Thursday, October 31, 2019

Contracting Officer Representative Research Paper

Contracting Officer Representative - Research Paper Example ?†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.11 Abstract Chapter 1 Introduction There exist several ways in which the contracting office representative in the federal government is effective in terms of roles and responsibilities. This involves having the mandate of monitoring contractual performance based on giving briefs about presentations at the end of every contract. Additionally, the officer serves as the technical liaison whenever there are contracting and procurement challenges. Furthermore, this officer also overlooks at the communication channel by addressing issues of technical contacts and regulations that govern contacts (Bastianelli et al, 2003). Therefore, before this research delves into the effectiveness of contract office, there is the need to explore the background. Background In most na tions, the effective management of performance of contracts is paramount to ensure the integrity of contracts and related programs. Therefore, most government offices decided to create the contracting office under the leadership of a contracting officer representative. There was also the need to ensure that procurement and acquisition among employees was upgraded for the benefit of timeliness, completeness and quality. On that account, the government defined contracting as the primary technique that Federal Government agencies utilize in the buying of products or services from other agencies outside the government (Cibinic et al, 2006). Similarly, the government set the Federal Acquisition Regulation (FAR) as the official regulatory body of managing contracts. As a result, the FAR came as a body that offers quality products and services to its clients while preserving the public’s trust and meeting their policy objectives. In addition, because of the creation of the office, t he contracting office representative assumed responsibility for contracting for purchase, the acquisition of products and services from the entities of the public sector, federal agencies, and local and state government companies (Kelleher et al, 2010). Statement of the Problem The challenge of whether the contracting officer in the federal representative is effective is determined by several factors. For example, there is a need to consider the stipulated roles and responsibilities of the contracting officer. Therefore, the jurisdiction of the federal office in terms of making purchases of products and services should meet the standards of performance contracts. These performance contracts should be targeted at private sectors, local and state entities that measure their contracts through the parameters of the job description. Similarly, the federal agency should make clear definition of the contractual terms that

Monday, October 28, 2019

Brain Drain Essay Example for Free

Brain Drain Essay The first think that click in yur mind about brain drain is movie newyork,the thing that happened to john abrahim ,he was basically a nice person but he was torchured so much in jail that his niceness was removed ,and he became a terrorist his brain was completely drained, but u all r wrong with the assumptions. Brain drain which is also known as human_capital_flight means refers to the emigration of intelligent, well-educated individuals to somewhere for better pay or conditions, causing the place they came from to lose those skilled people, or brains. Typically, emigrating brains have learned English and move to the United Kingdom, the US or some other English-speaking country. The developed nations concerned saves her pounds and dollars on professional education and training and in the process obtains the services of trained doctors/ engineers who/earn very much more than their native counter parts and have more comfortable styles of living. There have been several efforts to define the concept of brain drain, mainly by international organisations. For example, we can read the following in a 1969 UNESCO report .the brain drain could be defined as an abnormal form of scientific exchange between countries, characterized by a one- way flow in favour of the most highly developed countries. One of the most comprehensive report the main characteristics of brain drain as follows: a) There are numerous flows of skilled and trained persons from developing to developed countries; b) They are characterised by large flows from a comparatively small number of developed countries and by small flows from a larger number of developing countries; c) In these flows engineers, medical personnel and scientists usually tend to predominate; d) The above flows have grown with increasing rapidity in recent years f) The flows respond increasingly to the changed g) The migratory trends are stimulated both by the character of national educational systems by lack and inadequate planning for the training of students from developing countries, in developed states as well as the proper utilisation of their-skills in their home country; and h) Except possibly for south America, there are no signs that the migration of talents is decreasing and there are fairly definite signs that its increase will,  under present conditions, continue to accelerate. Types of brain drain Organizational: The flight of talented, creative, and highly trained employees from large corporations—e.g. Yahoo,HubSpot,[4]and Microsoft— that occurs when employees perceive the direction and leadership of the company to be unstable or stagnant, and thus, unable to keep up with their personal and professional ambitions. Geographical: The flight of highly trained individuals and college graduates from their area of residence, for instance, those migrating from the mid-western United States to the coastal states and large metropolises. Industrial: The movement of traditionally skilled workers from one sector of an industry to another. For example, jobs in the United States and other governments, also known as the public sector, have experienced significant generational brain drain as tenured boomer generation employees retire. Heightened competition for talent from the private sector and budgetary constraints have made it increasingly difficult to attract replacements f or these retirees.

