. Therefore, the TNAs would be cost effective for the organization. This means a combination of classroom and on-the-job training. The workplace training is to incorporate the latest organizational policies, procedures and state, federal guidelines. In addition, the training would be tailored to certifications, training materials, safe work conditions and ready reference  materials for the pretest/post-test final exam. Workforce training and planning trends today need to meet these objectives (Planning for people, 2012, Dec 29): Address skill gaps. Recruitment process, orientation, employee coaching, mentoring and development are specific and have compensation initiatives. Define goals in terms of human resource metrics, timelines and measure what is accomplished. Ensure senior management support. Involve management in overseeing the development of the workforce plan and it is linked to the corporate strategy. Ensure employees are updated/trained in new policies/procedure and are executed effectively. This would create an organization’s continuity plan towards the strategic direction. In addition, the organization implementation, maintenance and performance metrics. The Trainer and Training Environment The trainer and training environment will be within the workplace. This will eliminate any concerns that this training will not work at this plant, the boss generally makes those decisions and will better transfer the training to their specific job Blanchard Thacker (2013, p. 285). In a small business this is cost effective and the development phase input, process and output define the organizations objective goals. In the training and development process of equipment it will be done off-site to determine skills, safety practices and the actual physical operation of outdoor machinery. Throughout this implementation phase, the physical environment must be constantly monitored. This ensures learning has occurred. The learning process will be generalizability in jobs-relatedness and practice skills to the actual job Blanchard Thacker (2013, p. 294). The primary concerns in a training program is the learning impact, cost, time schedule without reducing productivity in the workplace environment. Therefore, the training program will be disseminated in advance throughout all levels of the organization. This will allow management, senior executive’s involved sufficient time to arrange employee’s schedules. This will be done so that work assignment can be adequately covered during the individual’s absence. The training will be evaluated and measured according to the skills learned  and transferred to the job. According to Blanchard Thacker (2013, p. 318) providing feedback to the trainer, can be used to modify the program and process to facilitate the training success. Conclusion The case scenario with Jim, truly demonstrated that trial and error method is not cost effective as a training and development program would be in an organization. In addition, when individuals are deficient in job skills it can create a hostile environment, lower morale and not encourage teamwork. In the above examples the best trainer would be within the workplace to diminish any barriers to the training methods. In addition off-site training for outdoor machinery would be effective in safe work conditions and actual operation of equipment. Jim needs the organization to create a training objective in KSAs. Management needs to review the workplace methods in safe practices, regulations and work conditions that meet the goals and objectives of the organization. References Blanchard, P.N. Thacker, J. W. (2013). Effective Training: Systems, Strategies, and Practices (5th ed). Upper Saddle River, N.J: Prentice Hall. Planning for people. (2012, Dec 29). Winnipeg Free Press Retrieved from http://search.proquest.com/docview/1265594428?accountid=32521 Saunderson, R. (2012). Transparency in training. Training, 49(1), 134-135. Retrieved from http://search.proquest.com/docview/1020618237?accountid=32521

Thursday, November 14, 2019

Did you say Library Anxiety? - Part One :: Essays Papers

Did you say Library Anxiety? - Part One Most people are familiar with the terms test anxiety, math anxiety, performance anxiety, computer anxiety, or even social anxiety. But mention "library anxiety" and you'll likely get a response similar to, "Library what?" Library anxiety is not a well-known phenomenon, even among librarians. The bulk of research on library anxiety has concentrated on the problem as it applies to university students, but it’s not hard to imagine that it manifests itself in library patrons across the board. Where did this idea come from, how can librarians identify it, what steps can be taken to reduce it and what can the library community learn from it? Although it has been cited in the literature as far back as 1972 , the term library anxiety was first identified in 1986 by Constance A. Mellon. Virtually every article or study on the subject since then has referenced Mellon’s work in this area. Her studies showed that most students felt that other students knew more about library searching than they did and that to ask for help would be to reveal their stupidity. She also found that contact with reference librarians was more effective in alleviating library anxiety than the bibliographic instruction sessions conducted by their teachers. There are other names in the field such as Carol C. Kuhlthau, who found that students’ ability to process information from the aspects of mental, creative and physical locating operations is hampered by their feelings, thoughts, and actions. In 1992, Sharon L. Bostick devised a valid and reliable instrument to measure Mellon’s theory of library anxiety. The basis of her doctoral dissertation, she developed a 43 item, 5 point Likert-format test instrument that defines levels of library anxiety. Her instrument showed that it is possible to identify library anxiety and to measure it quantitatively. She identified five factors that contribute to library anxiety: 1) Affective Barriers; 2) Mechanical Barriers; 3) Comfort with the Library; 4) Knowledge of the Library; and 5) Barriers with staff. "Affective barriers" measures the feelings of adequacy when using the library. As we will see, affective barriers come in to play with all of the other factors, each of which will be described in greater detail. Mechanical Barriers: The ability to locate and use library equipment is hampered by the physical barriers libraries present. Students search for copy machines and upon locating them they learn that they need specific change to use them, or must purchase a copy card.

Monday, November 11, 2019

Psychology Essay Essay

Omkar Kawade Charles Ramskov Psychology Essay Perception can be defined as the process of how an organism interprets a sensation. Many psychologists studied different types of perception, such as Constructive Perception (top-down) that was studied by Rock, Neisser, and Gregory. Another approach of perception was the Direct / Ecological (bottom up) which was studied by Gibson. Constructive (top down) perception is an active and deductive reasoning process. It is seen as an obstacle, object, or any matter that changes your perspective of its view. The way you view the object can be in any matter, but usually it connects back to a memory or an experience that you have had before. For example, a person called Eddie is an active user of a social network called Facebook, in which he has many friends, and talks to them very often. In this chat, he uses emoticons that are made up of keyboard functions such as colon and parenthesis â€Å" 🙂 â€Å". If you take this emoticon and rotate it, you will see a smiley face. When Eddie sees this arrangement of keyboard functions, he sees a smiley face. However, Kevin, a person who has no social interaction through the computer and/or Internet, sees this simply as a colon placed next to a right parenthesis sign. Direct Ecological (bottom up) perception is an inductive reasoning process. Gibson stated his theory of bottom up perception was basically visual perception and the information needed was available from the proximal stimulus that was produced by the distal stimulus. In this case, the example is that Kevin looks at the emoticon and sees only a colon and right parenthesis, but to furthermore find more perception in this symbol, top down perception is needed. Bottom up perception is the visual environmental view of what we see and how we interpret and distinguish certain things apart from each other, while top down perception is how we furthermore establish a different meaning for i t.

Saturday, November 9, 2019

Advertising and Big Beer Ad Essay

1. What factors influence the perceived credibility of an informal information source? List and discuss factors that determine the credibility of formal communication sources of product information. The perceived honesty and objectivity of the source of communication has an enormous influence on how the communication is accepted by the receiver. The major factors are perceived intention of source, correct use of celebrity endorsements and the appropriateness of the spokesperson with the content of the message. 2. What are the implications of the sleeper effect for the selection of spokespeople and the scheduling of advertising messages? The sleeper effect is the tendency for persuasive communication to lose the impact of source credibility over time. In terms of choice for a spokesperson, it is a good idea to select a controversial and famous person that will stick in the consumers mind e.g. celebrity endorsements. The ads should be scheduled first in the commercial block because people tend to remember them the most in comparison to the commercials played in the middle and end of the show. See more: Examples of satire in adventures of huckfinn essay 4. Virgin Airlines uses both magazines and Internet to promote its discount airline business. How would you measure the advertising effectiveness of the two media for promoting the service? Which is likely to be more effective? Broadband Internet services offer fast access to growing group of consumers i.e. special interest groups. However, the growth of unsolicited emailing, email viruses and worms have limited the effectiveness of this medium. There is a growing trend towards media fragmentation as they have shifted their focus from general interest audience to smaller more specialized groups. According to a Roy Morgan survey in 2006, there were 140 magazine titles read by the population of ages 14 and over. 5. Which media do you think are suitable for advertising to the 18-24 age group as opposed to the 55+ age group? Justify your answer with examples and /or secondary data. The most appropriate media type for the age group of 18-24 would be the Internet, as they are one of the largest users. This type of marketing is called viral as it allows the message to spread like a virus. Some examples of this are the Carlton Draught ‘it’s a big beer’ ad, which premiered on the Internet and now has had over 3 million views. Social networking activities driven by sites such a YouTube and Facebook have also had an important impact of the effectiveness of viral marketing, for example the Carlton ‘it’s a big beer’ ad can be viewed on YouTube. On the other hand, according to Nielsen Media Research it would appear that popular FM radio stations and ABC radio stations appeal to two very different audiences, with 33% of over 55 listening to 3AW Melbourne and closel y behind are the ABC stations for that age groups. 6. You are the marketing manager for a headache remedy. Your advertising agency has just presented you with two different promotional strategies, one using a humorous approach and one taking an â€Å"agony† approach. Which approach would you adopt? Why? As a pharmaceutical company we would choose the â€Å"agony† approach as these commercials are run with great success because they appeal to a certain segment that suffers from aliments that are not visible, which therefore elicit little sympathy from family and friends. Complaints are legitimized by commercials, which they immediately identify with. 7. You are a promotions manager working for the Australian or your home government. Devise an advertising campaign to discourage smoking by young women referring to the communication model shown in Figure 7.1.p.260. Compare your plan with current campaigns used by the Australian government, state governments or local governments. How is your campaign superior? Justify your answer with reference to consumer behavior. We would use an emotional advertising campaign, with a combination of fear and abrasive advertising to discourage women from smoking. Fear is an effective advertising appeal, as it provides a compelling set of reasons for immediate actions to prevent the fatal consequences of smoking. In using abrasive advertising we would use a controversial campaign as this will help improve awareness of the negative consequences of smoking, It would also link us to important social issues regardless of the fact that the images may be confronting to some people.

