Wednesday, July 31, 2019

Roskill and Howard Davies Airport Commissions and the Third London Airport

Introduction London’s airports are operating close to capacity and there are challenges associated with the location particularly of Heathrow airport, such as noise pollution and safety of London’s populace (DOT, 2003; Helsey and Codd, 2012). Capacity expansion pursuits have been long drawn over half a century involving two airport commissions and political intrigues (FT, 2014). The Third London Airport commission popularly known as the ‘Roskill Commission’ anticipated growth in air transport and speculated that by the end of the century London might have to accommodate 100 million passengers (Abelson and Flowerdew, 1972). It was an appropriate estimate as the actual number was 115 million (CAPA, 2013). This ceiling has been surpassed and London airports are operating under strenuous volumes. The pursuit of an alternative airport, additional runways to expand capacity, among other options continue to feature in public discourse almost half a century later with myriad ar guments and counterarguments (FT, 2014; The Independent, 2014). This report explores the works of the airports commissions (Roskill and Howard Davies commissions), as well as the consideration of the controversial Boris Island alternative. It focuses on the demand and supply of airports among other considerations significant for such ventures as the development of new airports or aviation facilities. History of commissions and development of arguments A 1964 interdepartmental committee on the Third London Airport forecast that the capacity of Heathrow and Gatwick airports combined, even with the addition of a second runway at Gatwick, would be insufficient for London’s air traffic by 1972 (Mishan, 1970). After the consideration of options, the commission on the Third London Airport (Roskill Commission) was set up in 1968. With their evaluation of the timing of need, expansion capacity requirement, and after a careful study of a total of 80 proposed project sites, the commission finally chose four sites, among them a new airport at Cublington (Abelson and Flowerdew, 1972). It was the first time that a full range of environmental and economic arguments were brought to bear on a major investment decision, providing substantial and significant systemic evidence on which to base decisions (HC, 1971). Its excellence in approach and output was however to not much good as government, with a variant perception and opinion immediatel y rejected its findings choosing instead a scheme to build an airport at Foulness, in the Thames Estuary (Mishan, 1970). Interestingly, this option had been considered and had been decisively rejected by the Roskill Commission on the basis of cost, distance and convenience to prospective passengers (FT, 2014). Neither of the two propositions (Cublington and Foulness) was built and a subsequent change in government and complexion led to the devise of a different scheme – a limited expansion of an existing airport at Stansted which was accomplished a decade after proposition. This option had also been considered by the Roskill Commission and never made its shortlist of key options (Helsey and Codd, 2012). It was a predictable failure and is still challenged by the lack of success in supporting long-haul operations by airlines, only benefitting from low-cost carriers (principally Ryan air) drawn by attractive landing charges which offset consequent inconvenience to their passeng ers (AOA, 2013). A proposal which has re-emerged and gained prominence is the new airport at the Thames Estuary. The ‘Boris Island’ alternative Dubbed ‘Boris Island’ as a consequence of its support by London Mayor Boris Johnson, the London Britannia Airport (a name adopted for the latest iteration of the idea in 2013) is a proposed airport to be built on an artificial island in the River Thames estuary to serve London. Plans for this airport go several years back but the idea was revived by the Mayor in 2008 (CAPA, 2013; Mayor of London, 2013). Proponents of the project cite the significant advantage it portends in the avoidance of flights over densely populated areas with consideration of noise pollution and attendant safety challenges. However, its critics who include some local councils, nature conservation charity – RSPB, as well as current London airports, oppose the scheme, suggesting that it is impractical and expensive (AC, 2013b). It is still under consideration of the Howard Davies Airports Commission, which estimates the entire undertaking including feeder roads and rail to cost ?112 billion, a bout five times the presently shortlisted short-term options (AC, 2013c). The overall balance of economic impacts of the project would be uncertain given the requirement for the closure of Heathrow and by extension London city for airspace reasons (CAPA, 2013). Renewed pursuit – Howard Davies Airports Commission In spite of the myriad arguments and criticisms of the various alternatives, not much has changed and the Howard Davies Airports Commission set up in 2012 still wades in the long running controversy (CAPA, 2013; AOA, 2013). There has evidently been little learnt in the several decades of bad policy making given the hedging, stonewalling, and political posturing that still characterizes the endeavour, a readiness to oppose policies espoused by those of different complexions or the persistent complication of issues when there is requirement for bold action. This characterizes policy today as it did half a century earlier with elaborate models being grossly misused and deliberately disregarded. Minor challenges and disadvantages are greatly amplified overshadowing potentially more substantial benefits (FT, 2014). The Airports Commission was set up to examine the need for additional UK airport capacity and to recommend to government how this can be met in the short, medium and long term. The commission is tasked with creating economic, sustainable and socially responsible growth through competitive airlines and airports. (AC, 2013a). The findings of the Howard Davies Airports Commission contained in their interim report released in December 2013 (preceding a final report expected in 2015) are mainly focused on the continued growth of air travel, mainly in the South East of England. The Commission considers that the region needs an extra runway by 2030, and another possibly by 2050. On the shortlist for the expansion of airport capacity are three options comprising a third runway at Heathrow 3,500m long; lengthening of the existing northern runway to at least 6,000m enabling it to be used for both landing and take-off; as well as a new 3,000m runway at Gatwick (CAPA, 2013; AOA, 2013). Not included is the brand new hub airport in the Thames Estuary, which is side-lined citing uncertainties and challenges surrounding the proposal at this stage (AC, 2013d). However, th e Commission promises an evaluation of its feasibility and a decision on its viability later in 2004 (The Independent, 2014). The Stansted and Birmingham options, however, failed to make the shortlist, although the decision remains open for their qualification in the long term (CAPA, 2013). In the Commission’s view, the capacity challenge is yet to become critical although there is potential if no action is taken soon. However, capacity challenges and the jostling and vying for a slice of anticipated extra capacity by airports signals need (AC, 2013d). Arguments on the expansion of airport capacity The Howard Davies Commission acknowledge the ‘over-optimism’ in recent forecasts of growth in demand for the aviation sector, but consider the level of growing demand as prominent requiring focus on the earliest practicable relief (AC, 2013c). This is in response to contentions by opponents that the current capacity is adequate basing their primary argument on earlier inaccurate demand forecasts. These opponents posit operational changes including quieter and bigger planes could serve to accommodate more passengers negating the need for ambitious and expensive ventures. Some also argue that constraining growth in the aviation industry would be the best option for emissions reduction and that government should utilise available capacity, pushing traffic from London’s crowded airports to others around the country, (AC, 2013b; c; d; AOA, 2013 DOT, 2013). The Commission accepts the changes in aviation practice and aircraft design could deliver modest improvements in c apacity but argue that none of these submissions suggested significant transformational gains (AC, 2013c). It also stresses that deliberations were alive to the issue of climate change and were focused on the delivery of the best solution for the UK, which entails the achievement of carbon targets and delivery of required connections for the economy and society(AC, 2013c; d). The Commission notes that doing nothing to address capacity constraints could have unintended economic and environmental consequences with the possibility of some flights and emissions being displaced to other countries (AC, 2013d; CAPA, 2013; Mayor of London, 2013). Reliance on runways currently in operation would likely produce a clearly less ideal solution for passengers, global and regional connectivity, and would be sub-optimal in the endeavour to minimize the overall carbon impact of aviation (AC, 2013a; AOA, 2013). To achieve statutory mechanisms aimed at operational efficiency and emission reduction are critical. Conservationists, such as the Friends of Earth, decry growth arguing that the building of more airports and runways will have a major impact on local communities and the environment (Mayor of London, 2013; AC, 2013b). The argument for sustainable growth is welcomed by industry players in light of calls for constraint (AOA, 2013; The Independent, 2014). Through time, the argument has significantly centred on the timing of need for expansion of capacity with the uncertainty over growth and demand estimates. The drive for more intensive use of existing capacity is most appropriate in the short-term given that operational and aircraft design improvements have enabled the handling of more volumes than anticipated. Though limited, there is still capacity for improvement benefitting environmental conformity and overall efficiency. Several tactical improvements are proposed by the Davies commission to enable full and efficient use of available resource and capacity (DOT, 2013; AC , 2013d). The Davies Commission proposes the encouragement of greater adherence to schedules by airlines through stricter enforcement of aircraft arrival time. This would enhance efficient sequencing of arrivals ending the practice of ‘stacking’ especially at Heathrow (Europe’s busiest airport), which is expensive in fuel costs and time and has adverse environmental impact. They also propose ‘smoothing’ of timetables and the tackling of surges in traffic and bottlenecks, such as restrictions of arrivals before 6am and the designation procedures of runways which impede efficiency (AC, 2013d). Also considered are ‘mixed-mode’ operations which entail simultaneous use of runways for take-offs and landings. Through this mode, Heathrow expects to gain 15% in airport capacity without extra building (AOA, 2013). The Airports Commission rules out proposed mixed-mode operations suggesting its use when arrival delays arise and eventually to allow e nvisaged gradual traffic build up and increase in operations towards the opening of additional runways rather than a flood-gate of activity. In their consideration of noise pollution and impact on residents, the Commission recommends ending of simultaneous landings at both runways with an exception of times of disruption (AC, 2013d). Presently, Heathrow designates different runways for landings and departure which are switched daily at 3 pm to allow for respite for communities near the airport (AOA, 2013; FT, 2014). The Howard Davies Commission suggests that there might not be need for one huge hub airport as growth in recent years has come from low-cost carriers (AC, 2013a). This view makes the case for expansion of Gatwick Airport. In anticipation of confirmation of expansion priorities and solutions, airport bosses are at loggerheads with Gatwick bosses suggesting that it would not make business sense for their second runway if Heathrow is also given a green light for simultaneou s expansion (AOA, 2013). This is in consideration of an extension of time to achieve return on investment from the expected 15-20 years to 30-40 years. Gatwick’s case is compelling given that it is cheaper, quicker, has significantly lower environmental impact and is the most deliverable solution in the short term (CAPA, 2013). Heathrow rejects this argument insisting there is a clear business case for a third runway regardless of development at Gatwick. With the airport operating at 98% of its capacity, they highlight potential for parallel growth delivering choice for passengers (AOA, 2013). Mayor Johnson is, however, opposed to Heathrow’s expansion citing the misery inflicted on a million people or more living in west London. He notes that there has been significantly more concern for the needs of passengers superseding the concerns of those on the ground. Johnson proposes focus on the new hub airport (Boris Island) to relieve impact on residents as well as to enhan ce UK’s competitiveness (Mayor of London, 2013). Supporters of Heathrow’s expansion say it will be quicker and will help to maintain the UK as an international aviation hub increasing global connections. Paris, Amsterdam and Frankfurt are closely competing for this business (DOT, 2013). Conclusion The examination of need for additional airport capacity and recommendation of solutions for the short, medium and long term, has taken the UK half a century and two commissions and still there is no confirmed venture despite the raft of proposals. The earlier Roskill Commission reached conclusions on four promising sites-including a new ‘Boris Island’ airport, which are still under consideration in the later commission the Howard Davies Airports Commission. Considering several arguments with regard to their mandate, the latter commission has proposed additional runways one at Gatwick and possibly two at Heathrow despite potential adverse effects to London residents. They are still to deliver a verdict on the new Thames Estuary project, promising a decision later in 2014 after evaluation. References Abelson, P. and A., Flowerdew, 1972. Roskill’s successful recommendation.† In: Journal of the Royal Statistical Society. Vol. 135. No. 4, pp.467 Airports Committee, 2013a. Emerging thinking: Aviation Capacity in the UK. 7th October. Viewed from: https://www.gov.uk/government/news/aviation-capacity-in-the-uk-emerging-thinking Airports Commission, 2013b. Stakeholder responses to Airports Commission discussion papers. 25th October. Viewed from: https://www.gov.uk/government/publications/stakeholder-responses-to-airports-commission-discussion-papers Airports Commission, 2013c. Airports Commission discussion papers. 29th July. Viewed from: https://www.gov.uk/government/collections/airports-commission-discussion-papers–2 Airports Commission, 2013d. Short and medium term options: proposals for making the best use of existing airport capacity. 7th August. Viewed from: https://www.gov.uk/government/publications/short-and-medium-term-options-proposals-for-making-the-best-use-of-existing-airport-capacity CAPA, 2013. The Davies Commission’s Interim Report on UK airports: the big loser remains UK competitiveness. Centre for Aviation. Department of Transport, 2003. The Future of Air Transport – White Paper and the Civil Aviation Bill. [online] viewed on 14/1/2014 from: http://webarchive.nationalarchives.gov.uk/+/http:/www.dft.gov.uk/about/strategy/whitepapers Financial Times, 2014. London’s new airport held to ransom by folly. December, 2013 Helsey, M., and F., Codd, 2012. Aviation: proposals for an airport in the Thames estuary, 1945-2012. House of Commons Library. Viewed from: http://cambridgemba.files.wordpress.com/2012/02/sn4920-1946-2012-review.pdf House of Commons Hansard, 1971. Thhird London Airport (Roskill Commission Report). 4th March. Vol. 812. cc1912-2078. HC Mayor of London, 2013. Why London needs a new hub airport. Transport for London. Viewed from: http://www.tfl.gov.uk/corporate/projectsandschemes/26576.aspx Mishan, E., 1970. What is wrong with RoskillLondon: London School of Economics Airports Operators Association, 2013. The Airport Operator, Autumn 2013. The Independent, 2014. Sir Howard Davies’ Airports Commission: Air travel could be transformed within a few years – with no more ‘stacking’. 17th December, 2013

