Wednesday, July 31, 2019

Demand Elasticity of Luxury Automobiles Essay

In the luxury automobile market, there are many vehicles that boast high quality workmanship, luxurious appointments and powerful drivetrains. For this research paper, the midsize luxury sedan segment was chosen because most of the vehicles from the brands in this segment have similar features, power, and most importantly, price tags. The flagship models of the brands were not chosen since the features and amenities are very different from car to car to such a degree that it would be almost impossible to compare the models. The retail prices of the flagship vehicles also vary by a few thousand dollars, making a fair comparison between the models even more difficult. The midsize luxury sedan segment offers consumers a good mix of quality components and craftsmanship, luxurious amenities, and ample power for daily commuting. These vehicles are designed for consumers who want luxurious, high quality vehicles at a fair price. The vehicle chosen for this study is the all-new Lexus GS430 sedan. The Lexus’ two closest competitors are the BMW 545i and the Cadillac STS V8. The vehicles chosen are with all standard equipment but the navigation system option was added to each since the Lexus comes with it already loaded. The engine and transmission options were also chosen to equally match the vehicles in power and price. Since there is no central retail location where one can purchase any brand of vehicle they want, three dealerships were surveyed for price information for each brand of vehicle included in this study. Surveying three dealerships for pricing for the same car allows us to not only see the price differences from one dealership to another but also allows us to compare the price of that vehicle with another from a totally different make. See Appendix I for the results of the survey. The vehicles chosen in this study all boasted high quality craftsmanship coupled with fine materials. The materials used in the interior of the were applied tastefully, and generously. The body panel fit and finish of all three vehicles was good, but the BMW had the tightest tolerances of the group. The paint finish however left much to be desired from all three models. There was a lot of orange peel in the finish of the paint. The interior design of the three models was tasteful, with the Cadillac being the most conservative and the BMW the most radically designed interior. The Cadillac had a good mix of both radical design and conservative styling. The BMW had the iDrive system which has a short learning curve to it, but it is supposed to simplify how you use the systems in the car. There wasn’t enough time to learn how to fully utilize the features of the iDrive system, but, in my opinion, turning on the air conditioner shouldn’t require reading a manual or much less, attending a training session for how to use the device. The training session is provided by BMW to new owners of vehicles equipped with the system. The iDrive system will have an effect on a consumer’s decision to purchase the vehicle since some consumers may find it cumbersome to use. Cadillac’s functions and controls were very simple and straight-forward. The navigation system and radio controls were touch screen and were displayed on a rather large monitor. The controls were easy to use and logically placed. The Lexus had a good mix of conservative and radical styling. The controls were laid out logically and the interior looked very clean. The Lexus had a hideaway drawer that had a lot of controls and buttons in it that was easily tucked away out of view. All three models come standard with passenger and side air bags. They all come with a CD player and heated seats. A navigation system is available with each vehicle, but is standard on the GS430. To even out the playing field, the navigation option was added to the Cadillac and BMW. This change in options actually brought the prices of the vehicles very close together. The Lexus had the most front leg room; however the Cadillac had the most interior volume. All three models have about the same power output with the BMW being the most powerful with a 325HP engine. The Cadillac was a close second with a 320HP engine and the GS430 came last with a 300HP engine. They all achieve approximately the same miles per gallon in the city, but highway mileage varies between the three models with the BMW being the most efficient out of the group. The BMW gets 18 miles to the gallon in the city and 26 on the highway, the Lexus 18/23, and the Cadillac 16/22 miles to the gallon, respectively. The Lexus felt the most nimble because as was suspected, it had a lower curb weight than the other models. The transmissions on all models were super smooth and power delivery was consistent with throttle input. The Lexus had the smoothest ride out of all three, however it achieved this because of how disconnected it felt from the road. The lack of communication from the suspension to the driver in the Lexus leaves the driver uncertain of road conditions and forces the driver to rely on vehicle safety systems to keep the car stable. The BMW had a sport suspension which made the ride a little rougher than the others, but was the most responsive to inputs from the driver and was the best at communicating road conditions to the driver, and because of this offered the most interactive driving experience. The suspension was tight and allowed the sedan to maneuver like a sports car. The Cadillac also had a smooth ride, but road feel was more prominent which made the ride feel a little less smooth than the Lexus. The Cadillac maneuvered well, but a stiffer suspension would make this vehicle a real performer. In conclusion, the quality levels of all three vehicles were near the same level. The BMW had the tightest tolerances in fit and finish with the most responsive ride, though the iDrive system is sure to turn off some prospective buyers. The Lexus had a smooth ride with luxurious appointments throughout, whereas the Cadillac had a good mix of both performance and luxury. The Lexus and Cadillac also had a keyless entry and ignition system which allowed you to get into your car and turn it on without ever taking the key fob out of your pocket. The consumers who purchase these vehicles are mid-upper class citizens. They are price-conscious and would like to get the best bang for their buck when purchasing a luxury car. The difference in the prices of alternate vehicles may be the deciding factor when purchasing a vehicle in this class. I would suggest a slight price decrease for the Lexus so it would be priced below the Cadillac, making it the best bang for the buck all the while providing the same comforts and amenities as the BMW and the Cadillac. My estimation of the demand elasticity of luxury automobiles is that the demand is rather elastic. A slight change in price will cause a significant change in demand for that particular product. If the price of the Lexus, or for any model in this class for that matter, was to suddenly increase a few thousand dollars, that price increase would make consumers consider the Cadillac or BMW instead since they both have the same level of quality and features. â€Å"Consumption of goods and services that are considered a luxury can be easily reduced if the price rises. Hence demand tends to be more elastic for fur coats, luxury cars, extensive vacations, etc. Goods considered a necessity are so important that buyers tend to respond little to a price change. They do respond however, although demand tends to be price inelastic for such goods† (Walbert). Lower priced practical vehicles can be considered necessities since a price increase will not cause consumers to not purchase these products. A price change will not trigger them to wait until later when the price drops to purchase the car. They will purchase the vehicle at the price given since it is absolutely necessary to have the car. However this does not hold true for the luxury automobile market. Luxury automobiles are a much larger purchase than a practical commuter vehicle purchase. A consumer in the market for a luxury automobile can wait until there is a price decrease before purchasing the vehicle, hence making the demand elastic.

Tuesday, July 30, 2019

My Life Essay

Above anything else, I still think that the most ambiguous term, concept, and thing in the world aside from its existence is life. A person’s life can be the most difficult thing to describe, to define, to expound, and to measure. It will always be very challenging for an individual to summarize his of her entire life in nothing but words that do not even measure up to life’s vague beauty, wonders, and mysteries. But in the very best way that I can, combining everything I learned from writing, recounting history, and expressing my thoughts, I shall try to tell you what and how my life is so far. I will choose to tell how my life was in the past, what it is like now, and how I envision it to become in the future in my own tone and perspective. Simplicity is a very relative and subjective term. Some would associate this term with peace and serenity, but I would rather connect it with the ideas of non-extravagant beauty and non-chaotic momentum. And so, I would rather call my life a simple one in this sense. As for my childhood, I realized that this phase is not a completely natural incident and event which happens to everyone. In one way or another, and at least in my own life, I have come to understand that having a childhood is also partly an individual choice that people have to make. More importantly, having a happy childhood is the greater choice which people have to decide on whether they would have it or not. With regard to my own, I chose having a childhood and a worthwhile one. Twenty-three years ago, I cried meaningfully on the [insert date of birth; ex: 25th of December, 1986] which told my parents that I am already existing as a person. Throughout my entire childhood, I cried for various reasons — whenever I got hurt, got disappointed, felt sad, felt annoyed, and felt overwhelmingly happy. All these cries, my life proved, are part of growing up. In my life’s context, these things made me realize that I am but a human being who feels and learns to express what he feels whenever he feels the need for it. Growing up in Turkey, I can say that my past is as colorful and vibrant as my country. My mind never ran out of iridescent and crazy ideas when I was going through my primary and secondary levels of education. I think I owe to my parents the considerable amount of effort they had to sacrifice in order to give me and my one and only sister the kind of education which we can both be proud of. My heart never skipped a beat as it vigorously lived with the glorious days of my childhood and adolescent years when I felt like I was the most powerful and liberated man that God has ever created. In a nutshell, my childhood is something I would always want to reminisce over and over again. And so, I rekindle that vibrant feeling every now and then, especially now that I write this chronicle of my life. Excellence and being well-molded never fascinated me until my parents, together with my mentors at the previous schools that I attended, injected into my consciousness the significance of education to an individual’s betterment. I think that it safe to say that generally, young people dislike going to school very much; however, it was during those days, when I was on the verge of hating school, when I started to realize that education is actually the strongest foundation I could ever have that will equip me with the skills and knowledge to become a competent person in the future. As an average person who grew up with his parents in Istanbul, Turkey and who is still spending his days as a university student under the custody of his parents, I can say that I now have a considerably complete idea of what being a well-molded individual is like. Upon seeing and knowing successful people around me, I have to realize that all their authority, wealth, honor, valor come from a sufficient amount of education and dedication to it. But for me, aside from this, one thing which also aids in creating a well-molded individual in each person is his or her choice of submitting and staying under the guidance of his of her parents, for no parent shall wish for his or her child to go astray. And so, I chose to stay aligned with my parents’ guidance and proved to myself that indeed, parents have the innate ability to know the best and only the best for their children. I have never learned and realized the power of material things. I may have become fascinated with some, but one of the most amazing and valuable things I have learned in my life is that most of the things that can actually give true happiness to people are the intangible things that money cannot purchase in anyway. In several instances, I have also experienced the most typical emotional and psychological milestones that a human being goes through in life. As I entered adulthood, I have realized the value of true friendship and the value of having a special person caring for me. I have also been able to go through several rites of passage that defined my membership to the so called â€Å"in-circles† in my youth. Many times I fell hard and stood up again, never surrendering to the most miserable heartbreaks yet the most meaningful lessons that I can consider indispensable for the rest of my life. Truly, no material form of wealth and luxury can ever compare to the most special things that I regard as my greatest achievements in my life so far; and these include my self-dignity, the seemingly everlasting friendship that I share with my peers, the love I constantly receive from the people around me, and the bright future that shines ahead of me in this point of my life. I chose to value these intangible treasures that will last longer than me and than the ones that will fade after I passed. Yet, no matter how colorful or pleasant my writing will turn out to be, I also believe that life is not always a bed of roses. For several instances, I have received harsh criticisms from people who tried to judge me from a far and tried to measure me as a person without knowing me completely. I have faced several failures that brought me serious humiliation and deep self-disappointment. I also have failed to live up to other people’s expectations a number of times. At one point, I thought these falls were bound to identify and label me as an individual and as a man. But my hopes, aspirations, and visions inside of me that have been kept hidden behind these failures always manage to float above everything else and take over my consciousness. Thus, I chose to believe that I as an individual can only be judged and measured according to how strong and triumphant I succeeded after a fall and not by how hard I fell flat on the ground. I chose to tell you this tale of my life in my endeavor to give myself a hint on how I would want to envision myself in the future. If there is one thing this chronicle has taught me and made me understand about myself, it is that my life is truly made up of great choices, and each choice is a fruit of a trial-and-error process of learning. Right now, the life of being a university student is giving me all the positive thoughts of what my life ahead would become. I could be successful like today’s powerful and affluent people, yes I can say, but I would choose to follow this tale and make a success story of my own, keeping in mind all the vibrant memories I have had from my childhood, all the valuable lectures my parents and my mentors taught me, the inspiration that my sister, my friends, and loved ones gave me, and the indispensable lessons my failures made me realize. Most especially, I would choose to remember my own ambiguous yet insightful definition of what my life is right now and what it will be tomorrow. Thus, I would still choose, and in the future, I know there will still be more choices to make, but I guess that is what life is to me basically — a never-ending ball of choices which define who we are.