Thursday, November 7, 2019

Safeway Supermarket Essay Essay Example

Safeway Supermarket Essay Essay Example Safeway Supermarket Essay Essay Safeway Supermarket Essay Essay Safeway Company has policies that require employees to smile at and do oculus contacts with clients. Most of the clients would see this sort of facial gestures as a friendly manner of making concern. but some clients might misconstrue them as a â€Å"flirt† . Twelve employees had filed ailments about this â€Å"Superior Service† policy and found it unethical for the company to hold clandestine shoppers to descry if there is any lawbreaker. This led to Union to acquire involved and suggest the company to modify the policy. However. the central offices disagreed that the policy was the cause of the misinterpretation. And they think it is necessary to develop their employees to be friendly and holding the right attitude to function their clients. Analysis of the Case Due to the â€Å"Superior Service† Policy implemented by Safeway. clients have two typical letter writer illations on the employees:* Positive: A friendly manner of making concern.* Negative: Employee purpose or effort to chat up with the clients. Although the instances of clients holding a negative letter writer illations on the Safeway Employees is little nevertheless it was a major concern which lead the Union to be involved and accordingly the Policy to be abolished. Q1. How. specifically. is the procedure of ascription illustrated in this instance? Causal Attribution is study on the causes of behaviour based on the followers: * Internal: based on actions for which the person is responsible. * External: based on state of affairss over which the person has no control. Majority of the clients are utilizing Positive letter writer illations to associate the employees to be friendly. The internal causes might be the employees are friendly. helpful and socially natured persons. On the other manus. the external causes might be the employees need to purely follow by the Policy of implemented by Safeway. Culture and norm practiced in Safeway. fright of being sent of Smile School. portion of their KPI and Job Descriptions. Certain clients are utilizing Negative letter writer illations to associate the employees to be coquettish. The internal causes are likely due to the â€Å"Easy going† and â€Å"very social† personalities of the employees. On the other hands the external causes are due to the enlisting and choice procedure in Safeway. the civilization of the company. The negative letter writer illations might be due to the following perceptual prejudices:* Fundamental ascription mistake* Halo consequence* Similar-to-me consequence* First feeling mistake* Selective perceptual experience* Pigeonholing Q2. What do you supposed is being done to assist develop people to be friendlier toward clients? In other words. what would you conceive of goes on in Safeway’s â€Å"Smile Schools† ? Learning is procedure where a comparatively lasting alteration in behavior happening as a consequence of experience. Operant Conditioning is the signifier of acquisition in which people associate the effects of their actions with the actions themselves. Normally the behaviours with positive effects are acquired whilst the behaviours with negative effects tend to be eliminated. Observational Learning is the signifier of acquisition in which people get new behaviours by consistently detecting the wagess and penalties given to others. For Safeway to efficaciously develop the employees to be friendlier. a assortment of developing techniques should be used. Either the preparation should be conducted officially in category in the Smile School and later via on occupation preparation. The Smile School categories should include developing on basic communicating accomplishments. recognizing accomplishments. client relationship accomplishments. Role Play should be included as an effectual manner to integrate the transportation of cognition and accomplishments of the engagement. support of the cognition acquired. Participant can associate to existent life experiences and trainers can measure defects and supply feedback. One of the Role Play should include scenario how to manage hard client under assorted state of affairss. The formal preparation and on occupation preparation would supply both positive and negative support. Positive support is the procedure by which people learn to execute behaviours that lead to the presentation of desired results while negative support is the procedure by which people learn to execute Acts of the Apostless that lead to the remotion of unsought events. Training should be conducted uninterrupted and ongoing so that it will be a uninterrupted support in which all desired behaviours are reinforced. Reinforcement should avoid penalty and should merely be used penalty as the last resort. The aim of penalty is diminishing the unwanted behaviour by following it with unwanted effects. Q3. Describe what you believe might be the progressive subject measure outlined in the warning missive to unfriendly Safeway clerks. Once preparation has been completed and the desired results still have non been reached. Safeway could follow taking progressive subject stairss as illustrated in the diagram below: It is a systematic and progressive method to reenforce the coveted consequence. The coveted consequence and the defects must be communicated decently. Written warning must spell out what is required from the employees. what are the defects. what action will be taken and the effects.

