Tuesday, August 25, 2020

Preparing and Writing Essay

A fundamental key to delivering great papers is to begin early and work consistently over an all-encompassing period. Work in an ideal opportunity for interruptions and issues (for example ailment or plate disappointment), and take into consideration cutoff time batching. Plan to finish a long time before the cutoff time to permit yourself some space. As a harsh guide, you may permit three weeks for deal with a course article. The cutoff time is proposed to assist you with time the board †ensure you hold fast to it. Ponder the criticism acquired on your past expositions. What qualities and shortcomings were distinguished? Consider how best to beat the shortcomings. For instance, if your articles have been reprimanded for constrained information on the writing or absence of profundity, this may show that you have to commit more planning time and increment or change the expansiveness and profundity of your perusing; whenever condemned for poor structure or restricted importance, you are probably going to profit by investing more energy in cautious arranging and altering/redesigning the last draft. Utilizing course articles to deal with your shortcomings can assist you with delivering a superior paper just as help to improve your general composing aptitudes. Look more:â how to compose a procedure paper Do some fundamental perusing to assist you with picking an article point. The perusing records for the papers give direction on wellsprings of starter perusing. For the most part it is helpful to pick perusing that is moderately later, this is probably going to incorporate a rundown of prior work, some of which you may investigate in more detail later. It can likewise be useful at a beginning time to utilize EconLit and the Library index to mind the accessibility and nature of valuable perusing on a theme. As ought to be self-evident, you should attempt to pick a subject that you find intriguing. This will help propel you to deal with the paper and is additionally liable to make the finished result all the more fascinating for the peruser/marker. Note that intrigue will in general increment as you take a shot at a theme, giving you don’t leave everything to the latest possible time. When you have picked a point (or even to assist you with browsing a short-rundown of subjects), utilize your underlying perusing to deliver a draft diagram plan of your exposition. The general guidance on what makes a decent article, set out beneath, should assist you with producing a powerful arrangement. An essential arrangement would commonly separate the article/thesis into a progression of consistently requested segments. This skeleton structure would then be able to be rounded out by fitting thoughts, significant references, work and data required, into the arranged areas (utilizing references from fundamental perusing, EconLit and so on.) Setting aside some effort to build a successful explained layout plan should push you to: †¢ Produce an all around organized and rational paper. †¢ Organize the resulting take a shot at your article/paper and plan your examination time all the more viably. †¢ Read effectively and all the more viably †making you consider how further adding fits to your arrangement and, potentially, adjusting your arrangement in light of new data or thoughts. In spite of the fact that the elements of a decent exposition can differ among courses and points, the accompanying expansive rules are commonly pertinent. Structure: †¢ Ensure that your article/exposition has a reasonable consistent structure. †¢ Use the prologue to spur the subject, set it in context and blueprint the structure of the body of your exposition to enable the peruser to follow the contention. †¢ Use the determinations to make together the contention, give a general evaluation and, conceivably, demonstrate regions that may be grown further if space permitted. General substance: †¢ The essential spotlight ought to be on investigation, not depiction or introduction of data. †¢ Make it clear that you have a decent comprehension of the significant essential writing. In any case, abstain from committing a lot of room to rehashing standard course reading material. For the most part you can clarify that you comprehend the nuts and bolts with regards to introducing a further developed or more profound examination. †¢ Be inventive †think about an intriguing and diverse edge on the theme; draw on thoughts from different courses (counting non-financial matters courses) or general perusing; go past the standard writing by utilizing EconLit or other reference sources; be set up to challenge standard methodologies. This is probably going to make the article all the more intriguing for you and the peruser/marker. †¢ Remember it is your article, it ought to mirror your educated idea and decisions on the theme, not just repeat or reword the perspect ives on others. Examination and models: †¢ The proper method of examination can change among courses and themes. In by far most of cases financial aspects papers will include the utilization of an express model or models. Formal models help to give an unmistakable coherent structure, which is a significant explanation behind their utilization in financial aspects. †¢ When introducing a model, you have to clarify that you comprehend the model. This includes more than basically duplicating a lot of conditions from an article or book. To flag your understanding you may for instance: give an instinctive clarification of the general model or key strides in fathoming the model; turn out to be a few stages in a model’s arrangement unequivocally, when (as is regularly the situation) this isn't done expressly in the first source; create and work through a variety of the model not grew expressly in the perusing; look into the model with other related models; survey the suspicions utilized and the impediments they present; apply the model reasonably to a specific circumstance. Introduction and style: †¢ Grammar and spelling matter. Leave a lot of time for altering the last draft to improve sentence structure. Utilize a spellchecker, yet recollect that spell checkers don't get all mix-ups. Erroneous spelling of names and language can be especially aggravating. †¢ Be exact and brief. Succinctness permits you to incorporate more inside as far as possible. †¢ Think about how to introduce information or data successfully. Tables or figures can be helpful presentational apparatuses. †¢ References ought to be introduced precisely and reliably. See the arrangements of primer readings for a recommended standard style. References and copyright infringement: †¢ Quotations ought to be utilized prudently, if by any stretch of the imagination, to help or show a contention. The wellspring of any citation ought to be obviously expressed, including the page reference. †¢ Data sources ought to be obviously refered to. †¢ When summing up or portraying someone’s work the source or sources ought to be plainly expressed. †¢ The University of Edinburgh’s Undergraduate Assessment Regulations state: â€Å"Plagiarism is the demonstration of replicating or remembering for one’s own work, without sufficient affirmation, deliberately or unexpectedly, crafted by another. It is scholastically deceitful and an offense against University discipline.† (http://www.docs.sasg.ed.ac.uk/AcademicServices/Regulations/UG_AssessmentRegulations.PDF, para. 14.2) †¢ The University of Edinburgh’s Guidance on the Avoidance of Plagiarism for Undergraduate and Taught Postgraduate Students states: â€Å"Plagiarism is the demonstration of remembering for one’s own work crafted by someone else, without satisfactory affirmation of having done as such, either purposely or unintentionally.† (http://www.docs.sasg.ed.ac.uk/AcademicServices/Discipline/StudentGuidanceUGPGT.pd f ) †¢ The Undergraduate Assessment Regulations include â€Å"The honest abuse or reference of material without formal and legitimate affirmation can comprise counterfeiting, in any event, when there is no purposeful aim to swindle. Work might be copied on the off chance that it comprises of close summarizing or unacknowledged rundown of a source, just as in exactly the same words interpretation. Any disappointment sufficiently to recognize or appropriately reference different sources in submitted work could prompt lower marks and to disciplinary activity being taken.† (http://www.docs.sasg.ed.ac.uk/AcademicServices/Regulations/UG_AssessmentRegulations.PDF , para. 14.2) †¢ The three going before visual cues maintain a strategic distance from copyright infringement, by appropriately recognizing sources (yet would not, all alone, comprise a decent article or exposition). Most examination abilities books contain further exhortation on article composing. The Main Library Reading Room has a broad assortment of study aptitudes books, which contain exhortation on paper composing. A few books are given explicitly to composing abilities, for instance:

Saturday, August 22, 2020

Lyrical Ballads and Hamlet Essay Example | Topics and Well Written Essays - 1000 words

Expressive Ballads and Hamlet - Essay Example he validity of the activities taken by Gertrude as a female character, it is as yet obvious that Shakespeare attempts to make an acknowledgment of this character as a person (Stephen 1). Hence, this paper endeavors to investigate the degree which self-hood can be accomplished using female characters as delineated by Shakespeare in Hamlet and The Female Vagrant by Wordsworth. The acknowledgment of the human instinct in Gertrude is seen when she drinks the harmed wine that was set up by Claudius, her significant other, for Hamlet. Taking a gander at this episode fundamentally, it is apparent in Act 3 that Gertrude begun to act normally again and felt the blame behind all the indecencies she was doing. For example, it is conceivable that Gertrude engaged in extramarital relations with Claudius even while she was as yet hitched to King Hamlet and most likely this is the reason the marriage among her and Claudius turned out to be so quick after the King’s demise. In addition, it might even now be conceivable that Gertrude took part effectively in mystery towards the homicide of her better half since from the play; she doesn't appear to consider the cases of her child that his uncle killed his dad, the King of Denmark (Stephen 3). A portion of the activities of Gertrude appear to be controlled by her desire and aspiration to hold her station in the royal residence and her status as the Queen of Denmark (Stephen 4). These are substantial human aspirations, and each other human will undoubtedly be loaded up with the longing to keep up an imperial status. It is in this manner not astonishing that Gertrude would do everything to make sure that she holds her status as the Queen of Denmark. What makes this desire all wrong is heading off to the outrageous; being prepared even to see her better incredible beginning engaging in sexual relations with another man even in a little while after her spouses passing makes a great deal of doubts (Stephen 4). Be that as it may, notwithstanding all the terrible things that Claudius did, she at last conceded that she wasn't right, despite the fact that she didn't utilize communicated in language to lament her deeds, however her activities

Monday, August 10, 2020

Are Some Racial Groups More Likely to Develop PTSD

Are Some Racial Groups More Likely to Develop PTSD Researchers have been very interested in answering the question of whether or not there are ethnic and racial differences in the development of post-traumatic stress disorder (PTSD). To answer some of these questions, a group of researchers interviewed more than 5,000 people from different racial groups across the United States. They wanted to learn more about the co-occurrence of different mental disorders, as well as whether or not people are equally likely to have a certain disorder, such as PTSD, depending on their age, sex, marital status, or race or ethnicity. Race/Ethnicity Differences in PTSD A persons race or ethnicity was not found to influence whether or not he had PTSD at some point in his life. However, other differences were found. African Americans, Asian Americans, and Native Americans tended to report having experienced fewer traumatic events as compared to European Americans and Latinos. Despite this, African Americans, Asian Americans and Native Americans were all more likely to develop PTSD after experiencing a traumatic event as compared to European Americans and Latinos. Ones Race Does Not Lead to PTSD Overall, a person is not more likely to develop PTSD just because of her racial or ethnic background. However, it seems as though that being from a minority group (with the exception of Latinos) is connected with increased likelihood (or risk) for having PTSD after experiencing a traumatic event. Although some other researchers have found that people from minority groups are more likely to develop PTSD after a traumatic event, this does not seem to be solely about a persons racial or ethnic identification. Instead, people from some minority groups may be more likely to have other characteristics (or risk factors) that increase the likelihood that they will develop PTSD after a traumatic experience. These risk factors may include less access to mental health care or the experience of more severe traumas when they do experience a traumatic event. A Combination of Race and Risk Factors Increases PTSD Vulnerability A persons racial or ethnic background seems to influence the development of PTSD only to the extent that other risk factors are present. Simply being black, Asian or from a certain racial or ethnic background appears not to increase the likelihood that a person will develop PTSD. It is important for people to be aware of which factors increase the likelihood that PTSD will develop. In doing so, steps can be taken to reduce the likelihood of PTSD after experiencing a traumatic event. Seeking social support or psychological treatment after a traumatic event may help to counteract these risk factors. Pursuing mental health care is still taboo in and outside of communities of color, but obtaining counseling or psychiatric services may lower ones risk of developing PTSD and other mental health problems. If you dont know where to get help, speak with a physician, a clergy member or search online to find the resources available in your community. Needing mental health services is no reason to feel ashamed. Its an important form of self-care.

