Wednesday, October 30, 2019

Article Analysis Essay Example | Topics and Well Written Essays - 250 words - 3

Article Analysis - Essay Example The statistics are worrying because one would expect the teachers to take advantage of the computers and internet to ease the learning process (Keengwe and Onchwari, 210). I, however, think there should be no cause for worry among parents concerning the adverse effects of technology to their children. Teachers have the responsibility of monitoring how children use technology to restrict it for educational purposes only. From the research conducted at the summer institute, it is devastating that teachers find it hard infusing instructional responsibilities with technology integration. I fail to understand why they view integration and instruction as two different entities. If both support each other in delivering content to the students, teachers should be willing to adopt them (Keengwe and Onchwari, 214-215). I think teachers are intellectuals who can integrate technology into classrooms to engage various learning styles that meet the abilities of all learners. I concur with the authors that teachers need technological skills that do not necessarily make them experts (Keengwe and Onchwari, 215-216). Based on the authors’ recommendations, it is imperative that school administrators move swiftly in installing modern technological tools that aid educational software. Besides, state education officers should not only create technological workshops, but also provide full-time technology experts t o schools. The article, therefore, meets the authors’ goal of stimulating reflections and evaluating the need for technology integration in classrooms and, in particular, early childhood education. Keengwe, Jared, and Grace Onchwari. "Technology and Early Childhood Education: A Technology Integration Professional Development Model for Practicing Teachers."  Early Childhood Education Journal  37 (2009): 209-18. Web. 2 June

Monday, October 28, 2019

Cells Breaks the Tor’s Anonymity: Onion Router

Cells Breaks the Tor’s Anonymity: Onion Router Ms. S.SIVARANJANI Ms. R.BACKIYALAKSHMI B.E, M.Tech., Abstract To hide the communication of users, the anonymity systems pack the application data into equal – sized cells. The size of IP packets in the Tor network can be very dynamic and the IP layer may be repack cells. A new cell-counting attack against Tor allows the attacker to confirm anonymous communication relationship among users very quickly. By varying the number of cells in the target traffic at the malicious exit onion router, the attacker can embed a secrete signal into variation of cell counter of the target traffic and it will be carried and arrive at the malicious entry onion router. Then an accomplice of the attacker will detect the signal based on received cells and confirm the communication among the users. There are several features of this attack. First, it is highly efficient and confirms very short communication session with only tens of cells. Second, this attack is effective and detection rate approaches 100% with a very low false positive rate. Third, it is possible to implement the attack in a way that appears to be very difficult for honest participants to detect. Keywords Anonymity, cell counting, mix networks, signal, Tor. INTRODUCTION Anonymity has become a necessary and legitimate aim in many applications. Here the encryption alone cannot maintain the anonymity required by users. Generally speaking, mix techniques can be used for either message-based or flow-based anonymity applications. Research on flow-based anonymity applications has recently received great attention in order to preserve anonymity in low-latency applications, including Web browsing and peer-to-peer file sharing. To degrade the anonymity service provided by anonymous communication systems, traffic analysis attacks have been used. The Existing traffic analysis attacks can be categorized into two types: passive traffic analysis and active watermarking techniques. The active watermarking technique has recently received much attention to improve the accuracy of attack. In this technique is to actively introduce special signals into the sender’s outbound traffic with the intention of recognizing the embedded signal at the receiver’s inbound traffic. The core contribution of the paper is a new cell counting based attack against Tor network. This attack confirms anonymous communication relationship among users accurately and quickly and it is difficult to detect. The attacker at the exit onion router detects the data transmitted to a destination and then determines whether the data is relay cell or control cell in Tor. After excluding control cells, manipulate the number of relay cells in the circuit queue and flushes out all cells in the circuit queue. This way the attacker can embed a signal into the variation of cell count during a short period in the target traffic. To recover the embedded signal, the attacker at the entry onion router detects and excludes the control cells, record the number of relay cells in the circuit queue and recover the embedded signal. The main features of cell-counting based attack are: (1) This attack is highly efficient and can quickly confirm very short anonymous communication sessions with tens of cells. (2) It is effective and detection rate approaches 100 % with very low false positive rate. (3) It makes difficult for others to detect the presence of the embedded signal. The Time – hopping based signal embedding technique makes the attack even harder to detect. SYSTEM ARCHITECURE There are two types of cells: Control cell and Relay cell. The CELL_CREATE or CELL_CREATED used for setting up a new circuit. CELL_DESTROY used for releasing a circuit. Relay cell is used to carry TCP stream data from client to bob. Some of the relay commands are: RELAY_COMMAND_BEGIN, RELAY_COMMAND_END, RELAY_COMMAND_ DATA, RELAY_COMMAND_SENDME, and RELAY_ COMMAND_DROP. The Onion router (OR) maintains the TLS connection to other OR. Onion proxy (OP) uses source routing and chooses several ORs from cached directory. OP establishes circuit across the Tor network and negotiates a symmetric key with each OR, one hop at a time, as well as handle TCP stream from client application. The OR on