Thursday, October 31, 2019

Literature Review Essay Example | Topics and Well Written Essays - 4000 words

Literature Review - Essay Example Kundera shows himself both as a talented historian and psychologist. In well-structured, enchanting manner Kundera entraps his readers in the worlds of his novels. His creative works is a sign of ideological struggle of Czech intellectuals in the age of Stalinism. Kundera was a Communist himself when this ideology was born, but very soon he was expulsed from the Party and his career was threatened because of his innocent joke. From that moment Kundera in his novels used jokes, irony and sarcasm in order to show how innocent trifle can ruin lives. This research paper is focused on his two novels â€Å"The Joke† and â€Å"The Book of Laughter and Forgetting†. On the examples of these two works a transformation of Kundera from a scrutinizer of the past to a sarcastic mocker of the past is shown. Dualistic manner of Kundera’s writing is shown as a basis for his novels. Thus the writer talks about the past and the present; he shows realistic and nonrealistic main characters; depicts the gap between heroes’ beliefs and realities etc. His manner of writing is bipolar; in such a way Kundera supposedly wants to show the ambiguity of human lives. This ambiguity was well-discerned on the example of the age of Stalinism. People had to think and act in one way in their daily life, but in their conscious, hearts and souls they lived other lives. Destructive force of Stalinism is shown on the examples of Kundera’s main characters of these two main novels. Ludvik, Helena, Mirek, Tamina and others were destructed by the huge ‘Communist slaughter’. In order to assess their essence, analyze their past, these characters wander between self-analysis and revenge, between accusing them and the history of their lost lives. In these tragic turbulences echoes a destiny of Kundera. Therefore while reading these two novels it is possible to reveal the curtain of mysterious genius of

Tuesday, October 29, 2019

Air Asia Essay Example for Free

Air Asia Essay A. Late Submission A 10% deduction per day of total coursework marks (excluding weekends and public holidays). Late submission between 5 to 10 days, results in a 50% deduction of total coursework marks. Late submission past 10 days results in an automatic 0% for coursework and the student will be barred from the final examination. B. Deliverables Students must submit all materials supporting their coursework listed in the deliverable section. The coursework must be done individually and must be entirely your own work. Please make sure that you are aware of the rules concerning plagiarism. If you are unclear about them, please consult your program coordinator/lecturer. The coursework should exhibit formal research skills i. e. with a table of content, proper citations, references, and appendices. The coursework write up must be able to demonstrate critical analysis and application of both theory and practical issues to the company that you have selected. Student may include additional relevant data/information apart from the proposed guidelines in conjunction to your research. Additional marks will be awarded for such attempt. A CD containing the softcopy version of your coursework should be submitted as well (if required). BACHELOR OF BUSINESS MANAGEMENT (HONS) BACHELOR OF ACCOUNTING (HONS) COURSEWORK QUESTIONS Choose one of the strategic change and management framework highlighted below and critically analyze and evaluate with supporting examples. PEST Analysis Porter’s 5 Forces Porter’s Value Chain Your report should attempt the following tasks: a) Discussion of the principles underlying the framework. b) A critical evaluation on the application of the framework in actual business context. c) Relating the framework to an organization of your choice. Your report should include: Cover Page Grading Scheme Executive Summary Table of Content Questions (a) (c) List of References/Bibliography Appendices (if relevant) BACHELOR OF BUSINESS MANAGEMENT (HONS) Guidelines (1) Your mark in this coursework will carry a 25% weight in the assessment of your overall performance in this module. (2) You will be working on this coursework individually. (3) The assignment will be in a report format of not more than 1,500 words. (4) Appropriate APA referencing system will be employed where applicable. (5) Your assignment should be type written, 1 ? line spaced, font 12 Times New Roman and justify aligned. Please staple and do not comb bind. (6) Please provide an executive summary, table of content, page number, proper heading title for each part answered and references. (7) Use an appropriate cover sheet. (8) Please attach a copy of the grading scheme at the front of your coursework (after the Cover Page) during submission. (9) The assignment will be submitted on 25th October 2012 (Thursday) in class. Assignment of Grades for Written Work Written assignments will be graded according to the following distribution: 70%: Content (thoroughness of preparation, information, and content) 20%: Style (grammar, writing quality, clarity of writing at the sentence level) 10%: Presentation (organization, clarity of writing at the paper level) What this means in practice is that if you do the work, but dont organize your thoughts or write clearly, you will end with at most a B. However, you will not be given full credit for content if the lecturer cannot understand what youre saying, so if you dont write clearly, you will probably end up losing points on content as well. BACHELOR OF BUSINESS MANAGEMENT (HONS) Academic Dishonesty As stated in the faculty Handbook, cheating, including plagiarism will not be tolerated. All written work, including paper summaries, must be your own work. If you wish to quote a source, you must do so explicitly, and with proper attribution. Any work that does not meet the requirements set out above will be treated as a violation of the academic honesty policy for the class, and dealt with accordingly.

Sunday, October 27, 2019

Conveyor Based Sorting System: Overview Detection Approach

Conveyor Based Sorting System: Overview Detection Approach Abstract: When the objects move on the conveyor belt, they fall into the receptacle at the end of the belt. Once the bin is filled the conveyor belt must stop in order not to overfill the bin. To make this possible we could use some sensors in the receptacle and link the belt and the weighing scale (on which the bin is placed) through programming so that when the receptacle reaches to certain weight the belt automatically stops. Some of the weighing sensors and level detectors are discussed in this report to reach a conclusion to decide the right method of approach to stop the overflowing of objects into the bin. Weight measuring sensors: There are various types of sensors used in measuring the weight of objects with different sizes and shapes. Strain gauges, load cells (of different types and shapes) and force sensors are some of the measuring sensors which are used in electronically weight measuring equipment. These sensors are installed in devices that measures the changes of force applied on them or the change of pressure on the particular spot of object or even the tension of the object. Our aim is to choose an approach for an overflow detection system when at the end of conveyor belt, the coloured objects are collected in a large bin. That is placed on the weighing device which accurately measures the weight of the bin/receptacle with the objects, and once its filled the conveyor belt/PLC stops and prevents the bins from overflowing. In this concept, to measure the weight, we could use different sensors like load cells of different types and strain gauges. 1.  Strain gauges: It is a device with varying resistance when certain amount of force or pressure, tension and weight is applied. It also converts them into measurable electrical resistance. This is the reason most of the load cells and electronically weight measuring scales are based on this strain gauge principle. Strain is a physical property of a material when it undergoes external displacement or deformation. Thus, this types of sensors can be used to measure both expansion and contraction. Strain gauge model The image1 above shows a typical metal-foil strain gauge which is widely available in the market. Strain gauges are mounted or glued to the surface of a solid material and when the material is compressed or stretched, the electrical resistance increases or decreases respectively. Generally, a Wheatstone bridge is used to change the varying resistance into varying voltage as the change in resistance is relatively small when using strain gauges to measure the weight of an object. Still, the output analogue signals are amplified further as this output signals from the Wheatstone bridge is still smaller when compared to the PLC in the design which is expected to be around 0 to 10V. The picture below shows the typical circuit of a strain gauge connected to the Wheatstone bridge (also known as Quarter bridge strain gauge circuit). The resulting output voltage is always a millivolt unit. Depending on the use of whole structure, the number of strain gauges connected to the Wheatstone bridge varies. Lets assume that, the weighing device below the receptacle/bin is fitted with the strain gauge, then every time an object falls into the bin causes a change in the tension in the gauge resulting a change in resistance. The picture2 below shows the typical assembly of strain gauge and Wheatstone bridge. The output voltage is normally measured using a voltmeter connected in circuit but can also be calculated using the following equation, The receptacle is assumed to be placed on the weighing scale which tends to be wider and a bit spacious which makes, using a single strain gauge to cover the whole space is not ideal. To improve the accuracy, we could use more than one strain gauge to cover the space on weighing scale. Advantages of strain gauge: Using strain gauges in the design have some pros and cons. Some of the advantages include, In a strain gauge, there are no moving parts but only a strip It is very small and easy to use on a piece of solid object When it comes to cost, its very inexpensive and easily available In our design, using more than one strain gauge to cover the weighing scale improves the accuracy. Disadvantages of strain gauge: The strain gauges need to be calibrated for it to work per desired design Overloading can be a problem; the strain gauges measure the stress on the scale in micro strain. Therefore, if the bin is slightly overfilled or even the load in it is beyond the limit then the results may be degraded. Just for a reference the limit normally be  ±3000 micro strain. If the wires of the get wet or not protected against humidity, the resulting electrical resistance might lead to parasitic results. If the design was to be open and wires are exposed to spillage which may cause errors in the result. 2.  Load cells: A load cell is a device which uses one or more strain gauges in its design to measure the force applied on the surface and change it into an electrical signal. Load cells can be in various types like hydraulic, pneumatic load cells, piezoelectric and capacitive load cells. Since it uses more strain gauges in the design which increases the accuracy of the model. Generally, Copper (Cu) and Nickel (Ni) alloys are used in the construction of the strain gauge load cells. When the length changes in the electrical conductor due to the stress applied on the free end, the resistance of electrical conductor also changes. in strain gauge load cells, use of Cu and Ni in this model is beneficial as the applied strain is virtually proportional to the change in resistance. This change in resistance is used to measure the strain applied if its connected to appropriate measuring circuit. This is a model image3 of a binocular beam strain gauge load cell which is more than one strain gauge and when theres stress applied on the free end, stretch in the gauge causes change in electrical resistance and thus the weight of the bin is measured. Hydraulic load cells are also known as force balance devices, one of the types of load cells which measures the weight of an object as pressure changes in internal filling fluid. As the force or pressure changes on the loading surface, pressure of the fluid inside the cell is also increases. The image4 above is a simple design of hydraulic load cell with the hydraulic fluid inside. Advantages of load cells Some of the advantages and disadvantages of the load cells are discussed below. It comes in various shapes and sizes like rugged shape and its in compact construction Load cells doesnt have any moving parts inside the structural design Since they have wide surface area which also has wide range of measurement Since our design (assumed concept) has a static weighing machine below the receptacle, load cells can be used and they also be used in dynamic loading Load cells are highly accurate since the loading surface is solid and wide area which covers the loading surface of the weighing machine. Disadvantages of load cells Compared to the strain gauges, load cells are solid and larger in size and shape As they have a solid structure and of different shapes, it may be hard to mount on any surface Just like a strain gauge model, calibration with these load cells is also essential in the process of measuring the weight of the objects fall into the receptacle They are slightly expensive and a very costly signal conditioning 3.Force sensor resistor: Force sensor resistor which is also known as force sensitive resistor (FSR), is a resistor material where the resistance changes whenever the force or pressure changes on the surface. When compared to the strain gauges and load cells, FSR measures the compressing force or weight differently by directly correlating the strain of the beam to the applied force on the surface. Piezo-resistive force sensor is one of these types of force sensors. It is a strip of layers with different form of inks which can detect the applied force or stress on the material where the strip is attached to. The image5 blow shows the simple construction of a special FSR called Piezo resistive force sensor. Every time each object falls into the receptacle or bin, the force is applied on the surface of the weighing scale which then compresses two layers of pressure sensitive ink within the flexible and adhesive substrate layers in the sensor. This pressure creates the tension in the layers converts them into electrical signals which then can be calibrated just like the load cells with the help of programming with engineering force units. This is an image6 of a Round Force Sensitive Resistor (Model: Interlink 402 with  ½ the diameter sensing region from the measuring surface). Advantages of Force resistive sensor FSR are generally very small and thin (about 0.2mm) and very flexible in construction which allows them for unobtrusive measurements to be taken in practical application These types of sensors are programable and customizable per the specification of the design concept These sensors are very cost effective and readily available in the market They are also inexpensive in programming or signal conditioning in electronics They only consume very low power and its light weight as its very thin in structure Disadvantages In measuring weight or pressure applied these sensors are very inaccurate with the results like  ±5% of full scale than a load cell They are calibrated by us, the users, which can lead to manual errors whereas load cells are programmed by the manufacturers if ordered directly Different approach than programming: Level detectors: Other than using just weight sensors to detect the weight of the receptacle and stop the overflow when the objects are filled, we could also use some level detectors at the top of the bin to detect whether the objects have reached the top while the object fall into the bin from the conveyor belt. For an effective way of stopping the overflow, mix use of both level detectors and weight sensors would improve the accuracy to stop the overflow. A typical level detector is used to detect once the material is at the determined point within the receptacle which is also known as Point Level Sensor (PLS). These sensors can be used to detect the levels of the objects at high, low and intermediate levels of the bin. These also must be programmed or calibrated to the desired level in the bin for the accurate results. Image7 below shows the typical model of Rod pointing level sensor which can be used to measure the liquid, slurry materials, powders or solid objects levels in a vessel. This sensor has a self-built alarm and LED indicator which can be activated when the objects in the vessel reaches the desired indication point. It has no moving parts in the assembly and since its simple design which makes it easily mountable on any part of the receptacle to our desired level. This image8 shows the ways of mounting the sensors in various levels of the bin. Conclusion: Weighing scale and conveyor belt are linked through the program so that when the receptacle is filled and desired weight is reached, which then signals the conveyor belt to stop filling the bins. This is the assumed concept for which we were using weighting sensors to detect the weight of the bin and stop overflowing. For this we cant just use programming to stop the overflow we would also need some additional sensor to detect the weight or the maximum level that the objects can reach. Therefore, to achieve the higher accuracy we could use both level detecting sensors and weighing sensors in the concept to stop the overflow of objects. Load cells are preferable means of sensing the weight of the receptacle to stop the overflow. Load cells are the sensors with the solid base where more than one strain gauges are mounted which improves the accuracy of measuring the weight of the bin. If we use strain gauges to measure the weight, we would be using more and more strain gauges to cover the wide area where the bin is placed. This could increase the cost of the project and using more gauges may result to find the average value between them to detect the weight which not be accurate. Using more strain gauges may also result in massive circuits and lots of wires hanging all over the places. So, if theres any faults in the circuits, it may be hard to find it. Load cells are the right choice since they have no moving parts in them which makes them more easily mounted under the receptacles. Use of both load cells and Level detectors in the design may benefit the approach to stop the overflow of the objects from the receptacle. References: Appmeas.co.uk. (2017). Load Cells | Force Sensors | Force Transducers | Load Measurement. [online] Available at: http://www.appmeas.co.uk/load-cells-and-force-sensors.html?gclid=CLSe34mxzNICFQsR0wodQu8Nmw [Accessed 12 Mar. 2017]. Binocular load cell. (2017). [image] Available at: http://www.instrumentationengineers.org/2013/07/load-cell-working-types-advantages-and.html [Accessed 10 Mar. 2017]. En.wikipedia.org. (2017). Wheatstone bridge. [online] Available at: https://en.wikipedia.org/wiki/Wheatstone_bridge [Accessed 12 Mar. 2017]. Force sensor Construction. (2017). [image] Available at: https://www.tekscan.com/resources/ebook/load-cell-vs-force-sensor [Accessed 12 Mar. 2017]. Hydraulic load cell model. (2017). [image] Available at: http://www.instrumentationengineers.org/2013/07/load-cell-working-types-advantages-and.html [Accessed 10 Mar. 2017]. Level detector. (2017). [image] Available at: http://www.blueleveltechnologies.com/products/modelVHS.html [Accessed 12 Mar. 2017]. Round FSR model 402. (2017). [image] Available at: https://www.adafruit.com/product/166 [Accessed 12 Mar. 2017]. Strain gauge. (2017). [image] Available at: https://www.slideshare.net/mac899/strain-gauge-23842407 [Accessed 9 Mar. 2017]. Tekscan. (2017). Load Cell Vs. Force Sensor. [online] Available at: https://www.tekscan.com/resources/ebook/load-cell-vs-force-sensor [Accessed 12 Mar. 2017]. Us, C. (2017). Load cell working, types advantages and disadvantages. [online] Instrumentation Engineering. Available at: http://www.instrumentationengineers.org/2013/07/load-cell-working-types-advantages-and.html [Accessed 12 Mar. 2017].

