Friday, November 29, 2019

Census Tract 78.09

The Hawaiian Islands lie in the centre of Pacific Ocean. These islands are located on several spots in the middle of the ocean. Another island in the Pacific Ocean is Oahu. The latter is closely located to the Hawaiian Islands with a census tract number of 78.07. The census tract map of Oahu Island in terms of per capita income is shown in the figure below:Advertising We will write a custom essay sample on Census Tract 78.09 specifically for you for only $16.05 $11/page Learn More I chose Oahu Island for this analysis because it is my home place. It is also imperative to note that the southern segment of the island is occupied by this island. On the other hand, Aiea borders Oahu Island to the east. There are two parallel roads that form boundaries to this tract. To begin with, the H-1 freeway creates a boundary to this tract on the northern side while the Moanalua Road forms the southern boundary to this tract. As I was walking along, I noted that the p earl Ridge shopping centre is also closely bordered with the Moanalua Road towards the south. One surprising aspect about this tract is that it is centrally located in the well developed island and it is also somehow difficult to identify the exact boundaries. However, with the use of maps provided by the United States Census Bureau, I was able to obtain all the relevant demographic data of this tract. Nonetheless, I noted that there was a lot of ease to reach sections of the island bearing in mind that the tract is conveniently located quite some distance from the freeway. I took approximately 15 minutes to reach the location of this tract within the downtown area through the eastern side of Kaneohe, Waipahu as well as Waikiki. If someone wants to reach Ko olina or the northern shore area, it only takes about 30 to 35 minutes. The areas are situated on the western region of the island. From my observation throughout the analysis, I noted that this tract is highly ordered with prope r town planning that may impress any visitor. For instance, there were four major malls in the island strategically located and easily reachable from any location of the Oahu Island.Advertising Looking for essay on geography? Let's see if we can help you! Get your first paper with 15% OFF Learn More Moreover, about one mile away, there is a healthcare centre known as Straub Clinic Hospital that caters for healthcare needs of the immediate population. Besides, there are myriads of schools, gas stations, car repair shops as well as restaurants located with this tract. All these features are just a clear indication on how communities living within tract and other neighboring settlements are capable of obtaining the much needed services within their proximity. As noted earlier, I would not have been able to analyze as well as comprehend the inherent features of this tract were it not for the invaluable data provided by the U.S. Census Bureau. As a matter of fact, my main task was to confirm the validity of data provided by this tract and explain deviations just in case I noted any. To begin with, the 78.07 census tract number is beyond just a mere stretching road or street map. It can be deduced that detailed economic and demographic components are represented in this map. In particular, the boundaries of these components are clearly stipulated explaining the composition and content of each part. Hence, the data provided by the US Census Bureau has made it possible for me to analyze as well as understand the economic and demographic characteristics of people who live close to my home place. This tract is well populated with about 10, 000 people. Out of this total number, males are slightly higher in number comprising of 52.9% of the total population while females make up about 47.1% of the total count of people in the tract. If these figures are anything to go by, then I suppose it depicts the actual situation in my neighborhood whereby most househo lds have more male members than females. For example, I have two brothers and one sister while in the neighboring house; there are 3 males and 2 females including the parents. In any case, as I was walking in one of the streets, I noted that the number of males whom I meet on the roads would slightly outnumber that of women. This was the same case even in the public service vehicles as well as the number of passengers in public service vehicles that I tallied all along. In addition, another interesting fact about this census tract is that the age bracket between 25 to 44 years has the largest number of people within the entire population. In the data I obtained from the US census Bureau, those who are between 25 and5 34 years comprise of about 23 % of the total population while those who are within the age range of 33 and 44 make up to 20.5% of the total population.Advertising We will write a custom essay sample on Census Tract 78.09 specifically for you for only $16. 05 $11/page Learn More In total, the 23% of the total population in Oahu tract accounted to 2, 309 people as per the 2004 data. I have noted this trend ever since I became a resident of Oahu Island. Although the US census Bureau statistics do not offer vivid information on this age bracket disparity, I can attest to the fact those who are between 25 and 44 years are mostly working class in their youthful and productive years. The fact that Oahu Island is a booming urban with myriads of vibrant economic activities implies that there is much need for youthful professionals who can drive the economy of this area. The latter definitely explains the reason why majority of the population is made up of those who are young in terms of age. However, recent statistics show that the Oahu population has significantly grown over the past few years bearing in mind that the latest figure of the total population is being quoted at 953,207 people. In addition, most of the population t hat amounts to about 75 % of the total count is known to dwell on the ‘urban’ side of the island. Indeed, this explains the reason why the city portion of the island is highly congested with people and economic activities. For example, it is quite hectic to penetrate through heavy traffic jams during the rush hours in the mornings and evenings when most people either leave or start their working hours. Besides, resources have also been strained with the growing number of people some of whom have decided to shift to the city side of the island for the purpose of working. The real estate business in Oahu also seems to be quite well largely due to the booming population. As one walks through the streets and bordering roads both to the north and south, it is clearly evident that this tract is currently witnessing major boom in the real estate industry as more commercial and residential buildings are being constructed each passing day. Indeed, the prices are steady and it is not easy to afford some commercial building in this place in terms of rental costs. In any case, the US Census Bureau statistics indicate that homes that are ready for sale have limited inventory. The table below shows the rate of population growth in Oahu since the year 2000. Advertising Looking for essay on geography? Let's see if we can help you! Get your first paper with 15% OFF Learn More Source: US census Bureau Before the last census was carried out, the Oahu population had recorded quite a mixed number of different races with their varying percentages. These were as follows: Blacks – 11,021, Caucasian – 178,050, Chinese – 45,410, Filipino – 119,237, Hawaiian – 169,964, Japanese – 159,767, Korean – 9,000, Mixed (not including Hawaiian) – 165,051 Samoan/Tongan – 16,206, Unmixed (excluding Hawaiian): 538,692 (source: US Census Bureau, 2010) From the list above, it is evident that the Caucasians are the majority race in this tract. They are then followed by the mixed categories of races who account for about 19% of the total Oahu population. I can indeed attest to the fact that the Caucasians are the majority race in this place even as one takes a walk through the streets and shopping malls. They own quite a huge chunk of business establishments here. As I was strolling past the upper side of the city, I h appened to come across quite a number of places of worship in this tract. For instance, some of the dominant places of worship and religions in this area include the Assemblies of God, Baptist, Buddhist, Catholic, Lutheran as well as Methodist believers. This made me to believe as well as assume that this area is made up of several races that are attached to myriads of religious beliefs. In addition, this could be an indication that most occupants of Oahu are mostly foreigners who came along with their unique ways of worship. In other words, this place is not dominated by one or a few religions as one would assume. It depicts the diversity of the region. In order to confirm my assumption, I once visited a Catholic cathedral in the area and I was surprised to notice a wide range of various races who attended the service. Although my family church has been Assemblies of God since childhood, this has not changed the scenario at all since most of the races are represented here with the exception of religions such as Buddhism that do not uphold to Christian faith. It is only the Buddhist congregation that appears to be separated and at big difference with the rest of the Christian based churches. Needless to say, religion is an integral parameter in Oahu since communities here seem to be closely attached and united by their respective religions. At some point, I almost concluded that while religion might be perceived as a unifying factor in most cases, it appears to play a divisive role in Oahu. My next area of analysis will be education, employment and income disparities. It is worth noting that education has been given top priority in this tract. The entire island appears to be well represented in terms of educational infrastructure that is most needed by the various communities. Education falls under the wider field of socio-economic status. It is definite that figures on socio-economic status of any given society are integral when undertaking demographic analys is. From the last census, over 130,000 students under the K-12 level had been enrolled in public schools. This figure does not include those who are attending both the chartered and special schools. In addition, the number of schools categorized under public has immensely grown to over 180 since the year 2005. On the other hand, the number of privately sponsored schools is above 100. These figures should be taken as purely provisional because when I compared data obtained from the 2010 census results, a lot has changed and consequently the numbers have also changed. The entrepreneurial nature of the Oahu residents is also another factor that has rapidly changed the socio-economic standards of this area. When I carried out my own physical observation and tallying of school-going children, I noted that in one single morning, a total of 25 school buses which passed were taking children to public schools while only 9 of the school buses were privately owned. In addition, although I pers onally attended a private school all through my elementary level, most of my childhood friends especially those who live in the neighborhood attended public learning centers. Some of the elementary private schools near our home include Hawaii Baptist academy which is church sponsored, hanalani schools and Assets School. I personally attended Epiphany Elementary school situated just within a 10 minute drive from our house. Some of the renowned public schools include the Iroquois Point Elementary School and Ahuimanu Elementary School. In order to obtain a very accurate and solid data in my analysis, I decided to focus on the county of Ahuimanu within Oahu. In terms of the data I obtained from the US Census Bureau, about 99.5% which represents 8,768 of the total population were categorized as in-households. Householders comprised of 2,745 people while the number of spouses were 1,750. Children within this county were 2,688 while those with their own children while still under 18 years were 1,597. Those beyond 65 years were only 31. The latter figure confirms the higher number of young population in this census Households by type The total households are 2,745, family households stand at 2,246, those under 18 years with own children were 886, husband-wife family are 1,750, with own children but under 18 years are 688, male householder with no wife present stood at145, those with own children but they are under 18 years are 62. Housing occupancy The total housing units stand at 2,826, occupied housing units are 2,745, vacant housing units are 81, and those for renting are 16, while 3 are not occupied. 17 units are ready for sale; those sold but not occupied are 6. Seasonal, recreational, or occasionally used units are 16, all other vacant houses are 23, homeowner vacancy rate is 0.8 % while rental vacancy rate is 2.8 %. Housing tenure The total number of occupied housing units is 2,745, owner-occupied housing units are 2,199; the population in owner-occupied housin g units stands at 6,889, the average household size of owner-occupied units is 3.13, and the renter-occupied housing units are 546. This essay on Census Tract 78.09 was written and submitted by user Diamondback to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Humorous Quotes on Love and Marriage

