Saturday, August 31, 2019

Inventory period and operating cycle Essay

Age of inventory will show the number of days that inventory of COSCO is being held before they are sold. Increasing or decreasing the same must be a guided by the objective of maintaining a good working capital condition. COSCO Wholesale has inventory period of 27 days. Before recommendation could be made whether its inventory period should be increased, said inventory period must be compared with the payment terms with suppliers. If the company’s payment terms (Bernstein, 1993) to supplier is 30 days them the age of inventory of 27 days is a good sign that the company is making sale of inventory efficiently, which means that it can sell faster than the next time the company orders and pays for these goods. For COSCO to maintain its 27 days inventory period, it must also tie this up with collection period since higher sales volume is normally associated with longer collection period. Increasing sales on credit with longer collection will decrease inventory period and the two will sum up to operating cycle (Meigs and Meigs, 1995). If the resulting operating cycle still allows a good and manageable working capital situation, then increasing sales on credit must be done up to such point, otherwise mismanaged working could turn the company unable to meet currently maturing obligations. Operating Cycle COSCO’S operating cycle is 30 says which consists of 27 days inventory period and 3 days collection period. To determine whether recommendations should be made whether the cycle could be increased or decreased should be tied up on it working capital situation. If its present working capital situation allows the company to meet it currently maturing obligations then its operating cycle is just right. As discussed earlier, the strategy on operating cycle is affected by decisions made on age of inventory and policy on making sales on credit. One could not just decrease operating cycle without basis like by decreasing age of inventory by underinvestment as this could mean not satisfying the demand for company’s products for the sake of shorter age of inventory and consequently shorter operating cycle. The company’s policy on sales on credit must be sufficient enough to meet realistic targets in terms of sales revenues and working capital requirements (Brigham and Houston, 2002).

Fundamental Attribution Error Essay

The fundamental attribution error is when a person overestimates the influence of another person’s personality over a remark or behavior rather than giving credit to the influence the situation may have on the person. A famous experiment demonstrating this â€Å"error† was conducted by David Napolitan and George Goethals. In this experiment, they instructed a woman to act either rude and critical, or warm and friendly to each person individually. Half of the group was told that the woman would be acting spontaneously, and the other half was let in on the experiment. The result was that the assumptions about her personality did not change even though half the group had known that she was an actor. Each group assumed that because the woman behaved coldly, her personality was so. Even the group who was told that her behavior was situational had still believed that she was warm and friendly because of the way she was acting in the situation. Many times, we find that we commit this error. If we simply looked at a situation from the other person’s point of view, perhaps they were having a bad day; we would then understand their behavior and perhaps even become sympathetic toward them. This relates to me because I tend to make this error a lot throughout the day. Many times, however, it has to do with my situation as well. For example, if I am having a bad day, it makes me harder to sympathize and/or understand when someone else is having a bad day. It’s like I don’t see it. Their bad attitude is just like another notch of bad onto the belt of bad day: another thing that went wrong. However, if I stop to think about why this person is so snappy, I might be able to see that it is not just the type of person that they are, but it is perhaps the situation that they were put in.

