Saturday, January 25, 2020

Survey on Traffic Pattern Discovery in Mobile Ad hoc Network

Survey on Traffic Pattern Discovery in Mobile Ad hoc Network Priyanka Sen Priti Saktel Abstract— Mobile Ad-hoc Network (MANET) is one of the networks of mobile routers that is self-configuring and connected by wireless links. Anonymity communication is one of the major issues in MANET. Though there are many anonymity enhancing techniques that have been proposed based on packet encryption to protect the communication anonymity of mobile ad hoc networks. There are still passive statistical traffic analysis attacks that can be vulnerable to MANET. The communication anonymity consists of two aspects: source/destination anonymity and end-to-end anonymity. In order to discover the communication pattern without decrypting the captured packets, this proposed system will be designed. The proposed system will first search the required node by using a heuristic approach. Then statistical traffic analysis will be performed to find the data transmission of the searched node to its neighboring nodes. After performing the statistical traffic analysis whether the search node is source or destination will be estimated. With the help of this estimation the traffic pattern will be discovered. The utility of this proposed system is basically in military environment. Keywords— Mobile Ad hoc Network (MANET), anonymity communication, statistical traffic analysis. I. Introduction Mobile ad hoc network (MANET) is a self configuring infrastructure less network of mobile devices connected by wireless network. It is one of the types of ad hoc network. Every device in MANET is independent to move. This results in changes of link of such device. Thus MANET is also known as an infrastructure less network. The devices that are present in the network must forward the traffic to other devices. In MANET each device must act as a router. The basic figure of a mobile ad hoc network can be illustrated in Fig 1. One of the critical issues of MANET is communication anonymity. Anonymity can be defined as the state in which identity of an object that performs the action is hidden. An anonymous communication system can be defined as a technology that hides the object identity. Communication anonymity [1] has two aspects: Source/destination anonymity and End-to-End relationship anonymity. In source/destination anonymity it is difficult to identify the sources or the destinations of the network flows while in end-to-end relationship anonymity it is difficult to identify the end to- end communication relations. In MANET communication anonymity has been proposed by anonymous routing protocols such as ANODR (ANonymous On-Demand Routing) [7], OLAR (On-demand Lightweight Anonymous Routing) [6]. All these anonymous routing protocols rely on packet encryption to hide the information from attackers. Still the passive attackers can eavesdrop on the wireless channel, intercept the transmission, and then perform traffic analysis attacks. Traffic analysis [10] is one of the types of passive attack in MANET. Traffic analysis is further subdivided into predecessor attack [8] and disclosure attack [9]. The following are the three nature of MANET due to which above approaches do not work well to analyze traffic in MANET: 1) Broadcasting nature: In wired networks point to point transmission can be easily applied to only one possible receiver. While in wireless network message is broadcasted to multiple receivers. 2) Ad hoc nature: Mobile node can be served as both source and destination. This can create confusion to determine the role of the node. 3) Mobile nature: Traffic analysis model do not consider the mobility of communication peers. This makes the communication among mobile node more complex. There is a need of such a technology which can analyze traffic without any interruption of the above three characteristics of MANET. This proposed system fulfills the need. The objective of this paper is to show that passive attackers can perform traffic analysis without the knowledge of the adversaries. This approach is required in military environment. The proposed system will perform statistical traffic analysis to discover the traffic pattern. This system will perform the point to point as well as end-to-end traffic analysis among receivers. Indirectly this calculation will provide probable source and destination of the network that will discover the hidden traffic pattern. Thus the adversaries will not be able to know about the traffic analysis. Fig. 1. Mobile Ad hoc Network The remaining paper is organized as follows: Section II describes the previous work. Section III presents the proposed work. Section IV describes the expected outcome of the proposed system. Lastly section V presents the conclusion. II. PREVIOUS WORK Yang Qin, Dijiang Huang and Bing Li [1], proposed that though there are many anonymous routing protocols and anonymous enhancing techniques available still mobile ad hoc network (MANET) is vulnerable to passive statistical traffic analysis attacks. The authors proposed a system called as Statistical Traffic Pattern Discovery System (STARS). A STAR is used to discover the hidden traffic pattern in MANET. The drawback of this proposed system is that no searching algorithm is applied to search the traffic free path. Douglas Kelly, Richard Raines, Rusty Baldwin, Michael Grimaila, and Barry Mullins [2], investigated on anonymity. For a user anonymity can be defined as using any services while keeping their identity hidden from an adversary. Anonymity help user to protect their data from attacks. Unidentifiability, Unlinkability, and Unobservability are the three properties of anonymity. Unidentifiability means the adversary