Saturday, May 23, 2020

American Independence Essay - 678 Words

The British colonies of north America declared their independence primarily for political reasons to what extent do you agree with this statement? The original 13 colonies of the United States of America were in desperation of independence and the advantages of leading a long, successful, happy life. In colonial times words like ?tyranny,? ?enslavement,? ?entrapment? and ?slavery? were part of the cultural norm. These words were common place and often used to describe the British control over the colonies. Thomas Jefferson, the writer or the Declaration of Independence, stated 27 gripes which were a direct result of years of frustration, abuse, and neglect from Britain. The Declaration of Independence was an inevitable rebellion†¦show more content†¦This is stated in the first gripe of the Declaration of Independence which says ?He has refused his Assent to Laws, the most wholesome and necessary for the public good.? This is a political reason, it was addressed to King George directly with the government as it points out one of the many flaws. Parliamentary taxation was another one of the main sources of the colonists anger. With the Sugar Act of 1764, they were forced to pay one-third of Britain?s French and Indian War costs. The Stamp Act was excessive for the colonists as well, but was met with much more hostility. They rebelled against these taxes because they were being taxed without representation in England, they felt the British had no right to tax their colonies when they themselves had no say in how they were ruled. ?For imposing taxes on us without our consent,? was another political whine that Thomas Jefferson inscribed in the Declaration of Independence. Thomas Jefferson had purpose in saying this, because political problems had most effect in the deciding factors of breaking away from Britain. Civil is a term used entirely with politics and political reasons. The civil liberties of the colonists were another freedom which was restricted. The colonists were discouraged from buying foreign products and had limited production as a result of mercantilism. In the hated ?Admiralty Courts?, colonists were shipped back to England to be tried in aShow MoreRelatedThe American War of Independence665 Words   |  3 PagesThe American Revolutionary War, also known as the War of Independence, began on April 19th, 1775 with the Battle of Lexington and Concord. The American Revolution was a war between the thirteen colonies and Great Britian. The colonies wanted to gain independence from Great Britian. It was also a rebellion against the monarchy, which lead to the establishment of the republic [CROSS]. The outcome of the war was a victory for the thirteen colonies. The colonist gained independence and British recognitionRead MoreThe American Revolution And American War Of Independence1379 Words   |  6 PagesThe American Revolution or the American War of Independence was one of the most remarkable wars in the history of the world. The motives behind the war can be interestingly explained by Zinn from the chapter Tyranny Is Tyranny in A People’s History of The United States: 1â€Å"Around 1776, certain important people in the English colonies made a discovery that would prove enormously useful for the next two hundred years. 2They found that by creating a nation, a symbol, a legal unity called the United StatesRead MoreThe War Of American Independence1780 Words   |  8 Pages The New American Government The War of 1812 should be referred to as â€Å"Second War of American Independence†. It is obvious that this was a small matter to the English, as they let the Americans win. This proved to the other countries that America could stand for itself and defend itself, making people respect and recognize them as a new country. The Americans were no longer a tainted colony, but a separate nation which the English had to take seriously. In fact, the Americans were the initiatorsRead MoreThe American Dream By The Declaration Of Independence886 Words   |  4 PagesThe American Dream Introduction The American dream is the hope in freedom which enables all citizens to achieve their goals through hard work. The American dream is a belief of equality and prosperity in America. The American dream is a set of ideals that allows society to have high standards of living through hard work of citizens. The country has no barriers and every member who works hard has an equal opportunity. The hope of having a sense of social equality is the American dream (Stalp). ItRead MoreThe American Struggle For Independence1462 Words   |  6 Pagespushed the Americans toward liberty. But as time has shown, many groups of people have not been â€Å"created equal† in the eyes of the American rebels. From the African slaves, to the Native Americans, and of course the women of America, there seemed to be more inequality driving this nation than equality. This paper aims to show the misdoings to each of these groups, but more prominently show the argument of how the African Americans were the biggest loser in the struggle for independence. Each groupRead MoreThe American Revolution : The Fight For American Independence Essay1155 Words   |  5 Pages The American Revolution: The Fight for American Independence Jaden Luttrell Central High School November 10, 2015 5th Period â€Æ' Abstract The purpose of this research paper is to do more than simply provide an accounting of the events of the American Revolution. Instead, I will provide a detail of how the French and Indian War impacted the revolution, and missteps by the British Empire led to the American fight for freedom. In doing so, you will come to understand how the American fight forRead MoreThe War Of Independence And The American Revolution1572 Words   |  7 PagesApril 19th 1775 â€Å"the shot heard ‘round the world† initiated the war for independence by the American colonists against the British. There were many reasons why the American Revolution came to be, but the two main reasons were for unjustified taxing acts against the colonists and to receive independence from their mother country England. In the Age of Revolution there were many wars taking place around the world and the American Revolution was one of them, the main objective of these wars was for theRead MoreIt Was the American Re volution and NOT the American War for Independence631 Words   |  3 PagesIndependence was the main focus of the colonies after monarch rule of the British. During this key period of American history, The American Revolution would be a more appropriate term instead of The War for Independence. In the dictionary, the term revolution is defined as an overthrow of one government and its replacement with another. The American Revolution gives a broader sense of what is going on; starting from the initial ideology of independence, the acts and protests carried outRead MoreAmerican Politics And The Declaration Of Independence Essay1773 Words   |  8 PagesThe United States is built upon a certain set of ideals and values , written seemingly clearly within the Constitution and the Declaration of Independence. Yet, despite this, there are various disagreements in how political promises to the people of the country play out. The unifying factor of what I believe American politics is, is the development to live up to these ideals and values. It is a nation built on the stifling of true, direct, democracy of the masses, built upon favoring wealth and anRead MoreCauses of the American War of Independence1229 Words   |  5 PagesThe American Revolution is usually seen as being the same thing as the American War for Independence, starting in 1775 with the battle of Lexington and ending in 1783 with the treaty of Paris. This popular misconception has lead to the most important has lead to the real revolution being forgotten, the change in the way countries are governed and the ideas that lead to it. With the end of the French and Indian wars, the first worldwide war, the British found themselves with a huge national debt

Tuesday, May 12, 2020

Second Seminole War, 1835-1842

Having ratified the Adams-Onà ­s Treaty in 1821, the United States officially purchased Florida from Spain. Taking control, American officials concluded the Treaty of Moultrie Creek two years later which established a large reservation in central Florida for the Seminoles. By 1827, the majority of the Seminoles had moved to the reservation and Fort King (Ocala) was constructed nearby under the guidance of Colonel Duncan L. Clinch. Though the next five years were largely peaceful, some began to call for the Seminoles to be relocated west of the Mississippi River. This was partially driven by issues revolving around the Seminoles providing sanctuary for escaped slaves, a group that became known as the Black Seminoles. In addition, the Seminoles were increasingly leaving the reservation as hunting on their lands was poor. Seeds of Conflict In an effort to eliminate the Seminole problem, Washington passed the Indian Removal Act in 1830 which called for their relocation west. Meeting at Paynes Landing, FL in 1832, officials discussed relocation with the leading Seminole chiefs. Coming to an agreement, the Treaty of Paynes Landing stated that the Seminoles would move if a council of chiefs agreed that the lands in the west were suitable. Touring the lands near the Creek Reservation, the council agreed and signed a document stating that the lands were acceptable. Returning to Florida, they quickly renounced their previous statement and claimed they had been forced to sign the document. Despite this, the treaty was ratified by the US Senate and the Seminoles were given three years complete their move. The Seminoles Attack In October 1834, the Seminole chiefs informed the agent at Fort King, Wiley Thompson, that they had no intention of moving. While Thompson began receiving reports that the Seminoles were gathering weapons, Clinch alerted Washington that force may be required to compel the Seminoles to relocate. After further discussions in 1835, some of the Seminole chiefs agreed to move, however the most powerful refused. With the situation deteriorating, Thompson cut off the sale of weapons to the Seminoles. As the year progressed, minor attacks began occurring around Florida. As these began to intensify, the territory began preparing for war. In December, in an effort to reinforce Fort King, the US Army directed Major Francis Dade to take two companies north from Fort Brooke (Tampa). As they marched, they were shadowed by the Seminoles. On December 28, the Seminoles attacked, killing all but two of Dades 110 men. That same day, a party led by the warrior Osceola ambushed and killed Thompson. Gaines Response In response, Clinch moved south and fought an inconclusive battle with the Seminoles on December 31 near their base in the Cove of the Withlacoochee River. As the war quickly escalated, Major General Winfield Scott was charged with eliminating the Seminole threat. His first action was to direct Brigadier General Edmund P. Gaines to attack with a force of around 1,100 regulars and volunteers. Arriving at Fort Brooke from New Orleans, Gaines troops began moving towards Fort King. Along the way, they buried the bodies of Dades command. Arriving at Fort King, they found it short on supplies. After conferring with Clinch, who was based at Fort Drane to the north, Gaines elected to return to Fort Brooke via the Cove of the Withlacoochee River. Moving along the river in February, he engaged the Seminoles in mid-February. Unable to advance and knowing there were no supplies at Fort King, he elected to fortify his position. Hemmed in, Gaines was rescued in early March by Clinchs men who had c ome down from Fort Drane (Map). Scott in the Field With Gaines failure, Scott elected to take command of operations in person. A hero of the War of 1812, he planned a large-scale campaign against the Cove which called for 5,000 men in three columns to strike the area in concert. Though all three columns were supposed to be in place on March 25, delays ensued and they were not ready until March 30. Traveling with a column led by Clinch, Scott entered the Cove but found that the Seminole villages had been abandoned. Short on supplies, Scott withdrew to Fort Brooke. As the spring progressed, Seminole attacks and the incidence of disease increased compelling the US Army to withdraw from key posts such as Forts King and Drane. Seeking to turn the tide, Governor Richard K. Call took the field with a force of volunteers in September. While an initial campaign up the Withlacoochee failed, a second in November saw him engage the Seminoles in the Battle of Wahoo Swamp. Unable to advance during the fighting, Call fell back to Volusia, FL. Jesup in Command On December 9, 1836, Major General Thomas Jesup relieved Call. Victorious in the Creek War of 1836, Jesup sought to grind down the Seminoles and his forces ultimately increased to around 9,000 men. Working in conjunction with the US Navy and Marine Corps, Jesup began to turn American fortunes. On January 26, 1837, American forces won a victory at Hatchee-Lustee. Shortly thereafter, the Seminole chiefs approached Jesup regarding a truce. Meeting in March, an agreement was reached which would allow the Seminoles to move west with their negroes, [and] their bona fide property. As the Seminoles came into camps, they were accosted by slave catchers and debt collectors. With relations again worsening, two Seminole leaders, Osceola and Sam Jones, arrived and led away around 700 Seminoles. Angered by this, Jesup resumed operations and began sending raiding parties into Seminole territory. In the course of these, his men captured the leaders King Philip and Uchee Billy. In an effort to conclude the issue, Jesup began resorting to trickery to capture Seminole leaders. In October, he arrested King Philips son, Coacoochee, after forcing his father to write a letter requesting a meeting. That same month, Jesup arranged for a meeting with Osceola and Coa Hadjo. Though the two Seminole leaders arrived under a flag of truce, they were quickly taken prisoner. While Osceola would die of malaria three months later, Coacoochee escaped from captivity. Later that fall, Jesup used a delegation of Cherokees to draw out additional Seminole leaders so that they could be arrested. At the same time, Jesup worked to build a large military force. Divided into three columns, he sought to force the remaining Seminoles south. One of these columns, led by Colonel Zachary Taylor encountered a strong Seminole force, led by Alligator, on Christmas Day. Attacking, Taylor won a bloody victory at the Battle of Lake Okeechobee. As Jesups forces united and continued their campaign, a combined Army-Navy force fought a bitter battle at Jupiter Inlet on January 12, 1838. Forced to fall back, their retreat was covered by Lieutenant Joseph E. Johnston. Twelve days later, Jesups army won victory nearby at the Battle of Loxahatchee. The following month, leading Seminole chiefs approached Jesup and offered to stop fighting if given a reservation in southern Florida. While Jesup favored this approach, it was declined by the War Department and he was ordered to continue fighting. As a large number of Seminoles had gathered around his camp, he informed them of Washingtons decision and quickly detained them. Tired of the conflict, Jesup asked to be relieved and was replaced by Taylor, who was promoted to brigadier general, in May. Taylor Takes Charge Operating with reduced forces, Taylor sought to protect northern Florida so that settlers could return to their homes. In an effort to secure the region, the constructed a series of small forts connected by roads. While these protected American settlers, Taylor used larger formations to seek out the remaining Seminoles. This approach was largely successful and fighting quieted during the latter part of 1838. In an effort to conclude the war, President Martin Van Buren dispatched Major General Alexander Macomb to make peace. After a slow start, negotiations finally produced a peace treaty on May 19, 1839 which allowed for a reservation in southern Florida. The peace held for a little over two months and ended when Seminoles attacked Colonel William Harneys command at a trading post along the Caloosahatchee River on July 23. In the wake of this incident, attacks and ambushes of American troops and settlers resumed. In May 1840, Taylor was granted a transfer and replaced with Brigadier General Walker K. Armistead. Increasing the Pressure Taking the offensive, Armistead campaigned in the summer despite the weather and threat of disease. Striking at Seminole crops and settlements, he sought to deprive them of supplies and sustenance. Turning over the defense of northern Florida to the militia, Armistead continued to pressure the Seminoles. Despite a Seminole raid on Indian Key in August, American forces continued the offensive and Harney conducted a successful attack into the Everglades in December. In addition to military activity, Armistead used a system of bribes and inducements to convince various Seminole leaders to take their bands west. Turning over operations to Colonel William J. Worth in May 1841, Armistead left Florida. Continuing Armisteads system of raids during that summer, Worth cleared the Cove of the Withlacoochee and much of northern Florida. Capturing Coacoochee on June 4, he used the Seminole leader to bring in those who were resisting. This proved partially successful. In November, US troops attacked into the Big Cypress Swamp and burned several villages. With fighting winding down in early 1842, Worth recommended leaving the remaining Seminoles in place if they would remain on an informal reservation in southern Florida. In August, Worth met with the Seminole leaders and offered final inducements to relocate. Believing that the last Seminoles would either move or shift to the reservation, Worth declared the war to be over on August 14, 1842. Taking leave, he turned command over to Colonel Josiah Vose. A short time later, attacks on settlers resumed and Vose was ordered to attack the bands that were still off the reservation. Concerned that such action would have a negative effect on those complying, he requested permission not to attack. This was granted, though when Worth returned in November he ordered key Seminole leaders, such as Otiarche and Tiger Tail, brought in and secured. Remaining in Florida, Worth reported in early 1843 that the situation was largely peaceful and that only 300 Seminoles, all on the reservation, remained in the territory. Aftermath During operations in Florida, the US Army suffered 1,466 killed with the majority dying of disease. Seminole losses are not known with any degree of certainty. The Second Seminole War proved to be the longest and costliest conflict with a Native American group fought by the United States. In the course of the fighting, numerous officers gained valuable experience which would serve them well in the Mexican-American War and the Civil War. Though Florida remained peaceful, authorities in the territory pressed for the full removal of the Seminoles. This pressure increased through the 1850s and ultimately led to the Third Seminole War (1855-1858).