Explain the reasons for the Sino-Soviet split in the 1960s Essay

In this essay I will be showing the reasons for why the Soviet-Split happened in the 1950s and 1960s. In 1959 a treaty of Friendship, Alliance, and Mutual Assistance was established and was signed by soviet Russia and Peoples Republic of China. Whilst Russia had the Technology the Chinese could offer the man power to support this which seemed like a perfect partnership. This treaty was about Russia and China sharing ideas and technologies together but Russia often refused to share there knowledge of such things such as the A-bomb and the fact that the soviets didn’t offer assistance when China had their confrontation with Taiwan in 1958 and India in 1959, the Chinese were again disappointed with the Soviet response. From the Chinese perspective, the U.S.S.R. seemed to be promoting its own national agenda and losing sight of the shared ideals and goals of Communism. The Sino-Soviet relationship was strained as tension between the two countries began to grow. Because of these reasons the split was obvious by the end of 1950s. The leaders of the union were alarmed at Mao’s hatred of America and they refused to help China develop there own atom bomb. China did manage to blow her first A-Bomb in 1964 followed by an H-bomb in 1969. This was all accomplished without soviet Aid. Mao seemed to advocate a nuclear war on the enemies of the communists. During the 1950s the Chinese leader Mao thought that China was being used as a Soviet satellite and rather than an equal partners which was stated in the treaty. It was clear that Mao and Khrushchev had different ideas on Communism and Capitalism because in one of Mao statements he noted that â€Å"I talked about the danger of nuclear war with a foreign leader. He believed that if a nuclear war was fought the whole of mankind would be killed. I said that if the worst came to the worst and half of mankind died the other half would remain while capitalism would have been smashed and the whole world would become communists.† This statement shows that Mao was confident in the fact that Communism would flourish if the world was drawn into a nuclear war. Khrushchev said that: â€Å"Anyone who thinks that communism can be advanced by war belongs in the lunatic asylum.† Khrushchev statement tells us that Communism could never be achieved no matter what happened in the world. These Statements by both leaders tells us that when they signed the treaty they were going to complete there own goals no matter want so overall the treaty was nothing more than a sham. The suspicions that China had against the soviets was supported greatly in the year of 1959 when Khrushchev went to the United States to have meeting with President Eisenhower. China viewed this as a betrayal of the Communist plan and that it was an attempt for worldwide revolution. This had a very important part in the crumble of the Sino-Soviet split because China wanted to be communist and not be part of the worldwide revolution which the United States of America wanted. Overall this was part of a long term effect on the Sino soviet split. Short effects that made a small contribution to the Sino-Soviet split were that the soviets made fun of the fact that China was not able to handle the technologies that Russia had. For example: â€Å"How can the Chinese be qualified to manufacture nuclear weapons when they eat watery soup out of a common bowl and do not even have trousers to wear.† These statement made by the soviets is clearly mocking the Chinese because it states that they are not advanced enough to handle the technologies. Because of this the Chinese did not receive the bomb and of course broke the treaty yet again adding more conflict between Russia and China. On 16 July 1960, the U.S.S.R. withdrew all its specialists and technical advisors from China. Though the quality of the relationship between the two countries had been slowly declining for years, this recall of personnel is often considered the definitive moment for dissolution of Sino-Soviet cooperation. This was seen as a big turning point in the cold because the threat to the United States was diminished. During the year of 1969 the governments accused each other of provoking incidents along the border that separated China and Russia from each other. This disputed territory was surrendered to Russia in 1858 and 1860; When China was to weak to fight back and had to surrender it. The tension has been building up since and each side has armed forces on it. This clash had been threatened to brake out in 1969. Between March and August, in a series of incidents, Shots had been fired between the border guards and some guards got shot as a result of this. Each of the countries accused each other of being the aggressor and for a time there seemed to be a danger of a full scale war. Because of this incident war seemed imminent but war was averted and became a close call between the tensions that the countries shared against each other. In conclusion I thought that the Sino-Soviet split was predictable. There was too many differences in there believes and ways of life’s for the treaty to stay together through the years. This could have been different if there were different leaders in charge of the countries and the communist and capitalist parties.

