Thursday, October 31, 2019

Improving operations Essay Example | Topics and Well Written Essays - 250 words

Improving operations - Essay Example The company uses enterprise resource planning (SAP) which helps in integrating the internal and external information and helps in quick response to the customer and improves customer relationship. The purpose of this management operating system is to share information among employees (Harwood, 2003). As the banking industry performance depends more on the individual performance of the employee and his/her ability to engage customers for a long-term relationship investment in the company. The organization uses the simplified idea management SIM process which effectively manages the productivity of the employees regarding innovation (Barton, 2010). The SIM process is implemented in each department of the bank because the model helps in better serving the customers and reduces cost for the organization. This process is necessary throughout the organization for continuous improvement and better growth (Barton, 2010). The SIM process is an effective approach in meeting customers’ needs and expectation because it allows employees to share information across all the organization about the customer’s desires and steps to ensure better customer satisfaction (Barton,

Tuesday, October 29, 2019

Contributions of Mansa Musa to the greatness of Mali Empire Essay

Contributions of Mansa Musa to the greatness of Mali Empire - Essay Example The Mali Empire extended to the east from the Atlantic coasts along the River Niger delta, which is known for the richness in agriculture, to beyond the village of Timbuktu. The northern border of this region was formed by the Sahara desert well known for dryness and hot climate. A tropical jungle formed the south. The Mali kingdom owes its success to the Niger River, which rises in southwest sides of Guinea and flows towards the east of West Africa through Nigeria shortly before flowing into the Atlantic Ocean. Along the banks of the River, Niger laid fertile soil that was left behind when the river became flooded each year. For this reason, many important cities emerged in the Niger delta and thus, trading of goods became more popular. Muslim traders that came from northern Africa, Orient, and Arabia found their way to different regions of Timbuktu due to the domestication of camels and good economic prospects in the Mali Empire at that time. They were able to transport their goods across the dry and hot Sahara desert to do business with people who lived along river Niger. Musa being the leader of Mali Empire denied non-believers of Islam access to river Niger markets. The trade made the River Niger’s markets thrive, thus, developing this empire (Tschanz 4-7). A natural trading intersection was formed in Timbuktu. The northern bank of river Niger became the stopping zone for camels. Timbuktu occupied the central bend of the river, which means that only boats were used to move goods along the river from east to west.

