Saturday, August 31, 2019

Son of the Morning Star

Son of the Morning Star Analysis Evan S. Connell has a unique writing style. While most stories are told from beginning to end, Son of the Morning Star: Custer and The Little Bighorn (North Point Press, 1984) begins with the aftermath of The Battle of the Little Bighorn. It is then followed by numerous events which led up to this battle. Connell chose this non-linear writing style in order to distribute the details he finds most fascinating and interesting to share with his audience. Using the conclusion of the battle as the introduction of the narrative creates a suspenseful tone.In the beginning of the story, the setting is the battle field which The Battle of the Little Bighorn had taken place a few days earlier. Lieutenant James Bradley has led his troops to the land where they discover the corpses of which they believe are General George Armstrong Custer’s troops. Custer himself was nowhere in sight. Even after a reward was offered upon his retrieval he could not be found . The deserted battle field raised questions and the men began to imagine what had happened days prior to their arrival.The author writes, â€Å"While discussing the day’s events around a campfire most infantrymen predicted more unpleasant news†¦Ã¢â‚¬  (pg. 3) The troops discovered a woman who was present during the battle and described to them what she had witnessed. The woman’s recollection of her experience opens up the story to a chronicle of the events which happened during the battle. The reader is given details regarding to Custer’s entrance and also each opponent’s fighting style: â€Å"Instead, Reno’s men dismounted and formed a skirmish line. Then they began to retreat. They ran very fast, she said, dropping guns and cartridges.She was disgusted by the conduct of these whites, saying they must have been seized with panic worse than that which seized her own people. † (pg. 7) As the plot approaches its conclusion, the reader is taken back to the aftermath of the battle and receives a tale told by a Cheyenne woman named Kate Bighead. She delivered a short story about the corpses she saw laying on the battlefield, one in particular she identified as General Custer: She said two Southern Cheyenne women were at the Little Bighorn and when the fighting ended they went to the battlefield.They saw Custer. They knew him well†¦they recognized him even though his hair was short and face was dirty. (pg. 422) Although the plot of this story does not have a chronological structure, it develops a more personal connection because the characters in the story are directly speaking to the audience as they give their personal accounts on the battle. For example, it had already been said that Reno was dead; however, an outburst made by Reno himself is mentioned shortly after. â€Å"The major was swigging at a flask when DeRudio splashed by. What are you trying to do? ’ Reno asked. ‘Drown me before I am k illed? ’† (pg. 50) Evan S. Connell’s work, Son of the Morning Star is an extraordinary and captivating narrative. He has an acquiring mind and was not afraid to step away from the traditional form of writing. Behind the chaos there is meaning. The writing style presented in this story is untraditional which could possibly lose the attention of the reader; however, this was a valid decision. ? Based on its cover the reader might think that the entire story is about General Custer and his troops.Despite expectations, the audience actually catches a glimpse of both the lives of Custer as well as his opponents. The author gives the reader a little information on the background of Crazy Horse, formerly known as Curly. â€Å"Curly did not reveal this manifestation to anybody until he was sixteen and ready to become a warrior†¦Except for moccasins and breechcloth he rode naked. † (pg. 67) The author also gives the reader the opportunity to read a few journal entries about Crazy Horse. These entries come from the diary of Jesse Lee, â€Å"Saturday, Sept. th, 1877. Everything is quiet and I think will remain so. Crazy Horse’s body was brought to this agency and put on a little platform, Indian fashion, on the hill overlooking the post, not half a mile away. † (pg. 75) He also includes a background on Chief Gall as well, providing facts about his birthplace and family. For example, he writes, â€Å"He was not a hereditary chief. The family seems to have been undistinguished, and because his father died at an early age the boy was regarded more with sympathy than respect.So it appears that not through any legacy did he become a chieftain†¦Ã¢â‚¬  (pg. 376) Throughout the story, the audience develops an idea of the motives of the Native Americans during the battle. The reader becomes aware of what Sitting Bull was thinking: If Sitting Bull did indeed call off the attack it was not because of any affection for whites, who , he hated with abiding and impenetrable rancor, but because he understood how vindictive they could be. If all the soldiers were slaughtered the whites would insist upon another battle†¦ (pg. 6) The audience was not only given an idea of what they were thinking before the battle. The author also makes a point to include a song that the Indians wrote after they had defeated General Custer and his men, â€Å"At that time the Indians did not realized they had fought Custer†¦when they found out, they sang about him. David Humphreys Miller transcribed one such kill-song†¦Ã¢â‚¬  (pg. 54) With the erudition given in the story, the reader concludes that the Native American leaders were fully developed human beings. Connell includes information regarding Chief Crazy Horse’s smart battle technique.For example, there are quotations given from a journalist: At critical moments Crazy Horse would dismount before shooting: â€Å"He is the only Indian I ever knew who did t hat often†¦he didn’t like to start a battle unless he had it all planned out in his head and knew he was going to win. (pg. 63) Chief Gall was compared to other great leaders and his leadership skills are described by his people including Lieutenant Godfrey, â€Å"He perceived Gall as a man of tremendous character natural ability, and great common sense, a chief whose massive physiognomy reminded him of Daniel Webster. (pg. 375) The comments made about these two leaders in particular demonstrate their equality of humanity compared to Custer’s men. Not only does he give details about the lives of the Native Americans but Connell also gives insight on the lives of those who fought with General Custer. The reader is given an idea of the reputation and trial of Benteen. For example, â€Å"In this, that Major Frederick W. Benteen, Ninth Calvary when in command of the Post of Fort Du Chesne, Utah, was found drunk†¦Specifications 2nd, 3rd, 4th, 5th and 6th were id entical, only the dates changed. (pg. 34) The reader also gathers information about Major Marcus Reno regarding his leadership and his behavior thus similar to that of Benteen’s. â€Å"Reno got demerits easily, almost deliberately†¦Ã¢â‚¬  (pg. 40) He also writes, â€Å"At least it failed to mollify the exasperated colonel because Reno found himself saddled with another charge†¦Ã¢â‚¬  (pg. 45) Although a great deal of this piece is devoted to the lives and motives of the Native Americans, the author also takes time to write about Custer’s men as well.Including battle experience as well as family history, Connell captures the importance of The Battle of the Little Bighorn. Throughout the non-linear story, the reader is taken back and forth between stories about Custer’s challengers and his troops. The author’s objectivity is apparent because the reader is given the opportunity to capture the battle from both perspectives. ? Before The Battle o f the Little Bighorn, General Custer had celebrated many victories; however, this battle ended in tragedy.Unaware of what caused the downfall at Little Bighorn, many have speculated possible causes of Custer’s defeat. These possibilities include Custer’s sanity, his confidence and other stereotypes. In the story, Connell’s collection of stories told by Sioux woman and other survivors give the reader ideas of what might have been the cause of this disastrous downfall. When looking back on the battle a discussion between an Indian and General H. L. Scott reveals a possible cause of this defeat.For example, Connell writes: During subsequent conversations Feather Earring emphasized that if Custer had approached diplomatically the Indians would have gone back to the reservations†¦General Scott observed that such a method of dealing with the hostiles had not occurred to anybody. (pg. 414) Shortly after this discussion more information about Custer’s skewed communication with the Indians is unveiled. If this miscommunication had never occurred the battle would have been avoided altogether.A Sioux chief gives his recollection on the events occurring prior to the battle: He asked Custer to promise that he would not fight the Sioux. Custer promised†¦After we got through talking, he soon left the agency, and we soon heard that he was fighting the Indians and that he and all his men were killed. If Custer had given us time we would have gone out ahead of him, but he did not give us time. If we had gone out ahead of Custer he would not have lost himself not would his men have been killed. (pg. 415) The attack had been approved by his officers, however, there had been some objections.Some of his troops did not believe the plan was logical but Custer’s confidence does appear to take over his mentality. He ignores a suggestion made by Gibbon, â€Å"Custer, instead of proceeding at once into the valley of the Little Big Horn, even should the trail lead there, should continue on up the Rosebud, get closer to the mountains†¦Ã¢â‚¬  (pg. 255-256) Losing touch with reality Custer continues to explain his plan to attack, â€Å"the combined forces would count coup on Sitting Bull, Crazy Horse, Gall†¦and all the rest† (pg. 56) Custer’s plan includes a victory rather than an alternative in case of any misfortune, he left no room for the unexpected. Although Custer’s plan seemed a little unrealistic his stubbornness was not the only thing to lead to the downfall at Little Bighorn. Many troops give their comments regarding Major Reno’s choice of leadership, â€Å"several military analysts believe Reno should have stayed there instead of doing what he did. They point out that his battalion so near the village would have engaged a great many warriors, thus allowing Custer’s plan to unfold. † (pg. ) It is also mentioned that Reno had an altercation with one of the Indian s which he encountered, â€Å"Reno misunderstood a figure of speech, taking I as an insult, and threatened to shoot High Bear-who responded by drawing a knife. Another scout, invoking Custer’s name, jumped between them and managed to prevent a bloody settlement. † (pg. 10) Not only was Reno’s lack of intuition a cause of defeat but it is also possible that his belligerent temperament lead to Custer’s labefaction. After analyzing the attitudes and actions of Custer and his troops, the reader can infer many causes that led to this disastrous defeat.Based on the strategic analysts’ comments, Reno could have used better instincts when leading his men into battle. It is possible that if the major would have had stronger intuition Custer’s men would not have suffered as much as they did. The reader can conclude that there was a sense of overconfidence made not only by Major Reno but Custer as well; however, if Custer had kept his promise to Sioux the entire battle could have been avoided. Custer and his five companies certainly underestimated their Native American opponents.

Friday, August 30, 2019

Classification of Epithelial Tissue

Classification of Epithelial Tissue Location of Epithelium The four basic tissue types in the body are the epithelial, connective, muscular, and nervous tissue. These tissues exist and function in close association with one another. The epithelial tissue, or epithelium, consists of sheets of cells that cover the external surfaces of the body, line the internal cavities, form various organs and glands, and line their ducts. Epithelial cells are in contact with each other, either in a single layer or multiple layers. The structure of lining epithelium, however, differs from organ to organ, depending on its location and function.For example, epithelium that covers the outer surfaces of the body and serves as a protective layer differs from the epithelium that lines the internal organs. The overview illustration shows different types of epithelia in selected organs. Classification of Epithelium Epithelium is classified according to the number of cell layers and the morphology or structur e of the surface cells. A basement membrane is a thin, noncellular region that separates the epithelium from the underlying connective tissue. This membrane is easily seen with a light microscope.An epithelium with a single layer of cells is simple, and that with numerous cell layers is stratified. A pseudostratified epithelium consists of a single layer of cells that attach to a basement membrane, but not all cells reach the surface. An epithelium with flat surface cells is called squamous. When the surface cells are round, or as tall as they are wide, the epithelium is cuboidal. When the cells are taller than they are wide, the epithelium is called columnar. Epithelium is nonvascular, that is, it does not have blood vessels.Oxygen, nutrients, and metabolites diffuse from the blood vessels located in the underlying connective tissue to the epithelium. Special Surface Modifications on Epithelial Cells Epithelial cells in different organs exhibit special cell membrane modifications o n their apical orupper surfaces. These modifications are cilia, stereocilia, or microvilli. Cilia are motile structures found on certain cells in the uterine tubes, uterus, and conducting tubes of the respiratory system. Microvilli are small, nonmotile projections that cover ll absorptive cells in the small intestine and proximal convoluted tubules in the kidney. Stereocilia are long, nonmotile, branched microvilli that cover the cells in the epididymis and vas deferens. The function of microvilli and stereocilia is absorption. Types of Epithelia Simple Epithelium Simple squamous epithelium that covers the external surfaces of the digestive organs, lungs, and heart is called mesothelium. Simple squamous epithelium that covers the lumina of the heart chambers, blood vessles, and lymphatic vessels is called endothelium.