is unable to determine one’s identity or action among similar ones. Unlinkability means the adversary is unable to relate messages or actions by observing the system. Unobservability means the adversary is unable to observe the presence of messages or action in the system. Since unobservability keeps the identity of messages or action secret it can be implied as anonymity. Unidentifiability is subdivided into sender anonymity (SA), receiver anonymity (RA), mutual anonymity (MA) and group anonymity (GA). Unlinkability is subdivided into location anonymity (LA), communicat ion anonymity (CA) and group communication anonymity (GCA). In order to discover the traffic pattern we have to work on unidentifiability property of anonymity and decrease the sender anonymity (SA) and receiver anonymity (RA). Lei Liu, Xiaolong Jin, Geyong Min, and Li Xu [3], proposed that in order to detect the attack in a network traffic intensity and packet number are the two important metrics. Lei et al. had designed an anomaly detection system. This anomaly detection system is used to detect the distributed denial of service (DDoS) attack in MANET. When traffic analysis is carried on MANET these two metrics are used to detect the DDoS attack. Similarly when traffic analysis will be carried on our proposed system data transmission will be considered as a parameter. We can conclude that data transmission will be an important factor whenever traffic analysis will be carried out, though the reason may be for detection of attack or for discovery of traffic pattern. Zhilin Zhang and Yu Zhang [4], introduced that control traffic plays an important role in route discovery in MANET. The characteristic that involve to carry out research on control traffic in MANET when on demand routing protocols are used include distribution of nodes’ control packet traffic, communication of control packets between nodes, rate of RREQ (route request) packets and the ratio of number of RREQ packets originating from one node to all RREQ packets relayed by this node. These characteristics of control traffic are affected by factors such as mobility, node density and data traffic. Thus theoretically we can determine that indirectly one of the factors of control traffic is data traffic. Hence we can conclude that control traffic will also play an important role in route discovery in our proposed system though the situation will be different. In our proposed system we will find traffic free path i.e. control traffic path so that it will be easy to find out the numb er of data packets transmitted to neighboring nodes. This will help us to discover route in our proposed system. Y. Liu, R. Zhang, J. Shi, and Y. Zhang [5] designed a novel algorithm called as traffic inference algorithm (TIA) which allows an adversary to infer the traffic pattern in MANET. This algorithm is based on the assumption that difference between data frames, routing frames and MAC control frames is visible to passive adversaries. Through these differences they can identify the point-to-point traffic using the MAC control frames, recognize the end-to-end traffic by tracing the routing frames and then find out the actual traffic pattern using the data frames. This algorithm is not a successful invention as it depends on the deterministic network behaviors. Stephen Dabideen and J.J. Garcia-Luna-Aceves [6], proposed that routing in MANET using depth first search (DFS) is feasible as well as efficient than breadth first search (BFS). The algorithm introduced is called as ordered walk search algorithm (OSA). The objective of this algorithm is to take advantage of the smaller time complexity of BFS and combine it with the low communication complexity of DFS in order to improve the efficiency of the search through the known path information. In order to demonstrate the effectiveness of OSA, ordered walk with learning (OWL) routing protocol has been presented which uses DFS to establish and repair paths from the source to the destination with minimum signaling overhead and fast convergence. The following are the advantages of DFS over BFS that had been investigated by Stephen et al. in MANET: (i) DFS require less overhead as compared to BFS. When large number of nodes is performing BFS, the routing TABLE 1 COMPARISON OF SEARCHING ALGORITHMS overhead can saturate the network making it difficult to deliver any packets. However DFS use only small network for routing. (ii) When BFS is used in a network, where there are multiple flows of search packets this situation can lead to increase the load on network and loss of packets. On the other hand as DFS involves only a small part of the network, thus this reduces the load in the network and results in less packet loss. A comparative study of searching algorithms is shown in TABLE I. From this table we conclude that DFS is better searching algorithm for MANET than BFS. III. PROPOSED WORK One of the characteristic of MANET is that all the nodes are hidden. This proposed system will unhide the nodes by using one of the searching algorithms. The searching algorithm chosen for searching the node will be depth first search (DFS). Source node will use DFS algorithm for traversing or searching the path in the network. Then statistical traffic pattern analysis will be performed on these searched nodes. This analysis will provide an estimation of the data transmitted to all the neighboring nodes of every searched node. We can discover the traffic pattern by using probability distribution. The working of each of the module is explained in detailed below. A. Searching node in MANET using depth first search. In this proposed system we are using DFS for routing decisions. When a node receives message for the first time, it