Tuesday, July 30, 2019

Phishing Attack

CHAPTER 1 INTRODUCTION In the field of computer security, Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is a fraudulent e-mail that attempts to get you to divulge personal data that can then be used for illegitimate purposes. There are many variations on this scheme. It is possible to Phish for other information in additions to usernames and passwords such as credit card numbers, bank account numbers, social security numbers and mothers’ maiden names. Phishing presents direct risks through the use of stolen credentials and indirect risk to institutions that conduct business on line through erosion of customer confidence. The damage caused by Phishing ranges from denial of access to e-mail to substantial financial loss. [pic] Fig 1. 1 the simplified flow of information in a Phishing attack 1. A deceptive message is sent from the Phishers to the user. 2. A user provides confidential information to a Phishing server (normally after some interaction with the server). 3. The Phishers obtains the confidential information from the server. 4. The confidential information is used to impersonate the user. 5. The Phishers obtains illicit monetary gain. Steps 3 and 5 are of interest primarily to law enforcement personnel to identify and prosecute Phishers. The discussion of technology countermeasures will center on ways to disrupt steps 1, 2 and 4, as well as related technologies outside the information flow proper. CHAPTER 2 PHISHING TECHNIQUES Phishers use a wide variety of techniques, with one common thread. LINK MANIPULATION Most methods of Phishing use some form of technical deception designed to make a link in an e-mail appear to belong to the spoofed organization. Misspelled URLs or the use of sub domains are common tricks used by Phishers. In the following example, http://www. yourbank. example. com/, it appears as though the URL will take you to the example section of the yourbank website; actually this URL points to the â€Å"yourbank† (i. e. Phishing) section of the example website. An old method of spoofing used links containing the ‘@' symbol, originally intended as a way to include a username and password. For example, http://www. oogle. [email  protected] tripod. com/ might deceive a casual observer into believing that it will open a page on www. google. com, whereas it actually directs the browser to a page on members. tripod. com, using a username of www. google. com: the page opens normally, regardless of the username supplied. 1 2 FILTER EVASION Phishers have used images ins tead of text to make it harder for anti-Phishing filters to detect text commonly used in Phishing e-mails. WEBSITE FORGERY Once a victim visits the Phishing website the deception is not over. Some Phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL. [pic] Fig 2. 1 An website which does not shows real address bar PHONE PHISHING Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the Phishers) was dialed, prompts told users to enter their account numbers and PIN. Vishing (voice Phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization. pic] Fig 2. 2 How Phishing Attack can take place CHAPTER 3 REASONS OF PHISHING Let's consider some of the reasons people fall victim to Phishing scams. TRUST OF AUTHORITY When a Phishing email arrives marked as â€Å"High Priority† that threatens to close our bank account unless we update our data immediately, it engages the same authority response mechanisms that we've obeyed for millennia. In our modern culture, the old markers of authority – physical strength, aggressiveness, ruthlessness – have largely given way to signs of economic power. â€Å"He's richer than I am, so he must be a better man†. If you equate market capitalization with GDP then Bank of America is the 28th most powerful country in the world. If you receive a personal email purported to come from BOA questioning the validity of your account data, you will have a strong compulsion to respond, and respond quickly. TEXTUAL AND GRAPHIC PRESENTATION LACKS TRADITIONAL CLUES OF VALIDITY Most people feel that they can tell an honest man by looking him in the eye. You can spot a â€Å"professional† panhandler before he gets to the fourth word in his spiel. Without clues from the verbal and physical realms, our ability to determine the validity of business transactions is diminished. This is a cornerstone of the direct mail advertising business. If a piece of mail resembles some type of official correspondence, you are much more likely to open it. Car dealers send sales flyers in manila envelopes stamped â€Å"Official Business† that look like the envelopes tax refund checks are mailed in. Banks send credit card offers in large cardboard envelopes that are almost indistinguishable from FedEx overnight packages. Political advertisements are adorned with all manner of patriotic symbols to help us link the candidate with our nationalistic feelings. E-MAIL AND WEB PAGES CAN LOOK REAL The use of symbols laden with familiarity and repute lends legitimacy (or the illusion of legitimacy) to information—whether accurate or fraudulent—that is placed on the imitating page. Deception is possible because the symbols that represent a trusted company are no more ‘real' than the symbols that are reproduced for a fictitious company. Certain elements of dynamic web content can be difficult to copy directly but are often easy enough to fake, especially when 100% accuracy is not required. Email messages are usually easier to replicate than web pages since their elements are predominately text or static HTML and associated images. Hyperlinks are easily subverted since the visible tag does not have to match the URL that your click will actually redirect your browser to. The link can look like http://bankofamerica. com/login but the URL could actually link to http://bankofcrime. com/got_your_login CHAPTER 4 ANTI PHISHING TECHNIQUES To counter the phishing threat, a number of anti-phishing solutions have been proposed, both by industry and academic world. The anti phishing techniques can in general be divided into three categories. 1. Spam Filters 2. Anti-phishing tool bars and 3. Password protection mechanism Spam Filters A class of anti-phishing approaches aims to solve the phishing problem at the email level. The key idea is that when a phishing email does not reach its victims, they cannot fall for the scam. Hence, filters and content analysis techniques are often used to attempt to identify phishing emails before these emails are delivered to users. Clearly, this line of research is closely related to anti-spam research [10]. By continuously training filters (e. g. , Bayesian filters), a large number of phishing emails can be blocked. This is because such emails often contain words that may be identified as suspicious tokens that do not frequently occur in legitimate emails (e. g. , ? update? , ? login? , etc. ). The main disadvantage of anti-spam techniques is that their success depends on the availability of these filters and their proper training. That is, when the user does not actively help in training the filter, the filter typically does not perform as expected. Furthermore, even when filters are trained well and a user rarely receives any spam or phishing emails, once a phishing email bypasses the filter, the user’s belief of the legitimacy of this mail is strengthened. Anti-Phishing Toolbars To identify a page as a phishing site, there are a variety of methods that can be used, such as white lists (lists of known safe sites), blacklists (lists of known fraudulent sites), various heuristics to see if a URL is similar to a well-known URL, and community ratings. The toolbars examined here employ different combinations of these methods. By using publicly available information provided on the toolbar download web sites as well as observations from using each toolbar we get a basic understanding of how each toolbar functions. Some of the toolbars that are used for anti-phishing are 1) eBay Toolbar The eBay Toolbar uses a combination of heuristics and blacklists. The toolbar also gives users the ability to report phishing sites, which will then be verified before being blacklisted. 2) GeoTrust TrustWatch Toolbar GeoTrust’s web site provides no information about how TrustWatch determines if a site is fraudulent; however, it is suspect that the company ompiles a blacklist that includes sites reported by users through a button provided on the toolbar. 3) Google Safe Browsing Google provides the source code for the Safe Browsing feature and says that it checks URLs against a blacklist 4) McAfee SiteAdvisor SiteAdvisor claims to detect not just phishing websites, but any sites that send spam, offer downloads containi ng spyware, or engage in other similar bad practices. The determination is made by a combination of automated heuristics and manual verification. 5) Microsoft Phishing Filter in Windows Internet Explorer This toolbar largely relies on a blacklist hosted by Microsoft. However, it also uses some heuristics when it encounters a site that is not in the blacklist. Users also have the option of using this feature to report suspected phishing sites 6) Netcraft Anti-Phishing Toolbar The Netcraft toolbar also uses a blacklist, which consists of fraudulent sites identified by Netcraft as well as sites submitted by users and verified by the company. The toolbar also displays a risk rating between one and ten as well as the hosting location of the site. [pic] Fig 4. 1 Netcraft Anti-Phishing Toolbar ) Netscape Browser 8. 1 It appears that the functionality of Netscape Browser relies solely on a blacklist, which is maintained by AOL and updated frequently. When a suspected phishing site is encountered, the user is redirected to a built-in warning page. Users are shown the original URL and are asked whether or not they would like to proceed. 8) Spoofguard Spoofguard does not use white lists or blac klists. Instead, the toolbar employs a series of heuristics to identify phishing pages. 9) AntiPhish AntiPhish is an academic solution which keeps track of where sensitive information is being submitted to. 0) Dynamic security skins Dynamic security skins is also an academis solution which allow a remote server to prove its identity in a way that is easy for humans to verify. Most of the tools that were tested used blacklists, but only half of them were able to identify the majority of phishing web sites. We don’t know the size of the blacklists used by each toolbar, nor do we know what heuristics are used by any of the toolbars other than Spoofguard. We suspect that the toolbars that performed best use larger and more frequently updated black lists. They may also use heuristics that allow them to detect phishing sites that haven’t yet been put on the blacklist. The only toolbar known to make no use of blacklists was Spoofguard. While it was able to identify the majority of phishing sites using only heuristics, it still missed some phishing sites and it had a very high false positive rate. Spoofguard could potentially be improved through the use of a whitelist, which would prevent the problems that occurred when phishing sites were visited before their corresponding legitimate sites. The whitelist would not necessarily need to be extremely large or updated frequently to be effective. Password Protection Mechanism A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource. The password should be kept secret from those who are not allowed for access. So, the major concern for any user is to safeguard his/her password. The password can be cracked with the attacks such as Guessing attack, Brute-force attack, Dictionary attack, Phishing attack etc. ,. Another problem regarding password is single password problem where the user uses a single password for both vulnerable sites and financial sites. The hackers can break into the vulnerable sites that simply stores username and password and apply those retrieved combination of username and password on high security sites such as banking sites. All these problems at a single stroke can be solved by hashing the master password using domain name as key on client side. Some of the applications/tools that use this powerful technique are 1) Password Composer This extension [25] puts a tiny red icon to the left of a password entry field. If one clicks on this icon, the password field is overlaid with a replacement input, where one can supply a single, secure password (Master Password). 2) Magic Password Generator This extension combines master password and the domain name of the site to make another unique password for that site. For advanced users, with a catchall address at a domain, just put â€Å"@example. com† (whatever one’s domain is) for the address, and MPWGen will make a different email for every site too. Alternately, use â€Å"[email  protected]†¦Ã¢â‚¬  and the value will be inserted after the + sign, for email accounts that support this feature, like gmail. ) Password generator Password Generator gets the hostname from the page's URL and mixes it together with one’s personal master password using a little cryptographic magic MD5. It always gets the same result if given that hostname and master password, but will never get that result if either changes. 4) Hassapass Hasspass automatically generates strong passwords from a master password and a parameter like domain name. The password generation is performed inside this very browser window in JavaScript 5) Genpass GenPass is a JavaScript/MD5 bookmarklet-based password generator. GenPass is no longer being updated. Presently consider using SuperGenPass; however, note that SuperGenPass is not compatible with GenPass—given the same input, they generate different passwords. 