Friday, December 27, 2019

Essay on Lady Macbeth in William Shakespeares Macbeth

Lady Macbeth in William Shakespeares Macbeth Throughout Macbeth, we are introduced to several interesting characters that influence events for good or bad. Perhaps the most complete character of all could be argued to be Lady Macbeth. Lady Macbeth often takes centre stage and reveals her emotions to the audience through several soliloquies. Because she is such a complex character, the audience has to make their own conclusions about her personality and drive behind her actions. To me, she appears at first to be loving but ambitious. By the end of the play, Lady Macbeth is revealed to be cruel but loyal, aggressive, ruthless and neurotic. The fact that she kills herself shows how mentally†¦show more content†¦We first are introduced to Lady Macbeth reading the letter from her husband in Act 1 Scene 5. From this scene we learn that she is ambitious, Glamis thou art, and Cawdor, and shalt be what thou art promisedà ¢Ã¢â€š ¬Ã‚ ¦ Her ruthless side has not been revealed yet because she just says that she wants her husband t o be King, she doesnt go in to any gory details. We do not learn how she will do this until later on in the play. It becomes clear that she holds high hopes for her husband. At first it may appear to be just because she loves him, but as the scene progresses, we find out that she is actually determined that she will be Queen. Basically she is going to use Macbeth to satisfy her own desires. She also gives the impression that she feels Macbeth is too honest to be King, that he is too full of the milk of human kindness. She realises that he will probably reluctantly kill the King and so she may have to push him along. We can see this by the eagerness she shows in wishing her husband home, Hie thee hither, that I may pour my spirits in thine ear. What is most disturbing is that in the arrival of her beloved husband, she is obviously still thinking about King Duncan. When Macbeth tells her that Duncan is going to stay at their residence, she immediately tells him that Duncan will not le ave the place alive, OShow MoreRelatedThe Downfall of Lady Macbeth in William Shakespeares Macbeth1399 Words   |  6 PagesThe Downfall of Lady Macbeth in William Shakespeares Macbeth William Shakespeares Macbeth has been a theatrical favorite since Elizabethan times. Its timeless themes of ambition, fate, violence, and insanity collaborate to produce a captivating plot. The audience traces the disintegration of a tragic hero and his willful wife. Lady Macbeth, one of Shakespeares most forcefully drawn female characters, plays an important role in the play Macbeth. She has a profound influence over the actionRead MoreEssay Lady Macbeth in William Shakespeares Macbeth1403 Words   |  6 PagesLady Macbeth in William Shakespeares Macbeth In act 1 scene, we see lady MacBeth reading a letter that her husband, MacBeth has sent her, it has been written as a soliloquy, she reads aloud to the audience how he has been given information about his future by a group of witches. MacBeth sent this letter to his wife quickly, he is was obviously pleased with the news and wanted her to know about it. This gives the audience the impression that Lady MacBeth was very dominantRead MoreLady Macbeth in William Shakespeares Macbeth Essay573 Words   |  3 PagesLady Macbeth in William Shakespeares Macbeth At the beginning of the play Lady Macbeth is strong, incisive, completely in control, ‘To alter favour is to fear, leave all the rest to me.’ At this point Lady Macbeth is the stronger of her and Macbeth. While he is stricken with guilt, she is in control and ready to do what she has to in order to ensure the fate she wants for herself. She has a masterful scheme and enough power over Macbeth to do this. At the end ofRead MoreLady Macbeth of William Shakespeares Macbeth Essay1185 Words   |  5 PagesLady Macbeth of William Shakespeares Macbeth Shakespeare shows Lady Macbeth as an ambitious woman. She starts out as a fiend like queen, who is capable of evil. However, as Macbeth grows more evil and ruthless, she sees the error of her ways and lacks the strength and courage to see things through. We first see this when she receives a letter from her husband. We see from the letter that Macbeth treats her as an equal, My dearest partner of greatness, and that heRead MoreThe Changing Attitudes of Lady Macbeth in William Shakespeares Macbeth617 Words   |  3 PagesThe Changing Attitudes of Lady Macbeth in William Shakespeares Macbeth In Shakespearean England, women’s role in society was very different to what it is today. Today, women are allowed, and in fact, almost expected to be educated, independent, confidant, outspoken, and to go to work, to provide for themselves. In the 1600’s, it wasn’t like that. Women were gentle, kind, and fragile. If they were well off, they were expected to stay at home and sew, whilst their husbandsRead MoreThe Relationship of Macbeth and Lady Macbeth in William Shakespeares Play1131 Words   |  5 PagesThe Relationship of Macbeth and Lady Macbeth in William Shakespeares Play The play begins when Macbeth meets three witches and is given three prophecies - one of which is that he will be king. In Lady Macbeths first scene she is reading a letter from her husband telling her about the witchs predictions. Upon reading the letter she instantly decides to obtain the crown for Macbeth through any possible means. Lady Macbeth is viewed as very controlling, strong, and certain;Read MoreMacbeth and Lady Macbeth as Evil Murderers in William Shakespeares Play1016 Words   |  5 PagesMacbeth and Lady Macbeth as Evil Murderers in William Shakespeares Play At the start of this play Macbeth is mentioned by witches which doesn’t give him credibility with the audience, whilst soon after Macbeth is seen as a brave, loyal and trustworthy servant of his king, Duncan. Almost as soon as the play starts, you hear of Macbeth’s bravery; â€Å"Brave Macbeth-well he deserves that name†¦Like Valour’s minion.† But soon after he has his meeting with the witches he is alreadyRead More Lady Macbeths Strategy in William Shakespeares Play Macbeth1612 Words   |  7 PagesLady Macbeths Strategy in William Shakespeares Play Macbeth In the seventh scene of act one Macbeth has left the banquet, and expresses his doubts about murdering Duncan in a monologue. Lady Macbeth comes in, and argues with Macbeth, until she manages to convince him, that he has to murder Duncan. To do that Lady Macbeth uses mainly two arguments. Letting I dare not? wait upon ?I would? like the poor cat i? the adage? (lines 43-44). Lady Macbeth tells Macbeth here that he shouldnRead MoreMacbeth and Lady Macbeth as A Dead Butcher and His Fiend-like Queen in William Shakespeares Macbeth2137 Words   |  9 PagesMacbeth and Lady Macbeth as A Dead Butcher and His Fiend-like Queen in William Shakespeares Macbeth Macbeth is one of Shakespeares four famous tragedies. It was written in 1605-1606, at the peak of Shakespeares career; and was chosen to accolade the new King James I of England, who had been James VI of Scotland. He had a fascination with witchcraft and the supernatural, so the play Macbeth complimented his passion. Shakespeare is famed for his use of the English languageRead MoreLady Macbeth as the Driving Force Behind the Murder of Duncan in William Shakespeares Macbeth1424 Words   |  6 PagesLady Macbeth as the Driving Force Behind the Murder of Duncan in William Shakespeares Macbeth Macbeth is a very exciting play containing all kinds of plots and murders. Many of the characters deceive one another in some form, and are generally very treacherous. Two of the most dangerous characters in the play are Lady Macbeth and her husband, Macbeth. Together they commit a most dreadful crime by killing the King; Duncan. It is for this reason that it is difficult to determine

Thursday, December 19, 2019

Literary Analysis Of Emily Dickinsons The Road Not Taken

There are many experiences and encounters everyone will face, not just once or twice, but repetitively in our undetermined life. By nature, humanity is subject to struggle, but we are also compelled and driven to strive. During life we face defeat and we will feel every possible alternative is not accessible. However, facing defeat enables learning and experience and therefore, we are preparing ourselves to not be defeated. The process of life exposes humans to the never-ending ups and downs in their lifetime. I argue that there are a variety of experiences to face, including unbearable climaxes, as well as tranquil moments in life. Difficulty of coming to a conclusion of choice between the occurrence of multiple options is demonstrated†¦show more content†¦Almost every event in life can be imagined through time, but the whole idea of life is that it is a series of unknown possibilities. Savannah Bennett discusses how cancer took the life of her relative without the expectan cy in her poem titled â€Å"Cancer†. An image of a closed door accompanies this work because a doorway doesn’t allow anything to see beyond, or know what’s beyond it until it is opened, and once opened it leads to another place, similar to the way a life ends and goes into another dimension. Both Steble’s poem â€Å"Choices† and Felix Lugo’s â€Å"There is no Rest for Success† symbolize the power a human has over their own decisions and determination. A picture of a closed flower embodies both of these poems because a flower makes its own decisions of when it wants to open and also if it wants to stay in the light to grow and thrive. A flower has the ability to lean it’s body to follow the light because light gives it energy to pursue its process life process. The poem â€Å"Broken promises† by David Kirby signifies how people create their own problems by expressing the way broken promises linger with their master who cr eated them. These broken promises remind a person of their failure and how they were defeated. A picture of an assignment given an F assists this poem because an F stands for failure and it is recorded on a paper called a report card to remind you of how you failed yourself. During lifeShow MoreRelatedFigurative Language and the Canterbury Tales13472 Words   |  54 Pages1. allegory: a literary work that has a second meaning beneath the surface, often relating to a fixed, corresponding idea or moral principle. 2. alliteration: repetition of initial consonant sounds. It serves to please the ear and bind verses together, to make lines more memorable, and for humorous effect. †¢ Already American vessels had been searched, seized, and sunk. -John F. Kennedy †¢ I should like to hear him fly with the high fields/ And wake to the farm forever fled from the childlessRead MoreAmerican Literature11652 Words   |  47 Pagesphilosophical readers sense of idealism focus on the individual s inner feelings emphasis on the imagination over reason and intuition over facts urbanization versus nostalgia for nature burden of the Puritan past Genre/Style: ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · literary tale character sketch slave narratives, political novels poetry transcendentalism Effect: ï‚ · ï‚ · ï‚ · helps instill proper gender behavior for men and women fuels the abolitionist movement allow people to re-imagine the American past Historical

