.

Monday, September 30, 2019

Explain the Potential Effects of Five Different Influences on an Individual

Explain the effects of five different life stages on the development of an individual. In today’s society it is almost impossible to grow up without being affected by the things around us. During an individual’s development there are five main key factors that affect them. These include: * Genetic factors * Socio- economic factors * Biological factors * Lifestyle factors * Environmental factors To begin with, there are 23 chromosomes in each cell found in the nucleus.It is these cells that determine the hereditary of a child as well as the sex during conception. Genetic diseases make up a large proportion of the total disease burden, for example 50% of deafness is due to genetics as well as 40-50% of miscarriages. Another disease that is generally caused by genetics is cystic fibrosis which is caused by a defective gene. As many as four people in the UK have this gene; however the gene is recessive meaning children will only get the gene if both parents are carriers. Cy stic fibrosis results in a sticky mucus forming in the lungs, pancreas and intestines, and in the past it meant a low life expectancy but today a lot can be done to solve this. In relation to Jason asthma also seen as a genetic disease and Jason’s development of asthma could be a result of his Mother smoking of drinking during pregnancy. However the causes of asthma may not just be due to genetic inheritance but also due to environmental factors which I will further later in the essay. Closely related to this and sometimes somewhat confused are biological factors.Biological factors also start from conception and one of these is Foetal Alcohol Syndrome (FAS) which is the biggest cause of mental handicap in the western world as well as the only one that is 100% preventable. The first stages in prenatal are the most important and again this relates to Jason as one of the effects of FAS is falling behind with leaning development and Jason found school hard to cope with but in the end caught up, however this could be as a result of many reason and it does not mean his mother consumed alcohol during pregnancy. A woman’s diet also affects the foetus as well as during breast eeding, research shows that if a mother had a high sugar diet her child is more likely to develop high cholesterol and a higher risk of heart disease in later life. Malnutrition or a lack of health food could also lead to poor health for the child in later life Jason’s mother also could have smoke during pregnancy leading to his asthma. Socioeconomic factors also heavy a heavy impact on development for example if a family is poor there is a higher risk a child will suffer from malnutrition as well as the fact in later life they will want to do better.Within the factor is values and attitudes, a prime example of this would be education, if parents have went to college they will more than likely want their children to as well, however it could also be argued that if parent haven ’t went to college they will want their children to achieve more in life than they did. In relation to Jason although he may want to go to college he may not be able to as he does not come from a well off family and may not be able to afford to do so. Continuing on from this is Lifestyle factors, which is a highly varied subject.For example a person who has been brought up in a poor household will be completely different that one brought up in a well off household. Nutrition and dietary is a big part of this however it is only if you are reasonably well off that you can afford to buy the healthier choices. As well as this alcohol intake and the misuse of substances can affect you and this happens to be on of the most controversial issues in society. It can have social, physical and mental effects on an individual from the expense, to long term health risks or the fact it could lead to depression.In relation to Jason’s lifestyle the fact he may not be able to afford col lege and the fact he lives in a high density housing estate may mean he is not that well off money wise meaning he may not get the healthiest foods and could also have been bullied not only as a result of his asthma but also as he cannot afford the things some of the other children could. Lastly is environmental factors, this has a huge impact on our development and research shows that 1 out of 5 children are malnourished. However this is a varied range of situations.Exposure to pollution as well as poor housing can lead to health problems for example carbon monoxide takes away oxygen from the red blood cells as they have a higher affinity for it which can then lead to heart disease and nitrogen and sulphur dioxide can lead to lung disease as these gases irritate the lungs. This is not the only environmental effect however, Jason got bullied a lot at school which means he could suffer from depression and will have low self-esteem in later life. As well as this fact when he was 8 his parents divorced which leaves a great mental effect on individuals and at his age it was a lot to go through.Separation can lead to anger issues for the child as well as abandonment issues and this could even go on to affect Jason in later life it could even lead to AD (anxiety disorder) which could be as the child’s routine is disrupted. Jason’s parents’ divorce may be the reason he fell behind at school and when he reached adolescence he adapted which may be why his school work improved. Environmental factors can affect development both physically and mentally. In conclusion all five factors can affect an individual’s development as shown through the example of Jason, and all five have different effects yet still equally importantBibliography * http://www. livestrong. com/article/217996-factors-affecting-early-child-development/ *http://www. psychologytoday. com/blog/surviving-your-childs-adolescence/201112/the-impact-divorce-young-children-and-adolesc ents *http://www. ucl. ac. uk/support-pages/information/alcohol-and-drug-abuse *http://www. lbl. gov/Education/ELSI/Frames/pollution-health-effects-f. html *http://uk-air. defra. gov. uk/air-pollution/effects *http://www. succeedsocially. com/lifestyle *Class notes *Moodle

Sunday, September 29, 2019

The Computer Technology

Computers are capable of doing more things every year. There are many advantages to knowing how to use a computer, and it is important that everyone know how to use them properly. Using the information I have gathered, and my own knowledge from my 12 years of computer experience, I will explain the many advantages of owning a computer and knowing how to use a PC and I will attempt to explain why you should purchase a computer and learn how to use one properly. Webster's New World Compact Dictionary defines a computer as â€Å"an electronic machine that performs rapid, complex calculations or compiles and correlates data† (â€Å"Computer. ). While this definition gives one a very narrow view of what a computer is capable of doing, it does describe the basic ideas of what I will expand upon. We have been living through an age of computers for a short while now and there are already many people world wide that are computer literate. According to Using Computers: A Gateway to Information World Wide Web Edition, over 250 million Personal Computers (PC's) were in use by 1995, and one out of every three homes had a PC (Shelly, Cashman,& Waggoner, 138). Computers are easy to use when you know how they work and what the parts are. All computers perform the four basic operations of the information processing cycle: input, process, output, and storage. Data, any kind of raw facts, is required for the processing cycle to occur. Data is processed into useful information by the computer hardware. Most computer systems consist of a monitor, a system unit which contains the Central Processing Unit (CPU), a floppy-disk drive, a CD-ROM drive, speakers, a keyboard, a mouse, and a printer. Each component takes a part in one of the four operations. The keyboard and mouse are input devices that a person uses to enter data into the computer. From there the data goes to the system unit where it is processed into useful information the computer can understand and work with. Next the processed data can be sent to storage devices or to output devices. Normally output is sent to the monitor and stored on the hard-disk or to a floppy-disk located internal of the system unit. Output can also be printed out through the printer, or can be played through the speakers as sound depending on the form it takes after it is processed. Once you have grasped a basic understanding of the basic parts and operations of a computer, you can soon discover what you can do with computers to make life easier and more enjoyable. Being computer literate allows you to use many powerful software applications and utilities to do work for school, business, or pleasure. Microsoft is the current leading producer of many of these applications and utilities. Microsoft produces software called operating systems that manage and regulate the information processing cycle. The oldest of these is MS-DOS, a single user system that uses typed commands to initiate tasks. Currently Microsoft has available operating systems that use visual cues such as icons to help enter data and run programs. These operating systems are ran under an environment called a Graphical User Interface (GUI's). Such operating systems include Windows 3. xx, Windows 95, and Windows NT Workstation. Windows 95 is geared more for use in the home for productivity and game playing whereas Windows NT is more business orientated. The article entitled â€Å"Mine, All Mine† in the June 5, 1995 issue of Time stated that 8 out of 10 PC's worldwide would not be able to start or run if it were not for Microsoft's operating systems like MS-DOS, Windows 95, and Windows NT (Elmer-Dewitt, 1995, p. 50). By no means has Microsoft limited itself to operating systems alone. Microsoft has also produced a software package called Microsoft Office that is very useful in creating reports, databases, spreadsheets, presentations, and other documents for school and work. Microsoft Office: Introductory Concepts and Techniques provides a detailed, step-by-step approach to the four programs included in Microsoft Office. Included in this package are Microsoft Word, Microsoft Excel, Microsoft Access, and Microsoft PowerPoint. Microsoft Word is a word processing program that makes creating professional looking documents such as announcements, resumes, letters, address books, and reports easy to do. Microsoft Excel, a spreadsheet program, has features for data organization, calculations, decision making, and graphing. It is very useful in making professional looking reports. Microsoft Access, a powerful database management system, is useful in creating and processing data in a database. Microsoft PowerPoint is â€Å". . a complete presentation graphics program that allows you to produce professional looking presentations† (Shelly, Cashman, & Vermaat, 2). PowerPoint is flexible enough so that you can create electronic presentations, overhead transparencies, or even 35mm slides. Microsoft also produces entertainment and reference programs. â€Å"Microsoft's Flight Simulator is one of the best selling PC games of all time† (Elmer-Dewitt, 50). Microsoft's Encarta is an electronic CD-ROM encyclopedia that makes for a fantastic alternative to 20 plus volume book encyclopedias. In fact, it is so popular, it outsells the Encyclopedia Britannica. These powerful business, productivity, and entertainment applications are just the beginning of what you can do with a PC. Knowing how to use the Internet will allow you access to a vast resource of facts, knowledge, information, and entertainment that can help you do work and have fun. According to Netscape Navigator 2 running under Windows 3. , â€Å"the Internet is a collection of networks, each of which is composed of a collection of smaller networks† (Shelly, Cashman, & Jordan, N2). Information can be sent over the Internet through communication lines in the form of graphics, sound, video, animation, and text. These forms of computer media are known as hypermedia. Hypermedia is accessed through hypertext links, which are pointers to the computer where the hypermedia is stored. The World Wide Web (WWW) is the collection of these hypertext links throughout the Internet. Each computer that contains hypermedia on the WWW is known as a Web site and has Web pages set up for users to access the hypermedia. Browsers such as Netscape allow people to â€Å"surf the net† and search for the hypermedia of their choice. There are millions of examples of hypermedia on the Internet. You can find art, photos, information on business, the government, and colleges, television schedules, movie reviews, music lyrics, online news and magazines, sport sights of all kinds, games, books, and thousands of other hypermedia on the WWW. You can send electronic mail (E-Mail), chat with other users around the world, buy airline, sports, and music tickets, and shop for a house or a car. All of this, and more, provides one with a limitless supply of information for research, business, entertainment, or other personal use. Online services such as America Online, Prodigy, or CompuServe make it even easier to access the power of the Internet. The Internet alone is almost reason enough to become computer literate, but there is still much more that computers can do. Knowing how to use a computer allows you to do a variety of things in several different ways. One of the most popular use for computers today is for playing video games. With a PC you can play card games, simulation games, sport games, strategy games, fighting games, and adventure games. Today's technology provides the ultimate experiences in color, graphics, sound, music, full motion video, animation, and 3D effects. Computers have also become increasingly useful in the music, film, and television industry. Computers can be used to compose music, create sound effects, create special effects, create 3D life-like animation, and add previous existing movie and TV footage into new programs, as seen in the movie Forrest Gump. All this and more can be done with computers. There is truly no time like the present to become computer literate. Computers will be doing even more things in the future and will become unavoidable. Purchasing and learning about a new PC now will help put PC's into the other two-thirds of the homes worldwide and make the transition into a computer age easier.

