Thursday, October 31, 2019

Economics for Business Essay Example | Topics and Well Written Essays - 1000 words - 1

Economics for Business - Essay Example (Monaghan, 2014) UK’s car market is the second largest market in Europe after Germany and therefore has a critical significance in terms of its contribution to the market. The market is however, dominated by the few but very large players in the industry. 2013 figures suggest that Ford emerged as one of the leading players in the market followed by Vauxhall and BMW. These brands are considered as the hottest selling brands with Ford Fiestas as the leading vehicle in the country purchased during 2013. Since the market is rebounding from its earlier levels, there are signs of price wars in the industry as one of the largest suppliers in the market i.e. Ford has started a fierce competition with the existing players in the market. It is also because of this reason that Ford Fiesta has registered highest number of growth in terms of units sold during 2013. Ford has been specifically offering deep discounts to the dealers on selling certain number of cars of its brands during the month. It suggests that Ford has been capitalizing on the growing opportunities and leveraging the same through the stronger incentives to the dealers. Other players such as Daewoo and Hyundai are also believed to be working towards matching such offers at EU wide level thus initiating price wars at the regional level. (News.bbc.co.uk, 2014) A closer analysis of the market would suggest that the market is being dominated by few but relative larger players in the market. UK Car market is dominated by both the local as well as international players. Local firms such as Vauxhall are also considered as the major players with firms like Ford, Nisan as well as Daewoo and Hyundai are also continuing to dominate the market. What is however, critical to note that none of these firms are actually the price makers as the overall demand depends upon certain other related factors such as availability of cheaper consumer credit and overall economic

Tuesday, October 29, 2019

Western Civilization Movie Term Paper Example | Topics and Well Written Essays - 2250 words

Western Civilization Movie - Term Paper Example Secondly, because of the first issue, there were not many written works in wide circulation and therefore not many people who were fully educated enough to both enjoy reading as a past-time or to serve as scribes to create more manuscripts. Within the story of Sir Gawain and the Green Knight, the story opens at a point where Gawain is a young knight in the service of the legendary King Arthur and thus addresses the historical existence of this figure. However, the narrative story is not considered a reliable source of information because there are few existent facts to support it and there is sufficient evidence to suggest that the Gawain author borrowed from older legends, such as the legend of Cuchulain (Brewer, 1992), to create his story. Despite this, the story still has numerous merits that help us understand more about life in medieval times such as the important elements of being a knight and the latent criticism of the male-ordered ‘civility’ represented by King Arthur and his knights as they turned their backs on nature and the natural element in man. At the beginning of the story, Gawain comes to the realization that he is the only knight capable of accepting the challenge of the Green Knight who has come bursting into Arthur’s court issuing a New Year’s Day challenge. This is because he feels he is the least valuable knight in the court and therefore the one most expendable should he fail to win the challenge. â€Å"I am the weakest, the most wanting in wisdom, I know, and my life, if lost, would be least missed, truly† (I.16.354-355). This reveals the context of defining the true knight in which humility is seen to be prized over bravery regardless if it is true. According to Garbis, the concept of the reluctant hero is an important element of the Arthurian tradition. â€Å"Some kind of shock occurs that makes one aware of the self† (Garbis, 2002). However, it often goes unnoticed that the Green Knight is clearly a supernatural figure that

Sunday, October 27, 2019

How Google is Changing Your Brain Article Analysis

How Google is Changing Your Brain Article Analysis When in doubt ask your all-knowing friend google. The authors Daniel M. Wegner and Adrian F. Ward who wrote How Google is Changing Your Brain published in 2013 in the Scientific American. Wegner and Ward argue that instead of relying on the diversity of our friends knowledge, people tend to ask google first. The article begins building credibility with convincing facts and examples; however, toward the end of the article, the sudden flip to how google is good weakens their credibility and ultimately, the article. In the article, the authors first set the stage by describing a birthday party scenario and how each person knows intuitively what to do. While one may remember the time and place of the party, the other may take note of the dress code.   The article then outlines that when presented with new information, people distribute remembering certain facts among their social group. When someone does not remember the right name or how to fix a broken machine they simply turn to someone who knows. The authors provide a few more examples to instill the idea of not only do people know the information stored within their minds; but, also the information of members of their social group. Throughout the entirety of the article, the authors use many strong examples and experiments that strengthens their claim, credibility and appeal to ethos. Mentioning the experiments boosts Wegner and Wards credibility showing that they have done their homework while providing statistics and facts. They also use their own experiments to support their claim which show they have first-hand experience with the subject. Adding to Wegner and Wards ethos appeals, they also have strong appeals to logos, with many facts and logical progressions of ideas. They point out facts, that show people are relying on computers to remember information, instead of the diverse information their friends may possess: We found that those who believed the computer had saved the list of facts were much worse at remembering. People seemed to treat the computer like transactive memory partners off-loading information to this cloud mind rather than storing it internally. These facts support the idea that people are beginning to rely on the internet and computers, instead of themselves and friends. Wegner and Ward continue with many more supporting ideas: it seems that the propensity for off-loading information to digital sources is so strong that people are often unable to fix details in their own thoughts when in the presence of a cyberbuddy. à ¢Ã¢â€š ¬Ã‚ ¦ As we off-load responsibility for many types of information to the Internet, we may be replacing other potential transactive memory partners friends, family members and other human experts with our ever present connection to a seemingly omniscient digital cloud. These are a few of the many ideas, that support the authors claim that this is a real and substantial problem that humans are relying less on each other, and more on the internet. The convincing statements appeal to logos and presses upon the reader that this is a topic worth discussing. However, the end of the article lacks the same effectiveness of the paragraphs before it. For example, Wegner and Ward notes that the internet is up to date, not subject to the distortion that afflicts human memory, and quicker than calling a friend hoping they have the information you seek. This damages the strength of their credibility and their argument. Additionally, the authors last statement in the article, refers to the internet in a way that weakens the articles purpose. While returning to the introduction in the conclusion is a  Ãƒâ€šÃ‚   frequently used strategy, they chose to abandon if not to totally disregard their beginning statement. Wegner and Ward states that humans are being freed from the necessity of remembering facts. The sudden dependence and off-loading of information to the internet is a movement that people should embrace. Though the article begins by effectively persuading to the readers the importance of the diversity of information their friends possess Wegner and Ward loses power in the end, where they need to drive home their argument. Readers can see a problem exists throughout the article; however, the sudden shift to downplay the problem, makes the reader not take it seriously in the end. Wegner, Daniel M., and Adrian F. Ward. How Google Is Changing Your Brain. Scientific American 309.6 (2013): 58-61. Academic Search Premier. Web. 8 Aug. 2016.

Friday, October 25, 2019

The Roseto Mystery and Outliers :: Literary Analysis

The ideas presented in Outliers are surprisingly aligned with my own. It makes sense to me that a person’s success isn’t all about ability and his or her individual merit. In the past I have reflected upon my successes to find that I was not alone while achieving them. I have been given tremendous opportunities in life. I have always challenged my own definitions, and I like the spin Malcolm Gladwell puts on his. â€Å"The Roseto Mystery† makes me want to go knock on my neighbor’s doors. I am not saying that I have the courage to do so, but I certainly would like to. I tend to be pessimistic when it comes to meeting new people. Wolf’s conclusions are helping me tip the scale the other way, seeing the glass half full. If people in Roseto truly lived longer, happier, healthier lives due to the involvement in their community, then I am tempted to summon the nerve to do the same. Chapter 1 has familiarity in my life. In the 8th Grade my father moved us to the Midwest from Southern California; culture shock! Dad decided that I should play football at the Junior High, after all my cousin played on the team, and so did my father when he was in school. Most of the other players were a minimum of one year older than me. It is common practice for parents to hold their boys back a year to start school; this gives the boys a size advantage in sports. By the time adolescence rolls around, one year makes a big difference in a young man’s size. Also, I was born in November; not a prime year for sports league cut-offs. When it came playing football, I was severely outsized by my teammates. Due to my experience, I tend to agree with having sports league try-outs split into semesters or trimesters to allow the same opportunities available to more players. Of course the logic in Chapter 2 is easy to agree with; I really agree with the ideas about opportunities the most. Chances at success are scarce. As the population grows chances become increasingly scarce.

Thursday, October 24, 2019

Notes on 5 Different Short Story

Notes on Short Story THE GIFT OF THE MAGI By O. Henry Date: 26 September 2012 Title: The Gift of the Magi Author: William Sydney Porter also known as O. Henry Background of the O. Henry: O. Henry was born on September 11, 1862, in Greensboro, North Carolina. Both his mother and father died before O. Henry turned 20. As a teenager, he worked as a pharmacist’s assistant in his uncle’s drugstore to help support his family. At age 19, he moved to Texas to take advantage of its warmth and dry climate. There he worked at a farm that belonged to a friend of his family’s. Vocabulary: * Instigates: To cause by incitement Subsiding: To sink to a low or lower level * Coax: To attempt to influence by gentle persuasion * Faltered: To hesitate or waver in action, purpose, intent, etc. * Ravages: To work havoc upon * Assertion: A positive statement or declaration, often without reason or support * Tresses: A plait or braid of hair * Ardent: Having, expressive of, or characteriz ed by intense feeling * Dandy: A man who is excessively concerned about his clothes and appearance * Manger: A box or trough in a stable or barn from which horses or cattle eat Setting: Christmas Eve, New York City Characters: Delia Young * James Dillingham Young * Madame Sofronie Literary Devices: * Allusion: â€Å"The magi, as you know, were wise men—wonderfully wise men—who brought gifts to the Babe in the manger. † * Anadiplosis: â€Å"And sixty cents of it was in pennies. Pennies saved one and two†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬  * Polysyndeton: â€Å"†¦Ã¢â‚¬ ¦ a time by bulldozing the grocer and the vegetable man and the butcher. † * Personification: â€Å"The dull precious metal seemed to flash with a reflection of her bright and ardent soul. † * Repetition: â€Å"†¦Ã¢â‚¬ ¦ looked out dully at a gray cat walking a gray fence in a gray backyard. * Simile: â€Å"†¦Ã¢â‚¬ ¦ about her rippling and shining like a cascade of brown wate rs. † * Metaphor: â€Å"Oh, and the next two hours tripped by on rosy wings. † * Situational Irony: Della receives combs for her hair that is no longer there. * Synecdoche: â€Å"White fingers and nimble tore the string and paper†¦Ã¢â‚¬  * Alliteration: â€Å"†¦Ã¢â‚¬ ¦ that life is made up of sobs, sniffles, and smiles. † Symbolism: The symbolism in â€Å"The Gift of the Magi† is based upon the gifts given by Jim and Della. Both Jim and Della gave up a possession the forfeited the importance of the gift they would receive from their spouse.The gifts showing the importance of giving everything of themselves. Theme: * Love * Sacrifice * Wealth * Women and Feminity Point of View: Third Person THE NECKLACE BY: GUY DE MAUPASSANT Date: 10 October 2012 Title: The Necklace Author: Henri Rene Albert Guy De Maupassant Background of the Author: Henri Rene Albert Guy De Maupassant was born on August 5th, 1850 and was declared deceased on July 6th, 1893. He was a French writer known for his short stories, which painted the life of people in the 19th Century of France.He was prolific, published 300 short stories and 6 novels, but he died at a very young age due to physical and mental illness. Vocabulary: * Blundered: A gross, or stupid mistake * Wit: The keen perception and cleverly apt expression of those connections between ideas that awaken amusement and pleasure. * Antechambers: A chamber or room that serves as a waiting room and entrance to a larger room or an apartment * Peopling: Indefinitely or Collectively * Trifled: An article or thing of very little value Setting: Paris, 1880 Character: * Mathilde Loisel * Monsieur Loisel Madame Forestier Literary Devices: * Situational Irony * Authorial Intrusion * Anaphora * Alliteration Symbolism: The Necklace The necklace, beautiful but worthless, represents the power of perception and the split between appearances and reality. Mathilde wants to borrow the necklace from Madame Forestier, but she did not tell Mathilde that it was a fake. Mathilde never underestimated Madame Forestier due to her wealth. Themes: * Wealth * Women and Feminity * Pride * Suffering A Very Old Man with Enormous Wings By: Gabriel Garcia Marquez Date: 31 October 2012Title: A Very Old Man with Enormous Wings Author: Gabriel Garcia Marquez Background of the Author: Gabriel Garcia Marquez was born on March 6th, 1928. He was a writer who grew up listening to family tales. His novels and > have drawn worldwide audiences. He won the Nobel Prize in 1982. After College, he became a journalist who introduced readers to magical realism. Vocabulary: * Stupor: Suspension or great diminution of sensibility; as in disease or as caused by narcotics, intoxicants, etc. Grandeur: The quality or state of being impressive * Dialect: A variety of language that is distinguished from other varieties of the same language by features of phonology, grammar, and vocabulary and by its use by a group of speakers who ar e set off from others geographically or socially. * Bailiff: An officer, similar to a sheriff or a sheriff’s deputy, employed to execute writs and processes, make arrests, keep order in the court, etc. * Reverence: A feeling or attitude of deep respect tinged with awe * Frivolous: Characterize by lack of seriousness or sense * Robust: Strong and Healthy Impertinences: Unmannerly intrusion or presumption Setting: Characters: * The Old Man * Pelayo * Elisenda * Father Gonzaga * The Neighbor Woman * The Spider Woman Literary Devices: * Verbal Irony * Synesthesia * Magical Realism * Onomatopoeia * Allusion Symbolism: * Wings: Wings represent power, speed and limitless freedom in motion. Ironically, the wings of the angel in the story convey only a sense of age and disease. When the village doctor examines the old man, he notices how naturally the wings fit in with the rest of his body.The ultimate effect is to suggest that the old man is both natural and supernatural at once. * T he Spider Woman: The spider woman represents the fickleness with which many self-interested people approach their own faith. Not surprisingly, the old man’s reputation wanes when he proves capable of performing only minor â€Å"consolation miracles†. Themes: * Family * Moral * Religion * Magical Realism The Pedestrian By: Ray Bradbury Date: 7 November 2012 Title: The Pedestrian Author: Ray Bradbury Background of the Author: Ray Bradbury was born on August 22nd, 1920, Waukegan, Illinois.He was an American fantasy and horror author who rejected being categorized as a sci-fi author, claiming that his work was based on the fantastical and unreal. His best known novel is Fahrenheit 451. He is also remembered for other of his popular works including > and >. He was declared deceased just recently, June 5th, 2012 at the age of 91. Vocabulary: * Seams: The line formed by sewing together pieces of cloth, leather, or the like. * Intermittent: Stopping or ceasing for a time * Win try: Of or characteristic of winter * Doot: N/ASetting: November, 2053 A. D. Characters: * Leonard Mead Literary Devices: * Personification * Imagery * Symbolism * Simile * Metaphor * Alliteration * Irony Symbolism: On their way to the psychiatric Center for Research on Regressive Tendencies, they pass Mead’s house. It is ablaze with lights in contrast to the dark city. It is a symbol of hope of vibrant life – light is a universal symbol of hope, but the car is swallowed up once more into the darkness, literally and figuratively. Themes: * Technology * Society loses its humanity * Mankind cease to exist * Distrust and Ultimate Destruction * Propaganda * Pessimistic