sorts all its neighboring nodes according to their distance to destination and then uses that same order in DFS algorithm. It starts its searching from the source node and updates one hop neighbors. This search continues to reach traffic free path between source and destination node. As shown in Fig. 2, depth first search works on tree or graph. The Fig. 2 gives an example of DFS routing path for the following graph: The searching starts from root node A. It is assumed that the left edges are selected than the right edges. Each node remembers the last visiting nodes which help to backtrack and reach the last node to complete the traversing. From Fig. 2 the path will be: A, B, D, E, C, and F. B. Statistical traffic analysis of packets in MANET For point-to-point (one hop) traffic in a certain period, first build point-to-point traffic matrices such that each traffic Fig. 2. Depth First Search matrix only contains independent hop packets. There can be situation in which two packets captured at different time could be the same packet appearing at different location. In order to avoid a single point-to-point traffic matrix form containing two dependent packets time slicing technique is used. Time slice technique is technique in which the process is allowed to run in a preemptive multitasking system. This is called as the time slice or quantum. The scheduler runs once every time slice to choose the next process to run. In this proposed system a sequence of snapshots during a time interval constructs a slice represented by a traffic matrix. The traffic matrix is denoted by W. This traffic matrix will consists of traffic volume from one node to another. For example, Here 1 indicates that there is transmission of data (traffic volume) from node 1 to node 2 whereas 0 indicate that there is no transmission of data between the two nodes. C. Discovery of system The traffic matrix tell us the deduce point-to-point and end-to-end traffic volume between each pair of nodes. We need to discover the actual source or destination in order to discover the traffic pattern. Here probability distribution is used. Probability distribution calculates the probability of the data transmitted to neighboring node which provide an accurate estimation of a node as source or destination. This will help to discover the traffic pattern. The equation required for source probability distribution is The equation required for destination probability distribution is Fig.3. System Flow Diagram Where s’(i) is the source vector, N is number of nodes, r(i,j) is the accumulative traffic volume from node i to node j, d’(i) is the destination vector. In the Fig. 3, the flow of the proposed system is explained. When the system will start it will form a network. This network will consist of certain number of nodes. All the nodes will be browsed. In order to search the node a heuristic searching algorithm will be applied. If the required node is present then statistical traffic analysis will be performed on it. After performing statistical traffic analysis probability distribution will be applied to discover the traffic pattern. However, if the required node is not found then the system will stop and no further process will be carried out. IV. EXPECTED OUTCOME From the idea of the proposed system we are clear with two outcomes. The outcomes will be to discover traffic pattern in MANET and to find probability of point to point transmission among receivers. These two outcomes are discussed below. 1. Discovery of traffic pattern in MANET The first step to discover traffic pattern will be searching a node. Then using point-to-point traffic matrix and end-to-end traffic matrix a statistical traffic analysis will be performed. The parameter to be considered for traffic pattern discovery will be number of data transmitted. 2. Probability of point to point transmission among receivers is estimated Point-to-Point transmission can be estimated by point-to-point traffic matrix. This matrix will consists of traffic volume between each node at one hop distance. The calculated traffic matrix will be used to determine the probability of point to point transmission among receivers. V. CONCLUSION The proposed system will be an attacking system. As nodes are hidden in MANET a heuristic searching algorithm will be applied. This heuristic searching algorithm will be depth first search (DFS).This system will perform statistical traffic analysis to find the data transmission between one to one and one to many nodes. Probability of point to point transmission among receivers will be estimated by point-to-point traffic matrix. Then by calculating multihop traffic and performing probability distribution the traffic pattern will be discovered. This will provide an approximate traffic pattern with approximate source and destination in the network. The proposed system will reduce the issue of anonymous communication in mobile ad hoc network (MANET). REFERENCES Yang Qin, Dijiang Huang and Bing Li â€Å"STARS: A Statistical Traffic Pattern Discovery System for MANETs† IEEE Transactions on Dependable and Secure Computing, Vol. 11, No. 2, March/April 2014. Douglas Kelly, Richard Raines, Rusty Baldwin, Michael Grimaila, and Barry Mullins, â€Å"Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics†, IEEE Communications Surveys Tutorials, Vol. 14, No. 2, Second Quarter 2012. Lei Liu, Xiaolong Jin, Geyong Min, and Li Xu, â€Å"Real-Time Diagnosis of Network Anomaly based on Statistical Traffic Analysis†, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012. Zhilin Zhang and Yu Zhang, â€Å"Control Traffic Analysis of On-Demand Routing Protocol in Mobile Ad-hoc Networks†, IEEE Second International Conference on Networking and Distributed Computing, 