Wednesday, July 31, 2019

Essay On Political Parties In India Essay

Posted in National Issues of India by Vijay Jaiswal On August 29, 2013. No comments In a modern democratic political system of India, with governments based on Parliamentary model, political parties are central to the working of the political system. Political parties in Indian Democracy grow up the as spokesman of organized interests. Thus a Political party system in India is an organization of like minded people based together either to preserve and promote group interests or to promote a particular ideology. Usually every party seeks to promote some particular interest and ideology. The political party constantly seeks to capture governmental powers to secure its ends. In a democracy, the party gets into power through elections. In a Parliamentary system such of India, the political party winning the majority of seats in the Lower House of the Parliament forms the Government, while the Party or Parties failing to get the majority constitutes the opposition. Thus the Parliamentary government is always a Party government. It may be the government of a single party or it may be the government of a coalition of parties. The nature of political party system in India was characterized by Morris Jhones as a dominant one party system. It means that India basically has a multi-party system but one among the many parties is dominant party and monopolizes governmental power. Since independence up to the 4th general election in 1947 this was precisely the picture. The Congress party was in power during all the twenty years from 1947-67 both at the centre and in the states with a brief exception in Kerala in 1958. The 1967 elections saw the fall of the Congress monopoly in several states where unstable coalitions were established. The sixth General Election in 1977 witnessed the fall of the Congress at the centre. The Janata Government was established. But the Janata experiment soon failed. For Janata was in reality an unstable coalition. The Congress gained back its power in 1980. Then there was a B.J.P. coalition government at the centre and in few states. On the basis of their influence and aspirations, parties in India fall into two categories: All India politicalparties and regional political parties. Thus the Congress (I) or the Jananta Dal or the Bharatiya Janata Party (BJP) – are truly All India parties having some sort of influence throughout India and having All India aspirations. There are some other political parties which are professedly All India parties but their influence is limited to particular regions. They may be classed us regional parties with All India aspirations. The Communist Party of India (Marxist), the Communist Party of India, the Forward Block, the Revolutionary Socialist Party (R.S.P) etc. fall into this category. The influence of the C.P.I. (M) for example is concentrated in West Bengal, Kerala and Tripura. The regional political parties are those which are frankly regional in their aspirations emphasizing their ethnic or linguistic identities. The D.M.K. or the A.I.A.D.M.K. in Tamil Nadu, the Telugu Desham in Andhra, and the A.G.P. in Assam or the National Conference in Jammu and Kashmir fall into this category. There are also some frankly communal parties like the Shib Sena emphasizing their religious identity. On the basis of ideology, Indian parties may be classified into conservative, liberal democratic and revolutionary parties. The B.J.P. for example is a conservative party. The Janata Dal and the Congress are liberal democratic parties. The Communist Parties, the Revolutionary Socialist Party etc. are revolutionary parties seeking restructuring of the society along Marxian Lines, while the B.J.P. may be said to occupy the extreme right position in the political spectrum, the Congress, the Janata Dal stand at the centre while the Communist Parties and  the R.S.P. occupy the extreme left position.

Tuesday, July 30, 2019

Aeneas and Jesus Essay

Roman ideal of pietas which Virgil’s Aeneas embodies the observance of what is due to the gods and men, and obeying one’s destiny (fate) or calling. In Virgil’s The Aeneid, Aeneas has no choice but to be devoted to the gods, while Jesus in The New Testament choices freely to be devoted to one god. Religion for the Romans was very tied up in ideas of obligations, not only to the gods, but to one’s family and nation as well. Aeneas preserves his sanity and the lives of his men, by stopping his own anxieties and desires to the demands of fate and the rules of piety. Religion in The Aeneid also involves making sacrifices and prayers to the gods. The idea was if you did that, the gods might like you and help you. The thing is they might also ignore you and mess up your life for no reason. Thus, when Aeneas tells Dido, â€Å"I sail for Italy not of my own free will,† he doesn’t mean that his fate is forcing him to go there. He means that he has an obligation (duty) to go there, which he is choosing to live up to. On the other hand, Jesus believes in one god. Jesus is completely devoted to his God and goes around teaching society about how good his God is. In the New Testament, Jesus has people or a following fully committed and devoted to God. The four Gospels describe Jesus’s life until his resurrection, and the remainder of the New Testament concerns itself with the community of followers of Jesus that steadily grows after his death. Concluding, Aeneas and Jesus are two different characters who have given their devotion to their own Gods. It was Aeneas’s piety or duty to carry his family with him to follow his devotion to the Gods. In contrast, Jesus uses his free will to teach us to follow his God. Aeneas has to sacrifice his free will to devote to his Gods because it is his fate while Jesus sacrifices himself voluntarily. ?

Monday, July 29, 2019

Is business bad for science & stop selling out science to commerce Essay - 1

Is business bad for science & stop selling out science to commerce - Essay Example The paper seeks to show that commercial influences on scientific research have become increasingly detrimental. First, commercial influences on scientific research have led to failure to release some of the scientific results seen as harming industries. For example, the results may be on danger posed by certain substances or drugs produced by companies. As a result, such companies are most likely to engage in a campaign that will ensure that such results do not come to the public limelight. A classical example is seen through Nancy Olivieri of Toronto University (Slaght & Pallant, 2006). Olivieri notes that that one of drug companies engaged in a campaign that she did not publish her results concerning a drug she found to have a high level of toxicity (Slaght & Pallant, 2006). The allegation is serious knowing that such drug will be in the public for use. Hence, this is not just unethical, but also detrimental to the public as it may lead to serious short and long term harm. Secondly, the influence of business on science has made it difficult for public to know how various advancements may be harmful to health and environment. Most of the research is done with little focus on the public concerns (Slaght & Pallant, 2006). The focus has been on ensuring their competitiveness, and business groups have been able to have their way with funding from bodies concerned with research. For example, genetic has been seen as playing a leading role in agriculture due to such influence. Hence, other environmental friendly approaches have been ignored such as minimal use of chemical fertilizers and pesticides (Slaght & Pallant, 2006). In addition, through funding most companies ensures that results are favorable to them. There has been damning evidence mostly in pharmaceuticals and biotechnology sectors. For example, it has been established that funders mostly choose scientists that are

Sunday, July 28, 2019

Describe the importance of angiogenesis for the development and Essay

Describe the importance of angiogenesis for the development and treatment of cancer - Essay Example More than a dozen dissimilar proteins have been recognized as angiogenic activators and inhibitors as well. The extent of appearance of angiogenic factors reveals the forcefulness of tumor cells fostering the cancer. The detection of angiogenic inhibitors should assist in lowering both morbidity and possible mortality resulting from carcinomas. A significant number of patients have obtained antiangiogenic therapy up to this moment. In spite of their speculative effectiveness, antiangiogeic treatments have not demonstrated advantageous in terms of long-term survival of patient and the mitigation of the carcinoma (Kerbel 2040). There is an imperative necessity for a new all-inclusive treatment approach merging antiangiogenic agents with conservative cytoreductive treatment in the regulation of cancer that poses as worldwide menace. Keywords: Angiogenesis, Prognosis, Immunohistochemistry Introduction Cancer is capable of spreading to bordering or distant organs and the organ systems, wh ich renders it a potential threat to life. The tumor cells can go through blood or lymphatic vessels. Additionally, they can then circulate through the intravascular stream, and then propagate at another site: metastasis. The development of the vascular network is imperative for the metastatic multiplication of cancer tissue. The processes in which new blood and lymphatic vessels result are referred to as angiogenesis and lymphangiogenesis, in that order (Shih, Lindley and Bevacizumab 1801). In this case both processes have a fundamental function in the generation of a new vascular net to supply nutrients, oxygen and immune cells into the system, as well as facilitating the elimination of waste products. The angiogenic and lymphangiogenic determinants are gradually more receiving consideration, particularly in the area dealing with neoplastic vascularisation (Gotink and Verheul 12). As per the above explanations, this exercise intends to describe the importance of angiogenesis for t he development and treatment of cancer. The description of the essence of the angiogenesis targets the provision of a comprehensive approach on the connection of the angiogenesis with cancer (Siemann 68). Therefore, it is logical to provide a comprehensive evaluation of the angiogenesis. Through this, it would be easier to understand the principles behind the operation and hence its exact means of development and cancer treatment by angiogenesis (Achen 550). Angiogenesis in Cancer Angiogenesis incorporate the formation of new blood vessels in a particular body tissue, tissues or organs (Nishida et al 213). The angiogenesis process entails the migration of endothelial cells, their growth and differentiation into tissues or specialized cells (Andre et al 178). The angiogenesis process is regulated by the bodily chemical signals (Cook p 232). The signals can foster both the repair of the deformed or damaged blood vessels and the creation of new blood vessels (Amioka et al. 416). The ch emical inhibitors are also chemical signals that intervene during the angiogenesis process and hence the formation of the blood vessels. Under the normal functionality of the body systems, the chemical signals are controlled so that the blood vessels are only formed at the required parts of the body organs (Boocock Charnock and Sharkey 512). Cancer only endangers life through the

Saturday, July 27, 2019

Daubert Standard Assignment Example | Topics and Well Written Essays - 500 words

Daubert Standard - Assignment Example From this essay it is clear that the Daubert standard states that the evidence should be reliable in nature; this means that the testimony provided by the expert witness should be obtained through a scientific method. According to the Supreme Court, an expert’s testimony is reliable if the scientific method used is testable, can be proved as false, and can be tested to be proved right or wrong. The testimony is even considered as reliable if it has been previously reviewed or is going to be reviewed in future by peers and it has an error rate attached to it already and the testimony or the finding should be acceptable by the community of science.This study outlines that  the crime scene investigators found two different sets of paints on the victims jeans, one paint was from the wall of the victim’s house and the second paint was from an unknown source. The forensic lab decided to figure out whether both the paints were from the same source or not. They developed a hy pothesis stating that both paints were from different sources and then they developed a null hypothesis stating that both the paints were from similar source.  The lab conducted various scientific tests to validate their hypothesis and prove that the paints were from different sources. The tests proved that the paints actually were from two different sources and the paints are not same. This test could have even proved the other way around that the paints were from the same source if other scientifically validity tests were used.