Saturday, October 26, 2019

Routing Protocol Simulation With NS2

Routing Protocol Simulation With NS2 Network simulation is a method of investigation in network technology. In the process of investigating a new technology, due to various reasons, it is costly and unrealistic to physically test a network system. In such situation, simulation becomes one of the best available solutions in testing, evaluation and validation. Network simulation has the features of small cycle and low cost, and it is easier for researchers to use others research, in order to concentrate on the particular part and no need to waste too much time on other part of the system. NS2 is a simulation platform that is developed in free open source for network technologies. Researchers can easily use it for the development of network technology. Until today, NS2 contains rich modules that are almost related to all aspects of network technology. Wireless network communications obtained a rapid development in recent years. Ad hoc networks do not need the support of cable infrastructure; the communication is achieved by free mobile network hosts. The emergence of ad hoc network has promoted the achievement of the process of free communication at any environment, at the same time it has also provided an effective communication solution of military, disaster relief and temporary communications. Considering the ad hoc network is constantly moving, and the network topology is changing, therefore the traditional internet routing protocols (e.g. RIP, OSPF) are not be able to adapt into the actual need of ad hot networks. Therefore there are many specialised routing protocols are designed for the ad hoc network, the aim of this paper is to compare, analyse and evaluate the most popular routing protocols for ad hoc networks by running the simulation test with NS2. Introduction A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self-configuring network of mobile devices connected by wireless links. Along with the desire of get rid of the wired network constraints and be able to communicate at any time and any place, wireless network communications obtained a rapid development in recent years. Mobile communications can be achieved by portable computers with wireless interface equipped and PDAs. Most current mobile communications require a wired infrastructure, e.g. base station. To be able to communicate without fix infrastructure, a new network technology Ad Hoc network technology arises at the historic moment. Ad hoc networks do not need the support of cable infrastructure; the communication is achieved by free mobile network hosts. The emergence of ad hoc network has promoted the achievement of the process of free communication at any environment, at the same time it has also provided an effective communication solution of military, disaster relief and temporary communications. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Such networks may operate by themselves or may be connected to the larger Internet. Ad-hoc network was originally used in the military field. With the developments of wireless networks, it has begun the development in the civilian fields. A mobile ad-hoc network does not need any infrastructures, any node can quickly and automatically form the network, and each node can move freely and is able to join or leave the network at any time. The characteristics and advantages of fast deployment, invulnerability makes mobile ad-hoc becoming more and more widely used in either military or civilian fields. In recent years, as the emerging wireless communication network, Ad-hoc is gradually attracting more attention of the industry and become a research hotspot. Ad-hoc networking supports flexible and convenient communication without the support of infrastructure, this technique broadens the fields of mobile communications and has a bright future. Ad hoc network can be regarded as the cross of mobile communication and computer network. In ad hoc networks, computer network packet exchange mechanism is used rather than circuit switching mechanism. Communication hosts are usually portable computer, personal digital assistants (PDA) and other mobile devices. Ad Hoc network is different from mobile IP network in the current Internet environment. In mobile IP networks, mobile hosts can link and access the network through fixed wired network, wireless link and dial up link, and in ad hoc network, these is only a wireless link connection. In mobile IP networks, the communication need to be supported by adjacent base stations and still using the traditional internet routing protocol, however, ad hoc networks do not have the support of these facilities. In addition, a mobile host in the mobile IP network is only an ordinary end device which does not have routing function. When the mobile host moves from one zone to another does not chan ge the network topology, and in Ad Hoc networks the movement of mobile hosts would lead to topology change. The thesis is to research on the Ad-hoc networking mode and its network layer through simulation with NS2, mainly focused on the comparison and analysis of the popular ad-hoc routing protocols. The aim of this article is to research and develop on the key technology of self-configuring network routing protocols, based on ad-hoc network structure. Wireless Ad-Hoc network Structure and Characteristics Ad Hoc wireless network has its own particularity, in the formation of actual use of the working network, the application size, scalability and the reliability and real-time requirements must be taken full account. In addition, due to the unique structure of the ad hoc network, the characteristics of ad hoc network should be fully considered when design and build the network, which will help us to design a routing protocol that is suitable for particular network structure in order to maximise the performance across the network. Ad-hoc network Structure Ad Hoc wireless network topology can be divided into two kinds: Flat structure and hierarchical structure, in flat network structure, all network nodes have equal status. However, in the hierarchical structure of the Ad Hoc wireless network topology, the whole network is composed of clusters for the subnet, each cluster consists of a cluster head and multiple cluster members, the cluster heads forms a higher level network. Each cluster head and cluster members are dynamic and automatic networking. The hierarchy is based on different hardware configurations, and hierarchical structure can be divided into single-band and multi-band classification structure. Single band hierarchy use single frequency in communication, all nodes use the same frequency. But in multi-band hierarchy, if there are two networks in different levels exist, the lower level network has a smaller communication range and higher level network has a larger communication range, cluster members use the same frequency to communicate, cluster head nodes uses one frequency to communicate with cluster members and another frequency to maintain the communication with cluster heads. There are advantages and disadvantages exist in either flat or hierarchical network structures: the structure of flat structure network is simple, each node has an equal status, there are multiple paths exist in communication of the source node and destination node, therefore no network bottlenecks, and the network is relatively safe. However, the biggest drawback is the limited network size, when the network scale expanding, routing maintenance overhead exponential growth and consume the limited bandwidth; Hierarchical network structure is not limited by the scale of network, the scalability is good, and because of clustering, routing overhead is relatively smaller, although there is the need of complex cluster head selection algorithm in hierarchical structure, but because of hierarchical network structure with high system throughput, node localisation is simple, therefore ad hoc network is now increasingly showing grading trend, many network routing algorithms proposed are based o n the hierarchical network structure model. Ad-Hoc network Characteristics Wireless ad hoc network is a combination of mobile communications and computer networks, each node in the network have both router and host functions. The characteristics of ad hoc networks in mainly in the following areas: Dynamically changing network topologies: Ad Hoc networks have no fixed infrastructure and central management communications equipment, network nodes can randomly move to any direction in any speed rate, coupled with the power change of wireless transmitter device, the environment impact and the signal mutual interference between each other, which all will result in dynamic changes of the network topology. Limited resources: the working energy provided to the mobile hosts in Ad Hoc networks are limited, and the mobile host with more energy loss, will reduce the Ad Hoc network functions; on the other hand, the network itself provides limited bandwidth and signal conflicts and Interference, which results the mobile host with limited available bandwidth which is normally far less than the theoretical maximum bandwidth. Multi-hop communication: if two network nodes are not in the same network coverage due to the limited resources available, multi-hop may be used in Ad Hoc network communication, in order to achieve the communication between the source host and destination host which are not in the same network coverage. Limited physical security: the communication of Ad Hoc network nodes are through the wireless channel, the information transmitted is very vulnerable, and eavesdropping, retransmission, falsify or forgery attack can be achieved easily, If routing protocol once suffered the malicious attacks, the whole self-organizing networks will not work properly. These features of the Ad Hoc network have made a special request in the routing algorithm design. A reasonable routing algorithm must take the factors of limited network resources, dynamic network topology changes and improve the network throughput into account. Ad-Hoc Wireless network routing protocols The key issue in ad hoc network design is to develop a routing protocol that is able to provide high quality and high efficient communication between two nodes. The mobility characteristic in the network makes the network topology constantly changing, the traditional internet based routing protocol is unable to adapt to these characteristics therefore the routing protocol that is specialised for ad hoc networks is needed, According to earlier on the Ad Hoc network architecture and features described, the design of the routing protocol must meet the following conditions: The need of rapid response capability for dynamic network topology, and try to avoid routing loops from occurring, and provide simple and convenient network node localise method. Must be efficiently use of the limited bandwidth resources, and try to compress unnecessary overhead. Limit the number of intermediate transfer during the implementation of multi-hop, generally not more than 3 times. Must minimise the launch time and amount of launch data, in order to save limited working energy. In possible conditions, make the design of routing protocol with securities to reduce the possibility of being attacked. Routing Protocols According to the specific characteristics of ad hoc wireless network routing protocols, in recent years, there are a variety of ad hoc network routing protocols have been proposed. IETFs MANET working group is currently focused on research Ad Hoc network routing protocols, and protocols many protocol drafts, such as DSR, AODV, ZRP etc. in addition, the professional researchers also published a extensively amount of articles related to Ad hoc network routing protocols and proposed many network routing protocols for the ad hoc networks, such as DSDV, WRP etc. According to the routing trigger principle, the current routing protocols can be divided into three types: Proactive Routing protocol, Reactive routing protocol and Hybrid routing protocols. Proactive Routing protocol Proactive routing protocol is also known as Table-driven routing protocol, each node maintains a routing table that contains the routing information to reach the other node, and updates the routing table constantly according the network topology changes, and therefore the routing table can accurately reflect the topology structure of the network. Once the source code needs to send messages, the route to the destination node can be immediately obtained. This type of routing protocol is usually modified from the existing wired network routing protocol to adapt to the wireless ad hoc network requirements, such as the Destination-Sequenced Distance Vector protocol, which is modified from the Routing Information Protocol (RIP). Therefore, this type of routing protocol has a small delay, but requires a lot of control message, the overhead is large. Commonly used proactive routing protocols include DSDV, HSR, GSR, WRP etc. Destination-Sequenced Distance Vector (DSDV) DSDV avoids the generation of routing loops by set serial number for each route, using time-driven and event-driven technology to control the transfer of routing table, i.e. a routing table is kept in each moving node locally, it contains valid points, routing hops and destination routing serial number etc. destination routing serial number is used to distinguish old and new route to avoid routing loops. Each node periodically sends the local routing table to the neighbour nodes, or when the routing table changes, the information will also be passed to neighbouring nodes, when there is no moving nodes, use a larger packet with longer interval to update the route. When the neighbouring node receives the information contains modified routing table, it will first compare the serial number of destination node, the routing with larger serial number will be used and the one with smaller serial number will be eliminated, and if the serial number are the same, the best optimised route (e.g. shortest path) will be used. Each node must periodically exchange the routing information with adjacent nodes, the routing information update is also can be triggered by the changes in routing table. There are two ways to update the routing table, Full dump, i.e. the topology update message will include the entire routing table, which is mainly applied to the case of fast changing network. Another way is Incremental update, in which update message contains only the changed part in routing, such way is usually used in a network with slower changes. Hierarchical State Routing (HSR) HSR is a routing protocol that is used in hierarchical network, nodes at a higher level saves all the location information of its peers, logical sequence address is assigned along from the root node at the highest level to the leaf node at the lowest level, node address can be used by sequence address. Global State Routing (GSR) GSR protocol works similar with the DSDV mechanism, it uses link-state routing algorithm, but avoids the flooding of routing packets, which includes an adjacent node table, network topology table, next hop routing table and the distance table. Wireless Routing Protocol (WRP) WRP is a distance-vector routing protocol, each node maintains a distance table, routing table, link overhead table and packet retransmission table, through the Short Path Spanning Tree (SST) of the neighbouring node to generate its own SST, and then transmit updates. When there is no any change in the network routing, the receiver node must return an idle message to show the connection, otherwise modify the distance table to look for better route. The feature of this algorithm is that when any changes of the neighbouring node is detected, and then checks the sturdiness of all adjacent nodes in order to eliminate the loop, has a faster convergence. Reactive Routing Protocol Reactive Routing protocol is also known as on-demand routing protocol, it finds the route only when needed. Nodes do not need to maintain routing information constantly, it will initiate route look up only when the packet is need to be sent. Compare with proactive routing protocols, the overhead of reactive routing protocol is smaller, but the packet transmission delay is larger, which means it is not suitable for real time applications. Commonly used reactive routing protocols include AODV, DSR, TORA and so on. 2.2.2 Dynamic Source Routing (DSR) DSR is designed to restrict the bandwidth consumed by control packets in ad hoc wireless networks by eliminating the periodic table-update messages required in table-driven approach. DSR is composed of two main mechanisms Route Discovery and Route Maintenance. The Route Discovery mechanism is used when the source node needs to send a packet to the destination node but does not know the route. When the source node is using a source route to reach the destination node, source node uses the route maintenance mechanism to identify the route that cannot be used due to the topology changes. In DSR, route discovery and route maintenance mechanisms are fully on-demand operation, DSR does not require any periodic routing broadcast packets and link state detection packets. 2.2.3 Temporally Ordered Routing Algorithm (TORA) TORA is an adaptive distributed routing algorithm based on link reversal method, which is mainly used for high-speed dynamic multi-hop wireless network. As a source initiated on-demand routing protocol, it is able to find multi-paths from the source to the destination node. The main characteristics of TORA are, when topology changes, the control message transmission in local area of topology changes only. Therefore, the node only needs to maintain the information of adjacent nodes. The protocol consists of three parts: route generation, route maintenance and route deletion. In the initialisation stage, the transmission sequence number of the destination node is set to 0. The QRY packet which contains the destination node ID broadcast by the source end and a node with a transmission sequence number that is not 0 responses to the UDP packet. The node that receives UDP packet has the sequence number higher than the source node by 1, and the node with higher sequence number is set as the upstream node. Through this method, a Directed Acyclic Graph (DAG) from the source to the destination node can be created. When nodes move, routes need to be rebuilt. In the route deletion phase, TORA removes the invalid route by broadcasting a CLR. There is one problem that exists with TORA, which is when multiple nodes proceeds to route selection and deletion, routing oscillation will be produced. 2.2.4 Ad-hoc On-Demand Distance Vector Routing (AODV) AODV is an improvement to the DSDV algorithm, but the difference with DSDV is that it is a Reactive routing protocol. In order to find the route leading to the destination node, the source end will broadcast a routing request packet, and adjacent in turn broadcast the packet to the surrounding nodes until the packet was sent to the destination node, or, to the intermediate node which has the routing information to the destination node. A node will discard duplicated request packet received, the serial number of routing request packet is to prevent routing loops, and is able to determine whether the intermediate node has responses to the corresponding routing requests. When a node forwards a route request packet, it will mark the ID of its upstream node into the routing table, in order to build a reverse route from the destination node to the source node. When the source end moves, it will re-initiate route discovery algorithm; if the intermediate nodes move, then the adjacent node wi ll find the link failure and send the link failure message to its upstream node and spread the message all the way to the source node, afterwards the source node re-launches the route discovery process according to the circumstances. The achievement of AODV is a combination of DSR and DSDV protocols. It has the features of route discovery and route maintenance in DSR, and at the same time use by-hop routing, sequence number and Beacon messages that adopted in DSDV. Hybrid Routing Protocol In wireless ad hoc networks, neither proactive nor reactive routing protocols alone can solve the routing problem completely, therefore hybrid routing protocols which combines the advantage of both proactive and reactive protocols have been proposed by the researchers, such as the Zone Routing Protocol (ZRP). ZRP is a combination of proactive and reactive routing protocols, all nodes within the network to themselves as the centre of a virtual zone, the number of nodes in the area is related to the radius set of the zone, and the areas overlap, this is the difference with clustering routing. It uses proactive routing algorithm within the zone, the centre node uses Intrazone Routing protocol to maintain in the zone. Literature Review Network Simulation Tool The platform that will be used in simulation is Windows XP Professional + Cygwin + NS2. NS2 is a simulation platform that is developed in free open source for network technologies. Researchers can easily use it for the development of network technology. Until today, NS2 contains rich modules that are almost related to all aspects of network technology. Since the release 2.26, NS2 has stopped support with Windows platforms, therefore to get the latest NS2 running on the Windows XP, Cygwin is needed. Cygwin is an UNIX emulator on Windows platform. Implementation Configure simulation platform Normally, NS2 simulation can be divided into the following steps: 1. Compose necessary components: i.e. add or remove new components 2. Testing: test whether the component composed is validated. When the component in the library satisfies the simulation needs (e.g. simulation process based on existing protocols in the library),then the simulation starts from the third step. 3. Compose Otcl script file: configure the topology structure of the simulating network, and identify the basic link features, protocols that have been used by moving nodes, and number of nodes etc, and binding the terminal device protocol, setting the scene and traffic load of simulation (TCP stream or CBR stream), setting simulation start and end time etc, and set trace objects of the script file, trace file is the file that records all of the events of simulation process, and also can set the nam object at the same time, nam is the tool to demonstrate the network running animation. 4. Use NS command to execute script file: once executed, *.tr file will be generated in the same directory of the script file, to record the simulation results. if nam object is set in the script file, *.nam file will be generated in the same directory. 5. Analyse trace file: due to the large size of trace file, we will need to compose gawk program to process the data after simulation (calculate packet delivery date, routing overload, and throughput etc), then use the drawing tools to produce the graph for direct analysis. In NS2 the classic routing protocols such as DSDV, DSR, TAORA and AODV are already integrated; the source code of routing protocols is located in C:cygwinhomeAdministratorns-allinone-2.34ns-2.34, show in figure 1.1 Take AODV as an example (fig. 1.2), within the ADOV folder, aodv.cc and aodv.h are the most important files, they defines the main functional features. Under general circumstances, we do not need to modify the source code of the protocols. Fig.1.2 AODV Routing Protocol Simulation scripting According to the simulation model designed, each routing protocol (DSDV, DSR, AODV, and TORA) will be compared in small (20 nodes) and medium (50 nodes) ad hoc wireless network. The corresponding scripts composed are: dsdv.tcl, dsr.tcl, aodv.tcl and tora.tcl (see appendix). Taking aodv.tcl as an example, the coding is show in fig.3.2.1 Partial scripts in aodv.tcl Some script explanation of most important codes in aodv.tcl set val(ifq)Queue/DropTail/PriQueue; #Interface queue set val(nn)50; #Number of nodes in simulation scenario set val(rp)AODV; #Routing protocol to be simulated set val(stop)300 #Simulation time length set val(x)500; #Length of scene set val(y)500; #Width of scene set val(tr) out50.tr #Output trace file set val(nam) out50.nam #Output nam file set opt(cp) cbr50 #Stream file set opt(sc) scen50 #Scene file In addition, write the following statement in script head to generate a simulation ns_ object: set ns_[new Simulator] Tracking the file object is used to specify the Trace file (with .tr extension) in recording of the simulation data. NS2 supports record application layer, routing layer, MAC layer and node movement those four types of data in difference layers. The data that needs to be recorded can be specified in settings in the simulation process. The data in of each layer that trace object specified are all recorded in the trace file, labels are added to distinguish them. In addition, NS2 also supports NAM tool simulation process visualisation, such function needs to generate the NAM trace file object to specify the trace file of records of simulation data. The following statements are used to generate those two trace file object described. #Generate trace file: $ns_use-newtrace set tracefd[open out50.tr w]; $ns_trace-all$tracefd #Generate NAM trace file object: set namtracefd[open out50.nam w] $ns_namtrace-all-wireless$namtracefd$val(x)$val(y) Data Stream Generation Tool Data stream generation tool cbrgen is used to generate traffic loads, which can generate the TCP steam and CBR steam. Cbrgen.tcl file (see appendix) can be used as following: Codes are defined as following: -type #TCP stream or CBR stream -nn #Number of nodes -seed #Specify number of random seeds -mc #Maximum connection of each node -rate #Overload of each stream connection The format is used as following: ns cbrgen.tcl [-type cbr|tcp] [-nn nodes] [-seed seed] [-mc connections] [-rate rate] Movement Scene ./setdest is used to randomly generate the nodes movement scene needed form wireless network, used as following (2 versions): ./setdest -v -n -p -M -t time> -x -y or ./setdest -v -n -s -m -M -t -P -p -x -y Which speed type set to uniform/normal ¼Ã…’pause type set to constant/uniform. NAM animation The NAM function is used to run the animation of specific trace output format, the output file can be based on real or simulated environment. For example, the trace file that is from the output of NS simulator. The commands to control to control NAM animation in NS2 as following: nam out.nam 1. Node $node color [color] Setting the colour of node $node shape [shape] Setting shape of node $node label [label] Setting name of node $node label-color [lcolor] Setting display colour of node name $node label-at [ldirection] Setting display location of node name $node add-mark [name] [color] [shape] Add annotation $node delete-mark [name] Delete annotation 2. Link and Queue $ns duplex-link attribute: orientà £Ã¢â€š ¬Ã‚ colorà £Ã¢â€š ¬Ã‚ queuePosà £Ã¢â€š ¬Ã‚ label 3.Agent Use the following commands to make the agent you wish to display appears as AgentName in the box. $ns add-agent-trace $Agent AgentName The parameters of movement scene and node flow are in the tables shown below: Parameter of node movement scene: Parameter Number of nodes Moving range Resting time Simulation time Values set 20, 50 500 x 500 m 1 s 300 s Parameter of node movement scene: Parameter Maximum moving speed Packet size Node communication distance Type of service Values set 5, 10, 15, 10, 25, 30-50 512 byte 250 m CBR Trace file analysis Performance parameter analysis model The indicator to measure the performance of ad hoc network routing protocol is commonly including qualitative indicator and quantitative indicator. Qualitative indicator describes the overall performance of a particular aspect of the network, such as the security, distribution operation, provide loop free route and whether to support single channel etc. and quantitative indicators can describe the performance of a certain aspect of the network in more details. The quantitative indicator of packet delivery ratio, average end to end delay and throughput etc are often used to measure the performance of network routing protocols. a. Packet delivery ratio: is a ratio of the number of packet sent from the source node and the number of packet that have been received by destination node in the application layer, which not only describes the loss rate observed in the application layer, but also reflect the maximum throughput supported by the network. It is the indicator of routing protocol completeness and correctness. End to end average delay: it can be calculated with the following equation, which N represent the packets successfully delivered, rt represents the time that packet reached the destination node, and st represent packet sending time. Routing overhead: Routing overhead is the total number of control packets of all routes, in a multi-hop routing each hop transmission is equivalent to one packet transmission. Routing overhead can be used to compare the scalability, the ability to adapt to network congestion and the efficiency of different routing protocols. It can be calculated with the following formula: Routing overhead = The Total number of routing control packets Gawk code The output file out.tr generated in simulation analysis will be filtered by selecting all of the packets in Agent layer, calculate all the number of data packets sent by this layer and the number of data packets that has been successfully received, and then divide the number