Sunday, October 27, 2019

Interpersonal Communication Strategies

Interpersonal Communication Strategies There are a lot of thing that are being taught about interpersonal communication in todays society. There are many thing that I have learned that will help you in your relationship as a married couple. Some of the thing that are important in interpersonal communication that will help you better communicate with one another will be discussed here today. There are a lot of skills that are needed to communicate effectively, identifying the barriers to effective interpersonal interactions as well as developing strategies for active, critical and empathic listening. Also according to what is being taught, learning how to evaluate appropriate levels of self-disclosure in relationships and also learning to understand how perceptions, emotions, and nonverbal expression affect interpersonal relationships. Learning strategies for managing interpersonal conflicts, is something that researchers feel could also a help a relationship. Here is some of what I have learnedà ¢Ã¢â€š ¬Ã‚ ¦ Identifying the barriers to effective interpersonal interactions is a very interesting subject as well as a great way to learn how to deal with or look for these barriers. According to Eric Garner, who list seven of the top barriers Its not always easy and often takes a lot of determination. But making an effort to remove the obstacles tangible and intangible that stand in our way, can be the key to building relationships that really work(Garner 2012) With Physical being the first barrier that he listed which mean Communication is generally easier over shorter distances as more communication channels are available and less technology is required. Although modern technology often serves to reduce the impact of physical barriers, the advantages and disadvantages of each communication channel should be understood so that an appropriate channel can be used to overcome the physical barriers, closed office doors, barrier screens, separate areas for people of different status, large worki ng areas or working in one unit that is physically separate from others. The second barrier Eric list is perceptual barriers is where the, The problem with communicating with others is that we all see the world differently. If we didnt, we would have no need to communicate: something like extrasensory perception would take its place. The next of the barriers are listed as emotional barriers is where, One of the chief barriers to open and free communications is the emotional barrier. It is comprised mainly of fear, mistrust and suspicion. The roots of our emotional mistrust of others lie in our childhood and infancy when we were taught to be careful what we said to others. Then we have, cultural barriers which means, when we join a group and wish to remain in it, sooner or later we need to adopt the behavior patterns of the group. These are the behaviors that the group accepts as signs of belonging. The group rewards such behavior through acts of recognition, approval and inclusion. In groups which are happy to accept you and where you are happy to conform, there is a mutuality of interest and a high level of win-win contact. Where, however, there are barriers to your membership of a group, a high level of game-playing replaces good communication. Next we have, Language barriers is described as, language that desc ribes what we want to say in our terms may present barriers to others who are not familiar with our expressions, buzz-words and jargon. When we couch our communication in such language, it is a way of excluding others. In a global market place the greatest compliment we can pay another person is to talk in their language. The sixth barrier is, the gender barrier, this barrier relates to There are distinct differences between the speech patterns in a man and those in a woman. A woman speaks between 22,000 and 25,000 words a day whereas a man speaks between 7,000 and 10,000. In childhood, girls speak earlier than boys and at the age of three, have a vocabulary twice that of boys. The reason for this lies in the wiring of a mans and womans brains. When a man talks, his speech is located in the left side of the brain but in no specific area. When a woman talks, the speech is located in both hemispheres and in two specific locations. This means that a man talks in a linear, logical and compartmentalized way, features of left-brain thinking; whereas a woman talks more freely mixing logic and emotion, features of both sides of the brain. It also explains why women talk for much longer than men each day. The last barrier that Eric Garner mentions is, interpersonal barriers, which sates that, There are six levels at which people can distance themselves from one another. These six things are listed as Withdrawal is an absence of interpersonal contact. It is both refusals to be in touch and time alone. Rituals are meaningless, repetitive routines devoid of real contact. Pastimes fill up time with others in social but superficial activities. Working activities are those tasks which follow the rules and procedures of contact but no more. Games are subtle, manipulative interactions which are about winning and losing. They include rackets and stamps. Closeness is the aim of interpersonal contact where there is a high level of honesty and acceptance of yourself and others. Working on improving your communications is a broad-brush activity. You have to change your thoughts, your feelings, and your physical connections. That way, you can break down the barriers that get in your way and start b uilding relationships that really work. Learning how to overcome these barriers and communicate with your mate effectively can make a world of different in how well you know your mate as well as how well you all will get along and how long the relationship will last. (Garner E. 2012) Now I will talk to you both about some of the strategies you can use for active, critical and empathic listening. To fully understand what your partner is trying to communicate to you it is really important to comprehend what he or she is saying to you. Now we know that some people like to talk more then others but when trying to communicate with your partner we have to remember to listen to the other person and give them the chance to talk as well. When everyone wants to talk and no one wants to listen it only complicates things and makes people unhappy. Communicating effectively is when you are able to express yourself effectively as well as being able to take time to listen keenly and carefully to what the other person is saying. Some of the strategies that can help you both to be more effective listener are, that when your partner is talking listen carefully and you can be able to repeat what he or she has said. This will help you to remember what the topic was and the kind of in formation that was shared rather it was super important or not so important later. If of you have the habit of forgetting what is discussed, it is important to be writing down the main points which will help you later. Distractions should be avoided in order to increase your ability of developing good listening skills, important communication between the two of you for example when you are budgeting your finances, it is important to switch off the TV phones, radios, or another such gadgets. It is important to listen from the heart which means having empathy towards what your partner is talking about Examine the body language, and lastly when something is not clear ask questions for clearing your understanding. Poor interpersonal communication level is the main cause of many broken marriages or couples seeking for counseling to restore their marriages. The common refrain used by most couples is that he or she no longer understands me. The main focus which couples are required to do is to understand and explore how to communicate to each other and the various problems they might be facing in communication . When you need your commutation to be improved the main aspects which you have to focus are the various communication mechanisms such as presenting honest and direct questions, providing feedback and setting aside time to talk to one another. Having a conflict is not the major issue but the main challenge is how you will be able to handle the conflict which will determine your future. Solving the conflict through the use of effective communication skills and understanding couples with respect leads to you having a happier future and building a stronger relationship. In future as you are confronted with conflicts, these communication skills tips will be effective for you. So keep them in your mind with the aim of having a positive outcome. Many couples think theyre communicating with each other when they sort out who will pick up the kids, pay the bills or call the grandparents, says Orbuch. But thats not the kind of communication shes talking about.(Schoenberg N. 2011) The article Can We Talk, Researcher talks about the role of communication in marriages I believe can really help you both to work on your communication skills with one another in your relationship. The article gives insight in to how couples can work on lea rning more about one another on a more personal level. Conversation partners related use of function words-such as pronouns, articles, conjunctions, prepositions and negations-augurs well for mutual romantic interest and stable relationships, says a team led by graduate student Molly Ireland and psychologist James Pennebaker, both of the University Of Texas At Austin. I find myself agreeing with the two psychologists. I believe that the use of language and grammar really contributes to the type of communication that we engage in our everyday life. The words people use when communicating with other has more meaning then people realize. So far in this class I have learned that it is not just what you rather then how you word things as well as your body language and facial expressions. An interesting irony is that two people who truly hate one another will often exhibit a high amount of language-style matching, Pennebaker says.Two people locked in a bitter fight tend to talk, or yell, in similar ways. Mostly, though, highly attentive conver sation partners like one another. (Bower B. 2012) According to Tim Borchers Self-disclosure is not simply providing information to another person. Instead, scholars define self-disclosure as sharing information with others that they would not normally know or discover. Self-disclosure involves risk and vulnerability on the part of the person sharing the information. Tim also states A useful way of viewing self-disclosure is the Johari window. The Johari window is a way of showing how much information you know about yourself and how much others know about you. The window contains four panes, as shown below. The Open Pane includes information such as hair color, occupation, and physical appearance. The Blind Pane includes information that others can see in you, but you cannot see in your self. You might think you are poor leader, but others think you exhibit strong leadership skills. The Hidden Pane contains information you wish to keep private, such as dreams or ambitions. The Unknown Pane includes everything that you and others do n ot know about yourself. You may have hidden talents, for example, that you have not explored. Through self-disclosure, we open and close panes so that we may become more intimate with others. I believe that using the method that Tim talks about can really help to better the self discloser in you interpersonal relationship. There are also functions and risk that Tim listed that can be helpful to a marriage as new as yours. He states Self-disclosure performs several functions. It is a way of gaining information about another person. We want to be able to predict the thoughts and actions of people we know. Self-disclosure is one way to learn about how another person thinks and feels. Once one person engages in self-disclosure, it is implied that the other person will also disclose personal information. This is known as the norm of reciprocity. Mutual disclosure deepens trust in the relationships and helps both people understand each other more. You also come to feel better about yourself and your relationship when the other person accepts what you tell them. Risks of Self-Disclosure While there are several advantages to self-disclosure, there are also risks. One risk is that the person will not respond favorably to the information. Self-disclosure does not automatically lead to favorable impressions. Anot her risk is that the other person will gain power in the relationship because of the information they possess. Finally, too much self-disclosure or self-disclosure that comes too early in a relationship can damage the relationship. Thus, while self-disclosure is useful, it can also be damaging to a relationship. ( Borchers T. 1999) Now I will give you some information that I have learned about perceptions, emotions, and nonverbal expression affect interpersonal relationships. According to Sole, Perception is the process of acquiring, interpreting, and organizing information that comes in through your senses. The perceptual process allows you to become conscious of situations in your environment that might be dangerous or that require your attention, and it is essential to your survival. Most people tend to think that they perceive the world as it really is; however, the truth is that they perceive only a small portion of what they encounter in the outside environment. Everything in the environment that has the potential to be perceived can be defined as a stimulus. These stimuli come to you through your five senses of sight, sound, smell, taste, and touch; you pay attention to some of these stimuli and not to others. You then try to make sense of the stimuli you are aware of or have paid attention to and create your own interpretations and meaning of them. Nonverbal communication is defined as communication of a message without words, which means that it encompasses a wide range of vocal and visual signs and behaviors. Throughout your life, you express thoughts and ideas not only through language but also through your voice, eyes, face, body posture and movement, and hand gestures. Understanding emotions and expressing these emotions appropriately is the key to successful communication with others. People who are aware of their emotions and are sensitive to the emotions of others are better able to handle the ups and downs of life, to rebound from adversity, and to maintain fulfilling relationships with others. As a result, say researchers, they can live more satisfying lives (Matthews, Zeidner, Roberts, 2003). Emotional intelligence is a set of skills that can be learned. We can improve our emotional intelligence by increasing our awareness of emotional issues and improving our ability to identify, assess, and manage our feelings.(So le, 2011) People skills involve a wide range of interpersonal skills including appropriate self-disclosure determining how much personal information to share with others, appropriate assertion skills presenting your ideas and opinions so that they are recognized, collaborative skills working well with others, problem solving skills, and conflict resolution skills. In conclusion I feel that communicating effectively in any relationship especially in a new marriage take time, practice and skill. There are many skills that you can use when trying to better the level of communication in your marriage. These skills include identifying the barriers to effective interpersonal interactions as well as developing strategies for active, critical and empathic listening. Other skills that you both can try and gain a better understanding of are, appropriate levels of self-disclosure in relationships and also learning to understand how perceptions, emotions, and nonverbal expression affect interpersonal relationships. The skill that I feel will help you the most in order to keep you relationship smooth is, Learning strategies for managing interpersonal conflicts. I really hope that this advice and research will help you to have a long and successful marriage. Sincerely Tiffany D. Roberson Reference Page Borchers T., 1999 Moorhead State University Allyn Bacon Retrieved from: http://www.abacon.com/commstudies/interpersonal/indisclosure.html Bower Bruce, Science News 2012 U.S.News World Report LP Retrieved from: http://www.usnews.com/science/articles/2010/11/22/shared-talking-styles-herald-new-and-lasting-romance Garner E. 2012, Seven Barriers to Great Communication Retrieved from: http://www.hodu.com/barriers.shtml Schoenberg N, CHICAGO TRIBUNE February 6, 2011, 2012 Hearst Communications Inc. Retrieved From: http://www.chron.com/life/article/Researcher-talks-about-the-role-of-communication-1690761.php Sole, K. (2011).Making connections: Understanding interpersonal communication. San Diego, CA: Bridgepoint Education, Inc. retrieved from: https://content.ashford.edu/books/AUCOM200.11.1/sections/glossary?search=interpersonal%20communication#w103694