Friday, July 26, 2019

Afro-Latin-Anerican Political Leaders Research Paper

Afro-Latin-Anerican Political Leaders - Research Paper Example Political modernity entails the aspirations to a better future as well as ideals for political and legal equality. To this end, Afro Latin American leaders are well remembered for their fight for racial equality, lack of government attention to their problem, predominant poverty and hardship. Evidently, the Latin American slavery is believed to have lasted longer and exhibited much more intensity than the United States. To this end, the early 15th century was synonymous with the enslavement of the Blacks by the Spaniards and Portuguese. This occurred even before the Columbus expeditions. The 1880’s marked the end of slavery in Latin American following abolishment by Brazil and Cuba2. There exists much less attention accorded to Afro-Latin American after the end of the colonial era. This has largely been due to the failure of recognition or identity crisis. Furthermore, more attention has normally been focused on Afro-American leaders in the fight of equality as compared to the ir Afro-Latin American counterparts. It is of interest to note that there have been national political leaders of African descent in a majority of Latin American countries. This has been evident in the early part of the twentieth century as well as late nineteenth century. Moreover, such Afro-Latin American leadership has been evident despite of the existence of strong racial discrimination.. However, a number of Latin American countries have been preoccupied with historical motives of curbing the political power among the huge segment of poor and working class people. Evidently, literacy requirements for voting were maintained by a majority of the Latin American governments after independence ... Afro Latin American Participation in Political Leadership Over a period of 30 year, Afro-Latin Americans have attained considerable gains in political organization, social movement activism, and mobilization. To this end, Afro-Latin American political leader and civil rights groups have been at the forefront in agitating against discrimination, racial prejudice and other forms of inequality. This was a stark contrast to the early 1970’s in which there was very minimal political activity by black groups4. Evidently, many Afro-Latin Americans were being oppressed in authoritative regimes from 1960’s to 1980’s. Presently, the existence of political-social movements that brought together Afro-Latin Americans have been in existence in every sub region of America such as Southern Cone, Central America, Caribbean, Andean and every other Latin American country. These movements have garnered political success in agitating for better economic and educational opportunities, racial equality and denouncing racism. The Afro-Latin political leadership within the black movements has taken a step further in addressing their concerns through churches, community, associations, labor unions, political parties, civic organizations and other social movements5. Furthermore, they have been successful in lobbying governments for public policy, resources and specific legislation at the local, state, national and international levels. To this end, Afro-descendants have gained more visibility, respect and acknowledgement in Latin America. However, the Afro-Latin American political groups are not properly structured or organized. To this end, some of them exhibit disconnect and insufficient synergy among members and leaders; the wider black communities and the

Fair trade Essay Example | Topics and Well Written Essays - 1500 words

Fair trade - Essay Example World trade has been increasing at an average rate of six percent for the last 20 years, which is twice the rate of world output. The integration of the world economy with the help of trade has lifted the living standards of the people within these developing nations, which is a positive sign. Sustained and consistent economic growth requires policies that can open trade and investment with the rest of the world. There is proof to it and it is that there has not been a single nation that has achieved economic stability without being open to the world for trade. International trade requires liberalization, i.e., openness to all and sundry within the world no matter what. The living standards are in direct proportion with them. There is a high need to promote and liberalize the manner in which trade is carried out within the world economy. It needs to be more generous to everyone and anyone as well as helpful for the developing nations so that more and more trade is carried out between the economic world markets. (Miles, 2006) Agriculture is one such example of being more liberal for the international trade market. Liberalization by both industrial and developing nations is necessary to realize trade’s potential that acts as a driving force for economic growth and de velopment. It is up to the industrial and developed nations to be more broadminded towards the developing ones so that trade barriers are removed in the wake of open trade between all the countries listed in the economic world. Fair trade is a social movement which is organized in nature and it basically presents a model which is accepted worldwide. It comes directly under the norms of the international trade regimes whereby it promotes payment of a fair price in accordance with the social and environmental standards in different areas of production related with goods and supplies. Fair trade has the emphasis on exporting goods and

Thursday, July 25, 2019

Societies Degrees of Mental Wellness Essay Example | Topics and Well Written Essays - 1000 words

Societies Degrees of Mental Wellness - Essay Example Here, one can start considering the multitudes of psychological testing they endured before expiration. Then, familiar pop-culture icons are useful in bringing reality to the subject of insanity which, he says, has inoculated all of society. So, those interested in the extremes of horror for their personal entertainment become news headline. Those indulging in such primal insanity bring personal fears up front, close and personal because they were never caught. He also reinforces those warnings the parents and caregivers pass onto their children, as they venture out into a world where everyone is dealing with issues of psychological wellness to some degree, leaving individuals ill-equipped to identify people like those who got away with it. Upon the review of his literary and cinematic stories, it gives one pause when trying to pin point him on his own mental illness scale. Therefore, horror entertainment fanatics are targeted by Stephen King, as he introduces them to what he calls a totally mentally ill society. He shows how all the forms of horror entertainment allow followers to savor their individual mental illness without repercussions, because they are authorized by pop-culture idols and logically ingested by his use of deep-seated analogies, which leave the audience with a humorous look at our society as being made up of a population of the mentally ill. When the analysis turns the reader to seek out and determine the normal, conservative reactionaries, King directs them to pop-culture icons. First, by showing in the horror film junkie what real ugliness is; then, he shows the beauty that a lot of people aspire to and, in turn, lets them know that no one could never be truly ugly†¦Ã¢â‚¬Å"Freda Jackson as the horrible melting woman in Die, Monster, Die! confirms for us that no matter how far we may be removed from the beauty of a Robert Redford or a Diana Ross, we are still light-years from true ugliness.†Ã¢â‚¬ ¦ (King, line 8). To explain this , Freda Jackson is perceived as a melting woman in Die Monster, Die! substantiates that no matter how far we may be away from the beauties of Diana Ross or Robert Redford, we are not even close to being ugly. This also results into feeling re-establishment of ordinarily; the horror film is essentially traditional and reactionary. This leaves those who watch such films to sit back and simply get entertained and have fun, only that this type of fun is unique in its coming from seeing other menaced and even occasionally killed. This has led to some critics suggesting that horror film has been turned into public form of execution. As King complements readers on their behavior, people are only there to enjoy each other and to clarify one's reality of normalcy. He says, â€Å"I think that we’re all mentally ill; those of us outside the asylums only hide it a little better – and maybe not all that much better, after all.†Ã¢â‚¬ ¦ (King, line 1). Something worth noting i s that everybody is insane; what brings the difference amongst them is the degree of sanity. It is at this point that the severely insane part of society is acknowledgeable by those who have not expired at their hands, or otherwise. For instance, there are those capable of carving women, like in the case of Jack, â€Å"were the likes of Jack the Ripper, the Cleveland Torso Murderer, we clap you away in the funny farm (but

Wednesday, July 24, 2019

Essay Questions Example | Topics and Well Written Essays - 750 words - 11

Questions - Essay Example On the other hand, efficiency depends on the time an organization or its employees take to execute a task. An efficient organization has its employees executing tasks within the shortest time possible and utilizing resources optimally. In other words, the employees use the minimum amount of resources to get optimal results. For example, an efficient manager uses emails in communicating with the employees while an inefficient manager uses letters. Both effectiveness and efficiency are equally important for the organization to achieve a high level of success. For example, using the minimal resources to produce goods and services improves performance. Additionally, consistent results improve performance. They enhance consumer satisfaction thus increasing the demand for the goods or services. The managers can improve both effectiveness and efficiency at the same time. For example, they can achieve this by hiring the right workforce to do the right job. Such an employee would not only ensure consistency in results, but would execute his tasks at the minimum time possible. Through this, the organization will attain consistent results using the minimal resources as possible. Both would enhance the organization’s performance. In October 2014, Wal-Mart announced that it would cut benefits for all the associates that are working less than 30 hours a week. This is unethical for a company that has been in the news for numerous unethical practices over the last a few years. Labor activists are blaming the company for the unfair pay for its workers. According to the activists, the retailer focuses on employing low wage employees, part-time. The employees are crying over low wages (nytimes.com). Some of them cannot even afford the basic needs. This is unethical because it is the responsibility of an organization to ensure that their employees are living a decent life, by paying them a fair salary. In the