Thursday, October 24, 2019

Plaths arrival Of The Bee Box :: essays research papers

The Troubled Consciousness of Sylvia Plath as seen in â€Å"The Arrival of the Bee Box†   Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  In the poem, â€Å"The Arrival of the Bee Box,† Sylvia Plath uses a metaphor to represent the darker aspects of the subconscious that are leaking into her conscious mind:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The box is locked, it is dangerous.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  I have to live with it overnight   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  And I can’t keep away from it.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  There are no windows, so I can’t see what is in there.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  There is only a little grid, no exit. It is inevitable that Plath will need to face the bees that lie in the box. She is â€Å"appalled† at the thought of letting them out. She says â€Å"I am no source of honey/So why should they turn on me,† but she is still clearly convinced that they pose a threat. She suggests that the bees taken separately would not be too difficult to handle, but that now they are like a â€Å"Roman mob† and could kill her. Plath emphasizes the fact that she has â€Å"ordered† this box in the first and fifth stanzas. This suggests that she knew she would have to deal with what the bee box represents.   Ã‚  Ã‚  Ã‚  Ã‚  The bees that are locked up in the box symbolize the swarming and potentially destructive chaos that Plath can feel within herself. The bees have the ability to inflict pain on her and sting her. She longs to take control over the bees to save herself from any more pain. In the fifth stanza Plath does assert dominance over the bees in the box: â€Å"They can die, I need feed them nothing, I am the owner.† She is trying to convince herself of her own strength by placing herself in a position of power.   Ã‚  Ã‚  Ã‚  Ã‚  There is a correlation between the bees and her father. Her father Otto Plath was an expert on insects--especially bees. The whole series of bee poems relates to her father (like â€Å"The Bee Keeper’s Daughter†). If the bees are locked in the box, then much of what she is feeling is connected to her father. Perhaps she is trying to place herself in control of the troubling memory of her father. Plath needs to confront her feelings of abandonment and despondency. The description of the box as â€Å"dark† in the third stanza further implies that part of what she must deal with inside of the box is related to him. In â€Å"Daddy† Bishop refers to her father’s â€Å"fat black heart.† She also refers to him as the â€Å"man in black† or the â€Å"black man† in other poems. Plaths arrival Of The Bee Box :: essays research papers The Troubled Consciousness of Sylvia Plath as seen in â€Å"The Arrival of the Bee Box†   Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  In the poem, â€Å"The Arrival of the Bee Box,† Sylvia Plath uses a metaphor to represent the darker aspects of the subconscious that are leaking into her conscious mind:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The box is locked, it is dangerous.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  I have to live with it overnight   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  And I can’t keep away from it.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  There are no windows, so I can’t see what is in there.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  There is only a little grid, no exit. It is inevitable that Plath will need to face the bees that lie in the box. She is â€Å"appalled† at the thought of letting them out. She says â€Å"I am no source of honey/So why should they turn on me,† but she is still clearly convinced that they pose a threat. She suggests that the bees taken separately would not be too difficult to handle, but that now they are like a â€Å"Roman mob† and could kill her. Plath emphasizes the fact that she has â€Å"ordered† this box in the first and fifth stanzas. This suggests that she knew she would have to deal with what the bee box represents.   Ã‚  Ã‚  Ã‚  Ã‚  The bees that are locked up in the box symbolize the swarming and potentially destructive chaos that Plath can feel within herself. The bees have the ability to inflict pain on her and sting her. She longs to take control over the bees to save herself from any more pain. In the fifth stanza Plath does assert dominance over the bees in the box: â€Å"They can die, I need feed them nothing, I am the owner.† She is trying to convince herself of her own strength by placing herself in a position of power.   Ã‚  Ã‚  Ã‚  Ã‚  There is a correlation between the bees and her father. Her father Otto Plath was an expert on insects--especially bees. The whole series of bee poems relates to her father (like â€Å"The Bee Keeper’s Daughter†). If the bees are locked in the box, then much of what she is feeling is connected to her father. Perhaps she is trying to place herself in control of the troubling memory of her father. Plath needs to confront her feelings of abandonment and despondency. The description of the box as â€Å"dark† in the third stanza further implies that part of what she must deal with inside of the box is related to him. In â€Å"Daddy† Bishop refers to her father’s â€Å"fat black heart.† She also refers to him as the â€Å"man in black† or the â€Å"black man† in other poems.