Wednesday, December 11, 2019

Issues Related to Smoking

Question: Write an essay on Issues Related to Smoking, Alcohol Consumption and Diet in UK? Answer: It is a proven fact through research that smoking and alcohol consumption immensely affects the human body. There are many harmful effects caused by smoking and alcohol among which lungs cancer and kidney damage is prime. In recent years various studies has shown that United Kingdom is dawdling with three critical life style issues. These issues can be discussed under three primary life style habits, which include smoking, alcohol and diet. The main aim of this assignment is to provide a proper light and explanation on the current life style and health condition in United Kingdom considering the three aspects which are alcohol, diet and smoking (Kvaavik et al. 2010). The factors that influence the health condition and status are said to be the determinants of health. Some of the factor that influences the health status can be broadly classified into various categories, which includes economical, societal, personal and environmental factors. Moreover, various other determinants like policy making, health services, biological and individual behavior influences the health condition and status of a particular nation (Stinghini et al. 2011). It has been found that various factors related to the social affairs, environment and physical condition has a major role in influencing the social determinants of health. These factors affect heavily on the quality of life and health of an individual. Some of the examples of these social determinants are public safety, socio-economic condition, exposure to globalization and technologies, availability of education, availability of job etc. However, certain other factors like social standard, social norms and social attributes as discrimination also influences the social condition of a country (Scott and Happell, 2011). Several minor factors like residential segregation and exposure to violence and social disorder also determine the social condition of a particular country. On the other hand, the environmental determinants like climate change, weather, toxic substance exposure and some aesthetic factors (like tree, electricity and lightning facility) also influences the health status. However, the condition of housing, neighbourhood, schools, office also influences the environmental and health status of a country heavily. These factors often correlate with the individual behavior of a person, which includes diet, alcohol and smoking addiction of a particular community (Dodd et al. 2010). Adding to this, various type of biological and genetic factors like age, sex, HIV status also affect the mass population of a country in terms of the health condition. For example, old person are found to be more biologically prone to suffer reduced and pitiable health condition due to cognitive effects like aging. Furthermore, it has been observed in UK community that various people are suffering due to health inequalities. This are considered as an unjust and an unethical difference in health condition that are seldom experienced by various population and communities within UK. It has been studied that people who are under-privileged and belonging from a lower strata of socio-economic background are more prone to chronic ill health (Hiscock et al. 2012). This people die earlier compare to the people residing in the higher strata of the society. On the other hand, health equity is defined as the commitment to eliminate the discrimination and disparities of health related inequalities in the society. Moreover, the main purpose of the health equity is to strive for providing the best possible health standard for each and every people. It also focuses on giving special attention towards people who are at greater risk of poor health condition based on environmental, social and biological factors (Wallerstein and Duran, 2010). The factors that affect the health and well-being of an individual are considered as the social determinants of the condition of health status. However, it should be remembered that this causes are not the direct and primary causes of illness, rather it can be considered as the reason for illness. Thus, it can be stated that smoking is the cause that can lead to various illness like chronic obstructive pulmonary disease (COPD), coronary heart disease (CHD) and lung cancer. Moreover, social and environmental factors influence an individual and determine the health condition and health status of a particular population within a nation (Scarborough et al. 2011). The Integrated Household survey (IHS) has shown a data, which confirms that 22 percent of men and 20 percent of female aged 18 or above has regular smoking habits. The people who are tagged as major smokers are found to smoke at an average of 15 cigarettes per day. However, the ratio and numbers found to vary among various sections in the community depending on their age, gender, social status and ethnicity. Moreover, the survey report also reported that one third of the United Kingdoms population between the age group of 20- 24 have been identified as regular smokers. However, the group of people between the age group of 60 and above is found to be infrequent smokers and their percentage is found to be 14% (McCartney et al. 2011). In a survey conducted by London Health Inequalities Forecast, it was found that the prevalence of smoking varies immensely among different population within United Kingdom. This marked difference is found to be prevailed among people belonging from different socio-economic strata. It was reported that people who are living in deprived circumstances have found to have higher rates of smoking habits. It was also reported that this deprived people with lower socio-economic status have taken up smoking at an early age and they are less likely to quit smoking. Hence, this result in higher numbers of smoke related illness among this particular section of the population (Bell et al. 2010). The report also showed that 28 percent of people in manual occupation are reported to smoke regularly compared to the 13 percent of the adults in managerial and professional occupations. However, various NGOs and other related organizations are assisting people in United Kingdom and helping them to quit smoking. Various seminars and educational programs are conducted annually to educate people about the ill effects of this habit. Various legislation and policies has been put forward by the government to ban smoking in every enclosed public places. Healthy Lives, Healthy People: a Tobacco Control Plan for England was published in March 2011, whose main purpose was to reduce the number of tobacco usage in United Kingdom. It was found that the consumption of alcohol has increased the rate of both acute consequences and chronic conditions among the population of United Kingdom. The acute consequences of alcohol consumption have increased the rate of road accidents and various type of assaults in the streets of UK. However, the chronic conditions like prevalence of cancer, heart disease, hypertension, liver damage have been reported to be very high due to higher rates of alcohol consumption in United Kingdom (Scarborough et al. 2011). The Integrated Household survey has shown that the consumption of alcohol varies with different ethnic groups within United Kingdom. The data and research survey has shown that Whites and Hispanic people have the highest alcohol consumption rates. It was found that 18.2 percent of Whites, followed by 15.2 Hispanic population), 10.1 Blacks and 8.01 percent Asians have the alcohol consumption habits in their adolescence (12 17 years) age. However, the percentage of this statistics tends to get higher when age group of 18 24 years of population was surveyed. It was found that Whites have the highest alcohol consumption rates with a percentage of 77.3% and 70.9% respectively (Ronksley et al. 2011). However, the consumption rate in Hispanics, Blacks and Asians has found to be lower between the ages of 18 24 years. In another study, which was performed by IHS, it was found that, Whites, Hispanics and lesser number of Blacks and Asians have reported alcohol consumption at an early onset (before the age of 15). However, the rate of drinking onset was found to be very low in case of females from every ethnic groups of the society. However, it was reported that the marked difference in socio-economic hierarchy was found to be a deciding factor in the amount of alcohol consumption in UK. It was reported that people who are living in deprived circumstances have found to have higher rates of drinking habits. Nevertheless, it was also reported that people enjoying the higher level in the socio economic pyramid of the society is reported to drink alcohol as a mark of their social status. However, the middle class people in UK was reported to consume alcohol in lesser amount compare to this former two groups of population (Rehm et al. 2010). To improve the determinants the government needs to impose higher taxes on the alcohol and impose a ban on heavy marketing and advertisement of alcohol within UK. Moreover, the Non-governmental organizations need to conduct various educational seminars and programs to educate people and spread awareness among the mass population of United Kingdom. The unhealthy diets and food habits among the population of United Kingdom has raised the number of obese patients. It has been found that majority of United Kingdoms population is suffering from excessive weights and obesity. The United Kingdom ministry has announced that obesity is one of the most increasing health problems among the population of the country. An online survey carried out by the organization name UK-Cental shows that in the year of 2014, 27.7% of the UK population have gained weight and suffering from obesity. Moreover, 23.1% of people have reported to living in a life with overweight condition. Several other diseases are associated with obesity. High blood pressure, cardiac diseases and high blood sugar are one of the most prevalent diseases, which are related with obesity (Wang et al. 2011). However, this data is common among the high people who belong in the higher socio-economic strata. They have money to eat their desired food and are more frequent to fast food centers, restaurants and stalls. However, the lower class people are deprived of any money and social status hence they suffer from malnutrition and deficiency. This is a classic example of the socio-economic condition of United Kingdom where people can easily distinguish a person and can understand from which socio-economic group he/she belongs (Scarborough et al. 2011. In 2012, 21.1% of the population was suffering from overweight issues, which rose to 24.4% in 1998. In 2013, the amount rose to 25.6%. The more recent data published by the National Health Survey in 2014 shows that 10.8 percent of the entire United Kingdom residents aged between 18 to 69 are suffering from obesity. Among this population, the male population is 12.1 percent, and female population is 9.5 percent, if this data is further categorized into the ethnic group, then 24 percent of the obese population belongs to Black Africans, 16.9 percent belong to Whites, and 7.9 percent belongs to the Asians (Misra and Khurana, 2011). The programs and seminars of United Kingdom are the most effective setting where people can be educated through awareness programs. Many companies and organizations have started Workplace Health Promotions (WHP) in collaboration with HPB. This collaboration helps to fund different training to staff, and conduct workplace health promotion programs. These grants of fund help to support the organizations to buy required equipment and build facilities or incentives that will motivate and encourage people to control obesity. Moreover, the Nongovernmental organizations and Government need to promote and fund this type of educational programs more. Moreover, the UK Government needs to implement Beatties model to increase health promotion and awareness among the mass population of United Kingdom. Beatties model is an analytical and complex model. This model recognizes that the promotion for healthy lifestyle and behavior is implanted by applying good social and cultural practices. The Beattie's model is focused on different tactics and approaches towards promoting health awareness (Gortmaker, 2011). Evaluating the data and information, it can be concluded that, United Kingdom is suffering from a unhealthy lifestyle and living habits. The country need to improve its standard of living so that it can sustain a healthy and prosperous future for its compatriots. Moreover, the non-governmental, non-profit organizations and the UK government need to work hand in hand to increase the awareness and start new legislations in order to reduce the unhealthy life styles in United Kingdom. However, it is tough but by making a proper plan and by collaborating with each other the work of promoting healthy life style in United Kingdom can be achieved in near future. It is an important aspect to make people aware about the consequences and harmful effects of smoking and alcohol consumption. In the younger generation the alcohol consumption and smoking rate is gradually increasing. This is not all a good sign for any country. To overcome this situation the Government of U.K. should implement prope r steps needed in order to maintain the social and economic integrity of the country. Reference: Bell, K., Salmon, A., Bowers, M., Bell, J. and McCullough, L., 2010. Smoking, stigma and tobacco denormalization: Further reflections on the use of stigma as a public health tool. A commentary on Social Science Medicine's Stigma, Prejudice, Discrimination and Health Special Issue (67: 3).Social science medicine,70(6), pp.795-799. Dodd, L.J., Al-Nakeeb, Y., Nevill, A. and Forshaw, M.J., 2010. Lifestyle risk factors of students: a cluster analytical approach.Preventive medicine,51(1), pp.73-77. Gortmaker, S.L., Swinburn, B.A., Levy, D., Carter, R., Mabry, P.L., Finegood, D.T., Huang, T., Marsh, T. and Moodie, M.L., 2011. Changing the future of obesity: science, policy, and action.The Lancet,378(9793), pp.838-847. Hiscock, R., Bauld, L., Amos, A., Fidler, J.A. and Munafo, M., 2012. Socioeconomic status and smoking: a review.Annals of the New York Academy of Sciences,1248(1), pp.107-123. Kvaavik, E., Batty, G.D., Ursin, G., Huxley, R. and Gale, C.R., 2010. Influence of individual and combined health behaviors on total and cause-specific mortality in men and women: the United Kingdom health and lifestyle survey.Archives of internal medicine,170(8), pp.711-718. McCartney, G., Mahmood, L., Leyland, A.H., Batty, G.D. and Hunt, K., 2011. Contribution of smoking-related and alcohol-related deaths to the gender gap in mortality: evidence from 30 European countries.Tobacco control,20(2), pp.166-168. Misra, A. and Khurana, L., 2011. Obesity-related non-communicable diseases: South Asians vs White Caucasians.International journal of obesity,35(2), pp.167-187. Rehm, J., Baliunas, D., Borges, G.L., Graham, K., Irving, H., Kehoe, T., Parry, C.D., Patra, J., Popova, S., Poznyak, V. and Roerecke, M., 2010. The relation between different dimensions of alcohol consumption and burden of disease: an overview.Addiction,105(5), pp.817-843. Ronksley, P.E., Brien, S.E., Turner, B.J., Mukamal, K.J. and Ghali, W.A., 2011. Association of alcohol consumption with selected cardiovascular disease outcomes: a systematic review and meta-analysis.Bmj,342, p.d671. Scarborough, P., Bhatnagar, P., Wickramasinghe, K.K., Allender, S., Foster, C. and Rayner, M., 2011. The economic burden of ill health due to diet, physical inactivity, smoking, alcohol and obesity in the UK: an update to 200607 NHS costs.Journal of Public Health,33(4), pp.527-535. Scott, D. and Happell, B., 2011. The high prevalence of poor physical health and unhealthy lifestyle behaviours in individuals with severe mental illness.Issues in mental health nursing,32(9), pp.589-597. Stringhini, S., Dugravot, A., Shipley, M., Goldberg, M., Zins, M., Kivimki, M., Marmot, M., Sabia, S. and Singh-Manoux, A., 2011. Health behaviours, socioeconomic status, and mortality: further analyses of the British Whitehall II and the French GAZEL prospective cohorts.PLoS Med,8(2), p.e1000419. Wallerstein, N. and Duran, B., 2010. Community-based participatory research contributions to intervention research: the intersection of science and practice to improve health equity.American journal of public health,100(S1), pp.S40-S46. Wang, Y.C., McPherson, K., Marsh, T., Gortmaker, S.L. and Brown, M., 2011. Health and economic burden of the projected obesity trends in the USA and the UK.The Lancet,378(9793), pp.815-825.