Monday, July 29, 2019

HRM Models

This report is about human resource management. Betcherman et al. (1994) defined human resource into three aspects: organizational and job design, organizational culture, and personnel policies and techniques as to ensure that the workers full prospective or potential can be achieved. According to Storey (2001:5) Human Resource management is defined as ‘a distinctive approach to employment management which seeks to achieve competitive advantage through the strategic deployment of a highly committed and capable workforce, using an integrated array of cultural, structural and personnel techniques. Marchington and Wilkinson, (2002) identified through research that people really do make the difference in human resource management. The truth behind this is that it’s supported on ‘high-commitment’ model which ensures that investing in people/human resource makes good business. This lay a foundation for the human resource professionals to make point that people rea lly are their most important resources to the organization which now leads to work out how principals can be then turned into practice. This report will show how human resource works in sports industry and there will be critical examine on hard and soft model followed in the Bolton Wanderers case study and which model is more prevalent and successful in day to day operations and management activities. Human resource management is the most important department in any organisation to improve their knowledge and increase a good strategy towards employees. Mainbody According to Storey (1992) there are two ideal and essential models of Human resource management one is ‘hard’ also known as Michigan model and other one is ‘soft’, i. . , Harvard model. The hard model of human resource management highlights the term ‘resource’ which adopts a logical approach in the management of employees in which people are taken as financial factor where cost must be controlled. Whereas, the soft model accentuate ‘human’ and hence training and development is given more emphasis in this model on a closer look to ensure the employee development and that the employees are adopting the strategies and policies so that a high level of staff can be achieved who can deliver their skills and give a better turnover in the competitive environment. Bratton and Gold, 1999) Michigan Model Legge (1995) states that in hard model there is a trend to see employees as to be supervised and mastered following quantitative, intellectual and calculative approach to get ensured that the work force is expeditiously positioned to get the maximum advantage. It is concerned with the no of employees and whether every single person is meeting the goals of the organisation. (Fombrun et al. , 1984). While planning the policies one part of hard model; administration need to know what is the turnover rate and is based more on statistics rather than behavioural science of human being (employees) and is more appropriate in sports sector where pressure of work is much more. Furthermore Michigan model is the human resource cycle, which starts from development, move forward to selection, performance, and appraisal and than back to development or to Reward. Related to Bolton Wanderers football club case study The development of the football club is the important part, but at Bolton Wanderers, it was not a good situation, because those were posted financially and have a high debt burden. The reason was a newly formed football stadium, when in 1999 Sam Allardyce was appointed as manager with the premises to promote the club from First Division to Premier League and to establish there with given opportunity. Moreover Bolton Wanderers ensure that every member was feeling to be a part of Bolton ‘family’. Furthermore the heavy debt burden effected on selection highly, because they could not attract the best players with huge salary. Thereby they decided to expand their scouting network and academic facilities to afford their own youth to be selected for the first team and prepared to play in a high level. So that many players, who was playing in first team came from their own team. So the club was trying to gain the commitment and goals of the players. The purpose of managing the system of rewards within the organisation is to attract and retain the human resources the organisation needs to achieve its objectives. To retain the services of players and maintain a high level of performance it is necessary to increase their motivation, commitment and flexibility by a variety of means, including appropriate management style, competitive compensation package and supportive culture (Armstrong and Murlis, 1994). This way clubs align their player and organisational objectives while the reward management is highlighted. Rewards not only comprise of just wages or salaries, bonus, commission, profit sharing but also non-financial rewards like for e. g. opportunities for career development. McKenna and Beech, 2002) Bolton Wanderers offered pay and a reward package to players and coaching staff, which was one of the some lowest costs within the Premier League. In addition the high investment in sport science was made that the player should be fit and can play and also the performance should be good. This technique was attracting some outstanding players because through the operation of these technique was for them possible to expand their playing careers. In addition players could advertise themselves for best club due to good performance. According to Cowling and mailer (1998) appraisals are essential to get a brief idea about the course of information which constantly elucidates the purpose and aims in pursuit of mutually agreed target between managers and subordinates. There are contradiction like people who support limiting its use, argues that linking it to pay can demoralize attempts to provide genuine criticism and an emotion-free review of strengths and weakness while the others who do think that the pay should be linked to appraisals debate that it helps in motivation and the employee involvement. In the sports context, employees in those cases receive appraisal from the news-channel, radio, newspaper and public. The satisfaction of the public is very important so they try to receive a good appraisal, which sometimes are not possible. A 360-degree performance based feedback can be done to obtain a collective review of the individual’s performance. A 360 degree, also known as multi-ratter feedback, is an appraisal technique in which ratings from numerous people like peers, boss, customers, team members, staff and self is taken and then from that feedback appraisals are done for the individual. Stone, 1998) Harvard Model In soft model alternative approaches through which problems can be solved are followed. (Beer et al. , 1984). The organisation attempts to balance the needs of the employees with the organisational requirements. The feelings of the employees are kept in mind rather than just thinking them as a mode of earning profit. The employees consent is seen notably. Staff dedication towards work is increased when they are involved in decision making and job design process. Furthermore Harvard model is the human resource system, where employees influence on human resource flow, reward and work system. Related to Bolton Wanderers Football Club case study As we can find out in the Bolton Wanderers case study training and development has been focused; to understand and learn about the organisation, their policies and implement them in the right way. Training comes under the soft model of human resource management. Training basically means learning the skills that are required in the organisation which is generally structured by the policy makers in such a way that it will develop the individual for the required work. There are two types of learning- learning as acquisition in which qualifications and skills attained are from formal structured courses; and learning as participation in which learning takes place while participating within the set of fellow workers. (Bach, 2005) Moreover the players and coaching staff influence the work system, through the decision if the player or the coach will work with each other. In Bolton Wanderers was the operation that the player from the youth has not any chance to choose the coach, because the still need a chance to play in first team and think afterwards to move to another club if there is any offer. Furthermore the reward is influenced by players to deliver a good performance, e. g. Bolton Wanderers was playing in season 2004-5 since 4 Years in Premier League and they also was attend in UEFA cup. Human resource flow conduced to motivated players from other players or coach. It is a high impact of employee staff such as coaching staff and players. Due to it increase the team work and every one is for each other there. Talking about hard model and soft model in the report, when we apply hard model which just focuses on placing skilled people required for the organisations objectives. Application of this model to the Bolton Wanderers which aims at reducing the costs ultimately leading to control and decrease the debt by following feedback method tells us that even when its important, applying Hard model does help in this case, as skills are required, rather than production. Finding right applicant for the right job is necessary rather than getting them in the job. Right recognition of an applicant is also very important as it saves the time for another recruitment it turns fail and thus, adds up to another cost in the accounts of an organization. Millmore et al. 2007) Conclusion To conclude the report it is better understood and observed that the applications of different models, practices and strategies have different implications depending on which industry we analyse the working and performance of the employees. Industries like banking or financial sectors have different set of rules to handle their employees inclining more on hard models of human resource mana gement. Where the sport industry also being success oriented centring the employees through their performance is inclined towards hard models.

Culture Research Paper Example | Topics and Well Written Essays - 1500 words

Culture - Research Paper Example In his book, Tylor defined culture as â€Å"that complex whole which includes knowledge, belief, art, law, morals, custom, and any other capabilities and habits acquired by man as a member of society† (Tylor cited in Haviland et al., 2013, p. 10). Culture is obviously not limited to men. Women’s role in the creation and possession of culture cannot be undermined. The concept of culture has become the mainstream topic in Anthropology ever since it was first used by Tylor. Culture is a very powerful survival tool for humans, though it is a sensitive phenomenon. Culture keeps changing constantly. Owing to the fact that culture is stored in the mind only, it can easily be lost as new trends set it. Culture is omnipresent and reflects in everything in the surroundings ranging from written languages to structures and events. The artifacts and broken pots discovered by the archaeologists from underneath the earth are such remains of old civilizations that define their cultural patterns. Old civilizations made those artifacts using their cultural skills and knowledge. People tend to identify cultures by observing materialistic things. â€Å"When we think of company culture, we focus on what we can see and touch – the foosball tables, happy hours, and free lunches. But these are only artifacts, what our culture produces. It’s much harder to pinpoint the root culture† (Wherry, 2014). Real culture is what causes people to purchase certain things and decorate the place with them. Culture as part of the learned patterns and perceptions of behavior has three layers. Cultural traditions play a pivotal role in giving a unique identity to a society. By Japanese, Italian, or Indian culture, people mean shared traditions, language, and beliefs that distinguish the people of one culture from those belonging to the other. In a vast majority of cases, people sharing a certain culture have