Saturday, September 28, 2019

History Of Popular Culture

In Early Modern Europe festivals were the setting for heroes and their stories, to be celebrated by the populace. They posed a change from their everyday life. In those days people lived in remembrance of one festival and in expectance of the next. Different kinds of festivals were celebrated in different ways. There were festivals that marked an individual occasion and weren’t part of the festival calendar, like family festivals such as weddings and christenings. Some took place at the same time every year and ere for everyone, like community festivals like the different saints’ days. Pilgrimages took place all year round. Annuals festivals like Christmas and Midsummer always took place on the same day every year. In those days the average village in Western Europe celebrated at least 17 festivals annually, not counting family occasions and saints’ days. Some festivals, such as Carnival, lasted several days or sometimes even several weeks. In the Netherlands Carnival started every year at the 11th of November (St. Martin) and culminated in a big festival of ‘Dranck, pleijsier ende vrouwen’ (Drink, fun and women) at the end of the Carnival eriod, preceding the period of Lent. Festivals were meant to take the minds of the people off their everyday life, off the hard times and their work. Everyday life in Early Modern Europe was filled with rituals, both religious and secular. Songs and stories played an important role in their lives, although they sometimes adjusted the details of the legends and stories to fit the way they thought a certain festival should take place. Popular culture was mixed with ecclesiastical culture in many ways. The story of St. John the Baptist is a good example of this. The ancient ritual f bathing and lighting fires during Midsummer’s Eve was a remnant of a ritual from the pre-Christian period. Fire and water, symbols of purification, could be seen as the tools of St. John the Baptist, and therefore a combination of the two elements of popular and ecclesiastical culture was obvious. It looks as if the Medieval Church took over the festival and made it theirs. The same thing happened to the Midwinter Festival, which became linked with the birth of Christ, on 25 December. There are many more examples to be found, such as the connection between St. Martin and geese caused by the fact that the St. Martins Day (11 November) coincided with the period during which the people used to kill their geese in the period preceding the Christian period. Carnival plays a special role in popular culture in Early Modern Europe. It is a great example of a festival of images and texts. It was a popular festival, taking on different forms in different regions of Europe. Aside from regional variations, these differences were also caused by factors such as the climate, the political situation and the economical situation in an area. On a whole Carnival started in late December or early January and reached ts peak upon approaching Lent. The actual feast, taking place at the end of the festive period, could take days and would usually involve large quantities of food and drinks. The festival took place in the open air in the centre of a town or city. Within a region, the way Carnival was celebrated varied from town to town. The festival was a play, with the streets as a stage and the people as actors and spectators. They often depicted everyday life scenes and made fun of them. Informal events took place throughout the Carnival period. There was massive eating and drinking, as a way of ’stocking up’ for Lent. People sang and danced in the streets, using the special songs of Carnival, and people wore masks and fancy-dress. There was verbal aggression, insults were exchanged and satirical verses were sung. More formally structures events were concentrated in the last days of the Carnival period. These events took places in the central squares and were often organised by clubs or fraternities. The main theme during Carnival was usually ‘The World Upside Down’. Situations got turned around. It was an enactment of the world turned upside down. Men dressed up as women, women dressed up as men, the rich traded places with the poor, etc. There was physical reversal: people standing on their heads, horses going backwards and fishes flying. There was reversal of relationships between man and beast: the horse shoeing the master or the fish eating the fisherman. The other reversal was that of relationships between men: servants giving orders to their masters or men feeding children while their wives worked the fields. Many events centred on the figure of ‘Carnival’, often depicted as a fat man, cheerful and surrounded by food. The figure of ‘Lent’, for contrast, often took the form of a thin, old woman, dressed in black and hung with fish. These depictions varied in form and name in the different regions in Europe. A recurring element was the performance of a play, usually a farce. Mock battles were also a favourite pass-time during the Carnival period. Carnival usually ended with the defeat of ‘Carnival’ by ‘Lent’. This could happen in the form of the mock trial and execution of ‘Carnival’, (Bologna, Italy, 16th century), the beheading of a pig (Venice, Italy), or the burial of a sardine (Madrid, Spain). So what was the meaning of Carnival in Early Modern Europe? Was it merely an excuse for the populace to go crazy or did Carnival have a deeper eaning hidden behind the facade of food, violence and sex? Carnival was a holiday, a game. It was a time of ecstasy and liberation. The form was determined by three major themes: food, sex and violence. It was the time of indulgence, of abundance. It was also a time of intense sexual activity – tables of the seasonal movement of conceptions in 18th century France show a peak around February. Carnival was also a festival of aggression, destruction and desecration. It was the ideal time to insult or pester people who had wronged someone, often in the form of a mock battle of a football match. A time for paying off old grudges. Serious violence was not avoided and in most areas the rates of serious crimes and killings went up during Carnival. It was also a time of opposition, in more than one way. It opposed the ecclesiastical ritual of Lent. Lent was a period of fasting and abstinence of all things enjoyed by the people, not just food and drink but also sex and recreation. The elements that were taken out of life during Lent were emphasised during Carnival. All that was portrayed by the figures of ‘Carnival’ and ‘Lent’ (fat versus thin). Carnival was polysemous, meaning different things to different people in ifferent areas. In different regions, different heroes were celebrated. Sometimes elements were taken over from other regions. Carnival did not have the same importance all over Europe. In the north of Europe (Britain, Scandinavia) it was less important than in the rest of Europe. This was probably partly due to the climate which discouraged an elaborate street festival at that time of the year. In these regions, people preferred to elaborate the festivities during the Midsummer festival (St. John’s Eve). Two reasons for this are the pagan survivals that were stronger in these regions, partly because they were solated from the rest of Europe due to geographical obstacles, causing a lesser ecclesiastical influence, and the climatic situation as mentioned above. Carnival was a festival in extremis, but elements of Carnival can be found in every festival that was celebrated in Early Modern Europe. During the harvest season, all over Europe festivals and rituals were held. The harvest was celebrated, again, with elaborate drinking and eating, although in a more moderate way than the Carnival celebrations. All these festival had one thing in common: they offered the people an escape from their everyday life and a way to express themselves. It offered the people a way to vent their resentments and some form of entertainment. Festivals were an escape from their struggle to earn a living. They were something to look forward to and were a celebration of the community and a display of its ability to put on a good show. It is said that the mocking of outsiders (the neighbouring village or Jews) and animals might be seen as a dramatic expression of community solidarity. Some rituals might be seen as a form of social control, in a sense that it was a means for a community to express their discontent with certain embers of the community (charivari). The ritual of public punishment can be seen in this light, as it was used to deter people from committing crimes. Professor Max Gluckman used the African popular culture to explain the social function of the ritual of reversal of roles as it happened during rituals as Carnival. Similar rituals still occur in certain regions in Africa. Gluckman explains this ritual as an emphasis of certain rules and taboos through lifting them for a certain period of time. The apparent protests against the social order were intended to preserve and even to trengthen the established order. As a counter example Gluckman states that: â€Å"? in regions where the social order is seriously questioned, ‘rites of protest’ do not occur. † Riots and rebellions frequently took place during major festivals. Rebels and rioters employed rituals and symbols to legitimise their actions. Inhibitions against expressing hostility towards the authorities or individuals were weakened by the excitement of the festival and the consumption of large quantities of alcohol. If those factors were combined with discontent over a bad harvest, tax increases or other calamities, this ituation could get out of control. It could prove a good opportunity for people excluded from power to try and enforce certain changes. It is hardly surprising that members of the upper classes often suggested that particular festivals ought to be abolished. They felt threatened by the populace who during festivals tried to revolt against the ruling classes and change the economical situation they were in. The reform of popular festivals was instigated by the will of some of the ‘educated’ to change the attitudes and values of the rest of the population († to improve them†). This reformation took on different forms in different regions and it took place at different moments in time. There were also differences in the practices that were being reformed. Catholics and Protestants opposed to different elements of popular festivals and they did so for different reasons. Even within the Protestant movement, the views towards reformation of festivals and popular rituals varied. Missionaries on both sides worked in Europe to install their religious values in the local people. Reformers on both sides objected in particular to certain elements in popular religion. Festivals were part of popular religion or were at least disguised as an element of popular religion. The festival of Martinmas (11 November) was a good example of this. What were the objections of the authorities against these elements of popular culture in general and popular religion in particular? There were two essential religious objections. Firstly, the majority of festivals were seen as remnants of ancient paganism. Secondly, the festivals offered the people an occasion to over-indulge in immoral or offensive behaviour, at many occasions attacking the establishment (both ecclesiastical and civil). The first objection meant that reformers disliked many of the popular customs because they contained traces of ancient customs dating from pre-Christian times. Protestant reformers went very far in their objections, even denouncing a number of Catholic rituals as being pre-Christian survivals, considering the saints as successors of pagan gods and heroes, taking over their curative and protective functions. Magic was also considered a pagan remnant: the Protestants accused the Catholics of practising a pagan ritual by claiming that certain holy places held magical powers and could cure people. The reformers denounced the rituals they didn’t find fitting as being irreverent and blasphemous. Carnival and the charivaris were considered â€Å"the work of the devil†, because it made a mockery of certain godly elements the Church held sacred. The reformers thought people who didn’t honour God in their way to be heathen, doomed to spend their afterlife in eternal damnation. Flamboyance was to be chased out of all religious aspects of culture, and, where possible, out of all other aspects of life, according to the Protestant doctrine. In some areas, gesturing during church services was banned, as was laughter. All these things were seen as irreverent, making a mockery of religion. All these changes were introduced in order to create a sharper separation between the ’sacred’ and the ‘profane’. The ecclesiastical authorities were out to destroy the traditional familiarity with the sacred because â€Å"familiarity breeds irreverence. The objection against popular recreations stemmed from the idea that they were ‘vanities’, displeasing God because they were a waste of time and money and distracted people from going to church. This objection was shared by both the ecclesiastical and civil authorities. The latter mainly bjected because it distracted the populace from their work, which in turn affected the revenues of the leading upper classes, or from other activities that were benefiting the rich, reasons that would vary per region. Catholic and Protestant reformers were not equally hostile to popular culture, nor were they hostile for quite the same reasons. Protestant reformers were more radical, denouncing festivals as relics of popery and looking to abolish feast-days as well as the feast that came with it, because they considered the saints that were celebrated during these festivals as remnants of a pre-Christian era. Many of these Protestant reformers were equally radical in their attacks on holy images, which they considered ‘idols’. During the end of the 16th and the first half of the 17th century Dutch churches were pillaged by Protestants trying to destroy all religious relics and images (de Beeldenstorm). Catholic reformers were more modified in their actions; they tried to reach a certain modification of popular religious culture, even trying to adapt certain elements to the Catholic way of worshipping and incorporating popular elements into their religion. They insisted that some times were holier than others, and they id object to the extend to which the holy days were celebrated with food and drink. Some argued that it was impossible to obey the rites of Lent with proper reverence and devotion if they had indulged in Carnival just before. Catholic reformers also installed rules in order to regulate certain popular festivals and rituals, such as a prohibition on dressing up as a member of the clergy during Carnival or a prohibition on dancing or performing plays in churches or churchyards. Contrary to the Protestant reformers however, the Catholic reformers did not set out to abolish estivals and rituals completely. Civil authorities had their own reasons to object to popular festivals in Early Modern Europe. Apart from taking the people away from work or other obligations, the authorities feared that during the time of a festival, the abundance of alcohol could stir up the feelings of discontent the people had been hiding all throughout the year. Misery and alcohol could create a dangerous mix that would give people the courage they needed to rebel against authorities. This was a good reason for the authorities to try and stop, or at least control, popular festivals.