Humorous Quotes on Love and Marriage Poking fun at love or marriage can be a dangerous proposition when youre making a joke in the presence of your loved one. Humor is like spice: the right amount can make a delicacy out of a bland meal. The key is the right amount. Use a humorous quote to season your words with the right amount of humor. Even then, be prepared to duck, apologize, and eat your words. At least, youll be able to attribute them to someone else. Thyra Smater Winsolow Platonic love is love from the neck up. Lily Tomlin If love is the answer, could you please rephrase the question? Woody Allen Love is the answer, but while youre waiting, sex raises some pretty good questions. Unknown Love is telling someone to go to hell and worrying about them getting there safely. Rogers Willson It doesnt much signify whom one marries, for one is sure to find out next morning it was someone else. Edgar Watson Howe A woman might as well propose: her husband will claim she did. John Updike Every marriage tends to consist of an aristocrat and a peasant. Frank Zappa I detest love lyrics. I think one of the causes of bad mental health in the United States is that people have been raised on love lyrics. Bill Cosby For two people in a marriage to live together day after day is unquestionably the one miracle the Vatican has overlooked. Honorà © de Balzac Great love affairs start with Champagne and end with tisane. Ray Bandy Honeymoon: A short period of doting between dating and debating. Johnny Carson I know youve been married to the same woman for 69 years. That is marvelous. It must be very inexpensive. H. L. Mencken To be in love is merely to be in a state of perceptual anesthesia - to mistake an ordinary young man for a Greek god or an ordinary young woman for a goddess. David Bissonette I recently read that love is entirely a matter of chemistry. That must be why my wife treats me like toxic waste. Beverly Nichols Marriage: a book of which the first chapter is written in poetry and the remaining chapters written in prose. Henry Louis Mencken Bachelors know more about women than married men; if they didnt, theyd be married too. Helen Rowland When you see what some girls marry, you realize how they must hate to work for a living. Anonymous Theyre almost inseparable. Sometimes it takes ten people to separate them. Anonymous If love is blind, why is lingerie so popular? Lord Dewar Love is an ocean of emotions entirely surrounded by expenses. Helen Rowland A man snatches the first kiss, pleads for the second, demands the third, takes the fourth, accepts the fifth†¦ and endures all the rest. Helen Rowland In olden times, sacrifices were made at the altar, a practice which is still very much practiced. Anonymous Love is one long, sweet dream and marriage is the alarm clock.

Thursday, November 21, 2019

(SMHR) - Strategic Management of Human Resources Essay

(SMHR) - Strategic Management of Human Resources - Essay Example Like every strategy, strategic management of human resources is also a strategy for getting some desired result in the organisation. The foundation of strategic human resource management is based on the organisational objectives. Every business organisation has some main objectives and they formulate certain plans and strategies to achieve these organisational objectives. The set organisational objectives lead every firm to the zenith of success. Human resource management and strategic human resource management are two different concepts with some specified relations. They are actually the two sides of the same coin having certain similarities and differences. People usually have the wrong notion that these terms are one and the same. As a result, people tend to use them interchangeably without understanding the real meaning. But there is a clear-cut difference between these two terms in meaning as well as in practice. Strategic human resource management is needed for the high level of competency of any organisation. Human resource management is an inevitable process with in the organisation. The terms strategic human resource management and human resource management can be thoroughly understood from the following analysis. The definitions of these concepts would give an in-depth idea. The term strategic human resource management can be defined as â€Å"the linking of human resources with strategic goals and objectives in o rder to improve business performance and develop organizational culture that foster innovation, flexibility and competitive advantage† (Sinha 2007). The strategic human resource management is a link in connecting human resources with definite organizational goals and objective for the purpose of enhancing business performance and developing certain culture which suits the requirements of organizations. On the other hand human resource management can be defined as â€Å"the function within an

Wednesday, November 20, 2019

Business strategy in financila services Essay Example | Topics and Well Written Essays - 2000 words

Business strategy in financila services - Essay Example A host of modern pharmaceutical companies all started out as Rhine-based family dyestuff and chemical companies e.g. Hoffman-La Roche, Sandoz, Ciba-Geigy (the product of a merger between Ciba and Geigy), and Novartis1 etc. Most are still going strong today2. Over time many of these chemical companies moved into the production of pharmaceuticals and other synthetic chemicals and they gradually evolved into global players. There are certain factors like the introduction of the penicillin during the late 1940s, its success and relative success of many other innovative drugs which actually institutionalized the efforts of research and development (R&D) in the pharmaceutical industry. The industry expanded rapidly in the sixties, benefiting from new discoveries and a lax regulatory environment. During this period healthcare spending boomed as global economies prospered. The industry witnessed major developments in the seventies with the introduction of tighter regulatory controls, especially with the introduction of regulations governing the manufacture of 'generics'3. The new regulations revoked permanent patents and established fixed periods on patent protection for branded products, a result of which the market for 'branded generics'4 emerged. PESTLE Analysis PESTLE analysis is a useful tool for understanding the "big picture" of the environment, in which you are operating, and the opportunities and threats that lie within it. By understanding the environment in which you operate (external to your company or department), you can take advantage of the opportunities and minimize the threats (RAPIDBI). Specifically the PEST or PESTLE analysis is a useful tool for understanding risks associated with market growth or decline, and as such the position, potential and direction for a business or organization. Technological advancements, tighter regulatory-compliance overheads, rafts of patent expiries and volatile investor confidence have made the modern pharmaceutical industry an increasingly tough and competitive environment. An analysis of the structure of the pharmaceutical industry using the PEST (political, economic, social and technological) model (Susanne, 2004) is given below. Increasing Political Attention Over the years, the pharmaceutical industry has witnessed increased political attention due to the increased recognition of the economic importance of healthcare as a component of social welfare. Political interest has also been generated because of the increasing social and financial burden of healthcare. Examples are the UK's National Health Service debate and Medicare in the US. Increased Economic Value During the year 2003, there were many high value mergers and acquisitions which were witnessed by the global pharmaceutical industry. With a projected stock value growth rate of 10.5% (2003-2010) and Health Care growth rate of 12.5% (2003-2010), the audited value of the global pharmaceutical market is estimated to reach a huge 500 billion dollars by 2004. Only information technology has a higher expected growth rate of 12.6%. Majority of