Wednesday, May 6, 2020

How Many Miles to Babylon Free Essays

â€Å"How many miles to Babylon? † Alec Moore – Narrator Frederick Moore – Father to Alec Mrs. Moore – Mother to Alec Jerry Crowe – Friend to Alec Mrs. Crowe – Mother to Jerry Major Glendinning – Commending Officer to Jerry and Alec in the army. We will write a custom essay sample on How Many Miles to Babylon? or any similar topic only for you Order Now General Points –  § Main Theme: Love vs. Hatred  § Reflects different stages of Narrator Development – There’s a continuous stream of consciousness, no chapters  § Ireland  § France  § Love – of country – passionless love of duty – of power and wealth – narcisstic love (love of self) Theme and Issues: Setting the Scene –  § Alec Narrates his tale of a loveless child, leaving him emotionless and scarred cruel mother, manipulative and hateful  § He was always goaded by his â€Å"beautiful mother†  § Mrs. Moore’s beauty contrasted to her vindictive personality. She’s swift and dismissive (passionless)  § Home with no affefction â€Å"The dining room in the daytime was unwelcoming† Relationship with his mother –  § Described through an experience when he seen his mother feeding the swans, thinking she was another woman for a split second, and felt love for her. This shows us that he doesn’t know his mother that well, mistaking her for another person but also that he only feels love for her when she is perceived as someone else. Compared to Christy’s love with his mother in â€Å"My left foot† – he has a continuous plutonic love for her.  § Mrs. Moore’s human relationships are meaning less and without power.  § She feels she is not capable of love as they are never aloud the freedom to experience it themselves.  § She has been taught only the proper etiquette of the wealthy at the experience of wealthy needs. The mother is jealous of Alec’s father and their relationship.  § She is again jealous of Alec’s developing relationships, such with Jerry, but also is worried what other people may think of a higher class boy, being friends with a lower class boy. Therefore, she wants to destroy it.  § She removes Alec from school, just so she won’t be left alone in the day. This is also a way for her to get to her husband, showing him that her and Alec also have a relationship, although it is fake. Relationship with Father – Alec feels real affection for his father, shown in his willingly attitude to spend time with him by the fire. He loves him within the bounds of duty and sensitivity.  § He leaves his father with loosing his only love in the family, when joining the army â€Å"heart rendering† when he leaves.  § They don’t display their love or intensity of feelings for one another, but it is evident e. g. when he accepts money as a â€Å"gestur e of love†  § His golden watch is given to Alec – Metaphorically represented as the beating of his heart. It will – â€Å"protect him from danger† Image of Women as hateful figures –  § The mother sees Alec’s decision to join the army as a personal triumph. She doesn’t have worries about the probable loss of her son’s life at war, but instead begins to enjoy the sympathy of her peers that she will receive from having her son at war.  § Jerry and Alec ridicule their â€Å"hypocritical mothers† as a display of grief as they go to war  § Alec makes fun of his mother for her intensity towards him, showing us that he doesn’t take her seriously. War as an image of hatred –  § The topic of war, adds a sense of horror The combination depicts a metaphorical journey for these characters from a debased nation of love in Alec to the trenches.  § The trenches are described as a physical representation of humankind without the power of love. It depicts the true meaning of evil and hate in contrast to love. Major Glendinning –  § He never shows remorse – he shows preci sion and dispassion by the murder of â€Å"Gloucester’s Regiment†  § This illustrates the breakdown of the inherent moral code in humanity  § When Alec requests leave for Jerry he shows compassion Paradoxical Aspect – to Jerry Crowe’s character. Contrary to loving nature Jerry Crowe –  § He abides by his sense of filial duty (wanting to find his father)  § His character brings out the true Alec Moore, makes him find himself.  § The reunion of Jerry and Alec at the finality of the novel is moving  § When Jerry is found, he is put into a detention camp, and declares he loves his country than his King. It is love that is the death of Jerry Crowe.  § When Alec pulls the trigger, it is none of murder, but saving his friend from a brutal death.  § After the death of Jerry, Alec finds no love in his life. He withdraws from life after his death. Cultural Context : – the world in which the novel is set  § Set in Ireland and focuses on the political conflict around the time of the nationalist movement and the First World War.  § Also conflicts between the upper and lower class in Ireland (classification)  § Alec Moore draws the reader into the story of his life by focusing on the rituals of his parents’ lives, his early childhood, education and his friendship with Jerry Crowe – all the ways that he sees his own life.  § The main way we see the cultural differences in Jerry and Alec is through their language and colloquialisms. Alec’s wealth is illustrated through his life setting – â€Å".. a high curtained window in which I could see as I went up the reflection of walls, the pictures, the polished banisters, the three altered heads, the crossed pikes, and a pair of beautifully chased silver swords† Alec’s Experience in childhood –  § His portrayal of his early childhood is harrowing. Mrs. Moore’s try to destroy the natural instincts of childhood are evident from her refusal to allow Alec to go to school, her interference in his friendship with Jerry and her dismissal of his piano teacher. Her interference is the source of Alec’s shyness and isolation.  § His relationship is distorted as his mother uses him as a means of avoiding direct contact with her husband – who neglects the important aspects of his development as he is a moral coward who has been bullied by his wife.  § Alec is used like a pawn by his mother to undermines her husband’s authority: â€Å" You never speak without authority.. you never sound as if you knew what you were talking about. You have always been an ineffective man† pg. 30 Mrs. Moore as an image of upper class – We are shown this through Alec’s narrative that she is a cruel and peevish mother  § Her maternal instincts are over-shadowed by her selfishness  § Her physical beauty is juxtaposed with her deformed nature.  § Johnston uses her to reflect the negative aspect of upper class society.  § Her desire to be regarded as a woman of culture and breeding is illustrated by her refined eating and drinking, her piano playing and her dress code. Mr. Moore as a Father figure –  § He has more of a relationship with Alec then the mother, shown by his scepticism about Jerry and Alec’s friendship. The Father is weak, his example of adult behaviour is confusing for his children.  § He can not be considered as a role model for Alec because of his flaws. The Friendship of Alec and Jerry –  § Alec’s childhood salvation comes from Jerry Crowe, he would have been very lonely without him, and wouldn’t have experienced his rejuvenation of childhood without him  § Ironically, Jerry’s childhood was one of a bad experience, similar to Alec’s – may have been what makes their friendship so solid. It is Jerry’s boisterous character that carries Alec through his awful home life  § His humour and attitude, allows Alec to manifest a reasonable perspective about his own future and society  § Their conversations are subtle reflections of the time in which they live â€Å"The German’s are going to fix all those eejits in Europe, The British are going to fix the Germans, and we†¦we are going to fix the British†  § The strength of their friendship survives the corrosion of class consciousness  § Proven by Alec’s constant support of Jerry, especially in the army. Alec’s Education –  § He lacks the encouragement needed from his parents, particularly from his mother to spur him to academic success.  § His mother is a crucial part in teaching him the piano, since dismissing Mr. Cave, although she does not keep her promise.  § She deprives him from going away to school as she cannot bear being left alone with his father. The Irish Nationalist Cause –  § Jerry’s recruitment to the army, is only for him to learn how to handle ammunition for the nationalist cause in Ireland, not for the desire to protect the English. The illustrates the nature of Irish society in the early part of the twentieth century where a small number of nationalists wanted to recreate a culture which was severly curtailed since the penal period.  § The paralleling of the nationalist movement in Ireland with the First World War illustrates two examples of the degeneration of society in violence. Portrayal of Women –  § It is unflat tering and prejudicial  § The author illustrates the lack of maternal nurturing which indicates the dysfunctional nature of society. Mrs Moore and Mrs Crowe deprive their sons of love, care and happiness – making decisions that are contrary to the moral well being of their sons.  § They both represent each end of society and class, yet both have the same role as mothers. Portrayal of Men –  § A portrayal of disconcert  § Alec’s introduction is apathetic and amoral who rejects the solace of religion  § Alec and Jerry are most admirable in their childhood, and they earn the readers respect through their loyalty to one another. The ambiguous ending of the novel suspends their credibility as full rounded characters and infers their symbolic function in the story.  § The other men are not symbolic as heroic figures (Major Glendinning, Jerry’s father, Mr. Moore) Instead, they are portrayed as ineffectual men enwrapped by their social position or as hard hearted, condescending automations. Setting of the Novel –  § The setting is varied, begins with Alec’s detention in France, and reverts to his childhood in Co. Wicklow – moves between Dublin, Belfast, England and France.  § With each change of setting, the reader is brought deeper into the impending doom with awaits Alec and Jerry.  § The move from Ireland to France also propels the protagonist from the domestic, political disharmony of his own country into the European fray so that the scale of the violence and cruelty of Alec’s early experiences is magnified beyond himself to thousands of other people. How to cite How Many Miles to Babylon?, Papers How Many Miles to Babylon Free Essays The same cannot be said for How Many Miles to Babylon, which ends in a pessimistic and gloomy scene. Alec Moore is awaiting execution, as the novel comes full circle. He is given â€Å"a pen and paper† because he is an â€Å"officer and a gentleman†. We will write a custom essay sample on How Many Miles to Babylon or any similar topic only for you Order Now He has nothing to do but wait. Alec refused to kill Jerry by firing squad, so in a sense, he asserted his own humanity in the face of war. However, this noble act is detrimental, as this act of compassion tragically costs him his life. Johnston’s outlook is in keeping with the sombre vision of the whole novel – dark, pessimistic and undeniably tragic. The central characters and key relationships within a text are extremely important to our understanding of the general vision and viewpoint. They allow us to see how the actions of another person can have a positive or negative impact on the life of the protagonist. The relationship between Alec and his mother Alicia in How Many Miles to Babylon is characterised by a lack of communication and affection. Alicia uses Alec as an extension of her own ego. He is not appreciated as an individual with individual needs and desires. She only cares that he conforms to her expectations. There is no real warmth to their relationship – which is cold and stifling. As well as restricting Alec’s relationship with Jerry Crowe, Alicia overpowers his relationship with Frederick. Alec cannot do anything without the consideration of his mother. Their relationship is presented in a negative light and Johnston, in a sense, caricatures Alicia to reflect the dark and negative aspects of the upper class. Alicia has a desire to be regarded as a woman of culture and intelligence, which is evident through her piano playing and refined eating rituals, but her actions are a departure from normal maternal practices. Alec feels unloved and unappreciated. The mother-son relationship is so important in How Many Miles to Babylon because not only does it portray a dark outlook on life, but is also a catalyst for the main plot. The general vision and viewpoint of a text expresses the author’s or director’s optimistic or pessimistic outlook on life. It also enables us to establish a greater understanding of the characters and allows us to empathise with them. The outlook can be either bright or dark, or indeed a combination of brightness and darkness and as we become more aware of this outlook as the plot develops, we can more effectively understand the situation of the protagonist within the narrative. How to cite How Many Miles to Babylon, Papers

Saturday, May 2, 2020

Tamburlaine The Great, Part Two monologue from the play by Christopher Marlowe Essay Example For Students

Tamburlaine The Great, Part Two monologue from the play by Christopher Marlowe Essay A monologue from the play by Christopher Marlowe NOTE: This monologue is reprinted from Masterpieces of the English Drama. Ed. William Lyon Phelps. New York: American Book Company, 1912. TAMBURLAINE: Villain, art thou the son of Tamburlaine, And fear\st to die, or with a curtle-axe To hew thy flesh, and make a gaping wound? Has thou beheld a peal of ordnance strike A ring of pikes, mingled with shot and horse, Whose shatter\d limbs, being toss\d as high as heaven, Hang in the air as thick as sunny motes, And canst thou, coward, stand in fear of death? Hath thou not seen my horsemen charge the foe, Shot through the arms, cut overthwart the hands, Dying their lances with their streaming blood, And yet at night carouse within my tent, Filling their empty veins with airy wine, That, being concocted, turns to crimson blood, And wilt thou shun the field for fear of wounds? View me, thy father, that hath conquer\d kings, And, with his host, march\d round about the earth, Quite void of scars and clear from any wound, That by the wars lost not a drop of blood, And see him lance his flesh to teach you all. A wound is nothing, be it ne\er so deep; Blood is the god of war\s rich livery. Now look I like a soldier, and this wound As great a grace and majesty to me, As if a chair of gold enamelled, Enchas\d with diamonds, sapphires, rubies, And fairest pearl of wealthy India, Were mounted here under a canopy, And I sat down, cloth\d with a massy robe That late adorn\d the Afric potentate, Whom I brought bound unto Damascus\ walls. Come, boys, and with your fingers search my wound, And in my blood wash all your hands at once, While I sit smiling to behold the sight. Now, my boys, what think ye of a wound?