6) Password Hasher When the master key is given to Password Hasher and it enters the hash word into the site's password field. A hash word is the result of scrambling the master key with a site tag. Click on a # marker next to a password field or press the Control-F6 key combination when in a password field or choose Password Hasher from either the Tools menu or the right-click popup menu on a password field to enter the master key. ) Pwdhash Pwdhash is a browser extension that transparently converts a user's password into a domain-specific password. The user can activate this hashing by choosing passwords that start with a special prefix (@@) or by pressing a special password key (F2). Pwdhash automatically replaces the contents of these password fields with a one-way hash of the pair (password, domain-name). Based on t he features like application type, hashing algorithm, security, password strength, spoof proof, visibility to webpage, visibility to user etc. Pwdhash is the best among the above mentioned applications. But some of its disadvantages are as follows a) Invisible to user – Password hashing done by Pwdhash is invisible to user. If this extension stops working, user will not know about this, i. e. , passwords will not be hashed. b) Visibility of activation to webpage – Webpage gets the intimation about the activation of Pwdhash. This made Pwdhash vulnerable for JavaScript attacks. So webpage can put some efforts to know the original master password. ) Password availability as plain text – The master password is directly filled in password field given by webpage. i. e. , password is available in plain text. d) Easily spoof-able – As activation is visible to webpage and by using Alex’s corner method it is very easy to know the master password of user by f ake webpage. e) Affect on others / Affecting webpage – Pwdhash have some side-effects on websites. Any JavaScript attached with password fields will not work properly. For ex. keyPress event will not work properly. f) Not secure – Finally, Pwdhash is not looking so secured. CHAPTER 5 ANTI-PHISHING There are several different techniques to combat Phishing, including legislation and technology created specifically to protect against Phishing. SOCIAL RESPONSES One strategy for combating Phishing is to train people to recognize Phishing attempts, and to deal with them. Education can be effective, especially where training provides direct feedback. One newer Phishing tactic, which uses Phishing e-mails targeted at a specific company, known as Spear Phishing, has been harnessed to train individuals at various locations. People can take steps to avoid Phishing attempts by slightly modifying their browsing habits. When contacted about an account needing to be â€Å"verified† (or any other topic used by Phishers), it is a sensible precaution to contact the company from which the e-mail apparently originates to check that the e-mail is legitimate. Alternatively, the address that the individual knows is the company's genuine website can be typed into the address bar of the browser, rather than trusting any hyperlinks in the suspected Phishing message. Nearly all legitimate e-mail messages from companies to their customers contain an item of information that is not readily available to Phishers. Some companies, for example PayPal, always address their customers by their username in e-mails, so if an e-mail addresses the recipient in a generic fashion (â€Å"Dear PayPal customer†) it is likely to be an attempt at Phishing. E-mails from banks and credit card companies often include partial account numbers. However, recent research has shown that the public do not typically distinguish between the first few digits and the last few digits of an account number—a significant problem since the first few digits are often the same for all clients of a financial institution. People can be trained to have their suspicion aroused if the message does not contain any specific personal information. Phishing attempts in early 2006, however, used personalized information, which makes it unsafe to assume that the presence of personal information alone guarantees that a message is legitimate. Furthermore, another recent study concluded in part that the presence of personal information does not significantly affect the success rate of Phishing attacks, which suggests that most people do not pay attention to such details. The Anti-Phishing Working Group, an industry and law enforcement association has suggested that conventional Phishing techniques could become obsolete in the future as people are increasingly aware of the social engineering techniques used by Phishers. They predict that Pharming and other uses of malware will become more common tools for stealing information. TECHNICAL RESPONSES Anti-Phishing measures have been implemented as features embedded in browsers, as extensions or toolbars for browsers, and as part of website login procedures. The following are some of the main approaches to the problem. Helping to identify legitimate sites Most Phishing websites are secure websites, meaning that SSL with strong cryptography is used for server authentication, where the website's URL is used as identifier. The problem is that users often do not know or recognize the URL of the legitimate sites they intend to connect to, so that the authentication becomes meaningless. A condition for meaningful server authentication is to have a server identifier that is meaningful to the user. Simply displaying the domain name for the visited website as some some anti-Phishing toolbars do is not sufficient. A better approach is the pet name extension for Firefox which lets users type in their own labels for websites, so they can later recognize when they have returned to the site. If the site is not recognized, then the software may either warn the user or block the site outright. This represents user-centric identity management of server identities. Some suggest that a graphical image selected by the user is better than a pet name Browsers alerting users to fraudulent websites Another popular approach to fighting Phishing is to maintain a list of known Phishing sites and to check websites against the list. Microsoft's IE7 browser, Mozilla Firefox 2. 0, and Opera all contain this type of anti-Phishing measure. Firefox 2 uses Google anti-Phishing software. Some implementations of this approach send the visited URLs to a central service to be checked, which has raised concerns about privacy. To mitigate the problem of Phishing sites impersonating a victim site by embedding its images (such as logos), several site owners have altered the images to send a message to the visitor that a site may be fraudulent. The image may be moved to a new filename and the original permanently replaced, or a server can detect that the image was not requested as part of normal browsing, and instead send a warning image. Augmenting password logins The Bank of America's website is one of several that ask users to select a personal image, and display this user-selected image with any forms that request a password. Users of the bank's online services are instructed to enter a password only when they see the image they selected. However, a recent study suggests few users refrain from entering their password when images are absent. In addition, this feature (like other forms of two-factor authentication) is susceptible to other attacks. Security skins are a related technique that involves overlaying a user-selected image onto the login form as a visual cue that the form is legitimate. Unlike the website-based image schemes, however, the image itself is shared only between the user and the browser, and not between the user and the website. The scheme also relies on a mutual authentication protocol, which makes it less vulnerable to attacks that affect user-only authentication schemes. 1 Eliminating Phishing mail Specialized spam filters can reduce the number of Phishing e-mails that reach their addressees' inboxes. These approaches rely on machine learning and natural language processing approaches to classify Phishing e-mails. 2 Monitoring and takedown Several companies offer banks and other organizations likely to suffer from Phishing scams round-the-clock services to monitor, analyze and assist in shutting down Phishing websites. Individuals can contribute by reporting Phishing to both volunteer and industry groups, such as PhishTank. LEGAL RESPONSES On January 26, 2004, the U. S. Federal Trade Commission filed the first lawsuit against a suspected Phisher. The defendant, a Californian teenager, allegedly created a webpage designed to look like the America Online website, and used it to steal credit card information. In the United States, Senator Patrick Leahy introduced the Anti-Phishing Act of 2005. Companies have also joined the effort to crack down on Phishing. CHAPTER 6 HOW ANTI-PHISHING SOFTWARE WORKS Anti-phishing software consists of computer programs that attempt to identify phishing content contained in websites and e-mail. It is often integrated with web browsers and email clients as a toolbar that displays the real domain name for the website the viewer is visiting, in an attempt to prevent fraudulent websites from masquerading as other legitimate web sites. Anti-phishing functionality may also be included as a built-in capability of some web browsers Common phishing tactics take advantage of a visitor by requesting them to link out to another site, asking that the enter personal information and passwords, or redirecting them to another site completely for registration. The process usually begins by sending out a forged e-mail that looks like it was sent from the company. Some tactics include saying an account has expired and needs to be updated, or has experienced unauthorized use and needs to be verified. Many banking and financial institutions become targets for these types of scams, and they can be a considerable threat to millions of account holders and users. Many leading web browsers and software programs have realized the impact of this trend, and have created programs that can limit the frequency of these types of scams. Micirosoft Windows Internet Explorer 7, Firefox 2. 0, Google Safe Browsing, and Earthlink ScamBlocker are just a few programs that have reduced the risks involved. In Firefox 2. 0, Phishing Protection is always turned on and checks the sites automatically for any potential risks or hazards. The list is reviewed on a regular basis, and can be configured to Firefox Security settings for maximum control. When Phishing Protection in enabled, the sites are downloaded into a list and checked for any anti-phishing services. A warning sign will appear if any suspicious activity is detected. The Netcraft toolbar makes use of a risk rating system, allowing you the option of entering a password (or not). TrustWatch makes the Internet Explorer toolbar, and can help validate a Web site and provide a site report when needed. This option also allows you to review all suspected sites and find out which ones use SSL technology. Earthlink Toolbar with ScamBlocker will verify any popup messages that you may encounter as you visit a site, and can help you find out all the details on current phishing scams. Anti-phishing software is designed to track websites and monitor activity; any suspicious behaviour can be automatically reported, and even reviewed as a report after a period of time. Anti-phishing toolbars can help protect your privacy and reduce the risk of landing at a false or insecure URL. Although some people have concerns over how valuabe anti-phishing software and toolbars may be, security threats can be reduced considerably when they are managed by the browser program. Other companies that are trained in computer security are investigating other ways to report phishing issues; programs are being designed that can analyze web addresses for fraudulent behavior through new tactics, and cross-checking domain names for validity. The best and in most using Anti-Phishing Software is Netcraft Anti-Phishing Toolbar Netcraft is an Internet Services Company located in the United Kingdom and is devoted to tracking online technology. Additionally, Netcraft has actively taken up the sole of patrolling the cyberspace to sniff out phishing emails. The antiphising toolbar from Netcraft not only protects you and your savings from phishing attacks but also lets you check the hosting location and Risk Rating of every site you visit. Once you download and install the toolbar, you join a giant neighbourhood watch scheme whose most alert and most expert members defend everyone in the community against phishing frauds. This antiphishing group working to protect you is one of the finest ways to fight phishing. This could be downloaded through internet [pic] [pic] Fig 6. 1 Downloading Netcraft anti-phishing tool bar CHAPTER 7 ADVANTAGES AND DISADVANTAGES OF USING ANTI-PHISHING Advantages †¢ Protect your savings from Phishing attacks. †¢ When a Phishing website or phishing email appears it will informs to the user. †¢ Some Anti-Phishing software's also allows seeing the hosting location and Risk Rating of every site you visit. †¢ Anti-phishing software is designed to track websites and monitor activity; any suspicious behavior can be automatically reported and even reviewed as a report after a period of time Disadvantages †¢ No single technology will completely stop phishing. So Phishing attacks can not be completely stopped †¢ Even Anti-Phishing software's should be upgraded with respect to the Phishing attacks. CHAPTER 8 FEW SNAPSHOTS OF PHISHING WEBSITES [pic] Fig 8. 1 Phishing Peoples Bank Web site [pic] [pic] Fig 8. 2 Phishing US Bank Web site CONCLUSION No single technology will completely stop phishing. However, a combination of good organization and practice, proper application of current technologies, and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it. In particular: High-value targets should follow best practices and keep in touch with continuing evolution of them. Phishing attacks can be detected rapidly through a combination of customer reportage, bounce monitoring, image use monitoring, honeypots and other techniques. Email authentication technologies such as Sender-ID and cryptographic signing, when widely deployed, have the potential to prevent phishing emails from reaching users. Analysis of imagery is a promising area of future research to identify phishing emails. Personally identifiable information should be included in all email communications. Systems allowing the user to enter or select customized text and/or imagery are particularly promising. Browser security upgrades, such as distinctive display of potentially deceptive content and providing a warning when a potentially unsafe link is selected, could substantially reduce the efficacy of phishing attacks. Anti-phishing toolbars are promising tools for identifying phishing sites and heightening security when a potential phishing site is detected. Detection of outgoing confidential information, including password hashing, is a promising area of future work, with some technical challenges. BIBLIOGRAPHY [1] http://en. wikipedia. org/ [2] http://webopedia. com/ [3] http://computerworld. com/ [4] http://www. anti-phishing. info/ [5] http://lorrie. cranor. org/ ———————– Not the real address bar Not the proper domain for peoples. com