Tuesday, December 3, 2019

Symbolism In The Fall Of The House Of Usher Essay Example For Students

Symbolism In The Fall Of The House Of Usher Essay Webster describes setting as the way to describe the place, time, and environment in a story or play. But, setting can do more then that as well. Setting can create atmosphere in a story. The writer can use the setting to foreshadow events that are soon to come. It can also tell the reader what kinda of traits the characters show. Edgar Allen Poe did this three things with his story, The Fall of the House of Usher. Poe used his wording of the setting to place an atmosphere in the readers head. Ushers house, the windows, the yard, all put a gloomy image in the readers mind and Poe is able to build off that to create a great story. We will write a custom essay on Symbolism In The Fall Of The House Of Usher specifically for you for only $16.38 $13.9/page Order now His use of the words black, decayed, vacent help him to create the perfect atmosphere. The narrator states that the mansion had an atmosphere which had no affinity with the air of heaven. It wasnt clean, or beautiful, or something a reader would want to live in. It was a house that put them in a frightened mood and wondering why the house would be this way. Poes wording when describing the setting is what creates the effective atmosphere in the story. Another important way Poe uses setting is to foreshadow events in the story. An example of this is the mansion. The narrator notices a small crack in the house. He defines this as a crack in the building, but also in the family. This foreshadows that something is coming along to make the house and the family fall. Another way foreshadowing takes place in setting is the time of year. The Fall of the House of Usher takes place in autumn. Autumn is used to symbolize that death is around the corner. This type of symbolism is also used on the night when Rodericks mind is finally on its last string. There is a storm outside, which also symbolizes that something bad is going to happen. In this story Poe used enough information to clue the reader in on what was going to happen, but not enough to give it all away. Character traits are also displayed through the setting. The narrator was affected by visiting the mansion and living in the gloomy atmosphere that Roderick had created through his books, art, and music. These things were all depressing and morbid, which matched the inside of him and his personality. Roderick played dirges on his guitar and painted images that the narrator described phantasmagoric. One of the rooms in the mansion had windows that feeble gleams of encrimsoned light erved to render sufficiently distinct the more prominent objects around. The windows represented Rodericks eyes and the light represented a sense of reality. Many of these things in the setting show that Roderick is unstable, he loves obsessing over death, and was depressed. Poe does something in his writing that some writers do not. He uses all aspects of the setting. He creates a mood for the story. He tells what is about to come. He also tells the reader what the characters are like. The setting in The Fall of the House of Usher held the story together and is the reason why the story is as well known as it is today.

Sunday, November 24, 2019

Italian Preposition Da - Preposition Da in Italian

Italian Preposition Da - Preposition Da in Italian In its simplest form, the Italian preposition da means from in English. It’s used in time expressions, in which case you may translate it as since or for. Here are the most common ways to use â€Å"da† in Italian. Common Ways to Use â€Å"Da† 1) To indicate an an action that began in the past and is still going on in the present. You would use the construction of present tense da time. Da quanto tempo leggi questa rivista? - How long have you been reading this magazine?Leggo questa rivista da molto tempo. - Ive been reading this magazine for a long time. 2) To express the equivalent of the English phrase at the house of: Vado da mio fratello. - Im going to my brothers house.Vado da Filippo. - Im going to Filippos house.Andiamo dai signori Rossi. - Were going to the Rossis house.Arrivo subito da te. - I’ll be right over to your place. 3) To indicate origin or source Vengo da Torino. - I come from Torino.Vengo dalla Francia. - I come from France.È tornato dalle vacanze. - He’s back from vacation.È tornato dagli zii. - He’s back from his aunt and uncles house. This also occurs In surnames: Francesca da Rimini; Leonardo da Vinci In correlation with the prepositions a and : si à ¨ trasferito da Roma a Firenze (movement); cadere dalla padella nella brace (figurative) 4) To indicate the worth or price of something: Voglio un francobollo da cento lire. - I want a 100 lire stamp.È una casa da poco prezzo. - Its a house of little worth.Unautomobile da dieci milioni - A ten thousand million dollar car 5) To indicate a location, place (stato in luogo) Ti aspetto dallavvocato. - I’ll wait for you at the lawyer’s office. 6) To indicate cause, reason (causa) Piangeva dalla gioia - To cry from joy 7) To indicate time Non lo vedo da molti anni. - I haven’t seen him in years. In correlation with the preposition a: lavorare dalla mattina alla sera - to work from the morning until the evening Other Ways to Use â€Å"Da† Here are some other ways to use â€Å"Da† 1) To indicate movement through a particular point (moto per luogo): Sono fuggiti dalluscita di servizio. - They escaped through the service exit. 2) To indicate separation (separazione, allontanamento): I Pirenei dividono la Spagna dalla Francia. - The Pyrenees divide Spain from France.Non riesce a staccarsi da quegli amici. - They can’t get away from those friends. 3) To indicate means, method (mezzo): Giudico le persone dai fatti, non dalle chiacchiere. - I judge people from facts, not from gossip. 4) To indicate purpose, ending (fine): Carte da gioco - Playing cardsSala da pranzo - LunchroomSpazzolino da denti - ToothbrushAbito da sera - Evening dress 5) To indicate an attribute (qualit): Una ragazza dagli occhi azzurri - A girl with blue eyesUn uomo dal cuore doro - A man with a heart of gold 6) To indicate a way, matter, mode (modo): Agire da galantuomo - To act like a gentlemanTrattare da amico - To treat as a friend 8) As a predicative (predicativo): Fare da padre - To act as a fatherFungere da presidente - To serve as president â€Å"Da† With Infinitives Followed by a verb in the infinitive, the preposition da introduces the following clauses:  » consecutive clause (proposizione consecutiva): Ho (una) fame da morire. - I’m starving.Fa (un) caldo da impazzire. - It’s so hot!  » final clause (proposizione finale): Dammi un libro da leggere. - Give me a book to read.Che cosa vuoi da bere? - What do you want to drink? Phrases Using â€Å"Da† The Italian preposition da is used to form prepositional and adverbial phrases, such as: Da parte di - A part ofFuori da - Outside ofDi qua da - Further on from/This side ofDi l da - On the other side of/BeyondDa vicino - Close/CloselyDa lontano - From afar/From far awayDa capo - Start over (from the top)/Start anewDa parte (from somebody) -  Of youDa parte (to save something) - (Put) AsideDa meno - For less...Dappertutto - Everywhere Prepositional Articles With Da When followed by a definite article, da is combined with the article to give the following combined forms known as prepositional articles (preposizioni articolate: Le Preposizioni Articolate Con Da PREPOSIZONE ARTICOLO PREPOSIZIONI DETERMINATIVO ARTICOLATE da il dal da lo dallo da l' dall' da i dai da gli dagli da la dalla da le dalle