Friday, September 27, 2019

Research Proposal Form Dissertation Example | Topics and Well Written Essays - 2500 words

Research Proposal Form - Dissertation Example In 1974, being the earliest legal opportunity, majority of the 16-year old British boys left full-time education. The driving force behind differentials in earnings at given levels of experience is the variation in years of schooling prior to labour market entry depicted in the simplest human capital model. But this model is inapplicable for the majority of young people in Britain because they have no schooling beyond the compulsory level. Therefore, it is essential to determine the big variation of success in the labour market regarding this group of young men. We observe the boys who left school in 1974 at the age of 16, and analyse their success with their respective occupations in 1981 (Connolly, et al. 1991; Elias & Blanchflower, 1988), by computing the average gross hourly earnings (over the whole male labour force) in the relevant occupation, gathered data from the Department of Employment’s New Earnings Survey. The sample considered is drawn from the National Child Dev elopment Study (NCDS) panel which is based on all individuals born in Britain in the week, March 3-9, 1958. The current paper aims to gather perceptions and causal attributions of the general public on youths not in employment, education, or training. The eventual goal is to facilitate these youth’s process of finding meaning – that is, assisting them in determining their rightful niches in society.

Thursday, September 26, 2019

Comparative Financial Analysis of Ryan Air & Easy Jet for Financial Assignment

Comparative Financial Analysis of Ryan Air & Easy Jet for Financial Years ending 2010, 2011 and 2012 - Assignment Example Its headquarter was moved to Geneva which became the first base outside UK. Today EasyJet has in its service 175 aircrafts over 400 routes in 27 countries. In 2009, EasyJet catered to passengers with 50% having passports of countries other that UK. In the year 2010 EasyJet faced a number of major problems that posed a threat to its efficient service. There was the eruption of Eyjafjalla volcano that produced ash which induced problems in European airspace. Then there were incidents like heavy snowfall and major ATC industrial activities. All these along with various functional problems provide immense challenge to the performance level of EasyJet. It was the integrity and dedication towards work that stimulated the employees of EasyJet to continue to provide uninterrupted world class service. EasyJet is efficiently capable to take in its wings the opportunities available for consistently increasing profit in European short-haul aviation. Along with this growth, EasyJet stresses on co st reduction strategies and embracing pathways for more revenue. All these elements have the potential to ensure continuous growth of functional cash making. In the beginning of 2011 the Board decided to start the practice of dividend payments during profitable phases without ignoring the fact that the company always need to have a strong financial base with a prudent balance sheet. This will be a stimulating factor for the shareholders in profitable years even as the company continues to enjoy market share (EasyJet: Annual reports & accounts 2011, pp.4-7). Ryanair Ltd. is an Irish airline was established in the year 1984 by the Ryan family with the assistance of only 25 people. Ryanair’s inaugural flight had its daily route from Waterford in Ireland to London Gatwick. The first operating aircraft was a 15-seater Bandeirante that could carry 5,000 passengers. Headquarter of the company is situated at Dublin Airport. Focus on

Integrated Logistics for DEP GARD Case Study Example | Topics and Well Written Essays - 2500 words

Integrated Logistics for DEP GARD - Case Study Example The present research has identified that Richard Binish who has been appointed by GARD wants to review these contracts and revive supply chain. Basically a lot has been changed in supply chain management and Binish wants to review all this supply chain with the change in situation (current market trends). Banished trimmed GARD's products line and primarily based it on faster moving products with higher moving velocity. Now more and more suppliers with specific criteria have come up and everyone's product is comparable. At present, GARD wants to review its supply chain with the improvement in its service window, and minimum threshold percentage. DEP's polymers having 6 major compounds which has been sourced from three firms as 60%, 25% and 15%. DEP has standardized its purchasing criteria and generally maintains a 7 days supply of each compound DEP is not using JIT because of bad experience, but it relies on electronic linkages for procurement. Most customers' orders are produced with in 6 to 8 days of order. In addition to it, DEP takes 3-6 days for shipment from its warehouse. Transportation and distribution which is done by DEP truck service to customers mostly within 200 miles through twice a week delivery routes. This needs maximum 6 days. So DEP supply chain is too much time consuming and hence needs to be streamlined. Basically in this case study, the kind of relationships between buyer and supplier is adding value to the supply chain, GARD and DEP's long relationship and understanding as well as DEP's knowledge about the requirement and quality with arm's length purchasing relationship is adding value to the chain, value in a supply chain is not simply the organizational value but it is the value created across different organizations that combine to create the supply chain. Inside an organization Porter identifies nine keys areas that need to be examined when examining how value may be created. He divided these 9 areas into what he referred to as: Primar y activities and support activities. The primary activities included: inbound logistics, processes, outbound logistics, marketing & sales, customer service. The support activities included: technological developments, human resource management, procurement and firm infrastructure. Basically in the case study, procurement stage of DEP is adding value to the chain because it provides certain option to purchase six basic compounds from 6 companies having different percentage of order completion as well as supply time. So we can analyze and reach out a suitable combination of companies and products to minimize the supply time and increased percentage of supply. DEP's supply bid has been divided into three parts and maximum quantity suppliers' supplies 60% whereas the remaining two are supplying 25% & 15% respectively. Firms' basic infrastructure with electronically connected procurement with marketing/sales department can easily assess demand of the market and proper information system can act fast. DEP is also adding value through outbound logistics with its own hired truck fleets. DEP also maintains inventory for 7 days so that they may have enough time for reordering and to get supply of raw material.

Wednesday, September 25, 2019

Development and Strategy Project Essay Example | Topics and Well Written Essays - 1000 words

Development and Strategy Project - Essay Example The project manager should first define the project and then work on building the projects work plan. For instance in this situation, the project is to set up a factory which deals in uPVC products and the company deals with both domestic and European markets. Since this project is a complex project, the project manager needs to gather the business requirements, help in designing the management system and also prepare tender documentation. The project manager also faces the challenge of appointment contractors, tender options and criteria and procedure for selecting contractors for tendering (Marsh 2007). Criteria and procedure for selecting contractors for tendering The procedure of contractor selection is a decision- making process, which involves a wide range decision criterion. The procedure may also include many decision-making parties. The decision will also be affected by the estimated value of the project. As for this case the project is a crucial project and contractor selec tion should be selected with a lot of caution. As the project manager getting the general information about the contractors, is a crucial move in this section since he, or she can investigate and assess the abilities of the contractors to carry out a job given to them. So as, to get the information required concerning the contractors, the contractors have to apply for the job and by doing so, they have to present the necessary information pertaining them. The project manager has an obligation of advertising the job opportunities, and states the different job categories that are available and state the qualifications of each post such as work experience. The posts may be such as manager and assistance manager. The project manager may select the contractors by interviewing them (Damster 2004). Appointments of contractors This is the section where the project manager appoints the contractors who have qualified to get the job. The contractor and the project manager must sign a contract form to show that they both have the same agreement according to the terms of the job. The appointment letter includes details of the contractor and the employer. The contractor details include a contact number, e-mail address, address, name, license card and eventually the contract service such as plumber specialist. The employer details include company name, address of the company, contacts, e-mail, and the acting agent and for this are the project managers. The appointment letter also includes the contractor’s insurance cover. The project manager must also include the mode of payment service whereby, there is inclusion of the terms of payment such as net 7 days or 30 days. Payment details must also be included whereby one states the mode of payment in which he or she will be using. Finally, the contractor and the agent of the company must sign at the end so that to show that they have all agreed on the terms stated on that agreement paper (Cohen 2008). Tender options A ten der is a structured invitation to sellers of property for the supply of goods and services. In tender options, there are two types of the tender which include open-tender and closed-tender. In an open-tender option, the offer to supply the goods and services may be accepted at any time during the tender period while in closed-tender option is where by the offer will only be considered when the tender period expires. As the project manage