Friday, August 30, 2019

Political Violence and Gangsters Essay

Eventually, due to many reports of violence and killings being associated with D’Andrea, he decided to withdraw from politics instead of his political ambitions being linked with blood shedding. Immediately after his withdrawal from politics, he and his friend started receiving death threats. On May 11, 1921, as D’Andrea was moving to his home with who used to be his bodyguard, they parted well and on reaching his doorsteps, he was attacked and suffered internal bleeding. Other incidences of violence which were politically oriented were witnessed in Chicago city after Merriam Charles who was a professor lost in the elections of Chicago reforms. He made it clear that Chicago was the most corrupt city in America. Until the times of Cermark, the issue of one monolithic was no more, but instead establishment of a collection of mini machines. Such machineries were controlled by prominent political factotums who dispensed their jobs in favor to their home constituents in return due to their loyalty on the material election date. An alderman’s clout purely depended on liability of political structures and schemes to have his vote delivered. In this city, the question of either winning or losing never rose to the politicians but the organizations definitely won the battles through all means because always the court was based on pluralities. (Write here Author’s name)Could you write here author’s name please? Introduction. The Chicago’s criminal reputation preceded long the wars between beer and Al Capone. Although they were born during the same year as sensationalists, American’s new and penny press fear of a masteries working class, the city was perceived even to its earliest observers as a hotbed of immorality and criminal events. Cases of theft murder, rape and crimson among other mayhems became the town’s breaking news in most of the media services. According to the cities complain that the business stealing horses had been reduced to a regular system in 1840, the tribune echoed the perception of the countless Chicagoans (Wirth 1965, p.77). Within the course of the same year, around 2,500 cities’s first hangings were reportedly and confirmed. As the time went on, observers from both beyond and within the city continued to note the existence of identifiable events of crime under ward. In the democrat ward, it was still getting to be notorious fact that pickpockets, thimble, robbers, three-shell game players and broad cases of sly tricks application to cheat become perfectly in the city. The criminal reputation in the city was enhanced by the visibility of vice (Brumer 1969, p.28). Within a half century’s period, more cases of gambling were reported in the city than the larger city of Philadelphia and more per capita than in New York. The vice was first concentrated in a certain area along the river of Chicago known as the ‘patches’ where by the tribune interpreted it as the most beastly sensuality and darkest place of criminal events. The city’s reputation was also wicked as many people witnessed the fire of that time as divine retribution which was against a modern day of Sodom and Gomorrah. The case of lawlessness after the conflagration provided no cause for optimism. One of the newspapers called the city reported that the entire city was infested with groups of burglars, thieves and cut-throat, bent on plunder and also murdered. The fire did not show any sense of redemption whereby the Chicago’s reputation darkened with time. As a result of existence of the image of lawlessness, violent labor dispute crisis increased especially with the Hay market crisis (Davis 1960, p.78). Understanding Political Violence. There is more to the modern political regions than the political religions and rituals sematics as it is assumed regarding to National Socialism and other regimes in totalitarian. Political style and other ideologies do not matter although they provide an answer to as how dead certainty came to be achieved by the ultimate mission. The revolutionary terror furies and sacrifice of the national revivalism give provision that in the current world, it is the region that is in violence but not the violence in region. Human rights violations, including the torture, kidnappings and murder were the daily phenomenon in Chicago city in 1920th. It had become a normal issue that disappearances and murder of labor leaders, kidnapping, union organizers and leftists to be increase especially during the events of politics. According to the research, many people were assassinated as a result of politically motivated killings in the country. Political violence and social change should be considered as the major factor as a breeding ground for violence. The focus should be to the armed organizations mainly the terror perpetrators who are not within the military operations. The aspect of how the political and economic situations in different social strata and how they link with violence should also is considered. Both armed organizations and terror contribute to economic decline. Armed conflicts are more common in the transitional societies like Chicago than in advanced countries (Green 19995, p.65 ). The killing of the vice leader by the name Jim Colosimo in the year 1920 which was the first year of prohibition, indicated a new phase in Chicago’s violence. The violent bloodily a beer wars between the year 1924 and 1930 made Al Capone very famous and the city synonymous with a new phenomenon of gangsterism. Notoriety in Chicago city grew due to series of violent incidences including; the 194 violent shooting of gang leader Dion O. Banion in his flower shop in North side, 1926 machine gunning of Hymie Weiss near the Holy Name Cathedral, 1929 Saint Valentine’s Day massacre which was done to seven people in a clerk street garage. These cases were very widely reported in the international press and also became the incidents of subjects of the popular contemporary plays and books (Haller 1973, p.254). Political Violence and Gangsters. To outline how politics contributed to violence activities in Chicago in 1920th, Chicago’s Union Siciliana elaborates how the decade was marked with series of slaughter. The organization of Unione siciliana was like a mafia group which was very mysterious. It was composed of the Camorra and the Black Hand. This organization was among thousands of fraternal organizations established in America for the purpose of mutual benefit in the societies. It was organized in the Chicago city and had limitations in membership. Depending with the organizations rules, the natives from other countries were interested to join and they were allowed, whereby at the end of first world war, there were many lodges of non Sicilians among them being Tuscan lodge, the Ventiam lodge, the Roman lodge and many more (Mc Garry 2004, p.556). The Union had no leadership but only membership. The leadership of Unione siciliana was exclusivity a stone in the shoe in most infamous gangs always. Al Capone whose heritage was in Neapolitan was associated with the responsibility of the killings of the most Unione Siciliana leaders during the 1920s due to their gang allegiances. Within the decade of 1920s, Anthony D’Andrea was appointed as the leader of the Chicago’s Unione Siciliana. Being born in Sicily, Anthony was a graduate from Palermo University who was a linguist and at the same time, he had studied priesthood. In the year 1902, he was convicted due to counterfeiting and forced to serve 13 months in the prison. In 1903, a former student of D’Andrea interceded on his behalf whereby Anthony was pardoned by the president Theodore Roosevelt. In Chicago, Anthony D’Andrea was known as the former power in the old red light district because in his early teens he was linked as being in connection to a certain gang of Italian counterfeiters and also bank robberies that based operations throughout the country. During this time, Ignacio who was also called Lupo the wolf Saietta was put under arrest in the city of New York and imprisoned. On the other hand Anthony and Frank Milano were also involved in counterfeiting and apprehended in Cleveland and both charged. This indicated that the Italian underworld criminals may have been networking together for long time prior to prohibition (Merriam 1929, p.78). When Anthony D’Andrea was released from prison in the year 1903, he proceeded to Chicago and settled in the so called 19th ward. He was interested with politics and joined local unions. D’Andrea’s Brother Joseph who was the president in the Sewer Diggers was later involved in the Peon system of extorting money from the Italian robberies. As a result, he was murdered on the canal street during a labor quarrel as they were budding the Union’ station. Consequently, it was noted that his brother Anthony D’Andrea would take his position of a presidency. John powers had been the Alderman and the democratic political boss in the 19th ward since the year 1888 had won the Alderman’s post in the ward for 16 elections consecutively (Shapiro 1988, p.143). It is from this time when the ward transformed from predominately Irish to around 80 percent Italian. Most of the democrats started to look for Italian democrat to represent them whereby Diamond Joe was the representative of Italian republican voters within the ward. Earliest on, the split between powers and D’Andrea had been noticed in 1915. The difference was due to each one of them supporting a different mayor candidate. In 1916, D’Andrea presented himself for the Democratic nominations against powers picked candidate James Bowler. In the same year, a Bowler supporter was killed in a Taylor street saloon. Police from streets of Maxwell claimed Lombardi Bowler’s killing as being just the latest addition to Black Hand toll. On the same month, Chicago’s daily tribune printed an article with title that, police on guard in two homes in Mafia terror (Hagan 1978, p.112). According to the article, it indicated that police had full confidence that the killing was as a result of Sicilian feud as it was opposed to the 19th ward political war. According to John Landesco with organized crime in Chicago, he declared that D’Andrea was the elected as the Unione Siciliana’s president which was one of the strongest organizations of foreign groups in America. When power noticed his defeat, he tired to make peace with D’Andrea whereby D’Andrea accepted to support powers for adreman’s position. The Supreme Court of Illinois however voided the election results and Powers took the position. When these events turned, there was a declaration of political war to the death (Gosnell 1937, p.432). On September 28, 1920, an explosion of bomb was witnessed on the porch of Alderman Power’s residence. Powers political rivals claimed that, Powers was keeping the house on Alister place so they intended him to claim residency within his 19th ward. Sometime after the explosion, Anthony D’Andrea was recorded announcing his candidacy as a non partisan for alderman’s position in that 9th ward. On the Feb. 11, 1921 just eleven days before the elections of the aldermanic, another powerful explosion of bomb was evident at Anthony D’Andrea’s political rally in the building on the Avenue of Blue Islands. After the incidence, Alderman Powers was the most sympathetic man. In response to these incidences, the Illinois state’s Attorney Robert E. who for long had proved to be a person of integrity reacted to the bombing incidences through vowing to have new state bill. He declared that, whoever was to be caught with bombing cases would serve for 25 years in penitentiary with death sentence as the maximum punishment. He also added that whoever who was to be caught placing a bomb where it can endanger children or women would be hanged. Chicago city had very tough and terrible conditions in the nineteenth ward. The gunmen were patrolling all over in the streets. Many bump off and kidnapping threats were being offered to D’Andrea while his supporters were being threatened and slugged. Gunmen and cutthroats had been imported from Buffalo and New York due to campaign intimidation. Within less than one week later, on the Feb. 18th, an explosion was made at the home of D’Andrea’s territorial area which adversely spoiled D’Adrea’s political offices of campaign headquarter. Immediately after each occurrence of bombing, Powers covered himself through posting $2,000 as a reward to capture and arrest the concerned perpetrators (Lesswell 1939, p.87). On the elections day in Feb. 22, 1920, security officers were ready very early in full force throughout Chicago city. They succeeded to arrest around 150 men during the day time. The most notorious one was Edward O Donnell who was the leader of a certain gang in southern sides. The day’s biggest catch included that of dynamite. In the area where the law enforcement officers called the headquarter for pre-election bomb outrage in the 19th ward, the security officers managed to raid a certain farm near the 71st street and the Avenue Central park. They were able to collect around 200 pounds of uncovered dynamite and many sacks of blasting powder indicating that those were the major bomb manufacturing centers. From the residence, two men were arrested (Wirth 1973, p.99). Within the 19th ward, more than 450 police officers were stationed. Before noon on the same day, 50 violators were under the police custody. In surprise, despite the fact that many security officers were put in place, three people from the camp of powers including the election judge and the precinct captain had already been kidnapped in the morning section. Power emerged as the winner by a slim margin of only 435 votes. This however did not put to an end the criminal activities and war. In less than just three weeks after conducting the elections, two precinct captains of Powers where killed mercilessly by gangsters. On March 9th, 1920 at around 9 in the morning section, Bailiff A. who was a municipal court Deputy was attack by two bandits as he walked to work. Just a few distant from that scene the same man was attacked again and hit nine times to death. After the murder of Bailiff A, another man by the name Raimond was also murdered while in his store of cigar on Taylor Street. After the incidence, two of the killers ran from the store and dropped one of the murder weapons on sidewalk. It was immediately speculated that most of the gunmen who were involved in the two killing were imported from New York. On April, 12 of the same year, D’Andrea who used to carry a gun for his own safety purposes was arrested after a social club was raided where the gun was found in his pocket. Also several men were arrested for being found gambling in the club (Woodiwiss 2001, p.71). Eventually, due to many reports of violence and killings being associated with D’Andrea, he decided to withdraw from politics instead of his political ambitions being linked with blood shedding. Immediately after his withdrawal from politics, he and his friend started receiving death threats. On May 11, 1921, as D’Andrea was moving to his home with who used to be his bodyguard, they parted well and on reaching his doorsteps, he was attacked and suffered internal bleeding. Other incidences of violence which were politically oriented were witnessed in Chicago city after Merriam Charles who was a professor lost in the elections of Chicago reforms. He made it clear that Chicago was the most corrupt city in America. Until the times of Cermark, the issue of one monolithic was no more, but instead establishment of a collection of mini machines. Such machineries were controlled by prominent political factotums who dispensed their jobs in favor to their home constituents in return due to their loyalty on the material election date. An alderman’s clout purely depended on liability of political structures and schemes to have his vote delivered. In this city, the question of either winning or losing never rose to the politicians but the organizations definitely won the battles through all means because always the court was based on pluralities. (Landesco,1973) During the Election Day, a message was being sent stating that the enemy should be punished and destroyed such that he can never think of politics again in future. The end justified the resulting means in time of insuring a victory decisive in the often grim Darwinistic struggle for life and death. Threat campaigns, brass knuckles, and even murder came to be the only preferred tactics methods especially when the normal ways of using propaganda and persuading voters seemed not to work. The violence associated with Al Capone and the terror campaigns during the election eve in 1923, he waged against the other political bosses of Cicero. Al Capone tried to invade the blue-collar factory in Chicago town when things proved to be too not for him. Capone was the only piker in the town. Intimidation and violence was the Chicago’s way out, and its roots historically extended very much in those times as compared to the rollicking era of Big Fellow and the bathtub gin. Chicagoans much involvement was in the political elections results not considering distractions of the professional sports televisions and other diversions of 20th century than today. In every ward, there was organization of social clubs which aimed to boost the areas preferred candidates. In the city, there were pageantry of colorful parades, torch light rallies, bombastic oratory emissions of sets of smoke were all over the meeting halls and also scattered all over the city (Adamic 1931, p.56). All these events were to show important senses ethnic pride hopes neighborhood identity, fears and also prejudices which vested in candidate’s fortune and enough courage to descend out of the same dominant nationality which was found within the wards. At times a Republican club or the Democratic club engaged in rival organizations which represented some other districts and the ethnic groups in woolly and wild free for alls which were often settled by bats, bricks and also pavement stones. In 1928, Aiello Capone war was still controlled by Unione Siciliana in Chicago. In April, 1928 elections, Capone supporters were heavily backing their Uniuone Siciliana candidate Bernard Barasa. This group had been associated with a number of explosions in connection with his campaigns although he lost the battle to the incumbent with more than 100, 000 votes. Immediately after the primary elections, Capone left for Miami Beach. In late June 1928, other leaders who included Fischetti Charley, Dab Serritella and Jake Guzik visited the boss. Soon they were accompanied by the famous machine gun jack and other killing twins who had been associated with murder of two Chicago killings of police officers. They discussed the fate of Frank Uale, who was the national president of Unione Siciliana in the state of New York. The next visit of Capone to Chicago was to attend the funeral of Lombardo Anthony, who was the Capone; sponsored president in Chicago.Lombardo had been killed by Aiello forces. As Capone was leaving Chicago, he met Lollordo and discovered that he could be threat to him in aspirating the presidential seat. On January, 8, 1929, Lolordo was shot with .38 Caliber guns without any warning (Landesco 1931, p.68). Conclusion. Some few years later, the long awaited reformist aim of shadowy conspirators who were seeking for control of Chicago’s violence situation got the public attention in the city when vice entrepreneur and boot legging Al Capone and Torrio John rose and prominence shocking violence. Their main agenda discussed about the earliest depictions of the criminal events which oriented from election activities during the boot legging time. They ignored many illegal businesses from international liquor trading networks t neighborhood soft drinks parlors. It also ignored public demands for booze which focused on competition in violence among the gangs in dominations of the illegal trading especially in urban space. Their illustrations also show the fuzzy and ever shifting turf of major gangsters around 1925 which suggests that no Chicagoan could control some of the gang. Generally these criminal events indicated that the city of Chicago had no well established rules to govern the country’s activities. It is also noted that most of the organizations associated with violence were supported and funded by the prominent political aspirant’s. At the same time, more groups of gangs formed due to the advantage of political crisis. For instance, the robberies, arson, rape among other evil events. All these symbolized government’s failure to provide enough security force to curb the problem. References. Adamic L, (1931), Dynamite: The story of classic violence in America, London. Asbury H, (2002).The Gungs of New York.London. Brumer H, (1969), Symbolic Interactionsm.Berkly. Davis H, (1960).Reinhold Niebuhr on Politics: New York Gosnell H, (1937).Machine Politics: Chicago Model. Chicago. Green P, (1995).The Mayors: The Chicago Political Tradition. Carbondale. Hagan J, (1978).Modern Criminology. New York. Haller M, (1973).Organized Crime in Chicago Part iii of the Illions crime survey 1929.Chicago. Landesco J, (1973), Organized Crime in Chicago: Part iii of the Illions Crime Survey 1929.Chicago. Lasswell H, (1939).World Revolutionary Propaganda: A Chicago Study. New York. McGarry j, (2004).The Northern Ireland Conflict: Consociational Engagements. Oxford. Merriam C, (1929).Chicago: A More Intimate View of Urban Politics.New York. Shapiro H, (1988).White Violence and Black Response: Amherst. Wirth L, (1965).On Cities and social life.Chicago. Woodiwiss M, (2001), Organized Crime and American Power. Toronto.