Friday, October 25, 2019

GMO Foods :: Science Agriculture Papers

GMO Foods A great deal of controversy has arisen with the advent of Genetically Modified Organisms (GMOs), especially surrounding the production, sale, and consumption of genetically modified foods. Many people are concerned, if not convinced, that the consumption of GMO foods by human beings may pose serious health risks. The concern is centered around the notion that there could potentially be various different unforeseen consequences due to the consumption of GMO foods. In addressing potential side effects and byproducts of the creation of transgenic foods, such as potential toxicity and allergenicity, it was found that the possibility and probability of these side effects are being regularly assessed and precautions are being taken to detect and avoid them. Horizontal Gene Transfer (HGT) was also taken into consideration and though it is indeed possible that gene transfer of the genetically modified (GM) gene into the DNA of mammalian cells could occur, it would not have any persisten t or negative effect on the recipient. HGT into microorganisms might be a concern if antibiotic resistance was conveyed to the recipient but in light of this fact resistance to key antibiotics is not used in the creation of GMOs. Therefore, the overall potential of GM foods to have negative effects on human health due to the aforementioned phenomena is negligible. Introduction The commercial production and consumption of Genetically Modified (GM) foods is perceived by many to be a novel technology that has been poorly evaluated and could potentially be harmful to humans. Though these foods seem very new, the first regulatory approval of GM crops occurred in 1995 (A. Konig et al., 2004). It was in the mid-1980s that the Organization for Economic Co-operation and Development and the US Office of Science and Technology Policy were working to assess the safety and need for regulation of GM crops and any other foods produced using GM crops. That puts us back at least twenty years from today in our ongoing scrutiny of the safety of GM foods.

Thursday, October 24, 2019

Critique for generation velcro Essay

Summary for â€Å"Denaturalizing ‘Natural’ Disasters: Haiti’s Earthquake and the Humanitarian Impulse from p.264 to p.268 in â€Å"Become an Active Reader† by Andrew D. Pinto, On 12 January 2010, at 16:53 local time, Haiti experienced a catastrophic magnitude-7.0 earthquake 25 kilometres west of the capital, Port-au-Prince. More than 220,000 people died and 2.3 million were displaced, while the magnitude-8.0 earthquake that struck Chile on 27 February 2010 resulted in fewer than 800 deaths, despite its higher magnitude. Why was Haiti’s experience so different? Most commentators have pointed to physical factors. However, although many have noted Haiti’s poverty and internal strife, only a few commentators have identified these as key determinants of the level of devastation caused by the earthquake. Even fewer have suggested looking at the historical record or where Haiti stands in the current world order for an explanation. What is considered â€Å"natural†, in the context of disasters such as Haiti’s, is seen as independent of human actions. Any analysis of such events must â€Å"denaturalize† them by examining the historic, political and economic contexts within which they occur. Without this, the humanitarian impulse informing international efforts to support Haiti’s recovery and development may serve to merely reinforce the historic relationship between wealthy countries and Haiti and may fuel continued underdevelopment. Knowledge of Haiti’s history is integral to an informed understanding of the earthquake and its outcome. Soon after Spanish colonized the island, native people vanished because of imported disease, malnutrition and maltreatment. Plantation of sugar cane became fields of misery for tens of thousands of trafficked African slaves, while Spain and France reaped the profits. The French Revolution triggered Haiti’s independence in 1804, which was the first example of slaves winning nationhood by their own resistance. However, with its economy ruined by revolutionary war, Haiti was forced to agree to unfair trading relationships with nations that refused to recognize its sovereignty. Throughout the 19th century, France, USA, German and Britain invade Haiti to deprive its national coffer. Foreign interference and political destabilization have continually undermined governance in Haiti. For example, USA enabled Haiti to pass the constitution that allows foreign ownership of lan d, and helped to emerge dictators such as â€Å"PaPa Doc† Duvalier and his son â€Å"Baby Doc† one after another. Western countries  supported them during â€Å"Cold War† ostensibly to fight against communism but also to support the interest of foreign companies who benefited from low-cost Haitian labour. Jean-Bertrand Aristide who was supported by the poor and working class was elected as the president in 1990 and 2000, but he was removed in a coup twice, because his popular reforms threatened the status quo of Haiti’s oligarchies and foreign interests. External forces played a role in both coups, leaving Haiti’s political health tenuous ever since. With this historical background in mind, one can examine the response of the global community to the 2010 earthquake. The immediate response by the international community succeeded in many ways. As a result of humanitarian impulse, no major epidemics have yet occurred in any of the camp but cholera. However, some aspects of the post-earthquake response have been problematic. Focus on the immediate humanitarian response appear s to have prevented a consideration of how the ground work for future development could be laid. At the time of publishing, the vast majority of those displaced are still living in tents or other temporary structures and over 95% of the rubble has yet to be cleared. The provision of the essential social services by the Haitian government is unlikely in the near future. The humanitarian impulse is too often fitful and fragmented. Furthermore, the involvement of high-income countries in the root causes of the devastation caused by â€Å"natural† disasters in low-income countries is rarely examined. So actual histories should replace the more palatable fictional histories that attempt to explain away wealthy nations’ past contributions to the persistent poverty in the world. Acknowledging actual histories may have little impact on the technical details of the initial emergency response, but it may make a difference in how relief efforts are subsequently carried out, particularly in the long-run. Appeals for funds can be combined with educational initiatives to explain to policymakers and the public why an event has occurred and how it relates to social, economic and political forces. Acknowledging the actual histories that have led to Haiti’s underdevelopment would require wealthy nations to probe their own political, social and economic involvement in Haiti’s underdevelopment. Although a laudable humanitarian impulse has driven relief efforts in Haiti, it alone is insufficient for the task of rebuilding the nation. In numerous countries where humanitarians operates including Haiti, respecting history  and seeing the connection between historic actions and present conditions is essential.