Wednesday, October 23, 2019

Market plan

The company has planned to start Its business In the urban areas In and around Tamil Nadia and has its own retail outlets in few major cities like Achaean, Benedictory, Cuddlier, Upstream, Salem, Bangor and in other similar cities. We believe that the growing need of the market for quality and safe herbal products will help the company to succeed. Intelligent decision, sincere efforts and skilful execution will propel the company to reach greater heights People have once again started practicing our traditional method of using deadline herbs to treat Injuries, health and personal care problems.These products are very effective, don't cause side effects, and are a cheaper when compared to the costly chemical products available in the market. These herbal products used in India are broadly classified into herbal health products and herbal beauty products. Before starting the business Tony Herbs conducted a research about the market condition for natural and herbal products in India. It collected useful information that will help the company to reach the target market in a better and a faster way.Customer Information Tony Herbs targets both the Individual customer market and the commercial market Industries). Individual customers: We are concentrating mainly on the urban population of Tamil Nadia constituting 46 the state The urban population is about 31. 74 million. Conscious about their health and are very particular about the products they use Commercial market: It includes the following industries: 1 . Arrived drug industry 2. Homeopathic drug industry 3. Cosmetic and hair industry 4. Food supplements industry 5. Soap industry Market NeedThe basic market need is high quality and safe herbal products. People are looking for products that are 100% chemical free even without added preservatives and emulsifying agents. They also look for products with long shelf life. Market forecast In India the market for herbal products is growing every year. The market for her bal products is not crowded as there are only few players in this business. So there is an ample chance for succeeding in this business right now. SOOT ANALYSIS Strengths: The products are of high quality 100% pure- chemical free Offers competitive price Excellent packagingGood distribution channel Weaknesses: It's a start up business and so a huge amount must be spent for creating awareness Also the budget for marketing is limited Opportunities: The market is not crowded with herbal products Not many competitors in this business As few herbs can be grown only in India there is large scope for exporting the products to the nearby countries Threats: Erratic weather conditions can lower the field yields There a few competitors for this business: The products from the super markets: The problem with these products is that the packaging is not very good and so the reduces will not have a long shelf life.Products from Private companies: It includes companies like Forest Essentials, Bouti que, Himalaya, Dabber and Lotus. They are big players but the disadvantage is that the products are not 100% pure (they use preservatives and emulsifying agents) and are quite expensive. Products from local shops: The products of the local shops are of poor quality. Our mission is to delight the customers with our high quality and safe herbal products and build a long term customer loyalty.Our initial objective is to create customer awareness about the range of products offered by us To develop a customer base To build long term customer loyalty Thereby achieving greater profitability Segmentation, Targeting & Positioning Since the company is based in Tamil Nadia, it plans to concentrate on the market in and around Tamil Nadia. It segments the market into rural and urban. It focuses only on the urban market under which it targets both the individual customers and other commercial businesses (industries).It plans to position the product as High quality 100% chemical free Safe to use Long shelf life Competitive price Tony herbs offers variety of products in the form of powder, capsules, essential oils and extracts without any added preservatives and emulsifying agents. The products are in their purest form and are of high quality. Tony herbs takes all measures to ensure that packing & sealing processes are never compromised which in turn ensure long shelf life.To offer consistent customer satisfaction with high quality products Tony Herbs follows strict quality control measures, right from procurement, till packing and dispatching of the entire consignment. PRICE It will offer competitive price for individual customers. This is done in order to create awareness and to stay ahead of the competitors. Offering low price will eventually For other industries it will initially offer products for lower prices and when once it has established a position in the market it will offer its products at reasonable price to them.Tony Herbs plans to promote its products through the following methods: Advertisements through television channels Advertisements through newspapers and radio Sample packets with magazines and newspapers Selling the products in local exhibition and fair Gifting the products to celebrities in reality shows Networking through managers and owners of other businesses For the individual customers, along with the products the company provides instruction manual on how to use the products for different purposes.This will, in a way help the individual customers to get rid of their fear of using the products. Also the company offers certain accessories like bowl and applying brush for free. FEED BACK Tony Herbs plans to get feedback from its customers periodically. This will help it to improve its products according to the suggestions given by the customers. By doing so, Tony Herbs can prove that it can do anything for the customer satisfaction even at the expense of short term profits as this investment would pay off with long term custom er loyalty. Market plan The company should start exploring. Ideas about the product are sought through consumer requests, competitive products in the market which may make the product not to be sold in the market due to competition, conducting market research which helps managers to collect and interpret facts that help in putting the product more efficiently into the hands of customers. It also evaluates distribution channels best suited for the product to the market and consumers acceptance of the product in the market. Diversification which effects growth through development of new areas that are clearly distinct from the current business. It may be through   conglomerate diversification which takes place when an organization diversify into areas they are not currently operating or concentric diversification which occurs when organization diversify to areas related to but distinct from current operations e.g. the company may diversify to women or men’s clothing depending which field they were currently operating. The company should also do screening of ideas. This is a preliminary evaluation which is carried out to determine whether the ideas has possibilities and whether shall be further developed or dropped. The bad ideas should be discarded and good ideas taken into consideration. It should also contain situation analysis which includes information on costs, sales the market competitors and various processes in the macro-environment. Market segmentation by subdividing the market of consumers of a product in order to capture more sales effectively and efficiently. It may lead to increase in marketing opportunities because when markets come close to group of customers, they respond to changes in the markets and can develop or modify the products. t also contains a SWOT analysis of the firm. This is a method of assessing organization and environmental factors which contribute to an organization’s competitiveness. It also enables managers to develop a strategic profile of the organization based on the information they have collected It also assumes an   organization will achieve strategic success by maximizing strengths and opportunities while minimizing weaknesses and threats. Strengths are internal conditions that provide the organization with an advantage relative to competitor’s e.g. good financial resources, better manufacturing capability, changes with new technology. Weaknesses are negative internal conditions that can lead to a lowering of organization performance e.g. absence of necessary resources, poor product image, managers with inadequate strategy skills. Opportunities are current or future conditions in the environment that is favorable to an organization’s current or potential outputs e.g. growing number of customers, introduction of new technologies that an organization can easily exploit diversification of the clothing. Threats are current or future conditions in the environment that is unfavorable to an organization’s current and potential outputs e.g. entry into the market of low cost competitor, rising sales of substitute products. Specification: The ideas are expanded to a realistic recommendation where a further research is conducted or carried out on features and competitors probable actions. This is where the idea is examined and it helps to know how the competitors react to that idea in this case the clothing brand juicy couture. Marketing mix which is a combination of different marketing decision variables being used by affirm to market its goods and services e.g. product mix which includes the shape, design etc and promotion mix which includes methods of communicating to customers and sales promotion. Development of idea is the next step. This involves building of prototypes to be shown and inseminated or distributed. The prototypes are models of the real thing or a sample of how the final product will look like. When it has been developed, it is taken to customers for them to see any products they may involve or their goodness. Based on the results from customers the product is then restructured so as to take into consideration the customers desires. The process continues until good quality products are produced as per customer’s specifications. Then, judgment about feasibility of the products are proved or disapproved. Samples are tested in the market and analyzed. From there the exact specification is then chosen which will attract the majority of customers. After all that, then there is commercialization step whereby it involves full-scale production of the product and extensive advertising and selling in the market. Branding is the use of a name, term, symbol, or design or a combination of these to identify a product. It includes the use of brand names, trademarks, and practically all other means of product identification. A brand name is a word, letter, or a group of words or letters. According to Adcock, marketing principles and practices (2001), â€Å"A brand is not a product that just happens to have high awareness, nor is it just a recognizable name or logo, although both these are often present. It is so much more; it is a powerful stimulus that conjures up a complex impasse and level of expectation about itself and what it can do for a consumer†. In branding, the company should analyze the situation and come up with a list of problems facing the brand as well as opportunities for new and improved products. The results of analysis of situation should picture the current position of the business and likely environmental changes. It should also highlight a number of problems and opportunities. It should be done for the product the firm is considering to enter. An important of the way customers perceive an offering is the recognition of that offering as a brand. A brand can either be an asset or a liability depending on the attitude of the customer towards it. Brand names are adopted by customers as a short-hand identification of the product, and taken as an assurance of the general quality and characteristics of the product. The following strategies and techniques might be used by the company to successfully brand itself. They should employ concentration strategy whereby it focuses on effecting the growth of the product. Can be done through market development. This is gaining a larger share in the current market or expanding to new markets. It may also focus on product development which is improving the existing product. Individual brand names: This is a technique used when a company wishes to separate its products and does not think there are any benefits from joint associations. Multiple product brands: Juicy Couture Company may use one standard name, often the company name for all its products it’s producing. This can offer marketing economies where a strong favorable brand name carries across the whole assortment, to the benefit of otherwise weaker products, and assisting the acceptance of new products by consumers and intermediaries alike. Multi-branding: This is where a manufacturer for this case Juicy Couture Company may use umbrella brand together with a different sub-brand name for various product offering. It may design their products in a way which is unique from other products in the market. This makes customers to be aware of unique products in the market and they will start asking for that product in order to purchase it. Therefore branding of products contributes to the acceptance of the product in the market. If products have bad brands, they will end up not being recognized by customers in the market and if brand names are good which attracts the attention of customers it will end up being purchased in large quantities in the market hence good sales. REFERENCE: 1. Product planning management by William L. Moore and Edgar A. Pessemier (1993) 2. Brand positioning: Strategies for competitive advantage by Sengupta, Subroto (1990) 3. Brand strategy by Murphy, John M. (1990) 4. Marketing management: B2B by Michael D. Hutt and Thomas W. Speh (2007) 5. Marketing principles and practices by Denis Adcock, Al Halborg and Caroline Ross (2001)         

Tuesday, October 22, 2019

Effects of Hydrotherapy Essays

Effects of Hydrotherapy Essays Effects of Hydrotherapy Paper Effects of Hydrotherapy Paper There are many alternative methods of health care available today. People that are disappointed with medical or surgical health care are turning to alternative methods to help themselves. Some alternative methods are positive through, acupuncture, therapeutic touch and hydrotherapy. These methods are used for several different reasons such as to reat chronic pain, reduce anxiety and stimulate healing. Hydrotherapy is an external application of water to the human body for therapeutic purposes. Hot water helps muscles to relax. Therefore, it reduces pain and improves circulation. Cold water lowers the bodies temperture so it reduces blood circulation, increases muscle tone and reduces swelling after an injury and reduces muscular pain. A patient who is weak and finds it hard to move an injured limb without aid maybe able to perform a full range of movements in a hydrotherapy pool. Polio victims and paraplegics may get great benefit form this form of physical therapy. It is easier for these people to move in water. Muscles only need to exert only a fraction of their normal effort to maintain a normal body posture in the water. Hydrotherapy is generally available as part of a spa therapy and has evolved into a separate form of treatment. Contemporary hydrotherapy pools are small, shallow, heated swimming pools. Some are circular and use jets to make the water swirl around. The water is usually chlorinated. Amoung the most popular is those in which the waters of natural springs are used. Thousands of people suffering from a wided variety of ailments frequent mineral baths in search of the cures attributed to local waters and muds. Although, physicians generally doubt that mineral water has any more healing power than regular water. To become a hydrotherapist you can take classes at a college especially for hydrotherapy, such as Canadian College of Massage and Hydrotherapy. Also taking jobs or volunteer jobs at clinics, is a good idea. In conclusion, there are several types of alternative methods of health care available for use. One of them is Hydrotherapy. Hydrotherapy is good for muscle relaxation, reducing pain, and improving circulation. Also, it increases muscle tone, reduces swelling after injury and reduces muscular pain. In addition, alternative methods of health care are becoming more and more popular, and job outlook for this career is excellent.

