Monday, September 30, 2019

Network Security And Its General Challenges Information Technology Essay

Network security is by and large considered as giving protection for the organisation by maintaining far from the hackers. Information security chiefly focuses on protecting the informations resource from malware onslaughts or simple errors which are done by people in administration with aid of DLP techniques. Information security means protecting information from the unauthorized users, the two footings information security and computing machine security and information confidence which are frequently used otherwise. These all Fieldss which are interrelated and portion some common ends of protecting confidentiality, unity and handiness. Governments, corporations, military, infirmaries, fiscal establishments, and some private concerns. Huge sum of confidential information about all their specific employees, merchandises, clients and research. All these information will be collected with processed and shop computing machines and besides can be transmitted across all other web.protecting confidential information is really of import in concern demand and in all instances an ethical and legal demand should be done. The cyberspace adventurer has thrall down to one and many security exposures and some of these exposures like spyware, computing machine viruses and adware are made possible by exploitable mistakes and bugs in the architecture of internet adventurer. The mistakes may be as Spyware which is installed in computing machines in which of import information will be copied without our cognition and this sort of malware is really difficult to observe. Adware as good is one of malwares which is in the signifier of advertizement on computing machine when you are downloading anything on the system.lastly Computer virus is one of the viruses which are created by computing machine itself. Software security is most of import for consumers, sellers because aggressors that create onslaughts even may do reasonably big consecutive effects and when all these onslaughts has been discovered so required package is sold for the consumers depending on the exposures. Decision: As tonss of information available at web services i.e. World Wide Web and these are successful in supplying services to all the user with the aid of web security that provides all the benefits of utilizing a safe web entree and uninterrupted informations transmittal between both the terminal devices. Machine surviving has been changed because of addition of internet population It figures out, all the relevant information sing the user at client side and hints out web sites accessed during the web session.

Sunday, September 29, 2019

The True Identity

Culture and identity go hand in hand. Everyone has their own identity, but where does that come from? The main contributor to someone’s identity is the culture they grew up in. Cultures vary in many different ways. Chinese is a very factual, to the point, respect your elders and family culture, while American culture is more carpe diem, freedom of speech, bigger is better mentality. So as you could imagine someone in China will grow up with a much different identity that someone in America. Someone’s true identity comes out when you’re placed in a situation that tests your culture’s view of right or wrong. Whether you go with the flow or choose to disobey is how you know one’s true identity. Take into account the story â€Å"Sonny’s Blues. † The narrator of the story, Sonny’s brother, thinks from the time Sonny’s a boy that the path Sonny has chosen is the wrong one. THis is because Sonny decides he wants to be a musician and gets into drugs, not the correct view of the culture deems correct. However, through his music Sonny shows his brother how he becomes happy and finally Sonny's brother understands why he went through what he did. They grew up in the same housing project and culture but why did they turn out so differently? Sonny went down the path that he felt would make him happy, the music. His brother chose to go along with society and join the army, get a career, and then start a family. I feel that Sonny has found his identity long before his brother has. He knows exactly what makes him happy and he goes after that in his own way, breaking free of society and becomes his own man, with his own identity. The narrator goes through the motions and while his brother maybe going down a separate path Sonny’s alive and has found himself. His true identity comes out when he’s on stage. In America we preach the pursuit of happiness meaning to go for what you want, allowing your true identity to shine. Whether you choose to take Sonny’s route or his brother’s, now that’s where you find your identity. In Jekyll’s case, he had split personalities. Hyde was his bad side and his pure side, which everyone came to know, wasn’t what Jekyll really wanted. He wanted to let Hyde out and to do so he had to take drugs, like Sonny did. Jekyll’s surface was a proper man but his true identity was what lied beneath him and what he allowed to surface when he conjured up his potion. Letting out this carnage side made Jekyll feel alive, with no remorse of what he was doing. The aliveness he felt was the disregard of his culture and their rules, and this is where he found himself happy. The disobeying Hyde was Jekyll’s true identity and how he really wanted to feel. Have you ever one day been faced with the opportunity to break cultures rules and done it? Did you feel exhilarated? Ones identity will never change. When they figure out what the true inner person is that, whether its a naughty person or a great person is what surfaces when the person is alone or set with a straining situation. The Jekyll side is what culture wanted to see, but the true identity of Jekyll was the disobeying side of Hyde. Identity now a days in America is being more seen as your image. Identity is everything that you are composed of. Looking at one person you can think you know them, but what do you know? Your Identity is you culture, morals, family, everything that has ever come to shape you to who you are today. What do you know at first glimpse of the hispanic standing in front of you? He was adopted by two Asians when he was just a baby and now is more assimilated into the asian traditions than any hispanic traditions. In â€Å"Trying to Find Chinatown,† this is almost the exact situation. This short story was wrote to open the eyes of the reader to see that someone doesn't have to be the person you label them as when first laid eyes on. Just because a person looks one way their identity has a much deeper meaning to them than image. Of course your identity for the most part will show up on the outer surface minutely, but who knows what caused you to walk down to the corner store to rob it, or why you jumped in front of that stranger on the bus to save his life jeopardizing your own. Your identity is what drives you to make those decisions. Your culture has a lot to do with that too. Some peoples true identity is to go with what culture deems right or wrong and others do things just in spite of their culture, but for the most part every ones identity reflects the culture they were raised in-in some form. Ones identity must be found by pushing themselves to the limit of what is known. Where they have to make their own decision based purely on the voice inside of them which tells them what to do. Your identity can mask itself to let the culture you live in accept you, but at some point if you repress that too much it could be detrimental to your health, just ask Dr. Jekyll about that one. Don’t ever judge a book by its cover because the man you see on the outside, sometimes maybe a very different person inside. People go on missions in search of their true identities, but i feel that the way to find your true identity is to look in the mirror and ask yourself, what do i base my choices off? Do i go with the flow of my culture or am i a stand alone type person. Only you can know the answer of your true identity.

Saturday, September 28, 2019

Nternational Marketing and Marketing Research

International Marketing and Marketing Research Compare the advertising campaigns (message, media, target audience†¦ )which company may use a) to launch new product b) to support a long established product whose sales are slowly declining Introduction Due to new challenges which business organisations encounter in ever changing environment, the present marketing must focus on much more than creating new products or services. It is vital to price them attractively and make them available to increasing demands of customers at place where they require them.However, an ffective marketing mix can be only successful only if all it parts take place One of the core aims of firms' marketing departments nowadays is to give emphasis to communication with their customers. The communication is based on understanding people's needs. The mission of marketing specialist is to create and design an unique sales promotion. Marketing communications is part of marketing mix. An important goal of adve rtising is to influence customers' choices and buying decisions, which will lead to accomplishment of marketing plans of the firm.Advertising has to be visible, clear, and easy to take in. Also, it has to identify the advertiser and their products or services. Marketers bring into play different advertising campaigns. during the ptoduct life cycle, product go through four different stages: introduction stage, growth stage, mature stage and declining stage. When the product is introduced for the first time in the market place, advertisement is aggressive; companies employ many means of direct and indirect marketing to promote it.Mass media are used since there is only little knowledge about this product among customers. Introducing new consumer goods is so-called informative advertising. Its main objective is to build a primary demand. A strategic aim firms follow when promoting the product for the first time is to inform potential buyers about it and highlight its features which dis tinguish it from competitors. Furthermore, this will create awareness about the product and influence consumers' perception. It also helps to build the firm's brand.In contrast, an advertisement of a new product is completely different from an advertisement of already established product, which has declining sales. Usually, these are products, which consumers have already known or used them and at some oint the sales curve start to decline. In this case, the promotion and advertising have marvellous impact to turn sales in opposite way. For example, the company offers some extra services. Furthermore, certain products can be offer with a complimentary product or discounts can take place. Price and non-price competition should be used at this point to keep the product at the market.When the sales are declining the main aim of marketing advertising strategy is to remind consumers of the product or service. The campaign in this case is trying to boost sales and profits. Advertising cam paigns vary. Firms can use a means of below and above the line marketing. below the line marketing include direct means of communication, most commonly direct mail and e-mail, often using highly targeted lists of names to maximize response rates and above the line embrace advertising such as television, cinema, radio, print, and Out-of-home to promote brands or convey a specific offer.Literature review Advertising is non personal form of communication, presentation and promotion of consumer goods, which will lead to increasing the sales. The information about certain organization and its products is conveyed to potential buyers through mass edia, such as television, radio, newspapers, magazines, direct mail, public transport, outdoor displays, catalogues, internet. (Dibb, 2009) The main purpose of advertising is to inform or persuade members of particular audience about new products which will enter the market , or for the existence of promotions which will be appropriate for some c ostumers.On the other hand , the main use of advertising embrace the promotion ot products or an organization in order to awareness among target consumer segment. The most important sides of advertisement are stimulation of demand, off settings of rivals' advertising strategy, and to support elling drives. (Dibb, 2009) Also, advertising marketing strategy has to notify and educate a certain target market about a brand and its heightened marketing mix or product benefits(Dibb, 2009). Due to these facts, the general idea of all advertising campaigns is to enhance consumption of consumer goods.Identifying the target market The target market is a specific group of people within the market at which the advertising message will be convoyed through the mass media. The target market or audience can be created from people from the same gender, age group, or based on other common features. Researchers attempt to understand the needs of certain target audience and this will lead to creating of marketing message that will make consumers to respond. The consumer feedback plays an important role in designing an advertising campaign.Advertising budget The most difficult marketing decision is how much a company should spend on advertising. According to Kotler(2001), advertising budget usually is influenced by different stages of product life cycle. A product first appearance in the market place usually need higher advertising budget. The company in that stage has to emphasize n building awareness and to gain target consumers. Market shares also affect the budget, expanding the market share require higher advertising cost, on the other hand low share brands often have high advertising spending, which aim to increase sales.Rivals have the main point when a company sets its advertising budget. Developing advertising strategy Consisting of successful advertising strategy depends on advertising message and selecting media. In advertising, different creative strategies are used in order to obtain consumer attention and provoke shoppers to purchase or use a specific product. Advertisers use different ways of thinking to create catchy slogans that capture consumers' attention. Creative strategies promote publicity, public relations, personal selling and sales promotion.

