Wednesday, July 31, 2019

Mount St. Helens

Geographic Facts and OverviewElevation: 8, 635 feet (2,550 m)Prominence: 4, 605 feet (1,404 m)Coordinates: 46 °12’00.17†N, 122 °11’21.13†WAge of rock: > 40,000 yearsEasiest access: southern slopeMount St. Helens is an active stratovolcano in Skamania County, Washington, in the Pacific Northwest region of the United States. It is located 96 miles south of the city of Seattle and 53 miles northeast of Portland, Oregon. Mount St. Helens takes its name from the British diplomat Lord St Helens, a friend of George Vancouver, who did a survey of this place in the late 1800s.The mountain can be found in the Cascade Range and is part the Cascade Volcanic Arc, a segment of the Pacific Ring of Fire that includes over 160 active volcanoes (Mount St. Helens). This volcano is quite well known for its ash explosions and pyroclastic flows. It is located 45 miles west of Mount Adams, in the western part of the Cascade Range. These volcanic mountains are each approximatel y 50 miles from Mount Rainier, the highest of Cascade volcanoes. Mount Hood, the nearest major volcanic peak in Oregon, is 60 miles (95 km) southeast of Mount St. Helens. (Mount St. Helens)Mount St. Helens is quite young compared to the other well-known Cascade volcanoes (Mount St. Helens). It only formed within the last 40,000 years, and the summit cone (before the 1980 eruption) began rising around 2000 years ago. The volcano is still considered the most active in the Cascades within the last 10,000 or so years, according to the Mount St. Helens report in Wikipedia.Mount St. Helens Eruptive HistoryThe early eruptive stages of Mount St. Helens are known as the â€Å"Ape Canyon Stage† (around 40–35,000 years ago), the â€Å"Cougar Stage† (ca. 20–18,000 years ago), and the â€Å"Swift Creek Stage† (roughly 13–8,000 years ago).The modern period, since about 2500 BC, is called the â€Å"Spirit Lake Stage†. (Mount St. Helens) Collectively , the pre-Spirit Lake Stages are known as the â€Å"ancestral stages† (Mount St. Helens).The Eruption of May 18, 1980Mount St. Helens erupts maybe around once each century. After lying asleep for 123 years, Mount St. Helens again spewed steam and ash on March 27, 1980 – a prelude that put geologists on alert. But what happened on the18th of May, 1980, went beyond what anyone had envisioned. According to Mount Saint Helens History report, a 5.1 magnitude earthquake from inside the volcano triggered the destruction of its north flank, letting down the largest landslide in recorded history and a volcanic eruption equal in power to 500 atom bombs (History). As much as a cubic mile of volcanic material shot upward and sideways.The blast traveled at more than 300 miles per hour with temperatures in excess of 600 degrees F, destroying 230 square miles of forest (History).   Within seconds, the trunks of thousands of 150-foot-tall old-growth Douglas firs snapped like toothpi cks. Ash rained down over 22,000 square miles, blew more than 12 miles into the atmosphere and circled the globe in 17 days (History).   When the ash finally cleared up, the mountain was reduced by 1,313 feet (History). Although the Forest Service and local authorities had worked hard to keep people away, 57 were killed.   Rocks, snow and ice roared down the mountain at enormous speeds (sometimes reaching more than 100 miles per hour). Most large animals on the volcano, like mountain goats, black bears, and thousands of elk and deer (even most fish, amphibians, insects and birds), died. (History)Mount St. Helens before the EruptionBefore the eruption of 1980, Mount St. Helens formed an almost perfectly conical, youthful volcano that sometimes was known as the Fuji-san of America (Eruptive History). According to Volcano World’s Eruptive History page, during the 1980 eruption, however, the upper 400 m of the summit was removed by a slope avalanche, leaving a 2 x 3.5 km hors eshoe-shaped crater now partially filled by a lava dome.The eruption of Mount St. Helens in 1980 changed the surrounding environment. Before the eruption, the areas around the mountain were known for its natural beauty. The Spirit Lake basin was said to be coated with ancient trees. The tree rings of these huge 800 year-old trees show evidence of eruptions that date back before the time of the Europeans arrival in the Americas (Biologic History).A few research sites existed before 1980 and they showed a healthy, vigorous forest, growing on the rich volcanic soils typical of the Pacific Northwest (Biologic History). Under the dense canopy, huckleberries, ferns, and mosses grew. A wide variety of animals lived here. Above Spirit Lake, the alpine meadows on the mountain were slowly being overtaken by trees (Biologic History). The alpine meadows supported a wide variety of wildflowers and gnarled trees. Mountain goats were transplanted from the Olympic Peninsula. They were well known fo r their aggressive ways.Sometimes they butted hikers right down the mountain (Biologic History). When people remember Spirit Lake, they always mention how clear it was (Biologic History). Fed by snow and glacial melt, the lake's temperature was normally below 55 degrees Fahrenheit year round (Biologic History). The many types of microscopic plants and animals that fish eat did not do well in this cold water. Because of this, the fish that were stocked never managed to become a self-sustaining population (Biologic History). Some people will tell you that Spirit Lake was overflowing with fish. However, catch records indicate that it was just average for the Northwest. Those who visited Mount St. Helens before 1980, were always impressed by its natural beauty. (Biologic History)Mount St. Helens NowAs amazingly destructive as it was, the May 18, 1980 eruption is just one of many events in the history of Mount St. Helens. Considering the 27 years and renewed volcanic activity, it is surp rising to see how Mount St. Helens continually changes. The past 27 or so years have been characterized by a rebirth.   Within the crater, a new lava dome began rising in 1986, rebuilding the mountain (History).   A new glacier has established itself on the crater floor.  Ã‚   And since early October 2004, a second lava dome has grown at a rate as high as a dump-truck load in volume every second.At this rate, scientists estimate Mount St. Helens could return to its height before the 1980 eruption of 9,677 feet in less than 200 years – less than a blink of the eye in geologic time (History). Remarkably, plant and animal life has revived itself faster than was expected. Beetles were among the earliest animals to return and over 300 kinds now flourish (History). Lupines, members of the pea family, were among the first plants to grow in the deep deposits of volcanic ash.Scientists learned that lupines drive ecological recovery by creating islands of rich nutrients that prom ote establishment of other plant species (History).   Millions of new trees and animal species have also returned to the areas that most of them left in 1980.   Mount St. Helens is back to being a living playground. According to the Mount St. Helens Institute, it has become one of the most  remarkable areas of geological and ecological disturbance and restoration in the world. This country has learned a lot from what happened 27, or so, years ago. We are now better prepared to face another eruption (to avoid the casualties of 1980), and scientists, our other learned friends in different fields of study, and the general public, are coming to experience the remarkable volcano that is Mount St. Helens.The Current EruptionsMount St. Helens came alive again in the fall of 2004 and has continually been erupting. Plenty of news crews and visitors from around the globe have surged to the volcano.   Mount St. Helens has returned to its former grandeur and is now a leading recreationa l area, with more than 500,000 visitors a year. W O R K S  Ã‚   C I T E Dâ€Å"Mount St. Helens.† Wikipedia, The Free Encyclopedia. 22 Apr 2007, 19:46 UTC. Wikimedia Foundation, Inc. 24 Apr 2007 ;https://en.wikipedia.org/w/index.php?title=Mount_St._Helens;oldid=124937639;