Tuesday, September 24, 2019

Third Assignment Example | Topics and Well Written Essays - 500 words

Third - Assignment Example These were purely financial institutions, and they had a difficult time staying afloat due largely to poor management, bad investments, and the lack of foresight required to weather difficult economic times. Companies that begin in one industry should not consider branching into the financial sector, as GE has attempted, as to do so all too often results in less than stellar results and can,in the end, adversely affect the American economy as a whole. The financial sector of any economy is critical to the well being of the nation as a whole. It is important that such institutions are viable and that they operate with integrity in an effort to secure the confidence of an investing public. In addition, sound and prudent banking institutions are required in order to attract outside and foreign investment. Every time a bank fails, or even struggles mightily, it reflects poorly on the nation, and it weakens investor and consumer confidence. In addition, when the banking system is in peril, as it has been for the past six to seven years, credit restrictions are tightened and the economy struggles to grow due to a lack of access to financial capital throughout all sectors of the economy. Even though GE is now exiting from the financial sector, this is another indicator that many such insinuations have simply grown too big to effectively focus solely on the banking end of the business. In the end, this is a further reflection the some bu siness can diversity their portfolio so much that they fail to truly excel at any one aspect. When this occurs in the banking industry, however, the results can have ramifications that are felt around the world. In 2008, at the outset of the global financial crisis, many large financial institutions simply collapsed under the weight of bad loans and poor lending policies that created an excess of loan obligations that simply could not be repaid. Not only has this ruined the credit

Monday, September 23, 2019

Segmentation and Consumer and business buying behavior Coursework

Segmentation and Consumer and business buying behavior - Coursework Example Furthermore, these children have an access to computers and the internet, and on this basis, they can download these games from the site of the company. Some schools also have a curriculum that aim at teaching students some computer programs, and this includes computer games. These schools are also a target, mainly because the games under consideration can also be used to teach students on how to operate computer software. One of the consumer products that was specifically targeted to me is Nokia Lumia. This phone is developed through the android technology, and contains social networking sites such as twitter and face book. On this basis, this phone had the capability of satisfying my needs, mainly because I use phones to access the social network sites and the internet. The segmentation strategy used in marketing this product is behavioral. This is because Nokia realized that most people love surfing the internet using mobile phones, hence coming up with a phone that contains social media and with the capability of surfing the internet (Aaker, 16). Another consumer product that was tailored for my need is a designer watch, manufactured by RGM. This watch was designed in a manner that it reflected the current popular fashion, as it was golden in nature, and very attractive to look at. The segmentation strategy used to market this product is the psycho-demographic segmentation. This segmentation process focuses on culture while developing the marketing

Sunday, September 22, 2019

Partnership with Parents Essay Example for Free

Partnership with Parents Essay Parents are experts on their own child and are their childs first and main educators. To meet the needs of children in our care effectively, childcare centers have to build strong relationships with parents and make sure that the sharing of information is a two-way, on going process. Aim for practitioners should be to achieve an open, supportive relationship with parents, who will be made to feel welcome, involved and fully informed about what happens in the childcare center. The preschool experience is often a young child’s first significant experience away from home. The first separation from home frequently places stress on the family until the transition is made. I have vivid memories of the first day I dropped off my son at preschool. I must have had a thousand questions and a million concerns: Would he behave? Would he cry? Would the teachers be able to keep up with him? The questions and concerns went on and on until I and my son finally felt comfortable with the preschool staff and environment. Positive parent-teacher partnerships assist young children with the transition from home and promote healthy growth and development. Even though actively reaching out to parents requires time, patience, and energy, teachers benefit by understanding children’s home environments. If the partnership between parents, staff and child is going well, each need to be able to trust and respect the other. The self-esteem and well-being of the people in the partnership are important when they are working together. Very important is a good start. Childcare staff should to help parents and children to feel welcome when they first arrive at the setting for e. g. parents and visitors are given a friendly welcome by staff; an attractive display in the entrance area showing some of the recent activities that children have been involved in; information showing the names of staff, with their photographs. Important is positive image and messages about diversity- for e. g. different languages, ethnicities and genders. The key to success in the partnership is good communication. Practitioners can sharing information with parent for one-way or two way communication. One-way communication occurs when teachers seek to inform parents about events, activities, or children progress through a variety of sources, such as an introductory letter at the beginning of the preschool year, newsletters, report cards, communication books, childcare center Web sites, and so on. Two-way communication involves interactive dialogue between preschool’s teachers and parents. Conversations may occur during telephone calls, home visits, parent-teacher conferences, open houses, and various preschool-based community activities. Teachers should actively incorporate both strategies to maximize sharing information with parents. Parents and teachers share in the responsibility of a childs education. The two should work cooperatively to foster a positive educational experience for a child. Often times, however conflicts do arise. Conflicts between teachers and parents can arise in a number of ways. A parents sometimes have a hard time dealing with the fact that someone else is parenting their child. Another common parental gripe is that the teacher is not giving the child enough attention or otherwise treating her inappropriately. Additional problem may be language barrier. An increasing number of parents do not speak English as a first language so they are unable to understand communications from the preschool. This can be a real issue and preschool teacher should assess whether hi or she is in a position to address this. When it comes to things like parents meeting teacher can invite some of parents family or friends who know English and can translate Even those parents who are fluent in English can have trouble understanding some communications from the preschool. Preschool teachers may be always think carefully when communicating with parents and ensure that they don’t use the jargon they might use with they colleagues. The key to a good relationship between teachers and parents is open communication. Parents should always talk directly with the teacher about the problem. Good communication prevents conflict from arising and makes resolutions a lot easier.