2011 Y. Liu, R. Zhang, J. Shi, and Y. Zhang, â€Å"Traffic Inference in Anonymous MANETs,† Proc. IEEE Seventh Ann. Comm. Soc. Conf. Sensor Mesh and Ad Hoc Comm. and Networks, pp. 1-9, 2010. Stephen Dabideen and J.J. Garcia-Luna-Aceves, â€Å"OWL: Towards Scalable Routing In MANETs Using Depth-First Search On Demand†, IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Oct 2009. Y. Qin and D. Huang, â€Å"OLAR: On-Demand Lightweight Anonymous Routing in MANETs,† Proc.Fourth Int’l Conf. Mobile Computing and Ubiquitous Networking, pp. 72-79, 2008. J. Kong, X. Hong, and M. Gerla, â€Å"An Identity-Free and On- Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks,† IEEE Trans. Mobile Computing, vol. 6, no. 8, pp.888-902, Aug. 2007. M. Wright, M. Adler, B. Levine, and C. Shields, â€Å"The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems,† ACM Trans. Information and System Security, vol. 7, no. 4, pp. 489-522, 2004. G. Danezis, â€Å"Statistical Disclosure Attacks: Traffic Confirmation in Open Environments,† Proc. Security and Privacy in the Age of Uncertainty, vol. 122, pp. 421-426, 2003. J. Raymond, â€Å"Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems,† Proc. Int’l Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity Unobservability, pp. 10-29, 2001.

Friday, January 17, 2020

7 Habits of Highly Effective People – Restoring the Character Ethic

The Seven Habits of Highly Effective People Restoring The Character Ethic By Stephen R. Covey While I was reading ‘The 7 habits of highly effective people’ by Stephen R. Convey, many things were running through my mind. Stephen R. Convey’s words encourages us to live our life by some specific â€Å"principles† which can represent our overall effectiveness as a human in individual or social context. This book helps us to know â€Å" How our habits can affect our character† and â€Å" How our character can affect our destiny†. I am completely agree with Steven R. Convey’s The 7 habits of highly effective people’s principles and will try to evaluate their significance in general life. There are 7 habits mentioned by Steven R. Convey in his book by adopting them in our everyday life we can become highly effective people. He defined Habits as the combination of Knowledge, skills and desire. By adopting all these habits in our everyday life, mentioned in his book, we can move through the maturity continuum day by day. Initially, according to first three habits of Convey, we move from dependence to Independence (private victory) and later by four habits we move from Independence to Interdependence (public victory). In his words, â€Å" How we apply a principle will vary greatly and will be determined by our unique strengths, talents, and creativity, but, ultimately, success in any endeavour is always derived from acting in harmony with the principles to which the success is tied. † I like the Convey’s style of writing and the way he structured his book, The Seven Habits of Highly Effective People. The words he used and the forms in which they are used are very simple and different from what we are used to seeing today’s literature. I think, this is one of the main reason why Stephen R. Convey is on the bestseller lists having sold more than fifteen Millon copies. Every single people in the world, who want to be a leader in personal and professional level want to know more about Stephen R. Convey’s The Seven Habits of Highly Effective People. PARADIGM The Seven Habits of Highly Effective People begins with the notion that every people perceive the world differently. They have their own unique â€Å"lens† to view the world, so; it’s nearly impossible to separate observation from the observer. In Convey view, all of us have our own paradigm. In general sense, paradigm is a way we see the world around us in terms of perceiving, understanding and interpreting, not in terms of visual sense of sight. Convey writes, â€Å" Depend on our way to see things, our behaviour and attitude change. The way we perceive things is the main source of the way we think and act toward that situation. † These paradigms are the main source for defining our behaviour and attitude towards any particular situation. I quite agree with his statement, that we cannot act and think outside of the paradigm in which we find ourself. It’s true that we cannot talk and walk differently than what we seeing and perceiving in any moment. We can try to change our outward behaviour and attitude for very little time but finally we have to find out actual paradigms from which those behaviour and attitude flows, because in the long run we can’t sustained same attitude and behaviour for paradigm different than the one where these attitude and behaviour actually belong. PARADIGM SHIFT Thomas Kuhn was very highly influential author who introduced ‘Paradigm Shift’ words first time into his own book: The Structure of Scientific Revolutions. Kuhn mentioned in this book that for every breakthrough in any field of human endeavour is start by breaking old and traditional paradigms. Convey tell this paradigm Shift as an â€Å"Aha† experience, when someone sees the picture from another view or angle. It has been observed that if a person is more bound to his initial perception, this ‘Aha’ experience is more intensive in his case. Its true in my case as well, I often felt this Aha’ experience many times in my life. Whenever my paradigm shifts, I see things differently, and because I see differently, I feel differently, and because I feel differently I behave differently. During this paradigm shift process, I don’t have to worry about controlling my behaviour and attitude; they change by themselves. According to convey, sometime s just a little knowledge is quite enough to examine our paradigm