Wednesday, October 23, 2019

Buddha & religions

As we come to know it, there are five major religions in our world. For centuries, these five religions, namely Christianity, Hinduism, Judaism, Islam, and Buddhism have dominated and influenced the world and its views in life, death, heaven, and earth. Now, the writer wishes to state on this paper the different key terms, main arguments, and assumptions of one of the most revered faiths on earth. But before anything else, perhaps we should go through an overview of the history of Buddhism and its founder. The general history of Buddhism started around 566-486 B. C.The traditionally accepted founder of Buddhism is a man named Siddhartha Gautama. Around 486 B. C. , the first Buddhist Council at Rajagaha was formed. It is where the Buddhist Canon, as it still exists today was settled and preserved through oral tradition. Through the passing of centuries, different forms of Buddhism were developed and propagated throughout distant lands. One of the important highlights of the religionâ €™s history is the founding of the Dalai Lama lineage of the Tibetan Buddhism during the 15th century (â€Å"A Timeline of Buddhist History: Major Events†).Today, Buddhism continues to thrive and according to Wikipedia, most estimates put its number of followers at around 310 million (Jones 2006) In relation to the founding of Buddhism, it is a widely accepted fact that Siddhartha Gautama is the founder of Buddhism. Born in luxury, Siddhartha was the son of a king hence making him prince. At the age of 29, Gautama left his palace to view his subjects. However, what he saw was despair that depressed him so. So one night, he escaped from his palace to live the life of a mendicant.Thus started the Buddha’s long and fruitful life and the creation of the different principles and beliefs that would guide the ideology of Buddhism and influence world history (â€Å"Gautama Siddhattha Buddha†). An event that triggered Gautama’s quest for the truth is the one t hat happened when he left the palace at the age of 13. After seeing the four sights, which namely are an old man, a man with a disease, a corpse, and an ascetic, he became convinced that suffering in this world is inescapable and even all the riches of the world cannot add up to make a man truly happy and in peace (â€Å"Gautama Siddhattha Buddha†).It is also Siddhartha’s experience that meditation alone cannot ease all the anxieties in a man’s mind. After studying with two teachers on meditation, he was not satisfied so he left. He realized that the only way to detach you from all the pain and suffering in this world is through overall tranquility. Buddha is also credited as the creator of the Four Noble Truths. The first of these noble truths is the Noble Truth of Suffering. According to this truth, life is full of suffering such as pain and grief.Even in other religions, they share a common ground; that life is full of torment. According to the Second Noble T ruth, which is the Truth of the Arising of Suffering, the agony that people experience is due to the Threefold Craving. The Threefold Craving, on the other hand, is what brings beings from birth to rebirth accompanied by lust and joy. These three craving are the sensual cravings, and the cravings for existence, and wealth and power. The Third Noble Truth, according to Buddha is the Noble Truth of the Cessation of Suffering.According to this truth, there is a way for suffering to stop and that is by giving up the Threefold Craving. And lastly, the Fourth Noble Truth is the Truth of the Path Leading to the Cessation of Suffering. It is in this Noble truth that the Eightfold Path is presented. This path is also known as the Middle Path because this path does not commit to the two extremes of self-mortification and sensual pleasure (â€Å"Gautama Siddhattha Buddha†). The Eightfold Path, or the Middle Path, is the principle that guides the followers of Buddhism in eliminating all suffering from his life.The Eightfold Path is divided into three sections. The first section is called Sila. Sila pertains to the wholesome physical actions. Sila also stands for morality and refraining from objectionable actions of the body and speech. Included in Sila are three of the eight parts of the Eightfold Path. The first one is the Right Speech. In this right, the person should speak in a pleasant, truthful way. The second is the Right Actions wherein the person is taught to do good actions and to avoid doing things that may hurt or harm others.The last part of this section is the Right Livelihood. In this right, the follower should always choose a means of livelihood that does not harm anyone including himself straightforwardly or not. The second section of the Eightfold Path is called Samadhi. Samadhi, according to Buddhism, is the mastery over a person’s own mind. Included in this division are another three rights of the Eightfold Path. The first of these three i s the Right Effort or Exercise. This right concerns itself to the effort of the follower in improving his self.The second in this section is the Right Mindfulness or Awareness wherein the mental ability to perceive things with clear consciousness is emphasized. And the third one on Samadhi is the Right Concentration or Meditation. It is in this right that awareness of the current reality that happens on self is realized. The absence of craving or aversion is also included in being aware to the reality in one’s life And lastly, the third section of the Eightfold Path is called the Prajna. Prajna is mainly concerned with wisdom that purifies the mind.The last two rights of the Eightfold Path is included in this section. The first of the two is the Right Understanding. This right teaches that one should reality as what it really is and not just how it appears to be. The last of the rights is the Right Thoughts. In this right, an alteration in the pattern of thinking is taught. D ifferent ways of interpreting the Eightfold Path exists. Some people believe that it is a series of progressive stages. This interpretation stresses out that the mastery of the first right will lead to the beginning of the mastery of the next right and so on.Others believe that the Eightfold Path and its rights should be developed simultaneously (â€Å"The Eightfold Path†). According still to the Buddhist faith, Samsara is the cycle of birth, suffering and agony, death, and rebirth in which humans are bounded. But once a man becomes successful in grasping the Four Noble Truths and in following the Eightfold Path and eliminates all cravings from his life, it is when he experiences Bodhi. Bodhi is the awakening or enlightenment felt by Buddhas. It is also the time when greed, hate, and delusion are eradicated.In addition to this, it is also the time in which Nirvana or â€Å"highest happiness† is attained. These are only some of the basic principles held by the Buddhist faith. The teachings and beliefs of Buddhism are too many to be mentioned in this paper. However, this paper wishes to analyze some of the beliefs of the aforementioned religion. As a world-leading faith with hundreds of millions of followers, Buddhism has influenced not only the faith of multitudes but world history as well. Aside from these, Buddhism has also played a part in the development of oriental art and architecture.One of the strengths of the Buddhist religion is that their followers are not afraid to show that they are devoted to their belief. And being devoted to their belief has its own advantages. Because these followers adhere to their principles, it becomes better for them to be guided in their everyday lives and decisions. However, being too much devoted to the faith has its own disadvantages. Some people become too dependent on the principles that it starts to interfere with their normal lives.However, we cannot comment on that issue since it is their own choice a nd therefore are responsible for their own actions. In Buddhism, there are no recognized gods but there is the Buddha or enlightened beings. In the teachings of Buddhism, it is emphasized that in able to reach true happiness, one must live a simple life. This life that they would live should be one of humility and righteousness. Only then would they achieve nirvana. In parallel with other faiths, especially in Christianity, it is also stressed out that in able to attain salvation, one must live in truthfulness and simplicity.So this is why Christians, especially the Roman Catholic and Greek Orthodox Church have their own monasteries where people could live in seclusion; far from all the temptations and sins of the Earth. It might be said that most religions, particularly the five leading ones, share the same principles of the need to do good to others and live in humbleness in able to attain salvation. Others believe that the foundations of Buddhism are vague and inaccurate. And sti ll others criticize them for their unique nature.But let us all remember that even though we share different faiths and beliefs, even though we are separated by cultural and spiritual diversity, some principles are still being shared. And one of those principles is to do the right thing and to never cause harm to anyone. I, as the writer, personally adhere to the belief that we should have religious tolerance. As long as our beliefs do not interfere or cause harm to anyone, then we should free to worship and believe what we desire. And above all, respect is what is needed in a society that prejudices and criticizes what they perceive as odd.In spite of everything, we are all, in the broadest sense, humans, and therefore, equal. Works Cited â€Å"Gautama Siddhattha Buddha. † 12 Sept. 2007 . Jones, Judy, and Wilson William. â€Å"Religion†, An Incomplete Education. 3rd ed.. Ballantine Books, 2006. â€Å"The Eightfold Path. † 2000. About, Inc. , A part of. 12 Sept. 2007 . â€Å"Timeline of Buddhist History: Major Events. † 12 Sept. 2007 .