Saturday, September 21, 2019

Triple Des Against A Brute Force Attack Computer Science Essay

Triple Des Against A Brute Force Attack Computer Science Essay Over the last few years, the Internet has evolved into a ubiquitous network and inspired the development of a variety of new applications in business and consumer markets. So, Multiprotocol Label Switching is another Challenge and a versatile solution to address the problems faced by present- day networks. Main objective of MPLS is to provide Security in the data exchanged. So, In this paper we have implemented Encryption Algorithms like AES, DES and Triple DES to provide sufficient levels of security for protecting the Confidentiality of the data in MPLS Network. This Paper also analyzes the Performance of these algorithms against Brute-Force Attack implemented in the MATLAB environment to protect the MPLS Network MPLS stands for Multiprotocol Label Switching, is a technology proposed by Internet engineering Task Force (IETF) it was designed to facilitate several problems areas in the internet including routing performance and is increasingly being adopted by service providers in their core networks. MPLS solutions are to be used with Layer2 and Layer 3 Protocols. MPLS has emerged as a potential solution for addressing traffic engineering, security and survivability for IP networks. So, a label is assigned to a packet when it enters the MPLS network at ingress Label Switched Router [1]. So, a label is a short fixed length identifier which is of 20 bits ranging from 0 to 19 that is used to forward the packets. Within the network the labels are used to route the packets without regard to the original packets header information. So, in this paper to secure the data which is attached with the label, various Encryption algorithms like AES, DES and Triple DES has been implemented on MPLS network. Ou r technique does not require any hardware, it is totally based on software.Following Sections discusses the proposed scheme. Section 2 discusses the Security Requirements of MPLS network. Section 3 gives the quick overview of the various encryption algorithms used in this technique. Section 4 walks through the used setup environment and the settings for the encryption algorithms on MPLS. This section also illustrates the performance evaluation methodology chosen settings to allow for a better comparison. Section 5 gives a thorough discussion about the implementation results. Finally, Section 6 concludes this paper by summarizes the key points and other related information. 2. Security Requirements of the MPLS Network Network Managers have many options for site to site connectivity like Traditional leased lines, ATM based connectivity and frame relay. But other two types of modern VPNs i.e MPLS and IPSec are becoming increasingly attractive to network managers [2]. In pure IP network it is easy to spoof IP addresses which is a key issue in Internet Security. But, because MPLS works internally with labels, instead of IP addresses, so it not so easy to breach the security. The very fact to make concept clear is that it is not possible to insert packets with wrong labels into the MPLS network from outside, since the customer edge(CE) is unaware of the MPLS core and thinks that it is sending IP packets to the router [3]. The intelligence is done in (PE) provider edge device where based on the configuration, the label is chosen and prepended to the packet. So, MPLS is more secure than normal IP addressing technique. But, the spoofing here can also be possible. The attacks like brute force attack can break the security, although it is not so easy, but it can do so. MPLS alone cannot provide security, it can be combined with IPSec to provide sufficient levels of secu rity. So, various encryption and hashing algorithms are used to maintain the confidentiality of the data. IPSec requires each side to authenticate with the other, so privacy is maintained in IPSec VPN through the use of encryption. A secure MPLS network provides the following facilities to its users [2]: Data Confidentiality: IPSec VPNs provide data confidentiality through robust encryption algorithms. It seeks to ensure data confidentiality by defining a single path between physical sites on a service provider network. This prevents attackers from accessing transmitted data unless they place sniffers on the service provider network. Though MPLS minimizes the chance that data may be intercepted, IPSec provides better confidentiality through encryption. Data Integrity: IPSec uses hashing algorithms to ensure data integrity. There are inherent methods as such to provide data integrity within MPLS VPNs. However, the odd of data being shared by a man-in-the-middle attack is low due to the separation address space and routing information provided by MPLS VPNs. Data Availability: IPSec relies on the Internet for transport. Although an attacker could not read the data, but it could DOS an IPSec VPN by entering false routes into the Internet Routing tables. MPLS VPNs rely on LSPs i.e. Label Switched Paths for transport and since LSPs have local significance only, spoofing is difficult to accomplish. Thus MPLS, can provide better data availability in this regard. Service Reliability: MPLS has the ability to protect the communication session against denial of service attacks. 3. REQUIREMENT OF ENCRYPTION ON LABELS IN MPLS NETWORK In this paper encryption on labels in MPLS network is proposed using AES, DES and Triple DES encryption algorithms. For implementing and evaluating above encryption algorithms we have done the following steps: Encrypt the data with one of the above mentioned algorithms. Encode the data according to MPLS. Brute Force Attack has been done. Time taken to find a correct key is measured against different key lengths. Data Label Encrypt Label Data MPLS Decrypt Secret Key Brute Force Attack Figure 1. Data Encryption This paper analyzes the effectiveness of AES, DES and Triple DES encryption algorithms against brute force attack on MPLS network. The comparison has been conducted by running brute force attack program against these algorithms. 3.1 Implementation Setup This section describes the implementation environment and the used system components. The implementation of DES, Triple DES and AES uses classes available in JAVA package javax.crypto. Separate functions for encryption and decryption have been implemented in MATLAB using JAVA cryptography API. Figure 2 JAVA Cryptography Package Brute Force program is implemented in MATLAB environment. This implementation is thoroughly tested and is optimized to give the maximum performance for the algorithm. 3.2 Methodology Used This Section will discuss the methodology and its related parameters like: system parameters, experiment factors and experiment initial settings. 3.2.1 System Parameters The experiments are conducted using Intel 64-bit processor with 32 GB of RAM. The program is written in MATLAB. The experiments will be performed couple times to assure that the results are consistent and are valid to compare the different algorithms .The brute force attack has been done using single PC. It can be enhanced by the use of parallel computers with high computational powers to decrease the time required to find the key for the above algorithms. 3.2.2 Experiment Factors In order to evaluate the performance of the compared algorithms against brute force program on MPLS networks, the experimental factors must be determined. The chosen factors here to determine the effectiveness of encryption algorithms are the key length and the time taken to breach an algorithm by brute force program. 3.2.3 Experimental Initial Setting We started the attack with 8 bit of key length and extended upto 64 bit. It can further increased upto supported key length of AES algorithm i.e 256 bits. But for this high computational power is required in terms of parallel computers to breach the algorithms. 4. Results and Discussions This Section will show the results obtained from running the brute force program on AES, DES and Triple DES. The results of implementation have been shown below in the form of graphs. The time of launch of brute force attack is shown at the start of the program as in Fig. 3. Figure 3 Screenshot of running brute force program The program exits on success of the attack on the encryption algorithm which is shown below in fig. 4 Figure 4. Screenshot of cracked algorithm The time required to break the encryption algorithm, actual encrypted string and the label applied, all are shown in fig. 5 Figure 5 Screenshot of various factors like time to break, actual encrypted string and the label applied It is highlighted here that the implementation has been performed assuming that the user has arrived at all the correct values of the key and only two values of the key is to be cracked. This has been done to save the time required. The key length can be optimized to reduce the time taken for encryption and decryption process so that it does not slow down the system. i) Effect of key length variation We compare the change in security performance by using different key lengths for encryption algorithms. Graphs are plotted between the time required to find the correct key and different key lengths. We have taken six different scenarios by increasing the length of the key. Table 1 DIFFERENT KEY LENGTHS Scenario Key length (Bits) 1 8 2 16 3 24 4 32 5 40 6 48 7 56 8 64 Following are the graphs for scenarios stated in table1. These graphs show the number of seconds required to breach the corresponding algorithm against brute force attack. Figure 5 Number of seconds required with key length of 8 bits Figure 6 Number of seconds required with key length of 16 bits Figure 7 Number of seconds required with key length of 24 bits Figure 8 Number of seconds required with key length of 32 bits Figure 9 Number of seconds required with key length of 40 bits Figure 10 Number of seconds required with key length of 48 bits Figure 11 Number of seconds required with key length of 56 bits Figure 12 Number of seconds required with key length of 64 bits The above graphs show the time taken to find the key by the brute force program on DES, Triple DES and AES for different key lengths. From these graphs it is analyzed that time taken by brute force attack increases exponentially with the increase in key length. It is clear from the graphs that in case of AES algorithm, brute force attack takes more time to find a key. Therefore, it has a better security than DES and Triple DES. i) Effectiveness of algorithms against brute force attack The results of the iterations of brute force program have been shown in the below figure in Table 2. This graph is plotted in MATLAB environment. The above data and graph represents the effectiveness of AES, DES and Triple DES algorithms against brute force attack. It is evident from the data presented that AES proves to be of better security against the brute force attack than DES and Triple DES for securing MPLS network. Figure 13 Effectiveness of AES, DES and Triple DES against brute force attack Table 2 Number of seconds required to breach DES, Triple DES and AES KeyLength (bits) DES (Seconds Triple DES (Sec) AES (Sec) 8 0.27 0.31 0.55 16 39.59 52.11 110.44 24 1442.52 4575.13 17443.22 32 3085.02 10534.81 36758.31 40 7765.12 21435.13 78252.12 48 15229.91 44671.11 156277.81 56 30118.73 89212.15 330115.42 64 65416.91 122294.54 775313.21 5. CONCLUSIONS The presented results showed that AES has a better security than DES and Triple DES against brute force attack since AES takes more time to break by brute force program for a given key length. Time taken by AES algorithm to break the security considerably increases with the increase in key lengths. respectively.