Sunday, July 28, 2019

Sexual Literacy Research (Sexual Orientation) Paper

Sexual Literacy (Sexual Orientation) - Research Paper Example Although, social factors like parenting styles and childhood experiences are maximally focused by various sections including social scientists, media, and common people, the role of biological or physiological factors assumes prominence based on number of researches. The article titled Prenatal Endocrine influences on Sexual Orientation and on Sexually Differentiated Childhood Behavior, written by Melissa Hines, and a book titled Gay, Straight and the Reason Why, written by Simon LeVay, focuses on this role of biological factors. So, this report analyses the above mentioned article and the book about sexual orientation to develop a plausible biological-based scientific explanation for the development of diverse sexual orientations in humans. LeVay in his book extensively covers topics regarding the factors responsible for sexual orientation. It includes prenatal neuro-hormonal effects, gender related brain organization in humans, cultural, psychological, and genetic influences (LeVay, 2011). Prenatal neuro-hormonal effects focus on how fetus can be exposed to hormones during pregnancy thereby influencing their sexual orientation (McCarthy, De Vries & Forger, 2009). According to researches, organization of the brain in males and females can also sway sexual orientation (Manning, 2002). When individuals face or exposed to certain cultural aspects, they are shown to exhibit homosexual or heterosexual behavior (Zucker, 2002). If certain experiences from childhood have a psychological impact, individuals’ sexual orientation can be influenced (Bem, 1996). Apart from these causes, LeVay (2011) focuses on how genetics can also influence the sexual orientation. He claims prenatal and hormonal factors as the most important determinants for one’s sexual orientation (LeVay, 2011). Similarly, the article claims evidences for

Saturday, July 27, 2019

The use of Derivatives markets and products by a company Essay

The use of Derivatives markets and products by a company - Essay Example Derivatives serve as ideal substitutes for complex investment strategies at a minimal cost. (Haugh and Lo 2001) Firms using derivatives have lesser risk exposure than which do not use.(Hentschel and Kothari, 2001) The banks who have used interest rate derivatives have shown higher growth in lending than those banks who do not use derivatives. (Brewer, Minton, and Moser 2000) From Micro-economic point of view, derivatives in different forms have the following functions. Swaps: These are mostly OTC contracts having longer period than options and futures and serve the purpose of meeting needs single client of a Bank or any institution. They afford firms to have new investment opportunities to hedge against any risks in currency rates, interest rates, and credit default etc. It is the periodical payments that represent the risks undertaken by these contracts and not their notional value. Futures: These are capable of increasing market efficiency and liquidity. Depending on national and international laws, this type of derivatives display very high transparency and are used to hedge and speculate in financial and commodity segments. Options: These are similar to futures but do not reflect clearly the underlying assets and do not give unique empirical results unlike options. The notional value does not represent the risk undertaken but the premium paid for opening and closing signify the extent of investment. Repos: These are unique to inter-banking transactions between RCB and European inter-bank system and are meant for finance liquidity rather than to hedge or speculate. The use of derivatives by a company is proposed to be demonstrated in this paper by the example of Glaxo Smithkline (GSK), world's one of the largest pharmaceutical giants. GSK uses derivatives among various finance instruments to finance its operations and manage market risks. The company's derivatives are mainly foreign currency contracts, interest rates and currency swaps. It uses them for swapping of its borrowings and liquid assets into currencies needed for the entire group of the plc. It uses derivatives to guard against changes in foreign exchange currency rates and interest rates. The derivatives are not used for speculation but only used to hedge against its own risks stemming from targeted business operations. It neither issues nor holds derivative financial instruments for trading purposes as a company policy. They are initially shown at cost in the Balance Sheet and revalued subsequently on the relevant reporting dates at fair value. The ones that are treated as hedges are designated as fair value hedges, cash flow hedges or net investment hedges. Changes in fair value of derivatives designated as fair value hedges are shown in the income s tatement with corresponding entries in the hedged asset or liability. Those designated as cash flow hedges are reflected in equity to the extent they are effective. The remaining portion that is not effective is reflected in profit and loss account at the same time. Those deferred in equity are later taken to income statement when the hedged asset results in

Friday, July 26, 2019

Physical Geography Essay Example | Topics and Well Written Essays - 500 words - 2

Physical Geography - Essay Example This implies that it reflects red and yellow light. Gold occurs in diverse geologic environments, and its classification into deposit categories is thus intricate. Geologists recognize two kinds of deposits or occurrence of gold, which entails the primary and secondary. These two kinds depend on the same physical and chemical process to generate economic concentrations of the gold ore. The primary type of occurrence often forms in a place that the gold precipitates, which happens during the chemical reaction involving hot fluids, mineralizing solutions and rocks of the Earth’s crust. Formation of the secondary deposits often occurs later when the mechanical and chemical processes of weathering, as well as erosion, take place. After the formation of these kinds of deposits, it is then easy to extract it using various techniques. Production of gold in Colorado is something that begun a long time ago. Colorado is one of the United States. History provides that Colorado started as a small town because of the gold trade and then later developed to what one can now see presently. There are a number of existing gold mines in Colorado that increasingly exploit this natural resource. Some of the districts within Colorado state where goldmines are exploited, include the Cripple Creek, as well as Victor goldmine. The economic contribution of gold to the state of Colorado can never be undermined. Gold has improved the economy of Colorado and had led to the construction of a number of infrastructural projects. Gold keeps on providing employment opportunities to the youths. Monotremes: They are primitive mammals that lay eggs. Marsupials: Their females have pouches, and their young are born immature and stay in these pouches. Placentals: Their young are born at a stage where they are somehow advanced, and before birth, their young are fed in the womb via the placenta. The Aepyornithidae and the Double Watted Cassowary are both birds that

Thursday, July 25, 2019

MPH599 - Culminating Project Mod 4Case Assignment Essay

MPH599 - Culminating Project Mod 4Case Assignment - Essay Example In doing so, they have data on what is being done and what is working. Involving a representative can only improve the work to be done. The Centers for Partnerships and Strategic Alliance also would be a helpful group to involve as they are involved in some of the granting that is being done for this problem and may be of great help to this group in determining funding that might be available. The NIHCM is a non-profit organization whose mission it is to promote improvement in health care access, management and quality and to foster dialogue and find creative workable solutions to American Health System Problems (nihcm.org). Further ASTHO which is a national nonprofit organization representing the state and territorial public health agencies of the US, US Territories, and District of Columbia (ASTHO.org). There is of course a need for involvement of the children themselves and their parents as anything that comes out of this affect them in some way. Physicians, School nurses and the health care community need to be involved as they are the primary people to carry out any of the plans or principles that come from this. They will also be the data collectors. The local community, schools, and Universities will need to determine how they can help with playgrounds and safe walking and biking trails. Finding tax money to make these improvements may be necessary and involving this group ahead of time will make that process easier. Last but not least are the schools and their contract with the vending machine industry. It makes no sense at all for a child to eat healthy food in the cafeteria and then be able to go out in the hall to get M&Ms. Of course, we know that this is a livelihood for many of these people but what will be needed is for them to change the kind of snacks that are available here. This includes things like Coke and Pepsi machines. This will not be an easy task, however, involving them early in the process will help the process become more

Wednesday, July 24, 2019

Women's and global leadership at bestfoods Case Study

Women's and global leadership at bestfoods - Case Study Example Ensuring that for each leadership position, a woman candidate must be present (Osland & Adler, 2007). Another method for promoting diversity include sending more women both of America and of non-American decent to senior management and development programs to shed a light on them on the possible leadership training offered to individuals. Understanding women and the barriers they face while at formal employment and support them. This is to be done by appreciating the effort that women contribute at work as well as the household needs they reach up to. At the same time, it is the look at work output in terms of delivery rather than time spent at work. Adding to that, many women at high levels to be selected for senior managerial positions at the company.Senior level management training offered to senior position holders promoted by companies could be beneficial to women if they had such positions(Osland & Adler, 2007). Brody is justified to hold the forum. This is because forums are an audience for all to be heard and the forum was to encompass women who are the sole victims in diversity at Bestfoods. The forum was to have 50% of women from outside the US, an enough indication of diversity. Possible alternatives that would generate the same agenda include holding seminars on gender diversity at work, pushing for bills that involve a certain limit in employment of women in each sector as well including women in the human resource departments of many companies (Osland & Adler, 2007). While pushing for the forum organization, Brody and Shoemate faced several challenges and programs. Brody and Shoemate’s ideas were not all met with a warm reception. Skeptical comments arose from some men and women who believed that the forum was not going to bear any results whatsoever. There was also the feeling of inferiority complex among some of the women selected to attend the forum. They felt that if in any case

Unnatural Causes Movie Review Example | Topics and Well Written Essays - 250 words

Unnatural Causes - Movie Review Example Social class and racism are not natural causes for sickness and hence the title of the film ‘unnatural causes’. The film is similar with other media that I have seen, read, and heard on the issues of health disparities and how it relates to one’s social class in that people in the lower social class are prone to disempowerment. Their economic status is low due to lack of the necessary resources and opportunities and hence they tend to get sick more often and their life expectancy is low. The people in this class are subject to chronic stress and cannot have access to better medical care services. They tend to get sick more often and hence live shorter lives. Exposure to chronic stress of race in a lifetime often leads to delivery of premature babies thus affecting health and life expectancy (California Newsreel, 2008). The film confirmed biases I had in regards to being poor rich, that wealthy people lead better, longer and healthy lives as compared to the poor (Haitkin, 2008). The question that surfaced for me during the film that I would like to know more about is how the health status of the low social class can improve. With America having the highest gross national product in the world, how can the poor have access to medical care and training on health issues? The statement that best describes what I learnt from the film is that health inequalities are not natural. This is because, health disparities that are because of racial and class inequities arise from the decisions the society makes (California Newsreel, 2008). As a future nurse, I propose that the society or the government should try to ensure that everyone gains access to health care regardless of their wealth in order to live longer and healthier

