.

Saturday, August 31, 2019

Why so minorities in us prisons

There are a majority of minorities in the U. S. Prisons because of lack of education, low or falling wages, and low parental or family guidance, parents being incarcerated as they were child and poor conditions after they have been released from Jail or prison. These are the top few reasons for the large numbers of minorities in the prison population. Many have disagreed on these findings, but three researchers at Princeton University have concluded that these are the primary causes with the high population of minorities in the U.S. Prisons and Jails. According to Bruce Western, Meredith Clambake and Jake Responded during the asses through asses at least two- thirds of the population of criminals were placed in state or federal prisons for a felony conviction with a sentence of a year or maybe even longer depending on the crimes the inmates have committed. Between these years the rate in population averaged about one hundred to one hundred thousand of the U. S. Population to 470 pris oners per the population of one hundred thousand in 2001. The gap continued to grow between the rich and poor and had affected the admission rate because of he increasing crime offenses being committed among the low income men†. Jacobs & Helms 1996)(Greenberg & Western 2001). When Western and his colleagues continued their work they found out that in 2009 the ratios for the minorities against Caucasians was sufficiently much higher than average. African- Americans were almost seven times higher than that of the Caucasian males. (4,749 African-Americans v. 708 Caucasians). The ratio of Hispanics compared to Caucasians was more than 2. 5 times higher (1,822 Hispanic males v. 08 Caucasian males). The female ratios are much lower than the males but are still found in the population of minorities housed in the Jails and prisons throughout the United States. The numbers for the African-American females rated 3. 5 times higher than the Caucasian females housed in the prison populatio n. (333 African-Americans v. 91 Caucasian females) and the Hispanic females are 1. 5 times higher than the Caucasian females within the general prison population. (142 Hispanic females v. 91 Caucasian females). These numbers are calculated by per 100,000 general population throughout the states Jails and prisons in the United States.The next stages of their research inducted was of the different labor markets or employment status of the minorities throughout the general population housed in the Jails and prisons throughout the United States. The labor markets have a big influence on the high rate of imprisonment in two ways: the dramatically falling of their wages and Job opportunities and this increases the crime offenses and rates at the bottom of the economic ladder and this ends up generating the higher arrest rates, convictions and prison admissions throughout the United States. Western & Petit 2001) When this happened in the asses through the asses most African Americans turne d to rug dealing and other crimes to compensate for the loss in income and Job opportunities. Western and Petit observed with their research that males of both ethnicities that had stable sector Jobs where the work is consistent, routine and monitored often commit less crimes compared to those of the secondary labor market where employment is irregular all the time and isn't reliable.When the wages and employment rates are low it sometimes leads to crime indirectly by undermining the bonds between family members and neighbors. During the years 1967 through 1998 youth homicides were weakly related to income inequality and reliably related only to unemployment rates among Caucasians but not for the African Americans. Messier, Rarefaction and McMillan (2001) When Western conducted ethnographic research he has identified entrepreneurial gangs as the key sources of economic opportunities for the young males throughout the urban communities characterized by the chronically high rates of u nemployment.One of Westerns colleagues Bourgeois in 1996 conducted research that the Hispanic drug gangs view the sales and distribution of illegal drugs to help the depleted economic opportunities in their inner cities in which they live. With Western and his colleagues this can be stated that the evidence of the young men in the poor urban neighborhoods resorted to drug dealing and other crimes such as rape, robbery, homicide , murder and other such crimes to help compensate the funding they have lost due to the low labor markets of the asses.With the conclusion of this information Western and his colleagues found out that due to lack of Job opportunities the inmates often resorted to other means of getting income that are most of the time found in either poorly stricken neighborhoods that don't have a lot of Jobs for the offenders or due to the inmates arrest history that prevents them from being hired or rehired in Jobs they had obtain before they were placed into the system.The next part of Western and his fellow colleague's research was that they conducted several theories whether or not parental or family guidance or influence had anything to do with the high imprisonment rates of the minorities that are placed into the Jails or prisons throughout the United States. When Western and his colleagues were conducting their research they had done a survey on several of the minority inmates that either had single parents or both parents at home with them before being incarcerated.With Western findings he also stated that â€Å"when there are families with two parents they can monitor their children's activities and help keep them from straying toward the peer networks that often lead to crimes for delinquency. Families that have only one parent often struggle with the falling wages and employment rates and their children often end up committing crimes with high levels of violence to help their parents make amends for their loss of income and they also didn't have that parent guidance or supervision to help them from straying towards the crime offenses. †Western and his colleagues also conducted more research in this topic on whether the parents being incarcerated had anything to do with this high number of minorities being in the prisons or Jails throughout the United States. Their findings were supported by the findings of other researchers studying the same topic. In 1995 researcher Nancy G. La Veggie and her colleagues of the Urban Institute Justice Policy Center did a study on thirty-six children of incarcerated parents and found that the results of the parents being incarcerated often caused chronic sleeplessness, difficulties concentrating and high rates of depression.One other study that was conducted during this time being showed sixteen percent of children with parents behind bars often developed temporary school phobias that would lead to the children not willing to attend school for six or more weeks following their pa rents being place into Jail or prison. The children also had a tendency of developing emotional responses that would eventually build and develop into long-term reactive behaviors, coping patterns and possibly even criminal activity.When Nancy and her colleagues finished their research they were able to determine that with at least one aren't being incarcerated presents a unique factor for the children of the age of 10 or lower made them have anti-social or delinquent behaviors that would lead them to eventually committing crimes and being placed into Jails and prisons. So with this research it shows the repeating factors that some kids end up eventually following their parent's footsteps and will be eventually placed into the system.They also showed us that it is a never ending cycle starting with the parents and eventually going to the children. These are why Western and his colleagues believed that with owe parental control or guidance played a huge factor. According to the 1997 survey conducted of the inmates housed in the state and federal prisons and Jails throughout the United States. Western and his colleagues found out that on average the inmates averaged less than eleven years of schooling compared to more than the thirteen years of schooling among the men under the age of forty in normal everyday society. Western ; Petit 2005). Most of the correctional facilities find out that the imprisonment rate for African Americans is seven times higher than those of the Caucasians. With this being said African American and Caucasian high school dropouts are five times more than likely to go to prison or Jail at a year's time compared to the men from both ethnicities that have completed school. Due to the combination of racial and educational inequality affects the young African American male dropout more than the Caucasian male dropout.Western & Petit estimated that one in six African American dropouts was incarcerated in state and federal prisons each year st arting in the asses. In 2001 one percent of college educated African Americans were incarcerated in prisons throughout the United States. By 2008 Western and his colleague's surveys read that thirty-five percent of African-American children between the grades seventh through twelfth have been suspended or expelled at some point throughout their schooling careers compared to the twenty percent of Hispanics and the fifteen percent of Caucasian men.With the increasing crime rates in the poor urban neighborhoods provides the explanation that the rising rates of incarceration affected the young minority men and women that had little to no schooling at all which is why there are so many minorities in the orisons or Jails throughout the United States. The effects of incarceration on the life chances of inmates are profoundly detrimental.

Friday, August 30, 2019

Invisible Man Essay

In Ralph Ellison’s Invisible Man, the character of Trueblood is unique and well developed. Trueblood is a man who impregnates his wife, and at the same period of time commits incest and impregnates his daughter. This character’s reasoning for having sexual relations with his daughter is that he was dreaming when this happened; a feat that while fantastical, could also be plausible due to Trueblood’s nature. Trueblood, while a moral character aside from his transgression, is also oblivious. A good example of this happens on page 48 when Dr.  Norton asks â€Å"You feel no inner turmoil, no need to cast out the offending eye? † to which Trueblood replies â€Å"I’m all right, suh. My eyes is all right too†. Regardless of his ignorance, Trueblood shows remorse for his actions, and believes that a â€Å"man don’t leave his family†, which attests to the morality of the character. Much like the Invisible man, Trueblood found his own morality which did not exactly follow society’s guidelines. When explaining his situation, Trueblood brings up the issue regarding awareness of reality, since according to him he has sex with his daughter during a dream state. As he describes it on page 59, the dream seems to be a metaphor for what actually happened: â€Å"I runs and runs till I should be tired but ain’t tired but feelin’ more rested as I runs†¦ Only I’m still in the tunnel. Then way up ahead I sees a bright light like a jack-o-lantern over a graveyard. It gits brighter and brighter†¦ it burst like a great big electric light in my eyes†. Trueblood comforts himself by saying â€Å"You ain’t guilty†; he does not admit his guilt since he does not see fault in what he did since he was not in control of himself. This is his perception of reality. Again, this unawareness of reality is parallel to the Invisible Man’s life, who cannot see anything as real until understanding he is invisible. The way Trueblood has been treated by the white community, however, seems to be one of the major issues. Before impregnating his own daughter, he claims his life to have been hard: â€Å"Every time I think†¦ what a hard time we was having I gits the shakes† and â€Å"it was cold and us didn’t have much fire†¦ I tried to git help but wouldn’t nobody help us†. After his sinful act, surprisingly enough, it was the white community which came to his aid. Not only are the police ssisting by giving Trueblood protection from the black community, but also assisting by giving him money. To this, Trueblood says â€Å"I done the worse thing a man could even do in his family and instead of chasin’ me out of the country, they gimme more help than they ever give any other colored man† (67). Again, morality is the theme here – the white community is treating Trueblood in a way as if rewarding him, even though his act was actually reprehensible. While this could be seen as the white community’s moral obligation to assist someone who was ostracized from their own community, it could also be seen as moral hypocrisy.