Monday, July 29, 2019

Short questions about western civilization Assignment

Short questions about western civilization - Assignment Example There came inflation due to scarcity of workers hence no production. 4. i) The war resulted due to dynasty disagreements. William, duke of England despised King of France by not paying homage. The Kingdom of France, and England fort for control of French throne (Bonomi 2003). 5. Fro m military purposes, renaissance era began after dark period elapsed. This gave way to research and discovery in naval ships, new trade routes, and navigation techniques. Press printing assisted a lot. 7. The council aimed at ending the Papal schism in Avignon Papacy. It ended Three-Pope controversy by accepting the resignation of Papal claimants and elected Pope Martin V. It voiced the killing of Jun Hus and ruled out on security matters, and the freedom of pagans (Bonomi 2003). 8. Marsilius of Pauda turned down the godly beginning of papal body. John Wycliffe led a kind of rebellious sect, which preached for biblically centered reforms. He was the morning star of Reformation in influencing secular power. Jan Hus, a Czech reformer, is the initiator of church reformation ahead of Luther and Calvin and a key predecessor to protestant movement in 16th C (Bonomi 2003). 9. The themes included philosophy, literature, and science. Philosophy and literature defined the way of life from logic, to natural, moral, and metaphysics a structure for university education. Science explored the numerous invention milestones, fro machines, geography, chemistry, and mathematics. 16. It came through dialogue among the Protestants and Catholics, and consolidating their own religious identity. The uprising of renaissance again helped to quell the conflicts since drifted to self-actualization (Bonomi

Sunday, July 28, 2019

Toyota Marketing in China Essay Example | Topics and Well Written Essays - 1750 words

Toyota Marketing in China - Essay Example Sales of marketable vehicle in the country are forecasted to grow at a CAGR of around 5.5% during 2008-2010. Based on the past performance, it is projected that passenger car sales will cross 11 Million Units in 2010. China is the world's second largest car market. It overtook Japan just last year and is challenging to become the world's largest automobile market. The industrial revolution in China has prompted development and growth in the middle-class of China and the automobiles have translated into a symbol of prestige. Toyota was a latecomer to the China market. Within its global strategies, North America is the top priority, followed by its home country Japan. China has been included in Toyota's top development strategy in recent years with its first China-made VIOS sedan produced in Tianjin in October 2002. Considering China as an immature auto market, the company had adopted a three-stage development plan -- first to establish a local sales network and launch brand promotions, then to build auto parts manufacturing bases, and, finally, to establish joint ventures (JVs) with local players and produce automobiles. Although a latecomer, Toyota has jumped to the front in terms of imported car volume -- 50,000 units annually (Jiang, 2004). The company stepped into the most important and critical stage -- speeding up the localization of its products, since its rivals, such as Honda and General Motors, started accelerating their saturation into China. After the market entry of the Prado and Land Cruis er with China's First Automobile Works, its manufactured goods with Guangzhou Automobile Manufacturing Co -- Camry, which was a great success in the Untied States, was also developed. Forbes magazine comments on Toyota's success in the US auto market, saying that once the company sets goals, it will manage to exceed the targets. What is more demanding to its rivals is Toyota's approach to realize these goals. That estimation may well apply to its China development. Although Toyota missed the first opportunities, it will likely catch up if it pays more attention to the China market and introduces high-end brands. Toyota may scale back its ambitious target of selling more vehicles in the United States this year than it did in 2007, as damage from an economic slowdown and high oil prices becomes more fully known. Toyota sold more than 4.8 million vehicles worldwide in the first half of this year, up 2% from the same period a year earlier, the Japanese automaker said Wednesday. That exceeded General Motors Corp.'s sales of 4.5 million vehicles in the same period, setting up Toyota to potentially end GM's 76-year run as the world's top automaker by sales (CNN Money, 2007) Toyota, the third-biggest foreign car brand in China, reported investing 3.6 billion Yuan ($526.8 million) to double the production capacity of one of its plants. This should boost Toyota's overall capacity in China to 830,000 units by the first half of 2010. Global requirement for light hybrid electric vehicles (HEV) is estimated to reach 4.5 million units in 2013. Increasing energy costs and greater than before emissions regulations are likely to increase demand for HEVs. The US is expected to experience the highest level of demand for HEVs, estimated at two million units in

Saturday, July 27, 2019

Situational Leadership Research Paper Example | Topics and Well Written Essays - 1500 words

Situational Leadership - Research Paper Example Latest research found that most leaders exhibited one of four combinations of task and relationship behaviors (Smith, Waller, and Warnock, 1989, p.1). Ken Blanchard and Paul Hersey developed a situational theory of leadership style. Their model of leadership shows that the practice of leading other employees requires one to be able to adopt job experience and skills of the individual employees. There are several theories that try to explain the actual perception and mentality a true leader should have, but all in all, a situational leader is required to be able to adapt their leadership skills according to the needs of the employees and perform it effectively according to situational context (Blanchard & Hersey, 2010). An effective or/and efficient leader is a leader who practices a behavioral and situational leadership. This kind of leader should be able to test different compromising situation to be able to determine which style of leadership will be successful in a particular situation (Lyons & Goldsmith, 2006, p.27). Effective leaders have the potential, interests, abilities and exemplary personality behavior to lead than non-effective leaders. They have the desire and willingness to lead others in the right way because they are always empowered by full confidence all the time. Not all successful leaders are effective or situational leaders, but the most successful ones have higher intelligence and emotional maturity (Hellriegel, & Slocum, 2007, p.216). Successful leaders have the desire to achieve better results in whatever position they are holding. They keep on seeking one goal after the other without depending on employees for motivation in achieving these goals. One has always a higher sense of integrity by strictly following and practicing the laid down set of values (Hellriegel, & Slocum, 2007, p.217). An effective leader

Friday, July 26, 2019

Eliminating the celibacy requirement for catolic priests Essay

Eliminating the celibacy requirement for catolic priests - Essay Example Without doubt some serious arguments can be presented supporting retaining clerical celibacy. One argument maintains that since Jesus himself was celibate and for the reason that the priesthood is a special vocation by which one follows Jesus, such a sacrifice is appropriate. In addition, celibacy serves as a sign of total devotion to the kingdom of God, a kingdom in which there will be no marriage: â€Å"for at the resurrection men and women do not marry; no, they are like the angels in heaven† (Matt 22:30). Lastly, celibacy functions as a witness that sexual activity, despite the fact that good, beautiful and important, is not the absolute essential it is held to be in western culture. To alter the celibacy requirement would be observed to give into cultural mores. (Sipe 85-88) On the other hand, there are a lot of arguments in favor of eliminating the requirement of celibacy. For instance, though it seems obvious that married, many of his apostles were married men. Further, the law of celibacy is a church law, not a divine law and can be changed should the Church believe it essential. A further suggestion supporting the lifting of the requirement of celibacy states that a married priest would be more pastorally sensitive to the needs of married couples as well as families if he were married himself.

Thursday, July 25, 2019

Life is beautiful Essay Example | Topics and Well Written Essays - 250 words

Life is beautiful - Essay Example The belief that the world is beautiful is created by Guido for his son. In response, Giosue does not understand the real situation even unto death. The purpose of the two beliefs in the film is to develop the plot of the film. Without the Giosue belief of a better world, the depiction of the holocaust cannot be illustrated and developed. The different perception of life by Giosue helped develop the plot. It is Guido’s belief that the world may change, but the perception of the human race cannot be hidden even when conducting business. Being a Jew, Guido presents himself as a caring father, but has racism in the way the family business is operated (Benigni). The concentration camp in the main set up of the film. It is based on the execution of the Jews, but Guido ensures that the sons belief in a beautiful world with no problems. The creation of a different view of the world helps in twofold view creation. In conclusion, the film has developed the two fold view by looking at the father and son approach to the world. The beautiful world is created in the son’s view while the real world is depicted in the life

Human Resources NHS report Essay Example | Topics and Well Written Essays - 2000 words