Friday, October 25, 2019

Punic Wars Essay -- essays research papers

Discuss the Roman Punic Wars, in terms of their circumstances and overall effect on Rome’s economic and social development Also discuss the ensuing â€Å"Gracchan turbulence† from the same perspective. The circumstance for the Roman Punic Wars towards Rome was a simple human reaction. If an outsider such as Italy, Carthage, or Greece make threats towards Rome, Rome will simply fight. The Punic Wars lasted in 3 stages, all resulting to the obsessive pride and higher standings of Rome. Rome’s initial desire of expansion was only for farming land. Romans believed like anyone else that victory brought them honor as well as a strong, political career. Rome strongly had their victory of Italy due to their military discipline. Cowards were not welcome in the Roman Army. If a Roman fled from his standings, or left his comrades to die, they would receive severe punishment from the generals worse than the enemy could give them. The confidence of Roman soldiers grew because they knew their comrades would assure their well being if anything is to happen. The opponents were usually barbaric and disorganized. Most often, the opponents would flee leaving their comrades to die. The discipline of the Roman army was formed throughout the Punic wars. Poet Virgil Maxim best referred Romans by the quote â€Å"Yield you not to ill fortune, but go against it with more daring.† Rome’s Military form helped their enemies become allies and eventually citizens dedicated to Rome. The ...

Thursday, October 24, 2019

Managing Regulative Community Relationships

The introduction of the new technology has created a massive change in the global educational system. As of the present time, the proprietary educational industry is the trend in the academic arena. As clearly mentioned, the Internet is most commonly utilized for this reason. Academic companies who opt to provide educational services and gain amiable profit at the same time take advantage of this opportunity that is provided by technological revolution. In fact, â€Å"proprietary colleges are considered a cost efficient mode of course delivery† (NEA, Internet). To be able to have a fine share in the educational industry, which brings the proprietary educational companies with the profit that they ought to have, the regulations for the said system are strongly imposed by the government and some organizations that control them. This is to be able to ensure that the education provided by such companies is considerably of high level, amidst the profit-centered motives that they have towards the services that they provide the students who are enrolled in their curriculum offerings. In this regard, it could be noted that the regulations created for this type or proprietary companies tend to allow the developmental measures that could be taken into consideration. By being able to further develop their systems of employment as well as their class offerings that are open to the public, they are allowed to balance both their services and their profit share in the market. In comparison with the less stringently regulated industries such as the ones found in the internet (e.g. Amazon.com), proprietary education industry is able to attract an ample amount of market share in the educational industry which in a way, helps them attain the profitable goal that they have aimed upon creating the virtual educational institutions. Among the regulations that controls the proprietary educational companies’ activities is the corporate citizenship. This is a regulation that indicates that companies that provide public service, such as education, should have â€Å"a shift from a paradigm of doing no harm as one of adopting a role for a positive good (Tuck, Internet). This means that an educational company found in the virtual world must not only see to it that they are doing no harm to their clients but they are also able to provide their ‘stakeholders’ with the ample service that they give, which refers to the positive good of the corporate missions. As a result, many students are further attracted to the system of education that virtual universities or colleges offer. Certainly, the convenience that it brings the students is highly motivational for young students or even professionals who would like to learn more to take advantage of the course offerings provided by the said type of educational provisions. However, the profit-oriented goals of the company at times redefine the service that these educational companies are providing their clients. Wanting to actually earn an amiably high amount of returns from the effort that the administrations put forward for organizing such types of institutions over the net, they are usually grabbed away from the excellent educational service that they are expected to provide their students. Hence, as a result, the financial stability that could ensure the company’s future existence in the proprietary educational industry is dimmed and less given attention. As known to many, the risks in any kind of industry changes over the years. This is why Lucy Benholz has pointed out in one of her articles that â€Å"foundations from different regions and sizes have found that building strong relationship with the policy makers when times are good will afford them some access to the resources that are further stretched on all sides†(Internet). This mainly points out the fact that as the policies and regulatory systems of the industry changes over time, it would be helpful for the companies to develop close relationships with the policy makers. This way they are able to earn for themselves an access to the provisions and resources given by the regulatory board creators to help them readjust their systems and still be able to attain the profit-centered missions of the company. If this is not considered by the administration, it could be well expected that the company would have a hard time dealing with the adjustments that has to be done and in later times, it would not be impossible for the virtual company to loose its track and be eliminated in the proprietary educational industry. BIBLIOGRAPHY Tuck, Jackie. (2005). Managing community relationships, reputation and sustaining competitive advantage. School of Business University of Ballarat. http://www.latrobe.edu.au/csrc/fact2/refereed/tuck_lowe_mccrae.pdf. (January 3, 2007). NEA Research Update. (2004). Proprietary Education: Threat, or Not? http://www2.nea.org/he/heupdate/images/vol10no4.pdf.   (January 3, 2007). Bernholz, Lucy. Managing up in down times. http://www.blueprintrd.com/text/managingup.pdf. (January 3, 2007).      

