Monday, November 25, 2019

Two-Dimensions Alphabetical-Alphabetical Matrix (2DAAM) Numbering

Two-Dimensions Alphabetical-Alphabetical Matrix (2DAAM) Numbering Free Online Research Papers Two-Dimensions Alphabetical-Alphabetical Matrix (2DAAM) Numbering for Telephone Numbering Plan Systems More Addresses, Less Number of Digits! Decimal National Numbering Plan†¦ Goodbye! Mag. Hasan Meslmani Abstract- In this paper, a new mechanism for Numbering Plan system of Geographical and Non-geographical for both Public Switched Telephone Network (PSTN) and Public Land Mobile Network (PLMN) is proposed using Two-Dimensions Alphabetical-Alphabetical Numbering (2DAAN), taking into account the increasing demands for numbering capacity for both subscribers and the services in order to meet growth of subscribers numbers and telephone services, such as Free Services or Value-Added Services. This research suggests a new mechanism for numbering which is different from the conventional methods for numbering plans according to recommendations of International Telecommunication Union (ITU) using Pre-Initial Access Isolation Principle (PIASP) and presenting the telephone number as an address for using the whole Possibilities range of Generated Addresses (PGA) for the usage elements. Therefore, this research aims to reduce the digits in telephone number for both fixed and mobile telephones, ren umbering the national call code or Local Area Code (LAC) within a certain country, renumbering the Country Code (CC) for each country according to ISO 3166 Alpha-2 Code list, standardization the Length of National Number, and standardization the National Numbering Plan (NNP) in each country. I. INTRODUCTION Two-Dimensions Alphabetical-Alphabetical Matrix (2DAAM) numbering This technique aims to create a huge ranges of addresses for numbering plan by means of using less number of digits taking into account designation of sufficient capacity for geographic areas and non geographic services to meet growth of telephone services, designation of numbering capacity for the future introduction of new services and designation of spare capacity in the form of codes and number ranges that are not associated with any known services and therefore potentially suitable for unforeseen expansion or the introduction of brand new services. The new mechanism depends on two main stages. The first one assumes enlargement the current numbering range by replacement its decimal elements with bigger range consists of the Latin characters elements which it fortunately already used in the current telephone keypad to execute some secondary functions. The second stage assumes using enlargement principle ones more by dropping these elements on coordinates axis by creating two dimensions mathematical model of Possibilities Theory to obtain on a big base which have the ability to generate huge range of addresses. It is the right time to redesign a new keypad which contains buttons presenting the Latin Alphabetical characters as a first function to support this technique, [1]. But this requires unfortunately partly or totally opposition some recommendations of the ITU on the international public telecommunication numbering plan such as E.123, E.163, E.164 and E.212, [2]. II. MATHEMATICAL MODEL A new mathematical model supporting the new mechanism of numbering plan for producing much more addresses sufficient to identify the huge numbers of subscribers has been developed. The general possibilities form of the Mathematical Model for the total sums of Total Generated Addresses (TGA) for a certain range can be written in the following expression (1): [1] (1) By choosing the Decimal Number range as a selected range, the previous expression can be re-written as: (2) (2) By applying this model on Two Dimensions Matrix (2D Matrix), The general form of Mathematical Model for the possibility of the produced numbers or addresses resulting from a certain range is shown in expression (3) (3) Now, by applying this model on Two Dimensions Matrix (2D Matrix), both rows and colons will be the 26th Latin alphabet characters resulting (26*26) Matrix and can be named 2D Alphabetical- Alphabetical Matrix. The components of all elements for the whole range of matrix is given in expression (4) (4) Classes of Calls When this study is applied for Calls Traffic according to Class of Calls for one month by random sample method on a set consisting of (100) suscribers belong to Sabil Exchange in Aleppo city, the following results have been obtaind and summerized in Table 1. Emergency Service International National Mobile Local Call Types 6 5 4 3 2 1 Levels %5 %5 %10 %15 %35 %40 Percentages Table 1: Calls classes As the result of that, six major classification types of calling can be followed when two A and B parties are executing calling. These classifications are: 1 Local Call 2 Mobile Call 3 National Call 4 International Call 5 Service Call 6 Emergency Call This classification will help the construction of a new hierarchy call address from one side, guiding to blow up the traditional design of the current telephone keypad and finally inspire the practical steps to redesign the button layout in the new keypad to support this hierarchy from other side, as it is illustrated in Fig. 1, [3,6]. Fig. 1: Classes of calls between the called parties (A) and (B) presentation and its percentages value. Application of Mathematical Model The general formula of the Mathematical Model for the total sums of Total Generated Addresses (TGA) possibilities for 2D Alphabetical-Alphabetical Matrix range can be shown in expression (4), from that, the following results can be obtained A. For n= 1 : B. For n= 2 : C. For n= 3 : D. For n= 4 : E. For n= 5 : From the previous (7), (10), (13), (16) and (19) equations and matrixes, the following Table shows the Total Generated Addresses (TGA) according to the number of digits for the 2D Alphabetical-Alphabetical Matrix (2DAAM) numbering [1]. 5digit 4digit 3digit 2digit 1digit n 141,167,095,653,376 208,827,064,576 308,915,776 456,976 676 TGA Table 2: Shows the Total Generated Addresses (TGA) according to the number of digits in the proposed (2DAAM) numbering. While, the Total Generated Addresses (TGA) in connection with the number of digits for the Decimal Numbering can be summerized in Table 3 [7], [8]. 7digit 6digit 5digit 4digit 3digit 2digit 1digit n 10,000,000 1,000,000 100,000 10,000 1,000 100 10 TGA Table 3: Shows the Total Generated Addresses (TGA) according to the number of digits in the current decimal numbering. By applying this proposed model on different ranges, we can obtain of the following different curves which reflex the value of the selected range, as it shown in Fig. 2. Which shows a possibility of the Total generated addresses produced according to the number of digits in the present numbering system in comparison with other systems, which they are arranged from right to left as follows: 1. Decimal numbering system method 2. Mixed numbering system method 3. IPv4 numbering system method 4. 2D Alphabetical- Alphabetical numbering system method Fig. 2: Possibilities of the Total Generated Addresses (TGA) produced according to the number of digits. It is be seen obviously, that the upper curve (2D Alphabetical), which expresses of possibilities of producing the Total Generated Addresses using 2D Matrix components P(x) and P(y) for the Latin Alphabets range, will have the highest values in comparison with the other used ranges (Mixed), (IPv4) and (decimal) curves, [9]. III. THE NEW SUGGESTED HIERARCHY LEVELS In [1] and [10], The Hierarchy Levels Suggestion can be divided into two main sets as follow: A. Call Type The First set can be divided into six subsets as follows: 1. Local Call 2. Mobile Call 3. National Call 4. International Call 5. Service Call 6. Emergency Call B. Subscriber Address The second set can be divided into five subsets as follows: 1. State: can be represented by ISO 3166-1 Alpha-2 Codes 2. City: can be represented also by Alpha-2 Codes 3. Exchange: can be represented by Alpha-2 Codes 4. Zone/ Cable: can be represented by Alpha-2 Codes 5. Subscriber: can be represented by Alpha-2 Codes Types of Two Dimensions Alphabetical-Alphabetical Matrix (2DAAM) calls In [1], Five types of calls using the 2DAAM are defined when the number of selection digits are equals to Subscriber Address mentioned above? (n=5): 1. Emergency Service Calls This category of calls includes all kinds of free services Emergency Service ? Numbers are identified by an ‘address’ reflex the two initial characters of the services name following the type of call Emergency sign or the service identifier ‘1’. This number or address is one digit in length. Example: 1 {services name} Example1 (fire): 1 FI Example2 (police): 1 PO The size of the numbers block allocated will generate (676) addresses for services. The service identifier ‘1’ combined with the short remainder of the number is intended to provide numbers that are easily remembered. 