Monday, October 21, 2019

Pink Floyd Essays - Harvest Records Artists, Free Essays

Pink Floyd Essays - Harvest Records Artists, Free Essays Juan Jos Mendoza MUL 2380 M W - 7:05p 8:20p 12/02/2015 Pink Floyd The early Sixties. Everything is up in the air, not least love, drugs and sex. A group of talented teenagers from academic backgrounds in Cambridge - Roger 'Syd' Barrett, Roger Waters and David Gilmour are all keen guitarists and among many who move to London, keen to discover more of this new world and express themselves in it. Mainly in further education studying the arts, architecture, and music. They mix with like-minded incomers in the big city. In 1965, Barrett and Waters meet an experimental percussionist and an extraordinarily gifted keyboards-player - Nick Mason and Rick Wright respectively. The result is Pink Floyd, which more than 40 years later has moved from massive to almost mythic standing. Through several changes of personnel, through several musical phases, the band has earned a place on the ultimate roll call of rock, along with the Beatles, the Stones and Led Zeppelin. Their album sales have topped 250 million. In 2005, at Live 8 the biggest global music event i n history the reunion of the four-man line-up that recorded most of the Floyd canon stole the show. And yet, true to their beginnings, there has always been an enigma at their heart. Roger 'Syd' Barrett, for example. This cool and charismatic son of a university don was the original creative force behind the band which he named after the Delta bluesmen Pink Anderson and Floyd Council. His vision was perfect for the times, and vice versa. He would lead the band to its first precarious fame, and damage himself irreparably along the way. And though the Floyd's Barrett era only lasted three years, it always informed what they became. These were the summers of love, when LSD was less a hallucinogenic interval than a lifestyle choice for some young people, who found their culture in science fiction, the pastoral tradition, and a certain strain of the Victorian imagination. Drawing on such themes, the elfin Barrett wrote and sang on most of the early Floyd's material, which made use of new techniques, such as tape-loops, feedback and echo delay. Live, the Floyd played sonic freak-outs half-hidden by new-fangled light-shows and projections with Barrett's spacey lead g uitar swooping over Waters' trance-like bass, while Wright and Mason created soundscapes above and beneath. On record they were tighter, if still 'psychedelic'. Either way, they sounded 'trippy'. And perhaps that was Barrett's intention. He certainly ingested plenty of LSD and other drugs, which didn't help his delicate mental balance. Over the spring of 1966, the young band were regulars at the Spontaneous Underground 'happenings' on Sundays at the legendary Marquee Club, where they were spotted by their future managers Peter Jenner and Andrew King. And by the autumn, the Floyd had become the house band of the so-called London Free School in west London. A semi-residency at the All Saint's Hall led to bigger bookings at the UFO and the International Times' launch in the Roundhouse as well as the recording of the instrumental 'Interstellar Overdrive' with the UFO's co-founder, producer Joe Boyd. This track was later used on hip documentaries of the scene. A signing to EMI followed i n early 1967. "We want to be pop stars," said Syd. In March, Boyd recorded Barrett's oddly commercial 'Arnold Layne' as a three-minute single. And with a Top Twenty hit to promote, the band took on a grueling schedule of gigs and recordings. They appeared at the coolest event of the summer, The 14-Hour Technicolor Dream in Alexandra Palace. They gave a concert under the banner 'Games for May' in a classical venue the Queen Elizabeth Hall where they displayed their theatrical ambitions through the use of props, pre-recorded tapes and the world's first quadraphonic sound system. They received a lifetime ban for throwing daffodils into the audience. And in June the Floyd released a single originally written for this event. 'See Emily Play', which was produced by EMI's Norman Smith, charted at Number Six and made it on to primetime TV's Top of the Pops three times with Barrett acting increasingly strangely. This was followed in August by Pink Floyd's first LP, The Piper At The Gates of Dawn, which they

Sunday, October 20, 2019

The Influence of Teachers Words and Actions

The Influence of Teachers' Words and Actions Teachers can have a huge influence on their students.  This goes much deeper than the lessons they teach. You only have to reflect on your own time in school to realize how positive or negative experiences can stick with you for the rest of your life. Educators need to remember that they hold great power over students in their hands. Words Can Uplift By encouraging a struggling student and explaining how she can be successful, a teacher  can change that student’s career. A perfect example of this happened to my niece. She had moved recently and began attending a new school in ninth grade. She struggled through most of her first semester, earning D’s and F’s. However, she had one teacher who saw that she was smart and just needed some extra help. Amazingly, this teacher spoke to her only once. He explained that the difference between earning an F or a C would require just a bit of extra effort on her part. He promised that if she spent just 15 minutes a day on homework, she would see a huge improvement. Most importantly, he told her that he knew she could do it. The effect was like flicking a switch. She became a straight-A student and to this day loves learning and reading. Words Can Harm By contrast, teachers can make subtle comments intended to be positive but are actually hurtful. For example, one of my best friends in school took  AP classes. She always earned B’s and never stood out in class. However, when she took her AP English test, she scored a 5, the highest possible mark. She also earned 4’s on two other AP exams. When she returned to school after the summer break, one of her teachers saw her in the hall and told her that she was shocked that my friend had earned such a high score. The teacher even told my friend that she had underestimated her. While at first my friend was delighted with the praise, she said that after some reflection, she was annoyed that her teacher didn’t see how hard she had worked or that she excelled in AP English. Years later, my friend now an adult says she still feels hurt when she thinks about the incident. This teacher likely only meant to praise my friend, but this faint praise led to hurt feelings decades after this brief hallway discussion. The Donkey Something as simple as role-playing can bruise a students ego, sometimes for life. For example, one of my students spoke of a former teacher she really liked and admired. Yet, she recalled a lesson he presented that really upset her. The class was discussing the barter system. The teacher gave each student a role: One student was a farmer and the other was the farmer’s wheat. The farmer then traded his wheat to another farmer in exchange for a donkey. My students role was to be the farmer’s donkey. She knew that the teacher simply picked kids at random and assigned them roles. Yet, she said that for years after the lesson, she always felt that the teacher had picked her as a donkey because she was overweight and ugly. Words Stick With Students The example illustrates that a teachers words can really stick with students for their entire lives. I know that I have tried to be more careful with what I tell students each day. I’m not perfect, but I hope that I am more thoughtful and less damaging to my students in the long run.

Saturday, October 19, 2019

Managing patient on antipsychotic medication Essay

Managing patient on antipsychotic medication - Essay Example Since that decade more than twenty of the antipsychotic agents have been introduced in United States. The antipsychotics used during the 1980s are collectively called conventional antipsychotics and the drugs that were introduced in the 1990s are called the atypical antipsychotics. Antipsychotics, unfortunately, have the tendency to be misused if the practitioner has sound knowledge about the psychopharmacological aspects of the drugs. Elderly patients are also at an increased risk of developing drug-induced motor or movement disorders as compared to the younger population (Saltz, Robinson, & Woerner, 2004). It is crucial to understand the pharmacological aspects of the antipsychotic drugs as improper management can lead to adverse drug reactions, drug-drug interactions, drug resistances and poor patient compliance. The second generation antipsychotics (SGA) are different from the first generation antipsychotics (FGA) because they also block the serotonin receptors. SGAs also have lesser extrapyrimidal symptoms as compared to the FGAs, however, SGAs ae associated with an increased risk of obesity, hyperglycemia and hyperlipidemia. According to studies only two SGAs cloazipine and olanzipine has been proved to be more effective than the FGAs. Antipsychotics are approved by the FDA for use in schizophrenia as well as some other psychiatric conditions and non-psychiatric disorders. They are also indicated in the treatment of bipolar disorders, autism, generalized anxiety disrder, major depressive disorder, perioperative nausea, preoperative restlessness, severe behavorial probles, severe nausea and vomiting, and refractory tourette syndrome and for the management of neuropsychiatric symptoms of dementia (Moore, DeJoseph, & Simmons, 2014). Both SGAs and FGAs are associated with risk factors and it is important to carry out a detailed assessment of the patient

Friday, October 18, 2019

The Use of Imagery as a Literacy Device Essay Example | Topics and Well Written Essays - 750 words

The Use of Imagery as a Literacy Device - Essay Example The purpose of this paper is to analyze a single literary device depicted in Poe’s story. In as much as the story has a number of literary devices irony as imagery remains a dominant element of the work. It is quite ironical at the beginning of the story with a description of Roderick. Since he believes most of his family members are suffering from hyper reactivity he also believes to be suffering from the same disease. This is ironical as he concludes to be suffering from Hypochondriac according to family history. For instance, the narrator says, â€Å"I was forced to fall back upon the unsatisfactory conclusion, that while, beyond doubt, there are combinations of extremely simple natural objects which have the power of thus affecting us, still the analysis of this power lies among considerations beyond our depth.† (Poe 06) This was in support of the fact that he believed with no doubt the sickness was a family sickness. Consequently, the story reveals irony, which mak es the story fascinating as a disease, is only accorded one family. Despite Roderick and Madeline being a brother and a sister they are involved in an intimate relationship. For instance in the story, â€Å""Her decease," he said, with a bitterness which I can never forget, "would leave him (him the hopeless and the frail) the last of the ancient race of the Ushers." (Poe 16)This was a depiction of the relationship, which existed between the two, who were from a family of the ushers. It was, therefore, ironical for the two to engage in intimate relationship as this represented incest. This is evidenced in the book when he says,† And thus, as a closer and still closer intimacy admitted me more unreservedly into the recesses of his spirit,† In addition, a sulphureous lustle is displayed among the characters who perceive themselves as sister and brother. From this perspective, irony manifests itself clearly leaving readers wondering what type of characters the two were (Po e and Lanier 36). The house of usher is full of ironical happenings, for instance, Roderick buries her sister alive to fulfill his prophecy. According to his prophecy, the people suffering from hyperactive reactivity like his sister are supposed to get buried alive. This is ironical as to how one can bury another alive just because he feels she is sick. This is also ironical considering the incestuous relationship between Roderick and Madeline we expected him not only to show love to his sister as a lover, but also as someone passionate. It is expected when a person dies he does not resurrect; however, this is a common event in the story with Madeline resurrecting to meet his brother Roderick. This is an ironical representation of unnatural characters who portray a bizarre of menacing events. Distress and agitation fills the bizarre occurrence of events as Madeline struggles out of the vault full of her, own blood, this is a horrifying scene (Poe 56). Vampirism of the last part of t he story relays many messages to the readers who remain guessing what happened to the last duo of the family. In conclusion, irony becomes a major literary device used in the story dominating almost all the narration. The fall of the house of usher manifests a disappearance of the family, which mainly suffers from a disease, aroused hyper reactivity. Several instances depict irony staring with the intimate relation

World Religion Essay Example | Topics and Well Written Essays - 750 words

World Religion - Essay Example This report approves that the temple is a place where Buddhist monks and lay people gather to practice meditation. Since meditation requires quiet and concentration, there are special rooms set aside in the temple for groups or individuals to sit on their pillows and meditate. The temple provides lay people with retreats, usually overnight stays but people can stay longer. When a person stays with the monks, they sleep on a simple mat and eat the same foods as the monks using the same simple black bowls. The purpose of a retreat is to simplify the person’s life, to relax, and to concentrate on meditation, so lay people do not get special treatment. The traditional tea ceremony is one of the activities that lay people participate in with the monks. They are also encouraged to work around the temple grounds and to study the grounds and buildings during tours so they can have an understanding of what traditional Buddhist worship is like. All these activities for lay people are me ant to encourage simplicity and concentration. This essay makes a conclusion that it is amazing to think of this place as enduring for more than 1,215 years in the same spot. Even though many events have happened this might have destroyed or disbanded the monks, it continued on even through religious oppression and many wars and natural disasters. This shows that the temple and the ideas of Buddhism are enduring, and even though there is this long history the monks still lead very simple lives. Outsiders can have a little taste of this Buddhist life, too.