Thursday, November 21, 2019

Business Planning Essay Example | Topics and Well Written Essays - 500 words

Business Planning - Essay Example In this case, the action of the employees is intrinsic for the success of the plan since the type of businessi idea involves a one-on-one conversation with the customers. 3. Fixed prices for renting: considering the state of the industry, owning and renting a car, the business idea is considered strong since the involved customers are made aware of the prices. The prices are fixed since there are less external influences on the prices such as weather. 1. High product pricing: Botflex plans to offer high quality services to the boat owners and the tenants thereby leading to the high product pricing. Because of the need for offsetting the high production cost associated, the business finds it difficult to charge low prices. This acts as a weakness of the company since most of the potential customers are medium income earners. 1. Chance for entry into new market: There are few corporations dealing in the same products thereby presenting an opportunity for entry into new market. The company can establish its critical operation to other new areas because of the higher economies of scale associated with venturing. 2. Collaboration with other companies dealing in the same products: There are many companies which recognize the good reputation held by a company, successful in making people rent ships. This means that there are chances for the company reducing the associated costs through collaborating with other recognizable companies. 1. Escalating prices of boats: The escalating prices bears chances for inefficiencies in the production process of the company considering that the prices of raw material for making boats are on the rise. 2. Trademark infringements: Trademark infringement is just like another threat which usually faces newly established company. The company branding is susceptible to cases of illegal use of trademark especially by the competitors or other newly rising

Wednesday, November 20, 2019

D1 Assignment Example | Topics and Well Written Essays - 500 words

D1 - Assignment Example the start, therefore, California was prone to fabricate its experience and have continued to show some version of the that experience on and off ever since. In addition, Starr meant that our actual lived experience takes place in California, where our marriages, tribes, cultures, histories and neighbors, public laws, private agonies and our real homes right down to our humble daily occurrences and activities such as eating existed. All these things were pursued by the fact that one belonged to California or was precipitated by California-ism which depend upon love affair, power and pleasure, norms and values of human made empires not those that emanate from Heaven. When Starr stated that California entered history is a myth, he tried to imply that California has been seen Shangri-la-the promised land of many pilgrims who looking for American dream. In addition, the statement implied that California which is the second most populous State in the United States has been blessed with human diversity and natural beauty (Starr 30). More so, the State has been witnessed many events such as innovation, triumph, and discovery. For many years, Ca lifornia native people lived in plenty or of good topography and climate suited to human habitation. During the renaissance period, European colonization were not the only one doing good and great things. This is because societies in other parts of the world flourished. As the world turned into the 15th century, it seems that each in the world had its own renaissance. Native Americans of North America were not an exception. These people had diverse languages and culture much such as Europeans. When colonizers from Europe landed in North America, they could not have imagined of the intricacy of the people they were soon to interact with. Not all Native Americans lived in peace like Europeans; the continent faced tribal conflicts that sometimes led to cultural and human destruction. European colonizers in California sought to

Sunday, November 17, 2019

Why only Thailand had not been under colonial rules Research Paper

Why only Thailand had not been under colonial rules - Research Paper Example European aspiration for trade and consumption, creation empires and exploitation of the slave labour has produced an immense impact on many regions of the world. Whereas Spain was a pioneer in conquest and colonial expansion forcing American aboriginal population out in order to take their place and plant the new religion, other European empires took up the baton in this direction of development. The most powerful colonial empires were the Netherlands, Russian Empire, France and Great Britain. Seeking to gain control over as many beneficial territories as possible, the empires kept on spreading their influence across the New World, Africa and Asia. As the world had seen the first wave of decolonization at the turn of the 19th century when the territories of the New World won their independence weakening Spain as the colonial empire, other colonists set their eyes on the countries of the Old World, territories of South Africa, India and Southeast Asia in particular. The history of the Southeast Asian region was marked by the colonial rule and forced interaction between regional governors and the foreign powers that came to conquer and exploit the territories economically. Naturally, the origins of the colonialism policy lay in the cradle of Western civilization, in Europe. Whereas the main colonists of the region were France and Great Britain, the Southeastern colonies included Burma, Singapore, Vietnam, Laos, Cambodia, Indonesia and East Timor (Ingkhaninan). The beginning if expansion took place in the 16th century when Spain began invasive war against the Philippines conquering the islands and maintaining control over them until 1898. Indochina, in its turn, became an arena for French aggressive expansion with Vietnam and Cambodia being colonized and turned into the so-called Indochinese Union. Later, in 1893, French colonists conquered Laos. Therefore, almost the