Tuesday, July 30, 2019

How the Hashatg trend changes TV

The coffee machine In the office used to be the place where people gathered to talk about the TV shows they had watched the night before. Nowadays watching television Isn't Just about enjoying your favorite program on the sofa. 95% of the public social conversation around Film and Television happens on Twitter and other social networks. People exchange with other fans and viewers, share their opinions and engage with each other via Twitter, Mainstream, Faceable and co.Studies have shown that especially the younger audience watches television with two eyes on the screen and a third on the smartened or computer. This â€Å"second-screen-trend† has started a new movement of advertising, targeting specifically this younger audiences and open up a whole new market of advertising on Television. Many brands have already connected their Twitter accounts with TV advertising, using washrags. This leads us to the question: How does the washrag-trend change marketing and advertising In th e TV and Media landscape?In this essay I will discuss the use of washrags as a marketing tool In the film and television Industry and how this new trend might Impact on my future career goals as a writer In the television Industry. One might catch himself asking, â€Å"What an earth is a washrag? â€Å". The washrag symbol (#) is mainly found on social networks like Twitter, Mainstream and Pinsetters and quite recently Faceable joined the circle of washrag users. A washrag symbol is used to unite specific tweets, photos, posts etc. About particular topics.It's a way of organizing or grouping those posts. Washrags can help users on Twitter and Mainstream to find topics that are similar to their own posts or interests. However, the Washrag is also a very economical but effective marketing tool. The marketers of big rims and companies can track the washrag routine of social network users undo create trends to boost their own companies. The washrag makes it possible for them to resear ch popular trends on Twitter and how many messages were sent regarding a specific washrag wealth a particular time frame.It can also be used to boost your visibility on social networks. If enough Individuals promote a washrag It will â€Å"trend† and attract more social network users. Ever since 2010 the most popular washrags at any given moment have been displayed on the front page of Twitter as â€Å"Trending Topics†. Simply put, washrags are a great way to organize Tweets, posts and photos but it is also very beneficial way of advertising a company, show or new products.Furthermore, television networks have been quick to notice the power of the washrag by displaying it in the bottom corner of the screen during a show or putting it in the end of a commercial. These types of washrags are called â€Å"branded washrags† as opposed to â€Å"organic washrags† which are started by fans or non – professional twitter users. Branded washrags can, for inst ance, serve as a tool of creating hype around an upcoming episode of a TV show, event or film and stir up a conversation between fans. Then, the washrag Is usually the name of the program or the topic that Is discussed.It seems as if the washrag had been around forever, however Twitter joined the clan quite recently in 2013. But even though the Washrag is a fairly new trend it has already completely changed the way TV shows and Films are advertised. Only a couple of years ago, a new show or a new movie would be mainly promoted by the star of the film, by attending red carpet events or making an appearance on a popular talk show to spread the word about their newest movie. Professionally made posters and trailers could be seen on television or your local bus stop.Whilst those techniques are still used, the posters or the trailers would now feature a little washrag symbol in the corner. Of course, a famous actor can still promote a new movie, but generally speaking, the marketing nowa days happens on Twitter and social networks, where fans are spreading the word of a new film or TV show by using the washrag. This has opened up a way to connect Television and social media and overall, the way of advertising has become much more interactive, meaning the audience plays a key role in the process.This is clearly visible in interactive shows, such as talk shows, live sport events or big gala events like the Golden globes or the Academy Awards. Here, the washrag is not only an active way of engaging the viewers but also a possibility to ask questions and get in touch with the makers or stars of the show. Some shows, such as â€Å"Project Runway', even give each contestant their own washrag for voting purposes. Likewise, the BBC family drama â€Å"Pretty Little Liars† gives a good example of the interactive usage of washrags between fans and the cast and rioters of the show.This might be partly due to the young age of the target audience, who are in their teens a nd mostly communicate with their friends via Faceable and Twitter. The series revolves around the mystery of a girl's disappearance and when asked, the series creator / show runner l. Marlene King hints at future story developments based on which the audience can attempt to solve the mystery. These are Just some of many shows that are successfully using the washrag for marketing purposes.For professionals working in marketing this means, in order to built a brand they will eve to create a campaign specific washrag in order to attract people on twitter to talk about their product, raise awareness and engage the target audience, as well as following current washrag trends in order to make their content relevant to trending topics. While the star of the show or film still plays an important role in the promotion process, the real marketing happens through the fans and social network users.The physical advertisement, such as posters has to big parts been replaced with the much more econ omical and at least as efficient advertisement through social networks, using washrags. This means the target audience who is spreading the word of a new show, movie or product all over the World Wide Web, became a key role in modern advertising. Therefore, the audience becomes more and more influential and even manages to reach out to big production companies and media groups. A good example for how powerful the audience's impact really is, is the NBC show â€Å"Community' which has been facing a constant threat of cancellation.In an attempt to safe the show, the show runners inserted the washrag † #Accommodativeness † at the end of the season three finale and started a campaign to safe the show. The fans picked up the washrag quickly and as NBC noticed the trending washrag and how much attention the show had been given, influential the users of social networks are if it comes to marketing, but also that washrags can be a inexpensive or even free marketing tool. This l eads me to my next point. How much does the washrag trend and the second – screen – trend influences me as an independent filmmaker and writer and how can I use the trend to my advantage?As an independent filmmaker it would be hard to run a professionally organized campaign in order to promote a new project, since there is usually no budget for advertising placements on television, posters or even professionally designed campaigns. For me, social media represents a free or affordable alternative to promote my projects. The washrag is a no budget film- marketing tool that can boost my appearance on the Internet. The more creative the washrag, the more successful the self-initiated campaign can be. Many â€Å"No Names† on Twitter have more followers than some celebrities.This proves that social media platforms such as Twitter are a great way to market your brand, film or product. Furthermore, from a writer's point of view, who would ideally like to work in televis ion, it is always useful to keep an eye on marketing trends while writing an episode. This way, the writer can already think of â€Å"washables puns† in the show or tastiness that could be used for washrag advertising, such as #Accommodativeness in Community, or even specifically create washrags for fans to interact in the Twitter community, much like in the example of Pretty Little Liars.However, all good things aside, the washrag trend also has its downside and using a washrag campaign for promotion purposes can potentially be a risky business. While it is fairly safe to say that a successful washrag campaign has the potential to raise awareness and increase online conversations, it can certainly be hard to predict the outcome. Once the washrag is out there, the marketers have no control over it and the development that the campaign might take is completely in the hands of the social media users. Some brands had to learn this lesson the hard way.When McDonald's introduced t heir washrag campaign â€Å"#Mysteries† in 2008, the campaign quickly developed a life of it's own and the designed washrag was used by Twitter users to tell their negative stories about the fast food chain. My personal favorite example of â€Å"how washrags can go wrong† is the â€Å"#Undersecretaries† washrag campaign which was created to mourn the death of Margaret Thatcher. Instead of reading the washrag â€Å"Undersecretaries† users read it as â€Å"#Undersecretaries† and as result accidentally mourned for the wrong lady.Status updates such as † R. L. P Cheer. At least now we'll find out about life after love. #Undersecretaries † amused the online community for days, but had very little to do with the actual events. In conclusion it can be said, that the development of the washrag trend within the sat seven years of its first appearance on twitter, clearly demonstrates the importance of collaboration between social networks and the television and film industry in order to successfully market a new film or TV show.The washrag trend has completely transformed the way of advertising in the TV and media landscape and given the audience a much bigger role in the advertising process. Moreover, it gives small companies or independent artists like me an opportunity to market themselves and create an online appearance to raise awareness to their films or handled carefully. In other words, marketers need to think about how washrags can be in cooperated into their media campaigns without losing the control over the narrative.

Monday, July 29, 2019

The Real World of Technology

This essay is in context to Ursula Franklin’s â€Å"Real World of Technology†. Urusla Franklin is an Author, research Physicist, Metallurgist and Educator. She was born on 16th September, 1921 in Munich, Germany. She is known for this reading, The Real World of Technology, which is based on her 1989 Massey Lectures, and The Ursula Franklin Reader: Pacifism as a Map, a collection of her papers, interviews, and talks. In this reading, the Author, Franklin has named the title â€Å"The Real World of Technology† because she wants to speak out or tell the real truth about technology.She wants spread awareness to the world regarding the ill effects of technology on humanity. If left-unchecked technology will eventually destroy society as we know it. She differentiates the use of technology in the past, what it is at present and what it will be in the future. Franklin illustrates her point by focusing on the effects technology has had on society and cultures in the past . She uses examples from China before the Common Era to the Roman Empire, with a majority of examples coming form the last one hundred and fifty years. Such as the Industrial Revolution and the invention of electronic mail.Franklin contends that for society s sake, people must question everything before accepting new technologies into their world. In the book, Franklin s argument urges people to come together and participate in public reviews and discuss or question technological practices that lead to a world that is designed for technology and not for society. The Real World Of Technology attempts to show how society is affected by every new invention that comes onto the market and supposedly makes life more easy going and hassle free while making work more productive and profitable.The lectures argue that technology has built the house in which we live and that this house is continually changing and being renovated. There is very little human activity outside of the house, and al l in habitants are affected by the design of the house, by the division of its space, by the location of its doors and walls. Franklin claims that rarely does society step outside of the house to live, when compared with generations past.The goal for leaving the house is not to enter the natural environment, because in Franklin s terms environment essentially means what is around us that constructed, manufactured, built environment that is the day-in-day-out setting of much of the contemporary world of technology. Nature today is seen as a construct instead of as a force or entity with its own dynamics. The book claims that society vies nature the same way as society views infrastructure as something that is there to accommodate us, to facilitate or be part of our lives, subject to our planning.Franklin writes in-depth about infrastructure and especially technological infrastructure. She claims that since the Industrial Revolution, corporations as well as governments using public fu nds have invested heavily into technological infrastructures and that: the growth and development of technology has required as a necessary prerequisite a support relationship from governments and public institutions that did not exist in earlier times.Franklin feels that the current environmental crisis that is facing the world–polluted air and water, acid rain and global warming to name a few, are due to the infrastructures built to support technology and its divisible benefits. Because of the newfound relationship between government and the private sector and the fact that these infrastructures can’t be built without the governments of the world, the state is just as much to blame for the current condition of the environment as any polluting cooperation.The difference between a private company and the government, Franklin insists, is that citizens surrendered some of their individual autonomy (and some of their money) to the state for the protection and advancement of the the common good – that is indivisible benefits. When governments do not attempt to stop the destruction caused by the creation of these infrastructures, the government is doing a disservice to its citizens. Just as the Industrial Revolution led to productive and holistic divisions of labor, she fears that new technologies non-communication technologies

Tillie Olsen's I stand here Ironing By susan Cahill's Essay

Tillie Olsen's I stand here Ironing By susan Cahill's - Essay Example She seems to be worn down by life and does not care about much anymore. I was touched by how the mother in the story is so neglectful of her children. It seems her oldest daughter taught her much about herself, life, and parenting. However, with her knowledge, the mother still does very little to change her life. She thinks that her oldest daughter is basically a lost cause because she is older and tainted by the world. The girl is talented and has much potential but the mother simply looks at her and thinks that it is a shame that her girl will never fully blossom. This is a defeatist attitude and a sad one because the mother is simply too tired to care. The mother seems content with the fact that there is nothing she can do about her situation. It is also sad that the mother finds ways to blame her children when she can. She claims that Emily did not want to be touched and that she was "too much to herself, her life was such that she kept too much in herself" (Olsen 590). In additi on, she sates, "My wisdom came too late . . . she is a child of her age, of depression, of war, of fear" (Olsen 590). Here I see the mother simply giving up because she is tired and all she wants to do is take a nap. This mother has more control and influence that she wants to believe. To turn things around, it might take some hard work.

Sunday, July 28, 2019

Strategic human resource management Essay Example | Topics and Well Written Essays - 3250 words

Strategic human resource management - Essay Example Strategic human resource management ensures that human resource management aligns human resource goals with overall business objectives. The force behind strategic human resource management is the growing need for firms to align their human resource strategies with the general business structure of overall goals In the contemporary market characterised with intense competition, most organisations have diverted from conventional perception of human resource as passive resource that can be manipulated to get things done. Organisations now understand the importance of human resource in the competition-plagued market and treat their workforce as crucial source of competitive advantage. Many firms have realized that there is likely to be no organisation in absence of employees. Human resource practices are thus perceived to be geared towards supporting overall objectives of the firm. This paper explores strategic human resource management of Burger King in Vietnam. Company Background Burg er King, often referred to as BK, is a multinational corporation headquartered in Florida, United States. Burger King’s roots can be traced back to Insta-Burger King, a restaurant chain in Florida founded in 1953. When Insta-Burger King was riddled with financial problems in 1954, David Edgerton and James McLamore, Miami-based franchisees, purchased the restaurant and gave it the now popular name, Burger King. The company has changed ownership severally since then with present owners focusing on restructuring to restore the company’s glory. By 2012, the company had approximately 12,700 outlets located in 73 nations. Burger King has basically relied on franchise business approach to grow globally and seek presence in many parts of the world. Burger King’s licensing of franchises differs from one location to another and depends on regions. Some franchises are categorised as master franchises and are mandated to sell the company’s sub-licenses. The companyâ €™s rapport with its franchises has never been smooth, leading to occasional legal challenges (Phi, 2012). Burger King became interested in Vietnam market in 2011 when the company collaborated with IPP/Blue Kite Vietnam. The company proceeded to establish its initial restaurant in Vietnam in 2012. Vietnam is perceived to be one of the most crucial markets for the company in Asia-Pacific (Phi, 2012). Through franchising, Burger King engaged with IPP group/BKV to ensure faster growth of the company in Vietnam (Phi, 2012). BKV in the strategic partnership was seen as a potential contributor in many crucial areas of the company. BKV was anticipated to provide employee training and development, finding strategic locations, and marketing of Burger King Brand among other roles. On the other hand, Burger king would ensure organisational as well as structural advancement while at the same time providing proficiency and assistance on its global operating system (Phi, 2012). Strategic Huma n Resource Management of Burger King in Vietnam The contemporary market is increasingly becoming competitive and consumer behaviour is also becoming very sophisticated. As such, firms which operate internationally are faced with the challenge competing on global scale. International human resource managers are tasked with the daunting role of developing workforce teams that can work in diverse business environments (Armstrong & Baron, 2002). In order to counter the growing global challenges in international business arena, strategic international human resource management is inevitable. Strategic international human resource management (SIHRM) can be referred to as the process whereby an international firm strategise on how to create and implement business policies and traditions for effectively managing its workforce on global scale(Armstrong, 2008). Strategic intern