Friday, September 27, 2019

The Assassination of President Garfield (Document Analysis Assignment) Research Paper

The Assassination of President Garfield (Document Analysis Assignment) - Research Paper Example The document under analysis was written in the context of Guiteau assassinating the president, an act he asserted was of political necessity. On the fateful day, July 2, 1881, Guiteau tracked the President to the then Baltimore and Potomac Railroad Station where he shot him. Guiteau immediately surrendered to authorities, saying he was the â€Å"The Stalwart of the Stalwarts.†2 Although he said that he was â€Å"Stalwart of the Stalwarts†, it is evident that he was merely disgruntled as he states in his letter that â€Å"the President proved a traitor to those who made him president.† 3 Stalwarts were a late 19th century group of Republicans under the leadership of one Roscoe Conkling who supported President Ulysses S. Grant (1869–1877) for a third term in office. This clique opposed the moderate Republicans who wanted civil reforms and often fought for the control of the Republican Party. Later, the opposing groups would settle on James A. Garfield for the Republican ticket at the Republican national convention in 1880. Guiteau arrived at his decision to assassinate President Garfield arguing that the latter was ungrateful to the Stalwarts after allowing himself to be manipulated by the Secretary of State to plot to murder Senator Conkling and General Arthur Grant. It is widely believed that Guiteau’s plot to assassinate the Pr esident originated from his belief that he was principally responsible for Garfields victory and should have been rewarded with an ambassadorship for his vital help to the President. 4 The two postings he wanted for himself but were constantly rejected by the President and the Cabinet were Paris and Vienna. Without family, friends, and almost penniless, Guiteau grew increasingly isolated and depressed and decided that the President Garfield had to be removed. That Guiteau was the only one obsessed with President Garfield and disgruntled with the latter’s government to the point of

Thursday, September 26, 2019

The ten faces of innovation IDEO's Strategies for defeating the Essay

The ten faces of innovation IDEO's Strategies for defeating the Devil's Advocate and Driving Creativity Throughout Your Organization Thomas Kelley, Jonathan - Essay Example Kelley does so by describing the way in which an innovation team can be built and function, providing numerous examples of application of these concepts. The introduction sets the scene by singling out the "devil's advocate approach" as the worst enemy of innovation, before defining three groups of roles, or "personas" which typically constitute a successful innovation-oriented activity. In a manner reminiscent of other team role models defined in organizational behavior, Kelley names the groups "learning", "organizing" and "building" personas. It is the learning group, which is the focus of the first three chapters. First the Anthropologist's role is discussed, where the key to beginning successful innovation is un-blinkered perception of how people behave. The theme continues with the Experimenter, whose accelerated failure allows for faster progress towards the goal, before closing with the Cross-Pollinator, adept at applying concepts from one area to a completely different one. Following this is the organizing group, again with one role per chapter. The Hurdler is the problem-solver, the Collaborator brings people together for a result and the Director sets the pace, the direction and the goals. The chapter on the last group, "building", open wi... The Caregiver is tasked with making it easier for the customer to transition to a new innovative context and the Storyteller, the final persona, enhances the motivation and the bonding of the team to produce real and useful innovation. The book closes with a final chapter with some general pointers on succeeding in innovation. The strength of the book lies in the very attainable possibility of replicating the innovation system that it describes. Kelley expresses the concepts and methods in terms that are related to everyday business life and does not make any excessive demand on the reader's intellect. The "cookbook" approach also allows readers to review their own organizations and to pinpoint any particular areas of weakness or malfunction. In a sense, the strength of the book is also its weakness: managing 10 different role models in a fast-moving business environment is a complex task and requires considerable energy. A section on a minimalist approach with ease of application would have been welcome, all the more so in that chapters on some roles (Director for example) appear to have been "padded" with more generic material. In addition, the transversal or underlying nature of certain personas notably in the organizing group could be further developed to enhance practical application. However Kelley makes a valid contribution to business in general with a workable innovation system underpinned by his own real experience. In the field of organizational behavior in particular, Kelley contributes at a micro-organizational level, mostly by charting the development of individual contributor roles, but also to some extent

Outline theiia.org Assignment Example | Topics and Well Written Essays - 1250 words

Outline theiia.org - Assignment Example Employers  and Agencies can fill open positions in their respective departments. One can also post job openings searching for resumes, which match the desired criteria posted in the audit career center (Institute of Internal Auditors 13). 1. SERVICES A. Quality Assurance Here, there is a Quality Assurance and Improvement Program (QAIP) which enables evaluation of the internal audit activity's conformance. This program is also responsible for gauging the efficiency and effectiveness of the internal audit activity, identifying improvement opportunities. Internal assessments are constant, where there are in-house assessments of the in-house audit  activities together with periodic self-assessments and/or reviews (Institute of Internal Auditors 14). 1. MEMBERSHIP A. Benefits of Membership This section focuses on members where it stipulates that members are entitled to guidance, training, and services free or specially priced. Most of the important prospects accessible to IIA members are: 1. Advocacy Resourceful guidance is accessible to members for the advocacy of their role with the main stakeholders. The IIA maintains international recognition due to their presence in Washington DC in the advocacy of the profession. ... The IIA is the pioneer in imaginative interior review preparing, with the provision of quality involving opportunities for learning which is well facilitated for its members and customers. With IIA, there is an assurance that as a member you have the learning and abilities essential for the procurement of the most abnormal amount of surety, knowledge, and possible objectivity which adds value to your organization. There is a commitment to the deliverance of the very best in internal audit training, satisfying our notoriety as the worldwide guide in inward review instruction, by the procurement of the best quality esteem in the business (Institute of Internal Auditors 16). 1. Top-quality Training Programs and Facilitators Here, the IIA raises the bar on quality by best practices in adult instructional design when building and updating courses. IIA also incorporates  the strategy and theory behind how adults learn working closely with subject matter experts in the development and mai ntenance of courses ensuring that they are aligned with the IIA's International Professional Practices Framework (IPPF). Another reason for our superiority and the top quality training programs is IIA’s talent facilitators which facilitate the member to undertake meticulous training and peer review, thus becoming experts at encouraging transfer of knowledge by way of discussions, exercises, and activities (Institute of Internal Auditors 17). 1. CERTIFICATION A. CIA certification The IIA has a very comprehensive certification portfolio serving as the key to unlocking opportunities within the internal audit profession; increasing the level of a member’s credibility while adding clout to the resume. This increases your value to your clients and employer

Wednesday, September 25, 2019

Social learning theories Essay Example | Topics and Well Written Essays - 4000 words

Social learning theories - Essay Example At the time when populations were expansively diffused, the implications of any particular aggressive act were primarily restricted to individuals whom the act was aimed at. Under circumstances of modernised life, in which the wellbeing of groups of inhabitants depends upon harmonious functioning of complex mutually supporting systems, aggressive behaviour that can be effortlessly carried out without demanding complicated mechanism immediately damages enormous numbers of people (Geen, 2001). Interest over the destructive implications of aggression confuses the reality that such behaviour normally has purposeful importance for the user. Certainly, there is a characteristic distinct to aggression that commonly generates circumstances cultivating its incidence. Dissimilar to social behaviours that are not useful without a degree of reciprocity satisfactory to the partakers, aggression does not necessitate eager receptiveness from others for its effectiveness (Moeller, 2001). An individual can harm and destroy to self-benefit despite of whether the victim agrees to it or not. Through destructive behaviour, or authority through verbal and physical coercion, individuals can gain important resources, modify rules to suit their personal desires, acquire power over and haul out compliableness from others, get rid of circumstances that negatively influence their wellbeing, and break down barriers that hamper or interrupt realisation of desired objectives. Hence, actions that are harsh for the victim can be gratifying for the one committing the aggressive act. Though aggression has several various roots its practical value certainly contributes greatly to the occurrence of such behaviour in the dealings of everyday existence (Moeller, 2001). Throughout the years several theories have been suggested to clarify why individuals act

Tuesday, September 24, 2019

Review of literature Essay Example | Topics and Well Written Essays - 500 words

Review of literature - Essay Example High consumption of alcohol in men can arouse anger in men, with the consequent result of domestic violence. Evaluation of the impact of treatment for alcoholism one year after the treatment demonstrated reduction of anger tantrums and violence towards the female partners (O’Farrell, Fals-Stewart, Murphy & Murphy, 2003). The evaluation of a 15-week cognitive-behavioral skills training program for men involved in domestic violence against women demonstrated that there was a sharp decrease in the recurrence of the violent behavior in men completing the training program. In addition, in comparison to those who dropped out of the program, those who completed the training program demonstrated a lower rate of physical violence recidivism during the one year follow up period (Hamberger & Hastings, 1988). Cognitive behavioural therapy is a popular treatment program for physically abusive men. The objective in cognitive behavioural therapy is not only to change behavior employing behavioural change models, but also to alter thinking patterns and beliefs that contribute to the violent behavior. However, very few randomised controlled effect evaluations have been conducted on the effectiveness of this treatment strategy for any definite conclusion on the effectiveness of the treatment strategy (Smedslund et al, 2007). The Over Aggression Scale (OAS) measures aggressive behaviors on four aspects of physical aggression directed on others, physical aggression directed on self, verbal aggression, and physical aggression against objects present in the surroundings. These four classifications are further studied on the basis of ratings from one to four, with one being the least severe and four being the mist severe. This tool is extremely useful for evaluating the effect of treatment programs for reducing aggressive behavior, as it permits recording of aggressive incidents for review and comparison