What is current macroeconomic situation in the U.S Essay

What is current macroeconomic situation in the U.S - Essay Example Over the period of time, the unemployment rates in US averaged just over 5% however, during September 2011, the unemployment rate reached over 9%1 suggesting that despite measures taken by the government, unemployment level is rising. The overall growth rate of GDP has not been encouraging as the growth during the current year has further slowed down due to depressed aggregate demand as well as higher levels of inflation. The overall forecasts for the growth rates during the current year are less than 4% thus suggesting that the economy may further slow down as the growth rates fall and inflation increases. In order to deal with the problem, US government has undertaken a restricted expansionary policy under which fiscal stimulus has been provided to the economy. At the start of the crisis, Bush administration has introduced a tax cut fiscal expansion program to stimulate the economy. After that a further fiscal expansion package was introduced to save the financial system from collapse during 2009 and a further tax cut and unemployment fund extension package was introduced during 2010. (The New York Times, 2011). These attempts suggest that the US government undertook fiscal expansion in order to stimulate the economy and provide the necessary launching pad for the economy to pick up. However, despite such measures, economy has not responded and as such the overall growth rates remained depressed. The monetary policy also remained expansionary in nature wherein FED reduced it policy rate to almost zero. Reduction in discount rate critically reduced the overall interest rates within the economy thus allowing the economy to get stimulus. Low interest rates were also meant to encourage consumer spending on credit so that the overall aggregate demand could be increased. Apart from this, FED also continued with the policy of quantitative easing under which fictitious money was created to increase the

Thursday, October 17, 2019

Environmental Impact Analysis Assignment Example | Topics and Well Written Essays - 1500 words

Environmental Impact Analysis - Assignment Example It also leads to social problems that are interconnected to the perception of the people who reside in the area where such plants are situated. Nuclear power initiates from fission reaction in which the uranium atoms split into smaller constituents. The energy that is released during this fission reaction is used to produce steam. This steam is then further used in turbines to produce electricity. This method of electricity generation in accumulation is responsible to generate 20 percent of the electricity that is produced within the United States of America. There are more than hundred nuclear power plants currently in the United States of America that are producing this form of energy. (U.S. Energy Information Administration) Uranium is a radioactive metal that is cannot be regenerated by any humanly process. There are specific methods that are used to extract Uranium like the conventional mining technique or by leaching of chemicals. As soon as uranium has been extracted it is the n sent to the uranium processing plants so that they are converted in fuel that can be consumed for various purposes. This fuel is then carried to the nuclear plants for further work. (uranium reserves estimate, EIA) Furthermore when the fuel reaches the plant it is sent to the nuclear reactor, reactions occurs when the neutrons present in uranium undergo collisions that generates heat and produces a chain reaction. Through this process heat is obtained which produces steam to generate electricity in turbines. The environmental impacts of such reactions are mentioned as follows: Despite the fact that the government and other authorities in concern have formulated strict laws to protect the health of the people as well as to secure the environment irrespective of that there are still a vast range of the environmental problems and impacts that are linked to the generation of electricity through this medium. In my paper I would be discussing the various ways through which this form of energy is impacting us. Heat rejection is one of the major concerns that our environment is facing. In the same way we experience with the thermal generated power plants which produce electricity through fossils etc. nuclear power plants also need some way through which they can radiate heat energy which is part of their condensing system. (Bulletin of the atomic scientists, 1946, pg 17)The quantity of the heat that is generated from the various parts of the generating plant differ but an estimate states that about 60-70% of heat energy is released from the plant when a nuclear fuel is ejected.It is usually seen that some of the plant that uses a cooling towers whereas some plants have created an artificial lake or a naturally formed body of water. (Hoffelner, 2013, pg 309) Apart from that it is greatly affecting the marine life that are a part of the environment in which the heat is given out. Another adverse effect that the heat causes in the water is the changing of rate at which the rivers flow also the anomalies present in the water of the sea. A research that was done shows that the apparent rise that occurs in the sea level is almost 3mm/year in the Northeast coast of United States of America. (Kopytko, 2011, pg 318-333) These nuclear power generation plants do not produce normal radiation like carbon , sulphur dioxide or various other gases present in the environment, instead of that these plants radiate emissions which contain uranium which is far more harmful and has

Wednesday, October 16, 2019

Information systeams Essay Example | Topics and Well Written Essays - 1500 words

Information systeams - Essay Example More so, the bank offers offshore banking services for the UK expatriates and foreigners residing in the UK. On the other hand, Barclays bank traces its origin in 1690 through a gold smith banking business in London. Later in 1736, an investor named James Barclay joined the business, which expanded tremendously to become a nationwide bank under the name Barclays and Co. Currently, the bank is a British multinational banking as well as a financial service company whose headquarters are in London, UK (Jain, 2005:96). The bank serves millions of customers with its outstanding services like saving accounts, current accounts, loans, mortgages, and much more all over the globe. This paper will evaluate the process of the two named banks’ personal loan processes and compare the two bank processes, not forgetting to outline the type of information system the banks use to process the personal loans NatWest personal loan There are two types of personal loans, which are secure and unsecu red loans. Unsecured loan is that which is supported by the credit worthiness of the borrower without using collateral or property. On the other hand, the secured loan is the loan acquired after rendering property or any other collateral as security to stand in place of the loan acquired. Unsecured loan is the most common type of loan acquired by individuals of all categories. To begin with, NatWest bank offers unsecured personal loans at a rate of 8.9% APR typical and this loan is available to existing current account holders only. The other account holders like the Advantage Gold,  Advantage Private, and Black Current Account holders the APR or preferential representative rates at 6.4% for loans ranging between ?7,500 and ?14,950. In addition, the applicant must be eighteen years and above and should be UK residence. In order for a borrower to estimate or work out how much loan he would like to borrow, the rates, monthly repayments and total loan costs, the bank offers personal loan calculators online. More so, the bank offers Jargon Buster to clarify confusing terminologies that are commonly associated with loans. Prior to unsecured loans, the bank also offers secured personal loan. This is a type of loan granted by banks over security of one or more asset. These assets will belong to the bank after the customer defaults on his personal loan repayments. In most cases, this loan is offered to people who offer houses or even personal vehicles as their security or collateral, which means that customers with these assets are the only individuals entitled to the loan. Unlike the unsecured loans, secured loans are more flexible in a manner that the borrower chooses on the period of repayment and can borrow as much amount of cash as they need as long as it is of the same value with the asset offered. Nevertheless, secured and unsecured personal loans fall under the same department. NatWest secured personal loan interest rates are paid based on personal circumsta nces where loans extending to ?14,950 have a maximum term of five years, while loans ranging from ?14,950 to ?25,000 have a maximum period of seven years. More so, home improvement loans over ?15,000, the repayment period takes up to ten years. In addition, no matter how much the amount one borrows, NatWest offers a minimum term of one year, and the borrower can repay the credit earlier

Environmental Impact Analysis Assignment Example | Topics and Well Written Essays - 1500 words

Environmental Impact Analysis - Assignment Example It also leads to social problems that are interconnected to the perception of the people who reside in the area where such plants are situated. Nuclear power initiates from fission reaction in which the uranium atoms split into smaller constituents. The energy that is released during this fission reaction is used to produce steam. This steam is then further used in turbines to produce electricity. This method of electricity generation in accumulation is responsible to generate 20 percent of the electricity that is produced within the United States of America. There are more than hundred nuclear power plants currently in the United States of America that are producing this form of energy. (U.S. Energy Information Administration) Uranium is a radioactive metal that is cannot be regenerated by any humanly process. There are specific methods that are used to extract Uranium like the conventional mining technique or by leaching of chemicals. As soon as uranium has been extracted it is the n sent to the uranium processing plants so that they are converted in fuel that can be consumed for various purposes. This fuel is then carried to the nuclear plants for further work. (uranium reserves estimate, EIA) Furthermore when the fuel reaches the plant it is sent to the nuclear reactor, reactions occurs when the neutrons present in uranium undergo collisions that generates heat and produces a chain reaction. Through this process heat is obtained which produces steam to generate electricity in turbines. The environmental impacts of such reactions are mentioned as follows: Despite the fact that the government and other authorities in concern have formulated strict laws to protect the health of the people as well as to secure the environment irrespective of that there are still a vast range of the environmental problems and impacts that are linked to the generation of electricity through this medium. In my paper I would be discussing the various ways through which this form of energy is impacting us. Heat rejection is one of the major concerns that our environment is facing. In the same way we experience with the thermal generated power plants which produce electricity through fossils etc. nuclear power plants also need some way through which they can radiate heat energy which is part of their condensing system. (Bulletin of the atomic scientists, 1946, pg 17)The quantity of the heat that is generated from the various parts of the generating plant differ but an estimate states that about 60-70% of heat energy is released from the plant when a nuclear fuel is ejected.It is usually seen that some of the plant that uses a cooling towers whereas some plants have created an artificial lake or a naturally formed body of water. (Hoffelner, 2013, pg 309) Apart from that it is greatly affecting the marine life that are a part of the environment in which the heat is given out. Another adverse effect that the heat causes in the water is the changing of rate at which the rivers flow also the anomalies present in the water of the sea. A research that was done shows that the apparent rise that occurs in the sea level is almost 3mm/year in the Northeast coast of United States of America. (Kopytko, 2011, pg 318-333) These nuclear power generation plants do not produce normal radiation like carbon , sulphur dioxide or various other gases present in the environment, instead of that these plants radiate emissions which contain uranium which is far more harmful and has

Tuesday, October 15, 2019

Accessorize with a Meaning Essay Example for Free

Accessorize with a Meaning Essay It takes up about two inches on my thick, and short middle finger. It is relatively small, yet has been proven to have great importance and meaning. This dented, imperfect circle fits loosely, and comfortably which allows for the constant usage and handling. It has a unique, and undefined shape that compliments the small circles within the accessory. There is a band of a perfect line of small circles that runs infinite in the exact middle of the accessory. The thirteen small circles sit in the small seats of metal all in unison and order. Sharp, pointed tips that look like the top of a vintage castle, pull the pendants on the outsides of the line, up and back down. If you cut the jewel in half, the sides are symmetrical with equal amount of points and dots. A tight grasp of the pointed edges are painful from the sharp and definite tips. Running your fingers over the piece, feels of rough sand paper rubbing on a wall. It shines bright and sparkly, which catches the attention from many eyes’ including my very own. However, on the inside, the real, steel metal has grown rugged, and dirty from over use, and age. It’s smooth outer covering has worn off, and the whole inside has thinned. It leaves a mark, and patch of dry skin where it lays on my finger every day and night. It smells of the sandwich I had today for lunch, since it is always there when my fingers are supporting my food. Also, smells of the decaying metal after it has been washed under the soapy, warm water. It’s small size and lightweight does not determine it’s meaning to me. In fact, despite the petite appearance it has a large, underlying sentimental theme to my life. I have never owned such a delicate, and special piece in my long 16 years of living. According to my mother, this was due to lack of responsibility and maturity. She could never trust me to guard such a remarkable diamond and actually understand the significance until the night that marked my transformation from a young girl, to a mature woman. This night, my sweet sixteen is with out a doubt was one of the best experiences of my life. This ring, purchased by my mother and grandmother from a small, expensive boutique was to not only be cherished because of it’s beauty, but also as a memory of this night which marked my new found maturity. Without this ring, I think it would change my outlook of a sweet sixteen completely. To most, a sweet sixteen is just a extravagant birthday party with an abundance of family, and friends that give larger gifts. Although, it symbolizes something much greater for a girl, it marks a necessary change in one’s life. My sweet sixteen is a night I want to smell, hear, touch, taste, and feel forever. The ring helps me hold on tight to this special time in my life. The ring’s unique shape also has a symbolical meaning. The line in the middle represents the stability and exactness in my life. Unfortunately, like everyone else, my life consists of many ups and downs. This ring has inflicted an important realization about my life. When I look down at my finger, I look back at the happiness, and joyous memories in my life especially my sixteenth birthday. This reminds me to preserve the happiness within my life, like my family and friends in order to fight off the barriers holding me back from success. I acquire laughter, and smiles through one glimpse of my ring. This is important to hold onto because a life is not worth living without the safety of warm smiles, and special memories. Hardships have become especially evident within my teenage years, so the ring has grown more and more important. I have endured many family and friend issues that inflict drama and undesirable emotions. The ring brings me back to a night filled with strictly fun and togetherness. People question, â€Å"how can a small piece of jewelery hold so much meaning? † Everyone must seek something for comfort and assurance for their own mental health and happiness. For me the ring provides me with the idea of my new found maturity, and happy memory where my family and friends were all able to come together, and share a memorable moment with me. Time has proven to cause separation and change amongst people, with this beautiful ring I will be able to forever remember loved ones and how grateful I am to have shared my sweet sixteen with them.