Wednesday, October 23, 2019

Project Proposal on an Internet Cafe

1. Executive Summary Cheetahs’ Internet cafe With fast appreciation of technology amongst the people of Zimbabwe, an insatiable need for access to internet has spread out across all societies in Zimbabwe. This has seen mushrooming of internet cafes in different parts of the nation. It is this mismatch between vast demand for internet services and few players in the market that has attracted me into seeking lines of credit in order to fill in the gap.Researches have arrived at a conclusion that implies that existing internet cafes are providing shoddy services; hence it is the prerogative of Cheetahs Internet cafe to provide quality services that clients deserve. To complement this, the cafe will provide, in addition to internet surfing, photocopying, printing, typing, laminating, scanning, graphic designs and software installations to make it a one stop shop. 1. 1 Objectives †¢Attain consistent profitability, thus laying the basis for sustainability. Create access to the information, learning opportunities, and communications media of the Internet, within the host community. †¢Grow community members’ familiarity with abstract computing and Internet concepts. †¢Give community members the opportunity to self-teach specialized skills such as academic research techniques, email and instant messaging, and usage of word processor and spreadsheet software. †¢Create a physical space for future development projects in the community. †¢Enrich communication between residents of Bulawayo and the South African diaspora by delivering access to affordable voice calls through Skype services. Generate sufficient revenue to allow physical expansion, offering the potential to replicate the same development objectives in surrounding areas. 1. 2Keys to success The internet cafe will be a great success because there are very few internet cafes which provide a one-stop shop,(exact number remains unknown) in the area and therefore the Cheetahs Ca fe will have its own monopoly as far as provision of high profile service is concerned. 1. 3 Missions The mission of our internet-cafe is to make the internet available to a greater population.In such a way that people will have access to all the sources which can be found on the internet. Thereby the cafe is supposed to be a place where people of all ages will come to enjoy the unique, upscale, educational, and innovative environment that the internet-cafe provides. 1. 4 Risks The main risks in establishing any business at all is always the demand. Will there be enough demand for my product, will there be enough interest in it? Won't we go bankrupt due to lack of interest? These risks are also present in the soon to come internet cafe, the population may not be interested in spending money to go online.Also, will the popularity of the internet sustain, in order for the people to maintain their interests in the internet and the internet cafe. And foremost, will there be a profit? 2 Company The internet-cafe which will be realized will offer the community of Bulawayo easy and affordable access to the internet. The internet-cafe will appeal to individuals of all ages and backgrounds. The instructional internet classes, and the staff that the internet-cafe provides, will appeal to the audience that does not associate themselves with the computer age.This educational aspect will attract younger and elderly members of the community who are rapidly gaining interest in the unique resources that online communications have to offer. 2. 1 Company Ownership The company will be registered as a Private corporation, which requires a minimum of 3 directors and a maximum of 20. A colleague of mine, Farai Mazanhi who has a photocopier and a Printer will be the second Director after me and Prince Hwenjere who has the technical knowhow of running a cafe will be the third Director. 2. 2 Start-up Summary The projected initial (start-up) cash outflows: Cash outflow from purchasing equipment Desktops @ $400 each. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Till operating computer set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Furniture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Commercial Printer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Photocopier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Commercial scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cash outflow from auxiliary services Software installations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Internet installations and router. . . . . . . . . . . . . . . . . . . . . . . . . . . Stationery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Labor for setting up the shop. . . . . . . . . . . . . . . . . . . . . . . . . . . . Air conditioner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Marketing material. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cash outflow from compliance Company registrations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Leasing premises. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Total cash outflow required to start the project. . . . . . . . . . . . $ 3 200 400 600 120 2 800 100 50 1 200 50 300 800 500 150 1 500 $ 7 220 2 900 1 650 11 770 2. 3 Company Locations and Facilities The site where the internet-cafe will be located was already decided before the making of this business plan. The location will be along Main street, Bulawayo CDB, between Stanbic bank and CBZ bank, Opposite Barclays bank. Currently the premises are leased to â€Å"The Bed shop† which is running a notice of 3 months from October, which makes it up to December.Communications have already been done with the lessor and our application has be en considered. A small space which fits office desk and a chair has been secured for a Commissioner of Oaths to sub-lease from at a noble monthly rental $100. Other than providing a subsidy to our monthly lease payments, Commissioner of Oaths will blend into our quest to provide a one-stop-shop. 3. Services Ultimately the internet-cafe will grant the customers access to the internet and World Wide Web. Other secondary services will include scanning, photocopying, typing, commissioner of oaths, printing and graphic designs . 1 Competitive comparison The direct competitors within the sphere of influence for Cheetahs cafe is Twitters cafe located at Bulawayo centre and Kwiknet, corner 5th and Main Street. Cheetahs’ cafe will have a better competitive leverage because it has â€Å"All services under one roof†. 3. 2 Service description The internet-cafe will provide its customers with full access to the Internet and common computer software and hardware. Some of the Interne t and computing services available to the future internet-cafe customers are listed below: – Access to external email accounts. – Photocopying – Scanning. Access to printing. – Typing services and graphic designs. . 3. 3 Fulfilment The internet-cafe will obtain its computer hardware from local stores which can be found in or around Bulawayo, particular interest has been in First Pack. The installation of the internet will also be provided by the local resources and consideration has been granted to Liquid Communications. 3. 4 Technology The internet-cafe will be providing its customers with computers which will be up to date with today’s system requirements. Hp is the suggested brand for computers, scanner and Printer, Minolta is the brand for a photocopier.The computers will be able to provide the customers with a variety of application to serve their needs. These applications will mainly be the mainly used ones which everyone will be familiar wit h such as Microsoft Office. 3. 5 Future services In the future the internet-cafe will be able to expand or improve its services. When expanding the needed amount of hardware should be purchased however what should be kept in mind is how far the internet cafe will be able to expand. The location may not be big enough to provide an excessive expansion of hardware.The improvement of service however could be made possible by providing the customer with additional services. A drink- and/or snack machine could be purchased for satisfying the customer, which would attract more customers and which could make the current customers stay longer. Under consideration is also provision of services such as games and wireless internet services. 3. 6 Market segmentation Since our internet cafe is situated in the CBD of Bulawayo, The most preferred sector that Cheetahs cafe intend to serve is the working class. The cafe will take advantage of the offices and banks surrounding the cafe. . Strategy and Implementation Summary 4. 1 Attracting customers To attract the intended customers the internet-cafe will use the budget allocation of $500 to suspend a big metal banner at the upper front of the entry. Posters will cheaply using internal resources and abilities of the shop assistants to cut on costs. These posters could be placed around places where the adolescents would mainly be present such as Bulawayo centre, supermarkets, movie house and strategic streets. Places like game-halls and sports clubs would be perfect for advertising.Another way of attracting the customer is to advertise in the local newspaper. By advertising in the local newspaper the households would get notice of the new internet-cafe. This would result in attracting the parents of the adolescents and the middle-aged inhabitants of Bulawayo residents who frequent town. These ways of advertising will be stopped after two years. This is because over such a period of time most inhabitants will have noticed the inte rnet cafe and/or heard about it. 4. 2 SWOT analysis This section will focus on the SWOT analysis.The SWOT analysis is a strategic planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. SWOT is an abbreviation for: Strength, Weakness, Opportunity and Threats. Strengths The strength that the internet-cafe will have is its dominant position in the local internet availability, strategic location and one-stop shop facility. Secondly, the internet-cafe should have strength in staying up-to-date with the latest computer software. By keeping the hardware updated with the needed software the customers will enjoy working with the computers.Staying updated with the newest software is also a cheap ‘investment’ which again would benefit to the success of the internet-cafe Weaknesses Besides the strengths each company/business has its weaknesses. Weakness can lead to a decrease of a company's success and development. The weakness of an internet-cafe in general is the risk of virus infection and uneven availability of internet. Staying updated with the latest hardware is not only an expensive investment it is an investment which does not sincerely pays off its prices immediately. Over a period of years such an investment should be needed however it remains expensive.Opportunities As any other organization an internet-cafe has its opportunities. Having certain opportunities offers an organization a possibility to expand their turnover. An opportunity of an internet-cafe is that the global population which is requiring access to the World Wide Web is slowly increasing. This increase of internet users should offer the internet-cafe a chance to expand the business. Another opportunity from which the internet-cafe might benefit is the possibility of a rising demand in the market. This raise would be the outcome of the growing popularity under the inhabitants.Once one is familiar with the World Wide Web one may introduce his or her social environment to the internet. Thereby the popularity of the internet will keep on growing and finally this will reflect in an increasing number of customers for the internet-cafe. Threats One of the threats the cafe will face is the continuous accessibility to internet by the general populace through smart phones. Stiff competition also forces prices down. However this has been cushioned against through diversity of the portfolio. Failure of one service will be evened out by the boom of other services. 5. Staff complementAn internet-cafe itself does not require a lot of employees. The employees should have at least 5 O’ Levels, be computer literate and A ‘Level would be an added advantage. 5. 1 Personnel plan The internet-cafe requires just a handful of employees in order to function. In total the internet-cafe will count a staff of a least 3 persons. One will be the till operator, his duties would be to accept payments for all services to be rendered and making payments for operational expenses. The second would be photocopying and binding; the third will be doing graphic designs and printing. Personnel plan Monthly salaryTill operator$ 200. 00 Graphic designer$160. 00 Photocopy assistant$150. 00 TOTAL $510. 00 6. Financial plan The following sections lay out the details of the financial plan for the future years. 6. 1 Start-up funding The internet cafe seeks to secure a loan of $11 770 to be precise from the bank according to the initial cash flow statement above marked 2. 2. Repayment Plan The management of Cheetahs’ internet cafe pledges to repay the loan in a space of two years. The repayments will be made on a month-to month basis. Assuming an interest of 10% per annum, monthly repayment amount would thus be estimated at $668.Proposed security I, being one of the directors will pledge the title deeds for a house which is valued at $15 000. The details of which are as follows: Stand no. 4875 Budiriro 4 Harare ?If need be, the title deeds shall be provided upon request 6. 2 Projected profit and loss YEAR 1YEAR 2 Sales51 00065 000 Add rent income from sub-leasing 1 200 1 200 Expenses(32 679)(34 809) Salaries(6 120)(6 120) Marketing ( 500)( 300) Machinery and equipment maintenance( 600)( 450) Internet subscriptions(12 000)(14 000) Rent(9 600)(9 600) Transport costs(720)( 720) Stationery(1 020)(1 500)Loan interest @ 18% p. a(2 119)(2 119) Net Profit before tax and after interest19 52131 391 Less tax(2 928)(5489) Net Profit after interest and tax16 95325 902 Cheetahs Internet cafe 6. 3Statement of the Financial Position for two years YEAR1YEAR 2 $$ Non-Current Assets Computers3 2003 200 Photocopier2 8002 800 Printer120 120 Furniture600 600 Commercial scanner100 100 TOTAL 6 8206 820 Current Assets Bank24 00024 000 Cash422 1 582 Debtors100 300 31 34240 702 Equity and Liabilities Loan [email  protected]%13 889 – Profit for the year16 95325 902 Owner’s equi ty14 000Current Liabilities Creditors 500800 31 34240 702 A CASH FLOW STATEMENT FOR CHEETAHS’ INTERNET CAFE FOR TWO YEARS Cash inflow from operating activities Cash received from sales Receipts from Debtors Payments to creditors Payment of expenses Cash flow from investing activities Purchase of equipment Sale of machinery Cash flow from financing activities Loan Interest payment Net cash flow Beginning cash balance Ending cash balance Year 1 14 771 50 900 100 (500) (35 729) (6 800) – 11 770 (2 119) 24 422 – 24 422 Year 2 29 391 64 700 300 (800) (34 809) – – – (4 238) 25 153 24 422 49 575

Tuesday, October 22, 2019

Review On Uncertainty And The Welfare Economics Of Medical Care Paper Article

Review On Uncertainty And The Welfare Economics Of Medical Care Paper Article Review On Uncertainty And The Welfare Economics Of Medical Care Paper – Article Example no. Review on "Uncertainty and the Welfare Economics of Medical Care" paper The of ‘Uncertainty and the Welfare Economics of Medical Care’ begins his study by comparing the characteristics of the medical-care industry with the norms of welfare economics. He explains the problems of medical care as adaptations of uncertainty in the frequency of disease and the efficacy of treatment. In this article, Arrow contributed to the information problems that lead to market failure in medical care markets. To date, Arrow’s theoretical framework that views market failure because of the imperfections of information remains consistent with the current studies. He also discussed the shifting nature of informational asymmetry between physicians and patients. Arrow posited that medical care markets are extremely uncertain. Patients are especially uncertainty about the consequences of acquiring medical treatments. The patients’ innate uncertainty about the effectiveness of m edical treatments prevents them from gaining important information on the quality of medical care services. He clarified that medical markets are in themselves information markets and that conditions of uncertainty makes accurate medical information very valuable. For instance, skilled care is a type of information that patients buy from physicians.He further described the nature of information as ‘elusive’ as a result it is a limiting factor on demand and supply in the information market. He expelled the limits on consumers’ ability to acquire information and ability to process that information. For example, individuals confronted with new illnesses usually do not have enough time to collect information because effectiveness of medical treatments often depends on minimizing the time between the onset of the illness and the start of the treatment. Arrow’s observation about the failure of the medical profession to insure against uncertainties led to the ree valuation of insurance as a public good and private commodity. He further addressed the roles of nonprofit institutions, self-regulations, and technological innovations that address medical needs. His contributions to the economics of medical health remain relevant to date. Work CitedArrow, Kenneth. Uncertainty and the Welfare Economics of Medical Care. The American Economic Review. Vol LIII, No. 5 Retrieved from

Sunday, October 20, 2019

Free Essays on Dentistry

Dentistry Introduction thesis statement. My term paper is on the career of a dentist .A dentist is a medical professional who specializes in the care of teeth, gums, and mouths. Some dentist's make dentures for people with out teeth. Their are many ,many kinds of dentist's. For example their is a dental assistant, a dental hygienists, a oral surgeon, also a dental laboratory technician. These career's are just some in the world of dentistry. By doing this research I believe my research will show. What a dental assistant, dental hygienists, orthodontists, oral surgeon, and dental laboratory technicians dose. Like for example what do they do , what is their salary, their nature of their work, and the education needed to become one of these people. The thing you need to know before you become any kind of a dentist. I choose to do my term paper on dentistry because when I grow up I want to become a dentist. My aunt's and uncle's are all dentists and I want to know what they do for a living. My a unt's and uncle's worked very hard to get to where they are and they are very proud of themselves. And I thought it would be interesting to learn about dentist's. The things that I already know about my topic dentistry is that there are a lot of other fields in this particular topic. For example there's a dental laboratory technician, a dental assistant, dental hygienists, Orthodontists, and oral surgeons. And these are just a few of the career's in dentistry. I know that the dentist works long hard hours. They have to at least finish high school. Then you go to college for four years. I also have a feel of how much a dentist makes they make 50,000 dollar's a year. But if you study hard, have a high school diploma , graduate from college, and take a lot of training your salary could be a lot more then 50,000 dollars. It would be 100,000 dollars a year. So all of that hard work and effort in school pays of. Dentist have to go throw a lot of ... Free Essays on Dentistry Free Essays on Dentistry Dentistry Introduction thesis statement. My term paper is on the career of a dentist .A dentist is a medical professional who specializes in the care of teeth, gums, and mouths. Some dentist's make dentures for people with out teeth. Their are many ,many kinds of dentist's. For example their is a dental assistant, a dental hygienists, a oral surgeon, also a dental laboratory technician. These career's are just some in the world of dentistry. By doing this research I believe my research will show. What a dental assistant, dental hygienists, orthodontists, oral surgeon, and dental laboratory technicians dose. Like for example what do they do , what is their salary, their nature of their work, and the education needed to become one of these people. The thing you need to know before you become any kind of a dentist. I choose to do my term paper on dentistry because when I grow up I want to become a dentist. My aunt's and uncle's are all dentists and I want to know what they do for a living. My a unt's and uncle's worked very hard to get to where they are and they are very proud of themselves. And I thought it would be interesting to learn about dentist's. The things that I already know about my topic dentistry is that there are a lot of other fields in this particular topic. For example there's a dental laboratory technician, a dental assistant, dental hygienists, Orthodontists, and oral surgeons. And these are just a few of the career's in dentistry. I know that the dentist works long hard hours. They have to at least finish high school. Then you go to college for four years. I also have a feel of how much a dentist makes they make 50,000 dollar's a year. But if you study hard, have a high school diploma , graduate from college, and take a lot of training your salary could be a lot more then 50,000 dollars. It would be 100,000 dollars a year. So all of that hard work and effort in school pays of. Dentist have to go throw a lot of ...