Monday, March 23, 2020

Neural and synaptic transmission free essay sample

Neural Synaptic Transmission The nervous system is made up of neurons and Gila cells. Neurons are the basic communication links in the nervous system. Gila cell provide support for neurons and contribute to communication. Neurons normally transmit a neural impulse (an electric current) along an axon to a synapse with another neuron. The neural impulse is a brief change in neurons electrical charge that moves along an axon, It Is an all-or-none event. Action potential triggers the release of chemicals called neurotransmitters that diffuse across the synapse to communicate with other reruns. Transmitters bind with receptors in the posthypnotic cell membrane, causing excitatory or Inhibitory Asps. Most neurons are linked In neural pathway, circuits, and networks. In the nervous system, the neural impulse functions as a signal. For that signal to have any meaning for the system as a whole, it must be transmitted from the neuron to other cell. We will write a custom essay sample on Neural and synaptic transmission or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page As noted above, this transmission takes place at special junction called Synapses, which depend on chemical messengers. To explain in another way neural impulses are electro chemical events. When Neurons stimulated beyond threshold level, there Is a rapid shift in Its polarity from negative to positive charge. This reversal of charge, called an action potential or neural impulse, is generated along the length of the axon to the terminal buttons. When neural Impulse reaches the terminal button, It triggers the release of neurotransmitters, the chemical messengers that carry the message across the synapse to neighboring neurons. Neurotransmitters can have either excitatory or Inhibitory effect to the neurons at which they dock. Example: The educational ND childcare reformers who have used brain science as the base for their campaigns have primarily cited to key findings: the discovery of critical period in neural development and the demonstration that rats raised In enriched environments have more synapses than rates raised in impoverished environments. A critical period is a limited time span in the development of an organism when It Is optimal for certain capacities to emerge because the organism Is especially responsive to certain experiences. Classical conditioning Classical conditioning explains how neutral stimulus can acquire the capacity to licit response originally evoked by another stimulus. This kind of conditioning was originally described by Ivan Pavlov. Many kind of everyday responses are regulated through classical conditioning, including phobias, fears, and pleasant emotional responses. Even psychological responses such as immune and sexual functioning and drug tolerance can be Influenced by classical conditioning. Conditioned response may be weakened and extinguished entirely when the CSS is no longer paired with the US. In some case, spontaneous recovery occurs, and an extinguished response reappears after a period of non-exposure to CSS. Conditioning may generalized to additional stimuli that are similar to the original CSS. The opposite of generalization is discrimination, which involve not responding to function as if it were US, to establish new conditioning. Example: The art of manipulating peoples association has been perfected by the advertising industry. Advertisers consistently endeavor to pair the product they are pending with stimuli that seem likely to elicit positive emotional response. Like advertisers, candidates running for election need to influence the attitude of many people quickly, subtly, ND effectively- and they depend on evaluation conditioning to help them do so. For example , politician show-up at an endless variety of pleasant public events( such as opening of a new mall) that often have nothing to do with their public service. Stress Stress is common every day event, even seemingly minor stresses or hassles can be problematic. To a large degree, stress lies in the eye of the beholder, as appraisals of stress are highly subjective. Major type of stress includes frustration, conflict, change, and pressure. Frustration occurs when an obstacle prevent one from attaining some goal. The three principal type of conflict are approach-approach, avoidance-avoidance, and approach-avoidance. A large number of studies with the SIRS suggest that change is stressful. Although this may be true, it is now clear that the SIRS is a measure of general stress rather than Just change related stress. Two kind of pressure ( to perform and conform) also appears to be stressful. Emotional reaction to stress typically include anger, fear, and sadness, although positive emotions may also occur may promote resilience. Emotional arousal may interfere with coping. The optimal level of arousal on a task depends on the implicitly of the task. The psychological arousal in response to stress was originally called the fight-or-flight response by Cannon. The fight-or-flight response may be less applicable to women than men. Sellers general adaptation syndrome describes three stages in physiological reaction to stress: alarm, resistance, and exhaustion. There are two major pathways along which the brain send signal to the endocrine system in response to stress. Action along these pathless two set of honeymoons, catecholamine and corticosteroids, into the bloodstream. Stress may support the process of neurosurgeons. Some coping responses are less than optimal. They include giving up, blaming oneself, and striking out at others with act of aggression. Indulging oneself is another coping pattern that tends to be of limited value. Defense mechanism protect against emotional distress through self-deception. Small positive illusion about oneself may sometimes be adaptive. Pigged According to Piglets theory of cognitive development, the key advance during seniority period is the childs gradual recognition of the permanence of objects. The operational period is marked by certain deficiencies in thinking- notably, interdisciplinary scholar whose own cognitive development was exceptionally rapid. In his early ass, after he had earned a doctorate in natural science and published a novel, Pigged turned his focus on psychology. He soon found himself administering intelligent test to children to develop better test norms. In doing this testing, Pigged became intrigued the reasoning underlying the childrens wrong answers. He decided that measuring children intelligent was less interesting than studying how children use their intelligence. He spent the rest of his life studying cognitive development. Many of his ideas were based on insights gleaned from jarful observation of his own three children during their infancy. Like Erosions theory, Pigged model is a stage theory of development. Pigged proposed that the youngsters progress through four major stages of cognitive development, which are characterized by fundamentally different thought process: (1) Seniority period (birth to age 2), (2) the operational period (age 2 to 7), (3) the concrete operational period (age 7 to 10), and (4) the formal operational period (age 11 onwards). Example; fathers are essential for healthy development. Over the last 40 years proportion of children growing up without a father in home has more than doubled. During the same time, we have seen dramatic increase in teenager pregnancy, juvenile delinquency, violent crime, drug abuse, eating disorder, teen suicide and family dysfunction. Erikson Erikson theory of personality development propose that individual evolve through eight stages over the life span. In each stage the person wrestles with changes (crises) in social relationship. According to Erikson Personality is shaped by how individual deal with these psychological crises. Each crisis involves a trudge between two opposing tendencies, such as trust versus mistrust or initiative vests guilt, both of which are experienced by the person. Erikson describes the stages interns of these antagonistic tendencies, which represent personality theaters people display in varying degrees over the reminder of their lives. Although the names for Erosions stage suggest either-or-outcomes, he viewed each stage as a tug of war that determine the subsequent balance between opposing polarities in personalities. The eight stages In Erikson theory are: stage 1- Trust versus mistrust ( is my word predictable and supportive? First year of life), stage 2- Autonomy versus sham and doubt (Can I do thing myself or must I always rely on others? Second and third years), stage 3-eliminative versus guilt (Am I good or am I bad? , fourth through six years), stage 4- Industry versus inferiority ( Am I competent or am worthless? Age six through puberty), stage 5-Latinity versus confusion (Who am I and where am I going? , adolescent), stage 6- Intimacy versus isolation (Shall I share my life with another or live alone? , early adulthood), stage 7-Gen eratively versus self-absorption (will I produce something of real value? , middle adulthood), stage 8- integrity versus despair (have I lived a full life? Late adulthood) Frauds psychoanalytic theory emphasis the importance of the unconscious. Freud described personality structure in terms of three components- the d, ego-and superego- which are routinely involved in ongoing series of internal conflict. Freud theorized that conflict centering on sex and aggression are specially likely to lead to anxiety. According to Freud, anxiety and other unpleasant emotions such as guilt are often warded off with defense mechanisms. Freud described a series of five stages of development: Oral, anal, phallic, latency, and genital. Certain experiences during these stages can have lasting effect on adult personality. Lungs most innovative and controversial concept was the collective unconscious. Idlers individual psychology emphasis how people strive for superiority to compensate for their feeling of inferiority. Overall, Psychodrama theories have produced many ground breaking insights about the unconscious, the role of internal conflict and the importance of early childhood experiences in personality development. However, psychodrama theories have been criticized for their poor testability, inadequate base of empirical evidence, and their male centered view.

Friday, March 6, 2020

Free Essays on The Prince

Response to â€Å"The Prince† My outlook was completely changed about the life of a prince after reading this piece. I predicted that it would be the same old story of the courageous and fearless prince; instead, I found it to be completely opposite. Basically throughout this whole paper, Machiavelli writes about any ruler wishing to stay in power must â€Å"learn how not to be good†. He wrote about it from a completely different perspective than what I had expected. He talks about ignoring morality at certain times so that a â€Å"prince† can remain a prince. When people think of the fairy tale prince, they usually think of someone who has strong morals and is courageous and trustworthy; yet Machiavelli writes that a prince â€Å"should know how to enter into evil when necessity commands†. He praised Cesare Borgia and Hannibal because they were cruel, and he insists that it is necessary for a prince to be cruel at times. According to him, mercy, faithfulness, humanness, forthrightness, and religion are all qualities that a prince must appear to have. He says that it â€Å"is not necessary for a prince to have all the above qualities, but it is very necessary for him to appear to have them.† He claims that people perceives one another as what one seems to be, only a few people perceive one as they really are. I agree with him here. Apparently because he had figured this out, he is able to write about how a prince should act. There are two particular examples that stood out in the story that I want to use to explain how he sees the life that a prince should live. These two examples are the main points that I took away with me, maybe because they even have some personal significance in my life. The first example jumped out at me when he wrote, â€Å"For men forget more quickly the death of their father than the loss of their patrimony.† This stuck with me because this phrase is so true. People remember if something they inherited is stole... Free Essays on The Prince Free Essays on The Prince Response to â€Å"The Prince† My outlook was completely changed about the life of a prince after reading this piece. I predicted that it would be the same old story of the courageous and fearless prince; instead, I found it to be completely opposite. Basically throughout this whole paper, Machiavelli writes about any ruler wishing to stay in power must â€Å"learn how not to be good†. He wrote about it from a completely different perspective than what I had expected. He talks about ignoring morality at certain times so that a â€Å"prince† can remain a prince. When people think of the fairy tale prince, they usually think of someone who has strong morals and is courageous and trustworthy; yet Machiavelli writes that a prince â€Å"should know how to enter into evil when necessity commands†. He praised Cesare Borgia and Hannibal because they were cruel, and he insists that it is necessary for a prince to be cruel at times. According to him, mercy, faithfulness, humanness, forthrightness, and religion are all qualities that a prince must appear to have. He says that it â€Å"is not necessary for a prince to have all the above qualities, but it is very necessary for him to appear to have them.† He claims that people perceives one another as what one seems to be, only a few people perceive one as they really are. I agree with him here. Apparently because he had figured this out, he is able to write about how a prince should act. There are two particular examples that stood out in the story that I want to use to explain how he sees the life that a prince should live. These two examples are the main points that I took away with me, maybe because they even have some personal significance in my life. The first example jumped out at me when he wrote, â€Å"For men forget more quickly the death of their father than the loss of their patrimony.† This stuck with me because this phrase is so true. People remember if something they inherited is stole...

