Thursday, October 31, 2019

Write's choice Assignment Example | Topics and Well Written Essays - 250 words

Write's choice - Assignment Example The other second question is; what were Matt’s stepping stones to become CEO. He started as accountant then editor and he played a very important role in building business at Holiday World when he was the project manager. This helped him to gain recognition for the hard work and enabled him to climb the ladder to a higher position. I believe that for someone to climb the ladder to the position of CEO, that parson should have proved that he is experienced and capable of steering the company to greater heights through his performance in other aspects of the organization. Who is the biggest competitor based on consumer perceptions? Dollywood and Silver Dollar City are seen as the best competitors in this business but what has to be taken into account is the fact that they do not provide direct competition. By virtue of the fact that they are located in distant areas, it can be noted that they do not give direct competition. In my own opinion, I believe that the aspect of proximity or closeness to each other plays a pivotal role in determining the nature of competition. Competition is intense when the companies are located closer to each other. In this case it is weak since the competitors are located in distant areas. What are the marketing strategies that you use in your operations? He stated that advertising tools such as billboards, radio, website as well as TV and radio were mostly used since these are popular and can be easily accessed by the targeted audiences. I concur with him as a result of the fact that television for instance is the most popular medium to families and it can be effectively used to market the services offered by Holiday

Tuesday, October 29, 2019

Healthcare and the Quality of Human Life Research Proposal

Healthcare and the Quality of Human Life - Research Proposal Example The establishments offer essential health care services to their valued clientele most of whom subscribe for family health maintenance and therefore pay periodical visits to the facilities. In urgent cases, the facilities customize emergency response services some of which may include the practitioners rushing to the premises of their clients or the clients rushed to the facilities where they receive effective customized and urgent services. In severe cases when the patients are under acute attacks, they are admitted into the boarding facilities where they are adequately diagnosed, treated and discharged only upon full recovery (Rouse & Cortese, 2010). Such centers are not common in the society today but social homes that take care of the elderly and weak in society operate in a similar manner. However, these centers purely busy themselves with the provision of healthcare services and not the provision of social security. Unlike in the social homes, their clients pay for their servic es they, therefore, do not discriminate on patients based on their age as is the case in the social homes. Patient-centered homes operate in a manner similar to homes for the old in that patients subscribe to their service after which the centers offer customized services based on the unique requirements of the client. The centers are fully-fledged facilities incorporating boarding facilities, the centers, therefore, offer both in and outpatient services for their clients. The main difference between these homes and the normal hospital is that the homes track their clients over a period depending on the specifications of the clients. More often, they offer services similar to those offered by family doctors only that unlike family doctors, they have fully equipped facilities capable handling any medical, furthermore, at the centers a patient id attended to by a variety of doctors depending on the level of his medical complications.