Wednesday, October 23, 2019

Indian and English cultures Essay

A passage to India is mostly concerned with the relationships between Indian and English cultures, and the interaction and conflicts are the most important moments in the book. This is clearly explained when at the beginning of the book when Dr. Aziz rides on his bicycle to Hamidullah’s house and debates whether it is possible to be friends with an Englishman. Major Callendar, the Civil Surgeon at Chandrapore, and Aziz’s superior calls him away as he is visiting Hamidullah and then disappears before he gets their not even leaving a explanatory note. Establishing that the English are snobby and care nothing about Indians. For Major Callendar Called Aziz right in the middle of dinner and was not even there when he arrived, insinuating that the meeting between the two must have not been that important and could have waited. Adding insult in injury the women at Callendar’s house take his Tonga (a horse-drawn carriage) without even asking. you can assume from the events at the beginning that the English think of Indians as a lesser race and that they should be subservient to them. One of the major moments in the book is when Dr. Aziz meets for the first time Mrs. Moore which is the mother to the Indian Magistrate – Ronny Heaslop. Dr. Aziz thinking that most English, especially Englishwomen are snobby and insensitive to Indians, asks Mrs. Moore to take off her shoes with not even looking at her feet; thinking probably to himself (no Englishwomen would have the common decency or respect for the Indian culture to take off her shoes in the Mosque). After the initial chastising Aziz and Mrs. Moore begin to form a friendship. Aziz finding out that she is both kind and sympathetic After there time at the Mosque Aziz escorts Mrs. Moore to the near all-white Chandrapore Club which is where Mrs. Moore had initially wondered off from. At the Club there is a showing of Cousin Kate, which is the most thoroughly English play in existence, conveying the desire of the English to recreate England in India rather than adapt to their foreign environment. Mrs. Moore ignores the play totally and continues on to the billiard room where she meets up with Adela Quested her traveling companion and most likely will marry Ronny. For the most part Indians view the English with anger and cynicism but it is with the newcomers (Mrs. Moore and Adela Quested) that Aziz sees that they have a desire to see the real India, and are willing to look far beyond the narrow minded view of the other English people. After Adela sees how unconcerned Ronny is with the plight of the Indians she decides not to marry him. As they go for a car ride with Nawab Bahadur, which is the leading loyalist in Chandrapore, an slight accident occurs when they hit a animal and crash. They both get out and look for the injured animal but to no avail, showing Adela his kindness, Adela tells Ronny to forget what she had said and that she will marry him. In town, the Nawab Bahadur tells a group of Indians about his distress; he fears evil spirits, for when he fist bought the car, he ran over and killed a man. Dr. Aziz tells the Nawab Bahadur’s grandson that the younger generation must reject such superstitions. This is showing that what all the English have brought to India is not bad for an elite have been educated and understand how the world works better than they have ever before.

Tuesday, October 22, 2019

South Bronx essays

South Bronx essays An impression that many Americans have is that people, who live in impoverished neighborhoods, are lazy and refuse to work. They feel that this is the reason they do not succeed in life. A book that discusses this and related topics is Amazing Grace written by Jonathan Kozol. The quote If people in Amazing Grace, would only apply themselves more, they would greatly improve their lives brings up undecided feelings within me. The setting of Amazing Grace is in the South Bronx, in a community where 44% of the population lives below the poverty line, the opportunities are scarce and oppression is high. It is one of the most polluted boroughs of New York, and has one of the highest rates of some illnesses, such as asthma and AIDS. The Bronx is not cut off from the world though opportunities do exist. Programs such as the YMCA and Kips Bay Big Brother Big Sister programs are in place to support children to help them succeed. Welfare programs, drug abuse counseling and other program s are in place to help adults who may need assistance. The above statements are evidence toward both views of the before mentioned quote. The South Bronx, which is not on any map, might be called more of a state mind. The people that come from the South Bronx hold it as a badge of honor...it means they're tough."(Bronx Beat 18) Deborah Harris said describing herself as a 30-something executive secretary and lifetime borough resident, during an interview about where she grew up. "You have to deal with a lot of pressure to sell drugs, and to commit crimes,"(Bronx Beat 18) said Barragh Seeranthin, who said he was from Castle Hill during an interview, in the South Bronx. The children in Amazing Grace grow up knowing about heroin or as they call it the needle drug, watching dealers on the corners, and in some cases, are born already addicted to cocaine and other drugs. Sara, Charlaynes older adopted daughter of six, had enough...