Tuesday, July 23, 2019

The Role of Testing of Employees as it Relates to the Selection Research Paper

The Role of Testing of Employees as it Relates to the Selection Process - Research Paper Example   According to Garrett, use of personality testing in the hiring process helps an employer select the best employees that fit his or her organization. Generally, Garret maintains that if personality testing is performed effectively, it can very well enable an employer to select the suitable workers that best suit the given type of work (Garrett, 2006). Additionally, pre-employment testing plays a very important role in selection as it helps reduce chances of an employer hiring a potentially dangerous person, a poor performer, and/or a criminally inclined worker. While statistics cite that, the traditional methods of hiring such as reference checks and interviews are still vital, they are largely subjective. However, with the standardized personality testing, benefits are recurrent as this process adds an objective instrument that when utilized to the maximum, it can help do away with or minimize cases of bias in the process of hiring (Gerald, 1993). Personality tests are variable. As such, they are able to give a great variety of results believed to be inaccurate when other modes of employee selection are used. Personality testing plays a major role in determining the respective form and content of a principal employee. In pre-employment testing, an employer gets a fundamental opportunity to test employee skills, integrity, handwriting, intelligence quotients, and other crucial characteristics (Garrett, 2006). These are essential to an employer as they help eliminate undesirable candidates. Furthermore, with personality testing, an employer is able to administer tests that assist in telling an employee is lying by measuring the employee’s honesty, which leads to the predisposition of negative or unruly behaviors such as theft. Indeed, personality testing in employee selection is very vital since it can also help in measuring comparative performance between and among candidates who appear equally considerable and good on paper. Sometimes back, many comp anies used to ignore the role played by psychological factors in an organization. As a result, research findings noted that compensation losses increased by a huge margin due to unreimbursed worker’s costs (Gerald, 1993). This showed that no matter how hard employers stressed on safe work practices, accidents still occurred in the workplace. Nevertheless, with the introduction of personality testing in employee selection, ergonomic analysis point out that risk managers are finding this strategy very effective in ensuring the safe working environment for all employees. As of today, it is turning out that, a huge body of evidence is demonstrating that pre-employment testing or psychological screening is an efficient tool that enables companies to select the best-suited employees for particular jobs. Based on that fact, it is however very important for risk managers to ensure that the administered tests meet the companies established the criterion for selecting the appropriate e mployees (Garrett, 2006). Personality testing helps determine the behavior traits of the job applicants. In general, some behavioral and personality traits of the applicants vary widely.  Ã‚  

Monday, July 22, 2019

PESTLE Analysis Template Essay Example for Free

PESTLE Analysis Template Essay Your notes Potential Impact: Implication and importance The list below is just to get you started. Remember to put these, and others that you add in the context of your organization or business. For example if you are a small private company the behaviours of a Wall Mart / Tesco or other large international player may well impact on you.If you are a local authority, government changes will change your priorities. In the NHS changes to treatments and public attitudes will also impact etc. About your organization.How might the factors listed on the left impact your business or part of the organization? H – HighM – MediumL – Low U – Undetermined Time Frame:0 – 6 months6 – 12 months 12 – 24 months 24 + months Type:Positive +Negative Unknown Impact:Increasing Unchanged = Decreasing Unknown Relative Importance:Critical Important Un-important Unknown Political – SWOT Trading policies Funding, grants and initiatives Home market lobbying/pressure groups International pressure groups Wars and conflict Government policies Government term and change Elections Inter-country relationships/attitudes Terrorism Political trends Governmental leadership Government structures Internal political issues Shareholder/ stakeholder needs/ demands ___________________ ___________________ ___________________ ___________________ ___________________ Economic – SWOT Home economy situation Home economy trends Overseas economies and trends General taxation issues Taxation changes specific to product/services Seasonality/weather issues Market and trade cycles Specific industry factors Market routes and distribution trends Customer/end-user drivers International trade/monetary issues Disposable income Job growth/unemployment Exchange rates Tariffs Inflation Interest and exchange rates Consumer confidence index Import/export ratios Production level Internal finance Internal cash flow ___________________ ___________________ ___________________ ___________________ ___________________ Social – SWOT Consumer attitudes and opinions Media views Law changes affecting social factors Brand, company, technology image Consumer buying patterns Major events and influences Buying access and trends Ethnic/religious factors Advertising and publicity Ethical issues Demographics (age, gender, race, family size,) Lifestyle changes Population shifts Education Trends Fads Diversity Immigration/emigration Health Living standards Housing trends Fashion role models Attitudes to work Attitudes to people doing certain types of work Leisure activities Occupations Earning capacity Staff attitudes Management style organizational culture Changes to education system ___________________ ___________________ ___________________ ___________________ ___________________ Technological – SWOT Competing technology development Research funding Associated/dependent technologies Replacement technology/solutions Maturity of technology Manufacturing maturity and capacity Information and communications Consumer buying mechanisms/technology Technology legislation Innovation potential Technology access, licensing, patents Intellectual property issues Global communications Inventions Innovations New discoveries Research Energy uses/sources/fuels Communications Rate of obsolescence Health (pharmaceutical, equipment, etc.) Manufacturing advances Information technology Internet Transportation Bio-tech Genetics Waste removal/recycling Email M-learning E-learning Collaboration tools Software changes RSI ___________________ ___________________ ___________________ ___________________ ___________________ Additional split of information if doing a PESTLE analysis rather than a PEST analysis: Legal – SWOT Current legislation home market Future legislation European/international legislation Regulatory bodies and processes Environmental regulations Employment law Consumer protection Industry-specific regulations competitive regulations ___________________ ___________________ ___________________ ___________________ ___________________ Environmental – SWOT Ecological Environmental issues International National Local Environmental regulations Customer values Market values Stakeholder/ investor values Staff attitudes Management style organizational culture Staff morale Staff engagement Global factors EU based factors ___________________ ___________________ ___________________ ___________________ ___________________ top Remember this is only a tool. Call it what you like – use whatever factors you feel are appropriate. Other variations include: PEST analysis (STEP analysis) Political, Economic, Sociological, Technological PESTLE/ PESTEL analysis- Political, Economic, Sociological, Technological, Legal, Environmental; PESTEL analysis PESTEL analysis- Political, Economic, Sociological, Technological, Environmental, Labour (Labor) related; PESTEL analysis (rare no references available) PESTLIED analysis- Political, Economic, Social, Technological, Legal, International, Environmental, Demographic STEEPLE analysis – Social/Demographic, Technological, Economic, Environmental, Political, Legal, Ethical SLEPT analysis – Social, Legal, Economic, Political, Technological STEPE analysis – Social, Technical, Economic, Political, and Ecological ETPS analysis – Economic, Technical, Political and Social – Scanning the business environment PESTLE Analysis on an HR department or other internal function While the PEST or PESTLE analysis is primarily aimed at looking at the external environment of an organization, many HR courses ask students to use the PEST or PESTLE analysis model to look at their own function. In this context we need to imagine that the department (HR) is an organization in its own right and look outside. Factors to include in your analysis may include the following: Political What is the culture of the organization, How is the HR function viewed by other functions? Who are the political champions of HR (or its adversaries)? Shareholder views Economic What is the budgetary position of the department, Is more money available? Are our customers likely to spend more or less money on the services we offer? What is happening to the financial status of the organization Interest rates Inflation Salary trends in the sector Sociological Other departmental attitudes to HR Population shifts (age profile) Education Fads Diversity Immigration/emigration Health Living standards Housing trends Fashion role models Age profile Attitudes to career Technological What changes may be coming our way? What new technology/ systems, How do we record attendance, performance? how might this change? Use of and encourage home working? Communications technologies changes of technology that will increase/ reduce the need for recruitment changes to HR software Legal What is happening in our sector that will impact what we do? Minimum wage, Working time, Food stuffs, Under 18 working, Occupational/ industrial Training etc. What changes will impact the services of the organization Environmental Staff morale Staff engagement Need to reduce storage needs Management attitudes (inside dept/ function) Organizational culture PESTLE Analysis for Schools or Education By rapidbi Last updated: Sunday, April 19, 2009 Save Share 2 Comments A PESTLE analysis is a tool that can provide prompts to the governors, management and staff involved in the analysis of the changes in the school’s environment that could impact future finance, planning and management