Saturday, August 31, 2019

Compare and Contrast between Arranged Marriage and Love Marriage Essay

Comparison and Contrast between Arranged Marriage and Love Marriage It is believed that marriages are made in heaven. It might be true while in reality the couples who are married are either in love with one another or the marriages are finalized or arranged by their family members. Debate about whether love marriage or arranged marriage is better is never ending as both sides have their experience and testimony to support the system which suits them. The purpose of this passage is to compare the arranged marriage with love marriage from the aspect of mutual understanding and love; and contrast the two types of marriages from the aspects of differences in expectations and mutual attitudes after the wedding, different reactions from the family. We should be aware that modern arranged marriage isn’t equal to forced marriage. Today parents are more realistic and becoming broad minded enough to accept the choice of their kids in marriage. Arranged marriages are also successful when the parents don’t force their children to marry whom they don’t want to and when the parents support and help their children to find their respective spouses as per their desires and likings. It is definitely wonderful when children are given the right to take a decision themselves on their marriage and also there should be proper arrangements for the first time—this is also called a period of courtship when both of them decide to date and decide to get married. Therefore, love can also be generated between the arranged ones during this period. Since it is true love, it has nothing to do with time. Whether it is a love or arranged wedding, it should be based on love, empathy, responsibility, concern, and commitment. The similarity also exists in the life after the wedding. It calls for a lot of dedication and efforts to carry on the relation. And to support and live happily with each other, both of them need patience, perseverance, and mutual affection and care. Despite the similarities, there are also some obvious differences. The first difference appears in the different expectations and mutual attitudes after the wedding. In the case of arranged marriages, the first few years are spent to know and understand much more deeply about each other’s likes and dislikes. The thrill and excitement of knowing each other, always keeps the couple motivated and positive towards each other. Whereas in the case of love marriages, the bride and the groom have already gotten along with each other for a long time and there are no more space left for the interest or curiosity of knowing more about each other. In the case of arranged marriages, even a small deed of care and forgiveness, leads to the strengthening of the marriage as a bond and the feeling of adjustment and compromise is more compared to the love marriages. While in love ones, the bride and the groom are always in a situation to compromise and the feelings may be no longer fresh and there are a lot of expectations from the life partner, which when left unfulfilled, will lead to quarrels and misunderstandings. For instance, sometimes discords may arise between couples having love marriages. It has come to the fore that after spending a long time together, many couples in love marriages are found to be repenting on their decisions. They find it hard to keep up the nuptial life and at last break the bond to get free. That is why it is reported that the divorce rate for arranged marriages in the traditional countries is much lower than those in the United States, where marriages out of love rule. Moreover, arranged marriages enjoy a clear edge over the love ones also because most parents think that only they are competent in finding the most suitable match for their beloved sons or daughters. Marriage is not just two people coming together but two families uniting to bring two souls together in holy matrimony. In arranged marriages the family or the matchmaker first scrutinizes the possible brides, their family and background and leaves the final decision with the groom or vice versa. The whole family support the matrimony during high and low times. They see to it that the couple is happy with one another at all times. Minor misunderstandings are cleared by advice from seniors who act as relationship managers and marriage councilors. With such an expert team around the couple thrive joyously. Contrarily in arranged marriages, there is a lot of pressure on the couples to meet parental expectations. Apart from the fact that couples in love have to face the challenges of the community and pacify their family members to accept the partner chosen by them, they have to make great efforts if they found their characteristics and family values didn’t fit into the new family. There can also be disputes emerging frequently in love marriages such as producing offspring, taking participation in family rituals, developing great rapport with sisters-in-laws, contributing to family expenses, and so on. As for myself, I’m kind of neutral. Being a girl with unpredictable future, I don’t think I have to depend on my family to find my life-long partner for me. But I do think an arranged marriage isn’t a bad choice when I’m at the marriage age without finding my Mr. Right. At that time an arranged marriage is undoubtedly a choice to widen my social circle as well as introduce me more people and to make both my parents and I happy. In conclusion, arranged marriage and love marriage are different when it comes to the mutual expectations and attitudes as well as family reactions. However, they also share similarities in the vital existence of love and understanding. We should remember that love is a vital element in a marriage, no matter what type or form we follow. It should happen and then bliss will subsequently follow.

Eng 157 Multicultural Analysis Paper

The Importance of Multicultural Literature ENG/157 David McCarthy The Importance of Multicultural Literature The introduction to multicultural literature into the broad world of differing walks of life, the reader may be surprised by the similarities between the cultures as well as the differences. Cultures are as eclectic as we are as individuals, each with their own quirks, intricacies, and uniqueness that inspires individuality regarding how the vast differences between cultures correlate to our own.Upon deeper examination of multicultural literature, however; we are also given the privilege to walk the path of the individual from whose perspective we are privy to through the written word. As many have wished at one point or another to know and understand what a particular individual is thinking, through reading multicultural literature, the opportunity to have such an experience and glean copious amounts of information. From the subtlest detail to major political agendas to perso nality quirks derived from current or past social standards of that culture.Although differences in points of view can prohibit understanding upon first contact greater exposure to literature from various cultures, one can find relation within themselves. One can empathize and humanize the characters that ultimately open the door to greater understanding of how a culture operates as well as attain the ability to relate those experiences to one’s own. To understand multicultural literature, one must first try to understand the cultural background of the author where he or she lives, what time, what their secular views are in a particular subject as well as their passions and influences.For instance, Ngugi Wa Thiong’o’, author of the short story ‘The Return’ is heavily influenced by his negativity toward British colonialism in Africa. The â€Å"The Complete Review† (2010-2012) website had a list of the pros and cons of the author’s writi ng stating that he has a â€Å"Powerful anti-colonial voice, a strong stylist, a significant novelist, playwright, and public intellectual. † It also went on to say that â€Å"Angry Marxist politics creep a bit far into some of his work and older works can feel somewhat dated. † Kamau, the main character in this particular ork of Thiong’o’s, depicts what the people ultimately have suffered because of the colonial regime within Africa. The character represents not only what the people of Africa forced to suffer but also hope that the effect of what transpired can be overcome through perseverance despite devastation endured. The author, Ken Saro-Wiwa, also politically motivated which is a characteristic prominent within his short story â€Å"Africa Kills Her Sun†. Having sided with the minority Ogoni within his homeland of Nigeria, his protests and resistance against the dictatorship of General Sani Abacha led to his imminent execution.Within this pa rticular short story, though, he wrote the character Bana as one who sees his acts of criminality no different from that of those in more prestigious standing. This ultimately leads the reader to question how criminal activity, such as robbery is any different from that of the sly, underhanded actions of a politician or any other individual in a position of power. Readers also develop an emotional attachment to a character, such as the main character in Chitra Divakaruni’s â€Å"Mrs. Dutta Writes a Letter†.From the direct perspective of the character, the reader looks through the eyes of an elderly widow from India who struggles to find balance between her ingrained traditions and customs from her native homeland to the vastly different culture of America. Mrs. Dutta struggles with her understanding of technology, culinary preferences, distinctively different parenting styles, and proper decorum regarding personal space. She finds herself lost within a struggle between wanting the companionship of her son and grandchildren and her yearning to return to the familiarity of home.Upon closer examination of this piece, the reader can identify with the character and the feeling of misplacement in foreign surroundings. This story also illustrates the struggle with diversity within The United States. As Mrs. Dutta’s son and his family try to maintain assimilation-disregarding their heritage and customs to avoid stereotyping, Mrs. Dutta reminds them of where they originate. The integration of cultures within The United States is predominantly why the United States viewed as the â€Å"Land of Opportunity†. Despite the years of being classified as ‘The Melting Pot†, diversity remains a struggle for many immigrants.This story is a prime example of the internal conflict between heritage and assimilation as well as the strength of familial bonds. The history of a culture is of huge importance within multicultural literature. The attac k on 9/11 within the United States is an event that had both shattered the United States as well as assist in the formation of the future history of the United States. Pride and patriotism after that particular event blossomed along with a heavy rift regarding diversity, especially those of the Islamic faith.Remembering such a tragic event honors those who have lived through it as well as lights a mental candle for those who did not. History is as important in other cultures as well. Understanding and appreciating facts as well as religious mythology, such as the Native American mythology described within Margaret Lawrence’s â€Å"The Loons†. The loons within this story represent a mythological representation of an omen of death in some Native American cultures. The character, Piquette, after staggering through life with two separate identities-Cree and French-ultimately succumbs to this omen.Much like the yellow ribbon represents the soldiers fighting to maintain our freedom battling terrorists and risking their lives, the loons in this story represent the battle between two different cultural backgrounds fighting against each other in a metaphorical sense. If a culture denies its history, the culture is denied its identity. History weaved within the yarns of multicultural literature shine a light upon the dusty background that assisted in the formation of the culture, therefore breaking down the barriers of the misunderstanding of ethics, principles, traditions, and mindset.Much like the dissemination of the history and politics of different cultures, multicultural literature also deepens the understanding of perspective, education, and view on controversial topics such as in Ha Jin’s â€Å"The Bridegroom†. The â€Å"Barnes & Noble† (1997-2012) website included an editorial review upon the short story stating that â€Å"The title story is perhaps the most telling indication of the clash of humanitarian feeling and bureaucr atic intervention.The protagonist, who has been taught to believe that â€Å"homosexuality originated in Western capitalism and bourgeois lifestyle,† is unable to credit his own sympathy for his son-in-law, who is sent to a mental hospital to cure his â€Å"disease. † Ha Jin has a rare empathy for people striving to balance the past and the future although caught on the cusp of change. (Oct. ) Copyright 2000 Cahners Business Information. |† (Editorial Reviews). The story, set in China illustrates the ignorance of homosexuality. Considering the different sects within theUnited States and from other various countries and religious backgrounds that do not understand nor accept homosexuality, this story showcases how relative that misunderstanding can be. Although The United States has erred to the side of acceptance on this particular lifestyle, there are certain groups that due to the ignorance and neglect of education refuse to accept it. Aside from the topic of h omosexuality within the piece and the misinformation regarding that particular lifestyle, the story also initiates the question of what marriage in point of fact entails.With homosexuals fighting for the right to marry within the United States being the most controversial topic, the question that arises after reading â€Å"The Bridegroom†, is whether or not unwavering loyalty without sexual attraction predetermines a solid marriage. Beina, the main female character within the piece remains loyal to her homosexual husband despite his or her lack of physical intimacy instead based the relationship upon respect and companionship.Reading multicultural literature not only strengthens the bond between individuals, it also strengthens the bonds of diversity. Diversity allows individuals to learn and expand knowledge. It increases the amount of respect through first person narratives, memoirs, and the ideals within fiction. Contrary to popular belief, fiction does instill fact in a c omprehensive manner where the reader can walk for a short time in another individual’s footsteps, trace out the character’s heritage, and take a glimpse inside the mind of an individual from a foreign land.A writer puts themselves into their work and the readers having taken the time to examine the stories can see the particular voice of the writer to understand and appreciate the author as well as the characters. References The Complete Review. (2010-2012). Retrieved from http://www. complete-review. com/authors/ngugi. htm Barnes & Noble. (1997-2012). Retrieved from http://www. barnesandnoble. com/w/bridegroom-ha-jin/1102808435