United States Bill of Rights and American Sporting Tradition

Gun Control Gun control would not help crime or murder rates because instead it disarms the law abiding citizens, therefore putting them at a disadvantage in defending there selves against criminals. The second amendment states that citizens have the right to bear arms. Guns have also been an American sporting tradition for years, and have saved many lives from rapist, murders and innocent civilians from the hands of criminals. The second amendment is part of the constitution and is something that should never be taken away, and can’t be taken away.The amendment says that â€Å"A well-regulated Militia, being necessary to the security of a free state, the right of the people to keep and bear Arms, shall not be infringed. † The first 10 amendments to our Constitution protect our most basic rights from being stripped away by an overly zealous government, including rights that all Americans hold dear. The United States Bill of Rights plays a central role in American law an d government, and remains a fundamental symbol of the freedoms and culture of the nation.One of the original fourteen copies of the U. S. Bill of Rights is on public display at the National Archives in Washington, D. C. This amendment and right give us the citizens a chance to defend ourselves from danger from not only criminals but also a foreign attack. A shooting sport is a competitive sport involving tests of proficiency (accuracy and speed) using various types of guns such as firearms and air guns. Hunting is also a shooting sport, and indeed shooting live pigeons was an Olympic event only once, in 1900.The shooting sports are categorized by the type of firearm, target and distances at which targets are shot at. Shooting sports have been a part of the Games since Baron Pierre de Coubertin brought us the first modern Olympiad in 1896. It was one of the first nine events held at the first Olympic Games along with track and field, Cycling, Fencing, Gymnastics, Swimming, Tennis, We ightlifting, and Wrestling. Guns have been a huge part of American history since the Olympics started in 1896.Guns have been used for many years not only to defend our country but also defend ourselves in the event of being attacked by a criminal. If the availability of guns is the major reason for the murder of people, why isn’t it that when the rate of gun sales go up the murder rate doesn’t go up as well? The answer is simple guns don’t kill people, people kill people. Imagine if the 10,000+ victims had guns of their own. That statistic could have shockingly stayed the same, just with different victims: the criminals.Americans tend to believe that guns are easily obtained, when in reality federals laws already passed make it impossible for criminals to legally obtain a weapon. Gun sales have gone through the roof since president Obama took office yet in terms of violent crime, the United States is safer today than it was 20 years ago. Violent crimes will cont inue to exist with or without stricter gun control. Guns will always be obtained by criminals if they want to get their hands on one, and making stricter gun control laws will only make civilians defenseless against these criminals.Taking the right to bear arms away will not save lives it will only cause more violence and since criminals don't follow the laws in the first place more laws would only hinder law abiding people not the criminals; they will still get any type of gun they want because the all mighty dollar is king. Even if we outlawed all guns criminals would still have them smuggled into the country just like drugs. The only thing that would accomplish would be law abiding people would be defenseless and the criminals would rule.

Thursday, August 29, 2019

Inscriptive Restorations Essay Example | Topics and Well Written Essays - 250 words

Inscriptive Restorations - Essay Example According to Trethewey, societal aspects that most individuals consider insignificant and take for granted are the ones that stand out as motivators of her passion. Trethewey uses Sontag quotes to demonstrate that photography is a cruel practice. She explains the ordeal poets experience to search for substance from their lives and pain of other peoples lives During the interview, Natasha recalls her grandmother as her role model and inspiration to her life (Trethewey and Petty 1024). She hails women for playing a role in adding influencing the passion and dedication in her work as a poet. Natasha further reveals that her life revolved around traditional setting where she lived with chicken. Nevertheless, she also counts herself as a modern woman who lived by the highway 49. Natasha also makes it known that she is an independent woman. It is noteworthy that, during the entire interview, Natasha fails to address the plight of blacks who are the major victims in the photographic environments. One of the issues standing out clearly from the essay is racial segregation. Rowell talks about black people who stand in isolation as white people take their photographss. In addition, Natasha also claims that three the black people’s gauzes, she is able to realize the attachment she has with them. The second thing that stands out in the essay is support and inspiration. Natasha recalls the role that her grandmother played in shaping her career and making her a responsible woman in the society. Finally, modernity versus tradition is another aspect that stands out in the essay. Trethewey recounts that she belong to â€Å"old timely.† She makes claims that she belong to a community that to date still plays marbles that contained pig rooting, particularly under house. Trethewey memorizes how she lived in a society where people still kept cattle in their yards and

Wednesday, August 28, 2019

Seagram building Essay Example | Topics and Well Written Essays - 2500 words

Seagram building - Essay Example The design of the building was given by Ludwig Mies van der Rohe who came to America from Germany (Whiffen and Koeper, 1984). The mythic ideals of German efficiency and clean cut German design are certainly evident from the way the building is structured yet the overall mix of the faà §ade of the building does not make it stick out like a sore thumb amongst the other buildings which surround it. The design also takes its cues from the American architect Philip Johnson who worked on the building from the time it was started in 1954 to the time it was completed in 1958. The building contains 38 floors and the exterior represents a fine example of post modern architecture that focuses on corporate seriousness and hints of gothic styling (Muschamp, 1999). The initial purpose of the building was to serve as corporate headquarters and the primary offices for Seagram’s & Sons but with time other offices and companies have established their bases in the building as well. While it would be interesting to study how the tenants of the building have changed with time, for our purposes, it is perhaps more important to study the architecture and the art of the building. The building faces Park Avenue over a broad plaza of Vermont granite which is lined by water pools on both sides that have ledges of marble that has been given an antique look (Whiffen and Koeper, 1984). The architecture of the tower itself is based on the steel structure that holds the building together with walls of pink-gray glass that give the building a distinctive look. The second element, which helps in creating the now classic look for the building, come from the bronze that has been used to make the various spandrels and I-beams which are visible on the exterior of the building (Muschamp, 1999). Discussing the building in the context of its surroundings Speyer (1968) says that: â€Å"The inescapable drama of

Tuesday, August 27, 2019

LAB REPORT Example | Topics and Well Written Essays - 750 words

Lab Report Example The ultimate intention is to determine the polarity of these molecules based on the relative electro-negativities of the atoms relating to the molecular hence stating whether a molecule is either polar or nonpolar. It has been generally known that a non-polar solvent will often dissolve a nonpolar molecule but not a polar molecule. It is therefore to a large extent, necessary to understand the theory behind the polarity of a molecule. This information will be critical in making of prudent decisions in certain chemical practices such as extractions and separations. This report therefore practically looks at the various steps taken to concluding on the polarity of certain molecules. Prominently used in the procedure is the VPESR theory. The VPESR theory seeks to predict molecular shapes of compounds from their Lewis structure since the molecular formulas have no direct relationship to the shape of molecules. According to the VSEPR theory the molecule will take up the geometry so as to minimize valence electron repulsion in the central atom of the molecule. In addition, the presence of lone pairs and the number of valence electrons majorly influence this geometry. There are various geometries which a molecule can adopt. These include; linear, trigonal planar, tetrahedral, trigonal pyramidal and octahedral geometries. After the molecular shape has been obtained the polarity of a molecule can be predicted based on the presence of polar bonds. A bond is polar or non-polar based on the electro-negativities of the atoms in the bond. The greater the difference in electro-negativities the more polar the bond. The atom with a greater electro -negativity tends to pull the shared electrons towards themselves, hence giving them a partial negative charge and leaves the adjacent atom with a partial positive charge, thus polarity. The symbol for a dipole moment of a polar bond is -|-- > with

Monday, August 26, 2019

No topic Essay Example | Topics and Well Written Essays - 250 words - 65

No topic - Essay Example Again Susan urgently needs to acquire the property to expand the university. The best alternative (BATNA) that he has is to sell it to the property to the private developer. His reserved price (RP) is approximately $19.7 million. This figure is arrived at by considering the cost of rebuilding property with same features, in the same location. Susan is mainly interested in acquiring a property to expand the university. As such, the property that Fr. John is selling is appropriate for the expansion due to its vicinity. Her main source of power is that she is aware that Fr. John is selling the property and that the school is suffering financial predicaments. Her best alternative would be to build her own premises should Fr. John sell the premises at the price equal to putting a new structure. Her recommended price is below $19.7 million as the amount would be enough to put up a new structure with similar features. Her target would basically to acquire the property at a lower price than that of putting a new

Sunday, August 25, 2019

Everyday Use by Alice Walker Research Paper Example | Topics and Well Written Essays - 1000 words

Everyday Use by Alice Walker - Research Paper Example Alice Walker, the author of this story is considered to be a highly acclaimed writer of the contemporary black women lives. Walker reflects upon the Southern life of Black people as a result of white oppression, need for self-respect and for their survival (Hedges & Wendt 25). For Dee the blacks’ world is a more optimistic and Americanized version which compels her to change her name from Dee to Wangero to represent her African identity. There is a twist in the tale when the readers learn that this was not Mama’s intention. She merely wanted her to gain excellent education and keep her away from her younger child Maggie whom she felt would not be able to cope with Dee because of an earlier accident which physically damaged Maggie. As Dee returns home on vacation she brings with her a boyfriend who has a Muslim origin who does not eat pork. His name is Hakim which Mama fails to pronounce well. Dee is fascinated with her home’s interior as well as the outlook as sh e admires the preserving of heritage to Mama’s great surprise because at first she was least inclined towards such minor details. Dee and Maggie are shown contrasting with each other in many ways. While Maggie is shy, Dee is bold and outspoken. Maggie is ashamed of her scars that she got from house fire. Being always at home near Mama, Maggie learnt the worth of African American heritage. ... She wishes to keep the quilt which disturbs Maggie and infuriates Mama (Whitsitt 445). However when Maggie insists that Dee keep the quilt Mama takes it away from her and returns it to Maggie. For Dee this is the most conservative outlook towards life and this can be understood when she says: â€Å"â€Å"But they're priceless!" she was saying now, furiously; for she has a temper. "Maggie would put them on the bed and in five years they'd be in rags. Less than that!†Ã¢â‚¬  (Walker 2009) For Mama this is altogether a strange experience seeing Dee talk about heritage and family values the way she does now. She strongly regrets sending Dee away for education because she believes it has shattered the family ties. She is much satisfied to keep Maggie at home because she has at least received the traditional upbringing with black community’s values deep ingrained. The quilt is a controversial figure in the story because its very existence is considered to be literal by many critics while Walker might have a different purpose in mind. She may be drawing an analogy between storytelling and quilting. â€Å"Quilt is a trope whose analogue (the quilt itself) provides the stitch that untropes the trope; it is a trope stitched to a reality...† (Whitsitt 447). The tightness of the stitching is indicative of the fact that the community or an individual is strongly and tightly knitted. Walker explores the â€Å"limits of art and the authentic† as she narrates the relationship between Mama, Maggie and Dee. According to critics, Dee is not only narrated out of the story but also from the sisterhood which is observed between Mama and Maggie. This, however, shuts the other possibility of keeping Dee in play. There is a sense of longing at the beginning of the story which reminds the

Saturday, August 24, 2019

Problems with Android phones Essay Example | Topics and Well Written Essays - 500 words

Problems with Android phones - Essay Example Various problems come with Android phones. One problem that needs immediate solution is forceclose, which is when an application running on Android phones stops abruptly. This is the root concept of this problem. It has problems with data storage and transmission. When the forceclose error is experienced, in most cases, data is lost. Therefore, it needs to be solved immediately. Various issues are being discussed in various forums. One of the forums that are commonly used and popular with many programmers is xda-developers.com. The stakeholders in this forum are the programmers of Android phones. The vision of the forum is to ensure that Android phones are popular and meet the client’s requirements. This forum is common with programming issues that are experienced with Android phones. Most problems that are raised in this forum need programming solutions. One common issue here is forceclose, and from the discussions, it seems to be a common problem that needs immediate solution. It is something that can affect the marketing of the product, and there is a need to work on it immediately. Another forum is that of Adnroidcentral.com. This forum deals with issues that can be solved. The common errors that are raised in this forum are those that can be solved without necessarily engaging programming procedures (Martin and Hoover). The xa-developers.com deals with programming issues. Most stakeholders are those that make use of Android phones in data collection. The data collection brings with it these problems. Android forums are mostly programmers who work on a freelance basis. They give solutions to the problems that are posted in the forum. The artifact analysis of the stakeholders is that the users of the forums give step-by-step solutions to the problems that are sent.  Most contributors also have programming skills that help them to solve the issues  (DoCoMo).  