Tuesday, July 23, 2019

Operation Management Essay Example | Topics and Well Written Essays - 2500 words

Operation Management - Essay Example 55% were satisfied and 10% were dissatisfied. Operations management of the hotel should focus on improving the quality of service so that the proportion of dissatisfied customers is reduced. The objective of operations management is to create 99.99996% customer satisfaction. This objective is not being currently achieved by the operations management. If service quality is improved, then it will increase the room occupancy (currently at 75%) and profitability further. Table of contents: 1. Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..3 2. Research Methodology†¦Ã¢â‚¬ ¦.4 3. Brief description of the specific features of the hotel which had a bearing on my analysis and were not included in the description provided†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦4 4. General Analysis of the hotel†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..5 4.1 Design†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦5 4.2 Planning in operations management of the hotel†¦Ã¢â‚¬ ¦6 4.3 Supply chain management†¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..6 4.4 Shop-floor control†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.6 4.5 Environmental best practices in the hotel†¦Ã¢â‚¬ ¦.7 4.6 Technological issues in operations management†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8 4.7 Quality management as part of operations management†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.8 4.8 Benchmarking†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..9 4.9 The use of the philosophy of ‘ lean’†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.9 4.10 Business process Re-engineering in the operations management†¦Ã¢â‚¬ ¦.11\ 5. Analysis of one area of special focus†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.13 6. ... This is followed by qualitative and quantitative analysis. There is a general analysis of the operations management of the hotel. This is followed by the analysis of the quality of service of the hotel. The aim of this study is to understand in-depth the operations management of the five star hotel and to make appropriate recommendations. 2. Research Methodology: The research methodology includes both primary and secondary research. The primary research was conducted by visiting the premises of the hotel and directly observing the operations management at the hotel. It also included a survey of about 20 guests of the hotel. The secondary research was done by delving into books, academic sources and other reports concerning the hospitality sector and operations management. The data and information collected were analyzed qualitatively and quantitatively. 3. Brief description of specific features of the hotel which have a bearing on my analysis and were not included in the description given: The areas of service quality, costs and room occupancy were not mentioned in the description provided. There was also no mention of the supplies used by the hotel. These areas have a special bearing on my analysis. A customer survey was also undertaken. The recommendations are based on this survey. 4. General Analysis of the hotel: 4.1 Design (product and facility): Product design is one of the critical issues of operations management. It is product design that determines the characteristics and features of a product and how well the product functions (Dyson, Robert G, 2000). Facility design determines the capacity, location and layout of the production or service facility (Krajewski, L.J., and L.P. Ritzman, 1993). The five star hotel is located in

Monday, July 22, 2019

School bullying Essay Example for Free

School bullying Essay Bullying is the use of force or coercion to abuse or intimidate others. The behavior can be habitual and involve an imbalance of social or physical power. It can include verbal harassment or threat, physical assault or coercion and may be directed repeatedly towards particular victims, perhaps on grounds of race, religion, gender, sexuality, or ability.[2][3] The victim of bullying is sometimes referred to as a target.( Wikipedia), also according to stopbullying.gov bullying is unwanted, aggressive behavior among school aged children that involves a real or perceived power imbalance. The behavior is repeated, or has the potential to be repeated, over time. Both kids who are bullied and who bully others may have serious, lasting problems , and another statement from childparenting.com bullying is intentional aggressive behavior. It can take the form of physical or verbal harassment and involves an imbalance of power (a group of children can gang up on a victim or someone who is physically bigger or more aggressive can intimidate someone else, for instance). Bullying happen in different places but according to Wikipedia Bullying is a common occurrence in most schools. According to the American Psychological Association, approximately 40% to 80% of school-age children experience bullying at some point during their school careers.[16] Regardless of the grade level, socioeconomic environment, gender, religion, or sexual orientation, bullying can happen to anyone. However, various studies point out that students from lower socio-economic backgrounds are more bullied than students from higher socio-economic background. Most children experience bullying at some point in their academic careers. The following is a list of statistics that illustrate the severity of bullying within classrooms:[16] * 20-40% of bullying victims actually report being bullied * 70% of middle school and high school students experience bullying in school * 7-12% of bullies are habitual and pose a serious threat * 23% of 9th graders have carried a weapon to school recent ly[18] * 5-15% of students are constantly bullied * 27% of students are bullied because of their refusal to engage in common sexual practices * 25% of students encourage bullying if not given proper education and support in anti-bullying techniques[15] Due to the low numbers of students who actually report incidents of bullying, teachers need to have a certain level of awareness that will thwart any potential problems. This awareness starts with understanding bullying. Bullying can happen in school, so it is the responsibility of students to protect their classmates and to show everyone the dignity and respect they would like to be treated with. The first line of defense in bullying is in student’s own behavior. But when that fails, it must be brought to the attention of someone in authority, like a teacher. The concept of someone in authority failing to address the problem is simply not acceptable. This is why you must speak to a teacher you trust and know will do something to stop the bullying. There are different kinds of bullying; one of those is verbal bullying. Verbal bullying mostly happen in schools. In many cases, verbal bullying is the province of girls. Girls are more subtle (and can be more devastating), in general, than boys. Girls use verbal bullying, as well as social exclusion techniques, to dominate others and show their superiority and power. However, there are also many boys with subtlety enough to use verbal techniques for domination, and who are practiced in using words when they want to avoid the trouble that can come with physically bullying someone else.( bullyingstatistics.org). Examples of this are name calling, insults, teasing, and intimidation, homophobic or racist remark. In the Philippines, it is common to have a group of friends and teased those people who are isolated. One example that shows verbal bullying happens in schools is the news regarding the teacher who bullied her disabled students, the today shows reported the incident and the recorded tape said: Wilt, who did not respond to requests for an interview, can be heard on the recordings alongside Chaffins calling Cheyanne â€Å"lazy† and â€Å"dumb.† â€Å"Cheyanne, are you kidding me? Are you that damn dumb? You are that dumb?’’ Chaffins can be heard saying in one instance. â€Å"Oh my God. You are such a liar. You told me you don’t know. It’s no wonder you don’t have friends. No wonder nobody likes you because you lie, cheat.’’ On the other hand, the more serious and dreadful regarding the issue of bullying is the physical bullying, About 42 percent of kids have been bullied while online with one in four being verbally attacked more than once, 80% of the time, an argument with a bully will end up in a physical fight, 43% fear harassment in the bathroom at school. Physical bullying mostly happens between boys. It is usually their way of getting their anger out. Physical bullying can be pinching someone on the arm, to kicking someone in their stomach, and everything in between. Physical bullying is also stealing or destroying someone else’s property. According to Wikipedia.com, cyber-bullying is defined as: â€Å"when someone repeatedly makes fun of another person online, or repeatedly picks on another person through emails or text messages, or uses online forums and postings online intended to harm, damage, humiliate, or isolate another person whom they don’t like.† Online bullying, termed â€Å"cyber-bullying†, happens when teens use the internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person. Cyber-bullying researchers, Hinduja and Patchin define cyber-bullying as â€Å"willful and repeated harm inflicted through the medium of electronic text†, and recently updated the definition to account for cyber-bullying through internet that occurs without actual text, such as videos being uploaded from â€Å"You Tube† for example. In schools, bullying may take the form of repeated name-calling, physical abuse, and continually making fun of diff erences. In the workplace bullying may be characterized by harassment, scapegoating, name-calling, physical abuse, or unfair work pressures. Although people who bully exude a tough exterior, they are often motivated by insecurity, feelings of social rejection, lack of control, and stress. Stressors that can motivate a person to bully include poor academic or work performance, an unsupportive peer network, and strained parental relationships. Commonly, people who bully have been the victims of abuse and express their anger by directing it toward others. Bad behavior frequently gets more attention then good behavior; the need for attention may influence a person to act out and bully another individual. According to abs-cbn news site, In a study led by Plan International and Unicef on Violence Against Children in Public Schools in 2009, it revealed that 4 out of 10 children in Grades 1 to 3 and 7 out of 10 in both Grades 4 to 6 and high school have experienced some kind of violence in school. The study also said that verbal abuse is the most prevalent form of violence experienced by children at all school levels. This includes being shouted at and being cursed, ridiculed, teased or humiliated. It also revealed that children experience violence both from their peers in school and from school personnel. Reccie Oliveros, a volunteer for Volunteers International for Development, Education and Service of Young People and Women (VIDES), has for many years dealt with children who have been bullied as well as the bullies themselves. She said some signs that your child is being bullied are when he or she becomes iyakin, biglang tumatahimik, may fear sa mukha, ayaw ng manood ng mga violent shows. Yung iba ayaw ng pumasok sa school. Oliveros said parents should talk to their children who are victims of bullies. Tanungin ang anak, baka may nasabing di maganda, may nagawa na di sinasadya. Tapos kausapin ang teacher at tapos hikayatin sila na dalawin ang pamilya ng batang bully, she said. Oliveros said the bullies usually have problems at home like parents