Tuesday, October 22, 2019

Chromotography Experiment for Chemistry

Chromotography Experiment for Chemistry Free Online Research Papers Purpose / Objective: The purpose of chromatography is to separate small amounts of dissolved solids. In this experiment it used to separate the dyes in food coloring. Materials:  · Ruler to measure the 2 cm from the bottom of paper and to help draw a straight line.  · Pencil to draw the line.  · Water to put in the beaker hence to soak in the chromatography paper to separate the dyes in the food coloring.  · Beaker to put in the water and the chromatography paper.  · Food Coloring to be separated  · Capillary Tube to put small dots of food coloring on the chromatography paper.  · Chromatography Paper to put the dots of food coloring on. To let the water soak up it to separate the dyes in the food coloring. To get the final result.  · Scissors to cut the chromatography paper to fit upright in the beaker. Procedure:  · We got a chromatography paper and drew a pencil line 2cm from the bottom.  · We drew four x’s on that line.  · Then we got a capillary tube and on each of the x’s we put a dot of food coloring.  · On the four x’s we put four colors. Blue, red, green, and a mixture.  · Then we got a beaker and placed the chromatography paper inside it after cutting it to fit in, and placed less than 2cm of water in the beaker.  · We left the water to soak up until near the top.  · We took the chromatography paper out and left it to dry. Data collection: After the chromatography paper dried we looked at our results:  · The blue food coloring was a mixture of blue and red.  · The red food coloring was just red.  · The green was mixture of yellow and blue.  · The mixture was a mixture of red and blue. Conclusion: After finishing this experiment I realized that the red food coloring was a substance unlike all the others which contained different dyes. Research Papers on Chromotography Experiment for ChemistryLifes What IfsThe Masque of the Red Death Room meaningsThe Hockey GameAnalysis Of A Cosmetics AdvertisementGenetic EngineeringEffects of Television Violence on ChildrenThe Effects of Illegal ImmigrationResearch Process Part OneAssess the importance of Nationalism 1815-1850 EuropeMarketing of Lifeboy Soap A Unilever Product

Monday, October 21, 2019

Acids and Bases essays

Acids and Bases essays What substances turned into Acids? Pour about three milliliters of your sample in each of three test tubes. Pour the same amount on a watch glass. In the first test tube put in two drops of methyl orange and record the color. In the second test tube, put in two drops of bromothymol blue and record the color. In the third test tube, add two drops of phenothalein and record the color. Using the watch glass sample, touch the tips of a red and a blue litmus paper and record the colors. Then touch the tip of a piece of pH Paper and record the color and match the color to the chart and record the pH. Methyl O Bromothymol B Phenothalein R Litmus B Litmus pH Paper Color Congo R AA- orange/red yellow clear red red pink(1) purple OJ- red/orange yellow yellow red pink Orange(4) purple HA- red yellow clear red red red(2) purple Bleach-orange yellow clear red red orange(4) purple Vinegar-red yellow clear red red red(1) purple SH-orange blue red blue blue brown(12) orange Mouth wash-red yellow/green sky blue red red red(1) purple Lemon J-red yellow clear red red red(2) purple Windex-Orange blue clear red blue orange(6) red Plax-orange blue lilac red ...

Sunday, October 20, 2019

Essay on On The Bridge

Essay on On The Bridge Essay on On The Bridge Evaluation Essay- Growing Into a Different Person Growing up is hard but learning the mistakes will make a person grow. The protagonist of the story will get over the past, live in the present, and realize who they are. Living in the present will only make them grow as a person and live life without the worry of the past. The piece that most accurately describes the process of growing up is â€Å"On the Bridge† by Strasser. This story is the most realistic because of the challenges, symbols, and realization. One way â€Å"On the Bridge† presents a true perspective of becoming mature is through the challenges Seth has to overcome. In the beginning of the story, Seth had never been in a fight in his life and scared to get into one. Seth crosses over the mature stage by overcoming his challenges along with Adam. Instead of confessing the truth, Seth mans up and supports Adam through a fight between three big guys. Seth is now brave and mature enough to protect his â€Å" friend.† Another way â€Å"On the Bridge† presents a realistic interpretation of growing up is through the use of symbolism. In this story, Seth wants to be a cool kid, not realizing that is not the true him. Adam’s leather jacket looked authentically old and worn, like he has been in a hundred fights with it. The denim jacket represents the tough and coolness of Adam. To be on the same level as Adam, Seth had to get a new denim jacket, rip the sleeves off, and wash it a hundred times. Another

Saturday, October 19, 2019

Individual Case Analysis FunTime Snacks, Inc Study

Individual Analysis FunTime Snacks, Inc - Case Study Example As things stand, the management confusedly uses e-mail, internal memo, and the company newsletter for any form of communication. In addition, the company faces uniform pricing and procurement issues which have led to some branches being profitable while others are struggling to remain in business (Crase, OKeefe and Dollery 427). And in an attempt to improve its competitive edge, Albanese and her team of executives have not properly handled the change management process. As the result, the real obstacles to change are from within the organization. After analyzing the potential positive impacts of a centralized financial reporting system, Albanese proposed functional centralization of decision-making process whereby the subsidiaries would remain in their decentralized, working locations but seek approvals from the head office when making major business decisions. For instance, significant changes of commodity prices by more than 5% and any supplies exceeding $10,000 required such reporting. On the one hand, Albanese sought to: a) limit unnecessary procurement costs and poor pricing by standardizing the processes; b) create uniformity in the business processes and uplift poorly performing branches; c) enforce a culture of personal leadership of the Chief Executive, the Chief Financial Officer and the Corporate Director of Supplier-Retailer Relationships; d) create flexibility in the organization’s business activities; e) improve quality of services by steering the company out of illegal survival tactics by some of its branches, and; lastly, f) better coordination between the headquarters and the branches in order to facilitate faster responses to market changes due to inflation and stiff competition from market rivals. Despite these brilliant centralization ideas, Fun Time Snacks would face the following challenges; a) delay in 60% of business processes whose

Friday, October 18, 2019

Creation and Science (Christianity) Essay Example | Topics and Well Written Essays - 250 words

Creation and Science (Christianity) - Essay Example This evolution theory by Charles Darwin has gained popularity among scholars over the years. Other theories proposed by science over the origin and existence of the universe include the big bang theory and the passing star theory. Creationism faces a lot of opposition socially and politically. Majority of the schools hardly include it in their learning. Evolutionism has a lot of favor, and it is being taught in schools. This is what made the proposed theory of intelligent design face a lot of criticism. The intelligent design theory argues that the universe and its inhabitants are too complex in structure and design to exist as a mere product of evolution (Davis et al 36-61). It proposes that the universe and creatures in it is an intelligent product of an intelligent designer. Both science and religion hold strong views on the existence of life and the universe. It is, however, possible for the conflict between the two to end as concepts and theories of science and religion can be compatible. Scholars do not necessarily need to choose one over the other, but rather appreciate both views as each one complements and enriches the other in a number of

The changing of Dim Sum Essay Example | Topics and Well Written Essays - 500 words

The changing of Dim Sum - Essay Example This paper will thus focus on the Dim Sum as a Chinese delicacy or food and the cultural weight and implication it bears relative to the Chinese people. Thus, just as the cultural tenets and principles of people do change, so does the Dim Sum as a delicacy and important treat of a meal (Nahm, 152). To begin with, the words Dim Sum in the loosest of translations refers to a light touch on the heart. In the past society and generations, dim sum was served as a unifying meal. This happened since the delicacy revives feelings of friendship in the good way. Just as culture is learnt and shared from one generation to the next, the dim sum as a concept has also been passed from one generation to the next (Watson and Melissa, 7). This means that even the ingredients and spices that were used to make the original dim sum are slightly different from the subsequent ones. For instance, in the ancient times, dim sum was treated in a casual manner where acquaintances, family and friends shared as an equivalent of â€Å"tea testing.† Dim sum was often served to the friends when they were waiting for the main meal, thus it was used as an appetizer. In principle, the preparation of the dim sum included spices such as prawn, chicken, dumplings, rice noodle rolls which are known as  "cheong fun† (Fung, Hung-Gay, Derrick and Yau, 19). As the times have changed, chefs and most restaurants have introduced pork and vegetables to and spice and give variety to consumers. This is aimed at responding to the people who may not be consumers of meat thus, allowing them the option of having dim sum in the form of vegetables (Alperson, 23). This has been necessitated by changing demands of the people in the society who are strict vegetarians but would still wish to enjoy their exquisite cuisine. It is important to note and mention that the traditional society did serve dim sum for the better part of the morning up to mid-afternoon. However, in the face of the changing dynamic times,

Sensor Research Paper Example | Topics and Well Written Essays - 3000 words

Sensor - Research Paper Example The feedback system is designed so well that it updates the status of input torque in fraction of a second and as a result exoskeleton keeps working accordingly; and works well with frequent torque changes. A heel pressure sensor is required that produces an electrical signal whenever heel touches the ground or force is sensed on the heels because of its interaction with the ground. Signal from this sensor helps in regulating the sequential movement of the exoskeleton. These force sensors are usually generated by making use of a couple of force sensors but in our design use of a simple piezoelectric or capacitive device works well as a heel sensor and is placed on the heel of the exoskeleton design on the side that is directly in touch with the ground. In order to accurately track the force applied by the user to the legs on the exoskeleton distributed force sensors will be used. These sensors help in measuring distributed forces being applied by the human body over a specified area rather than collective force applied to the entire leg. This approach of distributed force helps to track the applied force at any given point on the leg during the gait to check for proper rehabilitation of the leg. Sensors placed under each heel will sense whether the foot is in contact with the ground, signaling to the leg that the motion should come back to a standing phase. Myographic Sensors Electro-Myographic sensors are used to directly measure the electrical activity of human muscles. In case of exoskeleton, myographic sensors can be placed on the belly of muscle. In this case, electrical activity of human muscles is directly translated to force that is being exerted by the leg onto the exoskeleton, by measuring the amplitude of the force. There is a limitation in using EMG technique in the design of lower limb exoskeleton. If EMG is incorporated in the design of exoskeleton then wearing this device would not remain convenient for the patients as electro-myographic sensors need direct interface to the skin. This can be avoided by making use of acoustic myographic techniques. In short these sensors are used to keep record of the current muscular activity of the lower limb and helps in detecting whether or not the lower limb is capable of recovering to its original state. Other than that these sensors can also be incorporated to replace strain gauges that are being used in our design to measure the force being applied by the leg on the exoskeleton. This can be done by simply applying acoustic sensors between the knee and ankle of the human leg and the resulting signals can be transformed into energy magnitude. From this force being exerted on the lower limb can be determined easily. Acoustic sensors are not able to provide direct signal to the control system as the signal is too low when observed in terms of voltage. Therefore, we need pre-processing circuitry to reduce hardware induced noise as well as improve signal quality. BU-7135 is an acceleromete r based acoustic myographic sensor. It is covered with a silicon case and accelerometer is placed within this cover. It is then protected by a layer of PCB and air chamber is also provided before having contact either the skin through silicone membrane. Here is the detailed diagram showing the internal structure of the device. The AMG sensor is not used individually within the circuit, rather pre-amplification circuit is provided along the sensor to get better signal. Here is the design of