Saturday, October 19, 2019

Business Process for Intercontinental Conference help

Since the precedent era the intercontinental conference is being held for the decorum of Business Process Management for overcoming the issues of business alliance, and get through profitable outcomes through their official ventures. This platform has conquered an alleged overview through conducting eminence analysis of business prospective amendments, and tender crucial protestation to recommend proposal to rid off, over these concerns. Acknowledged through E.Soural in 2012 that, Business Process Management upholds numerous symposiums at global level, through configuring ideal dialogue of vital reviews, condiment banter along massively prominence business deities and considers over the issues through their prospective along pioneering recommendations for the formulation of the entire tactics and condemned sustainable elucidations for suitable outcome. The Business Process Management optimize symposium progression embracing the miscellany along opulence through Business Process Management meadow and dole out as exclusive opulent over connoisseurs figure describes the blend of obedience’s mending the sumptuous subjects to be the base of every speculation, sources like Managing System, Knowledge Management and Processor formulations are to be installed facing edge of the organization. Through nowadays worldwide endeavors require to admittance over salvage along amalgamate statistics all-round for the peripheral foundations. Along the competence to accomplish their aligned prospective, it is obligatory to trounce over enormous methodological obstacles mended the immense information configuration, construction of the structure and set off objectives for the procurement. Practically through the overview of assorted organization, there are some subdivisions mended for the possession along circulating the figures. Several of the organization have formulated by the comprehensive statistics across diverse peripheral foundations those are pertinent over the vicinity of conscientiousness. Administrating above prolong assorted milieu as onerous along pricey. Assortments of elucidation are penetrated intention for the business statistics analysis. The crucial is anticipated that the figures over elevated integrity, it is circulate through the communal corpses. Configuring the operation to formulate information unbolt is habitually obligatory through the provincial decrees. Usually the financial systems along the information accumulation procedures for unambiguous foundations are conducted through assorted prospective of communal populace. It analyzes significant segments among the financial system, often through the communal along constitutional progression. Through the summit if concluding the organization formulate subjective circulating of the federation. The consummate information of circulate provides information over: Through business amendments, a vital endowment of information over apiece realm configures the arithmetical bureau. Habitually there constitute over online coordination that grant admittance to statistics. It’s is proficient for immense monetary, tape realistic and societal researches. Conversely, this platform formulates allocation for several of information through databases. The respite of information provides accessibility through charts displayed over the web enlighten in the course of manuscripts that is anticipated for the viewer to comprehend those files, unfortunately it is barely palatable through systems. The Europe Business Process Management conference estimated in 2012 along the coalition Of twenty nations endeavoring to relocate the revolutionary analysis over latest merchandise and overhaul through the vicinity over BPM. The Europe Business Management conference upholds assorted nationalized inventiveness to evaluate Europe. Amended the ambition is to formulate concentration over pronouncement producers along securing the sustainment above massive business expenditure of Europe Business Process Management enterprises. The entire European Business Process Management canvassers and executors are deployed to unite along the vigor. Referred by Nurcan. S in 2012 that, Analogous concept is espoused by various provincial geometric workplaces. Maneuver the information through the paradigm of central agency of Poland that allocates its information in figure of Excel documentary. The cooperative method of accumulating information through Excel sheets, which is an uncomplicated platform divide into rows and columns, anticipated supreme charter to formulate information. The additional dilemma are mended over the pamphlet progression misrepresent significant details of information apart from the availability, Meta information is also not distributed, nor endow with texted information, individual decipherable explanations. It does not ensure potential usage of information. Through some comprehensive resolution the information is mended over XML documentaries. It habitually imitate sum, and somehow obtainable through the WEB server in individual comprehensible substitute along normal form of information. Whereas information is finely prearranged through diverse prospective, a normally it is not depicted through adequate aspects as to offer express accessibility through systematic utilization. An additional quandary along the concept is implemented normally, which do not pursue unbolt customaries appropriately. Along the instance of the XML information presented through P. State Depository is offered. Acquaintance of the idiom that is precondition as to condemns suitable utilization of information. The massively significant confronts along the information utilization procedure as credentials for pertinent database through online motive. The foremost investigation locomotives present minor maintenance to recognize the information basics along analysis contended for scrupulous significances over the provided compute is practically impracticable. However, yet during individual administers the categorize supplies, which is not undemanding for repossess information because that is not obtainable along configures effortlessly palatable through curriculums. Convention develop allocate layout, along be deficient of portrayal along deficiency of Meta information and connecting among diverse database thwarts interpretation across the information, which fractious over individual database. The symposium 2013 offer entire Business Process Management and Enterprise Architecture associate of Europe through solitary podium submission to ascertain the advantageous along BPM and EA lay simultaneously. The previous seminar conducted an immense sensation along the subordinate locality was eventually suitable, as considered by the delicates. Arrangement of application is at present been conventional over the symposium. Formulate intentions regarded: Contended by Glykas M.M in 2013, however several machineries over the perspective, which could facilitates the circumstance. Configure the substance through the instance of semantic machineries, which the espoused operands to formulate information depiction and analysis. It is analyzed primarily characterized through B. Lee, that the semantic browser is not a detach portal, hence it conservatory over the WEB through our knowledge. The solitary discrepancy, which corresponds, is figures are mended along the distinct connotation, alternatively that the processor has enormous prospects to reclaim the data through the harmony along individual objectives. The Business Process Management meeting in 2013, it notable that the upcoming cohort of Business Process Management condiment its virtues further than incremental competence, and contend to switch over to envision along research base analysis of optimization over Business maneuver. It productive work include: Through several farsighted dissertations B. Lee delineates various potentials. Individual tenure may sustained through mediators, that are operational along satisfactory background acquaintance, which can consult among apiece to provide our span effortless. To configure to this competence the information should be reachable to mechanisms for alternatively suitable development competent. Whereas several necessitates should be followed like immense physical exertion, which have to be carried out before any anticipation. Mentioned by U, Rahm in 2013 that, Configure the outcome of substandard development, preliminary of the about few years, the hallucination was reconsidered along the possibility of the semantic system were constrained through accurate demonstration of information. Amended through the hallucination of the semantic browser demonstrated for the aspirations, and the entire populace would be formulate to this medium of intermediary affirm connected information. It not configured through any officially interpreted documentary, but solitary sustain information. Based on the rdf format of attitudes along a extraordinarily effortless symbolized through 3 affirmatives: The connected information is deposit of customaries functional for circulating the prearranged information on single browser through rdf diagrams. This opinion pursues url’s the are obliged for through systematic profile are predestined over http, along url’s which configure entwined allots course-plotting. The connected unbolt information is connected statistics archetype functional over communal unbolt information through various realms at global level. At Oct 30, 2007 the constitution campaigners held a conference at Sebastopol at California to address that how the Constitution could be uplifted of the platform of e-stored Constitutional information for communal review. The efficient concepts of ten estimations are to be embrace to aperture over constitutional data. Along the doctrine are: Connected information is presently measured through clarification over preparation of statistics fissure. That composes it unproblematic to the constructors to switch over linked data system among diverse foundations. The minimalism for the demonstration and elucidation regarding the connotation offered to be striking. Withdrawal of uncomplicated actualities presents background for massive information system. Future linked to 2 important prospective: Interior perceptions could be definite as: Those are incarcerating elementary distinctiveness over the individual to milieu impartial along idiom impartial approach. Constantly the interior terminology address as the â€Å"foundational perception through scrupulous depiction idiom, corresponding as rdf along xml representation. The association’s pedestal over widespread terminology formulated through aspects like Dublin Core and another crate of Meta information measurement and representations eg: Elucidated by Janssen M. in 2012 that, Over peripheral treatment corporations massively utilize cryptographic links for their commotions. Moreover aspects of geological terminology, that is immensely province unambiguous. Appropriate implementation of monetary is not condiment to be potential devoid of orientation compilation for the associations and populace eg: The suitable compilation of terminology is accessible through connected unbolt terminologies situate. Declared by N M. Weske in 2012 that, Nowadays massive range of information is whole host of corresponding database. Concerting that there is no supplementary covenants along islets regarding to database, before denoted as information storage looms, the information is previously someway correlated. The occurrence was initially mended on May, 2007 as Connected Unbolt Information district. The structure of the initially known as cloud by R. Cyganiak along A. Jentzsch in attendance through the foremost foundation of the causatives information, the involvement of dramatists are connected over cloud figure contended as the register of accessible database and linkage among them. Through every annual overview, cloud platform is extending rapidly over the horizon. Configure by H. Kà ¼hn in 2013 that, the circumstance of ability relating to connected unbolt information system establishes it competence and accessible revolutionizes persistently. The amount of information portico is prosperous over the era. Concerting through abundant information formulation corresponding through various aspects: The documentary is mended along the overall information source of the Business Process Management (BPM) tactics and formulation of systematic operands to be followed through the business procedure corresponding to which amendments are made on these prospective according to the coloration of populace demands and worth eventual. Maintaining the entire foundation of the business venture along supreme management and proficient handling, ought’s be the confront of the business development. Paschou M. Sakkopoulos, E. Soural, 2012. Moblie Based Processes for Efficent Customer Flow Management. Halip T, Korgstie J, Nurcan S, 2012. Based Processes for Efficient Customer Management. Lampathaki F, V. Calcic, 2012. Translating Knowledge into Growth. Views from ICT Research to Support Future Business Innovation. Glykas M.M, 2013. Effort based performance measurement in business process management. Knowledge and Process Management. Kamarain F, Ayani R, Moradi F, 2012. A framework for simulation-based optimization of process models. Oliverira, C.A.L. Lima, 2013. Quantitative analysis of resource-constrained business process. Becker M, Klingner S, 2012. Towards Customer-Individual Configuration of Business Process Models, Kumar A, Yao W, 2012. Design and management of flexible process variants using templates and rules. Computer Industry 63. Muller R, Greiner U, Rahm, 2013. A workflow system supporting rule based workflow adaption. Data Knowledge Engineering 51. Bayer, H. Kà ¼hn, 2013."Prozessmanagement fà ¼r Experten - Impulse fà ¼r aktuelle und wiederkehrende Themen. H.Broninski, 2013."Human Interaction: The Missing Link in BPM (Part I)". Gong, Y. and Janssen, M, 2012. From policy implementation to business process management: Principles for creating flexibility and agility. Panagacos, 2012.The Ultimate Guide to Business Process Management: Everything You Need to Know and How to Apply It to Your Organization. Weske, 2012. "Business Process Management: Concepts, Languages, Architectures. M.Dumas, M. L. Rosa, J. Mendling, H. A. Reijers, 2013. "Fundamentals of Business Process Management. Mckinty and A. Mottier, 2016. "Designing Efficient BPM Applications - A Process-Based Guide for Beginners" Silver, 2012. BPMN Method and Style: With BPMN Implementer's Guide. Getting academic assistance from