Monday, October 14, 2019

The Use Of Enzymes In Textile Industry Biology Essay

The Use Of Enzymes In Textile Industry Biology Essay Enzymes are bio-catalysts and are used in several industrial processes since nineteenth century. Its use in textile industry is an example of industrial or white revolution. Enzymes, due to their non-toxic and eco-friendly characteristics, have gained wide applications in textile industry. Not only they are highly specific, efficient and work under mild conditions but also they help reduce process times, save energy and water, improve quality of product and reduce pollution. As a result they are rapidly gaining global recognition as important requirement for textile industry. Commercially enzymes can be obtained from three primary sources, animal tissues, plants and microbes. However, these naturally occurring enzymes are not produced in sufficient quantities to be readily used in industrial applications. Hence, microbial strains producing the desired enzyme are cultured and optimised i.e. fermentation, to obtain enzymes in sufficient quantities for their commercial use in textile industry. The enzymes used in the textile industry are amylases, cellulases, pectinases, lipases, catalases, proteases, xylanases etc. and are mainly used for processing of the textiles i.e. preparatory and finishing of the goods. Some of the applications include removing of starch, bleaching, degrading lignin, fading of denim and non-denim, removal of peroxidises, finishing of wool, decolouration of dyestuff, bio-scouring, bio-polishing, wool finishing, etc. (Shenai, 1990; Nalankilli, 1998; Barrett et al., 2003;Cavaco and Gubitz, 2003; Chelikani et al., 2004). CLASSIFICATION AND PROPERTIES OF ENZYMES USED IN TEXTILE INDUSTRY Enzymes are very specific toward catalysing the substrate. Hence these are classified on the basis of their catalytic functions in six broad categories: EC1 Oxidoreductases: catalyze oxidation and or reduction reactions EC2 Transferases: catalyze transfer of a functional group EC3 Hydrolases: catalyze the hydrolysis of various bonds EC4 Lyases: catalyse cleavage of various bonds by means other than hydrolysis and oxidation EC5 isomerases: catalyse isomerisation changes within a single molecule EC6 Ligases: joining of two molecules with formation of covalent bonds Properties of enzymes exploited for use in industrial application: Acceleration of the reaction rates by lowering the activation energy of the reaction. Operating optimally under milder conditions of temperature, pH and atmospheric pressure. Alternative for polluting, toxic and carcinogenic chemicals High specificity towards substrate makes easy to control their activity Biodegradable and do not produce toxic wastes. Due to their high efficiency, specificity, property of working under milder conditions and biodegradability enzymes are well suited for various industrial applications. ROLE FO ENZYMES IN TEXTILE INDUSTRY Use of enzymes in various textile processing processes has greatly benefited textile industry with respect to both environmental impact and quality of product. There are 7000 known enzymes, but only 75 are commercially used in textile industry (Quandt and Kuhl, 2001) and most of them belong to hydolases and oxidoreductases families. The hydrolases family includes amylases, cellulases, pectinases, proteases, catalases and lipases/estarases and oxidoreductase family include laccase, peroxidises. AMYLASES Amylases actson starch molecules and hydrolyses to give dextrin and small polymers of glucose units (Windish and Mhatre, 1965). These are classified according to the sugars they produced i.e. ÃŽ ±-amylases and ÃŽ ²-amylases. ÃŽ ±-Amylases being produced from filamentous fungi and bacteria are mostly used in industries (Pandey et al., 2000). This enzymes are stable over wide range of pH from 4-11 and optimal activity is related to the growth conditions of the source microorganisms (Vihinen and Mantsala, 1989). In general, ÃŽ ±-Amylases shows high specificity towards starch followed by amylase, amylopectine, cyclodextrin, glycogen and maltotriose (Vihinen and Mantsala, 1989). 1.1 Textile Desizing Size is an adhesive substance used to coat the wrapping threads used in weaving of the fabrics made from cotton or blend. Starch and its derivatives are broadly used to size fabrics due to their easy availability, relative low cost and excellent film forming capacity (Feitkenhauer et al., 2003). Amylases are used to remove this sizing material and prepare the fabric ready for dyeing and finishing (Cavaco-Paulo et al., 2008). Earlier to the discovery of amylases, desizing was done by chemical treatment of fabric with acid, alkali or oxidising agents at high temperature. But, this technique was inefficient in removing the starch which resulted in imperfections in dyeing and also degradation of cotton fibre. Amylases are commercially used for desizing fabric due to its efficiency and specificity and its effectiveness in completely removing the size without affecting the fabric (Cegarra, 1996; Etters and Annis, 1998). Starch is removed during washing in the form of water soluble dextrin and thus reduces the discharge of chemical waste into the environment. 2.0 CELLULASES Cellulases are the hydrolytic enzymes that catalyses the breakdown of cellulose to smaller oligosaccharides and finally to glucose. These enzymes are commonly produced by soil-dwelling fungi and bacteria such as Penicillium, Trichoderma and Fusarium (Verma et al., 2007) and shows optimal activity in temperature range from 30C-60C. The applicationof cellulases in the textile industry begin in late nineteenth century with denim finishing. It alone accounts for 14% of the worlds industrial enzyme market (Nierstrasz and Warmoeskerken, 2003). 2.1 DENIM FINISHING Denim is high grade cotton and its washing is done in order to give a worn look e.g. stonewashing of denim jeans, in which the denim fabric id faded using sodium hypochlorite or potassium permanganate are used as pumice stones (Pedersen and Schneider, 1998) it resulted in damage to the fabric and machine. Introduction of cellulases have increased the productivity without affecting garment or the machine. Cellulases hydrolyses the exposed surface of dyed (indigo) fabric leaving the interiors intact, partial hydrolyses of the surface results in removal of dye and leaves a light area. Most of the cellulases are produced from fungi, but cellulases from bacterial and actinomycetes origin are now studied with regard to its use in bio-stoning of denim. Cellulases used for washing of the denim can be further classified on the basis of optimal pH required for its maximum efficiency; as neutral cellulases operating at pH 6-8 and acidic cellulases acting at pH 4.5-6. 2.2 BIO-FINISHING Washing of cotton and other natural and man-made cellulosic fabrics, besides denim, such as linen, hemp, rayon and viscose by enzymatic activity of cellulases to improve final appearance is done by bio-finishing or bio-polishing processes (Videbaek and Andersen, 1993). The process helps in preventing the formation of ball of fuzz called pill on the surface of the garment, this formation usually results in unattractive, knotty fabric appearance. Cellulases, hydrolyses the microfibrils protruding from the surface of the fabric which tends to break off leaving a smoother surface. Bio-finishing may be an optional step for upgrading cotton fibrics, but is very important step in prevention of pilling or fibrillation during finishing of lyocell fabrics (Cavaco-paulo et al., 2008). Similarly, Carrillo et al. (2003) stated that cellulases can be used for viscose type regenerated celloloses like viscose and modal. Yachmenev et al. (2002) showed the use of ultrasound as an efficient way to improve the enzymatic activity in bioprocessing of cotton.

Sunday, October 13, 2019

Hip-Hops Musical Evolution of Rap Essay example -- The History Of Rap

The hip-hop culture began in the streets of New York City during the 1970’s and has gone through tremendous changes up until now. Hip-Hop consists of four elements: rap, graffiti, break-dancing, and the disc jockey. In this paper, I intend to fully explain the evolution of rap music, from its infancy to the giant industry it is today. Hip-Hop emerged in the 1970’s upon the arrival of a one Kool DJ Herc. Kool DJ Herc migrated to the United States from Kingston, Jamaica and settled in the West Bronx of New York. Kool DJ Herc was a disc jockey that attempted to incorporate his Jamaica style of disc jockeying, which involved reciting improvised rhymes over reggae records. Unfortunately for Kool DJ Herc New York seemed uninterested in reggae at that time. This forced Kool DJ Herc to find another appealing sound in order to please his audiences, which he did. Kool DJ Herc adapted a new style, which involved him by chanting over the instrumental or percussion sections of the popular music of the day. He learned that by taking two identical records using an audio mixer, that he could play any segment over and over, there fore extending one segment for entire song (Light, 1999). In the early 1970’s and with the emergence of disc jockeys such as Kool DJ Herc, hip-hop began to spread through urban areas of New York like â€Å"wild fire.† Kool DJ Herc, who actually coined the term â€Å"hip hop,† began to realize that this was the beginning of a new genre (Light, 1999). As this phenomena evolved the party shouts became more elaborate, d jays began to incorporate little rhymes such as â€Å"throw your hands in the air and raise ‘em like you just don’t care.† With regards to Kool DJ Herc, as he progressed eventually... ...ted Light, Alan. Vibe History of Hip Hop. Book & CD ed. New York: Three Rivers Press, October 1999. Scott, Cathy. The Murder of Biggie Smalls. 1 ed. St. Martins Press (Trade), October 2000 Ogg, Alex., David Upshal., and Alexander Ogg. The Hip Hop Years: The History of Hip Hop. Book & CD ed. Trans Atlantic Publications, Inc. September 1999. Scott, Cathy. The Killing of Tupac Shakur. 1 ed. Huntington Press; September 1997 Rose, Tricia. Black Noise: Rap Music and Black Culture in Contemporary America (Music and Culture). 1ed. Wesleyan University Press; May 1994 Brewster, Bill and Frank Broughton. Last Night a Dj Saved My Life: The History of the Disc Jockey; Grove Press; August 2000 Perkins, William Eric. Droppin’ Science: Critical Essay on Rap Music and Hip Hop Culture (Critical Perspectives of the Past). Temple University Press, October 1, 1995 Hip-Hop's Musical Evolution of Rap Essay example -- The History Of Rap The hip-hop culture began in the streets of New York City during the 1970’s and has gone through tremendous changes up until now. Hip-Hop consists of four elements: rap, graffiti, break-dancing, and the disc jockey. In this paper, I intend to fully explain the evolution of rap music, from its infancy to the giant industry it is today. Hip-Hop emerged in the 1970’s upon the arrival of a one Kool DJ Herc. Kool DJ Herc migrated to the United States from Kingston, Jamaica and settled in the West Bronx of New York. Kool DJ Herc was a disc jockey that attempted to incorporate his Jamaica style of disc jockeying, which involved reciting improvised rhymes over reggae records. Unfortunately for Kool DJ Herc New York seemed uninterested in reggae at that time. This forced Kool DJ Herc to find another appealing sound in order to please his audiences, which he did. Kool DJ Herc adapted a new style, which involved him by chanting over the instrumental or percussion sections of the popular music of the day. He learned that by taking two identical records using an audio mixer, that he could play any segment over and over, there fore extending one segment for entire song (Light, 1999). In the early 1970’s and with the emergence of disc jockeys such as Kool DJ Herc, hip-hop began to spread through urban areas of New York like â€Å"wild fire.† Kool DJ Herc, who actually coined the term â€Å"hip hop,† began to realize that this was the beginning of a new genre (Light, 1999). As this phenomena evolved the party shouts became more elaborate, d jays began to incorporate little rhymes such as â€Å"throw your hands in the air and raise ‘em like you just don’t care.† With regards to Kool DJ Herc, as he progressed eventually... ...ted Light, Alan. Vibe History of Hip Hop. Book & CD ed. New York: Three Rivers Press, October 1999. Scott, Cathy. The Murder of Biggie Smalls. 1 ed. St. Martins Press (Trade), October 2000 Ogg, Alex., David Upshal., and Alexander Ogg. The Hip Hop Years: The History of Hip Hop. Book & CD ed. Trans Atlantic Publications, Inc. September 1999. Scott, Cathy. The Killing of Tupac Shakur. 1 ed. Huntington Press; September 1997 Rose, Tricia. Black Noise: Rap Music and Black Culture in Contemporary America (Music and Culture). 1ed. Wesleyan University Press; May 1994 Brewster, Bill and Frank Broughton. Last Night a Dj Saved My Life: The History of the Disc Jockey; Grove Press; August 2000 Perkins, William Eric. Droppin’ Science: Critical Essay on Rap Music and Hip Hop Culture (Critical Perspectives of the Past). Temple University Press, October 1, 1995