Tuesday, February 18, 2020

Lesson Plan for Remote Sensing, GPS, and GIS Essay

Lesson Plan for Remote Sensing, GPS, and GIS - Essay Example However, with the introduction of geospatial technology such as remote sensing, geographic information system (GIS), and global positioning system (GPS), Social Studies can become very interesting to pre-collegiate students. In fact, â€Å"with data from satellite-based sensors becoming widely available, curricular and instructional opportunities are limitless† (Gaile & Willmott 2003, 411). This lesson is a basic introduction of geospatial technology itself, particularly RS, GIS, and GPS to the students in the K-12 educational levels using the simplest forms of explication and focusing on instilling in the students its correct appraisal in relation their subject Social Studies. II. Learning Objectives The use of geospatial technology has been of much use ever since it was developed and introduced. Government agencies involved in different aspects of national and social life use it to gather and analyze information, whether these are regarding the population, the weather, polit ics, agriculture, and other concerns. Because of this, it is imperative for teachers in K-12 social studies subjects to introduce spatial and geographic issues and to introduce students to the technologies to be used for these (Alibrandi & Moloney 2001). In doing so, the following may well be the objectives not just for the students who are the recipient of the education process but also for the teacher who delivers it to them. 1. To educate K-12 students in Social Studies about the basic features of geospatial technology, particularly Remote Sensing, GPS, and GIS. 2. To develop spatial thinking that may involve knowledge in orientation, scale, symmetry, and similar concepts. This will help students in â€Å"understanding change over space versus change over time and recognizing as understanding change over space versus change over time and recognizing patterns in data† (Schultz et al 2008, 27) . 3. To present the means in which the geospatial technology is applied in certain branches of science that are of vital importance to society and the country. 4. To teach students the importance of GIS, RS and GPS in enriching their learning experience in Social Studies and History, especially because events â€Å"occur not only in time, but in space, and expanding spatial understandings literally gives more dimension to simple historical understanding† (Alibrandi & Baker 2008, 8). III. Resources Needed Due to the obvious fact that teaching geospatial technology to K-12 students requires advanced resources too, it may be necessary to procure computers and the appropriate software. Schools are expected to have computers already though. Therefore what would be needed would be certain software for RS, GIS, and GPS. These software varieties may be available online already, which is why it is also imperative that the computers used for instruction should be connected to the internet. Using the internet-based maps or web maps can be considered as a good start b ecause these do meet the requirements in teaching geospatial technology and, at the same time provide teachers with instant geographic solutions to student questions and academic needs (Baker 2005, 45). Other resources that will be needed are as follows: 1. History and Social Studies textbooks corresponding to the grade level of the students being taught. 2. Printed maps or a globe 3. Software that may need to be installed to the computers that would be

Monday, February 3, 2020

Bibliography Essay Example | Topics and Well Written Essays - 500 words - 1

Bibliography - Essay Example The case of Quebec is used as an example for showing the resistance of a region to globalization using a particular element: the language; in accordance with Di Sciullo the French language has been used by Quebecers as a cause for protecting the region’s identity, even if the region is indispensable part of Quebec. In this way, the political choices of Trudeau in regard to ethnicity and identify of Quebec, as compared to other regions of Canada, can be clearly understood. Dufour, Christian. â€Å"Trudeau’s Canadian Legacy from a Quebec Perspective: New Canadian Nationalism Weakens Canada.† London Journal of Canadian Studies 18(2002/2003): 5-13, accessed February 12, 2012. The study of Dufour emphasizes on the role of Trudeau in the misunderstanding caused in regard to the demands of Quebecers, as citizens of a critical Canadian region. Moreover, through the above study it is made clear that the political decisions of Trudeau had led to the following problem: various cultural groups across Canada have been benefited from the changes in Canadian constitution while the rights of the citizens of Quebec were ignored. In other words, the study of Dufour, analyzing the conflicts between Quebecers and the rest of Canadians, makes clear the failure of Trudeau to secure national unity, especially as of the area of Quebec. The specific aspect of Trudeau’s legacy in regard to national unity is quite important, taking into consideration Quebec’s geopolitical value for Canada. In any case, the failures of Trudeau in managing the claims of Quebecers can be used for evaluating his practices in other regions with similar issues. Although the specific su bject is partially covered also in the study of Di Sciullo, the use of the study of Dufour is important in order to understand the challenges that nationalism has faced in Canada, especially since the information