Human Resources NHS report - Essay Example They are providing emergency and urgent care services to the UK patients. The study will be identifying the job role that will be requiring more training and development. Male nurses in the minor injuries units of NHS are requiring highest training and development for obtaining idea on treatment skills. Moreover, the study will be focussing on the north east of the UK area like Newcastle area. Mainly the A&E centres of this area are having quite inexperienced male nurses thus waiting time increases in care set up. Training and development of male nurses will be increasing the efficiency of the overall NHS set up in the Newcastle area (BBC News, 2015). According to Nick Triggle, NHS Winter report of Wales outlined most number of waits in the year 2009. NHS introduced new nurse recruitment rules for the A&E centres in order to increase safety among the patients. â€Å"It is observed that almost 92.4% of patients were treated in the trauma centres and A&E centres during the year 2009, where as, NHS targeted to treat at least 95% of the cart seekers (BBC News, 2015)†. â€Å"Major decline in the service provision started from the month of October of 2009. Such declining mode resulted into lowest levels of service traits during the year 2010 (BBC News, 2015)†. â€Å"During the time of January 2010, performance of the A&E centres reported as less than 87% of the capacity level. During the time, it was observed that only 29 among the 140 major hospitals under NHS reported that they were able to meet expectation of the care seekers (BBC News, 2015)†. Such care and trauma centres are providing the services like minor injury units and walk-in centres which increase the ability of health care services (BBC News, 2015). However, the statistics are showing that the target was set 95% of the patient’s capacity. â€Å"Actual scenario was outlining that only 88.5% patients are cared by the male nurses in Newcastle area (BBC News, 2015)†. In the NHS services

Wednesday, July 24, 2019

A COMPARATIVE ANALYSIS OF PORE PRESSURE PREDICTION USING PORE PRESSURE Thesis

A COMPARATIVE ANALYSIS OF PORE PRESSURE PREDICTION USING PORE PRESSURE DATA FROM OFFSET WELLS FOR FUTURE WELL PLANNING - Thesis Example 2013; Francis 2013). The latest technologies will be applied in regards to methods and paradigms of the forecasting of the fracture gradient and the forecasting of the pore pressure. The most effective practices in the estimation of pore pressures from the seismic velocity information will be applied. The most effective methods which are used in the industry with regards to the approximation of the formation pressure will be explored. A great deal of the information which is collected in the discipline of well planning is derived from the well production crews. This thesis will incorporate a data base of information in addition to the information which is derived from a survey of the well production crews in order to validate the hypothesis. The well production crews are the initial source of information from which the conditions of the wells are derived. This thesis will also incorporate a database of information which is pressure directed from a diverse number of wells with different characteristics. These wells are found in deep water, offshore, swamp land and the Niger Delta environment. The data which is collected from the oil well production crews will be applied in order to ascertain the best practices for effective well drilling and maintenance. Well planning is the most substantial stage of the drilling engineering process. Well planning has the requisite of the application of engineering theories, the personal and organizational perspectives and the factors of experiential knowledge. Notwithstanding that well planning procedures may be different for different implementations within the petroleum exploration and extraction industry, the final outcome must be a cost avoidant hole, which satisfies industry and government safety requirements for the petroleum extraction engineer’s requisites for oil and gas extraction processes (Eren 2010). 2.

Tuesday, July 23, 2019

ELL Instructor Interview Essay Example | Topics and Well Written Essays - 500 words

ELL Instructor Interview - Essay Example In order for students to implement these strategies, it is crucial that they get exposed to real-life scenarios in which they can be able to compare and contrast their acquired skills set. For instance, increasing their proficiency would mean sitting down them individually or in small groups and explaining the concepts to them through real-life methodology. Collaborating is undoubtedly essential in order to thrive in any profession as the thoughts of ideas, knowledge, and practices are exchanged. Trimis, E (2009) Through my personal experience, I have felt that English should be taught in the simplest manner by implementing methodologies that are acquired in school initiates from giving students real life example. In order for students to implement these strategies, it is crucial that they get exposed to real-life scenarios in which they can be able to compare and contrast their acquired skills set. Collaborating is undoubtedly essential in order to thrive in any profession as the thoughts of ideas, knowledge, and practices are exchanged. Quite often, students struggle to socialize in a pre-dominant learning environment. Parents and teachers should play a symbiotic role and support while ensuring that everyone is in sync with the progress. Furthermore, collaboration is a key for the success of students, parents and teachers. The main proposition is to ensure that a learning environment offers multiple platforms, bridges the gap between teachers, parents and students and secure and confidentiality is of the highest quality. Parents can give feedback or allow children to ask questions. Underachievement can consist of many factors such as not being challenged enough, lack of motivation or interest. Students maybe bright but may not feel challenged enough. Ideally, every teacher wants their students to be independent thinkers for various reasons. First and foremost, independent thinking is needed to harness the society and express innovation. Secondly,

Monday, July 22, 2019

Richard Wright Essay Example for Free

Richard Wright Essay In this story written by Richard Wright, we see a man who struggles to come to terms with asserting his independence on the people around him. The main character in the story, Dave, is portrayed by the author as someone who sees that ownership of a gun as the starting point whereby he can prove to his peers and his parents that he is a man. However, as the story progresses, we also witness how Dave fumbles along the way of becoming a man. I believe that many of us have, at one point in our lives, felt the same way as Dave when he wanted to break free from his youth by doing something that was basically within the turf of being an adult. For Dave, becoming a man meant being able to own and fire a gun. Dave felt, or believed, that owning a gun was synonymous to being able to stand up for yourself, or talk to him â€Å"as though he were a little boy†. Unfortunately, Dave focused on the benefits of having a gun instead of focusing on the responsibilities attached to owning a gun. In the course of his struggle for independence, Dave was able to convince his mother to buy a guy but only with the promise of immediately surrendering the gun to his father upon purchase. Naturally, Dave did not live up to this promise and instead tried the gun for himself. And in doing so, he killed the mule of his employer and instead of proving himself worthy of being called a man, his peers saw that he was still not ready to take on the responsibility. In this story, we see different points of view on independence. How does one come of age? For Dave, it was owning a gun but for his parents, it meant being responsible for your actions. In the end, Dave proved himself that he met his own criteria of being a man by owning and firing a gun. But in the sight of many, he is still that man who was almost a man. Almost but not quite.