Saturday, October 12, 2019

The Arrival of the Bee Box and the Rime of the Ancient Mariner :: English Literature

In The Arrival of the Bee Box and the Rime of the Ancient Mariner, compare the ways in which the choice of language, detail and the form, tell us about the feelings of the writer. In both poems, a range of literacy devices are used in order to express the feelings of the writers. Plath's poem is written similarly to the Rime of the Ancient Mariner, and yet they are different in many ways. Plath wrote her poem in 1962 and Coleridge wrote his poem in the 1700's or early 1800's, and the style of writing differ, as Plath's writing seems to be more emotive, whereas Coleridge's work seems to have a more a gothic theme to it. One of the main literacy devices used in both poems is the extended metaphor. Plath uses the metaphor to show the box as a symbol of her life and how she wants to escape from it, but can't because of the consequences. "The box is locked, it is dangerous." I think she feels trapped within her life and the depression of everything is getting to her. She wants to get out and experience other things, but feels that she has created her life and therefore must live with it, "I ordered this, this clean wood box/ I have to live with it overnight" Possibly, this could be related to part of her past, where she tried to commit suicide, in order to end her life, so that she can be free of the box. In the Rime of the Ancient Mariner, there are many metaphors within it. As the boat travelled on its course, it came across some ice and it got stuck there. At that time the Mariner didn't know what to do. Then an Albatross came to the rescue and it cracked the ice so the mariner was able to carry on his journey, "at length did across an Albatross/thorough the fog it came; / As if it had been a Christen soul, / We hailed it in God's name. / It ate the food it ne'er had eat. / And round and round it flew./ The ice did split with a thunder fit;/ The helmsman steered us through!" I think the ice was a symbol for the limitations in life, and the barriers Coleridge has come across in life and he over come them. Also, maybe the ice was a symbol of the dangers that come with life, and once they are dealt with, you can move along safely. The Rime of the Ancient Mariner is written in loose, short ballad stanzas usually either four or six lines long but, occasionally, as

Friday, October 11, 2019

Is Torture a Necessary Evil Essay

14th September 2013 Torture is a necessary evil. After reading this article and evaluating both sides of the argument, my opinion remains the same. I disagree that torture is necessary; it is a barbaric breach of human rights. After looking at statistics, only 8% of Guantanamo detainees were Al Qaeda fighters, this is a shockingly low percentage in proportion to the 517 Guantanamo that were detained. British laws have deemed torture illegal and yet at least 6 detainees alleged that British forces were involved in the torture. Torturing cannot go on; the pros do not outweigh the cons of torture. In exceptional circumstances, lives may be saved, but at what cost? Where does it end, as stated in the article, will family members become torture victims? As the initial suspect may not have value for their own life, they turn to his/her loved ones? If a suspect has been detained, regardless of what their crime may be, they still have the right to remain silent. Any forced extraction of information goes against the fundamental human rights , and even if information is gained, what assurance do we have that it will be correct information? In the heat of the moment, it may seem that the information is true, to end the pain that the victim is in, yet it may all be fiction. These are clearly not risks worth taking, and in my opinion, anyone who is willing to submit a fellow human being to that amount of pain and discomfort, does not fill me with confidence in the fact that they are in a position of power. In recent news, countries like the UK or the USA are undecided whether to involve themselves in the business of Syria; they claim that involvement, in the sense of morals, is the right thing to do. Yet there is still a debate on whether torture should be legal, does one not contradict the other? It seems extremely hypocritical that on one hand, the armed forces have a sense of human rights in one way, yet on the other hand, claims that torture is necessary, which completely abolishes human rights in another way. In conclusion, regardless of the arguments in favour of torture, I still disagree that torture is a necessary evil; it dehumanises victims, stripping them of their human rights, regardless of whether they may be Al Qaeda fighters, they still ha ve the basic human right to remain silent during questioning, any way of obtaining information by forced means is morally wrong.

Thursday, October 10, 2019

What I am Passionate About

Usain Bolt has won six Olympic gold medals. What do they all have in common? It is not that they won numerous gold medals. It Is they are all passionate about what they do, Since I started preschool at age four, my time outside of school have been piled up with never ending activities, first there was ballet, then came ice skating, art class, then swimming, chess, thenPlano, speed reading, and flute. Whenever I quit doing one thing, I picked up something new. As the years go by, most of these activities are only memories, but one thing has rooted inside of me. After a day of academic learning and demanding homework, I will quickly retreat into my safe haven, drawing. I love drawing. I think I am better at it than spelling. Maybe that is the reason I am better at math and science than reading and writing in school. To me, math and science is another way of drawing using dfferent media.I believe when writers want to write, their minds will be filled with words and sentences, but when I want to express myself, my mind will be filled with images and graphics. School, homework, and keeping up good grades can be pretty stressful, When I draw, I feel I am In a world where there are endless sunshine, a warm breeze, soft rolling green hills, fragrant flowers, morning dew on the bright green grass, chirping birds†¦ sometimes there are lines, geometric shapes, and dots which all Intertwine In the endless void.As long as I can Imagine, I can draw, I feel happy. People often think artists are only appreciated when they are dead. I believe that is a narrow way to appreciate art. Art is the major part of our life. Everything we live by pretty much started out with an Idea throwing on a piece of paper in the form of sketch or drawing. How would Thomas Edison plan out his idea for the light bulb? Drawing has become a major part of me; it has become my anchor and my passion and I am pretty darn good at It.

Wednesday, October 9, 2019

Conclusion on Smartphone Essay

As the conclusion, the university students nowadays prefer to improve their vocabulary skill through smartphones rather than other devices especially in this era. This because through the smartphones they can easily download application such as dictionary besides can work the vocxabulary lesson through offline or outside the class. At the same time, these can make students’ life more flexible to improve their vocabulary at anywhere and anytime they want it without sticking at one place to learn it. According to Sarmiento (2002), the excited students said mobile device helped them to learn math and science better. It is proven, as we can see, students get more interested to learn any subject through their mobile devices rather than going to class or get it from books. Therefore, we hope the government will allow the students to bring the mobile devices to schoolto give them opportunities to experiments and discover the mobile technologies. However, the school has to impose some rules so that the students will not misused the device in wrong way. Firstly, the advantage of using smartphones in vocabulary skills among university students is students can download English language materials through their smartphones. These can be divided in two methods which is the first one is by downloading a dictionary which can help improving students’ vocabulary. According to Song and Fox (2008), in today’s technoly era, more students prefer to bring a downloaded handheld electronic dictionary or a mobile device rather than bringing along a thick dictionary to class or places of study. This true as we can see, many students use their smartphones to download dictionary to enrich their vocabulary for them to learn the pronounciation of unfimiliar words even it is outside of the class. Furthermore, it also provides opportunities for them to solve vocabulary problems during their lecture. For example, when the students look up for a new word or expression from hard copy handouts by the lecturer, most of them prefer to use their dictionary in their smartphones to search for the meaning of the word rather than searching in the thick dictionary which is heavy. The next method, is by using internet access to download dictionary for supporting education. Sophisticated mobile devices have been upgraded upgraded and used to support education through personal and social enrichment (Roschelle,Sharples&Chan, 2005).

Tuesday, October 8, 2019

Markting 3000 Essay Example | Topics and Well Written Essays - 250 words

Markting 3000 - Essay Example For example, IPhone functions depend on the mobile network such as GSM, GPRS, EDGE, 3G, Call, SMS etc. Without these features there is not much use of IPhone and hence by distributing IPhone through AT & T, Apple is enhancing the value and use of IPhone for consumers. Similarly, the value chain for customers buying online is that segment of market which resides outside the USA. Hence, they cannot use AT & T in their country, so it much feasible for them to buy IPhone online and use it in their country on their choice of mobile network. The value they get from buying online is cheaper product as compared to if it bought from AT & T. The return value channel will be reselling IPhone back to Apple, which will refurbish them and then sell them again in the market at a higher price. The reverse value will be that when people buy refurbish sets they will know that the product is being checked by Apple itself and hence it will be more reliable than other second hand IPhones available in the market. This will result in refurbished IPhones selling at a higher price as result of reverse

Monday, October 7, 2019

Emergency Response and Promoting Safety Research Paper

Emergency Response and Promoting Safety - Research Paper Example An emergency action plan is crucial because it reduces the number of casualties of a particular emergency. In this case, the severity of injuries is also reduced considerably. The plan also enhances swift evacuation of people and property, which is under threat. The response to an emergency helps calm down an overwrought situation to avoid further havoc. The innovative methods used to keep workers safe and healthy includes training on the response to emergencies. The other method used is continuous evaluation of the emergency plan instituted to grasp the strategies applied during the emergencies. The company can also offer to train the employees on the usage of workplace machines and equipment to reduce the probability of an accident. The methods are useful in a construction company in the sense that they ensure that they enable the employees to take precautions while working. According to Goetsch (2010), a construction company is prone to many risks including falling objects. The methods will ensure that the employees are aware of the guidelines for emergencies and the response actions required. The training carried out ensures that the team promptly responds to an emergency. Training also equips the workforce with proficient skills on safety and health standards. Safety in a construction company is important because machines do most of the construction activities. For that reason, there are high chances of machine accidents owing to power failure, machine faultiness, and employee carelessness. Incentive programs can be employed in a construction company in a bid to promote the safety of the employees (Goetsch, 2010). Incentive programs ensure that employees who complete their tasks without any injury receive rewards. The initiative will ensure that all construction employees work towards minimizing accidents.  

Sunday, October 6, 2019

Compare Contrast 2 Poems A Working Girl Can't Win and Advice to my Son Essay

Compare Contrast 2 Poems A Working Girl Can't Win and Advice to my Son - Essay Example Peter Meinke try to tell in their poems based on their own experiences in â€Å"A Working Girl Can’t Win† and â€Å"Advice to my son†, respectively. More or less, both of them share their perceptions of people and life as assumed unanimously. The only difference in their poems is that Meinke takes a positive approach to life and advice his son to survive the harsh realities of life and live a better one, whereas Garrison discusses about the harsh stereotypes associated with women in their workplaces and daily lives. With the use of diction and imagery, these poems bring forth the harsh realities in life. Garrison emphasizes on the victimized state of women at the hands of the patriarchal and male dominated society. This all point towards gender discriminations which does not allow women to have the stability and sense of belonging in a workplace compared to their male counterpart. Thus, in order to prove their capabilities and intellect, they have to juggle with different identities: a work self and a feminine self (Hippel et al. 156). As these stereotypes prevail, Garrison, by using diction and vivid imagination, narrates the ubiquitous undeserving labels associated with women in workplace and elsewhere. Their chastity is libelled by questioning their status as â€Å"pundits or a slut† (Garrison). ... These men then criticise them for being too soft or strident, too aggressive or not enough. Normally, a few of these attributes portray a confident persona in men, however, this all appears abrasive in women (Rhodes 6). These attributes leave a woman battling for her status alone. But what these women forget is that in struggling they lose themselves forgetting how to live a normal life. Because they are involved in removing the threatening views from the society, their family is the only one who cherishes their endeavours and grieves their absence. The reason behind this is that women are considered as possession by men. They are to yield to men and not vice versa. But what everyone seems to forget is that women used to have a higher status than men in late II century BC (Campbell 6). Matriarchy was indeed very powerful until it crumbled. Where a struggling woman is seen undergoing transgression, Meinke, rather than bringing another reality upfront, shows an optimistic outlook towar ds harsh realities in life. The narrator of the poem advices his son to cherish life no matter the melancholy and gloominess it brings along. In his point of view, hardships are a fact of life and can not be denied. Not only will they come, but there also will be a day when the harbinger of death will arrive with â€Å"the shattered windshield and bursting shell† (Meinke) putting an end to everything earthly. Life is full of miseries and burdens which each individual has to deal with on their own. But as human beings are weak in nature, they crave for more and more ignoring what they already have as Rev. Leroy Allison said, â€Å"We spend too much time living in the ‘what if’ and