Sunday, January 26, 2020

Security Issues in Peer-to-peer Networking

Security Issues in Peer-to-peer Networking ACKNOWLEDGEMENTS: The interest in the field of networking, driven me to take the computer networking as my course in M.Sc. there are many different types of networks. Out of them the more popularized and upcoming trend of networks are peer-to-peer networks. This report of my final dissertation for the partial fulfilment of my M.Sc, computer networking, would not have been possible without the support of my supervisor, Mr. Harry Benetatos. He helped me a lot by guiding me and pin-pointing the key mistakes which I have done during my research. My course leader Mr. Nicholas Ioannides also helped me a lot to complete this dissertation. His advises and suggestions gave me a lot of encouragement and support which made me do this research and finish it in time. I am very thankful to my university, LONDON METROPOLITAN UNIVERSITY which provided me the free access to the IEEE library which helped me to find the key papers which are very useful for my research. I also thank my parents for their support given to me in all walks of my life. DEDICATION: I dedicate this report to my parents and my well wisher Sakshi for their constant support and encouragement throughout my education and life. CHAPTER 1 PROJECT INTRODUCTION 1.1 INTRODUCTION TO THE PROJECT: This dissertation is all about the security issues in the peer-to-peer networks. There are many security issues in peer-to-peer networks. I have chosen to do research on worm intrusions in peer-to-peer networks. In this document I have mentioned how the worm propagates in the network from one peer to another peer, how the worm can be detected and how the detected worm can be attacked and save the network from getting infected. 1.2 AIM: Security issue in Peer-to-peer networks: Securing the peer-to-peer network from worms.   1.3 OBJECTIVES: Ø To understand how the peers communicate with each other in the peer-to-peer network Ø To analyse the propagation of worms in the network. Ø To detect the worms near the nodes of the network Ø To defence the worms in the network. 1.4 RESEARCH QUESTION: This document briefly discusses about how the worms propagates in the network and how can it be detected and attacked in order to save the peer-to-peer network 1.5 APPROACH: My approach for this dissertation is as follows: Ø Understanding peer-to-peer networks Ø Defining the problem Ø Data collection and analysis Ø Study and understanding the existing solutions for the problem Ø Comparing different solutions Ø conclusion 1.6 METHODOLOGY: This section of my document contains what important steps to be followed in order to achieve the mentioned objectives. It also helps to schedule how to develop and complete different parts of the dissertation. In this dissertation firstly I will study and understand about the peer-to-peer networks and how the peers in the networks communicate and share information with the remaining peer in the network. Then I do research on how the worm propagates in the network, how can the worm be detected and how the detected worm can be attacked and restore the network.   In the pictorial form the different stages of my dissertation are 1.7 PREVIEW ABOUT THE COMING CHAPTERS IN THE REPORT: The rest of the report is organised as follows: in the chapter 2, there is brief discussion about the peer-to-peer networks, different types of peer-to-peer networks, advantages and disadvantages of the peer-to-peer networks. There is also some information about the worms, its nature and different types of worms. In chapter 3, there is a discussion about the methods given by the different person to detect the worm in the network by the method of matching the characteristic string of the worm. In section 4, there is a solution for this issue. That is mathematical method of detecting the worm in the network and defending it. Chapter 5 consists of a critical appraisal and suggestions for the further work. Finally, I concluded in chapter 6. CHAPTER 2 OVERVIEW OF THE GENERIC AREA AND IDENTIFICATION OF PROBLEM: 2.1 NETWORK: Network is a group of electronic devices which are connected to each other in order to communicate which each other.   The devices can be computers, laptops, printers etc. networks can be wired or wireless. Wired networks are networks in which the devices are connected with the help of wires. Wireless networks are the networks in which the devices are connected without the wires. There are many different types of networks and peer-to-peer is one of the important and special types of networks. 2.2 PEER-TO-PEER NETWORKS: Peer-to-peer networks are emerged in 1990 because of the development of the peer-to-peer file sharing like Napster [1].   Peer-to-peer networks abbreviated as p2p networks are the networks in which all the nodes or peers in the network acts as servers as well as clients on demand. This is unlike typical client server model, in which the clients requests the services and server supplies the resources. But in case of peer-to-peer networks every node in the networks requests services like a client and every node will supply the resources like server on demand. Peer-to-peer network doesn’t need any centralized server coordination.   Peer-to-peer network is scalable. Addition of new nodes to the network or removal of already existing nodes on the network doesn’t affect the network. That means addition or removal of nodes can be done dynamically. All the nodes connected in a peer-to-peer network run on the same network protocol and software. Resources available on a node in the network are available to the remaining nodes of the network and they can access this information easily. Peer-to-peer networks provide robustness and scalability. All the wired and wireless networks can be configured as peer-to-peer networks. Home networks and small enterprise networks are preferable to configure in a peer-to-peer networks. Most the networks are not pure peer-to-peer networks because of they use some network interface devices. In the beginning, the information is stored at all the nodes by making a copy of it. But this increases the flow of traffic in the network. But now, a centralised system is maintained by the network and the requests are directed to the nodes which contains the relevant information. This will save the time and the traffic flow in the network. 2.3 WIRELESS NETWORKS: Devices connected to each other without any wires can also be configured like peer-to-peer networks. In a case of small of number of devices it is preferable to configure the network in wireless peer-to-peer networks because it will be easy to share the data in both the directions. It is even cheaper to connect the networks in wireless peer-to-peer because we do not need to spend on the wires. Peer-to-peer networks are divided into three types. They are: Instant messaging networks Collaborative networks Affinity community networks[2] Instant messaging networks: In this type of peer-to-peer networks, the users can chat with each other in real time by installing some software such as MSN messenger, AOL instant messenger etc. Collaborative networks: This type of peer-to-peer networks are also called as distributed computing.   This is widely used in the field of science and biotechnology where the intense computer processing is needed. Affinity community peer-to-peer networks: It is a type of p2p network, where the group of devices are connected only for the purpose of sharing the data among them. Peer to peer networks are basically classified into two types. They are: Ø Structured peer-to-peer networks Ø Unstructured peer-to-peer networks 2.4 STRUCTURED PEER-TO-PEER NETWORKS: In the structured peer-to-peer nodes connected in the network are fixed. They use distributed hashing table (DHT) for indexing [4]. In DHT data is stored in the form of hash table like (key, value). Any node willing to retrieve the data can easily do that using the keys. The mapping of values to the keys are maintained by all the nodes present in the network such that there will be very less disruption in case of change in the set of participants DHT-based networks are very efficient in retrieving the resources. 2.5 UNSTRUCTURED PEER-TO-PEER NETWORKS: In unstructured p2p network nodes are established arbitrarily. There are three types of unstructured p2p networks. They are Pure peer-to-peer Hybrid peer-to-peer Centralized peer-to-peer In Pure p2p networks all the nodes in the network are equal. There won’t be any preferred node with special infrastructure function. In hybrid p2p networks there will be a special node called â€Å"supernodes† [3] . This supernode can be any node in the network depending on the momentary need of the network. Centralized p2p network is a type of hybrid network in which there will be one central system which manages the network. The network cannot be able to work without this centralized system Basically, all the nodes in the peer-to-peer networks contain the information of the neighbour in its routing table. The rate of propagation of worms in the peer-to-peer networks is larger than compared to the other networks. This is because the information of the neighbour peers can easily achieved from the routing table of the infected node. Different types of files are shared between the nodes in the peer-to-peer networks. These files can be the audio files, video files, music files, text documents, books; articles etc. there are a lot of peer-to-peer software available these days in the market for sharing the files. Some of them are bittorrent, limeware, shareaza, kazaa, Imesh, bearshare Lite, eMule, KCeasy, Ares Galaxy, Soulseek, WinMX, Piolet, Gnutella, Overnet, Azureus (vuze), FrostWire, uTorrent, Morpheus, Ants, Acquisition[5]. There are lot more file sharing softwares in the market but these are the top 20 file sharing softwares for peer-to-peer networks. Basically, all the nodes connected together in the network should configure with the same network protocol and the same software should be installed in all the nodes in order to communicate with each other. Else the nodes in the network cannot communicate if they are configured with the different software or protocol. 2.6 ADVANTAGES OF PEER-TO-PEER NETWORKS [6]: It is more useful for the small business network comprising of very small number of computer systems or devices. Computers in this network can be configured easily. Full time network administrator is not required for the p2p networks. Easy maintenance of the network. Only a single operating system and less number of cables needed to get connected Can be installed easily Users can control the shared resources Distributed nature of the network increases the robustness of the network. 2.7 DISADVANTAGES OF THE PEER-TO-PEER NETWORKS [12]: No centralised administration Back-up should be performed on the each computer individually. Peer-to-peer networks are not secure Every computer in the network behaves as server and client which can slow down the performance of the system Legal controversy with the copyrights. 2.8 WORM: Worm is a computer malware program or it can be called as a mischievous code which can multiple itself   into several replicas or it duplicate itself into several copies. Worm in simple can be called as â€Å"autonomous intrusion agent† [19] .It doesn’t actually alters the function of the system but it pass through i.e., worm is unlike virus.   It intrudes the network without the mediation of the user. This is first detected by Robert T Morris in 1988[18]. Today we have some billions of systems connected to internet. Bu during 1988 there were only 60,000 systems connected to the internet. During that period 10% of the internet systems i.e., 6000 of the systems are infected and almost clogged because of the worms [8]. Worms when enters the system it hides in the operating system where it cannot be noticeable [18] . It drastically slows down the system the effect the other programs in the system. In worst cases it could even effect the entire network and slow down the internet across whole world. As it is said earlier that it replicates itself into multiple copies and attach itself to the emails and corrupt them and sometimes deleting the file without the user interaction. If it enters our email, it can able to send itself to all the contacts in our email book and then to all the contacts of the emails of our email book and likewise it propagates, grow and spread at the higher rate. Worms will even create the â€Å"backdoor† into the computer [11]. This will make the attackers to send spam easily. Some famous worms discovered in 2003 and 2004 are â€Å"Mydoom†, â€Å" Sobig† and â€Å"Sasser†[7].   â€Å"Sasser† worm has recently affected the computers which are using Windows 2000 or Windows XP operating system. It restarts the system automatically and crashes it. It is spread to all the nodes in the network. There are some worms which are unlike the normal worms. These worms are very useful to the user some times. Hence, these are called the â€Å"helpful worms† [9]. Sometimes they help users without the interaction with the user. But most of the known worms are harmful and will always tries to infect the nodes in the network and affect the performance of the network. When the peer-to-peer networks are attacked by the worms, it slows down the efficiency of the network. So there is a need to save the networks from entering into the network and spreading itself all over the network. The worms should be detected and defended. If we delay in defending these worms, they replicate itself and makes many copies of itself and spread all through the network. This is very dangerous to the network as it affects the performance and efficiency of the network [10]. CHAPTER 3 RELEVANT WORK DONE BY OTHERS IN ORDER TO SOLVE THE PROBLEM: Many people proposed solutions to this problem. First Zhou L gave solution to p2p worm and he observed that propagation of worm in p2p network is very speed when compared to other networks[13] . Jayanthkumar performed some simulations on worm propagation from infected node to other node[10]. Wei yu researched on the behaviour of worms in p2p networks[14]. In my research I found one more interesting method of detecting the worms in the peer-to-peer network. This is indeed a special method of detecting the worms in network because the authors Yu Yao, Yong Li, Fu-xiang Gao, Ge Yu in their paper titled â€Å"A Signature-behaviour-based P2P worm detection approach† they proposed a mechanism of detecting the known worms in the peer-to-peer networks based on characteristic string matching. Worm make use of vulnerabilities in the network and +Spreads[15]. They also proposed the detection mechanism for the unknown worms based on their behaviour. They technique mainly consists of the te chnology of characteristic string matching, identifying the application and the unknown worm detection technology. They have given the algorithm for the matching the characteristics string of the worm called suffix-tree algorithm- suffix array algorithm. This is efficient and simple with very less time complexity. As peer-to-peer network follows fragment transfer technique there is chance of assigning the characteristics string of the worm to the other blocks of data. And again during the reorganisation process this characteristic string can identify the worm. These authors even validated their results by simulation. They proved that their method is also one of the efficient methods of p2p worm detection. As mentioned above this method detects the known worm and also the unknown worms based on characteristic string matching and their behaviour respectively. In this method they initially capture the network packets using the library function called â€Å"LibPcap†. â€Å"LibPcap† is the library function that captures the network packets in UNIX and Linux platforms. This function contains many functions that will be useful for capturing the network packets. After capturing the data packets with help of these functions the non-P2P packets are filtered out. So now the P2P packets are filtered. In these P2P packets the known worms are detected by using the characteristic string matching. This is implemented by the couple of algorithms. They are the â€Å"suffix array algorithm† and the â€Å"dichotomy algorithm†. These algorithms are very accurate and are capable of detecting the worms in very less time. As I mentioned above peer-to-peer networks follow fragment transfer mechanism. Hence the characteristic string of the worm can be assigned to the other blocks of data. So, in this situation it is difficult to detect the worm if the characteristic string of the worm is based on the single packet. But if the characteristic string is present in the block then there is a chance of detecting the worm because it will assign it to the two packets. At this time the worm characteristic string present in the two different data packets need to restructure. After restructuring, the worm can be detected by using the matching mechanism. In this way the known worm in the network is detected by using the characteristic string matching. The unknown worms in the p2p network can be detected with the help of the act characteristics of the worm at the initial stage of its propagation. This can be called as the behaviour based detection of the unknown p2p worms. Like this all the known and unknown worms in the network are detected. 3.1 P2P KNOWN WORM DETECTION: There are four steps in detecting the p2p known worms. They are: Deal flow Technology of identifying the application Characteristic string matching Reorganising the characteristic string 3.1.1 DEAL FLOW: In this step of deal flow the flow of data is divided into four steps[16]. Step 1: Extracting the p2p data stream from the original data stream. Step 2: check the extracted p2p data stream for worms using characteristic string matching with the worms already existing in the library function. Step 3: data is flow is reorganised. It now contains worm characteristic string as well. Go to step 2. Step 4: check the data flow for unknown worms using unknown worm detection techniques. After performing the four steps update the library function. All the four steps is represented   pictorially as in the next page. Figure 4: flow chart representing four steps to detect worms   yes    normal  Ã‚  Normal no  Ã‚  Ã‚  Ã‚   Abnormal abnormal 3.1.2 TECHNOLOGY OF IDENTIFYING THE APPLICATION: As said earlier, this paper uses the method of capturing the data packets and sca it for the worms which are known with the help of a function library called â€Å"LibPcap†[17] . For this there should be already some assigned rules in the network interface devices. So assigning these rules to those devices is done in stepwise procedure as: Identify the available network interface devices Open the network interface device Compile the rules that we are willing to attach to the devices Setup the rules of filtering to the device Now operate the equipment Start the process of capturing the packets There are some rules for identifying the p2p application. They are: Characteristic information of the known p2p is used Sometimes, if source-destination IP pairs don’t use the known P2P and they may use TCP and UDP at same time, then they are p2p. At a particular time source pairs {srcIP, srcport}[27] and the destination pairs {dstIP, dstport}[27] are checked Here we can identify whether it’s a p2p or not. If the number of connection port is equal to the number of connection IP, then we can say that it is a p2p. There are the situations where these rules have been used unruly. So the there were some amendments made to these rules. The amendments are rule (2) can identify even the mazes which are present and rule (3) is modified in such a way that in the detect cycle {srcIP, srcport}[27] pairs at the source and the {dstIP,   dstport }[27] pairs at the destination are checked. From this they derived that if the number of connection port is equal to the number of connection IP, the protocols which are used are same. If they are different then the protocols are different. 