The Role of the Individual in Candide

All around the world the roles of the individual and of society are completely abstract. As the world changes and develops, the roles of the individual and society change to meet the needs of the people. Voltaire's Candide which involves France during the Age of Enlightment & Marx & Engels' Communist Manifesto which involves Germany around 1848 both discuss the roles of the individual and of society in different ways. In both pieces of literature what is expected of the individuals and of society is very different from what is presently happening. The Communist Manifesto discusses human nature and social class while Voltaire discusses the flaws of society and the realities that not everything is for the best. In Communist Manifesto, the role of an individual is to be an equal and work towards the greater good of society and the role of society is to provide equality for all people. However in Candide, the role of an individual is to be an individual while the role of society is based upon the society you are living in. The role of the individual according to Marx and Engels is to be an equal with everyone else in society. The immediate aim of the Communists is the same as that of all other proletarian parties: Formation of the proletariat into a class, overthrow of the bourgeois supremacy, conquest of political power by the proletariat† (Communist Manifesto 13) The Bourgeois are the 0. 1% of the population that owns the means of production and The Proletariat are laborers who are 99. 9% of the population. Carl Marx state s here that the goal of Communism is equality for all. If you overthrow the Bourgeois it insures that power will be balanced because its 99. 9% in control now instead it’s 0. 1% in control. Marx describes his distaste for how everyone in society is being manipulated by the small percentage in control. Marx goes on to say that â€Å"The Bourgeoisie has subjected the country to the rules of the towns. It has created enormous cities, has greatly increased the urban population as compared with the rural and has thus rescued a considerable part of the population for the idiocy of rural life† (Communist Manifesto 7) People are being control in a majority of their daily routines and being an individual is not something truly supported by the Bourgeoisie. â€Å"You say individuality vanishes. You must therefore confess that by â€Å"individual† you mean no other person than the bourgeois, than the middle-class owner of property† (The Communist Manifesto 16) The idea of communism is to encourage people to actually be individuals while being an active member of society. Although the role of the individual are made very clear by Marx they fail due the ideals of human nature. It is said that the human nature can be considered the downfall of communism. Communism as proposed should be extremely successful but due to human nature there is no way for communist success. The success declines as soon as it starts because people lose motivation. People have no motivation to work as hard as they possibly can because everyone is economically equal. This is a flaw of the communist society as opposed to capitalism. Marx wants people to work as an autonomous collective to gain power and take it away from capitalism however, people are only invested in something that benefits them, and communism relies on an â€Å"all for one, one for all attitudes. According to The Communist Manifesto. the role of society is to provide equality for all people. As stated â€Å"In bourgeois society, living labor is but a mean to increase labor. In communist society accumulated labor is but a means to widen, to enrich, to promote the existence of the laborer† (The Communist Manifesto 15) Marx describes a comparison between the society currently and what Marx’s hopes society will be. Individuals are promised so much more in a Communist society. The difference between the idea of increasing labor and widening labor although minuscule provides hope for the people who are sick of their current society. In communist society, the present dominates the past. In bourgeois society, capital is independent and has individuality while the living person is dependent and has no individuality† (The Communist Manifesto 15). This shows how people, while working toward the greater good have their own individuality under communist society. In a Communist Society although people are allowed to be unique they are all considered equal no matter what. In Candide the role of an individual is to be an individual. Voltaire, throughout the skill of repetition exploits how people behave. He describes for instance how everyone feels someone is better off than they are. Voltaire uses Candide's journeys to portray the human assumption that the grass is always greener on the other side. Now even though most people are not pleased with how their lives are currently, they are esteemed individuals. Individuals work for the benefits of themselves as they cultivate their farms and work hard to make sure their families are well fed and stable. â€Å"‘I have only twenty acres of land’ replied the Turk, ‘which my children and I cultivate. Our work keeps us free of three great evils: boredom, vice and poverty’† (Candide 112). This shows how in Candide, society’s individuals work hard on their own to make something out of themselves. According to Voltaire in Candide the role of society clearly depends on what kind of society you are currently living in. Societies, according to Voltaire had many flaws. As Candide comes to the land of Eldurado, we are shown an almost flawless society. â€Å"Candide asked to see the law courts, he was told that there were none, that lawsuits were unknown. He asked if there were prisons; the answer was no. †(Candide 64) In this nearly flawless society all men are free and the king is the complete opposite of a tyrant. â€Å"I know my country doesn’t amount to much, but when man is fairly well of somewhere, he ought to stay there. I certainly have no right to prevent foreigners from leaving: that kind of tyranny is sanctioned by neither our customs nor our laws† (Candide 66). Another society Candide discusses is Paris. â€Å"Yes, I’ve been in Paris: it’s a mixture of everything found in all the provinces. It’s a chaos, a restless throng in which everyone is looking for pleasure and hardly anyone finds it, or at least that’s how it seemed to me†(Candide 75) In Paris it seems that this society has no partake in it’s citizens lifestyle. The individuals yearn for what society has to offer them. Voltaire uses satire to take aim at the military, religion, and societies' shallowness to disprove Pangloss’ theory that â€Å"all is for the best†. The world that we live in is not the best of all possible worlds.

Thursday, August 29, 2019

Article Critique Essay Example | Topics and Well Written Essays - 750 words - 7

Article Critique - Essay Example This movement did much to shift the focus from job recovery to the national debt. Though some from the conservative stance felt the Tea Party movement was exactly what the nation needed, proponents such as Sarah Palin had a very different view. She supported the insurgency much more so than the leader of the movement. She was very much against the movement being defined by any one leader or party. TEA AND SYMPATHY Who owns the American Revolution? (Tanenhaus,2012) The article uses metaphor to describe the Boston Tea Party ship. Though there is a replica that is discussed I believe in this article the discussion demonstrates that State of the Tea party Movement. Jill Lepore goes on to describe one business commentator’s outrage of the federal government’s bailout plan, demanding a new Tea Party. He insisted on the unloading of derivative securities into Lake Michigan. The article highlights the importance of the Founding fathers and those events that transpired in 1773; comparing them in a way as to give the opinion that today’s Tea Party movement is small in comparison and lacks the convictions of those of that time. Jill Lepore’s bias seems to be in agreement with the argument’s she presented in the article, and is in agreement that no particular leader or party should be on whole responsible for the Tea Party movement and that those who are considered Tea party faithful’s are emphatic of quixotic crusades (Tanenhaus,2012). Lepore disagree that the tea Party movement has a misguided view of the American Revolutionary period (Mohamed, 2011). Lepore uses sources such as Christen Varley, responsible for holding monthly Tea Party movement meetings and CNBC business commentator Rick Santelli. Lepore suggests that if the Tea party is to be thought of as fundamentalism history and its review will not change these thoughts. No Thanks for the Memories Gordon S. Wood (Wood, 2011) This article is actually a response to the Jill L epore book â€Å"The Whites of Their Eyes: The Tea Party’s Revolution and the Battle over American History, (Princeton University Press, 2011). He describes Jill Lepores attitudes and opinions as mocking and describes her discussions as ramblings of present day Tea Party movement issues with those of the Revolution. He considers her question of what our forefathers would do to be a question that is not only pointless but serves little purpose then to provoke conversation towards what seems to be her favorite subject, the American Revolution. Lepore regards the Tea Party as an ageless and nearly sacred event almost to the point of worship. Throughout her book she constantly reiterates that in the case of the Tea Party movement history is clearly not understood and possibly incapable of being understood by today’s government. She dismisses interpretative doctrine of original ideas as fundamentalism (Woods, 2011). Woods opinion is that Lepore should have as her focus mem ory of the American Revolution more so than emotional ties and that these ties cloud and bias her vision and opinion. He expresses concern that her scientific credentials are not demonstrated and that the book leaves us with little actual understanding of the Tea Party movement. He feels the book should have ‘

Wednesday, August 28, 2019

Macro paper Essay Example | Topics and Well Written Essays - 2000 words

Macro paper - Essay Example I chose the chapter about economic growth (chapter 16) because I believe that it would be most useful to use that topic at this time since the global economy has been experiencing a downturn in the past months. In chapter 16, the different indicators of growth are discussed as well as different ways to illustrate growth. I find these aspects interesting since there are, indeed, a lot of ways to show economic growth. For example, the use of a Production Possibility curve to measure growth is a common tool. This chapter says that in order for growth to occur, the curve should execute an outward shift. But I think it cannot be applied to all countries. Maybe it is applicable to developed countries because it is easy for them to shift to a higher Production Possibilities Frontier (PPF). In developing countries, however, economic growth means moving from inside the PPF to reach the point along the PPF (Crafts 139). Also, growth will not always occur just as long as the PPF curve shifts ou tward. According to the Solow Growth model, growth will start to slow down as the economy approaches its steady state level (Crafts 140). Just like in microeconomics where there is the law of diminishing marginal utility. Although Solow did not mention about a diminishing economic growth, the steady state level of an economy is like the satiation point wherein growth will slow down. Also, this topic brought the study of macroeconomics to a new level since it does not only talk about the usual AS-AD curves in macroeconomics but it also tackles the "society" part of economics. Yes, it discusses about the Aggregate demand and supply and the Production Possibility curve but it enables us to understand the global economy in a broader perspective. "The Battle of Ideas": A Macroeconomic Perspective In the first episode of Commanding Heights, The Battle of Ideas, the contrasts between Keynesian economics and Austrian economics are very noticeable. From Lenin's revolution against the global economy to Von Mises' free market. During the World War I, Lenin was against the free market and even said that globalization exploits men. Communism took over Russia. The state had implemented heavy public intervention. When John Stalin came, the idea of central planning was introduced. The government had so much power over wages and prices. This was the main idea of Keynesian economy. Public intervention is needed in order for an economy to develop or attain growth. On the other hand, there's this Austrian economics that constitutes the laissez faire approach to the economy - that free market is essential to attain a good economy. But what is really appropriate in order for an economy to grow Is it the Keynesian or Austrian In the world today that globalization is so prevalent, is it really beneficial for a country to apply the Keynesian thought of heavy public intervention Well, lessons from the past may have the answers to that. In the Battle of Ideas, when Lenin decided to impose heavy public intervention, the Soviet Union did not really prosper at all. Although communism was rampant in their time, having the government

Tuesday, August 27, 2019

Prophet Mohammed Essay Example | Topics and Well Written Essays - 500 words

Prophet Mohammed - Essay Example The intense conflicts between the Majority Shi’a adherents and the minority Sunni adherents have been apparent since the death of Prophet Mohamed. Both groups have been trying to rule over each other with violence and turmoil between them going back to when their two leaders were chosen. In agreement with the argument also, the war between the Sadam Regime and the Shi’a actually fitted the definition of a civil war. The Shi’a, the Kurds, and Sunnis all shared the state of Iraq with the Sunnis having more privileges compared to the majority Shi’a Muslims thus bringing eruptions of revolutions. The revolutions were, however, unable to shake the Saddam regime and thus the involvement of the United States. During the invasion, however, the US did not take any sides and was trying to bring peace to the state. Sadam was the enemy but not the Shi’a community and on bringing him down, they even started forming coalitions with other Shi’a leaders. A good example is the case of Abul Abed from Amariyah. Each group believing that their rivals follow false leaders thus being betrayers of Islam has brought about the sectarian conflict between the Sunnis and the Shiites. For the faith to be cleansed, each believes that they must eradicate the other group completely. Therefore, the question whether they will ever reconcile is somehow already answered. However, they are all Muslims who believe that there is no other God but Allah, believe in the Koran and in the Prophet Mohammad, and will, therefore, seem to come together in case of a common enemy.