other side of circuit connects to the requested destination and relay the data. The OP will sets up TLS connection with OR1 using protocol, through this connection , OP sends CELL_CREATE cell and uses Diffie-Hellman (DH) handshake protocol to negotiate a base key k1=gxy with OR1. Form this key; a forward symmetric key kf1 and backward key kb1 are produced. This way first hop circuit C1 is created. Similarly OP extends the circuit to second and third hop. After circuit is setup, OP sends a RELAY_COMMAND_BEGIN cell to the exit onion router and cell is encrypted as {{{Begin}kf3}kf2}kf1. While the cell traverses through circuit each time the layer of onion skin are removed one by one. At last the OR3 last skin is removed by decryption then it open a TCP stream to a port at the destination IP, which belongs to bob. The OR3 sets up a TCP connection with bob and sends a RELAY_COMMAND_CONNECTED cell back to Alice’s OP. Then the client can download the file. PROCESSING CELL AT ONION ROUTER The TCP data is received by OR from port A and it is processed by TCP and TLS protocols. Then the processed data is delivered to the TLS buffer. The read event is called to read and process the data pending in the TLS buffer. This read event will pull the data from TLS buffer into the input buffer. Then the read event process cells from input buffer one by one. Each OR has routing table which maintains map from source connection and circuit ID to destination connection and circuit ID. The transmission direction of the cell can be determined by the read event. To append the cell to the destination circuit the corresponding symmetric key is used to decrypt / encrypt the payload of the cell, replace the present circuit ID with destination circuit ID. The cell can be written directly for the destination connection if there is no data waiting in output buffer and the write event is added to the event queue. After calling the write event, the data is flushed to TLS buffer of destination. Then write event pull as many cells as possible from circuit to output buffer and add write event to event queue. The next write event carry on flushing data to output buffer and pull cells to output buffer else the cell queued in circuit queue can be delivered to network via port B by calling write event twice. Fig. 2Processing the cells at Onion router CELL – COUNTING BASED ATTACK The IP packets in Tor network is very dynamic and based on this the cell – counting based attack implemented. Dynamic IP packets over Tor : The application data will be packed into equal sized cells (512-B). While the packets transmitted over the Tor network it is dynamic. Because of this reason the size of packets from sender to receiver is random over time and large numbers of packets have varied in sizes. The main reason for this is the varied performance of OR cause cells not to be promptly processed and also if network is congested, cells will not delivered on time, because of this the cell will merge and non-MTU(Maximum Transmission Unit) sized packets will show up. Work-flow of Cell – Counting based attack: Step 1: SELECTING THE TARGET :- The attacker log the information at the exit OR, including the server host IP address and port for a circuit and circuit ID and uses CELL – RELAY-DATA to transmit the data stream. Step 2: ENCODING THE SIGNAL :- Until the write event is called the CELL – RELAY – DATA will be waited in the circuit queue. After the write event is called then the cells are flushed into output buffer. Hence the attacker can manipulate the number of cells flushed to the output buffer all together. This way the attacker can able to embed the secret signal. To encode bit 1, the attacker can flushes three cells from circuit queue and for bit 0, flushes one cell from circuit queue. Step 3: RECORDING PACKETS :- After the signal is embedded in the target traffic it will be transmitted to the entry OR along with target traffic. The attacker at the entry OR will record the received cells and related information and need to determine whether the received cells are CELL – RELAY – DATA cells. Step 4: RECOGNIZING THE EMBEDDED SIGNAL :- The attacker enters the phase of recognizing the embedded signal with the recorded cells. For this used the recovery mechanisms. Once the original signal is identified the attacker can link the communication between Alice and Bob. There are two critical issues related to attack: (1) Encoding signals at exit OR: Two cells are not enough to encode â€Å"1† bit. Because if the attacker uses two cells to encode bit â€Å"1† then it will be easily distorted over network and also hard to recover. When the two cells arrive at the input buffer at the middle OR, the first cell will be pulled into circuit queue and then if the output buffer is empty, the first cell will be flushed into it. Then the second cell will be pulled to the circuit queue. Since the output buffer is not empty, the second cell stays in the circuit queue. When the write event is called, the first cell will be delivered to the network, while the second cell written to the output buffer and wait for the next write event. Consequently, two originally combined cells will be split into two separate cells at the middle router. So the attacker at the entry OR will observe two separate cells arriving at the circuit queue. This cells will be d ecoded as two â€Å"0† bits, leading the attacker to a wrong detection of the signal. To deal with this issue the attacker should choose at least three cells for carrying bit â€Å"1†. For transmitting cells, proper delay interval should be selected: If the delay interval among the cells is too large, users are not able to tolerate the slow traffic and to transmit the data will choose another circuit. When this condition happens the attack will fail. And if the delay interval is too small, then it will increase the chance that cells may combined at middle OR. (2) Decoding signals at the entry OR: Distortion of signal: Anyway the combination and division of the cells will happen due to unpredictable network delay and congestion. This will cause the embedded signal to be distorted and the probability of recognizing the embedded signal will be reduced. Because of this distortion of the signal, a recovery mechanism can be used, that recognize the embedded