Friday, October 18, 2019

The Validity of The Persistent Offender Rule in International Law by Essay

The Validity of The Persistent Offender Rule in International Law by Omar Abasheikh - Essay Example It would be tantamount to an international crime to claim that the words offender and objector may be used interchangeably. Even in common parlance, â€Å"object† and â€Å"offend† does not share the same meaning, although sometimes, the person to whom an objection was made may take an offense out of it. An objecting state is not necessarily offending the customary international laws in place and in full force and effect among the community of states. The author creates a crime out of a perfectly normal and natural thing to do for a sovereign state. How could the author have missed this small yet very important point? Apparently, there was a mistake somewhere between the writing of the paper and the formulation of the title. A paper’s title is supposed to give the readers some idea about the body of the paper. But in this case, the title has become a cause for confusion because it is a totally different concept than the rest of the paper. Inconsistent Thesis Lest this review be regarded as a headhunt for flaws, the author is lauded for the extensive research he has done about the subject. He dug through cases and books as is evident in the amount of information and data that the paper contains. But enormous amounts of data are meaningless unless they are served and digested into coherent and logical conclusions. At one point, the author merely presented several opposing or corroborating statements without bothering to mention which one prevails pursuant to exiting international laws or jurisprudence from the International Court of Justice. But then again, the paper has no thesis statement, and if there was any, it was ambiguous and difficult to ascertain. Based on the title, the author is expected to make a stand as to... The research paper "The validity of the persistent offender rule in international law" begins with an introduction to the topic. The author analyzes logical mistakes of Omar Abasheikh in description of "persistent offender rule" and criticizes the title of the paper, which doesn't fit to the sense of the research. After that the author shows advantages and disadvantages in the approach of the author and comes to interesting conclusions. In the end the author sums up that â€Å"consent, whether express or tacit, is required for the formation of customary international law†1 and the persistent objector rule is a necessary and accepted feature of the system that works for the unique social setup of the international community of states. The persistent objector rule is a necessary tool that allows each state to tailor the international law to their particular needs and maximize their benefits. Overall, the author deserves recognition for the amount of time and effort he had put into the paper. No one can deny the fact that he had presented a good volume of pertinent facts and information in the paper. However, the article is not without flaws, starting off with the wrong choice of word in the paper’s title. Then there is the lack of a clear thesis statement and inconsistent theories. The reader would get lost in translation amid the legal terminologies used in the paper. Nevertheless, the paper was very informative and could serve as a jump off point for further and in depth research into the subject.

Comments on BP 3 Essay Example | Topics and Well Written Essays - 500 words

Comments on BP 3 - Essay Example The company will outsource some of its operations and will enter into a contract with the website development company in order to come up with attractive website. The team has effectively defined and elaborated all important elements and processed involved in the operation and transaction. The team has also included the elements of customer service and customer relationship management in order to make sure that the high customer value is provided to all customers. The company will also use social media techniques in order to market and promote the website and attract more traffic. The business model of the company is bit complicated as it involves several virtual links and partners. But the business model canvas provided by the team in the appendix has made it easier to comprehend the complete links and connections among all important partners and also has explained clearly how the business will operate. Lastly, the team has been able to calculate the cost behind the whole business model and has included all important costs and expenses in order to come up with more realistic figures. The major strength of this business plan is the testing of the product at the target market before launching it. This will allow the company to come up with the final product which accords with the needs and demands of the customers and there will be relatively less chances of rejection or failure. All the feedbacks and comments generated as a result of this pre-launch testing will be used by the company in order to improve the final product. This testing also allowed the company to identify the most profitable target segment. The company relies on heavy input from the customers and devises strategies accordingly. This, in turn, will allow increasing the customers’ satisfaction and attracting more customers. The main idea behind the whole business is to provide the eating products to the customers on mobile trucks and vehicles. This will allow the company

English Literature Essay Example | Topics and Well Written Essays - 1000 words - 2

English Literature - Essay Example hat is to say, throughout Act I, a careful reader traces the development of corruption mostly through the powerful character of King Claudius and the impact of corruption connected with the king on the entire kingdom of Denmark is evident to the readers. The theme of decay becomes perceptible in King Claudius’ speeches which also reveal the moral, social and political corruption existent in the entire society. In fact, Shakespeare has been realized through the critical works of several scholars as a writer with great social commitments and he has been especially effective in dealing with the issue of corruption and its effect on the society of Hamlet. In the play, the images of disease pervade the dramatic language suggesting not merely the corruption of the individual but the degeneration of an entire society. Therefore, the images of disease and corruption can be seen right from the opening scene of the play which, in the course of action, turns out to be literal references to the decay of the society. These images of disease and corruption can be traced from the opening scene of the play to the end and Marcellus comment in the third scene points to the decayed state of affairs in the country: â€Å"something is rotten in the state of Denmark.† (I IV 90: 6678) All through his play, Shakespeare makes use of the imagery of disease, poison and decay and Marcellus’ statement indicates such imagery in the play. The playwright presents widespread corruption in the state of Denmark which is comparable to infectious diseases contaminating the entire court and such setting of disease also amplifies the readers’ revulsion for the nasty events in the play. Just as disease leads one to death, the disease of the society leads the state of Denmark to a damned situation. In short, the dramatist’s use of images of disease and corruption helps the readers comprehend the emotional and moral decay and the bitter relationships of the characters as well as the anxious, chaotic

Thursday, October 17, 2019

CRIMINAL LAW Barrister advice and defence statement Essay

CRIMINAL LAW Barrister advice and defence statement - Essay Example Mr. Olmeda saw the defendant, Joseph Wearn, hovering around a display of walking sticks. Mr. Wearn was looking around rather suspiciously. Mr. Olmeda contacted his colleague in the video control room to have the camera operator focus on Mr. Wearn. Mr. Olmeda then witnessed Mr. Wearn take a walking stick. Mr. Wearn camouflaged the walking stick and made a speedy exit through the front of the store without stopping to pay for the item. Mr. Olmeda followed Mr. Wearn all the way to the main concourse area inside Brent Cross shipping centre. Mr. Olmeda took hold of Mr. Wearn’s arm and cautioned him that he was the store detective and that he watched him remove a walking stick and exit the door without paying for it. Mr. Olmeda asked Mr. Wearn to step inside the store with him while he contacted the store manager, Mrs. Linda Levison. Mr. Olmeda retrieved the walking stick from Mr. Wearn when he stopped him outside of the store. Mr. Wearn repeatedly shouted obscenities while on the w ay to the store manager’s office, Mrs. Linda Levison’s office. Mr. Olmeda explained to Mrs. Levison what had just transpired and handed her the walking stick. The store manager, Mrs. Linda Levison, phoned the police who arrived at 12.50 hours. Mr. Olmeda explained what had transpired and then he returned to his post. Witness: Mrs. Linda Levison Occupation: Store manager of John Lewis, Brent Cross, London Statement taken: 9 December 2010 Summation: Mrs. Linda Levison is the store manager for John Lewis, Bent Cross, London. On 8 December 2010, Mrs. Levison was met in her office by store detective, Javi Olmeda. Mr. Olmeda informed her that he had apprehended Mr. Joseph Wearn for taking a walking stick from the store without paying for it. Mrs. Levison took Mr. Wearn, who was escorted by the store detective, Javi Olmeda, to her office. She proceeded to call the police who arrived on or about 12.50 hours. This is pursuant to the store policy of contacting the police wheneve r a theft is alleged. According to Mrs. Levison, the alleged perpetrator, Mr. Wearn was crying while they awaited the police to arrive. Once the police had arrived, Mr. Olmeda, the store detective, recounted the allegation and returned to his post. According to Mrs. Levison, the walking stick that she had been given by Mr. Olmeda was characterized by a prominent lion’s head handle. It also had the store’s label attached to it so that Mrs. Levison was able to ascertain that the item in question was indeed sold at her store and part of the inventory. With the information from the label of the walking stick, Mrs. Levison was able to identify it as part of the store inventory and that such a walking stick, according to computer records, was not sold on 8 December 2010. Mrs. Levison handed the walking stick over to one of the attending officers, PC May. She then witnessed Officer May arrest Mr. Wearn and watched them leave her office. Mrs. Levison is producing the computer records from 8 December 2010 (Exhibit LL/1), and is willing to give evidence in court. Witness: Richard Fairchild Occupation: Security camera operator Statement taken: 9 December 2010 Summation: Mr. Fairchild is employed as a security camera operator by Securigard PLC. On 8 December 2010, he was working at the John Lewis Partnership’s central office manning the camera desk. Mr. Fairchild is responsible for operating the security camera. The security camera is set up to monitor and record

Film vs Book Essay Example | Topics and Well Written Essays - 1000 words

Film vs Book - Essay Example The film versions of the books One Flew over the Cuckoo’s Nest and Breakfast at Tiffany’s amply testify to the fact that it is pragmatic and necessary for the film versions to be different from the actual books on which the films are based so as to bring out the appeal and context of the overall plot as per the requirements of the cinematic genre (McFarlane 164). In that context there tend to be marked differences between the book and the film version of One Flew over the Cuckoo’s Nest. The book tends to deal with the plight of a mental institution in 1963. The movie got released in 1975, which is about 12 years after the book got published. Before delving into the differences between the movie and the book, one does need to know that the movie version of the book was utterly successful that won all the five major categories of Academy Awards. The primary thing is that the book is dominated by the point of view of Chief Bromden, a gigantic Indian, who is in the s ame ward with McMurphy. It is true that the writer Ken Kesey backed out from the film project when he came to know that the point of view of Chief Bromden had been removed from the movie and he no more stands to be the narrator in the film version of the book. It goes without saying that this alteration of the point of view in the book and the movie lead to major differences in the book and the film version of the story. When one reads the book with Chief Bromden being the chief narrator, the overall mood tends to be quiet slow and poised. The narration facilitated by Chief Bromden delves into the essential traits, characteristics and inclinations of the varied characters in the asylum in a threadbare, sophisticated and lilting manner. However, it is but natural to assume that in the film version of the One Flew Over the Cuckoo’s Nest, the producer had to adapt the storyline in consonance with the needs and requirements of the cinema. The film version of the book simply does not afford to be slow paced and languid as the book. Yet, if one reads the book before watching the movie one does miss the edgy, disturbed and cynical point of view facilitated by Chief Bromden as he says, â€Å"If my being half Indian ever helped me in any way in this dirty life, it helped me being cagey, helped me all these years (Kesey 4).† However, in the film version of the book, it is the trio of McMurphy, Nurse Ratched and Chief Bromden that bring out the story. The film version simply sets aside the pain and hurt inherent in Chief Bromden reveries, to display a larger view that incorporates an array of characters, thereby relying on the variety and the interactions between varied characters to move the story forward. Hence, if on the one side the plot in the book is poised, slow, emphatic and gripping, the storyline in the movie happens to be racy, action-oriented, emotive and multi-faceted, exactly the way it ought to be in a successful movie. The film versions do h ave their limitations and one simply could not expect a film version to stick diligently to the storyline and plot as it is given in the book (McCreadie 126).