Sunday, October 27, 2019

Solar Radiation Climate

Solar Radiation Climate Incoming solar radiation is a key component of the Earths Climatology. From maintaining the Earths climate, living forms are able to survive as Hulstrom (1989, p.1) points out solar radiation is a key principle for sustaining life and as a renewable source of energy it can prevent exploitation of the non-renewable sources e.g. oil. Depending on the landscape, solar radiation can create varies microclimates as explained by Chen, Saunders, Crow, Naiman, Brosofske, Mroz, Brookshire, and Franklin (1999, p.288) where a canopy of vegetation will absorb the short-wave radiation, increasing the sensitivity of the ground surface temperatures below. Chen, Hall and Liou (2006, p.1) state it is the spatial and temporal elements of incoming surface solar radiation that can determine many landscape scale processes. An area of interest where incoming radiation can create or trigger several processes and climates is mountainous terrain. Even though the total surface area of mountain systems around the world is a very small percentage of the total Earth surface, they can still create an input to the climate system experienced globally. The intensity of solar radiation reached at the surface plays a vital role in mountain climates. It is variations in elevation, slope, aspect, and shadowing that can affect the amount of radiation received at the surface (Dubayah, 1994, p.627, White, Mottershead Harrison, 1994, p. 207, and Chen et al., 2006, p. 1). This study will focus on incoming radiation and analyse the extent to which each of the factors above affect incoming radiation received upon uneven terrain. The focus will be on incoming radiation because, as Duguay points out (1993, p.339) any progress in the determination of surface radiation in mountainous terrain has to begin with incoming shortwave radiation. Another aspect that this study will approach is the extent to which vegetation canopy cover can intercept radiation before reaching the Earths surface. A study created by Mariscal, Orgaz, and Villaobos (2000, p.183) states the importance of measuring radiation received at the surface for purposes of photosynthesis and proposed 70% (p.184) of solar radiation can be intercepted by canopy cover. This study will be analysing the amount of radiation received beneath a forest canopy to aid the understanding between incoming radiation and vegetation cover. This study is designed to examine the intensity of incoming solar radiation received within Cwm Llysiog valley (51Ëš49N 3Ëš25W), located in the Brecon Beacons in South- East Wales. A Coniferous tree forest, located at the Southern end of the valley provides a canopy of vegetation to record radiation measurements beneath. The northern part of the valley is mostly grasslands and shrubs, providing a transect to measure radiation without vegetation inception. Across Britain in the 1970s Harding (1979,p.161) discovered there was very few actual observations of radiation reached on the surface across the uplands due to there be a lack of â€Å"robust automatic instruments, capable of withstanding the extremes of an upland environment†. A problem that was crossed in this study was the availability of automatic instruments for recording solar radiation, disallowing me to achieve the quantity of radiation data required. Literature Review Radiation Radiation is the main input to the black-box closed- system, planet Earth, received from the Sun, in the form of electromagnetic radiation waves ranging from 0.25-3.5 micrometres (Oke, 1987, p.8-9). These waves travel towards the Earth away from the source, at a speed of 299,800kilometers/second (Strobel, 2001). There is a large distance between the Sun and the Earth, resulting in only 0.002% of the total radiation secreted from the Sun is an input to the Earths system. The ozone is an important component for protecting the Earths atmosphere from captivating harmful amounts of solar radiation, by absorbing the majority of the radiation around wavelengths of 300mm. Each different wavelength is absorbed at different points of the Earths atmosphere. Shorter wavelength UV radiation and solar energetic particles are deposited mainly above the troposphere, where gases such as O2 (Oxygen) act as an absorber of the UV radiation (Lean Rind, 1998, p. 3072). Visible light is what can be seen b y the eye and is centred on wavelengths of about 0.5 µm (McIlveen, 1998, p.244). Acra et al. (1990), researched into how atmospheric interventions can cause this change in wavelength and how different colours can relate to the wavelength Blue skies are present when the degree of scattering is sufficiently high within the blue region of the spectrum (McVeigh, 1977, cited by Acra et al., 1990). The intensity of radiation reaching the Earth surface as a single value is 1353W/m5 and continues to be relatively constant (Rich, Hetrick Saving, 1995, p.3). Nunez (1980, p. 173) expresses the need for reliable knowledge of solar and terrestrial radiation at the Earths surface and looks into approaches that concentrate on the radiation fluxes over a unit of horizontal area, and some index of atmospheric turbidity to derive a climatic radiation model. It is analysed that in most of these cases the radiation fluxes at ground level are assumed to be non-related to the properties of the receiving surface. It would only be the reflected and outgoing terrestrial radiation that the surface would initiate changes (Nunez, 1980, p.173.). The surface properties aspect and gradient will be measured to analyse whether Nunez (1980) has the right idea. The receiving of energy emitted by the Sun, at the Earth surface is controlled by three sets of factors. Spatial and temporal variation in insolation at specific sites is predictable from basic geometric principles, and can cause variation in climatic conditions across local topography. Insolation is commonly expressed as the average irradiance and is a function of latitude, day of year, time of day, slope and aspect of the receiving surface, and horizon obstruction (Rich, Hetrick Saving, 1995, p.1). At different times throughout the day the Suns height appears to change, and is at its highest in around noon. At this point the sun rays have the least distance to travel through the atmosphere and UVB are at their highest. In the early morning and late afternoon the Suns rays pass through the atmosphere at an angle resulting in a reduction in intensity. The second is the scattering and absorption of incoming radiation within the atmosphere, through gases, aerosols and cloud particles. This results in three forms of incoming radiation received on inclined surfaces, including: direct (beam) radiation, which is the part of solar radiation that is not absorbed or scattered by the atmosphere and has a direct path from the sun to the surface (Allen, Trezza Tasumi, 2006, p.55). This study will be focusing on the factors influencing radiation once its nearer to the surface. Mathematical models have been used to estimate solar radiation. Alam, Saha, Chowdhury, Saifuzzaman and Rahman (2005) present a mathematical model to simulate the availability of solar radiation in Bangladesh using system dynamics methodology. describes the formulation of the mathematical model used for the study. It takes into account slope angles, atmospheric absorption and scattering by diffused radiation, and the amount of extraterrestrial radiation that would be received. One problem with these models is that the outcomes are only predictions of radiation intensity. Surface based measurements avoid estimations from modelling on radiation, but are more labour intensive. Holst, Rost and Mayer (2005) used both surface based measurements and empirical modelling, because it was recognised that modelling did not reach a standard of accuracy on its own. For this study field based measurements were carried out over the period of two days to measure the intensity of radiation received at the surface. Mountain Climates Observations made in mountains are very important for the understanding of solar radiation and solar constant. Data collection on mountains and their climates over many years has been seen to be quite problematic. The areas tend to be remote from major centres of human activity, have limited physical access, difficult to install and maintain weather stations, and can experience extreme climates. Recent studies have used satellite remote sensing and digital terrain data for analysing mountain climates (Duguay, 1994, Haefner, Seidel, Ehrler, 1997, Dubayah, 1994). Digital and satellite imagery has confirmed many climatic conditions that have emerged over thousands of years from the analysis of synoptic data, and has increased the understanding of cloud cover influencing radiation at the surface. Geographical controls that vary the intensity of solar radiation reaching the surface are Latitude and Altitude. Barry (1992, p.18) explains that latitude has a great influence on mountain climates with solar radiation and temperature decreasing with increasing latitudes. The Ozone becomes increasingly rich with altitude resulting in the mid and higher altitude regions reaching less radiation because the sun is lower in the sky and therefore the rays must travel a greater distance through the Ozone. This gives reason to why Holland and Steyn (1975, p.181) discovered aspect as being an important parameter in the mid- latitudes. Barry (1992, p. 77) also pronounces slope effects changes with latitude. Around latitudes of 40 ºN in the northern hemisphere, north facing slopes receive a greater duration of direct radiation throughout the day compared to south facing slopes (Barry, 1992, p.77). The Brecon Beacons is 51ËšN so the duration of direct radiation will be shorter on the north facing slope, but the differences between intensities on each slope will be compared for the duration of the day. Cloud cover is recognised as being a limiting parameter of incoming radiation (Arking Childs, 1984, Rieland Stuhlmann, 1992) and a main contributor to diffuse radiation. This research believes cloud cover plays a vital role in scattering and preventing direct solar radiation reaching the Earths surface. Rumney (1968, p. 89) exemplifies the fact that the amount of radiation and sunshine from one year to another would be the same were it not for variable amounts of cloud cover. Cloud cover is thought to cause â€Å"back scattering, and can reduce the solar power reaching the underlying surface by as much as 90%,† (McIlveen, 1998, p.244). Fritz (1951, cited by Garnier Ohmura, 1968, p.798) noted that cloudless skies are appropriate in climate studies to limit the atmospheric tranmissivity influence on incoming radiation. Spatial characteristics of mountainous terrain such as orientation, angle, vegetation cover and shadowing from neighbouring slopes have been the subject of many observational and analytical studies, Duguay (1993) by modelling downward fluxes (pp.341- 347), Churchill (1982) with aspect influence on hill slope process, Holland and Steyn (1975), vegetation response to angle and aspect, and Wendler and Ishikawa (1974) with the effects on slope and exposure on solar radiation. Figure 3 illustrates the three sources of illumination that can occur on slopes. Variability in slope angle can lead to strong local gradients in solar radiation (Ralph, 1994, p.627 Kumar, Skidmore, Knowles, 1997, 467). Holland and Steyn (1975, p.181) found that the differences in incident solar radiation in mountainous areas of different slopes and aspects were maximum in the mid-latitudes and the least in equatorial and polar regions. The mid-latitudes in the northern hemisphere are closer to the Sun in July (su mmer solstice) resulting in greater amount of radiation received on slopes north facing slopes receive more radiation in early hours (0600hrs) of the day and later hours in the evening (1800hrs) compared to the south facing slopes. The southern facing slopes, of an angle greater than 55 º receives a greater intensity of radiation at midday, where the north facing slopes are not illuminated, as displayed in figure 4. Barry (1992, p. 76) acknowledges the fact that â€Å"South- facing slopes at the equinoxes show a symmetrical diurnal pattern,† from the time the sun rises in the east, limiting the intensity shining on south facing slopes with increasing steepness in the early hours of the day. By comparing the north west and south east facing slopes through the duration of a day, I will be able to analyse whether the patterns found within research have correlated with my own findings. It shows the steep south facing slopes reach a greater amount of radiation compared to average south facing slopes, but it is clear the greatest difference between aspects is when the sun is either highest in June, or lowest in December in the sky (Ralph, 1994, p.633). Surface temperature is a useful parameter to estimate the amount of radiation received on varying slope aspects. Safanda (1999, p.367) expresses that the north facing slopes in the middle latitudes in the northern hemisphere are a few  ºC colder at similar elevations as on South-facing slope surfaces. Reason for this is that less solar radiation falls on a unit area of the slope surface (Safanda, 1999, p.367). By recording near surface temperatures for the two valley transects, it will allow me to correlate the differences between two aspects by comparing temperatures at the same elevation. Shadowing from neighbouring slopes or valleys is thought to be a â€Å"spatio-temporal function† because it depends on both topography and solar geometry (Ranzi Rosso, 1995, p.464). Shadowing, introduced by Ranzi and Rosso (1995, p. 468) for a catchment basin that has shadowing occurring across the surface from projected horizons within the catchment area, is ‘Self Shadowing. This should only occur in a valley with east and west facing slopes as the sun will rise in the east projecting a shadow onto the east facing slope if elevation is great enough. By knowing the different slope angles and orientations of the Cwm Llysiog valley, the effect of exposure and shadowing can be assessed. The McCall Glacier (Alaska) was studied (Wendler Ishikawa, 1974) for the effect of slope, exposure and mountain screening on solar radiation and discovered that the screening effect of mountains was much more important than the northerly exposure reducing radiation reaching the glacier. It is not only slope shadowing that could limit the intensity of radiation received at the surface in the Cwm Llysiog valley, vegetation cover will also reflect radiation. Cannell, Milne, Sheppard, and Unsworth (1987), and Bartelink (1998) explain with increasing canopy cover, radiation interception is increased resulting in a decrease of radiation at the surface (Jordan, 1969, p.663). Vegetation cover is thought to be the greatest limiting factor in the Vegetated valley and will be compared to the non- vegetated valley radiation readings to verify this prediction. 2. Aims and Objectives The aim of this study is to investigate how the variability in slope, aspect and shadowing comprise to create a changing affect on the gradients of incoming radiation in forested and non- forested valleys. This will be assessed by comparing north and south facing slopes within a South Wales valley with forested and non-forested slopes in the summer with cloudless skies. Below is each Hypothesis set before measurements were taken and research that backups the reasoning for the hypothesis. Hypothesis A: The vegetated slopes will decrease the intensity of solar radiation received at the surface compared to the non- vegetated slopes. This will reflect in the surface temperature, with an increase in solar radiation resulting in an increase in temperature. Safanda (1999, p.367) concluded that north facing slopes achieve a low temperature then south facing slopes. Bartelink (1998) is one of many that has proven vegetation cover will decrease the intensity of radiation received at the surface. Hypothesis B: The intensity of solar radiation will be greater on the south east facing slopes compared to the total solar radiation received on the north west facing slopes. The orientation of slope faces will be the most influential factor on incoming solar radiation. White et al. (1994, p.207) describes the azimuth (orientation of the surface) as being the most influential component in the intensity of solar radiation received at the surface. It is stated that a southerly facing aspect will receive a greater intensity of radiation at the surface compared to a northerly aspect, which might not receive any at all. On the other hand Whiteman, Allwine, Fritschen, Orgill, and Simpson (1988) compared radiation components from five stations situated in a single valley during September of 1984 and concluded that slope faces have distinctly different diurnal courses of radiation. Slopes facing north east, experience downward solar fluxes directly after the slope is illuminated during sunrise but the fluxes become weaker during the afternoon as a result sunset. In contrast the south west facing slopes, has weaker direct radiation in the morning but attains a strong peak in the early afternoon. This view is slightly different to Whites et al. theory on aspect. Hypothesis C: Slope angle will have a less influential impact on radiation intensity compared to slope aspect. It is thought with an increase in gradients the intensity of solar radiation will decrease and become less direct. White et al. (1994, p.208) explains that these two factors (aspect and gradient) combined have a greater effect on the amount of direct radiation on north facing slopes in the northern hemisphere. It is made clear, with increasing slope angles, there is a decrease in solar intensity directed at the north facing aspect. Dubayah (1994, p. 634) displays a time series of monthly incoming solar radiation for different slope terrains within the Rio Grande River Basin. The study shows steep south facing slopes receive around 140W/m2 more radiation than a steep north-facing slope in July. The differences displayed in these findings are thought to be due to slope gradient. Hypothesis D: Within the forested valley, the vegetation cover will cause a great deal of shadowing on the surface decreasing solar radiation received at the surface. The greatest shadowing in the non- vegetated valley will occur in the lower sites, near the valley floor where the surrounding horizons are at a higher elevation, decreasing the sky view factor. Ranzi and Rossos (1995, p.464) study in a drainage basin realised that shadowing occurs at low altitudes, as the â€Å"direct radiation is less important in relation to the other radiative fluxes, i.e. diffuse irradiance from the sky and direct and diffused irradiance reflected from nearby terrain†. This means any horizon at a higher elevation then the site being studied will reduce the intensity of solar radiation received at the particular site. White et al. (1989, p.419) agrees with Ranzi and Rosso views where changes in orientation or positioning on a slope, affects the view of surrounding topography, thus affecting receipt of reflected radiation. Jordan (1969, p. 663) explains The greater the vegetation cover the greater the greater the difference in radiation above and below the canopy. Null Hypothesis: There will be no correlation between radiation received at the surface on the vegetated and non- vegetated slopes. Factor such as slope orientation, slope angle and shadowing will not influence the amount of radiation reached at the surface. Elevation The relationship between direct radiation and surface elevation is complex and depends on the atmospheric conditions such as cloud cover. With an increase in surface elevation an increase in direct solar radiation will occur, because the solar path through the atmosphere is shortened. This only tends to occur under cloudless skies. Batlles, Bosch, Tovar-Pescador, Martinez-Durban, Ortega and Miralles (2008, p.341) studied atmospheric parameters to estimate radiation in areas of complex topography and came to the conclusion that only the global radiation changes with increase of 1000m in elevation. It was thought that in the current microclimate being studied, elevation variations are less significant than other topographic variables, such as shadowing affects. Measurements recorded in the field for this study only reached 40m up the slope, meaning the effect of elevation on radiation would be very little. Due to these findings elevation will not be included in this study as a control. Objectives The main objective is to examine any correlation between slope aspect, slope angle, shadowing and vegetation cover and to analyse the influence they might have on the intensity of incoming solar radiation reaching the surface. To assess these factors affecting incoming radiation on sloping terrain, this study will test the hypotheses determined by studying the previous research. The hypotheses will be tested by recording a set of incoming solar radiation readings along a transect across a valley over the period of a day. It was difficult to locate a valley with north and south facing slopes in Wales. The Cwm Llysiog presents north west and south east aspects. The increase in elevation will be measured to display differences in radiation at the base of the valley and the valley slopes. The gradient is also important to analyse the correlation between slopes and radiation. A set of temperature results at the nine sites along the transect will determine if there is a link between solar radiation intensity and near surface temperatures. Another main objective is to provide readings for all the above, on a slope covered by a forest canopy, creating a shadowing affect. Exposure readings for all sites will be recorded to assess the extent of shadowing from near surfaces and objects.