Monday, August 26, 2019

Critically appraise the fiscal strategy of the UK Conservative-Liberal Essay - 1

Critically appraise the fiscal strategy of the UK Conservative-Liberal Democrat Coalition government - Essay Example Amongst the compromises that the two parties made were their held fiscal policies, which have greatly affected the country to the present moment. The unresolved budgetary deficits, a weak economy and no framework for making a quick recovery for the economy can show this. When the recession hit Great Britain in the period 2007-2009, the Labour Government continued in its overspending in terms of the budget, which worsened the state of the public finances (Giudice, Kuenzel and Springbett, 2012, p. 22).   At the campaigns of the 2010 general election, the Conservatives promised faster action to curb borrowing in order to stabilize the economy. Through a new budget introduced on June 22, 2010 by the Chancellor of the Exchequer, the government planned to remove the deficit in the budget by the period 2014-2015. By this time, the amount of borrowing as a share of the GDP would have reduced, achieved through cuts in spending by a figure of 80% and increases in tax by 20%. This reassured the financial markets who continued to lend money and at the same time maintaining a low cost in the repayment of existing money owing. By doing this, the Conservatives had made a concession to their Liberal Democrats Coalition partners, which have led to several difficul ties with regard to the fiscal strategy and policy as originally made. The United Kingdom Conservative-Liberal Democrat Coalition Government aims at reducing the spending by the government so that the deficits that are in the budget are reduced. As already stated, it was initiated in the year 2010 with the main aim of achieving â€Å"cyclically-adjusted current balance by the end of the rolling, five-year forecast period†. This means that the intention of the fiscal policy was to have the austerity measures in place until the period 2015-2016, but this was pushed to 2018. What these austerity measures meant were

Sunday, August 25, 2019

History of American Islam Essay Example | Topics and Well Written Essays - 500 words

History of American Islam - Essay Example Estevanico was the first Muslim to enter the historical records in the North America. He was a barber who originated from North Arica and explored the states of Arizona and New Mexico in the 1530s for the Spanish Empire. In 1586, Sir Francis Drake brought around two hundred Muslims the then English colony of Roanoke, which is the present Carolina. Drake’s convoy of some thirty ships had freed these Muslims from Spanish colonial forces in the Carribean where they had been condemned to hard labor as galley slaves.Approximately 15 to 30% of the slaves who were brought to America were Muslims. Some documented cases include abdulrahman Ibrahim Sori and Ayubu Suleiman Diallo 1701-1773. Yarrow Mamout one of the Muslims who bought his freedom had his portrait painted by renowned American artist Charles William Peale, and it is kept at Philadelphia Museum art. In 1831, Omar Ibn said who was an educated native of West Africa managed to write the only well-known American slave descriptio n in Arabic. In 1939 Sayyid Said, the ruler of the Oman ordered his ships to set sail to American on a trade mission, and this marked the point of Muslims friendly relationship with America. In 1854, the Ottoman Empire sent a gift to be included in the Washington Monument. In 1857 Bilali Mohammad, a slave on Sapelo Island, Geogia, managed to write the first and the lone existing book on Islamic Law printed in America and this book was called Bilali document.The first documented Muslim cemetery called the Ross has tombstones dating from 1882.

Saturday, August 24, 2019

Engineering Technology and Society Essay Example | Topics and Well Written Essays - 2000 words

Engineering Technology and Society - Essay Example In these days, container designs for medications are a result of two disciplines: graphics and engineering, combined together to create better solutions for medication efficacy while these are kept. Innovations include contours with bump outs for easy patient grip when opening these containers, or removable rings for colour code prescriptions (Hafferty, 2010). Or, added ease with pliable ergonomic stoppers apart from utilisation considerations to protect product quality during shipment and in storage. Functionality involves structure, user friendliness in the simple dispensing of a dosage without need for assistance (Butchli, 2010); specialized packaging to unit-dose (Weeren et al 2002), labelling regulatory texts and standard brand imagery (Butchli, 2010). Given the broadness of available technologies, pharmaceutical containers sit a critical concern because efficacy directly affects health, impacts on brand differentiation and competitor edge. Containers protect against environmental factors as moisture, light or oxygen in the delivery of NDSS (Novel Drug Delivery Systems or medications described as oral, nasal, pulmonary, transdermal or needle free). The Institute for International Research has carried out several presentations on the relevance of a combined approach of scientific and business sense, and a marked cooperation between graphics and engineering to reach stability and shelf life (Weeren et al 2002). Resistance to various physical or chemical reactions and contamination is the aspect of a drug known as stability. Typically, it is assumed that medications kept in closed containers remain unchanged within its shelf life. The rate of change or degradation is expressed in terms of, drug A which degrades by hydrolysis to degradant B thus A + H2O B Or reduction in the concentration of A with time is the same as the rate constant of the

Friday, August 23, 2019

UK retail sector during financial crisis Dissertation

UK retail sector during financial crisis - Dissertation Example The data are used in an extensive review of literature and as comprehensive resources that informed the analysis and the discussion of the study. While the findings are not definitive, this study's investigation was able to provide suggestive details supporting the positive relationship between the UK protectionist measures and the performance or the survival of the retail sector after the crisis struck British shores. The impact of the financial crisis especially on the future developments and trends in the UK retail sector was also identified. This was based on the expected response on the part of the policy networks and the industry decision makers. Several problems were also cited both on the part of the government and its policies; and, on the side of the retail industry. The study was able to propose possible solutions and modifications to existing policy attitudes towards the retail sector based on t he lessons learned from the financial crisis experience. INTRODUCTION The ret ail sector is an important component of the United Kingdom’s economy. A prominent part of the industry is the British Petroleum, ranked second in the European continent and the biggest industrial incorporation in the UK. The sector also include the vibrant mechanical engineering and manufacturing sectors, which are both important in the British export output (Hiles, 2010, p.39-46) Then, there is the financial institutions such as investment firms and the banking institutions, which serves one-tent of the global financial requirements. The aggregate turnover of the entire retail sector accounts for a significant portion of the country’s gross domestic product (GDP). The sector ranks fourth in the global trade market. It is a leading player in the European Union and that it is one of the largest industries in the whole of Britain. It is not surprising, hence, when the British government provides it with special protective measures because any instability can result to a crippling effect to the entire economy (HM Treasury, 2009, p.23-25). This is particularly highlighted during the series of financial crises that hit the world in the past decade. For instance, when the 2008 financial crisis that originated in America spilled over across the globe, the British consumption experienced some disturbance. The retail sector was hit as the economy immediately contracted by 0.5 percent (UK Parliament, 2009, p.139). The consumer attitude and purchase behavior showed signs of dampening, which can affect the sector in the next few years or so. In a recent survey by Data Monitor, it was found that 90 percent of the British consumers believe that the country is in recession and that 47 percent reported a worsening of personal financial situation (Market Watch, 2009, p.73). The report found that majority of the consumers is in the process of making changes to their lives and purchasing behavior and that previous purchasing patterns can only be maintained

Thursday, August 22, 2019

Mandatory Assessment is not the Same as Mandatory Mediation, but Both Essay

Mandatory Assessment is not the Same as Mandatory Mediation, but Both Concepts Undermine the Family Mediation Process - Essay Example In family law, mandatory mediation can be defined as a situation whereby couples are instructed by a court to resolve a dispute by attending meetings with a mediator..The essence of the meetings is to help couple to reach a compromise deal on the disputed issue. Court mandated mediation is envisaged to be a facilitated negotiation by the aggrieved parties through a mediator to unravel the underlying issues and possibly reach a fair settlement. In the United Kingdom, mandatory mediation can either be categorical or discretionary. Categorical mandatory mediation refers to cases whereby statutes provide that certain cases must undergo Alternative Dispute Resolution while discretionary mediation refers to cases where the presiding judge decides the cases the should undergo mediation. On the other hand, mandatory assessment is the continuous process of gathering information from various sources to help evaluate the most appropriate strategies for achieving the well being of the child and safety. The process of mandatory assessment involves a court appointed assessor who is required to work with the concerned family to assess the conditions on the ground. The assessor can also seek information from other sources deemed necessary and after the evaluation, the final report given to the court is critical in reaching the final judgment. Although mandatory assessment and mandatory mediation are different, both are compulsory dispute resolution modes aided by a third party. The report analyzes the impacts of the mandatory assessment and mandatory mediation in the context of family law. After evaluation of these effects, it is clear that these processes undermine the family mediation process instead of helping in the dispute resolution. Particularly, these concepts go against the fundamental principal of voluntary resolution of disputes and are also counterproductive especially in issues involving domestic violence. From this perspective, these mandatory processes may actua lly introduce new complications in the justice system on top of those already caused by the traditional system. Non Voluntary Nature The principal argument against mandatory assessment and mandatory mediation is that they impinge on the right to self determination. Mediation is a voluntary decision making process and every individual has the right to self determination. Hence the term â€Å"mandatory mediation† is itself oxymoronic. Coercion into mediation leads into serious reservations concerning the mediation process itself and its outcome. It has been argued that if couples are coerced into mediation, then there is a high probability that they may be coerced within the mediation itself1. She further opines that the preceding stages to mediation are a determinant of the direction that the mediation will take. Once a couple has entered into the mandatory mediation process, there is a high expectation placed upon them to reach an agreement. According to Hayes, the heavy expe ctation to reach an agreement may alter the meaning of mediation to the aggrieved parties. In the seminal cased Halsey v. Milton Keynes., [2009] EWCA 15, [2009]2, the court decided that â€Å" to oblige truly unwilling parties to refer their disputes to mediation would be to impose an unacceptable obstruction on their right of access to courts.† This court ruling shows that indeed there is a great controversy over the implementation of mandatory mediati