Thursday, August 29, 2019

Travel Development and Construction Rail Terminals Essay

Travel Development and Construction Rail Terminals - Essay Example Accordingly, a plan is needed to direct all the activities, and this plan is directed to people to make them react according to the company’s desired result, and done through a combination of marketing tools. Responses of people in this marketing effort may be direct or indirect, delayed or instant. The extent to which the marketing concept that should be applied in the High Speed Railway will now depend on the information gathered by the network. The marketing program should be enough to stimulate attention, interest, desire and action among its target customers. High speed railways were first built in Japan in the 1960s, and now span countries across Europe and Asia. The pace of development shows no sign of slowing, and China, France and Spain, amongst other countries, are all pressing ahead with ambitious plans. Britain cannot afford to be left behind. Our current railway system dates back to the Victorian era and will not be sufficient to keep Britain competitive in the twenty-first century. A new high speed rail network would transform the UK’s economic geography. It would bring our key cities closer together, enable businesses to operate more productively, support employment growth and regeneration, provide a genuine alternative to domestic aviation, and create a platform for delivering long-term and sustainable economic growth and prosperity. A Y-shaped national high speed rail network linking London to Birmingham, Manchester and Leeds, and including stops in the East Midlands and South Yorkshire, as well as direct links to the HS1 line and into Heathrow Airport, would cost  £32 billion to construct, and would generate benefits of around  £44 billion, as well as revenues totaling a further  £27 billion. This network would slash journey times between cities, deliver a huge increase in rail capacity to meet rising demand for long-distance rail travel, and ease

Wednesday, August 28, 2019

Public Relations Crisis Management Plan Essay Example | Topics and Well Written Essays - 2500 words

Public Relations Crisis Management Plan - Essay Example These calls for the need to ensure better inter organizational communication. Advancements in technology and the role of media have also assumed to be of significant importance to business organizations. The immense reach, popularity and the influence of media in shaping public opinion has augured the need for having a dedicated public relations department that seeks to leverage the media to shape a positive opinion and image of the firm in the minds of the customers. The role of the public relations department also assumes significance in areas of crisis management in organizations as they largely tend to act as medium of communication between the organization and the external world. SWOT Strengths The main strengths of the company include a strong brand image of the organization and a product portfolio that has an evergreen demand in the market. The company’s presence in a market like Australia also adds to its bouquet of strengths. Certain other strengths include a talented and motivated employee base along with sound financial strength of the organization. Weakness The major weakness arises in the aspect of the rising cost of fuel and raw materials and it’s over dependence on external suppliers for raw materials. Opportunities The rising disposable income and demand for products such as cars largely influence growth of prospects for Hypothetica oils. The surge in demand witnessed over the last few years with an optimistic future largely emerges as an area of opportunity. Opportunities also exist in the form of new markets like China that have high potential. Threats The threats to the company arise mainly from the high extent of competition in the Australian market. Presence of large number of competitors in the market leads to a situation where market share and profit margins have reduced significantly thus generating considerable threats for the organization’s profitability and sustainability. Target Publics Primary Publics The first step towards shaping a public relations strategy involves selecting the public’s to be targeted. Publics constitute a collection of a number of individuals that have a set of similar interests and value proposition with regards to a particular scenario (Millar & Heath, 2004, p.42). Primary publics constitute the individuals that a firm tries to generate influence. This largely consists of individuals whose thoughts largely help in ensuring profitability and sustainability for the business. In the case of Hypothetica oil the primary publics would consist of the customers of the organization and the common people at large who form a part of the social network of the company. This would also include the employees of the organization as it is largely important to have a positive image of the organization in the minds of the employees as it largely helps in inducing motivation which is very critical to the success and sustainability of an organization. Secondary Publics Secondary publics include members of target audience that have the

Tuesday, August 27, 2019

Prosecution and Extradition of Person having committed acts of terror Essay

Prosecution and Extradition of Person having committed acts of terror - Essay Example When a person commits an act of terrorism in a foreign country, he should not be prosecuted in the same country because he might not get a full safety of his rights (Your Human Rights in a Foreign Country). The jury may be biased against the person because of his nationality and this may overwhelm the evidences present in the case. Hence, even if the accused is not guilty of the crime and there may be slight evidences of his innocence the biasness of the jury might cause them to sentence the person. Secondly, the accused is the national of another country and therefore is subject to prosecution by his native country. Countries have rights over their citizens and when they violate those rights they should be punished accordingly (Rhodes). Another reason to prosecute in the homeland is the difference in terms of the penalty and the actual sentence. For instance, in the European countries people who commit an act of terrorism or plan others are sent to detention facilities, those who murder others, are offered the capital punishment in some countries while in others they are sent to prisons (Death Penalty). On the other hand in the Arab world or in Muslim countries the sentences and the modes of punishment are different. People who kill others are beheaded and the ones who plan for acts of terrorism are also handed in strict punishments (Nasir). There is no doubt that such people should be prosecuted and handed with the worst punishments possible but they should also be given a ju stified chance to prove them innocent in front of an unbiased court of law. It is essential because people who get arrested are not always the ones’ who are the culprits, sometimes even innocent people are picked up. Furthermore, when these accused are declared guilty and sent to detention facilities, the behavior towards such people is extremely brutal and sometimes even the most basic rights of humans are neglected. For

Monday, August 26, 2019

Multi Protocol Label Switching Simulation Lab Report

Multi Protocol Label Switching Simulation - Lab Report Example Modem converts analog signal to digital signals & digital signal to analog signal. Today the internet seems to be an indispensable communication instrument, and everybody who is using the internet wants good services from internet service providers. Good service means, good downloading speed (means time related to opening, closing and downloading a file on the internet), good connectivity (Internet connection can be done easily on request), & transfer of data or file without interruption. Transfer of data or file without disturbance is a very critical factor on the internet, there are lots of internet connections providers, a lot of websites, a lot of data transfer, a lot of web server and lots of computer are accessing internet at the same time. Due to these usages, there is congestion on the internet, which results in delay in data transfer and also there is no surety that the data will be transferred completely. Today each and every organization wants to fulfill all the customers' needs. And the main agenda of most of the organization is Customer Satisfaction. Customer satisfaction is the key of success for any organization. Customer satisfaction can be achieved by providing good Quality of Service (QoS). Parameters for Quality of Service may vary from one organization to another. ... The performance of networking has complete dependence on the above four parameters. So if an organization wants to achieve customer satisfaction, they should have control on these parameters. For controlling these parameters, organizations use packet switching technology and Traffic Engineering. This technology depends on internet protocol addressing. Internet protocol addressing provides a unique number to a particular location. This unique numbers helps to find the location for transfer and minimize congestion. The internet protocol address is a twelve digit number. The Internet Engineering task force developed a technique known as Multi Protocol Label Switching (MPLS), to avoid congestion in networking, avoid delay in data transmission and keeping control on bandwidth. Multi Protocol Label Switching is based on internet protocol addressing. It involves packet data transfer. As the packet enters into Multi Protocol label switching, it receives a label. Depending upon the label Multi Protocol Label Switching defines the most suitable routing or path for data transfer. While defining the path Multi Protocol Label Switching analyze the load on the network & the type of traffic. Based on the analysis Multi Protocol Label Switching divides the traffic in a manner to minimize the network congestion. It also finds the shortest path for data transmission, which transmits the data from one location to other in the minimum time. Validation of MPLS Simulation: As we have come to know MPLS simulation is used to increase the efficiency of the network through minimizing congestion, now we have to validate that really this MPLS simulation is an effective tool for Internet service provider. There are various ways of proving or validating the MPLS

Sunday, August 25, 2019

Oberation objectives at the Penang mutiars Case Study

Oberation objectives at the Penang mutiars - Case Study Example to cater to all requests of the customers and at the same time maintain its promise of quality service to the visitors by being flexible according to the demand of the situation. Penang Mutiara never  compromises the quality of its service in order to cut back costs. Thus, it becomes clear that the operations management of this hotel is highly appropriate for its strategy. Operation strategy means the â€Å"total pattern of decisions and actions† that sets the activities, objectives and roles of the operation in order that they facilitate as well as provide support to the business strategy of the firm (Nieuwenhuizen 124). Making good ideas, creating products and giving services are among the primary focus of every business, as well as that of each manager, especially the operations managers. Operations management is the function of business that involves â€Å"making products and providing services† (Nieuwenhuizen 114). There are mainly three functions of operation management that are relevant for the success of strategy adopted by Penang Mutiara. They are business implementation strategy, supporter of business strategy and Driver strategy. Business implementation relates with the functioning and implementation of a plan. It is the actions that have to be taken following any initial plans in order for something to really happen. The seco nd function of the operation management is supporter of business strategy and this helps to attain strategic achievement for the hotel. The supporter of the business strategy helps to attain the goals of a  business, and besides the  administrator, the staff also utilizes  this strategy. Driver strategy is another important role of operation management function and it can assist to attain strategic achievement for Penang Mutiara Hotel. This role is defined as the major factor that helps in deciding the failure or success of an industry’s strategy. Managing a hotel of this size is an immensely complicated task, especially so

Saturday, August 24, 2019

Student performance objectives Essay Example | Topics and Well Written Essays - 500 words