Friday, August 30, 2019

Fool Chapter 6

SIX FRIENDSHIP AND THE ODD BONK Life is loneliness, broken only by the gods taunting us with friendship and the odd bonk. I admit it, I grieved. Perhaps I am a fool to have expected Cordelia to stay. (Well, yes, I am a fool – don't be overly clever, eh? It's annoying.) But for most of my manly years she had been the lash on my back, the bait to my loins, and the balm of my imagination – my torment, my tonic, my fever, my curse. I ache for her. There is no comfort in the castle. Drool gone, Taster gone, Lear gone mad. At best, Drool was little more company than Jones, and decidedly less portable, but I worry for him, great child that he is, stumbling about in the circle of so many villains and so much sharp metal. I miss his gape-toothed smile, filled as it was with forgiveness, acceptance, and often, cheddar. And Taster, what did I know of him, really? Just a wan lad from Hog Nostril on Thames. Yet when I needed a sympathetic ear, he provided, even if he was oft distracted from my woes by his own selfish dietary concerns. I lay on my bed in the portislodge staring out the cruciform arrow loops at the grey bones of London, stewing in my misery, yearning for my friends. For my first friend. For Thalia. The anchoress. On a chill autumn day at Dog Snogging, the third time I was allowed to bring food to the anchoress, we became fast friends. I was still in awe of her, and merely being in her presence made me feel base, unworthy, and profane, but in a good way. I passed the plate of rough brown bread and cheese through the cross in the wall with prayers and a plea for her forgiveness. â€Å"This fare will do, Pocket. It will do. I'll forgive you for a song.† â€Å"You must be a most pious lady and have great love for the Lord.† â€Å"The Lord is a tosser.† â€Å"I thought the Lord was a shepherd?† â€Å"Well, that, too. But a bloke needs hobbies. Do you know ‘Greensleeves'?† â€Å"I know ‘Dona Nobis Pacem.'† â€Å"Do you know any pirate songs?† â€Å"I could sing ‘Dona Nobis Pacem' like a pirate.† â€Å"It means give us peace, in Latin, doesn't it?† â€Å"Aye, mistress.† â€Å"Bit of a stretch then, innit, a pirate singing give us bloody peace?† â€Å"I suppose. I could sing you a psalm, then, mistress.† â€Å"All right, then, Pocket, a psalm it is – one with pirates and loads of bloodshed, if you have it.† I was nervous, desperate for approval from the anchoress, and afraid that if I displeased her I might be struck down by an avenging angel, as seemed to happen often in scripture. Try as I might, I could not recall any piraty psalms. I cleared my throat and sang the only psalm I knew in English: â€Å"The Lord is my tosser, I shall not want – â€Å" â€Å"Wait, wait, wait,† said the anchoress. â€Å"Doesn't it go, ‘the Lord is my shepherd'?† â€Å"Well, yes, mistress, but you said – â€Å" And she started to laugh. It was the first time I heard her truly laugh and it felt as if I was getting approval from the Virgin herself. In the dark chamber, just the single candle on my side of the cross, it seemed like her laughter was all around me, embracing me. â€Å"Oh, Pocket, you are a love. Thick as a bloody brick, but such a love.† I could feel the blood rise in my face. I was proud and embarrassed and ecstatic all at once. I didn't know what to do, so I fell to my knees and prostrated myself before the arrow loop, pushing my cheek against the stone floor. â€Å"I'm sorry, mistress.† She laughed some more. â€Å"Arise, Sir Pocket of Dog Snogging.† I climbed to my feet and stared into the dark cross-shaped hole in the wall, and there I saw that dull star that was her eye reflecting the candle flame and I realized that there were tears in my own eyes. â€Å"Why did you call me that?† â€Å"Because you make me laugh and you are deserving and valiant. I think we're going to be very good friends.† I started to ask her what she meant, but the iron latch clanked and the door into the passageway swung slowly open. Mother Basil was there, holding a candelabra, looking displeased. â€Å"Pocket, what's going on here?† said the mother superior in her gruff baritone. â€Å"Nothing, Reverend Mother. I've just given food to the anchoress.† Mother Basil seemed reluctant to enter the passageway, as if she was afraid to be in view of the arrow loop that looked into the anchoress's chamber. â€Å"Come along, Pocket. It's time for evening prayers.† I bowed quickly to the anchoress and hurried out the door under Mother Basil's arm. As the sister closed the door, the anchoress called, â€Å"Reverend Mother, a moment, please.† Mother Basil's eyes went wide and she looked as if she'd been called out by the devil. â€Å"Go on to vespers, Pocket. I'll be along.† She made her way into the dead-end passageway and closed the door behind her even as the bell calling us to vespers began to toll. I wondered what the anchoress would discuss with Mother Basil, perhaps some conclusion she had realized during her hours of prayer, perhaps I had been found wanting and she would ask that I not be sent to her again. After just making my first friend, I was sorely afraid of losing her. While I repeated the prayers in Latin after the priest, in my heart I prayed to God to not take my anchoress away, and when mass ended, I stayed in the chapel and prayed until well after the midnight prayers. Mother Basil found me in the chapel. â€Å"There are going to be some changes, Pocket.† I felt my spirit drop into my shoe soles. â€Å"Forgive me, Reverend Mother, for I know not what I do.† â€Å"What are you on about, Pocket? I'm not scolding you. I'm adding duties to your devotion.† â€Å"Oh,† said I. â€Å"From now on, you are to take food and drink to the anchoress in the hour before vespers, and there in the outer chamber, shall you sit until she has eaten, but upon the bell for vespers you are to leave there, and not return until the next day. No longer than an hour shall you stay, do you understand?† â€Å"Yes, mum, but why only the hour?† â€Å"More than that and you will interfere with the anchoress's own communion with God. Further, you are never to ask her about where she was before this, about her family, or her past in any way. If she should speak of these things you are to immediately put your fingers in your ears, and verily sing ‘la, la, la, la, I can't hear you, I can't hear you,' and leave the chamber immediately.† â€Å"I can't do that, mum.† â€Å"Why not?† â€Å"I can't work the latch to the outer door with my fingers in my ears.† â€Å"Ah, sweet Pocket, I do so love your wit. I think you shall sleep on the stone floor this night, the rug shields you from the blessed cooling of your fevered imagination, which God finds an abomination. Yes, a light beating and the bare stone for you and your wit tonight.† â€Å"Yes, mum.† â€Å"And so, you must never speak with the anchoress about her past, and if you should, you shall be excommunicated and damned for all eternity with no hope for redemption, the light of the Lord shall never fall upon you, and you shall live in darkness and pain for ever and ever. And in addition, I shall have Sister Bambi feed you to the cat.† â€Å"Yes, mum,† said I. I was so thrilled I nearly peed. I would be blessed by the glory of the anchoress every single day. â€Å"Well that's a scaly spot o' snake wank,† said the anchoress. â€Å"No, mum, it's a cracking big cat.† â€Å"Not the cat, the hour a day. Only an hour a day?† â€Å"Mother Basil doesn't want me to disturb your communion with God, Madame Anchoress.† I bowed before the dark arrow loop. â€Å"Call me Thalia.† â€Å"I daren't, mum. And neither may I ask you about your past or from whence you come. Mother Basil has forbidden it.† â€Å"She's right on that, but you may call me Thalia, as we are friends.† â€Å"Aye, mum. Thalia.† â€Å"And you may tell me of your past, good Pocket. Tell me of your life.† â€Å"But, Dog Snogging is all I know – all I have ever known.† I could hear her laughing in the dark. â€Å"Then, tell me a story from your lessons, Pocket.† So I told the anchoress of the stoning of St. Stephen, of the persecution of St. Sebastian, and the beheading of St. Valentine, and she, in turn, told me stories of the saints I had never heard of in catechism. â€Å"And so,† said Thalia, â€Å"that is the story of how St. Rufus of Pipe-wrench was licked to death by marmots.† â€Å"That sounds a most horrible martyring,† said I. â€Å"Aye,† said the anchoress, â€Å"for marmot spit is the most noxious of all substances, and that is why St. Rufus is the patron of saliva and halitosis unto this day. Enough martyring, tell me of some miracles.† And so I did. I told of the magic, self-filling milk pail of St. Bridgid of Kildare, of how St. Fillan, after his ox was killed by a wolf, was able to compel the same wolf to pull a cart full of materials for building a church, and how St. Patrick drove the snakes out of Ireland. â€Å"Aye,† said Thalia, â€Å"and snakes have been grateful ever since. But let me apprise you of the most wondrous miracle of how St. Cinnamon drove the Mazdas out of Swinden.† â€Å"I've never heard of St. Cinnamon,† said I. â€Å"Well, that is because these nuns at Dog Snogging are base and not worthy to know such things, and why you must never share what you learn here with them lest they become overwhelmed and succumb to an ague.† â€Å"An ague of over-piety?† â€Å"Aye, lad, and you will be the one to have killed them.† â€Å"Oh, I would never want to do that.† â€Å"Of course you wouldn't. Did you know, in Portugal they canonize a saint by actually shooting him out of a cannon?† And so it went, day in, day out, week in, week out, trading secrets and lies with Thalia. You might think that it was cruel of her to spend her only time in contact with the outside world telling lies to a little boy, but then, the first story that Mother Basil had told me was about a talking snake who gave tainted fruit to naked people, and the bishop had made her an abbess. All along what Thalia was teaching me was how to entertain her. How to share a moment in story and laughter – how you could become close to someone, even when separated from them by a stone wall. Once a month for the first two years the bishop came from York to check on the anchoress, and she would seem to lose her spirit for a day, as if he were skimming it off and taking it away, but soon she would recover and our routine of chat and laughter would go on. After a few years the bishop stopped coming, and I was afraid to ask Mother Basil why, lest it be a reminder and the dour prelate resume his spirit-sucking sojourns. The longer the anchoress was in her chamber, the more she delighted in my conveying the most mundane details from the outside. â€Å"Tell me of the weather today, Pocket. Tell me of the sky, and don't skip a single cloud.† â€Å"Well, the sky looked like someone was catapulting giant sheep into the frosty eye of God.† â€Å"Fucking winter. Crows against the sky?† â€Å"Aye, Thalia, like a vandal with quill and ink set loose to randomly punctuate the very dome of day.† â€Å"Ah, well spoken, love, completely incoherent imagery.† â€Å"Thank you, mistress.† While about my chores and studies I tried to take note of every detail and construct metaphors in my head so I might paint word pictures for my anchoress, who depended on me to be her light and color. My days seemed to begin at four when I came to Thalia's chamber, and end at five, when the bell rang for vespers. Everything before was in preparation for that hour, and everything after, until sleep, was in sweet remembrance. The anchoress taught me how to sing – not just the hymns and chants I had been singing from the time I was little, but the romantic songs of the troubadours. With simple, patient instruction, she taught me how to dance, juggle, and perform acrobatics, and all by verbal description – not once in those years had I laid eyes on the anchoress, or seen more than her partial profile at the arrow loop. I grew older and fuzz sprouted on my cheek – my voice broke, making me sound as if a small goose was trapped in my gullet, honking for her supper. The nuns at Dog Snogging started to take notice of me as something other than their pet, for many were sent to the abbey when they were no older than I. They would flirt and ask me for a song, a poem, a story, the more bawdy the better, and the anchoress had taught me many of those. Where she had learned them, she would never say. â€Å"Were you an entertainer before you became a nun?† â€Å"No, Pocket. And I am not a nun.† â€Å"But, perhaps your father – â€Å" â€Å"No, my father was not a nun either.† â€Å"I mean, was he an entertainer?† â€Å"Sweet Pocket, you mustn't ask about my life before I came here. What I am now, I have always been, and everything I am is here with you.† â€Å"Sweet Thalia,† said I. â€Å"That is a fiery flagon of dragon toss.† â€Å"Isn't it, though?† â€Å"You're grinning, aren't you?† She held the candle close to the arrow loop, illuminating her wry smile. I laughed, and reached through the cross to touch her cheek. She sighed, took my hand and pressed it hard against her lips, then, in an instant, she had pushed my hand away and moved out of the light. â€Å"Don't hide,† said I. â€Å"Please don't hide.† â€Å"Fat lot of choice I have about whether I hide or not. I live in a bloody tomb.† I didn't know what to say. Never before had she complained about her choice to become the anchoress of Dog Snogging, even if other expressions of her faith seemed – well – abstract. â€Å"I mean don't hide from me. Let me see you.† â€Å"You want to see? You want to see?† I nodded. â€Å"Give me your candles.† She had me hand four lit candles through the arrow loop. Whenever I performed for her she had me set them in holders around the outer chamber so she could see me dance, or juggle, or do acrobatics, but never had she asked for more than one candle in her own chamber. She placed the candles around her chamber and for the first time I could see the stone pallet where she slept on a mattress of straw, her meager possessions laid out on a heavy table, and Thalia, standing there in a tattered linen frock. â€Å"Look,† she said. She pulled her frock over her head and dropped it on the floor. She was the most beautiful thing I had ever seen. She looked younger than I had imagined, thin, but womanly – her face was that of a mischievous Madonna, as if carved by a sculptor inspired more by desire than the divine. Her hair was long and the color of buckskin, catching the candlelight as if a single ray of sunlight might make it explode in golden fire. I felt a heat rise in my face, and another kind of rise in my trousers. I was excited and confused and ashamed all at once, and I turned my back on the arrow loop and cried out. â€Å"No!† Suddenly, she was right behind me, and I felt her hand on my shoulder, then rubbing my neck. â€Å"Pocket. Sweet Pocket, don't. It's all right.† â€Å"I feel like the Devil and the Virgin are doing battle in my body. I didn't know you were like that.† â€Å"Like a woman, you mean?† Her hand was warm and steady, kneading the muscles in my shoulder through the cross in the wall and I leaned into it. I wanted to turn and look, I wanted to run out of the chamber, I wanted to be asleep, or just waking – ashamed that the Devil had visited me in the night with a damp dream of temptation. â€Å"You know me, Pocket. I'm your friend.† â€Å"But you are the anchoress.† â€Å"I'm Thalia, your friend, who loves you. Turn around, Pocket.† And I did. â€Å"Give me your hand,† said she. And I did. She put it on her body, and she put her hands on mine, and pressed against the cold stone. Through the cross in the wall, I discovered a new universe – of Thalia's body, of my body, of love, of passion, of escape – and it was a damn sight better than bloody chants and juggling. When the bell rang for vespers we fell away from the cross, spent and gasping, and we began to laugh. Oh, and I had chipped a tooth. â€Å"One for the Devil, then, love?† said Thalia. When I arrived with the anchoress's supper the next afternoon she was waiting with her face pressed nearly through the center of the arrow cross – she looked like one of the angel-faced gargoyles that flanked the main doors of Dog Snogging, except they always seemed to be weeping and she was grinning. â€Å"So, didn't go to confession today, did you?† I shuddered. â€Å"No, mum, I worked in the scriptorium most of the day.† â€Å"Pocket, I think I would prefer you not call me mum, if it's not too much to ask. Given the new level of our friendship it seems – oh, I don't know – unsavory.† â€Å"Yes, m – uh – mistress.† â€Å"Mistress I can work with. Now, pass me my supper and see if you can fit your face in the opening the way that I have.† Thalia's cheekbones were wedged in the arrow loop, which was little wider than my hand. â€Å"Doesn't that hurt?† I'd been finding abrasions on my arms and various bits all day from our adventure the night before. â€Å"It's not the flaying of St. Bart, but, yes, it stings a bit. You can't confess what we did, or what we do, love? You know that, right?† â€Å"Then am I going to have to go to hell?† â€Å"Well – † She pulled back, rolled her eyes as if searching the ceiling for an answer. † – not alone. Give us our supper, lad, and get your face in the loop, I have something to teach you.† And so it went for weeks and months. I went from being a mediocre acrobat to a talented contortionist, and Thalia seemed to regain some of the life that I had thought sure she'd lost. She was not holy in the sense that the priests and nuns taught, but she was full of spirit and a different kind of reverence. More concerned with this life, this moment, than an eternity beyond the reach of the cross in the wall. I adored her, and I wanted her to be out of the chamber, in the world, with me, and I began to plan her escape. But I was but a boy, and she was bloody barking, so it was not meant to be. â€Å"I've stolen a chisel from a mason who passed by on his way to work on the minster at York. It will take some time, but if you work on a single stone, you might escape in summer.† â€Å"You are my escape, Pocket. The only escape I can ever allow myself.† â€Å"But we could run off, be together.† â€Å"That would be smashing, except I can't leave. So, hop up and get your tackle in the cross. Thalia's a special treat for you.† I never seemed to make my point once my tackle went in the cross. Distracted, I was. But I learned, and while I was forbidden confession – and to tell the truth, I didn't feel that badly about it – I began to share what I had learned. â€Å"Thalia, I must confess to you, I have told Sister Nikki about the little man in the boat.† â€Å"Really? Told her or showed her?† â€Å"Well, showed her, I reckon. But she seems a bit thick. She kept making me show her over and over – asked me to meet her in the cloisters to show her again after vespers tonight.† â€Å"Ah, the joy of being slow. Still, it's a sin to be selfish with one's knowledge.† â€Å"That's what I thought,† said I, relieved. â€Å"And speaking of the little man in the boat, I believe there is one on this side of the loop who has been naughty and requires a thorough tongue-lashing.† â€Å"Aye, mistress,† said I, wedging my cheeks into the arrow loop. â€Å"Present the rascal for punishment.† And so it went. I was the only person I knew who had calluses on his cheekbones, but I had also developed the arms and grip of a blacksmith from suspending myself with my fingertips wedged between the great stones to extend my bits through the arrow loop. And thus I hung, spread spiderlike across the wall, my business being tended to, frantic and friendly, by the anchoress, when the bishop entered the antechamber. (The bishop entered the antechamber? The bishop entered the antechamber? At this point you're going coy on us, euphemizing about parts and positions when you've already confessed to mutual violation with a holy woman through a bloody arrow slot? Well, no.) The actual sodding Bishop of Bloody York entered the sodding antechamber with Mother sodding Basil, who bore a brace of sodding storm lanterns. And so I let go. Unfortunately, Thalia did not. It appeared that her grip, too, had been strengthened by our encounters on the wall. â€Å"What the hell are you doing, Pocket?† said the anchoress. â€Å"What are you doing?† asked Mother Basil. I hung there, more or less suspended to the wall by three points, one of them not covered by shoes. â€Å"Ahhhhhhhhh!† said I. I was finding it somewhat difficult to think. â€Å"Give us a little slack, lad,† said Thalia. â€Å"This is meant to be more of a dance, not a tug-of-war.† â€Å"The bishop is out here,† said I. She laughed. â€Å"Well, tell him to get in the queue and I'll tend to him when we're finished.† â€Å"No, Thalia, he's really out here.† â€Å"Oh toss,† said she, releasing my knob. I fell to the floor and quickly rolled onto my stomach. Thalia's face was at the arrow loop. â€Å"Evening, your grace.† A big grin there. â€Å"Fancy a spot of stony bonking before vespers?† The bishop turned so quickly his miter went half-past on his head. â€Å"Hang him,† he said. He snatched one of Mother Basil's lanterns and walked out of the chamber. â€Å"Bloody brown bread you serve tastes like goat scrotum!† Thalia called after. â€Å"A lady deserves finer fare!† â€Å"Thalia, please,† I said. â€Å"Not a comment on you, Pocket. Your serving style is lovely, but the bread is rubbish.† Then to Mother Basil. â€Å"Don't blame the boy, Reverend Mother, he's a love.† Mother Basil grabbed me by the ear and dragged me out of the chamber. â€Å"You're a love, Pocket,† said the anchoress. Mother Basil locked me in a closet in her chambers, then mid-way through the night, opened the door and handed in a crust of bread and a chamber pot. â€Å"Stay here until the bishop is on his way in the morning, and if anyone asks, you've been hung.† â€Å"Yes, Reverend Mother,† said I. She came to get me the next morning and hustled me out through the chapel. I'd never seen her so distraught. â€Å"You've been like a son to me, Pocket,† she said, fussing about me, strapping a satchel and other bits of kit on me. â€Å"So it's going to pain me to send you off.† â€Å"But, Reverend Mother – â€Å" â€Å"Hush, lad. We'll take you to the barn, hang you in front of a few farmers, then you're off to the south to meet up with a group of mummers[21] who will take you in.† â€Å"Beggin' pardon, mum, but if I'm hung, what will mummers do with me, a puppet show?† â€Å"I'll not really hang you, just make it look good. We have to, lad, the bishop ordered it.† â€Å"Since when does the bishop order nuns to hang people?† â€Å"Since you shagged the anchoress, Pocket.† At the mention of her I broke away from Mother Basil, ran through the abbey, down the old corridor and into the antechamber. The arrow cross was gone, completely bricked up and mortared in. â€Å"Thalia! Thalia!† I called. I screamed and beat the stones until my fists bled, but not a sound came from the other side of the wall. Ever. The sisters pulled me away, tied my hands, and took me to the barn where I was hanged.