Industrial facility Essay Example for Free

Industrial facility Essay 1. Describe how the use of a tall smoke stack might improve air quality near a large industrial facility. 2. How can topography contribute to pollution in a city or region? 3. From where do hurricanes derive their energy? What factors tend to weaken hurricanes? Would you expect a hurricane to weaken more quickly if it moved over land or over cooler water? 4. Where is the Bermuda high located during the summer and fall? How might the path of a hurricane, moving toward the west from Africa, be affected by the Bermuda High as the hurricane approaches the United States? 5. How do you think pollutants are removed from the atmosphere? Does this occur quickly or slowly? 1: The smoke coming from a tall smoke stack doesn’t mix with the pollutants below it. When a temperature inversion comes in at night, the smoke from the tall smoke stack is above the top of the inversion and doesn’t get trapped with the air below. The air below doesn’t get polluted as it would with a much shorter smoke stack, and doesn’t affect the air quality. 2: Topography plays a major role in trapping pollutants. Cities like Denver and Los Angeles, that lie in a valley or between mountains get better temperature inversions. Cold air mixing with the polluted air sinks to the bottom of valleys and low-lying basins. The top of these inversions creates a blanket-like effect and traps the pollutants so that they mix with the cold air below. In these poorly ventilated areas winds can’t mix and carry out the cold air or polluted air. In cities like Los Angeles, mountains surround the sides of the city, but the cold air from the Pacific Ocean comes onto land and helps trap pollutants. 3: Several factors are required to create a hurricane. Hurricanes often start off as a Tropical wave from the west coast of Africa. The diverging air moves from east to west with storms behind it with the converging air. Hurricanes come from 5-20 degrees north or south of the Equator and move with the coriolis effect. These storms must have a light wind shear in the upper atmosphere, warm ocean waters (26.5 degrees celsius +), instability in the atmosphere and a trigger (like a tropical wave). They form into a cluster of rotating thunderstorms around a low pressure system and release latent heat from the waters. However, strong vertical wind shears, cold water and land will dissipate a hurricane quickly. A hurricane moving over land will weaken a hurricane  more because hurricanes need the warm moist air that it cannot get from land. 4: Through the summer and fall the Bermuda high is located in the Atlantic, close to Bermuda. Since hurricanes are attracted to the heat and high pressure, the Bermuda high creates a perfect environment for the storm to form. Since the diverging air moving west from the African coast moves in an anticyclonic motion, it moves into the area of the Bermuda high before strengthening. The east coast of the US is very likely to receive hurricanes or the strong storms from the hurricanes rain bands. Hurricanes normally move from west, to north west to northeast. 5: Pollutants can be slowly removed from the atmosphere by various methods. Growing trees naturally filter the air. There are man-made machines to do so as well. These machines filter the air using scrubbers, house filters and other methods. These can also be installed in home air conditioning systems. After the filters are cleaned, they can be easily disposed.