Monday, September 23, 2019

Describe Fingerprint photographic technique you would use to recover Assignment

Describe Fingerprint photographic technique you would use to recover such marks following U.K. guidance - Assignment Example In general we have three types of fingerprints mainly latent, plastic and patent prints. Latent prints are formed from oils and sweat from the skin surface. They are invisible to un-aided eye, therefore; they require additional treatments. Patent fingerprints are made from ink, grease, dirt and blood. They are visible to the naked eye. Finally, the plastic fingerprints are in three-dimension, and they are made after pressing the hands on fresh soap, wax or paints. The prints are visible to the naked eye (Houck and Siegel, 2010, p. 29). To improve the visibility of latent fingerprints various lighting techniques can be used to obtain the invisible surfaces. According to Chaikovsky, Argaman, Batman, Sin-David, Barzovski and Yaalon (2005, p. 574), digital multiple exposure technique is applied. The process is simple and productive. Digital photography and computerized image processing with application of layers methodology produce many images that are easily controlled by computer programmes. Production of many images that are combined into a single image enables improved visualization of the selected portions of the latent print without affecting the rest part of the image. According to SIRCHIE (2013, p. 1), Crime scene photos are important in the crime scene inquiry. The photographs complement the investigator data in the form of data. A camera can be used to capture every object of importance within the crime scene. Warren (2014, p. 1), conducted a research to determine usage digital photography for forensic purposes. It was found out that digital imaging devices with spectral filters are very effective in the identification of untreated latent fingerprints in that it is viable and non destructive. According to the National Law Enforcement (2011, p. 6), it is believed that every individual has different body parts hence comparison of the measurements can be used to distinguish between two individuals. The method was developed by

Saturday, September 21, 2019

Advantages And Disadvantages Of Nuclear Energy Environmental Sciences Essay

Advantages And Disadvantages Of Nuclear Energy Environmental Sciences Essay Nuclear energy is a thriving global industry. Nowadays, there are a total of 435 nuclear power plants in the world. This source energy is not yet used in Malaysia. Nuclear energy can generate electricity by Fission process at the power plant. Its also said that nuclear energy only used a little fuel of uranium only but it can produce high electricity output. In such way, it can benefit our country in term of produce electricity as the government must take precaution about the decreases of supply of non renewable energy that extensively used in Malaysia. Hydroelectric is a renewable energy in Malaysia that produce high power capacity. It produced electricity from the flow of lake or streams. It will give the kinetic energy as the water flows downward very fast. So the kinetic energy has been converted to mechanical by the turbine. From the turbine, it will produce electricity. Tenaga Nasional Berhad (TNB) operates three hydroelectric in peninsular Malaysia which its sum generating power capacity is 1911 megawatts (MW) and operates with a total of 21 dams. The largest hydroelectric power system in Malaysia is at Bakun on the Balui River in Sarawak. It can generate power capacity as high as 2400 MW which is double of power capacity supply in peninsular Malaysia. Coal is a fossil fuel created from plant trapped underground for millions of years without being in contact to air. Because of its nature of long term of produce, it is classified as a non-renewable energy source. Coal is mainly consists of carbon atoms that come from plant material from ancient swamp forests. There are many types of coal. Some contain dangerous material such as sulphur that pollutes the atmosphere further when they burn that will cause to acid rain. Anthracite, bituminous coal, lignite, and sub-bituminous coal are all different types of coal that are used nowadays. [1] In Malaysia, there are 5 generating coal power stations. Sultan Salahuddin Abdul Aziz Shah Power station is the largest coal power station which its produce 2420 MW. In some research, It said that coal will last supply for the power energy at least for the next century.So our government must take precaution above this matter by bring in other energy sources in Malaysia. Oil is our primary source nowadays. For the time being, the increase of oil price has become a big issue in Malaysia. This will affect the price of TNB tariff in the long term as many of the power station use oil to produce energy. This matter will become serious if the fuel price keeps increasing. Oil plants in Malaysia are widely used in Sabah as the total Oil plant around Malaysia is five. Most of the power plants in Sabah use diesel engines to running their system. Gelugor Power system is the only one oil plant in peninsular Malaysia. It can produce around 398MW of generating power. In Malaysia, Gas energy Plant is widely used. Like oil and coal, gas is found underground, it from the million years of heat and pressure that being applied to the underground that can caused them to change to crude oil and natural gas. There is about 21 gas energy plant in Malaysia that can produce generating power from 100MW to 1500MW. Tuanku Jaafar Power system is the highest generating power system in Malaysia as it can produce 1500 MW of power Gas is a non renewable energy so the supply of gas maybe limited nowadays. Its also said that gas contributes a large amount of carbon dioxide that can be harmful to greenhouse warming. Biomass provides heat and energy. We can use many sources of biomass such plants, landfill fumes, agriculture, forest residues and also from the waste of industries and cities. In such ways, it not also minimizes the cost but it also reduces pollution to the environment. Biomass produce energy by basically burning organic matter to released its chemical energy. Using biomass energy contributes CO2 when burned but the carbon dioxide being recaptured and used by other plants. We can create electricity from biomass by direct fired, co firing, gasification and anaerobic digestion. There are nine biomass power plants in Malaysia. Likes Oil power plants, Biomass energy is widely used in Sabah. Many of biomass power plants empty fruit bunch as their fuel. Although biomass a renewable energy, it can only produce small power capacity.[1] DISCUSSION NUCLEAR POWER IN MALAYSIA Malaysian government announced that Malaysia is considering having Nuclear power plant by 2021. As the coal power plant has the limit supply of coal, and the price fossil fuel keep increasing, this was the best way to generate power that meet our country energy demand. Green Technology and Water Minister Peter Chin Fah Kui said that our main renewable energy, which is hydroelectric also have a problem of limited land to building a dam for hydro power plant. So the drastic way to overcome this entire problem is to build a costly but efficient nuclear power plant. According to the minister, the safety of power plant would be the high priority on building this technology. [2] How Nuclear Energy Works Nuclear energy is produced naturally under a human control. A nuclear power plant uses steam to generate the power plant. Uranium is the main aspect to produce a steam. Nuclear reaction occurs when uranium atoms split into small particles that can produce large amount of heat during the chain reaction. It will release around 3 neutrons and can produce a large of energy during the fission. This chain reaction will continue until uranium is split. Figure 1 shows fission of Uranium 235. [3] Figure 1 show Fission of Uranium 235 Fission process will occur in the fuel assemblies in the reactor core. Control rods are used to absorb neutrons to control the fission process. In order to keep the heat flowing efficiently, each power plant will have their coolant device that prevent the core becoming too hot and carries heat away. The piping of steam will run through the turbine in order to create electricity. Fission process can produce radioactive, It is important to have a barrier that can protect the release of radioactivity. Nuclear power plant is said to be under human control because it constantly monitored and controlled from a control room by highly trained engineered. It also has a backup system designed if the normal operation is disrupted. Figure 2 shows schematic figure of nuclear power plant. [4] Figure 2 shows schematic of nuclear power plant ADVANTAGES Environmental effect Nuclear energy has the lowest effect on the environment, Its because that the nuclear plants do not produce harmful gases. The water from the power plant also contains no harmful pollutants. Main aspect of Environmental safety of nuclear energy is it does not burn anything to produce electricity compared to other power plant such coil, oil and gas that can produce CO2 as it can increased concentration of greenhouse that responsible for climate change. For example, A 1000MW coal plant produce 44000 tonnes of sulphur oxides and 22000 tonnes of nitrous oxide and also 500 000 tonnes of solid waste that can be harmful to the atmosphere environment compared to the nuclear energy that doesnt produce any noxious gases .Nuclear energy will reduce about 5-10% greenhouse gases reduction by the time of 10 years. Cost Nuclear energy is very cost effective compared to the renewable energy such wind, hydro or solar. It uses Uranium as fuel. Main aspect is it use it can produce huge amount of energy in such a small amount of uranium. Uranium is highly concentrated source which is very cheap and easy transportable. For example, One kilogram Uranium will yield 20 000 times as much energy compare to the same amount of coal.[5] Supply Research said that Coal sufficient for some 300 years, natural gas for 60 years and oil for 40 years. The development of Nuclear power would be a drastic change for this problem. It was known that Uranium would last long for around 50 years, but recycling the plutonium from spent fuel would increase the potential of uses this technology as long as 3000 years at todays level of use. As we know, the consumption of fuel (uranium) of uses this technology is very small but the electricity produce are very high which is the main advantage of this technology.[6] Safety Since the tragedy of Chernobyl and three miles island, the safety of nuclear power plant had been improved. All nuclear power plant needs to be at maximum safety avoid major accidents. Nowadays, the design of newest nuclear reactor has applied the concept of negative feedback loop. This new technology ensures that nuclear power become harder to squeeze. In such ways, nuclear chain reaction that can lead to a explosion almost impossible to happen. So this technology had overcome the safety problem that always been worried by people around the world. DISADVANTAGE Environmental effect Nuclear waste is the main disadvantage in nuclear power energy. After many years of research, the world still has no exact solution to safely dispose the nuclear waste. Nuclear waste nowadays is stored in a disposal site. The problem is Plutonium takes a hundred thousand of years to be no longer radioactive. So the storage site may be full before the plutonium become inactive. In instant, plutonium are very dangerous as it is highly toxic and also can be used to make bomb.[7] Cost Although the price of uranium is cheap, the cost to construct Nuclear power plant is very expensive compared to the other source of power plant. It uses highly expensive technologies. The total cost to use the nuclear technology include construction, safety, insurance and liability in case of accidents or being attack which is can cause to mass destruction and also the cost of nuclear waste Nuclear Proliferation As we know, nuclear technology used a lot of uranium that can be converted to weapons production. Nowadays, there are more than 40 countries used this technology have a big risk about nuclear proliferation. The hazard of nuclear power includes the risk of disaster like nuclear reactor disaster in Chernobyl which hotly debated in the internet. The other problem is also the risk of terrorism and sabotage which can cause mass destruction. RENEWABLE ENERGY IN MALAYSIA Hydropower and biomass are commonly used of renewable energy in Malaysia. After an increasing price of fuel, lack of supply of coal, environmental problem and limited land in building dam for a hydropower, its a sufficient way if Malaysia take a step to develop a new type of renewable energy such wind and solar. Renewable energy plays a big role in supplying electricity in Malaysia as it also reduces the issue of global warming. Since Malaysia is located in equatorial region which receiving average of 8 hours of sunshine, its better for Malaysia government to implement solar technology in Malaysia. Nowadays, solar technology in our country is only use in rural area. For instant, Malaysia actually has built their first solar power station in Tropical Village of Kampung Denai.[8] Many citizens nowadays also use solar photovoltaic application as their water heater in their home. This shows that solar technology is no longer a new technology in Malaysia. Its better if our government to t ake opportunity to build a mega solar power supply in our country to overcome the problem of environmental effect if using non renewable energy such coil and oil. COMPARISON BETWEEN NUCLEAR ENERGY AND RENEWABLE ENERGY Safety The main difference is renewable energy doesnt have the tendency to create a military weapon the way the nuclear energy does. For instant, a sabotage of nuclear power plant would release a large amount of radioactive which is very harmful to human. Theres no type of renewable energy that can be used as weapon of mass destruction. Supply Renewable energies have very limitless source. It stated that nuclear energy can long last about 3000 years more because of the uranium supply is larger enough and also because of the ability of recycling plutonium. Both of this source energy has the long term of supply which would be the main factor of using this source. Environment Renewable energy is absolutely environmental friendly. Nuclear energy also doesnt produce any noxious gas which can increase the concentration of greenhouse problem or global warming. But the problem of using nuclear energy is to deal with the nuclear waste. Nuclear waste radioactive remains for hundred thousand of years. Until now, any of the world government body doesnt have the solution to solve this problem. Cost Nuclear power is more expensive compare with renewable energy. Even though we know that nuclear power plant only use little fuel (uranium) means little cost in term of supply but other cost like construction, safety, and waste are yet highly expensive. Solar energy is very affordable and very appropriate for our country as Malaysia gets a good sunlight each year. This could be the main advantage of using this technology. CONCLUSION Energy sources that are sustainable, environmental friendly and cost effective would be the main factor of choosing source energy. Renewable energy can achieve the sustainable we need. Renewable energy supplies 19% of energy and nuclear energy only supply 16% of world electricity.[9] Renewable energy not only have limitless source, its also easily organize and absolutely no risk to human and global. Nuclear energy maybe has its own advantage but the dangerous of nuclear waste has overcome all the benefit of nuclear energy. Theres still a big problem about the radioactive effect that can be harmful to human. So the investment on building nuclear power plant energy would be not a good option.