Student performance objectives - Essay Example Fortunately, I worked so hard to meet this objective. In a nutshell, deductive reasoning is the logical argument that begins from a general point to some specific before making a conclusion. Contrarily, inductive is that which starts from a definite/particular and expands to include other elements of the same nature before making an inclusive conclusion. To make this practical and real, I reviewed several research papers that could provide me with clear, logical arguments. I discovered that research is either deductively or inductively developed. The essence of generalizability makes the research work demonstrate great inductive reasoning. For instance, scientists having performed tests one sample conclude that the whole population from which the sample was obtained bears the same characteristics. I grasped this topic extensively having reviewed several written pieces of literature (Singmann and Klauer, 248-249). Consequently, fallacies and language propaganda are everyday misuses of language. People engage in several cases where they inaccurately generalize other people stereotypically either to serve their self-interest or based on inaccurate information they acquired. A fallacy like ‘all men are the same’ is one of the common language propaganda that should be demystified. Of course all men cannot be the same; men vary in different aspects such as height, complexion, attitude, personality among others. This objective was met by engaging in social interactions to identify some of the common fallacies people make in everyday life and indeed, several were noticed. I was expected to be in a position to utilize the codes of logics that demand an inference should be well supported by both valid and sound propositions to make the validate the argument. This is one thing I did achieve after exploring numerous books and journals especially those

Friday, August 23, 2019

Corporate Finance Essay Example | Topics and Well Written Essays - 2500 words

Corporate Finance - Essay Example This will further estimate the market value of a share for each of the capital structures using the no growth share valuation model being considered and to comment on findings; to consider which capital structure is preferred under the approach; and to contrast and explain the assumptions and theoretical approaches to capital structure taken earlier. 1. (i) Explain the columns in the above tale given the scenario stated above. From the data, establish the amount of debt, the number of shares, the amount of tax and the EPS for each gearing level show workings The first column on capital structure displays the different debt to equity ratios and each capital structure has a corresponding level of debt interest rate in the second column which increases as the debt structure becomes more highly leveraged. That the direct relationship is obvious between the debt to equity ratio and the interest rate since higher debt would mean higher risk for the debtor as few creditors would be willing to lend at rate lower than contracted earlier by the debtor. This would also mean that higher level of debt in relation to capital would require the company to pay higher interest expenses to creditors in absolute amount and would also mean higher tax shield for the borrower since interest expense is tax deductible for income tax purposes. The same direct relationship is also expected on EPS which increases directly as the debt to equity ratio is increased. Further the same inference could be made with the required return on shares. This means that the investors or stockholders would require higher return for higher level of risk because of increase in debt to equity ratio or higher financial leverage. This higher required return on investment would be the same as the cost of capital that would be used in evaluating the acceptability of projects. Those falling under the

Critical Path - Project Management Assignment Example | Topics and Well Written Essays - 750 words

Critical Path - Project Management - Assignment Example This process provides us a total time taken by the project. For assessing the total time we use above mentioned methods to find out the main project completion and development time. Through this time we obtain a project time line for the project execution. Here we also assign appropriate sequence to each activity of the project. Through these assigned activity sequencing, the expansion of a project network diagram is developed. This procedure is pretty time intense if completed with hand. Luckily, there are development organization software tools that can build network illustrations although there can be an illustration where we have to perform it by hand. One of the main causes for building a plan organization network drawing is to decide the elasticity inside the network (Kerzner, 2006) and (Field & Keller, 2007). Total float is the time obtainable for holding-up an activity devoid of delay end Date of the plan. The entire float of a task is then the biggest probable delay in finishing of this task that will not reason a delay in the achievement of the whole project. This recommends the subsequent instinctive notion: (Kerzner, 2006) and (Burke, 1999): The process of the determining the total float of a project activity involves the assessment of the total delaying an activity with no delay end Date of the plan. The total float of a project activity is the largest possible delay in the completion of that task that will not cause a delay in the accomplishment of the whole project (Kerzner, 2006). The assessment of the critical path provides a better overview of the project duration and more critical activates as well as their management. In the assessment of the critical activates of the project we determine their total float. Total float of the project if equal to zero then that activity denotes as the critical activity (Gray & Larson, 2006). The CP (critical path) is the best times path in the course of the network

Thursday, August 22, 2019

The Education Systems of Lt, the Uk and the Usa. Pre-School and Pre-Primary Education Essay Example for Free

The Education Systems of Lt, the Uk and the Usa. Pre-School and Pre-Primary Education Essay Pre-school and pre-primary education in Lithuania, in the United Kingdom and in the USA have several things in common.. First, both education systems are available in three countries and also pre-school education is not compulsory. There are public and private pre-schools in three countries. Public pre-schools are those which are run by the government. Private pre-schools are those which are run by private organizations, for which parents have to pay fees. Many private pre-schools have a high reputation and parents send their children there so that they will have advantages later in life. There are nursery schools for children from the age of 1 to 3 years in Lithuania. Children from the age of 3 till 6 attend a kindergarten. The number of children in nursery schools is approximately 10 children and approximately 15 children in a kindergarten, whereas the number of children in the USA and in Great Britain is approximately 2-3 little children or 4-5 bigger children plus nursery-governor’s help. Another difference is about security in pre-school institutions. People who come in a kindergarten or nursery school are not registered. By contrast, people who come in a nursery school or a kindergarten are strictly registered in the USA and in Great Britain. Your driving licence or passport is taken and you get permission to be in a pre-school institution. The kindergartens and nursery schools in Lithuania also differs in their cost compared to cost of these pre-schools institutions in the United Kingdom and in the Usa because it is cheaper to let your children to Lithuanian kindergarten than to American or English kindergarten. Differently from Lithuania children under 5 receive pre-school education in Great Britain. Some go to playgroups several times a week and take part in structured play (play with some educational purpose) with other children of the same age. Others go to a nursery school or to the nursery department or kindergarten of a school. Children attend day nurseries until they are 6 months old the same as in Lithuania. Day nurseries take care of children activity, self-expression, security. Nursery-governors take care of children education and upbringing. The emphasis is on group work, creative activity and guided play. Day nurseries are divided into private and community. Fees in the communities are not so big as in the day nurseries. Some of the community nurseries give parents discounts according to their financial position. The working time is very different in day nurseries of Great Britain, for example, local authority pre-schools work until 15 a. m. The other pre-school institutions work from 7 till 19. All kindergartens work all year except public holidays in Great Britain meanwhile not all kindergartens work all year in Lithuania. In the same way, children attend nursery schools, day care or pre-school from an early age in the USA. Children are taught, trained in the nursery schools and in the kindergartens. Nursery-governors play with children. There are some requirements in order that your child would be inducted to kindergarten, for example, it is required children to be toilet trained and your child is not ready for the potty, they may not let him or her attend a kindergarten, but children are not required to be toilet trained in Lithuania. In the USA parents may also have to pay high fees for late pickups and end up having to stay home with their child if the pre-school says she or he is too sick to be there. Another difference is that parents can freely choose which nursery school or kindergarten their child is going to attend in Lithuania, but in the USA all children should go to nursery school or kindergarten according to their living place because there are brought under districts. All children go according to district which he or she belongs to. If parents think that their district’s nursery school or kindergarten is not as good as it should be, parents must change the living place in order that their children could go to a better pre-school institution. Pre-primary education content is similar in three countries. There a wide variety of fun activities – including singing, dancing, arts and crafts, storytelling, free play, and both indoor and outdoor games and projects – designed to teach children different skills. Cildren may also learn some academic basics such as counting and the alphabet. Children in Lithuania start to attend pre-primary institution at the age of 6, but if parents want and their child is grown enough pre-primary institution can be attend at the age of 5, while the majority of children start to attend pre-primary preparation lessons at the age of 2-5 in the United Kingdom. Also the government’s programme which is named â€Å"sureStart† gives the possibility to all children from the age of 3 to 4 to get pre-primary lessons free of charge in a kindergarten. Differently from Lithuania children at the age of 6 start to attend a school in the USA. Taking everything into account, I can note that pre-school and pre-primary education has several things in common in The United Kingdom, in the USA, and in the Lithuania, but on the other hand there are a lot of differencies.