decisions. It can enable them carry out a more comprehensive analysis. A PESTLE is usually used in commercial organisations as a part of the strategic development of a business and marketing plan, however a PESTLE analysis can be used as part of identifying the opportunities and threats (swOT) for operational planning within educational and school environments. The PESTLE provides a simple framework within which to consider external factors. PESTLE is used as part of a SWOT for identifying the external factors (OT) Political Schools being privatised (like the NHS) A government initiative creates the risk that the school may fail to deliver the policy or be diverted away from local priorities etc. Changes to the skills required to be a teacher/ tutor Changes to curriculum with short lead times Requirement to be self managing Requirement to be self financing Economic Central or local government funding decisions may affect school/ establishment finances Closure of a local industry may affect fund raising plans etc. Ability of parents to raise funds for optional activities The need to run breakfast/ after schools clubs Ability to invest ‘savings/ surpluses’ Cost of providing resources: Staff – teaching support Basics – books/ paper Technology solutions laptops etc Interest rates Shortages of materials on national/ international markets Over provision of school places in the area resulting in competition from neighbouring schools The risk of highly valued, key staff moving on to more ‘up and coming’ schools/ academies Social Decline in birth rate, reflecting national trends Local population changes (increasing/ decreasing numbers) Demographic changes may affect likely pupil rolls or the nature of pupils needs e.g. pupils with English as a second language etc. Closure of local firms providing employment Inability to attract staff Social networking – blogs, facebook, twitter Changes to qualifications expected Integration with local community Integration of students with special needs parental preference – an increase in ‘parent power’ has allowed parents more freedom of choice over their child’s school the risk of highly valued, key staff moving on to more up-and-coming establishments Information is accessible to staff anywhere in the world via the Internet Staff were not given enough training or access to effectively change their habits and how they expected information to be made available Technological Changes to standards/ equipment required Risk of selecting the wrong technology at times of change (i.e. windows -v- open source) New computer viruses may affect school/ college operations, Disturbing/ illegal images on the internet may affect ICT security measures etc. Move from paper based books to e-book readers Computer hardware being out of date Computer software being out of date Time to manage IT systems Legislative new legislation may create risks of non-compliance with the law, create new administrative burdens etc Changes to child protection legislation Raise the age of school leaving age Raise/ lower the age of starting school. Nursery/ kindergarten Change to school opening hours Changes to funding of charity based organisations Health safety legislation Environmental A new highway layout near the school may create new dangers for pupils etc Waste disposal Reduction of green space available for activities Changes to local bus routes Using a significant amounts of paper and photocopier toner to produce printed information. For a more comprehensive PESTLE article see our pain page. A PESTLE Template: Area being reviewed Factor: Is factor positive or negative? Political P – N P – N P – N P – N Economic P – N P – N P – N P – N Social P – N P – N P – N P – N Technological P – N P – N P – N P – N Legislative P – N P – N P – N P – N Environmental P – N P – N P – N P – N Remember this is only a tool. Call it what you like – use whatever factors you feel are appropriate. Other variations include: PEST analysis (STEP analysis) Political, Economic, Sociological, Technological PESTLE/ PESTEL analysis- Political, Economic, Sociological, Technological, Legal, Environmental PESTEL analysis- Political, Economic, Sociological, Technological, Environmental, Labour (Labor) related PESTLIED analysis- Political, Economic, Social, Technological, Legal, International, Environmental, Demographic STEEPLE analysis – Social/Demographic, Technological, Economic, Environmental, Political, Legal, Ethical SLEPT analysis – Social, Legal, Economic, Political, Technological STEPE analysis – Social, Technical, Economic, Political, and Ecological ETPS analysis – Economic, Technical, Political and Social – Scanning the organizational environment Choose the acronym that most suits you or your organization. http://www.familybunker.com/forums/students-workshop/11967-swot-pest-analysis-part-ii.html Examples of SWOTs Strengths and weaknesses à ¨ Resources: financial, intellectual, location à ¨ Cost advantages from proprietary know-how and/or location à ¨ Creativity (ability to develop new products) à ¨ Valuable intangible assets: intellectual capital à ¨ Competitive capabilities à ¨ Effective recruitment of talented individuals à ¨ Competitive Advantage à ¨ Brand reputation à ¨ New product Opportunities and threats à ¨ Expansion or down-sizing of competitors à ¨ Market trends à ¨ Economic conditions à ¨ Expectations of stakeholders à ¨ Technology à ¨ Public expectations à ¨ All other activities or inactivities by competitors à ¨ Criticisms by outsiders à ¨ Changes in markets à ¨ All other environmental condition à ¨ Global Influences à ¨ Nothing PESTEL Analysis for Macro-Environment http://accalecturenotes.blogspot.com/2011/01/pestel-analysis-for-macro-environment.html PESTEL Analysis is used for the assessment of macro-environment (environment which indirectly affects business decisions) in which the business operates. Managers have to identify changes in macro-environment that influence their business decisions. These can be identified using PESTEL analysis. In exams, using this framework ensures that we have gathered sufficient information necessary to analyze the scenario. Other frameworks used are equally acceptable. Below discussed factors are interrelated, points discuss in one factor can be included in other. 1. POLITICAL. The following points to be considered when evaluating the political environment of the industry or business. 1. Availability of government grants or assistance in the form of cash or other asset perhaps upon fulfillment of some conditions. 2. Award schemes to enforce quality standards. 3. Stable or dynamic political environment i.e. is the government changes frequently resulting in changing policies being implemented by every new government or the country are under martial law or war? 4. Rules and regulations are polite or stringent. This indicates the venerability of the business to legal risk i.e. fines (can be discussed under legal also). 5. Barriers to entry and exit. Example by imposing licensing requirements. 6. Provision of training to workers. 7. Provision of infra-structure, includes sewerage, transportation and energy. 2. ECONOMICAL 1. Business cycle, identify the stage from which the business is suffering. The stages are depression, recession, recovery and boom. 2. Industrial cycle, identify the stage from which the industry is suffering. The stages are introduction, growth, maturity and decline. 3. Access to resources, finance at reasonable cost, workers at reasonable rates, material economically and easily and equipment with maintenance and spare parts. 4. Customers suppliers, their availability and bargain power should be assessed. 5. Taxation policies i.e. direct or indirect taxation and rates 6. Inflation, interest and exchange rates. 7. National income can also influence demand for the firms product. 8. Level of unemployment in the country, high unemployment may suggest that employer has dominant position and can negotiate low wage rate with workers 9. Stock market condition rising stock market index means rising demand of shares in the stock market may suggest easily availability of finance at cheaper cost. 3. SOCIAL 1. Stakeholders demand, taste and behavior. Example customer, financers and supplier who may not support if your business conflicts their principles. 2. Increasing or decrease population. Increasing population may suggest that higher demand for younger people products e.g. toys while decreasing population suggests opposite. 3. Attitude to work. Are people committed to their work or they just comply with standards. Healthy workers are more productive than overstressed workers. 4. Income distribution, how wealth for the country is scattered among individuals, even distribution may suggest that majority of the people can buy our product while uneven distribution may suggest that majority is poor and minority is rich which create demand for high volume and low priced and low volume high priced products respectively. 5. Social footprint. Impact that business leaves on the society 6. cultural change should be identified e.g. identifying societies leisure activities, changes in customs. 4. TECHNOLOGICAL 1. Stable or robust. Stable environment may suggest longer product life cycle and low level of obsolesces while robust environment suggests otherwise. 2. New product developments may permit doing business more efficiently, cost-effectively and effectively. Employer may move towards automation, this is turn may affect other factors of the framework 3. Innovation leads to break-through in economy and it may affect society as well. Example facebook, youtube are the products which affecting youths behavior. 5. ENVIRONMENTAL 1. Green house effect has affected the way business trades. There are increasing demands of environment friendly products. Example using hybrid cars and paper bags instead of plastic bags. 2. There are increase emphasis on environmental footprints and sustainability. 3. There are legislations being enacted related to environment. This forces the business to change its policies (the way they do business) and disposal costs to business like restoration of site. 6. LEGAL 1. Competition law imposes restriction of mergers and acquisitions to promote efficiency gained through competition. 2. Employment legislation protects rights of workers by setting minimum wage requirements, anti-discrimination and anti-harassment legislation. 3. Health and safety legislation to protect workers. 4. Imposition of high import duties to protect home industries. 5. Licensing requirement as discussed above Students are advised to think as many points as possible so they can quickly identify if they come in the exam scenario. Having thought its impact on business activities can save you lot of time. PESTEL ANALSIS is frequently used framework in exams and in practice. It is worth spent some time on it.