signal. The combination and division of cell can be categorized into four types: (1) Two types of the cell division for the unit of the signal and (2) Two types of the cell combination for different units of signal. To deal with these types of division and combination types of the cells the recovery algorithm can be used. If the number of cells recorded in the circuit queue is smaller than the number of the original signal are recovered as either two types of cell division for the unit of the signal. Suppose the number of cells recorded in the circuit queue is larger than the number of cells for carrying the signal; the recovered signal will be either two of the cell combination for different units of signal. When the signals are recovered in these types with k ≠¤ 2, can consider that these signals are successfully identified otherwise cannot be identified. Attack Delectability: To improve the attack invisibility can adopt the time-hopping-based signal embedding technique, which can reduce the probability of interception and recognition. The principle of this technique is, there exit random intervals between signal bits. At the exit OR, the duration of those intervals are varied according to a pseudorandom control code which is known to only the attackers. To recover this signal, the attacker at the entry OR can use the same secret control code to position the signal bits and recover the whole signal. If the interval between the bits is large enough, the inserted signal bits appear sparse within the target traffic and it is difficult to determine whether groups of cells are caused by network dynamics or intention. Therefore the secret signal embedded into the target traffic is no different than the noise. And when a malicious entry node has confirmed the communication relationship, it can separate the group of cells by adding delay betw een the cells so that not even the client can observe the embedded signal. In this paper a signal is embedded into the target traffic, which implies a secrete sequence of groups of one and three cells. With the time-hopping technique, groups of one and three cells are separated by random intervals and it is hard to differentiate them from those caused by network dynamics and since the embedded signal is very short and only known to attacker, can conclude that it is very difficult to distinguish traffic with embedded signals from normal traffic based on this very short secret sequence of cell groups. CONCLUSION AND FUTURE WORK In this paper, we presented a cell-counting based attack against Tor network. This can confirm the anonymous communication among the user quickly and accurately and it is very difficult to detect. The attacker at the exit OR manipulates the transmission of cells from the target TCP stream and embeds a secret signal into the cell counter variation of the TCP stream. Then the attacker at the entry OR recognizes the embedded signal using developed recovery algorithms and links the communication relationship among the users. In this attack the detection rate is monotonously increasing function with the delay interval and decreasing function of the variance of one way transmission delay along a circuit. This attack could drastically and quickly degrade the anonymity service that Tor provides. Due to the fundamental design of the Tor network, defending against this attack remains a very challenging task that we will investigate in future work. REFERENCES [1] W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, â€Å"DSSS-based à ¯Ã‚ ¬Ã¢â‚¬Å¡ow marking technique for invisible traceback,† in Proc. IEEE SP,May 2007, pp. 18–32. [2] N. B. Amir Houmansadr and N. Kiyavash, â€Å"RAINBOW: A robust and invisible non-blind watermark for network à ¯Ã‚ ¬Ã¢â‚¬Å¡ows,† in Proc.16thNDSS, Feb. 2009, pp. 1–13. [3] V. Shmatikov and M.-H. Wang, â€Å"Timing analysis in low-latency MIX networks: Attacks and defenses,† in Proc. ESORICS, 2006, pp. 18–31. [4] V. Fusenig, E. Staab, U. Sorger, and T. Engel, â€Å"Slotted packet counting attacks on anonymity protocols,† in Proc. AISC, 2009, pp. 53–60. [5] X. Wang, S. Chen, and S. Jajodia, â€Å"Tracking anonymous peer-to-peer VoIP calls on the internet,† in Proc. 12th ACM CCS, Nov. 2005, pp.81–91. [6] K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, â€Å"Lowresource routing attacks against anonymous systems,† Univ. Colorado Boulder, Boulder, CO, Tech. Rep., Aug. 2007. [7] X. Fu, Z. Ling, J. Luo, W. Yu, W. Jia, and W. Zhao, â€Å"One cell is enough to break Tor’s anonymity,† in Proc. Black Hat DC,Feb.2009[Online]. Available: http://www.blackhat.com/presentations/bh-dc-09/Fu/ BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf [8] R. Dingledine, N. Mathewson, and P. Syverson, â€Å"Tor: Anonymity online,† 2008 [Online]. Available: http://tor.eff.org/index.html.en [9] R. Dingledine and N. Mathewson, â€Å"Tor protocol specià ¯Ã‚ ¬Ã‚ cation,†2008 [Online]. Available: https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=tor-spec.txt [10] J. Reardon, â€Å"Improving Tor using a TCP-over-DTLS tunnel,† Master’s thesis, University of Waterloo, Waterloo, ON, Canada, Sep. 2008. Project management example: The London Eye Project management example: The London Eye Introduction Generally, the definitions of project management have diversities, but in commonly project management is used to accomplish business ambition, strategies and well-defined work tasks within a certain schedule and limit budget (Sabin, 2006). The project management required skill, experience, processes, methods and knowledge in order to complete the objectives of the project (Association for Project Management, 2014). Most strategists succeed in these days with high competitive and fusing global economy are mostly using the project management techniques to deliver substantial quality of business results within limited time and budget (Project Management Institute, 2014). Jamieson Morris (2004) support that project management is a key factor in business process. Even in many definitions of project management, the fundamental is about attaining the jobs done. The London Eye is the huge project that was designed by architectures David Marks and Julia Barfield, its purpose to represent modern architectural design and engineering of the first of the millennium century (Tim and Ian, 