Friday, August 23, 2019

Compliance and Coding Management 1 Assignment Example | Topics and Well Written Essays - 1500 words

Compliance and Coding Management 1 - Assignment Example The current staff of the hospital includes: coders in the HIM department for coding inpatient services; a front office employee phone answering, helping the person who walks in without having an appointment, retrieving and filing the records of the health departments of hospitals; the CFO who does various jobs which includes organizing budgets, organizing accounts, evaluating operational outcomes, and making income tax returns; nursing staff; hospital charge master coordinator who is just enjoying the position and get the information of hospital through phone call while staying at home. Basis of clinical database in hospital is produced by the coded data. Several departments of the clinics and hospitals use the abstracted information that is gathered for every patient. For instance, for clinical analysis, improvement in services of the hospital as well as usage of the provided services the department of quality management uses such information daily. A database produced by gathering of financial and clinical data is called a decision support system. Such systems render important data regarding the business of hospital in both financial and clinical conditions. For instance, information could be collected in order to compare the actual money spent and the hospital service charges cost. This information is further utilized by the financial for forecasting and budgeting. Persons with insurance contracts could use this financial and clinical data to discuss contract’s payment. Therefore, the use of codes for decision support provides helpful information regarding the business of the organization in both financial and clinical. This coding process can provide help to the coders that are in the department of health information management (HIM) and enables them to do their jobs with the essential information for exact coding. In the give scenario there are only threes, therefore the manager of the HIM department

Thursday, August 22, 2019

The Question of Reality (Metaphysics) Assignment

The Question of Reality (Metaphysics) - Assignment Example Indeed, many religions resort to the concept of faith in arguing that their particular version of reality is the accurate and true version. Through an examination of cosmogony and determinism, this essay explores my personal understanding of the nature of reality; namely, I believe that the origin of the universe cannot be explained through merely physical phenomenon and that we are ultimately living in a universe subject to determinism. This personal conception of the nature of reality suffers from many of the same problems that religion does, namely that it cannot unarguably be proven through the scientific method and rational discourse; nevertheless, through reason and understanding, I believe that this is the most accurate interpretation into the question of reality. With Edwin Hubble’s 1929 discovery of a red shift in the universe the theory that the universe was expanding emerged and slowly took hold in the scientific community. (Coles 2001) By the time of discovery of cosmic background radiation occurred in 1965 by Arno Penzias and Robert Woodrow Wilson at the Crawford Hill location of Bell Telephone Laboratories, the majority of scientific thought recognized that what humanity understands as the universe originally emanated from a big bang type explosion that has seen expanded, and continues to expand, into what we know as the universe today. For many individuals, this constitutes the ultimate nature of reality, but I believe that this doesn’t go far enough in explaining existence. While most scientific research acknowledges there was a big bang type explosion (Dodelson 2003), I believe that there must have been an impulse that originally started the universe. I lack the scientific background required to speak on a complex and s ophisticated level on the subject, yet I believe knowledge of the ultimate reality is not a question that can be articulated through contemporary linguistic or scientific devices.  

Fringe benefit plans Essay Example for Free

Fringe benefit plans Essay What, really, are fringe benefits? Fringe benefits are a significant share of a workers total compensation package, which has grown over time (Flynn, 2000). They are of two types: One type of fringe benefit is the spreading of an employee’s pay, which was earned while working, over periods when the employee does not work. The other type of fringe benefit includes all sorts of things which became substituted for money pay, which the employee may spend for things of his or her own choice. Instead of getting one’s entire money wage, the employee may get some of it in the form of specified goods or presumed services. All sorts of things become substituted for money pay. They range all the way from better toilet facilities in the plant to golf courses for members of the families of employees perhaps even help in building a church of some denomination in the community. It may be more company picnics, or a Christmas party, or insurance of one sort or another, or a pension for old age all sorts of things. Retirement pensions, even though all workers may be covered by a basic age-related state pension, the vast majority of firms operate an occupational pension scheme for their employees to which the firm contributes. In spite of the onus for pension provision shifting towards the individual in a number of countries, including the UK, company pension schemes remain a substantial and widespread fringe benefit. Other benefits include redundancy payments and discounts on company products and the use of company cars. Sometimes these fringe benefits are the result of employee pressure, either through the union or without any union. But often they are initiated by management; a company plan is put into effect. However they come about, fringe benefits of this type have one aspect in common. Smith (2003) has asserted that in each instance its cost comes out of the money due the employee as pay. Fringe benefits are not just a demand of last resort by men living in a society which already supplies them with almost everything they need. They satisfy some fundamental human needs which, but for conservatism on both sides of industry, would probably have become matters for the bargaining table long before now. Fringe benefit plans increase the benefits available to employees through provision of such benefits as better pensions, year-end bonuses, paid vacations, sick leave, and holidays and an air-conditioned working place, in addition to the employees’ basic salary. In some instances, profit-sharing agreements are also included, as well as store discount privileges of workers. At this stage, the desire for security and continuity of income may well have become as great, or greater, than the desire to raise income. Thus the social logic of fringe benefits in an advanced society. When it comes to health insurance and pensions, fringe benefits help compensate for myopia in an individuals consumption decisions. High marginal tax rates, for both firms and workers, encourage the use of fringe benefits. As workers have become better off in real terms this has increased their demand for fringe benefits. Fringe benefits conferred tax advantages on both workers and firms. In theory it was possible to determine the optimum combination of wages and fringe benefits in relation to the firms desire for profits. A substantial proportion of the average workers costs to his employer are in the form of fringe benefits. As far as private fringe benefits are concerned, large firms are able to obtain group discounts and larger numbers of employees ensure lower per-worker costs of administration. Often fringe benefits are taxed at relatively low rates, if at all. This creates strong incentives for the firm and its employees to increase the proportion of fringe benefits within total compensation. Further, taxation coverage is rather incomplete at the employee level owing to technical difficulties in taxing individual fringe benefits and because welfare income is relatively small. Fringe benefits also have an advantage to the employers not just because the benefits were tax deductible but also because they reduced turnover and thereby boosted productivity. Also, the use fringe benefits improved the overall morale of the employees. The social equation was working. WORKS CITED Flynn, B. (2000). Fringe Benefits. New Statesman, 129 (4499), 32. Smith, S. (2003). Labour Economics. (2nd Ed. ). London: Routledge.

Wednesday, August 21, 2019

Differences Between Economic Growth And Development

Differences Between Economic Growth And Development Introduction From a traditional economic perspective, development may be viewed as economic growth related to the rise in GDP, per capita income and infrastructural adjustments in the economy relative to population changes. However, in a simpler and more refined view, development may be taken to mean the improvement in quality of life of the population through poverty eradication, reduction of inequality, reduction of unemployment and demographic control measures. The traditional view on development focused more on the trickle down effect of wealth to the masses in to influence the real per capita GNP which was assumed to grow at a higher rate than the growth in population. Primarily, the trickle down effect involved creation of employment opportunities and enhancement of distribution of economic and social benefits through planned structures of production and employment. The current view on economic development has been focusing more on poverty eradication through establishment and achievement of development goals that may include reduction in disease, illiteracy, unemployment and social/economic inequality. Moreover, many institutions actively involved in enhancing global economic development, including the World Bank, United Nations, World Food Program, world Health organization and International Monetary Fund among others have come up with development goals whose core values may include ensuring everybody is able to sustain basic needs, enhancing societyà ¢Ã¢â€š ¬Ã¢â€ž ¢s self esteem and enhancing freedom from servitude. Despite these efforts, the gap between the developed and the developing countries and the issue of inequality in distribution of wealth are still evident. Moreover, a lot is expected to be achieved through the millennium development goals of 2015 which encompass eradication of poverty, enhancing universal education, enhancing gender equality, enhancing child and maternal health, combating HIV/Aids, ensuring total environmental sustainability and enhancing global partnership. However, these efforts are being hampered by the financial crisis, food crisis, political crisis and climate change, all of which have tended to be the mainstay in the contemporary world. This paper will discuss the subject of economic development and its impact to the contemporary society. Historical view of development The classical economic theorists clam that economic development involved the growth in total output relative to the growth in population and changes in per capita income on real GNP of an economy. Although they focused on elimination of poverty as the main goal of economic development, they based such an agenda on the wealth creation and distribution through division of labor and capital concentration in competitive capitalist environment (Cypher and Dietz, 2004, pp. 109-110). Although the difference in economic development between the poor and the rich nations may be attributed to the earlier years of slavery and colonialism, the asymmetrical growth in population as compared to food production may be one undoing factor in decelerating economic development. According to Cypher and Dietz (2009, p. 114), Malthus, a classical economists, posited that population did tend to increase at a geometric progression while food production/output increased at an arithmetic progression which indicated that there was overuse in the fertile land under cultivation and the subsequent surge in population would more than worsen the disreputability of the limited food reserves. In their view, economic development would be achieved through distribution of economic wealth to the people with an aim of enhancing the social well-being since the society was divided into haves and have-nots (Willis, 2005, p. 63). Modern Economic development view Generally, economic development is taken to mean the measure of the level of social-economic welfare of the people in a national economy. The current focus on economic development has been the sustainability of the social welfare through poverty eradication, eliminating unemployment and eliminating inequality. In a more broader sense, there may be a buffer between economic growth and economic development in that, while economic growth will measure the rate at which the GNP and per capita income are changing, the latter may be realized with or without economic growth and it involves social and structural changes such as demographics, environmental sustainability, political relations, literacy levels, social diversity and health. According to Hoff and Stigliz (2001, p. 391), the government ands markets as the determinants of economic development coupled with institutions, wealth distribution and historical ideologies, all of which have affected the developmental patterns in the world economies especially in the developing nations. While the institutions influence the direction of transaction costs in the economy, wealth distribution impacts on the economic efficiency and thus creating influence on the developmental adjustments in the economy. Mookherjee and Ray (2001, p. 118) view that wealth distribution affects saving, investment, and production structures thus influencing occupational choices and institutional adjustments that tend to explain the difference between the developed and developing economies. Measuring economic development As a measure of socio-economic welfare, economic development aims at achieving various objectives which include availing and distributing human basic commodities, improving the standards of living through provision of social amenities and job creation, and aligning the social and economic choices available to the society. In the contemporary economic environment, the gap between the poor and developed nations has remained to widen, despite the developing nations having a higher economic growth rate in the recent years. However, the globalization of trade has enhanced economic development especially through reorganization and reorientation of economic and social systems as well as improvement in household incomes and economic output (Todaro, 2009, p. 68). The attainment of millennium development goals according to United Nations (2009) provides a clear measure of economic development in the world economies. Despite the deadline being 2015, there has been developmental progress especially in areas related to literacy, gender equality, primary health care, global partnership and environmental sustainability. However, the HIV/Aids remains to be one of the stubbing blocks on development especially in Africa where poverty is much higher than in other parts of the world. Barriers to economic development The economic crisis (as experienced recently), the food crisis, adverse climatic changes and political warfare (civil strife and external sanctions) have remained to be the hindrances to the attainment of the economic development (World Bank, 2009). For instance, the globalization effect has led to environmental degradation and pollution resulting to interference with climatic changes that have created threat to food production (Meier and Stiglitz, 2001, 170). In addition, recently witnessed financial meltdown may slow down the realization of developmental goals due to its effect on investment patterns and interference with wealth distribution. Conclusion Economic development may be differentiated from economic growth due to the difference in measures and effects to the society. For a nation to experience economic development there must be structural adjustments that focus on the attainment of human wellbeing. Sound economic policies should be available to ensure that all the fundamentals that influence economic development are addressed fully and comprehensively.