Sunday, July 21, 2019

Authenticated Color Extended Visual Cryptography

Authenticated Color Extended Visual Cryptography Authenticated Color Extended Visual Cryptography with Perfect Reconstruction R. Sathishkumar, Gnanou Florence Sudha Abstract Visual Cryptography Scheme (VCS) is an image safeguarding scheme which encrypts the secret text based image into multiple binary images called shares, which are then transmitted to participants. These shares are then stacked over by the participants to decrypt the secret image, however with reduced quality. In Extended Visual Cryptography Scheme (EVCS), these binary shares are encoded with cover images to generate meaningful shares. In order to enhance the decoded EVCS secret image quality, Two in One Image Secret Sharing Scheme (TiOISSS) was implemented, which offers perfect retrieval of the secret image. In this proposed scheme, the TiOISSS implemented for color secret image with meaningful color shares with perfect reconstruction is proposed. This scheme uses Adaptive Halftoning technique to improve the EVCS image quality. Further, a color authenticated image and a text message are encoded in the meaningful color shares to suppress any fake shares from the intruders, thu s improving the security of the proposed scheme. Experimental results depict that the improvement in quality and security of the scheme. Index Terms Image Security, Visual Cryptography Scheme, Adaptive Halftone, Polynomial Image Secret Sharing, I. Introduction With the swift development in the networking technologies, digital data are transmitted across the world over internet. Thus, security has become a vital issue in both communication and the complex encryption gives ways to secure the information from the intruders. Image encryption has a vital role in variety of applications like telemedicine, medical image processing, military applications, etc. In the traditional way of encryption, the data will be encrypted with a security key and the decryption must be done with the same key. Hence, the security key is essential for proper decoding of the secret data. VCS is one such encryption method proposed by Naor and Shamir [1-2] to hide a secret image in the form of n noisy pictures called shares such that the secret data is retrieved by Human Visual System (HVS) by stacking the n shares. The traditional VCS is relaxed for threshold VCS in which at least any k number of shares are sufficient to decode the secret image [3-4]. The VCS has been proposed to hide the gray images by suitably halftoning it to binary images [5-7]. These schemes were proposed with noisy shares, that may invite intruders attention. R. Sathishkumar is with Department of Electronics Communication Engineering, Perunthalaivar Kamarajar Institute of Engineering and Technology (PKIET), Karaikal, India. ([emailprotected]) Gnanou Florence Sudha is with Department of Electronics Communication Engineering, Pondicherry Engineering College, Puducherry, India. ([emailprotected]) By suppressing this weakness, VCS were implemented with meaningful shares from the cover images, and is referred as Extended Visual Cryptography Scheme (EVCS) [8-9]. The VCS has further been extended for natural color images. Rijmen et al [10] proposed a VCS for color secret image with pixel expansion, in which each secret color pixel is expanded into a block of 22 color sub-pixels to generate two color shares. Huo et al [11] proposed the VCS for gray-level and color images using color decomposition and halftone technology, while retaining the advantage of traditional monochrome visual cryptography. Huo et al [12-13] proposed an improved model by using binary encoding to represent the sub-pixel blocks. In [14], Huo et al adjusted the contrast to reveal the secret image with better quality, but the noisy shares reveal the secrecy of the image. Der et al [15] proposed a color VCS with an additional authentic image, but the scheme suffers from the visual quality. Polynomial image secret sharing (PISS) was implemented with perfect decoding of secret image [16]. In [17], Sian et al implemented a Two in One Image Secret Sharing Scheme (TiOISSS) wherein the vague secret image is decoded using VCS in the 1st decoding stage and the better quality secret image is decoded using PISS using computations. Peng et al [18] improved the TiOISSS using GVCS with gray PISS values in the shares. Srividhya et al [19] improved the TiOISSS image quality by applying adaptive halftoning. However, the scheme is implemented for gray images with noisy shares. In [20], TiOISSS was implemented for meaningful shares, but the lossless recovery of the decoded image was not achieved. The existing model of TiOISSS are implemented for gray images and generates noisy shares and that may invite the intruders to insert the fake shares. In this proposed scheme, existing TiOISSS [20] is extended for natural color image with RGB color decomposition method. Further, before applying PISS algorithm, the color secret image is permuted at bit level, block level and pixel level to improve the security. This scheme generates meaningful shares based on the color cover images. Additionally, a color authentication image and a textual secret message are shared to validate the authenticity of the decoded secret image. Experimental results of the proposed scheme show that the weaknesses of the existing TiOISSS schemes are attempted, color TiOISSS are implemented with the enhanced quality and improved security. This paper is organized as follows. The VCS for gray scale and color images, TiOISSS and its related works are discussed in section II. The proposed Authenticated Color VCS is discussed in section III. The experimental results are discussed in section IV. The Quality analysis and Security analysis are discussed in section V and section VI. The conclusion is presented in section VII. II. Related Works The objective of the proposed scheme is to extend the TiOISSS for color images, with improved quality and perfect reconstruction. This section discusses the related works pertaining to existing TiOISSS and its limitations. Visual Cryptography Scheme Moni Noar and Adi Shamir implemented the visual secret sharing scheme in 1994 [1], which requires computations only in the encryption stage. The decoding of secret image is done by human visual system (HVS). In (k, n) threshold visual secret sharing scheme, n noise like shares are generated. Any k or more number of shares are required to decode the secret image. With (k-1) or lesser shares, the secret cannot be reconstructed. In basic (2, 2) VCS, every binary secret image pixel is expanded into 22 sub-pixels in the 2 number of noisy shares, as per the sub-pixel coding table shown in Fig. 1. For every white pixelof the secret image, any one out of the six sub-pixels are randomly selected for both the shares. Similarly, for every black pixel of the secret image, any one out of the six sub-pixels are randomly selected for share 1, and its compliment sub-pixels for share 2. Thus, by stacking the two shares, the white pixels are decoded with 50% gray level. However, the black pixels are reconstructed with full black sub-pixels. With the individual shares which has equal percentage of white and black pixels, the secret image information is not revealed. The share size and therefore the reconstructed image are doubled due to pixel expansion. Fig. 1 Sub-pixel coding table Adaptive Halftoning Halftoning technique is a process of converting the continuous tone image to monochrome image or binary image. The VCS is generally suited for monochrome images. Many techniques like AM halftoning, FM halftoning, etc. are available for converting the gray scale image to binary image. In [16-18], Error diffusion based on FM halftoning with is implemented. But, this results in scattered white pixels in the place of darker areas of gray image. The proposed work utilizes the Adaptive Halftoning [19] where in the dynamically determined threshold for halftoning, results in better contrast for both constantly varying images and sharp transition images. The human eye perceives the tiny dots as white and denser dots as black, in the halftoned image. A gray scale image and its halftoned image is shown in Fig. 2. Fig. 2 a) Continous tone b) Halftone Extended Visual Cryptography Scheme (EVCS) The shares generated in the VCS bears a noise like image. Though, it may reveal no clue about the secret image, it may however raise suspicions about the secret. In order to overcome the weakness of noise like VCS shares, they are embedded with the individual cover images, thus generating the meaningful shares. The VCS with meaningful shares are referred as Extended Visual Cryptography Scheme (EVCS). The meaningful shares depict the cover image and not the secret image. However, on overlapping the meaningful shares, the secret image is decoded. Color Visual Cryptography Scheme Conventional VCS is applicable only for binary images. For grayscale image, it is to be halftoned to binary image as discussed in section II-B. In the proposed scheme, adaptive halftoning is implemented. The color image is generally constituted by either subtractive or additive models as in Fig. 3. Fig. 3 a) Subtractive model, and b) Additive model In the subtractive model, with primary color components as cyan (C), magenta (M) and yellow (Y), the other colors can be obtained with proper mixing of CMY components. The color printer is based on subtractive model. In additive model, the desired color is achieved from proper mixing different Red (R), Green (G) and Blue (B) color components. By mixing the RGB components of equal intensity, white color can be obtained. Computer monitor is based on additive model. The secret color image can be decomposed into Red, Green and Blue frames. The individual frames will then be a gray pattern of the corresponding color components. These frames are adaptive halftoned to obtain the binary images which can be used for generation of shares in Red, Green and Blue components. By concatenating these RGB components of each shares, the corresponding color shares are obtained. Overlapping the color shares, the color secret image is decoded. Polynomial Image Secret Sharing Scheme (PISSS) PISS scheme was first implemented [16] to hide a secret image. Though, it contradicts the advantage of VCS, by involving mathematical calculations in both encrypting and decrypting stages, it offers perfect retrieval of the secret image pixels. The PISS is implemented for TiOISSS with perfect reconstruction [20]. The polynomial in equation 1, encodes the image pixels to cipher data, which is then embedded in GVCS shares. in which are the sequential k pixels of the image and P is the prime number. In the decoding phase, the Lagrange interpolation formula in equation (2) is used to derive the polynomial coefficients, By substituting the pixel position for , where, , keeping as the variable, the polynomial coefficients is derived, Further, the decoding polynomial equation can be derived by from the polynomial coefficient and the encoded image pixels in equation (3). The original secret pixel value can be retrieved from the equation (3), by substituting the image pixel position ,. A large prime number of 251, which is within the gray pixel range, can be considered for encrypting the grayscale image. TiOISSS Two in One Image Secret Sharing Scheme (TiOISSS) [18] combines the merits of both PISS to achieve perfect reconstruction VCS to decode the vague secret image by HVS. Hence, it involves two levels of encoding and decoding phases. The encoding phase starts with generating n VCS shares and n PISS shares from the same secret image, followed by replacing the black pixels of VCS shares by the gray-valued pixels of PISS shares to generate GVCS shares, which are transmitted through n users. In