Wednesday, August 21, 2019

Causes And Effects Of The Current Economic Crisis Economics Essay

Causes And Effects Of The Current Economic Crisis Economics Essay Overall economy is bullish; it is not only the stock exchanges that tell  riches to rags  stories but even  small businesses. It all adds to the national exchequer. An economist is likely to give a detailed, comprehensive definition of  recession. But for the layman who has been affected knows it only one way-when he loses his job and has no money to pay his  credit and loans.  Recession  is when the consumer faces foreclosure and the banker comes knocking for his pound (or dollar) of flesh. Many companies and whole countries go bankrupt for want of liquid funds and cash flow for even daily requirements.   If you look at it from the point of view of a businessman,  recession  is a transitory phase. The Business Cycle Dating Committee of the  National Bureau of Economic Research  has another definition. It profiles the businesses that have peaked with their activity in one season and it falls naturally in the next season. It regains its original position with new products or sales and continues to expand. This revival makes the  recession  a mild phase that large companies tolerate. As the fiscal position rises, there is no reason to worry.  Recession  can last up to a year. When it happens year after year then it is serious.   Are we facing a  recession  or not? Yes, for the simple reason that not only our neighbors but our friends are unemployed. There is less of business talk and more billing worries. Transitory recessions are good for the economy, as it tends to stabilize the prices. It allows run away bullish companies to slow down and take stock. There is a saying, when its tough the tough get going. The weaker companies will not survive the brief  recession  also. Stronger companies will pull through its resources. So when is it time to worry? When you are facing a foreclosure, when the chips are down and out and creditors file cases for recovery.   Firms face closures when they go through  recession  and are not able to recover from losses. If, at this time, they are not able to sustain their prices and stocks then there is more trouble. Even when the  recession  period gets over, they will not be able to do well. If a business survives a  recession  period they should be able to survive a depression. But how many  recession  proof businesses are there? Who will eventually survive the  recession?   1. Those that have been able to save their funds.   2. Those who have not invested in fly-by-night companies.   3. Those who remain clam till the storm passes.   4. Those that take stock immediately and decide to reinvest in a  recession  proof business. GLOBAL FINANCIAL CRISIS The world is seemingly inching towards recession .Companies are going bankrupt, stock market are nose diving and more employees are being laid off while companies struggle to cut cost. Looking theng back, it seems not so long ago when economies across the globe, especially india , were going through a boom . What went wrong ,then? Here,s a quick round up of the major events that bought the current economic downturn. 2001-2005: Housing prices shoot up in the US. Bank start lending aggressively, leading to the creation of sub primary Industry. Subprime lending refers to lending at slightly higher interest rates to borrowers,who under normal circumstances would not have been eligible for the loan .Such borrowers are consider to have a less -than-ideal credit as they may have defaulted in the past or are employed or without any regular income. Banks usually, refrained from lending to such people owing to the higher default risk. However, with the rise in property prices, banks started lending to such borrowers as these loans were mortgaged against property .In case of default, the banks could recover the money by selling off the mortgaged property. 2005: The prospering housing market comes to a standstill in many parts of the US. 2006: As the prices even out, homes sales drop. February 2007: Sub -prime bubble in the US burst-more than 25 sub prime lenders either go bankrupt, incur heavy losses or are up for the sale Banks files to take into account the possibly of a fall in property prices while undertaking sub prime lending . With the hike in interest rates by the Federal bank , the sub-prime borrowers began defaulting . This prompting banks to sell off the mortgaged properties. As more banks joined this trend of selling mortgaged properties , prices of property dropped down in the U.S. August 2007 : A no of leading mortgage lenders in the us go bankrupt : March 2008 : bear Sterns crumbles September 2008 : Lehman Brothers file for bankruptcy while Merrill Lynch is sold off to Bank of America Financial markets in the us developed a new product between 2001 nd 2006 . This product was in form of a bond securitized against mortgages . Financial institutions like bear sterns, Lehman brothers and Merrill lynch lent money to mortgage banks against the mortgages, on condition that these mortgage banks would repay the money as soon as they recovered their mortgages . These lenders ,in turn sold the retail bonds to individual investors . However, as mortgages could not be honoured , banks were unable to pay the back this money to financial institutions, who in turn could not pay repay individual investors. In the entire process, Institutions like Bear Sterns, Lehman Brothers Merrill lynch and AIG got a serve blow. LEHMAN BROTHERS Lehman Brothers was founded in 1850 by two cotton brokers in Montgomery, Ala. The firm moved to New York City after the Civil War and grew into one of Wall Streets investment giants. On Sept. 14, 2008, the investment bank announced that it would file for liquidation after huge losses in the mortgage market and a loss of investor confidence crippled it and it was unable to find a buyer. Lehmans slow collapse began as the mortgage market crisis unfolded in the summer of 2007, when its stock began a steady fall from a peak of $82 a share. The fears were based on the fact that the firm was a major player in the market for subprime and prime mortgages, and that as the smallest of the major Wall Street firms, it faced a larger risk that large losses could be fatal. As the crisis deepened in 2007 and early 2008, the storied investment bank defied expectations more than once, just it had many times before, as in 1998, when it seemed to teeter after a worldwide currency crisis, only to rebound strongly. Lehman managed to avoid the fate of Bear Stearns, the other of Wall Streets small fry, which was bought by JP Morgan Chase at a bargain basement price under the threat of bankruptcy in March 2008. But by summer of 2008 the rollercoaster ride started to have more downs than ups. A series of write-offs was accompanied by new offerings to seek capital to bolster its finances. Lehman also fought a running battle with short sellers. The company accused them of spreading rumors to drive down the stocks price; Lehmans critics responded by questioning whether the firm had come clean about the true size of its losses. As time passed and losses mounted, an increasing number of investors sided with the critics. On June 9, 2008, Lehman announced a second-quarter loss of $2.8 billion, far higher than analysts had expected. The company said it would seek to raise $6 billion in fresh capital from investors. But those efforts faltered, and the situation grew more dire after the government on Sept. 8 announced a takeover of Fannie Mae and Freddie Mac. Lehmans stock plunged as the markets wondered whether the move to save those mortgage giants made it less likely that Lehman might be bailed out. On Sept. 10, the investment bank said that it would spin off a majority of its remaining commercial real estate holdings into a new public company. And it confirmed plans to sell a majority of its investment management division in a move expected to generate $3 billion. It also announced an expected loss of $3.9 billion, or $5.92 a share, in the third quarter after $5.6 billion in write-downs. By the weekend of Sept. 13-14, it was clear that it was do or die for Lehman. The Treasury had made clear that no bailout would be forthcoming. Federal officials encouraged other institutions to buy Lehman, but by the end of the weekend the two main suitors, Barclays and Bank of America, had both said no. Lehman filed for bankruptcy Sept. 15. One day later, Barclays said it would buy Lehmans United States capital markets division for $1.75 billion, a bargain price. Nomura Holdings of Japan agreed to buy many of Lehmans assets in Europe, the Middle East and Asia. Lehman also said it would sell much of its money management business, including its prized Neuberger Berman asset management unit, to Bain Capital and Hellman Friedman for $2.15 billion. Lehmans demise set off tremors throughout the financial system. The uncertainty surrounding its transactions with banks and hedge funds exacerbated a crisis of confidence. That contributed to credit markets freezing, forcing governments around the globe to take steps to try to calm panicked markets. On Oct. 5, Richard S. Fuld Jr., Lehmans chief executive, testified before a Congressional panel that while he took full responsibility for the debacle, he believed all his decisions were both prudent and and appropriate given the information at the time. EFFECT ON THE INDIAN ECONOMY Impact of global recession on India America is the most effected country due to global recession, which comes as a bad news for India. India have most outsourcing deals from the US. Even our exports to US have increased over the years. Exports for January declined by 22 per cent. RECESSIONS ARE the result of reduction in the demand of products in the global market. Recession can also be associated with falling prices known as deflation due to lack of demand of products. Again, it could be the result of inflation or a combination of increasing prices and stagnant economic growth in the west. Recession in the West, specially the United States, is a very bad news for our country. Our companies in India have most outsourcing deals from the US. Even our exports to US have increased over the years. Exports for January have declined by 22 per cent. There is a decline in the employment market due to the recession in the West. There has been a significant drop in the new hiring which is a cause of great concern for us. Some companies have laid off their employees and there have been cut in promotions, compensation and perks of the employees. Companies in the private sector and government sector are hesitant to take up new projects. And they are working on existing projects only. Projections indicate that up to one crore persons could lose their jobs in the correct fiscal ending March. The one crore figure has been compiled by Federation of Indian Export Organisations (FIEO), which says that it has carried out an intensive survey. The textile, garment and handicraft industry are worse effected. Together, they are going to lose four million jobs by April 2009, according to the FIEO survey. There has also been a decline in the tourist inflow lately. The real estate has also a problem of tight liquidity situations, where the developers are finding it hard to raise finances. IT industries, financial sectors, real estate owners, car industry, investment banking and other industries as well are confronting heavy loss due to the fall down of global economy. Federation of Indian chambers of Commerce and Industry (FICCI) found that faced with the global recession, inventories industries like garment, gems, textiles, chemicals and jewellery had cut production by 10 per cent to 50 per cent IMPACT ON DIFFERENT SECTORS 1. Impact on stock market The immediate impact of the US financial crisis has been felt when Indias stock market started falling. On 10 October, Rs. 250,000 crores was wiped out on a single day bourses of the Indias share market. The Sensex lost 1000 points on that day before regaining 200 points, an intraday loss of 200 points. This huge withdrawal from the Indias stock market was mainly by Foreign Institutional Investors (FIIs), and participatory-notes. 2. Impact on Indias trade The trade deficit is reaching at alarming proportions. Because of workers remittances, NRI deposits, FII investment and so on, the current deficit is at around $10 billion. But if the remittances dry up and FII takes flight, then we may head for another 1991 crisis like situation, if our foreign exchange reserves depletes and trade deficit keeps increasing at the present rate. Further, the foreign exchange reserves of the country has depleted by around $57 billion to $253 billion for the week ended October 31.(Sivaraman, 2008) 3.Impact on Indias export With the US and several European countries slipping under the full blown recession, Indian exports have run into difficult times, since October. Manufacturing sectors like leather, textile, gems and jewellery have been hit hard because of the slump in the demand in the US and Europe. Further India enjoys trade surplus with USA and about 15 per cent of its total export in 2006-07 was directed toward USA. Indian exports fell by 9.9 per cent in November 2008, when the impact of declining consumer demand in the US and other major global market, with negative growth for the second month, running and widening monthly trade deficit over $10 billions. Official statistics released on the first day of the New Year, showed that exports had dropped to $1.5 billion in November this fiscal year, (Sivaraman, 2008) from $12.7 billion a year ago, while imports grew by $6.1billion to $21.5 billion. 4.Impact on Indias handloom sector, jewelry export and tourism Again reduction in demand in the OECD countries affected the Indian gems and jewellery industry, handloom and tourism sectors. Around 50,000 artisans employed in jewellery industry have lost their jobs as a result of the global economic meltdown. Further, the crisis had affected the Rs. 3000 crores handloom industry and volume of handloom exports dropped by 4.6 per cent in 2007-08, creating widespread unemployment in this sector (Chandran, 2008). With the global economy still experiencing the meltdown, Indian tourism sector is badly affected as the number of tourist flowing from Europe and USA has decreased sharply. 5.Exchange rate depreciation With the outflow of FIIs, Indias rupee depreciated approximately by 20 per cent against US dollar and stood at Rs. 49 per dollar at some point, creating panic among the importers. 6.IT-BPO sector The overall Indian IT-BPO revenue aggregate is expected to grow by over 33 per cent and reach $64 billion by the end of current fiscal year (FY200). Over the same period, direct employment to reach nearly 2 million, an increase of about 375000 professionals over the previous year. IT sectors derives about 75 per cent of their revenues from US and IT-ITES (Information Technology Enabled Services) contributes about 5.5 per cent towards Indias total export. So the meltdown in the US will definitely impact IT sector. Further, if Fortune 500 hundred companies slash their IT budgets, Indian firms could adversely be affected. 7.FII and FDI The contagious financial meltdown eroded a large chunk of money from the Indian stock market, which will definitely impact the Indian corporate sector. However, the money eroded will hardly influence the performance real sector in India. Due to global recession, FIIs made withdrawal of $5.5 billion, whereas the inflow of foreign direct investment (FDI) doubled from $7.5biilion in 2007-08 to $19.3 billion in 2008 (April-September). Conclusion From the above argument it can be noted down that the Financial or Subprime Crisis was the shear consequences of greed and to make too much profit on the part of Wall Street Firms and Investment Banks. This crisis also shows the failure of capitalist market economy. Though the Indian economy would be able to withstand the crisis without any major difficulty, but the crisis is still causing mayhem all over the world.

Tuesday, August 20, 2019

Subcortex Diencephalon lesions from the view of the Neurologist and the Neurosurgeon :: Medical Medicine Essays

Subcortex Diencephalon lesions from the view of the Neurologist and the Neurosurgeon The diencephalon, which includes the thalamus, hypothalamus, and subthalamus of the brain will be discussed in this project paper however, the main focus will by on the hypothalamus of the diencephalon structure. To begin a brief review of the functions of the thalamus and hypothalamus, the thalamus is the input center for sensory information and the output center for motor information. The hypothalamus regulates hunger, thirst, and the body’s temperature. The hypothalamus also releases hormones and plays a role in sexual responses and behaviors, and our circadian rhythms (Campbell, 1999). The hypothalamus can be affected in many ways from genetics/hormones to injury from a lesion or accident. If a female fetus is exposed to too much testosterone during their critical period the hypothalamus can become masculinized which would lean create masculine behaviors in the female. Those fetuses that are male but are androgen insensitive have femininized hypothalamuses and portray feminine behaviors (Kalat, 2004). Damage such as a lesion to the lateral hypothalamus can cause an individual to refuse food and/or water depending on where the lesion is located. The opposite of true of damage occurs in the medial hypothalamus, the individual will over eat or drink (Kalat, 2004). The Neurologist The neurologist can perform many experiments on the hypothalamus by placing electrodes on the different parts, which simulates what could happen to the individual if this portion of the hypothalamus became injured. Studies have shown that the hypothalamus control functions such as mating, urination and defecation, eating and drinking, temperature regulation (through homeostasis), and circadian rhythms (Farr, 2002). The anterior portion of the hypothalamus is involved in copulation however; the septal region is also involved. When electrical stimulation is directed to this area the individual will experiences sexual emotions and thoughts. A study was done on cats where electrical stimulation on the anterior portion of the hypothalamus was done thus showing that the cat acted as though it was going to urinate or defecate along with the other processes such as hiding/covering the feces (Farr, 2002). One of the most important functions of the hypothalamus is in the lateral and ventromedial regions, these areas in the hypothalamus control eating and drinking. If a lesion in the lateral region of the hypothalamus is created experimentally or damage is done to

Monday, August 19, 2019

Beauty Behind The Brushstrokes Essay -- China Culture Art Papers

Beauty Behind The Brushstrokes Chinese calligraphy, the ancient Chinese art of writing, has been around for as long as the history of China. Through thousand of years of evolution, many styles and forms have been developed and established, namely the zhuan, li, kai, xing and cao styles (shu). Different styles express different personalities and are used for different purposes and at different times. But the underlying beauty of Chinese calligraphy, regardless of its style, lies in its expression of thoughts and feelings of the calligrapher and ultimately, the spontaneous response from the viewer's mind. However, these styles, with different degrees of variation in forms, possess varied levels of expressiveness. The different level of expressiveness lies in the varaition of forms and the degree of variation. Zhuan shu and li shu are mainly for official writings and zhuan shu is the precedent of li shu. Li shu follows a certain strict prescription with minimal variations in the writings, and hence it is not very capable of expressing the thoughts and feelings of the calligrapher. However it is not until the materialization of li shu that this ancient form of writing can be considered as an art form with the capability of expressing ones feelings and thoughts, due to its flexibility and indefinite forms. Kai shu evolves from these two precedents and is the most commonly used style today due to its regular forms and legibility. However due to its slightly stricter prescription, it allows fewer variations and hence is less capable of exuding the calligraphers emotions and personalities. But with an injection of "motion" or flow in kai shu, the words become more fluid and indefinite. Such style i s named xing shu, which is more ... ...of thoughts and feelings, which are all merely preludes, lies the climax of the symphony of Chinese brushstrokes- the silent dialogue between human minds and their surroundings. Works Cited S.H Khoo and Nancy L. Penrose. Behind the Brushstrokes: Tales from Chines Calligraphy. Singapore: Graham Brash Pte Ltd, 1993. Jean Francoise Billeter. The Chinese Art of Writing. New York: Rizzoli International Publication, Inc, 1990. A.H Maslow. Towards a Psychology of Being. New York: John Wiley and Sons, 1968. Sartre, Jean-Paul. "Why Write?" In Critical Theory Since Plato ed. Hazard Adams. New York: Harcourt Brace Jovanovich, Publishers, 1971. Best, David. The Rationality of Feeling: Understanding the Arts in Education. London: The Falmer Press, 1992. Abstracted Works of calligraphy Chiang Yee. Chinese Calligraphy. Singapore: Graham Brash, 1938