Monday, October 21, 2019

Heal The World Essay Example

Heal The World Essay Example Heal The World Essay Heal The World Essay Verse 1: Theres A Place In Your Heart And I Know That It Is Love And This Place Could Be Much Brighter Than Tomorrow And If You Really Try Youll Find Theres No Need To Cry In This Place Youll Feel Theres No Hurt Or Sorrow Bridge 1: There Are Ways To Get There If You Care Enough For The Living Make A Little Space Make A Better Place Chorus 1: Heal The World Make It A Better Place For You And For Me And The Entire Human Race There Are People Dying If You Care Enough For The Living Make A Better Place For You And For Me Verse 2: If You Want To Know Why Theres A Love That Cannot Lie Love Is Strong. It Only Cares For Joyful Giving If We Try We Shall See In This Bliss We Cannot Feel Fear Or Dread We Stop Existing And Start Living Bridge 2: Then It Feels That Always Loves Enough For Us Growing So Make A Better World Make A Better World Chorus2: Heal The World Make It A Better Place For You And For Me And The Entire Human Race There Are People Dying If You Care Enough For The Living Make A Better Place For You And For Me Verse 3: And The Dream We Were Conceived In Will Reveal A Joyful Face And The World We Once Believed In Will Shine Again In Grace Then Why Do We Keep Strangling Life Wound This Earth. Crucify Its Soul Though Its Plain To See This World Is Heavenly Be Gods Glow Verse 4: We Could Fly So High Let Our Spirits Never Die In My Heart I Feel You Are All My Brothers Create A World With No Fear Together Well Cry Happy Tears See The Nations Turn Their Swords Into Plowshares Bridge 3: We Could Really Get There If You Cared Enough For The Living Make A Little Space To Make A Better Place Chorus 3: Heal The World Make It A Better Place For You And For Me And The Entire Human Race There Are People Dying If You Care Enough For The Living Make A Better Place For You And For Me Chorus 4: Heal The World. Make It A Better Place For You And For Me And The Entire Human Race There Are People Dying If You Care Enough For The Living Make A Better Place For You And For Me Chorus 5: Heal The World Make It A Better Place For You And For Me And The Entire Human Race There Are People Dying If You Care Enough For The Living Make A Better Place For You And For Me Coda: There Are People Dying If You Care Enough For The Living Make A Better Place For You And For Me There Are People. Dying If You Care Enough For The Living Make A Better Place For You And For Me You And For Me You And For Me You And For Me You And For Me You And For Me  You And For Me You And For Me You And For Me You And For Me You And For Me You And For Me INTERPRETATION In the first verse, the message of this song it to persuade all the people to save this world from dying and suffering. The words And if you really try †¦youll fell theres no hurt or sorrow. This sentence fragment can be delivered the meaning that if people try to help the needy children, there will be no sadness or regret for the loss of someone or something loved. They need our care, our love and our attention. There are ways to make the world better if people care about the living. In the second verse. In the third verse, the statement of the lyric †¦Wound this earth, crucify its soul, though its plain to see, this world is heavenly be Gods glow. portrays the religious aspect which means Let God open people’s heart as He sacrifice his life to the people and why shouldn’t you human being sacrifice for yourselves. In the next verse, the quote of the lyric is written, †¦I feel you are all my brothers†¦See the nations turn their swords into plowshares. means that the writer urges people that the spirits of our hearts have no fear inside it that we all will together feel the tears of helping the needy people. No tears of sadness but the tears of happiness. Come people, save this people as they are your family, your brothers. In his lyric, it means that Michael In the second verse, the The reason that I choose this song is because it gives me a strong feeling when listening to it. This song gives each person different interpretation in its lyric. The moment, the feeling, the obsessions are being portrayed Michael sings This sentence fragment can be delivered the meaning that if people try to help the needy children.

Sunday, October 20, 2019

A Current Event Essay

After the United States bombed Japan in World War Two, Korea was divided into two countries: North and South Korea. The economy in each country had different outcomes, which prevented and complicated these two countries coming back together. The US and five other countries, including North and South Korea, were involved in the Six Party Talks to try to combine the two conflicting countries. In 2005, North Korea was afraid it was giving away to much information about their nuclear weapons and they withdrew from the Six Party Talk. Although the United States has participated in talks with North Korea before, the US should engage in talks with them because they need to make a decision that will affect the country by preventing starvation or saving their nuclear weapons program. As stated in the New York Times, â€Å"Almost one out of two children is chronically malnourished North Korea runs a shortage of one million tons of food a year† (Sang-Hun). The United States should engage in talks with North Korea because their people are the ones suffering due to lack of nutrition. The government should understand that the future of North Korea wouldn’t look too bright with a smaller population and residents that are more angered than today. Also, since this country is under a dictatorship, the people have no input on topics, such as this one, that can help the bulk of their people. If the government were to continue to go against the people, an uprising should be expected and to other countries this wouldn’t come as a shock. With the help of the United States, the US can compromise with the North Korean government and supply aid for the deprived people. Not only is it in the best interest for the North Koreans, but for their government to negotiate to keep themselves in power. Another worry for the United States is North Korea has possession of nuclear weapons. As stated in the New York Times, â€Å"Since six-party talks ended, North Korea has detonated a nuclear device and tested a long-range rocket that may one day be able to carry nuclear warheads â€Å" (Knowlton and Sang-Hun). With having this as a â€Å"safety† or backup, Kim Jung IL is believed to have sold nuclear parts to Iran and Syria. What’s even worse is North Korea has the choice to sell their nuclear materials to Al Qaeda. The United States is concerned that if Al Qaeda were to possess these materials, they could create nuclear weapons and use this to hurt other countries, such as the US and Israel. Al Qaeda has no guilt for hurting large masses of people, so firing these VERY dangerous weapons, and killing people, wouldn’t be on their conscious. If the United States were to engage in talks with North Korea, they could compromise on dismantling their nuclear weapons, and could prevent nuclear materials from getting into the wrong hands. In conclusion, the United States would be making the right decision to engage in talks with North Korea for the sake of their starving people and from keeping nuclear materials out of the hands of Al Qaeda. This would help secure our safety and could potentially give the United States another ally in Asia. North Koreans are starving and with out the nuclear weapons they receive aid, if North Korea were to keep their nuclear weapons the civilians continue to starve. Brian Knowlton and Choe Sang-Hun, New U. S. Envoy to Talk With North Koreans, New York Times, October 19, 2011. Choe Sang-Hun, Head of U. N. Humanitarian Aid Paints Dire Scene in North Korea, New York Times, October 24, 2011