Saturday, July 27, 2019

Mexican Americans in World war I and World war II Research Paper

Mexican Americans in World war I and World war II - Research Paper Example Introduction United Sates of America is an amazing blend of different cultures. The demographic profile is very diverse having multi-cultural and multi-lingual identities. These identities generally include Hispanic and Latino Americans, American Indians, Asian, Black or African Americans and other Pacific Islanders. In United States, Mexican Americans basically involve those inhabitants living in America having Mexican Descent. This ethnic group makes up 16.3% of the total population of United States in 2010. Mexican Americans include 66% Hispanic and Latinos as well. United States is considered the second largest home for this community. A great portion of this community also resides in Canada. In 2008 there were about 7 million Mexican Americans who were undocumented but living in United States. Most of these people are the successors of native Mexicans. Some also belong to Europeans especially the Spaniards. The history of this ethnic group is wide ranging. It is round about four hundred years old. The history varies from one region to another. In the early 1900, there were so many Hispanics residing in New Mexico, Texas and California. Most of them were the successors of native Mexican, European and Spanish settlers. These settlers arrived to this region during Spanish colonial periods. So, the lineage of Mexican Americans can be traced back to early settlers of the colonial periods. History of Mexican Americans’ Contribution to US Cause It is the history of Mexican Americans that they always served United States especially in war conditions. When we look at history, we can observe that in 1861 when civil conflicts erupted in America, the Mexican Americans predominantly those situated in Texas at that time served directly or indirectly for the betterment of US. They also worked and participated voluntarily in Union Army and several other units. 10,000 personnel also served in the regular army. This ethnic group always showed extraordinary commitment and horsemanship. To facilitate their efforts, the US government had also set up four companies to utilize maximum from their services. Medal of Honors were also established by the government to facilitate those who risk their lives for their country. Hispanic and Mexican Americans received these honors for their commendable services in Civil War. Till 1898, the two previously mentioned ethnic groups scattered across the country as regular army officers and created a small, yet professional composition of personnel. Mexican Americans: Great Contributors to America’s Defense History reveals the truth that there were several Mexican Americans who served in First and Second World War with great devotion. Not only men but women also participated equally. Many men and women served in armed forces with their maximum possible dedication and loyalty. John P. Schmal writes about the publication of Defense Department. This publication declared â€Å"when our country has been in need, Hispanic Americans have had more than their share of stouthearted, indomitable men. Their intrepid actions have been in the highest tradition- a credit to themselves, their ancestry, and our nation.† So, Mexican Americans were the people who had greatly risked their lives to save and combat United States. While talking about American men during World War II, Richard Santillan mentioned that Mexican American clearly distinguished during combats for United States. They were so devoted and loyal to the

Friday, July 26, 2019

Juvenile and Adult Courts Essay Example | Topics and Well Written Essays - 1000 words

Juvenile and Adult Courts - Essay Example It was perceived, due to the influence of industrialization and modernization, that the children were corruptible innocents and that their upbringing demanded greater structure as prerequisite to adulthood than that had been previously regarded. Based on the assumptions of the social scientists who suggested that children are not responsible for their actions in the same way as adults since they are not fully developed, the idea of juvenile justice system was emphasized. According to this view, juvenile criminality is a kind of youthful illness, which can be cured by relocating the juvenile to a better family life in a rural setting. Thus, the first court designed specifically to deal with children was established in Chicago one hundred years ago which led to the growth of a separate juvenile justice system nationwide. "Juvenile courts are responsible for dealing with children who are accused of committing two types of offenses: status offenses - violations of laws with which only ch ildren can be charged (e.g., running away from home); and delinquency offenses - acts committed by a child which, if committed by an adult, could result in criminal prosecution." (Young and Gainsborough, 2000, p 2). Significantly, the premise on which the separate juvenile system rests is that children are developmentally different from adults and that more amenable to treatment and rehabilitation to juvenile criminals can be ensured by this system, unlike the adult criminal justice system. Therefore, it is essential to regard the juvenile justice system and the adult criminal justice system as two separate systems of justice founded on different philosophies, even though there are elements of close resemblance in both the systems. In a comparative analysis of the juvenile justice system and the adult criminal justice system, it becomes evident that the juvenile court system has been historically distinct from adult courts and both the systems are founded on divergent philosophies. Whereas the adult criminal justice system emphasizes the punishment of criminals, the juvenile justice system is mainly concerned with the rehabilitation and treatment, along with community protection. Rehabilitation and treatment are not primary goals in the criminal justice system and the guiding principle of this system is that criminal sanctions should be relative to the offense committed. On the contrary, "the juvenile justice process centers on the individual child and takes into account the child's problems and needs, focusing less on punishment than on helping the child to change and so minimize the likelihood of future criminal behavior." (Young and Gainsborough, 2000, p 2). Although there has been an important speculation in the recent years that the clemency within the juvenile justice system is not always the best option for all cases, it is constantly emphasized that there are several momentous differences between the juvenile and adult courts. The terminology used within the juvenile and adult courts offers one of the main differences between the two systems. "For juveniles who are brought into court, the terminology refers to the situation as an 'act of delinquency'. In the adult court the term 'crime' is used. Another difference is the way in which

Thursday, July 25, 2019

Explain why successful projects start with accurate project definition Term Paper

Explain why successful projects start with accurate project definition and are delivered through open and adaptive project systems - Term Paper Example This is the reason why experts advise against closed systems, which do not present any level of adaptability. This paper will demonstrate that accurate project definition and the adoption of open and adaptive systems are factors that lead to the success of a project. Project Definition is a complex process that is defined by Kà ¤hkà ¶nen (1998, p. 625) as â€Å"The process prior to final investment decision-making†. This process has crucial element, which is the recognition of the clients or stakeholders’ necessities and â€Å"specification†. Specifically trying to understand the stakeholder’s needs in order to deliver an adequate outcome, with keeping into consideration the three main factors that will measure the performance of this project, which are time, budget, and quality; project manager and his team must be aware of this element and they should understand them clearly (Cano & Lidà ³n 2011, p. 528). This process considered a vital stage since all hazards that might emerge and is associated with the project will be examined (Neal 1995, p. 5). In order to fulfill and cover more aspects of the definition Walker highlighted an important side which most of the definitions lacked it. He mentioned the resources, w hich includes people who are a key factor to deliver the project. Since the projects cannot be achieved without managing people and by their work, it is essentially vital to include them in the definition (Gibson Jr & Cho 2000, p. 115). Kà ¤hkà ¶nen stated that in order to boost the possibility of achieving an effective project, there are two points; initially, there should be â€Å"strategic information† to make sure that the possessor has a clear and adequate knowledge of the chances that will lead to an effective project. Second, the fundamental venture execution plans must be considered as an important part of the definition. From the same point of view, Cano and Lidà ³n addressed it briefly as clarifying and building an accurate

Wednesday, July 24, 2019

Scenario Essay Example | Topics and Well Written Essays - 4000 words

Scenario - Essay Example Loyalty and vision are both essential and provide employees with a pursuing path. In this report, an elaborate study will be presented which will determine the responsibilities and performance of the employees. Besides this, analysis will also signify the need for developing interpersonal and transferable skills. The organizations require that the employees work together and develop the strategies which help them in appropriate problem solving. All these studies signify the need for developing self-awareness and promote teamwork. This highlights the skills of individuals and presents a conclusion which proposes the ways through which useful human resource can be gathered by the organization. TASK # 1: DETERMINE OWN RESPONSIBILITIES AND PERFORMANCE 1.1 MANCHESTER COLLEGE LIP FOR DEVELOPING RESPONSIBILITIES AND PERFORMANCE OBJECTIVES Performance monitoring process is essential for individuals as it helps them in defining the career scope. The individuals require appropriate planning fo r setting goals and performing all the relevant actions required for progressing. Measuring the activities must be done through adequate planning, implementing, monitoring and reviewing the plan. This requires evaluating the needs, measuring impact and designing the services which are required for progressing within the relevantly designed model. (ACC, 2009) The measure of the responsibilities and performance makes the individual aware of the plan of action required to follow. Defining the scope of development can be done through the use of this model. For the individuals, the plan should be structured using all the available information which has been provided through the LIP model provided at the Manchester College. Three Months Acquire the expertise which reflects on the Academic performance. Plan and structure goals acquired for the future. Assess the current situation and develop an understanding of the goals which need to be acquired. Categorize the significance of job and ali gn it with the course which is being studied. Assess the support required for learning. Six Months The course learned and its relevant application with the job. Compare all the skills which include interpersonal and communication skills and how they may assist in acquiring the gains in the future. Prepare for the studies ahead of time after reviewing the date of the curriculum. Prepare for the assessment and rate the course preparation while studying the course. Nine Months Acquire complete knowledge and skills required for the training. Measure the competencies and further develop the skills keeping in mind the SMART goals. Enhance the technical knowledge and skills. Set own personal targets and ensure that no compromise is made while acquiring those targets. The performance objectives developed from the model will assist with the progress and create a whole new level of competence. 1.2 ACTION PLAN USING THE SMART TARGETS Goal setting is an essential process for completing the goal s. It is effective as it identifies all the facets and highlights all the hurdles which may arise during the success phase. The individual goals which are made determine the accomplishment of the strategic goals. The goal setting theory is one of the most influential and practical theories. Thousands of companies across the globe use this