the decoding phase, the GVCS shares from the users are overlapped to reconstruct the vague secret image, in the 1st stage level with just HVS. This process does not require any mathematical computations. Further, Inverse PISS is applied to the gray pixels of GVCS shares to perfectly retrieve the secret image, in the 2nd stage level of decoding. III. Proposed scheme In existing TiOISSS [19], the noisy shares were generated, which make attract the intruders to create a fake shares to forge the legitimate user. In the proposed scheme, the existing TiOISSS is modified for color images. The meaningful color EVCS shares are generated by embedding a color authentication image. The RGB components of color secret image and the cover images are extracted as in Fig. 4. The modified TiOISSS is applied for each color components to generate the corresponding the color components of GVCS shares. By concatenating the RGB components, color GVCS shares are obtained. The vague color secret image and the authentication image can be decoded, in the first decoding phase. Additionally, to provide additional authenticity, a 216 bits of textual message is embedded in the two LSBs of white pixels of all GVCS shares, which are then decoded in the 2nd phase. The RGB components of color secret image and the authentication image are then retrieved by applying Inverse PISS. The stages involved in the proposed modified color TiOISSS with the generation of meaningful EVCS shares and including an authentication image are discussed in the following sections. EVCS Share generation EVCS shares are generated from the individual RGB components of the secret color image, authentication image and the cover image. The Left half of the secret image is considered for generating the left half of VCS shares (LS1 and LS2) as in Fig. 5. By considering the authentication image, the right half of VCS shares (RS1 and RS2) are generated. For each RGB components of the secret image, the following steps are followed to generate the corresponding RGB components of the VCS shares. 1.From the left half of secret image (LS), the left half of share1 (LS1) and the left half of share2 (LS2) are generated. 2.For every black pixel of the halftoned authentication image, corresponding subpixels of left half of share 2 (LS2) with one pixel modified from white to black is placed in the corresponding subpixel location of right half of share 1 (RS1). Thus, the RS1 and LS2 will decode the vague authentication image. 3.For each black pixels of RS, the corresponding sub-pixels of the right half of share 1 (RS1) with modified location of black pixels is placed in the corresponding subpixel location of right half of share 2 (RS2). 4.VCS shares are obtained by combining the left half and the right half of each shares. To overcome the weakness of noisy shares, cover images are embedded to generate the meaningful shares. Each RGB components of the VCS shares are processed as shown in Fig. 5, with the corresponding RGB components of the cover images. For every black pixel in each cover image component, the corresponding sub-pixel location of the respective VCS share component is modified such that one white pixel converted to black. The location of the converted black pixel depends on the pixel value of the secret image in the corresponding location. Thus, the EVCS shares components are generated from the VCS shares and the cover images. GEVCS Share generation The color secret image is first decomposed into RGB components and the pixels of each component are permuted in three levels to improve the security. In the proposed scheme, the 128 bit of encryption key is used as formatted in Fig. 6 is used to perform the permutation in bit level, block level and pixel level with respective 32-bit keys. The permutation order key defines the order of permutation performed which is required in reverse permutation operation. The GVCS share order defines the share order to be processed to retrieve the embedded key from the GVCS shares. The size of the textual secret message embedded in the GVCS shares is defined in the 16-bit Secret Message length. The PISS shares are generated from the permuted color secret image as detailed in section II-E. The resultant PISS values and the authentication color image pixels are embedded into the black sub-pixels are the EVCS shares. Prior to embedding these PISS values, it is truncated by a factor ÃŽÂ ±, (ÃŽÂ ± = 1, 2, à ¢Ã¢â€š ¬Ã‚ ¦ 16). This truncated value along with its remainder in GEVCS shares will be darker near to black, providing better visual quality. Thus, the truncated permuted PISS values, the color authenticated image and the textual secret message are embedded into EVCS shares to generate the GEVCS shares as detailed in the Fig.7. Decryption of the Secret image The decoding of the secret image is done in two phases. In the first phase, the two GEVCS shares are overlapped to decode the vague color secret image. To verify its authenticity, RS1 and LS2 of the GEVCS shares are superimposed to decode the authentication image. In the second phase of decoding, the encryption keys and the secret messages are extracted from the white pixels of each GEVCS shares. The PISS values are retrieved from the GEVCS shares. Inverse PISS is applied to reconstruct the secret image and the authentication image are perfectly. The process is explained in Fig.8. IV. Experimental Results The experimental results of the proposed Authenticated Color Extended TiOISSS with perfect reconstruction are discussed in this section. This scheme is implemented for truncation factor, ÃŽÂ ± = 7 and adaptive halftoning technique is applied for VCS share generation. The 256256 sized color secret image and the 256128 sized color authentication image are considered as shown in Fig. 9(a) 9(b). The color cover images of 256256 size are shown in Fig. 9(c) 9(d). The Adaptive halftoning version of the secret image and cover images are shown in Fig. 9 (e), 9(f) 9 (g). Applying VCS over the halftoned authentication and the secret image with pixel expansion, m = 4, two VCS shares of 512512 are generated and is shown in Fig. 9 (h) 9 (i). The GVCS shares generated from VCS shares by embedding PISS values as detailed in section III-B are shown in Fig. 9 (j) 9 (k). In the first level of decoding, the two GEVCS shares are overlapped to decode the vague color secret image. To verify the authenticity, LS2 and RS1 are overlapped to reveal the vague authentication image. They are shown in Fig. 9 (l) 9 (m). In the 2nd decoding phase, by applying Inverse PISS and reverse permutation over the extracted gray pixels of the GEVCS shares, the perfect reconstruction of both the color authentication image and the color secret image is decoded as shown in Fig. 9 (n) 9 (o). V. Quality Analysis The parameters like Contrast, Structural Similarity Index Measure (SSIM) Peak Signal to Noise Ratio (PSNR) of the Authenticated Color Extended TiOISSS are analysed. Contrast Contrast which represents the visual quality of the image, is given by the normalized difference between the mean grayness of the white secret pixels and the mean grayness of black secret pixels in the decoded image. In this scheme, contrast [20] is calculated among the group of decoded pixels valued more than the threshold, (C0) and the group of decoded pixels valued lesser than the threshold, (C1) and is given by, Contrast between the color secret image and its 1st decoded secret image for adaptive halftoning technique and between the authentication image and its 1st decoded output has been tabled in Table I for various truncation factor, ÃŽÂ ±. The contrast is improved SSIM It is a measure of resemblance between two images and it is calculated for two common sized (NÃÆ'-N) windows x and yof the two images. SSIM is given by where and are the average of y and x. and are the variance of x and y, is the covariance of x and y and are two variables to stabilize the division, L is the dynamic range of the pixel values and and by default. The SSIM between the color secret image and its 1st decoded secret image for adaptive halftoning technique and between the authentication image and its 1st decoded output has been tabled in Table I for various truncation factor, ÃŽÂ ±. The SSIM is improved resulting in increased similarity between the secret image and the decoded secret image. PSNR The Peak Signal to Noise Ratio (PSNR) is a measure to estimate the image quality between two images. Based on the pixel difference between the reconstructed image and the original image, PSNR is defined as where MSE denotes Mean Squared Error and s = 255, the maximum pixel value of the image. The PSNR between the color secret image and its 1st decoded secret image for adaptive halftoning technique and between the authentication image and its 1st decoded output has been tabled in Table I for various truncation factor, ÃŽÂ ±. The PSNR is higher for lesser value of the truncation factor. TABLE I Comparison of Secret Image and 1ST PHASE DECODED Secret Image Secret image vs Decoded Secret image (1st phase) Auth image vs Decoded Auth image (1st phase) ÃŽÂ ± Contrast SSIM PSNR Contrast SSIM PSNR 1 Not possible, No Truncation Not possible, No Truncation 2 0.1324 0.2556 3 0.1314 0.2446 6.7766 0.1720 0.1260 4.3907 4 0.1330 0.2452 6.5423 0.1708 0.1498 4.1201 5 0.1322 0.2380 6.5246 0.1762 0.1769 4.1499 6 0.1319 0.2352 6.4209 0.1752 0.1950 4.0422 7 0.1318 0.2328 6.3584 0.1753 0.2082 3.9912 8 0.1325 0.2348 6.3265 0.1746 0.2217 3.9447 9 0.1320 0.2322 6.3640 0.1772 0.2277 4.0184 10 0.1317 0.2316 6.3082 0.1771 0.2351 3.9738 11 0.1313 0.2292 6.3050 0.1761 0.2378 3.9582 12 0.1312 0.2291 6.2671 0.1768 0.2444 3.9383 13 0.1311 0.2307 6.2571 0.1765 0.2476 3.9250 14 0.1307 0.2286 6.2791 0.1750 0.2436 3.9232 15 0.1302 0.2280 6.2373 0.1760 0.2510 3.8964 16 0.1312 0.2322 6.2348 0.1751 0.2528 3.8830 Table II shows the comparison of meaningful shares with the corresponding cover images, which depicts that meaningful shares offers better visual quality. TABLE II Parameter Comparison for GVCS Shares vs Cover Images, for ÃŽÂ ± = 7 Proposed Scheme GEVCS 1 GEVCS 2 Contrast 0.1239 0.1746 SSIM 0.2803 0.1807 PSNR (dB) 6.1746 6.2839 Table III shows the comparison of different halftoning techniques, which shows that the adaptive halftoning offers better visual quality. TABLE III Parameter Comparison between the Secret Image and 1st decoded Secret Image, for Different Halftoning, for ÃŽÂ ± = 7 Halftoning Technique AM Halftoning FM Halftoning Adaptive Halftoning % Improvement FM vs Adaptive Contrast 0.0947 0.0988 0.1318 33.40 SSIM 0.0755 0.1823 0.2328 27.70 PSNR (dB) 6.1453 6.2268 6.3265 1.60 VI. Security Analysis The security of the proposed scheme is discussed here with the following security aspects. Authentication image for additional security With any one of the GEVCS color shares, the hackers may generate the other counterfeit shares, such that the legitimate receiver may get a bogus secret image instead of the original secret image. To overcome this weakness, a color authentication image is encoded into the GEVCS shares. In the 1st level of decoding, the vague authentication image is reconstructed and is used to validate the genuineness of the secret image, thus enhancing the security of the scheme. Further, the perfect retrieval of the authentication image is achieved by computations, in the 2nd decoding phase. Histogram of Shares Fig. 10 shows the histogram pattern of the color GEVCS share 1, for truncation factor ÃŽÂ ± = 7. It can be observed that the pixels occupy value up to 36 (i.e. 28/ÃŽÂ ±) and at 255. By choosing different values of ÃŽÂ ±, the pixel distribution of GEVCS shares can be limited accordingly. Unlike the original secret image, where pixels are distributed over the entire range, GEVCS shares are secured with limited pixel distribution, thus enhancin