shift and sometimes people need life threatening experiences or complete role change in a their life to realise paradigm shift. As we know, many people want to be successful and effective in their respected lives. They have some desires, goals and dreams to full fill but they are reluctant to honestly examine our own paradigm. They are unwilling to look at the things in the way they supposed to look. This can be easily understood by the story of the manager, who was taking management training classes and seminars. Although, he was very friendly with his employees but he never seen any sign of loyalty and responsibility from his employees toward him. He knew, that if he took a day off from his work, his employees would spend all day by walking and talking around water cooler. Convey suggest the manager to ask some question to himself before asking anything to employees like, â€Å" Despite, having friendly behaviour of my, are they disloyal employees so bold to ask me why I am treating them like a mechanical objects? † Having Knowledge of our own paradigm is good in many ways. By knowing our paradigm can help us to understand how we can interact with others, and that will help us to know how they interact with us. So, Convey suggests, we must examine own paradigm, motives and character. In my opinion, Convey is right. In our life, sometimes we have to examine our own paradigm first, and then put feet on someone else shoes. INSIDE-OUT APPROACH There is one ‘Inside-out’ approach mentioned by Stephen R. Convey. This Inside-out approach says that, â€Å" Every self-help program should begin with the Inside of man. Which mean if you want to have happy marriage relationship; we must start from ourself to cherish our relation. We shouldn’t expect or wait for our partner to do something for our relationship. SEVEN HABITS OF HIGHLY EFFECTIVE PEOPLE The Seven Habits Of Highly Effective People suggest us to implement all 7 habits into our life for being an effective people. First three habits mentioned by R. Convey are habits of independence. They will help us to achieve private victory or self-mastery. The remaining habits mentioned by Convey are habits of interdependence or public victory. These remaining four habits help us to effectively work with others. And I think its quite true, an any individual person who might be very good independently, but he is not good enough to think and act interdependently could be good individual producer but he can’t be good team member or team leader. HABITS OF INDEPENDENCE Habit 1: Be Proactive Convey says, each person has two circles around him, first circle is circle of influence and second circle is circle of concern. He says, if you worry endlessly about outside of your circle of influence then you never be proactive. If we work within our circle of influence than we will be very proactive. Moreover, the more effective we become, the more our circle of influence will expand. He tells us to be proactive in every situation. We should take the full responsibility of our actions. We are fully responsible for whatever happens to us in our life. We should believe in ourself to shape up our future. We are the only one who knows our strengths and weakness. We can understand our abilities only in difficult problems because this problem makes us solve it by different-different approaches. And during this time we know more about our own physical and mental abilities and skills. I can elaborate this proactive-ness by giving my latest life experience. I enrolled in Leadership and Responsibility subject, for which I am writing this response paper. Our teacher Tom Anderson have told us before that, we have to one write 3000 words response paper after reading Stephen R. Convey’s The 7 Habits of Highly Effective People. Although, I bought this book at the beginning of my semester but I never read it. I was thinking that I have plenty of time to read it. I started reading this book just before 3 week from my final date. And I knew, that my actual job was not to prepare this response paper of 3000 words. But, I had to read Convey’s 7 habits and applied them in my daily behaviour (Which I will do later on my summer vacations). Anyway, I was telling you about proactive-ness by my example. As you can see if I start reading this novel after few more days I won’t be able to submit my assignment on time. And, I might fail this subject. No one going to be responsible for failing this subject because I had my books on time and I had plenty of time. Just because I didn’t take my action on right time I could failed that subject. Habit 2: Begin with the End in Mind â€Å"Begin with the end in mind† habits mean that whatever we do in our life, we should have clear picture about our goal. Convey says that some people start climbing the ladder of success and finally when they reach at the top they find that ladder was leaning against the wrong wall. As we all want to be very efficient and effective in our task. We can be very efficient but we can truly effective when we begin with the end in mind. And for setting ‘end in mind’ Convey suggests a process ‘Visualization’. Visualization is a process in which we visualize achieving our final goal like any athletic, performer and sales representative. Doing this process of visualization we create an internal â€Å"comfort zone† and when we find our self in final situation, we not find it completely foreign. It doesn’t scare us. In our daily life, mostly we all apply this habit of visualization in some extend. This visualization helps us to plan and schedule in advance before start our journey. As you can see in my previous example, I started reading this The7 Habits of Highly Effective People, just 3 weeks ago my paper