2. Very Local Calls This category of calls includes all calls between two subscribers belong to the same exchange. Very Local Calls? Numbers are identified by an ‘address’ reflex the two initial characters of the zones name and subscribers name, respectively following the type of very local call sign or the service identifier ‘2’. This number or address is two digits in length. Example: 2 {zones name} {subscribers name} Example: 2 ZH OM The block numbers allocated size will generate (456,976) addresses for each exchange. 3. Local Calls This category of calls includes all calls between two subscribers belong to a different exchanges in the same city or region has the same Local Area Code (LAC). Local Calls? Numbers are identified by an ‘address’ reflex the two initial characters of the exchanges name, zones name and subscribers name respectively? following the type of local call sign or the service identifier ‘3’. This number or address is three digits in length. Example: 3 {exchanges name} {zones name} {subscribers name} Example: 3 SA ZH OM The block numbers allocated size will generate (308,915,776) addresses for each city or region. 4. National Calls This category of calls includes all calls between two subscribers belong to a different exchanges in a different cities or regions has the same Country Code (CC). National Calls? Numbers are identified by an ‘address’ reflex the two initial characters of the citys name, exchanges name, zones name and subscribers name following the type of national call sign or the service identifier ‘4’. This number or address is four digits in length. Example: 4 {citys name} {exchanges name} {zones name} {subscribers name} Example: 4 AL SA ZH OM The block numbers allocated size will generate (208,827,064,576) addresses for each country. 5. International Calls This category of calls includes all calls between two subscribers belong to a different exchanges in a different country has a different Country Code (CC). International Calls? Numbers are identified by an ‘address’ reflex the two initial characters of the countrys name according to ISO 3166-1 Alpha-2 Codes Countries Names table, citys name, exchanges name, zones name and subscribers name respectively following the type of international call sign or the service identifier ‘5’. This number or address is five digits in length. Example: 5 {countrys name} {citys name} {exchanges name} {zones name} {subscribers name} Example: 5 SY AL SA ZH OM The block numbers allocated size will generate (141,167,095,653,376) addresses for the world, or lets say (41,765,412,915,200) addresses for (200) countries around the world, [7]. Geographic Information System (GIS) It can be also noticed that each address such as (SY AL SA ZH OM) carries Geographic Information System (GIS) meanings; the former address can be read as follows: The subscriber Omar Meslmani (OM) is a Subscriber belongs to ZHra Zone (ZH) which belongs to Sabil Exchange (SA) in Aleppo City (AL) in Syria State (SY), as it shown in Fig. 3. [1-10]. Fig. 3: The suggested display of the new keypad. This range of addresses has the ability to define (6,425) address to every living person, whereas IPv4 supports 4.3Ãâ€"10*9 (4.3 billion) addresses, roughly 6.5 billion people population today, which is inadequate for giving even one ?address (0.66) to every living person, [11]. IV. REPRESENTATION THE SUBSCRIBER ADDRESS LEVELS We can present each level of the five subscriber address levels which consists of Alpha-2 Codes as mentioned above by only one digit product from cross point of the horizontal component on (x) axis with the vertical component on (y) axis depending on ?2D Matrix concept by special program means. A. Local Call representation Let us suppose that the calling party (A) wishes to execute a Local Call with a called party (B) which has the following address (SA ZH OM). Then the Local Call can be represented by three digits as it shown in Fig. 4. Fig 4: Local call representation. 1st Pair: SA (Cross Point of Horizontal Component S with Vertical Component A) 2nd Pair: ZH (Cross Point of Horizontal Component Z with Vertical Component H) 3rd Pair: OM (Cross Point of Horizontal Component O with Vertical Component M) Every pair can be represented by one digit according to the expanded Unicode coding method as it shown in Fig. 5. [1]. Fig. 5: Representation of the alphabetical pair. B. Mobile Call representation Let us suppose that the calling party (A) wishes to execute a Mobile Call with a called party (B) which has the following address (MT SA ZH OM). Then the Mobile Call can be represented by four digits as it shown in Fig. 6. [1]. Fig. 6: Mobile call representation. C. National Call representation Suppose that the calling party (A) wishes to execute a National? Call with another called party (B) which has the following address (DA DM TJ YM). This address will define the subscriber Yousef Meslmani (YM) which is a Subscriber belongs to Tenth Jazeera Zone (TJ) which belongs to Dummar Exchange (DM) from Damascus City (DA) in Syria State (SY). In this case the National Call can be represented by four digits as it shown in Fig. 7. [1] Fig. 7: National call representation. D. International Call representation Let us consider that the calling party (A) wishes to execute an International? Call with another called party (B) which has the following address (SY AL SA ZH OM). Then the International Call can be represented by five digits as it shown in Fig. 8. [1] Fig. 8: International call representation. E. Service Call representation The new mechanism of numbering should be having the ability to support all type of services calls. Let us suppose that the calling party (A) wishes to execute a Service? Call (Follow Me Immediately) with another (B) party which has the following address (JA MR HM). Then the Service Call can be represented by five digits as it shown in Fig. 9. [1,3-5] Fig. 9: Service call (Follow Me Immediately) representation. Let us suppose that the calling party (A) wishes to execute a Service? Call (Alarm Call) at seven clock (HH: 07) and thirty minute (MM: 30) for duration nine and ninety days (DD: 99). Then the Service Call can be represented by five digits as it shown in Fig. 10. [1,3-5] Fig. 10: Service call (Alarm Call) representation. F. Emergency Call representation Suppose that the calling party (A) wishes to execute an Emergency Call with a called party B (Fire) which has the following address (FI). Then the Emergency Call can be represented by one digit as it shown in Fig. 11. [1,3-5] Fig. 11: Emergency call representation. Extension of the Unicode Coding Method We suggest to modify the current database of an Unicode coding method? in order to have the ability to identify the additional (676) new characters or symbols of pair AA, AB, †¦, MA, MB, †¦, ZA, ZB, †¦, ZZ, which resulting from the proposed Mathematical Model for the total sums of Total Generated Addresses (TGA) possibilities for 2D Alphabetical- Alphabetical Matrix (2DAAM) range for (n=1). [9] Therefore, each pair can be represent by one symbol, then assign each one with the new hexadecimal suggested code of the extended Unicode Coding,? for instance RS= 20A8, whereas it represents in the current main version separately as follows R= 0052 and S= 0053 enable us to merge two symbols in one to save more Bytes!. V. SOME EXAMPLES AND DISCUSSION Suggested Dialing of the Telephone Addresses A. Type of Call Selection The type of call can be determined by means of several ways in the suggested new keypad. For instance, we can create our own default call type to execute the desired selection by means of check mark method as it shown in Fig. 12. [1] Fig. 12: Setup default call type. B. Dialing Called Number The Dialing Called Number can be execute by another methods differ from the traditional method by means of new keypad which has been developed especially for the new mechanism of numbering according to the following flow chart illustrated in Fig. 13 [7, 8]. The Cursor Position? can be already determined by means of the new keypad type of call selection to reserve number of digits suits to the desired call and compares the value with the initial values of the parameters. Then apply two logical loops, the first one (Loop1) determines the segments of each digit, while, the second one (Loop2) determines the number of digits. [1] ? Fig. 13: Illustrates the flow chart for 2D Alphabetical- Alphabetical Matrix (2DAAM) numbering. 1. National Call Dialing Figure 14 illustrates stages of data reception of dialing the International Call, where the Parameter Initial Values will be as follows:? ? Type of Call = International {Intern} Cursor Position {P=5} Number of Digits {D=5} Fig. 14: International call dialing mechanism. The total length of address for the International Call dialing will be (5) digits long. The receiving data for the first digit (SY) will be received in the position no. (5), the second digit (AL) will be received in the position no. (4), the third digit (SA) will be received in the position no. (3), the forth digit (ZH) will be received in the position no. (2), and finally the fifth digit (OM) will be received in the position no. (1). 