Wednesday, October 16, 2019

English Literature Essay Example | Topics and Well Written Essays - 1000 words - 2

English Literature - Essay Example hat is to say, throughout Act I, a careful reader traces the development of corruption mostly through the powerful character of King Claudius and the impact of corruption connected with the king on the entire kingdom of Denmark is evident to the readers. The theme of decay becomes perceptible in King Claudius’ speeches which also reveal the moral, social and political corruption existent in the entire society. In fact, Shakespeare has been realized through the critical works of several scholars as a writer with great social commitments and he has been especially effective in dealing with the issue of corruption and its effect on the society of Hamlet. In the play, the images of disease pervade the dramatic language suggesting not merely the corruption of the individual but the degeneration of an entire society. Therefore, the images of disease and corruption can be seen right from the opening scene of the play which, in the course of action, turns out to be literal references to the decay of the society. These images of disease and corruption can be traced from the opening scene of the play to the end and Marcellus comment in the third scene points to the decayed state of affairs in the country: â€Å"something is rotten in the state of Denmark.† (I IV 90: 6678) All through his play, Shakespeare makes use of the imagery of disease, poison and decay and Marcellus’ statement indicates such imagery in the play. The playwright presents widespread corruption in the state of Denmark which is comparable to infectious diseases contaminating the entire court and such setting of disease also amplifies the readers’ revulsion for the nasty events in the play. Just as disease leads one to death, the disease of the society leads the state of Denmark to a damned situation. In short, the dramatist’s use of images of disease and corruption helps the readers comprehend the emotional and moral decay and the bitter relationships of the characters as well as the anxious, chaotic

Film vs Book Essay Example | Topics and Well Written Essays - 1000 words

Film vs Book - Essay Example The film versions of the books One Flew over the Cuckoo’s Nest and Breakfast at Tiffany’s amply testify to the fact that it is pragmatic and necessary for the film versions to be different from the actual books on which the films are based so as to bring out the appeal and context of the overall plot as per the requirements of the cinematic genre (McFarlane 164). In that context there tend to be marked differences between the book and the film version of One Flew over the Cuckoo’s Nest. The book tends to deal with the plight of a mental institution in 1963. The movie got released in 1975, which is about 12 years after the book got published. Before delving into the differences between the movie and the book, one does need to know that the movie version of the book was utterly successful that won all the five major categories of Academy Awards. The primary thing is that the book is dominated by the point of view of Chief Bromden, a gigantic Indian, who is in the s ame ward with McMurphy. It is true that the writer Ken Kesey backed out from the film project when he came to know that the point of view of Chief Bromden had been removed from the movie and he no more stands to be the narrator in the film version of the book. It goes without saying that this alteration of the point of view in the book and the movie lead to major differences in the book and the film version of the story. When one reads the book with Chief Bromden being the chief narrator, the overall mood tends to be quiet slow and poised. The narration facilitated by Chief Bromden delves into the essential traits, characteristics and inclinations of the varied characters in the asylum in a threadbare, sophisticated and lilting manner. However, it is but natural to assume that in the film version of the One Flew Over the Cuckoo’s Nest, the producer had to adapt the storyline in consonance with the needs and requirements of the cinema. The film version of the book simply does not afford to be slow paced and languid as the book. Yet, if one reads the book before watching the movie one does miss the edgy, disturbed and cynical point of view facilitated by Chief Bromden as he says, â€Å"If my being half Indian ever helped me in any way in this dirty life, it helped me being cagey, helped me all these years (Kesey 4).† However, in the film version of the book, it is the trio of McMurphy, Nurse Ratched and Chief Bromden that bring out the story. The film version simply sets aside the pain and hurt inherent in Chief Bromden reveries, to display a larger view that incorporates an array of characters, thereby relying on the variety and the interactions between varied characters to move the story forward. Hence, if on the one side the plot in the book is poised, slow, emphatic and gripping, the storyline in the movie happens to be racy, action-oriented, emotive and multi-faceted, exactly the way it ought to be in a successful movie. The film versions do h ave their limitations and one simply could not expect a film version to stick diligently to the storyline and plot as it is given in the book (McCreadie 126).

Tuesday, October 15, 2019

Air traffic control Essay Example for Free

Air traffic control Essay Situation 1: Adapted from WAFBLA â€Å"Everyone Else Does It! † Ethics Project You have been struggling in your Engineering Models class. The content does not come easily, so you have put in countless hours to understand and do the assignments. There is another student who breezes through the assignments, getting high marks for the work he turns in. You know for a fact that he has used his college-aged cousin to do some of the assignments for him. You don’t know how many assignments were turned in this way, but you are certain that he, in fact, did not do all the work. Your frustration increases over the last assignment that you worked overtime on, but did poorly. Of course, this other student scored well on the same assignment. You drop the teacher an anonymous note about the implied cheating on the part of this other student. Questions: 1) What do you believe are the ethical issues related to this situation? Not being prepared to turn in the assignment. Trying to use someone elses work as your own. | 2) Write an argument supporting the actions taken. Be sure to tie your response to one of the ethical frameworks discussed. This is the rights approach as you are telling the teacher that another student is not turning in his actual work. This will make the challenge of the assignment fair for everyone. | 3) Write an argument against the actions taken. Be sure to tie your response to one of the ethical frameworks discussed. You should just let the other student do what he wants to and tell him that he won’t be able to get help when he does the exam. | 4) Were you in this situation, what would your response be? Why? I would also tell the teacher that he is cheating so that it would be fair for everyone who turns in their homework. | Situation 2: Occidental Engineering Author: Michael McFarland, S. J. Wayne Davidson is a software engineer in the aerospace division of Occidental Engineering, a large engineering firm. For the past two years he has been working as a test engineer for Operation Safe Skies, a project to build a prototype of the next generation air traffic control system. This project, which is funded by a contract from the Federal Aviation Agency (FAA), is a very important one for Occidental. With all the cutbacks in defense spending, the aerospace division has been losing business. The Safe Skies project has provided much needed business, and could lead to a much larger contract if successful. Mindful of its strategic importance, the company had bid very aggressively for the original contract. In fact they had low-balled it, bidding less than it would take to do the work properly. They felt that was the only way they could beat out their competitors, who were just as hungry for the work. Because of their somewhat shaky financial position, the company was not willing to take a loss on the project, so the project has been underfunded and understaffed. Nevertheless those working on the project have made a heroic effort, working eighteen hour days seven days a week to meet the deadline, because they know how much it means to the company, not to mention their own jobs. They are now very close to success. A version of the prototype has been completed and turned over to Wayne for testing. He has run extensive simulations on it and found that it works as it should except for one little problem: when there are too many aircraft in the system, it will sometimes lose track of one or more of them. The forgotten aircraft will simply disappear from the screen, there will be no trace of it anywhere, and it will be ignored by all of the collision avoidance and other safety tests. Wayne has been working with the software designers to identify the cause of the problem, and they have traced it to a subtle error in memory allocation and reuse. They are confident that they can fix it, but it will take a month or more to do the redesign, coding and testing. Wayne meets with his boss, Deborah Shepherd, the project manager, to discuss the implications. She tells him that what he is asking for is impossible. The contract requires that the company deliver a fully certified, working version of the software in three days for system integration and test. The government has developed a new, get-tough policy on missed deadlines and cost overruns, and Occidental is afraid that if they miss this deadline, the government will make an example of them. They would be subject to fines and the loss of the remainder of the prototype contract; and they might not be allowed to bid on the contract for the full system. This would have a devastating effect on the aerospace division, resulting in thousands of lost jobs. They consider whether they can do a quick patch to the software before turning it over, but Wayne adamantly refuses to release any code that has not been tested thoroughly. There is always a chance that the patch would interact with some other part of the program to create a new bug. Then well have to deliver the software as is, Deborah says. I cant jeopardize this project or the jobs of my people by missing that deadline. We cant do that! exclaims Wayne. Thats like delivering a car with defective brakes. Dont worry, Deborah reassures him. We have contacts in the FAA, so we know their testing plans. They will do a lot of simulations to make sure the software works with the hardware and has all the functionality in the specs. Then they will do live tests, but only at a small airport, with a backup system active at all times. There is no way they will overload the system in any of this. After that they will have some change requests. Even if they dont, we can give them an updated version of the program. We can slip the bug fix in there. They will never see the problem. Even if they do, we can claim it was a random occurrence that would not necessarily show up in our tests. The important thing is no one is in any danger. Maybe they wont find the bug, but I know its there. I would be lying if I said the system passed all the necessary tests. I cant do that. Anyway, it would be illegal and unprofessional. You can certify that it is safe, because it is, the way they are going to use it. And so he does. In the end Wayne signs off on the software. It is delivered to the FAA and makes it through all the preliminary tests, including live tests at a small airport in the Midwest. As a result of these tests, the FAA requests some changes in the user interface, and when Occidental delivers the new software it includes a robust solution to the problem of the disappearing aircraft. No one outside of Deborahs group ever learns of the problem. In fact Occidentals success with the prototype leads to major contracts for air traffic control software, giving much-needed business to the aerospace division. This saves hundreds of jobs, and allows the company to add hundreds more. Wayne Davidson, however, takes early retirement once the prototype project is finished, in order to write a book on software testing. He feels that the book should have a chapter on ethics, but he can never bring himself to write it. Questions: 1) What do you believe are the ethical issues related to this situation? Lying about a completed project when it isn’t. | 2) Write an argument supporting the actions taken. Be sure to tie your response to one of the ethical frameworks discussed. There was no productive way to get all of the project done, so they had to give what they had. | 3) Write an argument against the actions taken. Be sure to tie your response to one of the ethical frameworks discussed. It wasn’t a good choice because they didn’t tell the company that the project wasn’t finished and handed them an incomplete project. | 4) Were you in this situation, what would your response be? Why? I would ask for more people to help so we could get the project done on the day its due and assign each person a different part to do. |