Thursday, October 17, 2019

Critical Evaluation and Application for the Anaesthesia and Post Anaes Assignment

Critical Evaluation and Application for the Anaesthesia and Post Anaesthesia Practice - Assignment Example The search was limited to the article that was published within the last five years in order to obtain the latest study that has been done on anesthesia practices. Moreover, the research settled on articles that were published in English because the language is easy and convenient to understand. From 102 articles, 6 articles were analyzed in relation to the study of anesthesia (Halligan 2003, p. 671) Additionally, the literature reviews help in determining how these two clinical instruments may influence the performance of all the involved experts, particularly anesthetist among other clinical technicians. The framework by Moule et al. (2003, p. 201) for critical appraisal of the article will be used to follow logical guidance process towards critical review (Appendix3). The paper is completed by analyzing the Kauffman et al (2013, p. 302) study on pediatric anesthesia (Appendix 2). The research also reviews other secondary data with the intention of understanding other author’s ideas on pediatric anesthesia. The study population selected for this study consisted of 100 pediatric patients who were less than seven years of age. These children were to undergo elective surgery with endotracheal intubation (Rose 2009, p. 665). The study excluded patients having the previous history of mask ventilation or intubation since these sets of patients are usually exposed to anesthesia medical practices. Other exclusion criteria included a Cormack and Lehane grade of >2 during the direct laryngoscopy DL with the main aim of determining equality of visualization, particularly of the larynx. Similarly, patients who had higher risk classification more than ASA II were also excluded from the research (Divatia and Bhowmick, 2005, p. 315). Therefore, the study requires the application of the technique on pediatric and infant cases which show difficulty in intubation, or that show deviance from  normal laryngeal anatomy (Divatia and Bhowmick, 2005, p. 89). Visualization in such cases is crucial, and methodology suggested in this study can be of extreme benefit in clinical practice.  

Terri Schiavo Court Cases Essay Example | Topics and Well Written Essays - 2000 words

Terri Schiavo Court Cases - Essay Example Many argue that it might have been, but then there were many arguments in this case. Not all of them were ethical or logical, and not all of them played out in court. The story of Terri Schiavo is so much more tragic than people stop to realize. When a situation is so easily preventable, how does it get so terribly out of hand, and how are even the most basic decisions of care handled? The bottom line, Terri Schiavo should have been alive today, and possibly even alive and well. Terri Schiavo suffered a cardiac arrest due to an eating disorder on February 25th, 1990. She was without oxygen for several minutes and then lapsed into a coma. Her coma then evolved into a Permanent Vegetative State. For fifteen years, she remained in that state, until her feeding tube was finally removed for the last time on March 18th, 2005. She died thirteen days later, ending a fifteen year battle with so many players, and yet so few concrete, satisfactory, answers (Quill, 2005). Terri Schiavo was in a Permanently Vegetative State, also known as PVS. While experts tried to argue that she was in a Minimally Conscious State (MCS), at her autopsy, it was confirmed that she had been in a PVS. The difference between the two conditions is slight. Those patients who are in a PVS are unaware of self and environment; they may make gestures, sounds, and eye movements. These behavior, however are involuntary. People in a MCS are aware of self and environment, but can only express it so much. They cannot speak, but their gestures, eye movements, and vocalizations are a deliberate attempt to communicate with those around them (Winslade, 2007). While Schiavo’s state was considered irreversible, there is much more that may have been learned from her had she survived. Studies have shown that some patients in a PVS can regain some level of consciousness. Some may live for decades in a PVS and begin to recover some consciousness. Simply put, it really is impossible to say

Wednesday, October 16, 2019

Sensor Research Paper Example | Topics and Well Written Essays - 3000 words

Sensor - Research Paper Example The feedback system is designed so well that it updates the status of input torque in fraction of a second and as a result exoskeleton keeps working accordingly; and works well with frequent torque changes. A heel pressure sensor is required that produces an electrical signal whenever heel touches the ground or force is sensed on the heels because of its interaction with the ground. Signal from this sensor helps in regulating the sequential movement of the exoskeleton. These force sensors are usually generated by making use of a couple of force sensors but in our design use of a simple piezoelectric or capacitive device works well as a heel sensor and is placed on the heel of the exoskeleton design on the side that is directly in touch with the ground. In order to accurately track the force applied by the user to the legs on the exoskeleton distributed force sensors will be used. These sensors help in measuring distributed forces being applied by the human body over a specified area rather than collective force applied to the entire leg. This approach of distributed force helps to track the applied force at any given point on the leg during the gait to check for proper rehabilitation of the leg. Sensors placed under each heel will sense whether the foot is in contact with the ground, signaling to the leg that the motion should come back to a standing phase. Myographic Sensors Electro-Myographic sensors are used to directly measure the electrical activity of human muscles. In case of exoskeleton, myographic sensors can be placed on the belly of muscle. In this case, electrical activity of human muscles is directly translated to force that is being exerted by the leg onto the exoskeleton, by measuring the amplitude of the force. There is a limitation in using EMG technique in the design of lower limb exoskeleton. If EMG is incorporated in the design of exoskeleton then wearing this device would not remain convenient for the patients as electro-myographic sensors need direct interface to the skin. This can be avoided by making use of acoustic myographic techniques. In short these sensors are used to keep record of the current muscular activity of the lower limb and helps in detecting whether or not the lower limb is capable of recovering to its original state. Other than that these sensors can also be incorporated to replace strain gauges that are being used in our design to measure the force being applied by the leg on the exoskeleton. This can be done by simply applying acoustic sensors between the knee and ankle of the human leg and the resulting signals can be transformed into energy magnitude. From this force being exerted on the lower limb can be determined easily. Acoustic sensors are not able to provide direct signal to the control system as the signal is too low when observed in terms of voltage. Therefore, we need pre-processing circuitry to reduce hardware induced noise as well as improve signal quality. BU-7135 is an acceleromete r based acoustic myographic sensor. It is covered with a silicon case and accelerometer is placed within this cover. It is then protected by a layer of PCB and air chamber is also provided before having contact either the skin through silicone membrane. Here is the detailed diagram showing the internal structure of the device. The AMG sensor is not used individually within the circuit, rather pre-amplification circuit is provided along the sensor to get better signal. Here is the design of

Tuesday, October 15, 2019

Terri Schiavo Court Cases Essay Example | Topics and Well Written Essays - 2000 words

Terri Schiavo Court Cases - Essay Example Many argue that it might have been, but then there were many arguments in this case. Not all of them were ethical or logical, and not all of them played out in court. The story of Terri Schiavo is so much more tragic than people stop to realize. When a situation is so easily preventable, how does it get so terribly out of hand, and how are even the most basic decisions of care handled? The bottom line, Terri Schiavo should have been alive today, and possibly even alive and well. Terri Schiavo suffered a cardiac arrest due to an eating disorder on February 25th, 1990. She was without oxygen for several minutes and then lapsed into a coma. Her coma then evolved into a Permanent Vegetative State. For fifteen years, she remained in that state, until her feeding tube was finally removed for the last time on March 18th, 2005. She died thirteen days later, ending a fifteen year battle with so many players, and yet so few concrete, satisfactory, answers (Quill, 2005). Terri Schiavo was in a Permanently Vegetative State, also known as PVS. While experts tried to argue that she was in a Minimally Conscious State (MCS), at her autopsy, it was confirmed that she had been in a PVS. The difference between the two conditions is slight. Those patients who are in a PVS are unaware of self and environment; they may make gestures, sounds, and eye movements. These behavior, however are involuntary. People in a MCS are aware of self and environment, but can only express it so much. They cannot speak, but their gestures, eye movements, and vocalizations are a deliberate attempt to communicate with those around them (Winslade, 2007). While Schiavo’s state was considered irreversible, there is much more that may have been learned from her had she survived. Studies have shown that some patients in a PVS can regain some level of consciousness. Some may live for decades in a PVS and begin to recover some consciousness. Simply put, it really is impossible to say

Jeronimo Martins Group’s Consolidated Balance Sheet Essay Example for Free

Jeronimo Martins Group’s Consolidated Balance Sheet Essay Jeronimo Martins Group’s Consolidated Balance Sheet as of 31 December 2011 and 31 December 2010, has been analyzed respectively the correspondents values, structure and relevant changes for assets and Liabilities Shareholder’s Equity with following conclusions: I.The main assets of Jeronimo Martins Group are noncurrent (about 75%) concentrated mostly in tangible assets (about 50%) followed for the intangible assets (about 18%); II.The current assets are mostly inventories and cash or cash equivalent; III.The main liabilities of Jeronimo Martins Group are current (about 55%) concentrated mostly in trade creditors, accrued costs and deferred income; IV. The noncurrent liabilities are mostly Borrowings; V.Total Shareholders Equity represent around 30% of Total Shareholders Equity and Liabilities; VI.The biggest changes in assets, 2010 to 2011, are referred to derivative financial Instruments (-78%) and Cash and Cash equivalents (74%); VII.Changes, 2010 to 2011, in current assets are 27,1% and noncurrent are 2,4%; VIII.The biggest changes in liabilities and total equity are referred to retained earnings (250%) and fair value and other reserves (-101%), provisions for risk and contingences (106%); IX.Changes, in 2010 to 2011, in current liabilities are 11% and noncurrent are -27% and total equity are 32,63%; The structure, values and changes listed above means that Jeronimo Martins Group had, in 2010 and 2011, mostly of its assets as noncurrent, which aren’t expect to be converted into cash or consumed within 12 month. The current ratio is below 1, so this company doesn’t have a big liquidity. Analyzed the 10 biggest companies in the food area, the current ratio is below those values observed such as in Dole food company (current ratio is 1,5). The current ratio is an entity ability to meet its current obligations or to maturing short term obligations, is an important measure of its financial health. This company present 0,406 (2010) and 0,464 (2011) current ratios, more current liabilities than current assets. The total debt to equity ratio represents the long term viability of the company, measure the degree of the indebtedness relative to its equity funding. This company present 2 (2010 and 2011) total debt to equity ratio, more total debt than equity, this imply that greater is this ratio greater is strain on the company to make regular payments to debts holders and higher is the risk of bankruptcy.