Tuesday, August 20, 2019

Positive and Negative Publicity Strategies

Positive and Negative Publicity Strategies In todays world, image and reputation of a business is critically significant than past due to increased market competition and also, with developed technologies, the consumers can be more easily evaluate to particular brand of product or organization. Therefore, it is essential that businesses and organizations have understanding of the effective and strategy public relation for healthy and positive new development. Successful public relation can be give to organization as a good image, and thus publicity is significant role in terms of successful public relation. Because, publicity can be helps gain public awareness and build relationship between products and consumers. The publicity can be defined in many interpretations. Yet, according to Yale (1991:2), publicity involves supplying information that is factual, interesting, and newsworthy to media not controlled by you, such as radio, television, magazines, newspapers, and trade journals. It can be both positive and negative to ones business or organization and thus, it is significant to be aware of what strategies can support to either improve as a positive or reduce a negative way, rather than just simply analysis how they are addressed. Due to organization crises frequently result in negative publicity, threatening the image of the company, the company should have an effective tactics for reduce the impact (Dean, 2004). Furthermore, organization need to try achieve positive publicity for enhance their healthy image and reputation for a successful within market competition. As a result, crisis management is mostly important tactic, which could be positive publicity or an overcome in a negative wa y, and once overcome in a negative way; publicity has essentially support public relation endeavors. In this essay will look at both in positive and negative publicity and explain the strategies which can assist both. Also, it will examine two cases (Johnson Johnson and Toyota) of negative publicity, how they reacted to reduce impacts and which crises management can be support. Strategic positive publicity tips Positive publicity is a main issue when organizing new event or product because it allows to company send a message out to wider audience in effective way, rather than reach the message personally. In a further extend, it is normally acknowledged to be more credible and more influential than company-controlled communications (Wragg, 1981). In this sense, therefore, it is vital to know which strategies can be support to maintain positive publicity. Firstly, organization has to become familiar with the wide range of publicity tools available with them (Wragg, 1981). It can be feature articles, news releases, interviews, press conferences and special events. Besides, these days people more familiar with online sources such as online news reports, blog posts, Facebook updates, YouTube videos and Twitter entries. For instance, good news may spread to wider audience via online sources and its may potentially create healthy public image (Lawrence, 2010). Therefore, select effective publicity tool is most important point that can be achieve positive publicity. In addition, the media can be an effective publicity tool if it is used correct for building healthy image between an organization and the community. As noted by Wragg (1981:17), the media is one of the main avenuesà ¢Ã¢â€š ¬Ã‚ ¦value of the media in influencing or bringing a message to the notice of the greatest number of people in the shortest time. With developed technologies, most of consumers are able to interact with at least one source of media tool and thus, using effective media is opportunities organization to communicate with consumers. For instance, consumer may evaluate what the organization say and what they do via growth of media. Secondly, organization needs to develop making a publicity plan for presenting their message to the public via the media. As mentioned by Yale (1991:13), with a good publicity planning will help the organizations come out ahead in the competition for space in publications and air time. In a further extend, the organizations can get a lot of coverage for free if it is done correctly and sent to targeted media (Yale, 1991). Effective publicity plan can be including as determine goal of event or product and also decide what message send to public. It may create public awareness that the event or product, build a stronger reputation within ones community or simply to introduce organization to the media and public (Hashemi, 2008). After knowing organizations goal, it enables to determine right target audiences which deliver the message to people who will be interest the message (Hashemi, 2008). Therefore, effective publicity plan is most important strategic for maintain positive publicity , and its lead to good image of ones business. As a result positive publicity can be establish and maintain goodwill and mutual understanding between organization and its publics (Hasek, 2001). In other words, effective publicity supports public relation as successfully. Make lower and prevent negative publicity Look at the reality; it is really obvious, that one little mistake, rumor or gossip can make a serious damage ones business image even though the company is a market leader. This can be regarded as negative publicity. According to Parvesh (2007), negative publicity is the adverse publicity that an organization may incur due to a particular reason, which may lead to potentially disastrous consequences. Like this, negative publicity has the possible to injury corporate image and reputation. this is due to its high credibility as well as the negativity effect, a tendency for negative information to be weighted more than positive information in the evaluation of people, objects, and ideas (Mizerski, 1982 cited by Dean, 2004:193. Because the media has a preference for reporting bad news (Dennis Merrill, 1996), thus companies are more likely to receive bad press rather than positive press. Furthermore, blog, online forum and talk radio and uncontrolled media, it is easier than past, to da mage organization image and reputation (Jenness, 2002). Therefore, It is compulsory know that how to organization can diminish the negative publicity, and get better their image in the public. According to Jenness (2002),negative publicity can be the result of a mishandled crisis. In a further extend, negative publicity is often occurs due to wrong response from the crisis. Perrier, for example, Perrier was unable to overcome negative publicity when top management hesitated in the crisis-solved process. Traces of benzene were found in the companys bottled water in 1990, however top management reassured the public that it was necessary to recall contaminated bottles only in North America. The crisis continued when scientists found benzene in bottled water being sold in Europe (Broom, Center Cutlip, 2000:128). Finally, media discovered, and reported, that benzene-tainted product had been sold all over the world for months. The media questioned Perriers integrity and concern for public safety, and the company lost its dominant position in the market place; it has been unable to rebuild its reputation due to mishandled the crisis (Jenness,2002). This may suggest that effectiv e crisis management is necessary for a reduce damage organization image or reputation. Effective crisis management can be regarded as careful planning, research and training, which can be overcome negative publicity. As Perrier crisis publicity suggests that, consumers need honest answer and they need them fast. Therefore, the company should have good crisis planning for deal with negative publicity. The plan can be include recall the all the products and make an apology to public. Moreover, Berger, Sorensen and Rasmussen (2003:23) suggest that dedicate a team to keep a sharp eye on all fronts, including the Internet which involves blog, online forum and search engine ranking. This can be excellent strategy for prevent from negative publicity. For instance, negative movie review on the magazine or online forum, it may badly influence to the movie itself and also production company, because it leads to lose consumers attention and also possibly to decrease sale a movie ticket. Like this, company need keep look at any comments or developments that might turn ugly. Although it can never be all-encompassing, its better to be aware of possibilities than being caught unawares (Berger et al, 2003:32). Develop Optimal Communication Plan In addition, it is necessary develop optimal communication strategy for reduce negative publicity. For reduce negative publicity, the company may training about how to communicate with the media press and the public about the crisis that is happening. As noted by Dean (2004) has developed a classification of communication strategies that can be employed during a crisis event to manage the image of the affected organization. The company need well prepared communication plan for interview or presentation that open communicate with public in order to protect organization image by negative publicity. In addition, communicate in web-site or informal networking can be useful tool for present information as effectively. Word-of-mouth, for example, it can be powerful tool for positive publicity or negative publicity, yet generally assumes that negative word-of-mouth should hurt product success (Berger et al, 2003:26). Therefore, the company need develop word-of mouth communication in order t o quash rumor or gossip and make consumers more aware or encourage the product or event. As a result, careful planning, research, and training can lessen negative publicity and can assist companies control crises. Is Negative Publicity Can being a Good Thing? On the other side, according to Berger et al (2003:33), though negative publicity can definitely hurt sales in some cases, in others, negative may actually be positive. In a further extend, even though negative publicity can be damage organization image or reputation, it may occurs positive effect in some case if the negative image can assist to increase public attention, overwhelming the negative influences . It suggests that, because negative publicity can increase product awareness and accessibility; it can sometimes have a positive influence on product choice and sales (Berger et al, 2007:3). Due to number of brands are in market place, it is important that get a consumers awareness in order to successful business. Informal media or word-of-mouth, for instance, even though they are presents the products or event as badly, consumers may more inform of their particular product or event. Moreover, Berge (1990:25) mentioned that a wine described as redolent of stinky socks, saw its s ales increase by five percentages after it was reviewed by a prominent wine website. Also, indirect negative publicity can be positive in terms of sales. For example, when Britney Spears represented as issue maker via media, such as hit to paparazzi, over binge problem, her new album Circus actually more increased sales, because the articles also mentioned her new album, and thus direct positive publicity (Berger et al, 2007:15). Like this, these examples show that negative publicity can be a good thing in some case. In addition, after effectively overcome and control the negative organization image and reputation, the organization can regain the consumers trust. In other words, after found lots of problems from the public, as negative publicity, the organization may use them as feedback in order to rebuild their positive image. It may take a long time, however, with resolved negative image, the organization potentially get a public attention. Two cases of organization crisis As a mentioned above, when organization crisis and its damage by negative publicity, It is important figure out what actually happened, how the negative publicity that affect the organization and how to manage in order to solve the crisis. In this part will look at two different examples, Johnson Johnson of Tylenol and Toyota Recall, which used different ways to manage the emergency situations and have different public opinions. Johnson Johnson of Tylenol Scandal In 1981, Chicago, U.S.A, seven customers who took Tylenol died of injected poison. In this tragedy, Johnson Johnson lost their image as market leader and also huge damage corporate reputation. This suggests that they might have had no choice without to give up the brand of Tylenol. Tylenol was the top-selling product by Johnson Johnson. Yet, after the crisis, according to Kaplan (1998), the publicity about the cyanide laced capsules directly caused a nationwide panic and also the company found itself in a real dilemma. Also, many people said that Tylenol as a brand could no longer survive in market place. Moreover, the media interpreted the issue as badly. Therefore, these poisonings made it compulsory for Johnson Johnson to launch a public relations strategy immediately, in order to save the reliability of both their product and corporation as a whole (Kaplan,1998). Toyota Recall Crisis Toyota was play a dominant role in the developing automatic in the world, with high-quality and high technology lead to Toyotas high credit in market place. They are reached the best seller between within all vehicles company, and also build good reputation during last 40 years (Edmund, 2010). It suggests that Toyota be covered in media as positively, and its lead to maintain their good image for a long period. Though, recently the negative publicity around the Toyota company as fast and quick due to acceleration problem. Toyota got a lot of complains about the acceleration and they eventually has recalled eight million vehicles worldwide, including a total of six million in the U.S., because of acceleration problems. Consumers may keep away from Toyota brand because they might be thinking that Toyota is not safe and reliable anymore. Like this, the company suffers from the very serious credit crisis, as noted by Horrel (2010), the long-term loss of reputation could be the real knock out punch for Toyota. After that, it seriously damaged Toyotas high-quality image in the public. Different reaction between Johnson Johnson and Toyota The first different between two companies is how honestly they react from the crisis. According to Dean (2004), Johnson Johnson handled a disastrous crisis amazingly well in 1982 and the companys reaction remains as a model for effective media relations. They let customers know about this awful incident via the media instead of concealing the fact. Contrary, even though Toyota already found the problem early time, they denial for the reputation and conceal the problem, which do not take any responsibility of the issue. Therefore, the public view began to turn away from Toyota (Horrel, 2010). In addition, another different point between two companies is that how actively the take action toward the crisis. After cyanide was discovered in some capsules of Tylenol, a product used by an estimated 100 million people, Johnson Johnson decided to cooperate fully with the media. It immediately announced a recall of all Tylenol packages in both U.S. and foreign markets. They decide not use the all the recalled products even though after results proved that there was no problem in the manufacturing procedure (Kaplan, 1998). However, even Toyota recalled a mounts of vehicles in 2009, the problem still existing and recall increased occurs. Eventually, on January, 2010, Toyota decide stop to producing the recalled model. Their reputation gets serious damage at the same time. The last thing which different between two companies is that lack of sincerity to customers. Tylenol put lots of endeavor into regain trust of the public. The companys decisions, which were based on the business principle of being socially responsible, earned Johnson Johnson praise from the media. According to Dean (2004:197) the company received additional positive press coverage when it subsequently introduced its new tamper-resistant packaging. Although not being able to control media coverage of the situation, Johnson Johnson was able to gain positive publicity because the company had an open communication plan and knew what to do during a crisis (Kaplan, 1998). Therefore, Johnson Johnson got a good image, which involves the company considers customers safety, and quickly recovered their reputation in an effective way. On the other side, Toyota still struggling with the crisis and respond to lessen impact with the CEOs apologies to the public, the purpose is reducing the negat ive publicity as much as possible. Yet, it seems to be hard to rebuild their reputation as before. As like, determination that a firms actions or inactions are directly responsible for a tragic event is likely to severely affect consumer regard for the organization (Dean, 2004:201). As a result, two cases show that crisis can be huge damage to organization image, yet, with well-organized strategy, the crisis could be solved and rebuild the positive reputation. To conclude, publicity can be assist organization image and reputation either as positively or as negatively. Therefore, it is important to understand the strategies that can be employed to assist both. By understanding of them, the organization can be maintain positive publicity for develop their healthy image, on the other side; they also enable to make lower negative publicity in order to reduce and prevent organization image. As mentioned above, two cases (Johnson Johnson and Toyota) shows that how the negative publicity has affected the organization in terms of image and reputation. Especially, when organization is in a crisis, it would be help to rebuild good image if they using publicity as effectively. As a result, publicity has essentially supported public relations endeavors, because publicity allows achieving public awareness and building relationship between products and consumers. Therefore, once organization uses positive strategies in order to gain a good image, it ca n be actually supported public relation in effective way.