Tuesday, November 5, 2019

Athletic Leadership Development Program Essay Example for Free

Athletic Leadership Development Program Essay There is great need to develop effective athletic management programs in high schools. Apart from the fact that students derive direct benefit from such programs, it is also a good training resource since today’s high school athletes will eventually take shape as tomorrow’s sports leaders as coaches, trainers, athletic administrators, sports physicians, sports psychologists and other capacities (Lanasa, Ciletti & Lackman, 2005). High school is a very important stage in which students prepare for the future by getting a good education, making friends and participate in other activities such as athletics. It is unfortunate, that many schools have adopted budget cuts that under provide for sports, taking the opinion that money would be better spent on academics. Though it is right that academics come first, sacrificing high school sports is dangerous to the students’ high school experience as it affects their ability to perform at optimum academic levels (Amorose & Horn, 2000). Sports are also an important component that helps students develop into well-rounded adults who give full benefits to the country at large. INTRODUCTION This paper will carry out a literature review to illustrate how a School Athletic Leadership Plan works to give students full benefits. In extension, the school as an institution also derives high levels of achievement and satisfaction from the same. It will show how students with an interest in the field of training and treatment of athletes can effectively be prepared by the school athletic training programs. They are a perfect opportunity of gaining college and career preparation. These programs give an appropriate opportunity to the attainment of information, certification, scholarships and networking for students (MacGregor, 2005). HOW TO DEVELOP A LEADERSHIP PROGRAM This section will evaluate the leadership program adopted by Wheeler High School in Indiana. It presents a situation that is appropriate to most high schools where there are potentially good players but their hopes and targets fail to materialize due to lack of a well organized sports framework and leadership in the school. On evaluation of the progress and areas that need change, Snodgrass notes that the foremost problem was the lack of player leadership in the students’ teams coupled with the lack of senior talent (2005). Borrowing from the plan adopted by this school, this paper will give guidelines on how a school athletic leadership plan can be developed. Structure of the program An effective leadership program should start by identifying players that can participate in the plan. For starters, the first class could be made up of six senior and two junior students who would meet weekly for two to three hours over a ten week period (Snodgrass, 2005). In this period, they would they would participate in the curriculum by carrying out the following; Interaction They are expected to visit and spend one or two hours in the curriculum each night (Snodgrass, 2005). From this interaction, the head of the plan identifies the strengths and weaknesses of the selected team by observing how they interact and how committed they are. This is the stage at which the leaders and those with skills valuable to the plan are identified. As they share ideas, hopes and aspirations, this pilot group can come up with an excellent blueprint of the plan since they are better positioned to know what would work with their fellow student athletes and what would not. Activities strengthening core values The activities that strengthen core values are important as they set the plan in motion with the rest of the student athletes. The pilot group of eight should each be assigned a group of student with which they carry out these activities. This could occur in class for discussions and after knowing each other, the group members should engage in out of class activities. Group leaders are expected to call incoming players and engage with them with an aim of getting to know them intimately (University of Wisconsin, 2007). This is a very important step as the group leaders get in a position to identify strengths and weaknesses that might be hidden from the coaches and teachers. This enables the teams to avoid failures that commonly arise from the lack of proper understanding within the team. Leadership in youth camps The eight members of the pilot team should serve as counselor at the summer youth camp. They are expected to take up roles such as teaching a position, coaching the team in flag football, running the punt-pass-kick contest etc (Young & Edmonson, 2010). It should involve activities such as story narrations to emphasize the importance of team playing. The plan should be sure to implement a youth summer camp. The Handbook of Organizational Consulting Psychology underscores the importance of such camps in the development of leadership plans. It is from such camps that the members emerge as a team understanding each other, with strong leadership and ready to work together (Fiedler, 2002). The above activities lay the foundation on which the plan can be built upon. After getting the required individuals to spearhead the program and the necessary team sprit, the plan can proceed into the next step in which it formally assembles the best ideas and strategies for the leadership program in form of a blueprint discussed in the following section. PLANNING THE BLUEPRINT Snodgrass defines a blueprint as the process of designing a leadership program in any field from start to finish (2005). It guides the implementation of the whole process and it gives guidelines on how to check progress and success levels. This paper will provide a blueprint that is divided into steps as follows; Step 1: Assembling the planning team According to the program adopted by the Leigh University for the summer of 2007, the planning team should comprise all the key stakeholders to build a program that is acceptable campus wide (Fiedler, 2002). It is imperative to ensure that all individual stakeholders understand the importance of athletics in the life of the students. Teachers and other members of staff should be ready to sacrifice some academic hours in order to bring the plan into track. In this university, the team consisted of coaches from the Athletic Department, administrators and student-athletes as well as staff from the Dean of Student’s Office to attain a healthy balance (Young & Edmonson, 2010). They should meet weekly to discuss the rest of the steps in the blueprint. Step 2: Conducting a leadership audit â€Å"The leadership audit is a systematic assessment of leadership development opportunities at the institution and beyond. A complete audit includes both internal and external reviews and inventories all leadership opportunities† (Lanasa, Ciletti & Lackman, 2005). Internal audit: The information from this audit should find out whether there are other leadership initiatives on campus in which student-athletes can participate (). Fiddler finds that often these programs are not designed to directly increase the value of the student’s leadership and do not fundamentally impact Athletics as a whole(Amorose & Horn, 2000). There should be goal setting and skill building workshops that are conducive to the unique schedules of student-athletes and athletics department staff. External audit: This involves researching specific leadership opportunities at other institutions. This should particularly look for leadership development programs and delivery options within other institutions (Robinson & Skinner, 2008). It can be done in neighboring schools that have highly successful leadership development programs to identify crucial aspects that can be adopted. It can also be done online or from other literature on the issue to set good standards for a comprehensive plan. Step 3: Identification of an anchor The anchor is another crucial aspect of the plan that should be in place. Young and Edmonson define it as the â€Å"existing institutional purpose, outreach or reason that makes the program’s efforts essential and justifies the investment of time, energy and resources to support the effort (2010). It helps in the acceptance of the plan since it does not appear as something totally alien. For instance the mission statement of Lehigh University is; â€Å"To advance learning through the integration of teaching, research, and service to others† (Young and Edmonson, 2010). To be in tandem with the school’s mission statement, the Lehigh Athletics Mission Statement could be made to capture that of the institute, e. g. â€Å"Our mission in the Lehigh Athletics Department is to advance learning to develop leadership, and to foster personal growth through comprehensive athletics programming. † (Young and Edmonson, 2010). This way, the plan manages to entrench itself within existing institutional goals and hence all stakeholders can comfortably identify with it and work towards its implementation. As such, teachers for instance would drop their hard line stance towards the plan as they feel it helps in academics. Step 4: Determining the scope The scope is the extent of the leadership experience which encompasses aspects such as how deep the program will be embedded in institutional culture and the programmatic mission and learning objectives (Robinson & Skinner, 2008). The scope should be connected to the vision, mission, and learning outcomes of the school’s sports department. Vision: the plan should be aimed at cultivating a culture of leadership which encourages self-awareness, commitment to team playing, and emphasis on values and actions that enhance a good athletic experience. (Amorose & Horn, 2000) Mission: the sports department should use the plan to complement and support the larger missions of the institution as a whole. This can be achieved with the use of the transformational leadership theory that enhances student’s leadership skills and understanding (Fiedler, 2002). It should accomplish a sense of community among al stakeholders focusing on the value of positive leadership. Learning outcomes: these are the benefits that the students should derive from participating in the Athletic Leadership Program. Firstly, they enhance their knowledge of basic leadership skills and principles. Others are interpersonal skills, integrity, peer motivation, self awareness and the value of diversity in every situation (University of Wisconsin, 2007). This will enhance their wellbeing in every field of life in school and beyond. Step 5: Shaping the philosophy A philosophy is important in shaping an appropriate vision, mission and goals for a comprehensive Athletic Leadership Program. Robison and Skinner put forward two examples of philosophy that can be used to achieve this end. They do so by addressing the unique needs of student-athletes, teams and coaches (2008). The Transformational Leadership Theory is the primary philosophy in which the program is embedded. â€Å"It describes a course of action where both leaders and participants engage in a mutual, ongoing process of raising one another to higher levels of motivation, moral reasoning, and self-consciousness† (Robinson & Skinner, 2008). This encourages collaboration and interdependence within participants by appealing to social and community focused values. Principle-Centered Leadership Theory: this theory is based on principle based leadership. Leaders are required to center their practices in natural based practices. Their values can only be effective if they remain true to these guiding principles, which are identified as; â€Å"continually learning, service-oriented, radiate positive energy, believe in other people, lead balanced lives, see life as an adventure, are synergistic, and exercise for self-renewal† (Robinson & Skinner, 2008). Step 6: Selecting delivery framework These are the strategies and individuals to be used for teaching participants about leadership. This includes positional leaders and emerging ones. Positional leaders include coaches and captains who are directly responsible of development of athleticism in individual-student athletes which will ultimately lead them to winning championships (Fiedler, 2002). Emerging leaders include students joining the program and those who have been it for a while and want to further their leadership skills. This way, the plan ensures that it has a never ending supply of talent and new leadership, i. e. it is sustainable. Step 7: Select Assessment and Evaluation Strategies This step ensures that intentional assessment and evaluation tools will are available. It is recommended that the implementation of the blueprint is assessed after the first full year of implementation. The tools to be used for this assessment may include â€Å"focus groups, student-athlete exit interviews, pre- and post-surveys, student-athlete post-season evaluations, etc† (University of Wisconsin, 2007). This process is meant to explore needs, outcomes and satisfaction derived from the plan. CONCLUSION A School Athletic Leadership Plan like the one outlined above will go a long way in accomplishing a varied range of needs in the school. It clearly shows the need to implement an effective plan from which students can derive numerous benefits. The step by step process is imperative in creating a leadership program which is self sustaining and which is deeply rooted in the institutional goals and vision. This ensures that it is embraced by all. REFERENCES Amorose, A. J, and Horn T. S (2000). Intrinsic Motivation: relationship with collegiate athletes’ gender, scholarship status, and perceptions of their coaches’ behavior. Journal of sport and exercise psychology. 22(1), 63 – 84. Fiedler, F. E (2002). Proactive ways to improve leadership performance. Handbook of organizational consulting psychology, 76 – 105, San Francisco: Jossey-Bass Lanasa, J. , Ciletti, D. and Lackman, R. (2005). Designing a Model for Improved Outcomes Among Students- Athletes in Sports Education. Left Coast Press. Retrieved, 6th August, 2010 MacGregor, G. M. (2005). Designing Student Leadership Programs: Transforming the Leadership Potential of Youth. Youthleadership. com Robison, T. I and Skinner, T. (2008). The Athlete and the Grade Change. Cases in Educational Leadership. Retrieved, 6th August, 2010 Snodgrass, S. (2005). Building a high school leadership program. Gale, Cengage Learning. University of Wisconsin. (2007). A Grounded Theory Of High Quality Leadership Programs: Perspectives From Student Leadership Development Programs In Higher Education. Madison: University of Wisconsin. Young, J. and Edmonson, S. (2010). High School Athletic Directors and Educational Leadership Traits: A Conceptual Analysis of the Literature. Retrieved, 6th August, 20 10 Athletic Leadership Development Program. (2016, Sep 17). We have essays on the following topics that may be of interest to you

Saturday, November 2, 2019

Competition in drafts for sports Research Paper Example | Topics and Well Written Essays - 750 words

Competition in drafts for sports - Research Paper Example History shows that the Cleveland Cavaliers abused this privilege by signing LeBron James to a huge contract. Many sports analysts also argue that the NFL draft does not carry as popular names. The biggest names in NFL draft up to this day is Adrian Peterson, who has still not managed to take his team to the superbowl. However, the NBA draft has always gotten attention for its fancy players. The NBA 03 draft was one of the most prominent drafts that features players such as LeBron James, Carmelo Anthony, Chris Bosh, Kirk Hinrich, and many other superstars. The NBA has been traditionally been very lucky being blessed with drafts whereas NFL drafts. Competition in both drafts have been superseding amazingly in the previous decade. Players have been stronger, faster, and better than ever before. This is due to the fact that competition has been majorly extensive even at minor conferences. Players are running the 50 yard dashes in major milestones for the NFL draft. The advent of the supplement industry and nutritionists have also played a vital role in this. Players at the collegiate levels have nutrionists, therapists, and training staff to help them in any manner possible. However, one element of draft that is missing is the athlete’s behavior. The combine and pre-season events that occur before the draft also are a valuable element. They dictate the nature of the draft as players showcase their skills and athletic abilities. Prior to the NFL combine, recruiters only had game film to evaluate the players. With new technologies and analysis, the draft has become a very fierce method of evaluation. Competition in drafts has been much fiercer as well because of the exposure of social media. Social media attention has been a focal point in the persona lives of athletes. In today’s centuries, the advent of social media has made

Thursday, October 31, 2019

Leading Retailer Case Study Example | Topics and Well Written Essays - 1750 words

Leading Retailer - Case Study Example The main aim of the company is to help people save money to help live better. The growth of the company over the years has been immense. The company pays a lot of attentions to the needs of the stakeholders and helps provide the stakeholders with the desired results. The biggest retailer in the world with over 971 discount stores, 2447 super centres, 132 neighborhood markets, and 591 Sam's clubs in the US, Wal - Mart has been able to very smoothly make its way to the top of the retailing industry. The company is spread over the 14 countries and employees almost over 2.1 million people. The company has made enormous revenue of over $378,799 million for the year - end January 2008. Being the largest retailer in the world, Wal - Mart is faced with a lot of competition and making all the happenings, issues, events etc of Wal -Mart always in the limelight (Money Central, 2008). The company works on the basic values which mainly revolve around the respect for individuals, service to customers and striving for excellence. The management of the company is said to be very efficient and the managers are known to be work by the values of the firm. However the company still faces a number of issues pertaining it employees, each of whom are known as associates in the company. The vision of the company is to become the leaders of the retail industry. This however can only be achieved by ensuring that the customers receive what they desire out of the company. The mission of the company highlights their constant need to improve the services provided to exceed customer expectations and to provide customers with reasonably priced goods of great quality. The company's basic va lues of respect for individuals, service to customers and striving for excellence speaks for itself. Wal - Mart has tried to ensure it reaches out to the majority of the American population and the major customer groups accounting to almost 23 percent belong to families where the annual income is lesser than $25,000. It was also noted that almost half of the customers of the superstore are blue-collar workers and most of the families are either unemployed or elderly (Featherstone, 2005). The Issues: Wal - Mart in some recent reports has been accused of not treating their employees fairly and making the employees work over the shift hours. The company has also been accused for paying the employees much lower than what they should receive. According to a number of reports the employees have actually disclosed the fact that they receive pays which are way below the minimum level of pay that has to be given to the employees. The company claims to give importance to the employee's growth and careers. The company's website claims to provide the employees with a competitive pay, skills development and health benefits for the employee and family. However a recent article in Business Week highlighted the fact that the company has been paying employees about $8.23 per hour, or $13,861 a year. This pay is well below the federal poverty line of $14, 630 for a family of three. Other