2. National Call Dialing Figure 15 illustrates stages of data reception of dialing the National Call, where the Parameter Initial Values will be as follows:? ? Type of Call = National {Nation} Cursor Position {P=4} Number of Digits {D=4} Fig. 15: National call dialing mechanism. The total length of address for the National Call dialing will be (4) digits long. The receiving data for the first digit (AL) will be received in the position no. (4), the second digit (SA) will be received in the position no. (3), the third digit (ZH) will be received in the position no. (2) and the forth digit (OM) will be received in the position no. (1). 3. Local Call Dialing Figure 16 illustrates stages of data reception of dialing the Local Call, where the Parameter Initial Values will be as follows:? ? Type of Call = Local {Local} Cursor Position {P=3} Number of Digits {D=3} Fig. 16: Local call dialing mechanism. The total length of address for the Local Call dialing will be (3) digits long. The receiving data for the first digit (SA) will be received in the position no. (3), the second digit (ZH) will be received in the position no. (2) and the third digit (OM) will be received in the position no. (1). 4. Emergency Call Dialing Figure 17 illustrates stages of data reception of dialing the Emergency ? Call, where the Parameter Initial Values will be as follows:? ? Type of Call = Emergency {Emerg} Cursor Position {P=1} Number of Digits {D=1} Fig. 17: Emergency call dialing mechanism. In this case, the total length of address for the Emergency Call dialing will be as short as (1) digit long and suits this kind of calls which require higher speed in dialing. The receiving data for the first digit (FI) will be received directly in the position no. (1). [1-10]. VI. CONCLUSION By applying this method of numbering, we can obtain several practice benefits such as: 1. Identification a Constant Length of the Telephone Address The identification of constant length of the telephone address will be formatted using the new suggested design of keypad which contains ready blocks for data reception according to 5 levels which represent the basic components of any subscriber. [1] The important result of this representation will be create a standard length of the telephone address can be used around the world and offer at the same time more addresses for far future without any changing. 2. Uniform Identification Format of the Equipment Number (EQN) As a result, the Equipment Number (EQN) of any subscriber [3-5], will identify with the telephone number or address itself. 3. Re-building New Hierarchy of the Telephone Exchange The proposed structure of next generation of the telephone exchanges focuses on cancellation some current exchange elements structure such as Shelf name and using uniform design of other element such as Blocks and Cables. [10] The following Table illustrates that the address of local call will reflex partially the basic elements parameters of exchange hierarchy Exchange room, Main Distribution Frame (MDF) and Network for the current hierarchies of exchanges which represent it the current hierarchy of Siemens (EWSD) system for instance comparing with the suggested hierarchy of the new (HASAN) system as it shown in Fig. 18. Fig. 18: Illustrate the current proposed parameters in the basic elements of exchanges (Exchange Room, MDF Room and Network). This Table shows the identification of all parameters of the various elements of communication system (Exchange, MDF and Network) according the suggested hierarchy from one side, and identifying this parameters partially with the telephone address according the suggested numbering plan from other side. Also the Table indicates to the unnecessary parameters which refer to by (X) sign and can be omitted in the new Hierarchy. [1,3-5] It believed, the time to create a standardized Worldwide Numbering Plans (WNP) instead of the traditional National Numbering Plans (NNP) has come which differ from one country to another by means of creating a certain keypad depending on investing of the Two Dimensions Alphabetical-Alphabetical Numbering (2DAAN)? and support a number of applications like cut, copy, pasting or predict text, or at least and as a first step, trying of investing the advanced present new generations of telephone keypads and its applications such as: BlackBerry which developed by the Canadian company Research In Motion (RIM), which has a built-in QWERTY keyboard. [12] IPhone which is an internet-connected multimedia smart phone designed and marketed ?by Apple Inc. Since its minimal hardware interface lacks a physical keyboard, the ?multi-touch screen renders a virtual keyboard when necessary. [13] For text input, we can also implement a virtual keyboard on the touch screen which has ?automatic spell checking and correction, predictive address capabilities for the 5 elements of suggested Hierarchy: State, City, Exchange, Zone and Subscriber. The keyboard can predict what word the user is ?typing and complete it, and correct for the accidental pressing of keys adjacent to the ?presumed desired key. [14,15] Furthermore, we can also use the next generation of this technique (WNP) in the future, which will be the Three Dimensions Alphabetical-Alphabetical- Alphabetical Numbering (3DAAN) in the same manner mentioned above which can supports more and more addresses maybe for requirements of very far future or even forever. REFERENCES [1] M. S. H. Ali, M. N. Salaho and H. O. Meslmani, â€Å"Development a New Numbering Plan of Telephone Communication Systems,† Aleppo University Magazine publications, Engineering Science Series, vol. 63, Aleppo, Syria, 2008. [2] â€Å"ITU-T Recommendation E.164,† Assigned country codes, Geneva, Swiss, 2005. [3] â€Å"Digital electronic switching system EWSD,† Siemens training center for communication networks, Munich, Germany, 2000. [4] â€Å"Operating system documents of local exchange EWSD,† for Syrian Telecommunication Establishment (STE) project, Siemens company, Munich, Germany, Sept. 2001. [5] â€Å"Operating system documents of Ericsson exchange,† for Syrian Telecommunication Establishment (STE) project, Ericsson company, Stockholm, Sweden, Feb. 2003. [6] â€Å"Syrian Estimation Group Results,† Geography and population, Damascus, Syria, 2007. [7] â€Å"Public Switched Telephone Network (PSTN) ,† European Telecommunication Standards Institute (ETSI), Paris, France, 1997. [8] L. W. Couh, â€Å"Digital and Analog Communications System,† Macmillan publishing company, 2nd Ed., New York, USA, 1997. [9] L. HUGHES, â€Å"Data Communications,† Mc Graw-Hill, 2nd Ed., New York, USA, 1998. [10] M. S. H. Ali, M. N. Salaho and H. O. Meslmani, â€Å"Development a New Hierarchy of Exchanges,† Aleppo University, Magazine publications, Engineering Science Series, vol. 64, Aleppo, Syria, 2008. [11] â€Å"The World Fact Book,† Geography and population rank order publications, New York, USA, July 2007. [12] Research In Motion Reports Fourth Quarter And Year-End Results For Fiscal 2006. blackberry.com/ [13] Apple Inc. (2008-06-09). Apple Introduces the New iPhone 3G. Press release. ?apple.com/pr/library/2008/06/09iphone.html. Retrieved on 2008-06-09. [14] ?The most advanced mobile OS. Now even more advanced.. Scott Forstalls ?presentation. Apple. 2009-03-17. ? [15] Cohen, Peter, Cut and paste, MMS highlight iPhone 3.0 ?improvements. Macworld. 2009-03-17 ?macworld.com/article/139438/2009/03/iphone30user.html. ?Retrieved on 2009-04-01. ? Hasan Omar Meslmani was born in Aleppo, Syria, on June 4, 1964. He received B.Sc. (with honors) degrees in electrical and electronic engineering in 1988 and M.Sc. degrees in communication engineering in 2004, from Aleppo University, Aleppo, Syria. He joined the Syrian Telecommunication Establishment (STE), Aleppo Directorate in 1988, as a technician engineer, from 1988 to 1990, he was operating and maintaining engineer at Jamilieh Exchange (NEC System NEAX61), from 1991 to 1992, he was an installation Department Head at Jamilieh Exchange, from 1992 to 1993, he was a supervisor engineer at Ensari Exchange, from 1993 to 1994, he was a supervisor engineer at Sabil Exchange, from 1994 to 2007, he was a Head Exchange of Sabil Exchange, from 1998 to 2007, he was a Supervisor for Automatic Billing System for Sabil Exchange in Aleppo, Successfully completed training course at Siemens Training Center for Communication Networks in Munich, Germany (Siemens System EWSD) in1992, he has been a member of the Telecommunication Development Committee in Syria for 21st century, in Syrian Telecommunication Establishment (STE) in1996, Successfully completed training course at STE Training Center for Radio Communications at High Institute for Application Technology Science in Damascus, Syria in1998, After that, a successfully completed training course at Ericsson Training Center for Communication Networks in Dublin, Ireland (Ericsson System AXE 10) in 2000. He enrolled as Ph.D. student in electronic engineering in Communication Department, Aleppo University in 2006. Research Papers on Two-Dimensions Alphabetical-Alphabetical Matrix (2DAAM) NumberingPETSTEL analysis of IndiaAnalysis of Ebay Expanding into AsiaInfluences of Socio-Economic Status of Married MalesBionic Assembly System: A New Concept of SelfThe Project Managment Office SystemIncorporating Risk and Uncertainty Factor in CapitalOpen Architechture a white paperResearch Process Part OneRiordan Manufacturing Production PlanAnalysis Of A Cosmetics Advertisement