Thursday, August 29, 2019

Unit II Solid Waste Impact Essay Example | Topics and Well Written Essays - 250 words

Unit II Solid Waste Impact - Essay Example Solid materials such as home appliances will be collected and set aside from recycling (U.S Environmental Protection Agency, 2014). The municipal council’s landfill needs to be located in an area with less human and industrial activity. A confined area near the edge of the national park is the best option for establishing the landfill. This is because there is less human activity in that area, and so there will be less air pollution. The area will be fenced off from wild animals that may wander into the landfill and feed on the waste materials and far away from a water source (National Park Service, 2014). During my survey I learnt that during the weekdays very few people visit the national park. The number increases on the weekends when people are resting. The municipal council decided that the landfill will operate only on weekdays when there is less human activity around the

Wednesday, August 28, 2019

Zimmerman vs. Atlas Energy Essay Example | Topics and Well Written Essays - 1000 words

Zimmerman vs. Atlas Energy - Essay Example The hydraulic fracturing that the company used while linking the gas leaked toxic gas into his land and therefore making it inhabitable. When tests were conducted on Zimmerman’s property, it was established that there were alarming levels of carcinogenic chemicals that were dangerously above screening levels. 1500 feet from his place of residence, there was discovered seven potential carcinogenic chemicals. The company, known as Atlas Energy, Inc was formerly known as Atlas Energy and has been in the Energy business since 1968 and is by all means the leading producer in Marcellus Shale. According to Zimmerman, the substances that were found in his lands were so alarming that they could not be caused by nature and therefore, the company had acted negligently by not considering the fact that the land was a privately owned piece of property and should have been more careful with the chemicals they were going to use during their exercise. Zimmerman’s claims were based on th e fact that most farmers from areas which similar developments had taken place were exposed to similar conditions and there seemed like nothing was being done about the situation. A year earlier before the drilling started, Zimmerman claims that the baselines were completely normal and there was no indication of any harmful substances in his property after tests were carried out. 2. Discuss what management could have done in terms of risk management to have prevented the  events that lead to the lawsuit.   In the spirit of promoting sustainable development, international law encourages that all people practice safe methods of development so that the environment is preserved. Sustainable development basically promotes the use of the environment and available resources in such a manner that the current generation exhausts them fully while at the same time preserving the resources for the coming generations. The management at Atlas Energy should ensure that before the drilling begi ns all the precautions are taken so that the society around them is not affected in a bad manner. If it is obvious that such drilling will definitely result to contamination of the environment around the drilling, the management should ensure that the people living around are compensated and re allocated to a place where the chemical spilling will not affect their health and existence. If the initial precautions were ignored, the company management still had a chance to salvage the situation after it realized that Mr. Zimmerman had been affected by the chemicals spilled during the exercise. This would have been done by settling Mr. Zimmerman’s grievances outside the court and ensuring that there are options for Mr. Zimmerman to consider part from the courts. Since the management knew for sure that Zimmerman’s property had been ruined by the effects of their drilling, the Company should have found a way to compensate Mr. Zimmerman from the harm caused. In America, this will be the first of its kind if Mr. Zimmerman goes ahead to win the court case. In countries that majorly depend on foreigners to promote their economy, such scenarios are well expected but not in the United States of America. America is a developed country and a major economic power in the world and therefore, those who choose to develop the economy should do so considering the health of the people around them. 3. Discuss the ethical considerations reflected in the laws applicable to this case.   Every company owes a duty of care to its client and the general public to ensure that all their employees are well equipped to avoid negligence that can harm the public.