Monday, November 18, 2019

Extensive reading approach and contrast this with direct or component Assignment

Extensive reading approach and contrast this with direct or component skills - Assignment Example Uncommonly, there is an approach that avoids the use of recommended reading materials and guided reading activities, yet has the same aim of promoting advanced reading skills of students. This approach is referred to as the extensive reading approach. What is extensive reading? The term extensive reading is credited to Harold Palmer (1917: 137) who proposed that learners should read one book after another. The idea of reading a great number of reading materials over time to improve reading proficiency is based on the belief that language acquisition, especially vocabulary development, occurs through reading (Nagy & Herman 1987: 20). Supporters of extensive reading believe that the more reading experiences language learners have, the more adept they will be in the target language. In particular, Grabe and Stoller (2002: 90) believe that although extensive reading alone cannot guarantee language proficiency, the latter cannot occur without extensive reading. The extensive reading appro ach offers some advantages that other approaches do not have. Making students form the habit of reading could lead to promoting the love for reading, making the reader as the focus of instruction, empowering comprehension, and improving linguistic and communicative ability. (References for this are quite impossible to obtain, thus I used â€Å"could lead to† to imply possibility, thus lessening the claim). Promoting the love for reading Promoting the love for reading is one essence of the extensive reading approach. Dublin, Eskey and Grabe (1986: 228) noted that people learn to read and improve in reading by means of reading itself. In extensive reading classes, students are motivated to read to build the habit and enjoyment in reading. As Grabe and Stoller (2001) claims, ‘one does not become a good reader unless one reads a lot’ (198). As such, the extensive reading approach differs a lot in structure and materials from intensive reading approaches. The teacher in the extensive reading class allows students to read the materials they prefer, thus cultivating in them the interest to read about those things they find interesting. Students have the option to read fiction or non-fiction books, or basically anything they find interesting among a variety of materials available. This way, students are not forced to understand topics or concepts that they find vague at the very beginning. Ideally, the love for reading may be developed if teachers allow students to read according to their interest, pace and level (Collie & Slater 1987: 6). In other approaches, students are asked to read a uniform text, thus they are forced to understand knowledge and concepts even though such are not applicable to them. For instance, a Muslim kid may deal with a text discussing the beatification of Pope Paul II when reading about current events. Such a practice, although may enhance the knowledge of a student about the world, could interfere with a student’s culture and affect his/her interest during a particular reading class. This implies that teachers using other approaches should be careful in choosing materials for their students. Nunan (1989: 60) posits that the reading materials should have some cultural or personal relevance to the readers.