2000). The London eye was the tallest Ferris wheel in the world by height 135 meters, after success, with Star of Nanchang in 2006, Singapore Flyer in 2008 and High Roller in 2014 in order. The construction of London Eye used 16 months to finish in order to celebrated of the year 2000, London Eye also knows as the Millennium Wheel. In the first year of operation, number of visitors approximately was 3.2 millions, hence this becomes more popular of attracting visitors in the United Kingdom. The production cost of the London Eye is 75 million pounds and took 50 percent of time less than normal to finish the project (Marks Barfield, 2014). This makes London Eye is one of the most interested project to measure and examined in the process of project management. A project must have three variables that can estimate certain time of the project, limited by budget and meet quality requirement (Lester, 2007). Characteristics in process of construction London Eye can be evaluated as the project, because of the constrains from budget and time, no repetition of construction, requirement of a variety of skill and experience expertise involve. From all of these characteristics summarize that the London Eye is classified as a project. The scope of this paper study is to investigate two aspects, which are stakeholders management, project planning and scheduling that make London Eye become a successful project. However, it is essentially that we have to understand the background of the project first, in order to understand the process. London Eye’s Characteristics Since 2000, the London Eye has become one of the iconic landmarks of London. The concept of London Eyes was introduced in 1993 by the architecture name Marks Barfield. His design of Ferris wheel submitted to the Architecture Foundation competition in order to build to celebrate the millennium year. In 1994, British Airways interest to become a sponsor of the project. In 1996, the permission of the project was successfully made by the agreement of shareholders as the result, Tussauds Group was joined as the last partner. The London Eye was constructed before the year 2000 only 16 months (The British Broadcasting Corporation, 2005). More that 5 different oversea companies worked to build London Eyes and it took 7 years till it was open. The formal opening ceremony on 31, December 1991 and follow by public open on 9, March 2000. The Iron Triangle Figure1: Iron triangle of London Eye project The Iron Triangle is the traditional technique for evaluating project performance, which have three variables; time, cost and scope that try to balance each others (Atkinson, 1999; Gardiner and Stewart, 2000). If one of the three variables is changed, it will affect one of the others too. For example; if stakeholders want less time of construction, they need to increase the budget or reduce the scope (Gregory, 2006). In (Figure1) shows The Iron Triangle of London Eye project follow by time, cost and scope. The London Eye used only 16 months in order to finish the construction process, in order to celebrate millennium century, that is 50 percent less than normal process. The cost of construction of London Eye was 75 million pounds higher than average cost of normal construction. But the cost of building was not issued to be a problem because the main purpose of this is to open on time and to be the biggest Ferris wheel in the world (London Eye, 2014). To understand the key elements of project management, such as stakeholders management, project planning and scheduling which are the factors to push the London Eye finished on time. The Author will illustrate and explain two of variables in further. Stakeholders Management According to, Freeman and Reed (1983) has given a definition of stakeholder is someone that â€Å"can affect the achievement of an organizations objectives or is affected by the achievement of an organization’s objectives†. Bourne and Walker (2004) suggest that even a project manager was able to deliver the project with the original scope, cost and time, but without the attention of stockholders, a project might probably not be able to success. The conflict in stakeholders must be managed, because it might lead to projects fail (Bourne and Walker, 2005). A stakeholder can be any individual, institution or organization that involves the interaction with the project or business. The stakeholder might effect from project, both direct and indirect, and can be occasional or ordinary contact with the project (Paul, 2013). Identify who are the stakeholders and understand the role of them must be done. London Eye project have many stakeholders who are investing in the project. But the key stakeholders of the project, who have the potential to support and facilitate the project can clearly identify. David Marks and Julia Barfield, who invented the idea of the wheel in 1990 were a press campaign to support the concept. Bob Ayling, Chief Executive of British Airway in that period offered financial and corporate support to this project. In 1997, Tussauds Group was brought into the position of the operator. The London Eye Company Limited, were owned by three owner separate in equal shard. David Marks and Julia Barfield owned one third, The Tussauds Group also owned one third and lastly one third owned by British Airways, who was the leading support during the development phase. Government didn’t support the project, except the construction of new pier, in purpose to protect collision of the wheel. For financing purpose of the London Eye project was provided by Sumitomo Bank and Westdeutsche Landesbank (Tim and Ian, 2000). Mace is the UK’s leading company on the project management, as appointed to be Project Managers in 1998. Seven groups of contractors were chosen to project, they were responsible for building and design as follows: Tilbury Douglas Construction Ltd for Foundations, Civil works and Pier structure, Hollandia BV for Wheel Structure, Pomagalski SA for Capsules and Controls, T Clarke PLC for Electrical Installations, Littlehampton Welding Limited for Boarding Platform and Pier Finishes, Waterers Landscape PLC for Landscaping and Alandale Construction Limited for County Hall Fit-Out (Tim and Ian, 2000). From this we can identify stakeholder as two types; internal stakeholders