Monday, October 14, 2019

Biotechnology: Applications and Arguments For and Against

Biotechnology: Applications and Arguments For and Against The use of genetically modified organisms (GMOs) in agriculture is rising, but not without debate. There are many scientists who argue that genetic engineering in agriculture is the best way to solve many issues of poverty, food security, environmental harm, and the need for increasing competitiveness in sales, but others raise ethical issues regarding the health of the people who consume the genetically modified products, the possible harm to the environment, the depredation of the welfare of the farmers and their food security, and the general introduction of engineering into mainstream use in society. 1.2 Definition of Genetically Modified Organisms Genetically Modified Organisms, commonly called GMOs, refer to organisms whose genetic material has been altered using recombinant DNA technology, a method used to recombine the DNA of different organisms. 1.3 Sequence of Discussion I begin the paper with an introduction to the issues of using biotechnology and generating GMOs in agriculture. I continue with arguments both for and against the use of biotechnology in agriculture. I conclude the paper with information about the current debate on this issue and resources to obtain more information. 2.0 Prelude to the Issues The use of genetically modified organisms to enhance the production, yield, and quality of agriculture is under much discussion. Biotechnology companies are actively investigating the research and development of new technologies to improve food security and augment production of goods in both the developed and developing worlds, while activist groups work to ensure that biotechnology is not used in food production at all for fears of damage to the environment and human health, among other issues. On the other hand, according to Dr. Miguel Altieri, a leading spokesperson in the field, the view that GMOs can enhance food security in the developing world rests on two assumptions: that hunger is due to a gap between food production and human population density or growth rate and that genetic engineering is the best or only way to increase agricultural production and so meet future food needs.1 While it is clear that there are benefits to using biotechnology to improve crop production, th ere are also many fundamental and ethical arguments against its use, as is illustrated shortly. 3.0 The Argument for Biotechnology 3.1 Applications of Biotechnology to the Goal of Poverty Reduction Several objectives of using biotechnology in agriculture are associated with the reduction of poverty. Introducing GMOs into agriculture is predicted to increase rural incomes, sustain production in resource-poor areas, and provide more nutritious foods. Supporters of the use of biotechnology in food production believe that developed nations with technology have a social and political obligation to assist these poorer nations. In India, Vietnam, and Kenya, diseased vegetable crops and trees can benefit from genetically produced bio-pesticides. The cardamom crops in India, potato crops in Vietnam, and banana crops in Kenya are often farmers sole source of income, such that diseased crops can have an extremely damaging affect on the farmers lives. Problems with a lack of clean and pure seeds and planting material can be solved by using bio-pesticides, which allow for leniency in the purity of the seeds and planting material. In this way, GMOs can potentially provide a means for high-resistance and high-yielding crops.2 Biotechnology can also contribute to sustaining the production of foods, commonly cereals and maize, in resource-poor areas. Drought, pests, and acidic soil often cause detrimental problems to farming, but insect resistance and aluminum tolerance can circumvent these environmental barriers. The ability to provide a full farming season through using GMOs to assist in the production of larger quantities of food for these farmers helps to ensure a profitable growing and harvesting season.2 Finally, GMOs can contribute to generating more nutritious foods with higher nutrient content-this technology most commonly being applied to rice. The people in countries such as India and China rely heavily on rice in their diets, but rice alone does not provide the necessary nutrients for a balanced diet. 3.2 Applications of Biotechnology to the Goal of Financial Security for Farmers Farmers can make great use of transgenic techniques in their agriculture with the goals of both ensuring food security and increasing the competitiveness of their crops. Biotech companies and supporters of the use of GMOs believe that there exists a political obligation to assist in the security and well-being of farmers who supply goods to more developed countries. Food Security The biotechnology objectives in agriculture that are associated with issues of food security include meeting the demand predictions for staple foods, increasing livestock numbers, and increasing vegetable and fruit yields. Two major constraints that farmers encounter with regard to meeting the demand predictions for staple foods, which must be grown in large quantities, include the presence of pests and the consequential infectious diseases, and problems associated with biotic stress. Pests and disease are often a problem in rice crops in China, and the addition of genetically modified rice varieties with pesticides can assist in the prevention of diseases in these crops. In addition, GMOs are valuable for avoiding abiotic stresses, such as salinity and drought. In India, China, and Thailand, hydration and salinity tolerance in cereals, considered to be staple foods, assist in the security of high yields of these food crops to meet the demand.1 In India, biotechnology can help to avoid the major problem associated with the keeping of livestock, i.e., the probability of diseased animals, including cattle, pigs, and sheep. In addition, embryo technology can sidestep issues of productivity in dairy cattle. Both of these uses for GMOs lead to an increase in both livestock number and productivity.2 Biotechnology is also useful for securing a stable food supply by increasing vegetable and fruit production. Pests and diseases infect these crops, often completely depleting their production. Examples of crops are tomato and potato crops in Vietnam, as well as papaya crops, which can become infected with the ringspot virus.2 3.2.2 Increasing Competitiveness The use of biotechnology in agriculture can also assist farmers competitiveness on the global market, specifically by sustaining productivity exports, regulating food safety and quality control, and adding value to exports. Biotechnology is useful in sustaining exports by increasing the yield of crops, such as coconut crops in the Philippines, banana crops in countries such as India, China, and Vietnam, and potatoes, rice, maize, wheat, cassava, and beans in other developing countries.2 In addition, GMOs can contribute to food safety and quality control with respect to food exports by controlling pesticide residues and ensuring the competitive quality of exports.2 Improved quality can include characteristics such as texture, taste, appearance, and nutritional value, and the ability to delay the ripening of fruits and vegetables can greatly approve the longevity of some produce. Specific improvements for producers are an increased flexibility during production, harvesting, storage, distribution, and transport stages, leading to a reduction of overall production costs and a greater guarantee of quality product at the time of selling.3 3.3 Applications of Biotechnology to the Goal of Environmental Protection The introduction of technology into the environment can be hazardous and brings up ethical issues associated with protecting the environment through the use of technology (also see section 4.2). However, many supporters of GMOs claim that biotechnology in agriculture can enhance protection of the environment, specifically by reducing pesticide use and enabling the efficient use of water. Pesticide misuse on cotton and rice crops in China and on vegetables in Malaysia is a common problem when farmers are misinformed of use of pesticides, or when pesticides are overused in attempt to deter crop failure due to pests. Transgenic crops can potentially reduce the need for and usage of pesticides by assisting pest extermination and preventing weed growth. GMOs such as Bacillis thuringiensis (Bt), a natural soil bacterium, can be used to kill insects by allowing the plants to produce their own toxin against pests, sidestepping the problem of farmers who are mis- and overusing pesticides. In addition, herbicide tolerant crops ideally require fewer herbicide applications, because the crop is genetically programmed to more efficiently utilize the particular chemical product.4 Finally, transgenic herbicides can be applied to pre-treat the land, so that weeds are altogether prevented, and farmers can weight the options and costs of using more chemicals versus dealing with weed gr owth during harvest.3 4.0 The Argument Against Biotechnology 4.1 Uncertainty of the Safety of Humans After Consumption Although there is a lot of anticipation and excitement about the beneficial effects that can potentially result from the use of biotechnology in agriculture, there is also a lot that is unknown about the uses of transgenics and their impending consequences. Specifically, examples of these issues include the lack of available public information and knowledge about the content and effects of GM foods, the possible inactivation of many nutrients present in naturally-grown foods, and the introduction of allergens through the use of GMOs. These are all social, ethical, and legal issues based on the morality of tampering with foods in a way that will have an unknown effect on human health. As just stated, one major issue regarding the allowance of the free use of GMOs in agriculture is associated with the unknown potential health effects of consuming chemically treated foods. Consumers assume that the foods they buy are safe, even though many contain compounds that are potentially toxic or allergenic. The general public has a large misunderstanding about genetically modified (GM) foods because companies do not boldly advertise their use of transgenic components in their products. For this reason, people often consume GM foods without even knowing it. In addition, while many biotechnology companies advertise the use of transgenics in agriculture as beneficial to human health by improving the nutritional content of food, genetic engineering also has the potential to remove or deactivate many nutritional substances present in naturally-grown foods: Recent research shows that GE [(genetically engineered)] herbicide resistant soybean have lower levels (12-14 percent) of isoflavones, [which are] key phytoestrogens . . . that occur naturally in soybeans and may protect women from severe forms of cancer.1 These genetic modifications boost the activity of a gene that makes critical amino acids, but the resulting shift in amino acid levels shifts the metabolism of the plant to alter the levels of the aforementioned phytoestrogens. This effect is clearly seen in GM soybeans, even when the chemical residue data is within the Environmental Protection Agency (EPA) tolerance limits.4 Finally, the use of GMOs in agriculture brings to question the compromise of human safety because of wide Finally, the use of GMOs in agriculture brings to question the compromise of human safety because of wide reports of increased allergenicity after consumption of GM foods. For example, a protein was expressed in a crop used for animal feed in order to increase the content of the amino acid methionine. This protein was subsequently shown to be an allergen, as are a number of related [proteins of this type] from other species.5 Another example of the use of biotechnology introducing an allergen into a food product is the use of a Bt protein in GM maize, which also shows the general features of allergenic proteins.6 These are simply two examples of how the application of biotechnology can introduce allergens into crops. Since research is still just beginning on many GMOs, the allergenic effects of the use of biotechnology in agriculture remains unclear and under investigation. Antibiotic resistance is the ability of a bacterium or microorganism to withstand the use of an antibiotic because of its ability to synthesize a protein that neutralizes the antibiotic.7 While it is thought that the use of genetically engineered pesticides and herbicides on crops might only have the effect of reducing pests and weeds, it can actually have an opposing effect as well. The generation of superbugs and superweeds, pests and weeds resistant to the GM pesticides and herbicides, respectively, can result. Not only can the crops that are sprayed acquire these characteristics, but hybrid crops can arise when crops cross. This can cause resistance in crops that were not previously sprayed with GMOs, and can also cause multi-tolerant crops when two crops that are sprayed with different chemicals cross. The result of this second cross is a crop that is resistant to multiple herbicides (i.e., superweeds) or pesticides (i.e., superbugs), which are even more difficult to control. In addition, this resistance can give these weeds and bugs a selective advantage over the naturally-tolerant weeds and bugs, allowing them to propagate efficiently.5 5.0 Conclusions While there are many points both in favor and against the use of GMOs in agriculture, some people believe that the question simply comes down to whether or not it is ethical to engineer in agriculture, which has always been managed by farmers themselves in conjunction with local biological cycles and ecological balances. Activists against the use of technology worry about future generations, and how the use of biotechnology in agriculture now will affect food production in years to come. They raise concerns that regulations are too loose and poorly enforced, and the eventual effects of the use of GMOs remain unknown. In addition, important issues revolve around whether or not it is ethical for well-fed people of developed nations to regulate access to agricultural technology in developing nations. According to Dr. Altieri, because the true root cause of hunger is inequality, any method of boosting food production that deepens inequality will fail to reduce hunger. Conversely, only te chnologies that have positive effects on the distribution of wealth, income, and assets, that are pro-poor, can truly reduce hunger.1 Therefore, questions regarding the use of biotechnology in agriculture should better address the needs of poorer nations. Many people are still under-informed about potential benefits and negative effects of using GMOs in agriculture, and are therefore not ready to form an opinion on the issue. For this reason, there are many forums on the internet and published books to help interested people learn more. In addition, several documentaries present these issues, an example being The Future of Food, a documentary by Deborah Koons.9 The issues regarding the use of biotechnology in agriculture are important and affect everyone, and should not be overlooked. People in favor of the use of biotechnology in agriculture argue that it is unethical not to help poorer nations when more developed nations have the technology to do so. On the other hand, activists against the use of GMOs in agriculture maintain that more harm than good comes from the introduction of GMs into food production. How does Culture Affect Parenting Styles? How does Culture Affect Parenting Styles? A family is a set of intimate social relationships that adults create to share resources so as to ensure the welfare of themselves and their dependents (Robert and Lie 77); a family is also a unit that gradually molds a persons personality. How you behave and what you become in life are very much dependent on your family life (Importance). To this extent, families play crucial role for people in their lifetime, let alone for children whose social interaction begins at first between family members. Researchers have demonstrated time and time again that the environment in which children are raised significantly affects their intellectual, physical, social, and emotional development (Important). They further emphasize that those impacts on their childhood will probably be carried on even after they grow up and experience a lot of changes. For decades, researchers have also been interested in how parents influence their childrens development, and one approach in this area is the study of what has been termed as parenting style (Darling and Steinberg 493). This paper is a review of research studies on parenting styles within the ethnical (cultural) contexts. The idea of examining this field of study is partially derived from Chapter 2 (Culture), Chapter 7 (Race and Ethnicity) and Chapter 9 (Family) in the book named Sociology: The Points of the Compass, written by Robert Brym and John Lie. The whole paper is divided into several sections. First, it starts with the illustration of ethnical (cultural) aspects that differentiate families. It is then followed by the classification of parenting. The paper then focus on the influence of culture on parenting styles and finally provides a conclusion as a whole. Families Are Different Family define themselves as a family. Membership in a family can be decided only by each member of that family (Couchenour and Chrisman 22). Families differ from one another in many ways; ethnicity and culture are two crucial differences greatly impact on a familys beliefs, practices, and values (McGoldrick, Giordano and Garcia-Preto 1). Ethnicity Ethnicity is a shared concept and culture heritage by groups of people whose commonality are transmitted from their ancestors generation by generation (Couchenour and Chrisman 22). The identity of these ethnic groups is uniquely marked based on the combination of race, religion, traditions, and ancestors (Robert and Lie 302). They differ from others in terms of languages, foods, stories, customs, values, and other aspects. Families carry on their ethnicities through their own family traditions, celebrations, religions, stories, and entertainments (McGoldrick, Giordano and Garcia-Preto 14). The importance of ethnicity on each family varies (Couchenour and Chrisman 23). Culture Culture