Saturday, November 16, 2019

Design Of Wifi Based Tdma Protocol Information Technology Essay

Design Of Wifi Based Tdma Protocol Information Technology Essay Time division multiple access is a multiple access method for shared the channel by dividing the signal into different time slots. TDMA is successful works in cellular mobile communication for several years ago. Recently has been combined with OFDM to introduce OFDMA. TDMA also ensure fairness between nodes in the network. In vehicular scenario, we proposed TDMA protocol to work with CSMA/CA to mitigate and cope with some of the challenges in vehicular communications. In this chapter we will discuss the design of the protocol, connection messages, protocol flow and cross intercommunication between the new TDMA sublayer with CSMA/CA and PHY layers. In section 3.2 a general explanation of proposed TDMA protocol, the design of Wi-Fi-based 802.11p is discussed in Section 3.3. In Section 3.4, implementations of TDMA protocol in the simulation environment is presented. Simulation problems and implementation improvements is discussed in Section 3.5. The chapter summarization is given in Sec tion 3.6. 4.2. EXPLANATIONS OF TDMA PROTOCOL The TDMA protocol is representing as a provider client protocol, which means the protocol is centralized. The other possibility is to define a distributed or an ad hoc protocol as it is done in (Fan Yu, 2007) and (Katrin, 2009). We mean by centralized that the provider will be the only one handles the information that has given in both channels. This does not mean that all communication is going to be only unidirectional (from the provider to the client), but sometimes is going to be bidirectional communication. The provider in our case here is the RSU (Road Side Unit) and the client/station is OBUs (Onboard Units). Form now we may always use the term RSU to provider or centralized node and the OBU to client or mobile station. Here we need to implement frame of 10 ms, those frame consist of two main time slots, one of them for the control and the second one for the service or data channel, and both are using different duration. Why we chose value of 10 ms because this is currently used in many TDMA implementations i.e. WIMAX. 4.3. DESIGN OF WI-FI BASED TDMA PROTOCOL IEEE802.11 has two modes DCF and PCF. Distributed Coordination Function (DCF) relies on CSMA/CA distributed algorithm and an optional virtual carrier sense using RTS and CTS control frames (IEEE Std 802.11, 1999). If the channel is busy during the DIFS (DCF Interframe Space) interval, the station defers its transmission. Point Coordination Function (PCF) is used for infrastructure mode, which provides contention-free frame transfer for processing time-critical information transfers (W. Wang, 2003). PCF is optional in the standard and only few vendors implemented it in their adapters. Two different periods defined at PCF mode: contention-free period (CFP) and contention Period (CP). CFP uses contention free-poll frames to give stations the permission to transmit. However, PCF has many drawbacks and limitations in long distance applications (i.e. up to tens of kilometers) this due to sensitivity of the acknowledgement (ACK) messages to propagation delay which is designed for contention -free local area networks purposes. Also, once a station reserves the access to the medium, it may occupy the medium for long time without any station can interrupt its transmissions even in the high priority traffics case; i.e. if the remote station has lower data rate due to the distance, then it will take long time to release the channel (Pravin, 2003). Consequently, it has been shown that (S. Sharma, 2002) (Sridhar, 2006) TDMA based MAC is suitable for long distance propagation delay. Most of the implemented solution for long distance Wi-Fi-based network was used WiMAX like TDMA frame for conducting the PMP scenario. However, using WiMAX/TDMA above Wi-Fi is increasing the system complexity and overhead since the WiMAX/TDMA has been built for the licensed-based and Wi-Fi is built with unlicensed environment. In this research a design of TDMA over the 802.11 is presented. The function of the proposed TDMA is to disable the contention behavior of 802.11 (CSMA/CA) for contention-less MAC. In this research a new cross layer design is introduced between CSMA/CA and new logical TDMA layer, which the Wi-Fi MAC frame is encapsulated in a logical TDMA header before forwarded to IP layer. The proposed protocol stack is shown in Figure4.1. The CSMA/CA peer-to-peer protocol is disabled and replaced with TDMA peer-to-peer protocol as shown with the dot-lines. Figure.4.1. Protocol flow of the TDMA-based PMP The logical TDMA header is added between IP header and MAC header. The function of the new header is to disable the random access feature of the CSMA/CA in 802.11 and replace it by logical TDMA function, which is maintains the synchronization of the local timers in the stations and delivers protocol related parameters. The frame is shown in Figure 4.2. The proposed TDMA header contains BCCH (broadcast control channel), FCCH (frame control channel) and RA (random access). BCCH: contains general information i.e. timestamp through time_stamp_update(), SSID, BS-node capabilities and random access time interval ra_interval(). All this parameters (except the RA time interval) is prepared and copied from the beacon frame (using beacon_content()) from the Wi-Fi MAC device driver. The BCCH information helps the APs in the sleep, wakeup, transmitting and receiving times. Figure.4.2. Additional TDMA header is added to Wi-Fi frame FCCH: carries the information about the structure and format of the ongoing frame i.e. scheduler () and time_slot_builder(); containing the exact position of all slots and Tx/Rx times and guard time between them and scheduling. RACH: contains a number of random access channels (RCH). This field is uses when no schedule has been assigned to the APs in the UL fields. Non-associated APs use RA for the first contact with an AP using slot_time_request(). The flow diagram of logical control and data channels is shown in Figure 4.3. Figure 4.3: the flow of the virtual channels for the TDMA frame, First, the RACH frame is receiving if there any connection request from APs to BS. Then, BCCH, FCCH and AGCH broadcast their information, then transmit and receive users payload. Timer is controlling all the transmitted and received signals. Although, the new TDMA header is introduced at the cost of the performance due to the overhead, however, in the long distance applications with point-to-multiple-point infrastructure scenarios usually the numbers of stations are not too high compared with end-user part. In our scenario we consider 4 remote access points and one central access point (BS-node). By implementing TDMA_module() each APs would assigned with time slot within the TDMA frame. TDMA also saves power because each STA only needs to wake-up during these time slots in each frame. If new node (AP) wants to join the network it listens to the BCCH frame to get the initial parameters from the BS-node. Then it uses the RA period to send time_slot_request() request to the BS-node to r equest for time slot. The BS-node uses the FCCH field to update the new scheduling table in scheduler(). The TDMA_module() assigns time slots for APs by taking copy of the NAV (network allocation vector) information (NAV_update()) from the Wi-Fi MAC layer and modifying it according to the schedule scheme. NAV is considered as virtual carrier sensing which is limits the need for contention-based physical carrier sensing. This is done by setting new back_off_counter() and NAV_new() in the TDMA_module() which indicates the amount of time that medium will be reserved for each time slots. The BS-node set the NAV value to the frame length time plus any other necessary messages to complete the current operation to make sure that no station (AP) will access the channel during the frame transmission. Other stations count down from the NAV to 0. When the NAV has nonzero value, the scheduler () send back to the Wi-Fi MAC that indication that the medium is busy; before the NAV reaches 0, the ba ck_off() and NAV_new() update the Wi-Fi MAC with the new NAV. The destination address (DA) and source address (SA) in the MAC frame header and in the SSID is modified according to the new NAV and RR scheduling information. Figure4.4 shows illustrate the flow of the process in cross-layer concept, which is consisting of three layers: TDMA source code, wireless driver and hardware abstraction layer (HAL). The cross layer is performed between wireless driver and the source code. HAL is different for each hardware platform. The procedure of this approach is also below: Core Module: Repoint the WiFi_MAC_SAP to TDMA_MAC Point the MAC-TDMA_SAP to IP TDMA_module() { //modify the NAV vector for virtual (fake) busy network busy If NAV() not_equal_to_zero then { //copy the NAV value to new place to use it for new AP Network_entry Copy CSMA/CA/NAV() to CSMA/CA/NAV_old() Copy TDMA()/NAV_new() to CSMA/CA/NAV() } If NAV()=0 then { // call NAV_update() TDMA/NAV_update() Set back-off counter() Send the NAV_new() to scheduler() } Scheduler(){ //using round robin queue scheme Round_robin() } //time_slot_builderà ¢Ã¢â€š ¬Ã‚ ¦ Time_slot_builder(){ random_access(){ // See if there are any time slot request If time_slot_request(){ Time_slot()++ } else traffic(); } } //add the new TDMA header // send the broadcast control channel (BCCH) bcch(){timestamp(); ra_interval; SSID;BS-node capability}; //for the RA using the same etiquettes used by contention period (CP) at the MAC level fcch() { slots_time_builder() Set frame_format(){ Slot_time_interval; } 4.3.1 TDMA Protocol Flowchart In Vehicular Environment The RSU sends the beacon frame periodically with the free slots available in the TDMA frame. The OBU scans for the RSU beacon. If more than one RSU respond, comparisons are made on their (received signal strength indicator) RSSIs and the best one is selected after which the order of merits are applied on the other RSUs as first, second, etc candidates according to their RSSI signal strength. The OBU uses the beacon to synchronize its frame with the RSU after which the OBU sends the data in the free slots (in the coming uplink frame). A check is performed to find if the RSSI Figure.4.4. Implementation and incorporating TDMA in 802.11p protocol stack. OBU scan for the RSUs Beacon frame More than one Beacon frame Are received No Compare the different RSSIs and select the best and > threshold Yes Synchronization and clock Exchange with RSU Send data in the free slots In the UL sub-frame RSSI No Yes Figure4.5 TDMA Protocol Flowchart The TDMA frame structure is shown in Figure4. 3. The TDMA frame encapsulates the 802.11 frames in the payload subsection. The frame is repeated periodically for every 20msec (which is the length of the frame). Each frame contains the beacon filed, i.e. the broadcast control channel (BCCH) which comprises timestamp, SSID, and BS-node capabilities. The frame also contains the frame control channels which carries information on the structure and format of the ongoing frame, i.e. the slots scheduler which contains the exact position of all the slots and the Tx/Rx times and guard times. The GACH and the RACH are used for random access channel when the OBU needs to join the WBSS. The RACH is the channel that the OBUs use for association request. The GACH is the grant access channel that contains all the OBUs accepted for transmission in the next frame. The TDMA is using transmission opportunities (TXOPs) mechanism originally provided by the IEEE 802.11e to calculate the DL and UL time slots duration. The TXOP is a predefined start time and a maximum duration for the station to access the medium. A RSU will set its own NAV to prevent its transmission during a TXOP that has been granted through the OBU (Figure4. 6). Rather than categorizing the data traffic based on the voice, the data and the video as in the 802.11e, the data traffic priority categories are based on the OBUs channel quality. The RSU gives high priority to vehicles with high speed to send more frames before it leaves the WBSS. The vehicle with the high channel fading will get more number of slots. Of course, this mechanism will introduce performance anomaly, however, we can use any of the solutions available in the literature for the performance anomaly (Tavanti, 2007) (IEEE P802.11p/D3.0,2007). DCD feedback TDMA DCF EDCA PMD and PLCP Figure4.6 Channel fading parameters feedback for vehicles transmission priority and TXOP setting. 4.4. IMPLEMENTATIONS OF TDMA PROTOCOL IN THE SIMULATION ENVIRONMENT In the previous section, we theoretically describe the main characteristics of the protocol which we want to design. This section explains how we implemented the ideas of this thesis by the modification Code of C++ in the Network Simulation. Although the protocol that we want to design is basically a protocol of MAC, we have to put in mind that is not only changes to be made in the MAC layer will be done. We will also have to deal with the physical and application layer. From the point of view of the provider of MAC layer is the one which is responsible to handle the various types of packages (from service and control channel). In fact, the MAC layer in the side of the provider is the one which carries the multiplexing of TDMA between the two channels (and also between various services to the interior of the channel of the service). The application, in this case, will produce the packages which will be presented in each channel. From the point of view of the client layers, MAC and application are simple. The MAC layer basically responsible; to send to application the packages which the client wants to receive (packages which belong to the channel or from desire service) or throwing the packages that not requested by the client (packets from a broadcast or unicast service the client is not interested in). The application layer will be the one that which produces the packages of the request from clients to send to the provider when they are interested by a service unicast. Well as we described in detail the characteristics of the MAC protocol designed earlier, we may carry out this idea described theirs corresponds to the last version of our protocol, to reach this execution that we programmed and examined before simple versions, the changes of the force and improvements made between the versions are related to the definition of the various services offered in the section of channel service: The first version only considered a unidirectional communication between provider and client. The reason was that we only define broadcast services in the service channel. A second version consisted in defining unicast services and hence introducing a bidirectional communication between provider and client. This new version was more complex than the previous one so we decided to divide the application we had until now (called pbc3) into two sides: the application in the provider side (pbc3) and the application in the client side (pbc3Sink). This idea of defining two sides of an application or protocol layer (to simplify its implementation) is already used in other applications or protocol layers included in the simulator as TCP. The third