Friday, September 20, 2019

HPTLC Method for Determination of Edaravone

HPTLC Method for Determination of Edaravone Development and Validation of HPTLC Method for Determination of Edaravone in Bulk and in Injectable Dosage Form A simple, rapid, reliable and accurate high performance thin layer chromatography method has been developed for the estimation of Edaravone in bulk and pharmaceutical dosage form. The chromatographic development was carried out on aluminum plates, pre-coated with silica gel 60 F254, using a mixture of Toluene: Methanol (6:à ¢Ã¢â€š ¬Ã¢â‚¬ °4à ¢Ã¢â€š ¬Ã¢â‚¬ °v/v) as mobile phase. Detection was carried out densitometrically at 254à ¢Ã¢â€š ¬Ã¢â‚¬ °nm. Theà °Ã‚ Ã¢â‚¬ËœÃ¢â‚¬ ¦fvalue of analyte was found to be0.66 ±0.02. The method was validated with respect to linearity, accuracy, precision, limit of detection, limit of quantification and specificity. The linear regression analysis data for the calibration plots showed a good linear relationship with Ã… ¸2=0.9995 in the concentration range 200–600à ¢Ã¢â€š ¬Ã¢â‚¬ °ng/spot. The % assay (Mean  ± S.D.) was found to be100.27 ±0.72. Accuracy of the method was accessed by percentage recovery and found to be99.77 ±0.71%. The m ethod is new, simple and economical for routine estimation of edaravone in bulk, pre-formulation studies and pharmaceutical formulation rapidly at low cost in routine analysis. Keywords: Edaravone, HPTLC, Pharmaceutical dosage form 1. Introduction Edaravone [EDA] is a neuroprotective agent  used for the purpose of aiding  neurological  recovery  following acut ebrain ischemia and subsequent  cerebral infarction. Chemically, it is 3-Methyl-1-phenyl-2-pyrazolin-5-one. [1]. It is a strong novel free radical scavenger, was developed by Mitsubishi Tanabe Pharma Corporation (Osaka, Japan). It acts as a  potentantioxidant, protecting against  oxidative stress  and  neuronal  apoptosis Furthermore, edaravone has anti-apoptotic, anti-necrotic, and anti-inflammatory cytokine effects, as well as scavenging free radicals in cardiovascular diseases and stroke, showing protective effects in the heart, vessel, and brain in experimental studies [2-5] Different methods have been reported for the determination of EDA in the bulk drug, in the dosage forms and in biological samples. HPLC [6-7] and potentiometric titrations [8] methods are available for determination of the analyte in bulk drug and formulation. RP-HPLC [9], RP- HPTLC [10] and LC-MS/MS [11] methods are reported for determination in biological samples. The literature survey revealed that HPTLC method is not reported for determination of EDA in bulk and pharmaceutical dosage forms. The present study describes the development and validation of a simple, specific, sensitive, accurate, precise, and economical HPTLC method for determination of EDA in bulk and injectable dosage form. The proposed method is optimized and validated as per the International Conference on Harmonization (ICH) guidelines [12,13]. Fig 1: Edaravone 2. Experimental 2.1 Reagents and chemicals Edaravone was kindly gifted from Sun Pharmaceuticals, Vadodara, Gujarat, India. Edaravone injection was obtained from commercial sources within their shelf life period. All the reagents and solvents used were of analytical grade and obtained from Merck Chemicals. 2.2. Instrumentation and chromatographic conditions Chromatography was performed on 20cmÃâ€"10cm aluminum foil plates precoated with 0.2mm layers of silica gel 60 F254 (E. Merck, Germany). The plates were prewashed with methanol and water mixture, dried in the current of dry air and activated at 120 °C for 5min. Samples were applied as bands 6mm wide, by use of a CAMAG (Switzerland) Linomat 5 applicator with a CAMAG microliter syringe. A constant application rate of 150nLs−1was employed. Linear ascending development was performed in a twin-trough glass chamberwith mobile phase consisted of toluene: methanol (6:4 v/v), which gave sharp and symmetrical peak withà °Ã‚ Ã¢â‚¬ËœÃ¢â‚¬ ¦f0.66 + 0.02. The optimized chamber saturation time was 15 min at room temperature (25à ¢Ã‹â€ Ã‹Å"C ±2à ¢Ã‹â€ Ã‹Å"C) and relative humidity60% ±5%. After development, the plates were dried. Densitometric scanning, at 254 nm, was performed with a CAMAG TLC scanner 4 in absorbance mode. The source of radiation was a deuterium lamp emitting a cont inuous UV spectrum in the range of 190–400 nm. 2.3. Preparation of Standard Stock Solution An accurately weighed quantity of 10à ¢Ã¢â€š ¬Ã¢â‚¬ °mg EDA was transferred to 10à ¢Ã¢â€š ¬Ã¢â‚¬ °mL volumetric flasks, dissolved in methanol, and volume was made up to mark with the same solvent to obtain a working standard having concentration 1000à ¢Ã¢â€š ¬Ã¢â‚¬ °ngà ¢Ã¢â€š ¬Ã¢â‚¬ °ÃŽ ¼L−1. 2.4. Optimization of mobile phase Initially, different ratios of methanol and toluene were tried, but tailing of spots was observed. Finally, the mobile phasecomprising of toluene:à ¢Ã¢â€š ¬Ã¢â‚¬ °methanolà ¢Ã¢â€š ¬Ã¢â‚¬ °(6:à ¢Ã¢â€š ¬Ã¢â‚¬ °4à ¢Ã¢â€š ¬Ã¢â‚¬ °v/v) gives good resolution, sharp and symmetrical peak withà °Ã‚ Ã¢â‚¬ËœÃ¢â‚¬ ¦Ãƒ °Ã‚ Ã‚ Ã‚ ¹value of 0.63 at 254à ¢Ã¢â€š ¬Ã¢â‚¬ °nm. Figure 2: Chromatogram of standard Edaravone: (Rf = 0.63). 3. Result and discussion Validation of HPTLC method: The proposed method was validated as per the ICH guidelines in terms of its linearity, accuracy, specificity, intraday and interday precision, limit of detection (LOD), and limit of quantification (LOQ). 3.1. Linearity (Calibration Curve) The amount of standard solution equivalent to 200-600 ng/spot of EDA was spotted on the prewashed TLC plates. The plates were developed, dried and scanned as described above. The calibration plot was constructed by plotting peak areas against the corresponding concentrations (ng/spot) of EDA. The linearity of response for EDA was assessed in the concentration range 200-600 ng/spot in terms of slope, intercept and correlation coefficient values. The calibration plot showed the correlation coefficient (r2 = 0.999), the intercept (5.838) and the slope (703.3) over the concentration range of 200-600 ng/spot (Fig. 2). The results of regression analysis are shown inTable 1. 3.2 Limit of Detection (LOD) and Limit of Quantification (LOQ) The limit of detection (LOD) and the limit of quantification (LOQ) of the drug were derived by calculating the signal-to-noise ratio (S/N, i.e., 3.3 for LOD and 10 for LOQ) using the following equations designated by International Conference on Harmonization (ICH) guidelines LOD = 3.3 Ãâ€" ÏÆ'/S LOQ = 10 Ãâ€" ÏÆ'/S Where, ÏÆ' = the standard deviation of the response and S = slope of the calibration curve. 3.3 Range Suitable levels of precision and accuracy have been demonstrated between the upper and lower concentration limit of linearity under study. 3.4 Precision: The intra-day and inter-day variation for the determination of EDA was carried out at three different concentration levels 400, 600, 800 ng/spot. Intra-day variations were assessed by analyzing these concentrations in triplicate within a day and inter-day variation was assessed by using the same concentration of drug and analyzing it different days and time. Accuracy: The accuracy of the method was determined by the use of standard addition at three different levels. The pre analyzed sample solution of 400 ng/spot of EDA was spiked with extra amount equivalent to 80 %, 100 % and 120 % of the standard edaravone and the mixtures were analyzed by the proposed method. The experiment was conducted in triplicate. When these solutions were analyzed the recoveries were found to be within acceptable limits (Table 1). Specificity The mobile phase was optimized and it showed good result. There was no interference of diluents and other constituent’s in determining peak purity. This method is specific. Conclusion A new HPTLC method has been developed for the identification and quantification of EDA. Low cost, faster speed, and satisfactory precision and accuracy are the main features of this method. The method was successfully validated as per ICH guidelines and statistical analysis proves that the method is sensitive, specific, and repeatable. It can be conveniently employed for routine quality control analysis of EDA as bulk drug and in marketed injectable formulation. Acknowledgments The authors express their gratitude to Sun Pharmaceuticals Vadodara, Gujarat, India for providing a gift sample of Edaravone, the Management of Pioneer Pharmacy Degree College, Vadodara, Gujarat, India, and Anchrom Test lab Pvt. Ltd, Mumbai, Maharastra, India, for providing the necessary facilities. References Japanese Pharmacopoeial Forum, sixteenth edition, March 2012 Vol.21 (1), pp. 701-702. Doherty, Annette M, Annual Reports in Medicinal Chemistry, Volume 37, Boston: Academic Press. Watanabe T, Tanaka M, Watanabe K, Takamatsu Y, Tobe A,â€Å"Research and development of the free radical scavenger edaravone as a neuroprotectant.Yakugaku Zasshi, March 2004,124(3): 99–111. Higashi Y, Jitsuiki D, Chayama K, Yoshizumi M (January 2006). Edaravone (3-methyl-1-phenyl-2-pyrazolin-5-one), a novel free radical scavenger, for treatment of cardiovascular diseases.Recent Patents on Cardiovascular Drug Discovery1(1): 85–93. Kikuchi, K.; Miura, N.; Kawahara, K.; Murai, Y.; Morioka, M.; Lapchak, P.; Tanaka, E. Edaravone (radicut), a free radical scavenger, is a potentially useful addition to thrombolytic therapy in patients with acute ischemic stroke (review). Biomed. Rep. 2013, 1, 7–12. George Lunn Hplc Methods For Recently Approved Pharmaceuticals A John Wiley Sons, Inc., Publication; P.p 204-206. XIA Ya Jun, ZHANG Xiao Ping Determination of Edaravone Injection by HPLC: Chinese Journal of Pharmaceuticals; Chinese journal of pharmaceuticals; 34; 352-353 ZHANG Fu-Cheng, TIAN Shu -Xia, JIANG Ye Comparison Of Two Potentiometric Titration Determinations Of edaravone [j]; Chinese Journal Of Pharmaceuticals; 2005-09 WEI Min, XIAO Yi (Guangxi Liuzhou Municipal People s Hospital, Liuzhou 545001, China); Determination of the Concentration of Edaravone in Human Serum by RP-HPLC [J]; China Pharmacy; 2007-08 M. Gandhimathi, M. Saravana Kumar, R. Baghla and T. K. Ravi RP-HPTLC Method for theIn VitroEstimation of Edaravone in Human PlasmaIndian Pharmaceutical Association Convention Volume: 72Issue: 2 P.p: 276-282 GU Li-Qiang XIN Yan-Fei ZHANG Sheng WEN Lei YANG Shi-Bao, HU Xiao-ling, XUAN Yao-Xian; Determination of edaravone in plasma of Beagle dog by LC-MS/MS [A]; [C]; 2009 ICH-Guidelines Q2A, â€Å"Validation of Analytical Procedures: Definition and terminology,† (CPMP III/5626/94), Geneva, Switzerland, 1995. ICH-Guidelines Q2B, â€Å"Validation of Analytical Procedures: Methodology,† (CPMP/ICH/281/95) Geneva, Switzerland 1996.

Thursday, September 19, 2019

F. Scott Fitzgerald and the Lost Hope of Babylon Revisited :: Literary

F. Scott Fitzgerald and the Lost Hope of Babylon Revisited F. Scott Fitzgerald is known as the spokesman of the "Lost Generation" of Americans in the 1920s. The phrase, "Lost Generation," was coined by Gertrude Stein "to describe the young men who had served in World War I and were forced to grow up to find all Gods dead, all wars fought, all faiths in man shaken" (Charters 489). Fitzgerald exemplified the generation that Stein defined. His family, with help from an aunt, put him through preparatory school and then through Princeton University (Charters 489). Fitzgerald’s family hoped that he would stop "wasting his time scribbling" and would be serious about his studies (Charters 489). However, he left college before graduating and accepted a commission as a second lieutenant in the Regular Army during World War I (Charters 489). During his military service, he spent most of his time writing his first novel, This Side of Paradise (Charters 489). The peak of Fitzgerald’s fame as a writer came with the publication of The Great G atsby, in 1925 (Charters 489). Fitzgerald, writing in the third person, reflected back fondly on the Jazz Age because "it bore him up, flattered him, and gave him more money than he had dreamed of, simply for telling people that he felt as they did, that something had to be done with all the nervous energy stored up and unexpended in the War" (Charters 489). In the years of the 1930s and the Great Depression, Fitzgerald saw his own physical and emotional world collapse with the decline of his literary reputation and the failure of his marriage. Fitzgerald’s last years as a writer "were truly lost . . . writing Hollywood screenplays and struggling to finish his novel The Last Tycoon" (Charters 489). Fitzgerald wrote approximately 160 stories during his career (Charters 489). "Babylon Revisited," written in 1931, is one of his later works. It is considered "more complicated emotionally" than his earlier works because he shows "less regret for the past and more dignity in the face of real sorrow" (Charters 489). "Babylon Revisited" focuses on Charlie Wales, a man who returns to Paris to retrieve his daughter and begin his life anew as a family with her. The title is appropriate because Charlie returns to Paris where, before the Depression hit, he and his wife lived a life of endless partying and spending of money, where everything had a price that he could afford to pay.