is the unique experiences of ethnic groups using languages, symbols, beliefs, values, ideologies, and material objects to deal with real-life problems (Robert and Lie 40). It acts to shape familys values, thoughts, reactions and socialization goals (Bigner 8). Therefore, the styles of communication between parents and children can be quite different among various cultures, which means what is considered to be an acceptable way of interaction in one culture could be very offensive in another cultural context. When parents are exposed to a dominant given culture with high frequency, they are affected by the norms and values of that culture (Keshavarz and Baharudin 67). Consequently, those culturally affected norms and values could easily serve as the guidelines for parents to interact with their children. In this sense, understanding the cultural context of the society can potentially help to predict differences parenting styles that predominate in that society and to understan d why these differences occur (Keshavarz and Baharudin 67). Trawick-Smith states, Only through a full understanding of parental beliefs, socialization practices, and family relationships, can the individual needs of individual children be well met (qtd. in Couchenour and Chrisman 25). The Classification of Parenting Styles The principal role of parenting involves the promotion of nurturing, balanced relationships or, contrastingly, the exacerbation of stress-prone, hostile exchanges between parents and children (qtd. in Keshavarz and Baharudin 67). Darling and Steinberg emphasize that parenting style is a constellation of attitudes towards the child that are communicated to the child and create an emotional climate in which the parents behaviors are expressed (493). Baumrind has investigated parenting styles in a series of studies and found three primary categories of parenting styles identified as authoritative, authoritarian and permissive (Reeves), which later on are conceptually expanded by with two linear constructs: responsiveness and demandingness (qtd. in Sonnek 8). Authoritative Parenting Referring to those studies conducted by Baumrind, authoritative parents are conscientious, consistent, warm secure in their ability to parent and unconditionally committed to their children (Reeves). On one hand, they state behavioral expectations to children; on the other hand, they respect their childrens opinions and independence; while setting high but realistic goals for their children, they also provide the necessary supports for them to achieve these goals. The authoritative parenting was found most effective in fostering social responsibility, sense of self-esteem, confidence and adaptability in their children to meet challenges of academic and other contexts where strong beliefs in ones abilities are required (Couchenour and Chrisman 94). Some researchers have examined the relationship between parenting style and childrens adjustment, and confirmed that authoritative parenting style is positively associated with healthy adjustment and reducing maladjustment than other styles of parenting (qtd. in Keshavarz and Baharudin 67). Authoritarian Parenting Authoritarian parents provide firm and high control over their children and require them to be very responsive to their demands; they are very punitive and affectively cold; they set firm goals to their children but allow little verbal exchange; compared with two other parenting styles, authoritarian parents are less likely to use gentle methods of persuasion (Reeves). To this extent, children have poor communication skills, and social incompetence; they are easily to become anxious while being compared with others. Studies on the relationship between parenting style and childrens adjustment have found that children of authoritarian parents tend to have low self-esteem and lack spontaneity (qtd. in Keshavarz and Baharudin 68). Permissive Parenting Characteristics of permissive parents are identified as warm, high nurturance, responsive but low in parental control and demand few maturity behaviors (Reeves). Permissive parents would like to allow their children to control their activities as their willingness. They expect little of children, and place few demands on them. This parenting style tends to be unsuccessful in enabling children to develop a range of self-directing abilities that underlie academic success (qtd. in Keshavarz and Baharudin 68). Researches later on split the permissive parenting style into a fourth category- indulgent and neglecting parenting, which most fits with its definition (qtd. in Sonnek 8). Cultural Influences on Parenting Styles In the nineteenth century, parenting experiences varied considerably by gender, age, social class, and culture, just as they do today (Baker 94). Individuals may consider parenthood as fulfilling a moral obligation (Bigner 9). Vygotsky indicates that human knowledge is rooted in culture (qtd. in Couchenour and Chrisman 8), which means what much of what children know derives from their families, such as, how to celebrate holidays; how to prepare, cook and eat foods; and how to behave properly in the public places. On many occasions, childrens behaviors of are mostly based on their parents expectations and demands. The values and ideals of a culture are transmitted to the next generation through child-rearing practices (Keshavarz and Baharudin 68). Therefore, children in different cultural contexts can be cultivated by their parents to behave differently; in this sense, it is necessary to take into consideration the importance of culture when evaluating parenting behaviors. Cultural models of individualism and collectivism can bring direct as well as indirect impacts on parenting behaviors (Keshavarz and Baharudin 68). Its direct influence on parenting behavior could be explained by passing on values of a culture to their children to become productive and integrated members of their culture (qtd. in Keshavarz and Baharudin 68); its indirect influences on parenting behavior are via more societal forces such as language patterns and customs, and economic structure indirectly (Health Canada 8). To this extent, parents can relate their parenting with those direct and indirect cultural effects. Individualism and collectivism refers to the manner in which people perceive themselves in relation to other members in the society (Brislin 23). Literally, individualism indicates independence. It includes the wide-spread and growing belief that people have the right to choose their own martial partners, to be happy in marriage, and to find new partners if their relationships turn out to be unsatisfactory (Baker 24). In contrast, collectivism implies interdependence. It includes the mutual emotions and beliefs shared by people as a result of living together (Robert and Lie 371). Robert and Lie further explain that collective actions include routine actions and non-routine ones, which take place when people act simultaneously in accordance with or opposition to external changes, such as social, political, economic, etc; their difference is that the former ones are typically nonviolent and follow established patterns of behavior in existing social structures, whereas the latter ones o ccur when usual conventions cease to guide social action and people transcend, bypass, or subvert established institutional pat ­terns and structures (371). In this sense, different family relationships, family interactions, self-concept, and academic achievement can be assumed via collectivism and individualism (Newman 51). Therefore, the arrangement of childrens activities differs from parents to parents with differing childrearing goals and cultural meaning systems (Keshavarz and Baharudin 67). Collectivism can be fully reflected by most Asian countries. Parents emphasize desirable traits such as interdependence, duty, sacrifice, compromise, conformity, highly involvement in one anothers lives, however, it does not mean a complete ignorance of individuals well-being or interest; it actually means that maintaining the familys well-being is ultimately the best guarantee for the individuals well-being (Newman 51). To this extent, authoritarian parenting may be more appropriate in those collectivistic societies compared with other parenting styles (Keshavarz and Baharudin 69). High levels of economic hardship have been greatly linked with authoritarian parenting and even neglecting parenting -a split of permissive parenting (qtd. in Sonnek 16). In sharp contrast, cultures like Western Europe, the United States, Canada, and Australia tend to value individual freedom, autonomy, personal development, and gratification over group obligation and duty (Newman 52); Newman emphasizes that childhood is sometimes regarded as the preparation for leaving home as the sign of independence, even those people who experience unwillingness and sadness at the thought of breaking these ties accept that it is a necessary step towards growing up (52). Therefore, it could be concluded that it is much more appropriate to examine parenting styles and their meanings in the cultural context (Bigner 9). In the conceptualization, culture is theorized to afford different meaning to behaviors (e.g., parenting) and has different effects on children and adolescents across different cultures (Keshavarz and Baharudin 69). For instance, in China, where I was born and brought up, proper and mild physical punishments are sometimes used by parents for controlling their children; they are considered as part of the authoritarian parenting; however, this parenting style is greatly opposed by many other cultures, and regarded unacceptable. Researchers mention that children will accept parenting behaviors which are consistent with cultural values (qtd.Keshavarz and Baharudin 69). For example, Chinese kids (including me when I was young) view spanking, which could be one of the physical punishment, as their parents concerns and affections on them in the Chinese culture. Conclusion Chapter 9 of Sociology: The Points of the Compass concludes that Parenting styles and behaviors perform a crucial role in the growth of children. Ethnicity, described in Chapter 7, is a socially constructed label which has profound consequences for peoples lives, and differentiates people by perceived physical or cultural differences (Robert and Lie 198); these cultural or ethnical differences can lead to different parental forms and behaviors in different social context; in other words, the ways that family members interact with each other are affected by the culture of the society, therefore, just as what has been examined in Chapter 2, what counts as good for raising children in one culture can be regarded as negative in another culture; to this extent, cultural and ethnical factors should be counted in order to better understand and examine parenting styles in different societies. Cri-Du-Chat Syndrome: Symptoms and Causes Cri-Du-Chat Syndrome: Symptoms and Causes Cri-Du-Chat Syndrome Introduction Cri-du-chat is an autosomal syndrome that is caused by a large or small deletion from a portion of the short arm of chromosome. This syndrome is also known as the 5p deletion syndrome where the P describes the short hand chromosome and Lejeunes syndrome. It is also called cat cry syndrome which is a French translation of Cri-du-chat, because of its similarity to the high pitched cat cry like sound a new born child makes. This sound is supposed to disappear a few weeks after birth and may or may not persists in to adulthood. In 1958 Dr. Jerome Lejeune discovered down syndrome. He discovered that the chromosomal link to down syndrome. This discovery was ground breaking for discoveries in genetics because it was the first time that an intellectual disability and a chromosomal defect were linked together and this earned him multiple prestigious awards. Up on continuing his research on chromosomal liked disorders, he also discovered that down syndrome was caused by an extra chromosome on pare 21 and he also noticed a deletion on the 5th chromosome which is the cause for Cri-du-chat syndrome. (1) Symptoms and OMIM Number Cri- du- chat The relationship of chromosomal alteration and genetic disease was observed that the main clinical feature was the high pitched cry and hindered mental capacity (Mainardi, 2006). The OMIM number for this syndrome is # 123450. The number sign is used to indicate that it is a well described partial aneusomy. Syndrome causes many phenotypical changes which depend on the size of the deletion. Some or all of the symptoms might be present in a patient. It has also been found that the deletion of the telomerase reverse transcriptase gene (TERT; 187270) well as evidence that deletion of the telomerase reverse transcriptase gene (TERT; 187270) is present which is also responsible for some of the phenotypical changes. (2) Besides the high pitched cry, Cri-du-chat is characterized by failure to thrive, broad nasal bridge, round moon shaped face with hypertelorism, Anisocoria, undersized jaw and heads , depleted motor senses hypertonia, small carpals, low birth weight and incomplete intestinal r otation in infants. There are some less distinctive symptoms such as separation of rectus and abdomen, cardiac abnormalities including atrial and ventricular septum defects, primary immunodeficiency, an epicanthal fold which covers the inner corned of the eye and inguinal hernia. (Chromosome 5, 2017).) Once the infant is born there is a low mortality rate until adulthood where most of the symptoms observed as a child continue on with addition of misalignment of teeth, skeletal problems, eye defects and in some cases neurological malformation, Syndactyly, undescended testis in male patients, and skin tags on the ear occur. (Mainardi, 2006,) Clinical causes of symptoms The syndrome is caused by a deletion of the short arm, which is also denoted by P, of chromosome 5. Chromosome 5 contains more than 900 genes that code for specific proteins such as interleukins, protocadherins and complement proteins. The function of these proteins range from regulation of immune system, nervous system controls and muscle formation and strength. The deletion of Some Sections of chromosome 5 such as 5p15.3, specifically at markers D5S731 and D5S760, are directly associated with the cat like cry and speech delay. Another region called 5p15.2, specifically CTNND2, is related to lower intellectual ability, and dysmorphism of head size and facial features. The severity of mental and motor capacities can depend up on the size of the chromosomal deletion (Chromosome 5, 2017). Although the affected family members apparently shared deletions of the same size, the variation in mental symptoms within this family suggested that other factors besides the size and location of 5p deletions may modify the mental presentation of patients with cri-du-chat syndromeThey suggested that a cranial developmental field, originating from the notochordal location, is involved in the manifestations of criduchat syndromehowever, the characteristic cat-like cry without the typical dysmorphic and severe developmental features of the syndrome has been found in individuals with a deletion confined to 5p15.3The cranial base angle was in most cases reduced and in no cases increased compared to age-related standards for normal individuals. Malformations in the bony contours of the sella turcica and the clivus occurred in cri-du-chat patients with terminal deletions. Frequency The frequency of the disease is 1:15000 to 1: 50000 of new born infants. Cri-du-chat makes up 1% of profoundly retarded patients who have IQ levels that are less than 30. Since it is a genetic deletion it doesnt have a preference as far as race nut it has a slight female dominance ratio of 4:3. This syndrome doesnt have a latency, the symptoms are present starting from birth and continue to show the symptoms in to adulthood. In most cases it has been seen that the symptoms become more severe in to adulthood. (Harvard et al., 2005, pp. 341-51). Inheritance pattern Cru de chat is not an inherited syndrome. It is a random deletion that occurs during meiosis and can occur without the parents being affected. However close to 10% of the affected individuals can inherit a chromosomal abnormality from unaffected parents. This abnormality is caused by chromosomal rearrangement called Balanced Translocation where the genetic material is still intact and doesnt cause any health problems. However when this trait is passed down from one or two parents it has a high chance of becoming and Unbalanced Translocation which can cause a genetic material to be added or deleted. In the case of cri du chat the short arm of chromosome 5 experiences a large or a small portion deletion which causes the syndrome. In some cases the catlike cry can be present without the physical abnormalities. This is more evident in the deletion at a specific location in the chromosome 5p15.3. Malformation in the cranial base was reduced and compared to a standard individual it doesnt show a major difference. However malformations in the contours the skull such as in Sella Turcica occur in patients that have terminal deletions. In one of the studies conducted with in the same family showed different symptoms and levels of mental retardation even though they shared the same size deletion. This suggests that not only the size but the location of deletion affects the severity of the syndrome (2) References Cerruti Mainardi, P. (2006). Cri du Chat syndrome. Orphanet Journal of Rare Diseases, 1, 33.  http://doi.org/10.1186/1750-1172-1-33 Chromosome 5. (2017, January 24). Retrieved January 29, 2017, from U.S National Library of  Medicine. U.S department of health human services website: https://ghr.nlm.nih.gov/chromosome/5 Chromosome 5. (2017, January 24). Retrieved January 29, 2017, from U.S National Library of  Medicine. U.S department of health human services website: https://ghr.nlm.nih.gov/condition/cri-du-chat-syndrome#genes Harvard, C., Malenfant, P., Koochek, M., Creighton, S., Mickelson, E., Holden, J. Rajcan-Separovic, E.  (2005). A variant Cri du Chat phenotype and autism spectrum disorder in a subject with de novo cryptic microdeletions involving 5p15.2 and 3p24.3-25 detected using whole genomic array CGH. Clinical Genetics, 67(4). http://dx.doi.org/10.1111/ j.1399-0004.2005.00406.x https://lejeuneusa.org/genetic-intellectual-disabilities/cri-du-chat-syndrome#.WJpP-n_Rs8c (1) http://www.omim.org/entry/123450?search=cri%20du%20chathighlight=du%20cri%20chat (2)