Friday, September 20, 2019

Intelligent Software Agent

Intelligent Software Agent Chapter 1 Intelligent Software Agent 1.1 Intelligent Agent An Agent can be defined as follows: â€Å"An Agent is a software thing that knows how to do things that you could probably do yourself if you had the time† (Ted Seller of IBM Almaden Research Centre). Another definition is: â€Å"A piece of software which performs a given task using information gleaned from its environment to act in a suitable manner so as to complete the task successfully. The software should be able to adapt itself based on changes occurring in its environment, so that a change in circumstances will still yield the intended results† (G.W.Lecky Thompson). [1] [2] [3] [4] An Intelligent Agent can be divided into weak and strong notations. Table 1.1 shows the properties for both the notations. Weak notation Strong notation Autonomy Mobility Social ability Benevolence Reactivity Proactivity Rationality Temporal continuity Adaptivity Goal oriented Collaboration Table 1.1 1.1.1 Intelligency Intelligence refers to the ability of the agent to capture and apply domain specific knowledge and processing to solve problems. An Intelligent Agent uses knowledge, information and reasoning to take reasonable actions in pursuit of a goal. It must be able to recognise events, determine the meaning of those events and then take actions on behalf of a user. One central element of intelligent behaviour is the ability to adopt or learn from experience. Any Agent that can learn has an advantage over one that cannot. Adding learning or adaptive behaviour to an intelligent agent elevates it to a higher level of ability. In order to construct an Intelligent Agent, we have to use the following topics of Artificial Intelligence: Knowledge Representation Reasoning Learning [5] 1.1.2 Operation The functionality of a mobile agent is illustrated in 1.1. Computer A and Computer B are connected via a network. In step 1 a mobile Agent is going to be dispatched from Computer A towards Computer B. In the mean time Computer A will suspend its execution. Step 2 shows this mobile Agent is now on network with its state and code. In step 3 this mobile Agent will reach to its destination, computer B, which will resume its execution. [7] 1.1.3 Strengths and Weaknesses Many researchers are now developing methods for improving the technology, with more standardisation and better programming environments that may allow mobile agents to be used in products. It is obvious that the more an application gets intelligent, the more it also gets unpredictable and uncontrollable. The main drawback of mobile agents is the security risk involved in using them. [8] [9] The following table shows the major strengths and weaknesses of Agent technology: Strengths Weakness Overcoming Network Latency Security Reducing Network traffic Performance Asynchronous Execution and Autonomy Lack of Applications Operating in Heterogeneous Environments Limited Exposure Robust and Fault-tolerant Behavior Standardization Table 1.2 1.2 Applications The followings are the major and most widely applicable areas of Mobile Agent: Distributed Computing: Mobile Agents can be applied in a network using free resources for their own computations. Collecting data: A mobile Agent travels around the net. On each computer it processes the data and sends the results back to the central server. Software Distribution and Maintenance: Mobile agents could be used to distribute software in a network environment or to do maintenance tasks. Mobile agents and Bluetooth: Bluetooth is a technology for short range radio communication. Originally, the companies Nokia and Ericsson came up with the idea. Bluetooth has a nominal range of 10 m and 100 m with increased power. [38] Mobile agents as Pets: Mobile agents are the ideal pets. Imagine something like creatures. What if you could have some pets wandering around the internet, choosing where they want to go, leaving you if you dont care about them or coming to you if you handle them nicely? People would buy such things wont they? [38] Mobile agents and offline tasks: 1. Mobile agents could be used for offline tasks in the following way: a- An Agent is sent out over the internet to do some task. b- The Agent performs its task while the home computer is offline. c- The Agent returns with its results. 2. Mobile agents could be used to simulate a factory: a- Machines in factory are agent driven. b- Agents provide realistic data for a simulation, e.g. uptimes and efficiencies. c- Simulation results are used to improve real performance or to plan better production lines. [10[ [11] [12] 1.3 Life Cycle An intelligent and autonomous Agent has properties like Perception, Reasoning  and Action which form the life cycle of an Agent as shown in 1.2. [6] The agent perceives the state of its environment, integrates the perception in its knowledge base that is used to derive the next action which is then executed. This generic cycle is a useful abstraction as it provides a black-box view on the Agent and encapsulates specific aspects. The first step is the Agent initialisation. The Agent will then start to operate and may stop and start again depending upon the environment and the tasks that it tried to accomplish. After the Agent finished all the tasks that are required, it will end at the completing state. [13] Table 1.3 shows these states. Name of Step Description Initialize Performs one-time setup activities. Start Start its job or task. Stop Stops jobs, save intermediate results, joins all threads and stops. Complete Performs one-time termination activities. Table 1.3 1.4 Agent Oriented Programming (AOP) It is a programming technique which deals with objects, which have independent thread of control and can be initiated. We will elaborate on the three main components of the AOP. a- Object: Grouping data and computation together in a single structural unit called an ‘Object. Every Agent looks like an object. b- Independent Thread of control: This means when this developed Agent which is an object, when will be implemented in Boga server, looks like an independent thread. This makes an Agent different from ordinary object. c- Initiation: This deals with the execution plan of an Agent, when implemented, that Agent can be initiated from the server for execution. [14] [15] [16] [17] 1.5 Network paradigms This section illustrates the traditional distributed computing paradigms like Simple Network Management Protocol (SNMP) and Remote Procedure Call (RPC). 1.5.1 SNMP Simple Network Management Protocol is a standard for gathering statistical data about network traffic and the behavior of network components. It is an application layer protocol that sits above TCP/IP stack. It is a set of protocols for managing complex networks. It enables network administrators to manage network performance, find and solve network problems and plan for network growth. It is basically a request or response type of protocol, communicating management information between two types of SNMP entities: Manager (Applications) and Agents. [18] Agents: They are compliant devices; they store data about themselves in Management Information Base (MIB) (Each agent in SNMP maintain a local database of information relevant to network management is known as the Management Information Base) and return this data to the SNMP requesters. An agent has properties like: Implements full SNMP protocol, Stores and retrieves managed data as defined by the Management Information Base and can asynchronously signal an event to the manager. Manager (Application): It issues queries to get information about the status, configuration and performance of external network devices. A manager has the following properties: Implemented as a Network Management Station (the NMS), implements full SNMP Protocol, able to Query Agents, get responses from Agents, set variables in agents and acknowledge asynchronous events from Agents. [18] 1.3 illustrates an interaction between a manager and an Agent. The agent is software that enables a device to respond to manager requests to view or update MIB data and send traps reporting problems or significant events. It receives messages and sends a response back. An Agent does not have to wait for order to act, if a serious problem arises or a significant event occurs, it sends a TRAP (a message that reports a problem or a significant event) to the manager (software in a network management station that enables the station to send requests to view or update MIB variables, and to receive traps from an agent). The Manager software which is in the management station sends message to the Agent and receives a trap and responses. It uses User Data Protocol (UDP, a simple protocol enabling an application to send individual message to other applications. Delivery is not guaranteed, and messages need not be delivered in the same order as they were sent) to carry its messages. Finally, there is one application that enables end user to control the man ager software and view network information. [19] Table 1.4 comprises the Strengths and Weaknesses of SNMP. Strengths Weaknesses Its design and implementation are simple. It may not be suitable for the management of truly large networks because of the performance limitations of polling. Due to its simple design it can be expanded and also the protocol can be updated to meet future needs. It is not well suited for retrieving large volumes of data, such as an entire routing table. All major vendors of internetwork hardware, such as bridges and routers, design their products to support SNMP, making it very easy to implement. Its traps are unacknowledged and most probably not delivered. Not applicable It provides only trivial authentication. Not applicable It does not support explicit actions. Not applicable Its MIB model is limited (does not support management queries based on object types or values). Not applicable It does not support manager-to-manager communications. Not applicable The information it deals with neither detailed nor well-organized enough to deal with the expanding modern networking requirements. Not applicable It uses UDP as a transport protocol. The complex policy updates require a sequence of updates and a reliable transport protocol, such as TCP, allows the policy update to be conducted over a shared state between the managed device and the management station. Table 1.4 1.5.2 RPC A remote procedure call (RPC) is a protocol that allows a computer program running on one host to cause code to be executed on another host without the programmer needing to explicitly code for this. When the code in question is written using object-oriented principles, RPC is sometimes referred to as remote invocation or remote method invocation. It is a popular and powerful technique for constructing distributed, client-server based applications. An RPC is initiated by the caller (client) sending a request message to a remote system (the server) to execute a certain procedure using arguments supplied. A result message is returned to the caller. It is based on extending the notion of conventional or local procedure calling, so that the called procedure need not exist in the same address space as the calling procedure. The two processes may be on the same system, or they may be on different systems with a network connecting them. By using RPC, programmers of distributed applications avoid the details of the interface with the network. The transport independence of RPC isolates the application from the physical and logical elements of the data communications mechanism and allows the application to use a variety of transports. A distributed computing using RPC is illustrated in 1.4. Local procedures are executed on Machine A; the remote procedure is actually executed on Machine B. The program executing on Machine A will wait until Machine B has completed the operation of the remote procedure and then continue with its program logic. The remote procedure may have a return value that continuing program may use immediately. It intercepts calls to a procedure and the following happens: Packages the name of the procedure and arguments to the call and transmits them over network to the remote machine where the RPC server id running. It is called â€Å"Marshalling†. [20] RPC decodes the name of the procedure and the parameters. It makes actual procedure call on server (remote) machine. It packages returned value and output parameters and then transmits it over network back to the machine that made the call. It is called â€Å"Unmarshalling†. [20] 1.6 Comparison between Agent technology and network paradigms Conventional Network Management is based on SNMP and often run in a centralised manner. Although the centralised management approach gives network administrators a flexibility of managing the whole network from a single place, it is prone to information bottleneck and excessive processing load on the manager and heavy usage of network bandwidth. Intelligent Agents for network management tends to monitor and control networked devices on site and consequently save the manager capacity and network bandwidth. The use of Intelligent Agents is due to its major advantages e.g. asynchronous, autonomous and heterogeneous etc. while the other two contemporary technologies i.e. SNMP and RPC are lacking these advantages. The table below shows the comparison between the intelligent agent and its contemporary technologies: Property RPC SNMP Intelligent Agent Communication Synchronous Asynchronous Asynchronous Processing Power Less Autonomy More Autonomous but less than Agent More Autonomous Network support Distributed Centralised Heterogeneous Network Load Management Heavy usage of Network Bandwidth Load on Network traffic and heavy usage of bandwidth Reduce Network traffic and latency Transport Protocol TCP UDP TCP Packet size Network Only address can be sent for request and data on reply Only address can be sent for request and data on reply Code and execution state can be moved around network. (only code in case of weak mobility) Network Monitoring This is not for this purpose Network delays and information bottle neck at centralised management station It gives flexibility to analyse the managed nodes locally Table 1.5 Indeed, Agents, mobile or intelligent, by providing a new paradigm of computer interactions, give new options for developers to design application based on computer connectivity. 