and external stakeholders. Internal stakeholder can be people who involve in part of the business for example; shareholders, managers and employees. External stakeholders are the people who outside the business such as customers, local community, suppliers, press and government (The British Broadcasting Corporation, 2014). Figure2: Stakeholders Web and Internal External Stakeholder From the figure2 above, researcher attempt to explain the understanding of the internal and external stakeholders of The London Eye by using The Stakeholder Web describe. From internal stakeholders, Shareholders can be British Airways, David Marks Julia Barfield and Tussaudes Group that interested in dividends and growth of shares. Managers and employees are interested in salaries and job security. From external stakeholders, suppliers concerned in delivering services and finished project on time. Government, Tourists, Londoner and also including people around the South Bank area are impacted from the project such as the project might effects to new businesses that can take benefits from London Eye such as bars and restaurants. Traffic around the London Eye maybe influenced because increasing of tourists. All of these influencers can become stakeholders of the project. Stakeholders have different of interests, to manage this conflict it’s necessary to understand the types of stakeholders and what can influence their behavior. By classifying the different groups of stakeholders, using stakeholder power and interest matrix, to organize based on the level of power and interest. Stakeholder classification of power and interest matrix map will make groups of stakeholders easier to understand. Stakeholders can be classified in two big dimensions, of power and interest (Newcombe, 2003; Johnson and Scholes, 1993). The basic concept is who have high power and high interest will be the key players and also need to manage it. Figure3: London Eye stakeholder power and interest matrix From the figure 3 shows that London Eye project stakeholders were classified by level of interest and power. The key players in this case can be British Airway who is supporting the financial and able to control the project. Bank and financial institutions such as Sumitomo Bank and Westdeutsche Landesbank, that provided financial loan. Press and local community didn’t have power, but the project directly effects to their living or career. Same as the government, they didn’t provide the financial support but able to collect taxes from the project. Customers and Londoner can be in the group of minimal effort. The success of The London Eye project definitely involved with the stakeholder management. The well understanding in position and its roll are significant to make this project completed. However, it is not only stakeholder management, variable that leads to the success of the project. Many factors that involved included planning and scheduling of the project also are the important variables. Project Planning and Scheduling Project management planning is one of the important variables that required lists of time, quality and cost. Project management planning depends on types and sizes of project (Lester, 2007). The role of project management can separate into three main areas; 1) It can handle the operational requirement to meet the customer satisfaction, 2) The project must be completed on time and 3) Control and delivery the job on the previous set of constrains budget. Good project planning will lead to success according to these three goals. For more understanding of London Eye planning, researchers will apply Work Breakdown Structure (WBS) is the technique for controlling and planning project. Secondly Gantt chart technique will also use to explain in this project. The Work Breakdown Structure (WBS) To organize the structure of the project, Work Breaking Structure assists the work process. It is similar to the outline of the book or report. WBS is the brief version of work structure that help to perform and focus on plan, track and evaluate of the project (Gregory, 2006). According to the diagram, it consists of three benefits of using WBS, First, WBS are easier to evaluate the cost and time of work. Second, it is easy to break down the work into the small tasks and makes it easier to measure the progress. Third, it eases the separation of the tasks into the team member. Moreover, WBS contains two kinds of tasks: the summary tasks and the work packages. Summer tasks will describe each of the processes in the project, for the work packages describe as the lowest level task that required details to complete. From the figure4 shows The London Eye’s Work Breakdown Structure. WBS identifies the work that should be done, based on researcher’s understanding and assuming. The summary tasks can be divided up to four main tasks; safety, stakeholders (internal and external), physical and organizational. Moreover there are more subordinate level breakdown into each main tasks. For example, in physical tasks and the construction of wheel, capsules and foundation can be described as the lower level task of each level. The Gantt chart The Gantt chart was developed during the World War I invented by Henry Laurence Gantt. The Gantt chart uses to identify the necessary steps to obtain a result of work. The process of doing Gantt chart is worked by projecting schedule, follow step by step, from the final result, analyst activities, timing of process and sequence of tasks (Gregory, 2006). The chart can used to compare the estimated time of the project before, start with initial time on the actual time that really spent. Furthermore, Gantt chart can apply to every project, both in big project and small project. For example, building a factory, making a cup of glass or producing a musical. Figure5: London Eye’s Gantt chart From the figure5 shows The London Eye’s Gantt chart. The researcher is using information from the previous research and available documents to create this Gantt chart (The British Broadcasting Corporation, 2005; Tim and Ian, 2000). From this chart can see that London Eye project used approximately 7 years of planning, finding sponsors, get permits and construction. The London Eye can be estimated as the long project in-term of planning, but comparing