Wednesday, September 18, 2019

Japanese Internment Essay -- Internment Japanese Americans History Ess

Japanese Internment The 1940’s was a turning point for American citizens because World War II was taking place during this time. Not only was America at odds with other countries, but also within its self. America is a huge melting pot full of diverse cultures and people from all nations. People travel from all over the world to the United States of America. These people had one goal in mind, a life of freedom and equal opportunity; or so they thought. The Japanese first began to immigrate to America in the 1860's in Hawaii. â€Å"Until the 1880’s only a handful settled in the United States. From then until 1924 when the United States excluded Japanese immigrants, less than 300,000 had settled in American territory.† (Davis, 1982) These people saw America as land of "freedom". So when they came to America they did everything they could as to not be associated with the likes of the Chinese culture, which were also migrating to America at this time. â€Å"Anti-Asian activists, who had first mobilized against Chinese immigrants when they began arriving in California in the 1840’s, employed the same â€Å"yellow peril† imagery to attack Japanese immigrants in the late nineteenth century.† (Murray, 2000) To the naked eye of Americans, the Japanese and Chinese people seem to be physically the same. Actually these were two totally different cultures. One of the first groups of Japanese who came to America was known as Gannenmono; who mostly resided on the west coast and Hawaii. They earned a rough living while working on sugar plantations. Because of the horrible working conditions, many of the immigrants often went on strike. The workers complained to the Japanese government, which in response sent an ambassador to settle the problems. The American born children of these immigrants are known as Issei; in other words, the first generation. This generation of people did everything they could to Americanize themselves. The second generation of children is known as Nisei. Even though these children were American, their families still wanted them to remember their culture. Therefore, many children of this generation had dual citizenship between Japan and America. Children were often sent back and forth over seas to stay with grandparents. Third generation Japanese-Americans are known as Sansei. There was also a generation called Kibei. These were American born citizens that m... ... the U.S. government. The Civil Liberties Act of 1988, signed by President Ronald Regan, provided an official apology from the U.S. government and an individual payment of $20,000 to each Japanese internee that was still living in 1988. Works Cited †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Daniels, Roger (1971). Concentration Camps USA: Japanese Americans and World War II. New York: Holt, Rinehart and Winston, INC. †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Daniels, Roger. (1972). Concentration Camps USA: Japanese Americans and World War II. New York: Holt, Rinehart and Winston, INC. †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Daniels, Roger. (1981). Concentration Camps: North America. Malabar, Florida: Robert E. Krieger Publishing Company, INC. †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Davis, Daniel S. (1982). Behind Barbed Wire. New York: E.P. Dutton, INC. †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Hatta, Julie. (2002). Jainternment, http://www.jainternment.org/ †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ikeda, Tom. (2003). Densho, http://www.densho.org †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Murray, Alice Y. (2000). What Did the Internment of Japanese Americans Mean? Boston: Bedford/St. Martin’s. †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Spicer, Edward H. (1969). Impounded People. Arizona: The University of Arizona Press. †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Yu, John C. (1996). The Japanese American Internment, http://www.geocities.com/Athens/8420/main.html

Tuesday, September 17, 2019

School Captain Speech

4. Social Justice | | Personal Statement of Intent: This Statement will be published electronically on the Intranet for all staff and students to read.Your statement should be no more than 200 words. You should consider the following questions: Why do you think you would be an appropriate Middle School Leader? I think I would be an appropriate middle school leader for these reasons I always show respect towards the teachers and my friends, i am always open minded to new opportunities and new things that arise. I am really confident, responsible and motivated. I show high participation for the music ensembles that I take part in every week and early in the morning.I have been a school captain before at my old school in the junior school so I have plenty of experience in public speaking. What qualities do you possess to accomplish the tasks and responsibilities associated with being a leader? I will show responsibility, enthusiasm, maturity, open minded I am trustworthy so people can t rust me. I always possess honesty and wisdom and confidence. Also I am always positive and I listen to what other people have to say.If you were successful, what would you aim to achieve in your leadership position? I would step up to my big leadership position as I would have big shoes to fill as school captain which I can do easily and all my peers and teachers are relying on me to do a good job as a leader for 2013. especially Mrs Janssens is relying on me to do a good job if I get school captain or the vice captain and in someone’s absence I would step up to the job straight away which I would always be happy to do. School Captain Speech 4. Social Justice | | Personal Statement of Intent: This Statement will be published electronically on the Intranet for all staff and students to read.Your statement should be no more than 200 words. You should consider the following questions: Why do you think you would be an appropriate Middle School Leader? I think I would be an appropriate middle school leader for these reasons I always show respect towards the teachers and my friends, i am always open minded to new opportunities and new things that arise. I am really confident, responsible and motivated. I show high participation for the music ensembles that I take part in every week and early in the morning.I have been a school captain before at my old school in the junior school so I have plenty of experience in public speaking. What qualities do you possess to accomplish the tasks and responsibilities associated with being a leader? I will show responsibility, enthusiasm, maturity, open minded I am trustworthy so people can t rust me. I always possess honesty and wisdom and confidence. Also I am always positive and I listen to what other people have to say.If you were successful, what would you aim to achieve in your leadership position? I would step up to my big leadership position as I would have big shoes to fill as school captain which I can do easily and all my peers and teachers are relying on me to do a good job as a leader for 2013. especially Mrs Janssens is relying on me to do a good job if I get school captain or the vice captain and in someone’s absence I would step up to the job straight away which I would always be happy to do.