20 Chapter 2 Learning Paradigms 2.1 Knowledge Discovery in Databases (KDD) and Information Retrieval (IR) KDD is defined as â€Å"the nontrivial process of identifying valid, novel, potentially useful and ultimately understandable patterns in data† (Fayyad, Piatetsky-Shapiro and Smith (1996)). A closely related process of IR is defined as â€Å"the methods and processes for searching relevant information out of information systems that contain extremely large numbers of documents† (Rocha (2001)). KDD and IR are, in fact, highly complex processes that are strongly affected by a wide range of factors. These factors include the needs and information seeking characteristics of system users as well as the tools and methods used to search and retrieve the structure and size of the data set or database and the nature of the data itself. The result, of course, was increasing numbers of organizations that possessed very large and continually growing databases but only elementary tools for KD and IR. [21] Two major research areas have been developed in response to this problem: * Data warehousing: It is defined as: â€Å"Collecting and ‘cleaning transactional data to make it available for online analysis and decision support†. (Fayyad 2001, p.30)  · Data Mining: It is defined as: â€Å"The application of specific algorithms to a data set for purpose of extracting data patterns†. (Fayyad p. 28) 2.2 Data Mining Data mining is a statistical term. In Information Technology it is defined as a discovery of useful summaries of data. 2.2.1 Applications of Data Mining The following are examples of the use of data mining technology: Pattern of traveller behavior mined: Manage the sale of discounted seats in planes, rooms in hotels. Diapers and beer: Observation those customers who buy diapers are more likely to buy beer than average allowed supermarkets to place beer and diapers nearby, knowing many customers would walk between them. Placing potato chips between increased sales of all three items. Skycat and Sloan Sky Survey: Clustering sky objects by their radiation levels in different bands allowed astronomers to distinguish between galaxies, nearby stars, and many other kinds of celestial objects. Comparison of genotype of people: With/without a condition allowed the discovery of a set of genes that together account for many case of diabetes. This sort of mining will become much more important as the human genome is constructed. [22] [23] [24] 2.2.2 Communities of Data Mining As data mining has become recognised as a powerful tool, several different communities have laid claim to the subject: Statistics Artificial Intelligence (AI) where it is called â€Å"Machine Learning† Researchers in clustering algorithms Visualisation researchers Databases: When data is large and the computations is very complex, in this context, data mining can be thought of as algorithms for executing very complex queries on non-main-memory data. 2.2.3 Stages of data mining process The following are the different stages of data mining process, sometimes called as a life cycle of data mining as shown in 2.1: Data gathering: Data warehousing, web crawling. Data cleansing: Eliminate errors and/or bogus data e.g. Patients fever = 125oC. 3- Feature extraction: Obtaining only the interesting attributes of the data e.g. â€Å"data acquired† is probably not useful for clustering celestial objects as in skycat. 4- Pattern extraction and discovery: This is the stage that is often thought of as â€Å"data mining† and is where we shall concentrate our efforts. 5- Visualisation of the data: 6- Evaluation of results: Not every discovered fact is useful, or even true! Judgment is necessary before following the softwares conclusions. [22] [23] [24] 2.3 Machine Learning There are five major techniques of machine learning in Artificial Intelligence (AI), which are discussed in the following sections. 2.3.1 Supervised Learning It relies on a teacher that provides the input data as well as the desired solution. The learning agent is trained by showing it examples of the problem state or attributes along with the desired output or action. The learning agent makes a prediction based on the inputs and if the output differs from the desired output, then the agent is adjusted or adapted to produce the correct output. This process is repeated over and over until the agent learns to make accurate classifications or predictions e.g. Historical data from databases, sensor logs or trace logs is often used as training or example data. The example of supervised learning algorithm is the ‘Decision Tree, where there is a pre-specified target variable. [25] [5] 2.3.2 Unsupervised Learning It depends on input data only and makes no demands on knowing the solution. It is used when learning agent needs to recognize similarities between inputs or to identify features in the input data. The data is presented to the Agent, and it adapts so that it partitions the data into groups. This process continues until the Agents place the same group on successive passes over the data. An unsupervised learning algorithm performs a type of feature detection where important common attributes in the data are extracted. The example of unsupervised learning algorithm is â€Å"the K-Means Clustering algorithm†. [25] [5] 2.3.3 Reinforcement Learning It is a kind of supervised learning, where the feedback is more general. On the other hand, there are two more techniques in the machine learning, and these are: on-line learning and off-line learning. [25] [5] 2.3.4 On-line and Off-line Learning On-line learning means that the agent is adapting while it is working. Off-line involves saving data while the agent is working and using the data later to train the agent. [25] [5] In an intelligent agent context, this means that the data will be gathered from situations that the agents have experienced. Then augment this data with information about the desired agent response to build a training data set. Once this database is ready it can be used to modify the behaviour of agents. These approaches can be combined with any two or more into one system. In order to develop Learning Intelligent Agent(LIAgent) we will combine unsupervised learning with supervised learning. We will test LIAgents on Iris dataset, Vote dataset about the polls in USA and two medical datasets namely Breast and Diabetes. [26] See Appendix A for all these four datasets. 2.4 Supervised Learning (Decision Tree ID3) Decision trees and decision rules are data mining methodologies applied in many real world applications as a powerful solution to classify the problems. The goal of supervised learning is to create a classification model, known as a classifier, which will predict, with the values of its available input attributes, the class for some entity (a given sample). In other words, classification is the process of assigning a discrete label value (class) to an unlabeled record, and a classifier is a model (a result of classification) that predicts one attribute-class of a sample-when the other attributes are given. [40] In doing so, samples are divided into pre-defined groups. For example, a simple classification might group customer billing records into two specific classes: those who pay their bills within thirty days and those who takes longer than thirty days to pay. Different classification methodologies are applied today in almost every discipline, where the task of classification, because of the large amount of data, requires automation of the process. Examples of classification methods used as a part of data-mining applications include classifying trends in financial market and identifying objects in large image databases. [40] A particularly efficient method for producing classifiers from data is to generate a decision tree. The decision-tree representation is the most widely used logic method. There is a large number of decision-tree induction algorithms described primarily in the machine-learning and applied-statistics literature. They are supervised learning methods that construct decision trees from a set of input-output samples. A typical decision-tree learning system adopts a top-down strategy that searches for a solution in a part of the search space. It guarantees that a simple, but not necessarily the simplest tree will be found. A decision tree consists of nodes, where attributes are tested. The outgoing branches of a node correspond to all the possible outcomes of the test at the node. [40] Decision trees are used in information theory to determine where to split data sets in order to build classifiers and regression trees. Decision trees perform induction on data sets, generating classifiers and prediction models. A decision tree examines the data set and uses information theory to determine which attribute contains the information on which to base a decision. This attribute is then used in a decision node to split the data set into two groups, based on the value of that attribute. At each subsequent decision node, the data set is split again. The result is a decision tree, a collection of nodes. The leaf nodes represent a final classification of the record. ID3 is an example of decision tree. It is kind of supervised learning. We used ID3 in order to print the decision rules as its output. [40] 2.4.1 Decision Tree Decision trees are powerful and popular tools for classification and prediction. The attractiveness of decision trees is due to the fact that, in contrast to neural networks, decision trees represent rules. Rules can readily be expressed so that humans can understand them or even directly used in a database access language like SQL so that records falling into a particular category may be retrieved. Decision tree is a classifier in the form of a tree structure, where each node is either: Leaf node indicates the value of the target attribute (class) of examples, or Decision node specifies some test to be carried out on a single attribute value, with one branch and sub-tree for each possible outcome of the test. Decision tree induction is a typical inductive approach to learn knowledge on classification. The key requirements to do mining with decision trees are:  · Attribute value description: Object or case must be expressible in terms of a fixed collection of properties or attributes. This means that we need to discretise continuous attributes, or this must have been provided in the algorithm.  · Predefined classes (target attribute values): The categories to which examples are to be assigned must have been established beforehand (supervised data).  · Discrete classes: A case does or does not belong to a particular class, and there must be more cases than classes. * Sufficient data: Usually hundreds or even thousands of training cases. A decision tree is constructed by looking for regularities in data. [27] [5] 2.4.2 ID3 Algorithm J. Ross Quinlan originally developed ID3 at the University of Sydney. He first presented ID3 in 1975 in a book, Machine Learning, vol. 1, no. 1. ID3 is based on the Concept Learning System (CLS) algorithm. [28] function ID3 Input: (R: a set of non-target attributes, C: the target attribute, 2.4.3 Functionality of ID3 ID3 searches through the attributes of the training instances and extracts the attribute that best separates the given examples. If the attribute perfectly classifies the training sets then ID3 stops; otherwise it recursively operates on the m (where m = number of possible values of an attribute) partitioned subsets to get their best attribute. The algorithm uses a greedy search, that is, it picks the best attribute and never looks back to reconsider earlier choices. If the dataset has no such attribute which will be used for the decision then the result will be the misclassification of data. Entropy a measure of homogeneity of the set of examples. [5] Entropy(S) = pplog2 pp pnlog2 pn (1) (2) 2.4.4 Decision Tree Representation A decision tree is an arrangement of tests that prescribes an appropriate test at every step in an analysis. It classifies instances by sorting them down the tree from the root node to some leaf node, which provides the classification of the instance. Each node in the tree specifies a test of some attribute of the instance, and each branch descending from that node corresponds to one of the possible values for this attribute. This is illustrated in 2.3. The decision rules can also be obtained from ID3 in the form of if-then-else, which can be use for the decision support systems and classification. Given m attributes, a decision tree may have a maximum height of m. [29][5] 2.4.5 Challenges in decision tree Following are the issues in learning decision trees: Determining how deeply to grow the decision tree. Handling continuous attributes. Choosing an appropriate attribute selection measure. Handling training data with missing attribute values. Handling attributes with differing costs and Improving computational efficiency. 2.4.6 Strengths and Weaknesses Following are the strengths and weaknesses in decision tree: Strengths Weaknesses It generates understandable rules. It is less appropriate for estimation tasks where the goal is to predict the value of a continuous attribute. It performs classification without requiring much computation. It is prone to errors in classification problems with many class and relatively small number of training examples. It is suitable to handle both continuous and categorical variables. It can be computationally expensive to train. The process of growing a decision tree is computationally expensive. At each node, each candidate splitting field must be sorted before its best split can be found. Pruning algorithms can also be expensive since many candidate sub-trees must be formed and compared. It provides a clear indication of which fields are most important for prediction or classification. It does not treat well non-rectangular regions. It only examines a single field at a time. This leads to rectangular classification boxes that may not correspond well with the actual distribution of records in the decision space. Table 2.1 2.4.7 Applications Decision tree is generally suited to problems with the following characteristics: a. Instances are described by a fixed set of attributes (e.g., temperature) and their values (e.g., hot). b. The easiest situation for decision tree learning occurs when each attribute takes on a small number of disjoint possible values (e.g., hot, mild, cold). c. Extensions to the basic algorithm allow handling real-valued attributes as well (e.g., a floating point temperature). d. A decision tree assigns a classification to each example. i- Simplest case exists when there are only two possible classes (Boolean classification). ii- Decision tree methods can also be easily extended to learning functions with more than two possible output values. e. A more substantial extension allows learning target functions with real-valued outputs, although the application of decision trees in this setting is less common. f. Decision tree methods can be used even when some training examples have unknown values (e.g., humidity is known for only a fraction of the examples). [30] Learned functions are either represented by a decision tree or re-represented as sets of if-then rules to improve readability. 2.5 Unsupervised Learning (K-Means Clustering) Cluster analysis is a set of methodologies for automatic classification of samples into a number of groups using a measure of association, so that the samples in one group are similar and samples belonging to different groups are not similar. The inpu