Thursday, November 21, 2019

The Business Strategy Game - BSG Online game Essay

The Business Strategy Game - BSG Online game - Essay Example Industry overview As we entered the footwear industry the notion of being highly competitive in the market was our main subject of concern. Through the knowledge we had gained in business studies, we had to apply Michael Porter’s five forces so that we thoroughly understand the market and promote our company’s competitive advantage (Roy, 2009). Thus, we put the following forces into close consideration. Firstly, on the bargaining power of buyers, we saw that, since the footwear industry provides an extremely competitive market, this force was at all times undergoing a steady rise. The most important opportunity under this force was that our company had the prospect of applying our differentiation principle for the products offered by our company. However, we observed that there was always the threat of consumers having a high bargaining margin thus bringing in the possibility of a lower profit than the one we had anticipated. About the bargaining power of suppliers, we saw that since there are very many suppliers in the footwear industry, this force is always very low. This was a very important opportunity to our company as it meant that, we could get supply of raw materials at low price. Thus, it aided us in meeting the strategy clock principle of selling quality products at low price. Concerning the threat of new entrants, we saw that the industry offered a great opportunity to our company. Since industry 7 was limited to five (5) groups, this threat was not applicable. In this sense, the footwear industry offered a huge opportunity for our company since we had to lay all our concentration mainly on outshining our existing competitors. Regarding the threat of substitute products, we saw this was a subject of great concern for our company. This is because, this competitive force was always very high as at most times the products available in the market were substitutes of one another. However, this force was an important opportunity to our compan y since it motivated us to be very innovative. Finally, we saw that the force of competitive rivalry was a great opportunity for our company to triumph in the industry. The opportunity offered by this force was that it ensured we did all our best in innovating higher quality product designs. However, our company had to face the threat of our competitors using our product designs to come up with more advanced ones. Company overview As we took over management of Zenith Company Limited, we observed several essential strengths and weaknesses that the company already put in place (Brott, 2009). Among the most essential strengths that Zenith had created is a huge market share of around 20%. Secondly, the company had a good customer base for its products particularly in North America and Europe Africa. It had also done a lot in promoting its brands over the internet thus enjoying the advantage of selling its products at higher prices per pair. Our company also had the advantage of having u tilized a significant number of retail outlets (Hill and Jones, 2010, p. 178). However, the company had some weaknesses and they included lack of celebrity appeal. The company further had a weakness of taking a lot of time in delivering goods to its clients. Decisions Year 11 There are several decisions that we had to concur as a team. This was to ensure that our company was going to meet the goal of being very competitive

Wednesday, November 20, 2019

Produced Water Treatment Term Paper Example | Topics and Well Written Essays - 1750 words

Produced Water Treatment - Term Paper Example This water must be treated prior to discharge or re-injection. Produced water has a complex composition, but its constituents can be widely grouped into inorganic and organic compounds, including dissolved and dispersed oils, grease, heavy metals, and radionuclide’s, treating chemicals, formation solids, salts, dissolved gases, scale products, waxes, and microorganisms and dissolved oxygen. More than 40% of the 250 million barrels of water produced in a daily basis from both gas and oil are emancipated into the environment. This clearly shows its effects in the environment and globally making it to be considered instead of clearing it as waste. Environmental concerns have driven research into the treatment of produced water. Current conventional treatment technologies are targeted at removal of heavy metals, oil and grease, and desalination, which often lead to the generation of large volumes of secondary waste. Produced water treatment also represents challenges for major oil-producing projects, especially in India, where special treatment requirements to meet the discharge norms for disposal or injection into spent oil wells have not yet been met. This affects the environment to which it can be reversed by being treated and become useful to the people. From recent researches, The USA and China have been quoted the leading disposers of produced water worldwide as seen in the previous years. This is a result of increased demand in oil and petroleum products worldwide in many non-oil producing countries. In 1995 the American Petroleum Institute, (API), made its recommendation on the Best Available Technology for Produced Water Management on Offshore Gas and Oil Installations. The following were identified by the report as the water toxicity contributing factors. The discharge of untreated water into fresh water bodies such as streams presents a toxic level that is highly lethal to aquatic life. In addition,

Monday, November 18, 2019

Case Study #1 Essay Example | Topics and Well Written Essays - 500 words

Case Study #1 - Essay Example Iron deficiency anemia is characterized by abnormalities in hemoglobin synthesis leading to small red blood cells that have had a little hemoglobin. The reduced hemoglobin negatively affects the cells effectiveness in carrying oxygen to various body parts. According to Cook (2002), adolescents are highly predisposed to anemia because of body requirements to support rapid growth. Females lose an average of 20mg of iron every month during menstruation and thus require high iron content to maintain normal body functioning. Symptoms of iron deficiency include fatigue, dizziness, lethargy, shortness of breath, restless leg syndrome, brittle nails, blue sclera, pale conjunctivae, glossitis and pica. Depending on its severity, iron deficiency has several consequences for patients. Decreased physical activity , diminishing endurance, abnormal temperature regulation, vulnerability to infections, compromised growth and development, increased lead and cadmium absorption hence a high probability of lead poisoning, pregnancy complications like premature birth and growth retardation of the fetus. Although there is no specific test to indicate iron deficiency in anemic patients, tests of iron status can be used to determine whether an individual has sufficient iron or not. For instance, hemoglobin tests are used to determine the level of iron-containing protein in red blood cells. Hematrocit indicates the percentage of red blood cells in the blood. Thus, use of the hemoglobin test is more direct and efficient in diagnosing iron deficiency in individuals. When the erythrocyte count is less than 2%, it shows that the blood has insufficient reticulocyte to enable the bone marrow to replace the worn out hemoglobin hence leading to deficiencies. The presence of hypochromic microcytic red blood cells in a blood smear is an indication of a deficiency in hemoglobin synthesis (Beard, 2001). Shortness of breath can be attributed to a reduced oxygen supply to