Saturday, October 5, 2019

Threat of the over use of technology ( computer ) in teaching student Research Paper

Threat of the over use of technology ( computer ) in teaching student in primary schools - Research Paper Example hnology offers a variety of benefits to enhance the quality of education and make the process of learning more convenient and interesting both for the teacher and the students, overuse of technology in teaching students in primary schools poses several kinds of threats as well. â€Å"Family, school, and workplace environments are now on the verge of what can be termed the â€Å"Triple Disconnect† – from self, others and nature† (zonein.ca, 2014). The Canadian Society of Pediatrics and the American Academy of Pediatrics state that infants between 0 and 2 years of age should not be exposed to any kind of technology at all, children from 3 to 5 years of age should not be exposed to technology for more than just one hour per day, whereas the exposure of children in the age-range of 6 to 18 years to technology should be limited to 2 hours per day (Rowan, 2014). Threats posed by the overuse of technology in primary schools include but are not limited to the social chal lenge of isolation, reduced motivation for the studies on the part of the students, and increased tendency to have negative effects of using technology on their health. Overuse of technology in the classroom can be a cause of isolation of the students. â€Å"[C]ritics have written and spoken extensively of their beliefs that schools should not use technology for a variety of reasons ranging from creating social isolation to preventing students from learning critical basic skills† (ncrel.org, 2005). Students of primary schools are essentially children. Children as students need close supervision and monitoring in order to have their attention directed solely towards the studies. With the growing literacy rate, the population of students in the primary schools has increased over the years. This has raised challenges for the school administration in general and for the teachers in particular. Teachers today have more students to supervise than they used to have in the past. However, the increased strength of

Friday, October 4, 2019

McDonald's Marketing Essay Example | Topics and Well Written Essays - 1750 words

McDonald's Marketing - Essay Example Despite these innovations, McDonald’s tremendous growth could only continue for so long. Its average annual return on equity was 25.2% between 1965 and 1991. However, the company found its sales per unit slowing between 1990 and 1991. In addition, McDonald’s share of the quick service market fell from 18.7% in 1985 to 16.6% in 1991. Growth in the quick service market was projected to keep pace with inflation in the 1990s. After a decade of struggle, by 2003 McDonald’s shares hit rock bottom. At this point a â€Å"plan to win†, marketing campaign was launched and the salad was added to the menu to combat the unhealthy image the food had attained. It backfired initially because of its high calorie content, but then McDonald became more aware of customer needs and revamped its offerings with low fat salad dressings etc. McDonald was back on its feet very soon and turned in a healthy profit in 2004. Most McDonald's restaurants offer both counter and drive-through service, with indoor and sometimes outdoor seating. The Drive-Thru, Auto-Mac, or McDrive as it is known in many countries, often has separate stations for placing orders, paying for them and picking up orders. In some countries "McDrive" locations near highways, offer no counter service or seating. In contrast, locations in high-density city neighbourhoods often omit drive-through service. Menu choice also involves variety. The emphasis is on standardized limited menu with high quality and low wait times. The menu serves typically serve different types of food products in a range of sizes.

Thursday, October 3, 2019

Greedy Based Approach for Test Data Compression Using Geometric Shapes Essay Example for Free