Thursday, September 19, 2019

Use of detailed satire in modest proposal :: essays research papers

The use of detailed satire through A Modest Proposal The use of detailed satire is very evident in A Modest Proposal. A writer’s hand that brings the reader’s eye to the effect of sociopolitical policies on the Irish by the English landlords and politicians in the early 1700s, could have only belonged to Jonathon Swift. Swift skillfully addresses â€Å" the suffering caused by English policies in Ireland † as well as holding the Irish accountable for their â€Å"passivity.†   Ã‚  Ã‚  Ã‚  Ã‚  Swift begins by using a gradual egression, setting the tone of the current situation in Dublin, only to shock the reader at his proposal of cannibalism, specifically of young children, to help alleviate the economic burdens imposed by the English and accepted by the Irish. In laying the foundation for his proposal, Swift suggests the benefits for all:   Ã‚  Ã‚  Ã‚  Ã‚  But my intention is very far from being confined to provide only for the children of professed beggars; it is of a much greater extent, and shall take in the whole number of infants at a certain age, who are born of parents in effect as little able to support them as those who demand our charity in the streets. Swift continues on, using excruciating detail, suggesting preparation for dining, the appropriate number of dinner guests the young child will feed, and the price of such a feast. All the while this morbid suggestion is detailed rationally. Swift brilliantly targets the English landlords when he addresses the price of the food, and how it is appropriate since â€Å"as they have already devoured most of the parents, seem to have the best title to the children.† Swift’s use of detail purposely takes the reader away from the proposal to show the examples of how cannibalism has worked elsewhere, only in a satiric effort to show the reader this is not the way to improve the city of Dublin. The build-up of this proposal continues to its conclusion where Swift has taken the reader to the actual expedients, although rejecting them for no hope of them ever being

Wednesday, September 18, 2019

Riddles :: essays research papers

1. Can you name three consecutive days without using the words Monday, Tuesday, Wednesday, Thursday, Friday?†¦Yesterday, Today, and Tomorrow 2. What falls but never breaks? What breaks but never falls?†¦Night and Day! 3. Wat is black when u buy it, red when u use it, and gray when u throw it away?†¦ Charcoal 4. Woman shoots her husband, holds him underwater for 5minutes, and finally hangs him. They were seen five minutes later. How is it possible†¦ The woman was a photographer, took a picture, developed it, and hung it up. 5. The word candy can be spelled in two letters†¦. C and Y 6. Name an English word of more than 2 letters that both begins and ends with the letters "he" in that order. There are two possible answers. "hehe" is not acceptable. haha!†¦ Headache or Heartache. 7. Who makes it, has no need of it. Who buys it, has no use for it. Who uses it can neither see nor feel it†¦. Coffin 8. Whoever makes it, tells it not. Whoever takes it, knows it not. And whoever knows it wants it not†¦. Counterfeit money 9. Why is six afraid of seven†¦Because seven eight nine 10. Johnny's mother had three children. The first was April, the second was May. What was the name of her third child?†¦.Johnny 11. Why is it against the law for a man living in North Carolina to be buried in South Carolina?†¦Because he is still living 12. There was an airplane crash, every single person died, but two people survived. How is this possible?†¦They were married 13. That attorney is my brother, testified the accountant. But the attorney testified he didn't have a brother. Who is lying?†¦The accountant was his sister 14. A man and his son were in an automobile accident. The man died on the way to the hospital, but the boy was rushed into surgery. The emergency room surgeon said "I can't operate, that's my son!" How is this possible?†¦The mother was the surgeon. 15. Forewards it is heavy, backwards it is not†¦Ton 16. The more you feed it, The more it grows high,But if you give it water It shall quickly Die†¦Fire 17. The Begining of eternity, the end of space, the begining of every end, The end of every place†¦.The letter E 18. What starts with P, ends with E, and has thousands of letters in it?...Post Office 19. Ten copycats were sitting on a bridge. One jumped off, how many were left?†¦None they were copycats 20. What state is inside another state?†¦Arkansas 21. What state is full of color?†¦Colorado 22. What state has 2,000 pounds of dirty laundry?†¦Washington 23. What state makes you feel bad?