Sunday, August 18, 2019

Automobiles Essay -- Essays Papers Cars Driving Environment

Automobiles The invention of the automobile in the early 20th century has had an adverse affect on our environment. Our society has used technology in order to advance the automobile to make it better and more efficient. The automobile industry knows what sells and they take advantage of that. With this growing technology to advance automobiles also comes flaws. The biggest and most obvious flaw is pollution. Because of pollution, we find ourselves asking the question of whether this technology has helped our society more than it has hurt it. Automobiles are the cause of 60 percent of our air pollution today (Dewees 214). There are four main sources in which pollution comes from an automobile. The first, on a hot day the sun will heat the gas tank of the car, this in turn causes vapors from the gasoline to leak from the fuel tank. Second, when the car is simply running the engine becomes hot and causes the engine and exhaust system to release gasoline vapors. Third, after a car is turned off and parked, gasoline vapors continue to be emitted because the engine is still hot from running. And lastly, when you go to the gas station to refill your gas tank vapors are forced out of the tank into the air. Before we look at some alternative process' to help reduce or eliminate automobile pollution, we should try to understand how this occurs. This form of pollution is a direct result of the combustion process, also known as exhaust, and from fuel being evaporated into the atmosphere. The next step is to get a better understanding of the combustion process. The gasoline that we use to put into our cars are made of a mixture of hydrocarbons, hydrogen and carbon atoms. When we put the gasoline into our car, what is supposed ... ...s, an alternative solution needs to be made. We need to stop looking at cost efficiency in this matter and decide what is more important, a healthy world to live in or a cheap way to drive. WORKS CITED "Alternatively Fueled Vehicles." Environmental Health Center. http://www.nsc.org/EHC/mobile/alternat.htm (10 Oct.2000). "Automobile Emissions: An Overview." http://www.epa.gov/OMSWWW/05-autos.htm (10 Oct.2000). "Car Exhaust-Health Effects." Enviromned. Research. http://www.nutramed.com/environment/carsepa.htm (12 Oct.2000). "City Life: Fixing the Car." Crawford Systems. http://www.carfree.com/lif_fxcar_qz.html (8 Oct.2000) "Exhaustion: A guide to Transportation Emissions." Environment Canada. http://www.ec.gc.ca/emission/l-le.html (14 Oct.2000). "Motor Vehicles and the 1990 Clean Air Act." htpp://www.epa.gov/omswww/11-vehs.htm (15 Oct.2000)

Saturday, August 17, 2019

American Dream – American Beauty & Of Mice and Men

Although the roots of the American Dream are founded on opportunity for all, it has become an inaccessible illusion for most. John Steinbeck’s novella â€Å"Of mice and men† explores the fragility of this concept in a more modern context. Whereas Sam Mendez’s film â€Å"American Beauty† uses black comedy to highlight the allusive nature of the American dream that has become perverted by an affiant society. Both of these texts expose a reality that reveals the isolation and loneliness experienced from pursuing American dream. George and Lenny both shared â€Å"The American Dream† of owning their own small farm house. However they too were unable to grasp the reality when their dream became crushed by society’s expectations. ‘Some day – we’re gonna get the jack together and we’re gonna have a little house and a couple of acres an’ a cow and some pigs and –‘, George and Lenny constantly repeats this phrase continuously throughout the novella, as their personal ambition and aim. It was this specific phrase that allowed our two protagonists to differentiate from others, it gave our protagonists hope as they were unique from all other farm workers ‘Guys like us, that work on ranches are the loneliest guys in the world. They got no family. They don’t belong no place. They come to a ranch an’ work up a stake and then they go inta town and blow their stake, and the first thing you know they’re poundin’ their tail on some other ranch’. Knowing that they were different from all other farm workers they motivated themselves to believe that they were able to obtain what others could not, as they were different from everyone else ‘They ain’t got nothing to look ahead to’ †¦ ‘But not us! ’ An’ why? Because †¦ Because I got you to look after me, and you got me to look after you, and that’s why’. Our two protagonists can closely compared with the mouse in Robert Burns Poem â€Å"To a Mouse†. The mouse within Burns poems lived on a farm very similar to Lennie and George. Through hard work the mouse creates a home, which was ultimately destroyed by the farmer. The rodents that Lennie often carried around symbolises how fragile they really were, being crushed by Lennie’s petting. The American Dream was supposedly founded on the belief that it was a dream for all and that everyone had an equal chance. However Steinbeck’s choice of emphasizing both the fragility and the selective nature of the American Dream crushes Lenny and George indefinitely. Steinbeck highlights the allusive nature of the American dream by using alienated and lonely characters who are shown to be unable to fulfil their dream. Crooks is a black man who was shunned from society merely because of his colour and race. Unable to belong with the rest of the other characters, he is often shown alone. When Lennie first confronts Crooks, Crook turned his vulnerability against Lennie and lied about George never returning, suggesting that George will never return. He plays a cruel game with Lennie, suggesting to him that George is gone for good. Only when Lennie threatens him with physical violence does he relent. Crooks exhibits the corrosive effects that loneliness can have on a person; his character evokes sympathy as the origins of his cruel behavior are made evident. Perhaps what Crooks wants more than anything else is a sense of belonging—to enjoy simple pleasures such as the right to enter the bunkhouse or to play cards with the other men. This desire would explain why, even though he has reason to doubt George and Lennie’s talk about the farm that they want to own, Crooks cannot help but ask if there might be room for him to come along and hoe in the garden. Similarly, Curly’s wife also had an ambition to be a movie star and famous. Near the start of the novella, Curly’s wife was shown to be a â€Å"tramp† or â€Å"tart†, however as the novella progresses, her lust for attention grows. This desire is shown by her confrontation with other men, even though Curly had told her not to. The lack of attention that the other characters and the story gave her is further emphasised by Steinbeck’s decision of disallowing her a name. Curly wife’s is also another character that demonstrated loneliness, however, unlike other characters, she had little significance. Similarly Sam Mendez also produces unique individuals within â€Å"American Beauty†, each having their own dreams and ambitions, to demonstrate the allusion that the American dream is for everyone. The Burnham’s in particular were bitter and confined even though they were shown to have â€Å"Everything†: a house, a car, a family. Even though the Burnhams had the depicted everything, they did not appear to be content with their life. Lester Burnham, the protagonist, has been slowly deteriorating from the typical patriarchal household. Lester is often showed to be confined within himself shut of from other characters. During the first office scene, Lester’s reflection upon the computer is shown behind green bars of text. Even Lester himself admits that he loser living the same boring life every day. At the beginning of the movie Lester starts of narrating, â€Å"In a way I’m dead already†. During the first dinner scene after Lester walks into the kitchen, Lester tells Jane â€Å"Sometimes Jane you don’t have to wait for me to come to you. You can come to me† however Jane’s response was different from the typical families creating a sunse of unrealistic expectation of what a family should be. When Lester is in the shower, he is also confined within the small shower cubicle. It wasn’t until Lester reverted back to the consumption of pot that he starts challenging everyone, breaking away from the accumulating confinement. At this point Lester breaks away from the facade that he was unworthy, gaining independence. Caroline on the other hand is taken in by the desire for success. Even though Caroline had everything that the American dream states, she continues to long for more. This shows how the American Dream is continuously filled with wants and desires. When Lester and Caroline were alone in the living room Caroline gets distracted by Lester nearly spilling beer on the coach. Lester tells her â€Å"This isn’t life. This is just stuff. And this stuff has become more important to you than living. † Both Mendez and Steinbeck imply through their texts that The American Dream is merely a facade and an allusion that anyone can obtain. However, the selective nature of the dream restricts various people from pursuing this happiness.

Friday, August 16, 2019

Importance of Sports and Games

Education without activities is always incomplete. A child may mug up the history textbook, but for how long? May be until the last bell of exams but if it gets a bit of interactive touch, then the same student may have such a memorization and understanding that he will not only just forget it ever in his life but also implement it in his life with an equal degree of effectiveness. The clear-cut inference is this that if the education is the car then sports and activities are the keys to drive on towards the success! Yesterday I read a newspaper report which showed the tendency oildren to remain away from all sorts of physical activities.I felt really sorry to hear this. Friends if you think that if Newton had just studied days and nights to bring to the world his greatest achievement. Importance Of Sports The importance of sports in the life of a young student is invaluable and goes much further than the basic answer that â€Å"it keeps kids off the streets. † It does in fact keep kids off the streets, but it also instills lessons that are essential in the life of a student athlete. Sports play a pivotal role in the makeup of a young athlete, especially in the middle school to high school years where student athletes are much more mature and mentally developed.Where else can a young, impressionable youth learn values like discipline, responsibility, self confidence, sacrifice, and accountability? Television, which may be the most influential tool in the lives of young adults, does not show enough of these qualities, nor is it on the Internet, or radio. Rather it is up to the parents, teachers, sports teams, clubs, and after school programs to help mold, develop, and instill these qualities into the lives of student athletes.