Friday, October 25, 2019

Opposition to the Iraq War Essay -- Politics Government

Iraqi War Out of 50 citizens polled, five believe that the war in Iraq should continue.That is only 10%, of those polled.Not much, is it? What this poll demonstrates is that the people of the U.S.A. do not feel the war is helping. The Iraqi war is a very â€Å"lively† and on-going debate issue. The war has cost us many people: soldiers, reporters, civilians and insurgents. The best way to confront this problem is to have the Iraqi army in power and for our people to come home. This merciless war has claimed too many lives. CNN news reports that in December alone, the U.S. army has lost 3,000 American men and women. This proves that the death toll has overpowered the benefits claimed by President Bush. Only more people will die because of the war, an...

Thursday, October 24, 2019

How And Why The North Won War by 1865 Essay

Abstract My research topic for this essay is explain how and why the North won war by 1865. In this essay I will be explaining the various reasons as to why the South surrendered to the North and how it all happened. This war took place from 1861 to 1865 and is ranked as the most deadliest war in American history. The Union or Northern States won the war against the South or the Confederacy. Instead of looking at causes or consequences, in this essay I will go into the reasons as to why did the North win the Civil War. The American South, though raised in military tradition, was to be no match North in the coming Civil War. The manpower on the Union side was much larger and outnumbered the Confederate army strength. The lack of emphasis on manufacturing and commercial interest, the South surrendered to the North their ability to to fight independently. It wasn’t the Northern troops nor generals that won the Civil War, but their guns and equipment. From the very first start of the war, the Union had various advantages. â€Å"The North had large amounts of just about everything that the South did not, boasting resources that the confedaracy had even no means of attaining.† (Brinkley, 1991). The Union had large amounts of land available for growing food crops which served for providing food for its hungry soldiers and money for the growing industries. The South, on the other hand, devoted most of their land to its main cash crop: cotton. Raw materials were almost entirely concentrated in Northern mines and refining industries. Railroads and telegraph lines are what the North was surrounded by, but left the South isolated, outdated, and starving. The Confederates were willing to sell their cash crops to the North to make any sort of profit. Little did they know, â€Å"King Cotton† could buy them time, but not the war. â€Å"The South had bartered something that perhaps it had not intended: its independence.† (Catton, 1952). The North’s growing industry had a powerful dominance over the South. Between the years of 1840 and 1860, American industry was steady growing. â€Å"In 1840 the Research Paper: â€Å"Explain how and why the North won war by 1865.† 4 total value of goods manufactured in the United States stood at $483 million, increasing over fourfold by 1860 to just under $2 billion, with the North taking the king’s ransom.†(Brinkley, 1991). The hidden reason behind this dramatic growth of money is because of the American Industrial Revolution. Beginning in the early 1800s, some of the ideas of the industrial revolution began to get picked up from the American Society. One of the first industries to see quick development was the textile industry, but, thanks to the British government, this development almost never even passed. Years before this, England’s James Watt had developed the first successful steam engine. This invention completely revolutionized the British textile industry, and eventually made it the most profitable in the world (â€Å"Industrial Revolution†). The British government, were astonished with this new material but cautious, so they ended up trying to protect the nation by preventing the export of textile machinery and even the emigration of skilled mechanics. â€Å"Despite valiant attempts at deterrence, though, many immigrants managed to make their way into the United States with the advanced knowledge of English technology, and they were anxious to acquaint America with the new machine s.†(Furnas, 1969). People like Samuel Slater can  be credited with beginning the revolution of the textile industry in America. He was skilled mechanic in England, and spent long hours studying the schematics for the spinning jenny until finally he no longer needed them. â€Å"He emigrated to Pawtucket, Rhode Island, and there, together with a Quaker merchant by the name of Moses Brown, Research Paper: â€Å"Explain how and why the North won war by 1865.† 5 he built a spinning jenny from memory.† (Furnas, 1969). This would later become known as the first modern factory in America. It would also become known as when the North had the economic dominance over the South. The South could not seem to accept this after the time passed so they thought they could breakthrough somehow. Another inventor by the name of Eli Whitney set out in 1793 to revolutionize the Southern cotton industry. â€Å"Whitney was working as a tutor for a plantation owner in Georgia (he was also, ironically, born and raised in New England) and therefore knew the problems of harvesting cotton.† (Brinkley, 1991). Until then, the risky task of separating the seeds from the cotton before sale had to be done by slave labor and was not very effiecient. With that being said, Whitney developed a machine which would separate the seed from the cotton swiftly and effectively, cutting the harvesting time by more than one half. This machine, which became known as the cotton gin, had amazing results on the South, producing the highest trend the industry ever had. â€Å"In that decade alone cotton production figures increased by more than 2,000 percent. â€Å"(Randall and Donald, 1969 ). Lots business opportunities opened up, including the expansion of the Southern plantations. â€Å"This was facilitated by the fact that a single worker could now do the same amount of work in a few hours that a group of workers had once needed a whole day to do.† (Brinkley, 1991). This allowed slaves to pick much more cotton per day and this led most plantation owners to expand their land. Most of the gains from the cash crop took over the basic necessity of the food crop. â€Å"In 1791 cotton production amounted to only 4000 bales, but by 1860, production Research Paper: â€Å"Explain how and why the North won war by 1865.† 6 levels had skyrocketed to just under five million bales.† (Randall and Donald, 1969). Cotton was now bringing in about  $200 million a year, which is a very big change for the south. â€Å"King Cotton† became a fundamental motive in Southern economy. However, during this short time of economic process, the South failed to realize that it would never be fully sustained by â€Å"King Cotton† alone. What it needed was the help of â€Å"Queen Industry.† Eli Whitney knew and realized that the South would not rapidely accept change, so he decided to take his smart mind and ideas back up to the North, where it could be put to good use. He found his niche in the small arms business. A while back, during two long years of quasi-war with France, Americans had been troubled by the lack of rapidity with which sufficient armaments and equipments could be produced. Whitney came out with the invention of interchangeable parts. His vision of the perfect factory included machines that would produce, from a mold, the various parts needed to build a standard infantry rifle, and workers on an assembly line who would construct it. The North, eager to experiment and willing to try anything of economic progress, decided to test this new method of manufacture. It did not take long for the North to make Eli Whitney’s dream a reality. The small arms industry was successful. â€Å"By the onset of the Civil War, the confederate states were noting the fact that there were thirty-eight Union arms factories capable of producing a total of 5,000 infantry rifles per day, compared with their own paltry capacity of 100.† (Catton, 1952). During the mid-1800s, the Industrial Revolution dug deep into to the sides of the Northern states. â€Å"Luckily, immigration numbers were skyrocketing at this time, and the sudden profusion of factory Research Paper: â€Å"Explain how and why the North won war by 1865.† 7 positions that needed to be filled was not a big problem.† (Randall and Donald, 1969). â€Å"The immigrants, who were escaping anything from the Irish Potato Famine to British oppression, were willing to work for almost anything and withstand inhuman factory conditions.† (Jones, 1993). Although this exploitation was extremely cruel and very unfair to the immigrants, Northern businessmen profited alot from it. By the beginning of war in 1860, the North, from an economical standpoint, stood like a towering giant over the Southern society. Of the over 128,000 industrial firms in the nation at the time, the Confederacy held only 18,026. â€Å"New England alone topped the figure with over  19,000, and so did Pennsylvania 21,000 and with 23,000.†(Paludan, 1988). The total value of goods manufactured in the state of New York alone was over four times that of the entire Confederacy. The Northern states produced 96 percent of the locomotives in the country, and, as for firearms, more of them were made in one Connecticut county than in all the Southern factories combined. The Confederacy had made one mistake and that was believing that its thriving cotton industry alone would be enough to sustain itself throughout the war. Southerners didn’t see a need to go into the uncharted industrial territories when good money could be made with cotton. What they failed to realize was that the cotton boom had done more for the North than it had done for the South. Southerners could grow huge amounts of cotton, but due to the lack of mills, they couldn’t do anything with it. The cotton was sold to the Northerners who would use it in their factories to produce woolens and linens, which were in turn sold back to the South. â€Å"This cycle stimulated industrial Research Paper: â€Å"Explain how and why the North won war by 1865.† 8 growth in the Union and s tagnated it in the Confederate states.†(Catton, 1952). Southern plantation owners believed that the growing textile industries of England and France were highly dependent on their cotton, and that, in the event of war, those countries would come to their rescue. The Civil War gave an even bigger boost to the already growing factories in the North. The troops needed arms and warm clothes on a constant basis, and Northern Industry was ready to provide them. By 1862, the Union could use almost all of its own war materials using its own resources. The South, on the other hand, was in desperate need and dependent on outside resources for its war needs. â€Å"Dixie was not only lagging far behind in the factories. It had also chosen to disregard two other all-important areas in which the North had chosen to thrive: transportation and communication†¦the Railroad, the Locomotive, and the Telegraph- -iron, steam, and lightning-these three mighty genii of civilization†¦will know no lasting pause until the whole vast line of railway shall completed from the Atlantic to the Pacific.†(Furnas, 1969)  During the ante-bellum years, the North had shown a great desire for an effective mode of transportation. For a long time, canals had been used to transport people and goods across large amounts of land which were accessible by water, but, with continuing growth and expansion, these canals were becoming obstacle to many Northerners. They simply needed a way to transport freight and passengers across terrains where waterways didn’t exist. â€Å"The first glimmer of hope came as America’s first primitive locomoti ve, powered by a vertical wood-fired boiler, puffed out of Charleston Research Paper: â€Å"Explain how and why the North won war by 1865.† 9 hauling a cannon and gun crew firing salutes†(Catton, 1952). The Railroading industry became a big thing in the North, where it provided a much needed alternative to canals, but could never quite help the South. Much of this could be because Northern engineers were experienced in the field of ironworking and had no problem constructing vast amounts of rail lines, while Southerners, weren’t very experienced in that area. The Union, with its some 22,000 miles of track, was able to transport weaponry, clothes, food, soldiers, and whatever supplies were needed to almost any location in the entire theater. Overall, this greatly helped the Northern war effort and increased the morale of the troops. The South, however, was lacking on most of this. â€Å"With its meager production of only four percent of the nation’s locomotives and its scant 9,000 miles of track, the Confederacy stood in painful awareness of its inferiority.†(Randall and Donald, 1969). Another obstacle arose in the problem of track gauge. As the war kept on, the Confederate railroad system steadily deteriorated, and by the end of the struggle, it had all collapsed. Communication, was also a big problem to Southern economical growth. The telegraph had came into American life in 1844. This fresh form of communication greatly facilitated the operation of the railroad lines in the North. Telegraph lines ran along the tracks, connecting one station to the next and aiding the scheduling of the trains. The telegraph provided instant communication between distant cities, helping the nation come together like never before. Yet, the South, unimpressed by this technology and not having Research Paper: â€Å"Explain how and why the North won war by 1865.† 10 the money to experiment, chose not to go into its development. By 1860, the North had laid over 90 percent of the nation’s some 50,000 miles of telegraph wire. â€Å"Morse’s telegraph had become an ideal answer to the problems of long-distance communication, with its latest triumph of land taking shape in the form of the Pacific telegraph, which ran from New York to San Francisco and used 3,595 miles of wire† (Brinkley, 1991). The North has assuredly won over the South. Northerners, prepared to enjoy the deprivation of war, realized that they were experiencing an enormous industrial boom even after the first year of war. â€Å"Indeed, the only Northern industry that suffered from the war was the carrying trade.† (Catton, 1952). To the South, however, the war was a drain and only made them suffer even more. The South decided not to use two crops which would prove the outcome of the Civil War. Those crops were industry and progress, and without them the S outh was defeated. Refrences Angle (1967) Paul M. A Pictorial History of the Civil War Years. Garden City, New York: Doubleday Brinkley (1991) American History: A Survey. New York: McGraw Catton, Bruce (1952) The Army of the Potomac: Glory Road. Garden City, New York: Doubleday, Furnas, J.C (1969) The Americans: A Social History of the United States 1587-1914. New York: Putnam Jones, Donald C. (1993) Telephone Interview Paludan, Philip Shaw. (1988) A People’s Contest. New York: Harper Randall, J.G., and David Herbert Donald. (1969) The Civil War and Reconstruction. Lexington, Massachusetts: Heath