Tuesday, August 27, 2019

Cultural Communications Essay Example | Topics and Well Written Essays - 750 words

Cultural Communications - Essay Example Business communication in the United States has distinct features that differentiate it from communication in other cultures. Communication style in the United States focuses on the message as opposed to development of long-term relationships during a communication process. Interactions are therefore short-term based and are limited the tasks to be performed. Another feature of the United States communication protocol is individualism culture. People put their self-interest before others, operate independently, and are identified with the culture of â€Å"self promotion† (Nafsa, n.d., p. 1). The American business communication protocol is further informal and disregards social class. Individuals prefer interacting with peers to underscore rank recognitions and even communications with people at higher social classes or ranks are informally conducted without consideration to the ranks (Nafsa, n.d.). Nature of interpersonal relationships is another characteristic behavior in Ame rican business communication. The individualistic approach undermines development of strong interpersonal relationship. Consequently, the culture reports loosely formed relationships that only last for short periods. The loose interpersonal bonds together with the culture of independence also identify lack of long-term obligations in business communications because interactions are limited to tasks. American business communication culture is also direct, involving confrontations. An emerging issue is directly criticized, and people are not afraid to â€Å"discuss controversial topics† (Nafsa, n.d., p. 1). Further, individuals in American culture always feel free to communicate their thoughts (Nafsa, n.d.). Business communication in the culture is also proactive and aligned to applicable rules of law. An American manager would for example comfortably initiate communications to discuss issues and similarly observe legal constraints and consequences of elements of the communicat ions, and agreements made thereof (Li, 2012). A direct approach to communicating feedback also characterizes the culture’s business communication protocol (Hrmagazine, 2008). How the protocols would create challenges The identified protocols in U.S. business communication create challenges by inducing culture based communication barriers in communication with individuals from a different culture. The Americans individualistic approach to communication may not be acceptable to a person from a collective culture, and may lead to suspicions. Similarly, an individualistic approach to communication with a party from a collective culture would communicate selfishness against the communist morals, a factor that would identify ethical concerns and lead to withdrawal from communication as the collectivist seeks to maintain his or her expected moral standards. The United States culture that disregards social hierarchy and cultural practices is also likely to raise ethical concerns and negatively influence communication with a person from a different culture. A person from a culture in which people regard social hierarchy and integrate culture in communication would for example lose interest in a communication in which a young American manager fails to recognize the party’s seniority while negotiating. Failure, by Americans, who do not

Monday, August 26, 2019

Claires Antiques Essay Example | Topics and Well Written Essays - 1500 words

Claires Antiques - Essay Example It should be noted that as the company currently has a level limited of resources, only one of these alternatives will be chosen. To aid in the decision making, this presentation will utilize a Net Present Value (NPV) analysis to the projected cash flows of both projects. Considering that cost of capital may vary from Claire's antiques expectations, we will also employ sensitivity analysis to look at the value of the two alternatives' NPVs in different cost of capital. We will further assume that the risk-based cost of capital is 10% and that the project has a tax rate is 40%. Also, the company will be using straight line depreciation method to adjust the book value of the facility. Another assumption is that, the company will be using either North or West Warehouse for five years, after which the facility will be sold in cash in its book value or salvage value. Also, this presentation assumes the depreciation expense is not yet included in the presumed annual fixed costs. NPV is used in capital budgeting to analyze the profitability of an investment or project. NPV is the difference between the present value of cash inflows and the present value of cash outflows (Net Present Value 2006). If the NPV is positive, the investment is accepted. In contrast, negative NPV means that an project is not profitable. The evaluation of the alternatives begins with the laying out of the expected cash flows. In an NPV analysis, cash outflows and inflows are further discounted to take into account the time value of money. After that, the NPVs of the two options are compared. Based on the data given by the private firm, North Warehouse will have the following cash flows for 5 years: 1. advertising expense of $140, 000 in year 0 2. sales revenue in year 1 is $650, 000 and will grow at an annual rate of 7% 3. contribution margin is 55% of the total revenue 4. annual fixed cost is $100, 000 5. $1, 500, 000 investment in facility 6. estimated salvage value of $125, 000 7. yearly depreciation of $275, 0001 Table 2 shows the discounted cash flows from the first alternative. Please note that the figures in black are inflows of cash while the figures in red indicate the opposite. Total Cash outflow and outflow for the fiscal year are discounted using the present value factor. Table 2. Cash Flows of Option 1: North Warehouse Option 1 or using the North Warehouse yields a positive NPV of $7, 181.00 utilizing a risk-adjusted cost of capital of 10%. Evaluation of Option 2: West Warehouse Based on the data given by the private firm, North Warehouse will have the following cash flows for 5 years: 1. incur an advertising expense of $150, 000 in year 0 2. sales revenue in year 1 is $900, 000 and will grow at an annual rate of 8% 3. contribution margin is 45% of the total revenue 4. annual fixed cost is $120, 000 5. $1, 700, 000 investment in facility 6. estimated salvage value of $120, 000 7. yearly depreciation of $316, 0002 Table 3 shows the cash flow/inflow of Option 2 which is the West Warehouse. Based on the cash

Sunday, August 25, 2019

Management assignment Essay Example | Topics and Well Written Essays - 250 words

Management assignment - Essay Example My objective work objective for the future is to work with Saudi Aramco Company and head the marketing department. Being the national producer oil the company is in a very strategic sector considering that oil and gas account for a good proportion of the country’s total GDP. As a marketing manager with the company I will be able to develop and marketing strategies with the aim of growing the company’s profitability while at the same time serving the common good of the public. I will for instance want to see the company give back to the community through CSR, participate in sponsorship of sports and projects that enhance national unity. Also by growing Aramco’s sales I will indirectly touching on the lives of many persons since oil products form the backbone of Saudi’s economy. I think project management is very important and the skills learnt in the module will greatly help me my quest for achieving my wildly important goals. Skills such as working with different teams, diversity and divergent opinions as well as expatiations of budget, time frames and quality have really transformed by outlook. With these skills I believe I should be able to effectively achieve my wild goals and become a very successful global business

Saturday, August 24, 2019

Decision Making Self-Analysis Assignment Example | Topics and Well Written Essays - 1250 words

Decision Making Self-Analysis - Assignment Example These two are the most basic models of decision making that inspire the whole process (Elham, 2010). The rational model involves four stages that ought to be followed when making decisions. These steps comprise of identifying the problem, developing solutions, choosing a solution and executing as well as assessing the solution. These four stages represent the whole decision making process and provide for the necessary dynamics that guarantee the effectiveness of the process. Each stage in the rational model is of immense significance to the holistic process and should therefore be approached with care in order to achieve effective results. This model has some shortcomings including the absence of sufficient information that hinders decision making and the reality that a problem could transform within a short period of time (Schoorman & Acker-Hocevar, 2010). The normative model indicates that decision making has a number of components that characterize its application. Among these fea tures include restricted information processing, judgmental heuristics along with satisficing. Limited information processing underscores that fact that at any given time only a restricted degree of data can be used or processed for decision making. Judgmental heuristics, on the other hand, involves that consideration for purposes of decision making shortcuts are applied to make the process simpler. Satisficing on the other hand implies the selection of solutions that are more convenient and satisfy minimum requirements (Elham, 2010). Each model has strengths and weaknesses, which point towards their effectiveness and applicability in the vast process of decision making. The rational model is more practical and is effective in dealing with problems that require a substantive decision for the long term. However, this model does not take into account some of the realities of decision making like the absence of adequate information along with the changing nature of problems. The normat ive model is convenient when dealing with challenging situation that need creativity and distinctiveness in order to develop the solution but could be disastrous when applied on practical and rational situations. How to Self-Assess Decision-Making Styles Self-assessment is a crucial parameter in the field of decision making because it provides for room through which the decision maker can evaluate their decision. There are various styles of decision making that apply to different situations and serve a different purpose. Each style of decision making has a unique approach to decision making in the sense that each has a distinct set of parameters that govern the process of making a decision. Therefore, in considering the various methods of self-assessment each style of decision making must be considered in order to optimize the results. Since each style has different methods of approach, it is obvious that the methods of self-evaluation change with each respective style (Schoorman & Acker-Hocevar, 2010). As a result, it is actually impossible to self evaluate a decision or the process of making a decision without being aware of the style applied in the process. Therefore, for the decision maker to evaluate his decision or the process applied the key consideration is the relevant decision making style. Once the style has been factored it becomes convenient for

Friday, August 23, 2019

In this assignment, discuss the diagnostic value of less invasive Assignment

In this , discuss the diagnostic value of less invasive imaging modalities - Assignment Example Atherosclerosis is the chief causes of  coronary artery diseases (CAD) which causes changes in structure as well functionality of blood vessels.  It is the process in which, progressive dumping of cholesterol and other fatty materials across the arterial wall occurs. These dumping results in a contriction of the lumen i.e stenosis, which restricts blood flow. Further, spasm, birth defect, lupus, arteritis, blood clogging are few other causes apart from atherosclerosis. Ten years ago, CAD is thought to be a disorder of men. Generally, CAD occurs a decade earlier in men than women,  up to the time of menopause, because a high level of estrogen  protects women from CAD. Anyhow, after menopause, it happens more frequently in women in comparability to men. It is noticed that ratio of women suffering from CAD is higher than men in the age group of or beyond 75. CAD is assumed to be the leading  lifer taker in developed countries. Studies imply about 5-9% of people aged 20+ are su ffering through CAD. The death rate rises with age, and it is more common in males in comparison to females,  but the  death rates for men decrease sharply after age of 55 and finally after aged 75. The death rate of women is higher than men, who are of the same age.  Ã‚  It is estimated that +16 million Americans are suffering through CAD and 8 million of them had a myocardial infarction (increased 1 Million per annum). Framingham trial predicts approximately 50% & 30% of males and females respectively in the age 40+ population are suffering through CAD (Helen H, and Munther K). The most convoluted part of CAD lies in its undetection, mostly CAD remains undetected until the moment of myocardial infarction or even death. It is an alarming situation for Biomedical Scientists to develop a mean to discover CAD as soon as possible to get the best result and prevent diseases. Early detection of CAD allows a physician to  reduce the potential risk factor associated with CAD. There are several methods by which CAD can be diagnosed including an echocardiogram, electrocardiogram, but imaging method like multislice CT angiography, electron-beam computed tomography, nuclear scan, and magnetic resonance angiography, etc, is assumed to be the most effective method for CAD diagnosis. Imaging of CAD is the demand of 21st centuries due to the uninterrupted activity of Heart & acuteness of CAD. Over the last decade, multislice CT Angiography (MSCTA) has been recognised as the most precious & productive method of CAD diagnoses because of lightning technical promotion & enhanced precision (Sun Z, 2010). It has exhibited an immense potential in early identification of CAD because of  improved spatial and temporal resolution.  Ã‚  MSCTA showed enormous technical growth from the early generation of 4-slice CT scanners to subsequent models such as 16-, 64-, dual-source, 256- and 320-slice CT. Retrospective ECG gated method was employed to show the feasibleness of MSCTA w ith 4-slice. It displayed mild accuracy with sensitivity & specificity of 78% and 93%, respectively.