Tuesday, October 29, 2019

The Fast Food Industry in Houston, Texas Essay Example | Topics and Well Written Essays - 1000 words

The Fast Food Industry in Houston, Texas - Essay Example In 2010, Ibisworld report indicated that McDonald’s Corporation had a market share of 12.7 percent, Wendy’s had 6.6 percent, Starbucks Corporation had 5.9 percent, and Burgers King Corporation had 5.1 percent (Schlosser, 2012). This indicates that these four companies are the leading market players in Houston’s fast food industry with McDonald’s corporation being the market leader. Additionally, according, McDonald’s share price is $90.79. In 2011, the company’s profit rose to 19 percent that is equivalent to revenue of $6.91 billion. Wendy’s current-year income is projected at $2.69 billion, and Jack in the Box earnings and revenue is projected at $2.16 billion and $1.53 a share (Schlosser, 2012). In spite of gloomy economic condition, Houston fast food industry is experiencing robust economic growth. Studies have predicted that the fast food market is expected to grow in the coming years, and will cross the $179 Billion mark by 2013 (Schlosser, 2012). The fast food industry, like any other industry, also experiences the economic ups and downs. In addition, they provide products and services that many other businesses depend on. Various business trends such as social and financial markets significantly affect the economic status of fast food market. Some of the key factors that affect the demand and supply of fast food include health, supply, spending and financing. The impact of fast foods on health is one of the most significant challenges.