Wednesday, October 23, 2019

Hobby: Nutrition and Black Bean Curd

Hobby In the past ten years, cooking has become one of my favorite hobbies. I have had many experiences that are worth writing about. My husband and I love to eat, cook and dine out. We have enjoyed different cooking activities that have brought us a lot of pleasure, and up to this day we still engage in cooking. We love to explore different kinds of cooking styles because we love to eat different types of food. The most popular cuisines that we have cooked the most are Chinese, Italian and American food. Also, we experiment in different cooking styles and trying Japanese, French, Mexican, Thai, and Mediterranean food as well. My husband and his friends formed a gourmet club a few years ago. Each couple that joined the club loves to eat and cook. So every weekend, a couple will pick up a theme and invite their friends to their house to have a nice dinner. Usually I will cook Chinese food for our guests. China is a big country; there are about 56 regional styles of food in China. Each region has it own cuisine due to varying weather conditions, environment, tastes and products (web. ) For example, Cantonese food is well known in America; Cantonese food specialized in seafood and Dim Sun. If you go to a Cantonese style restaurant, you will see a big fish tank with live fish and seafood in every restaurant. Customers can select the fresh seafood and fish that they like on the spot. The chef will cook your selection in any style that you want. The most popular cooking styles for fresh seafood are: steaming, sauteing, stir-frying and boiling. Two other cooking styles that I want to introduce are those from the provinces of Si Chuang and Hu Nan. These cuisines feature very spicy, sour, sweet, and salty dishes. If you can’t handle the heat, please stay away. The most famous dishes from that region that American people are familiar with are: GongBao Chicken, Ma Po Tofu and Fish in Chili Bean sauce. One interesting idea that comes from cooking is that we can learn about different culture and history as we cook their cuisines. Since China’s history dates back 5000 years, so do the styles of cooking. Today’s Chinese cuisines are blending traditional and modern techniques representing that very long history. I love spicy food. One of the Chinese cuisines that I mentioned above comes rom the province of Si Chuan. Si Chuang province is the mountain district in the center of China and its food is famous for its hot and spicy dishes, and one of my favorites dishes is Ma Bo Tofu. Taste, color and smell are the three most distinctive features for Chinese cooking. My secret to cooking this dish is how to control the spices. First, I will separate all the spices in three levels: mild spicy, medium spicy and very spicy. My husband loves spicy but he does not like it when the hot spicy numbs his tongue because he wants to taste the food. Every time I cook my Si Chuang dishes, I have to be very careful with how much spice I should put in because I do not want him to â€Å"cry†. Secondly, I have to prepare several main ingredients: a piece of soft Tofu, few black bean curd, two sponge of hot chili and half pound of mince pork meat, and a little bit of green onions for the final touch. After I get all ready, I will start cooking my famous Si Chuang Dish, Ma Po Tofu. Cooking a delicious and testy Mo Po Tofu is not easy. I did learn some tricks from my mother. I start by putting some virgin olive oil in a hot pan. While the pan is getting hot, I mix hot chili sauce and mince pork together, and then I cut a piece of Tofu into a little tiny square shape. I have to do all these steps in a very short period of time because I do not want the oil to burn. At the same time, I have been soaking the black bean curd with warm water in a little serving bowl. After I finish all the preparations, it’s time to cook. I put the mixture of pork and chili sauce into the pan. First, saute them for just two minutes and takes them out very quickly and put on a serving plate. Meanwhile, I will warm up the pan with a little bit of olive oil again, put a little square tofu into the pan, and then cover it for 3 minutes. The reason I have to cover the Tofu while it’s cooking is because Tofu is a very delicate ingredient and I do not want to overcook it. The last step is to softly pour the hot chili mince meat on top of the Tofu, and then decorated with a few strips black bean curd with tiny chopped green onions. The whole process to cook this dish actually only takes six to seven minutes. It seems very easy to cook yet you have to be quick and know how. I assume that if a person loves spicy food, he will love my recommendation. Please do not forget that I just mentioned earlier, you can control how much spice you use to suit your taste. The beauty of this dish is that the Tofu will melt in your mouth while you are eating them, and it is both tasty and very healthy. Tofu contains lots of protein and it is the main source of protein for vegetarian diet. The final step is the presentation for this dish. A good dish contains smell, color coordination, taste and presentation. So I will use a beautiful China plate to present it. The first step, I will put a piece of green lettuce on the button of the plate, and then serve with some beautiful little squares of Tofu with red hot chili mince meat on the top. For the final touch the black bean curd and green onions are placed. At this point, you should be able to smell and taste my Ma Po Tofu now. Do you feel too spicy? To enjoy this dish you must use the sense of sight, touch, smell and taste. Cooking is my passion and also requires lots of knowledge. In recent years, eating health and cooking healthy food is a big topic for American society. American people love fast food. The fast food culture has been merging into the American society for a long period of time . That is why we have the biggest fast food industry in the world. On a recently television program it was stated that McDonald’s golden arch icon is a more popular symbol than the cross of Christian faith. The results of this unhealthy diet are many health problems. A lot of adults in America have high blood pressure, diabetes, stroke and heart disease. These diseases can be direct traced back to their unhealthy diet and life style. The fast pace of life and work are so busy, parents no longer have the time to cook for their children or themselves. Fast food is taking up a large and large part of the family food budget due to convince. Now seems cooking as become a luxury because it takes so much time. Every night, parents will go to McDonald’s, Burger King, or Jack in the Box to buy some greasy chicken, burgers and fries for their family. What are the results? We have obese kids because junk food has become too large a percentage of their diet. It is so sad to see our kids suffer from the diseases of the obesity. So let’s go back to cooking for our families. I will say that if everybody pays lots of attention to their health, this is will help our society to change its vision of the fast food industry. Everyone wants to live longer and healthier. No one wants to suffer the diseases that obesity can cause. So be your family’s guard and teach your kids and their friends to eat healthy and nutritious food. You can also teach your kids how to cook, how to pick the good ingrains and create a health meal. At the same time, explain to your kids why foods are either healthy or unhealthy. So that, in the future they can evaluate for themselves and make the right decision in the future. Our effects now will pay off in the future for the health of our families. Cooking health meals for my family is relaxing, fun and an enjoyable activity for me. I love it. I want my family to eat healthy meals every day. Actually, my dream is to learn how to cook different types of cuisine. Especially learn how to cook Italian and French food. I think it will be a fun thing to do.

Tuesday, October 22, 2019

Free Essays on Lamb Of God

of John the Baptist as he saw Jesus approaching one day. Why would John refer to Jesus as the Lamb of God? He is not the only one; in the book of Exodus Jesus is referred to as the Lamb twenty-eight times. According to the dictionary a lamb can be: a young sheep, a sweet mild-mannered person, or one who can be duped or cheated especially in financial matters. These are the ways that lamb can be used out of the context of this chapter. Jesus is obviously not a young sheep or someone who can duped or cheated very easily, but he is a sweet mild-mannered person according to the bible. I do not believe that this is the reason that John refers to Jesus as the Lamb of God. I believe that in order to discover the meaning in the context you have to look at the Jewish traditions and beliefs. During Passover the Jews would sacrifice a Lamb and smear its blood across their doors to protect them from the evil spirits that came. Jesus as a lamb can be interpreted as the paschal lamb, whose blood saved the Israel, and also as the lamb that is slaughtered as sin-offerings. Jesus’ crucifixion and death can be thought of as both of the lambs, the paschal and the slaughtered. He was slaughtered to save the salvation of man and forgive their sins. He came to be a sacrifice for the sinners. There is one last interpretation of the lamb in the bible, the apocalyptic lamb that would destroy evil from the world. The apocalyptic lamb is totally different then the paschal lamb and the slaughtered lamb. In the book of Revelations the lamb is referred to as having seven eyes and seven horns. The horn is a symbol of power. The lamb of Revelation is said to lead an army, go to war, and conquer his enemy. This lamb holds the destiny of mankind in his hand; he is â€Å"The Lord of Lord and King of Kings.†(Rev. 17:14) So, which meaning did John in... Free Essays on Lamb Of God Free Essays on Lamb Of God â€Å"Behold, the Lamb of God, who takes away the sin of the world.† (John 1:29) These are the words of John the Baptist as he saw Jesus approaching one day. Why would John refer to Jesus as the Lamb of God? He is not the only one; in the book of Exodus Jesus is referred to as the Lamb twenty-eight times. According to the dictionary a lamb can be: a young sheep, a sweet mild-mannered person, or one who can be duped or cheated especially in financial matters. These are the ways that lamb can be used out of the context of this chapter. Jesus is obviously not a young sheep or someone who can duped or cheated very easily, but he is a sweet mild-mannered person according to the bible. I do not believe that this is the reason that John refers to Jesus as the Lamb of God. I believe that in order to discover the meaning in the context you have to look at the Jewish traditions and beliefs. During Passover the Jews would sacrifice a Lamb and smear its blood across their doors to protect them from the evil spirits that came. Jesus as a lamb can be interpreted as the paschal lamb, whose blood saved the Israel, and also as the lamb that is slaughtered as sin-offerings. Jesus’ crucifixion and death can be thought of as both of the lambs, the paschal and the slaughtered. He was slaughtered to save the salvation of man and forgive their sins. He came to be a sacrifice for the sinners. There is one last interpretation of the lamb in the bible, the apocalyptic lamb that would destroy evil from the world. The apocalyptic lamb is totally different then the paschal lamb and the slaughtered lamb. In the book of Revelations the lamb is referred to as having seven eyes and seven horns. The horn is a symbol of power. The lamb of Revelation is said to lead an army, go to war, and conquer his enemy. This lamb holds the destiny of mankind in his hand; he is â€Å"The Lord of Lord and King of Kings.†(Rev. 17:14) So, which meaning did John in...