to the time on construction is apparently very short compared to this kind of the project. Conclusion of the project The London Eye is one of the most successful projects in many aspects. It’s also one of the most successful in architect design of 21st century. The components of London Eye must be assembled above The Thames River that required high technology to handle the project. The original plan of London Eye was planned to be completed the construction in 2 years, but in, finally it used only 16 months to finish the project. If according to, The Iron Triangle theory said that if one of the three variables was changed, it will affect one of the others too. London was used the budget around 75 million pounds to build, but the project’s time construction is faster than expected and the scope has not changed. Unfortunately, components of London Eyes have to ship up and assemble in the Thames River this made it harder to deliver projects on time (Tim and Ian, 2000). The London Eye is not the ordinary project for both suppliers and project management team. To be able to finish on deadline, all around the prost have to be given to everyone who was a part in this project. Shareholders and investors of the project must spend huge money in order to justify risk of the project. For example, if poor quality and not finished on time happened, this implies that the cost of the project may not be the first priority of concern. Therefore, the time and scope or quality must be the first and second priority of the scope in the project. Mace construction that was controlling the project management team of London Eye should be accredited for the achievement and deliver project before deadline. But if they can decrease time for searching operators and suppliers, it could save the cost of the production because time of construction can reduce cost of production. From the stakeholder management perspectives, it illustrates the conflict of interest in shareholders, as the factor of â€Å"Time† had become a conflict among them. However, British Airway as a big shareholder that support financial fund during the construction had burden the high cost of production and risk. But in terms of marketing, British Airway can promote and impose the branding under the sponsorship deal. British Airway also improves brand image by using London Eye as the presenter of their brand. Recommendation of the project Researcher found that from this paper, it helps to understand theories and concept of project management, which make it easier to manage and deal with the project. The fundamentals of controlling cost, deliver on time and satisfaction in quality are significantly important. Not only the stakeholder management and project planning and scheduling will lead to the success of the project. But risk management, uncertainty management, resource management, scope management and other management aspects should be concerned as part of the success factors in project management. Other aspects of business should be considered as important as project management such as financial, human resource management and costumer relationship management. The London Eye project was won over 25 awards for engineering tourism, innovation and design including; 2003 Queen’s Award for Enterprise Innovation Furthermore, the project can make huge profits from the first few months of opening and had recovered the cost (London Eye, 2014). From this show that minimize cost is not always important for business but deliver customer expectation and requirement sometime is more important. The main problem of this project is about lack of managing for future that effects to cost which increases more that it should be. The project manager should concern this point because when one varies in cost, time and quality of project, it will always affect one the others as a whole. 1

Friday, October 25, 2019

Literary Themes In All Quiet O :: essays research papers

Some authors use themes to show the reader some perspective. Erich Maria Remarque’s book “All Quiet on the Western Front'; uses many themes but there are four main ones. Those four themes are the Lost Generation, futility of war, sound imagery, and the institutionalization or depersonalization of war. Some of these themes can be integrated together to make an alarming yet wonderful effect to draw the reader into the story of “All Quiet on the Western Front';.   Ã‚  Ã‚  Ã‚  Ã‚  One of the most prominent themes book is also the most saddening. That theme is the institutionalization or depersonalization of war. Remarque begins the story with Germany’s soldiers fighting an institutionalized war. Soldiers were trained to destroy and kill the enemy. By institutionalizing the war, it was made easier to kill someone just like you for no reason. But by depersonalizing the soldiers with their enemy, it left devastating effects on the mind and heart. Soldiers emotions were deadened and they became irrational. Throughout the story, Paul Baumer, the narrator does not talk about killing someone but as the story progresses, this changes. An example of Paul acting irrational because of the effect war had on him was when he was in the trenches and all of a sudden, a French soldier comes into the trench and Paul immediately stabs him without thinking about, for Paul is scared and emotionally scarred. After stabbing him, Paul leaves him alone to let him bleed to death. In that part of the story, Paul regains a little bit of his emotions because after he stabbed the man, he starts to feel very guilty about it. He tries to talk to the dead man and help the man’s wounds. When Paul looks at the mans wallet, he finds some information about the soldier and realizes that the soldier was very much like himself, the only difference was that they were fighting on different sides. Paul then starts to feel he killed himself and wishes no more of a part in the war.   Ã‚  Ã‚  Ã‚  Ã‚  The institutionalization of the war led to people thinking how futile this war really is. Because the war was so depersonalized for the soldiers of Germany, they start to feel this isn’t their war to fight. Their loyalties are lost. What could have been solved between world leaders in a peace meeting had been made into an all out war, making millions of people lose their lives.