submission due date. Otherwise, I have to request my lecturer to extend my submission date. I have visualised my plan and schedule in my mind before start reading my Stephen R. Convey’s book. Habit 3: Put First Things First After Habits 2 ‘Begin with the end in mind’ comes habit 3 ‘Put First Things first’. Perhaps after applying habit 2 or visualisation process we can have many things to do at same time. They all can be significant and can have positive impact on our life. But, probably we don’t do them because they aren’t urgent for us. We should know how & when we have to organise our priorities according to our needs. Sometimes we aren’t good in prioritising things and we realised the importance of it unless we end up in trouble paying for them. It’s really important for us to practice this habit as much as we can in our life. For example, my friends were calling me for going to night club with them on this coming Saturday, but going to night club is not so much important for me as much as I have to finish this response paper before its due date. So, finishing my Assignment on time is at the top of my priorities list. HABITS OF INTERDEPENDENCE Habit 4: Think Win/Win Convey points out that there are two kinds of people some are those who think Win/Win and other are those who think Win/Loss. The people who think Win/Win are those who are not selfish, they seeking mutually benefits for all. And people who think Win/Loss are those who are selfish. They always think about their own benefits, they don’t care about others. They believe that, ‘if I win, you lose’. People who think Win/Lose can be extremely effective, but they have trouble making good relationship. They people mainly focus on power and credentials, and sometimes these things drive other people away from them. To be successful, we should know, how to utilize strengths of others and how you can be benefits for them. We must find the Win/Win situation every time. Lets take an example of any organisation, in which business owner don’t share his profit with his employees. He enjoys all the profits generated by his employees’ hard work and dedication. He is thinking Win/Lose. So, what do you think, after sometime will his employees feel dedicative and cooperative towards him? I am sure he will not succeed in his business in long run, if he continuously being selfish. He should realised soon that overall performance will always good than individual performance. Habit 5: Seek First to Understand, Then to Be Understood In this habit ‘Seek First to Understand, Then to Be Understood’ convey suggests that, if we really want to think in Win/Win way than we should be very good listener. If we will not listen to anyone then how we will discover Win/Win deals. Most of the time we just pretend to be listening, actually we are busy in preparing our next sentence. In any communication we shouldn’t pretend to be active listener. In experts view, only 10% communication based on verbal, 30% by tones of our sound and rest 60% by our body language. In empathic listening, we usually use our ears with our eyes and heart. We can take an example of a Doctor, in his profession he should be very good listener. If any patient comes to meet him, he should have to listen him very carefully to know his problem and pain. If he won’t listen him carefully than this doctor can’t diagnose his patient properly. Habit 6: Synergize In Collins Dictionary, Synergy means the potential ability for individuals or groups to be more successful working together than on their own. This habit enclosed all the above habits mentioned above. After listening carefully to others we can combine and can work together for common goals. Convey says that we human have our own mental, emotional and psychological difference. And, for working together we should understand each other values completely so that no conflict will generate. When we work as a team member during any group assignment, we must ignore someone’s weakness and should strengthen his strength. Every group member has his or her different habit, values, behaviour and culture. So it’s common to have conflicts. By applying all the above habits (specially Synergize) we can resolve all the conflicts and work toward achieving our final assignment. Habit 7: Sharpen the Saw This is the last and most important Habit mentioned by Stephen R. Coney in his book The Seven Habits of Highly Effective People. As we have seen in Habit 3: Put First Things First, we must maintain Productivity (P) with future Product Capability (PC). â€Å"Sharpen the Saw,† means self –renewal. We must take out some time to harness our skills. Just like a machine, we will wear out very soon if we continuously work, so, we must take out some time to relax and learn new skills. It will improve us to be more productive in later stages. Convey defined four dimensions for personal renewal: Physical Renewal (do exercise, good food and control stress) Mental Renewal (Read, Visualize and Plan) Social or Emotional Renewal (Communicate with others) Spiritual Renewal (Religion, kindness, altruistic) CONCLUSION The Seven Habits of Highly Effective People is a magnum opus written by Stephen R. Convey. The language of this book is very simple and easy to understand. I would recommend this book to everyone whether he is a man or woman, boy or girl and young or old. Convey has provided numerous life-based examples, which make this book easier to understand. In my view, he has done an outstanding job in trying to improve individual’s life. This book: The Seven Habits of Highly Effective People is a real source for empowering individuals, families, society and business. REFERENCES (1) Stephen R. Convey (2004), The Seven Habits of Highly Effective People.