Sunday, July 21, 2019

An Analysis Of Cultural Heritage Tourism Tourism Essay

An Analysis Of Cultural Heritage Tourism Tourism Essay Heritage is property of the world. It has important evidences of past incidents and changes and it is the necessity to conserve it without political involvement and racial discrimination (UNESCO, 2004). So far Graham et al. (2000, p40) suggested Heritage is tremendously concerned in the construction and legitimating of collective constructs of uniqueness, such as group, gender, religion, civilization and nationalism. When we talk about the relation of heritage into tourism industry, at first, holy cities such as Rome are acknowledged as a highly multifunctional and even multi heritage place, as a result, the heritage attractions positively become the feature of Italy for tourist. To manifest the implication of heritage is consequently the key point of managing a heritage sites. As cultural heritage tourism is mostly depending on the history, the event in the past has abundant evidence that how the past travels had been changing the entire pages of each century and affected our past life. Much of it is also passed on form age to age occasionally in the form in which it actually happen but more often as myth or fable. In whichever form it is of prime importance to a tourism professional, particularly in the circumstances such as the one obtaining in India with wealthy cultural heritage having continuity form the ancient (IGNOU, 2002). The process of finding will continue to the future because no one predict that how many real stories have buried in the earth or still has not being found. But somehow scholars has been able to find the real incident of past with the help of evidences of literature which still present all over the world as well as the role of science and researchers. An archaeology department of each country is encouraging the researchers to fin d out about our past. These particular reasons also encouraged to the selection of the dissertation topic, so at first this will focus on past history and development of Ajanta and Ellora caves and then it will look at the past record of tourist information and the with the help of available secondary data from Books, Journal articles, news papers past surveys and the information available from the internet, respective governments and non government agencies such as UNESCO, ICOMOS, IUCN, GHF, etc. Introduction: Cultural heritage conservation is always a centre of discussion in the form of developing economy of various nations. Cultural heritage tourism product is becoming a prime source for develop and developing countries. Countries like India where every tourist gets glimpses of diverse culture in his/her entire journey. India is primarily a cultural destination in international tourism in these are the features of India marketed as tourism product in international as well as domestic circuit. Domestic tourism competition already has begun in India from past decades every states government has been developing their strategies with the help of international organization to improve the tourism. In result due to sudden changes the competition can be seen among service providers as from hawkers to a large scale stakeholders. In scenario market everyones mind has been diverting toward the heritage sites in India, thus its creating trafficking of tourists as well as service providers. So it is affecting the quality of services and facilities. So it shows a different picture of hospitality and tourism industry in India. Visitors/ tourists these are the main driver of tourism industries. Firstly, the different demands and requirement of individual is affecting on tourism industry in India such as tailor made tours and the class of tourist. Also the issues and understanding of heritage tourism by people it may be visitors/tourists or local communities are different. There are two types of tourists are who has interested to visit a cultural sites around the world and the second one who Most of the peoples travel interest is to watch heritage sites around the world and some leisure activity thus it boosting the economy of respective destination. The most important part of tourism is a cultural as well as natural heritage property. So it always remains prime attraction to most of the people to come and enjoy their holidays. This dissertation will focus on the every aspects of cultural heritage tourism industry such as supply, demand, conservation management, interpretation, authenticity and politics of cultural heritage site. The primary data can receive with the help of some questionnaire to understand the real nature and find out what can do more to achieve the overall development at Ajanta and Ellora Caves at Aurangabad. To understand the World cultural heritage site here the UNESCO considers that as a monuments, architectural works, works of monumental sculpture and painting, elements or structures of an archaeological nature, inscriptions, cave dwellings and combinations of features, which are of outstanding universal value from the point of view of history, art or science; groups of buildings: groups of separate or connected buildings which, because of their architecture, their homogeneity or their place in the landscape, are of exceptional universal importance from the point of view of history, art or science; sites: works of man or the combined works of nature and man, and areas including archaeological sites which are of excellent universal value from the historical, aesthetic, ethnological or anthropological point of view. In contrast it is suggested that World Heritage Sites should not only be exemplary situations for the pursuit of research but also be closely identified with the creation and maintenance of different kinds of knowledge (Darvill, T., 2007). People always willing to learn new things or exchange the knowledge between each other, it is nothing but to become aware about our surroundings and changing of trends in scenario market. Here, In the Krakow Charter (2000), a monument is defined as a clearly determined entity, the bearer of values, which represent a support to memory. In it, memory recognises the aspects that are relevant to human performance and feelings, associated with the historic time-line (Vecco, M 2010). Economic In the Times of India there was an article about heritage tourism and in that the Atul Sethi has mentioned that Heritage can become a serious economic driver for India, if the country is able to get its act together. If we take an example as future 2025, so the picture of the heritage site will give different view as no beggars or touts in particular area like Maluti temple, a world heritage site in Jharkhand India. So tourist can enjoy the holistic experience of the temples and can savour the living legacy of the region. The heritage tourism in India is attracting hordes of international and domestic tourist and top of the line contributors to the countrys foreign exchange and GDP. The global heritage fund organizations 2010 report says that developing countries like India can tap a $ 100 billion a year opportunity by 2025, if they make sincere attempt to preserve and responsibly develop their heritage sites. Literature Review: Introduction: This chapter will investigate the perception of cultural heritage tourism and visitor management as well as development of tourism at site by reviewing several concerned literatures. The review will start with the overview of cultural heritage tourism including the concept of Culture, heritage, cultural heritage tourism and cave architecture from different World Heritage Sites to understand the their current scenario of cultural heritage tourism management. The review will be followed by the discussion on visitor impacts, their experience and management. Also it will focus on the intermediaries of cultural heritage tourism. Cultural heritage tourism: Cultural Tourism is the subset of tourism that is defined as travel directed toward experiencing the traditional and contemporary culture, arts, and special character of a place. This includes the performing, visual and literary arts, language, museums, heritage, crafts, architecture, design, film and broadcasting. The primary benefit of cultural tourism is economic impact. There are plenty of statistics that talk about the fact that travellers who participate in cultural activities spend more money and stay longer than leisure travellers. A good cultural tourism plan shapes and defines a communitys image, both to itself and to the outside world Cultural tourism and cultural heritage management work as equivalent activities in most places with really little conversation between the two (Mckercher and Du Cros, 2002). As it shows common interest between the cultural and cultural heritage is the management, conservation, and preservation of the cultural and heritage properties. So the results of this many lost opportunities to provide value to visitor experiences even though managing rare and weak resources in a social context, environmentally and ethically responsible and sustainable manner. Sometimes this loss results in some (and scholars stress some) unprincipled tourism operator exploring local culture and heritage assets for their own personal gain (Mckercher and Du Cros, 2002). Hall and Zeppel (1990a:87 in Timothy and Boyd, 2003) stated that relation between cultural and heritage tourism is: Cultural heritage is experiential tourism based on being involved in and stimulated by the performing arts and festivals. Heritage tourism, whether in the form of visiting preferred landscapes, historic sites, buildings or monuments is also experiential tourism in the sense of seeking an encounter with nature or feeling part of the history of a place. Most researchers believe that heritage is linked to the past which symbolizes some sort of gift to be passed down to current as well as future generations, both in terms of cultural traditions and physical objects (Hardy, 1988 cited in Timothy and Boyd 2003). But in contrast many authors have pointed out that what elements of past a society need to maintain (Fladmark 1998; Graham et al., 2000; Hall and McArthur 1998 in Timothy and Boyd 2003). As there are many incidents all cannot link to the cultural aspects. This makes selective sort of heritage it assumes some aspect of value, that which is of personal value is labelled as personal or family heritage, whereas those values dictated by nations or communities become our heritage (Hall and McArthur 1998 cited in Timothy and Boyd 2003). Hall and Zappel (1990) observed differently that the connections between cultural and heritage tourism, stating that Cultural tourism is experiential tourism based on being involved in and stimulated by the performing arts, visual arts and festivals. Heritage tourism whether in the form of visiting preferred landscapes, historic sites, building or monuments, is also experiential tourism in the sense of seeking an encounter with nature or feeling part of the history of a place. However the most internationally accepted definition of heritage was defined by UNESCO that Heritage is our legacy from the past, what we live with today, and what we pass on to the future generations (UNESCO 2008a, p.5). Furthermore Timothy and Boyd (2003) stated that heritage can be divided into tangible immovable resources (e.g. national park, sanctuaries, monuments, buildings), tangible movable resources (e.g. objects in museums) and intangible resources including values, customs, ceremonies, lifestyles and experiences such as cultural events, currently UNESCO focusing on folk dances of south India as a cultural heritage( ). It defines that heritage tourism as an immersion in the natural history human heritage, arts, philosophy and institutions of another region or country (Timothy and Boyd 2003). The importance of Heritage The importance of heritage and reasons for preserving heritage can be described into four aspects which are social, economical, scientific and political (Hall and McArthur 1993a). In social significance, heritage refers to personal and collective identity people and society have which can lead to create a sense of belonging. The sense of belonging and social conscience is a driver to consider preservation in the first place. In terms of economic importance, heritage is preserved because of its value for tourism and recreation. As being a large scale business, heritage tourism can generate incomes for the sites either from visitor spending or sponsorship from various stakeholders (Hall and McArthur 1993a). Further mainly Heritage have scientific and educational importance since heritage attractions especially natural heritage sites such as national parks may have rare habitat and endangered species which will be useful for scientific researches as well as the monuments and wonders of the worlds creates more opportunities to the scientist and researchers to find out the exact meaning of the past it may be by digging by the archaeological department of each country or the scientific analysis of wall paintings at various world heritage sites (Hall and McArthur 1993a). In terms of political importance, Hall and McArthur (1993a, p. 9) state that the importance and demonstration of heritage may serve political ends as the conservation and interpretation of certain heritage attractions may serve to underline a particular version of history or to promote existing political values. Current tourist demand: According to (Pavliv, 2009) up gradation in the standard of living is become a main cause of rises in fluctuation of tourists spending for example the income generating from the modern tourism commodities. Modern tourists behaviour is the main factor in current tourism industry. As currently many of travel operations that could be from demand side or supply side are in boom because ease of accessing Information through internet. So the importance of information technology in the current industry is the main factor while considering the supply and demand of tourism industry. Also it can be assumed that the personal needs of the modern tourism have more influence compare to old masses of tourism. The current tourism mostly depended on economic mass and production to consume mass, standardized and rigidly packaged holidays. The new tourists are dictating the pace and direction of industry changes (Poon, 1993 in Pavlic, 2009). New tourists behaviour is the most important factor in the modern tourism development. Consequently, here the intention of the research is to find out the main factors and consequences of tourism demand changes. The researcher wants to find out if there is the universal type of tourist for the universal tourism supply or there are different types that require different marketing approach for example the e-tourism method to attract the tourists. Also the goals of the paper are to research the main causes of changes in modern tourism. The stated phenomenon has exerted a great influence onto the behavioural changes, as well as on the change in structure of the existing needs of tourist demand compare with the previous period. While the old mass tourism, apparently identical tourists were forced by the economic and mass production to consume mass, standardized and rigidly packaged holidays of every group of people and individual, new tourist consider the changes in this industry are and it affecting on their individual decision (Poon, 1993 cited in Pavlic, 2009). For ex: tour packages. Vellas Becherel (1997 in