Friday, November 15, 2019

Development of Intrusion Detection System Software

Development of Intrusion Detection System Software INTRODUCTION Heavy reliance on the Internet and worldwide connectivity has greatly increased that can be imposed by attacks plunged over the Internet against systems. It is very difficult to prevent such attacks by the only use of security policies, firewall or other mechanism because system and application software always contains unknown weaknesses or many bugs. In addition, complex, often unforeseen, interactions between software components and or network protocols are continually exploited by attackers. Successful attacks inevitably occur despite the best security precautions. There for intrusion detection system has become an essential part of the system because they can detect the attacks before they inflict widespread damage. Some approaches detect attacks in real time and can stop an attack in progress. Others provide after-the-fact information about attacks and can help repair damage, understand the attack mechanism, and reduce the possibility of future attacks of the same type. More adv anced intrusion detection systems detect never-before-seen, new, attacks, while the more typical systems detect previously seen, known attacks [1]. MOTIVATION The speed of growth of Internet is very fast without any end. With this growth the threat of attacks is also increasing. Because as we all know that theft can be occurred over the Internet from all over the world. So we require a system which can detect the attack or theft before there is some loss of information and reputation of organization or any individual. There are many solutions has been provided by the researchers and from many companies like firewall, intrusion detection system and IPS to stop the attacks. But still it is very hard to detect the attacks like DoS and worm propagation before they widespread, because regularly thousands of attacks are being developed and for a signature based intrusion detection system it is very hard to detect these kinds of new attacks with perfect accuracy. Mostly intrusion detection system generates many false alarms. These false alarms can affect the other processing of the network. If somehow any attacker gets to know that there is an intrusion detection system in the network then, the attacker will want to disable the intrusion detection system. His/her first target will be the intrusion detection system before attacking the network. So there should be proper security policies for deploying the IDS to take proper advantages of it. PROJECT OBJECTIVES Security is the main concern for any network. Every day thousands of attacks are created so that alarms and logs should be generated properly for reducing their effect. intrusion detection system and IPS are mostly used devices for providing these kinds of solutions. But there are many issues like performance and accuracy. So the main objective of the project is to develop a signature based intrusion detection system for DoS attacks with better scalability and performance i.e. intrusion detection system with minimum false alarms and with better throughput. In this study the example of TCP SYN flood attack will be taken for implementing and evaluating the performance and scalability of the developed intrusion detection system. Second Objective of this study is to discuss the policies for implementing the intrusion detection system securely. And these policies shall also be evaluated. Intrusion detection system intrusion detection systems (IDS) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems. As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations [2, 48]. There are many different types of intrusion detection system and they can be characterized by different monitoring and analysis approaches. Each approach has different advantages and disadvantages. All approaches can be described in terms of generic process model for intrusion detection systems. Many intrusion detection systems can be described in terms of three fundamental functional components information source, analysis, and response [2]. OVERVIEW Chapter 1 In this chapter we will give a brief introduction of whole project, what is the motivation for selecting this project. What are the main objectives of this project? And what is the main problem which will be considered in this project. Chapter 2 is all about the literature review. In this chapter many different aspects of the intrusion detection system will be discussed like why we require intrusion detection system, different type of intrusion detection system, need for intrusion detection system, about attacks different types of attacks and many other different facts about intrusion detection system which can help to improve the knowledge about intrusion detection system. Chapter 3 will focus on the analysis and designing part of the intrusion detection system. How a computer system can be designed. What s the system engineering and different type’s models will be discussed. CHAPTER 2 NEED FOR INTRUSION DETECTION SYSTEM Internet is carrying more traffic than ever before and still growing in the size without any end. Along with the explosive growth comes an increased threat from Internet related attacks. The Internet allows theft to occur from anywhere of the world [14]. Many threats impact on the operation of your computer network. Natural threats such as flood fire and tornadoes, causes unexpected disruptions. Most companies have well-defined procedure to handle these natural attacks. Security procedures designed to combat hacker attacks, an unsecured network will definitely be attacked. The only question is when the attack will occur [14]. COMPUTER ATTACKS AND VULRANABILITIES intrusion detection systems have been adopted by many organizations because the organizations know that intrusion detection systems are necessary component of the security architectures. But still intrusion detection system is not too much popular, most organizations lack experienced intrusion detection system operators. intrusion detection system can be most effective if the human operates it. But before developing a signature based intrusion detection system the knowledge of the attacks is must. Signatures is a set of rules that sensor uses to detect typical intrusive activities. These rules are based on various criteria i.e. IP protocol parameters, transport protocol parameter and packet data [12]. THE PHASES OF THE ATTACKS Attack can be divided into three different phases. The first phase is defining the goal for attack. The second phase is the reconnaissance attack, also known as the information gathering. After collecting the information the attacker proceed to the third phase, the attacking phase [12]. FIRST PHASE: GOALS OF ATTACK Before attacking a network or system, an attacker sets her goals or objectives. When attacking network the attacker can have various goals: Data manipulation System access Elevated privileges Denying availability of the network resources MOTIVATION Revenge Political activism Financial gain Attackers attempt to disrupt network to discredit the particular organization’s image [12]. RECONNAISSANCE BEFORE THE ATTACK Collecting the information is the attacker’s second step in launching an attack against the network. Successful reconnaissance is also important for successful attack. Attackers use two main mechanisms to collect the information about the network. Public data source Scanning and probing An attacker sometime starts his knowledge search by examining public information available about company. By using these kind of information the attacker can determine that where the business is located, the business partners, the value of the company assets and much more. And through scanning, the attackers use remote reconnaissance to find specific resource on the network. The goal of the information gathering is to pinpoint weak points on the network where an attack is likely to succeed. By pinpointing specific weakness on the network, the attacker can launch an attack in the future that generates minimal traffic or noise on the network. This greatly reduces the likelihood of detection during the actual attack [12]. For example: ping sweep, vertical scan, horizontal attack, DNS query, block scan and many more. THE ACTUAL ATTACK After an attacker maps the network, he researches known vulnerabilities for the system that he detected. The attacker’s goal at this stage is to gain access to resources of the network i.e. Unauthorized data manipulation, system access, or privilege escalation. ATTACK METHODOLOGY Regardless of the motivation or personal preferences, an attacker has several attack methodologies from which to choose [12]: Ad hoc (random) Methodological Surgical strike (lightning quickly) Patient (slow) AD HOC (Random) An ad hoc attack methodology is unstructured. An attacker using this methodology is usually disorganized and those types of attacks frequently fail. It is difficult to comprehensively locate targets on the network. METHODOLOGICAL It provides a well-defined sequence of steps to attack a network. First, the attackers use the reconnaissance to locate the targets. Next the attacker locates the exploits for known vulnerability on the target. Finally when he satisfies with his toolkit he starts attacking system on the target network. SURGICAL STRIKE (Lightning Quick) Many times the attacker uses an automated script against a network. The entire attack is completed in a few seconds. Before the system administrator or security analysts have time to react and make any decision. PATIENT (Slow) It refers to how quickly the attacker executes his attacks. Usually the one uses a patient (slow) methodology to avoid detection. Many intrusion detection systems have difficulty detecting attacks that occurs over long period of time. BACK DOORS Viruses and worms provide a vehicle for an attacker to wreak havoc on your network and potentially the Internet. However, the spread of viruses and worms is much harder to determine in advance. Viruses and worms are much harder to determine in advance. Trojan horse program enables an attacker to establish back door on systems. However Trojan horse requires some type of transport vehicle [12]. DENIAL OF SERVICE TECHNIQUES The purpose of DoS attacks is to deny legitimate access to the network resources. These attacks include everything from simple one-line commands to sophisticated programs written by knowledgeable hackers. There are different types of DoS attacks some of them are- Network resource overload Host resource starvation Out-of-band attacks Distributed attacks NETWORK RESOURCE OVERLOAD One common way to deny the network access is by overloading a common resource necessary for network components to operate. The main common resource that can be attacked in the network bandwidth in several ways generating lots of traffic, distributing the attack across numerous hosts, and using a protocol flaws that amplifies the attack by soliciting help from many different hosts on the target [12]. Example- Smurf and Fraggle attack. HOST RESOURCE STARVATION The resources available at the hosts are also known as the attack point as well. One such resource is the buffer that a host uses to track TCP connections. OUT-OF-BOUNDS ATTACKS The first out-of-bounds attack category uses over-sized packet, it overflows the allocated buffer and causes the system crash. An over-sized packet attack is ping of death. DISTRIBUTED ATTACKS The latest trend in DoS attacks is for an attacker to compromise numerous hosts and then use all these compromised hosts to provide a massive against a specific target. These types of attacks are known as the distributed denial of service attack (DDoS). DISTRIBUTION EFFECT To disrupt the victims communication very badly, the attacker must compromise an agent machine that has more network resources than the victim. Locating and breaking into such a machine may prove difficult, if the target of the attack is well-provisioned site [16]. Distribution brings number of benefits to the attackers: By using distribution techniques, the attacker can multiply the resources on the attacking end, allowing him to deny service to more powerful machines at the target end [16]. To stop a simple DoS attack from a single agent, a defender needs to identify that agent and take some action that prevents it from sending such a large volume of traffic. In many cases, the attack from a machine can be stopped only if the machine’s human administrator, or network operator, takes action. If there are thousands agents participating in the attack, however, stopping any single one of them may provide little benefit to the victim. Only by stopping most or all of them can the DoS effect be palliated [16]. If the attacker choose agents that are spread widely throughout the Internet, attempts to stop the attack are more difficult, since the only point at which all of the attack traffic merges is close to the victim. This point is called aggregation point. Other nodes in the network might experience no telltale signs of the attack and might have difficulty distinguishing the attack traffic from legitimate traffic [16]. In DoS attack executed from a single agent, the victim might be able to recover by obtaining more resources. For example, an overwhelmed Web server might be able to recruit other local servers to help handle the extra load. Regardless of how powerful a single agent might be, the defender can add more capacity until he outstrips the attacker’s ability to generate load. This approach is less effective in defending against DDoS attacks. If the defender doubles his resources to handle twice as many requests, the attacker merely needs to double the number of agents- often an easy task [16]. TCP-SYN ATTACK The SYN-flooding attack is a Distributed denial-of-service method disturbing hosts that run TCP server processes. The attack take benefit of the state retention TCP performs for some time after receiving a SYN segment to a port that has been put into the listen state. The basic idea is to utilize this behavior by causing a host to retain enough state for bogus half-connections that there are no resources to establish new genuine connections [51, 52]. A TCP implementation may allocate to LISTEN state to be entered with either all, some, or none of the pair of IP addresses and port numbers specified by the application. In many common applications like web servers, none of the remote host’s information is pre known or preconfigured, so that a connection can be established with any client whose details are unidentified to the server ahead of time. This type of â€Å"unbound† LISTEN is the goal of SYN flooding attacks due to the way it is typically implemented by operating systems [51, 52]. For success, [51, 52] the SYN flooding attack relies on the victim host TCP implementation’s behavior. In particular, it assumes that the victim allocates state for every TCP SYN segment when it is received and that there is perimeter on the amount of such state than can be kept at any time. The [51, 52] SYN flooding attack does not attempt to overload the networks recourses or the end host memory, but merely attempts to exhaust the backlog of half-open connections associated with the port number. The goal is to send a quick barrage of SYN segments from IP addresses (often spoofed) that will not generate replies to the SYN-ACKs that are produced. By keeping the backlog full of bogus half-opened connections, legitimate requests will be rejected. Three important attack parameters for success are the size of the barrage, the frequency with which barrages2 are generated, and the means of the selecting IP addresses to spoof. Usually, [51, 52] systems implements a parameter to the typical listen () system calls that allows the application to suggest a value for this limit, called the backlog. 1 To be effective, the size of the barrage must be made large enough to reach the backlog. Ideally, the barrage size is no larger than the backlog, minimizing the volume of the traffic the attacker must source. Typical default backlog values vary from half-dozen to several dozen, so the attack might be tailored to the particular value determined by the victim host and application. On machines intended to be servers, especially for a high volume of the traffic, the backlogs are often administratively configured to higher. Another aspect makes both DoS and DDoS attacks hard to handle: Defenses that work well against many other kinds of attacks are not necessarily effective against denial of service. For years, system administrators have been advised to install a firewall and keep its configuration up to date, to close unnecessary ports on all machines, to stay current with patches of operating systems and other important software, and to run intrusion detection system to discover any attacks that have managed to penetrate the outer bastions of defense [16]. Unfortunately, these security measures often will not help against denial of service. The attack can consist of traffic that the firewall finds acceptable. intrusion detection systems are of limited value in dealing with DoS, since, unlike break-ins and thefts, DoS attacks rarely hide themselves [16]. WHAT IS INTRUSION DETECTION SYSTEM? intrusion detection systems gather information from a computer or network of computers and attempt to detect intruders or system abuse. Generally, an intrusion detection system will notify a human analyst of a possible intrusion and take no further action, but some newer systems take active steps to stop an intruder at the time of detection [4]. The goal of intrusion detection is seemingly simple: to detect intrusions. However, the task is difficult, and in fact intrusion detection systems do not detect intrusions at all—they only identify evidence of intrusions, either while they’re in progress or after the fact. Such evidence is sometimes referred to as an attacks â€Å"manifestation.† If there is no manifestation, if the manifestation lacks sufficient information, or if the information it contains is untrustworthy, then the system cannot detect the intrusion [5]. intrusion detection systems are classified into two general types known as signature based and heuristic based. Pfleeger and Pfleeger describe signature-based systems as â€Å"pattern-matching† systems that detect threats based on the signature of the attack matching a known pattern. Heuristic based systems, which are synonymous with anomaly-based systems, detect attacks through deviations from a model of normal behavior [6]. intrusion detection systems that operate on a single workstation are known as host intrusion detection system (HIDS), while those that operate as stand-alone devices on a network are known as NIDS. HIDS monitor traffic on its host machine by utilizing the resources of its host to detect attacks. NIDS operate as a stand-alone device that monitors traffic on the network to detect attacks. NIDS come in two general forms; signature based NIDS and heuristic based NIDS [7]. PROCESS MODEL FOR INTRUSION DETECTION SYSTEM intrusion detection systems can be described in terms of three fundamental functional components [2, 48]: Information Sources the different sources of event information used to determine whether an intrusion has taken place. These sources can be drawn from different levels of the system, with network, host, and application monitoring most common. Analysis the part of intrusion detection systems that actually organizes and makes sense of the events derived from the information sources, deciding when those events indicate that intrusions are occurring or have already taken place. The most common analysis approaches are misuse detection based (signature based) and anomaly detection. Response the set of actions that system takes once it detects intrusions. These are typically grouped into active and passive measures, with active measures involving some automated intervention on the part of the system, and passive measures involving reporting intrusion detection system findings to humans, who are then expected to take action based on those reports. INFORMATION SOURCE The most common way to classify intrusion detection system is to group them by information source. Some intrusion detection systems analyze network packets, captured from network backbones or LAN segments, to find attackers [2]. It can be describe by dividing three different parts. NETWORK BASED INTRUSION DETECTION SYSTEM NIDS are intrusion detection systems that capture data packets traveling on the network media (cables, wireless) and match them to a database of signatures. Depending upon whether a packet is matched with an intruder signature, an alert is generated or the packet is logged to a file or database [8, 48]. Network-based intrusion detection systems often consist of a set of single-purpose sensors or hosts placed at various points in a network. These units monitor network traffic, performing local analysis of that traffic and reporting attacks to a central management console. As the sensors are limited to running the intrusion detection system, they can be more easily secured against attack. Many of these sensors are designed to run in â€Å"stealth† mode, in order to make it more difficult for an attacker to determine their presence and location [2, 48]. HOST INTRUSION DETECTION SYSTEM  or HIDS Host-based intrusion detection systems or HIDS are installed as agents on a host. These intrusion detection systems can look into system and application log files to detect any intruder activity. Some of these systems are reactive, meaning that they inform you only when something has happened. Some HIDS are proactive; they can sniff the network traffic coming to a particular host on which the HIDS is installed and alert you in real time [8, 48]. These types of intrusion detection systems run on host to reveal inappropriate activities on these hosts. The HIDSs are used for detecting the attacks from the inside and outside network. They provide snap shot about the existing system files and connect them to the previous. If the important system files were modified or deleted, the warning is sent to the administrator for inspection. The HIDS example is notice able on the machines with significant task; these machines do not expect the change of their configuration [9, 48]. APPLICATION-BASED INTRUSION DETECTION SYSTEM Application-based intrusion detection systems are a special subset of host-based intrusion detection systems that analyze the events transpiring within a software application. The most common information sources used by application-based intrusion detection systems are the application’s transaction log files. The ability to interface with the application directly, with significant domain or application-specific knowledge included in the analysis engine, allows application-based intrusion detection systems to detect suspicious behavior due to authorized users exceeding their authorization. This is because such problems are more likely to appear in the interaction between the user, the data, and the application [2, 48]. INTRUSION DETECTION SYSTEM ANALYSIS There are two primary approaches to analyzing events to detect attacks: misuse detection and anomaly detection. Misuse detection in which the analysis targets something known to be â€Å"bad†, is the technique used by most commercial systems. Anomaly detection, in which the analysis looks for abnormal patterns of activity, has been, and continues to be, the subject of a great deal of research. Anomaly detection is used in limited form by a number of intrusion detection systems. There are strengths and weaknesses associated with each approach, and it appears that the most effective intrusion detection systems use mostly misuse detection methods with a smattering of anomaly detection components [2, 48]. ANOMALY BASED DETECTION Anomaly detection uses models of the intended behavior of users and applications, interpreting deviations from this â€Å"normal† behavior as a problem. A basic assumption of anomaly detection is that attacks differ from normal behavior. For example, we can model certain users’ daily activity (type and amount) quite precisely. Suppose a particular user typically logs in around 10 Am., reads mail, performs database transactions, takes a break between noon and 1 Pm., has very few file access errors, and so on. If the system notices that this same user logs in at 3 Am., starts using compilers and debugging tools, and has numerous file access errors, it will flag this activity as suspicious. The main advantage of anomaly detection systems is that they can detect previously unknown attacks. By defining what’s normal, they can identify any violation, whether it is part of the threat model or not. In actual systems, however, the advantage of detecting previously unknown attacks is paid for in terms of high false-positive rates. Anomaly detection systems are also difficult to train in highly dynamic environments [5]. MISUSE DETECTION Misuse detection systems essentially define what’s wrong. They contain attack descriptions (or â€Å"signatures†) and match them against the audit data stream, looking for evidence of known attacks. One such attack, for example, would occur if someone created a symbolic link to a UNIX system’s password file and executed a privileged application that accesses the symbolic link. In this example, the attack exploits the lack of file access checks [5, 10]. The main advantage of misuse-based systems is that they usually produce very few false positives: attack description languages usually allow for modeling of attacks at such fine level of detail that only a few legitimate activities match an entry in the knowledge base. However, this approach has drawbacks as well. First of all, populating the knowledge base is a difficult, resource intensive task. Furthermore, misuse based systems cannot detect previously unknown attacks, or, at most, they can detect only new variations of previously modeled attacks. Therefore, it is essential to keep the knowledge base up-to-date when new vulnerabilities and attack techniques are discovered. Figure 2 shows how the misuse detection based intrusion detection system works is [11]. RESPONSE OPTION FOR INTRUSION DETECTION SYSTEM Once intrusion detection systems have obtained event information and analyzed it to find symptoms of attacks, they generate responses. Some of these responses involve reporting results and findings to a pre-specified location. Others involve more active automated responses. Though researchers are tempted to underrate the importance of good response functions in intrusion detection systems, they are actually very important. Commercial intrusion detection systems support a wide range of response options, often categorized as active responses, passive responses, or some mixture of the two [2]. IMPORTANCE OF THE INTRUTION DETECTION SYSTEM Usually we place a burglar alarm on the doors and windows of our home. We are installing an intrusion detection system (intrusion detection system) for our house. The intrusion detection systems used to protect our computer network operate in similar fashion. An intrusion detection system is a software and possibly hardware that detects attacks against our network. They detect intrusive activities that enter into our network. We can locate intrusive activity by examining network traffic, host logs, system calls, and other areas that signal an attack against our network [14]. There are different benefits that an intrusion detection system provides. Besides detecting attacks, most intrusion detection systems also provide some type of response to the attacks, such as resetting TCP connections [14]. DESIRABLE CHARACTERSTICS OF INTRUSION DETECTION SYSTEM There are different characteristics for an ideal intrusion detection system, which are listed below [many references]: An ideal intrusion detection system must run with minimum human supervision. An ideal intrusion detection system must be easy to deploy. An ideal intrusion detection system must be able to detect attacks intrusion detection system must not produce false negative alarms. intrusion detection system must not produce false positive alarms. intrusion detection system must report intrusion as soon as possible after the attacks occur. intrusion detection system must be general enough to detect different types of attacks. An ideal intrusion detection system must be fault tolerant; it must be able to recover from crashes and must restore previous state, either accidental or caused by malicious activities. An ideal intrusion detection system must impose minimal overhead on the system. An ideal intrusion detection system must be configurable to implement the securities policies of the system. THE PERIMETER MODEL AND DoS The perimeter model is an architecture commonly used by today’s organizations to protect critical infrastructures. This security model divides network architectures into two distinct groups; trusted and entrusted. The trusted group is often the finite internal infrastructure, whilst the entrusted group consists of infinite external networks. In this model two types of devices are used; firewall to control the traffic entering and leaving the trusted domain, and intrusion detection system to detect misbehavior of trust with in the trusted area boundary [18]. WHERE IDS SHOULD BE PLACED IN NETWORK TOPOLOGY Depending upon network topology, the intrusion detection system can be positioned one or more places. It’s also depends upon what type of intrusion activities should be detected: internet external or both. For example if the external intrusion activities should be detected, and only one router is connected to the internet, the best place for an intrusion detection system may be just inside the router or firewall. If there are many different paths to the internet, then the intrusion detection system should be placed at every entry point. However, if the internal attacks should be detected then the intrusion detection system should be placed in every network segment 2. Placement of the intrusion detection system really depends upon security policies 3 [8]. Note that more intrusion detection systems mean more work and more maintenance costs. Which defines that what should be protected from the hackers [8]? IDS AGAINST DENIAL-OF-SERVICE ATTACKS (DoS) The goal of a DoS attack is to disrupt some legitimate activity, such as browsing, web pages, an on line radio and many more. The denial of service is achieved by sending message to the target that interferes with its operation and makes it hang, crash, reboot or do useless work [16]. A denial-of-service attack is different in goal, form, and effect than most