Wednesday, August 21, 2019

Tuberculosis: Prevention and Treatment

Tuberculosis: Prevention and Treatment Tuberculosis (TB) is an airborne infectious disease which is caused by strains of mycobacteria, mainly Mycobacterium tuberculosis1. There are roughly one third of the worlds population are infected with tuberculosis where nine millions of new cases reported annually2. Although tuberculosis can be prevented and treated, it continues to cause millions of deaths every year2. When infected individual coughs, sneezes or spits, M. tuberculosis is propelled into the air and infected those who breathed in the bacteria that existed in droplets of saliva3. Primarily, tuberculosis will affect the lungs, known as pulmonary tuberculosis3. It will also affect other parts of body, for instance lymph nodes, bones, brain and kidneys3. Once a person is infected with tuberculosis, there are basically three possible ways may occur. Firstly, the immune system plays a vital role and strong enough to kill the bacteria3. Secondly, immune system is not strong enough to fight off the bacteria but is able to b uild a defensive barrier against the bacteria3. Individuals who are latently infected with M. tuberculosis show asymptomatic where these bacteria lie dormant in the lungs and able to reactivate after years1. The disease is often reactivated in those who are immunocompromised or generally weakened. Lastly, the immune system fails to kill bacteria causing the bacteria to grow and spread towards other parts of body which is called active tuberculosis3. In the fight of tuberculosis, World Health Organisation (WHO) recommends universal Bacille Calmette-Guà ©rin (BCG) vaccination in the countries with high TB burdens4. BCG vaccine contains weakened form of M. tuberculosis which will induce human antibodies to fight against this type of bacteria. The efficacy of BCG vaccination can be ranging from 0% to 84%5. This may be due to the frequency of TB exposure and quality of vaccine used, leading to arguments on BCG vaccination efficacies4. One of the greatest arguments is that BCG vaccination causing positive reactions to tuberculin skin testing and hence interfere with the diagnosis of latent TB4. Existence of evidences showing the rates of efficacy also depends on geographical location, age at vaccination and form of TB further complicate the situation. Currently, TB chemotherapy is made up of combination of a list of first-line drugs isoniazid (INH), rifampicin (RIF), pyrazinamide (PZA) and ethambutol (EMB) 6. If the treatment fails d ue to bacterial drug resistance, or patient unable to tolerate, second-line drugs for instance para-aminosalicylate (PAS), fluoroquinolones, ethionamide and cycloserine are introduced6. These are considered as second line drugs generally either less potent with larger doses regimen or more toxic with serious side effects6. Tuberculosis is presently treated in two phases, namely initial phase and continuous phase7. In initial phase, the patient will be treated with concurrent use of four first line drugs, with the aim to eradicate or control bacteria population to replicate in rapid motion and also avoid the emergence of bacteria resistance7. The treatment choices available for initial treatment include isoniazid, rifampicin, pyrazinamide and ethambutol7. Streptomycin is used rarely but can be used in patients who infected with bacteria that are resistant to isoniazid before the therapy is commenced7. The duration for initial phase is 2 months whereas the continuous phase takes 4 months7. During the four months of continuous phase, patients are treated with isoniazid and rifampicin at same doses7. Most of the TB treatment is supervised where drug administration needs to be fully supervised by healthcare professions since lengthy duration of treatment causing incompliance in patients7. These patients who are unlikely to be compliance will be given the drugs three times a week until the course is completed while patients who able to comply with the treatment will not be supervised7. Despite the chemotherapy treatment and BCG vaccine, TB remains as a significant infectious disease due to increasing emergence of drug resistant TB and co-infection with Human Immunodeficiency Virus (HIV) 6. Since the host defense in HIV patients is suppressed, they are more susceptible to TB infections. Moreover, drug- drug interactions between antiviral therapy and anti-TB also causing complications in treating co-infected patients6. Drug resistant TB has evolved mainly because of improper treatment or incompliance in patients who stop taking their medications before the bacteria is being fully eradicated since the duration of treatment is lengthy which takes 6-9 months8, 9. The mechanism involved includes chromosomal mutations in genes that responsible for drug targets encoding9. When there is a sequential accumulation of mutations, multi-drug resistant tuberculosis (MDR-TB) emerges where the M. tuberculosis strains will resistant to two of the most commonly used drugs, Isoniazid and Rifampicin9. Patients with MDR-TB are then relying on the second-line drug classes, fluoroquinolones and the three injectable agents namely amikacin, capreomycin, and kanamycin10, 11. The chances to cure would dramatically be reduced for patients who infected with extensively drug-resistant tuberculosis (XDR-TB), a situation where the isolated strains are resistant against any one of fluoroquinolones and at least one of three injectable drugs6. In order to combat with the MDR-TB or XDR-TB and optimize the tuberculosis drug regimen, it is crucial to understand the mechanism of action of current using first-line drugs and how resistance is developed against these drugs. Isoniazid (INH) or isonicotinic acid hydrazide is discovered in 1952, a bactericidal agent which active against organism of the genus Mycobacterium, especially M. tuberculosis, M. bovis and M. kansassi6, 12. In vivo, INH has shown to be bactericidal in culture over the first 48 hours which become bacteriostatic after this particular time frame12. This indicates that INH is bacteriostatic for slow replicating bacilli but is bactericidal against rapidly dividing mycobacterium. The minimal tuberculostatic concentration is 0.025 to 0.05ug/ml13. INH is a prodrug that needs to be activated by catalaseperoxide hemoporotein, KatG before acts by inhibiting mycolic acid synthesis and cell wall disruption in susceptible mycobacterium13, 14. This inhibitory action is only targeted to mycobacteria since other bacteria do not contain mycolic acid in the cell wall13. INH acts by inhibit enoyl acyl carrier protein (ACP) reductase, InhA, and a beta-ketoacyl-ACP synthase, KasA that are crucial in fatt y acid synthesis system for mycolic acid15. Resistance to INH is believed due to mutations in gene encoding catalaseperoxidase katG or InhA or lacking KatG 9, 14. Isoniazid is metabolised in the liver, mainly by acetylation and dehydrazination where slow acetylator may experience higher concentration leads to potential toxicity before excreted in the urine within 24 hours13. Rifampicin (RIF), discovered in 1963, is a lipophilic semisynthetic derivative of rifamycin antibiotic which is produced by the fermentation of a strain of Amycolatopsis mediterranei6, 9, 16. RIF has bactericidal activities against a broad spectrum of microorganisms including gram-positive and gram-negative. RIF will inhibit the action of DNA-dependent RNA polymerase of mycobacteria that is encoded by rpoB through formation of a stable drug-enzyme complex9. This will suppress the initiation chain formation in RNA synthesis and hence prohibit protein synthesis in M. tuberculosis9. Development of resistance to RIF is mostly due to mutation in 81 base pair region of rpoB gene thus facilitate a straightforward approach to detect MDR-TB since 85-90% RIF-resistant strains are also resistant to INH9. RIF produces peak plasma concentration of 7ug/mL in 2 to 4 hours after ingestion of 600mg17. It also distributed well to most of the body tissues and fluids, including cerebrospinal fluid since it is lipophilic17. Following absorption from the gastrointestinal tract, RIF is eliminated rapidly in the bile with fewer amounts excreted through urine17. Pyrazinamde (PZA) is discovered in 1954 and it produces excellent sterility effects against semidormant tubercle bacilli at slightly acidic pH6, 9. The antimicrobial activity of PZA is through interference with mycolic acid synthesis in M. tuberculosis by pyrazinoic acid, an active moiety of PZA9. Conversion of PZA to pyrazinoic acid is mediated by pyrazinamidase enzyme that is encoded by pncA gene in M. tuberculosis, thus indicating that these bacilli are sensitive to PZA9. Resistance against PZA evolved when mutation occur at pncA gene that is responsible for pyrazinamidase, hence affecting the activity of this enzyme9. PZA is well absorbed from gastrointestinal tract and is widely distributed to most tissues and fluid too17. The oral administration of 500 mg PZA produces plasma concentrations of 9-12ug/ml after two hours and 7ug/ml after 8 hours17. PZA is metabolized in liver whereas the metabolites are excreted through renal glomerular filtration17. Ethambutol (EMB) is discovered in 1962, acts as bacteriostatic agent and is active against undergoing cell division6, 18. EMB primarily targets on impairment of cell wall polymerization by inhibits arabinosy transferase, a vital enzyme responsible for mycobacteria cell wall biosynthesis9, 18. Since arabinosy transferase enzyme is encoded by embC-embA-embB genes, resistance against EMB evolved is believed due to mutation of these genes9. EMB is currently used as one of the first-line treatment for tuberculosis mainly because of its synergistic effect with other front-line drugs and its low toxicity property18. There is roughly 75-80% of an oral dose of EMB is rapidly absorbed in gastrointestinal tract with absorption unaffected when administered with foods19. In addition, EMB is distributed widely to body tissues and fluid, including cerebrospinal fluid before being metabolized in the liver and excreted in urine19. Streptomycin (SM) is an aminoglycoside antibiotic, used as first line treatment for TB when it first discovered in 19441, 6. Streptomycin is isolated from the bacteria Streptomyces griseus and its antimicrobial effects against M. tuberculosis is highly effective when use in combination with other first line agents20. However, SM is no longer considered as first line treatment as resistance against it has developed rapidly1. The optimum pH for SM is at pH8 where its bacteriostatic activity will reduce with increasingly acidic environment20. SM acts by binding tightly to A site of 16S ribosomal RNA subunit, interferes with mRNA translation, causing faulty protein being produced1, 9. Resistant emergence when the mutation occurs at gene rpsL and rrs that encoded for 16S and S12 ribosomal protein1, 9. Upon administration, SM is poorly absorbed from gastrointestinal tract and mostly administered parentally1. SM is mostly excreted in urine and patients with low renal profile might experienc e toxicity such as neurotoxic reactions1. When the first line treatment is no longer suitable for patients or patients develop multi-drug resistance TB, second line drugs will then be introduced in combating the TB. Second line