Friday, October 18, 2019

Environment policy Assignment Example | Topics and Well Written Essays - 500 words

Environment policy - Assignment Example Initiatives to better preserve this planet, adopting a â€Å"greener† perspective, and taking steps to research and beneficially slow the damage we contribute to the planet is a good thing. There are several things that tend to stand in the way of solid government policies and interventions on this issue. Firstly, many people do not take the concern seriously. They often disregard the topic’s discussions to the ramblings of paranoid conservationists and â€Å"tree huggers.† Others disregard the concerns, founded or not, because the potential, consequential, repercussions of environmental issues will, likely, not culminate into anything serious enough to affect day to day living for generations to come; which, overall, could be considered rather selfish and definitely short-sighted. Politically, it is harder to get full support on initiatives because different states have a differing level of economic loss and gain when it comes to environmental policies. Both, Democrats and Republicans, representing states that have heavier fossil fuel productions dispute any legislature and are far less likely to support environmental interventions.("New York Times") Sev eral states have taken upon themselves to implement their own policies and initiatives to encourage a more environmentally conscious and beneficial approaches. Environmental issues are very real, they do matter, and they are worthy of taking seriously in order to preserve this planet that we all live on. In the end, however, it is not an issue simply of states, or individual countries, it is a global issue. But America’s policies, often, set an example for others around the world, perhaps greater action on our part would result in greater responses worldwide. I respect your opinion and I have to say that I agree with you that not everything that leads to planetary damage can be laid solely on the actions of humankind. However, human beings readapt their environments to suit their

The impact of terrorism on tourism Dissertation

The impact of terrorism on tourism - Dissertation Example However, of late the terrorism activities have gained further dominance owing to its growing linkage to the tourism industry. Wilks, Pendergast and Leggat (2006) states in this regard that it is hard to uncover the reasons which have led to the growth of terrorism and its growing linkage to tourism activities. The tourism industry has become the target point for terrorism activities in the international scale owing to the slag of security and alertness. Tourists on tour tend to be remain undeterred about the surrounding environment being lost in the fun of holidaying which becomes the target point of terrorist to easily lay their grounds upon. Wilks, Pendergast and Leggat (2006) further observe that the rate of infiltration of terrorist in tourism centers has also another potential reason other than the lack of alertness of the tourists. The functions of tourism mainly occur along the principal trade routes of any region. Thus the terrorists feel that attack on such trade and economi c routes would help in disrupting the economic activities of the region. Thus terrorist attacks on tourism helps in jeopardizing the trade and economic operations of a region making it poor. ... The linkage of terrorism operations with tourism industries can also be observed to be a potential factor that enables the terrorist outfits to gain considerable publicity. Tourist centers being largely linked with market places helps the terrorist gain wide amount of publicity having conducted a large massacre of human lives and property. It helps them reach their demands to the eyes and ears of the higher authorities. Finally, Wilks, Pendergast and Leggat (2006) state that the nature of the functions of tourism industry being so diversified and spread across international borders that it becomes difficult to trace the movement of terrorists inside hotels and tourist areas. People from various nationalities clad in different type of outfits tend to regularly visit international tourist hotspots which being not closely monitored encourages militancy actions. (Wilks, Pendergast and Leggat, 2006, pp.82, 85-86). Types of Terrorist Activities across Tourism Centers The event of terrorism linked with tourism activities in order to succeed in their goals of spreading terror and panic in the regions takes to different forms of terrorist operations. In this regard, Henderson (2007) observes that terrorist outfits generally carry out a host of terrorist activities, which aims to take many lives in order to succeed in their mission of spreading terror. Different terrorist operations are planed out by the terrorist groups, which can take place individually or in particular assortments. The different activities, which are planned by the terrorist groups, include employment of suicide bombers to counter insurgency operations. The terrorist

Meditation Essay Example | Topics and Well Written Essays - 1250 words

Meditation - Essay Example I kept asking myself what might have been wrong with her. Something within me kept telling me something was amiss. Suddenly, when I heard hoots and brakes’ screeching is when I realized that I was so engrossed in my thoughts and I was almost being ran over. I quickly grabbed my bicycle brakes and came to a sudden halt; almost falling down. It is when I realized I had gone extremely far from home without noticing. I changed my course, and decided to ride back home. Today I meditated on being grateful for my bike. I got the bike as a present from my dad for my exemplary performance in school. I had always wished to own one and every day after school, I would drop off my school bag in my room and rush to Tom’s house, my neighbor and friend, in order to ride his bike. I adore my bike so much. Apart from exercising using it, sometimes I save my parents the pressure of dropping me to school when they are running late for work. Sometimes I wonder what I would do if sometime stole it; I guess I would be sick for a week. When sent on short errands such as buying groceries from the store, my bike usually plays an integral since it enables me take shortest time possible; thus, making my parents proud of me. In case I am stressed or bothered about something, taking a ride in the woods near my home always gives me amazing refreshment. A two-hour ride and I go back home rejuvenated and feeling better. My bike is a gem to me. Today I practiced meditating when taking a shower. A warm shower in the morning is the best way to jumpstart one’s day. While enjoying the warm water hit my back, I reminded what my History teacher told us in class yesterday about respecting and appreciating our parents. I could not help thinking of what I could do without my mum and dad. My thoughts wondered how they are always there for me. They comfort and encourage me every time I am worried about something. They have always provided me with everything I need and sacrificed a lot to take