Monday, August 19, 2019

An Attempt At Understanding Dreams Essay -- essays research papers

An Attempt At Understanding Dreams   Ã‚  Ã‚  Ã‚  Ã‚  A few months ago I watched a movie called â€Å"The Candyman†. It was a horror movie about this psychotic woman who massacres people around her but has no idea what she's doing. An imaginary creature called â€Å"The Candyman† is appearing to her and talking to her, and she actually thinks that he's the one who is doing the murdering. Anyway, it was a scary movie and I had a bit of fun freaking out my mother that night by telling her that â€Å"The Candyman† will appear to her in her dreams (although I didn't think about the consequences if he really appeared to her and she killed all of us while we were sleeping!). Fortunately for my mother (and the rest of us), she didn't dream about him that night. A few weeks later, I did, though! However, I didn't get very scared in my dream because thanks to a certain technique that I developed a few years ago, I can somehow avoid any dangers in my dreams by knowing that I'm dreaming and that nothing bad can happen to me. This helped me in a lot of annoying dreams before because when I'm in trouble I sometimes just â€Å"fly away† in certain situations in the dream or I just ignore it and tell the bad guy that he can't hurt me because I know it's just a dream. I have no idea until today how I'm able to do that, but it really makes me wonder. I also don't know why I had that dream a few weeks after the movie and not the same night I watched it, especially that I had completely forgotten about it until the night of the dream, at least consciously. Anyway, I decided to use the chance of having to write a paper for Psychology 201 and I almost instantly knew that I was going to explore the world of dreams and the process of dreaming. Before I go any further though, I think I know from the start that no matter how much material I gather or people I interview, I will not be able to explain the process of dreaming because I believe that it is so complex and mysterious that no man can claim to really understand it. The maximum that I wish to achieve is just to admire this incredible phenomenon and to at least try to clarify some of the little details surrounding it.   Ã‚  Ã‚  Ã‚  Ã‚  Some questions come to my mind immediately when I think about dreams: What causes dreams? Does everybody dream? Do dreams have significant meanings in reality? Why do some dreams seem so weird and out of ... ...echnology. The main problem is the great diversity of the issue and the difficulty of conducting physical experiments and analysis on such a phenomenon. It is a phenomenon that defies the laws of physics and society, and the limits of dreams are stretched as far as the human imagination goes. The best we can do is to give limited explanations that we think might work with us, but the true secrets of dreaming will never be uncovered. We can just share our dreams and try to understand some events that happen to dreamers all around the world, which makes us appreciate dreams more and more. Works Cited Abdel Hamid, Ranya, 22 yrs., Mechanical Engineering major at State University. Aristotle, â€Å"On Dreams†, 350 B.C. Atkinson, Rita L., â€Å"Introduction To Psychology†, 1993. Dreams Interpretation Services & Resources, â€Å"http://www1.rider.edu/~ ~suler/dreams.html†, 1996. Farrag, Mariam, 20 yrs., Political Science major at State University. Ghaleb, Teymour, 23 yrs., Marketing Analyst at Daewoo Co. Hassan, Farouk, Dr., Practicing Psychiatrist. Rafik, Nadine, 17 yrs., student at State University. Shawky, Safinaz, 21 yrs., Economics major at State University.

Sunday, August 18, 2019

Holy Zion A Study of Ethiopianism in Rastafarianism with a Focus on the

Holy Zion A Study of Ethiopianism in Rastafarianism with a Focus on the Concept Of Ethiopia as Zion Open your eyes and look within Are you satisfied with the life you're living? We know where we're going; We know where we're from We're leaving Babylon, we're going to our fatherland (Marley "Exodus" 5). In 1977, Bob Marley's lyrics reflected the ideology of Rastafarianism, defined by the New Dictionary of Religions as, "A variety of dynamic movements in Jamaica . . . since the 1930s among the poor landless men, inspired by Marcus Garvey’s Back to Africa movement and the accession of Ras Tafari as emperor of Ethiopia" (Rastafarian). But the Rastafarians are much more than "poor landless men". They are an oppressed people who in the1930s found themselves in a hopeless situation. It was this hopeless situation that readied the minds and hearts of the Rastafarians to look beyond their lives in Jamaica. They began to look to a new life and a new world by the name of Ethiopia. The concept of Ethiopia as Zion, a destined homeland for all Black people, soon took hold of the Rastafarians so much so that it became the basis for their religion, Ethiopianism. According to one source, "It is the Rastafari movements, with its origins in Jamaica, that Ethiopianism has been most consistently elaborated for nearly seven decades" (Dread History). Ethiopianism, and specifically the belief in Ethiopia as Zion, was so accepted by the Rastafarians because it offered a sense of dignity and hope in an otherwise hopeless economic and social climate. Jamaica 1930 was not the picture of peaceful jungles and calm sunsets that we see in travel agents’ brochures. Jamaica 1930 was a time of economic, social, and natural disaster. As L... ...ove. http://www.webcom.com/nattyreb/rastafari/everlasting.html Jamaicans Of Ethiopian Origin And The Rastafarian Faith. http://web.syr.edu/~affellem/napti.html. Marley, Bob. Exodus. 1977. ---. Survival. 1979. Mutabaruka. Check It. 1983. ---. Outcry. 1984. ---. The Ultimate Collection. 1996. Mutabaruka Web Site. http://www.ireggae.com/muta.htm. The Rastafarian Religion. http://www.aspects.net/~nick/religion.htm Rastafarian. http://ucl.broward.cc.fl.us/pathfinders/rastafa.htm. Rastafarianism. http://www.ritesofpassage.org/g-rasta.htm Redington, Norman. A Sketch Of Rastafari History. St. Pachomius Orthodox Library, 1995. Sandford, Christine. The Lion of Judah. Philadelphia: Macmillian, 1955. Who Was Marcus Garvey? http://www.rockol.it/rockol/reggae/MarcusGa.htm. Zach, Paul. Insight Guides: Jamaica. Boston: Houghton Mifflin, 1995.

Saturday, August 17, 2019

Materials For Torque And Aluminium Engineering Essay

Modern vehicles with constituents made of aluminum can be 24 % lighter than one with steel, which besides allows fuel ingestion to be reduced by 2 liters per 100 kilometers. Besides the above mentioned facts, aluminum is besides corrosion opposition ( Aluminium Leader 2011 ) . Engineering applications are germinating quickly, enabling new constituent designs, for burden bearing and fabrication systems. Modern stuffs include fibre complexs, proficient ceramics, technology polymers and high temperature metal metals ( Ashby et al. , 1985 ) . The vehicle interior decorator must be cognizant of these developments and be able to choose the right stuff for a given application, equilibrating belongingss with processing, utilizing a basic apprehension of the structural inter-relationships. Metallic elements and Alloies: Metallic elements are non copiously available, therefore, can merely be used for specializer applications such as catalytic convertors and powerful lasting magnets. However, metals such as Fe, Cu and aluminum, which are copiously available and can be easy extracted are widely used in both, pure every bit good as alloy signifier ( Cottrell, 1985 ) . At present, loosely used and cheapest stuffs are Iron-based or ferric metals. Mild or low C steel is adequately strong with output strengths changing between 220 and 300 MPa for low burden uses. Further, it is easy to cut, flex, machine and dyer's rocket. High output strength is required for drive shafts and gear wheels due to higher tonss. Therefore, medium C, high C or metal steels, ( yield strengths of 400 MPa ) are used for these intents. Higher strength and wear opposition are needed for bearing surfaces. For such parts, medium and high C steels, hardened by heat intervention and extinction ( increases the output strengths to about 1000 MPa ) , are used. Unfortunately, these hardened steels become brickle following this heat intervention, so that a farther mild re-heating, called annealing, is required. This reduces the crispness whilst keeping most of the strength and hardness. Stainless steel steels are alloys with a assortment of signifiers, viz. , Austenitic, Ferritic, Martensitic and the newer Duplex steels. A common composing contains: Chromium – 18 % nickel – 8 % ( BS 970, 1991 ) Their corrosion opposition and creep opposition is superior to kick C steels, peculiarly at high temperatures, nevertheless, higher stuff and fabrication costs limit their usage in vehicle technology to specialist applications such as longer life exhaust systems. Cast chainss have 2 to 4 % C, in contrast to the 1 % or less for other ferric metals mentioned supra. This makes them brittle, with hapless impact belongingss, unless heat-treated to bring forth malleable Fe. Since the higher C content reduces the thaw point, it makes pouring into complex shaped molds much easier, hence, it is more readily project than steel. The C in the signifier of black lead makes an ideal boundary lubricator, so that cylinders and Pistons have good wear features, for usage in Diesel engines. However, it is now mostly replaced by the much lighter aluminum alloys for these applications in gasoline engines. Copper is besides used in vehicle technology. It is more expensive than steel, but is malleable and can be easy shaped. Due to its high electrical conduction, it is used in wiring and telegraphing systems. Brass is a Cu metal, normally with 35 % Zn, which makes it easier to machine yet stronger than pure Cu. This helps bring forthing complex forms for electrical adjustments. However, such metals suffer from a long term job, known as & A ; acirc ; ˆ?dezincification & A ; acirc ; ˆâ„ ¢ , in H2O. Corrosion can be minimized by utilizing the more expensive Cu metal, bronze, where Sn is the debasing component, although this stuff may be harder to machine. Copper-nickel metals have good weirdo opposition at high temperatures where they are besides corrosion resistant. The latter belongings is made usage of in brake fluid pipe-work. Aluminum and its metals have a major advantage over steels and Cu alloys, as vehicle technology stuffs. As mentioned above, their much lower densenesss lead to take down weight constituents and attendant fuel energy nest eggs. Whilst aluminum ores are abundant, the extraction of pure aluminum is really energy demanding, being electro-chemical in nature instead than the purely chemical procedure used for steels. Copper occupies an intermediate place on this point. Thus, pure aluminum is more expensive than Fe and Cu and has lower characteristic strength and stiffness. However, it does hold corrosion opposition with good thermal and electrical conduction. A broad scope of metals is now available with assorted heat interventions and fabricating chances. These stuffs have now replaced steels and Cu metals in many vehicle constituent applications, where their higher stuffs costs can be designed out, see Figure 4.1. However, stuffs developments are such that aluminum metals are themselves in competition with polymers and composite stuffs for such applications as vehicle body-work, see Figure 4.2. A composite stuff is a combination of two stuffs, with its ain typical belongingss. Its strength or other desirable quality is better or really different from either of its constituents working entirely. The chief attractive force of composite stuffs is that they are lighter, stiffer and stronger than most other structural stuffs. They were developed to run into the terrible demands of supersonic flight, infinite geographic expedition and deep H2O applications but are now used in general technology including automotive applications. Composite stuffs imitate nature. Wood is a complex of cellulose and lignin ; cellulose fibers are strong in tenseness but flexible and lignin Acts of the Apostless to cement the fibers together to make a stuff with stiffness. Man-made complexs achieve similar consequences by uniting strong fibers such as C or glass, in a softer matrix such as epoxy or polyester rosin. Considerable monetary value fluctuations in stuffs occur from clip to clip due to fuel monetary value fluctuations so that the cost values should be considered in comparative footings. The choice of a metal for a design application requires experimental informations. The first phase will find which group of metals should be used, steels, Cu or aluminum ( see Table 4.1 ) . Then a specific choice will necessitate more elaborate information. Testing of stuffs and constituents will hence be required. Some belongingss are mostly independent of composing, microstructure and processing. These include denseness, modulus, thermic enlargement and specific heat. However, many belongingss are really dependent on metal composing, microstructure, heat- intervention and mechanical history. These belongingss include output and tensile strength, ductileness, break stamina, weirdo and fatigue strength, so that specific information is required ( Smith, 1993 ) .