drugs that are mostly used include Ethionamide (ETH), Cycloserine (CS), Para-Aminosalicylic Acid (PAS) and Fluoroquinolones (FQ). ETH has been in use since 1960s, is a structural analogue of INH and it targets at inhibition of mycolic acid biosynthesis in tubercle bacilli9, 21. INH however is much more potent than ETH since the minimal inhibitory concentration for ETH is 0.5-5.0ug/mL21. Resistance evolved due to mutation at gene InhA and ethA which encode for oxygenase enzyme in activation of ETH 9. In vitro, CS has inhibitory effect on M. tuberculosis at 5-200ug/mL and there is no cross resistance occurred between CS and other drugs13. CS acts by interfereing the biosynthesis of bacterial cell wall13. CS is well absorbed in gastrointestinal tract and also widely distributed to body tissues and fluid including cerebrospinal fluid13. PAS was first introduced as first line drug but being replaced by Ethambutol in 1960s1. It acts bacteriostatically with possessing inhibitory effect at concentration less than 1mg/ml by interfere with folic acid metabolism in bacteria1. PAS is readily absorbed from gastrointestinal tract and distributed well throughout the body. Approximately 80% of the drugs will be excreted via kidney after being metabolized to acetylated form1. Moxifloxacin and Gatifloxacin are both been synthesized and evaluated as excellent bactericidal agents through inhibiting DNA gyrase, an ATP-dependent enzymes topoisomerase II which is responsible in bacteria DNA transcription9. DNA gyrase is consisted of two subunits that is arranged in a complex, is encoded by two different genes, gyrA and gyrB where mutations at gyrA will normally cause bacteria resistance to these new generation of flouroquinolones9. Due to the increasing incidence of multidrug resistance TB, it is highly desirable to develop new drugs that are not only potent and effective against current resistant strains of M. tuberculosis but also possess shorter treatment duration since most of the incompliance of patients is brought up by lengthy TB treatment. Most of the mechanisms of action of current treatments are involved in interfering the bacterial DNA synthesis, protein and mycolic cell wall biosynthesis. The enzymes that participate in these pathways could also be the target of newly designed drugs such as TMC207, one of the new drugs which are currently under investigations and clinical trials. TMC207 is a member of diarylquinoline class of compound which target at adenosine triphosphate (ATP) synthase by binding to subunit C of the synthase, blocking the energy pathway of mycobacteria22, 23. In vitro, TMC207 not only possesses ability to inhibit both drug sensitive and resistant M. tuberculosis isolates, but also able to sterilize the patient through killing the dormant bacilli bactericidally22. TMC207 showed a minimum inhibitory concentration of 0.03ug/mL against M. tuberculosis, suggesting a more potent agent compared to current first- line treatments such as isoniazid and rifampicin23. Apart from that, its synergistic effect with pyrazinamide could promise as effective drug combination for sterilizing the patients against TB22. A phase I clinical trials which involved short terms administration of TMC207 in healthy individuals showing no adverse effects and the subjects are well tolerated with it23. However, it is essential to investigate the selectivity of TMC207 again st mammalian ATP synthase with longer periods to ensure the patients safety when administered with TMC207. Thiacetazone (TAC) is widely used as second line anti-TB agent against multiresistant tuberculosis at present24. TAC acts by interferes the biosynthesis pathway of mycolic acid in tubercle bacilli24. The fact that M. tuberculosis has been difficult to eradicate and remains persistent is due to its cell wall that composed of mycolic acid which is resistant against chemical injury, dehydration and also has low permeability to antibiotics24. Mycolic acid contains cyclopropane rings that is activated through cyclopropane mycolic acid synthase (CMASs), has a significant contribution to tuberculosis24. By inhibiting the cyclopropanation, the cell wall biosynthesis will then be interrupted, introducing the bactericidal effects24. The aim of this research is to synthesis and evaluates the analogues of Thiacetazone which might be potential anti tuberculosis agents. The analogues will be tested against different strains of mycobacteria in lab. The target actions of these analogues will also be identified based on the structure of the analogues. The above analogue is synthesized when a benzylaldehyde reacts with a primary amine. This is a condensation process and an imine is produced. The changes at position R1 to R3 with different electron withdrawing groups are first planned to be evaluated. However, the plan is prohibited since the corresponding structures are either unavailable or too expensive that falling outside the budget. After revised on the previous analogues that were discovered and their respective MIC values obtained from lab, the structures of new analogues that are going to be evaluated are finally sorted out. The R1 to R3 positions would be replaced by either a -chloro or a -methoxy with R8 position would either be an amine, a methyl or a benzene ring. A chloro is used at position R1 to R3 since it is electron withdrawing, big and lipophilic molecule whereas the methoxy group is electron donating, small and quite lipophilic. For R8 position, an amine is selected because it is electron withdrawing and small. A methyl is also selected since it is quite lipophilic, small and electron donating. On the other hand, benzene ring which is highly lipophilic, neither electron donating nor withdrawing group might have a different effect on the analogue synthesized. References: Patrick Brennan, Douglas Young (2008). Tuberculosis. 88(2), 85-86, 137-138, 162-163. Health Protection Agency. http://www.hpa.org.uk/HPA/ National Health Services. http://www.nhs.uk/Pages/HomePage.aspx Zaida Araujoa, Jacobus Henri de Waard, Carlos Fernà ¡ndez de Larrea, Rafael Borges, Jacinto Convit (2008). The effect of Bacille Calmette-Guà ©rin vaccine on tuberculin reactivity in indigenous children from communities with high prevalence of tuberculosis. Vaccine 26, 5575-5581. Hart and Sutherland (1977). BCG and vole bacillus vaccines in the prevention of tuberculosis in adolescence and early adult life. Br Med J2(6082), 293-295. Global Alliance for TB Drug Development. http://www.tballiance.org/home/home.php 57th edition of British National Formulary: Section on Tuberculosis drugs, 316-317. Blumberg, H. M. et al. (2003). American Thoracic Society/ Centers for Disease and Prevention/ Infectious Disease Society of American: treatment of TB. Am.J.Respir.CareMed.167, 603-662. Suhail Ahmad and Eiman Mokaddas (2009). Recent advances in the diagnosis and treatment of multidrug-resistant tuberculosis. Respiratory Medicine 103(12), 1777-1790. Frieden TR, Sherman LF, Maw KL, et al. (1996). A multi-institutional outbreak of highly drug-resistant tuberculosis: epidemiology and clinical outcomes. JAMA 276, 1229-1235. Mukherjee JS, Rich ML, Socci AR, et al. (2004). Program and principles in treatment od multi-drug resistant tuberculosis. Lancet 363, 474-481. Zhang Y. et al. (2003). Isoniazid. Tuberculosis 2, 739-758. Hardmn, J.G., L.E. Limbird, P.B Molinoff, R.W. Ruddon, A.G. Goodman (2006). Goodman and Gilmans The Pharmacological Basis of Therapeutics. 9, 1164-1165. Zhang Y, Heym B, Allen B, Young D, Cole S (1992). The catalase-peroxidase gene and isoniazid resistance by Mycobacterium Tuberculosis. Nature 358, 591-593. Richard A. Slayden, Richard E. Lee and Clifton E. Barry (2002). Molecular Microbiology 38(3), 514-525. Rup Lal, Sukanya Lal (2005). Recent trends in rifamycin research. BioEssays 16(3), 211-216. Hardmn, J.G., L.E. Limbird, P.B Molinoff, A.G Gilman (2001). Goodman and Gilmans The Pharmacological Basis of Therapeutics. 10, 1278-1281. Raghunandan Yendapally and Richard E. Lee (2008). Design, synthesis and evaluation of novel ethambutol analogues. Bioorganic and Medical chemistry Letters 18(5), 1607-1611. McEvoy, G.K. (2007). Admerican Hospital Formulary Service. Besthesda, 551. Selman A. Waksman (1953). Streptomycin: Background, Isolation, Properties and Utilisation. Science, 118(3062), 259-266. Sampson AE, Barry CE (1999). Abstract General Meeting American Society Microbiology. 99, 635. Andreas H.D., Alexander Pym, Martin Grobusch et al. (2009). The Diarylquinoline TMC207 for Multidrug- Resistant Tuberculosis. 360(23), 2397-2405. Anna C. Haagsma, Rooda Abdillahi-Ibrahim, Marijke J. Wagner, Klaas Krab, Karen Vergauwen, Jerome Guillemont, Koen Andries, Holger Lill, Anil Koul, and Dirk Bald (2009). Selectivity of TMC207 towards mycobacterial ATP synthase compared with that towardsthe Eukaryotic homologue. Antimicrobial Agents and Chemotherapy, 53(3), 1290-1292. Anuradha Alahari, Xavier Trivelli, Yann Guà ©rardel, Lynn G. Dover, Gurdyal S. Besra, James C. Sacchettini, Robert C. Reynolds, Geoffrey D. Coxon, Laurent Kremer (2007). Thiacetazone, an Antitubercular Drug that Inhibits Cyclopropanation of Cell Wall Mycolic Acids in mycobacteria. PloS ONE, 2(12): e1343. Mycolic acids are a complex mixture of branched, long-chain fatty acids, representing key components of the highly hydrophobic mycobacterial cell wall. Pathogenic mycobacteria carry mycolic acid sub-types that contain cyclopropane rings. Double bonds at specific sites on mycolic acid precursors are modified by the action of cyclopropane mycolic acid synthases (CMASs). The latter belong to a family of S-adenosyl-methionine-dependent methyl transferases, of which several have been well studied in Mycobacterium tuberculosis, namely, MmaA1 through A4, PcaA and CmaA2. Cyclopropanated mycolic acids are key factors participating in cell envelope permeability, host immunomodulation and persistence of M. tuberculosis. While several antitubercular agents inhibit mycolic acid synthesis, to date, the CMASs have not been shown to be drug targets. We have employed various complementary approaches to show that the antitubercular drug, thiacetazone (TAC), and its chemical analogues, inhibit mycolic acid cyclopropanation. Dramatic changes in the content and ratio of mycolic acids in the vaccine strain Mycobacterium bovis BCG, as well as in the related pathogenic species Mycobacterium marinum were observed after treatment with the drugs. Combination of thin layer chromatography, mass spectrometry and Nuclear Magnetic Resonance (NMR) analyses of mycolic acids purified from drug-treated mycobacteria showed a significant loss of cyclopropanation in both the ?- and oxygenated mycolate sub-types. Additionally, High-Resolution Magic Angle Spinning (HR-MAS) NMR analyses on whole cells was used to detect cell wall-associated mycolates and to quantify the cyclopropanation status of the cell envelope. Further, overexpression of cmaA2, mmaA2 or pcaA in mycobacteria partially reversed the effects of TAC and its analogue on mycolic acid cyclop ropanation, suggesting that the drugs act directly on CMASs. This is a first report on the mechanism of action of TAC, demonstrating the CMASs as its cellular targets in mycobacteria. The implications of this study may be important for the design of alternative strategies for tuberculosis treatment.