Pavlic, 2009) the modern tourist can be classified in various factors and in that three main factors which particularly in demand of travel of tourist firstly, demographic and communal changes. These factors mainly control by traditional and existing outbound market respectively these are two main markets in this industry so as far as concern it has enormous influence on the individual tourist as well as on international tourism. Secondly, leisure time and duration of holidays is greater than before as. Segmentation of holidays and market segmentation. Chapter 3 A case study of Ajanta and Ellora caves The consideration of architectural heritage had been a matter of national concern only at most the laws regarding protection of historic building in Europe date back to that period of their national borders. There are numerous cultural groups live in each country, but their scope never went beyond the boundaries. The cultural internationalism was a result of the First World War, with the formation of the confederation of Nations, and most of all of the Second World War, with the formation of the United Nations Organization and the establishment of the UNECO (ICOMOS, 2010). The chapter provides a literature review of cultural heritage tourism in India, Particularly at Ajanta and Ellora Caves World Heritage sites inscribed in 1983 by UNESCO at Aurangabad, India. These caves are great example of cave architecture from the 2nd to 6th century. It is mainly demonstrate the Buddhist, Jain and Hindu religion cultures. So, these studies will focuses on the religious diversity of cultures in India as well as it involve the importance of heritage visitors management at those sites. And then it will compare with other world heritage sites. As what can do more to maintain/sustain the balance between demand and supply side of heritage tourism industry in India. Increasing tourists and the conservation of heritage sites these are the main issues now days. So, as subsidizing product of tourism industry what are the main significance and characteristics of cultural heritage tourism and its importance around the world and in India particularly at Ajanta and Ellora caves . According to the UNESCO, the Ajanta Caves are the masterwork of the Archaeological rock cut caves. The first Buddhist cave monuments at Ajanta date from the 2nd and 1st centuries B.C. During the Gupta dynasty period (5th and 6th centuries A.D.), highly abundantly decorated caves were added to the original group. The paintings and sculptures of Ajanta, considered as a stunning success of Buddhist religious art, have had a considerable artistic influence. As it mentioned above the Ajanta caves depict the role of the Buddhist community, intellectual and religious halls, schools for self development based on the teaching of Vipassana. In the  Buddhist  tradition which means insight  into the nature of reality. Vipassana is one of worlds most ancient techniques of meditation; it is a practice of self-transformation through self-observation and  introspection. In English, vipassana  is often referred to simply as insight meditation. The caves also was a reception centres in the India of the Gupta and their immediate successors. The caves are located 100  km north-east of Ellora, 104  km from Aurangabad, Maharashtra India and 52  km from Jalgaon Railway Station. They are cut into the volcanic lava of the Deccan in the forest ravines of the Sahyadri Hills and are set in beautiful sylvan surroundings. The most important part is these magnificent caves containing carvings that depict the life of Buddha, and their carvings and sculptures are considered to be the beginning of classical Indian art. And this is main reason why tourist and researchers attract to those sites. The description of the caves is, the total number of caves are 30 but one is unfinished caves so the 29 caves were excavated beginning around 200 BC, but they were abandoned in AD 650 in favour of Ellora. In that five of the caves were temples and 24 were monasteries, thought to have been occupied by some 200 monks and artisans. After 7th century to 18th century there was no any supportive record has found, it may be because of increased forest surrounding of the site and that it was forgotten until their rediscovery by a British tiger-hunting party in 1819. The Ajanta site consists of 29 caves cut into the side of a cliff which rises above a wander in the Waghora River. Today the caves are reached by a road which runs along a terrace mid-way up the cliff; however each cave was once linked by a stairway to the edge of the water. This is a Buddhist community, comprises five sanctuaries or Chaitya-grihas  (caves number 9, 10, 19, 26 and 29) and monastic complex  sangharamas  or viharas. A first group of caves was formed in the 2nd century BC: the Chaitya-grihas open into the rock wall by doorways surmounted by a horse-shoe shaped bay. The ground plan is a basilical one: piers separate the principal nave from the side walkway which joins in the apsis to permit the ritual circumambulation behind the (commemorative monument). This rupestral architecture scrupulously reproduces the forms and elements visible in wooden constructions. A second group of caves was created at a later date, the 5th and 6th centuries AD, during the Gupta and post-Gupta periods. These caves were excavated during the supremacy of the Vakatakas and Guptas. According to inscriptions, Varahadeva, the minister of the Vakataka king, Harishena (c. AD 475-500), dedicated Cave 16 to the Buddhist sangha while Cave 17 was the gift of the prince, a feudatory. An inscription records that the Buddha image in Cave 4 was the gift of some Abhayanandi who hailed from Mathura. The earlier architectural formulas were re-employed but treated in an infinitely richer and more ample manner. The decoration attained, at this time, an unequalled splendour: the statuary is numerous (it was already permissible to represent Buddha as a human; these representations are found both on the facades and in the interior). Finally, the wall painting, profuse and sensitive, constitutes, no doubt, the most striking artistic achievement of Ajanta. Under the impulse of the Gupta dynasty, Indian art in effect reached its apogee. The Ajanta Caves are generally decorated with painted or sculpted figures of supple form and classic balance with which the name of the dynasty has remained synonymous. The refined lightness of the decoration, the balance of the compositions, the marvellous beauty of the feminine figures place the paintings of Ajanta among the major achievements of the Gupta and post-Gupta style and confer on them the ranking of a masterpiece of universal pictorial art. Here needs to understand the history of India as how the past events has changed its culture first major civilisation Indus River valley was found early five thousand years back. The twin cities of Mohenjodaro and Harappa World heritage site UNESCO now in Pakistan were ruled by priests and held the fundamentals of Hinduism. These civilisations are known to possess a sophisticated way of life, a highly developed sense of aesthetics, an astounding knowledge of town planning and an unreadable script language. The Indus culture at one point of time extended nearly a million square kilometres across the Indus river valley. It existed at the same time as the ancient civilizations of Egypt and Sumer but far outlasted them. Surviving for nearly a thousand years the Indus valley civilisation fell to tectonic upheavals in about 1700 BC, which caused a series of floods.   The Aryans came around 1500 BC, and that was the reason to the collapsing Indus Valley culture. At the dawn of Vedic ages the Aryans came in from the North and spread through large parts of India bringing with them their culture and religious beliefs. Pleased In 567 B.C. Siddhartha Gautama was born. After asceticism and  meditation, Siddhartha Gautama discovered the Buddhist  Middle Way-a path of moderation away from the extremes of self-indulgence and  self-mortification. Siddhartha Gautama attained enlightenment sitting under a  Pipal  tree, now known as the  Bodhi tree  in  Bodh Gaya, (A name of place) India Gautama, from then on, was known as  The Perfectly Self-Awakened One,  the  Samyaksambuddha. There are lots of paintings and sculptures Vipassana. During this time lived Mahavira, who founded the Jain Religion. The Indian subcontinent is full of caves and monuments devoted to these religions and are worth a visit.   After two hundred years, in the 4th century B.C., Emperor Ashoka, one of the greatest King of Indian histories, led the Mauryan Empire to take over almost all of what is now modern India. This great leader embraced Buddhism and built the group of monuments at Sanchi (a UNESCO world heritage site). The Ashoka pillar (four lions are seated back to back on single cut rock pillar) at Sarnath has been adopted by India as its national emblem and the  Dharma Chakra  on the Ashoka Pillar adorns the National Flag. They were followed by the Guptas in the north, while in the south part of India quite a few different Hindu empires, the Cholas, the Pandyas and the Cheras spread and grew, did business with Europe and other parts of Asia till the end of the 1100s. Christianity came in India at about the same time from Europe. Legend has it that St. Thomas the Apostle arrived in India in 52 A.D. Even earlier than that people of the Jewish religion arrived on Indias shores. In about the 7th century A.D. a group of Zoroastrians, or Parsees, landed in Gujarat and became a part of the large mix of religions in India today, each of which adds its important and distinctive flavour. In the 15th century Guru Nanak laid the foundation of the Sikh religion in Punjab. In 1192, Mohammed of Ghori, a ruler from Afghanistan, came into India and captured several places in the north including Delhi. When he went home he left one of his generals in charge who became the first Sultan of Delhi. During this time Islam, was introduced into a major part of Northern India. It can be mentioned that even before that, just after the period of the prophet, Islam was brought to the western coast of India by Arab traders and flourished in what is now Kerala. The Dehli Sultanate gradually took control of more and more of North India over the next 200 years, till Timur, who was called Timur the Lame or Tamberlane came from Turkey in 1398 to attack India. He and his army stole all the valuables that they could carry and left again, Soon the Mughals, who were from Iran, came in and took control of the north. In the meantime south, in 1336, the Hindu Vijayanagar empire was set up and became very strong. The Europeans Portuguese, French, Dutch, Danish and British started arriving in the early 1600s. The above people held territories in India and made a good friends as well as enemies among Indias rulers as they got more and more involved, with the Indian politics, however the British who eventually controlled most of India and finally made it one of their colonies. Two hundred years later, in the 4th century B.C., Emperor Ashoka, one of the greatest King of Indian histories, led the Mauryan Empire to take over almost all of what is now modern India. This great leader embraced Buddhism and built the group of monuments at Sanchi (a UNESCO world heritage site). The Ashoka pillar at Sarnath has been adopted by India as its national emblem and the  Dharma Chakra  on the Ashoka Pillar adorns the National Flag. They were followed by the Guptas in the north, while in the south part of India several different Hindu empires, the Cholas, the Pandyas and the Cheras spread and grew, trading with Europe and other parts of Asia till the end of the 1100s. Christianity entered India at about the same time from Europe. Legend has it that St. Thomas the Apostle arrived in India in 52 A.D. Even earlier than that people of the Jewish religion arrived on Indias shores. In approximately the 7th century A.D. a group of Zoroastrians, or Parsees, landed in Gujarat and became a part of the large mix of religions in India today, each of which adds its important and distinctive flavour. In the 15th century Guru Nanak laid the foundation of the Sikh religion in Punjab. To Top In 1192, Mohammed of Ghori, a ruler from Afghanistan, came into India and captured several places in the north including Delhi. When he went home he left one of his generals in charge who became the first Sultan of Delhi. During this time Islam, was introduced into a major part of Northern India. It may be mentioned that even before that, just after the period of the prophet, Islam was brought to the western coast of India by Arab traders and flourished in what is now Kerala. The Dehli Sultanate gradually took control of more and more of North India over the next 200 years, till Timur, who was called Timur the Lame or Tamberlane came from Turkey in 1398 to attack India. He and his army stole all the valuables that they could carry and left again, and after that the Delhi Sultanate was never so strong again. Soon the Mughals, who were from Iran, came in and took control of the north. In the meantime south, in 1336, the Hindu Vijayanagar empire was set up and became very strong. The Europeans Portuguese, French, Dutch, Danish and British started arriving in the early 1600s. All of them held territories in India and made friends and enemies among Indias rulers as they got more and more involved, with the Indian politics, but it was the British who eventually controlled most of India and finally made it one of their colonies. India got its independence from Britain in 1947 after a long struggle led mostly by Mahatma Gandhi. In the process of becoming independent, India became two countries instead of one. In the years since independence India has made huge progress and coped with great problems, and has developed its industry and its agriculture, and has maintained a system of government which makes it the largest democracy in the world. India got its independence from Britain in 1947. Since independence India has made huge evolution and muddle through with great problems, and has maintained a system of government which makes it the largest democracy in the world. Every community and nation try to protect, conserve and develop heritage as an asset, particularly to make them important tourist sites by developing better infrastructure and facilities, which offer a rich cultural experience to tourists and ensure cultural and natural heritage of the destination to be preserved and conserved. To extend INTACHs mandate beyond conservation, the Heritage Tourism Division was set up in December 2005. A cogent system of sustenance of heritage sites was evolved in the activities of the Division. This would allow people to have access to and understand heritage sites in complete detail. The Heritage Tourism Divisions primary work is to synergize heritage with tourism. The Division works for development of sustainable tourism connected with heritage as an asset. A development of tourist facilities is in harmony with the local eco-system and heritage architecture, and regulates sensitivity of design in architectural style of construction of any new tourist facilities. The aim of developing tourism is to conserve and utilize buildings to sustain their maintenance. Heritage Tourism development aspects are: Community Development of tourist receiving destination Socio-economic Growth of the receiving community Preservation and Conservation of cultural and natural heritage sites Income Generation