Thursday, October 17, 2019

The Uses and Abuses of Nationalism Essay Example | Topics and Well Written Essays - 500 words

The Uses and Abuses of Nationalism - Essay Example The religious systems influenced the way commerce and trade has been done since the ancient times. During the 17th Century, there was a disagreement in establishing what was right according to the religious beliefs at the time. A rift had emerged between the Protestants and the Catholics, leading to the northern European nations’ interest in â€Å"trade and commerce† (896). The transition from Catholicism to Protestant among many Europeans created a transformation in commerce. Watson says, â€Å"New mercantile classes were replacing the traditional military and landowning aristocracies as the main political force.† (896).This demonstrates the influence of religion on trade and commerce during the ancient times. However, the influence of religious systems has continued to be minimal with time. In the modern day society, the input of the religious systems in matters of commerce and trade is almost inexistent. The change has been characterized by religious tolerance and freedom of religion as enshrined in the bill of rights. Colonization helped shape trade and commerce in the European countries as well as those of their colonies. Courtesy of British colonization, America sprung to become a giant economy partly because most of the individuals who embarked on building the country had a great background. Watson supports this argument by mentioning that, â€Å"Britain had her American colonies†¦ she had emerged as the most powerful of the maritime nations† (897). Some of the Britain’s benefits came from the trade and taxes that were levied on its colonies, an aspect that facilitated the growth of the economy. Slavery was a key component of economic growth, in an attempt to maintain supremacy and high economic output western countries pioneered by Portugal engaged in slave trade. It began around 1444 despite criticism from several quarters, especially from key

Research for the Financial Risk Management Problems of Small and Literature review

Research for the Financial Risk Management Problems of Small and Medium-sized Enterprise in China - Literature review Example Similarly, Allen warns that investors who fail to adopt the correct strategies in handling the identified risks always face severe consequences. To support his ideology, he says that the economic depletion of 2008 came out because of the then major financial firms failing to adopt the correct strategies of managing loose credit. Mulz 2011 (pg. 7) defines financial risk management as the aspect of evaluating and managing current or possible financial risks within the firm. He says that even though financial risk management practices cannot always prevent firms from all possible risks, they are beneficial in a way as they decrease the level at which firms are exposed to the risk. According to (pg. 9), risk management has some similarity to financial risk management. The similarity arises from the fact that in both cases, investors and firm managers are required to identify potential risks, evaluate possible remedies that they can embrace, and finally implement the most appropriate strategies in such a way that the objectives of the business are handled satisfactorily. Historically, various economies of the world have different mechanisms of controlling their markets. This is to mean that a strategy can be ideal for implementation in the United States but not in China, Brazil, Australia or South Africa for that matter. This essay aims to provide more insight on both risk management and financial risk management, but by comparing the most applicable strategies in China with those in Western nations notably, the United States of America. Similarly, this essay aims to discuss how differently bigger companies as well as small and medium-sized enterprises in China manage risks. On the same note, the essay briefly covers some of the financial risk problems that SME’s face in their attempt to compete with the already established corporates. Chance 2010 (pg. 47) argues that the

Wednesday, October 16, 2019

Design Information Technology Assignment Example | Topics and Well Written Essays - 1500 words

Design Information Technology - Assignment Example To embed functionalities on a simple design would require more effort than in putting the functionalities regardless of simplicity of design. Simplicity is the factor of designing that made Kaplan and Braunstein the high sale in camcorder. People love simple, adaptable, and dependable products (Colborne, 2010). Most of the companies had concentrated on making their camcorders win sales by adding advanced features. This was in contrast to the flip, which was primitive, missing on some features with low resolution. A year later flip just increased its sales to a million units with a low market of 6 million units. This came in recognition by the company, which recognized how the camcorders had become complex and intimidating. On realizing the main objective of people, which was not to make films but take spontaneous events as they came. With the realization of the customer requirements, flip is set into simplicity. It ditched the non-essential features, leaving out no cable. It effected on flip-USB connector, giving it its name. The flip had few buttons, did not require a CD for its software for it was embedded in the camcorder itself. This was among the design example of simplicity that gained the market among others that existed such as the VW Beetle and Twitter. This brings out how simplicity finds a popular audience due to reliability, as well as, being easy to use. They leave the users attracted to them. Hence, they usually get many surprising ways. This is one of the most advanced technologies that has brought up creation of powerful yet simple products. In creating complexities, when one side fails it may cost more to change everything in a satisfying manner to the people. The US Motor industry based itself on building cars that were heavy, thirsty, and expensive and sold at a premium price when the company faced a weighty problem during the 2008 economic crash. As usual, not many wanted high expenses during the economic crash. When the company did its anal ysis, it found that in restructuring itself, it would have to invest more billions of dollars. Therefore, it recognized the advantage of simplicity having withstood changes with less cost unlike the complexities that would cost a lot more when changes arise. Thus, the designers must put into consideration only the features that people consider essential, especially when rough times come, adhering to changes that would cost a lot. To give more features would require more cost unlike simple designs, which entail fewer features hence lowering of the cost (Colborne, 2010). Simplicity does not mean it would be so for all users and manufacturers. A company, which had its networking and functionality upgraded, made the managers’ work simpler, but the salespeople complained. This proves that on designing a simple part a lot would have to be put into consideration. Companies which products seem simple to the users, designers, and manufacturers usually have it rough. Google, which is t he largest and the simplest of all search engines, has the best engineers to do coding and math on the back end. Every year they set out to have the best in every of the fields they have. Employees work in the highest degree of professionalism to bring out what is acceptable by the users as simple. The one wheel bike may look very simple but prove to be an enormous challenge to ride. The Shaker and Panton chair both are simple but have a given uniqueness for their purpose. Therefore, in the design creation, we consider

Research for the Financial Risk Management Problems of Small and Literature review