Thursday, August 22, 2019

Critical Literature review Example | Topics and Well Written Essays - 1500 words

Critical - Literature review Example Shareholders in a certain corporation take keen interest in the manner which the corporation carries out it business activities. In most cases, the shareholders focus on what the corporation has done, either positive or negative relative to its impact on the society (Subhabrata, 2007). Additionally, the shareholders show interest on how the corporation develops and takes care of its work force. Thus corporate social responsibility can be simply defined as the capacity of a company to build protractible livelihoods. The company upholds the cultural differences of the locals and finds opportunities in developing skills of employs, the public and the government thus gives back to the society. In fact, this model is much more convincing mainly because: a) Social responsibility forms an integral part of the society’s wealth creation process, which enhances competitiveness of a business hence maximization of wealth creation in society. b) In tough economic times, there are incentive s to implement corporate social responsibility and better as compared to other corporate social responsibility models. However, corporate social responsibility has had a philanthropic definition in the United States. In the philanthropic model, companies earn profits, unhindered with an exception of fulfilling their taxation responsibility. Then the companies give a certain amount of funds, which is a percentage of their profits as a donation to support charitable activities. Nevertheless, corporate social responsibility has been defined in different model referred to as the European model that is more oriented in how business is executed in a socially answerable way, harmonized by the investment in the local communities for justifiable business reasons. It is noteworthy that different corporations implement corporate social responsibility differently due to their varied nature of business. Depending on a business priorities and core values, a corporate social responsibility is mani fested in form of incentives and the business processes. Existing literature on corporate social responsibility has associated this practice to ethical ad moral conduct of business. Thus corporate social responsibility is perceived as an obligation not only to the law but also long term aims for the good of the community, which the business serves. In this sense, corporate social responsibility involves carrying out business in an ethically acceptable way in the interest of the society at large (Thomas, 2007). Thus a corporation is expected to: Respond in appositive in regards t o emerging societal priorities and prospects Willing take measures ahead of regulatory conflict Balance the interest of the shareholders against the interests of the society The main facets of corporate social responsibility: Economic responsibility to generate profit for the corporate owners Legal responsibility to strictly comply with all regulatory requirements Ethical responsibility not only to generate profit, but also act in just and a fair in business processes Voluntary and philanthropic responsibility to uphold human welfare and helpfulness In this paper, my chief focus on how the new policy published the European commission for the 2011-2014 action agenda has impacted business reorganization by the corporations so as to implement corporate social responsibility. The new policy was introduced to enhance a better alignment of European enterprises to better corporate social

Crime Scene Reconstruction Essay Example for Free

Crime Scene Reconstruction Essay It has moved beyond a physical barrier allowing analysts to dissect the crime scene to identify evidence often missed simply walking through the traditional steps of sketching. There is now the opportunity for anyone to revisit the crime scene the next day, next week, or years from now. This is an important the crime scene leaving nothing to the Jurors imagination. According to the Department of Safety for the State of Connecticut, forensic crime scene reconstruction is the process of determining the sequence of events about what occurred during and after a crime (Department of Public Safety Scientific Services, 010). Crime scene reconstruction normally starts ideas of what happened during the crime and then moves to an analysis of the evidence at the scene. It focuses on gathering as much data and evidence to form a valid hypothesis. The hypothesis can then be subjected to various tests to prove or disprove the overall interpretation of the reconstruction. Once the reconstruction is formalized a theory can be determined in support of the reconstruction. There are three types of crime scene reconstructions. They are specific incident reconstruction, specific event reconstruction, and specific physical evidence reconstruction. Specific incident reconstruction involves reconstructing a crime scene where an accident or incident occurred. This will be needed during such incidences as traffic accidents or homicides. The purpose is to identify the types of evidence that can be associated with these incidents. Using specific event reconstruction, the sequence of events or timelines can be established. This form of reconstruction looks at how all of the pieces of the puzzle fit together. With specific event reconstruction the sequence of events can be determined. The final type of reconstruction is specific physical evidence reconstruction. This involves evidence such as blood and bullets. Through reconstruction of blood splatter, it can be determined where the shooter was standing during a homicide. It will also help identify the location of the bullet if it is exits the body of the victim. Capturing the crime scene is an important part of the crime scene reconstruction process. Typical methods include sketching the crime scene using graph paper and a pencil or taking photographs from a digital camera. Both of these methods do provide a snapshot of the crime scene for preservation but, they do not capture the scene in its entirety. A sketch will note measurements of physical evidence in their relation to the victims body or to such items as furniture and doorways. However, it is completely relying on the investigator to supply accurate measurements and identification of the physical evidence. Using 3D technology, the entire crime scene can be analyzed for accurate measurements at anytime. An advantage that 3D technology has over other methods of crime scene reconstruction is that it can preserve the crime scene in a moment in time. This is vital if the scene is in a populated area and needs to return to its natural state as soon as possible. Think about a crash scene involving two vehicles on an expressway in Los Angeles during rush hour that resulted in a fatality. The time it takes to clear the scene is a very important variable when collecting the evidence. Under these conditions, there may be evidence that goes unnoticed by an investigator that is sketching the scene. Not to mention the time that it takes to do physical measurements. Using 3D technology can allow the investigator to collect the data and have confidence that nothing will missed. In order to capture a crime scene in its entirety multiple scans of the scene must be considered. The collection of data comes from only the viewpoint of the investigator. Consider capturing the image of an automobile. If we were to stand at the front of the automobile we would not be of the automobile to in order to collect a complete image. One tool used to collect 3D images from a crime scene is a calibrated digital camera. It uses a technology called stereo photography. Standard photographs are only 2-dimensional representations of what you see. 3-dimensional photographs are taken from two perspectives. Because we have two eyes, we will need two perspectives on a scene. By forcing each eye to see only one photograph, i. e. the left eye sees the left photograph and the right eye sees the right photograph, your brain will reconstruct the depth information from the two pictures and you will see a 3D image (3dphotography, 2010). The use of calibrated digital cameras allows the viewer to see the image as it would have been seen by the individual taking the pictures. When multiple photographs are combined, a reconstruction of the scene is created. Another tool that is used to collect 3D images from a crime scene is a 3D scanner or laser. A 3D scanner is known for high-accuracy and long range. Most 3D scanners can collect data from 900 feet away. It can operate in bright sunlight or total darkness, indoors or out. The built-in digital camera allows the measured 3D data (known as a point cloud) to automatically be mapped creating a 3D rendering of the scene (3D Forensic Mapping, 2010). The 3D scanner quickly digitizes a scene using both panoramic photography and 3D laser scanning which is the process of making millions of highly accurate measurements in Just a few minutes. The result is an accurate 3D representation of he scene from which any measurement can be made, even long after the scene has been vacated. Whether using a calibrated digital camera or a 3D scanner, it is time to create a 3D model of the data. The models are assembled in 3D animation software. This is when the data that was collected at the crime scene is put into the software. In the case of the using a calibrated digital camera, each pixel is assigned a coordinate. The coordinate is made up of XYZ; where X is an Easting coordinate, Y is a Northing coordinate, and Z is the elevation. The pixels or coordinates are then lotted on a 3 dimensional grid. If we consider a sketch that is typically performed at a crime scene, it is laid out on a piece of graph paper. The investigator assigns a certain measurement between squares and then plots all the relative items of the crime scene at the respected distance. This would be considered a 2 dimensional drawing where only X Y are plotted. In a 3D plot, it includes the Z value. This gives the 3 dimensional model its depth. So, the multiple photographs taken with the calibrated digital camera are overlaid, assigned a coordinate, and modeled into a 3D image. The 3D scanner is not much different from a calibrated digital camera, although it uses an infrared laser to collect data points instead of pixels. The hardware then assigns coordinates to each data point and the software plots them. A 3D scanner can collect as many as 100,000 data points per second (Oberle, 2009). This creates a huge advantage over using digital camera which can only collect upwards of 8 million pixels with each photo (Patterson, 2010). It would only take a scanner Just over a minute to surpass a digital camera in resolution. At this point, the scene is ready for review. With the combination of photo-like images the software will allow the viewer to spin the images 360-degrees. Looking at the computer screen, you will be able to enter the crime scene as if you were actually there. This can be copied and viewed by anyone with access to the 3D software. It becomes a crime scene, the more likely evidence will not go unnoticed. When reviewing the crime scene reconstruction, measurements can be achieved right from the office. Because each data point is assigned a coordinate, the distance formula can be used to calculate distances between two points. The software includes an algorithm that can quickly calculate the distance between any points selected by the user. Therefore, determining specific physical evidence reconstruction such as blood splatter is made possible back at the office. In blood spatter evidence, the measurements will help calculate the mass of each drop from the size of its stain, and use this to calculate its maximum potential velocity. Air drag would tear apart a droplet if it travelled faster than this limit (Marks, 2010). With that information, and an angle of impact estimated from the shape of the stain, the software projects a ealistic trajectory backwards in time to locate the origin of the blood spatter.