Google Bike Essay Example | Topics and Well Written Essays - 750 words

Google Bike - Essay Example Our current market research indicates that 20 inch wheel diameter is not comfortable with the majority of the rides; hence we will stoke bikes with wider wheel diameter to beat our competitors. Further, more our bikes will cost relatively low for the first years to attract more customers as we brand our company. Market Research And Analysis Our store will be located in Dallas and California among other mountainous regions. This would help attract more customers. Our team conducted a comprehensive market research and the findings will be applied in making major decisions. The company will stock bikes with wider diameter wheels for good speed and comfort. Currently, our competitors are stocking a 20 inch diameter wheel, and this is not appreciated by the customers. Customers complain of carrying huge amount of cash to such stores in major parts of the US, hence, will incorporate Visa services to enable easy and comfortable transactions. A good number of US citizens suffer from obesity and respiratory complications due to lack sufficient exercise. Google bikes would provide them a good opportunity to burn some calories and maintain good health. The majority of US citizens prefers cycling or walking to work places due to several reasons like expensive fuel, environmental conservation strategy and enjoying the natural weather among others, hence the company will stock quality Google bikes with comfortable design at affordable prices to workers or individual who prefer cycling to driving to work places (Abrams, 216). There is an increasing trend of collages establishment, this would mean increased number of students who prefer cycling to school, thus increased demand or market. Our competitors are prone of running out of stock mores o during summer or other holidays. Our company will adopt a supply chain that ensures that orders are made in good time to limit chances of running out of stock, customers are always turned away whenever they visit any store only to reali ze their preferred item is out of stock. Our biggest competitor will be Mashable Company whose bikes is expensive and uncomfortable, since they come in 20 inch wheel diameter. Financial Plan The latest Good ride’s financial report indicates that the company made a net profit of about $ 3 billion in the year 2012, from the sales of spare parts. To venture into Google bike business, it is estimated that a total of $ 2.5 million will be needed. The company financial team has done the financial analysis and ascertained that the company will employ both equity and debit capital. The equity capital will see the company raise about $ 1.5 million from its asset liquidification or from previous profits. The debit capital would see the company seek about $ 1.0 million loan from regional or national banks among other loaning institutions. It is estimated that the company is likely to make an annual net profit of $2.0 billion from the sale of Google bikes. The company will use 0.005% of the profit to settle the loan, however, the company will seek more loans to further expand the business while repaying the current loan, but all this will depend on the customers’ turn out. Economics Of The Business Currently, there is a good demand of Google bikes from the increasing trend of colleges’ establishment, rise in fuel prices and increase in outdoor activities like picnic, bike riding and bike rides among others. Good ride would take advantage of its competitors’

Tuesday, July 23, 2019

How do Australian magazine advertisements portray the feminine ideal Research Paper

How do Australian magazine advertisements portray the feminine ideal for teenagers - Research Paper Example communication and journalism had always been experiencing quite freely to figure out ways and means that can impart the messages effectively through the use and employment of various tools of the trade. In this connection, presentation of feminine characters is an important consideration because of the impact and effect a correct and purposeful use of the gender can generate. However, feminine characters are subjected to stereotypes that are more traditional. Maurie & Sharon have identified the same fact and states, â€Å"Magazine advertisements are also same in theme. Women primarily have decorative or sexy role in magazine ad portrayal.† (2008, p.212) Moreover, age is an important factor as far the acceptability of a trend is concerned. Literature and specially magazines and advertisements for teenagers can play a vital role in developing new trends while safeguarding cultural foundations of a society. This research will focus Australian Magazine advertisements to gauge the impact of feminine characterization on teenagers because these characters occupy the front pages and major advertisements and serve as ideals for many young peoples. The research will examine and investigate how the varied portrayal of models can generate and develop images, symbols and forms and how far these images can arouse the fetish thoughts and desire for teenagers in Australian society. The research will focus the presentation and portrayal of feminine in Australian magazines in general and particularly the Dolly and Girlfriend magazines. These presentations serve  as ideals for Australian girls who want to  establish  their identity through some unique, desirable and enviable attire, style and glamour.   The popularity and fame of these two magazines among teenagers have helped these... The paper tells that experts from the fields of communication and journalism had always been experiencing quite freely to figure out ways and means that can impart the messages effectively through the use and employment of various tools of the trade. In this connection, presentation of feminine characters is an important consideration because of the impact and effect a correct and purposeful use of the gender can generate. However, feminine characters are subjected to stereotypes that are more traditional. Maurie & Sharon have identified the same fact and states, â€Å"Magazine advertisements are also same in theme. Women primarily have decorative or sexy role in magazine ad portrayal.† Moreover, age is an important factor as far the acceptability of a trend is concerned. Literature and specially magazines and advertisements for teenagers can play a vital role in developing new trends while safeguarding cultural foundations of a society. The research will examine and investiga te how the varied portrayal of models can generate and develop images, symbols and forms and how far these images can arouse the fetish thoughts and desire for teenagers in Australian society. The research will focus the presentation and portrayal of feminine in Australian magazines in general and particularly the Dolly and Girlfriend magazines. These presentations serve as ideals for Australian girls who want to establish their identity through some unique, desirable and enviable attire, style and glamour. The popularity and fame of these two magazines among teenagers have helped these magazines to qualify for the research.

Monday, July 22, 2019

Culture Assessment Essay Example for Free

Culture Assessment Essay A widely accepted definition of organizational culture is it is the shared meanings, artifacts, values, beliefs, norms, and assumptions that dictate how an organization works and its existence (Cameron Quinn, 2006). Organization culture is shaped by more than one element; say individuals’ life experiences, background, education levels and so fourth. Undoubtedly, leadership also plays a critical role in defining what culture prevails in the organization and their actions have a major influence on how the rest of the organization follows suit. (Robbins et al, 2000) Additionally organization culture defines the strategies that a firm uses in handling things like competition, growth, resource management and the like. (Goffee Jones, 1996) A good assessment of the cultural orientation of a firm makes it likelier to promote interorganisational network and also implement changes that encourage member participation and productivity. The key indicators of organizational culture include organization structure, power and managerial styles, ways in which members of the organization interact and do their jobs among others. This paper takes a look at FedEx Corporation and gives a summary of the type of organization culture at FedEx, its benefits, hindrances as well as the recommendations of the company. Company overview FedEx Corporation is a large company headquartered in the US that deals in printing, courier services and logistics as well as cargo airline services. This company has been named one of the top 10 most admirable companies by Fortune magazine two years in a row. Since its founding in 1971 it has grown from humble beginnings a leader in air courier industry. Its brands include the FedEx home delivery, FedEx smart post and FedEx freight east and west, FedEx services among others. Its chief competitors are DHL, TNT, UPS, BAX Global and USPS. The company employs over 250,000 workers and has a net income of approximately 1. 8 billion dollars in 2006. Culture assessment The organization culture at FedEx blends various kinds of organization culture but perhaps the most predominant culture is flexibility discretion and dynamism. This has been its major strategy of staying ahead. To support this, FedEx takes pride in their ability to adapt to change so as to enhance effectiveness and competitiveness. (Cameron Quinn, 2006, p. 34) This it achieves by combining innovation, knowledge sharing, high experience and team work in its key strategies to attaining competitive advantage. A good illustration of FedEx external focus is evident in the numerous deliveries of relief supplies that FedEx made to hurricane Katrina victims for free in 2005, earning it more customers and goodwill. Adhocracy orientation at FedEx is fostered at top level management down to the junior staff. The CEO of FedEx encourages employees to be trend setters and nonconformist and dare to take calculated risk. The management encourages employees to be all ears on current events and look for opportunities. The guiding philosophy is that an innovation failed is better than a thousand years lost in risk averse dealings. Innovation at FedEx is held with high regard and employees are rewarded handsomely for developing fresh ideas. The management supports viable projects from employees financially or otherwise. This is one reason why FedEx distinguishes itself as an evergreen company in the air courier industry. This culture is underscored when creative attempts that fail are rewarded as well as the successful innovations. The familiar slogan ‘absolutely, positively gets it there overnight’ is made real by the culture ingrained in the employees towards importance of customer service, efficiency at work, speed and accurate scheduling. This culture leverages FedEx for competitive advantage. Basically, the FedEx corporate culture emphasizes urgency, speed and teamwork, exceeding customers’ expectations, initiative, flexibility and active listening (O’Reilly, Tushman Michael, 1997) Aside from the flexible nature at FedEx, it also adopts an outwardly and sensitive approach to the environment that it operates. Competitiveness fosters the company to always look for opportunities to expand and grow. While the opposite of this culture is to foster integration and unity within the organization as well as knowledge some elements of this culture are also present at FedEx. This is because FedEx emphasizes high skills among employees. Employees at FedEx are highly learned individuals as the company only picks the best of the best. Working ones way up the corporate ladder requires that ones knowledge base also increases. In addition, the internal focus of FedEx organizational culture provides an appropriate environment that enables employees to grow and exercise their skills as seen in the various training and task assignments delegated to employees. In order for knowledge sharing to be maximized then division of labor, job enrichment, team building and so forth have to be conducted regularly (Murray, Poole Jones, 2005) some aspects of these are present at FedEx. FedEx corporate culture values hard work and rewards such appropriately. It also disregards discriminations and fosters equal opportunities for its employees in areas of promotion, transfer and recruitment. The hands off team oriented management style promote progressive and diversified work culture. Communication is a key strength for FedEx organization culture and regular surveys on employees’ views on the job are taken to monitor and modify areas of universal discontent. Notably, the employees at FedEx are highly experienced and skilled individuals. The culture therefore is based on letting employees be free agents who direct their jobs in their own direction. The management ensures that employees are proactive and take initiative to learn from mistakes of others. The employees are not reprimanded or penalized for slip-ups rather management takes the blunder as an opportunity to teach the rest. Most of the tasks done at FedEx are assigned to teams which are given sufficient power and authority to fulfill their responsibilities and be accountable for the results. Seemingly this is the reason behind the great success of FedEx. The benefit of the cultures present at FedEx is that the company is maintains its competitiveness amid intense competition from the competitors. Additionally, it deals with fewer conflicts, fewer staff turnover and enjoys increase in employees’ job satisfaction, higher performance less resistance to change, higher productivity and better customer service and so forth. The hindrances of this kind of organization culture are that it requires major investment in time and money. The management needs to be patient with employee mistakes which are most times costly. Additionally it is difficult to monitor this practice in the FedEx Company because of the large workforce and the busy schedules that the employees have. Conclusion The organizational culture at FedEx has both benefits and detrimental aspects although many are the benefits. In the competitive faced paced industry that FedEx operates their culture seem most fitting. Perhaps the only thing that I would improve is the hierarchal structure and the communication channels for free flow of information and faster decision making throughout the organization.