and last version consisted in implementing the algorithm which handles the access of more than one client to the same unicast service. This was not considered in version two. When we are programming our MAC protocol, several problems raised, which are not only in our side, but also of the limitations or the restrictions of the Network Simulation. Well, in the next section4.5 we describe and explained all, it is worth to mention a principal limitation in so much it deeply influenced the execution of our protocol. The limitation comes like more parallel flow of the data in the same node started to appear (the node can be client or provider). In our case we decided to have only one provider, this provider will produce the data of both services. This means that the provider will have more application to the function in parallel and more file test in the MAC layer (see Figure 3.2), each one associated to a different data flow. That is the reason why we are interested in parallelizing. The problem is, in so far as we know, installing parallel flows in same node; is not a task easy to make in the simulator. The most common solution is composed to use nodes as parallel flows as much of an idea used when a protocol stack is defined on the two aircraft or more (like the plan of the data and management represented on Figure 2.3). This is Explained in (GMPLS, 2006), or when we wish to have a node of multi-interface, in (NS2 Notebook). The idea is: if we cannot have more than one application function in parallel in the same node, what would be the possible solution? The answer to that, like also accentuated in section4.5, is to have only one application to function in the provider, which produces various types of packages according to the time execution. This approximation also solves the problem to have more than one queue (in parallel) in the MAC layer. We will not need various queues to store various packages due to these packages arrive at the MAC layer already in the order; they must be sent. This solution simplifies the definition of the MAC layer but made the definition of the application layer to be more complex. Although the solution taken could seem rudimentary; the fact is that the difference between the theoretical solution and rectifies is not also large particularly when to think that what we want with once examine with the protocol is implemented. After the mention and explanation of this problem we can now specify how the protocol was made. We will start to explain how application is defined in all both, client and provider. Both sides application have two principal functions: one is responsible for creation and sending of the packages to the lower layers and the other is responsible to receive the packages of the lower layer. The application in the side of the provider calls the pbc3 and has two principal functions: one for send and other for receive frame. While sending the frame we basically have to create a package (by defining its title) and send it. The provider will send various types of packages according to the execution time. Basically we will have two types of packages: the packages of management in the control channel of inspection mark and the packages of the data in the excavation of service of the channel timeslot. These packages will have various headers. In case of the packages of the zones information of the header are as in Figure 4.7: Type Service_id Time_slot seqNum lastPacket node_id Send_time Payload Figure 4.7: Fields of the application header for data frames. Service_id: Field used by the provider to indicate the service whose payload is included in the frame. Time_slot: Field that shows the subtime slot when the service is offered. SeqNum: Sequence number of the packet sent. Nowadays is only used in data packets which belong to unicast services, it is used by the provider when more than one client want to receive the same private information. LastPacket: This field is related to seqNum. It is used to indicate that the packet sent is the last one. In case of management frames the header is defined by the following fields in Figure 4.8. Type Services_ Num_services node_id Send_time Payload Information Figure4.8. Fields of the application header for management frames. services_information: It is only used in management frames. It is a vector which contains the basic information about the services offered by the provider. This basic information is defined by three fields: the first field is the identifier of the service, the second field is the subtimeslot identifier and the third field is the type of the service (as we said already before the type of the service means if the service is broadcast or if it is unicast). These three fields must be defined for each service available in the provider, the Figure 4.9 shows that. Service 1 Time Slot where Type of Service 1 Service 2 Time Slot when Type of service 2 Identifier Service 1 is offered Identifier Service 2 is offered Figure 4.9: Example of the services_information buffer when two services offered. Although in our implementation the identifier of the service and the identifier of the timeslot is the same (which means the service whose identifier is the number one will be offered in the subtime slot number one), we decided to define two variables because they would have different values in future versions of the protocol. Num_services: Value used to indicate the total number of services which are going to be offered by the provider during the service channel timeslot. Once we have explained how our application works in both sides (provider and client) we must explain the main changes done in the MAC layer. When we download the NS2.33 version there was already included an implementation of IEEE802.11a protocol. We didnt want to make use of this code because it was totally oriented to guaranty the CSMA/CA with virtual carries sense mechanism, we are not interested in. there was also simple TDMA implementation included. We decided to adapt into our requirements. We basically had to change the definition of the TDMA frame and to set up both data and management MAC headers. In contrast to the application layer there are no variables defended to make use of the MAC layer through the Tcl script. If we concentrate on the physical layer, we will see that in our version of Network Simulation NS2, there were already two physical layers for wireless communications applied: the first one called the wirelessPHY and the second one called WirelessPhyExt. We are interested to use this last version of the physical channel basically it presented an important concept for us: it supports multiple arrangements of the modulation. WirelessPhyExt leaves the function with BPSK, QPSK, QAM16 and QAM64 as it is described in (Qi Chen, 2008). The modulation influences certain important characteristics such as the rate of header information and minimum sensitivity of the receiver, according to the indications the Figure 3.3 of, and consequently the period of the data of transmission and SINR necessary to receive it and to decode it. The only problem is that this new version of the wireless channel must be used together with an extension of the MAC layer called Mac802_11Ext. We were not interested in using that one for the same reason we were not interested in using the Mac802_11 version; and for that we decided to introduce the multiple modulation schemes in the WirelessPhy layer. Another important point when working low layers of the WAVE protocol stack is to think about how the channel is modelled in NS2. There are four different types of channel propagation defined and include in NS2.33, The free space model, the Two-Ray Ground reflection model, the Shadowing model and the Nakagami model. The first three models are well described in (The NS manual, 2008). 4.5 SIMULATION PROBLEMS AND IMPLIMENTATION IMPROVEMENTS Here we explained the reason for which we are interested to study the technology of TDMA in the V2I communications and the process followed to define and apply our protocol. By creating a new protocol, sometimes it is not possible to design the theoretical idea that we had because of some limitations presented by the simulator. It is also possible that our execution could be improved at the points given. We must realize that although the protocol seems to be complex sometimes, many improvements could be made to obtain the best and more specific results. The idea of this section is just to explain the main problems found when elaborating our protocol and to suggest some future improvements. If we refer first to the problems found when we were working we must clarify that most of them are not really problems (in the sense of bugs found when executing the protocol) but limitations the simulator has which do not allow us to define the protocol as we wanted to. There are three main limitations we want to point out: The first is already mentioned in the previous section. The problem is related to the parallel data flows in a node. We were interested by this fact of being able not only to have more application to the function in parallel in the same node (as explained in the section 4.4) but to also define the two planes of protocol, data and planes of management, in the same node (that we can see Figure 2.3) although this last idea was thrown it required of much work to make. In section 4.4 we adopted easy and the fast solution which does not have affected the results obtained. But there is other solutions, simplest is composed to define nodes as many, in the code of TCL, as data flows we need and link these nodes through a router. To explain it easily: we will have one node per each data queue (see Figure 3.3) and one router that handle the information from each node. This solution is based in the actual implementation of the Diffserv queues in the NS (Definition of physical queues) where virtual and physical queues are used (Implementing multiqueue). In our case we will need at least two nodes: one for the data of the control channel and the other for the data of the service channel, in case only one service is offered. We must realize this solution involves changes in the Tcl code which leads to a simple C++ implementation. Another solution, which could be considered as an improvement is to have only one application running on the provider that generates different types of packets but instead of doing it as a function of the execution time, it could generate them randomly and give the work of organize them to the link layer. In this case we will need to define an algorithm in charge of finding the desired packets in the unique queue that exists in the link layer and sending them in the correct order to the MAC layer. There is a third solution which allows having an implementation closer to the one specified in the standards ((IEEE 802.11, 2007) and (Implementing multiqueue)). The idea consists of adapting the definition of the queue done nowadays in the implementation 802.11e standard which is included in the simulator. As we can see in (Design and verification, 2003) this implementation requires changes in the definition of the class queue which allows having multiples queues by creating them in an array (Evaluation of IEEE 802.11e). The source code of this new type of queue can be found in (Evaluation of IEEE 802.11e). The second limitation is related to the synchronization of the nodes. Those nodes can be an OBU or a RSU. The NS is a simulator based in events controlled by timers. The fact is, as it is pointed out in IEEE 1609.4 standard in (Yunpeng, 2007) all the nodes require to be synchronized before communication. The synchronization is especially important when using TDMA technology and it is a process which will be carried on when any OBU enters in the communication area of a new RSU in a centralized system. The fact is that in the NS tool all the nodes implemented (in the Tcl code) have the same time basis which means they do not need any synchronization because they are already synchronized. If we are interested in defining the synchronization process we should first desynchronize the nodes by manipulating their timers. In our case we will consider the RSU time basis to be the one the other nodes must to synchronize on. Each OBU will have to follow a synchronization process before receiving data frames from the RSU. The idea could be the following: the first time an OBU receives frames from a new RSU it gets the timestamp of the RSU and, after adding the delay produced by the propagation of the frame to this timestamp, adjusts its timers. Calculate the delay or time difference between the RSU and the OBU is not complicated. The only idea which does not seem clear is how to set up different time basis in the nodes. The third and last limitation is related to the anti-collisions mechanism used in the MAC layer mainly based in CSMA/CA algorithm. We detected the problem when executing our code: we found there were collisions between request frames when a considered number of OBUs were interested in receiving information about the same unicast service. Those collisions should not take place if we keep in mind each node is supposed to be able of sense the medium to see whether it is busy before sending any kind of frame. Why this type of collisions is produced? As we explained earlier, it is necessary to present intervals of guard to the end of each time slit to avoid collisions between the reinforcements produced by various devices (OBUs and RSU in our case) but in this case the collisions due are produced to different OBUs send braces of request really narrowly in time and, because of them cannot detect if the medium is with vacuum or not, a collision is produced and detected by the RSU. When working with the NS tool we are not able to do all the things we want to, not only because of some restrictions or limitations the tool has (as we explained before) but also because of time we did not implement all the ideas which came to our mind and we must simplify and focus our work. Because of this lack of time there exist a lot of points in our protocol which could be improved. Some of these points are explained in the following paragraphs. If we focus in the implementation of the control channel the most important improvement which could be done is to introduce critical frames and implement the process each node has to follow when receiving those frames. Introducing those types of frames will be really interesting because we can see how to handle both types of information (critical and no critical) and we would make a better use of the control channel than we do in our actual implementation. If we pay attention to the service channel there are some things which could be improved, the ideas are summarized in the following points: In the actual implementation there is not any prioritization between nodes, which means when two or more nodes want to receive the same information (which is unicast) the first who ask for it is the first which receives the data. One possibility is to define the priority as a function of the position of each OBU with respect to the RSU. It sounds coherent to give higher priority to the nodes that are closer to the RSU because of their small latency (time necessary to consume a service). Basically the latency is smaller because the propagation time (one of the terms