Thursday, October 24, 2019

Gender determination Essay

When an individual is born, he or she has male or female sexual organs and this determines the sex of that individual and consequently how the society expects that person to behave. Gender is different however, in that it transcends the simple biological explanation of why one is a boy and another is a girl. This paper will focus on what makes one a girl putting aside the fact that one was born one. It will also look at the possibility of an individual being born a girl but changing to become a boy. How and why this is done is also part of the discussion. Gender is described as â€Å"the socially constructed roles, behaviour, activities and attributes that a particular society considers appropriate for men and women† (http://www. who. int). This means that to be masculine or feminine depends on a society and not only on the sexual organs that one is born with. Once an individual is born, the society teaches him or her how to behave according to the expectations that specific society has for an individual belonging to his or her particular sex. Every society has some roles that are assigned to male and female members of the society and this determines whether one is male or female. The question then becomes whether one is born with his or her gender or this is learned from the society that one grows in. In my own case, attending a girl’s school determined my becoming feminine and thus becoming a girl despite the fact that I was born a girl. In the school, only girls were around and thus were the only role models that I had. This meant that I only had other girls to emulate in my behaviour and my peers were also girls so together we all aspired to be better girls. The teachers we had were also keen on ensuring that we were trained on how girls should behave in certain occasions and also which aspects were to be admired in a girl and which were abhorrent in a female. This shows that one can be trained to become feminine or masculine but it is important to note that it is not always so. This can be demonstrated by the number of girls who would get into trouble with the teachers for playing truant yet this was supposed to be an undesirable trait for girls and hence was dissuaded. These girls were given the same training as all their peers yet tended to behave differently causing one to question whether gender is completely determined by the society (Morrow 1991). Despite the question that is posed above, it is clear that girls who are educated in girl’s only schools are usually more feminine than those who attend mixed schools. This is because those in mixed schools are not controlled as much as those in girls only schools. The environment they are reared in leans more towards femininity and thus tends to discourage any behaviour that is seen to be masculine. The lack of an alternative form of behaviour leads to their feminine behaviour although some will try deviate by doing what they think others are doing elsewhere (Askew & Davey 2005). This then leads to the question whether or not one can change from being a girl into a boy? Apart from the biological way, culture has two different ways of changing an individual’s gender. This can either be done by changing the culture one has been brought up in or by being brought up in an environment that emphasises the behaviour of the opposite sex (Watney 1994). Since gender is determined by the roles that a society assigns to each sex, ones gender can change depending on the culture one finds him or herself in at a particular time. Roles assigned to the sexes by different cultures differs and are interchanged whereby roles assigned to women in one culture may be assigned to men in another culture. In this way a male in one culture may be seen to be feminine in another thus changing a male into a female or vice versa. Another way that one can change ones gender is by rearing a girl in a male environment. The girl tends to adopt the masculine behaviours exhibited by her male counter parts as has been witnessed by the women who venture into fields assumed to be the male domain. This is in politics and business where women who succeed in these environments are seen to be more masculine than feminine thus changing their gender to becoming more male than female (Miller, Lewy & Peckham1997). In conclusion, it is correct to say that an individual’s gender is not only determined by his or her sex but also by the culture that they have grown in. the roles that a culture assigns to an individual are used to determine femininity and masculinity of members of the society. It is possible for ones gender to be changed depending on which community one is in. Roles assigned depending on an individuals sex change according to the society. Furthermore, the environment one is in influences the behaviour one has thus influencing the gender that one belongs to. Reference 1. Askew J. & Davey M. 2005, Sex Acts: Practices of Femininity and Masculinity, Archives of Sexual Behaviour Vol. 34, Sage Publications, Thousand Oaks 2. Gender, World health organization retrieved on 13th April 2009 from http://www. who. int/topics/gender/en 3. Miller J. B. , Lewy J. & Peckham E. 1997, Context Effects on Self-Perceptions of Feminine and Masculine Quantities, Sex: A Journal of Research Vol. 37 4. Morrow F. 1991, Unleashing Our Unknown Selves: An Inquiry into the Future of Femininity and Masculinity, Praeger Publishers 5. Watney S. 1994, Aphrodite of the Future, Artforum International Vol. 32

Wednesday, October 23, 2019

Poem Comparison †Telephone Conversation Essay