Thursday, January 9, 2020

Effects of Violent Video Games Essay - 1406 Words

Rhetorical Analysis Essay According to the article â€Å"Shooting in the Dark† author, Benedict Carey, states that studies today on violent video games show no concrete evidence on actually long term negative effects on gamers. Mr. Carey is not a researcher or scientist but is a veteran writer of neuroscience, neurology, and psychology. Throughout this article he gives factual evidence and quotes from scholarly sources such as doctors and researchers in the fields of behavior and psychology. The author gives ample explanation on evidence used from his sources to give the optimal understanding to the reader of the results and/or findings given by the sources. The article connects to the modern age of gamers with examples from big name video†¦show more content†¦Anderson to support his claim by showing that most blame of violent outbreaks in society are blamed on one single thing, like video games, but if you look at the studies there are some many different factors tha t affect the behavior of today’s society. The author then goes on to say â€Å"Most researchers in the field agree with Dr. Anderson evidence and findings,† which establishes an accepted respect of authority for his source. This gives the reader a feeling of comfort in knowing that these sources are scholarly and can be trusted. Another source used by the author explains a recent experiment by psychologists at Iowa State University have found that after a short usage of the fighting game â€Å"Mortal Kombat† that they indeed acted slightly more aggressive shortly following the experiment but ultimately couldn’t find any results in long term effects. Mr. Carey states â€Å"Many similar studies have found the same thing: A dose of violent gaming makes people act a little more rudely than they would otherwise, at least for a few minutes after playing, but little is found about what actually follows,† this gives more support to his claim by displaying that his claim is the generally accepted and agreed upon opinion of most scholars in this field of study. Throughout the article the author gives each of his source’s full detailed background to explain why they are creditable and trustworthyShow MoreRelatedVideo Games and Violent Video Games Effect1225 Words   |  5 Pages A video game is â€Å"an electronic game in which players control images on a television or computer screen† (Merriam-Webster). Video games have been entertaining and challenging gamers since the Game Boy to modern console games. Despite the simplicity of the definition of video games, a video game, especially ones containing violence can have a large effect on the gamer. Because of the realism and advancements in the video game industry, video games can influence the player, and can make the gamerRead MoreThe Effects Of Violent Video Games On Children1074 Words   |  5 PagesVideo Games. Anderson et al. (2008), Anderson et al. (2010), Browne and Hamilton-Giachritsis (2005), Erwin and Morton (2008), Gentile and Stone (2005), and Jason et al. (2005) revealed a correlation between violent video games with immediate and later aggressive behavior. All of the research for the effects of violent videos games are conducted on older children and current research has not yet studied young children or preschoolers. It is important to note what research exclaims about the long-termRead MoreEffects Of Violent Video Games Essay1712 Words   |  7 Pagesof all of the age groups, teeneagers love video games. Though some say â€Å"it’s just a game†, that simple game could be more of an impact than people think. At the moment teenagers may not see any change in their actions and emotions while playing video games. Violent video games in specific are a huge impact on Americans teenagers. Do parents actually pay attention to the things their children say while playing violent video games? No. Violent video games affect a great am ount of America’s teenagersRead MoreViolent Video Games Effect On Children1654 Words   |  7 Pagessamples of the dialog talked between kids who play games such as like â€Å"Call of Duty† or â€Å"Halo†. In today s age, kids frequently boast about the quantity of players they figured out how to kill while playing these video games. Two decades ago, this would not be the typical waste of time of an eleven year old, yet now kids are seeing this kind of brutal movement as simply one more approach to take a break on a Saturday morning. Since the video game market is blasting at this moment because of progressiveRead MoreThe Effects of Violent Video Games Essay1685 Words   |  7 Pages Since violent video games, like Mortal Kombat, were created, adolescents who play these games become more aggressive than before. To me, playing violent video games is unsafe for these people since they have the negative influence on these people. I believe that researching on t hat topic would help us get the sense of what problems to avoid. I wish to know what are the possible effects of violent video games on adolescents’ aggression. The independent variable is violent video games, and theRead MoreViolent Video