Network Security Analysis Essay

This article is concerned about network security. It mentions about the present situation of network security and an analysis of the reason that lead to unsafe network environment. Then the article introduces two frequently used protocols in network security: HTTP (Hypertext Transport Protocol) and HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), then compare them and give a brief conclusion. On the other side, the article introduces how firewall protects network security in hardware aspects. Keywords: Network; Security; Analysis; Countermeasures 1. Introduction As technology develops, network is getting more and more mature. It is known to all that security is the second step after that a successful network has been deployed. 1.1 Situation of Computer Network Security With the rapid development of the Internet and the widespread application, the number of computer viruses, Trojan horses is explosive growth. According to Jinshan drug gangsters â€Å"cloud security† center monitoring statistics show that in 2008, Jinshan drug gangsters were intercepted more and more new viruses, Trojans, which grew up 40% compared with 2007. The center statistics also show that 90% of the virus infected users, this attachment web pages that humans are enjoying the network information with the great wealth and convenient at the same time, also be the severe beset by problems of network information security. The lure of wealth that hackers attack is no longer a kind of personal interest, but more and more become an organized, interest driven career crime. Its main means has: online professor viruses, Trojan horses production technology and various network attack technology; Online exchange, trafficking and rental viruses, Trojan horses, zombie network; Online customized viruses, Trojan horses; Internet theft behavior (account Numbers game, bank accounts, QQ number, etc.), sell the trumpets; Internet fraud and extortion; Through the network business platform money laundering profit, etc. Attackers need technical level gradually decrease, means more flexible, joint attacks increase rapidly. Trojan viruses, Trojan virus writers, professional hack personnel, sales channels, professional players have been formed complete gray industrial chain. 1.2 Threats to Computer Network Security The threat to computer network security includes attacks by hackers and computer virus. It mostly presents in the following aspects. Firstly, send fake E-mails to users. It is a common way to cheat the account and password by posing as legitimate websites. Secondly, damage caused by viruses is also a common phenomenon. For e.g. when virus gets into computer, it will cover our hard disk with useless data. Thirdly, it’s about unauthorized accessing. This mainly refers to the normal use or oversteps their authority to use the network equipment and information resources. Fourthly, damage the integrity of the database. Fifthly, interfere with the normal running of the systems. Finally, communication lines are tapped and people are not familiar about safety of network security. The first situation doesn’t occur in common. However, awareness of maintain computer network security is really important. In the article, it mainly analyzes several common situations and introduces what the threat is and how it works. 1.3 Countermeasures of Network Security As network security has a lot of loopholes, people create a lot of methods to protect network. On the side of hardware, people begin to use firewall to protect network. On the side of software, a lot of tools and technologies have been used in this area, such as router filtering. The article introduces how firewall works and two similar protocols: HTTP and HTTPS. By comparing these two protocols, we will find the development of technology. 1.4 Importance of the Study of Network Security It’s important for securing ones computer, keeping important data and profile information protected. Careful web surfing habits may keep you from being a victim of virus attacks and malware, however this is an intensely risky activity and very often people may end up with an infected computer. Some good anti-virus programs will help to keep your computer protected and safe, but users must remember to keep this updated regularly for better protection over new viruses. 2. Related Work 2.1 Network Security Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and over seeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. 2.2 ISO/OSI model The International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model defines seven layers of communications types, and the interfaces among them. (See Figure 1.) Each layer depends on the services provided by the layer below it, all the way down to the physical network hardware, such as the computer’s network interface card, and the wires that connect the cards together. People develop a lot of protocols to each layer. Such as PPTP/L2TP to linked layer, IPSEC to network layer, TLS/SSL to transfer layer. Each protocol includes security information that helps network transfer safer and safer. 2.3 IPV4 protocol The protocol contains a couple aspects which caused problems with its use. These problems do not all relate to security. They are mentioned to gain a comprehensive understanding of the internet protocol and its shortcomings. The causes of problems with the protocol are: 1. Address Space 2. Routing 3. Configuration 4. Security 5. Quality of Service The lack of embedded security within the IPv4 protocol has led to the many attacks seen today. Mechanisms to secure IPv4 do exist, but there are no requirements for their use. IPsec is a specific mechanism used to secure the protocol. IPsec secures the packet payloads by means of cryptography. IPsec provides the services of confidentiality, integrity, and authentication. This form of protection does not account for the skilled hacker who may be able to break the encryption method and obtain the key. 2.4 Types and Sources of Network Threats Denial-of-Service, unauthorized access, executing commands illicitly, confidentiality breaches and destructive behavior are common type of threats to network security. The sources of network threats include 3 aspects. Firstly, the invasion of bad information and pollution. Network is open, even borderless space information network of people in the rich cultural life, but also to the illegal dissemination of information or indecent information provided soil British Middlebury Seck Griffith University, Professor Di Mulai study found that in non-academic information on the Internet, 47% of pornography on These content without restriction for people feel free to browse, not only seriously jeopardize the health of young people, and poison the social atmosphere and hinder the building of a harmonious society in China. In addition, the network’s openness and freedom are often some criminals use, or dissemination of endangering national security, to subvert the government, disrupting social order and security of information, or information network organizing rallies and other anti-social activities. Secondly, Internet ‘hackers’ and computer crime. Hacker wanton rampage information networks, technology and the consequences of its invasion of escalating their use of technical means, or attacks on government sites or military organization’s Web site and endanger national security interests, undermine government image; or steal business, financial institutions, business information to profit illegally, endangering the economic order; or steal personal confidential information, violation of privacy or stolen cash. These acts seriously impede the normal operation of information networks. In addition to outside hackers the use of the Internet, the rampant crime and tort. The use of computer information network system to implement theft, fraud or corruption, embezzlement and other crimes than the traditional criminal methods and tools more subtle complexity, and violation of trade secrets with the network, electronic communications freedoms, civil Privacy and damage the reputation of others and other events are also frequent. Online pyramid schemes, online fraud, etc. These crimes have been on the network posed a serious threat to network security. Thirdly, the existence of their own network security vulnerabilities and risks. Freedom to share and open spirit of the Internet, but also the charm of the Internet The Internet is based on TCP / IP protocol, network devices, operating systems with networking capabilities and openness about the existence inherent vulnerability In addition, the software in the design, it is inevitable there are some defects or flaws, which has become a prime target for hackers, while software programmers deliberately left the ‘back door’ has become a major network security risks network These weaknesses of their own existence, to bring the work of anti-hacker considerable difficulty: on the one hand difficult for scientists to develop a common and effective network security for the protection of technical means on the other hand the lack of implementation of these measures sufficient to protect the social environment. 3. Methods 3.1 Analysis of Network Security System and network technology is a key technology for a wide variety of applications. Security is crucial to networks and applications. Although, network security is a critical requirement in emerging networks, there is a significant lack of security methods that can be easily implemented. There exists a â€Å"communication gap† between the developers of security technology and developers of networks. Network design is a well-developed process that is based on the Open Systems Interface (OSI) model. The OSI model has several advantages when designing networks. It offers modularity, flexibility, ease-of-use, and standardization of protocols. The protocols of different layers can be easily combined to create stacks which allow modular development. The implementation of individual layers can be changed later without making other adjustments, allowing flexibility in development. In contrast to network design, secure network design is not a well-developed process. There isn’t a methodology to manage the complexity of security requirements. Secure network design does not contain the same advantages as network design. When considering network security, it must be emphasized that the whole network is secure. Network security does not only concern the security in the computers at each end of the communication chain. When transmitting data the communication channel should not be vulnerable to attack. A possible hacker could target the communication channel, obtain the data, decrypt it and re-insert a false message. Securing the network is just as important as securing the computers and encrypting the message. When developing a secure network, the following need to be considered: 1. Access – authorized users are provided the means to communicate to and from a particular network. 2. Confidentiality – Information in the network remains private. 3. Authentication – Ensure the users of the network are who they say they are 4. Integrity – Ensure the message has not been modified in transit 5. Non-repudiation – Ensure the user does not refute that he used the network Here we mainly discuss fake websites. Fake websites means phishing. Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL. An attacker can even use flaws in a trusted website’s own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service’s own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, making it very difficult to spot without specialist knowledge. Just such a flaw was used in 2006 against PayPal. A Universal Man-in-the-middle (MITM) Phishing Kit, discovered in 2007, provides a simple-to-use interface that allows a phisher to convincingly reproduce websites and capture log-in details entered at the fake site. To avoid anti-phishing techniques that scan websites for phishing-related text, phishers have begun to use Flash-based websites. These look much like the real website, but hide the text in a multimedia object. 3.2 Firewall’s Protection A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network’s firewall builds a brigade between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. In general, some functions that can be done by the firewall are: 1. Doing a packet filter firewall can make the decision whether to accept or reject the incoming data packets. 2. Hiding Network Address (NAT) IP addresses can be used on the internet is a public IP. So to create a client that uses private IP can be translated into public IP. These functions are performed by a firewall, known as NAT. 3. Monitoring and Logging to improve network security and logging on the terms monitoring by a firewall. 3.3 Protocols of Network Security Network security protocols are used to protect computer data and communication in transit. The primary tool used to protect information as it travels across a network is cryptography. Cryptography uses algorithms to encrypt data so that it is not readable by unauthorized users. Generally, cryptography works with a set of procedures or protocols that manage the exchange of data between devices and networks. Together, these cryptographic protocols enhance secure data transfer. Without cryptographic network security protocols, Internet functions such as e-commerce would not be possible. Secure communication is necessary because attackers try to eavesdrop on communications, modify messages in transit, and hijack exchanges between systems. Some of the tasks networks security protocols are commonly used to protect are file transfers, Web communication, and Virtual Private Networks (VPN). The most common method of transferring files is using File Transfer Protocol (FTP). A problem with FTP is that the files are sent in clear text, meaning that they are sent unencrypted and therefore able to be compromised. For example, many webmasters update their sites using FTP; an attacker using a packet sniffer and the website’s IP address can intercept all communications between the webmaster and the site’s server. Here we mainly discuss two similar protocols: HTTP and HTTPS. The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is a multi-linear set of objects, building a network by using logical links (the so called hyperlinks) between the nodes (e.g. text or words). HTTP is the protocol to exchange or transfer hypertext. The standards development of HTTP was coordinated by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for Comments (RFCs), most notably RFC 2616 (June 1999), which defines HTTP/1.1, the version of HTTP in common use. Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with the SSL/TLS protocol. It provides encrypted communication to prevent eavesdropping and to securely identify the web server with which you are actually communicating. Historically, HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and for sensitive transactions in corporate information systems. In the late 2000s and early 2010s, HTTPS began to see widespread use for protecting page authenticity on all types of websites, securing accounts and keeping user communications, identity and browsing history private.