Wednesday, November 13, 2019

Comparing Good and Evil in Tolkien’s The Hobbit and The Lord of the Rin

Comparing Good and Evil in Tolkien’s The Hobbit and The Lord of the Rings Imagine yourself in a pre-industrial world full of mystery and magic. Imagine a world full of monsters, demons, and danger, as well as a world full of friends, fairies, good wizards, and adventure. In doing so you have just taken your first step onto a vast world created by author and scholar John Ronald Reuel Tolkien. Tolkien became fascinated by language at an early age during his schooling, in particularly, the languages of Northern Europe, both ancient and modern. This affinity for language did not only lead to his profession, but also his private hobby, the invention of languages. His broad knowledge eventually led to the development of his opinions about Myth and the importance of stories. All these various perspectives: language, the heroic tradition, and Myth, as well as deeply-held beliefs in Catholic Christianity work together in all of his works. The main elements of Tolkien’s works are Good versus Evil, characters of Christian and anti-Christian origin, and the pow er of imagination. In Tolkien world, evil is the antithesis of creativity, and is dependent on destruction and ruin for its basis. Conversely, goodness is associated with the beauty of creation as well as the preservation of anything that is created. The symbolic nature of these two ideologies is represented in the Elven Rings, which symbolize goodness, and the One Ring, which is wholly evil. A main theme of "The Hobbit", then, is the struggle within our own free will between good will and evil. "Early in the (Lord of the Rings) narrative, Frodo recalls that his uncle Bilbo, especially during his later years, was fond of declaring that†¦ there was only one Road; that it was lik... ...Pity 2. Self-sacrifice B. Evil 1. corruption (Gollum) 2. greed (Smaug) II. Characters, Christian and anti-Christian A. Christian 1. Comparing to Christ a. Bilbo b. Gandalf B. Anti-Christian 1. Satan a. Saruman b. The Ring III. Power of the Imagination A. Creates secondary belief B. Escape through imagination Works Cited  · Tolkien, John Ronald Reuel. The Hobbit. New York: Ballantine, 1982.  · Wood, Ralph C. "Traveling the one road: The Lord of the Rings as a "pre-Christian" classic." The Christian Century Feb. 93: 208(4).  · "Eucatastrophe." Time September. 1973: 101  · Evans, Robley. "J. R. R. Tolkien" Warner Paperback Library. 1972: 23-4, 41-2, 202  · Urang, Gunnar. "J. R. R. Tolkien: Fantasy and the Phenomenology of Hope" Religion and Fantasy in the Writing of C. S. Lewis, Charles Williams, and J. R. R. Tolkien. United Church Press, 1971

Monday, November 11, 2019

The Relationship of Macbeth and His Wife in Act 1 Scene 5 and 7

The Relationship of Macbeth and his wife in Act 1 Scene 5 and 7 From the beginning of the play, the relationship between Macbeth and his wife seem to be the expected partnership in romance, however, as the play progresses, our expectations seems to change for the worst. We are informed that Macbeth desires to be King of Scotland and initially, his wife appears to be supportive of him as a wife should be but her response to this changes quite drastically as we read further on. We are first introduced to Lady Macbeth when she reads the letter which Macbeth sent to her recapping his encounter with the three witches.She now becomes aware of Macbeth’s wish to become king but she knows that his conscience inhibits him from partaking in any risky business. She uses the phrase â€Å"yet do I fear thy nature, is too full o’th’milk of human kindness†¦ † in her opening soliloquy which suggests that he is a very kind and worthy gentleman. â€Å"Thou wouldst be g reat, art not without ambition but without the illness should attend it. † She explains how he has the ambition to become king but lacks the boldness to become violent if needed to get the crown.This helps to show how sensible and timid Macbeth can be and why Lady Macbeth has to intervene to make the situation progress further. To our surprise, Lady Macbeth appears to be the complete opposite of her husband’s supposed character. She is determined to make sure that Macbeth becomes king under any circumstances that need to be undertaken. At the end of her soliloquy, she says â€Å"Hie thee hither, that I may pour out my spirits to thine ear, and chastise with the valour of my tongue all that impedes thee from the golden round†¦ which means that she wishes to persuade and talk him out of whatever may be keeping him from seizing the crown. This furthermore emphasizes her persistence to crown him as king and shower her with glory. Throughout this act, Lady Macbeth appe ars to be the stronger partner and this is reflected when she calls upon supernatural powers, much greater than her own, to make her less of a woman and more like a man. â€Å"Come, you spirits that tend on moral thoughts, unsex me here and fill from the crown to the toe topfull of direst cruelty†¦ She has made herself aware that she has to uphold the greater position in the relationship so that their aim of getting the crown is accomplished. The audience finds this act quite shocking as females are meant to be the fairer sex. During the rest of her call to the spirits, she develops the sense of maliciousness and ruthlessness which accentuates the depth of her serious attitude. At this point in the play, the audience has reached a full understanding of Macbeth and his wife’s ambition.When Macbeth is introduced in Scene 5, he begins with â€Å"my dearest love† focusing on Lady Macbeth which shows the position he holds his wife at proving quite admirable to the aud ience. However, Lady Macbeth shows no mercy to the situation. King Duncan planned to go to the castle that night and wished to leave tomorrow but Lady Macbeth’s response to this was â€Å"O never shall sun that morrow see† which implies he will not be leaving tomorrow leading to the cruel suggestion of death. This line reflects her decisive character showing that she is taking the lead role here.She also teaches Macbeth the way in which he must deceive Duncan and instructs him on the arts of hypocrisy as she says â€Å"†¦ look like th’innocent flower, but be the serpent under’t. † By using this metaphor, it shows that she is manipulating Macbeth and challenges his feelings of guilt and pity for Duncan and replaces them with demeaning and spiteful emotions. Lady Macbeth encourages him to be deceitful to his loyal and trusting leader that is Duncan and the audience can begin to make the judgement that the evil spirits are now manifesting in Lady Macbeth’s heart from her evil suggestions.She knows that Macbeth hasn’t got what it takes to make this plan work so she takes the leading role by saying ‘Leave all the rest to me† at the end of Scene 5. At the beginning of Scene 7 opening with Macbeth’s soliloquy, we as the audience, really get a sense of guilt that seeps through Macbeth. This is beyond his usual attitude so this is hard for him to cope with. He knows how much he wants to be king but what frightens him the most are the consequences. He uses the metaphor â€Å"If th’assassination could trammel up the consequence and catch with his surcease, success†¦ e’d jump the life to come†¦ † which translated means â€Å"If this assassination could work like a net and prevent any consequences, he would be more than happy to risk the afterlife to do so. † Macbeth knows that Duncan is a highly respected man because of his good intentions and purely hearted natu re so he is afraid if he is made known to the people that he is responsible, the chances of him becoming king will be shattered. He contemplates the idea of killing Duncan and weighs up the advantages and disadvantages. The only know advantage is that he will become King.However, the disadvantages are what he already is considered to Duncan. â€Å"First, as I am his kinsman and his subject, strong both against the deed; then as his host who should against his murderer shut the door, not bear the knife myself. † This quote from Scene 7 shows that Macbeth is in conflict with what Lady Macbeth is instructing and his loyal personality is urging him not to fulfil the â€Å"horrid deed†. After considering what a â€Å"meek† leader Duncan was, we as the audience can really depict a picture as to what Macbeth was emoting.When Lady Macbeth enters, Macbeth’s final decision has now been displayed. â€Å"We will proceed no further in this business. He hath honoured me of late†¦ † He has decided to cancel the plan because of how nicely Duncan had treated him that evening. The amount of guilt was too much for him to bear so the easiest escape for him was to abort the business. To his misfortune, Lady Macbeth did not take the current news very lightly. She begins to bombard him with insults and various accusations. â€Å"Art thou afeard to be the same in thine own act and valour, as thou art in desire? Lady Macbeth begins to question him and whether he is afraid to do what he must to achieve what he desires. As she has handed herself to the powers of darkness, she speaks to him brutally by saying â€Å"Was the hope drunk wherein you dressed yourself? Hath it slept since? † suggesting that he was drunk when he made the decision to kill Duncan. He raging fury increases furthermore when she says â€Å"Which thou esteem’st the ornament of life, and live a coward in thine own esteem, letting I dare not wait upon I would, lik e the poor cat i’th’adage? calling him a coward if he doesn’t take the crown that he has always wanted to own. At this point in the play, the relationship between Lady Macbeth and his wife reaches its peak as they have a great dispute. Macbeth’s counter argument is not as furious as Lady Macbeth as he simply responds with â€Å"Prithee, peace. I dare do all that may become a man; Who dares do more is none. †He believes that he has done all that a man can do in this situation however Lady Macbeth disagrees. She believes that his definition is wrong and that he only becomes and man if he does the deed.Now Lady Macbeth is raging, she decides to use the excuse that Macbeth doesn’t love her which is the typical response for a woman to use in an argument with her partner. In addition to this, to emphasize the depth of evil in her she creates a vivid inhuman image in the audience’s mind â€Å"I have given such and know how tender ‘tis to love the babe that milks me: I would, while it was smiling in my face have plucked the nipple from my boneless gums and dashed the brains out, had I so sworn as you have done to this. As she is the mother of the child, this makes the image even more disturbing as she has sworn to herself that she would have done it just as Macbeth swore he would do the rotten deed. The audience can really see the evil thoughts capturing her mind at this point as thoughts like this would not be evoked from a normal female figure. Macbeth is emotionally moved by the lengths Lady Macbeth would go to keep her word so he sees this as an opportunity to voice his fear of failure. â€Å"If we should fail? † Lady Macbeth’s response is â€Å"We fail? But screw your courage to the sticking-place and we’ll not fail. which suggests that it is impossible for them for them to fail if he just becomes more courageous. Lady Macbeth has planned the whole murder and reveals it to Macbeth which he can find no faults for himself. At this point in the scene, there is finally some common ground between Macbeth and his wife. â€Å"When Duncan is asleep, whereto the rather shall his day’s hard journey soundly invite him, his two chamberlains will I with wine and wassail so convince that memory the warder of the brain shall be fume, and the receipt of reason a limbeck only. She plans on making the guards so drunk so that they won’t be able to remember any affairs that take place during the night. Macbeth begins to understand his wife’s plans and knows that once the blood is put onto the guard’s daggers, people will assume they are the culprits. By the end of the scene, Macbeth has decided to go ahead with the murder, using every muscle in his body to help him carry out this task.He appears to have changed his tone also as he ends with â€Å"False face must hide what the false heart doth know† which in some aspects is similar to what Lady Macb eth had originally told him to do. By the end of both scenes, the audience can really determine the flow of Macbeth and his wife’s relationship. Originally, Lady Macbeth supported Macbeth’s desire to become King of Scotland but as the play went on, the support had turned into force and she did not have a friendly approach to the situation as she called upon the dark spirits to disable any feelings of remorse as a human being should have.Macbeth knew that the deed he was influenced to pursue was cruel and would have rotten consequences but his the persuasive tone of his wife led him to change his mind and use the same words she used on him to her. It is not an ordinary relationship as the audience can see the manifestation of the dark powers between one side of the partnership which leads to other side to perform murderous tasks.