Research for the Financial Risk Management Problems of Small and Medium-sized Enterprise in China - Literature review Example Similarly, Allen warns that investors who fail to adopt the correct strategies in handling the identified risks always face severe consequences. To support his ideology, he says that the economic depletion of 2008 came out because of the then major financial firms failing to adopt the correct strategies of managing loose credit. Mulz 2011 (pg. 7) defines financial risk management as the aspect of evaluating and managing current or possible financial risks within the firm. He says that even though financial risk management practices cannot always prevent firms from all possible risks, they are beneficial in a way as they decrease the level at which firms are exposed to the risk. According to (pg. 9), risk management has some similarity to financial risk management. The similarity arises from the fact that in both cases, investors and firm managers are required to identify potential risks, evaluate possible remedies that they can embrace, and finally implement the most appropriate strategies in such a way that the objectives of the business are handled satisfactorily. Historically, various economies of the world have different mechanisms of controlling their markets. This is to mean that a strategy can be ideal for implementation in the United States but not in China, Brazil, Australia or South Africa for that matter. This essay aims to provide more insight on both risk management and financial risk management, but by comparing the most applicable strategies in China with those in Western nations notably, the United States of America. Similarly, this essay aims to discuss how differently bigger companies as well as small and medium-sized enterprises in China manage risks. On the same note, the essay briefly covers some of the financial risk problems that SME’s face in their attempt to compete with the already established corporates. Chance 2010 (pg. 47) argues that the

Tuesday, October 15, 2019

Effects of race on the perception of Guilt Essay Example for Free

Effects of race on the perception of Guilt Essay Affective mood disorders are mental disorders characterised by disturbances in mood and emotional states, unlike Schizophrenia, the most severe of mental disorders, which is distinguished by problems with thought processes. These affective mood disorders can include variations such as Bipolar disorders where the patient experiences two extreme states; mania accompanied with depression and Unipolar disorders where only the depressive state is present. There have been many suggestions as to the cause of these disorders. It has long been thought that there are two types of depression: reactive and endogenous. Reactive depression follows the psychodynamic view that depression relates to life events such as loss of a loved one and endogenous depression mirrors the cognitive approach where the individual attributes failures internally thus bringing on depression. However the DSM-IV only lists two sub-types of depression, which are reliant upon the length that the patient has suffered for. These are major depressive disorder and dysthymic disorder. Biochemical explanations are mainly associated with unipolar depression and were developed in the 1950s with the introduction of Tricyclic drugs, which were discovered to help those with depressive symptoms. It has been suggested that chemical imbalances in the brain cause these depressive symptoms. Neurotransmitters such as serotonin, norepinephrine and dopamine are believed to be of a higher level in patients with no signs of depression compared to lower levels in those with depression (Schildkraut, Green and Mooney, 1985, in Gleitman et al, 1999) However, it is only possible to investigate this by measuring the by-products of the metabolising neurotransmitters. Although it has been found that patients with depression have lower levels of these by-products, Cooper (1988, in Cardwell et al, 2000) carried out post-mortems on patients who had suffered from depression and found that there was no abnormality in the chemicals of the brain. Medications used to treat depression can be used in support of the biochemical hypothesis as drugs such as Lithium and Tricyclic antidepressants increase the levels of norepinephrine and serotonin in the brain implying that it was the shortage of these chemicals that was causing the depression. Rosenzwig, Leiman and Breedloves (1996, in Gleitman et al, 1999) experiment also supports this view as it was discovered that lowering the levels of the neurotransmitters works in reverse and can cause depression. However, these anti-depressant drugs cause an immediate increase in the levels of norepinephrine, following the biochemical hypothesis once the norepinephrine level is increased depressive symptoms should disappear. In fact it takes 2-3 weeks after first taking the drugs for an effect to be seen, yet within a couple of days after taking the drugs the norepinephrine levels have returned to their previous level. This hinders the biochemical hypothesis and suggests that it may not purely be a chemical imbalance that causes depression. Patients who suffer with bipolar depression also have low levels of norepinephrine during a depressed phase, returning to a higher level when in a manic stage, (Muscettola et al, 1984,in Gleitman et al, 1999) the switch between the manic and depressive phases occur very quickly and without external influences, indicating that it is in fact a biological rather than psychological reason that causes this switch to take place. Another strand to the biological approach is the question; does depression run in families? The biological explanation supports this suggestion. There have been numerous twin studies comparing concordance rates of MZ (identical twins) with DZ (non-identical) twins, all giving evidence for some genetic transmission. Evidence for a genetic link concerning bipolar disorders comes from a study carried out by Hodgkinson, Mullan and Gurling, (1990, in Gleitman et al, 1999); they discovered that patients who had bipolar disorder also had an enzyme deficiency accompanied by a type of colour blindness. All of these irregularities are caused by a defect on the X-chromosome. This indicates that the genetic cause of bipolar disorder also lies with the x-chromosome and may explain to a certain degree why it has been found that more women than men suffer from bipolar depression. However it is important to note that women, no matter what culture have a different social support structure to men, allowing them to talk more about their problems. Therefore it may simply be the case that more women report their problems than men, who keep their feelings of depression to themselves. This difference also occurs with unipolar depression and can be accounted for by the vast amounts of hormonal changes women endure through menstruation, child carrying and the menopause. McGuffin et al (1996) compared 109 pairs of twins and found a rate of 46 per cent concordance in MZ twins to that of 20 per cent in DZ twins; this study shows a genetic link for depression but that it is not the only factor. If depression were only caused by genetics then the concordance rates would be 100 per cent for MZ twins and 50 per cent for DZ twins, suggesting that other factors play an important role. This genetic link may be due to environmental factors as the patients are likely to live in a shared environment. This suggests that the concordance rates occur not because depression is hereditary but because it can be learnt. This however could also work in reverse; a relative may not suffer from depression because they have experienced depression and have learnt ways to cope with their feelings and experiences. This can also be illustrated by Siever, Davis, and Gorman, (1991, in Gleitman et al, 1999) who carried out twin studies that showed identical twins were four times more likely to both suffer from a mood disorder than non-identical twins. Identical twins have a closer shared environment than non-identical twins, which may account for the higher concordance rate amongst identical twins.

Monday, October 14, 2019

Visual Information Encryption by D-H Key Agreement

Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an