Sunday, October 27, 2019

Security Issues in Peer-to-peer Networking

Security Issues in Peer-to-peer Networking ACKNOWLEDGEMENTS: The interest in the field of networking, driven me to take the computer networking as my course in M.Sc. there are many different types of networks. Out of them the more popularized and upcoming trend of networks are peer-to-peer networks. This report of my final dissertation for the partial fulfilment of my M.Sc, computer networking, would not have been possible without the support of my supervisor, Mr. Harry Benetatos. He helped me a lot by guiding me and pin-pointing the key mistakes which I have done during my research. My course leader Mr. Nicholas Ioannides also helped me a lot to complete this dissertation. His advises and suggestions gave me a lot of encouragement and support which made me do this research and finish it in time. I am very thankful to my university, LONDON METROPOLITAN UNIVERSITY which provided me the free access to the IEEE library which helped me to find the key papers which are very useful for my research. I also thank my parents for their support given to me in all walks of my life. DEDICATION: I dedicate this report to my parents and my well wisher Sakshi for their constant support and encouragement throughout my education and life. CHAPTER 1 PROJECT INTRODUCTION 1.1 INTRODUCTION TO THE PROJECT: This dissertation is all about the security issues in the peer-to-peer networks. There are many security issues in peer-to-peer networks. I have chosen to do research on worm intrusions in peer-to-peer networks. In this document I have mentioned how the worm propagates in the network from one peer to another peer, how the worm can be detected and how the detected worm can be attacked and save the network from getting infected. 1.2 AIM: Security issue in Peer-to-peer networks: Securing the peer-to-peer network from worms.   1.3 OBJECTIVES: Ø To understand how the peers communicate with each other in the peer-to-peer network Ø To analyse the propagation of worms in the network. Ø To detect the worms near the nodes of the network Ø To defence the worms in the network. 1.4 RESEARCH QUESTION: This document briefly discusses about how the worms propagates in the network and how can it be detected and attacked in order to save the peer-to-peer network 1.5 APPROACH: My approach for this dissertation is as follows: Ø Understanding peer-to-peer networks Ø Defining the problem Ø Data collection and analysis Ø Study and understanding the existing solutions for the problem Ø Comparing different solutions Ø conclusion 1.6 METHODOLOGY: This section of my document contains what important steps to be followed in order to achieve the mentioned objectives. It also helps to schedule how to develop and complete different parts of the dissertation. In this dissertation firstly I will study and understand about the peer-to-peer networks and how the peers in the networks communicate and share information with the remaining peer in the network. Then I do research on how the worm propagates in the network, how can the worm be detected and how the detected worm can be attacked and restore the network.   In the pictorial form the different stages of my dissertation are 1.7 PREVIEW ABOUT THE COMING CHAPTERS IN THE REPORT: The rest of the report is organised as follows: in the chapter 2, there is brief discussion about the peer-to-peer networks, different types of peer-to-peer networks, advantages and disadvantages of the peer-to-peer networks. There is also some information about the worms, its nature and different types of worms. In chapter 3, there is a discussion about the methods given by the different person to detect the worm in the network by the method of matching the characteristic string of the worm. In section 4, there is a solution for this issue. That is mathematical method of detecting the worm in the network and defending it. Chapter 5 consists of a critical appraisal and suggestions for the further work. Finally, I concluded in chapter 6. CHAPTER 2 OVERVIEW OF THE GENERIC AREA AND IDENTIFICATION OF PROBLEM: 2.1 NETWORK: Network is a group of electronic devices which are connected to each other in order to communicate which each other.   The devices can be computers, laptops, printers etc. networks can be wired or wireless. Wired networks are networks in which the devices are connected with the help of wires. Wireless networks are the networks in which the devices are connected without the wires. There are many different types of networks and peer-to-peer is one of the important and special types of networks. 2.2 PEER-TO-PEER NETWORKS: Peer-to-peer networks are emerged in 1990 because of the development of the peer-to-peer file sharing like Napster [1].   Peer-to-peer networks abbreviated as p2p networks are the networks in which all the nodes or peers in the network acts as servers as well as clients on demand. This is unlike typical client server model, in which the clients requests the services and server supplies the resources. But in case of peer-to-peer networks every node in the networks requests services like a client and every node will supply the resources like server on demand. Peer-to-peer network doesn’t need any centralized server coordination.   Peer-to-peer network is scalable. Addition of new nodes to the network or removal of already existing nodes on the network doesn’t affect the network. That means addition or removal of nodes can be done dynamically. All the nodes connected in a peer-to-peer network run on the same network protocol and software. Resources available on a node in the network are available to the remaining nodes of the network and they can access this information easily. Peer-to-peer networks provide robustness and scalability. All the wired and wireless networks can be configured as peer-to-peer networks. Home networks and small enterprise networks are preferable to configure in a peer-to-peer networks. Most the networks are not pure peer-to-peer networks because of they use some network interface devices. In the beginning, the information is stored at all the nodes by making a copy of it. But this increases the flow of traffic in the network. But now, a centralised system is maintained by the network and the requests are directed to the nodes which contains the relevant information. This will save the time and the traffic flow in the network. 2.3 WIRELESS NETWORKS: Devices connected to each other without any wires can also be configured like peer-to-peer networks. In a case of small of number of devices it is preferable to configure the network in wireless peer-to-peer networks because it will be easy to share the data in both the directions. It is even cheaper to connect the networks in wireless peer-to-peer because we do not need to spend on the wires. Peer-to-peer networks are divided into three types. They are: Instant messaging networks Collaborative networks Affinity community networks[2] Instant messaging networks: In this type of peer-to-peer networks, the users can chat with each other in real time by installing some software such as MSN messenger, AOL instant messenger etc. Collaborative networks: This type of peer-to-peer networks are also called as distributed computing.   This is widely used in the field of science and biotechnology where the intense computer processing is needed. Affinity community peer-to-peer networks: It is a type of p2p network, where the group of devices are connected only for the purpose of sharing the data among them. Peer to peer networks are basically classified into two types. They are: Ø Structured peer-to-peer networks Ø Unstructured peer-to-peer networks 2.4 STRUCTURED PEER-TO-PEER NETWORKS: In the structured peer-to-peer nodes connected in the network are fixed. They use distributed hashing table (DHT) for indexing [4]. In DHT data is stored in the form of hash table like (key, value). Any node willing to retrieve the data can easily do that using the keys. The mapping of values to the keys are maintained by all the nodes present in the network such that there will be very less disruption in case of change in the set of participants DHT-based networks are very efficient in retrieving the resources. 2.5 UNSTRUCTURED PEER-TO-PEER NETWORKS: In unstructured p2p network nodes are established arbitrarily. There are three types of unstructured p2p networks. They are Pure peer-to-peer Hybrid peer-to-peer Centralized peer-to-peer In Pure p2p networks all the nodes in the network are equal. There won’t be any preferred node with special infrastructure function. In hybrid p2p networks there will be a special node called â€Å"supernodes† [3] . This supernode can be any node in the network depending on the momentary need of the network. Centralized p2p network is a type of hybrid network in which there will be one central system which manages the network. The network cannot be able to work without this centralized system Basically, all the nodes in the peer-to-peer networks contain the information of the neighbour in its routing table. The rate of propagation of worms in the peer-to-peer networks is larger than compared to the other networks. This is because the information of the neighbour peers can easily achieved from the routing table of the infected node. Different types of files are shared between the nodes in the peer-to-peer networks. These files can be the audio files, video files, music files, text documents, books; articles etc. there are a lot of peer-to-peer software available these days in the market for sharing the files. Some of them are bittorrent, limeware, shareaza, kazaa, Imesh, bearshare Lite, eMule, KCeasy, Ares Galaxy, Soulseek, WinMX, Piolet, Gnutella, Overnet, Azureus (vuze), FrostWire, uTorrent, Morpheus, Ants, Acquisition[5]. There are lot more file sharing softwares in the market but these are the top 20 file sharing softwares for peer-to-peer networks. Basically, all the nodes connected together in the network should configure with the same network protocol and the same software should be installed in all the nodes in order to communicate with each other. Else the nodes in the network cannot communicate if they are configured with the different software or protocol. 2.6 ADVANTAGES OF PEER-TO-PEER NETWORKS [6]: It is more useful for the small business network comprising of very small number of computer systems or devices. Computers in this network can be configured easily. Full time network administrator is not required for the p2p networks. Easy maintenance of the network. Only a single operating system and less number of cables needed to get connected Can be installed easily Users can control the shared resources Distributed nature of the network increases the robustness of the network. 2.7 DISADVANTAGES OF THE PEER-TO-PEER NETWORKS [12]: No centralised administration Back-up should be performed on the each computer individually. Peer-to-peer networks are not secure Every computer in the network behaves as server and client which can slow down the performance of the system Legal controversy with the copyrights. 2.8 WORM: Worm is a computer malware program or it can be called as a mischievous code which can multiple itself   into several replicas or it duplicate itself into several copies. Worm in simple can be called as â€Å"autonomous intrusion agent† [19] .It doesn’t actually alters the function of the system but it pass through i.e., worm is unlike virus.   It intrudes the network without the mediation of the user. This is first detected by Robert T Morris in 1988[18]. Today we have some billions of systems connected to internet. Bu during 1988 there were only 60,000 systems connected to the internet. During that period 10% of the internet systems i.e., 6000 of the systems are infected and almost clogged because of the worms [8]. Worms when enters the system it hides in the operating system where it cannot be noticeable [18] . It drastically slows down the system the effect the other programs in the system. In worst cases it could even effect the entire network and slow down the internet across whole world. As it is said earlier that it replicates itself into multiple copies and attach itself to the emails and corrupt them and sometimes deleting the file without the user interaction. If it enters our email, it can able to send itself to all the contacts in our email book and then to all the contacts of the emails of our email book and likewise it propagates, grow and spread at the higher rate. Worms will even create the â€Å"backdoor† into the computer [11]. This will make the attackers to send spam easily. Some famous worms discovered in 2003 and 2004 are â€Å"Mydoom†, â€Å" Sobig† and â€Å"Sasser†[7].   