Wednesday, August 21, 2019

Principle Of Operation Of Switched Reluctance Motor Engineering Essay

Principle Of Operation Of Switched Reluctance Motor Engineering Essay 1. INTRODUCTION: From those days the variable reluctance motors had played a vital role in electrical field. These motors are very attractive because they have replaced conventional ac and dc drives in many industrial applications all over the world. Apart from the working they have many advantages such as simple and low cost construction. Since the variable reluctance motor has a high torque with the inertia ratio normal when compared with other motors. Eventually the single head salient synchronous reluctance motors have some advantages which are similar to variable reluctance motor. The cost and performance of the machine is highly dependent on the converter topology. The converter for the machine drive should be very fast accurate current control for better drive performance. In addition to these requirements the machine should produce low volt ampere rating for low cost, should be more reliable and robust with small number of switches producing high efficiency at last. In addition to this all of these converters have greater switching loss and stress because the converters are all operated with hard switching. Now a days soft switching is also implemented for these types of machines. The above mentioned goals can be achieved either by improving the machine design or innovation in the inverter configuration. I hope that my designing deals with the application of a particular type of inverter for the variable reluctance motor drive. 2. VARIABLE RELUCTANCE MOTOR DRIVES: 2.1 CONSTRUCTION: The basic construction of switched reluctance motor is shown in the figure. The construction includes both stator and rotor. It has six pole rotor and eight pole stator in it. The conventional variable reluctance motor that is nothing but the switched reluctance machine has a doubly salient laminated structure which is very simple and robust. The rotor does not contained any windings or conductors within it. 2.2 PRINCIPLE OF OPERATION OF SWITCHED RELUCTANCE MOTOR: To start with the switched reluctance motor, the torque production in the machine is explained with the help of principle of electromechanical energy produced in the coil of the machine. As the rotor rotates, the inductance of the phase windings of a machine varies between the inductance values with respect to the rotor angle. Due to the highly nonlinear magnetic behaviour of the variable reluctance motor, the phase inductance is dependent on the current level as well as with the rotor position. There is also a speed dependent back emf that becomes very large below and above the base speed and dominates the behaviour of the drive. Although the machine has a simple structure, the behaviour of its electromagnetic is obviously convivial. The electrical input energy is given by expression which is displayed as follows; However, the linear inductance of switched reluctance motor model along with back emf. And also the back emf is proportional to the machine speed which is very helpful in exploring the behaviour of this type of drive .The diagram of solenoid coil and the characteristics of the machine is shown as below; For low-speed operating mode, the back emf can be ignored in such a way that these can be compared with the dc bus voltage, and the machine can be assumed as current fed driving machine. Current fed operation is obtained by means of a current regulated pulse width modulation technique. With a proper controller and converter, the phase current should be designed to be close to a square waveform in order to minimize torque pulsations. The back emf increases for the medium speed range machine . To compensate the loss, phase is excited already in designing of the waveform .The machine runs at speed below and above the base speed. Here the back emf is compared and also the emf is even larger than the supply voltage than that of the phase current. Thus the phase current becomes impossible without very large advanced techniques. The phase winding should now be excited before , whereas its inductance value is small in order to develop the sufficient current for a challenging torque. During this mode of operation the phase winding is fed with the voltage and hence the technique is called pulse dropping mode. Even at any suitable power electronic converter or the controller, this type of drive system must maintain the capability of the design for the current pulses to maintain the values of variable reluctance motor accurately. The above mentioned waveforms are executed by simulation method with the help of the mat lab software. The mat lab code for the above mentioned waveform is as follows; 3.MATLAB SIMULATION: 3.1 CODING 1: w=1; k=zeros; d=0; z=zeros; i=0; t=0; e=0.000001; % is the increment of time while (t if t while i z(w)=t; % to store the time values k(w)=i; % to store the current values d=(1/0.1)*(100-(10*i))*e; % is the increment of current i=i+d; % to increase the current t=t+e; % to increase the time w=w+1; % to increase the index of the current and time arrays end while i>=6.5 while i>=6 % to limit the current to a minimum of 6 z(w)=t; k(w)=i; d=(1/0.1)*(-(10*i))*e; i=i+d; t=t+e; w=w+1 ; end end end if t>0.03 z(w)=t; k(w)=i; d=(1/0.1)*(-100-(10*i))*e; i=i+d; t=t+e; w=w+1 ; end if t>=0.0353 break end end plot(z,k,r-,LineWidth,2,Color,black) OBTAINED WAVEFORM: 3.2 CODING 2: v=[]; % an array to store the value of voltages p=[]; % an array to store the value of time c=[]; % an array to store the value of the currents R=1; % resistance value L=0.001; % inductane value fs=1000000; % sampling frequency f1=1000; % switching frequency of the 1st switch f2=142.857; % switching frequency of the 2nd switch d=0.5; % duty cycle t_on=d*(1/f1); % t ON for the 1st switch di=0; n=0; x=0; i=0; t=0; t2=(1/f2); while t while (t n=n+1; v(n)=50; di=(1/L)*(v(n)-(R*i))*(1/fs); i=i+di; c(n)=i; p(n)=t; t=t+(1/fs); end x=x+(1/f1); if (t while t n=n+1; v(n)=0; di=(1/L)*(v(n)-(R*i))*(1/fs); i=i+di; c(n)=i; p(n)=t; t=t+(1/fs); end end end while t>=(0.5*t2) % the second half cycle of the second switch n=n+1; v(n)=-50; di=(1/L)*(v(n)-(R*i))*(1/fs); i=i+di; c(n)=i; p(n)=t; t=t+(1/fs); if c(n) break end end plot(p,v), axis ([0 0.005 -50 55]) hold on; plot(p,c) hold off; Xlabel (Time) Ylabel (Current / Voltage) OBTAINED WAVEFORM: 4.CLASSIFICATION OF SWITCHED RELUCTANCE MOTOR: 5.MODELING AND CONTROL STRATEGIES OF A VARIABLE RELUCTANCE MOTOR: The above block diagram represents the modelling of the variable reluctance motor with their control strategy. The above circuit contains the following blocks such as feed forward compensator, flux or current controller and the driver block. The block also contains the observer. The feedback from the motor or drive is connected to the observer as well as to the feedback compensator. The machine is designed in such a way that it is based on both synchronous and asynchronous type and in this machine the torque control problem can be solved by transforming it into an equivalent current control one. The simple solution is probable because the torque is proportional to the current or to a specific component of the current vector in a proper orientation system. Moreover by considering the wide availability of high-quality and low-cost current transducers the solution obtained is also more convenient from an economical point of view. For the variable reluctance motors the torque versus current function is nonlinear and therefore preventing the simple solution which adopt these drives for standard motors. To prevail over the problem a cascade controller structure which is same as the one proposed earlier has been selected. It consists of an external static feed forward nonlinear compensator which is followed by a nonlinear flux or the current which is selected depending on design choices with the closed-loop controller. In the case of feed forward compensator transforms the torque set point which is corresponding to the flux or current is normal in these cases. The internal closed-loop controller is based on exact or directly measured feedback, depending on the controlled variable selected. Hence the optimization techniques are used for the design of a feed forward pre compensator. The closed-loop controller operates in a stator reference frame thus by avoiding the use of match up transformations. This designing presents the inverter for the motor modelling and control optimization activities. Importance is placed on the optimization techniques used in the design of the feed forward compensator. Finally the work related to the design of the closed loop flux or the current controller is currently in growth. The main report here is that the order to validate the design of the feed forward compensator. Previous to entering into details about the feed forward compensator design, some general considerations are value making in this kind of this design. Direct calculation of a current set point is not suitable because the torque reliance on current must also think about magnetic nonlinearities. Even though the simpler relationship exists between torque and flux the feed forward compensator is designed under the assumption of an internal flux closed-loop controller. But the current is certain in such a way that the flux set point can be directly transformed into a current by means of the model output obtained. It must be pointed out how the planned replica structure would be greatly simplify the design of the torque controller. A critical point is the alteration of the scalar torque demand into a corresponding three-phase flux vector. It can be noted that fluxes qualified to different phases can be bewildered independently by means of the associated control inputs. The control problem thus has as many degrees of freedom as the figure of phases. These degrees of freedom can be used for different purposes such as the four phase motor and the two adjacent phases. These are selected according to the real rotor position and torque signal that are used to impose torque dynamics and ripple-free operation. The remaining two phases are controlled in order to keep their current at zero. For a certain phase motor, the required dynamics is obligatory on motor acceleration by controlling a single phase and thus by selecting as a function of position and torque sign. The left over controls must keep the remaining phase currents at zero or collect them to zero as fast as possible. Both approaches have the similar kind of problems mainly related to the need for a fast switch-on and switch-off of phase currents that impose a voltage waveform that is strongly impulsive. While the voltage is limited in a real power inverter there is an increase in the enduring torque ripple occurs in the machine. Furthermore the solution proposed in during the good dynamic specification of the error between the actual and the desired acceleration does not control the torque ripple explicitly. The approach which is going to be considered in this attempt many degrees of freedom as possible in order to get the best performance from the motor. Thus the modelling would be done in such a way that it gives high efficiency with the low cost production. 6.OVERVIEW OF A VARIABLE RELUCTANCE MOTOR TOPOLOGY: The performance and cost of the variable reluctance motor drive is highly dependent on the topology used to drive the machine. Since the features of Variable reluctance motor drive have been realized the developments in the topologies have proceeded in parallel with the machine design. From those days there have been many topologies invented and while the conventional inverter driven induction machine drive the variable reluctance motor drives havent been made standard . In addition to this the induction motor drives which almost always carry an pulse width modulation voltage link inverter .This method for variable reluctance motor drives seems to be much more application dependent. Ideally the variable reluctance motor drive should meet the following requirements: capability to program a commanded current pulse very quickly and accurately for good drive performance. Low noise and torque pulsation. as low a converter power VA rating as possible for a given drive rating for low cost. low switch/phase ratio. reliability and robustness. high efficiency. Only if all the above requirements are met then only variable reluctance motor drives can be comparable with the conventional inverter driven induction machine drive and other variable speed drives that are present in the market. These topologies discovered up to date and these materials have become popular and it is used in a many of the applications now a days. These configuration design include the asymmetric bridge converter with bifilar winding configuration which will split supply configuration from H-bridge configuration and also from the common switch configuration. The asymmetric bridge converter has an entire current pulse programming power in such a way that the converter is able of apply the full supply voltage across the winding in either directions for the purpose turning the current in each phase that is in on state as well as in off state. Even though the converter faces some difficult from high switch or phase ratio it is normally expensive because the two switches per phase and the associated drive circuit. The winding present in the machine that is the bifilar winding should meet the minimum switch requirement with one switch or the phase ratio. Thus the voltage waveforms resulting from non matching magnetic coupling will increase the switch voltage rating values to twice the value of the voltage and even higher. In addition to the losses such as copper loss which is associated with the auxiliary windings are generally high for many applications. Thus the supply converter topology also meets the minimum switch requirement. And also in this case the phase number must be even and the converter does not ready to tolerate the phase unbalance or the fault in any phase. This is because these fault results in the voltage increase in the capacitor banks. And also the dc bus voltage utilization is poor because only 1/2K is utilized. Thus the H-bridge topology meets the minimum switch requirement. Therefore this reason is suitable for four or multiples of four-phase machines, and it also utilizes only half of the dc supply voltage. In this topology two phases are always on at one time and only one of the two phases are contributing to motoring torque production at any instant time. Therefore, the degradation of the output torque is achieved easily. The common switch design in the machine only requires one more switch in addition to the minimum switch requirement. However this does not tolerate phase overlapping and therefore this leads to its capability and also this is very limited because for the particular reason for the single-pulse mode. Here in this method they have already used C-dump configuration design and this configuration design also requires only one additional switch to the one switch or the phase requirement. The converter utilizes a capacitor to dump the energy of a switch off going phase and a chopper operating with buck principle to discharge the capacitance value. The capacitor voltage is generally maintained at twice the supply voltage value in order to supply negative supply voltage to the off going phase. The converter also has full capability to develop the current pulse during both turn on and turn off condition and also produces high efficiency operation results at the end. The main disadvantages of this converter are the high switching device voltage ratings. The cost of the additional switch of the dump capacitor and inductor also matters finally with the losses associated of the reactive elements. To open new application fields to the variable reluctance motor drives it is clearly necessary to both improve the drive performance at the lower cost. These goals can be achieved either by improving the machine design or creating some innovations techniques in the Inverter which we are going to design. The general circuits for the converter topology are shown as follows; The force production for motoring and regeneration waveforms is shown in the upcoming figure. The forward direction of the motion of the translator is considered as the positive sign. The direction of the motion is considered as positive by assuming the certain phase sequence. While considering the forward direction of the motion they represent the forward motoring operations for their corresponding quadrants. Similarly when we are considering the reverse direction these regions represents the reverse regenerative operation for their quadrants. The duty cycle of each phase is only about 0.34 and their induced emf are constant between x1 and x2.The air gap power and the generating electromagnetic force can be made constant by exciting the stator phases with the wide range of pulse of currents. The one half of the air gap power is saved in the phase windings in the form of magnetic field energy. Then the mechanical power output is formed from the other half of the air gap power. There is the similarities between the reluctance motor and brushless DC motor in terms of current, a ir gap waveforms. Thus the dc machine controller can be used to control the switched reluctance motor for low cost and as well as for high volume applications. 7.ADVANTAGES OF A VARIABLE RELUCTANCE MOTOR: Simple and robust in construction. Low cost due to the absence of rotor windings and magnets due to the use of a small number of concentrated stator coils which is same as the field coils of a dc machine. Low rotor inertia and high torque. Motor phases operate almost independently to each other. The machine has greater economy and reliability. Machine does not need bi directional currents. Suitable for high speed operations. 8.CONCLUSION: Thus I hope that the back ground reading for my project has been done fully with the materials provided by our supervisor as well as with the materials we have collected. Future work is to design an inverter for a variable reluctance motor and build up the hardware kit for the operation. For the above mentioned reason I have gone through back ground reading completed related to the switched and variable reluctance motors. Thus my reason for taking over my project is for both modelling and building the hardware is to simplify the design of the high performance inverter for the machine with high efficiency. Even though different approaches had been overcome to design an inverter the process is carried out to design the material for both rotating and linear machines. Up to date the designing of the material in the laboratory had been performed by simulating using the Mat lab software and coding and waveforms obtained are displayed above in our report.