Monday, October 21, 2019

Traits Theory in Leadership

Traits Theory in Leadership Introduction Leadership was first used by Greeks to refer to those who were known as first among equals. The term involved operations on the platform of accountability which was used in enhancing equity within the society. Assertiveness, courage, and imitation were some of the traits considered to be responsible for leadership effectiveness amongst individuals (Zaccaro, 1991).Advertising We will write a custom critical writing sample on Traits Theory in Leadership specifically for you for only $16.05 $11/page Learn More The success of any group is attributed to the kind of leadership it has or operates under. Successful leadership entails delegation of group interests with respect to individuals’ association with specific policies. Thus leadership involves combination of traits that could be incubated and propagated through an organization and includes all members. Qualities of a leader Leadership means ability to influence and extend necessary suppor t to others making them work towards achieving specific goals. A leader posses various qualities which include being dynamic, tactful, motivator, orator, futurist, good analyzer, social, supportive and should have job related knowledge. A leader should be the kind of person capable and ready of taking any risk amidst controversial issues. He should have the ability of putting his juniors on toes for the purposes of achieving important goals. Good communication forms part of leadership since messages and objectives need to be articulated through clear and well understood means. Interractiveness form part of socialization where a leader is required to mingle with his subordinates and even offer them support within different areas of need (Zaccaro, 1991). Traits of leadership Hypothesis shows that history has since been shaped by extraordinary leadership; this forms critical starting point for the trait theory of leadership (Zaccaro, 1991). Trait theory argues that leadership fully dep ends on the personal qualities of the leader. Some researchers were acknowledged earlier for the manner through which they applied trait theory, one of them being Bowden 1926. Cowley 1931, summarized by indicating that understanding of leadership required the study of traits. Table 1 below, gives the level of interractiveness involved in traits of leadership. Self confidence appears in all but two of the reviews, whereas other traits including adjustment, sociability and integrity tend to appear in multiple reviews though not consistent (Anderson, 1978).Advertising Looking for critical writing on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Dominance emerged as an important leadership trait within some major reviews. An important observation is the exclusive trait of self confidence; none of the traits emerged as related to leadership in the majority of these reviews (Mann, 1959). Table 1: Review of traits of effectiv e or emergent leaders Leadership Criteria There is general agreement that a five factor model of personality developed by some personalities in early nineteen sixties could be used to describe the most critical aspects of personality (Goldberg, 1990). Traits studied in the five factor model include; Neuroticism, nature of being open towards experiences, extraversion, agreeableness and Conscientiousness. However, several ways emerged on how leadership could be assessed explicitly. Two distinctive classes of leadership emerged which were referred to as leadership emergence and leadership effectiveness. The former refers to the nature of quality as seen by other people concerning leadership’s capability of an individual. This may not be such accurate since the analysis is based on limited knowledge about the leader. Personality traits of an individual leader are deeply explored before making any applicable conclusion. Neuroticism This could be referred to as the status where an individual posses weak emotions towards events. This leads to stressful emotional reactions and experiences. Reviews done by Bass (1990) showed positive correlation in studies on self confidence that showed low levels of neuroticism to leadership. Self esteem an indicator of low neuroticism is thought to be a factor in both senior and subordinate staff within organizations.Advertising We will write a custom critical writing sample on Traits Theory in Leadership specifically for you for only $16.05 $11/page Learn More Neurotic individuals as indicated by some authors are less likely to be perceived as leaders. In consideration of these facts, neuroticism is thought to be negatively related to leader emergence and leadership effectiveness. Extraversion An extravert person is thought to possess leadership traits which make him/her active, assertive, energetic, restless and not easily withdrawn from circumstances (Gough, 1988). According to Costa 1988, extrave rsion is strongly related to social leadership whereas other publications agree that extraversion leads to emergence of a leader within groups. Extraverts are viewed by others to possess unique leadership traits that are of great importance within the field. Leaders are more likely expected to be more energetic as compared to non leaders, they are required to have more stamina and be generally active, lively, and often restless, (Kirkpatrick and Locke 1991). Major facets among extraverts thought to be leaders comprises of dominance and sociability, (Gough, 1990). There is a general feeling that links extroverts to leadership emergence which is mostly associated with leadership effectiveness. Openness This represents the status where leaders are expected to be mentally alert and autonomous when conducting events. According to Bass 1990, openness is the most vital trait of leadership. Openness shows a positive correlation to personality based upon behavioural measures of creativity. T his trait also correlates with the ability to think widely beyond limitations placed by human will. Creativity appears to be an important skill to effective leaders. Research indicates that creativity is linked to effective leadership. There is a consensus belief which suggests that open individuals are more likely to emerge as effective leaders at any given place. Agreeableness This involves the status of being considerate towards situations and events. Zaccaro 1991 discovered that interpersonal sensitivity was related to leadership. Altruism, tact and sensitivity are hallmarks of agreeable personality and would suggest that leaders should be more agreeable.Advertising Looking for critical writing on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Agreeable individuals are likely to be modest and they tend not to be excessively modest as well as being affiliated to certain groups (Bass, 1990; Goldberg, 1990). Need for affiliation appears to be negatively related to leadership in some circumstances (Yukl, 1998). These factors suggest that agreeableness would be negatively related to leadership. In light of these conflicting justifications, the possible relationship between agreeableness and leadership appear little bit ambiguous. Conscientiousness This involves leadership with the end result in mind; the leader proves dependable in times of need and ensures tasks are appropriately completed. Effectiveness for the group and reinforcement of the tendencies all depends on the leadership positioning (Bass, 1990). According to Barrick 1991, conscientiousness is related to job performance which in turn depends on leader effectiveness. Kirkpatrick and Locke 1991 noted that leaders should be tirelessly persistent in their activities a nd follow through with their programs. Conscientious individuals should have more tenacity and persistence therefore expected to make excellently effective leaders that conscientious individuals will be more effective leaders (Goldberg, 1990). Trait theories have been used for the purposes of differentiating between leaders and non leaders. Qualities such as ambition, energy, eagerness to lead, honesty, integrity, self confidence, intelligence, and job relevant knowledge are those which differentiates leaders from non-leaders. Those who find pleasure in shepherding others are considered to make good leaders. Several theories were developed in the process of describing traits. Path goal theory This theory was discovered by Robert House. It involves the extraction of key elements on structure initiation and consideration from Ohio state leadership structure. Also the theory incorporates expectancy theory of motivation. The theory argues that it is upon leaders to help their followers and ensure that they achieve the necessary goals in life and within particular organizations. Four types of leaders’ behaviours are described within this theory; directive behaviours which enable followers easily imitate what is expected of them. Supportive behaviours which shows lots of concern to members, then there is participative behaviour which makes a leader be more consultative with those he/she leads. Finally, there is an achievement behaviour which makes the leader to challenge members through setting of higher goals. Leader Participation Model This is the kind of model which relates leadership behaviour and the level of his/her participation in decision making. This model provides rules which are helpful in the process of analysing leader’s contributions. The levels of participation are drawn against personality traits of the leader under review. Qualities such as ability to communicate effectively, ability to relate freely with members and other employees a nd also training qualities are considered within this model. Conclusion Barrick and Mount (1991), investigated the relationship of the Big Five traits to leadership pooling across the leadership criteria. Conceptually leadership effectiveness and emergence are distinct constructs. Effectiveness and emergence in leadership are analyzed through measures and observations by other people’s perception of leadership. There exists a strong link to ascertain that Neuroticism, Extraversion, and Openness are related to multiple leadership criteria and that these traits display significant relationships with leadership in combined analysis. Emphasis should be given on the importance of teamwork within the various individuals within any group. Leadership requires proper attention to team members through various means which includes providing appropriate advices on ways of improving the overall performances. Leaders should ensure that all the programs used appropriately towards strengthen ing of group members making them ready for any challenging task. At the same time leadership roles should be reinforced through delegation of some duties to individual members; this ensures that all employees and members are actively involved in the running of the team. Leaders should learn to engage the staff in open conversations and record every crucial matter that arises from the conversations. They should also be involved in teaching and guiding the team through various processes and showing them various ways of solving specific problems. Leaders should learn the importance of prioritizing events both on short term and long term basis. In this way it is easy to provide leadership towards utilization of available resources on areas which require immediate attention in the quest for providing quality services. They should be capable of selecting competent members having the capability of working towards achieving the laid down long term objectives. Leaders chosen in every departm ent should have the capability of playing supervisory roles ensuring provision of quality services. Trait theories have been effectively applied for the purposes of differentiating leaders. It makes it easier to identify and associate highly flexible people with leadership, this is since they have dynamic capabilities which enables them to adequately monitor others. References Anderson, G. Viswesvaran, C., 1998. An Update of the Validity of Personality Scales in Personnel Selection. Paper presented at the 13th Annual Conference of the Society for Industrial and Organizational Psychology, TX; Dallas. Print. Barrick, M. R. Mount, M. K., 1991. The Big Five personality dimensions and job performance: A meta-analysis. Personnel Psychology, (44), pp.1–26. Bass, B. M., 1990. Bass and Stogdill’s Handbook of Leadership. New York: Free Press. Bowden, A. O., 1926. A study of the Personality of Student Leaders in the United States. Journal of Abnormal and Social Psychology, (21) , pp. 149–160. Costa, P. T. McCrae, R. R., 1988. Personality in Adulthood: A six-year Longitudinal study of self-reports and spouse ratings on the NEO Personality Inventory. Journal of Personality and Social Psychology, (54), pp.853–863. Cowley, W. H., 1931. Three Distinctions in the Study of Leaders. Journal of  Abnormal and Social Psychology, (26), pp. 304–313. Goldberg, L. R., 1990. An alternative â€Å"description of personality†: The Big-Five Factor Structure. Journal of Personality and Social Psychology, (59), pp.1216–1229. Gough, H. G., 1988. Manual for the California Psychological Inventory. Palo Alto, CA: Consulting Psychologists Press. Hughes, R. L. Curphy, G. J., 1996. Leadership. Boston: Irwin McGraw Hill. Kirkpatrick, S. A. Locke, E. A., 1991. Leadership: Do traits matter? Academy of Management Executive, (5), pp. 48–60. Mann, R. D., 1959. A review of the relationships between personality and Performance in small groups. Ps ychological Bulletin, (56), pp. 241–270. Stogdill, R. M., 1974. Handbook of Leadership. New York: Free Press. Yukl, G. Van Fleet, D. D., 1992. Theory and research on leadership in Organizations. Handbook of industrial and organizational psychology, (3), pp. 147–197 Zaccaro, S. J. Kenny, D. A., 1991. Self Monitoring and Trait based Variance in leadership: An investigation of leader flexibility across multiple group situations. Journal of Applied Psychology, (76), pp. 308–315.