â€Å"Sasser† worm has recently affected the computers which are using Windows 2000 or Windows XP operating system. It restarts the system automatically and crashes it. It is spread to all the nodes in the network. There are some worms which are unlike the normal worms. These worms are very useful to the user some times. Hence, these are called the â€Å"helpful worms† [9]. Sometimes they help users without the interaction with the user. But most of the known worms are harmful and will always tries to infect the nodes in the network and affect the performance of the network. When the peer-to-peer networks are attacked by the worms, it slows down the efficiency of the network. So there is a need to save the networks from entering into the network and spreading itself all over the network. The worms should be detected and defended. If we delay in defending these worms, they replicate itself and makes many copies of itself and spread all through the network. This is very dangerous to the network as it affects the performance and efficiency of the network [10]. CHAPTER 3 RELEVANT WORK DONE BY OTHERS IN ORDER TO SOLVE THE PROBLEM: Many people proposed solutions to this problem. First Zhou L gave solution to p2p worm and he observed that propagation of worm in p2p network is very speed when compared to other networks[13] . Jayanthkumar performed some simulations on worm propagation from infected node to other node[10]. Wei yu researched on the behaviour of worms in p2p networks[14]. In my research I found one more interesting method of detecting the worms in the peer-to-peer network. This is indeed a special method of detecting the worms in network because the authors Yu Yao, Yong Li, Fu-xiang Gao, Ge Yu in their paper titled â€Å"A Signature-behaviour-based P2P worm detection approach† they proposed a mechanism of detecting the known worms in the peer-to-peer networks based on characteristic string matching. Worm make use of vulnerabilities in the network and +Spreads[15]. They also proposed the detection mechanism for the unknown worms based on their behaviour. They technique mainly consists of the te chnology of characteristic string matching, identifying the application and the unknown worm detection technology. They have given the algorithm for the matching the characteristics string of the worm called suffix-tree algorithm- suffix array algorithm. This is efficient and simple with very less time complexity. As peer-to-peer network follows fragment transfer technique there is chance of assigning the characteristics string of the worm to the other blocks of data. And again during the reorganisation process this characteristic string can identify the worm. These authors even validated their results by simulation. They proved that their method is also one of the efficient methods of p2p worm detection. As mentioned above this method detects the known worm and also the unknown worms based on characteristic string matching and their behaviour respectively. In this method they initially capture the network packets using the library function called â€Å"LibPcap†. â€Å"LibPcap† is the library function that captures the network packets in UNIX and Linux platforms. This function contains many functions that will be useful for capturing the network packets. After capturing the data packets with help of these functions the non-P2P packets are filtered out. So now the P2P packets are filtered. In these P2P packets the known worms are detected by using the characteristic string matching. This is implemented by the couple of algorithms. They are the â€Å"suffix array algorithm† and the â€Å"dichotomy algorithm†. These algorithms are very accurate and are capable of detecting the worms in very less time. As I mentioned above peer-to-peer networks follow fragment transfer mechanism. Hence the characteristic string of the worm can be assigned to the other blocks of data. So, in this situation it is difficult to detect the worm if the characteristic string of the worm is based on the single packet. But if the characteristic string is present in the block then there is a chance of detecting the worm because it will assign it to the two packets. At this time the worm characteristic string present in the two different data packets need to restructure. After restructuring, the worm can be detected by using the matching mechanism. In this way the known worm in the network is detected by using the characteristic string matching. The unknown worms in the p2p network can be detected with the help of the act characteristics of the worm at the initial stage of its propagation. This can be called as the behaviour based detection of the unknown p2p worms. Like this all the known and unknown worms in the network are detected. 3.1 P2P KNOWN WORM DETECTION: There are four steps in detecting the p2p known worms. They are: Deal flow Technology of identifying the application Characteristic string matching Reorganising the characteristic string 3.1.1 DEAL FLOW: In this step of deal flow the flow of data is divided into four steps[16]. Step 1: Extracting the p2p data stream from the original data stream. Step 2: check the extracted p2p data stream for worms using characteristic string matching with the worms already existing in the library function. Step 3: data is flow is reorganised. It now contains worm characteristic string as well. Go to step 2. Step 4: check the data flow for unknown worms using unknown worm detection techniques. After performing the four steps update the library function. All the four steps is represented   pictorially as in the next page. Figure 4: flow chart representing four steps to detect worms   yes    normal  Ã‚  Normal no  Ã‚  Ã‚  Ã‚   Abnormal abnormal 3.1.2 TECHNOLOGY OF IDENTIFYING THE APPLICATION: As said earlier, this paper uses the method of capturing the data packets and sca it for the worms which are known with the help of a function library called â€Å"LibPcap†[17] . For this there should be already some assigned rules in the network interface devices. So assigning these rules to those devices is done in stepwise procedure as: Identify the available network interface devices Open the network interface device Compile the rules that we are willing to attach to the devices Setup the rules of filtering to the device Now operate the equipment Start the process of capturing the packets There are some rules for identifying the p2p application. They are: Characteristic information of the known p2p is used Sometimes, if source-destination IP pairs don’t use the known P2P and they may use TCP and UDP at same time, then they are p2p. At a particular time source pairs {srcIP, srcport}[27] and the destination pairs {dstIP, dstport}[27] are checked Here we can identify whether it’s a p2p or not. If the number of connection port is equal to the number of connection IP, then we can say that it is a p2p. There are the situations where these rules have been used unruly. So the there were some amendments made to these rules. The amendments are rule (2) can identify even the mazes which are present and rule (3) is modified in such a way that in the detect cycle {srcIP, srcport}[27] pairs at the source and the {dstIP,   dstport }[27] pairs at the destination are checked. From this they derived that if the number of connection port is equal to the number of connection IP, the protocols which are used are same. If they are different then the protocols are different. 3.1.3 CHARACTERISTIC STRING MATCHING: This is the most important section of the paper. Here authors have given some definitions to the terms which we are going to use, the algorithms which we are going to use to detect the worm. Couple of algorithms are mentioned. They are suffix-array algorithm and the dichotomy algorithm. So the entire process of detecting the worm depends on the efficiency and the accuracy of these algorithms. First of all before using and understanding suffix-array algorithm we will try to understand some keywords and rules. Suffix: suffix is the part of a string or a substring which starts at a particular location to the end of the string. If a suffix in the string S starts at the location ‘i’ to the end of the string S, then the suffix can be represented as Suffix(i)=S[i,Len(S) ][27] . Let us understand how the strings can be compared. The comparison in this paper followed â€Å"dictionary comparison† If u and v are the two different strings. Comparing the strings u and v is same like comparing u[i] and v[i], where ‘i’ starts with the value 1. Ø Here string u is equal to string v i.e., u=v when u[i]=v[i] Ø String u is greater then string v i.e., u>v when u[i]>v[i] Ø String u is less than string v i.e., u But the results were still not obtained for i>len(u) or i>len(v) Also if len(u)>len(v) then u >v, if len(u) Suffix-array: suffix-array is denoted by SA. It is a one-dimensional array. It is an array of SA[1], S[2], SA[3],†¦. And so on. Here s[i] Rank-array: rank-array is nothing but SA-1. If SA[i]=j, then Rank[j]=i. we can say that the rank[i] saves the rank of Suffix(i) in an ascending order for all the suffixes. In this paper the author has taken the example of string â€Å"science† and explained everything clearly. The string â€Å"science† can generate seven suffixes. They are: Suffix(1): science Suffix(2): cience Suffix(3): ience Suffix(4): ence Suffix(5): nce Suffix(6): ce Suffix(7): e When we sort out everything in a dictionary order it will be in the order as follow Suffix(6)= ce Suffix(2)= cience Suffix(7)= e Suffix(4)= ence Suffix(3)= ience Suffix(5)= nce Suffix(1)= science Suffix-array algorithm follows multiplier ideas. Firstly get SA1 and Rank1 by comparing every character in the string. Comparing string is similar to comparing the every character sequentially. So by comparing every character, SA1 and Rank1 can derive SA2 and Rank2. And this SA2 and Rank2 will derive SA4 and Rank4. And this will again derive SA8 and Rank8. So finally suffix-array and rank-array are derived from this process. The main process of the suffix-array algorithm is Ø Calculating SA1 and Rank1. Firstly all the suffixes are arranged in the first letter order and then suffix-array (SA1) is generated by using quick sorry algorithm and then Rank1 is also generated. Ø Comparing 2k-prefix Suffix(i) and Suffix(j) using SAk and Rankk. 2k-Suffix(i) = 2k-Suffixes(j), this is equivalent to Rankk[SAk[i]] = Rankk[SAk[j]] and Rankk[SAk[i+k]] = Rankk[SAk[j+k]] 2k-Suffix(i) Suffix-array algorithm is a sorting algorithm which sorts out the characteristic string. So, this uses binary search algorithm. The algorithm follows Step 1: in the first step values are assigned like left=1, right=n and max_match=0 Step 2: the middle value i.e., mid= (left +right)/2. Step 3: comparing the characters corresponding to Suffix (SA[mid]) and P. the longest public prefix r can be helpful in implantation and comparison. If r > max_match, then max_match=r. Step 4: if Suffix(SA[mid])   If Suffix(SA[mid])>P, then right=mid-1   If Suffix(SA[mid])=P, then go to step 6 Step 5: if left Step 6: if max_match= m, then print â€Å"match is successful†. 3.1.4 REORGANISING THE CHARACTERISTIC STRING: In this step the characteristic string is reorganised. If the character string is divided into two different data blocks, then the data block with the partial characteristic string is stored. Basically, all the information about the data block like index, beginning offset, length of the block and so on are contained at the head of the each block. Here a structure piece is defined which consists of index of the block, beginning offset of the block offset, length of the character array head and the length of the character array end[18]. Initially each and every data packet is compared with the characteristic string for matching. If it is matched then the warning or an alert is sent to all the users about the worm. Here if the tail of the characteristic string of the worm matches with the head of the data block, then it will be stored in the character array end. And if the head of the characteristic string of the worm matches with the tail of the data block then it is stored in the corr esponding character array head. Suppose if the neighbouring data block contains a partial characteristic string of the worm then the neighbour string in the array head as well as in the end will be reorganised. Now this reorganised string will again perform the characteristic string matching and if any worm is detected then again the warning is sent to all users saying that the worm have found. If it is not matched then it won’t perform any operation. If in a case that the characteristic string is present in the block but is divided into two different data packets, then a special term called â€Å"character array† is introduced. First the matching mechanism is performed in both the data packet. If the matching characteristic string is found then the warning is sent to the users that there is a worm present. But if only part of the characteristic string is found then it will be enough if it meets some of the requirements like the head of the data packet should match wit h the tail of the characteristic string or the tail of the data packet should match with the head of the characteristic string. But if these conditions are not satisfied then no operation is performed. Now, if the tail of the data packet contains the partial characteristic string then the data packet is stored in the array. If the length of the characteristic string is m, then the Array[m] is set as ’’. And if the head of the data packet contains a part of the characteristic string then that data packet is stored in the n consecutive units of array. Finally, this array will be the characteristic string matching and if the worm is detected then the warning is sent to all the users. If it is not matched then nothing is done. 3.2 DETECTING UNKNOWN P2P WORM: In the above section we have seen how the known worm is detected. But that algorithm or mechanism are meant to detect the unknown p2p worms. So here in this section we will understand how the unknown worms can be detected and restrain the network. As we know in p2p networks a node can able to send the information to multiple hosts at a same time. Anyhow same protocol is used by all the nodes in the network[27]. These characteristics of the network helps worm to propagate easily. As we discussed above, only the known worms can be detected by using the characteristic string matching method. Here we will see how the unknown worms can be detected. The unknown worms are detected based on the behaviour of the node. Some of the detection rules are: same content files are transferred to multiple hosts in a very short time. Same protocol is used and the destination port is same. If these rules are satisfies by the source port then it allows the p2p worm to propagate. Now, it is necessary to e xtract the characteristics of worm near the worm propagation nodes. When these characteristics are extracted, they are added to the feature library. This data similarity comparison and extracting the characteristics are done using the LCSeq algorithm. But the LCSeq algorithm based on generalized suffix tree (GST) is the more efficient. The overall idea is that all the suffixes are represented as a tree. And this tree will have some characteristics like: Ø Every node in a tree is a string and root is the empty string Ø Every suffix can be represented as a path from the root. Ø Every substring can be considered as a prefix of a suffix. Ø To achieve the searching public sub sequence, every node should be set the information of its subordinate source string. 