3.1.3 CHARACTERISTIC STRING MATCHING: This is the most important section of the paper. Here authors have given some definitions to the terms which we are going to use, the algorithms which we are going to use to detect the worm. Couple of algorithms are mentioned. They are suffix-array algorithm and the dichotomy algorithm. So the entire process of detecting the worm depends on the efficiency and the accuracy of these algorithms. First of all before using and understanding suffix-array algorithm we will try to understand some keywords and rules. Suffix: suffix is the part of a string or a substring which starts at a particular location to the end of the string. If a suffix in the string S starts at the location ‘i’ to the end of the string S, then the suffix can be represented as Suffix(i)=S[i,Len(S) ][27] . Let us understand how the strings can be compared. The comparison in this paper followed â€Å"dictionary comparison† If u and v are the two different strings. Comparing the strings u and v is same like comparing u[i] and v[i], where ‘i’ starts with the value 1. Ø Here string u is equal to string v i.e., u=v when u[i]=v[i] Ø String u is greater then string v i.e., u>v when u[i]>v[i] Ø String u is less than string v i.e., u But the results were still not obtained for i>len(u) or i>len(v) Also if len(u)>len(v) then u >v, if len(u) Suffix-array: suffix-array is denoted by SA. It is a one-dimensional array. It is an array of SA[1], S[2], SA[3],†¦. And so on. Here s[i] Rank-array: rank-array is nothing but SA-1. If SA[i]=j, then Rank[j]=i. we can say that the rank[i] saves the rank of Suffix(i) in an ascending order for all the suffixes. In this paper the author has taken the example of string â€Å"science† and explained everything clearly. The string â€Å"science† can generate seven suffixes. They are: Suffix(1): science Suffix(2): cience Suffix(3): ience Suffix(4): ence Suffix(5): nce Suffix(6): ce Suffix(7): e When we sort out everything in a dictionary order it will be in the order as follow Suffix(6)= ce Suffix(2)= cience Suffix(7)= e Suffix(4)= ence Suffix(3)= ience Suffix(5)= nce Suffix(1)= science Suffix-array algorithm follows multiplier ideas. Firstly get SA1 and Rank1 by comparing every character in the string. Comparing string is similar to comparing the every character sequentially. So by comparing every character, SA1 and Rank1 can derive SA2 and Rank2. And this SA2 and Rank2 will derive SA4 and Rank4. And this will again derive SA8 and Rank8. So finally suffix-array and rank-array are derived from this process. The main process of the suffix-array algorithm is Ø Calculating SA1 and Rank1. Firstly all the suffixes are arranged in the first letter order and then suffix-array (SA1) is generated by using quick sorry algorithm and then Rank1 is also generated. Ø Comparing 2k-prefix Suffix(i) and Suffix(j) using SAk and Rankk. 2k-Suffix(i) = 2k-Suffixes(j), this is equivalent to Rankk[SAk[i]] = Rankk[SAk[j]] and Rankk[SAk[i+k]] = Rankk[SAk[j+k]] 2k-Suffix(i) Suffix-array algorithm is a sorting algorithm which sorts out the characteristic string. So, this uses binary search algorithm. The algorithm follows Step 1: in the first step values are assigned like left=1, right=n and max_match=0 Step 2: the middle value i.e., mid= (left +right)/2. Step 3: comparing the characters corresponding to Suffix (SA[mid]) and P. the longest public prefix r can be helpful in implantation and comparison. If r > max_match, then max_match=r. Step 4: if Suffix(SA[mid])   If Suffix(SA[mid])>P, then right=mid-1   If Suffix(SA[mid])=P, then go to step 6 Step 5: if left Step 6: if max_match= m, then print â€Å"match is successful†. 3.1.4 REORGANISING THE CHARACTERISTIC STRING: In this step the characteristic string is reorganised. If the character string is divided into two different data blocks, then the data block with the partial characteristic string is stored. Basically, all the information about the data block like index, beginning offset, length of the block and so on are contained at the head of the each block. Here a structure piece is defined which consists of index of the block, beginning offset of the block offset, length of the character array head and the length of the character array end[18]. Initially each and every data packet is compared with the characteristic string for matching. If it is matched then the warning or an alert is sent to all the users about the worm. Here if the tail of the characteristic string of the worm matches with the head of the data block, then it will be stored in the character array end. And if the head of the characteristic string of the worm matches with the tail of the data block then it is stored in the corr esponding character array head. Suppose if the neighbouring data block contains a partial characteristic string of the worm then the neighbour string in the array head as well as in the end will be reorganised. Now this reorganised string will again perform the characteristic string matching and if any worm is detected then again the warning is sent to all users saying that the worm have found. If it is not matched then it won’t perform any operation. If in a case that the characteristic string is present in the block but is divided into two different data packets, then a special term called â€Å"character array† is introduced. First the matching mechanism is performed in both the data packet. If the matching characteristic string is found then the warning is sent to the users that there is a worm present. But if only part of the characteristic string is found then it will be enough if it meets some of the requirements like the head of the data packet should match wit h the tail of the characteristic string or the tail of the data packet should match with the head of the characteristic string. But if these conditions are not satisfied then no operation is performed. Now, if the tail of the data packet contains the partial characteristic string then the data packet is stored in the array. If the length of the characteristic string is m, then the Array[m] is set as ’’. And if the head of the data packet contains a part of the characteristic string then that data packet is stored in the n consecutive units of array. Finally, this array will be the characteristic string matching and if the worm is detected then the warning is sent to all the users. If it is not matched then nothing is done. 3.2 DETECTING UNKNOWN P2P WORM: In the above section we have seen how the known worm is detected. But that algorithm or mechanism are meant to detect the unknown p2p worms. So here in this section we will understand how the unknown worms can be detected and restrain the network. As we know in p2p networks a node can able to send the information to multiple hosts at a same time. Anyhow same protocol is used by all the nodes in the network[27]. These characteristics of the network helps worm to propagate easily. As we discussed above, only the known worms can be detected by using the characteristic string matching method. Here we will see how the unknown worms can be detected. The unknown worms are detected based on the behaviour of the node. Some of the detection rules are: same content files are transferred to multiple hosts in a very short time. Same protocol is used and the destination port is same. If these rules are satisfies by the source port then it allows the p2p worm to propagate. Now, it is necessary to e xtract the characteristics of worm near the worm propagation nodes. When these characteristics are extracted, they are added to the feature library. This data similarity comparison and extracting the characteristics are done using the LCSeq algorithm. But the LCSeq algorithm based on generalized suffix tree (GST) is the more efficient. The overall idea is that all the suffixes are represented as a tree. And this tree will have some characteristics like: Ø Every node in a tree is a string and root is the empty string Ø Every suffix can be represented as a path from the root. Ø Every substring can be considered as a prefix of a suffix. Ø To achieve the searching public sub sequence, every node should be set the information of its subordinate source string. 3.3 EXPERIMENT: We know that the worm body tries to infect the other nodes in the network by sending the worm to the specific ports of p2p node. So here the author tried to prove the efficiency of his method by performing an experiment. In this experiment he prepared a multiple group worm body and sent it repeatedly at regular intervals of time. Then he captured these packets and extracted their characteristics and compared it with the one that already exist in the feature library. P2p worm is detected separately using different algorithms like BF algorithm, KMP algorithm and suffix-array algorithm and compared their results doing three experiments. In the experiment 1, worm characteristics are in the same packet.. in the experiment Security Issues in Peer-to-peer Networking Security Issues in Peer-to-peer Networking ACKNOWLEDGEMENTS: The interest in the field of networking, driven me to take the computer networking as my course in M.Sc. there are many different types of networks. Out of them the more popularized and upcoming trend of networks are peer-to-peer networks. This report of my final dissertation for the partial fulfilment of my M.Sc, computer networking, would not have been possible without the support of my supervisor, Mr. Harry Benetatos. He helped me a lot by guiding me and pin-pointing the key mistakes which I have done during my research. My course leader Mr. Nicholas Ioannides also helped me a lot to complete this dissertation. His advises and suggestions gave me a lot of encouragement and support which made me do this research and finish it in time. I am very thankful to my university, LONDON METROPOLITAN UNIVERSITY which provided me the free access to the IEEE library which helped me to find the key papers which are very useful for my research. I also thank my parents for their support given to me in all walks of my life. DEDICATION: I dedicate this report to my parents and my well wisher Sakshi for their constant support and encouragement throughout my education and life. CHAPTER 1 PROJECT INTRODUCTION 1.1 INTRODUCTION TO THE PROJECT: This dissertation is all about the security issues in the peer-to-peer networks. There are many security issues in peer-to-peer networks. I have chosen to do research on worm intrusions in peer-to-peer networks. In this document I have mentioned how the worm propagates in the network from one peer to another peer, how the worm can be detected and how the detected worm can be attacked and save the network from getting infected. 1.2 AIM: Security issue in Peer-to-peer networks: Securing the peer-to-peer network from worms.   1.3 OBJECTIVES: Ø To understand how the peers communicate with each other in the peer-to-peer network Ø To analyse the propagation of worms in the network. Ø To detect the worms near the nodes of the network Ø To defence the worms in the network. 1.4 RESEARCH QUESTION: This document briefly discusses about how the worms propagates in the network and how can it be detected and attacked in order to save the peer-to-peer network 1.5 APPROACH: My approach for this dissertation is as follows: Ø Understanding peer-to-peer networks Ø Defining the problem Ø Data collection and analysis Ø Study and understanding the existing solutions for the problem Ø Comparing different solutions Ø conclusion 1.6 METHODOLOGY: This section of my document contains what important steps to be followed in order to achieve the mentioned objectives. It also helps to schedule how to develop and complete different parts of the dissertation. In this dissertation firstly I will study and understand about the peer-to-peer networks and how the peers in the networks communicate and share information with the remaining peer in the network. Then I do research on how the worm propagates in the network, how can the worm be detected and how the detected worm can be attacked and restore the network.   In the pictorial form the different stages of my dissertation are 1.7 PREVIEW ABOUT THE COMING CHAPTERS IN THE REPORT: The rest of the report is organised as follows: in the chapter 2, there is brief discussion about the peer-to-peer networks, different types of peer-to-peer networks, advantages and disadvantages of the peer-to-peer networks. There is also some information about the worms, its nature and different types of worms. In chapter 3, there is a discussion about the methods given by the different person to detect the worm in the network by the method of matching the characteristic string of the worm. In section 4, there is a solution for this issue. That is mathematical method of detecting the worm in the network and defending it. Chapter 5 consists of a critical appraisal and suggestions for the further work. Finally, I concluded in chapter 6. CHAPTER 2 OVERVIEW OF THE GENERIC AREA AND IDENTIFICATION OF PROBLEM: 2.1 NETWORK: Network is a group of electronic devices which are connected to each other in order to communicate which each other.   The devices can be computers, laptops, printers etc. networks can be wired or wireless. Wired networks are networks in which the devices are connected with the help of wires. Wireless networks are the networks in which the devices are connected without the wires. There are many different types of networks and peer-to-peer is one of the important and special types of networks. 2.2 PEER-TO-PEER NETWORKS: Peer-to-peer networks are emerged in 1990 because of the development of the peer-to-peer file sharing like Napster [1].   Peer-to-peer networks abbreviated as p2p networks are the networks in which all the nodes or peers in the network acts as servers as well as clients on demand. This is unlike typical client server model, in which the clients requests the services and server supplies the resources. But in case of peer-to-peer networks every node in the networks requests services like a client and every node will supply the resources like server on demand. Peer-to-peer network doesn’t need any centralized server coordination.   Peer-to-peer network is scalable. Addition of new nodes to the network or removal of already existing nodes on the network doesn’t affect the network. That means addition or removal of nodes can be done dynamically. All the nodes connected in a peer-to-peer network run on the same network protocol and software. Resources available on a node in the network are available to the remaining nodes of the network and they can access this information easily. Peer-to-peer networks provide robustness and scalability. All the wired and wireless networks can be configured as peer-to-peer networks. Home networks and small enterprise networks are preferable to configure in a peer-to-peer networks. Most the networks are not pure peer-to-peer networks because of they use some network interface devices. In the beginning, the information is stored at all the nodes by making a copy of it. But this increases the flow of traffic in the network. But now, a centralised system is maintained by the network and the requests are directed to the nodes which contains the relevant information. This will save the time and the traffic flow in the network. 2.3 WIRELESS NETWORKS: Devices connected to each other without any wires can also be configured like peer-to-peer networks. In a case of small of number of devices it is preferable to configure the network in wireless peer-to-peer networks because it will be easy to share the data in both the directions. It is even cheaper to connect the networks in wireless peer-to-peer because we do not need to spend on the wires. Peer-to-peer networks are divided into three types. They are: Instant messaging networks Collaborative networks Affinity community networks[2] Instant messaging networks: In this type of peer-to-peer networks, the users can chat with each other in real time by installing some software such as MSN messenger, AOL instant messenger etc. Collaborative networks: This type of peer-to-peer networks are also called as distributed computing.   This is widely used in the field of science and biotechnology where the intense computer processing is needed. Affinity community peer-to-peer networks: It is a type of p2p network, where the group of devices are connected only for the purpose of sharing the data among them. Peer to peer networks are basically classified into two types. They are: Ø Structured peer-to-peer networks Ø Unstructured peer-to-peer networks 2.4 STRUCTURED PEER-TO-PEER NETWORKS: In the structured peer-to-peer nodes connected in the network are fixed. They use distributed hashing table (DHT) for indexing [4]. In DHT data is stored in the form of hash table like (key, value). Any node willing to retrieve the data can easily do that using the keys. The mapping of values to the keys are maintained by all the nodes present in the network such that there will be very less disruption in case of change in the set of participants DHT-based networks are very efficient in retrieving the resources. 2.5 UNSTRUCTURED PEER-TO-PEER NETWORKS: In unstructured p2p network nodes are established arbitrarily. There are three types of unstructured p2p networks. They are Pure peer-to-peer Hybrid peer-to-peer Centralized peer-to-peer In Pure p2p networks all the nodes in the network are equal. There won’t be any preferred node with special infrastructure function. In hybrid p2p networks there will be a special node called â€Å"supernodes† [3] . This supernode can be any node in the network depending on the momentary need of the network. Centralized p2p network is a type of hybrid network in which there will be one central system which manages the network. The network cannot be able to work without this centralized system Basically, all the nodes in the peer-to-peer networks contain the information of the neighbour in its routing table. The rate of propagation of worms in the peer-to-peer networks is larger than compared to the other networks. This is because the information of the neighbour peers can easily achieved from the routing table of the infected node. Different types of files are shared between the nodes in the peer-to-peer networks. These files can be the audio files, video files, music files, text documents, books; articles etc. there are a lot of peer-to-peer software available these days in the market for sharing the files. Some of them are bittorrent, limeware, shareaza, kazaa, Imesh, bearshare Lite, eMule, KCeasy, Ares Galaxy, Soulseek, WinMX, Piolet, Gnutella, Overnet, Azureus (vuze), FrostWire, uTorrent, Morpheus, Ants, Acquisition[5]. There are lot more file sharing softwares in the market but these are the top 20 file sharing softwares for peer-to-peer networks. Basically, all the nodes connected together in the network should configure with the same network protocol and the same software should be installed in all the nodes in order to communicate with each other. Else the nodes in the network cannot communicate if they are configured with the different software or protocol. 