who are absent all the time. Insecure sila. Kulang sa atensiyon. Minsan nam-bubully pag walang pumapansin sa kanila, said Oliveros. Social factors also contributed in bullying, In two studies, McKown and colleagues had a total of 284 children, ages 4 to 16 years old, watch movie clips and look at photos before judging the emotions of the actors based on their facial expressions, tones of voice and body postures. Various social situations were also described and the children were questioned about appropriate responses. The results were then compared to parent/teacher accounts of the participants friendships and social behavior. Kids who had social problems also had problems in at least one of three different areas of nonverbal communication: reading nonverbal cues; understanding their social meaning; and coming up with options for resolving a social conflict. A child, for example, simply may not notice a persons scowl of impatience or understand what a tapped foot means. Or she may have trouble reconciling the desires of a friend with her own. It is important to try to pinpoint the area or areas in a childs defici ts and then build those up, McKown explained. When bullying continues and a school does not take action, the entire school climate can be affected. The environment can become one of fear and disrespect, hampering the ability of students to learn. Students may feel insecure and tend not to like school very well. When students don’t see the adults at school acting to prevent or intervene in bullying situations, they may feel that teachers and other school staff have little control over the students and don’t care what happens to them. The effects of bullying are so devastating and profound that over the last few years at least 37 state laws against bullying have been adopted. There have also been civil suits brought against schools and school systems over bullying incidents, some with damages in the millions of dollars. It is important to realize that, like sexual harassment and racial discrimination, some forms of bullying are illegal actions. Bullying is a serious issue that will impact the school experience of all children involved. This is why it must be taken seriously and effective measures to prevent it must b e put in place. Van der Kolk, McFarlane, and Weisaeth (2007) state, â€Å"Trauma in childhood can disrupt normal developmental processes. Because of their dependence on their caregivers, their incomplete biological development, and their immature concepts of themselves and their surroundings, children have unique patterns of reaction and needs for intervention.† Many of the children who are affected by traumatic stressors such as bullying can have their developmental processes and parts of their brains affected by the traumatic events (Ziegler, 2002). Many psychologist said that bullying is related to the person’s view of him/her self according to Tammy Wilgenbusch, a clinical psychologist with University of Iowa Childrens Hospital, said that at this age, children are developing their personalities and independence so they may be more likely to take their insecurities out on or try to wield power over others. By later adolescence, they have a better sense of self and are less likely to take insecurities out on others, Wilgenbusch said in a statement. Bullying is a negative or aggressive act that is systematic and ongoing that can be instigated by one person or a group of individuals, Wilgenbusch explained. Meanwhile if bullying can cause a stress and anxiety, it has a lot of tendency lead to suicide attempts. The statistics on bullying and suicide are alarming, suicide is the third leading cause of death among young people, resulting in about 4,400 deaths per year, according to the CDC. For every suicide among young people, there are at least 100 suicide attempts. Over 14 percent of high school students have considered suicide, and almost 7 percent have attempted it. Bully victims are between 2 to 9 times more likely to consider suicide than non-victims, according to studies by Yale University. According to statistics reported by ABC News, nearly 30 percent of students are either bullies or victims of bullying, and 160,000 kids stay home from school every day because of fear of bullying. The correct definition to this question is bullycide is suicide caused from the results of bullying. Children and teens who are bullied live in a constant state of fear and confusion in their lives. Many feel the only way to escape the rumors, insults, verbal abuse and terror is to take their own life. Bullycide is clearly a serious issue. Bullying has been a major topic since last year in mainstream media news and has become a problem everyone is taking awareness on — more than ever these days. Kids and teenagers are scared to talk about the issue they are facing. It even happens with high school students, where according to U.S. News studies done by the National Center for Education Statistics states that, only a quarter of high school students speak out on being bullied. There are various things that a parent or teacher can do to teach their children and their students about the effects of bullying. Information on the facilities and action that can be taken to educate the young can be found in the Scholastic article, â€Å"Bullying and Teasing: No Laughing Matter† that explains the issue to parents. From my own personal experience with bullying for nine years, victims are set to believe students/kids become bullies because of their insecurity and issues at home, which they cast on the victims; which usually turn out to be the school â€Å"underdogs.† From my own experience, I noticed that when victims, such as myself, approach a counselor or someone else for help in school, we hear the bullies are trying to take their own rage and aggression due to insecurity or personal problems at home out on the victims. Serious action and consequences however are not being taken by counselors, and/or deans until the situation of bullying goes to the extreme, forcing the school in jeopardy of getting a bad reputation for bullying. Even though the idea that, bullying is wrong can be taught through anti – bullying organizations, and advocates against bullying, we also have to realize there are problems that the perpetrator is facing and needs help with. Therefore, while helping the victim, the perpetrator should also be helped. With so much awareness on bullying by mainstream media news, there have been various organizations that have made it their mission to put an end to bullying. A couple of years ago, anti-bullying organizations, including STOMP OUT Bullying and Champions Against Bullying took a stand to bring awareness to this problem. However, the effects of bullying, like Ty’s case, has brought more awareness to this problem which is making organizations come together to teach the youth on why bullying is wrong. Therefore, and organization made up of 52 other organizations was created in April 2011 called â€Å"Be a STAR Alliance. Be a STAR Alliance was founded by the Creative Coalition and World Wresting Entertainment (WWE) to educate children on bullying. Even though some might take what WWE is doing as promoting bullying when they are doing their wrestling shows, they strongly continue to advertise what they do is being done in a safe environment by trained professionals and should not be done at home, school or anywhere else. Ironically, the WWE is promoting bullying through wrestling but they are doing this to entertain fans through wrestling not to promote bullying. As a victim of bullying, I have joined the Be a STAR Alliance organization and its partners to bring awareness on bullying as well as to end it. Be a STAR Alliance has a pledge they encourage members and others to take to put an end to bullying through their Public Service Announcements (PSA). The way to put an end to bullying is to educate young students who will form the next generation. If they get educated to not be a bully from their youth, then they will know how to show tolerance and respect to their friends, peers, and anyone they meet in their lifetime. That is exactly what the goal of the alliance is. Be a STAR stands for Show Tolerance and Respect; hence STAR is capitalized due to the value of the letters for this organization. At the same time, there are steps and help for both victims and perpetrators that need to be strictly enforced in a school environment. With bullying on the rise, more student, parents, and educators are encouraged to take a stand by organizations like Be a STAR alliance to put an end to bullying. Hopefully, with more people and organizations standing up to stop bullying, everyone can put their foot down to end this problem once and for all so the effects of bullying stops short of death or suicide for children, as in Ty Smalley’s case. Bullying behaviour is seen all over the world and almost in all sections of society. It might start at an age as early as preschool and might intensify in the transitional teenager years. There can be various reasons behind this kind of aggressive behaviour. Often the victim is shy and introvert and weak in built as compared to bully. On the other hand, bullying is a behaviour which does not necessarily demand a great built. A bully tries to attract the attention of others in a negative manner. It can be correlated with attention deficit hyperactivity disorder. Similarly children coming from aggressive or disturbed family background showcase the bullying behaviour. Sometimes bullies just gives around what they have been through as retaliation. The affected child is most of the times submissive and docile in nature. It is extremely hard to identify if the child is facing bullying at school or community. Generally the affected children don’t talk with their parents about the incidences. They are either too scared or feel embarrassed to admit such behaviour happening to them. But parents might notice a quite withdrawal of the children from daily situations. The kid may repeatedly complain of false aches and avoid going school. Frequent crying or getting upset often over trivial matters is also sign of bullying. Any kind of unexplained bruises or abnormal behaviour of the children must be checked and investigated thoroughly. On identifying the problem the foremost thing is to build confidence in the child. It is important to make him understand that he is listened to and his feelings are respected. Pay attention to each and every detail the child narrates. Sometimes it is hard to identify the gravity of the situation and any loose thread may lead to serious consequences. School authorities, or teachers, or counsellors at school may be approached regarding the matter. If necessary, parents of the bully can also be approached but it is always advisable to do so in front of counsellors only. Bullying is a serious matter and should be strongly dealt with. Even if the child has not yet faced any such situation it is important to explain him such prevalent behaviours in the society and ways to tackle it. If left unattended, this childhood problem can have serious effects on the personality of the child throughout his life. Recent shootings at various schools in US are thought to be an expression of physical bullying only. This is enough to explain the gravity of the situation and early remedial measures should be taken. Bullying is a serious problem that can dramatically affect the ability of students to progress academically and socially. A comprehensive intervention plan that involves all students, parents, and school staff is required to ensure that all students can learn in a safe and fear-free environment. â€Å"When people hurt you over and over, think of them like sand paper. They may scratch and hurt you a bit, but in the end, you end up polished and they end up useless.† ― Chris Colfer