Saturday, November 9, 2019

Social Responsibility and Managerial Ethics Essays

Social Responsibility and Managerial Ethics Essays Social Responsibility and Managerial Ethics Essay Social Responsibility and Managerial Ethics Essay Sneirson, J. F. (2011). Beyond Profit: Rethinking Corporate Social Responsibility and Greenwashing After the BP Oil Disaster. Tulane Law Review, 85(4), 983-1038. Retrieved from EBSCOhost. Lefter, C. C. , MureSan, L. L. (2010). THE ETHICAL AND SOCIALLY RESPONSIBLE BEHAVIOR OF THE COMMERCIAL COMPANIES. Bulletin of the Transilvania University of Brasov. Series VII: Social Sciences. Law, (52), 207-212. Retrieved from EBSCOhost. Lin-Hi, Nick (2008). Corporate Social Responsibility: An Investment in Social Cooperation for Mutual Advantage, Wittenberg Center for Global Ethics Discussion Paper, 2008-6. Porter, M. E. , Kramer, M. R. (2006). Strategy and society: The link between competitive advantage and corporate social responsibility. Harvard Business Review, 84(12), 78-92. Robbins, Bergman, Stagg, Coulter (2008). Management, 5th ed. , Sydney, Australia: Pearson Education. Snow, D. (2005, September 14). Green is good. Sydney Morning Herald. Retrieved September 14, 2005, from smh. com. au/news. business/green-is-good/2005/09/13/112637712729. htnl

Wednesday, November 6, 2019

Written Communication Critical Analysis Marion Enterprise

Written Communication Critical Analysis Marion Enterprise Problem Statement Data is important to manufacturing companies like Marion Enterprise. It is necessary in critical areas of the business such as human resource, production and the organization’s inventory. Data is useless without consistent updates.Advertising We will write a custom proposal sample on Written Communication Critical Analysis Marion Enterprise specifically for you for only $16.05 $11/page Learn More The research problem is to investigate office ergonomics of the data entry center in this organization. The other issues that will be examined are the establishment of an anthropometric database and possible hazards employees overlook in the data entry center. The study will however major on the first issue. Justification Ergonomics is the science that examines how capable people are taking into account their physical and mental limits in relation to the tools, machines and equipment used in the course of their work. Office ergonomic is a s pecialty that focuses on the environment of the office worker. There has been an increase in interest by people towards the specialty because of an upsurge in the use of computers and disorders associated with them (Wisha Services Division (WSD), 2002). The specialty is critical since some of the signs associated with poor ergonomics such as fatigue and pain reduces the productivity of workers (CBS, n.d). Treatment of disorders occasioned by poor ergonomics in an office environment is costly in terms of finance and time lost whenever an employee takes leave (Health and Safety Executive (HSE), 2013). The worst part is a reduction in the normal pace of work in a department where an employee is based. For this organization, the entry of data will be slowed which may affect the ability of the organization to get real-time data. Topics for investigation The workstation Data entry operators spend many hours during the working days in their workstation. The workstation will be the first ar ea to be investigated for any ergonomic flaws. It consists of the office furniture such as the chairs, tables and computers that the data entry operators use directly as they carry out their work. All these aspects will be examined (Workers Compensation Board (WCB), (2007). The computers used by the data entry operators Computers are the key equipment used by data entry operators (Occupational Health Clinics for Ontario Workers Inc, 2008). They will be investigated to ascertain how ergonomic they are to their users. In the investigation, computer parts such as mouse, keyboard and the monitor will be assessed on ergonomic adjustability.Advertising Looking for proposal on business communication? Let's see if we can help you! Get your first paper with 15% OFF Learn More Anthropometric data The research will also determine the feasibility of establishing a database for anthropometric data. The data will be useful for management when purchasing equipment for the d ata entry operators after recruitment. Problems related to ergonomics in computer equipment will reduce significantly in the data entry center that will be expanded (National Occupational Health and Safety Commission, 1991). Hazards with sharp edges All the furniture in the data entry center will be examined to establish whether they have any sharp edges that the employees often lean. This action by the data entry operators only appears harmless initially but leads to certain disorders such as slow blood circulation and damaged nerves (Texas Department of Insurance, n.d). Repetitive motions The operational nature of data entry operators will be looked at to assess the possible effect they have on the workers developing disorders. All repetitive motions will be noted so that a possible intervention can be formulated. The intervention will be a scientific one, and its impact in improving the office ergonomics of the data center has to be monitored after periods specified to ensure eff ectiveness Health and Safety Authority (HSE), n.d). Working space The available working space in the data entry center as compared to the staff who works there will be examined. The examination will seek to reveal the sufficiency of the available space. Appropriate recommendations will then be made (Environmental Health and Safety (EHS), n.d). Preliminary methodology and potential resources The research will gather data about all the areas mentioned earlier using the following methods. Interviews will be conducted to the data entry operators on specific areas on different areas of their workstations. Structured written questionnaires will follow the interviews as a way of verifying most of what has been given orally in the interviews conducted. Observations will be made on the workstations and computers and information obtained compared to recommended office ergonomics (University of Wisconsin Eau Claire, n.d).Advertising We will write a custom proposal sample on Written Com munication Critical Analysis Marion Enterprise specifically for you for only $16.05 $11/page Learn More The anthropometric data will be sought for reputable databases available online. The results of a feasibility study for setting a company anthropometric database will be determined by the diversity of the staff in the organization. Work schedule The research will be conducted for a period of two weeks. During the first week, data will be collected from the data entry center. The collection through interviews will be done in the first hour of each office day in order for a period of three days to minimize disruptions to normal work. The remaining two days of the week will be used by the research team to gather data with written structured questionnaires. The second week the first working day, the team will observe the workstations of the data entry operators. The other two days will be for analyzing the data, and the last two will be utilized in preparing the rep ort. References CBS. (n.d). The advantages of ergonomics. Retrieved from cbs.state.or.us/osha/pdf/ergo/ergoadvantages.pdf Enviromental Health and Safety (EHS). (n.d) Ergonomic workstations guidelines. Retrieved from ncsu.edu/ehs/www99/right/handsMan/office/ergonomic.html Health And Safety Authority (HAS). (n.d). Ergonomics in the Workplace. Retrieved from hsa.ie/eng/Publications_and_Forms/Publications/Occupational_Health/Ergonomics.pdf Health and Safety Executive (HSE). (2013). Ergonomics and human factors at work. Retrieved from hse.gov.uk/pubns/indg90.pdfAdvertising Looking for proposal on business communication? Let's see if we can help you! Get your first paper with 15% OFF Learn More National Occupational Health and Safety Commission. (1991). Ergonomic principles and checklists for the selection of office furniture and equipment. Retrieved from safeworkaustralia.gov.au/sites/SWA/about/Publications/Documents/31/ErgonomicPrinciplesChecklistsForOfficeFurniture_1991_PDF.pdf Occupational Health Clinics for Ontanrio Workers Inc. (2008). Office ergonomics handbook. Retrieved from ohcow.on.ca/uploads/Resource/Workbooks/ergonomics.pdf Texas Department of Insurance. (n.d). Office Ergonomics. Retrieved from tdi.texas.gov/pubs/videoresource/wpofficeergo.pdf University of Wisconsin Eau Claire. (n.d) Data Collection Methods. Retrieved from http://people.uwec.edu/piercech/researchmethods/data%20collection%20methods/data%20collection%20methods.htm Wisha Services Division (WSD). (2002). Office ergonomics. Practical solutions for a safer workplace. Retrieved from lni.wa.gov/IPUB/417-133-000.pdf Workers Compensation Board (WCB). (2007). Office Ergonomics: think detection:think pre vention: think activity. Retrieved from wcb.ab.ca/pdfs/public/office_ergo.pdf