Tuesday, November 12, 2019

Buddhist and Christians

Two of the most sought religion in the world is Buddhism and Christianity. Followers of the two aforementioned religions are very lenient when it comes to certain beliefs and practices. They preserve the sanctity of their chosen faith and ensure that the symbols of worship and history are well respected through the years. Tibetan Buddhism is mostly followed in the regions of Himalayas. Countries that adhere to the said religion were India, Bhutan and Nepal. People in China, Russia and Mongolia are also Tibetan Buddhists. This religion has four main traditions namely Sakya, Kagyu, Nyingma and Sakya.All of th aforementioned division includes teachings of the three vehicles of Buddhism: Vajrayana, Mahayana and Foundation Vehicle (Coleman, 10). Achieving enlightenment is the main goal of Tibetan Buddhists. The right term for people who already gained enlightenment is Buddhahood. It is a state of mind wherein the nature of reality as well as mental obscurations is freed. Buddhists are con sidered as internalist because their state of mind is of great importance in the religion (Coleman, 22). Buddha is their god and they uses texts like Pali Canon, Tibetan Canon and Chinese Canon (Conze 35).Christianity on the other hand is a monotheistic religion which centers on Jesus Christ and his teachings. Christians are the followers of this religion who believes that Jesus is the only begotten son of God (Woodhead 7). Unlike Tibetan Buddhism which believes in karma, Christians believes that a life worth livings is when you adhere to the same way Jesus cared and sacrificed for others. It may incorporate similitude between the two religion because both belief aims to do well towards other people. In Christianity, Buddhahood is achieved when everlasting life is granted to its followers.Unlike Tibetan Buddhism which uses three different texts, Christianity uses The Holy Bible which is divided into two: The Old and The New Testaments (Woodhead). One of the famous symbols of worship in among Christians is the cross. It is being look upon by followers of Christianity as a significant affirmation of all the hardships of Christ (Padgett 18). It leads to the salvation of souls and forgiveness of sins. Christians even come up with the practice of the sign of the cross which affirms the sacredness of the symbol.Another symbol of worship for Christians is the fish which is often seen on tombs during the early times. It contains the Greek word Icththys which claims Christ’s character and professes the worship of believers (Padgett). The use of images and statues of Christ and other saints are also part of the symbols of worship for Christianity. Tibetan Buddhists look upon the Kalachara or the Tenfold powerful logo as their symbol of worship (Dagyab & Thurman 46-55). It can be found everywhere in places where Tibetan Buddhism is present.It comes in various forms and represents the teachings of the religion. It contains representation of letters in Lantsa script discussing about the outer world and the human body (Dagyab & Thurman 46-55). Typically, Tibetan Buddhists uses flags to decorate monasteries, houses and even mountains. They believe that the prayer flags contain mantras that can be spread out by the wind. These flags contain auspicious symbols, special prayers and mantras (Dagyab & Thurman). Wind horse and Prayer wheels are also part of the symbols of worship for Tibetan Buddhists.It is also similar to prayer flags which contain special powers once the wheel is turned (Conze). Apart from Christianity, Buddhist relies too much on symbol rather than working out for their faith. Regardless of the difference of the two religions, what keeps them the same in religiosity is the willingness of their followers to stick to their belief and treasure the worship symbols. The concept of faith is given meaning in their respective ways and makes way for their goal of achieving enlightenment (Buddhists) and salvation (Christians).Works Cited Col eman, Graham, ed. A Handbook of Tibetan Culture. Boston: Shambhala Publications, Inc, 1993. Conze, Edward. A Short History of Buddhism. Oneworld. 1993 Padgett, Alan G. ; Sally Bruyneel. Introducing Christianity. Maryknoll, N. Y. : Orbis Books, 2003. Rinpoche, Dagyab & Thurman, Robert Buddhist Symbols in Tibetan Culture. USA: Wisdom Publication, 1993. Woodhead, Linda. Christianity: a very short introduction. U. S: Oxford [Oxfordshire]: Oxford University Press, 2004.