Sunday, July 21, 2019

Detection and Mitigation of DDOS Attack

Detection and Mitigation of DDOS Attack A Survey on Detection and Mitigation of Distributed Denial of Service attack in Named  Data Networking Sandesh Rai1*, Dr. Kalpana Sharma 2, and Dependra Dhakal 3 1Sikkim Manipal Institute of Technology, Student, Computer Science Engineering, Rangpo, Sikkim. 2Sikkim Manipal Institute of Technology, Head of Department, Professor, Computer Science Engineering, Rangpo, Sikkim 3Sikkim Manipal Institute of Technology, Assistant Professor, Computer Science Engineering, Rangpo ,Sikkim Abstract. There are various number of on-going research are taking place thats aims to provide next best Internet architecture although there are varieties of scope and maturity. This research is mainly based on to provide better security and better privacy as basic requirements of the protocol. Denial of Service Attacks which is a major issue in current Internet architecture also plays a critical issue in any new upcoming internet architecture and requires major focus for the same. The paper focus on the Interest flooding attack which is one the different type of Distributed Denial of service attack (DDOS).NDN incorporates better security features that detect and mitigate certain attack in the networks. But its resilience to the attacks has not analyzed yet. It presents the Distributed Denial of Service (DDOS) in Named Data Networking where an adversary sends out Interest packet with spoof names as an attacking packet to the NDN router. Keywords: NDN, DDOS, Content store, Pending Interest Table, Cache pollution. 1 Introduction Clearly internet has become a part of the day todays life of the people. Millions of people around the world use it to do various type of day todays task. It connect millions of people around the world via wired ,wireless, mobile or fixed computing devices and host huge amount of information(which is in the digital form) to be used by people. Internet provides information to be exchanged and has exponentially grown over time. The main ideas of the Todays internet architecture were developed in 70s.The telephone where conversation was point to point. The utilization of the Internet has dramatically changed since 70s and current internet has to adapt well with new usage model, new application and new services. To cope up with these changes, a variety number of research is taking place to design a new Internet architecture. Named Data Networking (NDN) [1] is one of the ongoing research .Its main objective is to developed a next best Internet architecture for upcoming generation. Its an instantiation of the of the Information Centric approach (ICN) or Content Centric approach (CCN) [1][2][3]. The main objective of the CCN is to provide more flexibility, security and scalability. CCN provide more security by securing the individual pieces of content rather than securing the connection. It provides more flexibility by using content name instead of using IP addresses. NDN is one of the instances of Information Centric Networking (ICN).NDN is based on the working principle of Content-Centric Networking (CCN) [3], where content instead of hosts are the main focus in the communications architecture. NDN is one of the research projects funded by the United State of National Science Foundation (NSF) which is under Future Internet Architecture (FIA) Program [3].NDN focus on the name rather than the location of th e host. In NDN every pieces of the data is digitally signed by its source producer. The signing in data allows the producer to be trusted and authenticated. Caching of the data is one of the core features of the NDN which helps to optimum use of network bandwidth use in the network . NDN provide an attractive architecture for the data distribution, anonymous communication. 1.1 Distributed Denial of service attack: As the years goes by, Distributed denial of service (DDOS) attack have become common and dangerous and it remains among the most critical threats on the current Internet. They are very difficult to detect and mitigate. Any new architecture should detect and mitigate DoS attack or at least minimum their effeteness. NDN appear to be efficient for the distribution of the content for the legitimate parties but unknown to malicious parties. Instead of using single host computer and single connection for the internet, the DDOS attack utilizes various number of host computers and various number of internet connections. The host computers for an attack are distributed across the whole wide world. The difference between a DOS attack VS a DDOS attack is that the victim host will be overloaded by thousands number of resources requests. In the attacks process, the adversary host node in the network sends request a huge number of zombie for the attack to take place. A malicious user attacks the n etwork host by requesting resources in a huge number in the form of Interest packets with spoofed names or without spoofed name. These huge numbers of Interest consumes the bandwidth of the network and exhaust a routers memory. This type of attack is known as Interest Flooding Attack (IFA) and this paper exclusively focus on this problem and their proposed countermeasures. 2 Overview of NDN Architecture Named data networking is an new and ongoing research architecture whose motivation is the architectural mixed of current internet architecture and its various usage. However the architecture design and principles are motivational derivation from the successes of todays Internet architecture [4]. The thin waist as can be seen in Figure 1 of hour glass architecture was the key service of the enormous growth of the internet by allowing both upside layer and bottom layer technologies to innovate independently. The NDN architecture contains the same hourglass shape as shown in Figure 1.2.1, but changes the thin waist by using data directly rather than its location. Figure 2.1 [4]: NDN Hourglass Architectures For communication, NDN provide two different packets i.e. Interest and Data packets. A user asks for resources by issuing Interest packet to the router in the network, which contains a name for those particular resources that identifies and verifies the desired data for the host. Different fields of a data packet [5]: 1.Signature: To verify data. 2. Key locator: To verify signature. 3. Publisher Public Key Digest: Public key hash of the producer. 4. Content name: Name of the requested data. 5 Selector: which include scope: and reserved. Figure 2.2 [6]: Packets in the NDN Architecture Any node having data that satisfies it, a Data packet is issued by the satisfied router [7], each router of NDN contains following different three data structures for Interest packet and Data packet forwarding. i) Content Store (CS): Recently used data are store. ii) Forward Information Base (FIB): Routing table of name of the data and it guides Interests toward data producers [8]. iii) Pending Interest Table (PIT): Store unsatisfied data request. It record the requested data name[8]. 3 Interest Flooding attacks By using the information and state of the Pending Interest Table (PIT), a routing of content by router is performed. In the PIT the name of requesting content is looked up for identifying its entry. The malicious node uses the state of the PIT to perform DDOS attacks. Basically there are three types of Interest Flooding attack [9]: a) Static: This type of attack attacks the infrastructure of the network and is limited and caching provides a build in solution. The interest is satisfied by the content of the cache [10]. b) Dynamically generated: Here the requested resources is dynamic and all the requested interest reaches to the content producer depleting the network bandwidth and state of the Pending Interest Table (PIT).Since the requested content is dynamic, in build cache does not serve as countermeasure for the attacks[10]. c) Non- existing: This report focus on this attack type where attacker involves non-satisfiable interest for a non-existing content in the network. These kinds of interest are not taken care by the router and are routed to the content producer depleting network bandwidth and router PIT states [11]. In all three types of attacks the malicious host uses a very large number of fake request, which are distributed in nature, An adversary host can use two features unique to NDN, namely CS and PIT, to perform DDoS attacks [12] in the router. We focus on attacks that overwhelm the PIT, which keeps record which are not fulfill by a router. The adversary host issues a large set of fake request, which are possibly distributed in nature, to generate a large number of Interest packets with spoofed name as shown in Figure 1.3.1 aiming to (1) overwhelm PIT table in routers, and (2) swamp the target content producers [13][14]. Figure 3.1 [15]: Example of Interest flooding attack Once the PIT is exceed its threshold, all incoming interests are dropped as there will no memory space available to create entries for new resourced interests. Since the names are spoofed, no Interest packets will be satisfied by the content [16]. These packets request will remain in the PIT for as much as possible, which will definitely exhaust the router memory and router resources on routers. This is the goal of Interest flooding attack. 4 Related Works Gasti et al. [17] analyzed the resilience of Named Data networking to the DDOS attacks. The paper discussed two different types of attacks with their effect and proposed two countermeasure mechanisms: a) Router Statistics and b) Push-back approaches. Afanasyev et al. [18] addressed the flooding attack. Their works explain the feasibility of the interest flooding attacks and the requirement of the effective solution. In terms of evaluation of the attack the proposed mitigation plan is complementary to Poseidon mitigation .Afanasyev et al. proposed three different mitigation algorithms: a) token bucket with per interface fairness b) satisfaction-based pushback c) satisfaction-based interest acceptance. All the three algorithms exploit their own state information to stop Interest flooding attacks. Satisfaction based pushback mechanism among three algorithms effectively detect and mitigate the attack and ensure all the interest form a legitimate user. Campagno et at. [19] Addressed the flooding attacks and proposed a mitigation algorithm called Poseidon. This algorithm is strictly used for non-existing type of interest flooding attacks. This mitigation algorithm is used for local and distributed interest flooding attacks. Dai et al. [20] addressed the flooding attacks and proposed a mitigation algorithm. The solution is based on the collaboration of the router and the content producer. Dai et al. proposed Interest traceback algorithm. The algorithm generates a spoof data packet to satisfy the interest in the PIT to trace the originators. According to the, the algorithm is not proactive, that overhead the network by sending out spoof data packet for the interest depleting the bandwidth of the network and creating traffic. The main shortcoming of this approach is that its take the long unsatisfied interest in the PIT as adversary interest and others as legit interest. So the router drops any long incoming interest packet which may be a legitimate interest. Choi et al. [21] addressed the overview of the Interest Flooding attacks for strictly non-existing content only on NDN. The paper tries to explain the effectiveness of the attack in the network and in quality of services. Karami et al. [22] addressed and provide a hybrid algorithm for the solution. The algorithm is proactive. There are two phase 1) detection 2) reaction. In detection phase the attack is detect using combination of multi objective evolutionary optimization and Radial basis function (Neural Network).In the reaction phases an adaptive mechanism for reaction is used to mitigate the attacks. 5 Analysis of survey The following table show the analysis of the all the paper and comparison related only on the project. The table is a comparison of different paper which is written by well-known publishers. The Analysis try to provide a possible research gap that is present on the paper. Table 1.Comparison of different NDN related paper SLno Title Publication Details Summary Research Gap 1 DoS DDoS in Named Data Networking P. Gasti, G. Tsudik, E. Uzun, and L. Zhang. DoS DDoS in named-data networking. Technical report, University of California. Discussed two types of attacks with their effects and potential countermeasures (Router Statistics and Push-back Mechanisms). 1. The paper only put a light on the attack and its possible countermeasures. 2 Interest flooding attack and countermeasures in Named Data Networking A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang. Interest flooding attack and countermeasures in Named Data Networking. In IFIP Networking. Proposed three mitigation algorithms. (token bucket with per-interface fairness, satisfaction-based Interest acceptance, and satisfaction-based pushback). 1.Improvements in token bucket with per-interface fairness, satisfaction-based Interest acceptance was less effective than satisfaction based pushback. 3 Poseidon: Mitigating interest flooding DDoS attacks in named data networking. A. Compagno, M. Conti, P. Gasti, and G. Tsudik, Poseidon: Mitigating interest flooding DDoS attacks in named data networking,Conference on Local Computer Networks. Proposed a framework, named Poseidon, for mitigation of local and distributed Interest flooding attack for non-existing contents 1.Fixed Threshold. 4 A hybrid multiobjective RBFPSO method for mitigating DoS attacks in named data networking. A. Karami and M. Guerrero-Zapata, A hybrid multiobjective RBFPSO method for mitigating DoS attacks in named data networking,Neurocomputing. Introduced an intelligent combination algorithm for the solution. 1.Investigating inter-domain DoS attacks and applying Hybrid approach. 5 Threat of DoS by interest flooding attack in content-centric networking S. Choi, K. Kim, S. Kim, and B.-H. Roh,:Threat of DoS by interest flooding attack in content-centric networking, in International Conference on Information Networking. Explain the difficulty for getting a solution flooding attacks in the PIT. 1.Analyzing DDoS attacks and their countermeasures. 6 Mitigate ddos attacks in ndn by interest traceback H. Dai, Y. Wang, J. Fan, and B. Liu. Mitigate ddos attacks in ndn by interest traceback. In NOMEN. Introduced a traceback solution where a node sends a spoof data packet to trace the host. 1. Only the request which is long is considered as malicious request. 6 Conclusion This report starts with a brief introduction of the CCN, NDN architecture and which is further followed by common and most critical attacks in todays internet. NDN mainly focuses on the data security, data privacy for the users. This report clearly represents only the starting step for mitigating DDOS attacks on the Pending Interest Table in the context of NDN. In this paper, we have explained DDOS attack and its various types namely, interest flooding attack. We have discussed current research regarding the attack, their existing solution, and try to analyze the given solution for detection and mitigation. The adversary tries to exploit interest forwarding rule to make certain interest for the packet with the never existing content name. We analyzed that the victim of the attack is host and PIT of the router. Thus a huge amount of Interest packet will reside on the PIT of the router which use and exhaust the memory of the router and computing resources of the router which will defin itely degrade the performance of the router. The NDN is the latest ongoing research topic and a new propose Internet architecture where limited research have been done for the mitigation and detection of the interest flooding attack thus there is a very much need for details analysis on the security before the architecture actually deployed. References V. Jacobson, M. Mosko, D. Smetters, and J. Garcia-Luna-Aceves.: Content- centric networking, Whitepaper, Palo Alto Research Center, pp. 2-4 (2007) V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard,.:Networking named content,in Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, ACM(2009) L. Zhang, D. Estrin, J. Burke, V. Jacobson, J. D. Thornton, D. K. Smetters, B. Zhang, G. Tsudik, D. Massey, C. Papadopoulos et al.: Named data networking (NDN) project, Relatorio Tecnico NDN-0001, Xerox Palo Alto Research Center-PARC( 2010) J. Pan, S. Paul, and R. Jain.: A survey of the research on future internet architectures, Communications Magazine, IEEE (2011) A. Hoque, S. O. Amin, A. Alyyan, B. Zhang, L. Zhang, and L. Wang.: NLSR: Named-data link state routing protocol,in Proceedings of the 3rd ACM SIGCOMM Workshop7Information-Centric Networking, ACM, pp. 15-20(2013) V. Jacobson, J. Burke, L. Zhang, B. Zhang, K. Claffy, D. Krioukov, C. Papadopoulos, L. Wang, E. Yeh, and P. Crowley.:Named data networking (NDN) project 2013- 2014 report,http://named-data.net, Annual Progress Report( 2014) C. Ghali, G. Tsudik, and E. Uzun.: Elements of trust in named-data networking, ACM SIGCOMM Computer Communication Review, ACM, vol. 44, no. 5, pp. 1-9 (2014) M. Aamir and S. M. A. Zaidi,.:Denial-of-service in content centric (named data) networking: A tutorial and state-of-the-art survey, Security and Communication Networks, vol. 8, no. 11, pp. 2037-2059 (2015) M. W ¨ahlisch, T. C. Schmidt, and M. Vahlenkamp.: Backscatter from the data plane threats to stability and security in information-centric networking. CoRR, abs/1205.4778 (2012) Content centric networking (CCNx) project. http://www.ccnx.org. A. Afanasyev, I. Moiseenko, and L. Zhang.: ndnSIM: NDN simulator for NS-3. Technical Report NDN-0005, 2012, University of California, Los Angeles(2012) Wang R, Jia Z, Ju L.: An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking. InTrustcom/BigDataSE/ISPA, Vol. 1, pp. 310-317(2013) Kumar, K., Joshi, R.C. and Singh, K..: A distributed approach using entropy to detect DDoS attacks in ISP domain. In Signal Processing, Communications and Networking, ICSCN07. International Conference on pp. 331-337(2007) Feinstein L, Schnackenberg D, Balupari R, Kindred D. :Statistical approaches to DDoS attack detection and response. InDARPA Information Survivability Conference and Exposition, 2003. Proceedings Vol. 1, pp. 303-314(2003) Krishnan, R., Krishnaswamy, D. and Mcdysan, D.: Behavioral security threat detection strategies for data center switches and routers. In Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on pp. 82-87(2014) Zhang Y.:An adaptive flow counting method for anomaly detection in SDN. InProceedings of the ninth ACM conference on Emerging networking experiments and technologies pp. 25-30(2013) P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, DoS and DDoS in named data networking, in 22nd International Conference on Computer Communications and Networks (ICCCN), pp. 1-7(2013) A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang.:Interest flooding attack and countermeasures in named data networking, in IFIP Networking Conference, pp. 1-9(2013) A. Compagno, M. Conti, P. Gasti, and G. Tsudik,Poseidon: Mitigating interest flooding DDoS attacks in named data networking,in 38th Conference on Local Computer Networks (LCN), IEEE, pp. 630- 638(2013) H. Dai, Y. Wang, J. Fan, and B. Liu, Mitigate DDoS attacks in NDN by interest traceback, in Conference on Computer Communications Workshops.(INFOCOM WKSHPS), IEEE,pp. 381- 386(2013) S. Choi, K. Kim, S. Kim, and B.-H. Roh, Threat of DoS by interest flooding attack in content-centric networking, in International Conference on Information Networking (ICOIN), pp. 315-319(2013) A. Karami and M. Guerrero-Zapata.: A hybrid multiobjective RBFPSO method for mitigating DoS attacks in named data networking, Neurocomputing, vol. 151, pp. 1262-1282(2015)