Friday, August 16, 2019

Critical Issues Concerning Deforestation and Its Environmental Effects

Over half of the worlds† forests have already been destroyed if the rate of deforestation is not reduced, the forests will suffer even more damage. Imagine this; every minute twenty-six hectares (estimated) of the forest are destroyed, this is equal to thirty-seven football fields. The forest is not only the home to some of the most important species on earth, but it also helps control the climate and makes the planet able for us to live in. The expanding human population has cleared many of the trees, once covering much of the earth, a long time ago. Agriculture took a toll early of the landscape, and now the once great forests are reduced to tiny pockets scattered throughout the earth. Recently is when the tropical forests have become under severe attack of deforestation. Only seven hundred of the original one and a half billion hectares of the rain forest remain. At the turn of the twentieth century there was twice as much rain forest as there is today. Causes of deforestation include; commercial logging, clearance for agriculture, roads and railways, forest fires, mining and drilling, fuelwood, and clearing land for living are just some of the main reasons, of which we have not found the worst culprit. The two most common found reasons for deforestation are shifting cultivation and commercial logging. The problem starts when the soil becomes less fertile from animals grazing and walking repeatedly over the small land space. This not the threat to the forest however, the threat is when the land is not allowed enough time to recover and causes soil degradation. Felling of trees for charcoal, and clearing trees for mining and the extraction of oil are other factors leading to deforestation, but are not considered as damaging as shifting cultivation and commercial logging. Nonetheless they are still a threat to the existence of the rain forest. When trees are cleared the topsoil erodes in just one decade, of which it took thousands of years to accumulate. The land is now unusable and can lead to disastrous flooding since there is no soil to soak up the rain. The most disastrous effect of deforestation is the effect it has on the earth†s climate. The greenhouse effect and global warming is caused by the build-up of carbon dioxide in the atmosphere mainly. The amount of carbon dioxide would be greatly affected by the destruction of the rain forest; this would lead to a build up in the atmosphere and in result would increase climate change. Most of the burnt or rotting trees release even more carbon dioxide. Scientists believe that only a small fraction of the plants and animals that live in the rain forests have been identified, and of these are believed to hold the cures for some of the most deadly diseases, such as cancer and aids. An obvious solution would be for us to quit cutting down trees altogether, but there is no way we could do that. Forest management plans are being used all over the world, putting sustainability as the emphasis. These plans allow logging to take place by putting into the earth what we take out. These plans are carried out so that logging can be done with the least enduring effects taking place to the earth. Some parts of the rain forests, which are labeled as too sensitive for even well managed logging, are restricted as protected areas. These protected areas along with the help of enforced legislation, can be an effective defense against the many problems that affect the rain forests. The most important step in stopping the process of deforestation is to inform and educate the people whose actions either directly or indirectly create a problem for the rain forests. Developed countries and their consumers have to realize the devastating impacts on the forests from which the products cause that they buy. By doing this will be the only way we can stop the deforestation process and maybe eventually reverse it and the rain forests will flourish.