Monday, September 16, 2019

By the time Macbeth murders Duncan Essay

‘By the time Macbeth murders Duncan, he has already lost the battle for his soul’. Discuss this statement and examine the factors which lead to his decision to kill the king. It is the aim of this essay to evaluate and determine the validity of the above statement. I will examine the factors which lead to Macbeth’s decision to kill the king. The definition for a person’s soul is the spiritual part of them that is supposed to continue after their body is dead. People also use ‘soul’ to refer to a person’s mind, character, thoughts and feelings. ‘The battle for his soul’ represents whether this person submits to good or evil. The factors that I will look at in particular when considering what drove Macbeth to commit the murder, are the witches and Lady Macbeth. The play begins with the witches who introduce Macbeth by saying they will meet him. ‘There to meet with Macbeth’. This is an effective way to start the play, as people were very superstitious at the time. They believed in witches and they believed they were evil. One person who was very wary and curious about such matters was James I and Shakespeare had written this play for him. The gunpowder plot took place the previous year and James I was, consequently, very sensitive and concerned about future assassination attempts. Shakespeare was writing for an audience who were predominantly Christian and who believed in heaven and hell; the way some one behaved on earth would decide what happened to them when they died. The soul is very important in this play and this is why ‘Macbeth’ may have been popular as people were interested in these things. If someone lost their soul, they would be lost to God and would be condemned to hell for eternity. Macbeth talks a lot about this in his dramatic monologues. Duncan was a good honest king who had done nothing but treat Macbeth as a good friend. Duncan calls him ‘worthiest cousin’, which suggests the closeness of their relationship. Duncan is grateful for Macbeth’s bravery in battle. He says, ‘I have begun to plant thee and will labour, to make thee full of growing†. Duncan is saying he will do anything to repay him for being so brave. Duncan is a very good person, Macbeth says, â€Å"Duncan hath borne his faculties so meek hath been so clear in his great office that his virtues will plead like angel†. Macbeth knows that he was good and he still murdered him. Therefore is no excuse for what he has done. The King is Macbeth’s guest so he should protect him, not attack him. There are different reactions from Macbeth and Banquo to the witches’ predictions. Banquo believes that Macbeth will become king because he has already become Thane of Cawdor, just as the witches had predicted. He thinks that it is very strange how the witches are helping them. Furthermore, he believes the witches will be kind to them and have their trust only to betray them later. He is clearly surprised and remains sceptical as to their intentions. The different reaction by Macbeth is apparent when he is shocked at first after hearing what the witches have to say. He truly believes that he will become king as two of the predictions have proved accurate. Things can only get better for Macbeth, or so he believes. Macbeth’s opinion of the witches remains undecided and he does not really know what to think about the ‘weird sisters’. There are conflicting beliefs that he has. Firstly, he believes they are not good, but if they were bad why did they give him such success? It seems that he is beginning to trust the witches when he considers the success that they have given to him. Banquo, on the other hand, instantly distrusts them and believes ‘†¦to win us to our harm, the instruments of darkness tell us truths’. As soon as Lady Macbeth receives Macbeth’s letter about the witch’s predictions she begins to plan the murder: ‘Come, you spirits that tend on mortal thoughts, unsex me here and fill me from the crow to the toe top full of direst cruelty.’ She wants to be filled with cruelty and wants evil spirits to posses her. She wants to lose her femininity and become manly so she is capable of the greatest cruelty. She hopes to lose her soul so she does not feel guilty. The factors that lead Macbeth to kill the king are the witches, Lady Macbeth and his own personality. The witches led Macbeth to the murder when they greeted him and said ‘All hail Macbeth, that shall be king hereafter.’ In the time of the play it was believed that witches could take demonic possession of people and make them do what they wanted. Macbeth sees a dagger just before the murder of Duncan. Some people may say that it is the witches that put the image in front of him to drive him into murdering. However, Act 1, scene 1 suggests that there are limits to the witch’s powers; they cannot kill. They talk about a lady who did not give them nuts so they want to get her back, and also her husband who is on a boat. ‘I’ll give thee wind.’ ‘I’ll drain him as dry as hay. They say many things that they will do to him but they do not mention killing him and this proves that death is not in their power. Macbeth and Lady Macbeth have a good relationship, they seem to get on extremely well together and when they are apart they miss each other. Later in the play Lady Macbeth begins to take control and becomes rather dominant. She can persuade him to do anything. Macbeth decided that he did not want to go through with the murder but Lady Macbeth talked him into it by calling him a coward and using harsh words. ‘And live a coward in thine own self esteem’. She says this after Macbeth refuses to proceed any further with the murder. She is taunting and humiliating him. When Macbeth talks himself out of committing the murder, ‘We will proceed no further in this business,’ Lady Macbeth makes him change his mind by calling him a ‘coward’. She tells him, ‘When you durst do it, then you were a man’. The implication being that he is no longer acting like a man. She tells him that if he breaks this promise, he will break all other promises including those made to her, ‘Such I account thy love’. Nevertheless, she claims that she would rather dash out the brains of a baby then break such a promise. Shakespeare utilises extremely strong imagery to emphasise just how important it is for her. In Macbeth’s dramatic monologue he gives many reasons as to why he does not want to go through with the murder. Many thoughts are running through his head such as the fear of Duncan returning as something bad in his next life. Additionally, he believes something bad will happen if he goes through with it. ‘To plague th’ inventor. This even handed Justice’ He is going against the deed of killing the king. ‘Strong both against the deed: then, as his host’. He is a kinsman, therefore he can not kill somebody on the same side as him and this suggests that it is not like him at all and he does not want to take his life. When Lady Macbeth enters he does not tell her these reasons but gives different ones altogether. He says the king has been honouring him recently and people have high opinions of him. Consequently, he wants to remain popular with people. Macbeth must kill Duncan so that he can be king and take his place. The witches told him that he would be king, but not necessarily by murdering him. Initially the murder has been devised entirely by Macbeth and not recommended by anyone else. As Macbeth states, ‘If chance will have me king, why chance me crown me, without stir’. He is saying that if he becomes king that is good but he will not do anything to make himself king. As he admits, his only motive for the killing is ‘Vaulting ambition’. I will now consider the nature of Macbeth’s sin. The crime that has been committed is truly evil, but I do not believe that Macbeth is necessarily evil. The fact that Macbeth believes that he will never be forgiven indicates he is genuinely remorseful. The only reason Duncan was murdered was for Macbeth’s personal gain. Macbeth had no real reason to kill him, as the king was a dear friend. There are many reasons that suggest that Macbeth should never be forgiven for this. The murder was in cold blood and it had been planned and not committed in the heat of the moment. Macbeth did not want to go through with it but Lady Macbeth induced him to do so. This is why I believe Macbeth is not evil because he was driven to it. After the murder the grooms were smeared with blood to make it seem as if they had committed the murder. In the morning Macbeth murders them too pretending that he has acted out of ‘violent love’ for Duncan. He does this to get himself out of trouble and to avoid suspicion. Therefore, the grooms cannot deny committing the murder. Macbeth has killed the king. At the time, there was a belief that kings were put onto the throne through God’s power (divine right) and so an attack on the king’s power was seen as acting against God’s wishes. This is the reason for him to go to hell as God has disowned him. Macbeth says, â€Å"He’s here in double trust: first, as I am his kinsman and his subject, strong both against the deed; then as his host, who should against his murderer shut the door, Not bear the knife myself.† Macbeth knows that what he has done is wrong as he should be looking after his guest. After the murder, Macbeth is unable to say the word ‘Amen’, â€Å"But wherefore could not I pronounce ‘Amen’ I had most need of blessing and ‘Amen'†. He feels that God has deserted him as ‘Amen’ means ‘god with us’. He is trying to keep his Christian faith but he believes he is losing his soul and that he will be doomed to eternal damnation. Macbeth feels that he cannot sleep because only the good sleep. After the murder has been committed Lady Macbeth is calm and does not feel any guilt at all. The fact that she is not sorry suggests that she is evil. ‘Wash this filthy witness from your hand†¦smear the sleepy grooms with blood’. She gives him orders as she does not want to get caught and she wants somebody else to get the blame. If I were in the audience, I would be thinking that Macbeth is now behaving unlike himself. He is acting guilty about the murder and he wishes that he never committed the crime. This is dramatic because it shows that he must really want to be king if he kills even though he does not want to and this shows how desperate he really must be. Christians believe that if someone is truly sorry for a sin they have committed and repent, they can be forgiven and, in that case, their soul would not be forfeit. After the murder I strongly believe that Macbeth is extremely sorry for what he has done. ‘I had most need of blessing’. This means that he still wants God’s blessing even after his terrible sin. ‘I am afraid to think what I done’, which suggests that it is so unlike him to do this that he is scared to look back, he does not want to believe what he has done. â€Å"To know my deed ’twere best not know myself† he would rather not know himself after what he has done as he is so ashamed. ‘Wake Duncan with thy knocking, I would thou couldst’ He wishes that Duncan could be wakened with knocking which means he regrets the murder. I do not believe that Macbeth has lost his soul as he feels sorry for what he has done and feels very guilty he also has many regrets. As Macbeth is so worried about the murder he has committed one would not think that he would kill anymore, but he does. He arranges the murder of Banquo, his best friend, and tries to have his son Fleance killed. This is because Banquo suspects that Macbeth has killed Duncan as he heard the witches’ predictions. He has Fleance murdered because the witches said Banquo’s descendants would be king. Macbeth seeks out the three witches to predict the future, even though he knows that they are evil. ‘To the weird sisters. More shall they speak. For no I am bent to know by the worst means, the worst’. He also wants to know what else must be done for him to be king. The audience may have thought that he is turning evil and is just looking for trouble and they will probably be worried about what will happen next. He arranges the murder of Lady Macduff and her children because she has fled to England to join the other side to be against Macbeth. He wants to hurt her for turning against him. Now Macbeth is beginning to lose his soul as he keeps on killing and he does not feel guilty anymore. He finds that he must keep on doing more and more wrong in order to stay in his position. ‘I am in blood stepped so far that I should I wade no more, Returning were as tedious as go o’er.’ He has gone far enough and there is no point stopping as he has done a lot to get where he is. It will be far easier for him to carry on then to stop. It is possible that the witches have sensed a potential for evil in Macbeth and that is why they have chosen to use him. It is Macbeth who has ‘horrible imagings’. He fought in battles so he killed a lot of people there. We learn many contradictory things about Macbeth. He is a very strong man as he fights in the king’s battles and wins. He is described as ‘Brave Macbeth’ and ‘Noble Macbeth’ by the captain, this is because he is very loyal, brave and honourable. However, Lady Macbeth says he is ‘too full o’th’ milk of human kindness’ and implies that he has a good heart. Macbeth has been violent in battle. ‘†¦He unseamed him from the nave to th’ chops and fixed his head upon our battlements’. He had fought a lot in battle and killed a lot of people but after the murder he can not handle all the guilt. His personality has changed. He admirers Lady Macbeth when she is at her most evil, saying she is ‘undaunted mettle’. This is because she does not give up and pursues with her target. Macbeth is frequently associated with dark and night, asking for darkness to cover his feeling. ‘Stars, hide your fires, let not light see my black and deep desires’. Goodness is represented by light and evil is represented by dark. For example, Macbeth using the cover of darkness to hide his crimes, ‘Come, seeling night, scarf up the tender eye of pitiful day’. He is ashamed of what he is thinking. Macduff says of him ‘Not in the legions of horrid hell can come a devil more damned in evil to top Macbeth’. He thinks Macbeth is filled with evil. The name of his follower, Seyton is perhaps a pun of Satan. I do not believe that Macbeth is evil. The witches made him think a lot and this led him to do things he would never normally do. It was the witches who gave him the idea of being king and this is where things started to become bad. Macbeth goes to visit the witches again after the murder who tell him that no person can kill him that is born from women. He now thinks he is invincible. In my opinion, it is here that he loses his soul given that he carries on killing without feeling any guilt. It seems that Macbeth was not only an instrument of evil, but also the victim.

Sunday, September 15, 2019

Education Theory Essay

English Language Learner (ELL), English as Second Language (ESL), and English as Foreign Language (EFL) are the teaching and learning strategies of English language for students whose first language other than language. The complexities and technicalities of English Language often confuse students having non-English background and especially those who live in non-English speaking countries (Ferris and Hedgcock, 1998). ELL, ESL, EFL and similar courses are designed to help students to enroot themselves in the basics and essentials of English from beginning. Importance of ELL Globalization has seen English becoming the language with maximum reach and influence, and it is taught in many nations as the second language. With English becoming the international language of commerce, business, law, technology and medicine, it is has become an essential career and communication tool. Estimates are that around 1. 5 billion people around the world, out of which more than 70 percent are non-native speakers of English, use English as a language of communication (Ferris and Hedgcock, 1998). In consequence there are host of full-fledged academies and dedicated institutions in many non English-speaking countries that design curriculum and try to select most appropriate course material to impart English communication skills to students (Gass and Schachter, 1996). On a secondary and more immediate level, there is a continuous influx of foreign nationals in USA and many of them lack formal communication training in English. The foreign nationals and students, who come to USA in thousands every year, share a combined language background of more than 1000 languages. The individual background of foreign nations s acts as a hindrance in their amalgamation with their immediate surrounding and culture, and presents the image of USA as an alien nation (Messerschmitt Vandrick and Hafernik, 1996). This obviously requires designing a comprehensive and all assimilating learning procedure that can act as cultural and linguistic melting pot. In this respect ELL assumes a very important role, providing a crucial cross over opportunity to foreign students, imparting the necessary communication learning and teaching that is essential for their survival in the generally English surrounding (Messerschmitt Vandrick and Hafernik, 1996). Theories in ELL designing Most of the students passing through traditional ELL courses have reported difficulty in actual understanding of content and implications of English language when they face it in the real life situation. In this perspective, researchers have theorized that by observing the model of English education imparted in native English speaking countries and modeling the ELL courses on those parameters (Messerschmitt Vandrick and Hafernik, 1996). The most prevalent and popular pedagogy model observed for native students showed that students were required to study novels, short stories, literature work, and were required to devote their time to writing. The formal schooling requires students to get well versed in descriptive, narrative, argumentative and imaginative style of writing (Gass and Schachter, 1996). These models also required students to undertake discussion and expositions on the literature material they covered during the course along with developing their own text, expressing their own ideas and reviewing and analyzing other works. Most of the major educational institutions have started following this process-oriented approach in language education that makes learning of language as a non-directional endeavor, enabling students to develop their inner thinker and writer and empowering them to imbibe, rather than learn, English language (Ferris and Hedgcock, 1998). Since 1980s, researchers have found that ELL methods succeeded mostly for students who were encouraged to develop a cognitive and create approach towards English through the process of writing (Messerschmitt Vandrick and Hafernik, 1996). Writing helps students to think originally, compose ideas in a logical way, transfer the essential communication strategies to students and enable them to develop a reflective intuition on interpretation of English text and language. There are a number of additional studies and researches to prove that learning strategies that are based on the model of primary education techniques have been successful in creating the most effective set of models (Gass and Schachter, 1996).