Sunday, November 10, 2019

Indus Motors

Indus Motor Company (IMC) is a joint venture between the House of Habib , Toyota Motor Corporation Japan (TMC) , and Toyota Tsusho Corporation Japan (TTC) for assembling, progressive manufacturing and marketing of Toyota vehicles in Pakistan since July 01, 1990. IMC is engaged in sole distributorship of Toyota and Daihatsu Motor Company Ltd. vehicles in Pakistan through its dealership network. The company was incorporated in Pakistan as a public limited company in December 1989 and started commercial production in May 1993. The shares of company are quoted on the stock exchanges of Pakistan. Toyota Motor Corporation and Toyota Tsusho Corporation have 25 % stake in the company equity. The majority shareholder is the House of Habib. IMC's production facilities are located at Port Bin Qasim Industrial Zone near Karachi in an area measuring over 105 acres. Indus Motor company's plant is the only manufacturing site in the world where both Toyota and Daihatsu brands are being manufactured. Heavy investment was made to build its production facilities based on state of art technologies. To ensure highest level of productivity world-renowned Toyota Production Systems are implemented. IMC's Product line includes 6 variants of the newly introduced Toyota Corolla, Toyota Hilux Single Cabin 4Ãâ€"2 and 4 versions of Daihatsu Cuore. We also have a wide range of imported vehicles. Corporate Profile| | Our Profile Indus Motor Company Private Limited, (trade name, Indus Motors) is the top ranking Maruti Dealer in India. The Company having its registered office at Indus House, Chakorathukulam, Calicut and Corporate Office at Thevara, Kochi was incorporated on 11th July, 1984. The business life of the company is started by starting their Ist Dealership in Calicut in the year 1986. The sale of Maruti vehicle is soundly boosted by marketing intelligence of the Indus Motors. Indus maintains the No. 1 dealer position continuously for the last five years. Based on the recent business reports, the company delivers one Maruti Car in every 13 minutes. The company will assist the customer from the time of choosing vehicle model, colour, finding the best finance option that suits them. They will constantly keep the customer update about their vehicle status until the delivery of the Vehicle is done. In case of servicing of vehicles, the company is at their service, with options of collecting vehicle from doorstep and once the works over deliver it back to the customer. They have Maruti on Road Service in case customer’s vehicle gets breakdown on the way. Their Maruti skilled technicians will come to the location where and rectify the problem or if it is a major work that has to be attended at the workshop the vehicle will be towed to the nearest Service Station. Our Vision Transform Indus into World Class Dealership Forever No. 1 in India Delighted customers and Delighted Employees Our Mission We will pursue the development of our financial and human resources through diversified business activities, in an ethical and socially responsible manner and in pace with the advancements of the day. We will uphold a professional code of conduct in the pursuit of our goals and are committed to taking up social responsibilities as a corporate citizen by dedicating a significant share of our productive surpluses for espousing social causes that would benefit our employees, their families and the society at large. Chairman ; Managing Director Mr. Abdul Wahab P V, Chairman PEEVEES ; Bridgeway Group of Companies Mr. P V Abdul Wahab is a person who rose from a humble background and now is a dynamic entrepreneur heading the PEEVEES and Bridgeway Group of companies. Today, Mr. Wahab’s business portfolio includes a conglomerate spread across India and the Middle East. Besides his business interests, Mr. Wahab is associated with various cultural and social organizations and He Elected unopposed as Member of Parliament (Rajya Sabha) from Kerala for the period from 2004 to 2010. He is a member of Rajiv Gandhi International Sports Foundation, Malabar Development Board, Malabar Chamber of Commerce and Chairman, Malabar Airport Development Action Committee (MADAC). Besides various distinguished awards, Mr. Wahab was also honoured in House of Commons, London in November 2003. | board of Directors| Sl No| Name| Designation| 1| Mr. Abdul Wahab P V| Chairman ; Managing Director| 2| MR. P. A. IBRAHIM HAJI| Vice Chairman| 3| MR. P. V. MUNEER| Director| 4| MR. P. V. ALI   MUBARAK| Director| 5| MRS. YASMIN   WAHAB| Director| 6| MR. T P AJITH KUMAR| Director| 7| MR. T P ANIL KUMAR| Director| | MR. JABER ABDUL WAHAB| Director| 9| MR. AJMAL ABDUL WAHAB| Director| 10| MR. P. A. MOHAMMED SHAFI| Director| | Values ; Beliefs The enduring belief that their corporate destiny is inextricably entwined with those of the employees and customers carries them towards a profitable and ethical business model. Quality Policy Customer satisfaction through quality services achieved by through constant adherence and continual improvement in quality services and systems following P. D. C. A (Plan, Do, Check and Act) technique in all their functions and actions complying with the requirements. Dealerships of the Company 1st dealership in Calicut – 1986 2nd in Kochi – 1991 3rd in Trivandrum – 1994 4th in Muvattupuzha – 2005 5th in Royapettah, Chennai – 2006 6th in Kattupakkam, Chennai – 2008 As on today, Indus has 6 Dealerships 40 Workshops 10 True Value Outlets 2 Maruti Driving Schools 18 E-Outlets 75 sales outlets Major departments Sales Service True value Spares Accessories Insurance Sales support Institute Maruti Driving School| INDUS GROUP CAR SALES TREND | | |   | | | 9745 997 333 | | | 9847 000 000| | | | | | | | | | | | | | | INTRODUCTION OF INDUS MOTOR COMPANY Indus Motor Company (IMC) is a joint venture between the House of Habib,Toyota Motor Corporation Japan (TMC) , and Toyota Tsusho Corporation Japan (TTC) for assembling, progressive manufacturing and marketing of Toyota vehicles in Pakistan since July 01, 1990. IMC is engaged in sole distributorship of Toyota and Daihatsu Motor Company Ltd. vehicles in Pakistan through its dealership network. The company was incorporated in Pakistan as a public limited company in December 1989 and started commercial production in May 1993. The shares of company are quoted on the stock exchanges of Pakistan. Toyota Motor Corporation and Toyota Tsusho Corporation have 25 % stake in the company equity. The majority shareholder is the House of Habib. IMC's production facilities are located at Port Bin Qasim Industrial Zone near Karachi in an area measuring over 105 acres. Indus Motor Company’s plant is the only manufacturing site in the world where both Toyota and Daihatsu brands are being manufactured. Heavy investment was made to build its production facilities based on state of art technologies. To ensure highest level of productivity world-renowned Toyota Production Systems are implemented. IMC's Product line includes 6 variants of the newly introduced Toyota Corolla, Toyota Hilux Single Cabin 4Ãâ€"2 and 4 versions of Daihatsu Cuore. We also have a wide range of imported vehicles. VISION AND MISSION IMC’s Vision is to be the most respected and successful enterprise, delighting customers with a wide range of products and solutions in the automobile industry with the best people and the best technology†. * The most respected. * The most successful. * Delighting customers. * Wide range of products. * The best people. * The best technology. Mission of Toyota is to provide safe & sound journey. Toyota is developing various new technologies from the perspective of energy saving and diversifying energy sources. Environment has been first and most important issue in priorities of Toyota and working toward creating a prosperous society and clean world. PRESENT PERFORMANCE: Currently the company is performing well in automobile sector of country. Its sales for the year 2003-2004 is 29,565 units. It has captured the largest automobile market share in the country. It is greatly contributing in human resource development by training and other such activities. The demand for its products is more than the company’s capacity. Its has certain advantages upon its competitors like largest market share, customers’ liking of its products more than its competitors. The company is continues to maintain a strong commitment towards its Human Resource. To enhance Consumer Satisfaction, extensive training programs were held during the year. Company continuously arrange service campaigns in the cities where its dealerships are present to provide quality service to customers and collect their complaints, suggestions and comments about company. The company also checks its dealerships continuously for not only maintaining but enhances its standards to give to customers maximum satisfaction. FUTURE OUTLOOK With the growth of the economy, political stability and availability of car financing, our automobile market has immense potential. According to some estimates, including that of the Pakistan Automobile Manufacturers Association (PAMA), the demand for passenger cars and light commercial vehicles could grow from 115,000 units to 160,000 units by 2006. nvestment by the industry could double to Rs 98 billion, employment could grow up from 170,500 to 290,000, and the industry’s contribution to the national exchequer could jump from the current Rs. 51. 50 billion to Rs. 121 billion. However, for the automobile sector to realize this potential, it needs a clear, consistent and longterm government policy so that automobile manufacturers and vendors, specially our foreign partners, feel confident of making long term investme nt for future expansion. The status of our localization program in the post TRIMS era is still unclear even though the Government has applied for an expansion of TRIMS applicability for another two years (up to December 2005). The world is becoming more and more open. We can learn from other countries e. g. India and Thiland, who have adopted policies that not only assist indigenous manufacturing but also make their manufacturing internationally competitive. MANAGEMENT POLICIES Management as a team at Indus Motor Company is committed to comply with the requirements of our Integrated Management System and to endeavor to continuously improve upon it in order to: Manufacture high Quality Products. Generate Customer Satisfaction. Provide Service to the Society. Maintain Market Leadership. Identify and avoid/mitigate those environmental aspects which have negative environmental impacts. Comply with all applicable legal, regulatory and other requirements related to Environment, Health and Safety. Design and maintain facilities, establish systems, provide training and conduct operations in a manner that safeguard people and property. Identify, evaluate & mitigate health risks related to our operations that potentially affect our employees, contractors and the public. MANUFACTURING FACILITIES Just in Time spirit implies two opposing forces of providing fast and flexible response to customers, yet building efficient mechanisms and systems that are efficient and waste-free. The concept is to provide the right product and information, at the right time, in the right amount, in the right manner, while maintaining high standards of efficiency and cost control. We have to SWOT STRENGHTS WEAKNESSES OPPORTUNITIES THREAD Strengths:  · Qualified and well trained staff  · Biggest sale network  · Best production plant in the world  · Financial Strong  · Biggest market share  · People Trusted Products  · High Quality Products  · ISO Certified  · Resale value  · Customer Care  · Customized products  · Brand Image  · Availability of Spare parts  · Best delivery system (Transportations) Weaknesses  · High Price of Products  · Political instability  · Low per capita income of public  · Less overhead rates of competitors  · Increasing Prices of Oil Rising inflation Opportunities  · Industry expansion  · Technology upgrading  · Strong Position * Market Integration opening up * Opportunity growing in other countries * Newly developed Areas/Markets (e. g. Gawader) * Favorable govt. policies * Big Market * Economy is expanding Threats  · Chinese cheaper products challenges  · Free Trade & WTO  · Strong comp etition from competitors in near future  · Instability of Government  · High rate of Taxation  · Bad infrastructure ORGANIZATION HIERARCHEY The above chart shows the centralization in the industry. The main decision comes from the Chairman of the company while Board of Directors approves his decisions and this implement in organization by respective committees. The Board of directors is committed to good corporate governance. The company is managed and supervised responsibly and proper internal controls and risk management policy. Its procedures are in place for efficient and effective operations of the company, safeguarding of assets of the company. This is compliance with laws and regulations and proper financial reporting in accordance with International Financial Reporting standards. indu