Tuesday, August 20, 2019

Compare And Contrast Tcsec And Cc Information Technology Essay

Compare And Contrast Tcsec And Cc Information Technology Essay To evaluate a computer system or product to see it meets the security requirements based on the information security evaluation standards. Trusted Computer System Evaluation Criteria (TCSEC) was the first computer security evaluation standard which was published by the U.S. defense department in1985. TCSEC influenced other European countries and very soon some countries based on TCSEC to develop their own security evaluation standards. In 1996, America combined with 5 European countries (UK, France, Germany, Netherlands and Canada) and NSA (National Security Agency) and NIST (National Institute of Standards and Technology) developed a new criterion which was called Common Criteria (CC). In 1999 Common Criteria (CC) was recognized by ISO and named ISO/IEC 15408-1999. In this essay TCSEC and CC will be discussed, compared and contrasted to find out the similarities and differences and the strength of CC will be indicated. The answers for the topic are based on research on relevant articles and journals and most of the resources are from the internet. The materials are then analyzed and discussed. The outline of the report is as follows: Introduction- brief description of the topic. Background- explanation of TCSEC and CC. Compare and contrast the two standards Describe the similarities and differences between the two standards and state the advantages of CC. Some journals, articles and books are used in this report which can be found in the references. Background This session discusses TCSEC with the evaluation class of TCSEC. And also describes the CC and evaluation of assurance level of CC and the evaluation process. TCSEC Evaluation Class CC- Assurances Levels D Lowest protections EAL1 Functionally tested C1 Discretionary Protection EAL2 Structurally tested C2 Controlled Access Protection EAL3 Methodically tested checked B1 Labeled Security Protection EAL4 Methodically designed, tested, reviewed B2 Structured Protection EAL5 Semi-formally designed and tested B3 Security Domains EAL6 Semi-formally verified design and tested A1 Verified Protection EAL7 Formally verified design and tested Table 1- Evaluation Class of TCSEC and Evaluation Assurances Level CC TCSEC is commonly called the Orange Book (the cover of book is orange). TCSEC has 4 divisions and 7 evaluation classes. Each class contains security requirements and it is used to determine the level of trust of a computing system. The divisions of TCSEC are A, B, C, D and the seven evaluation classes are: D (lowest), C1, C2, B1, B2, B3 and A1 (highest). A is more secure than D, and 2 is more secure than 1. (See Table 1) Level D: non-secure system Level D only contains D1 evaluation class. D1 is the lowest protections and only provides security protection for file and user. Level D can be applied to any system which has been evaluated but did not meet the higher evaluation class requirements. Level C: Discretionary protection Level C provides audit trial protection and Level C includes C1 and C2.C1 is discretionary security protection and its class is lower in Level C. C1 provides discretionary access control and it has the responsibility for Identification and authentication. C2 has all the security features of C1 and has the function of audit trail and access protection. C2 requires single- user log-in with password and an audit trail system. C2 works through log-in process, security event and source isolation to increase access. Level B: Mandatory Control. There are 3 classes in Level B and they are B1, B2 and B3.B1 has all the requirements of C2 and it also has some new requirements: each object has a label which is under system control. It uses sensitivity labels as a basis of all the access control and labels the object which will import to the system. When the system administrator adds a new communication channel or I/O mechanism, he has to manually assign security level to the channel and mechanism. The system uses user password to determine the user access level and it also uses audit to record any unauthorized access [13]. B2 has all the requirements of B1. Besides that, the B2 administrator must have clear and documentation style of security policy for trusted computing base. B2 has some new security requirements: system must immediately inform any changes between user and associated network, only user is able to do initial communication in the trusted path and the trusted computer base supports inde pendent administrator and operator. B3 has all the requirements of B2. But B3 has stronger ability to monitor access and anti-interference. B3 system has to set the security of the administrator. The new security requirements for B3 are: provide a readable security list, some objects are not allowed for certain users to access, the system has to provide a description of the users and to identify user before any operation and the trusted computing base establishes security audit trail for each labeled object [13]. Level A has the highest security. Level A only has A1 class. A1 is similar to B3. A1has the obvious features a developer of system must adopt for a formal design specification to analyze a system. After analysis, the developer has to use verification technology to ensure that the system meets the design specifications. The entire installation operation must be done by the system administrator and each step has to provide formal documentation. In TCSEC, to identify the security and to give some assurance to the system, it has to meet the security requirements [14]. The TCSEC was replaced by CC. CC is a framework of mutually recognized evaluation criteria and it contains 3 parts: security model, security functional requirements and security assurance requirements. Security assurance components are the basis for the security assurance requirements and it expresses in Protection Profile (PP) or Security Target (ST) [15]. A Protection Profile is the security requirements of customers and a company of users for a class of Targets of Evaluation (TOE) [15]. A PP uses a template independently to express security requirement. This is useful when implementing a product line or a family of related products [7]. Protection Profile copy TCSEC security requirements of C2 and B1. Protection Profile include: a template of commercial security profile, Firewall profiles which use for packet filters and application gateways, Smart card profiles, Database profile and a role which is based on control profile [16]. A Security Target consists of a collection of security requirements and used to evaluate computer system or product [7]. Figure 1 The PP/ST specification framework [7] Evaluation is that use defined criteria to evaluate a computer system or IT product [16]. Figure 1 shows specification framework to the Targets of Evaluation. The Common Criteria evaluation process starts from identifying a TOE (Target of Evaluation), and then input an ST which describes the security functions of the TOE [16], the example of TOE is computer system or product, To see if the result of the system is secure, it should meet a set of security requirements or protection profile [7]. Common Criteria provides a set of Evaluation Assurance Levels (EAL) from EAL1 (lowest) to EAL7 (highest) and it will be awarded to products and system upon successful completion of evaluation (see Table 1). The Common Criteria is absorbed by ISO (NO. 15408) EAL1- Functionally tested. For the correct operation of EAL1, it requires a certain confidence of occasion. This situation is of the view that the security threats are not serious [7]. EAL1 provide the evidence of testing and its documentation. EAL2- Structurally tested. In the delivery of the design information and test results, EAL2 requires the developer collaboration. But do not spend too much energy beyond the good commercial operation of consistency. EAL3- Methodically tested checked. Without a lot of changes on the premise of reasonable development practices, it allows a conscientious developer to obtain maximum assurance during the design phase from the correct security engineering. EAL4- Methodically designed, tested, reviewed. It allows the developers to obtain maximum guarantee from the correct security engineering, the security engineering is based on good and strict commercial development practice. This development practice does not need much professional knowledge, skills or other resources. In the rational economic conditions, and to renovate an existing production line, EAL can achieve the highest level of result [7]. EAL5- Semi-formally designed and tested. It enables the developers to obtain maximum security from the security engineering. The security engineering is based on a strictly commercial development practice. It relies on the appropriate application of professional safety engineering technology for support. EAL6- Semi-formally verified design and tested. It enables the developers to gain a high level of certification through the application of safety engineering technology and strict development environment, and. This is to produce a costly TOE to protect high-value assets against major risks [16]. EAL7- Formally verified design and tested. It is applicable to safe TOE development and it applies to places where the risk is very high, or high value assets that worth higher expenses. In this session discussed TCSEC and CC, an explained evaluation class of TCSEC, evaluation assurance level of CC and the evaluation process. Those discussions are very important that helps to find out the similarities and difference of TCSEC and CC. Next session, TCSEC and CC will be compared and contrasted based on the above discussion. Compare and contrast TCSEC and CC This session will discuss the similarities and differences between the security standards based on the above description on TCSEC and CC. It will also state the strength of CC and to explain why CC is a relatively successful security evaluation standard. Similarities Even though TCSEC has been replaced by CC, they still have some similarities. Both of them are security evaluation standard and evaluate computer system by security level classification and each level has security requirements. Both of them provide confidentiality security functionality and evaluate Computer Operation System. Differences Although CC has some similarities as TCSEC, but both of them are different. TSCEC is only used in U.S. In the beginning, it was proposed that TCSEC was to focus on independent computer system and it suited evaluation of military operating system. TCSEC does not involve security criteria for open system and it is the criteria for static model. TSCEC just considered protecting system owner and operator but did not cover user security area especially for the security of telecommunication system user. And also only considered confidentiality for documents of system owner and it did not address integrity and availability. From Table 1 we see that the evaluation of TCSEC is mix security and functionality. So if any hardware of software is changed, it will start to evaluate the system again. But CC is recognized by ISO organization and it applies to nations. Compared CC with TCSEC, CC is more complete. Common Criteria is not only focus on operating system but also for Network and Database. Common Criteria involve security criteria for open system and the criteria for dynamic model. CC keeps system confidentiality, availability and integrity through TOEs security specifications. CC has distinguished security and functionality, any change does not affect the evaluation. The evaluation process of both also is different. TCSEC checks system to see if it is secure by using the security requirements which is classified by evaluation class. In a Common Criteria evaluation, use Common Criteria to evaluate the product or computer system. The evaluation stages are: Protection Profile evaluation, Security Targets evaluation, TOE evaluation and Assurance maintenance.CC evaluates system starting from identifying a TOE, and then developing a set of criteria to the TOE for evaluation. For each step, detailed information will be added. To get to know if the system is secure, it should meet a set of security criteria or protection profile. Finally TCSEC has been substituted by CC. That means TCSEC was abandoned but CC is still the ongoing security evaluation standard. The advantages of CC Form the above comparison of the differences between TCSEC and CC, we can point out that CC is a relatively successful security evaluation standard because CC has some advantages. CC is an international security standard and many countries acknowledge the testing result. CC is absorbed in security objectives and the related threats and the evaluation process help to enhance confidentiality, availability and integrity of the system. CC provides a set of security criteria in detail and the criteria details are easily understood by customer and supplier. Customer can use them to determine the security level of the products and also to find out their own security requirements. So that supplier can design product for them and also use them to identify their product or system security features. Customer can trust the evaluation because the testing is done independently and not by the supplier. In this session, the similarities and differences between TCSEC and CC have been discussed and after comparison, the advantages of CC have been indicated. Conclusion To sum up, through the discussion of the evaluation process and assurance level of TCSEC and CC, we found out the similarities and differences between the two standards and also the advantages of CC. TCSEC is firstly a security standard and it develops 4 levels and 7 evaluation classes. Each evaluation class contains security requirements and using the requirements it will help to identify the security level of the system or product. TCSEC has provided identification and authentication for user to access the system document and also to provide audit trial and access protection. TCSEC evaluates system or products by checking security requirements to see if the system meets them. TCSEC has been replaced by CC and CC is an international security evaluation standard. CC provides Protection Profiles and Security Targets which are documents for specifying security requirements. [2] CC has 7 Evaluation assurance levels. Because CC came from TCSEC, they have some similarities but actually they are quite different. TCSEC only applies to operation system and it focuses on the demand of confidentiality. CC has full description of security mode, security concepts and security functionality. Compared with TCSEC, CC has some advantages. The testing result is accepted by nations, supplier can design product for customer based on their requirements. CC keeps system confidentiality, availability and integrity. After comparison we can say that CC is relatively a successful security evaluation standard.