Sunday, July 21, 2019

The Financial Markets: Direct And Indirect Transfers

The Financial Markets: Direct And Indirect Transfers In economics, a financial market refers to a media that allows people to buy, sell, create and exchange financial securities such as share and bonds, commodities such as basic agricultural goods and precious metals, and other fungible items of value at low transaction costs and at prices that reflect the efficient-market. Both general markets where many commodities are traded and specialized markets where only one commodity is traded exist in financial market. Markets work by placing many interested buyers and sellers in one media, thus making it easier for them to find each other. The financial markets can be divided into different types such as capital markets commodity markets, money markets, insurance market and foreign exchange market. A saver refers to the one who deposit their money in bank, invest in company share and pays premium to an insurance company with objective to earn interest, dividend and profit. They aim also to accumulate their fund for future investment and expenses. However, a borrower just the reverse to saver. A borrower borrowed the money from saver by financial market to fulfill their need and need to effort the interest charge or give the dividend to saver. In a well-functioning economy, capital will flow efficiency from saver to borrower. The transfer of fund can make by three different ways such as direct transfer, indirect transfer through investment bankers and indirect transfer through financial intermediary. 2.0 Body 2.1 Direct transfer The first way is through direct transfer. It refers to a transfer of assets from one type of tax-deferred retirement plan or account to borrower. Direct transfers are not considered to be distributions and not taxable as income or subject to any penalties for early distribution. Most transfers take several days to complete, although this process is now generally faster in the electronic than in the past. Direct rollovers from qualified plans are a form of direct transfer. It occurs when firms direct sell their stock or bond to saver without going through any financial institution The advantages of direct transfer are direct transfers convenience and simple to trade between borrower and saver. The reason is when both borrower and saver agree with the term and condition, the transaction will be in process. Besides, it will be save time and cost. The reason is the transaction can complete online, just taking few days to complete and there is no high commission to pay for intermediate. Even though it is a lot of advantages using this method, there also bring some disadvantages to both parties. The savers will face lack of professional consultation from expertise. This will lead to the saver making wrong investment, facing loss the money and cheat by the business. Beside, the business will also facing less efficiency when direct transfer the securities. The reason is there is no expertise to help them promote the securities and it may not planning well when issuance of securities. 2.2 Indirect transfer through investment bankers The second way is indirect transfer through investment bankers. Investment bank refers to a financial institution that helps individuals and corporations to raising their capital by underwriting. They also act as the clients agent when issuance of securities such as stock and bond. An investment bank may also help organization involved in mergers and acquisitions and provides ancillary services. In investment banking there are two main which are trading securities for cash or other securities and promotion of the securities. In this way, the investment banker assumes the risk of selling a new security issue at a satisfactory price. This is called underwriting. An underwrite serve as a middleman and facilitates the issuance of securities. The companys securities and savers money will pass through the investment banking house. The investment banker will buy the entire issue of securities from the company that needs of financial capital. Then investment bank will turn sells these same securities to savers at a higher price. However, the investment bank taking the risk when they buy and hold the companys a security for certain time and it may not resell to savers for as much as they paid after a period of time. The reason is new securities are involved and company receives the proceed of the sale, this is called a primary market transaction. Besides, the investment banker also advises firms on the details of selling securities. The advantages for this method are the business will get professional suggestion from expertise about the details of selling securities. The business can raise the capital more efficient, the reason is the investment banker will buy over the securities and hold to sell for savers. This will help to business dispense with the pending time to wait saver transfer the money. The disadvantages for this method are the business may face depress in price of securities. The reason is when the business need capital emergency, the investment banker will depress the price of securities in order to make more money. The savers may also face receive inaccuracy information from investment banker. The reason is the investment banker wants to resell the hold securities, they may give inaccuracy information to the saver. 2.3 Indirect transfer through financial intermediary The third way is indirect transfer through financial intermediary. Financial intermediary consists of channeling funds between surplus and deficit agents. A financial intermediary is a financial institution that connects surplus and deficit agents. The classic example of a financial intermediary is a bank that transforms bank deposits into bank loans. Insurance companies, credit unions, pension fund and mutual funds also include as financial intermediary. Insurance defined as the equitable transfer of the risk of a loss, from one entity to another, in exchange for payment. Credit union is a cooperative financial institution that is owned and controlled by its members and operated for the purpose of promoting thrift, providing credit at reasonable rates, and providing other financial services to its members. Pension fund is any plan, fund, or scheme which provides retirement income. Mutual fund is a professionally-managed type of collective investment scheme that pools money from many investors to buy securities Through the process of financial intermediation, certain assets or liabilities are transformed into different assets or liabilities. As such, financial intermediaries channel funds from savers to those borrowers. As example, saver will save the surplus money in bank and get the deposit certificate, the bank will use the money to borrow to borrower by term of mortgage. Financial intermediaries provide important advantages to savers. Lending through an intermediary is usually less risky than lending directly. The major reason for reduced risk is that a financial intermediary can diversify. Financial intermediary will give many loans to different borrower. When mistake happen, the financial intermediary can cover by others loan interest. But if savers borrow direct to business, the risk will face by individual. Another reason is financial intermediary specialize in lending and better predict which of the people able to repay compare to individual savers. Second advantage financial intermediaries give savers is liquidity. Liquidity is the ability to convert assets into form money quickly. A house is an illiquid asset; selling one can take a great deal of time. If an individual saver has lent money directly to another person, the loan can also be an illiquid asset. Third advantage financial intermediaries give savers is cost advantage. Using financial intermediaries can reduce the costs of borrowing. The reason is there are a lot of borrowings complete in financial intermediaries, it can lead to economic of scale and save cost for savers. 3.0 Conclusion

Saturday, July 20, 2019

The Personification Of Food In Literature

The Personification Of Food In Literature Since food is created from recipes that have been passed down from one generation to the next, the art of cooking was taught by mothers to daughters, they reawaken the past by reminiscence. It is not a surprise that we find frequent references to the epitome of human characteristics in novels of magic realism, such as Kitchen and Like Water for Chocolate. Food in literature can be used as symbolism for many aspects of things, but its most likely that it represents the ideal voice of a character or the personality of themselves. This is because certain aspects of a character reveal themselves in the personal choices of consuming food and the effects afterwards on the characters. Since eating consists of numeral pre-activities to be performed; the preservation, preparation, presentation, and performance of food as well as the food product itself is what leads characters to behave ambiguously. More abstractly, in addition to giving insights within a character, both Yoshimoto and Esquive l use food to symbolize significant relationships amongst the characters and the association in fact or thought. Therefore, by analyzing the human attributes given to food, we can gain insights into numerous ideas that the writers are exemplifying. This paper will compare the ways in which food is used for the above purposes in both novels. Early in Kitchen we are shown a brief introduction to the main character Mikage and her adoration for the kitchen. Mikage is portrayed as a caring and generous character through her food preparation activities and presentation. While preparing food for others, she upholds a feeling of contentment and happiness because the warmth of food and the company of her loved ones. We see that through the death of Mikages grandmother whose death has left a heavy impact on her. She describes to have slept in the kitchen after her grandmothers death, which indicates her association with warmth and food was what she needed to comfort her worried soul: Steeped in a sadness so great I could barely cry, shuffling softly in gentle drowsiness, I pulled my futon into the deathly silent gleaming kitchen. Wrapped in a blanket, like Linus, I slept. The hum of the refrigerator kept me from thinking of my loneliness. There, the long night came on in perfect peace, and morning came. Furthermore, being a culinary teachers assistant, Mikage has a particularly refined taste for food and always seems able to make eating an event that upholds optimism and hope under any circumstances. She makes it a social experience for Yuichi, an acquaintance of her grandmothers funeral whos family Mikage goes to live with after her grandmothers death. He had been mournful after his own mothers death and Mikage had prepared a magnificent feast in order to cheer him up. And its true that for the whole summer I went about it with a crazed enthusiasm: cooking, cooking, and cooking. I poured all my earnings from my part-time job into it, and if something came out wrong Id do it over till I got it right. Angry, fretful or cheery, I cooked through it all. (56) Mikage is also shown to reveal her inner emotions through the use of preservation and presentation of food to express her sincerity and concern. As a young woman who had been taught by her grandmother to cook, she does not limit herself to only traditional recipes. She prepares food with vast quantities of materials and tries to expand on her options of cooking a good meal. She questions her love for the kitchen, Perhaps to me a kitchen represents some distant longing engraved on my soul. As I stood there, I seemed to be making a new start; something was coming back (56). The intensity of culinary had given her opportunities to express her inner feelings and to maintain a steady relationship with the people in her life. Mikage prefers finely detailed meals which consist of dishes with lots of color and shapes, reflecting her personality within the final product. Her preservation of food reflects her thoughts and concerns for the people in her life, such as her friendship with Yuichi. She identifies his loneliness and sets out to be a better friend by Finding myself standing alone in the standing alone in the street, close to midnight, belly pleasantly full, a hot takeout container of katsudon in my hands, completely bewildered as to how to proceed. (93) From this we can perceive the importance of friendship from Mikages generosity of supplying food for a friend. On contrary, Yuichi is grateful of having Mikage in his life and the food would taste so good because he feels loved and happy amongst his isolation. It is exactly the notion that distinguishes Mikage from other characters in Kitchen. Though Mikage also has a humble taste for food that shes accustomed to, The food was so delicious, and I realized how very, very hungry I was. It occurred to me I always enjoyed what I ate when I was with him. How wonderful it is, I thought (142). In contrast to other characters in the book, Mikage does not care for her social environment. This is evident in which she describes her eating experiences with Yuichi, her very close friend. This shows that Yuichi has bonded with a person who cares very much about him through her expressive eating behavior. The affectionate attitude to food is related to their genuine friendship, and more specifically, conveying their emotions. In a cafà ©, sensible Mikage drank tea with Yuichi, confessing that it was their first time sitting down in such a setting, Yuichi bluntly blurts out Mikages feelings about her grandmothers death versus his feelings towards his mothers death. The literal description of Mikages profoundly response was Yuichi, the fact that youre relaxed enough with me now to tell me how youre really feeling is a source of comfort to me. It makes me very happy. So happy I feel like shouting it from the rooftops (76). It can be interpreted metaphorically with tea being a symbol for relaxation but conveys acknowledgement between people. Contrariwise, Mikages goal in a genuine friendship is shown in her attitude towards her association with food. When she began to sob audibly, everyone in the place turned to stare at her. Chikas shoulders jerked spasmodically, racked with grief. Tear s fell into her soup (86). Again, the fundamental presentation of food is associated with emotions and memoirs. Mikage, who witnesses his touching scenario can identify that the human heart is unquestionably precious and genuine. The human nature of Mikage shows itself in the reply: the experiences of the last months had changed me. In the mirror I could see only a trace of the spoiled princess I had been, the one who took Eriko for granted. I was so far from that now (87). The death of a friend led her to realization that it was too late to say goodbye. Experiencing a similar fate to Mikage, Tita shows her affections through her preparation and presentation of food. However, she is denied of love from her mother and she is used as a tool to compensate the happiness of the rest of family members while not being able to experience her own. While all the food she prepares does not center on her, most of it was having to do with her entity. So it seemed that Tita was destined from the very beginning to learn the traits of cooking since birth, allowing her emotional connection to the food she cooked later in her life as a form of realism. The establishment of traditional recipes being handed down from one generation to the next is relevant to Tita and her emotions. Since her mother has denied her marriage to Pedro, her lover; he has brought her roses which she used for their family dinner. A sense of alchemical process, this is ominously displayed at the dinner: with that meal it seemed they had discovered a new system of communication , in which Tita was the transmitter, Pedro the receiver and poor Gertrudis the medium, the conducting body through which the singular sexual message was passed (52). Her resilient behavior concerning her preparation of food and drinks shows her frustration and insatiable character; on her knees, was bent over the grinding stone, moving in slow regular rhythm, grinding the almonds and sesame seeds (67). Tita finds her sexual satisfaction in passionately committing adultery with Pedro and this is symbolized by the eating of rose petal quail. Without any mention of romantic love, the presentation of food reflects the intensifying emotions during the preparation. This example adds to Titas profile to have affectionate characteristics. The way that food can be used as a literary effect is evidence in both novels Kitchen and Like Water for Chocolate, Yoshimoto and Esquivel seem to share a similar view on the literary use of food symbolism. The reason that something as generalized as food comes to represent the characters and their need to transform the food with their own emotions. Instead of describing directly what kind of character one is or stating how the plot will develop, both authors use the personification of food to convey the ideas. It is this sort of literary technique that makes a novel enduring.