Greedy Based Approach for Test Data Compression Using Geometric Shapes Essay As the complexity of systems-on-a-chip continues to increase, the difficulty and cost of testing such chips is increasing rapidly. One of the challenges in testing SOC is dealing with the large size of test data that must be stored in the tester and transferred between the tester and the chip. The cost of automatic test equipment (ATE) increases significantly with the increase in their speed, channel capacity and memory. As testers have limited speed, channel bandwidth and memory, the need for test data reduction becomes imperative. This project deals with lossless compression of test vectors on the basis of geometric shapes. It consists of two phases: i) Encoding or Compression and ii) Decoding or Decompression. During the compression phase we exploit reordering of test vectors to minimize the number of shapes needed to encode the test data. The test set is partitioned into blocks and then each block is encoded separately. The encoder has the choice of encoding either the 0‘s or the 1‘s in a block. In addition, it encodes a block that contains only 0‘s (or 1‘s) and x‘s with only 3 bits. Furthermore, if the cost of encoding a block using geometric shapes is higher than the original cost of the block, the block is stored as is without encoding. We have created a new greedy based algorithm to find the shapes present in a block in minimal time. This algorithm after analysis seems to be at least 50% more efficient than the algorithm proposed by the author of the original paper which has been implemented in our program. During the decoding phase the data is read from the compressed file and decoded based on the format in which it was encoded. These phases have been implemented using software. The application gives a good compression ratio of nearly 50% under average conditions, is extremely fast and the shape extraction algorithm used provides fast extraction of shapes. To test a certain chip, the entire set of test vectors, for all the cores and components inside the chip, has to be stored in the tester memory. Then, during testing, the test data must be transferred to the chip under test and test responses collected from the chip to the tester. One of the challenges in testing SOC is dealing with the large size of test data that must be stored in the tester and transferred between the tester and the chip. The cost of automatic test equipment (ATE) increases significantly with the increase in their speed, channel capacity and memory. As testers have limited speed, channel bandwidth and memory, the need for test data reduction becomes imperative. 1. 2 Systems on a chip A system on a chip or system on chip (SoC or SOC) is an integrated circuit(IC) that integrates all components of a computer or other electronic system into a single chip. It may contain digital, analog, mixed-signal, and often radio-frequency functions—all on a single chip substrate. A typical application is in the area of embedded systems. A typical SoC consists of: †¢ A microcontroller, microprocessor or DSP core(s). Some SoCs nbsp—called multiprocessor system on chip (MPSoC)—include more than one processor core. †¢ Memory blocks including a selection of ROM, RAM, EEPROM and flash memory. †¢ Timing sources including oscillators and phase-locked loops. †¢ Peripherals including counter-timers, real-time timers and power-on reset generators. †¢ External interfaces including industry standards such as USB, FireWire, Ethernet, USART, SPI. †¢ Analog interfaces including ADCs and DACs. Department of Computer Science and Engg, TKMCE Page 4 Greedy Based Approach to Test Data Compression using Geometric Shapes Voltage regulators and power management circuits. These blocks are connected by either a proprietary or industry-standard bus such as the AMBA bus from ARM Holdings. DMA controllers route data directly between external interfaces and memory, bypassing the processor core and thereby increasing the data throughput of the SoC. Figure 1 Department of Computer Scien ce and Engg, TKMCE Page 5 Greedy Based Approach to Test Data Compression using Geometric Shapes 1. 3 Data Compression Data compression, source coding orbit-rate reduction is the process of encoding information using fewer bits than the original representation would use. Compression is useful because it helps reduce the consumption of expensive resources, such as disk space or transmission bandwidth. On the downside, compressed data must be decompressed to be used, and this extra processing may be detrimental to some applications. For instance, a compression scheme for video may require expensive hardware for the video to be decompressed fast enough to be viewed as it is being decompressed (the option of decompressing the video in full before watching it may be inconvenient, and requires storage space for the decompressed video). The design of data compression schemes therefore involves trade-offs among various factors, including the degree of compression, the amount of distortion introduced (if using a lossy compression scheme), and the computational resources required to compress and decompress the data. Several test data compression techniques were proposed in the literature. These techniques can be classified into two categories; those that require structural information of the circuit and rely on automatic test pattern generation and/or fault simulation and those that are more suitable for intellectual property (IP) cores as they operate solely on the test data. Techniques of the first approach include some of the linear decompression-based schemes and broadcastscan-based schemes. Techniques of the second approach include statistical coding, selective Huffman coding , run-length coding , mixed run-length and Huffman coding , Golomb coding , frequency-directed run-length (FDR) coding , alternating run-length coding using FDR (ALT-FDR), extended frequency-directed run-length (EFDR) coding , MTC coding , variable-input Huffman coding (VIHC) , multilevel Huffman coding , 9-coded compression , Block Merging (BM) compression and dictionary-based coding . Test compression techniques in this class can be further classified as being test independent or test dependent. Test-independent compression techniques have the advantage that the decompression circuitry is independent of the test data. Changing the test set does not require any change to the decompression circuitry. Examples of test-independent compression techniques include Golomb coding, frequency-directed run-length (FDR) coding, alternating run-length coding Department of Computer Science and Engg, TKMCE Page 6 Greedy Based Approach to Test Data Compression using Geometric Shapes using FDR (ALT-FDR) , extended frequency-directed run-length (EFDR) coding , MTC coding , 9- coded compression and Block Merging (BM) compression 1. 4 Automatic Testing Equipment Automatic or Automated Test Equipment (ATE) is any apparatus that performs tests on a device, known as the Device Under Test (DUT), using automation to quickly perform measurements and evaluate the test results. An ATE can be a simple computer controlled digital multimeter, or a complicated system containing dozens of complex test instruments (real or simulated electronic test equipment) capable of automatically testing and diagnosing faults in sophisticated electronic packaged parts or on Wafer testing, including System-OnChips and Integrated circuits. ATE is widely used in the electronic manufacturing industry to test electronic components and systems after being fabricated. ATE is also used to test avionics and the electronic modules in automobiles. It is used in military applications like radar and wireless communication. . 4. 1 ATE in the Semiconductor Industry Semiconductor ATE, named for testing semiconductor devices, can test a wide range of electronic devices and systems, from simple components (resistors, capacitors, and inductors) to integrated circuits (ICs), printed circuit boards (PCBs), and complex, completely assembled electronic systems. ATE systems are designed to reduce th e amount of Figure 1. 2 test time needed to verify that a particular device works or to quickly find its faults before the part has a chance to be used in a final consumer product. To reduce manufacturing costs and improve yield, semiconductor devices should to be tested after being fabricated to prevent even a small number of defective devices ending up with consumer. Department of Computer Science and Engg, TKMCE Page 7 Greedy Based Approach to Test Data Compression using Geometric Shapes Chapter 2 2. 1 Problem Definition As the complexity of systems-on-a-chip continues to increase, the difficulty and cost of testing such chips is increasing rapidly. To test a certain chip, the entire set of test vectors, for all the cores and components inside the chip, has to be stored in the tester memory. Then, during testing, the test data must be transferred to the chip under test and test responses collected from the chip to the tester. Our application must be able to compress the test vectors by a significant percentage and it must also be lossless. In addition to these two basic requirements the program must extract the shapes from each block in an optimal manner (here the technique to be used is a greedy approach rather than a brute force one). Moreover the test data must be sorted and partitioned before shape extraction is done. The application must also be able to correctly decompress the encoded data. In order to obtain the shapes covering the bits in as little time as possible, we have created a greedy based algorithm which works in an overall time of O(n4). The original algorithm proposed by the authors of ? Test Data Compression based on Geometric Shapes? [1] on other hand requires one O(n4) operation to identify all possible covers and another O(n4) to find the optimal among them which is a brute force approach. 2. 2 Motivation for Project One of the challenges in testing SOC is dealing with the large size of test data that must be stored in the tester and transferred between the tester and the chip. The amount of time required to test a chip depends on the size of test data that has to be transferred from the tester to the chip and the channel capacity. The cost of automatic test equipment (ATE) increases significantly with the increase in their speed, channel capacity and memory. As testers have Department of Computer Science and Engg, TKMCE Page 8 Greedy Based Approach to Test Data Compression using Geometric Shapes limited speed, channel band-width and memory, the need for test data reduction becomes imperative. 2. 3 Problem Analysis The problem can be divided into the following phases 2. 3. 1 Test Set sorting Here sorting is done on the basis of its neighbors. Also to achieve maximum compaction the first vector after sorting must contain maximum number of zeroes. 2. 3. 2 Test Set partitioning Partitioning of test vectors into blocks can be done easily. But in the case of partial blocks which appears if the number of test vectors and size of test vectors are not integral multiples of N(block is of size N*N) we can partition the block as N*N and use a mark array to indicate which bits are not to be processed. . 3. 3 Shape Extraction Here the shapes must be extracted optimally which means we have to use a greedy algorithm. This algorithm was created and works superbly. 2. 3. 4 Decoding This is only a simple matter of finding the code and based on the code of filling up the test vectors. Department of Computer Science and Engg, TKMCE Page 9 Greedy Based Approach to Test Data Compression using Geometric Shapes Chapte r 3 3. 1 Encoding Phase 3. 1. 1 Test Set Sorting 3. 1. 1. 1 Description Sorting the vectors in a test set is crucial and has a significant impact on the compression ratio. In this step, we aim at generating clusters of either 0‘s or 1‘s in such a way that it may partially or totally be fitted in one or more of the geometric shapes shown in Table 3. 2. The sorting is with respect to both 0‘s and 1‘s (0/1-sorting). The technique is based on finding the distance D between two vectors A and B that maximizes the clusters of 0‘s and 1‘s. The next vector with the highest distance to the existing vector is selected during the sorting process. The distance D may be computed with respect to 0‘s (0-distance), to 1‘s (1-distance) or to 0‘s and 1‘s (0/1-distance) as follows: here k is the test vector length and W(Ai, Bi) is the weight between bits Ai and Bi. Table 3. 1 specify the weights used in computing the 0/1-distance between two vectors. Note that for i = 0, W(Ai, Bi-1) = 0 and for i = k 1, W(Ai, Bi+1) = 0. Table 3. 1 Department of Computer Science and Engg, TKMCE Page 10 Greedy Based Approach to Tes t Data Compression using Geometric Shapes Table 3. 2 3. 1. 1. 2 Algorithm 1. Find the vector with the maximum number of zeroes and interchange with first vector 2. i? 1 3. Compare ith vector with all other vectors from i+1 and calculate the distance based on the equation 4. Exchange the vector with maximum distance with ith vector 5. If ilt;n then i? i+1 Department of Computer Science and Engg, TKMCE Page 11 Greedy Based Approach to Test Data Compression using Geometric Shapes 3. 1. 2 Test Set Partitioning 3. 1. 2. 1 Description A set of sorted test vectors, M, is represented in a matrix form, R? C, where R is the number of test vectors and C is the length of each test vector. The test set is segmented into L? K blocks each of which is N? N bits, where L is equal to R/N and K is equal to C/N. A segment consists of K blocks. In other words, the test set is segmented into L segments each containing K blocks. For test vectors whose columns and/or rows are not divisible by the predetermined block dimension N, a partial block will be produced at the right end columns and/or the bottom rows of the test data. Since the size of such partial blocks can be deduced based on the number of vectors, the vector length and the block dimension, the number of bits used to encode the coordinates of the geometric shapes can be less than log2N. 3. 1. 2. 2 Algorithm 1. Partition the test vectors into 88 blocks( partial or full) 2. If block is partial then a. Mark the rest of the bit positions as already processed Department of Computer Science and Engg, TKMCE Page 12 Greedy Based Approach to Test Data Compression using Geometric Shapes 3. 1. 3 Shape Extraction 3. 1. 3. 1 Description This algorithm was created by our group to obtain the optimal covers of the shapes in as little time as possible. In our algorithm we begin by assuming that all other points before (i,j) has been processed. This means that if any new shape exists in this block it may only begin at a point greater than or equal to (i,j). Now if we are starting from (i,j) we need to check only four points adjacent to it along with (i,j). These positions are shown Figure 3. 1. This is a direct consequence of our initial assumption. Now let us assume that a shape begins from (i,j). Since no other shape has been detected so far, (i,j) is a point. Now the algorithm checks the four adjacent points to see whether the make any other shape when taken in combination with (i,j). Since (i,j) is classified as a point, the next possible shape that can be formed is a line. There are four possiblities for this. This is shown in Figure 3. 2. Figure 3. 1 Department of Computer Science and Engg, TKMCE Page 13 Greedy Based Approach to Test Data Compression using Geometric Shapes Now if another of the adjacent points is a valid bit and if the current shape s a line,then the next figure that can be formed from 3 points is a triangle. This also has four different possiblities. This is shown by Figure 3. 3. Figure 3. 2 If the current shape is a triangle(type 4) and if another point adjacent to (i,j) is of the bit we are checking for then, the only remaining possiblity is a rectangle. This is shown by Figure 3. 4. Figure 3. 3 In orde r to avoid the possiblity of rechecking bits that have already been processed our algorithm uses a ? mark‘ matrix similar to the block of bits,except that every position other than what has already been included in a shape are marked as zeroes. Those that have been identified as belonging to a shape are marked as ones. We also insert the points that have to be processed by the algorithm in the next stage into a queue for faster processing of the rest of the shape. Department of Computer Science and Engg, TKMCE Page 14 Greedy Based Approach to Test Data Compression using Geometric Shapes Figure 3. 4 The anomalies that can occur during this approach are: ? There can be other shapes starting from the same point (i,j). Since we are performing a greedy search, the only possiblity that comes under this category are additional lines emanating from (i,j). This can be easily solved by saving the current shape as well as the newly identified line into the list of shapes. Then the algorithm performs all the above mentioned steps, i. e. marking the bits processed and inserting the points to processed later into the queue. ? Another problem related with this simple approach is that the type 1 traingle may recognized as a rectangle and a few lines if its size is greater than one. This can be avoided by computing the length of the side of square that may contain the triangle(if it exists ) and the length of both the diagonals. If the length of a side is the same as that of a diagonal then its indeed a traingle or a square. To distinguish between these we check whether the length of both diagonals are same. If they are not, then the shape is a triangle,otherwise it‘s a rectangle. The reason these anomalies needs to be carefully implemented is that anomaly 2 can increase the computational complexity of our oerall algorithm significantly if its to be solved. Once the shapes have been detected for what they are we process only those positions that may be a continuation of the shape are processed. Also the proceesing of these bits are only done in the direction of interest(for example, in the case of say type 1 line the only possible extension of the shape occurs in the downward direction and hence this is the only direction processed). This means that not all of the four adjacent positions need to be checked during further processing, which in turn reduces complexity. Department of Computer Science and Engg, TKMCE Page 15 Greedy Based Approach to Test Data Compression using Geometric Shapes Once a shape has been completely detected, which begins from (i,j), we start the processing of the next bit at position (i,j+1) or (i+1,1). This is necessary so as to ensure that we do not miss any shapes during proceesing. Department of Computer Science and Engg, TKMCE Page 16 Greedy Based Approach to Test Data Compression using Geometric Shapes 3. 1. 3. 2 Algorithm Department of Computer Science and Engg, TKMCE Page 17 Greedy Based Approach to Test Data Compression using Geometric Shapes 3. 1. 3. 3 Complexity Analysis As we have seen the algorithm needs 3 loops. Out of this two is used to traverse the entire block. This gives us an outer loop complexity of O(n2). Then the third loop is always executed 4 times in order to check neighboring points. The actual detection of shapes is only a matter of addition of indices to (i,j) and checking to see whether they satisfy any of the conditions of the algorithm. Addition is done in constant time. Now although the detection of the kernel of shapes can be done in a constant time we need to spend some additional time in the case of anomaly 2. As mentioned earlier this can be solved by finding the length of the sides of the square containing it and the length of both the diagonals of the square. Also this must be the square that may contain the whole triangle. This means that in the worst case the lengths may be of size n. This gives us the complexity for this step to be 4O(n). The further processing of shapes that has been detected is done using a queue. The maximum number of times the queue can be executed is O(n2). This because there are at most that many bits in a block. Therefore the overall complexity for shape detection is O(n2) x4x(4O(n) + O(n2))=O(4n3 + n4)=O(n4). Now in average cases the queue will not need to contain the entire block, as the block can be assumed to be comprised of equal parts required and unrequired bits. This means that in the average case, shape extraction process predominates and average case complexity becomes O(n3). This is much better than a brute force approach to shape extraction. Even in the worst case our algorithm performs better as we do not need to perform a covering step to find the most optimal covers for the shapes detected. This would have taken another O(n4) which we avoid by directly using a greedy approach. Department of Computer Science and Engg, TKMCE Page 18 Greedy Based Approach to Test Data Compression using Geometric Shapes 3. 1. 4 Encoding 3. 1. 4. 1 Description The encoding process will be applied on each block independently. The procedure Extract_Shapes(b) will find the best group of shapes that cover the bits that are equal to b as shown in the algorithm. Encode_Shapes determines the number of bits, a, needed to encode this group of shapes. There are two cases that may occur: a) The block contains either 0‘s and X‘s or 1‘s and X‘s. In this case, the block can be encoded as a rectangle. However, instead of encoding it as a rectangle, it is encoded by the code 01‘‘ (indicating that the block can be filled by either 0‘s or 1‘s) followed by the bit that fills the block. Hence, the number of bits to encode the block a = 3. We call such blocks filled blocks. ) The block needs to be encoded by a number of shapes. We call such a block encoded block. In this case, we need the following: ? 2 bits to indicate the existence of shapes and the type of bit encoded. If the encoded bit is 0, then the code is 10, otherwise it is 11. ? P = 2 ? log 2 N ? 3 Bits to encode the number of shapes, S. If the number of shapes exceeds 2P, then the number of bits needed to encode the shapes is certainly greater than the total number of bits in the block. In this case, the block is not encoded and the original test data is stored. 3. 1. 4. 2 Algorithm 1. While there are shapes to be encoded a. Find shape and type of shape b. Find x,y coordinates of shape c. If shape has a length parameter calculate its value d. Depending on shape and type encode the parameters as per table 2. 2 Department of Computer Science and Engg, TKMCE Page 19 Greedy Based Approach to Test Data Compression using Geometric Shapes 3. 2 Decoding Phase 3. 2. 1 Description The pseudo-code of the decoding algorithm is given below. It first reads the arguments given by the encoder and computes the parameters needed for the decoding process. These parameters include the number of segments, the number of blocks in a segment and the dimensions of the partial blocks. For each segment, its blocks are decoded one at a time. The first two bits indicate the status of the block as follows: ? ? ? ? 00: the block is not encoded and the following N*N bits are the original test data. 01: fill the whole block with either 0‘s or 1‘s depending on the following bit. 10: There are shapes that are filled with 0‘s. 11: There are shapes that are filled with 1‘s. For those blocks that have shapes, the procedure Decode_Shapes is responsible for decoding those shapes. It reads the number of shapes in the block and then for each shape it reads its type and based on this it reads its parameters and fills it accordingly. Based on the arguments read first, the decoder can determine the number of bits needed for each variable (e. g. the coordinates and the distances). These are used for the partial blocks when only one block of each segment remains and when the last segment is being decoded. Department of Computer Science and Engg, TKMCE Page 20 Greedy Based Approach to Test Data Compression using Geometric Shapes 3. 2. 2 Algorithm Department of Computer Science and Engg, TKMCE Page 21 Greedy Based Approach to Test Data Compression using Geometric Shapes Chapter 4 4. 1 Language Specification The above project has been implemented in C/C++. This is because C/C++ is a language very well suited for bit level manipulations and provides other features which can be easily implemented using hardware directly. Another consideration that is of paramount importance here is the degree by which C/C++ lends itself to system level programming. The key considerations can be summed up as: ? ? ? ? ? ? Simple Very High Speed Very close to assembly language Can be used to directly implement application using hardware Bit level manipulations are possible Dynamic . 2 Hardware Specification CPU RAM Main Storage Medium Monitor : Pentium II or above : 4 MB : 1 GB HDD : Standard VGA 4. 3 Software Specification Operating System Design Tools : DOS : C/C++ Department of Computer Science and Engg, TKMCE Page 22 Greedy Based Approach to Test Data Compression using Geometric Shapes Chapter 5 5. 1 Application One of the challenges in testing SOC is dealing with the large size of test data that must be stored in the tester and transferred between the tester and the chip. The amount of time required to test a chip depends on the size of test data that has to be transferred from the tester to the chip and the channel capacity. The cost of automatic test equipment (ATE) increases significantly with the increase in their speed, channel capacity and memory. As testers have limited speed, channel band-width and memory, the need for test data reduction becomes imperative. To achieve such reduction, several test compaction and lossless compression schemes were proposed in the literature. The objective of test set compaction is to generate the minimum number of test vectors that achieve the desired fault coverage. The advantage of test compaction techniques is that they reduce the number of test vectors that need to be applied to the circuit under test while preserving the fault coverage. This results in reducing the required test application time. Department of Computer Science and Engg, TKMCE Page 23 Greedy Based Approach to Test Data Compression using Geometric Shapes CONCLUSION In order to check the effective compression ratio produced by the application several different test sets were taken and the algorithm was applied. The test vectors were sorted to maximize the compression. In this work, test vectors were sorted based on a greedy algorithm. Test vectors sorting based on the 0/1-distance was performed. For 0/1-distance sorting, the test vector with more 0‘s was selected as the first vector. The compression ratio is computed as: In the case of large vectors with only sparsely populated positions the application was found to produce very high compression ratio. In the average cases the compression ratio was nearly 50%.