Saturday, July 20, 2019

Threat To India Or Economic Need Of China

Threat To India Or Economic Need Of China I have always thought that it is important, even essential, that these two countries of Asia, India and China, should have friendly and, as far as possible co-operative relations. It would be a tragedy, not only for India, and possibly for China, but for Asia and the whole world, if they develop some kind of permanent hostility  [1]   Jawahar Lal Nehru India and China have laid the ghost of the 1962 war to rest, and have turned their faces to the future. Prem Shankar Jha INTRODUCTION For more than 60 years, Pakistan and India and have been arguing and periodically coming to blows over one of the most beautiful places in the world i.e. Pakistan occupied Kashmir (POK). India, Pakistan and China are in possession of various parts of Jammu Kashmir. China-Pakistan relations have always been a matter of concern for India, however due to the increased involvement of China in POK the matter has worsened further. With presence of an estimated 11,000 soldiers of the Peoples Liberation Army in POK, one can confidently state about the growing foot-prints of China in POK  [2]  . This prompted views among many Indian military and political leaders and journalists that Islamabad is handing over the de-facto control of the strategic Gilgit-Baltistan region of POK to China. Further it is believed that as the years proceed, Pakistan will emerge as an instrument of Chinas force projection into South Asia.  [3]   With this as background, it is imperative to examine and understand Chinas interests and strategy in POK as these developments hold large significance for Indias security interests. INDIA CHINA RELATIONS India and China are two of the oldest civilizations of the world and in spite of the present economic, political and military environment and compulsions, these two countries have a long history of friendly relations. However, since 1913-14 Shimla Conference, the Sino-Indian border as part of the issue of Tibets status has been a matter of dispute in relations between the two countries and has resulted in military conflicts. Presently the renewed tensions between the two countries have been dominating diplomacy with issues like Chinas refusal of visa to a top Indian Army General and aggressive Chinese intrusions across the LAC. Pakistan Chinas strategic equation with Pakistan is another issue which is a hindrance to any meaningful improvement in Indias relations with China. China has been the biggest supplier of military hardware to Pakistan, some of which is made available to Kashmiri militants. The increasing involvement and presence of Chinese soldiers in POK has raised concerns in India. Economic A strategic partnership was announced by China and India in 2005 and both countries have in recent years successfully attempted to reignite diplomatic and economic ties and consequently, the two countries relations have become closer. Presently, China is Indias largest trading partner and has recently changed its stance on Indias bid seat at UNSC. This is viewed as beginning of a maturity period in Sino-Indian relations. CHINAS ECONOMIC GROWTH In 1949, Chinas economic system changed to a communist system and as Chinas contribution in world trade has grown; its importance to the international economy has also increased. China is the worlds second largest economy after the United States by purchasing power parity and is the worlds fastest-growing economy. Unequal Regional Development Deng Xiaoping, orchestrated Chinas reform and opening-up 30 years ago, once said that some areas must get rich before others.  [4]  This was due to the countrys massive scale, the economic development could not happen all at once across China. Planning and implementation of such an economy would take years, even decades and some areas would inevitably be developed before others and thus coastal regions of China were the best place to place to start, due to the natural advantage of access to Asian and overseas markets via the Pacific Ocean and South China Sea.  [5]  The two areas which benefited most from this economic strategy of China were the Yangtze River Delta region in the East and Pearl River Delta region in the South.  [6]   West China the New Economic Story Chinas unequal transportation system, combined with differences in the availability of resources (natural and human) and industrial infrastructure has resulted in large variations in the regional economies of China. Although Chinas coastal regions continue to develop, the initial boom has already slowed.  [7]  Furthermore, foreign investors are beginning to grow weary of the increasing costs of doing business in cities like Shanghai and Shenzhen.  [8]  Therefore, now both domestic and international businesses are looking towards the interior of the country, where overhead costs are lower. Chinas Western region will emerge as the most interesting economic development story of the coming decade. This Western region comprises of 28% of Chinas population and 70% of its landmass and presently it also accounts for 17% of the countrys GDP, but surely this is set to change for the better.  [9]   In 2001, the Chinese government implemented its Western Development Strategy also known as the Go West policy. The plan called for large infrastructure development in urban and rural areas. The main components of the strategy included the development of infrastructure (transport, hydropower plants, energy and telecommunications), enticement of foreign investment, increased efforts on ecological protection (such as reforestation), retention of talent flowing to richer provinces and promotion of education. The Western Development Bureau affiliated to the state, had released a list of 10 major projects in 2008, with a combined budget of 436 billion Yuan which included projects like, new railway lines connecting Guiyang and Guangzhou, Lanzhou and Chongqing, Kashgar and Hotan in Xinjiang; highways between Wanyuan and Dazhou in Sichuan Province, Shuikou and Duyun in Guizhou Province and airport expansion projects in Chengdu, Chongqing and Xian.  [10]  They also include building of hydropower stations, coal mines, gas and oil transmission lines and also public utilities projects in the western region. By the end of 2007, China had started 92 key construction projects in Western region, with a total investment of more than 1.3 trillion Yuan. The Big Western Line, also known as the South-North water transfer project, is another project being planned to be undertaken for diverting water from six rivers in Southwestern China to the dry areas of Northern China through a system of tunnels, reservoirs and rivers. A robust growth is already in place in the West, reaching 11.9% in the last year.   Over the past 10 years, the railway capacity has increased by 160%, Highway capacity by 280% and the energy capacity by 550%.  [11]  Fixed investment of West was 3,600 billion Yuan and per capita gross domestic product rose to 1,933 dollars per year in 2008, which is just 41.9% compared to the per capita GDP of East. In early July 2010, China announced fresh investments to the tune of 100 billion dollars for 23 infrastructure projects to promote rapid and healthy development of western areas.  [12]   CHINAS ECONOMIC SECURITY Chinas spectacular economic growth is largely responsible for its rising energy demands. While energy production in China sharply increased since 1980, consumption exceeded production by the end of the 1990s and the gap between consumption and production is continuing. Chinas natural gas supply is even more limited than oil. The IEA 2006, forecasts that Chinas oil import will increase five folds by 2030 from slightly less than 2 MMBD in 2002 to 10 MMBD, when imports will account for 80% of Chinas total oil needs. Moreover, as in the rest of Asia, China will become heavily dependent on the Persian Gulf (70% of oil by 2015) for future supplies and its oil will increasingly have to transit a series of vulnerable maritime choke points.  [13]  The constant and safe importation of oil has become a crucial issue in Chinas energy sector. SINO- PAK ECONOMIC NEXUS Gwadar Port Pakistan inaugurated its third deep sea port at Gwadar in 2005 and it became operational in 2008. Work for phase II, at estimated cost of US $ 932 million is in progress for building nine additional berths (including two oil terminals with capacity of 2, 00,000 DWT ships). Other then the economic and military advantages to Pakistan it is important to examine Chinas role and strategic interest in this project. It is widely claimed that there is Chinese interest in reaching the blue waters of Arabian Sea.  [14]  This is considered to be a strategic move by Chinese as they funded US $ 198 million (out of the total Phase I cost of US $ 248 million) and also provided 450 engineers onsite. Towards success of Chinas Go West policy, Gwadar provides access to a port at just 1500 km as compared to the Eastern ports at 3000 km for the products produced in Western China. Gwadar is the ideal transit corridor for China to import oil and gas from Iran and the Persian Gulf. It offers an alternative route which is safer and cheaper as compared to the Strait of Malacca, where China faces problems of piracy and is under US sphere of influence. In Oct 2010, Pakistan government also decided to build a connecting gas pipeline from Gwadar to Xinjiang, China.  [15]   Official sources confirm that an understanding has already developed at highest levels between Pakistan and China that the Gwadar port is to be taken from the Port of Singapore Authority (PSA) and handed over to the Chinese. The port should have gone to the Chinese, who built it largely from their own investment, in the first place, says Baloch nationalist Rauf Khan Sasoli, who accuses former President Pervez Musharraf of giving it to the PSA to please his American masters.  [16]  This will result in not only transfer of power at the Gwadar port but will also allow Chinese to build Gwadar as tax-free industrial center, including oil and gas refineries and a network of roads and railways from Gwadar to China through the ancient silk route. An ambitious deal to build railways along the Khunjrab pass has already been signed between Pakistan.  [17]   There is another thought to this project where Gwadar is considered as the Naval base for the Chinese as part of its String of Pearls strategy and providing defence to its oil movement as part of energy security. However, China had always denied that Gwadar will be used by Chinese military. Pakistan occupied Kashmir The geopolitics amongst China, Pakistan and India has been under the influence of development in POK. The building of the Karakorum Highway proved to be a turning point and was instrumental in strengthening the Sino-Pakistan strategic relations. The Karakorum highway was constructed by Chinese engineers and was completed in 1986. It connects Chinas region of Xinjiang with Gilgit-Baltistan. China and Pakistan had signed a deal in 2006 to widen the Karakoram highway by almost 20 meters wherein China had promised US$ 350 million for the project and once the project is completed, the transport capacity of the strategically significant region will increase significantly which will facilitate Chinas free access to the oil-rich Gulf through the Pakistani port of  Gwadar.  [18]  Thus, it may be visualized that the Gwadar port will be an integral part of Chinas Foreign Trade route in future.   In return for Chinese assistance in the building the highway, Pakistan ceded the Trans-Karakorum Tract to China.  [19]  Since then, it has been a constant source of supply of arms, ammunition and nuclear material to Pakistan from China and other countries like North Korea. Apart from this, goods manufactured in China have crept into Pakistan on a massive scale due to this highway. The Sino-Pak collaboration in hydro-power projects in the POK region including controversial Diamer Bhasha Dam on the Indus River is also a matter of concern for India. During Zardaris visit to China in 2009, the two sides signed a Memorandum of Understanding (MoU) on construction of a hydro-power station at Bunji, in the Astore district of POK, with the agreement to construct the hydro power project (7000 MW) on build, operate and transfer basis, which means that all the investment ($ 6-7 billion) will be made by Chinese entrepreneurs.  [20]  Further, there were agreements for cooperation in fisheries, agriculture, education, dams and investment. China has contributed substantially to the rehabilitation and rebuilding projects in POK after the devastating earthquake of Oct 2005. These investments have helped China strengthen its control over POK. China has also encashed on the deprivation and alienation of people in POK both at political and social level. The Karakorum highway has helped in providing the necessary support during the rebuilding and trading opportunities for people of POK. It has been reported that of an estimated 7,000 to 11,000 soldiers of the Chinese Peoples Liberation Army are in POK. Many of the PLA soldiers entering Gilgit-Baltistan are expected to work on the railroad and some are extending the Karakoram Highway, others are working on dams, expressways and other projects. In a way, these developments in POK brings out that, since Pakistan Army is unable to handle multiple conflicts, thus it apparently gave the Chinese army de facto control over Gilgit and Baltistan regions. For China, it is a win-win situation, as it stands to gain unfettered road and rail access to the Middle East through Pakistan.  [21]  The map of karakorum highway is shown below for better appricaition of the situation and its impoartance for Western Chinas economic growth. Karakoram Highway Map Karakorum Highway AN ALTERNATE VIEW TO INDO-CHINA RELATIONS China has finally moved away from Deng Xiaopings principle of hide your strength, bide your time so as to adopt a more proactive role in international affairs. The transformation that China is currently undergoing is clearly visible. Its changes in the socio-political and legal conditions confirm that the regime has changed away from the label of authoritarianism. The course of making decisions and strategy has slowly become decentralised and actors like media, think tanks, academic institutes/ university and voluntary associations and interest groups constitute major linkages between the government, its mechanism and the governed.  [22]   Visit of the Indian External Affairs Minister to China in 1999 marked the resumption of high-level dialogue. The joint declaration signed during the visit of Indian Prime Minister to China in June 2003 stated that China was not a threat to India.  [23]  Special representatives were appointed by the China and India in order to provide thrust to border negotiations. India also acknowledged Chinas sovereignty over Tibet and pledged not to allow anti-China political activities in India. On its part, China had acknowledged Indias 1975 annexation of the former monarchy of Sikkim and later rectified official maps to include Sikkim as part of India.  [24]  India and China are in the second stage of exploring the framework of a final package settlement covering all aspects of the India-China boundary dispute, which will be followed by the final stage of delineation and demarcation of boundary.  [25]   Convergence of Interests India and China have found substantial convergence of interests at the international level wherein they both share similar concerns about the growing international dominance of the US, the threat of terrorism disguised as religious and ethnic movements and the need to accord primacy to economic development. Both nations also favour more democratic international economic regimes.  [26]  They have strongly resisted efforts by the US and other developed nations to link global trade to labour and environmental standards. China and India put forward a joint Sino-Indian position in the World Trade Organization (WTO) and International trade negotiations. Chinas Neutrality Towards Indo- Pak Relations There has been a subtle shift in Beijings stance on Pakistan vis-à  -vis India. Chinas neutral position during the Kargil conflict, during Indo-Pak crisis following the terrorist attack on the Indias Parliament and during Mumbai terrorist attack is seen as sincere attempts of Chinas to improve ties. Towards Chinas attempts to project itself as a responsible regional player, it is supporting peace and anti-terrorist efforts in South Asia by cooperating with the India and US. China is also seen to be instrumental in encouraging Pakistan to negotiate with India by using its linfluence over Pakistan. On, 02 Dec 1996, when Jiang Zemin famously advised the Pakistani senators to set aside the Kashmir problem and improve their relationship with India, he thereby decisively distanced China from the Kashmir imbroglio.  [27]   Bilateral Trade As India and China have found a distinct convergence of their interests on world stage, they have used it to strengthen their bilateral relations on social, military and economic front. Prime Minister Manmohan Singhs government had made it clear that it favoured closer ties with China and would continue to work towards improving and strengthening bilateral relations with China. Among the most encouraging developments in India-China ties is the rapid increase in bilateral trade. A few years ago, India Inc had a fear of being swamped by Chinese imports, whereas today, it is estimated that the bilateral trade between the two countries will grow by 20 per cent to reach beyond $60 billion in 2010-11 from the present US $ 50 billion. Political Initiatives Chinese premier Wen Jiabao told Manmohan Singh during the Indian Prime Ministers visit to China in Jan 2008, that there was enough space for China and India and the two leaders resolve to promote building of a harmonious world of durable peace and common prosperity through developing the Strategic and Cooperative Partnership for Peace and Prosperity between the two countries. China and India also cemented a shared vision for the 21st century by agreeing to raise the annual volume of bilateral trade to $ 60 billion by 2010 and to play role in transforming Asia and the World. In 2009, China and India witnessed frequent high-level interactions. Chinese President Hu Jintao held talks with Indian Prime Minister Manmohan Singh at the Shanghai Cooperation Organisation (SCO) and the BRIC (Brazil, Russia, India and China) summits in Yekaterinburg, Russia. Premier Wen Jiabao interacted with Manmohan Singh at the East Asia Summit in Thailand and the Copenhagen Climate Change Conference.  [28]   CHINAS PRESENCE IN PAKISTAN NOT A THREAT TO INDIA China and India know that any conflict would have devastating effect on both countries, because of the nuclear threat and thus the ability to co-operate and solve disputes through diplomacy is in the interest of both countries. India is continuing to improve its relations with China on the convergence of interests that the two nations have achieved in recent years. In respect to Indo-Chinese cooperation it is noted that while they are rivals, they are not enemies and that they knew how to work together with common interests in mind which is exemplified by their burgeoning trade relationship and the potential to work together on a number of key issues, such as terrorism, drug trafficking, global trade and climate change.  [29]   China is presently busy in Xinjiang region trying to calm the Uighur separatist movement, it is trying its best to hold Tibet, the military intervention in Taiwan is now a possibility and war of words with Vietnam has already started. Importantly, Indias relations with China are improving with improved bilateral trade, increased political initiatives and military co-operations. Thus, having studied the Chinese need and strategy for development of its Western region, the importance of Gwadar port and POK for the western region and Chinas energy security concerns, it can be confidently stressed that Chinas presence in Pakistan is not a threat to India but is the economic need of China.