Sunday, October 20, 2019

Bluest Eye and Giovannis Room

The blue eyes and Giovanni's room have two novels written by James Baldwin and Tony Morrison, the world's most highly respected 20th century literary writers. But I'd like to concentrate on their two pieces, James Baldwin's Giovanni's room and Tony Morrison's blues eye. Among these novels, the author suggests a theme rooted in some way in the present. These authors now show this in different ways. This is due to the contrast between the outline of their stories and the structure of novels. Room of Giovanni James Baldwin's novel Giovanni's Room is aimed at emphasizing the symbolism of Giovanni's room. In the novel, the room of Giovanni is depicted as a Giovanni prison symbolizing the life of Giovanni, dominating the relationship between Giovanni and David, a metaphor of David's homosexuality and underwater tomb. These different depictions of Giovanni's rooms are combined in novels to create an overall negative metaphor for homosexuality that follows from society. In the novel The Blue st Eyes, Tony Morrison combines techniques such as how to use the metaphor, satirical usage of the name, and the visual image she uses. The theme of blue eyes is developing mainly on consistency of African Americans against white standards. Women can make their skin white and adjust their hair by changing their hair, but you can not change the color of their eyes. The desire to change his / her identity is itself a desire to become a depressed eye, a desire to become an indication of instability of Pecora itself. This work was somewhat overlooked before other Morrison novels began to form a series of works, but most of the comments on the most eyes are beneficial. Later, many critics saw the blue eyes as a background for Morrison's quest for racial, sexual and cultural problems. For example, Slara, the central figure of Morrison's second novel, is not constrained by social norms that are not of type, but Jade of Tar Baby's fashion model rejects myths of romance . . Morrison women ar e increasingly looking for freedom and autonomy. Like Claudia MacTeer in The Bluest Eyes, they reject romantic myths, beautiful myths, and the implicit character. But the blue eyes is not only the foundation of Morrison's late novels. It is worth reading for himself.

Friday, October 18, 2019

Research Paper Rough Draft Example | Topics and Well Written Essays - 2000 words

Rough Draft - Research Paper Example This work gives a brief description about various types network hacking techniques, various types of biometrics that can be integrated into the network security features and the recent trends in network security involving biometrics forbattling the attacks of the network hackers. Wireless networks have become an essential part of our daily life. In recent times the uses of wireless networks had undergone a phenomenal growth and so are the attempts of hacking and network intrusions. People transmit large amounts of sensitive/private data over the networks to their desired destinations. However, with the new advancements in the field of information technology, maximizing information security has also become more and more difficult as the result of more organized intrusion attempts by hackers. A hacker is a person who makes use of advanced programming skills and techniques to break illegally into any specific computer system in order to expose the security flaws (Ciampa, 2009). Although many significant measures have been taken to make information security and wireless security reliable, none has proved able to provide complete protection to the wireless and computer networks. In such conditions, it is essential to design a reliable security system that can min imize the risk of unauthorized use of information.  This paper will describe in detail why protecting the network system from the attack of hackers is still a challenging task under research, despite various technological developments? (Ciampa, 2009), what are the various techniques used to hack a network? (Ciampa, 2009), what is biometric authentication? (Mudholkar, Shende, and Sarode, 2012),and how incorporating biometric authenticationcan be helpful in strengthening a network’s security system? (Li, et.al, 2011). The use of wireless networks and internet has become inseparable

Stratgic managment task1 Essay Example | Topics and Well Written Essays - 1750 words

Stratgic managment task1 - Essay Example Based on a complete analysis of the company, the future direction mission and vision will be drawn out along with a strategic objectives and key strategies for the next three years. Overview of Company: Tiger Airways Australia has been developed to be an ultra – low cost airline. The company was started in 2007 and is a subsidiary of Singapore Airlines. The main office of the company is located at Melbourne and the secondary base of the company is at Adelaide Airport. The main competitors of the company include some well known airlines like JetStar, Virgin Blue, Qantas etc. The table below provides a clear view of the competition of the company. Airline Competitiveness Jetstar Airways Biggest and direct competition Virgin Blue Very High levels of competition Qantas Airways Very High levels of competition Singapore Airlines High levels of competition SilkAir Medium levels of competition AirAsia Medium levels of competition Philippine Airlines Low Levels of competition Malaysia Airlines Low Levels of competition Cathay Pacific Airways Low Levels of competition (Which Airline) The high levels of competition has led the company to share routes as well as destination with other competitors. The table below provides detailed understanding of the same. ... of the routes are shared (12 Routes) Almost 26% of the destinations are shared (25 Destinations) Philippine Airlines Almost 7% of the routes are shared (7 Routes) Malaysia Airlines Almost 6% of the routes are shared (6 Routes) Company Market Details: Tiger Airline has been in the industry for a relatively shorter period and the company has yet to build its brand name and image in the markets. However Tiger Airlines has been able to effectively develop a number of routs for itself. The company is strictly a point to point travel airline and hence the company does not provide range of services like baggage to other flights, or transfer of passengers (Joshua). However the company has been able to effectively reach out to a strong market in the past years. The diagram below provides a clear view of the route of the company. (Airline Route Maps) Tiger Airways Fleet Total Singapore 10 Australia 9 Total 19 (Tiger Airways) It is clear that Tiger has been able to effectively launch itself int o several routes. The next section will provide an overview of the company’s internal and external analysis. Here SWOT analysis and PEST analysis has been chosen for the company. SWOT Analysis: Strengths Ultra Low Cost airlines Wide range of routes available Excellent coverage of the South East Asian countries and Australia Weaknesses Too focused on the low costs Lack of proper service in terms of the services included in the price Incomplete or inaccurate processes Opportunities Recessionary period is an opportunity for the company to make the best of the travel of people Higher availability of technology Improved ecommerce website Threats Increasing number of negative reviews from customers Increasing facilities by other low cost airlines Increase or fluctuation in terms of the fuel

Maintaining Psychological Contract is Crucial During Downturns Essay

Maintaining Psychological Contract is Crucial During Downturns - Essay Example How employee perceive obligation and to what magnitude it is fulfilled constitute the main ingredient of this psychological contract. It can be divided into subdivisions within the literature that further enumerate its framework. The two types includes transactional and relational contract. Relational psychological contract is mainly driven by socio-emotional exchanges between the employee and the organization. It involves long term undefined performance terms and promotes a mutual sense of understanding. It bonds the two parties with the commitment of promoting collective interest over personal gains. (ODonohue et al 2007). On the other hand transactional psychological contract is comprised of monetizable exchanges and are driven by short term personal interest. Both these type of contract terms blend together to provide with the important adhesive that binds the two parties with a concealed force. According to Burr and Thomas there is another form of contract which is emerging unde r the label of â€Å"ideology-infused† contract. It has a more transpersonal perspective not only transactional and relational but also for something for the society. So it demonstrates what is in it for me, us and the society. So far we were explaining psychological contract from one dimension only involving the employee and the organization. But since recent changes in the trend of hiring workers from different agencies has given rise to another form of psychological contract. This contract has two dimensions. In this setup, workers are employee of the agency hence all the essence of psychological contract perfectly applies among the two parties. The other contract is established between the employee and the client organization where he or she works. (Chambel et al 2009). This dual psychological contract is not discussed much in the literature and it is important to highlights its implication in today’s changing trend of contingent employment. Now technically there

Thursday, October 17, 2019

Business plan Assignment Example | Topics and Well Written Essays - 500 words - 1

Business plan - Assignment Example This has been in practice by people regardless of their age ranging from their childhood which poses as great dange (Henry, 2013)r. Also from the time of industrialization in this world whereby machines replaced work done by human especially the practical and manual work, many people have engaged in business or work practices which they engage passively. Most people work in offices and spend all of their day sited. This makes their bodies to be more relaxed which is a great danger. Due to the above practices which have been caused by emanating factors in the environment such as technological developments in food and in how work is carried out, diseases have come into being which have killed and continue to kill people all over (Pinson, 2004). An example of a lifestyle disease is cancer which results from eating unhealthy food which comprises mostly of junk food and on the other hand not practicing at all. As per the above aspects of life, it is thus worth to come up with a fitness center which will tend to assist people to maintain a good living characterized with good health through training and proper dieting. This is a spelled out in the fitness centers vision, mission and the strategy of the organization (Bisoux, 2002). Good health fitness center is an entity whose main goal will be to create a fit and healthy society. Good training and proper dieting will be our main objective which we intend to teach the society in order to make the world a better place. Our agenda is to eliminate lifestyle diseases in the future through our committed staff of well-trained fitness guides who will be of help to the society through their advice on how to train and live well. Our goal is also to create branches throughout the nation In order to ease access of training facilities and services. Our vision is to be the best in weight management, group fitness, cardio and martial arts. Our mission is to be the best firm in