Tuesday, September 17, 2019

History of Dogs

Rachel Bikshorn Eng 101 Informational Paper: Breeding of Dogs Over Time There are hundreds of breeds of dogs all over the world today. These dogs started off as wild animals that were domesticated for the benefit of humans. Purposes for breeding and domesticating dogs have changed since the beginning of the process. However, humankind has always taken advantage of what dogs can do for us. Dogs have been a large part of our lives from the very start. Some of their purposes have changed from more aggressive characteristics in hunting, to more passive behaviors to assist those in need.As humans have changed and evolved over time, so have our dogs. Early dogs were used for hunting large animals. Cave paintings dating back ten thousand years ago portray dogs helping a hunter take down extremely large animals (Coren 120 picture 2). These dogs were usually tamed wolves that could be used for hunting and protection. These dogs had a pack mentality and were very protective of the other dogs a nd humans apart of their pack (Coren 120). Later, hunting dogs would still be use, but for different reasons and animals. Later in society, more breeds of dogs were showing up, but for similar purposes.Breeds of dogs, such as pointers, spaniels, hounds, and terriers were used for hunting smaller animals. They would hunt for birds, foxes, ducks, deer, and rabbits (Coren 120 picture 9-13). Other breeds were used for service work to assist with jobs at home, transportation, or to help move objects. Many breeds of sheepdogs were used on farms to herd livestock. They were sought out for herding because they lacked a tail. This was â€Å"a desirable trait because of a tax structure that defined as taxable livestock anything born with a tail† (Coren 120 picture 14).Breeds such as the husky were and still are used in team to pull people and objects across snow-covered grounds. â€Å"The dog teams are organized much like a wolf pack, with a leader, or king whose movements coordinate the activities of the other animals† (Coren 120 picture 15). The other dogs on the sled team pay attention to the pack leader and follow that dog. Other, smaller breeds were used to pull small carts with objects such as rags (Coren 120 picture 16). Saint Bernards are extremely large dogs that came from Italy and the Swiss Alps.These dogs were used in search and rescue mission in the mountains. They were also used as herding dogs, livestock guardians, hunting dogs, and watchdogs (Saint Bernards- History and Information 3). Currently, dogs are still a huge part of our lives. As we have adapted to society and technology advances, so have our purposes for keeping dogs and certain breeds close in our lives. Dogs and dog breeds have also adapted to our everyday needs as they have changed in society. More commonly now, we see dogs as family oriented.They still assist in safety work and service help, but breeds are now commonly bred for family and show purposes. Commonly German Shepar ds are used as police dogs. These dogs sniff out drugs and bombs at bus stations, airports, checkpoints, and many other places. The key positive about using sniffing dogs is that it is not considered a search. There does not need to be evidence of drugs or bombs to bring out a sniffing dog. They simply sniff and detect or do not detect illegal objects (Savage). Dogs are also used to help the public through service.Many breeds that are known to be more docile and passive work with people who have special needs. These may include children, adults, elderly, and people with disabilities. Therapy dogs can be found visiting patients in nursing homes and hospitals to help ease the pain and anxiety for the residents. A study was done to see how therapy dogs affected anxiety levels in patients that needed an MRI. In order to get a clear picture from the test, the patient must be very still. If they are nervous and moving slightly, the picture is not clear.The study had two groups of people t hat needed an MRI. One group spent time with a therapy dog beforehand and the others did not. The study showed that â€Å"time spent with a dog seemed to substitute for the anti-anxiety medications some patients need to get through and MRI† (HealthDay). Dogs have a calming affect on people and can be used at substitute for drugs in certain situations. Other dogs that are also calmer and more docile have been used for service work. These dogs work with blind and deaf people.Guide dogs for the blind are ranked as â€Å"one of the most useful modern occupation for a working dog† (Serpell 52). Commonly Labradors and golden retrievers are used as guide dogs. Thanks to these dogs, people with disabilities are able to function on their own in society. Most commonly you can find dogs of all different breeds in people’s homes. Although many dogs are used for working purposes, many are also simply house pets. Dogs that are family oriented and friendly with other people an d pets are most likely what one would find in a home setting with a dog.Certain breeds, such as the pug have not been used for anything else other than companion dogs and pets. Another breed, the King Charles spaniel, has been bred to be loving and gentle. Some characteristics are specifically bred for housedogs and pets (Coren 120 picture 17-18). Dogs that have certain personality traits and physical characteristics have been bred for multiple purposes. Newly, purposes have been for helpful and caring reasons. It has become increasingly popular to breed dogs with strong physical and personality characteristics for show and sport purposes.Today, dog breeding â€Å"in most countries is dominated by the show-ring† (Serpell 61). Exemplary models of dog breeds are bred and trained for sport or show. Dogs in top physical condition compete in dog shows where their bodily skills are shown off in obstacle courses and physical tasks. Other dogs that are in top condition for looks and behavior compete in dog shows where judges pick the best in show for certain categories of dogs. The categories where a dog is picked as the winner include; sporting, hounds, working, terrier, toy, non-sporting, and herding (American Kennel Club).Over time, humans have used dogs in ways that best benefit our lives in the time period. As we have changed and evolved, so have our dogs. From the wildest and newly domesticated, to the simple house pet, dogs have always had a purpose in our lives. We have bred them over time to help us with our everyday needs, and in return they have been loving and loyal companions. Resources: â€Å"St. Bernard Dogs a History and Information. † St. Bernard Dogs a History and Information. Copyright August 7, 2011. Web October 25, 2012. Savage, David. â€Å"Top Justices See Benefits of Police Dogs†.Los Angeles Times. Copyright November 11, 2004. Web October 25, 2012. â€Å"Therapy Dogs May Help Ease Anxiety of MRI†. HealthDay. U. S. Ne ws. Copyright May 6, 2011. Web October 25, 2012. â€Å"A Beginner’s Guide to Dog Shows†. American Kennel Club. Copyright 2012. Web October 25, 2012. Serpell, James. The Domestic Dog: its evolution, behavior, and interactions with people. New York: Cambridge University Press, 1995. Coren, Stanley. The Intelligence of Dogs: A Guide to the Thoughts, Emotions, and Inner Lives or our Canine Companions. New york: The Free Press, 1994.

Monday, September 16, 2019

World War II

Who was Joe Louis, why is he important, and why did he help to increase black enlistment into the military? He was important because he defeated a white boxer and encouraged blacks to enlist In the army 2. What was the first concentration camp and when was it set up? Dachas, 1933 3. What groups of people were targeted during the Holocaust? Jews, Gypsies, Polish Catholic, Russians, mentally and physically disabled, homosexuals, and political prisoners. 4. What was the â€Å"Final Solution†? The mass murder of Jews 5.Based on the reading, describe Auschwitz. More than 1. 6 million were killed in Auschwitz, they didn't feed babies to see how long they could survive 6. During the asses, how was widespread anti-Semitism demonstrate by the US? The US only let 10 percent of the quota of Jewish people allowed into the country 7. How many nations were involved in ‘MINI and where did fighting take place? 70 nations were involved. 8. How many people participated In the war and how many people died? Over 70 million people served 9. Which nation suffered the greatest number of deaths? Which nation suffered the least?Soviet troops, Germans, and Japanese suffered the most and Americans suffered the least amount of death 10. In what ways did the world change because of the war? The world is more observant of situations and people like Hitler and WI lead to the Nuclear age 11. How was US sentiments about international relations prior to WI similar to feelings prior to WWW? Because before WWW they were striving for Isolationism and they are striving for It again after WI 12. Why was the Kellogg- Brand Pact unsuccessful? Because the other nations didn't agree with it so the other nations went to war anyways and tried bringing America into it. 3. In 1935, how did a large percentage of college students feel about war? Why did many people feel this way? They weren't going to fight even if they were invaded 14. What was Merchants of Death and what did It argue? It was a book that said that the United States had been drawn into the European war by international arms manufacturers who had deliberately fomented conflict In order to market their products 15. What was Mien Kampala and what did It call for? Mien Kampala means my struggle. It laid out Hitless plan for Germany. 16. Why was Doll Hitler imprisoned?Because he and his Anza party took over the 5 year old republic of Germany. The Beer Hall Putsch 17. What actions did Hitler take after becoming the chancellor of Germany? He outlawed labor unions, imposed newspaper censorship, and decreed that the Nazis would be the only political party of Germany. He also established a I OFF the age of 10 to Join youth organizations and follow Nazi beliefs. 18. What were the Unmerge Laws and what did they do? Forbade intermarriages, restricted property rights, and barred Jews from the civil service, the universities, and all professional and managerial occupations. . What did Japan do because of their lack of ra w materials? What was the reaction of the US? They invaded Manchuria.. President Hoover rejected a military response. 20. As Japan ignored the reaction, what actions did they take during the asses? What was the reaction of the US? In December 1937, Japanese aircraft bombed the Panky, a U. S. Gunboat stationed on the Yanking River. The United States accepted Japan's apology 21 . What event took place in Nanking and how did the US react? In December 1937, Japanese aircraft bombed the Panky, a U. S. Gunboat stationed on theYanking River. The United States accepted Japan's apology 22. Who led Italy throughout WI? Bonito Mussolini 23. What was Italy's political party and how was it similar to Hitter's Germany? Fascism. He said he would end political corruption and labor struggles Just like Hitler. 24. What were Italy's aspirations regarding Africa? To make an Italian empire in North Africa, 25. What actions did Germany take after dropping out of the League of Nations? He went seeking mor e land in England 26. What areas was Hitler able to annex without interference of Britain and France? Austria 27.What is appeasement and why were Britain and France looked at as appeasing Germany? Appeasement is to make someone happy. They kept giving Germany breaks 28. What was agreed upon in the German-Soviet non-aggression pact? That the soviet union could have control over Poland 29. What event caused the war to begin and what was Germany's war tactic? WWW. Germany's war tactic was tip become the master race 30. Who became Prime Minister of Britain during the war? Winston Churchill 31 . What was the German Air Force called? Luftwaffe 32. After failing to destroy Britain, what actions did Germany take?They invaded Belgium 33. What events occurred between Deck. 6 and Deck. 11, 1941? Soviet forces repulsed the German attacks on Moscow. This was Hitter's first defeat 34. Between 1935 and 1941, how was the US involved in the war? We responded to the war by issuing a proclamation of n eutrality. In 1941 the President offered a Lend- Lease aid to the Soviet union. 35. What actions did the US take against Japan because of their expansion throughout Asia? America froze all Japanese bank accounts in the US. 36. When did the bombing of Pearl Harbor occur? Deck 7th 1941 not destroyed the ship repair facilities. 8.What was the US reaction to the bombing of Pearl Harbor? The US declared war on Japan 39. How did the war affect US economy? Give specific examples. The war brought unprecedented prosperity to America. 40. How did WI affect American fashion? Women had to work so they couldn't wear more feminine clothes so they had to wear more masculine clothes 41 . What happened to the NAACP during the war? Their membership went from 50,000 to 500,00 thousand. 42. What was â€Å"Rosier the Riveter† and did it represent? She was the popular image of of women who abandoned traditional female occupations to work in defense industry. 3. What role did Mexican Americans play during the war? Almost 400,000 served during the war. 44. How were Mexican Americans treated in Los Angels during the war? Many youth gangs erupted in Los Angels 45. How was the naturalization of Italian, German, and Japanese immigrants to the US affected during the war? They weren't allowed to in mass numbers. 46. What were Internment Camps? How did Sauerkraut v. US relate to these camps? Internment camps were for immigrants when they wanted to move into another country but they had to go to camps.Because a US military official told Sauerkraut to go too camp and he said no and then he went to Jail. 47. How many people died at Straddling? 850,000 48. Before invading France, where did the US and British forces begin fighting? Germany 49. When did the allied invasion of France begin and what was it referred to as? 50. How/when did Hitler die? April 30th 1945. Gunshot to the head 51 . When was V-E day? May 8th 52. What were the US' two strategies to defeat Japan and who led each of th ese? 53. What was the Enola Gay? Boeing 8-29 Superstores bomber