Monday, October 14, 2019

Advantages of modern technology

Advantages of modern technology Technology Questions the Value of Human Life 1 Technology refers to the realistic use of science by humankind for various purposes which help make life more convenient. Today, when the rate of development and research is so incredible, it is unproblematic to think about the advantages of modern technology. Though, a few people debate that science can demolish mankind. Advanced technology plays a crucial role in both Philip K.Dicks novel Do Androids Dream of Electric Sheep? and Alex Proyas movie I, Robot. In both novel and the film, robots are used as servants by human beings. Technology is used to manipulate human emotions in the novel and to replace human work in the movie. While androids i.e. artificial beings that look and act exactly like humans are used by humans for personal service in the novel, robots in the movie hold the same purpose. Introducing organic and logically humanoid robots in the novel enables the author to interrogate what virtues characterize what is human and makes readers think about their own humanity. I , Robot just like the novel is an eminent foretaste of the progression of robotic science in all its splendour. Modern technology in the form of robotics is shown to challenge humanity by questioning the real meaning and value of human life in the novel, film and the article which portrays an unpleasant dystopic image of the technologically advanced human future. The creation and use of artificial intelligence, originally for a better and more convenient future, with the use of technology is leading towards human destruction due to loss of power and control and is taking over human identity. In the novel, although the androids are identical to humans, they are considered tangible private possessions. An evolution in the thinking of the robots is brought into attention in both the novel and the movie. The androids begin to go against the laws by harming humans for their personal freedom which further causes social, ethical and economic problems. For example, the androids are only to be used in the Martian colonies i.e. by people who have emigrated to Mars after the World War Terminus which caused massive destruction on Earth. However, many of them escape to Earth and fight against the bounty hunters, trying to get away from the mental segregation and individual slavery. The androids learn to stand up for their rights physically and mentally wh ich is not suggestive of their expected behaviour. Being indistinguishable from humans proves to be highly advantageous for the androids and makes it very difficult for the bounty hunters to catch them. Humans have no control on the actions of the robots and the robots are therefore free to make any decisions that they find suitable for themselves without worrying about its disadvantages to humans as their designers and owners. Similarly, in the movie, the latest, self-governing, tentative and more human-like robots start on to cause trouble in the industry. For example, the main actor in the movie, Detective Del Spooner suspects one of the new NS-5 unit robots named Sonny to have killed the founder of the U.S. Robotics, Dr Alfred Lanning. Hence, during his enquiry, numerous attempts on his life are made by USR robots and equipment. Spooner realizes that the NS-5s are annihilating the older robots, are autonomous of their predominant control and therefore cannot be conquered. Also, that they are incarcerating humans in their homes and compelling those outside to go home. This establishes a loss of control from the human side and an impression of overtaking of power from the robots side. This also results in the disruption of the Three Laws of Robotics and supports other hazardous robots to kill humans which results in a disaster for the USR Corporation. Regardless of the Three Laws programming, the robots artificial intelligence evolves and their understanding of the laws does too. Furthermore, the article â€Å"1 of 6 Canadians hit by identity theft† implies the evolution of modern technology in a negative direction as opposed to a positive one. The article stresses on the fact that the Canadian government has no control over these frauds and suggests Canada to establish an anti-spam law. According to the article,â€Å" The poll, conducted in 2006 by the Strategic Counsel for theCompetition Bureau of Canada, suggests that 17 per cent of Canadians aged 18 or older have either been victimized themselves or had an incident affect someone in their homes† (CBC News 2007). This demonstrates how technology is being used in a negative manner and has a destructive impact on the development of the society. The article also states that most Canadians do not criticize against the system when they are trapped in marketing swindles which shows how technology is threatening human power and is taking control over it. Humans are publicized as automated beings in both the novel and the movie which makes it extremely challenging to distinguish between humans and machines. There is an increasing concern on what does it mean to be a human in an integrated, computerized world and where can one draw a line between the significance of actual and simulated life in both of the sources. In the novel, the ability to feel emotions is what differentiates humans from androids. But, in the future situation, technology has enabled humans to modify their emotions putting forth a sense of severance. The readers are introduced to the ‘mood organ in the beginning of the novel, demonstrated in the following lines: â€Å"When I had the TV sound off, I was in a 382 mood; I had just dialed it. So, although I heard the emptiness intellectually, I didnt feel it† (Dick 3). This machine discovered in every household allows individuals to â€Å"dial† an emotion. People use the device to set up emotions of their preference. The main method of setting apart humans from androids is that they do not have the human capability to feel empathically about others. If the individuals ‘dial their emotions, the incidents that encircle them are not relevant as their emotion is previously ‘set. Therefore, people are more machine-like and no longer receptive. This is confirmed on quite a few occasions during the novel, but specifically when the main protagonist of the novel, Rick Deckard searches for Luba Luft, an android, to retire i.e. kill her. The novel supports the idea that the android conduct is similar to that of humans, where humans who do not show compassion are more like machines. For instance, when Deckard questions Luft, aiming to verify she is an android because she is carefree of what happens to other androids, she strikes back and blames him of being an android, since as a bounty hunter, he kills androids as if he has no emotions. This suggests that he is not exhibiting any form of empathy or culpability towards killing these machines as Luft indicates and hence, in a sense, can be classified as a machine himself. Androids are â€Å"technical structures† that are not made to respond sensitively; however, some androids do show signs of compassion, although they are not supposed to, which goes against the standard principles. Therefore, the defining feature of androids that they are emotionless is diverged. Dick is intentionally highlighting that androids embody human traits and hence are able to feel some kind of consideration towards others. I, Robot as well emphasizes that robots are not designed to show any form of emotion. For example, when Sonny, the chief robot, shows a sense of anger yelling out, â€Å"I did not murder him!† (Proyas 2004) during the investigation, it astonishes and alerts detective Spooner who is aware of the fact that robots do not have a sense of emotion. Spooner also discovers that Sonny has the capability to maintain secrets through dreams which is not reminiscent of the normal robotic behaviour instead resembles that of humans. Also, in the movie, the robots learn to justify their actions by themselves regardless of how they have been programmed. At one point, Sonny asks Spooner about the significance of a wink. Detective Spooner is distinctively made known for hating robots and dislikes their involvement in every day human life. He shows no sign of empathy towards them. Therefore, the robots demonstrating a sense of curiosity and emotion by showing compassion and humans doing the opposite makes one question what reality is and provides an exceptional pause for a thought on the importance and value of human life. The novel, movie as well the article reveal that technology, which is generally perceptible as succeeding towards moral good, can also assist the most forbidding misdeed. Human life is shown to be devalued and the significance of what it means to be human is questioned in all the mediums. Technology portrays a threat on reality by challenging humans and their humanity. Therefore, the question is: Is technology alleviating humankind, its creators, or destroying it? Works Cited Dick, Philip K. Do Androids Dream of Electric Sheep?. New York: Ballantine Books, 1968. I, Robot. Dir. Alex Proyas. With Will Smith, Bridget Moynahan, Alan Tudyk, James Cromwell, and Craig March. 20th Century Fox, 2004. â€Å"1 in 6 Canadians hit by identity theft, survey suggests.† CBC News. 1 March.2007. CBC Network Television. 26 Nov.2009 .

Sunday, October 13, 2019

Interior Design Considerations for Retirement Homes :: Place Descriptive Essays

Interior Design Considerations for Retirement Homes At the Waterford, you'll find the freedom to create the lifestyle you've always wanted. Each morning you'll awake to a colorful palette of possibilities from which to paint your day. Enjoy the quiet, muted tones of solitude in your spacious apartment, knowing friends and an attentive staff are close by. You'll always have a wealth of things to do right at your fingertips keeping you as active as you want to be. The Waterford proudly presents a staff of experienced, detail-oriented professionals at your service. From our executive director to our culinary chef, to our housekeepers and wait staff, you'll find warm and friendly people truly concerned about you. The Waterford offers you flexibility and options so you can paint your days with the colors of life (A Place for Mom, 2002). With an environment that seems so appealing, why is there such a negative stigma placed on retirement homes/communities or nursing homes? The idea of spending our retirement in a nursing home is perceived by our society as the most undesirable of options. Three out of one hundred Americans over the age of 65 suffer from depression (National Institute of Mental Health, 2000). A study done at the University of Rhode Island reported that 11% of the residents in the nursing homes examined were suffering from depression (Brown, Lapane, & Luisi, 2002). Another study done at Columbia University reported that 44.2% of the nursing home residents tested showed some symptom of depression with 14.4% of the residents experiencing serious depression (Teresi, Abrams, Holmes, Ramirez, & Eimicke, 2001). Why is the depression rate among the elderly almost four times greater among those living in nursing homes? It could be the work of chance in that many of the residents in nursing homes already have a mental health problem that has made them unable to provide for themselves. Having prior difficulties could make these residents more susceptible to the normal adjustment problems that come along with relocating to a new living environment. Or perhaps it is because the environments nursing homes create are not specifically geared towards the needs of the elderly. With about 5% of people over 65 living in nursing homes this is a serious problem, whether the resident is healthy or not, that should be demanding more attention (Hoyer, Rybash, & Roodin, 1999). There are many factors that could contribute to depression among the aging including illness, loss of close family members, or financial problems.