Where Have All The Good Ones Gone? :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Honesty. Respect. Integrity. Motivation. Dedication. Patriotism. The preceding words represent qualities many of today’s American students lack. Many US citizens question the reason behind this decline of morality within the educational system. Parents blame the teachers; teachers claim the students are unable to be taught and parents aren’t attempting to assist teachers in their quest to disperse their knowledge. As for the students, they just don’t care. Who exactly is to blame? Students? Teachers? Parents? More importantly, how this be fixed? Government programs like the recent â€Å"No Child Left Behind† Act aren’t as effective as they claim, and bribing the students with field trips and Coke float parties do not work. What is a nation, quickly filling with uneducated young adults, to do?   Ã‚  Ã‚  Ã‚  Ã‚  Many theories have been tested as to why students are becoming lazy and, for lack of a better word, stupid. Most fingers are pointed towards parental control. Commercials geared towards a drug-free America tell parents to ask questions: Who? What? Where? When? Most parents are too caught up in the drama of their own lives to wonder who their kids hang out with, and where and what they are doing with them. They are more concerned with Mr. Limon not paying them for overtime or why Clint and Robert got fired. Students are ignored and seldom rewarded for good behavior. However, when Mom and Dad get a call from the school when little Johnny was caught smoking marijuana in the boys’ bathroom, it’s a different story. The parents become involved, but for all the wrong reasons. When the parents confront Johnny, he responds negatively, with slamming doors and outbursts of â€Å"You’re ruining my life† or â€Å"I can’t believe you!!† It shouldn’t take a drastic measure for children to get their parents’ attention. Parents should want to know what’s going on in their child’s life, in all aspects. In movies, the parent-teenager relationship is portrayed as something very awkward and forced. The way to solve this: change how it is seen in real life. Parents should talk to their children more, and their children will learn to trust them. In one family, a 30-something year old mother has a 16-year-old daughter. Because of their healthy relationship based on trust and understanding, the daughter considers her mother her best friend. Families need to spend more time together and less time on the run. Plan an uninterrupted family night—cell phones get turned off, computers are unplugged—where the family just plays a nice game of Monopoly or Life, or watches a movie based on positive moral values.

Friday, July 19, 2019

Nursing and Biomedical Research :: Health Care, Nurses

With unparalleled technological advancement, nursing and bio-medical research, and the present healthcare environment, nurses must be cognisant of their professional and personal views of ethics. Ethics are standards of behaviour, developed as a result of ones concept of right and wrong (Judson & Harrison, 2010), and are intended to influence the actions of healthcare professionals. Ethical principles help guide the decision-making process among healthcare workers in complicated situations. [Therefore] we cannot understand nursing unless we also understand ethics (Gallagher & Wainwright, 2005) There are many different ethical theories which can mainly be divided into three groups. These are Duty based, Goal based and Rights based theories. Deontology is a duty based ethical theory. This means that a moral person must always do their duty and must perform them â€Å"without exception, whatever the consequences† (Seedhouse, 2001). However, this theory has limitations and objections because it does not allow for conflict between duties, flexibility or compromises and these are all essential for health work. (Seedhouse, 2001) Goal based theories such as Utilitarianism, believe that what is morally right is determined by the good that is produced as the consequence of the action. The acts that achieved this were defined as â€Å"good† and those that produce â€Å"pain† were bad. (Rumbold, 2000) An objection with Utilitarianism is that because it is only concerned with the consequences, then even if an action was taken that was intentionally bad, it would still be ethically right if the eventual consequences were favourable. (Seedhouse, 2001) Dunbar (2003) states that there are four main ethical principles, these are beneficence, non-maleficence, justice and autonomy. The principle of beneficence is to do good for patients and to put their needs before your own (Rumbold, 1999 p217) and with beneficence comes the principle of non-maleficence meaning to do no harm. Rumbold (1999, p222) describes how in many nursing duties nurses have to â€Å"do harm† to our patients but only when it is alongside beneficence and the long-term goal is to do good by the patient. In not giving a patient assistance to eat their meals we are acting in a manner that these principles don’t support as there is no good that could arise from this. Beneficence is considered to be the caring ethic, as it guides us to work in the best interests of the patient but at the same time for the benefit of other patients, considering their rights to justice and fairness with their care (Kennedy, 2004).