DU (The Emirates Integrated Telecommunications Company that operates Research Paper

DU (The Emirates Integrated Telecommunications Company that operates in the United Arab Emirates) - Research Paper Example Consumer segment focuses on people and households who are provided with mobile as well as fixed voice calling, apart from internet and related data services and television services. The business segment focuses on small scale as well as large scale businesses and corporations and government agencies. The company provides them with integrated fixed and mobile business solutions such as voice, contents, data and mobile or otherwise applications. Carrier segment focuses on providing carrier and international data networks as well as wholesale services to international companies and multinational corporations (Gulfbase.com, 2015). Emirates Integrated Telecommunications Company is ranked as first in the telecommunication sector, and is ranked as fourth in the service market. The company holds 11.37 percent of the share in the telecommunication sector, and 7.56 percent of the market share in the service industry (Gulfbase.com, 2015). It employs 2000 workers throughout UAE and ensures a great working environment for both its home and expatriate staff. The company was late entrant to the telecommunication sector in the GCC, but it successfully competed against great players in the market such as Etisalat and managed to achieve 8.5 million prepaid mobile and data subscribers (Oracle.com, 2015). Solvency ratios give a significant metric to measure a company’s ability to meet its debts as well as other financial obligations. This ratio shows whether the cash flow is sufficient for the company to meet its financial liabilities of both short and long terms (investopedai.com, 2015). This paper presented a brief company profile of Emirates Integrated Telecommunications Company, which is the leading provider of mobile and telecommunication services in UAE, and has been ranked to be the number one in the sector in UAE. This paper presented the income statement and balance sheet of the company and analyzed various ratios related to short term solvency or

Wednesday, October 16, 2019

Proposed amendment to county comprehensive plans Assignment

Proposed amendment to county comprehensive plans - Assignment Example (Puget Sound Regional Council, 2008, 59) The counties of both Pierce and Snohomish will have the opportunity to vote on the Vision 2040 document, and amongst its terms are the preceding. The following discussion paper will outline the policy and its various facets. It will also introduce some of the broadest national, indeed international, implications of the policy as well as the local issues of direct and immediate importance. This document will provide Pierce and Snohomish councilors with all the information necessary to make a considered and enlightened decision regarding Vision 2040, in the context of Multicounty Planning Policy DP-47. Vision 2040 and the Goals of Pierce and Snohomish Counties Vision 2040 is 'The Growth Management, Environmental, Economic, and Transportation Strategy for the Central Puget Sound Region' and was adopted by the PSRC General Assembly on April 24, 2008 and amended by the PSCR Executive Board on May 28, 2009. Consequently, it's jurisdiction covers Pie rce and Snohomish Counties. ... (Puget Sound Regional Council, 2008, v) As such in its general principles it corresponds precisely with the goals of the Pierce County Code Title 19A – Comprehensive Plan, 2010. This document commences with the identification of thirteen goals. One of these is (E.) 'Economic Development', and another is (J.) â€Å"Protect the environment and enhance the state's high quality of life, including air and water quality, and the availability of water.† A range of the other objectives relate to social goals and quality of life issues. Clearly, therefore, the Vision 2040 document is congruent with Pierce County's broadest policy thrusts. Such is also the case with Snohomish County. The future of Snohomish County is outlined in the Snohomish County Department of Planning and Development Services, General Policy Plan, 2011 identifies a series of themes and policy objectives that are also consonant with Vision 2040: Encouragement of development and/or redevelopment in urban areas with existing or planned public facilities and services. Reduction of urban sprawl. Adequate provision of efficient multi-modal transportation systems. Availability of affordable housing for citizens of all income levels. Promotion of economic opportunity. Respect for private property rights. Predictability and timeliness of permit review processes. Conservation of natural resources. Retention of open space and provision of recreational opportunities. Protection and enhancement of the environment. Citizen participation in the planning process. Adequate provision of necessary public facilities and services. Preservation of historic and archaeological resources. Utilization, protection, restoration and preservation of shorelines of statewide significance. (Snohomish

DU (The Emirates Integrated Telecommunications Company that operates Research Paper

DU (The Emirates Integrated Telecommunications Company that operates in the United Arab Emirates) - Research Paper Example Consumer segment focuses on people and households who are provided with mobile as well as fixed voice calling, apart from internet and related data services and television services. The business segment focuses on small scale as well as large scale businesses and corporations and government agencies. The company provides them with integrated fixed and mobile business solutions such as voice, contents, data and mobile or otherwise applications. Carrier segment focuses on providing carrier and international data networks as well as wholesale services to international companies and multinational corporations (Gulfbase.com, 2015). Emirates Integrated Telecommunications Company is ranked as first in the telecommunication sector, and is ranked as fourth in the service market. The company holds 11.37 percent of the share in the telecommunication sector, and 7.56 percent of the market share in the service industry (Gulfbase.com, 2015). It employs 2000 workers throughout UAE and ensures a great working environment for both its home and expatriate staff. The company was late entrant to the telecommunication sector in the GCC, but it successfully competed against great players in the market such as Etisalat and managed to achieve 8.5 million prepaid mobile and data subscribers (Oracle.com, 2015). Solvency ratios give a significant metric to measure a company’s ability to meet its debts as well as other financial obligations. This ratio shows whether the cash flow is sufficient for the company to meet its financial liabilities of both short and long terms (investopedai.com, 2015). This paper presented a brief company profile of Emirates Integrated Telecommunications Company, which is the leading provider of mobile and telecommunication services in UAE, and has been ranked to be the number one in the sector in UAE. This paper presented the income statement and balance sheet of the company and analyzed various ratios related to short term solvency or

Tuesday, October 15, 2019

Teenager Substance Abuse Essay Example for Free

Teenager Substance Abuse Essay For youth leaders, this is a study of a teenager who has a substance abuse problem and was released from a detention center. It involves a seventeen old male who abuses marijuana, alcohol, and ecstasy; and is also the son of two ministers. This story should help readers understand the dynamics involved with a teenage drug user and will also help youth leaders develop effective skills for reaching out to a troubled teen in need of support, especially after incarceration. A seventeen-year-old male, Jimmy, lived in a middle-class suburb. Jimmy was referred to me by his sister, ecause she felt my knowledge and past experiences might be helpful in reaching him. Later on I decided to meet and conduct an interview at his house, with his sister present in an adjacent room. During the conversation, several facts emerged. Jimmy had been in trouble with the legal system, mostly for drug possession and motor vehicle infractions. He said he had been kicked out of high school because of his drug use. He had been using alcohol and marijuana since he was about 13. He had more recently been taking ecstasy. When asked why he used drugs, he claimed it educed his boredom and provided a way to escape and have fun. Additionally, it was discerned that his father worked long hours (in the mental health field), and was basically absent from the family. Later, I learned that his father denied his sons habits. The family, which also includes a younger 16-year-old brother, had gone to see a therapist but Jimmy was an unwilling participant. Jimmy noted that he does have a problem with authority figures, like the police, because he believes they are corrupt. Jimmy did admit that police have a Job to do, in terms of protecting people rom harmful practices. Jimmy also realized that there are consequences of drug use and that he was headed for a state prison sentence if he did not improve his actions. He learned that his mother could be arrested under law if he had drugs in her house; this bothered Jimmy. I researched about what state prison was like and told him all about it. Throughout the intervention, then I listened and affirmed the young man without condoning his bad behavior. In the end, I gained his trust and told him that his personal feelings would be kept confidential. I recommended that Jimmy be areful when he with his peers, and I encouraged him to select a friend who would help hold him accountable. I shared my phone number with him. Jimmys behavior improved. The relationship between teens and drugs has been around for decades; however, this is not what you would call positive. Substance abusing (which is using drugs or alcohol in ways than can cause physical harm) is often associated with crime. But why do youths take drugs? Youth take drugs for the following reasons: social disorganization, peer pressure, family factors, emotional, or rational choice. Social isorganization deals with drug abuse to poverty and disorganized urban environment. Drug use by youth minority group members has been tied to factors such as racial prejudice, low-esteem, social status, and stress produced from environment. The National Youth Survey found that drug use tends to be higher among urban youths. problem was bad and the police officer and teachers that worked at my high school had no idea whatsoever what was going on right under their noses seriously, I remember people at football games found this place behind a shed where no one went and they used to smoke and do drugs, it was bad. But of course no one could say anything about anything they saw otherwise that person will get death threats and get their tires slashed in the parking lot and have to go to homecoming fearing for their life. Like one time I remember this girl said something and everyone in the school hated her and she was instantly unpopular. So yes there is a huge drug problem and getting students to rat each other out is so not going to happen. In a perfect world maybe, but in the real world, not a chance. Jimmy is a classic case of a lonely teenager who is never with his parents and is basically always hanging out ith his friends which are a very bad influence. The pattern that I recognize from Jimmy is that he has been wanting to get his parents attention and the only way he gets it, is by consuming excessive alcohol or illegal drugs. Teens feel alone at home and family. They look for something attractive that pleases them. They dont get enough attention from parents. They were not used to get enough attention when they were kids. But when they were kids there were a lot of childish things that could make them busy and temporarily happy. But when they reach 14, those things can ot attract them anymore. They still suffer from lacking of attention and the things that could be a relief for them, have lost their attraction. So they look for new things. Definitely these new things cannot be found in family. They are already disappointed about family. Parents should be trained and educated about these things. They should know that all of these problems come because of lack of attention from one or both parents. One hour attention to children and teens saves hundreds of hours of therapy in future. It prevents a lot of problems that addiction is only one of them. By interviewing Jimmy I found that teenagers see taking / using drugs are Just a way of teenage-hood, most youth will try some sort of drug, maybe Just to try it out or maybe for a reason. This teen said he has taken drugs because it was something to do, and everyone else around him was doing it and it was seen cool to take drugs and that it was a way to escape from the real world. Interviewing Jimmy was very interesting because I could sort of relate what he is going through from when I was in high school. Luckily Jimmy is acting on time before he goes to the wrong path and becomes a failure in life.