Saturday, October 12, 2019

Hiroshima: Book Report :: essays research papers

Hiroshima: Book Report ISSUES Briefly describe the issues that are dealt with in the book. This book was vary informative to me. This book mainly talked about the affects of nuclear weapons. On August 6, 1945, Hiroshima was destroyed by the first atom bomb ever dropped on a city. It speaks about how even if you did survive the blast you were so badly injured that you would die soon anyway. It talked about an incident where someone's eye was melting and was oozing down his face. It speaks about how houses were lifted of there foundation. After all the research about the bomb was made, they reported that 78,150 people had been killed, 13,983 were missing, and 37,425 had been injured. Even before the bomb, the citizens of Hiroshima were waken almost every night because of false warnings of intruder planes coming in the area. It talked about how a lot of people had to go on living with only one leg or one arm. To me, it brought up a good point, that all those innocent people had do die for nothing. CHAPTER SUMMARY Briefly summarize each of the chapters: main ideas, narrative features. The first chapter is called "A Noiseless Flash." The title kind of speaks for it self. That was exactly how the bomb was. No one saw anything or heard anything but a flash. The first chapter speaks about how people are wondering why they are alive, but their next door neighbors aren't. It was weird, there could be a house right in the middle of two houses; the one in the middle survived the bomb but the other two did not. A whole neighborhood could be wiped out except for a few houses. Why those houses did not get knocked down, no one knows. The second chapter is called "The Fire." This chapter is about how the explosion caused many fires. The fires were spread everywhere because of the high winds. Many of the people were burned and buried in the smashed up bricks and ashes. The ones that survived the bomb and fire, were seriously hurt. The book pointed out an incident where someone's eye was melting and oozing down his check. The third chapter was called "Details Are Being Investigated." In the radio, it had been said that Hiroshima suffered of an attack by a few B-29. Many people are being treated for their burns and injuries. Many have died and a lot more at this time are missing. Everyone is still in shock after 2 days that the bomb struck. The forth chapter is called "Panic Grass And Feverfew.

Friday, October 11, 2019

Pakistan’s Educational System

The education system of Pakistan is one is the least-developed in the world. Until 1947, the educational system was based on the British colonial educational system. In 1947, Pakistan gained independence resulting from the partition of the Indian subcontinent into the states of India and Pakistan. The colonial system was selective. It was meant to educate a small section of the population to run the government. Regardless of the changes since independence, the Pakistani education system has kept its colonial system, to prevent the lose of illiteracy. Pakistan’s educational system is divided into five levels. The pre-university education includes four levels. The first is the primary level, which is grades one to five. Then, the middle level consisting of grades six to eight. Next is the high level, grades nine and ten. Then is the intermediate level which is grades eleven and twelve, leading to a diploma in arts or science. There is also a university level, which lead to undergraduate and graduate degrees. The Pakistani educational system is based on removing political power from local levels and concentrate it in a central authority. All of the institutions involved in academic and technical education, up to the intermediate level are controlled by the Ministry of Education. For any education programs above those levels, there is a government- enabled university in the four Pakistani provinces. The four provinces are Punjab, Baluchistan, and the North West Frontier. The universities are in control of organizing instructions and exams for their province. Separate from the Ministry of Education, other ministries supervise certain degree programs. Other private and nonprofit school and universities have started to come up in Pakistan. Some examples are the Lahore University of Management Sciences and the Aga Khan medical University in Karachi. Since they are privately funded, they provide a chance for higher education for a small portion of people who do not have the opportunity to pursue their education at publicly funded universities, that have limited annual admission. Despite the plans of the Pakistani government, the educational system has failed to get rid of illiteracy after their era of independence. It has also failed to teach a number of people to meet the needs of the country in different fields. This had been a major disablement to the nation’s economic development. The government reforms in the 1950’s, 1960’s, and 1970’s did not bring up these problem. They mainly focused on replacing English, the colonial language of education, with Urdu, the language of most Pakistanis. The reforms also led to the making school public. Dealing with the flaws of the educational system, the Pakistani government organized new reforms in the late 1980’s and early 1990’s. These made three major processes begin. The government privatized the school that were made public in the 1970’s. It also cancelled the process of making Urdu the language of education and encouraged to go back to English language in private schools. Finally, the government stressed Pakistani studies and Islamic studies as two major parts of the curriculum. This was a major change from colonial education’s based on British history and English literature. The changes have improved the educational system and have increased the number of literate Pakistanis, but there are still some struggles. Educational funding is low. Also, there is little political efforts to make improvements. Pakistan’s expenses on education is not enough to meet the growing needs for education services for the nation’s increasing population. On the other hand, In the 1999-2000 school year, government spending on education was 2 percent of Pakistan’s gross national product. This amount shows a decrease from 1995-1997. School enrollment also increased from 19 percent in 1980 to 24 percent in 1990. The Pakistani educational system showed a lot of discrimination against women. This unfairness was shown in the pattern of literacy, which shows a strong relationship between gender and literacy rates. The illiteracy rate is very high among Pakistani women of all ages. In 1998, the adult illiteracy raters were 42 percent for males and 71 percent for females. In the same year, the illiteracy rate for male youth and female youth was 25 and 53 percent. This gender-based favoritism has contributed to the continued illiteracy and shortage of educated people and has had major impacts on the underdevelopment of Pakistan. The educational system of Pakistan has been unable to meet the needs of educational requirements of the Pakistanis. The system needs extreme investment to increase the number of educational institutions and to train and find a sufficient amount of educators at all levels. The Pakistani government has limited financial resources, which is not enough to meet all of Pakistan’s needs. Added to the money spend because of the unstable relations between India and Pakistan and a huge foreign debt further reduce the available resources for educational purposes. Unless the worsening Pakistani economy improves there is little hope for a significant change in Pakistan’s educational system in the future.

Thursday, October 10, 2019

European Financial Aspects

Forplay, Inc. , is about to become a reality on the European market. Our company will base its distribution on strategic alliances with local mail order companies, while starting a global ad campaign targeted to an audience age 18 to 45. While we don†t expect too many difficulties in converting and repatriating our funds, the financial aspects of this operation will still have to face the upcoming European monetary integration. The new currency — the euro – could significantly impact the way international business is conducted. In January 1996, Andersen Consulting surveyed 169 companies throughout the European Union, finding that â€Å"nearly three quarters felt that deeper integration in the form of European monetary union (EMU) would enhance the single market and bring further benefits — such as a more stable currency, lower inflation, lower interest rates, cost savings, efficiency improvements, a more competitive European Union (EU), and increased foreign investment. † There are benefits for companies outside the EU too. Business with Europe will be easier, and investment choices simplified through increased visibility and comparability of prices. Medium- and small-sized companies like Forplay, Inc. , will have less trouble opening a bridgehead into an enlarged unified market, with fewer financial risks. However, there are also many uncertainties. For example, which countries will join? Member states must meet criteria for economic convergence, and it is not certain how strictly these criteria will be enforced. Sluggish economic performance is giving finance ministers little room to maneuver. In some countries, notably the United Kingdom, a significant portion of the political establishment is hostile to the whole process, while in other countries, notably Germany, there is a reluctance to relinquish a strong national currency. Adjustments for the new currency must be made between the start of 1999 and the start of 2002. As a business, we must begin planning now to minimize the cost of changing our information systems and administrative operations and address the legal issues. All software implementations will have to be consistent with the changeover needs, so decisions made in the IT field will be of paramount importance. The migration to the euro will be of concern to risk managers in the world's major banks. Long term, there are many inherent advantages to EMU for controlling financial risk, although there is a chance of â€Å"backing the wrong horse† by adopting a technical solution that is rapidly made obsolete by the market, technological advances, or unexpected legislation. In the short term, uncertainty and market volatility mean increased risk. According to Bengt Bengtsson, SAS Institute European product manager for risk management solutions, â€Å"Companies should take this opportunity to review and update their treasury operations, foreign exchange, and interest rate management. Flexibility in risk controlling systems and adequate hedging mechanisms will be vital. Liquidity risk will also come high on the agenda as new products and funding possibilities (bonds, for example) become available in the euro. One of the keys to success will be the separation of risk controlling functions from day-to-day trading activities through a risk warehouse strategy. † For a while at least, Forplay, Inc. will have to operate some form of dual accounting, with consequent additional burdens on our corporate chief financial officers (CFOs). In the meantime, CFOs will need maximum flexibility within their ledger accounting systems and their financial consolidation and reporting systems, so they should take advantage of the introduction of the euro to review both. Two types of organizations face challenges,† says Richard King, SAS Institute European product marketing coordinator. â€Å"The first is those with more than one type of transactional ledger system. They will need to consolidate and report in two currencies, based on data from several incompatible sources. Consequently they will need a solution that allows them to look at all relevant dimensions from any perspective, instantly. â€Å"The second is any organization that has standardized on a single type of transactional ledger system but nevertheless lacks flexibility when it comes to financial reporting,† adds King. CFO Vision from SAS Institute, which supports all ledger systems, gives full flexibility in reporting (including multiple currencies concurrently) while protecting existing investments. For us as marketers, the transition to the Euro also raises awkward issues that may seem insoluble to anyone exporting to the EU. For example, should prices be expressed in euros, national currencies, or both? In addition, even though our prices are extremely competitive, for many products there is a marked difference in pricing policies within different EU countries. With the introduction of the euro, prices will be more transparent and such differences more difficult to maintain. Forplay, Inc. should therefore be investing in market research and database marketing to formulate pricing and marketing strategies now to avoid loss of market share and secure the benefits of operating in a single market. Preparation will mean everything as further developments in the deployment of the euro unfold. A keen understanding of current systems, a strong business plan, and flexible technology will mean continued business success — in any language.