Concepts of Concurrent Engineering (CE)

Concepts of Concurrent Engineering (CE) Abstract In order the manufacturers and the sectors of the construction is to move there is one way which is to adopt the philosophy of concurrent engineering (CE), better than using the masters of other companies in the provision chain. This assignment will outline and discusses the concepts of concurrent engineering (CE) and its philosophy and its relations with supply chains. 1) Introduction to concurrent engineering Concurrent engineering (CE) is a method that is used in the product development process. It is different than the traditional approach from the product development in which it uses simultaneous, something that sequential, processes. By finishing the tasks in paralelamente, the product development can be obtained more efficiently and in substantial saving in costs. In the traditional approach finishing all the physical manufacture of a prototype before realizing any test, but In the concurrent engineering it allows to design and multiple analyses to happen at the same time, and at different times, before the real unfolding. This multidisciplinary approach accentuates work in equipment with the use of cross-functional equipment, and allows so that the employees work in the end of collaboration in all the aspects of a project of the beginning. Also known like the iterative method of the development, concurrent engineering requires the continuous revision of the progress of equipment and the frequent revision of the plans of the project. The analysis reasoned behind this creative, modern approach is that whichever previous those errors can be shortages, easiest and less expensive they are to correct. The concurrent engineering professionals explain from their experience that this system of management and design offers several advantages, including the quality of the increasing product for the end user, faster times of the product development, and lower costs for the manufacturer and the consumer. There are some disadvantages associated to the putting in initial practice of concurrent engineering, including the necessity of the considerable reconstruction of organization and the extensive retraining of workers. Such potentially breaking changes and requisite aggregates of work can be fulfilled resistance of in charge and other employees. Also, there are generally considerable difficulties in data of transference between employees in diverse departments that can require additional pursuit of computer software applications. Besides these significant initial investments, the organizations whom they adopt a concurrent model of the work of engineering must typically wait for several years before considering the advantages of this transition. 2) History of Concurrent Engineering There are many alternative definitions are available for concurrent engineering, but this list is quite typical. The increasing of the role of manufacturing process on the design of process of product design, the formation of cross-functional equipment to obtain the development process, a concentration in on client during the development process, and the use of the implementation time as source of competitive advantage is all the part of the definition. All the products have a necessity to incorporate the restrictions imposed by the process of manufacture in the product design. Depending on the manufacture consideration for the process, these effects can be codified in formal or computerized rules, or can be transported with individual experience and expert work. Defining these concerns in the early design in the development process creates the opportunity to reduce manufacture costs and to improve quality of the product. The method to obtain the integration of the design with other functions is often with the use of cross-functional teams. These teams can include to people with masters in the excellent production, commercialization, finances, service or other areas, this depends on the type of product. Another important functional barrier is the separation between the engineering designer and the client. Under same philosophy to eliminate the barrier of the design-manufacture, the designer can make more responsive to desires of the client and such way create a success product more and this is known like integration of the design-commercialization. The implementation time has demonstrated to be a significant facet of the modern competition. By Diminishing the time of obtaining the product the company/signature can respond to the tendencies of the market or to the new built-in technologies quickly. Decreasing the implementation time creates an advantage of the market for those companies that can produce products quickly. All these ideas are the fundamental of the concurrent engineering and it have been discussed in Literature during many years before the appearance of the concurrent movement of engineering. The product designs have existed for while the production in mass has existed. At the beginning, a division of work of the intellectual appeared by whom the designer was responsible to present/display the design and the manufacturer was responsible to make the product real. Due to this division there is the opportunity so that the designer of the product works in the ignorance of manufacturer constraints. And then the designer became blamed by throwing the design over the wall which separates design of the manufacture and this design that is thrown on the proverbial wall is generally difficult and expensive to produce, and it does not adjust necessarily to desires of the market. This functional separation and its resulting injurious effect on the resulting product design that could be repeated with other functions (such as commercialization, maintenance or others).The solution for this situation is to have the designer to be more involved in the other concerns inside and outside the organization in who he works. The engineering writers have implored that these barriers should be eliminated. There have been several different reasons to their imploration that the role of the manufacturing concerns in the design process must be increased. More frequently repeated between these reasons they are an increasing level of competition, the role of the new process of manufacture, and the necessity to reduce implementation time of the development. All these justifications to push concurrent engineering ideas have deep historical antecedents. These justifications are discussed down. 2.1 Increased Competition A justification given for the necessity of the increasing cooperation in the process of the product development is an increasing level of competition. There have been demands that the competition level has increased recently occasionally when we did not consider recent more. For example, a claim is that the competition level has increased from the start of century of the nineteenth and the modern companies cannot be allowed not to pay attention to the design-manufacturing interaction. Similar, another say is that the one of high level of the competition in 1950s required that the personal of the design and the manufacture cooperate in the new product development. The economic competition is and has been always fierce now and this effect is not new. 2.2 New Production Methods Whereas the new methods of production enter in good condition gets to be important to get the knowledge on the new processes of production and its effects on the resulting product design to take advantage, and responds to the limitations of the new processes. The knowledge on these processes should be available for the designer of the product. This knowledge is often resident in the engineer of the production. Therefore, the situation where the new processes of production are used will be often important part to make sure that the design engineers work close by with the engineers of the production. Between new processes of manufacture, the development of the automatic techniques of the assembly has been mentioned frequently as to require of high level of integration between the design and manufacture. The new processes of manufacture are being developed continuously. Each new manufacturing process requires the close collaboration between the designer and the manufacturing engineer 2.3 Lead Time One of the first motivations for a concurrent engineering approach to the product development is a desire to shorten the total time that takes to bring a product to the market. The notion that the length of the development cycle is an important competitive advantage and that the direction of all the aspects of the problem of the design could take at the same time as a shortened development cycle is a rule of many years. In summary, the claim reasons of the necessity of the integration of the economic competition is the new processes of production, and the shortening implementation time are not new 3) Importance of Concurrent Engineering Concurrent engineering is important and this is because the following: It takes the products for successful Like work engineers, you will work in a concurrent atmosphere of engineering Necessity to understand the tools and techniques Increasing role of the process of manufacturing in decisions of product design Formation of cross-functional equipment concentrate on the client products requirements Implementation time like competitive advantage 4) Traditional Engineering versus Concurrent Engineering In traditional engineering less period of time is past relatively for defining the product on another hand the relatively long time is spent to design the product and awhile amazingly long time is often needed to readjusts the product. The key to shorten the time of the total design is to define better product and the best document the design process. Traditionally, the development of a product had been seen as a cycle of plan,do,check then Adjust.Concurrent engineering is a process in which the appropriate disciplines are trusting to work reciprocally to conceive, to approve, to develop, and to execute programs of the product that the meeting predetermined objectives. The figure down is comparison between the sequential, centralized and concurrent design This one is the relatively recent term that is applied to the philosophy of design of engineering of the cross-functional cooperation to create the products that are better, more cheaply and it is engaged in more quickly to put in the market. This new tendency joins technical and nontechnical disciplines such as engineering, commercialization and accounting. Always concentrating in the satisfaction of the client, these representatives work together in the definition of the product that will make. Therefore concurrent engineering can be defined as: A philosophy of the product development: Multiple design integration A method of product design: Integration of multidisciplinary people in the equipment of design A method to lead people: The design of what imagine in people Which is not concurrent engineering: It is not â€Å"on wall† Nor â€Å"of the wall† (it is being used and it is here remaining) The goal of concurrent engineering is to improve the interactive work of diverse disciplines that affect a product. The following are some of the advantages of concurrent engineering: It reduces the life cycle of product the procedure of redesign It reduces the production cost results of the minimization of the life cycle of product life cycle of product Maximizes the quality of the product initially spending more time and money in the cycle of design and making sure that the selection of the concept is optimized; the company can increase the perspective to give a product of quality to the client. Team Work the human resources is working together for a common product. The several organizations follow a plethora of product and development cycle of process. Characterizing the phases of the life cycle of the product development helps to put in perspective some of involved organization issues. The phases are: Declaration of mission (Mission statement): also it is known as brifr of the design. I must contain a general description of the product, the segments of target market, and of the categories of the client and specify the quota of market of the goals of business for, the margins of benefit and the projected Life cycle of the product. Definition of the market and the concept: The demands of the consumer are identified by several techniques of the market study; the studies of the test are conducted, identifies the requirement of functional technical design, the design and the viability of the manufacture are solved and the valuations of costs project. Generation and selection the system level concept: the several concepts of design are generated that satisfy the requirements with functional design. It designs the satisfaction of these requirements in terms of quality, the cost is selected and the delivery and the architecture of the product are solved. Detailed product design: The detailed specification of the dimensions of the product, the materials and the tolerances that are made. The special components and standard are identified Test and refinement of the prototype: the prototypes of the selected design will be tested for the viability of the functionality, the manufacturing and the assembly, and also for the cost. Planning of process, planning of production and control: The processes of real production of the end deign are planned. The plans of the control of production and the quality assurance are elaborated. Ramp-up and refinement of the production: in this the final phase of the production is finished in order it familiarity and the training manpower, discovering the correction of the production problems before complete level of the production is reached. Later, the product is launched. 5) Approaches to implement the concurrent engineering 5.1 TEAM BASED IMPLEMENTATION The team consists of designers and others of related areas. the team members are selected for their capacity to contributes in the design of a product, identifying potential problems early in the design stage. The progresses in hardware and software, have given to members the capacity to work in designs and to consider the effects of diverse qualities, on the final design. For the approach to the team-based work, they require to an team of multiple functions and is also desirable to educate the members of team in the philosophy of concurrent engineering. 5.2 COMPUTER BASED IMPLEMENTATION The team -based approach can be executed easily, but it has problems: How to handle to a team effectively Some members could have limited knowledge It can be expensive to maintain to a team Whereas the computers obtain more complex and faster, the new tools begin to emerge that they incorporate the concurrent philosophy of engineering in associate the hardware and software thus allowing that the designers change to the product design with respect to the life cycle of products. A constraint programming language is the onethat has been developed so that to the designers to consider all the implications of the life cycle related to the product (Bahler and others, 1990). 