Saturday, November 16, 2019

Rehabilitation The Key In Changing Offender Behaviour Criminology Essay

Rehabilitation The Key In Changing Offender Behaviour Criminology Essay Behaviour can be explained through biological, learning or cognitive theories. This essay briefly analyses each of them in order to come to an agreement whether prison-based rehabilitation programmes should be abolished in times of financial cutbacks. Research evidence indicates that although much of our behaviour has biological roots as suggested by twin and adoption studies, it does not necessarily mean behaviour cannot be changed. Applications of cognitive and learning theories have proven that behaviour can be changed for the better. Although only certain types of rehab programs are effective in changing criminal behaviour, it nevertheless implies that behaviour is more nurture than nature. Rehabilitation: The Key in Changing Offender Behaviour In recent decades, incarceration rates (ABS) have displayed an upward trend across Australia. This, along with an increasing rate of recidivism(ABS) has contributed to a growing amount of criticism on the effectiveness of prison based rehabilitation programmes. According to Vennard, Sugg and Hedderman (1997) prison based programmes designed to rehabilitate offenders have been criticised on two main grounds. Firstly, that they over simplify the roots of offending behaviour by not considering other determinants of crime and secondly, that they are ineffective at changing criminal behaviour. This nothing works (Martinson, 1974) attitude has changed in recent years to a cautious optimism, supported by growing research that some types of intervention can be effective at reducing re-offending. It is therefore paramount that some, if not most rehabilitation programs continue to operate despite financial cutbacks. The effectiveness of rehabilitation programs depends on how criminal behaviour is acquired. Is it the result of an individuals genetic makeup that makes them a criminal or is it the environment in which they are raised that governs their behaviour? From the biological theories of behaviour to the behaviourist perspective on learning, there is one general theme of how genetic and environmental variables interact (Burton, 2009). Biological accounts of behaviour Family studies (Joseph, 2001; Raine, 2003; Schmitz, 2003) concluded that genetics can cause a tendency for criminal behaviour but they also found that an individuals personality could be, and often is, modified by the environment. Twin studies done by comparing identical twins or fraternal twins, is a type of genetic study that confirms this. Tuvblad, Eley and Lichtenstein (2005) examined 1226 pairs of twins for signs of heritability in anti-social behaviour (ASB) and found that although ASB in females were explained by genetic influences, males showed no significant mediation between aggressive behaviour and heritability. Furthermore, they found significant shared environmental effects in males. This suggests that the presence of ASB, a major factor in criminal behaviour (Joesph, 2001;Morley Hall, 2003) can be altered through environmental influences and therefore changeable through rehabilitation programs. On the other hand, adoption studies suggest that behaviour is more nature than nurture. In a review of adoption studies, Joseph (2001) found that most adoption studies concluded that adopted-away children who were born to parents with a criminal background were more likely to engage in criminal activity than adopted children whose parents had no criminal background. However Joseph (2001) also established that the majority of adoption studies found no significant role of genetics in violent crime. This suggests that there are some environmental influences on behaviour Besides heritability, certain biological chemicals are also known to influence behaviour. Monoamine oxidase (MAO) is an enzyme that has been shown to be related to ASB.A study by Elliot (2000) found that low MAO activity results in a lack of control which can lead to impulsivity and aggression, and by further association, ASB. Aggressiveness and impulsivity can also be increased by the neuro-chemical serotonin. As Lowenstein (2003) states, studies point to serotonin as one of the most important central neuro-transmitters underlying the modulation of impulsive aggression. Since chemical levels can be changed through diet, by incorporating a special diet in a rehabilitation program, it can improve the chances of successfully rehabilitating an offender. Although there is a lack of recent research evidence into this possibility, several past studies (Schauss 1981;) Schoenthaler, 1983 ) suggest that it is possible to manipulate behaviour through diet. Behaviour through learning The notion that criminal behaviour is a learned behaviour has been around for a long time. Sutherland (1947) put forth the theory of differential association which postulates that criminal behaviour is learned in association with those who have criminal attitudes and values. An individual learns favourable or unfavorable definitions of the legal code and he or she learns criminal behaviour if they accumulate an excess of definitions favourable to violation of law over definitions unfavourable to violations of law (Sutherland 1947). This theory suggests that behaviour can be changed. According to the theory, individuals become criminals principally because they have been isolated from groups whose behaviour are law-abiding or because of some circumstances have made them associate themselves with criminals frequently. Therefore, if criminals are to be changed, they must become members of anti-criminal groups or their present pro-criminal group relations must be changed (Cressy, 1955). Cressey (1963) did a follow-up experiment on drug addicts by applying his principles formulated in his 1955 article on the differential association theory on a drug rehabilitation program. Sixty-six percent of the drug addicts who stayed on the program for at least three months and 86% of those who remained on the program for at least seven months did not revert back to drug use. The differential association theory is not perfect however. Burgess and Akers (1969) criticised Sutherlands theory due to its lack of attention on individualism and failure to take into account of personality traits. Using Skinners principles of operant conditioning, they further developed Sutherlands differential association theory to address these issues. They called their revision, the differential association-reinforcement theory. Burgess and Akers(1969) argue that criminal behaviour can be explained as a function of the reinforcement or punishment a person receives from the environment. In other words, behaviour that produces a reward will tend to be performed more frequently in the future, while behaviour that is followed by punishment will tend to decrease in frequency. Differential reinforcement occurs when under certain environmental conditions, one behaviour leads to greater or more frequent rewards than does another alternative behaviour. The behaviour that receives greate r reinforcement- e.g criminal behaviour-becomes dominant over the alternative behaviour, such as law-abiding behaviour. Consequently, through this process of differential reinforcement, certain environmental conditions can increase the probability of criminal acts by individuals. A study on the effects of imprisonment(punishment) and probation (reinforcement) on juvenile offenders demonstrated the effectiveness of applying the differential reinforcement theory in rehabilitation. Tsytsarev , Manger and Lodrini (2000) found that the incarcerated group had a higher likelihood of re-offending whilst the probation group had a lower likelihood of re-offending. Cognitive approach Among the range of offender programmes designed to reintegrate offenders into society, those which are increasingly favoured are those that seek to address an offenders way of thinking, reasoning and associated behaviour, otherwise known as cognitive-behavioural techniques (Vennard et al, 1997). Cognitive-behavioural techniques assume that offenders are shaped by their environment and have failed to learn certain ways of behaving (McGuire, 1995;Vannard et al, 1997). This does not mean criminal behaviour is solely attributed to individual factors. McGuire (1995) explains that it also takes into account the social conditions which affect individual development and is not in conflict with other explanations of criminal behaviour, such as the theory of differential association. Rehabilitation programmes based on this approach tend to teach offenders to confront their crime, understand why it happened and develop ways of controlling their behaviour. The success rates of these rehabilitation programs have been well documented. Feindler and Ecton (1986) (as cited in Vennard et al, 1997) developed a programme for young offenders which successfully taught them how to control anger.(example) while McDougall et al. (1987) reported significant anger reductions among inmates in young offenders institutions who had undergone an anger management programme combining cognitive procedures, specifically self-instruction and self- statements to use in situations of anger. More recently, Lipsey (2009) examined the effectiveness of various intervention programs, including rehabilitation. Of the 548 interventions analysed, he concluded that punishment or deterrence-based interventions such as boot camps actually increased recidivism. In contrast, programmes that were multi-model and had a more behavioural or skills-oriented had the most impact in reducing recidivism. In a different research review, Landenberger and Lipsey(2005) showed that progra ms based on cognitive behavioural techniques are effective with juvenile and adult criminal offenders in various criminal justice settings, including prison, residential, and parole. They found that it was even effective with high-risk behaviour such as rape. Conclusion With the current focus on punishing criminals through longer prison terms and harsher fines, rehabilitation must not be neglected as the vast amount of research literature indicates that behaviour can be changed. The financial gains from turning a criminal into a law-abiding, productive citizen far outweigh the temporary savings from abolishing rehabilitation programs. Equally important is that we continue to provide more resources to rehabilitation programs in order to better understand, and change something that is constantly evolving human behaviour. Kelvin Mui