Tuesday, August 20, 2019

Conventionally Broadcast Encryption (BE) Schemes

Conventionally Broadcast Encryption (BE) Schemes ABSTRACT Conventionally broadcast encryption (BE) schemes enable a sender to securely broadcast to any subset of members, however it requires a trusted party to circulate decryption keys. Group key agreement protocols authorize a group of members to negotiate a common encryption passkey through spread out networks so that only the batch members can decode the ciphertextsviz encrypted under the shared encryption key, but a sender cannot debar any particular member from decrypting the ciphertexts. This project infers two notions with a hybrid primitive referred to as Auxiliary Propagate encoding. In this new primitive, a common public encoding key is agreed by group members who hold a individual decoding passkey. A sender viewing the public group encoding passkey can restrict the decoding to a subdivision of members of his preference. The scheme is proven to be fully collusion-resistant under the decision n-Bilinear Diffie-Hellman Exponentiation presumption in the standard imitation. Of unaided interest, the project presents a new BE scheme that is aggregatable. The cumulative property is shown to be useful to construct advanced protocols. Keywords-Multicast encoding, Auxiliary Propagate Encoding, Provable Security, Group key agreement INTRODUCTION INTRODUCTION Along the rapidly leading and prevalent communion technologies, there is an increasing bid for handy cryptographic primeval to protect group conversations and ciphering platforms. These platforms include instant-messaging tools, collaborative ciphering, mobile ad hoc networks and communal net. These new applications call for cryptographic primitives allowing a sender to soundly encrypt to any subdivision of the users of the services without relying on a fully credible dealer. Broadcast encoding is a well-studied primeval intended for secure group-oriented communications. It allows a sender to soundly broadcast to any subdivision of the group members Nonetheless, a BE system heavily relies on a fully trusted key server who produces classified decoding passkeys for the members and can read all the communion to any members. Group key agreement is another well-defined cryptographic primeval to secure group-oriented communions. A traditional GKA enables a group of members to setup a common secret passkey through spread out networks. However, whenever a sender wants to share an information to a group, he must first join the group and run a GKA protocol to share a classified passkey with the intended members. More recently, and to overthrow this limitation, Wu et al. popularized asymmetric GKA, a common public encoding key is agreed by group members who hold a individual decoding passkey. However, neither traditional symmetric GKA nor the newly introduced asymmetric GKA enables the sender to unilaterally exclude any particular member from reading the plaintext. Hence, it is necessary to find several adjustable cryptographic primeval en abling dynamic broadcasts without a fully credible dealer. The Auxiliary Propagate Encoding primitive, viz a hybrid of GKA and BE. Compared to its preliminary Asia crypt 2011 version, this project provides complete security proofs, elaborates the necessity of the aggregatability of the hidden BE building block and shows the practicality of the scheme with experiments. The main contributions are as follows. First, the primitive and explains its security definitions. Auxiliary Broadcast Encoding incorporates the elemental ideas of GKA and BE. A group of members interact through free networks to agree a public encoding passkey while each member holds a different secret decoding key. Using the public encryption passkey, anyone can encode any message to any subdivision of the group members and only the intended receivers can decrypt. Unlike GKA, Auxiliary enables the sender to exclude some members from reading the ciphertexts. Compared to Broadcast Encryption, Auxiliary Propagate Encoding does not need a fully credible third party to set up the system. Characterize collusion resistance by defining an attacker who can fully control every member farther the affianced receivers but cannot extract useful message from the cipher text. Second, the notion of aggregatable broadcast encoding. Coarsely speaking, a Broadcast Encoding scheme is aggregatable if its secure instances can be aggregated into a new secure instance of the BE system. Specifically, only the aggregated decoding keys of the same user are valid decoding keys corresponding to the aggregated public passkeys of the hidden Broadcast Encryption examples. The aggregatability of AggBE schemes is beneficial in the manufacturing of scheme and the BE schemes in the literature are not aggregatable. A detailed AggBE system tightly proven to be fully collusion-resistant beneath the decision BDHE assumption. The proposed AggBE system offers effectual encoding/decoding and short ciphertexts. Certainly, create an effectual Auxiliary Broadcast Encoding scheme with AggBE scheme as a building block. The Auxiliary Broadcast Encoding construction is proven to be semi-adaptively secure under the decision Bilinear Diffie-Hellman Exponentiation assumption in the standard model. Only one round is needed to form the public group encoding passkey and set up the Auxiliary Broadcast Encoding system. After the system set-up, the storage cost would be O(n) for sender as well as for group members, where n is the number of group members taking part in the setup stage. Although, the online complexity (which dominates the practicality of a Auxiliary Broadcast Encoding scheme) is very low. Post trade-off, the variant has O(n2=3) complexity in communion, calculations and storage. This is comparable to up-to-date regular Broadcast Encoding schemes which have O(n1=2) complexity in the same performance metrics, but system does not require a credile passkey dealer. Execute a chain of experiments and the experimental results verify the practicality of scheme. Potential Applications A potential application of Auxiliary Propagate Encoding is to secure data exchanged among friends via social networks. Since the Prism scandal, people are desperately concerned about the privacy of their personal data shared with their friends over social networks. Auxiliary Propagate Encoding can provide a feasible solution to this problem. Indeed, Phan et al underlined the applications of Auxiliary Propagate Encoding to social networks. In this scenario, if a group of users want to share their data without letting the social network operator know it, they this Encoding scheme. Since the setup procedure of Encoding only requires one round of communication, each member of the group just needs to broadcast one message to other intended members in a send-and-leave way, without the synchronization requirement. After receiving the messages from the other members, all the members share the encryption key that allows any user to selectively share his/her data to any subgroup of the members . Furthermore, it also allows sensitive data to be shared among different groups. Other applications may include contemporary messaging among family members, protected scientific research tasks jointly conducted by scientists from different places, and disaster rescue using a mobile ad hoc network. A common feature of these scenarios is that a group of users would like to exchange sensitive data but a fully credible third party is unavailable. Encoder provides an efficient solution to these applications. AIMS OBJECTIVES 2.1  AIM The Auxiliary Propagate Encoding primitive, viz a hybrid of GKA and BE. Compared to its preliminary Asia crypt 2011 version, this project provides complete security proofs, elaborates the necessity of the aggregatability of the hidden BE building block and shows the practicality of the scheme with experiments. The main aim are as follows. First, the primitive and explains its security definitions. Auxiliary Broadcast Encoding incorporates the elemental ideas of GKA and BE. A group of members interact through free networks to agree a public encoding passkey while each member holds a different secret decoding key. Using the public encryption passkey, anyone can encode any message to any subdivision of the group members and only the intended receivers can decrypt. Unlike GKA, Auxiliary enables the sender to exclude some members from reading the ciphertexts. Compared to Broadcast Encryption, Auxiliary Propagate Encoding does not need a fully credible third party to set up the system. Characterize collusion resistance by defining an attacker who can fully control every member farther the affianced receivers but cannot extract useful message from the cipher text. 2.2  OBJECTIVE The Auxiliary propagate Encoding primitive, which is a hybrid of GKA and BE.It provides complete security proofs, illustrates the necessity of the aggregatability of the underlying BE building block. ConBE incorporates the underlying ideas of GKA and BE. A group of members interact via open networks to negotiate a public encryption key while each member holds a different secret decryption key. Using the public encryption key, anyone can encrypt any message to any subset of the group members and only the intended receivers can decrypt. The collusion resistance by defining an attacker who can fully control all the members outside the intended receivers but cannot extract useful information from the ciphertext. The notion of aggregatable broadcast encryption (AggBE). Coarsely speaking, a BE scheme is aggregatable if its secure instances can be aggregated into a new secure instance of the BE scheme. Specifically, only the aggregated decryption keys of the same user are valid decryption keys corresponding to the aggregated public keys of the underlying BE instances. An efficient ConBE scheme with our AggBE scheme as a building block. The ConBE construction is proven to be semi-adaptively secure under the decision BDHE assumption in the standard model. LITERATURE SURVEY LITERATURE SURVEY 3.1 Paper on Broadcast Encryption: Several schemes that allow a center to broadcast a secret to any subset of privileged users out of a universe of size nso that coalitions of k users not in the privileged set cannot learn the secret. The most interesting scheme requires every user to store O(k log k Several schemes that allow a center to broadcast a secret to log n)keys and the center to broadcast O(k2 log2 k log n) messages regardless of the size of the privileged set. This scheme requires every user to store O(log k log(1/p)) keys and the center to broadcast O(k log2 k log(1/p)) messages. Algorithm: Step 1: Takes as input the number of receivers n, Setup(n) outputs private keys d1 , à ¢Ã¢â€š ¬Ã‚ ¦, dn and public-key PK. Step 2: Takes as input a subset, Encrypt (S, PK, M): Encrypt M for users S à ¯Ã†â€™Ã‚  {1, à ¢Ã¢â€š ¬Ã‚ ¦, n} Output ciphertext CT. Step 3: Takes as input a subset, Decrypt (CT, S, j, dj, PK): If j à ¯Ã†â€™Ã… ½ S, output M. The key K can then be used to decrypt the broadcast body CM and obtain the message body M 3.2 Paper on Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys: This system describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. This construction both ciphertexts and private keys are of constant size (only two group elements), for any subset of receivers. The public key size in this system is linear in the total number of receivers. Second system is a generalization of the first that provides a trade-off between ciphertext size and public key size. The system achieves a collusion resistant broadcast system for n users where both ciphertexts and public passkeys are of size O(à ¢Ã‹â€ Ã… ¡n) for any subset of receivers. Algorithm: Step 1: Let G be a bilinear group of order p. Pick a random generator g of G and random ÃŽÂ ±, ÃŽÂ ³ à ¢Ã‹â€ Ã‹â€  Zp and, as usual, define gi = g(ÃŽÂ ± i ) and v = gÃŽÂ ³Ãƒ ¢Ã‹â€ Ã‹â€  G. Step 2: Output the public key PK = {g, g1, , gn, gn+2, . . . , g2n, v} , it generates m shares of ÃŽÂ ³. Secret sharing generates the shares. Let f à ¢Ã‹â€ Ã‹â€  Zp[x] be a random polynomial of degree t à ¢Ã‹â€ Ã¢â‚¬â„¢ 1 satisfying f(0) = ÃŽÂ ³. For j = 1, , m the jth share of ÃŽÂ ³ is defined as sj = f(j) à ¢Ã‹â€ Ã‹â€  Zp. Step 3: User k à ¢Ã‹â€ Ã‹â€  {1, . . . , n} wants her private key dk = g ÃŽÂ ³kà ¢Ã‹â€ Ã‹â€  G. pick t administrator servers to help generate dk. To generate dk . For i = 1, . . . , it receives g si k from the ith administrator. It computes private key as dk = à ¢Ã‹â€ Ã‚ i=1(gk8)ÃŽÂ »i . Then dk = gkà ¢Ã‹â€ Ã¢â‚¬Ëœi=1 ÃŽÂ »i8i = g ÃŽÂ ³k as required. As usual all these messages are sent between the administrators and a user are over a private channel. 