The context of this poem is of a black man from Africa trying to find accommodation, it is based on his experiences as a student in the 1960’s. The poem is written from the perspective as a phone discussion between him and a landlady. The main problem in this poem is that there is a huge amount of racism show by the landlady to the African – ‘How dark? Are you light or very dark?’ This shows immediately that the landlady has something against coloured people and can’t have a conversation without knowing the skin colour of the man. It also seems that the landlady would prefer the man not be coloured than to rather receive money for the accommodation. The impression we get from the landlady tells us that she is a very racist and ignorant woman. She first shows this after the man mentions he’s an Africa, which she doesn’t reply to – ‘Silence, silenced transmission of pressurised good breeding.’ The silence shows us her simple summary of her response of having to think twice about accommodating the black man. She shows that she has a sense of racism in her – ‘Considerate she was, varying the emphasis – Are you dark? Or very light?’ This tells us that the landlady is trying to imagine all the colours he could be and shows she judges people totally on colour. We also see that she is wealthy and cares about her image a lot – ‘Lipstick coated, long gold – rolled cigarette holder piped.’ From the view of the man he would think she is also a snob due to the way she is speaking to him and her questions. When the conversation starts it begins normally but is changed completely when the man says he is African – ‘Self confession – I am African.’ This suggests that the mans skin colour is a sin which he is guilty of. He also feels that he needs to defend himself even before the woman has started to ask any questions. Then after the landlady asked him how dark he was he didn’t know how to respond to her – ‘Button A, Button B,’ this shows us that the man is shocked and confused to answer the question just asked. After the man realises that the landlady has a sense of racism in her, he begins to become angry and compares it to the environment he is in – ‘Red booth, red pillar box, red double tiered.’ The red that he is describing represents his feelings which means he is angry and the environment seems repulsive to him. When the man says – ‘Like plain or milk chocolate’ he is talking about his skin colour and at the same time making a clever joke out of it. He is also mocking the landlady and showing her that he is not going to put up with the racist questions anymore. This shows that he is beginning to twist the conversation and is now the person who is asking the questions. He shows this when he says his colour is ‘West African Sepia’ and then asking her if she knew his skin colour. But as ‘West African Sepia’ isn’t a colour it tells us that the man is using his knowledge to make a fool of her. This makes him feel better due to the fact that he is now criticising her. Also, he feels he wants to make her feel the same way he felt when he had to answer the racist questions. The attitude of the man changes at the end of the poem from being a polite and respectful to an angry and rude man. But he changes his attitude because of the landlady’s judgement of him and decided to show his angry and rage to show that he is not a weak person. The man is now making fun of her and is mocking her at more length when he speaks about his colour – ‘Don’t you know what it is? That’s dark, isn’t it?’ He then starts to be rude by offering to show his bottom under the pretence of suggesting she meets him before judging – ‘My bottom raven black, wouldn’t you rather see for yourself.’ He does this to make her feel uncomfortable as he was before and tried to put her in a complicated position. The control of power in the beginning of this poem was in the hands of the landlady as she owns the house and is offering the accommodation to the man. As the poem continues her power begins to decrease as the man reverses the situation as he starts to mock her. By the end of the poem the man has gained all the power from the landlady and is so powerful the landlady talks but only when she is asked a question. I think the poet wrote this to show that people who seem to be weak like the African man could be clever enough to gain power. Also, people who are foreign to a country still believe they have rights to fight back to unpleasant comments. You Will Be Hearing From Us Shortly The context of this poem is based on an interview for a position at a company. The interview includes the ‘interviewer’ and ‘interviewees’. The poem is written from the perspective of the interviewer asking questions to the candidates. The main problem in this situation is that there is a sense of prejudice shown by the interviewer to the candidates. Also, the candidates are not being treated fair to even be considered the position at the company. Another problem is that in the poem people are judged on looks and appearance instead of their knowledge and potential. The impression we get from the interviewer is that she wants the interviewee to know that she is in charge and is the only person asking the questions. This is shown in the first stanza when she immediately asks her questions, which shows she has a much more superior attitude than the interviewees – ‘You feel adequate to the demands of this position’. This shows from the start-off that the interviewer is in control and doesn’t show any manners to wait for a response but instead asks the next question. The character of the interviewer develops into being rude and also she doesn’t pay attention to the interviewee’s emotions or feelings. She shows that she is rude when she questions their looks and abilities – ‘Find your appearance, disturbing?’ She also is more direct in asking questions and doesn’t hesitate of their reaction this is show hen she questions their accent – ‘And your accent that is the way you have always spoken, is it?’ This gives us the impression that she is insulting the speech of the interviewee. The poet makes us think that the candidate is really weak and doesn’t show any sign of defending herself. Also, whenever the interviewer finishes asking a question she also replies for the candidates – ‘So glad we agree, Quite so.’ This shows that they are so powerless they can’t be able to answer for themselves. It also shows us that the interviewees seem that they don’t care about receiving criticism and do not have the power to stand up and respond. The character of the candidate develops into being more weaker than she is already. She receives more and more criticism from the interviewer and never has the chance to respond due to the interviewers power – ‘What of your education? Where were you educated?’ This shows the interviewer is now not even giving the courtesy of a response and instead goes straight onto the next question, showing the interviewee’s lack of importance to her. The control of power in this poem was in the hands of the interviewer in the beginning. As the poem continues her power gets stronger and stronger and becomes so strong that at a point you’d forget that the candidates are even present. By the end of the poem the interviewer still has all the power possible in the interview and uses it to great effect against the interviewees. I think the poets reasons for writing this poem is to show people that a person who is in a powerful enough position to make judgements of people can have even more power by showing it and using it to their advantage.