Wednesday, November 13, 2019

Guns, Germs, and Steel :: History, European Dominance

All through history, there is a ubiquitous theme. In life’s perpetual cycle, the Europeans always manage to overshadow the other civilizations. Why is it that the Europeans dominated the other races? Throughout Guns, Germs, and Steel, Jared Diamond desperately attempts to answer Yali’s question asking â€Å"Why is it that you white people developed so much cargo and brought it to New Guinea, but we black people had little cargo of our own† (Diamond, p. 14)? In the Epilogue, Diamond summarizes his answer to Yali’s question essentially attributing the environment for the success of the Europeans and discredits racial superiority of any sort (Diamond, p.405). Although other factors contributed to the rise of the European civilization, the environment was the main factor. Some specific factors falling under environment that affected the European civilization are geography, food production, and diffusion and population. The geography of Europe contributed to its dominance over the other civilizations. The Chinese appeared to have it all. They had a rise of food production, the largest human population in the world, and developed writing and most of all they were unified country (Diamond, p.411). The European coastline was highly indented with five large peninsulas which all evolved independent languages, ethnic groups, and government. China has a much smoother coastline with land that is less scattered compared to Europe (Diamond, p.414). â€Å"Europe’s geographic balkanization† and discord among the states developed hundreds of competing, and ambitious states (Diamond, p.416). States were kept on their toes to try to out due what another state had previously accomplished because they knew â€Å"if one state did not pursue some particular innovation, another did, forcing neighboring states to do likewise or else be conquered or left economically behind† (Diamond, p.416). Chinaà ¢â‚¬â„¢s unification based on geography led to their demise. Their government isolated them from the outside world and rejected all imports including technologies leaving them dramatically underdeveloped in a world of technologies (Diamond, p.416). Food production also affected Europe’s dominance over the other civilizations. As stated in chapter 18, â€Å"the former absence of food production in [the Americas] was due entirely to their local paucity of domesticable wild animals and plants, and to geographic and ecological barriers that prevented the crops and the few domestic animal species of other parts of the Americas from arriving (Diamond, p.356). Domestication of animals varied among the continents because of differences in continental areas and the Late Pleistocene extinctions.

Monday, November 11, 2019

Males and females

Much research studies had focused on the behavior of male delinquency. However, there has been a steady rise of juvenile female offenders as well as on the criminal justice system. Media has sensationalized the account of female violence. The rise in number of arrests however, can also be attributed to changes in policies in police practices, rather than a drastic change in women’s behavior. Most of these arrests were assault-related. While former juvenile offenses were once labeled as non-criminal offenses such as a girl being hit by a mother shoves her in self-defense and runs away from home. Whereas such an offense would be labeled before as â€Å"runaway† offense, today this might cause her to be charged of assault, which is a criminal offense. However, in criminal offenses such as robbery, female youths had been seen as becoming more involved in what used to be a predominantly male offense. Youth status, especially among urban girls is a causal factor for most of such crime. Pop culture among adolescents places great importance on high-end branded clothes, latest electronic gadgets, ‘looks’ that try to imitate Hollywood celebrities and fashion models, which had placed greater pressure on growing adolescents for peer acceptance. Youth pop culture has greatly caused an obvious division among differences in economic status, and the desire to â€Å"keep up the Joneses’† breeds the environment for some youths to victimize their own peers in order to buy the â€Å"desirable† goods which they would not have been able to afford otherwise. Other studies had also attributed thrill and excitement as robbery-causing factors among youths who were inclined to ‘show-off’. Although there are less occurrences of female robberies than among males, both has expressed the same motivation for committing the crime, and that is to acquire more money in order to have goods that bestow high status among peers. Female youth offenders were less likely to use weapons compared to males, and is much more characterized by harassing and hijacking youths of lesser age for petty amounts of cash and in some cases, jewelry. It has also been found that there is also a high correlation between poor relationships with mother-daughter which causes an increase among female adolescents to seek peer reputation which in turn becomes a contributing factor for female delinquency (Kerperlman & Smith-Adcock. â€Å"Female Adolescents’ Delinquent Activity†) A comparative study between male and female offenses however has shown that there is a significant difference between their criminal activities. Young men were more likely to resort to use weapons (guns) than girls. Knives were more of girls’ choice of weapon if they do resort to using one. Female offenders were more likely to commit murder because of conflict rather than during the act of other crime such as robbery. Assaults done by girls are more frequently done against one’s own family members. Males are more often arrested for more serious crimes such as rape, homicide, or burglary than young females. While there is a growing belief that female behavior has greatly changed among offenders today, suggesting that girls are taking over more masculine-related crimes, the offenses of male and female youth delinquency had both risen; therefore change of behavior cannot solely be blamed on changes of female youth behavior but changes on the over-all young population in ge neral. There is also no evidence that female offenders gained an increase of status among male peers since such offenses were done mostly among female younger victims (J. Weiler. â€Å"Girls and Violence†). Reference: 1.  Ã‚  Ã‚  Ã‚  Ã‚   Kerpelman, J & Smith-Adcock S.   â€Å"Female Adolescents’ Delinquent Activity†. Vol. 37, No. 2, 176-200. 2005 2.  Ã‚  Ã‚  Ã‚  Ã‚   Chesney-Lind M, Paramore V. â€Å"Are Girls Getting More Violent?: Exploring Juvenile Robbery Trends†. 1998 3.  Ã‚  Ã‚  Ã‚  Ã‚   Cited by Weiler, J. â€Å"Girls and Violence†. ERIC Digest, No. 143. http://www.ericdigests.org/1999-4/girls.htm         