2.6 ADVANTAGES OF PEER-TO-PEER NETWORKS [6]: It is more useful for the small business network comprising of very small number of computer systems or devices. Computers in this network can be configured easily. Full time network administrator is not required for the p2p networks. Easy maintenance of the network. Only a single operating system and less number of cables needed to get connected Can be installed easily Users can control the shared resources Distributed nature of the network increases the robustness of the network. 2.7 DISADVANTAGES OF THE PEER-TO-PEER NETWORKS [12]: No centralised administration Back-up should be performed on the each computer individually. Peer-to-peer networks are not secure Every computer in the network behaves as server and client which can slow down the performance of the system Legal controversy with the copyrights. 2.8 WORM: Worm is a computer malware program or it can be called as a mischievous code which can multiple itself   into several replicas or it duplicate itself into several copies. Worm in simple can be called as â€Å"autonomous intrusion agent† [19] .It doesn’t actually alters the function of the system but it pass through i.e., worm is unlike virus.   It intrudes the network without the mediation of the user. This is first detected by Robert T Morris in 1988[18]. Today we have some billions of systems connected to internet. Bu during 1988 there were only 60,000 systems connected to the internet. During that period 10% of the internet systems i.e., 6000 of the systems are infected and almost clogged because of the worms [8]. Worms when enters the system it hides in the operating system where it cannot be noticeable [18] . It drastically slows down the system the effect the other programs in the system. In worst cases it could even effect the entire network and slow down the internet across whole world. As it is said earlier that it replicates itself into multiple copies and attach itself to the emails and corrupt them and sometimes deleting the file without the user interaction. If it enters our email, it can able to send itself to all the contacts in our email book and then to all the contacts of the emails of our email book and likewise it propagates, grow and spread at the higher rate. Worms will even create the â€Å"backdoor† into the computer [11]. This will make the attackers to send spam easily. Some famous worms discovered in 2003 and 2004 are â€Å"Mydoom†, â€Å" Sobig† and â€Å"Sasser†[7].   â€Å"Sasser† worm has recently affected the computers which are using Windows 2000 or Windows XP operating system. It restarts the system automatically and crashes it. It is spread to all the nodes in the network. There are some worms which are unlike the normal worms. These worms are very useful to the user some times. Hence, these are called the â€Å"helpful worms† [9]. Sometimes they help users without the interaction with the user. But most of the known worms are harmful and will always tries to infect the nodes in the network and affect the performance of the network. When the peer-to-peer networks are attacked by the worms, it slows down the efficiency of the network. So there is a need to save the networks from entering into the network and spreading itself all over the network. The worms should be detected and defended. If we delay in defending these worms, they replicate itself and makes many copies of itself and spread all through the network. This is very dangerous to the network as it affects the performance and efficiency of the network [10]. CHAPTER 3 RELEVANT WORK DONE BY OTHERS IN ORDER TO SOLVE THE PROBLEM: Many people proposed solutions to this problem. First Zhou L gave solution to p2p worm and he observed that propagation of worm in p2p network is very speed when compared to other networks[13] . Jayanthkumar performed some simulations on worm propagation from infected node to other node[10]. Wei yu researched on the behaviour of worms in p2p networks[14]. In my research I found one more interesting method of detecting the worms in the peer-to-peer network. This is indeed a special method of detecting the worms in network because the authors Yu Yao, Yong Li, Fu-xiang Gao, Ge Yu in their paper titled â€Å"A Signature-behaviour-based P2P worm detection approach† they proposed a mechanism of detecting the known worms in the peer-to-peer networks based on characteristic string matching. Worm make use of vulnerabilities in the network and +Spreads[15]. They also proposed the detection mechanism for the unknown worms based on their behaviour. They technique mainly consists of the te chnology of characteristic string matching, identifying the application and the unknown worm detection technology. They have given the algorithm for the matching the characteristics string of the worm called suffix-tree algorithm- suffix array algorithm. This is efficient and simple with very less time complexity. As peer-to-peer network follows fragment transfer technique there is chance of assigning the characteristics string of the worm to the other blocks of data. And again during the reorganisation process this characteristic string can identify the worm. These authors even validated their results by simulation. They proved that their method is also one of the efficient methods of p2p worm detection. As mentioned above this method detects the known worm and also the unknown worms based on characteristic string matching and their behaviour respectively. In this method they initially capture the network packets using the library function called â€Å"LibPcap†. â€Å"LibPcap† is the library function that captures the network packets in UNIX and Linux platforms. This function contains many functions that will be useful for capturing the network packets. After capturing the data packets with help of these functions the non-P2P packets are filtered out. So now the P2P packets are filtered. In these P2P packets the known worms are detected by using the characteristic string matching. This is implemented by the couple of algorithms. They are the â€Å"suffix array algorithm† and the â€Å"dichotomy algorithm†. These algorithms are very accurate and are capable of detecting the worms in very less time. As I mentioned above peer-to-peer networks follow fragment transfer mechanism. Hence the characteristic string of the worm can be assigned to the other blocks of data. So, in this situation it is difficult to detect the worm if the characteristic string of the worm is based on the single packet. But if the characteristic string is present in the block then there is a chance of detecting the worm because it will assign it to the two packets. At this time the worm characteristic string present in the two different data packets need to restructure. After restructuring, the worm can be detected by using the matching mechanism. In this way the known worm in the network is detected by using the characteristic string matching. The unknown worms in the p2p network can be detected with the help of the act characteristics of the worm at the initial stage of its propagation. This can be called as the behaviour based detection of the unknown p2p worms. Like this all the known and unknown worms in the network are detected. 3.1 P2P KNOWN WORM DETECTION: There are four steps in detecting the p2p known worms. They are: Deal flow Technology of identifying the application Characteristic string matching Reorganising the characteristic string 3.1.1 DEAL FLOW: In this step of deal flow the flow of data is divided into four steps[16]. Step 1: Extracting the p2p data stream from the original data stream. Step 2: check the extracted p2p data stream for worms using characteristic string matching with the worms already existing in the library function. Step 3: data is flow is reorganised. It now contains worm characteristic string as well. Go to step 2. Step 4: check the data flow for unknown worms using unknown worm detection techniques. After performing the four steps update the library function. All the four steps is represented   pictorially as in the next page. Figure 4: flow chart representing four steps to detect worms   yes    normal  Ã‚  Normal no  Ã‚  Ã‚  Ã‚   Abnormal abnormal 3.1.2 TECHNOLOGY OF IDENTIFYING THE APPLICATION: As said earlier, this paper uses the method of capturing the data packets and sca it for the worms which are known with the help of a function library called â€Å"LibPcap†[17] . For this there should be already some assigned rules in the network interface devices. So assigning these rules to those devices is done in stepwise procedure as: Identify the available network interface devices Open the network interface device Compile the rules that we are willing to attach to the devices Setup the rules of filtering to the device Now operate the equipment Start the process of capturing the packets There are some rules for identifying the p2p application. They are: Characteristic information of the known p2p is used Sometimes, if source-destination IP pairs don’t use the known P2P and they may use TCP and UDP at same time, then they are p2p. At a particular time source pairs {srcIP, srcport}[27] and the destination pairs {dstIP, dstport}[27] are checked Here we can identify whether it’s a p2p or not. If the number of connection port is equal to the number of connection IP, then we can say that it is a p2p. There are the situations where these rules have been used unruly. So the there were some amendments made to these rules. The amendments are rule (2) can identify even the mazes which are present and rule (3) is modified in such a way that in the detect cycle {srcIP, srcport}[27] pairs at the source and the {dstIP,   dstport }[27] pairs at the destination are checked. From this they derived that if the number of connection port is equal to the number of connection IP, the protocols which are used are same. If they are different then the protocols are different. 3.1.3 CHARACTERISTIC STRING MATCHING: This is the most important section of the paper. Here authors have given some definitions to the terms which we are going to use, the algorithms which we are going to use to detect the worm. Couple of algorithms are mentioned. They are suffix-array algorithm and the dichotomy algorithm. So the entire process of detecting the worm depends on the efficiency and the accuracy of these algorithms. First of all before using and understanding suffix-array algorithm we will try to understand some keywords and rules. Suffix: suffix is the part of a string or a substring which starts at a particular location to the end of the string. If a suffix in the string S starts at the location ‘i’ to the end of the string S, then the suffix can be represented as Suffix(i)=S[i,Len(S) ][27] . Let us understand how the strings can be compared. The comparison in this paper followed â€Å"dictionary comparison† If u and v are the two different strings. Comparing the strings u and v is same like comparing u[i] and v[i], where ‘i’ starts with the value 1. Ø Here string u is equal to string v i.e., u=v when u[i]=v[i] Ø String u is greater then string v i.e., u>v when u[i]>v[i] Ø String u is less than string v i.e., u But the results were still not obtained for i>len(u) or i>len(v) Also if len(u)>len(v) then u >v, if len(u) Suffix-array: suffix-array is denoted by SA. It is a one-dimensional array. It is an array of SA[1], S[2], SA[3],†¦. And so on. Here s[i] Rank-array: rank-array is nothing but SA-1. If SA[i]=j, then Rank[j]=i. we can say that the rank[i] saves the rank of Suffix(i) in an ascending order for all the suffixes. In this paper the author has taken the example of string â€Å"science† and explained everything clearly. The string â€Å"science† can generate seven suffixes. They are: Suffix(1): science Suffix(2): cience Suffix(3): ience Suffix(4): ence Suffix(5): nce Suffix(6): ce Suffix(7): e When we sort out everything in a dictionary order it will be in the order as follow Suffix(6)= ce Suffix(2)= cience Suffix(7)= e Suffix(4)= ence Suffix(3)= ience Suffix(5)= nce Suffix(1)= science Suffix-array algorithm follows multiplier ideas. Firstly get SA1 and Rank1 by comparing every character in the string. Comparing string is similar to comparing the every character sequentially. So by comparing every character, SA1 and Rank1 can derive SA2 and Rank2. And this SA2 and Rank2 will derive SA4 and Rank4. And this will again derive SA8 and Rank8. So finally suffix-array and rank-array are derived from this process. The main process of the suffix-array algorithm is Ø Calculating SA1 and Rank1. Firstly all the suffixes are arranged in the first letter order and then suffix-array (SA1) is generated by using quick sorry algorithm and then Rank1 is also generated. Ø Comparing 2k-prefix Suffix(i) and Suffix(j) using SAk and Rankk. 2k-Suffix(i) = 2k-Suffixes(j), this is equivalent to Rankk[SAk[i]] = Rankk[SAk[j]] and Rankk[SAk[i+k]] = Rankk[SAk[j+k]] 2k-Suffix(i) Suffix-array algorithm is a sorting algorithm which sorts out the characteristic string. So, this uses binary search algorithm. The algorithm follows Step 1: in the first step values are assigned like left=1, right=n and max_match=0 Step 2: the middle value i.e., mid= (left +right)/2. Step 3: comparing the characters corresponding to Suffix (SA[mid]) and P. the longest public prefix r can be helpful in implantation and comparison. If r > max_match, then max_match=r. Step 4: if Suffix(SA[mid])   If Suffix(SA[mid])>P, then right=mid-1   If Suffix(SA[mid])=P, then go to step 6 Step 5: if left Step 6: if max_match= m, then print â€Å"match is successful†. 3.1.4 REORGANISING THE CHARACTERISTIC STRING: In this step the characteristic string is reorganised. If the character string is divided into two different data blocks, then the data block with the partial characteristic string is stored. Basically, all the information about the data block like index, beginning offset, length of the block and so on are contained at the head of the each block. Here a structure piece is defined which consists of index of the block, beginning offset of the block offset, length of the character array head and the length of the character array end[18]. Initially each and every data packet is compared with the characteristic string for matching. If it is matched then the warning or an alert is sent to all the users about the worm. Here if the tail of the characteristic string of the worm matches with the head of the data block, then it will be stored in the character array end. And if the head of the characteristic string of the worm matches with the tail of the data block then it is stored in the corr esponding character array head. Suppose if the neighbouring data block contains a partial characteristic string of the worm then the neighbour string in the array head as well as in the end will be reorganised. Now this reorganised string will again perform the characteristic string matching and if any worm is detected then again the warning is sent to all users saying that the worm have found. If it is not matched then it won’t perform any operation. If in a case that the characteristic string is present in the block but is divided into two different data packets, then a special term called â€Å"character array† is introduced. First the matching mechanism is performed in both the data packet. If the matching characteristic string is found then the warning is sent to the users that there is a worm present. But if only part of the characteristic string is found then it will be enough if it meets some of the requirements like the head of the data packet should match wit h the tail of the characteristic string or the tail of the data packet should match with the head of the characteristic string. But if these conditions are not satisfied then no operation is performed. Now, if the tail of the data packet contains the partial characteristic string then the data packet is stored in the array. If the length of the characteristic string is m, then the Array[m] is set as ’’. And if the head of the data packet contains a part of the characteristic string then that data packet is stored in the n consecutive units of array. Finally, this array will be the characteristic string matching and if the worm is detected then the warning is sent to all the users. If it is not matched then nothing is done. 3.2 DETECTING UNKNOWN P2P WORM: In the above section we have seen how the known worm is detected. But that algorithm or mechanism are meant to detect the unknown p2p worms. So here in this section we will understand how the unknown worms can be detected and restrain the network. As we know in p2p networks a node can able to send the information to multiple hosts at a same time. Anyhow same protocol is used by all the nodes in the network[27]. These characteristics of the network helps worm to propagate easily. As we discussed above, only the known worms can be detected by using the characteristic string matching method. Here we will see how the unknown worms can be detected. The unknown worms are detected based on the behaviour of the node. Some of the detection rules are: same content files are transferred to multiple hosts in a very short time. Same protocol is used and the destination port is same. If these rules are satisfies by the source port then it allows the p2p worm to propagate. Now, it is necessary to e xtract the characteristics of worm near the worm propagation nodes. When these characteristics are extracted, they are added to the feature library. This data similarity comparison and extracting the characteristics are done using the LCSeq algorithm. But the LCSeq algorithm based on generalized suffix tree (GST) is the more efficient. The overall idea is that all the suffixes are represented as a tree. And this tree will have some characteristics like: Ø Every node in a tree is a string and root is the empty string Ø Every suffix can be represented as a path from the root. Ø Every substring can be considered as a prefix of a suffix. Ø To achieve the searching public sub sequence, every node should be set the information of its subordinate source string. 3.3 EXPERIMENT: We know that the worm body tries to infect the other nodes in the network by sending the worm to the specific ports of p2p node. So here the author tried to prove the efficiency of his method by performing an experiment. In this experiment he prepared a multiple group worm body and sent it repeatedly at regular intervals of time. Then he captured these packets and extracted their characteristics and compared it with the one that already exist in the feature library. P2p worm is detected separately using different algorithms like BF algorithm, KMP algorithm and suffix-array algorithm and compared their results doing three experiments. In the experiment 1, worm characteristics are in the same packet.. in the experiment