Friday, November 8, 2019

The sciences of collaborating the computer programming consist of mathematical and logical expressions The WritePass Journal

The sciences of collaborating the computer programming consist of mathematical and logical expressions Abstract The sciences of collaborating the computer programming consist of mathematical and logical expressions Abstract  Art and Mathematics: Analogy  Visual Mathematics :Fractal art:Evolution of Fractal Art:Dynamic Painting:ConclusionBibliographyRelated Abstract   Art and Mathematics: Analogy   The beauty of art relies on a person, who visualizes it, feels it and creates it. It stimulates us to see, hear and feel things that aren’t part of the material world. There has been a striking relation between mathematics and art.   There are several patterns of nature that seems artistic and follows mathematical principles. In fact, mathematics and art have long momentous connection. Many painters turned into mathematicians and many art works have the underlying principles in it. Visual Mathematics : Right from Da Vinci’s Golden ratio to modern Fractal art and computer animation, art has been a medium to express certain mathematical principles. The modern way of expressing art begins with the play of binary numbers defining certain algorithms to create unique masterpieces. Mathematics is inherent in all artworks. Even soap bubbles follow certain symmetry. Geometry has become a form of art leading to evolution of origami. Southern India is famous for their patterned art form called as kolam/ Rangoli created from dots which have line, mirror rotational symmetry. Even these decorative patterns follow mathematical calculations and some of them are based on Fibonacci numbers as well. A simple system to generate symmetric square kolams is based on the identity n^2 = (n-2) ^2 + 4(n-1). In this way patterns are made and then converted into geometrical loops in a decorative way. Both math and art breaks the boundaries of reality. It’s all about expressing the boundless realm we have within us and which in our real life can only come in finite ways. Algorithms, Codes and Patterns are all forms of art and we have to explore the possibility of linking several unnoticed beautiful creations of nature. The sciences of collaborating the computer programming consist of mathematical and logical expressions and art forms are case studied with some of the innovative approaches. In the contemporary world of changing technologies within the creative arena the conclusion of the thesis will bring the opportunity to learn more about the smart approach to create art in any forms. The method of code generated artworks has created unusual designs using interesting platforms and has been modus operandi in painting technology. Generative art evolved from artwork and programming allows the artists to evolve them digitally and create novel masterpieces involving intrinsic mathematical codes. Fractal art: It is kind of algorithmic art that exist as electronic images derived from certain calculations. These mathematical calculations are represented as images and animations. The power of modern computers allows us to visualize complex objects. Fractal art is used in modeling mountains, fire and other natural substances. It is basically a fragmented geometric shape arranged in random fashion. Evolution of Fractal Art: A snowflake evolved from an equilateral triangle is a kind of fractal art . The mathematical phenomena of recursive self-similarity are exhibited in these art works. Ocean waves, DNA, heartbeat and crystals can be depicted using fractal art. From Generation of new music to computer graphic design for organic environments Fractal art has been a pioneer in projecting these. These art follow equations like Zn+1 = Zn^2 + C where n is the iteration number and each iteration number is given a different color. Mathematics and geometry in art is clearly illustrated in these forms of art. To the mathematician they bring a glut of very difficult surmises that no one can unravel and to the artist they provide pillars around which imagination can play at will. In this way art and math are used to create graphic of intangible quality. Fractal art allows us to use iterative procedure to generate unique designs and provides a new experience of the beauty of mathematical calculations and parameters. Dynamic Painting: Dynamic painting is a movement in visual arts that has been generated algorithmically by a computer system. It can be considered as a generative art. An artist begins creation of a Dynamic Painting by visualizing an idea for the painting, choosing colors, shapes and principles of their development over time. Using a many procedures that have deep origins in the styles of conventional paintings, an artist transforms the brush strokes into algorithms that can exactly express his original design of a digital painting. These algorithms govern the vitality of the developed art. The deployment of computational algorithms for generating dynamic artworks might lead to a never ending picture that will not repeat itself from which animation, abstract designs and novel creations can be derived.   The algorithm creates a slight mutation in the original system and evolves it into numerous paintings. A prudent algorithm uses a computer to generate a series of unique images that follow the style and pattern of original painting.   The painting is always in the state of an everlasting transformation. The concept of dynamic painting made us realize the value of self-shifting digital paintings and how algorithms are used to generate dynamism. This makes us think to deploy and work on novel algorithms or at computational level to generate unique artworks that has even the possibility of creating painterly animations. This tells how interesting platforms/ libraries are used to generate and different algorithms like ‘The Evolutionary algorithm’ are employed Platonic Solids in art: Platonic solids are recurring subject in western art. These belong to the group of geometric figures called polyhedral. The regular solids that are possible are: Cube, Tetrahedron, Octahedron, Icosahedron and dodecahedron. These were the elements that were linked with four elements of nature. The cube to earth (most immobile), icosahedron to water (least mobile), tetrahedron to fire (most mobile) and octahedron to air (intermediate) and the fifth construction used for adorning the constellations . In this way geometric solids were unified with nature. The golden ratio was contained in pentagons and several illustrations from nature follow the rule. Modern day algorithms are cleverly used to produce smooth, rounded forms from coarse polygons. One can generate many forms with entirely diverse attributes by modifying certain algorithms and process parameters. Mostly the process is iterative and this produce entirely new forms unlike those seen in nature. This is a kind of generative art that employs algorithms to make out masterworks. The use of computational algorithms establishes a strong interconnection between mathematics and art till date and the future is unpredictable. The artwork can be fed into computer which can find out the underlying principle or fundamental notion inside it. Viral structures are built of regular icosahedron, grids based on atmospheric flow are based on icosahedron and the common dice is a platonic solid. This kind of art that employs algorithms display a novel aesthetic and an amazing complexity whose degree of branching , porosity , topography and fractalization can be modified . These determine the surface development and variation in textures. Platonic solids date back to century of Plato but till date it has been an interesting area to explore for novel graphic design. Conclusion Generative art evolved from artwork and programming allows the artists to evolve them digitally and create novel masterpieces. The concept of dynamic painting, Fractal art and platonic solids boils down to concept of employing unified algorithm to create new style of artworks. These topics clearly establish a strong connection between mathematics and art. This enables us to proceed with an iterative algorithm to create a generative artwork. In this way the artist chooses the attributes of his style to be incorporated and develop it into a distinctive work. Bibliography 1.Hyung W. Kang , Uday K.Chakraborty , Charles K.Chui , Wenjie He(2005);†Multi-Scale Stroke-based Rendering by Evolutionary Algorithm†.In Proc. International Workshop on Frontiers of Evolutionary Algorithms (JCIS),pp 546-549. 2. David G. Stork (2009)†Computer Vision and Computer Graphics Analysis of paintings and drawings: An introduction to the literature† CAIP 09 Proceedings of the 13th International Conference on Computer Analysis of Images and Patterns 3. Dr. Gift Siromoney(1974)â€Å"Array grammars and Kolam† Computer Graphics and Image processing Vol 3, pp – 63-88 4. Dr. T.Robinson, Nagata Shojiro(2006)†Digitalization of Kolam Patterns and Tactile Kolam Tools†- In Formal Models , Languages and Applications , Series in Machine Perception and Artificial Intelligence Vol 66, pp 353-362 5. Glassner .A (1996)†Origami Platonic solids† Computer Graphics and Applications IEEE , Vol 16 Issue-4;pp-85-91 6. Michael Hansmeyer (2010)†Subdivision Beyond Smoothness† Computational Aesthetics Conference Proceedings , London pp- 120-129 7. Richard Taylor(2001) â€Å"Fractals : A Resonance between art and nature†, Symmetry : Art and Science , ISIS Journal Vol 1-2 pp-194 8. Richard Taylor (1999)† Fractal Expressionism† Physics World Vol 12 , no 10 , pp-25 9. Claude Paul Bruter (2002) Mathematics and art: Mathematical visualization in art and education 10. Carla Farsi, Doug Craft (2005) Mathematics and the Arts, University of Colorado 11. Ouellette, Jennifer (2001) Pollock’s Fractals, DISCOVER Vol.22 No11.