Monday, October 14, 2019

Classification Of Network Topology

Classification Of Network Topology The term topology refers that way in which the end points, or stations, attached to the network are interconnected or it is the arrangements of systems in a computer network. It can be either physical or logical. The physical topology refers that, how a network is placed in a physical way and it will include the devices, installation and location. Logical topology refers that how a data transfers in a network as opposed to its design. The network topology can be categorized into bus, ring, star, tree and mesh. Hybrid networks (They are the complex networks, which can be built of two or more topologies together). Bus Topology A bus topology is characterized by the use of a multi point medium. A long and single cable acts as a backbone to connect all the devices in a network. In a bus topology, all computers are stations attaching through the tap (an interfacing hardware to connect to the network) and it connects directly to the bus network. Datas are transmitting and receiving to the bus, by the duplex actions between the tap and the device. Devices in the bus topology send a broadcast message to the other device for communications. But the proposed device can only accepts and processes the messages. Advantages Bus topology can install very easily on a network. Cabling will be less compare to other topologies because of the main backbone cable laid efficiently in the network path. Bus topology suited for a small network. If one computer fails in the network, the other computers are not affected they will continue to work. It is also less expensive than star topology. Disadvantages The cable length will limited and there by limits the number of stations. The main cable (backbone cable) fails, and then the entire network will fail. It is very difficult to trouble shoot. Maintenance cost is very high in a long run. Terminators are required for both the ends of the cable. Ring topology The ring topology is the network consists of dedicated point to point connection and a set of repeaters in a closed loop. Signals passing through ring in a single direction until they reach to its final destination. It may be clock wise or anti clock wise. Datas are transmitted in the form of frames. These topologies are used in school campuses and some office buildings. Advantages It performs better than star topology under heavy work load For managing the connection between the computers, there is no need for the network server. It is cheaper than star topology because of less wiring. By adding the token ring in the network, can create large network. Very order network because all the devices has a access to the token ring and opportunity to transmit. Disadvantages A failure or break in the ring, it can disable the entire network. It is much slower than an Ethernet network with under normal load. Any moves, changes and ads of the devices can affect the network. Network connection devices like (Network adapter cards and MAU) are much more expense than Ethernet cards. Star Topology Star topology is the network in which each station is directly connected to a central connecting node called hub. In star topology all the devices are not directly connected to one another. All the devices are connecting to the central server (switching hub). This topology does not enable the direct traffic between the devices in the network. A controller act as the interface between the devices. A star topology feature, each device needs only one link and one input/output port to connect the number devices in the network. This type of topology is used in local area networks (LAN) and sometimes high speed LAN often uses a star topology with central hub. Advantages If anyone connection is fails in the network, it will not affect the entire network. Only that connection or link affected. It is easy to identify the fault and fault isolation. Easy to expand the network in the star topology. No failure to the network when connecting or removing devices. It is very easy to manage because of its simplicity in the function. Disadvantages In a star topology, if the central connecting device goes down, the entire network will fails. It requires more cable length compared to the linear bus topology. Star topology is more expensive than bus topology because o the connection ports like hub. Tree Topology Tree topology is the generalized form of the bus topology. It integrates the multiple star topologies together on to a bus. The data transmission of the tree topology, through the cables with closed loops. The transmission medium is a branching cable with no closed loops. The layout of the tree topology is beginning at the head end. These layouts have many branches and these are quite complex layouts in the topology. Any transmission from the device is going through the medium and it can receive by all other devices in the tree topology network. Tree Topology will give the expansion of the existing network. Advantages Tree topology is well supported by the hardware and software vendors. Point to point wiring for each and every segments of the network. It is the best topology for the branched networks. Disadvantages It is more expensive because more hubs are required to install the network. Tree topology is entirely depends upon the backbone line, if it fails then the entire network would fail. It is very difficult to configure and wire than other network topologies. In a tree topology, the length of network depends on the type of cable being used. Mesh Topology In a mesh topology, every device has connected to each other or a dedicated point to point link to every other device. (Dedicated term means that the traffic links only between the two devices it connects). To find the number of physical links in a fully connected mesh network with n nodes, we first consider that each node must be connected to other node. Node 1 must be connected to n-1nodes, node 2 must be connected to n-1nodes, and finally node n must be connected n-1 nodes. If each physical link in the network can allow the communication in both directions, we can divide the number of links by 2.In other words we can say that in a mesh topology, we need n (n-1)/2. Suppose if we are connecting 15 nodes in a mesh topology, then the number of cables required; CN = n (n-1)/2 CN = Number of cables = 15 (15 1)/2 n = Node = 15*14/2 = 15*7 = 105 Therefore, the total number of cables required for connecting 15 nodes = 105. Advantages There is no traffic problem because of the dedicated link in the mesh network. Mesh topology is very strong. If any link becomes not active it does not deactivate the entire system. Point-to-point links make full identification and fault isolation easy. Security or privacy for data travels along the dedicated line. Network can be expanded without any disruptions to the users. Disadvantages Installation and reconnection are difficult. Mesh topology required more cabling and the number input/output ports comparing with other network topologies. Sheer bulk of the wiring can be greater than the available space can accommodate. The hardware required to connect each link can be prohibitively expensive. Hybrid Topology A network can be hybrid, which uses two or more network topologies together in a network. An example of hybrid technology is the star ring network. OSI Model in the Network The OSI model was developed by the ISO (International Organization for Standardization) in 1947, as a model for a computer protocol architecture and as a frame work for developing protocol standards. The purpose of the OSI model is show how the communications are going through in a network between different systems. The OSI model is not a protocol; it is a model for understanding a network architecture .This model is flexible, very strong and interoperable. The OSI model is a layered frame work for the design of network systems that allows communication between all types of computer systems. OSI model contains of seven layers, each of which defines a part of the process moving information across a network. The OSI reference model has been divided into two categories according to their specific functions in the network architecture; upper layers and lower layers. The lower layers are used to allow traffic through the network to the other system. The other four layers are used to complete the process to the other system. The Advantages of the OSI model are given below It helps the user to understand the whole features involved in networking OSI model gives a better understanding to the users that how a software and hardware components working together in the networks. Troubleshooting in the OSI model is easier as it breaks the network into usable layers The basic functional relationship terms are defined so that it can be used by network professional on another network The users can understand new technologies as they develop in this model Upper Layers of the OSI Models are; Application layer Presentation layer Session layer The upper layers have act as an interface between the end user and the applications. It consists of all the issues about the application, presentation and sessions and these layers are applied in software only. The application layer is more close to the end user. Examples of upper layer technologies in the OSI model are SNMP, FTP, and WWW etc. Lower Layers of the OSI Model Transport Layer Network Layer Data link Layer Physical Layer These layers provide network specific functions like data transport issues (flow control, addressing and routing). The bottom layers in the OSI model (physical layer and data link layer) can use in software and hardware also. TCP, UDP, IP, IPX are some examples for the lower layers. Application layer The application layer act as the interface to the end users can access the network. Application layer is the layer the user sees in contest of loading an application such as e-mail, supporting the file transfer, ability to print on a network, surfing the World Wide Web etc. These layer have another specific functions like network virtual terminal, access and management, mail services and directory services. Protocols used in this layer are SMTP, Telnet, FTP, and SNMP. Presentation layer In the presentation layer, the application formats the data to be sent out on the network depending on the presentation layer. The presentation allows applications to read and understand the data or message sent.The presentation layer is also responsible for the translation, compression and encryption. Messages are sending between the layers. Presentation layer will translate data into understandable for the transmission. This layer also handles the encryption, decryption, data compression and decompression. Session layer The session layer is the network dialog controller. It establishes, maintains and synchronizes the interaction among communicating systems. This layer is responsible for opening, using and closing session. It handles the remote procedure calls. Session layers are communication through the gateways and application interfaces. Session layer will also places check points in the data flow. Examples for the session layer are SQL, ASP, and RPC etc. Transport layer The transport layer offers end to end communication between the two end networks devices in a network. The transport layer is also responsible for the delivery of a message from one process to another. A process is an application program running on a host. The transport layer ensures that the whole message arrives intact and in order, overseeing both error control and flow control at the source-to-destination level. Transport layer gives a type of address to the data called port address. Transport layer also have the responsibilities of detecting transmission error and the proper sequence. This layer divides the messages into smaller packets and it controls the data flow. Network layer A Network layer provides the end to end (source to destination) delivery of a packet, across the multiple networks (links). This layer ensures that each packet gets from its point of origin to its final destination. Network layer gives logical addressing, so that endpoint (receiver) can be identified. During a packet delivery process it send messages and report errors. This layer also defines the routing works and how routers can learn how a packet can deliver. Examples for network layer protocols are IP, IPX, and TCMP etc. Data link layer A Data link layer transforms the physical layer, a raw transmission facility, to a reliable link. It makes the physical layer appear error-free to the upper layer. This layer divides the datas into frames and gives the physical address. It uses the MAC address for define a hardware or data link address .Data link layer handles the flow control, error control and the access control. This layer can identify the specific computer on the network. Data link layer contains two sub layers; Logical Link Control and Medium Access Control. LLC is the upper layer and which maintain and establish the communication links to the device. And it also responsible for the frame error control and addressing.MAC is the lower sub layer of the data link layer. It controls how the devices sharing the media channel. Physical layer A Physical layer is used to define the connector and interface conditions, also the medium requirements which are cables. The Electrical, Mechanical, Procedural and Functional conditions are also defined by sending a bit stream on the network. This layer defines the characteristics and different types of medium. Physical layer defines the data rate i.e. the duration of a bit or how long they will exist. Physical layer will tell the transmission mode between two devices. Examples for the physical layers are Cables, hubs, switches, repeaters etc. Conclusion Network topologies helps the user to understand the whole features involved in networking and also how the software hardware components together in networks. Network topology provides easy to trouble shooting the OSI models. Users can understand very well about the new technologies in the OSI model. Resources I have searched various websites and books for gathering information about the network topologies and OSI model. Strength of the project I have studied the assignment very deeply and did very hard work for doing this assignment. I collected different type of resources for getting the information for this project like books, journals and websites etc. The project has been completed with the support of my lecture by giving some useful tips. Effective time scheduling really helps me for doing the project. Weaknesses of the project It was very hard to find out the important information for this assignment. Lack of experience for doing these kinds of assignment. What I learned from this project Project planning is very much important for doing a successful project. If we can spend relatively more time on our project, it will be much better for the project. I have learnt how to work under pressure and how to complete the given project in a scheduled time.