Games Effects On Children934 Words   |  4 Pagestodays’ society is Violent video games effect negatively on youngsters. This issue is growing because many of these games are featured aggressive elements that lead youngsters towards violence. For most players, video games are fun but also violent games take over the lives of some player. Since the world of video games was started in the 1980s, the video games still getting new level of popularity in this world. Most people are getting really addictive of these violent video games. The first importantRead MoreThe Effects Of Violent Video Games On Emotion1570 Words   |  7 PagesThe effects Violent Video Games have on Emotion Tiffany Jones Professor Teresa Neal Psych 2300 Kennesaw State University Introduction Many studies have shown how harmful the effects of media violence can be for over 60 years, and some recent studies have shown that there may even be a direct correlation between a one’s emotions and their exposure to the highly concentrated violence in video games. It is also known that over 85% of video games today have at the very least some type ofRead MoreViolent Video Games and the Effects on the Youth800 Words   |  4 PagesViolent Video Games and the Effects on the Youth Today our world is surrounded by technology and new inventions that make our lives better. Some of the most popular of hobbies among children and teenagers are video games, but what many people don’t know is that they are bad for them. Violent video games in particular have been proven to not be appropriate for the age groups that play them and to have a negative effect on school, social behavior, and increase aggression. Kids who play violent videoRead MoreEffect of Violent Video Games on Teenagers1070 Words   |  5 PagesIntroduction Violent video games are special games, which negatively influences to the attitude and behavior. These video games are popular between children and teenagers. Since 1980-s years violent games are in political discussion. Because when teenagers usually play violent video games, they are becoming aggressive and then they face with psychological problems. For this, some people claim that violent games are harmful for society and they affect to behavior and health. It was interested inRead MoreViolent Video Games And Its Potential Effects3794 Words   |  16 PagesViolent contents within video games have become rampant especially amongst adolescents. At the same time, with the growing number of users being exposed to these games, it becomes crucial to research the potential threats which emerge from playing these games. What many may not realize is that research does assert how the violent contents within video games may lead to aggression, possibly from arousal and being desensitized to real violence. Whilst other researchers argue that the relationship between

Wednesday, January 1, 2020

The Era Of Reconstruction During The Civil War - 1630 Words

The freedmen fought hard for their freedom and even though they got their freedom it was followed by a brutal contraction, which was imposed by the white people. This contradiction is emblematic of the African-American experience. The era of reconstruction was a short-term success, a medium-term failure, and a foundation for the long-term successes of the civil rights movement in terms of black freedom. The era of reconstruction exposed the radical limits of freedom for natural born citizens in the post-civil war United States. The idea of freedom changed in a tremendous way for the blacks. I would like to begin by asking the same question James A. Garfield had asked in 1865, â€Å"What is freedom†, is it a bare privilege of not being†¦show more content†¦His story â€Å"Twelve Years a slave† has been made into a movie and is very heart touching. In his story he described what it was like to be treated as human property. Background Africans Americans were enslaved since the 17th century. By the time of the American revolution and the adoption of the the new constitution in 1787, the founder agreed to end the importation of slaves. But soon slavery was once again thriving in the southern United States. This was due to the introduction of the cotton mill. The outbreak of the civil war changed the future of the American nation, it determined what kind of a nation America would become. The main cause of the civil war was the uncompromising differences between the free and the so called slave states. After Lincoln was elected president in 1860, the southern states broke away from the federal union believing that Lincoln would restrict their right to own slaves. Slaves were treated very cruelly and many families were separated due to this. In 1857 Dred Scott ruled that slaves are subhuman property with no right of citizenship. The south defended their slave institutions by saying that the blacks are like children’s and were incapable of caring for themselves and slavery is what keeps them fed, clothed and occupied. Slaves worked all sorts of jobs but the majority worked in plantations. The civil war was one of the bitterest war in the American history. Many Americans died and many were left