Conference Management

Abstract This project aims to create a common platform for organizing activities of conference. The conference management system will manage the abstracts and research papers submitted by scholars, reviewing them, and accepting or rejecting them. This will greatly reduce the costs and efforts of the conference managers and authors where they can directly interact through internet. Currently there is a need for such a conference management system, where research conferences relating to different fields can be managed by single application. This application can host any number of conferences and large number of paper can be submitted.The environment created would enhance the usability of conference’s thereby facilitating the researcher’s to submit their papers easily and making organizers to manage the research’s by forwarding it to the jury and taking their reviews. This would reduce a lot of effort. It would also eliminate the need to have expertise on employing people for managing all such activities. It would smooth the progress of conference management and all the activities will take place in well-defined manner. Table of Contents Page No. RecommendationI Dissertation Approval Sheet II Candidate DeclarationIIIAcknowledgementIV AbstractV Chapter 1 Introduction 1. 1 Overview and issues involved01 1. 2 Problem definition 01 1. 3Problem Solution 01 Chapter-2 Literature Survey 2. 1 Methodology 03 2. 2 Technologies and tools 04 Chapter-3 Requirements gathering 3. 1 Software requirements 08 3. 2 Hardware requirements 98 3. 3 Use case model 10 Chapter-4 Analysis 4. 1 Sequence diagrams 18 4. 2 Activity diagrams 22 Chapter-5 Design 5. 1 Technology selection 25 5. 2 Database design 28 5. 3 Implementation details Chapter-6 Testing 6. 1Test case and design30 6. 2Testing methods and strategies31Conclusion 37 Bibliography38 Chapter-1 Introduction This conference management tool aims at improving the conference management practices and reduces the burd en on the part of organizers, and provides the technical solution for the research paper submission and reviews. 1. 1 Overview and Issues Involved There are large numbers of conferences being taking place at different locations all over the world, we have seen researchers and eminent educationist submit their research papers at these conferences, they generally have to send the research paper through post and it takes a lot of time.This project is focused towards developing a management system that will cater to the needs of the conference organizers. 1. 2 Problem Definition In the present scenario, the conference organizers face a lot of problems in coordinating various activities that are associated with conference. This increases a lot of effort and needs a lot of expertise and large numbers of people are required to manage all the process. This definitely is not an easy task. There is a lot of trouble involved in submitting a research paper to a conference and then sending it to a jury, for review and their comments.To speed up this process of conference management was our main focus in this project. 1. 3 Problem Solution This project will be a fine demonstration of efficient use of technology and engineering in the web- application development field. This will cut down the organizing and maintenance cost of conference’s and will also reduce the efforts of author to send their research papers through post. This is done through creation of a conference management application that would assist the organizers to run their conference effectively.Our software product ‘conference management system’ is designed and developed to provide the rigid solution for the handling of conferences. We have designed an interface that will provide the platform for the researchers and educationist to submit their research papers online and it will be forwarded to jury for their review and comments. The system will help the user’s to create new confere nce by providing the information of the conference and the request will be forwarded to the administrator for validation.The administrator can accept or reject the conference request and he will have to authority to delete the author if he is found doing illegal activity on the system. The chair of the conference will add the program committee members to review the papers submitted in that conference. The chair can check the details of the paper submitted in the conference installed by him. The program committee member will be reviewing the conference for which he is selected by the chair to review the conference. The program committee can download the research paper for reading it so it can be reviewed in a better manner. . 1 Methodology To operate this software in a best possible way, the user should have some knowledge of accessing internet and navigating the internet through any browser. He should be aware of how conferences are hosted and the working of organization that hostâ €™s the conference i. e. from submitting of paper, forwarding it to the jury, and then finalizing selected research papers. 1 System Interfaces As our system is completely an independent system in itself thus it does not require any external API or any interface for interaction with any other system.It only interacts with the administrator and author’s, but not with any other software component. 2 Interfaces Our system will interact with the user only through the well defined graphical user interface. Client server architecture will be required for supporting the application. Client Server Architecture A server is anything that has some resource that can be shared. There are Computer servers, which provide computing power; print servers, which manage a collection of printers; disk servers, which provide networked disk space; and web servers, which store web pages.A client is simply any other entity that wants to gain access to a particular server. The interaction between client and server is just like the interaction between a lamp and an electrical socket. The power grid of the house is the server, and the lamp is a power client. The server is a permanently available resource, while the client is free to â€Å"unplug† after it is has been served. [pic] Fig 2. 1 Client-Server Architecture 2. 2 Technologies and Tools NetBeans NetBeans refer to both a platform framework for java desktop applications,and an integrated development environment(IDE).The NetBeans IDE is written in Java and can run anywhere a compatible JVM is installed, including Windows, Mac OS, Linux, etc. The NetBeans platform allows application to be developed from a set of modular software components called modules. The NetBeans Platform is a reusable framework for simplifying the development of Java Swing desktop applications. Among the features of the platform are: †¢ User interface management (e. g. menus, toolbars) †¢ User settings management †¢ Storage manag ement (saving and loading any kind of data) †¢ Window management Wizard framework (supports step-by-step dialogs) †¢ NetBeans Visual Library †¢ Integrated development Tools Adobe Dreamweaver Adobe Dreamweaver is the industry-leading web authoring and editing software that provides both visual and code-level capabilities for creating standards-based websites and designs for the desktop, smart phones, tablets, and other devices. It is a site building and publishing tool appropriate for intermediate to advanced users that allows you to create graphical interface and built-in advanced design and coding features.It enables use of basic JavaScript without any coding knowledge. Integrating features of Adobe Dreamweaver are amazing; it integrates with Adobe’s Spry Ajax framework and that makes an easy access to dynamically-generated content and interfaces. Adobe Dreamweaver is also integrated with Adobe Flash Professional, Fireworks, Photoshop Extended; this lessens th e amount of stages for making projects. Adobe Dreamweaver supports leading web development technologies such as HTML, XHTML, CSS, XML, JavaScript, Ajax, PHP, Adobe ColdFusion software, which make designing and development really magical.Powerful CSS tools do not need separate utilities, and reduce the need to manually edit CSS code in designing and developing websites. Adobe Dreamweaver is the best application for extension developers and web designers who design and put up websites. MySQL Mysql is a relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. The SQL phrase stands for Structured Query Language. Free-software-open source projects that require a full-featured database management system often use MySQL.For commercial use, several paid editions are available, and offer additional functionality. Uses MySQL is a popular choice of database for use in web applications, and is a central component of the widely use d LAMP web application software stack—LAMP is an acronym for â€Å"Linux, Apache, MySQL and Perl/PHP/Python†. MySQL is used in some of the most frequently visited web sites on the Internet, including Flickr. com, Nokia. com, YouTube and as previously mentioned, Wikipedia, Google and Facebook. Glass Fish Server: Glassfish is an open source application server project led by Sun Microsystems for the Java EE platform.The proprietary version is called Sun GlassFish Enterprise Server. Glassfish is free software. The latest version of GlassFish released is v3. 1. Other Java EE application servers: †¢ JBoss AS †¢ WebSphere AS †¢ WebLogic Server †¢ Apache Geronimo MODULE-2 †¢ JDBC/ODBC: ODBC  (Open Database Connectivity) is a standard software interface for accessing database management systems (DBMS). The designers of ODBC aimed to make it independent of  programming languages, database systems, and  operating systems. Thus, any application can u se ODBC to query data from a database, regardless of the platform it is on or DBMS it uses.ODBC accomplishes platform and language independence by using an  ODBC driver  as a translation layer between the application and the DBMS. The application thus only needs to know ODBC syntax, and the driver can then pass the query to the DBMS in its native format, returning the data in a format the application can understand. Java DataBase Connectivity, commonly referred to as  JDBC, is an  API  for the  Java programming language  that defines how a client may access a  database. It provides methods for querying and updating data in a database. JDBC is oriented towards relational databases.A JDBC-to-ODBC  bridge enables connections to any ODBC-accessible data source in the  JVM  host environment. JDBC allows multiple implementations to exist and be used by the same application. The API provides a mechanism for dynamically loading the correct Java packages and registering them with the JDBC Driver Manager. The Driver Manager is used as a connection factory for creating JDBC connections. JDBC connections support creating and executing statements. These may be update statements such as  SQL’s CREATE, INSERT, UPDATE and DELETE, or they may be query statements such as SELECT. †¢ MySql †¢ Tomcat Server.Rational Rose Model Rational rose is an object oriented Unified Modeling Language (UML) software design tool intended for visual modeling and component construction of enterprise level software applications. Rose facilitates object-oriented analysis design, better known for OOAD. In fact, Rose is an acronym for Rational Object Oriented Software Engineering. The great things about Rose is that it allows analysts, engineers, writers and project managers to create, view, manipulate modeling elements in a Unified Modeling Language (UML) across the entire enterprise, using one tool and one language.The tool’s true value is that it expo ses software development problems early on in the development life cycle, helping you manage everything from straight forward projects to more complex software solutions. Basically, Rose supports use-case driven object modeling. Chapter-3 Requirement Gathering 3. 1 Software Requirements Functional Requirements |SRS 001 |Add new author |This system shall be able to add new users with valid email-id. | |SRS 002 |Install Conference |Conference management system shall provide users to add new conferences. |SRS 003 |Submit a paper |Authors can submit their papers in already existing validated conferences. | |SRS 004 |Conference validation by administrator |All the conferences are validated by administrators so as to avoid any unauthorized| | | |researches. | |SRS 005 |Program committee selection by Chair |Eminent program committee is selected by chair so as to provide best expertise and | | | |best research papers are selected. |SRS 006 |Paper selection by Program committee |The program committee can select the papers which he wants to review. | |SRS 007 |Upload review |The program committee member can upload his review for selected papers. | |SRS 008 |Mail to Authors and PC member |The chair can send mail from time to time to program committee member and author. | |SRS 009 |Paper download |The program committee can download the paper for further reading. |SRS 009 |Review form download |The program committee can download the review form for making reviews. | |SRS 011 |User feedback |User’s valuable feedback provides us a constant motivation of improvement. | Table 3. 1 Showing Functional Requirements Non-functional Requirements |SRS012 |Access Permission |The conference management system shall have several types of access permissions. For instance, | | | |the administrator is shall be able to validate conference requests and delete the author.At | | | |the same time, authors shall have restricted access to already submitted research papers. | |SRS013 |Mainta inability |The system shall provide the capability to backup the database and it is very easy to maintain | | | |and work on. | |SRS014 |Reliability |The system shall be available all the time, only a internet connectivity is required. |SRS015 |Flexibility |The conference management system shall be flexible and adaptable due to future plans of | | | |expanding the system. | Table 3. 2 Showing Non-Functional Requirements Development End †¢ Operating System (Windows, Mac OS, Linux) †¢ Java Development Kit (JDK) 5 or above †¢ HTML editor (Macromedia Dreamweaver 8) Client End †¢ Internet connection. †¢ A java enabled browser. 3. 2 Hardware Requirements Development End †¢ 500Mhz Intel Pentium-III or higher processor †¢ An Internet connection †¢ 512 MB RAM 600 MB of free hard-drive space, for each platform downloaded into the SDK, an additional 100MB is needed. Client End †¢ 500 MHz Pentium III processor above. †¢ 2 GB hard disk and 256 MB of RAM. †¢ An internet enabled device. †¢ Web Browser installed operating system. 3. 3 Use Case Model In this project, the analysis and design is used as a technique to conduct a research into conference management system. Design is completely based on definition of problem and the knowledge based construct. The use-case diagram which clearly depicts how this system behaves is constructed. End users can easily circumspect the operations carried out.Also the relationship between various elements is visible and the constraints are easily identified. [pic] Fig 1. 1 Use case for Author. [pic] Fig 1. 2 Use case diagram for Program committee member. [pic] Fig 1. 3 Use case diagram for Editor [pic] Fig 1. 4 Use case diagram for Administrator Use Case Description 3. 3. 1 UC01: Login 3. 3. 1. 1 Description:The user logs in the web site. 3. 3. 1. 2 Flow of events:User opens the login page; enter his id and password, and clicks on login button. 3. 3. 1. 2. 1 Alternative Flows: N. A. 3. 3. 1. 3 Special requirements:N. A. 3. 3. 1. Preconditions:The user must have registered him before with the web site and should hold a valid account. 3. 3. 1. 5 Post conditions: The user gets access to the site. 3. 3. 1. 6 Extension point:N. A. 3. 3. 2 UC02: Sign Up 3. 3. 2. 1 Description:The user registers him by entering his details. An account is made where his profile information is maintained. 3. 3. 2. 2 Flow of events Entering all the fields and then clicking on submit button. 3. 3. 2. 2. 1 Alternative Flows: N. A. 3. 3. 2. 3 Special requirements: N. A. 3. 3. 2. 4 Preconditions: The user should have a valid email account.The mandatory fields should not be left empty. 3. 3. 2. 5 Post conditions:The user has a valid account on the website. 3. 3. 2. 6 Extension point:N. A. 3. 3. 3 UC03: Install a Conference 3. 3. 3. 1 Description: The author can create a new conference. 3. 3. 3. 2 Flow of events: Users logs in, and then go to chooses create conference option and enters the co nference details and submits his request. 3. 3. 3. 2. 1 Alternative Flows: N. A. 3. 3. 3. 3 Special requirements:N. A. 3. 3. 3. 4 Preconditions: The user must have a valid account on the web site. 3. 3. 3. Post conditions: The request for a new conference is submitted. 3. 3. 3. 6 Extension point: N. A. 3. 3. 4 UC04: Submit Paper 3. 3. 4. 1 Description: The author can submit his research paper on the existing conferences. 3. 3. 4. 2 Flow of events: Author logs in, and then goes to chooses submit conference option and enters the research paper details and submits his paper. 3. 3. 4. 2. 1 Alternative Flows: N. A. 3. 3. 4. 3 Special requirements:The author must have a valid research paper. 3. 3. 4. 4 Preconditions: The author must have a valid account on the web site. . 3. 4. 5 Post conditions: The author’s research paper is submitted and will be forwarded to jury for review. 3. 3. 4. 6 Extension point: N. A. 3. 3. 5 UC05: Edit Profile 3. 3. 5. 1 Description:The user can access h is own profile information. He can either view or edit the profile. 3. 3. 5. 2 Flow of events: Users logs in, and then goes to My-Account section to view and edit his profile information. 3. 3. 5. 2. 1 Alternative Flows: N. A. 3. 3. 5. 3 Special requirements: 3. 3. 5. 4 Preconditions: The user must have a valid account on the website. 3. 3. . 5 Post conditions: The profile information is updated. 3. 3. 5. 6 Extension point:N. A. 3. 3. 6 UC06: Validate Conference 3. 3. 6. 1 Description: The administrator can validate the conference requests. 3. 3. 6. 2 Flow of events The administrator logs in and then goes to selects the validate conference option, then selects the conference requests which is to be validated. 3. 3. 6. 2. 1 Alternative Flows: N. A. 3. 3. 6. 3 Special requirements: N. A. 3. 3. 6. 4 Preconditions:The administrator must hold a valid account and must be properly logged in. . 3. 6. 5 Post condition: The selected conferences are validated. 3. 3. 6. 6 Extension point:N. A. 3. 3. 7 UC07: Add PC member 3. 3. 7. 1 Description: The chair has the right to invite the PC member to review the paper for a particular conference. 3. 3. 7. 2 Flow of events The author has to change his role from author to chair, then select the conference for which he wants to invite the PC member. 3. 3. 7. 2. 1 Alternative Flows: N. A. 3. 3. 7. 3 Special requirements: The author has to change his role from author to chair to be able to add 3. 3. . 4 Preconditions:The author is properly logged in and changes his role from author to editor. 3. 3. 7. 5 Post condition: The PC member is invited to review the paper for a particular conference. 3. 3. 7. 6 Extension point:N. A. 3. 3. 8 UC08: Review the paper 3. 3. 8. 1 Description: The PC member can review the paper for which chair has invited him. 3. 3. 8. 2 Flow of events The author will have to first change his role to PC member, then select the conference which he wants to review and then select the research paper for which he wants to write review.The PC member posts his review for that paper. 3. 3. 8. 2. 1 Alternative Flows: N. A. 3. 3. 8. 3 Special requirements: The author must be added by chair as a PC member for that conference. 3. 3. 8. 4 Preconditions:The PC member should be added by program chair to review that conference, and he should have changed his role from author to PC member. 3. 3. 8. 5 Post condition: The author posts the review of the paper. 3. 3. 8. 6 Extension point:N. A. 3. 3. 9 UC09: Download Paper 3. 3. 9. 1 Description: The PC member can download the research paper. 3. 3. 9. Flow of events The author changes his role from author to PC member, selects the conference and particular research paper, then downloads the paper. 3. 3. 9. 2. 1 Alternative Flows: N. A. 3. 3. 9. 3 Special requirements: The author must be added by chair as a PC member for that conference. 3. 3. 9. 4 Preconditions:The PC member should be added by program chair to review that conference, and he should have changed his role from author to PC member. 3. 3. 