Sunday, September 15, 2019

Communication of Values and Ethics in Strategic Organizational Communication Essay

Starbucks organizational structure has been rearranged to better accommodate customer satisfaction. Schultz, CEO of Starbucks announced the expansion of their matrix organization structure. They will operate under four U. S. divisions: Western/Pacific, Southeast/Plains, Northeast/Atlantic and Northwest/Mountain (Schultz, 2008). There are some major advantages for this kind of organizational structure which include maximized communication channels. Once the appropriate adjustments are made, Schultz believes that Starbucks will be able to develop products specifically to market appeal. The continual support in the Starbucks organizational structure support functions operating being their own department and supporting shared visions and goals for each of the U. S. divisions and the international circuit (Schultz, 2008). In 1995, Starbucks opened its first coffee house internationally in Tokyo, Japan (Starbucks, 2008). Successful partnership allowed the company its footing inside foreign country. The large population and high disposable income from the consumers is what initially drawn the company and its executives to Japanese market. In adapting Japanese culture, extensive researches motivated Starbucks in changing their business model by catering to 40 year old businessmen and provide a smoking environment to enjoy their coffee. The Japanese locations included U. S. menus which the founder of the international segment for Starbucks ignored the advice stated previously. The complication of working in the East and West was understood by a Starbucks business partner, Sazaby. Japans’ attraction towards the kinds of products contributed to the understanding of the global market and leading Starbucks a success (Japan External Trade Organization, 2006). Unilever has another common organizational structure; the hybrid form. It operates with three divisional regions, two product segments, and five functional segments. It developed and implemented this organizational structure for their company to improve communication and to take advantage of resources that are available to them. This structure is typically organized in a top-down manner. It flows down to management once the executive level is satisfied with the structure. It is not always visible, however judging by actions and specified reporting protocol this structure is intact and in use. In equity based modes of entry involves managements decision to make foreign investments. This would require a partnership, collaboration, or alliance be made with another company or a distributor for a better grasp on the concept of the economy, culture, and climate in the new area. Exporting, subcontracting, and franchising could be with minimal cost to the company. Starbucks continues to stand behind their mission statement in all odds of the economy and publicly through public awareness. I read a story about Starbucks charging and not responding to sending the troops in Iraq coffee without charging them. Not every company can help everyone in need and there are times when they do have to say no for other obligations. Most companies already commit to donations to specific groups/organizations and have implemented that cost into their yearly/monthly/quarterly budget. However, there are some exceptions when it does exceed their denomination term. Starbucks Customer Relations organization handles these types of comments as best as they can satisfying all parties involved. The company retracted its answer in a formal public letter, (viewable for public) stating that â€Å"Starbucks has provided over 220,000 3-packs of Starbucks VIA to the USO for their care package program. † (Starbucks Newsroom) Starbucks are partnered with the American Red Cross and the United Service Organizations (USO) to provide coffee in efforts to relieve times of conflict, donating more than 141,000 lbs of coffee. Public relations are exceptional with the Starbucks Coffee Company. They have several outlets in communicating to them any questions or concerns and a hotline phone number to be contacted. The company responds within 24 hours most times and they answer all comments no matter how small or large and resolves conflicts as quickly as possible. Starbucks Mission: Our mission: to inspire and nurture the human spirit – one person, one cup and one neighborhood at a time.

Saturday, September 14, 2019

Hae’s Murder

Hae orchestrated her own murder with the help of a third party to frame Adnan. Suppose the plan was to plant Hae's body in Adnan's car in order to frame Adnan. Hae's accomplice mistook Jay for Adnan (or followed Adnan's car, that Jay borrowed), and Adnan discovered Hae's body in Adnan's car, freaked out, and either confronted Adnan and they both buried the body together, or buried the body himself but pointing the finger to Adnan, or just left the body to Adnan to deal with. The anonymous tip came from Hae's accomplice. The tip was specific about pinning it on one particular person.The body was buried in a way that wanted to be found (shallow grave of 6 inches). Mr S probably received a tip or heard a rumor about the grave. Someone wanted the body to be found and led to Adnan. If Adnan had premeditated the murder, he could have pre-dug grave or dug deeper grave. It seems far fetched but we hardly know anything about Hae, except for her diary, her post-breakup letter to Adnan, and some of her Lacrosse buddies called her a tick, as in a very competitive spirit who could not let go. The picture she painted of their relationship in her diary sounded like she was more into Adnan than he was. He recounted being upset about the break up for a while but got over it because it's just high school stuff.She was in love with him despite him calling her the devil, and his sin, and endured public embarrassment by his parents at the homecoming dance. Adnan and his friends thought it was funny.Aisha recounted that Hae didn't think it was funny.Hae wrote in her diary that Adnan would have to choose between her or his religion. She believed that love will â€Å"conquer all†. She would need to make him see this, that she is above his belief. She broke up with him, started dating an older guy to make Adnan jealous, to get back at him and in hopes that he would recognize his mistake. Adnan would come running back to her and commit his undying love for her forever religion be-damned. Instead, Adnan got over her and started dating other women, multiple women, and is so casual about it. Hae becomes mad hurt, jealous, and plots her own murder to frame Adnan. By the time Jay (or Jay and Adnan) discover the body, they're probably high and freaking out. Adnan (who knew nothing) was probably having a hard time convincing Jay that he didn't do it and Jay is probably super convinced that Adnan is the killer that his mind â€Å"filled in the blanks† by the police investigation and made his story corroborate police findings. This would explain why his stories change from time to time.They may have disposed of the bodies together. idkThe identity of the anonymous tipper, the story from the neighbor boy about seeing a girl's dead body in the trunk, the coincidence of finding the body, all make me believe that there is a third person who indirectly pointed to the location of the body and blamed Adnan.

Friday, September 13, 2019

Daffodil by Ted Hughes and I Wandered Lonely as a Cloud in contrast Essay

Daffodil by Ted Hughes and I Wandered Lonely as a Cloud in contrast - Essay Example Poetry connects beyond any particular framework of time period. Certain critics comment upon this connects as influence and others quote it as inspiring. William Wordsworth, the great pantheist and romantic poet wrote the poem, ‘I Wandered Lonely as a Cloud’ in the year 1804. The poem popularly came to be known as ‘The Daffodils’. In the year 1986, the very modern poet Ted Hughes inspired by the poem of Wordsworth had drawn allusion from the poem of Wordsworth and included the poem bearing the title, ‘Daffodils’ in his collection of poems entitled, ‘Flowers and Insects’. In the sleek edition by Ted Hughes when other poems could not become quite popular, very intriguingly the poem which eluded its title from the Romantic era of English literature drew considerable attention. Both the poems, written age apart, very interestingly pondered upon the impact of memories captivated by both the romantic and the modern poet, which essentially builds the matrix upon which the similarities between the poems can be evaluated and the difference in the perspective upon the same subject could be analysed. Thesis Statement The essay intends to discuss critically the essential similarities and differences inherent within the poem which evolves out on the context of the same subject. Contrast: I wandered Lonely as a Cloud and Daffodils At the outset, a thorough introspection through the poem by Wordsworth, ‘I wandered Lonely as a Cloud’ enables the readers to come to terms with the exclusive order well organised within the poetic scheme by Wordsworth. The narrator of Wordsworth’s poem is reminiscing upon the private moment encountered by him and evocation of his feelings on seeing the beautiful sight of daffodils on a field. The influence of the memory is so powerful for the narrator of Wordsworth’s poem that it is capable of making the ‘pensive’ mood of the narrator elevated. Taking the q ueue of a sombre simile, the poem begins ‘I wander’d lonely as a cloud’. The metaphor of the poem is so strong that the field of dancing daffodils is assumed as the dancers on a dancing floor. The poet plays with the words to the extent within the poem that it seems the rhyming and the choice of words together are so much intended to make the lines of the poem dance together with the daffodils thereby evoking a strong imagery before the eyes of the readers (Woof, 2011). The main intention of the poem by Wordsworth is to make the readers feel the joy the narrator received on seeing the field of dancing daffodils. The surprise of the narrator is also being communicated by him when he comments upon his surprise at the ‘wealth the show to me had brought’. The poem closes with the trip of the narrator down his memory lane and aptly with a rejuvenating metaphor, ‘and then my hear with pleasure fills, and dances with the daffodils’ (The Wordswo rth Trust, 2012). The poem by Wordsworth focuses on the beauty and bounty the nature captivates and its ability to balm the bruises of a tired heart and elevate the pensive mood of a man. The poem by Ted Hughes is a seminal work. It is inspired by the poem of Wordsworth which captivates the daffodil flowers central to both the text. Hughes’ ‘Daffodil’ also narrates the memory of the narrator and his encounters with the flower daffodil. However, very contrastingly the berating of the narrator’s dead wife amid the reminiscence of daffodils builds a morbid tone of the poem quite contrasting to the poem of Wordsworth. The allusion of the title thus appears evidently ironic and a reader coming across the poem by Hughes for the first time will be misled because they won’t find the familiarity of context and intonation with the