3.3 EXPERIMENT: We know that the worm body tries to infect the other nodes in the network by sending the worm to the specific ports of p2p node. So here the author tried to prove the efficiency of his method by performing an experiment. In this experiment he prepared a multiple group worm body and sent it repeatedly at regular intervals of time. Then he captured these packets and extracted their characteristics and compared it with the one that already exist in the feature library. P2p worm is detected separately using different algorithms like BF algorithm, KMP algorithm and suffix-array algorithm and compared their results doing three experiments. In the experiment 1, worm characteristics are in the same packet.. in the experiment Security Issues in Peer-to-peer Networking Security Issues in Peer-to-peer Networking ACKNOWLEDGEMENTS: The interest in the field of networking, driven me to take the computer networking as my course in M.Sc. there are many different types of networks. Out of them the more popularized and upcoming trend of networks are peer-to-peer networks. This report of my final dissertation for the partial fulfilment of my M.Sc, computer networking, would not have been possible without the support of my supervisor, Mr. Harry Benetatos. He helped me a lot by guiding me and pin-pointing the key mistakes which I have done during my research. My course leader Mr. Nicholas Ioannides also helped me a lot to complete this dissertation. His advises and suggestions gave me a lot of encouragement and support which made me do this research and finish it in time. I am very thankful to my university, LONDON METROPOLITAN UNIVERSITY which provided me the free access to the IEEE library which helped me to find the key papers which are very useful for my research. I also thank my parents for their support given to me in all walks of my life. DEDICATION: I dedicate this report to my parents and my well wisher Sakshi for their constant support and encouragement throughout my education and life. CHAPTER 1 PROJECT INTRODUCTION 1.1 INTRODUCTION TO THE PROJECT: This dissertation is all about the security issues in the peer-to-peer networks. There are many security issues in peer-to-peer networks. I have chosen to do research on worm intrusions in peer-to-peer networks. In this document I have mentioned how the worm propagates in the network from one peer to another peer, how the worm can be detected and how the detected worm can be attacked and save the network from getting infected. 1.2 AIM: Security issue in Peer-to-peer networks: Securing the peer-to-peer network from worms.   1.3 OBJECTIVES: Ø To understand how the peers communicate with each other in the peer-to-peer network Ø To analyse the propagation of worms in the network. Ø To detect the worms near the nodes of the network Ø To defence the worms in the network. 1.4 RESEARCH QUESTION: This document briefly discusses about how the worms propagates in the network and how can it be detected and attacked in order to save the peer-to-peer network 1.5 APPROACH: My approach for this dissertation is as follows: Ø Understanding peer-to-peer networks Ø Defining the problem Ø Data collection and analysis Ø Study and understanding the existing solutions for the problem Ø Comparing different solutions Ø conclusion 1.6 METHODOLOGY: This section of my document contains what important steps to be followed in order to achieve the mentioned objectives. It also helps to schedule how to develop and complete different parts of the dissertation. In this dissertation firstly I will study and understand about the peer-to-peer networks and how the peers in the networks communicate and share information with the remaining peer in the network. Then I do research on how the worm propagates in the network, how can the worm be detected and how the detected worm can be attacked and restore the network.   In the pictorial form the different stages of my dissertation are 1.7 PREVIEW ABOUT THE COMING CHAPTERS IN THE REPORT: The rest of the report is organised as follows: in the chapter 2, there is brief discussion about the peer-to-peer networks, different types of peer-to-peer networks, advantages and disadvantages of the peer-to-peer networks. There is also some information about the worms, its nature and different types of worms. In chapter 3, there is a discussion about the methods given by the different person to detect the worm in the network by the method of matching the characteristic string of the worm. In section 4, there is a solution for this issue. That is mathematical method of detecting the worm in the network and defending it. Chapter 5 consists of a critical appraisal and suggestions for the further work. Finally, I concluded in chapter 6. CHAPTER 2 OVERVIEW OF THE GENERIC AREA AND IDENTIFICATION OF PROBLEM: 2.1 NETWORK: Network is a group of electronic devices which are connected to each other in order to communicate which each other.   The devices can be computers, laptops, printers etc. networks can be wired or wireless. Wired networks are networks in which the devices are connected with the help of wires. Wireless networks are the networks in which the devices are connected without the wires. There are many different types of networks and peer-to-peer is one of the important and special types of networks. 2.2 PEER-TO-PEER NETWORKS: Peer-to-peer networks are emerged in 1990 because of the development of the peer-to-peer file sharing like Napster [1].   Peer-to-peer networks abbreviated as p2p networks are the networks in which all the nodes or peers in the network acts as servers as well as clients on demand. This is unlike typical client server model, in which the clients requests the services and server supplies the resources. But in case of peer-to-peer networks every node in the networks requests services like a client and every node will supply the resources like server on demand. Peer-to-peer network doesn’t need any centralized server coordination.   Peer-to-peer network is scalable. Addition of new nodes to the network or removal of already existing nodes on the network doesn’t affect the network. That means addition or removal of nodes can be done dynamically. All the nodes connected in a peer-to-peer network run on the same network protocol and software. Resources available on a node in the network are available to the remaining nodes of the network and they can access this information easily. Peer-to-peer networks provide robustness and scalability. All the wired and wireless networks can be configured as peer-to-peer networks. Home networks and small enterprise networks are preferable to configure in a peer-to-peer networks. Most the networks are not pure peer-to-peer networks because of they use some network interface devices. In the beginning, the information is stored at all the nodes by making a copy of it. But this increases the flow of traffic in the network. But now, a centralised system is maintained by the network and the requests are directed to the nodes which contains the relevant information. This will save the time and the traffic flow in the network. 2.3 WIRELESS NETWORKS: Devices connected to each other without any wires can also be configured like peer-to-peer networks. In a case of small of number of devices it is preferable to configure the network in wireless peer-to-peer networks because it will be easy to share the data in both the directions. It is even cheaper to connect the networks in wireless peer-to-peer because we do not need to spend on the wires. Peer-to-peer networks are divided into three types. They are: Instant messaging networks Collaborative networks Affinity community networks[2] Instant messaging networks: In this type of peer-to-peer networks, the users can chat with each other in real time by installing some software such as MSN messenger, AOL instant messenger etc. Collaborative networks: This type of peer-to-peer networks are also called as distributed computing.   This is widely used in the field of science and biotechnology where the intense computer processing is needed. Affinity community peer-to-peer networks: It is a type of p2p network, where the group of devices are connected only for the purpose of sharing the data among them. Peer to peer networks are basically classified into two types. They are: Ø Structured peer-to-peer networks Ø Unstructured peer-to-peer networks 2.4 STRUCTURED PEER-TO-PEER NETWORKS: In the structured peer-to-peer nodes connected in the network are fixed. They use distributed hashing table (DHT) for indexing [4]. In DHT data is stored in the form of hash table like (key, value). Any node willing to retrieve the data can easily do that using the keys. The mapping of values to the keys are maintained by all the nodes present in the network such that there will be very less disruption in case of change in the set of participants DHT-based networks are very efficient in retrieving the resources. 2.5 UNSTRUCTURED PEER-TO-PEER NETWORKS: In unstructured p2p network nodes are established arbitrarily. There are three types of unstructured p2p networks. They are Pure peer-to-peer Hybrid peer-to-peer Centralized peer-to-peer In Pure p2p networks all the nodes in the network are equal. There won’t be any preferred node with special infrastructure function. In hybrid p2p networks there will be a special node called â€Å"supernodes† [3] . This supernode can be any node in the network depending on the momentary need of the network. Centralized p2p network is a type of hybrid network in which there will be one central system which manages the network. The network cannot be able to work without this centralized system Basically, all the nodes in the peer-to-peer networks contain the information of the neighbour in its routing table. The rate of propagation of worms in the peer-to-peer networks is larger than compared to the other networks. This is because the information of the neighbour peers can easily achieved from the routing table of the infected node. Different types of files are shared between the nodes in the peer-to-peer networks. These files can be the audio files, video files, music files, text documents, books; articles etc. there are a lot of peer-to-peer software available these days in the market for sharing the files. Some of them are bittorrent, limeware, shareaza, kazaa, Imesh, bearshare Lite, eMule, KCeasy, Ares Galaxy, Soulseek, WinMX, Piolet, Gnutella, Overnet, Azureus (vuze), FrostWire, uTorrent, Morpheus, Ants, Acquisition[5]. There are lot more file sharing softwares in the market but these are the top 20 file sharing softwares for peer-to-peer networks. Basically, all the nodes connected together in the network should configure with the same network protocol and the same software should be installed in all the nodes in order to communicate with each other. Else the nodes in the network cannot communicate if they are configured with the different software or protocol. 2.6 ADVANTAGES OF PEER-TO-PEER NETWORKS [6]: It is more useful for the small business network comprising of very small number of computer systems or devices. Computers in this network can be configured easily. Full time network administrator is not required for the p2p networks. Easy maintenance of the network. Only a single operating system and less number of cables needed to get connected Can be installed easily Users can control the shared resources Distributed nature of the network increases the robustness of the network. 2.7 DISADVANTAGES OF THE PEER-TO-PEER NETWORKS [12]: No centralised administration Back-up should be performed on the each computer individually. Peer-to-peer networks are not secure Every computer in the network behaves as server and client which can slow down the performance of the system Legal controversy with the copyrights. 2.8 WORM: Worm is a computer malware program or it can be called as a mischievous code which can multiple itself   into several replicas or it duplicate itself into several copies. Worm in simple can be called as â€Å"autonomous intrusion agent† [19] .It doesn’t actually alters the function of the system but it pass through i.e., worm is unlike virus.   It intrudes the network without the mediation of the user. This is first detected by Robert T Morris in 1988[18]. Today we have some billions of systems connected to internet. Bu during 1988 there were only 60,000 systems connected to the internet. During that period 10% of the internet systems i.e., 6000 of the systems are infected and almost clogged because of the worms [8]. Worms when enters the system it hides in the operating system where it cannot be noticeable [18] . It drastically slows down the system the effect the other programs in the system. In worst cases it could even effect the entire network and slow down the internet across whole world. As it is said earlier that it replicates itself into multiple copies and attach itself to the emails and corrupt them and sometimes deleting the file without the user interaction. If it enters our email, it can able to send itself to all the contacts in our email book and then to all the contacts of the emails of our email book and likewise it propagates, grow and spread at the higher rate. Worms will even create the â€Å"backdoor† into the computer [11]. This will make the attackers to send spam easily. Some famous worms discovered in 2003 and 2004 are â€Å"Mydoom†, â€Å" Sobig† and â€Å"Sasser†[7].   