Monday, November 4, 2019

How government policy affect US banking system Essay

How government policy affect US banking system - Essay Example The demand-deposit control has turned banks into the middle agents and the principal agents in the US payment system and the financial transactions taking place. The costs and the benefits of banking regulation include the major industry changes witnessed that include internet and electronic banking; data processing models improved communication; and the development of more complex risk management and financial instruments (Graig, 1983). Government policy on the banking sector determines the outlook of the banking system, influencing the entry of players in the system and determining who is capable of engaging in the banking business. The policy definitions offer guidance on who can operate a bank, which services can be traded, and models of expansion that can be employed by banks. Banking regulation in the US increases the protection offered to depositors (Ambrose, Michael, &Â  Anthony, 2005). This adjusted effect came after the government recognized that increasing numbers were co nducting their business through banks, and deposits of businesses and individuals were increasing. Banking regulations imposed the improvement of financial and monetary stability. This was introduced in reaction to the recognition that there was an increasing level of transactions and businesses carried out among businesses and individuals (Spong, 2000). ... ation on the US banking structure increased competition among banking sector players, which was expected to improve the quality and the efficiency of the services delivered to customers (Graig, 1983). Government policy and regulation have increased the level of consumer protection observed in the US banking system, through a number of ways. These ways include safeguarding the moneys saved in the bank as well as improving the quality of services offered by banks (Rezende, 2011). The banking legislation and regulation of the 1970s and 1980s led to the development of a more open and competitive banking system. The policies also led to the adoption of technological models that could improve the quality of banking services offered in the US. The effect of the regulation also improved the capacity of banks to serve the increasing number of customers, as well as adapt to the changing economic environment. Some of the regulations that created this effect include the International Banking Act of 1978 (Spong, 2000), which required equitable treatment among both domestic and foreign bankers, in different areas, including reserve deposits, branching and the observance of banking regulations (Spong, 2000). The second was the financial Institutions Regulatory and Interest Rate Control Act of 1978, which sought to eliminate different forms of financial abuses (Federal Reserve, 2010). The Act also increased the capacity of regulatory agencies in avoiding the concentration of management and control. The other is the Depository Institutions and Deregulation and Monetary control Act of 1980 (Spong, 2000), which sought to ensure that the different financial institutions did their business from a more equal and efficient competition ground (Rezende, 2011). Government policy led to the

Saturday, November 2, 2019

Five pillars in islam Essay Example | Topics and Well Written Essays - 1250 words

Five pillars in islam - Essay Example To be a true Muslim, it is must to obey and act according to the five pillars of Islam, as mentioned in the Holy Quran revealed upon the last Prophet of God (Allah) Muhammad. Prophet Muhammad preached an integrated universal plan directed to all mankind, in which authority on earth is devolved to mankind with the creation at their disposal to utilise.They are given the tools of learning (inspiration or revelation) and the general guidelines to be used in order to stay on the right course, as well as the freedom to choose. Prophet Muhammad preached by presenting his own life as an example to follow and did nothing beyond the doings of an average Muslim. Holy Quran and Sunnah (teachings of Holy Prophet) in this context is the best example of what he did by setting his own example in this world.Prophet Muhammad's preaching revolves around the central theme that after death every body will be raised at the Day of Judgement and all will be judged by God based on their conduct in this life. No doubt it was Prophet Muhammad's inspirations, which put mankind on a new footing by stressing the use of empirical observations and the use of reason and reflection as the guiding tools for seeking the way of God. The five pillars necessary to be practiced by a Muslim are none other than:1.Shahadat (Kalma Tauheed) – The belief of one and only God; 2. Salat (Prayers) – prayers performed five times a day at regular intervals i.e., dawn, noon, afternoon, sunset and night; (Pasquine, March 2002) 3. Siyaam (Fasting) 4. Zakat (Charity) - Charity tax for the poor and disadvantaged; 5. Hajj (pilgrimage) - Obligatory for a Muslim to perform at least once in his lifetime. Shahadat - Tauheed (Confession of one God) In the midst of that milieu which was followed by the then superstitious beliefs, and had been cross-fertilized by all sorts of ideas, right in the centre of the Arabian Peninsula, separated but not isolated, Prophet Muhammad came preaching that there is only One God for all creation, Allah (an assimilated form of Al-ilaah, the god), with no other gods besides Him, accessible to all, with no priesthood as an intermediary, no original sin and no ethnic, tribal or racial overtones. In the Quran we find God addressing human beings in general or the believers, but never 'the Arabs' or 'men' in contradistinction to 'women'. (Hamdiyyah, 2000, p. 26) 'Shahadat' in the form of 'Kalma Tauheed' is the belief that must be declared and uttered by every Muslim, which means that he has acknowledged by his heart and soul that there is no God except "Allah" and Prophet Muhammad is His most beloved and last Prophet. This doctrine is the foremost principle for being a Muslim after which a Muslim follows other doctrines. The oneness of Allah prevents a Muslim from getting into other confusions and diversification which is the cause of uniting the Muslims all over the globe to a single main believe, i.e., Allah is the creator of the universe and all the things within ranging from nature to life. Prophet Muhammad is the last messenger for whom Allah has created the whole universe and He is the one to whom we are onus to worship and none other. Salat (Prayer) The second main pillar of Islam is Salat (Prayer), which is, in fact, one of the earliest and most constantly urged elements of Prophet Muhammad's message. "The word used 'Salat' refers to Arabic word where it refers precisely to liturgical prayer, a public worship of God in the form of audibly uttered words". (Peters, 1994, p. 164) Quran says, Prophet Muhammad advises the Muslims "Do not be loud in your prayer nor speak it softly (as if in secret), but find a way between" (Quran 17: 110) It is the second basic pillar which makes it compulsory for a Muslim to practice his daily five times prayer which is accompanied by particular gestures and postures, as laid down in the teachings of Prophet Muham