3.3 Paper on A Conference Key Distribution System: Encryption is used in a communication system to safeguard information in the transmitted messages from anyone other than the intended receiver. To perform the encryption and decryption the transmitter and receiver ought to have matching encryption and decryption keys. A clever way to generate these keys is to use the public key distribution system invented by Diffie and Hellman. The public key distribution system is generalized to a conference key distribution system (CKDS) which admits any group of stations to share the same encryption and decryption keys. The analysis reveals two important aspects of any conference key distribution system. One is the multi-tap resistance, which is a measure of the information security in the communication system. The other is the separation of the problem into two parts: the choice of a suitable symmetric function of the private keys and the choice of a suitable one-way mapping thereof. Algorithm : Step 1 : Consider A center chooses a prime p = ÃŽËÅ"(2cN), c à ¢Ã¢â‚¬ °Ã‚ ¥ 1 constant, and an element ÃŽÂ ± à ¢Ã‹â€ Ã‹â€  Zp of order q = ÃŽËÅ"(2N). If this has to be verià ¯Ã‚ ¬Ã‚ ed then the factorization of q is given. The center publishes p, ÃŽÂ ± and q. Step 2 : Let U1,,Un be a (dynamic) subset of all users5 who want to generate a common conference key. Step 3 : Each Ui, i = 1,,n, selects6 rià ¢Ã‹â€ Ã‹â€ R Zq, computes and broadcasts Zi=ÃŽÂ ±ri mod p . Step 4 : Each Ui, i = 1,,n, checks7 that ÃŽÂ ±q à ¢Ã¢â‚¬ °Ã‚ ¡ 1(modp) and that (zj)q à ¢Ã¢â‚¬ °Ã‚ ¡ 1(modp) for all j = 1,,n, and then computes and broadcasts Xi à ¢Ã¢â‚¬ °Ã‚ ¡(zi+1/zià ¢Ã‹â€ Ã¢â‚¬â„¢1)ri (modp), where the indices are taken in a cycle. Step 5 : Each Ui, i = 1,,n, computes the conference key, Ki à ¢Ã¢â‚¬ °Ã‚ ¡(zià ¢Ã‹â€ Ã¢â‚¬â„¢1)nri  ·Xin-1à ¢Ã‹â€ Ã¢â‚¬â„¢1  · Xi+1n-2  ·Ãƒâ€šÃ‚ ·Ãƒâ€šÃ‚ · Xi-2 (modp). 3.4 Paper on Key Agreement in Dynamic Peer Groups: As a result of the increased popularity of group- oriented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer tele- and video-conferencing. Regardless of the application environment, security services are necessary to provide communication privacy and integrity. This paper considers the problem of key agreement in dynamic peer groups. (Key agreement, especially in a group setting, is the steeping stone for all other security services.)Dynamic peer groups require not only initial key agreement (IKA) but also auxiliary key agreement (AKA) operations such as member addition, member deletion and group fusion. We discuss all group key agreement operations and present a concrete protocol suite, CLIQUES, which offers complete key agreement services. CLIQUES is based on multi-party extensions of the well-known Diffie-Hellman key exchange method. The protocols are efficient and provably secure against passive adversaries. 3.5 Comparative Study SR NO Paper Title And Methods Used Authors Name Mertis Demerits Problem Solution Future Work 1. Broadcast Encryption ( Symmetric Encryptions, Secret key Distributions management) A. Fiat and M. Naor Provides secure group-oriented communications Existing GKA protocols cannot handle sender/member changes efficiently Requires a trusted third party to distribute the keys. Using Asymmetric group key agreement (ASGKA) to overcome this. Future work will concern the implementation of the ASGKA scheme to incorporate the following. 2. Collusion Resistant Broadcast Encryption with short Ciphertext and private keys (Parameterization) Dan Boneh , Craig Gentry Provides a collusion resistant system. Cannot handle large sets of groups. Collusion resistant is limited to a relatively small group. Using appropriate parametrization Future works will concern the reduction of collusion by constructing both Ciphertext and private key of constant size. 3. A Conference Key Distribution System (Security in digital systems ,Conference key distribution) I. Ingemarsson, D.T. Tang and C.K. Wong Provides a system using That distributes key using contributory key generation. It is immune to insecurities due to symmetric functions of degree two. As the key was a symmetric function of degree two, it was insecure. Using a asymmetric function instead of symmetric function. Future research will be devoted to methods that can use asymmetric function for higher security. 4. Key Agreement in Dynamic Peer Groups (Multi-party Computation) Michael Steiner, Can handle system with constantly changing members and senders. It is not efficient for relatedly large set of groups. Works only for relatively small and non-hierarchical groups. Using key transport mechanism. Future research Will including the methods adopted in this. 5. Broadcast Encryption ( Symmetric Encryptions, Secret key Distributions management) A. Fiat and M. Naor Provides secure group-oriented communications It requires a fully trusted third party and direct link It is more expensive as direct link has to be established Cost can be minimised using Contributory key generation schemes or using Conbe Scheme. Future research will be including plans to implement the schemes to cut down expenses. 6. Contributory Broadcast Encryption With Efficient Encryption and Short Ciphertexts Qianhong ,Bo Qin, Lei Zhang,Josep Domingo-Ferrer Doesnt require trusted third Party to set up the system. As it is more flexible , it compromises on some set of performances. Cannot handle changes in server/member efficiently Using auxiliary group Encoding EXISTING SYSTEM EXISTING SYSTEM PROBLEM STATEMENT PROBLEM STATEMENT The prevailing broadcast encryption scheme can provide reliable end to end encryption, however requires a trusted third party to distribute the keys. Also the BE scheme requires to set a direct link with the receiver to enable the flow of information. Existing GKA protocols cannot handle sender/member the changes efficiently with the growing technologies and ad hoc devices, it is essential for the system to address and resolve the issue.Using Asymmetric group key agreement (ASGKA) the system can overcome the shortcomings of the BE system. Collusion Resistant Broadcast Encryption with short Ciphertext and private keys methodology used a symmetric key of degree two to mitigate collusion for a relatively short system. It could not handle or further avoid collusion for a large set of system.Using appropriate parameterization can aid the drawbacks of the system. Also as the key was a symmetric function of degree two, it was insecure and worked only for relatively small and non-hierarchical groups. A Conference Key Distribution System which uses security in digital systems and conference key distribution provides a system That distributes key using contributory key generation. It is immune to insecurities as it uses symmetric function of degree two. Key Agreement in Dynamic Peer Groups which uses multi-party Computation can handle system with constantly changing members and senders but It is not efficient for relatedly large set of groups. Using key transport mechanism, the range of the system can work efficiently for relatively larger set of group. The system will not require the sender to be the part of the group. SCOPE SCOPE PROPOSED SYSTEM PROPOSED SYSTEM Diffie-hellman algorithm Diffie-Hellman key exchange (D-H) [nb 1] is a specific method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as originally conceptualized by Ralph Merkle and named after WhitfieldDiffie and Martin Hellman. Step 1: Let the users be named sender and receiver. First, they agree on two prime numbers g and p, where p is large and g is a primitive root modulo p. Step 2: Now sender chooses a large random number a as her private key and receiver similarly chooses a large number b. Step 3: Sender then computes, which she sends to Receiver, and Receiver computes , which he sends to sender. Step 4: Now both Sender and Receiver compute their shared key , which Sender computes as and Receiver computes as Sender and Receiver can now use their shared key to exchange information without worrying about other users obtaining this information. In order for an attacker to do so, he would first need to obtain knowing only , , and . This can be done by computing from and from . This is the discrete logarithm problem, which is computationally infeasible for large . Computing the discrete logarithm of a number modulo takes roughly the same amount of time as factoring the product of two primes the same size as . 7.2MATHEMATICAL MODEL Group Key Agreement. For 1 à ¢Ã¢â‚¬ °Ã‚ ¤k à ¢Ã¢â‚¬ °Ã‚ ¤n, member k doesthe following: Randomly choose Xi,k à Ã‚ µG, ri,k à Ã‚ µZpÃÅ' ½; Compute Ri,k = gÃâ€" ¾ÃƒÅ Ã‚ ³i,k, Ai,k = e(Xi,k, g); Set PKk = ((R0,k , A0,k),à ¢Ã¢â€š ¬Ã‚ ¦.,(Rn,k, An,k)); For j = 1,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦., n ,jà ¢Ã¢â‚¬ °Ã‚   k, computeà Ã†â€™i, j ,k=Xi,khjri,kfor i = 0,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦,n, with i à ¢Ã¢â‚¬ °Ã‚  j; Set dj,k = (à Ã†â€™0,j,k,à ¢Ã¢â€š ¬Ã‚ ¦.., à Ã†â€™jÃâ€" ¾1,j,k,à Ã†â€™j+1,j,k,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦,à Ã†â€™n,j;k); Publish (PKk, d1,k,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.,dkÃâ€" ¾1;k, dk+1,k,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦., dn,k); Compute dk,k accordingly and keep it secret. Group Encryption Key Derivation. The group encryption key is PK = PK0 PKn = ((R0,A0),à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦,(Rn,An)) where Ri =à Ã… ¸nk=1Ri,k,Ai =à Ã… ¸nk=1Ai,kfor i =0,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦,n. The group encryption key PK is publiclycomputable. Member Decryption Key Derivation: For 1 à ¢Ã¢â‚¬ °Ã‚ ¤ià ¢Ã¢â‚¬ °Ã‚ ¤ n 1 à ¢Ã¢â‚¬ °Ã‚ ¤jà ¢Ã¢â‚¬ °Ã‚ ¤ nand i à ¢Ã¢â‚¬ °Ã‚   j, member j can compute herdecryption key dj = (à Ã†â€™ 0,j,à ¢Ã¢â€š ¬Ã‚ ¦.., à Ã†â€™ jÃâ€" ¾1,j,à Ã†â€™j+1,j,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦,à Ã†â€™n,j) where n n n à Ã†â€™i,j= à Ã†â€™i,j,jà Ã… ¸Ãƒ Ã†â€™i,j,k= à Ã… ¸Ãƒ Ã†â€™i,j,k= à Ã… ¸Xi,khrj k=1,kà ¢Ã¢â‚¬ °Ã‚  1 k=1 k=1 7.3 SYSTEM ARCHITECTURE Storage Server Upload File with privileges 1. Req File Search Files2.Access the file METHODOLOGY METHODOLOGY 8.1 FLOW CHART UML DIAGRAMS 8.2.1 Use Case Diagram Sequence Diagram Upload Files Upload File Response Register Register Confirmation Provide access Permission Request Search the file File request confirmation File sending response Req Sign Distribution Sign Res Status Class Diagram