Thursday, July 18, 2019

Analysis Network

CIRCUIT SWITCHING AND PACKET SWITCHING 1) INTRODUCTION Telecommunication networks carry information signals among entities, which are geographically for apart. The communication switching system enables universal connectivity. Switches can be valuable asset to networking[1]. Overall, they can increase the capacity and speed of our network. Every time in computer network we access the internet or another   computer network outside our immediate location, our messages are sent through a maze of transmission media and connection devices.The mechanism for moving information between different computer network and network segment is called switching in computer network[2]. Figure 1: Switched network Long distance transmission is typically done over a network of switched nodes. Nodes not concerned with content of data. A collection of nodes and connections is a communications network. Data routed by being switched from node to node. Nodes may connect to other nodes only, or to stations an d other nodes. Node to node links usually multiplexed. However, switching should not be seen as a cure-all for network issues.There are two different switching technologies which are: 1) Circuit switching and 2) Packet switching. 1. Circuit Switching Circuit switching was the first switching technique have been used in communication network. This is due to easy to carry analog signals. Circuit switching  network establishes a fixed bandwidth channel between nodes before the users may communicate, as if the nodes were physically connected with an electrical circuit. The bit delay is constant during the connection, as opposed to packet switching, where packet queues may cause varying delay.In circuit switching, the transmission medium is typically divided into channels using Frequency Division Multiplexing (FDM), Time Division Multiplexing (TDM), or Code Division Multiplexing (CDM). A circuit is a string of concatenated channels from the source to the destination that carries an inf ormation flow. To establish the circuits, a signaling mechanism is used. This signaling only carriers control information, and it is considered an overhead. Since all decisions are taken by the signaling process, the signaling mechanism is the most complex part in circuit switching.Each circuit cannot be used by other callers until the circuit is released and a new connection is set up. Even if no communication is taking place in a dedicated circuit then, that channel still remains unavailable to other users. Channels that are available for new calls to be set up are said to be idle. Telephone network is example of circuit switching system. Virtual circuit switching is a packet switching technology that may emulate circuit switching, in the sense that the connection is established before any packets are transferred, and that packets are delivered in order.Unlike with packet switched networks, we cannot just send a ‘packet’ to the destination. We need to establish and la ter terminate the connection. We need to have some way of transmitting control information, we can either do this in band that the same channel we use for data or out of band which is on a seperate dedicated channel. Phone networks used in band signaling a while ago we could control switching and other functionality by playing tones into the telephone. Today in band signaling is considered unsecure and is not used except for compability with old systems[3]. 2. Packet SwitchingPacket switching  is a communications paradigm in which packets are routed between nodes over data links shared with other traffic. In packet-based networks, the message gets broken into small data packets. These packets are sent out from the computer and they travel around the network seeking out the most efficient route to travel as circuit become available. This does not necessarily mean that they seek out the shortest route. Each packet may go different route from the others. Each packet contains a  "header† with information necessary for routing the packet from source to destination.The header address also describes the sequences for reassembly at the destination computer so that the packets are put back into the correct order. Each packet in a data stream is independent. To be able to understand packet-switching, we need to know what a  packet  is. The  Internet Protocol (IP), just like many other  protocols, breaks data into chunks and wraps the chunks into structures called packets. Each packet contains, along with the data load, information about the IP address of the source and the destination nodes, sequence numbers and some other control information.A packet can also be called a segment or datagram. Once they reach their destination, the packets are reassembled to make up the original data again. It is therefore obvious that, to transmit data in packets, it has to be digital data. The packet switching can broadly be divided into two main categories, first is the virtual circuit approach and other is the datagram approach. In the virtual circuit approach to packet switching, the relationship between all packets belonging to the message or a session is preserved. A single route is chosen between the sender and the receiver at beginning of the session.When the data are sent, all packets of transmission travel one after another along that route. The wide area networks use the virtual circuit approach to the packet switching. The virtual circuit approach needs a call setup for establishing a virtual circuit between the source and destination. A call teardown deletes virtual circuit. After the setup, routing takes place based on the identifier known as the virtual circuit identifier. This approach can be used in the WANs, frame relay and an ATM. In the other approach of packet switching that is the datagram approach, each packet is treated independently of all others.Even if one packet is just a piece of a multi-packet transmission, the ne twork treats it as though it is existed alone. Packets in this approach are known as the datagram. The internet has chosen datagram approach to switching in the network layer. It uses the universal addresses defined in network layer to route packets from the source to destination. In  packet-switching, the packets are sent towards the destination irrespective of each other. Each packet has to find its own route to the destination. There is no predetermined path; the decision as to which node to hop to in the next step is taken only when a node is reached.Each packet finds its way using the information it carries, such as the source and destination IP addresses[4]. 2) HISTORY OF CIRCUIT SWITCHING AND PACKET SWITCHING * Evolution of Circuit Switching Switches are used to build transmission path between telephone set on a flexible basis. Without switches, each telephone set would require a direct, dedicated circuit to every other telephone set in order to be able to communicate. This is a full-mesh physical topology network. Such a full mesh network clearly is resource-intensive, impractical and even impossible, as early experience proved.Circuit Switching were developed for voice communications. Contemporary circuit switches provide continuous access to logical channels over high-capacity physical circuits for the duration of the conversation. In January 1878, the first telephone switch went into operation in New Haven Connecticut. Switching technology had advanced drastically over the intervening decades, yet the basic function had remained the same: interconnect users of telephones by creating circuits between them. Every telephone has a line, or circuit, that connects physically to a telephone switch.In the simple case of both the person making the call and the person being called are connected to the same switch, the caller dials the number of the desired person, the switch checks to see if the line is available, and if it is, the two lines are interconnec ted by the switch. The connection is maintained until one person hangs up his or her telephone, at which time the switch terminates the connection, freeing both lines for other calls. Three characteristics of this type of switching, called â€Å"circuit switching,† are important.First, before the two parties can talk the circuit between them has to be created, and it takes time for a switch to check if a connection can be made and then to make the connection. Second, when a connection has been made, it creates a dedicated connection. No other party can reach either party of a dedicated connection until that connection has ended. Three, since switches are very expensive one accounting policy telephone companies implemented to recover their investment was to institute a minimum charge for every telephone call, generally three minutes.For voice calls that lasted many minutes, a minimum charge did not represent a problem. But communications between computers often last less than seconds, much less minutes. It was difficult to image how circuit switching could work efficiently for computer communications when such a system took minutes to make a connection, created dedicated connections so only one person, or party, could be in connection with another party, and had a prohibitive cost structure. Although these issues were generally understood before the experiments of Roberts and Marill in 1965, they were once again strongly confirmed.The experiments also made it abundantly clear that the problems confronting computer communications were not only with the circuit-switching architecture of the telephone system. Host operating system software of the day assumed there was only one Host and all connecting devices were as if â€Å"slaves. † Hosts were not designed to recognize or interact with peer-level computers; the concept of peer-level computing did not yet exist. Thus, in interconnecting two computers, one had to be master and one slave. The problem only became worse if more than two computers wanted to interconnect and communicate.Nevertheless, the problem of Host software was considered to be solvable if a suitable communication system could be designed and made to work. Fortunately, an inquisitive innovative scientist, Paul Baran, had already explored the problems of circuit switching beginning in 1959. By 1962, he had made his concept of a message-based communication system publicly known. Independently, in 1965, an English scientist, Donald Davies reached the same conclusions as had Baran and would coin its name: packet switching. * Evolution of Packet Switching The concept of packet switching had two independent beginnings, with Paul Baran and Donald Davies.Leonard Kleinrock conducted early research and authored a book in 1961 in the related field of digital message switching without explicitly using the concept of packets and also later played a leading role in building and management of the world’s first packet s witched network, namely the ARPANET. Baran developed the concept of packet switching during his research for the US Air Force into survivable communications networks, first published in 1962, and then including and expanding somewhat within a series of eleven papers titled â€Å"On distributed communications† in 1964.Baran’s earlier paper described a general architecture for a large-scale, distributed survivable communication network. His paper focused on three key ideas: 1) the use of a decentralized network with multiple paths between any two points, 2) dividing complete user messages into what he called message blocks (packets), and 3) delivery of this message by store and forward switching. Baran’s study paved the way for Robert Taylor and J. C. R.Licklider, both wide-area network evangelists working at the Information Processing Technology Office, and it also helped influence Lawrence Roberts to adopt the technology when Taylor put him in charge of developm ent of the ARPANET. Baran’s packet switching work similar to the research performed independently by Donald Davies at the National Physical Laboratory, UK. In 1965, Davies developed the concept of packet switched networks and proposed development of a U. K. wide network. He gave a talk on the proposal in 1966, after which a person from Ministry of Defense told him about Baran’s work.At the 1967 ACM Symposium on operating system principles, Davies and Robert bringing the two groups together. Interestingly, Davies had be chosen some of the same parameters for his original network design as Baran, such as a packet size of 1024 bits. Roberts and the ARPANET team took the name â€Å"packet switching† itself from Davies work. In 1970, Davies helped build a packet switched network called Mark I to serve the NPL in the UK. It was replaced with the Mark II in 1973, and remained in operation until 1986, influencing other packet communications research in UK and Europe[5]. 3) COMPARISON BETWEEN CIRCUIT AND PACKET SWITCHINGCircuit Switching: In circuit switching a message path or data communication path or channel or circuit is dedicated to an entire message block during the process of message transmission. The entire bandwidth is dedicated to the said message as it were, and before any data transmission can take place circuit initialisation and setup has to be done to enable or determine the avalaibility of the link as in trying to make a call using the telephon line for voice messaging or even dial-up procedure where you need to establsih that the line is free for use in the first place; and then have the line engaged all through your time of use.All the message travel through the same path and keep the link engaged all the while when the block of message is been relayed or transmitted. In circuit switching, whole of the data travels along a single dedicated path between the two terminals whereas in datagram switching data is divided into packets an d each of these packets are treated indepently and travel along different paths, source and destination being the same. Circuit switching concept is used in Telephony networks where a dedicated line is assigned to particular connection, the connection in this case is permanent during the connection.Considerable amount of bandwidth is wasted in this process and at a time only one way communication is possible. Circuit switching is done at physical layer whereas datagram switching is generally done at network layer. Circuit switching requires the resources to be reserved before the transmission of data but datagram switching doesn’t require such reservation of resources. Advantages: 1. Fixed delays, because of the dedicated circuit – no interference and no sharing. 2. Guaranteed continous service, also because of the dedicated circuit. . Guaranted the full bandwidth for the duration of the call. Disadvantages: 1. Takes a relatively long time to set up the circuit. 2. Dif ficult to support variable data rates and is not efficient for burst traffic. The equipment may be unused for a lot of call, if no data is being sent the dedicated line still remains open. 3. During crisis or disaster, the network may become unstable or unavailable. 4. It was primarily developed for voice traffic rather than data traffic. Packet Switching:In packet switching the block of data is split into small units with each unit having a sequence number attached to it for orderly identification within a given message block and these different units are usaully sent across the available diffrent links or channels of data transmission from one end to the other end point where they arrvive at different times but have to be assembled together in the correct order at this location via the sequence numbers to get out the original message back without any data degredation occuring as a result of the different paths of transmissions from source to destination.Also no single data channel is dedicated to any given message block in the course of transmission as many units of different messages can be multiplexed and then get demultiplexed at their deffferent destinations correctly since there are codes to differentiate each unit of message, resulting to no conflict at all. Packet switching splits messages into small units and transmitting them to destination using different paths while at the same time keeping tracks or maintaining an orderliness of the units for proper and correct reassembling of the units to get the original message back.Packet switching is generally used in Internet data transmmission where we send data without minding if the link is free or not as far as we are connected and the pieces of information that we sent are then split into smaller units and then sent in packets, with each packets switched through different data channel most times and with no loss at the end. The main advantage of packet-switching is that it permits â€Å"statistical mu ltiplexing† on the communications lines. The packets from many different sources can share a line, allowing for very efficient use of the fixed capacity.With current technology, packets are generally accepted onto the network on a first-come, first-served basis. If the network becomes overloaded, packets are delayed or discarded (â€Å"dropped†)[6]. Advantages: 1. Since packet are typically short, the communication links between the nodes are only allocated to transferring a single message for a short period of time while transmitting each packet. Longer messages require a series of packets to be sent but do not require the link to be dedicated between the transmission of each packet.The implication is that packets belonging to other messages may be sent between the packets of the message being sent from one node to other node. This provides a much fairer sharing of the resources of each of the links. 