â€Å"Sasser† worm has recently affected the computers which are using Windows 2000 or Windows XP operating system. It restarts the system automatically and crashes it. It is spread to all the nodes in the network. There are some worms which are unlike the normal worms. These worms are very useful to the user some times. Hence, these are called the â€Å"helpful worms† [9]. Sometimes they help users without the interaction with the user. But most of the known worms are harmful and will always tries to infect the nodes in the network and affect the performance of the network. When the peer-to-peer networks are attacked by the worms, it slows down the efficiency of the network. So there is a need to save the networks from entering into the network and spreading itself all over the network. The worms should be detected and defended. If we delay in defending these worms, they replicate itself and makes many copies of itself and spread all through the network. This is very dangerous to the network as it affects the performance and efficiency of the network [10]. CHAPTER 3 RELEVANT WORK DONE BY OTHERS IN ORDER TO SOLVE THE PROBLEM: Many people proposed solutions to this problem. First Zhou L gave solution to p2p worm and he observed that propagation of worm in p2p network is very speed when compared to other networks[13] . Jayanthkumar performed some simulations on worm propagation from infected node to other node[10]. Wei yu researched on the behaviour of worms in p2p networks[14]. In my research I found one more interesting method of detecting the worms in the peer-to-peer network. This is indeed a special method of detecting the worms in network because the authors Yu Yao, Yong Li, Fu-xiang Gao, Ge Yu in their paper titled â€Å"A Signature-behaviour-based P2P worm detection approach† they proposed a mechanism of detecting the known worms in the peer-to-peer networks based on characteristic string matching. Worm make use of vulnerabilities in the network and +Spreads[15]. They also proposed the detection mechanism for the unknown worms based on their behaviour. They technique mainly consists of the te chnology of characteristic string matching, identifying the application and the unknown worm detection technology. They have given the algorithm for the matching the characteristics string of the worm called suffix-tree algorithm- suffix array algorithm. This is efficient and simple with very less time complexity. As peer-to-peer network follows fragment transfer technique there is chance of assigning the characteristics string of the worm to the other blocks of data. And again during the reorganisation process this characteristic string can identify the worm. These authors even validated their results by simulation. They proved that their method is also one of the efficient methods of p2p worm detection. As mentioned above this method detects the known worm and also the unknown worms based on characteristic string matching and their behaviour respectively. In this method they initially capture the network packets using the library function called â€Å"LibPcap†. â€Å"LibPcap† is the library function that captures the network packets in UNIX and Linux platforms. This function contains many functions that will be useful for capturing the network packets. After capturing the data packets with help of these functions the non-P2P packets are filtered out. So now the P2P packets are filtered. In these P2P packets the known worms are detected by using the characteristic string matching. This is implemented by the couple of algorithms. They are the â€Å"suffix array algorithm† and the â€Å"dichotomy algorithm†. These algorithms are very accurate and are capable of detecting the worms in very less time. As I mentioned above peer-to-peer networks follow fragment transfer mechanism. Hence the characteristic string of the worm can be assigned to the other blocks of data. So, in this situation it is difficult to detect the worm if the characteristic string of the worm is based on the single packet. But if the characteristic string is present in the block then there is a chance of detecting the worm because it will assign it to the two packets. At this time the worm characteristic string present in the two different data packets need to restructure. After restructuring, the worm can be detected by using the matching mechanism. In this way the known worm in the network is detected by using the characteristic string matching. The unknown worms in the p2p network can be detected with the help of the act characteristics of the worm at the initial stage of its propagation. This can be called as the behaviour based detection of the unknown p2p worms. Like this all the known and unknown worms in the network are detected. 3.1 P2P KNOWN WORM DETECTION: There are four steps in detecting the p2p known worms. They are: Deal flow Technology of identifying the application Characteristic string matching Reorganising the characteristic string 3.1.1 DEAL FLOW: In this step of deal flow the flow of data is divided into four steps[16]. Step 1: Extracting the p2p data stream from the original data stream. Step 2: check the extracted p2p data stream for worms using characteristic string matching with the worms already existing in the library function. Step 3: data is flow is reorganised. It now contains worm characteristic string as well. Go to step 2. Step 4: check the data flow for unknown worms using unknown worm detection techniques. After performing the four steps update the library function. All the four steps is represented   pictorially as in the next page. Figure 4: flow chart representing four steps to detect worms   yes    normal  Ã‚  Normal no  Ã‚  Ã‚  Ã‚   Abnormal abnormal 3.1.2 TECHNOLOGY OF IDENTIFYING THE APPLICATION: As said earlier, this paper uses the method of capturing the data packets and sca it for the worms which are known with the help of a function library called â€Å"LibPcap†[17] . For this there should be already some assigned rules in the network interface devices. So assigning these rules to those devices is done in stepwise procedure as: Identify the available network interface devices Open the network interface device Compile the rules that we are willing to attach to the devices Setup the rules of filtering to the device Now operate the equipment Start the process of capturing the packets There are some rules for identifying the p2p application. They are: Characteristic information of the known p2p is used Sometimes, if source-destination IP pairs don’t use the known P2P and they may use TCP and UDP at same time, then they are p2p. At a particular time source pairs {srcIP, srcport}[27] and the destination pairs {dstIP, dstport}[27] are checked Here we can identify whether it’s a p2p or not. If the number of connection port is equal to the number of connection IP, then we can say that it is a p2p. There are the situations where these rules have been used unruly. So the there were some amendments made to these rules. The amendments are rule (2) can identify even the mazes which are present and rule (3) is modified in such a way that in the detect cycle {srcIP, srcport}[27] pairs at the source and the {dstIP,   dstport }[27] pairs at the destination are checked. From this they derived that if the number of connection port is equal to the number of connection IP, the protocols which are used are same. If they are different then the protocols are different. 3.1.3 CHARACTERISTIC STRING MATCHING: This is the most important section of the paper. Here authors have given some definitions to the terms which we are going to use, the algorithms which we are going to use to detect the worm. Couple of algorithms are mentioned. They are suffix-array algorithm and the dichotomy algorithm. So the entire process of detecting the worm depends on the efficiency and the accuracy of these algorithms. First of all before using and understanding suffix-array algorithm we will try to understand some keywords and rules. Suffix: suffix is the part of a string or a substring which starts at a particular location to the end of the string. If a suffix in the string S starts at the location ‘i’ to the end of the string S, then the suffix can be represented as Suffix(i)=S[i,Len(S) ][27] . Let us understand how the strings can be compared. The comparison in this paper followed â€Å"dictionary comparison† If u and v are the two different strings. Comparing the strings u and v is same like comparing u[i] and v[i], where ‘i’ starts with the value 1. Ø Here string u is equal to string v i.e., u=v when u[i]=v[i] Ø String u is greater then string v i.e., u>v when u[i]>v[i] Ø String u is less than string v i.e., u But the results were still not obtained for i>len(u) or i>len(v) Also if len(u)>len(v) then u >v, if len(u) Suffix-array: suffix-array is denoted by SA. It is a one-dimensional array. It is an array of SA[1], S[2], SA[3],†¦. And so on. Here s[i] Rank-array: rank-array is nothing but SA-1. If SA[i]=j, then Rank[j]=i. we can say that the rank[i] saves the rank of Suffix(i) in an ascending order for all the suffixes. In this paper the author has taken the example of string â€Å"science† and explained everything clearly. The string â€Å"science† can generate seven suffixes. They are: Suffix(1): science Suffix(2): cience Suffix(3): ience Suffix(4): ence Suffix(5): nce Suffix(6): ce Suffix(7): e When we sort out everything in a dictionary order it will be in the order as follow Suffix(6)= ce Suffix(2)= cience Suffix(7)= e Suffix(4)= ence Suffix(3)= ience Suffix(5)= nce Suffix(1)= science Suffix-array algorithm follows multiplier ideas. Firstly get SA1 and Rank1 by comparing every character in the string. Comparing string is similar to comparing the every character sequentially. So by comparing every character, SA1 and Rank1 can derive SA2 and Rank2. And this SA2 and Rank2 will derive SA4 and Rank4. And this will again derive SA8 and Rank8. So finally suffix-array and rank-array are derived from this process. The main process of the suffix-array algorithm is Ø Calculating SA1 and Rank1. Firstly all the suffixes are arranged in the first letter order and then suffix-array (SA1) is generated by using quick sorry algorithm and then Rank1 is also generated. Ø Comparing 2k-prefix Suffix(i) and Suffix(j) using SAk and Rankk. 2k-Suffix(i) = 2k-Suffixes(j), this is equivalent to Rankk[SAk[i]] = Rankk[SAk[j]] and Rankk[SAk[i+k]] = Rankk[SAk[j+k]] 2k-Suffix(i) Suffix-array algorithm is a sorting algorithm which sorts out the characteristic string. So, this uses binary search algorithm. The algorithm follows Step 1: in the first step values are assigned like left=1, right=n and max_match=0 Step 2: the middle value i.e., mid= (left +right)/2. Step 3: comparing the characters corresponding to Suffix (SA[mid]) and P. the longest public prefix r can be helpful in implantation and comparison. If r > max_match, then max_match=r. Step 4: if Suffix(SA[mid])   If Suffix(SA[mid])>P, then right=mid-1   If Suffix(SA[mid])=P, then go to step 6 Step 5: if left Step 6: if max_match= m, then print â€Å"match is successful†. 3.1.4 REORGANISING THE CHARACTERISTIC STRING: In this step the characteristic string is reorganised. If the character string is divided into two different data blocks, then the data block with the partial characteristic string is stored. Basically, all the information about the data block like index, beginning offset, length of the block and so on are contained at the head of the each block. Here a structure piece is defined which consists of index of the block, beginning offset of the block offset, length of the character array head and the length of the character array end[18]. Initially each and every data packet is compared with the characteristic string for matching. If it is matched then the warning or an alert is sent to all the users about the worm. Here if the tail of the characteristic string of the worm matches with the head of the data block, then it will be stored in the character array end. And if the head of the characteristic string of the worm matches with the tail of the data block then it is stored in the corr esponding character array head. Suppose if the neighbouring data block contains a partial characteristic string of the worm then the neighbour string in the array head as well as in the end will be reorganised. Now this reorganised string will again perform the characteristic string matching and if any worm is detected then again the warning is sent to all users saying that the worm have found. If it is not matched then it won’t perform any operation. If in a case that the characteristic string is present in the block but is divided into two different data packets, then a special term called â€Å"character array† is introduced. First the matching mechanism is performed in both the data packet. If the matching characteristic string is found then the warning is sent to the users that there is a worm present. But if only part of the characteristic string is found then it will be enough if it meets some of the requirements like the head of the data packet should match wit h the tail of the characteristic string or the tail of the data packet should match with the head of the characteristic string. But if these conditions are not satisfied then no operation is performed. Now, if the tail of the data packet contains the partial characteristic string then the data packet is stored in the array. If the length of the characteristic string is m, then the Array[m] is set as ’’. And if the head of the data packet contains a part of the characteristic string then that data packet is stored in the n consecutive units of array. Finally, this array will be the characteristic string matching and if the worm is detected then the warning is sent to all the users. If it is not matched then nothing is done. 3.2 DETECTING UNKNOWN P2P WORM: In the above section we have seen how the known worm is detected. But that algorithm or mechanism are meant to detect the unknown p2p worms. So here in this section we will understand how the unknown worms can be detected and restrain the network. As we know in p2p networks a node can able to send the information to multiple hosts at a same time. Anyhow same protocol is used by all the nodes in the network[27]. These characteristics of the network helps worm to propagate easily. As we discussed above, only the known worms can be detected by using the characteristic string matching method. Here we will see how the unknown worms can be detected. The unknown worms are detected based on the behaviour of the node. Some of the detection rules are: same content files are transferred to multiple hosts in a very short time. Same protocol is used and the destination port is same. If these rules are satisfies by the source port then it allows the p2p worm to propagate. Now, it is necessary to e xtract the characteristics of worm near the worm propagation nodes. When these characteristics are extracted, they are added to the feature library. This data similarity comparison and extracting the characteristics are done using the LCSeq algorithm. But the LCSeq algorithm based on generalized suffix tree (GST) is the more efficient. The overall idea is that all the suffixes are represented as a tree. And this tree will have some characteristics like: Ø Every node in a tree is a string and root is the empty string Ø Every suffix can be represented as a path from the root. Ø Every substring can be considered as a prefix of a suffix. Ø To achieve the searching public sub sequence, every node should be set the information of its subordinate source string. 3.3 EXPERIMENT: We know that the worm body tries to infect the other nodes in the network by sending the worm to the specific ports of p2p node. So here the author tried to prove the efficiency of his method by performing an experiment. In this experiment he prepared a multiple group worm body and sent it repeatedly at regular intervals of time. Then he captured these packets and extracted their characteristics and compared it with the one that already exist in the feature library. P2p worm is detected separately using different algorithms like BF algorithm, KMP algorithm and suffix-array algorithm and compared their results doing three experiments. In the experiment 1, worm characteristics are in the same packet.. in the experiment