Thursday, August 15, 2019

Biometrics Identification Attendance Monitoring System Essay

Technology plays an important role in our society because of modernization. One that makes the daily activities of organizations more convenient is the use of technology. The internet that is really abundant today for handling information, web-based applications are some example of this and Information Technology (IT) is a big help to many companies. To resolve the problems encountered in the daily processes as well as to make their company effective and competitive. â€Å"Business Analytics† is a continuous iterative exploration that refers to the technology, application, processes and a fact based management to driven decision making. Philippine Auto Components, Inc. was established in the Philippines in 1995. The company is a part of DENSO Corporation Japan, which is the leading company in automotive technology components in the world. The products are car air-conditioning and heating systems, electrical automotive and electronic control products, filters, fuel management systems, instrument panel clusters and radiators. PAC is certified as ISO 14001 in August 1998 for it regards the preservation of natural resources and international and environmental standard. The company have the mission to contribute to the better world by creating value together with a vision for future. It’s Vision to become the top design engineering who totally develop Electronic automobile technology. Its philosophy, such as Customer satisfaction to quality products and services, Global Growth through anticipation of change, Environmental Preservation and harmony with society and Corporate vitality and respect for individuality. The organization works the spirit of having teamwork, as One for All, All for One†. The policy in the manufacturing as 3M- Minimum space, stock, investment; 3N- No defect received, produced, delivered; 3S- speed, simple, s. o. p and 3Z- Zero emission, variance, accident. The principles of HR to their employees to motivate them to work with encouragement by fully concentrating with their capabilities, to recruit, assign, retain, and develop competitive workers with creative power and fair HR management policies to gain for DENSO recognition in both community and associates. Since they expanded last year, they will focus on recruitment of new employees and maintaining the performances of their current workers. Because of this they exceed more time and focus for the HR Personnel to generate reports about the employees, the applicants as well as the supervisors. In the recruitment process, there are applicants that will have an exam once they submitted their resume in the company; applicant wait hours while screening of their resume which is checked by HR Personnel. Applicants who passed the exam will be informed through phone for scheduled interview and requirements. Usually applicants wait months with the result. When an employee requests a sick leave, he/she is required to fill up explanatory form. Before request leave acceptance, he is required to submit medical certification for the updating signed by concerned Officers for HR archiving and verification. Ailing personnel is considered unfit to work. Meanwhile, the supervisors have several tasks to accomplish also and the top priority is the work for the flow of the production. They should go to the designation area of the supervisors and employees to update records correcting inconsistencies accomplishing this with given deadline. HR has other reports to be done apart from this. Through cooperation and time management the process with the HR, it should be easier for them to handle. We focused our study on the HR department about their current process in the recruitment, evaluation and filling leave by the employees as well as the reports for the HR. The researchers want to contribute to the improvement of the processes through this study. The Philippine Auto Components, Inc. is one of the companies that want improvement, in their office because they encountered inconveniency. The main objective of the study is to develop efficiently the current process of Human resources of Philippine Auto Component, Inc. Specifically, the study aims to achieve the following: 1. To determine the problem with regards to data rendering of Human Resources. 2. To determine the issues with regards to generating reports of Employees Information. 3. To address accurately the information for the Human Resources related decision. 4. To speed up the process of monitoring the records in recruitment, job evaluation and performance, leave request and employees’ information. 5. To provide a system that can be effective, accurate, reliable, user friendly and secure. 6. To improve the reports and employees information being mishandled that leads to the lost of data and errors in records. Conceptual Framework The researchers used a paradigm structure to support the fundamental principles of the study. A paradigm is a pattern or a model that corresponds to the real world of processes on what the researchers have gathered. It guides the development of the study regarding what the proponents want to improve for the satisfaction among the persons involved in this study. The figure shows the paradigm that is based upon the process in the Human Resource Department or the office. The paradigm has the Input, Process and Output that will guide the researchers for the development of the automation in some HR processes. INPUTPROCESSOUTPUT Figure 1. Conceptual Framework The figure shows the process inside the HR that the information about the employee, applicants and even the supervisors are being recorded. The employees information like their leave request, their performances in their designated jobs including the personal information and which the department they belong to. The applicants’ information with the flow of recruitment and their training are also being input. The supervisors are also being evaluated by the employees. This will be processed and have an output of the reports in evaluations of three, the absence calculations and the lists of the current employees and newly hired as well as the applicants’ information and list. Significance of the Study Prior to the advent of computerization, data is processed manually. However, in the past few decades, the computer and electronic technology has been incorporated into almost every aspect of our lives. They now play a big role in the lives of people and assist them in taking care of files and documents. Today, there is probably no better indication of how technologically advance is the society than a computerization process. Nowadays, computers have become the base technology that enables the people to tap information resources as the fast growing industry of the internet. Great help will be provided for the company Philippine Auto Components, Inc. in terms of trends in Information System, thus, improving the HR functions and benefits as the delivery of services within the organization. The following are the beneficiaries: Company. The Philippine Auto Components, Inc. will benefit because they can save materials like papers and inks as part of their cost in the operation of the company, especially they can now have strategic planning to be more competitive advantages instead on focusing to the manual process that HR has. The company will remove the barrier between the branches or other department. HR Personnel. Can give less effort in the report, target deadlines are being done before the date, eliminates human errors, save time, the leave and absences made by the employees are monitored as well as the communication between the applicants and employee is more convenient. The possible loss of information is less. Supervisors. Accurate and up to date leave reporting and a real-time tracking of leave will generate the system. They are easily informed about the leave request and handling of approval and disapproval will not disturb their other work activities within the company. Employees. Can easily file a leave request without filling up many forms like explanation slip, and they can monitor and aware of their allotted leave such as sick leave and vacation leave. They can work in a fair environment. Their performances are also shown for they will be in the sense of improving their jobs and have a goal to do task well managed and be an asset to the company. Applicants. Hiring within the company is easily being known by the applicants and they will prefer online applications than traditional walk-in job hunting which is time consuming and costly. The announcement online will benefit them, for they can easily apply for what exact job they are looking for. The follow-up Interview schedule through email would be better than waiting for a phone call. Researchers. This will help the future researchers to use this as their reference in their study as well as the programming language being used. This will aid them in enriching their study and will serve as a source of their related literature. Scope and Limitation This study will focus on the HR functions in the company, Philippine Auto Components, Inc. and is intended to eliminate the common problems encountered by the current process of the organization. The information about the current employees, applicants as well as the supervisors will be input to the system. The employees can request a leave which is being approved by the supervisor with the use of the system. Employees can also monitor their allotted leave and performances in their jobs. Applicants can follow-up scheduled interviews through the notification in the HR admin who uses the system. They can also view hiring position within the company. HR can monitor the training of the newly hired employees. The information list of employees in their classification belonged to like contractual, under probationary, regular employees and on the job trainees are also being monitored. The allotted or remaining absence or leave will be monitored by the employee. The performances of employees being evaluated by the supervisor and the applicants’ information are being updated by the HR Personnel. The system offers reports like list of employees, list of applicants, leave monitoring and evaluation reports among the employees. There is a communication between the employee and the HR department and employees can also suggest some ideas to the management. The system does not cover the inventory of all the materials inside the company, cannot compute the sales of the company, do not monitor the prices of the product, cannot monitor trucking and shipping of the products and cannot make purchase order. Definition of Terms Online. A computer-related application that uses an internet connection to be access by the users of the system to communicate easier and faster among the people involved in the institution. It helps the organization to gain more competitive advantages. Company. This is the working environment that has one goal in achieving their vision in terms of business and customer services depending on their products. Organization. It is the groups of people in the company that are involved in the process of Human Resources and needed to have the full attention with regards to the data handling. I. S. Information System. System that help the current process to be more accurate, efficient, secured, user friendly and make their work and day to day operation be more convenient. HRIS. Human Resource Information System. System that develop to collect, process, store and distribute information applying to the policies and process of the Human Resource Management. HRM. Human Resource Management. It encompasses the recruitment, records, leave reports and other information that provides a safe and fair environment in the company. HR Personnel. Person who are responsible in the Human Resource in the current process. HR Department. The persons who are involved in the data reports, recruitment, evaluation and the whole Human Resource process in the company. Supervisors. The head officer of each department in the company that implement the rules and regulations of the company, communicating to the HR for the better flow of the employees’ job, be motivated and guides them for their leave request. Employees. The persons who work within the company’s premises. Applicant. The people who seek job vacancies in the company to have a work and be stable to the day to day life. Leave Request. The employees need to file when in sick, emergency, even maternity and paternity leave covered on period of the date. Computerization. It is the process of applying technology in the paper handling materials for betterment of the organizations’ tasks in the company. Paradigm. A pattern that will help the researchers to overview the covered processes of the HR on what are should be the input data and the accurate output of the system. Quantitative Data. It express the data’s certain amount or range. It makes sense to set boundary limits to such data and it is also meaningful to apply arithmetic operations to data. Quantitative research. This is a technique like surveys whose findings may be expressed numerically and can be computed through mathematical manipulation. That will help the researchers to estimate the future events or quantities. Lickert Scale. It is the way to measure the mean figure responses and evaluate a study through questionnaire using decrement value (Strongly Agree, Agree, Neither, Disagree and Strongly Disagree). Iterative Waterfall. The focus is on delivering a sprint of work as opposed to a series of valuable/shippable features.