9. 5 Post condition: The PC member downloads the paper. 3. 3. 9. 6 Extension point:N. A. 3. 3. 10 UC010: View Paper Details 3. 3. 10. Description: The PC member can check the details of the research paper. 3. 3. 10. 2 Flow of events The author changes his role from author to PC member, selects the conference and particular research paper, then views the detail of paper. 3. 3. 10. 2. 1 Alternative Flows: N. A. 3. 3. 10. 3 Special requirements: The author must be added by chair as a PC member for that conference. 3. 3. 10. 4 Preconditions:The PC member should be added by program chair to review that conference, and he should have changed his role from author to PC member. 3. 3. 10. 5 Post condition: The PC member check the details of paper. 3. 3. 0. 6 Extension point:N. A. 3. 3. 8 UC11: Delete Author 3. 3. 11. 1 Description: The administrator can delete any author if he does any illegal activity. 3. 3. 11. 2 Flow of events The administrator logs i n and selects the author to be deleted. 3. 3. 11. 2. 1 Alternative Flows: N. A. 3. 3. 11. 3 Special requirements: N. A. 3. 3. 11. 4 Preconditions:The administrator must hold a valid account and must be properly logged in. 3. 3. 11. 5 Post condition: The author is deleted from the system. 3. 3. 11. 6 Extension point:N. A. 3. 3. 12 UC12: Logout 3. 3. 12. 1 Description: The administrator can delete the author. . 3. 12. 2 Flow of events The administrator logs in and selects the logout option and administrator is logged out. 3. 3. 12. 2. 1 Alternative Flows: N. A. 3. 3. 12. 3 Special requirements: N. A. 3. 3. 12. 4 Preconditions:The administrator must hold a valid account and must be properly logged in. 3. 3. 12. 5 Post condition: The author is logged out from administrator page. 3. 3. 12. 6 Extension point:N. A. Chapter-4 Analysis 4. 1 Sequence Diagram A sequence diagram is an interaction diagram in UML that emphasizes the time ordering of the messages. It shows how processes operate on e with another and in what order.It shows parallel vertical lines as different processes or objects that live simultaneously, and horizontal arrows as the messages exchanged between them, in the order in which they occur. The boxes across the top of the diagram represent the use cases, objects, classes, or actors. The dashed lines hanging from the boxes are called object lifelines, representing the life span of the object during the scenario being modeled. The long, thin boxes on the lifelines are activation boxes, also called method-invocation boxes, which indicate processing is being performed by the target object/class to fulfill a message.Messages are indicated on UML sequence diagrams as labeled arrows, when the source and target of a message is an object or class the label is the signature of the method invoked in response to the message. Return values are optionally indicated using a dashed arrow with a label indicating the return value. [pic] Fig 4. 1 Sequence Diagram for Lo gin [pic] Fig 4. 2 Sequence Diagram for Sign Up [pic] Fig 4. 3 Sequence Diagram for My-Account Section [pic] Fig 4. 4 Sequence Diagram for Paper Submission [pic] Fig 4. 5 Sequence Diagram for Conference validation [pic] Fig 4. 6 Sequence Diagram to add PC member. [pic] Fig 4. Sequence Diagram to write review for a paper. [pic] Fig 4. 8 Sequence Diagram to check submission details of a conference. 4. 2 Activity Diagram An Activity Diagram is essentially a flow chart showing flow of control from activity to activity. They are used to model the dynamic aspects of as system. They can also be used to model the flow of an object as it moves from state to state at different points in the flow of control. Activity diagrams commonly contain fork start & end symbol. [pic] Fig 4. 7 Activity diagram for Author [pic] Fig. 4. 8 Activity diagram for administrator Chapter-5 Design 5. 1 Technology SelectionWe are a part of a rapidly changing software industry. New and better software’s are cr eated every day. The main purpose of the software is to provide comfort to its users and also to the other developers. Java Java Platform, Standard Edition or Java SE is a widely used platform for programming in the Java language. It is the Java Platform used to deploy portable applications for general use. In practical terms, Java SE consists of a virtual machine, which must be used to run Java programs, together with a set of libraries needed to allow the use of file systems, networks, graphical interfaces, and so on, from within those programs.Java Development Kit jdk 1_5_0 it has been by far the most widely used Java SDK Sun contributed the source code to the OpenJDK. The Java Development Kit (JDK) is a Sun Microsystems product aimed at Java developers. Since the introduction of Java, it has been by far the most widely used Java Software Development Kit. A Java Development Kit (JDK) is a program development environment for writing Java applets and applications.It consists of a r untime environment that â€Å"sits on top† of the operating system layer as well as the tools and programming that developers need to compile, debug, and run applets and applications written in the Java language. A JVM can also execute byte code compiled from programming languages other than Java. Java was conceived with the concept of WORA: â€Å"write once, run anywhere†. This is done using the Java Virtual Machine. The JVM is the environment in which Java programs execute. It is software that is implemented on non-virtual hardware and on standard operating systems.JVM is a crucial component of the Java platform, and because JVMs are available for many hardware and software platforms, Java can be both middleware and a platform in its own right, hence the trademark write once, run anywhere. The use of the same byte code for all platforms allows Java to be described as â€Å"compile once, run anywhere†, as opposed to â€Å"write once, compile anywhere†, w hich describes cross-platform compiled languages. A JVM also enables such features as automated exception handling, which provides â€Å"root-cause† debugging information for every software error (exception), independent of the source code.A JVM is distributed along with a set of standard class libraries that implement the Java application programming interface (API). Appropriate APIs bundled together form the Java Runtime Environment (JRE). Java's execution environment is termed the Java Runtime Environment, or JRE. Programs intended to run on a JVM must be compiled into a standardized portable binary format, which typically comes in the form of . class files. A program may consist of many classes in different files. For easier distribution of large programs, multiple class files may be packaged together in a . jar file. JSP and ServletsA servlet is a Java programming language class used to extend the capabilities of servers that host applications accessed via a request-resp onse programming model. Although servlets can respond to any type of request, they are commonly used to extend the applications hosted by Web servers. To deploy and run, the Apache Tomcat Server may be used. It is an open source servlet container developed by the Apache Software Foundation (ASF). Tomcat implements the Java Servlet and the Java Server Pages (JSP) specifications from Sun Microsystems, and provides a â€Å"pure Java† HTTP web server environment for Java code to run.Java Server Pages  (JSP) is a  Java  technology that helps  software developers  serve  dynamically generated web pages  based on HTML,  XML, or other document types. JSP may be viewed as a high-level abstraction of  Java servlets. JSP pages are loaded in the server and are operated from a structured special installed Java server packet called a Java EE Web Application, often packaged as a  . war  or  . ear  file archive. JSP allows Java code and certain pre-defined actions t o be interleaved with static web markup content, with the resulting page being compiled and executed on the server to deliver an HTML or XML document.The compiled pages and any dependent Java libraries use Java byte code rather than a native software format, and must therefore be executed within a  Java virtual machine  (JVM) that integrates with the host  operating system  to provide an abstract platform-neutral environment. MySQL as a backend Features of MySQL 1. Speed: Of course, the speed at which a server side program runs depends primarily on the server hardware. Given that the server hardware is optimal, MySQL runs very fast. It supports clustered servers for demanding applications. 2. Ease of use: MySQL is a high-performance, relatively simple database system.From the beginning, MySQL has typically been configured, monitored, and managed from the command line. However, several MySQL graphical interfaces are available as described below: †¢ MySQL Administrator: T his tool makes it possible for administrators to set up, evaluate, and tune their MySQL database server. This is intended as a replacement for mysqladmin. †¢ MySQL Query Browser: Provides database developers and operators with a graphical database operation interface. It is especially useful for seeing multiple query plans and result sets in a single user interface. Configuration Wizard: Administrators can choose from a predefined list of optimal settings, or create their own. †¢ MySQL System Tray: Provides Windows-based administrators a single view of their MySQL instance, including the ability to start and stop their database servers. 3. Cost: MySQL is available free of cost. MySQL is a â€Å"Open Source† database. MySQL is part of LAMP (Linux, Apache, MySQL, PHP / Perl / Python) environemtn, a fast growing open source enterprise software stack. More and more companies are using LAMP as an alternative to expensive proprietary oftware stacks because of its lower co st, reliability, and documentation. 4. Query Language Support: MySQL understands standards based SQL (Structured Query Language). 5. Capability: Many clients can connect to the server at the same time. Clients can use multiple database simultaneously. You can access MySQL using several interfaces such as command-line clients, Web browsers. 6. Connectivity and security: MySQL is fully networked, and database can be accessed from anywhere on the Internet, so you can share your data with anyone, anywhere.The connectivity could be achieved with Windows programs by using ODBC drivers. By using the ODBC connector to MySQL, any ODBC-aware client application (for example, Microsoft Office, report writers, Visual Basic) can connect to MySQL. 7. Portability: MySQL runs on many varieties of UNIX, as well as on other non-UNIX systems, such as Windows and OS/2. MySQL runs on hardware from home PCs to high-end server. MySQL can be installed on Windows XP, Windows Server 2003, Red Hat Fedora Linux , Debian Linux, and others. We have maintained our database in MySQL that involves maintenance of information. 5. Database Design It is defined as â€Å"centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format†. Our data dictionary is designed in order to fulfill: †¢ A document describing a database or collection of databases †¢ An integral component of a DBMS that is required to determine its structure †¢ A piece of middleware that extends or supplants the native data dictionary of a DBMS. The most challenging phase of the system life cycle is system design. The term design describes a final system and the process by which it is developed.It refers to the technical specifications that will be applied in implementing the candidate system. It also includes the construction of programs and program testing. System design is a solution, a â€Å"how to† approach the creation of a new system. This important phase is composed of several steps. It provides understanding and procedural details necessary for implementing the system recommended in the feasibility study. Emphasis is on translating the performance requirements into design specifications. The first step is to determine how the output is to be produced and in what format.Samples of the output and input are also presented. Second, input data and master files (database) have to be designed to meet the requirements of the proposed output. The operational (processing) phases are handled through program construction and testing, including a list of programs needed to meet the systems objectives and to complete documentation. Finally, details related to justification of the system and an estimate of the impact of the candidate system on the user and the organization are documented and evaluated by management as a step toward implementation.The design approach that was suited for the project turned out to be object-oriented design. It creates a representation of the real world problem domain & maps it into a solution domain that is software. Unlike other methods, object-oriented design results in a design that interconnects data objects(data items) & processing operations in a way that modularizes information & processing , rather than processing alone. E-R diagrams represent the schemas or the overall organization of the system. In order to begin constructing the basic model, the modeler must analyze the information gathered during the requirement analysis for the purpose of: classifying data objects as either entities or attributes, ? identifying and defining relationships between entities, ? naming and defining identified entities, attributes, and relationships, ? documenting this information in the data document. ? Finally draw its ER diagram. To accomplish these goals the modeler must analyze narratives from users, notes from meeting, policy and procedure documents, and, if lucky, design document s from the current information system. [pic] Fig 5. 1 Enhanced Entity-Relationship diagram. Chapter 6 Testing 6. Test Case and Design Software testing is a critical element of software quality assurance and the ultimate review of specification, design and code generation . Testing of the software leads to uncovering of errors in the software and reveal that whether software is functional and performance requirement are met. Testing also provides a good indication of software reliability as software quality as a whole. The result of different phases are evaluated and then compared with the expected results. If the errors are uncovered they are debugged and corrected.A strategy approach to software testing has the generic characteristics: †¢ Testing begins at the module level and works outwards towards the integration of the entire computer based system. †¢ Different testing techniques are appropriate at different point of time. †¢ Testing and debugging are different ac tivities, but debugging must be accommodating in the testing strategy. †¢ A strategy for the software testing must be accommodate low level tests that are necessary to verify that a small source code segment is performing correctly according to the customers requirement and that of developers expectations.Testing Objectives †¢ Testing is a process of executing a program with the intent of finding an error. †¢ A good test case is one which has a high probability of finding an as yet undiscovered error. †¢ A successful test is one that uncovers an as yet undiscovered error. †¢ Our objective is to design tests that systematically uncover different classes of errors and to do so with minimum amount of time and effort. Testing Principles: †¢ All tests should be traceable to customer requirements. †¢ Tests should be planned long before testing begins. The Pareto principle applies to software testing. †¢ Testing should begin â€Å"in the small† and progress towards testing â€Å"in the large†. †¢ Exhaustive testing is not possible. †¢ To be most effective, testing should be conducted by an independent third party. 6. 2 Testing Methods and Strategies: Any engineered product can be tested in one of two ways: White-Box Testing: Knowing the internal workings of a product, tests can be conducted to ensure that the internal operation performs according to specification and all internal components have been adequately exercised.For testing our project, we have used the Black-Box testing methods, and a short description of this testing method follows: Black-Box Testing: Black box testing, also called â€Å"Behavioral testing†, focuses on the functional Requirements of the software. It enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program. It is a complementary approach to â€Å"White-Box testing† that is likely to uncover a different class of errors. Black Box testing attempts to find errors in the following categories: †¢ Incorrect or missing functions Interface errors †¢ Errors in data structures †¢ Behavior or performance errors †¢ Initialization and termination errors. Snapshots for Test cases: [pic] Fig 6. 2. 1 Snapshot for login Test Cases Description: following testing checks the authenticity of the end-user. Test 01 : Test case for successful Login Login ID: pushpendra Password: blackboard System Output: Successful Login Test 02 : Test case for incorrect password Login ID: pushpendra Password: chalk System Output: Incorrect user-id or Password [pic] Fig 6. 2. 2 Snapshot for conference installation Test CasesDescription: this lets you install a new conference. Test 01 Conference name: International conference on environmental studies Conference acronym: ICES Email: [email  protected] com City: Indore Country: India Your role: chair Research area: environmental Any other information: Send request System output: conference successfully installed. [pic] Fig 6. 2. 3 Snapshot for paper submission Test Cases Description: this lets you submit your research paper in your desired conference. Test 01: Name: mohit maheshwari E-mail: mohit. [email  protected] om Country: India Organization: Accenture India Title: cloud computing Abstract: benefits of new cloud computing Keyword: ACC Paper: paper1. pdf Browse System output: new paper successfully submitted. [pic] Fig 6. 2. 4 Snapshot for changing role Test Cases Description: this lets you change the role as per as requirement. Test 01: Present role: Author Change role New role: Chair System output: Your role successfully changed. [pic] Fig 6. 2. 5 Snapshot for updating profile Test Cases Description: this lets you update your personal information.Test 01: Name : ankit jain Contact number: 9407217505 E mail: [email  protected] com Organization: Microsoft India Country: India Password: anjtdf Change password: fhdfioh Submit System output: your profile successfully updated. [pic] Fig 6. 2. 6 Snapshot for review of the paper Test Cases Description: this lets you review the form previously submitted by you. Test 01: ID : 412 Author: mohit jain Review rating: 4. 5 Comment: it was very innovative. Submit System output: your form has been successfully reviewed. Conclusion Software’s are making everyday life of humans being easier & faster.This type web-application shows â€Å"How we can solve management problem? † Hence, software is managing the record & database in behalf of humans. After completion of this website, authors and administrator can now access the conference’s and can submit the research paper of their interest field. It is aimed at improving the infrastructure of the conference organizer’s by providing authors an opportunity to submit their papers. Thus it can manage the entire conference process related to paper submission, jury selection, and paper review, under the complete control of the administrator.In our project, we have used Mysql RDBMS for the creation, maintenance and use of the database. The user interface is designed using Java servlets, JSP using Netbeans IDE. We have defined two users for this system, author and administrator, each with their own access and rights and activities. This project allowed us to interact with JSP and servlets. We explored java database connectivity and also became familiar with requirements of a conference management system. BIBLIOGRAPHY/REFRENCES 7. 1 BOOKS REFERED The following books were used extensively for the project development and implementation. . â€Å"The Complete Reference Java2† Tata McGraw-Hill publishing Company Limited. By- Herbert Schildt. 2. The Complete Reference to JAVA SERVER PAGES 3. Head First – Java Servlets 4. Software Engineering Pearson edition By Ian SommerVille 5. Database Management System by Ivan Bayross 7. 2 WEBSITES REFERED †¢ http:// www. google. com †¢ http://www. wikipedia. com †¢ http://www. w3schools. com/css/css_examples. asp †¢ http://www. w3schools. com/js/default. asp †¢ http://www. jsptut. com/ †¢ http://www. roseindia. net/jsp/jsp. htm