Friday, November 8, 2019

Free Essays on The Role Of Socialization In Crime

The social learning theory proposes that crime is learned through the ongoing process of socialization, and is especially important during young childhood. Different important social units that influence a child’s behavior are their family, school, peers, and community. There are some important predictors of crime that can be discussed from a social-learning perspective, including gender, and delinquency. The four major concepts of the social learning theory are: differential association, differential reinforcement/punishment, definitions, and imitation (Skinner, & Fream 1997). Differential association refers how people exposed to different social environments have the opportunity to observe, and learn different behavior (Skinner, & Fream 1997). Children who are exposed to a behavior are given the opportunity to observe, and imitate a behavior and are therefore more likely to adopt that behavior than children who are not exposed to it. Children who are not exposed to certain behaviors will not be able to imitate them. Therefore a person who has been exposed to an environment that incorporates crime is more likely to commit a crime in their lifetime than a person that has not been exposed to an atmosphere that includes crime. Imitation is important when a behavior is first observed because one way to learn, and incorporate a behavior is to practice it in reality or in fantasy (Skinner, & Fream 1997). Children are likely to imitate a range of behaviors that they observe to test them out. The behavior can be learned through modelling, internalizing, and conforming to behavior that is deemed favourable. A child that observes criminal behavior may practice it in fantasy, or imitate it in reality. This rehearsal causes the behavior to be stored in the memory of the child and therefore becomes retrievable in the right circumstances. Behavior is considered favourable if it produces a desirable reaction, or a favourable consequence. Those... Free Essays on The Role Of Socialization In Crime Free Essays on The Role Of Socialization In Crime The social learning theory proposes that crime is learned through the ongoing process of socialization, and is especially important during young childhood. Different important social units that influence a child’s behavior are their family, school, peers, and community. There are some important predictors of crime that can be discussed from a social-learning perspective, including gender, and delinquency. The four major concepts of the social learning theory are: differential association, differential reinforcement/punishment, definitions, and imitation (Skinner, & Fream 1997). Differential association refers how people exposed to different social environments have the opportunity to observe, and learn different behavior (Skinner, & Fream 1997). Children who are exposed to a behavior are given the opportunity to observe, and imitate a behavior and are therefore more likely to adopt that behavior than children who are not exposed to it. Children who are not exposed to certain behaviors will not be able to imitate them. Therefore a person who has been exposed to an environment that incorporates crime is more likely to commit a crime in their lifetime than a person that has not been exposed to an atmosphere that includes crime. Imitation is important when a behavior is first observed because one way to learn, and incorporate a behavior is to practice it in reality or in fantasy (Skinner, & Fream 1997). Children are likely to imitate a range of behaviors that they observe to test them out. The behavior can be learned through modelling, internalizing, and conforming to behavior that is deemed favourable. A child that observes criminal behavior may practice it in fantasy, or imitate it in reality. This rehearsal causes the behavior to be stored in the memory of the child and therefore becomes retrievable in the right circumstances. Behavior is considered favourable if it produces a desirable reaction, or a favourable consequence. Those...

Wednesday, November 6, 2019

Argumentative Essay Sample on Euthanasia My Personal Opinion

Argumentative Essay Sample on Euthanasia My Personal Opinion Euthanasia is a serious political, moral and ethical issue in today’s society. Most people either strictly forbid it or firmly favor euthanasia. Although, I have no political background or confirmed religion, I choose to formally educate myself on the matter of euthanasia. I feel very strongly about this issue because I am affected by the matter on an almost everyday basis. I am a patient care technician in an emergency room and also work on a cardiac unit in one of Michigan’s top 100 osteopathic hospitals. I’ve actually watched people in pain eventually die. I’ve had to listen to patients beg me to, â€Å"pull plugs,† and put pillows over their faces to smother them so they could die faster. Terminally ill patients have a fatal disease from which they will never recover. Euthanasia is when a terminally ill patient chooses to end his/her own life by participating in physician-assisted suicide. After reading the ten sources and extensively researchin g euthanasia, I still support and promote the legalization of euthanasia. I believe that all people deserve the right to die with dignity. First of all, I would like to offer my own personal feelings and opinions on the matter of euthanasia because I actually have frequent contact with people who suffer with terminal illnesses. When I was a junior in high school I was offered the opportunity to explore my career options by pursuing advanced learning in the medical field. I attended regular high school for one half of the day, the other half of my day was spent in a nursing home (extended care facility), Port Huron Hospital and also at St. Clair Technology Center. I spent many hours studying medical terminology and proper body mechanics, I also learned how to take care of sick patients while promoting healthy life styles changes. Unfortunately the hardest lesson which was the how to take care of the terminally ill, while being supportive to their many physical, spiritual and emotional needs. I graduated from high school and proceeded to go to college in order to accomplish my goal of becoming a registered nurse. After gr aduation I moved into my own apartment and took a job at St. John’s Medical Center on an oncology/hospice unit. I worked at St. John’s for 18 months. Hospice is where terminally ill patients are sent to be cared for during the last stages of their lives. Oncology is the study of tumors, but more specifically, it’s a term usually associated with some kind of cancer. Therefore, for about a year and a half I had to take care of dying patients. These people had a slim chance of surviving for over six months to a year. When my patients were suffering and in pain I had to smile and tell them, â€Å"Don’t worry everything will be all right.† We both knew that everything would no be all right and they had just wanted to die. I witnessed patients telling other members of the nursing staff how they had begged and pleaded with god to take their life due to the excruciating pain they were experiencing. The nurse just replied, â€Å"Oh sweetie, you shouldn’t say things like that.† I had patients who were so mean and cruel to staff, it was unreal. They were mad at l ife because they knew it would be taken away soon. I’ve watched patients who were fully coherent and self-sufficient upon admittance in to the hospital become totally confused and bed bound. I watched these people lose all motor skills, which left them crippled and unable to feed or bathe themselves, or even use the toilet. They had lost all of their dignity. After reading Peter Singer and Mark Sielger’s, â€Å"Euthanasia-A Critique,† it is fair to say that these doctors have put forth a strong argument against euthanasia. Singer and Siegler are both medical doctors who are very proficient in their fields. Singer and Siegler make the point that, â€Å"the relief of pain and suffering is a crucial goal of medicine,† however, â€Å"euthanasia violates the fundamental norms and standards of traditional medicine† (Seyler 333 335). When a person no longer has the choice of continuing a normal healthy life, unusual circumstances call for rare methods of treatment. Why should a person be tortured with the, â€Å"frightening prospect of dying shackled to a modern-day Procrustean bed, surrounded by the latest forms of high technology,† according to Singer and Siegler this is an adamant fear of many fatally ill patients (Seyler 333). Singer and Siegler make several good points in their essay, however, pain control seems to be the biggest issue facing the terminally ill as stated by the doctors. This is entirely untrue. People who are faced with a terminal illness experience just as much emotional turmoil as physical pain. When Singer and Siegler say, â€Å"physical pain can be relieved with the appropriate use of analgesic agents,† I am saddened because it has been my own personal experience to watch terminally ill patients become over medicated and drugged up so much that they are unable to think or act for themselves (Seyler 333). When a person can longer speak, think or act for him or herself, that person has been stripped of their dignity. Sidney Hook’s, â€Å"In Defense of Voluntary Euthanasia,† was emotionally charged and very gripping. Sidney Hook is a philosopher, educator and author (Seyler 338). Hook has been so unfortunate as to have sampled death and was left with a bitter taste in his mouth. He suffers with congestive heart failure, which one can live with but which if not treated or maintained properly will cause a painful death. He offers his first hand account of meeting with the Grim Reaper: I lay at the point of death. A congestive heart failure was treated for diagnostic purposes by an angiogram that triggered a stroke. Violent and painful hiccups, uninterrupted for several days and nights, prevented the ingestion of food. My left side and one of my vocal chords became paralyzed. Some form of pleurisy set in, and I felt like I was drowning in a sea of slime. (338) If this sharp use of imagery isn’t enough to make the reader understand this mans pain, maybe his next account will persuade one to rethink euthanasia, â€Å"At one point, my heart stopped beating; just as I lost consciousness, it was thumped back into action again. In one of my lucid intervals during those days of agony, I asked my physician to discontinue all life-supporting services or show me how to do it. He refused and predicted that someday I would appreciate the unwisdom of my request† (Seyler 338). It is important to add Hook’s quotes when reflecting upon his personal experience with death. Hook feels as though he was robbed of the peaceful serenity of death and will have to suffer through it once more, when death comes knocking again. Euthanasia is a serious issue in today’s political world. Arguments for and against euthanasia are cause for major debate. Proponents and opponents disagree on at least four controversial issues. The four major issues are, but not limited to, the nature autonomy, the role of beneficence, the distinction between active and passive euthanasia and the public and social implications of legalization. The nature of autonomy basically means that all people are granted the right to think, feel and act for him or herself. The first and fourteenth amendments were put into place to protect an individual’s freedom of religion, speech, privileges, immunities, and equal protection. The role of beneficence involves the physician’s duty to relieve suffering. The distinction between passive and active euthanasia, or killing and allowing one to die. The public and social implications of legalization are totally based on one’s individual feelings. Euthanasia is a serious topic because it goes against the norms of traditional medicine. Euthanasia is not always applied to terminally patients either. People who have been in serious accidents, or who have debilitating diseases such as severe cases of Cerebral Palsy, Multiple Sclerosis, Muscular Dystrophy, and Cerebral Vascular Diseases (which lead to strokes and heart attacks) are often in consideration for the application of euthanasia. The problem is, however, these patients typically are in a persistent/permanent vegetative state. A persistent/permanent vegetative state (PVS), is a condition in which a person is neither in a coma nor unconscious. In other words, these patients cannot act or speak for themselves or in addition, respond to much stimulus. Personal experience and opinion may be a factor that weighs heavily on the issue of euthanasia, but the real substance comes from the facts. The legal ramifications play a major role in the legalization of euthanasia. Euthanasia began with its roots in both the Hippocratic tradition and the Judeo-Christian ethic of sanctity of life, Western medicine has long opposed the practice of physician-assisted suicide. However, the controversy over euthanasia is not new. Beginning in about 1870 (after the introduction of chloroform and ether) and continuing in today’s society, euthanasia is still a hot topic of discussion. Ohio is the only state in the United States of America that does not explicitly prohibit euthanasia by jurisdiction of the federal law. After interviewing Dr. Caleb Dimitrivich, an oncologist, who most directly works with terminally ill patients at St. Joseph’s Mercy Hospital, it is easy to see that he definitely opposes euthanasia. Doctors have real difficulty dealing with death. â€Å"Dying is something that I, as doctor, am trying to prevent. If a patient is terminally ill, I strive to make that patients life as comfortable as I possibly can,† says Dr. Dimitrivich. After reading, Matters of Life and Death,† by Professor Lewis Wolpert, one is reminded by the’ â€Å"doctors attitude† towards dying patients. Wolpert is a professor of biology and how teaches how biology is applied to medicine â€Å"Dying is something patients are not allowed to do. It is an affront to so go against the doctor’s efforts and advice, and this is completely understandable but cannot be the basis for not helping a patient die† (Wolpert 42). The religious community has taken a negative stance on the issue of euthanasia. The majority of Christian religions ban the application of euthanasia to the terminally ill or PVS patients. In the bible, one can read about the absolute sin of taking another human being’s life, it is iniquitously wrong. After interviewing Maryanne Chapman who is a practicing member of the Catholic faith and who has also worked as a secretary for 15 years at St. Valerie of Ravenna in Clinton Township, MI, her opposition to legalized euthanasia is very clear. â€Å"It is a crime against God to end a life,† states Chapman. However, Maryanne is 72 years old and suffers from Chronic Obstructive Pulmonary Disease (COPD), also makes the comment, â€Å"people don’t live on machines, so therefore why should we die on them, God didn’t intend for that.† Basically what Mrs. Chapman is trying to say is that for patients suffering with a PVS, it is also a sin to try to sustain a li fe that has no purpose or function in society.