6) Requirements for Concurrent Engineering to be viable 6.1 Overcoming Traditional Barriers Beginning and maintaining the concurrent engineering is not an easy task. It demands the care, the discipline and the commission by the whole organization, of the management superior to the rows inferiors. It takes the education in all the levels from the organization on the concurrent engineering so that all speak a common language. The spectacular change to the traditional practices is also a necessity and the short term center of the business cannot exist in the context of the concurrent engineering that pleads continuous improvements. 6.2 Teamwork Development and Interaction Since the team work is the dominant essence of the concurrent engineering, the process to select to the team should be dealt seriously and with the precaution. Composing of the team of several disciplines in an organization must be able to share ideas, to communicate freely and to work from the beginning cohesive with a right of the common objective. The members of team of interdisciplinary groups must rove through the traditional departmental borders, for unconstrained by the arbitrary barriers, communicate their concepts, make recommendations and negotiate conflicts to bring problems to ignite early. It defines the goals more early possible to determine a vision common to allow the alignment of intentions. The effectiveness of the work in team depends on the distribution of ideas and goals beyond immediate allocations and departmental loyalties. It is important to observe that the work in team and the distribution are due to value just as highly as technical capacity and creativity and have to be considered as an integral part of engineer evaluation of operation. 6.3 Involvement of Outside Influences In order to develop close relationships with the clients and the suppliers, understanding its requirements and drawing on its contributions to understand better what and how to design. Being nearer clients will provide one better understanding of its requirements and company capacities to cover and to satisfy those demands. The close work with the suppliers adds its experience with zero cost to the organization. In fact, they often can, being expert in its respective fields, to suggest less expensive ways better and to make things. On the other hand, the information of suppliers is useful for the valuation of the project during the design stage. In addition, such relations facilitate manufacture practices just in time. 6.4 Co-evolution Many implied activities in the manufacture of a product of their concept, design, making to the end item, are interdependent and they are due to see altogether. They must be worked ignited concurrently to facilitate an appropriate analysis of compensation that takes to the optimization of process design, to the requirements in conflict and the violations of the constraint of being identified and being solved. 6.5 Continual Improvement In order to adopt a philosophy of doing it right and obtaining it better. The center of improvements must be applied in product and the processes implied in producing the product this possible aid to express the organization of the way of the fire fighting to the way of the prevention. 6.6 Information Sharing and Management It must have an efficient system of the distribution of information such that the members of a team can accede to all the corporative facilities and to the information of the work carried out by the several teams that is necessary to design, to prove, to make and to support the product on their life cycle. All the excellent aspects of the design process are due to register and to document for the future references. 6.7 Togetherness All the members of the teams must be established ideally near each other. This would animate communications and also it foments spirit of the group of the responsibility and the togetherness. If the positioning of the network is not possible to have each in great then proximity it must use to interchange the information. Alternatively, the team of the product development can accompany the movements by the product with its design and phases of development that gain experience throughout the way. 6.8 Integration of frameworks and Tools It integrates the frames and the computerized tools like the packages of CAD/CAM/CAE that give the transparent access to the tools related of the use and to the services of the part available to the team. It facilitates the process to transfer programs of the CAD/CAE in the machines to eliminate errors of the transcription in the manufacture upon the manufacture and of the assembly. 6.9 Empower In order to authorize individuals or to the team to make necessary decisions when it is invited in diverse stages of the product design, It has been observed that the empowerment could destraillar the maximum capacity of the individuals or of the team authorized that did the dear and connected sensation to them with the organization, of such better way emitting their operation and commitment. 7) Examples of Concurrent Engineering The aeronautical systems group at â€Å"Lockheed Corporation† recently developed and integrated of Corporation called â€Å"Calfab†. This mini-factory uses the automated disposition and the manufacture and has shortened the time that takes for the design and the manufacture of metal pieces of leaf as of 52 days 2 days a reduction of the 96 percent. Used metal to travel 2500 feet between the several machines and now travels only 150 feet. There are few lazy manufacturing companies that have not pointed at least a reduction of the 50 percent in the time that takes to send a new product of the idea to the production. The companies such â€Å"Xerox† has obtained this goal already. Few organizations have pushed east concept the point of having a strategy of corporative design or a way to project the design and the planning full-range of all products five years in the future, but this one is coming. It is the rare company that it has a strategy of the innovation that includes decisions on the business and new products, the risk, and the production. The good ideas have a unique quality of the motivation. People obtain moved envelope they and will be possible competition and discord on her origin. However, the majority of the ideas good or bad never they are acted on any close individual, groups, and, especially, companies. 8) Important factors in Concurrent Engineering Practice 8.1 Organizational Factor a. Cross-functional Teams: The members of project team gain one better understanding of the priorities of the project and process discipline, doing the visible risks and commitments for a better control. The team Is consisted of experts of engineering design, the production, the commercialization and any other functional area that has an interest acquired in the development project. They form to work in a specific project, and remain next to the team through development of the product. This approach seems more recent, because has been discussed through the years forties, fifties, and sixties, like viable way to obtain the work of complex development. b. Liaison Personnel: The connection of the personal are nonmember of any functional piece of an organization, but something the people who able and are prepared to approach the editions that cross functional boundaries of organization. The personal of the connection full-time have like their work the coordination of the different functions. Under this approach, they make the ways primary obtain the informative transmission between the functional areas. c. Job Rotation: The rotation of work means to turn personal between the functional categories. They assign these personal temporarily or permanently outside his customary functional specialty that is a manufacture engineer will work with the design engineers or vice versa. Thus it is possible to integrate the several knowledge bases without realizing significant structural changes to the organization. The rotation of work seems to have useful advantages of integration. 8.2 Some Helpful rule based methods: a. Product Design Methods Design for Manufacturing (DFM) DFM tries to reduce to the minimum the content of manufacturing information of the product design within the restrictions imposed by the functionality and the operation. Minimize the total number of parts Simplifies the design to make sure that the remaining pieces are easy to make, to mount, to direct and to maintain Standardizes as far as possible to facilitate desirable characteristics of produceability such as simplified interoperability, exchange capacity, interface, effective consolidation of pieces and function, availability of components and so on * Design for Quality it can intentionally be executed in the passage of the system design designing the product and the process to be tolerant of the variation * Design for Cost it is essential that the industrial organizations have analysis of cost and viable and responsive control systems. The effective analysis of the costs of the product or the project and the capacity to execute to the management of the cost control includes the management of the cost of the product or the project, and this one requires knowledge and an understanding of the elements of cost and its sensitivity to the several parameters of control. The cost analysis forms the base for the cost control and without exact and opportune data of cost, the control of effective cost is impossible. The more exact and more opportune data of cost are useless unless they are joined with an effective control mechanism of cost. * Design for Assembly (DFA) The searches to reduce to the minimum the cost of the assembly within pressures imposed by other requirements of design. DFA has been the departure point for the development of a corporative philosophy of DFM and the change of the culture accompanies that it. * Design for Safety The designer must develop the habit constantly to evaluate the design for the security, considering not only the design itself but the personal implied in the manufacture of the product, using the procedure, and in maintaining and the repair of the product or the system as well as the end user or the buyer. To develop to the processes of manufacture as well as the maintenance and the procedures of early operation during the design process will attend security problems that reveal in a while in which measured corrective they are possible to be taken in the minimum cost * Design for Reliability The Reliability is defined as the probability for which a device or a component of system will be realized successfully for : A given range of conditions of operation A specific environmental condition Awhile of prescribed economic survival Design for X Help to ensure that parts and products are correctly designed to be produced using a particular production process or method such as plastic injection molding or sheet metal stamping. It helps to make sure that the pieces and the products are correctly designed to be produced using a process or a particular method of production as plastic seal of the moulding under pressure or the metal of leaf. b. Integrated Computer Analysis This is based on the recognition that the passages in the development of a manufactured product are correlated and can be modeled with effectiveness using the computers. This relation comes around not only from the characteristics of the piece that are made but also of the processes, the specifications, the instructions and of the data that define and direct each passage in the manufacture process. 9) Product prototyping and Concurrent engineering Concurrent engineering uses the tools to obtain the communication of the design and to facilitate the process. Many of these tools include the modeled one, the creation of a fast prototype, and control systems of the document. The planning systems are used to help to develop the material channels and to handle valuations of the production. The creation of a fast prototype, and the software of control of the document for the putting in practice is very important in of concurrent engineering. The digital world has moved at a new level in the development of the engineering design. The recent advances in creation of a fast prototype are transforming the engineers of the way and the manufacturers are approaching design and the development of manufacture. Then the companies and the personnel directing adopt the solid modeled one, can hook to the development and the validation of the totally digital design. The implications are reduced costs of the development, reduced readjustment, and imp roved visualization of the product. An additional tool put in the product development and the equipment are the use of the creation of a fast prototype after digital validation of the design. This allows that we take what we thought we could outside have perfected in print of the computer and `towards a prototype of operation in a question of hours without the equipment of the pre-production or the expensive processes. The printed part resulting is 3 dimensional ones, the plastic part that can be really used in the use. The pieces can be mounted, be held, be beaten, be sanded, and be painted to watch and to feel exactly like the attempt of product calculation. These plastic pieces can be used, for example, with the validation of the assembly of the design, the real validation of manufacture, molds or the components of manufacture for the professional operations, commercialization, fairs, and the verification short of the design of the client. References R. A. Sprague, K. J. Singh and R. T. Wood (Mar 91). Concurrent engineering in product development. IEEE DESIGN AND TEST OF COMPUTERS, pp 6-13. Raymond T. Yeh (OCT. 92). Notes on concurrent engineering. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, v41, n5, pp 407-414.. A. Rosenblatt and G. F. Watson (JUL.91). Concurrent engineering. IEEE SPECTRUM, pp 22-37. D. Stewart (MAY 93). Concurrent development puts projects on target. ELECTRONIC DESIGN, pp 61-66. S. S. Chanan and M. Unny (1994). CONCURRENT ENGINEERING: Concepts, Implementation and Practice. Chapman Hall. C. G. M. Landon (1993). CONCURRENT ENGINEERING DESIGN: Integrating the Best Practices for Process Improvement. Dearborn, Michigan, Society of Manufacturing Engineers.. L. N. James and E.W. Daniel (1989). CONCURRENT DESIGN OF PRODUCTS PROCESSES: A Strategy for the Next Generation in Manufacturing. McGraw -Hill. Edited by H.R. Parsaei W.G. Sullivan(1993).Concurrent Engineering: Contemporary Issues and Modern Design Tools. Chapman Hall.?K. Andrew (1993). CONCURRENT ENGINEERING: Automation, Tools, and Techniques. John Wiley Sons. Ahluwalia, R.S. and Ji, P. (1990) Process planing in concurrent engineering environment, 1990 International Industrial Engineering Conference Proceedings, pp. 535-40. Charles, D.P.S.T. (1989) Simultaneous engineering, AUTOFACT 89, Conference Proceedings, Detroit, Michigan, October 30-Nov. 2, 14.1-14.6. ^ Ma, Y., Chen, G., Thimm, G., â€Å"Paradigm Shift: Unified and Associative Feature-based Concurrent Engineering and Collaborative Engineering†, Journal of Intelligent Manufacturing, DOI 10.1007/s10845-008-0128-y