2. The ability to do statistical multiplexing which can exploit the i nherent â€Å"burstiness† in many data applications and thereby enable sharing of the network resources more efficiently among multiple data streams is a major advantage. 3. Pipelining†- This simultaneous use of communications links represents a gain in effieciency, the total delay for transmission across a packet network may be considerebly less than for message switching, despite the inclusion of a header in each packet rather than in each message. Disadvantages: 1. Packets arriving in wrong order. 2. Under heavy use there can be delay. 3. Protocols are needed for a reliable transfer. 4. Not so good for some types data streams. Real-time video streams can lose frames due to the way packets arrive out of sequence[7]. ) PERFORMANCE ANALYSIS Circuit Switching In circuit switching, a unique connection is used to move data between the two end user[8]. â€Å"Circuit-Switched type networks† are most commonly portions of the ubiquitous telephone networks to which we ar e all accustomed. In these networks, which generally transmit voice or data, a pribate transmission path is established between any pair or group of users attempting to communicate and is held as long as transmission is required.Telephone networks are typically circuit switched, because voice traffic requires the consistent timing of a single, dedicated physical path to keep a constant delay on the circuit. Figure 2: Example of circuit switching Figure 3: Public circuit switching network Subcribers: The device that attach to the network. Subscriber loop: The link between the subscriber and the network. Exchanges: The switching centers in the network. End office: The switching center that directly supports subscribers. Trunks: The branches between exchanges. They carry multiple voice-frequency circuit using either FDM or synchronous TDM.Figure 4: Circuit establishment Basic performance equation for a single link in a circuit-switched network: Let’s consider a system with N cir cuits on a single link, with customers arriving according to a Poisson process at rate ? customers per second, and with successful customers having a mean holding time of h seconds, distributed as a negative exponential distribution with parameter ? = 1/h. If a customer attempting a new call finds all the circuits busy, there are no waiting places, so we’ll assume that the customer just goes away and forgets about making the call.Define the state of our system by the random variable K, where K represents the number of customers currently in the system, then K can take on any integer value in the range from 0 to N. With these assumptions, our model is simply a state-dependent queue, with arrival rate (independent of the state), and service rate i when the system is in state K=i. This is known as an M/M/N/N queue: Markovian arrivals, Markovian service time, N servers, and a maximum of N customers in the system. We can draw the following Markov chain diagram to represent the sy stem.When there are I customers the service rate is i , which is due to the fact that there are i customers, each with a service rate ? , so the total service rate is i. Figure 5: Markov chain diagram Under conditions of statistical equilibrium, the solution is: pi=AiN! j=0NAjj! Observe that this is simply a truncated Poisson distribution and also the result depends on the traffic A, and not the specific values of ? and ?. To establish a path in circuit switching three consecutive phases are required: 1. Connection establishment. 2. Data transfer. 3.Connection teardown. Elements of a circuit-switch node (Figure 6): * Digital Switch: Provides a trasnparent signal path between any pair of attached devices. * Control Unit: Establishes, maintains and tears down connections. * Network Interface: Functions and hardware needed to connect digital and analog terminals and trunk lines. Figure 6: Circuit switch element Packet Switching In packet switching, data are broken into packets of fixed or variable size, depending on the protocol used. The performance of packet switching is called best effort performance.If you transmit from sender to receiver, all the network will do its best to get the packet to the other end as fast as possible, but there are no guarantees on how fast that packet will arrive. Figure 7: Example of packet switching Packet switching is used to optimize the use of the channel capacity available in digital telecommunication networks such as computer networks, to minimize the transmission latency, the time it takes for data to pass across the network. It is also used to increase robustness of communication. These layers are introduced to break down the complexity of communications.The top layer (layer 7) is the layer at user level. As the layers go down, they get increasingly primitive. Layer is most primitive from as it is just binary numbers prepared to be transmit to the end node. Seven layers of open systems interconnection models are shown in ta ble 1[7]: Layer Number| Name| Description| 1| Pysical Layer| Deals with physical connection between nodes in network. | 2| Data Link Layer| Maintaining and optimising actual connection. | 3| Network Layer| Deals with communication of data on a network. | 4| Transportation Layer| Sequencing, error detection and optimisation of communication. 5| Session Layer| Controls the communication between applications running on end nodes. | 6| Presentation Layer| Format data and provides syntaxes for application. | 7| Application Layer| Contains management functions. | Table 1: Layers of open systems interconnection model Every packet contain some control information in its header, which is required for routing and other purposes. Figure 8: Packet data format Initially, transmission time decreases as packet size is reduced. But, as packet size is reduced and the payload part of a packet becomes comparable to the control part, transmission time increases.Figure 9: Variation of transmission time with packet size. As packet size is decreased, the transmission time reduces until it is comparable to the size of control information. There is a close relationship between packet size and transmission time as shown in Figure 9. In this case it is assumed that there is a virtual circuit from station X to Y through nodes a and b. Times required for transmission decreases as each message is divided into 2 and 5 packets. However, the transmission time increases if each message is divided into 10 packets[9].The packet switched networks allow any host to send data to any other host without reserving the circuit. Multiple paths between a pair of sender and receiver may exist in a packet switched network. One path is selected between source and destination. Whenever the sender has data to send, it converts them into packets and forwards them to next computer or router. The router stores this packet till the output line is free. Then, this packet is transferred to next computer or router ( called as hop). This way, it moves to the destination hop by hop. All the packets belonging to a transmission may or may not take the same route.The route of a packet is decided by network layer protocols. As we know there are two approaches for packet switching which are: 1. Datagram switching, 2. Virtual circuit swtiching. 1. Datagram Switching: Each packet is routed independently through network which is also called connectionless packet-switching. Datagram packet switching sends each packet along the path that is optimal at the time the packet is sent. When a packet traverses the network each intermediate station will need to determine the next hop. Routers in the internet are packet switches that operate in datagraam mode.Each packet may travel by a different path. Each different path will have a different total transmission delay (the number of hops in the path may be different, and the delay across each hop may change for different routes). Therefore, it is possible for the p ackets to arrive at the destination in a different order from the order in which they were sent[10]. Figure 10: Datagram packet switching Figure 11: Delay in datagram packet switching There are three primary types of datagram packet switches: * Store and forward: Buffers data until the entire packet is received and checked for errors.This prevents corrupted packets from propagating throughout the network but increases switching delay. * Fragment free: Filters out most error packets but doesn't necessarily prevent the propagation of errors throughout the network. It offers faster switching speeds and lower delay than store-and-forward mode. * Cut through: Does not filter errors; it switches packets at the highest throughput, offering the least forwarding delay. 2. Virtual Circuit Switching: Virtual circuit packet switching (VC-switching) is a packet switching technique which merges datagram packet switching and circuit switching to extract both of their advantages.VC switching is a v ariation of datagram packet switching where packets flow on so-called logical circuits for which no physical resources like frequencies or time slots are allocated shown in Figure 12. Each packet carries a circuit identifier, which is local to a link and updated by each switch on the path of the packet from its source to its destination[10]. A virtual circuit is defined by the sequence of the mappings between a link taken by packets and the circuit identifier packets carry on this link. In VC-switching, routing is performed at circuit establishment time to keep packet forwarding fast.Other advantages of VC-switching include the traffic engineering capability of circuit switching, and the resources usage efficiency of datagram packet switching. Nevertheless, a main issue of VC-Switched networks is the behavior on a topology change. As opposed to Datagram Packet Switched networks which automatically recompute routing tables on a topology change like a link failure, in VC-switching all virtual circuits that pass through a failed link are interrupted. Hence, rerouting in VC-switching relies on traffic engineering techniques[6].Figure 12: Virtual circuit packet switching Figure 13: Delay on packets in virtual-packet switching 5) APPLICATION OF CIRCUIT AND PACKET SWITCHING Circuit Switching 1. Plain Old Telephone Service (POTS) The plain old telephone system (POTS) is the largest circuit switched network. The original  GSM  network is also circuit switched. Prior to the existence of new types of networks, all communication systems had to be built based on the existing telecommunications facilities, which were largely oriented to what the common carriers refer to as plain old telephone service, known as POTS.Consequently, even today, in order to use POTS for data communications, it is necessary to use a modem to convert the data to a form suitable for voice-transmission media. The data transmission rate that can be obtained over a POTS connection is typically les s than 64 Kbps. These rates are adequate for text and audio transmission. However, they are not suf? cient for good quality video transmission in real-time. 2. Switched 56 Service Switched 56 service is a dial-up digital service provided by local and long distance telephone companies. For a connection, a data service unit/data channel unit (DSU/CSU) is used instead of a modem.Switched 56 service uses a 64 Kbps channel, but one bit per byte is used for band signaling, leaving 56 Kbps for data. This service allows the transmission of information over one or two twisted cable pairs to multiple points at a data rate of 56 Kpbs. 3. Integrated Services Digital Network (ISDN) The ISDN was designed in the 1980s to offer end-to-end digital connectivity, while providing the required QoS with data rates in the range of Kbps to Mbps over switched connections. In order to provide even higher data rates, the original ISDN was extended to broadband ISDN (BISDN) (Martin, 1985).The ISDN services are provided to users as ISDN interfaces, each comprising a number of ISDN channels. Using 64-Kbps channels, called bearer or B channels, ISDN provides access to the digital network. ISDN provides lower error rate compared to typical voiceband modems and a relatively high bandwidth data channel[11]. Packet Switching 1. VOIP It is becoming increasingly accepted to transmit delay sensitive data through a packet switched network (rather than circuit switched). There are protocols that can create a virtually real-time environment – which, for voice conversations, is sufficient.Voice over IP is essentially a voice signal encoded into a digital format, being sent through a packet switched network (or possibly any other network) using the Internet Protocol (IP). Over recent years there have been standards developed and supported by major companies including ITU-T H. 323. VOIP has a long way to evolve before it is used as widespread as circuit switched networks, but it is well on its wa y. 2. IPv6 The current protocol that is employed almost everywhere IP (IPv4) has come to the end of its useful life. This is mainly because it has run out of addresses to uniquely identify every non-private computer in the world.IPv6 has been deigned to be more efficient than IPv4 and solve the addressing problems that we face at present. Ipv6 will use 128 bits to address nodes, which provides 2128possibilities (roughly3. 4? 1038). It will incorporate a special ‘option mechanism’ to store optional headers in the transport layer (to maximize efficiency by reducing required space). Finally, Ipv6 will have support for resource allocation, allowing packets to be part of a ‘traffic flow’ which will provide better communication of data such as video/voice streams [VOIP]. 6) CONCLUSION In large networks there might be multiple paths  linking sender and receiver.Information may be switched as it travels through various communication channels. Data networks can be classified as using circuit-switching or packet-switching. Packet switching, which forms the basis of the Internet, is a form of statistical multiplexing in which senders divide messages into small packets. The switching centers receive the control signals, messages or conversations and forwards to the required destination, after necessary modification link amplification if necessary. In computer communication, the switching technique used is known as packet switching or message switch (store and forward switching).In telephone network the switching method used is called circuit switching. Circuit switching  is a technique that directly connects the sender and the receiver in an  unbroken path. In the modern and fast paced world, what we are looking for is efficiency, low costs and reliability and packet-switched networks seems to fulfill most of the criteria that the society is looking for. It would only be a matter of time before circuit switching becomes a thing of the past. 7) REFERENCES [1] Stallings, W. , Data and Computer Communications, 7th ed. 1999, Upper Saddle River, NJ: Prentice Hall. [2] Notes. com, C.What is Switching. Available from: http://ecomputernotes. com/computernetworkingnotes/computer-network/what-is-switching. [3] ABC, T. , Circuit Switching. 2005. [4] Jia, S. and G. Wang. Network performance analysis of packet-switching C;sup;3;/sup; system. in TENCON '89. Fourth IEEE Region 10 International Conference. 1989. [5] Wikipedia, Packet Switching, 2012, Wikipedia. [6] Torlak, P. M. , Telecommunication Switching and Transmission. Packet Switching and Computer Networks: UTD. [7] Heng Zheng Hann, C. Y. Y. , Fareezul Asyraf, Farhana Binti Mohamad, Fong Poh Yeee, Circuit Switching vs Packet Switching, C.Y. Y. Heng Zheng Hann, Fareezul Asyraf, Farhana Binti Mohamad, Fong Poh Yeee, Editor, Wikibooks. [8] Gebali, F. , Analysisof Computer and Communication. Switches and Routers2008, New York, USA: Springer. [9] Kharagpur, I. , Switching Techniqu es: Circuit Switching, CSE. [10] Notes. com, C. Datagram Packet vs. Virtual Packet. Available from: http://ecomputernotes. com/computernetworkingnotes/switching/distinguish-between-datagram-packet-switching-and-virtual-circuit-switching. [11] Dr. Farid Farahmand, D. Q. Z. , Circuit Switching. 2007.