Monday, November 4, 2019

Marketplace Fairness Act Essay Example | Topics and Well Written Essays - 500 words

Marketplace Fairness Act - Essay Example es is defined as goods or services sold into a state in which he is not allowed to pay, collect or remit state or local sales and use taxes unless provided in the act. In case the remote seller uses the CSP and there is an error he/she is forgiven if there is a debt however CSP is not liable if the inaccurate information is fed into it and also both the remote seller and the CSP are not liable if the error is as a result of software provided by state. However the remote seller is liable is does not use the CSP. The act has effect on the remote sellers in that the MFA must pass and become effective law, states that require collection of sales tax must be a member of Streamlined Sales and Use Sax agreement, publish a notice that it is participating in the act, the remote seller must have a minimum of $1 million dollars in remote sales in United State, that the State will provide tax certified software provider and that the remote seller may use the CSP to calculate sales tax collections and the remote seller should remit collected tax to the appropriate state (United States, 115). This bill was passed by Senate with 70% of the vote in the spring agitating that this could become the law of the land. This is on the basis that small businesses are economic backbone of the state and nation (United States, 108). They provide jobs, economic growth, aid support in the communities they serve the loss of customers to the internet stores who sell goods and services at cheaper prices has lead to loss of customers hence higher unemployment, slow growth in the economy, underfunded charities and state and government receiving less revenue while more and more people want assistance. As stated in the Digital Goods and Services Tax Fairness Act of 2011, the house of the Representative has not yet voted for the bill nor has it set date to vote it in. As much as this bill has not passed the House of Representatives it’s doubtful that Congress will not pass some form of legislation

Saturday, November 2, 2019

Beats By Dre Essay Example | Topics and Well Written Essays - 2000 words

Beats By Dre - Essay Example Due to the entry of new players into the market, the level of competition is believed to be on the rise, as manufacturers adopt more aggressive and market cantered marketing approaches to reach out to new customers (Breen, 2014). Beats by Dre is a headphone manufacturing line in the united states that has gained significant prominence due to the promotion and celebrity endorsements that it has acquired in the past. The company own the consumer can access significant patent for audio technologies and some of the music from online music stores. However, as a strategy to reach out to new customers and increase influence in the market, the company has collaborated with a number of companies including HTC and Chrysler (Doyle 2011). In 2014, Apple Inc. acquired the company through a cash and stock deal worth more than $3 billion, one of the largest company acquisitions ever witnessed in the headphone industry. In this report, beats by Dre will be discussed in light of its competitive market strategies and how it performed in the face of emerging small businesses. Porter five force analyses and Ansoff growth matrix will be used to evaluate the performance and prospects for the company (Johnston, 2012). The headphone industry has emerged as one of the most attractive sectors in 2014 due to the emerging interests from music producers, mobile phone companies among others. Though the industry is still emerging from low market recognition, the reputation it has gained in the market demonstrates its great potential and future prospects. A number of small companies have entered the market and they continue to rise above the stiff competition (Akoth, 2014). One such company is beats by Dre, a headphone company that was founded in 2006 by Dry Dre, an American musician. Through a well-coordinated market campaign and market sensitization programs, the company acquired dominance and respect in the industry. This attracted major