Saturday, July 20, 2019

Death Penalty as an Effective Method of Punishment Essay -- Argumentat

Death Penalty as an Effective Method of Punishment An issue that has continually created tension in today's society is whether the death penalty serves as a justified and valid form of punishment. Whenever the word "death penalty" comes up, extremists from both sides start yelling out their arguments. One side says deterrence, the other side says there's a potential of executing an innocent man; one says justice, retribution, and punishment; the other side says execution is murder. Crime is an evident part of society, and everyone is aware that something must be done about it. Most people know the threat of crime to their lives, but the question lies in the methods and action in which it should be dealt with. In several parts of the world, the death penalty has been apportioned to those who have committed a variety of offenses from the time of ancient Babylon to present-day America. The Roman Empire made use of the death penalty liberally, as did the Church of the Middle Ages. As history tells us, capital punishment, whose def inition is "the use of death as a legally sanctioned punishment," is an acceptable and efficient means of deterring crime. Today, the death penalty remains an effective method of punishment for murder and other heinous crimes. There is debate over the morals and effectiveness of such a harsh sentence. Most commonly, the death penalty is challenged as a violation of the Eighth Amendment, which says that the U.S. cannot use "cruel and unusual" punishment. Due to the fact that "punishment" is a legal infliction of suffering, it must be somewhat "cruel.† As for being unusual, it is anything but, due to the long history of its usage. People will plunder, take advantage of others, and commit cri... ...does not violate the cruel and unusual punishment clause. Capital punishment has proven to have good benefits upon the country in determining the consequences that criminals deserve. This is needed to ensure the safety and moral values of society. If this is the case, there is no need for us to consider the expenses involved in the death penalty. Certainly human lives are more important, for it may easily be yours. We should not abolish capital punishment, but hold our country accountable for properly exercising the death penalty upon those who deserve it. Works Cited Anonymous: "Death Penalty and Sentencing Information in the United States." Internet. "Death Penalty Statistics," North Carolina Attorney General's Office. 1997. Nancy Jacobs, Alison Landes, and Mark A. Siegel. Capital Punishment, Cruel and Unusual?. Wylie: Information Plus, 1996.