Monday, August 19, 2019

College Writing In a Global Age Essay -- Education Academics Essays

College Writing In a Global Age To begin a discussion about teaching college writing in a digital era we must first understand what this era represents. It is an age when many people choose to "watch" books instead of read them, in the form of television programs or motion pictures. It is a time when product advertisements, "news" reports and controlled communications attempt to do the world's thinking for them and when computers-if given enough information on a subject-can compose a written report suitable for any university course. With the availability of these alternatives to reading, thinking and writing, it is a wonder that there is still a college writing requirement at all. Nevertheless, almost every college and university in America has a compulsory writing course, and during the digital ere, almost every instructor has a different approach. As the number of students with diverse cultures, experiences and backgrounds increases, so does the belief of some that these approaches must be examined to ensure a c ulturally inclusive environment will inevitably lead to warfare. Maxine Hairston, Professor of Rhetoric and Composition at the University of Texas at Austin, believes that because of the increased diversity in the classrooms, faculty should encourage students by developing assignments directed toward the students exploration of opinions and viewpoints based on their own experience. These students bring with them a kaleidoscope of experiences, values...we want to respond positively and productively, using every resource we can to help them adapt to the classroom setting, Hairston thinks that students will be able to share their thoughts with one another, thus increasing the opportunities for multicultural awareness... ...ntimidation of the language barrier allowed me to concentrate on the coursework while understanding it enough to talk about it with others, gain insight into several perspectives and form my own opinions. Although Bray would undoubtedly equate them with those in fear of sounding prejudice, I agree with the positive approaches Hairston and Marback take in regards to multiculturalism. Their basic beliefs, that maintaining contact with and desiring to understand people of different cultures, are a good thing and not as Bray suggests: "a bad idea"(Bray). When we consider what college writing courses expose our students to-the ability to collaborate with minds of I different experiences while enabling them to form and maintain their own outlooks; less I force-feeding of ideas and opinions from mass media-it's no longer a wonder that the I courses exist, it's a blessing. College Writing In a Global Age Essay -- Education Academics Essays College Writing In a Global Age To begin a discussion about teaching college writing in a digital era we must first understand what this era represents. It is an age when many people choose to "watch" books instead of read them, in the form of television programs or motion pictures. It is a time when product advertisements, "news" reports and controlled communications attempt to do the world's thinking for them and when computers-if given enough information on a subject-can compose a written report suitable for any university course. With the availability of these alternatives to reading, thinking and writing, it is a wonder that there is still a college writing requirement at all. Nevertheless, almost every college and university in America has a compulsory writing course, and during the digital ere, almost every instructor has a different approach. As the number of students with diverse cultures, experiences and backgrounds increases, so does the belief of some that these approaches must be examined to ensure a c ulturally inclusive environment will inevitably lead to warfare. Maxine Hairston, Professor of Rhetoric and Composition at the University of Texas at Austin, believes that because of the increased diversity in the classrooms, faculty should encourage students by developing assignments directed toward the students exploration of opinions and viewpoints based on their own experience. These students bring with them a kaleidoscope of experiences, values...we want to respond positively and productively, using every resource we can to help them adapt to the classroom setting, Hairston thinks that students will be able to share their thoughts with one another, thus increasing the opportunities for multicultural awareness... ...ntimidation of the language barrier allowed me to concentrate on the coursework while understanding it enough to talk about it with others, gain insight into several perspectives and form my own opinions. Although Bray would undoubtedly equate them with those in fear of sounding prejudice, I agree with the positive approaches Hairston and Marback take in regards to multiculturalism. Their basic beliefs, that maintaining contact with and desiring to understand people of different cultures, are a good thing and not as Bray suggests: "a bad idea"(Bray). When we consider what college writing courses expose our students to-the ability to collaborate with minds of I different experiences while enabling them to form and maintain their own outlooks; less I force-feeding of ideas and opinions from mass media-it's no longer a wonder that the I courses exist, it's a blessing.

Sunday, August 18, 2019

Gene Therapy Regualtion :: Science Genetics Essays

Gene Therapy Regualtion Gene therapy techniques are a rapidly growing area of interest and concern. Gene therapy technologies will have great impacts on how deal with medical problems and perhaps even on how we live our lives. Yes, gene therapy is something that will probab ly impact your life in one form or another. There are many issues discussed related to this topic, one of which is regulation. Who should regulate this research and to what extent should it be regulated? The following essay addresses the later question . This essay will explain what gene therapy is, how it is regulated, and will discuss the philosophies on how it should be regulated. Who ultimately decides the uses of gene therapy, and will those making these decisions keep your interests in mind? It is in the best interests of everyone that society develop proactive means of regulating gene therapy to maximize benefits and minimize the risks. Human gene therapy is one of the newest advances bridging science and medicine in our modern world. In the most basic sense, it involves changing the genetic composition of certain cells in the human to correct a "defect" in the genetic code that is c ausing undesirable characteristics such as a disease. A person's genetic code is responsible for coding proteins which constitutes our physical makeup. A single alteration to this code can result in a lethal disease. In gene therapy, genes with the cor rect code are inserted into the cell. The method of choice to insert desired genes into human cells is through a virus vector in which the virus inserts modified DNA to replace the DNA that is causing the genetic problem (Coutts). Once the DNA is in th e cell, it can code for the desired protein needed to make the patient well. If the cells that are treated in your body are not reproductive cells, this type of gene therapy is called somatic cell therapy. This technique means it only affec ts those trea ted cells and will not be a genetic trait passed on to future generations. In somatic gene therapy, treatments often have to be conducted every couple of months because cells continually are being replaced in the body. Germ-line therapy is a procedure in which reproductive cells are altered. This results in future generations that carry this same alteration. Much debate over gene therapy has erupted as scientific advances have brought this technology to the application phase.

Saturday, August 17, 2019

Mosfet

Jovany Tavera August 7, 2011 ET 475 Electronic Design William Shockley proposed the Field Effect Transistor (FET) in 1952. FETs are majority carrier devices and its operation depends on its applied voltage to control the majority carriers. The applied voltage controls the current in the device by means of an electric field. FETs are voltage sensitive with high input impedance. FETs are more temperature stable then Bipolar Junction Transistor (BJT). They are easier to fabricate than BJTs. FETs, with their high input impedance, can store charge long enough to be used as storage elements. A later version of FETs is the metal-oxide semiconductor FET (MOSFET). There are four terminals in total: source, gate, drain and the substrate. The MOSFET is constructed with the gate insulated with a silicon dioxide dielectric. Depletion and enhancement is the two modes on the MOSFET. MOSFETs are also known as IGFETs (Insulated Gate Field Effect Transistor). Just as BJTs has either npn or pnp, MOSFETs can be either NMOS or PMOS. The depletion mode was design with a physical channel connected between the drain and source. In operation, a negative gate-to-source voltage pushes out electrons from the channel region, therefore depleting the channel. When the gate-to-source voltage reaches the threshold voltage the channel is pinched off. A positive charge of the gate-to-source voltages increases the channel size, as a result, an increase of drain current. Due to the insulated gate, the gate current is extremely small. Enhancement MOSFET is different from depletion MOSFET due to not having the thin n-layer. In order to establish a channel it requires a positive voltage between the gate and the source. Positive gate-to-source voltage accumulates electrons at the surface beneath the oxide layer. When the voltage reaches the threshold voltage a number of electrons are attracted to the substrate region therefore acting as an conducting n-channel. No current exist in the drain until gate-to-source voltage exceeds the threshold voltage.

Plato’s Laches

During his lifetime Socrates’ various interactions with his fellow Athenians left his intentions debatable. Popular belief in Athens seemed to be that, â€Å"he [Socrates] was an evildoer, and a curious person, who searches into things under the earth and in heaven? and makes the worse appear the better cause† (Plato, pg. 5) as stated by the unofficial charges against him in The Apology. After discussions, his interlocutor’s were left confused in a state of aporia, with no conclusion.And so while negative views of Socrates became increasing popular in Athens right up until his death, Socrates was, on the contrary, serving as Athens’s benefactor, opening up their eyes to the truth of world in which they lived in. In Plato’s Laches, Socrates does in fact tear down his interlocutors’ claims but only to prove to them that they don’t know what they claim to know by exposing holes in their fundamental thoughts and to redirect them on a path to finding true knowledge.Through a method of elenchus, Socrates aimed to prove to his interlocutor that the ideas they held about certain topics were in fact false. When a person would come to him with a question, as Laches and Nicias do in Laches, Socrates would first direct the conversation in such a way that the question lying before the men is a foundational one, and not necessarily the original question.In his explanation of this Socrates states, â€Å"So, in a word, whenever a man considers a thing for the sake of another thing, he is taking counsel about that thing for the sake of which he was considering, and not about what he was investigating for the sake of something else† (Plato 185D) and redirects the question of whether or not young boys should learn the art of fighting in armor to how to care for the souls of young men. By doing this Socrates is able to expose the very source of his interlocutors’ belief system and demonstrate that if the basis of the s ystem isn’t true nothing built on it can be true.Socrates goes on to have the men discus virtue, because they are trying to discover what virtue could be added to their sons’ souls to make them better men and because virtues are the basis for the moral ethics by which they live.. He then invites them to define a virtue: courage. When Laches gives a less than sufficient answer, Socrates rephrases his question and asks for a true definition of courage, one that would encompass every sort of courageous act. Eventually Laches gets to a point where he is unsure of how to proceed, saying, â€Å"I am really getting annoyed at being unable to express what I think in this ashion. I still think I know what courage is, but I can’t understand how it has escaped me just now so that I can’t pin it down in words and say what it is† (Plato 194B). By admitting that he is unable to concisely express the definition of something he considered himself knowledgeable abo ut, Laches allowed Socrates’ method to have a reflective effect on him. The dialogue ends in an aporia, or a state of unknowing, leaving Laches and Nicias still without an answer to whether or not young men should learn the art of fighting in armor and more importantly without what a proper definition of courage.They leave the conversation confused, realizing, that they don’t know what they thought they knew, which is what Socrates had originally intended for them to eventually understand. Coming out of a Socratic dialogue usually left the interlocutor feeling one of two ways. Laches, after conversing with Socrates and Nicias, is aware that he isn’t as informed on the idea of courage as he would have like to think, but still agrees to go Lysimachus’ house the next day to continue the discussion in hopes of revealing an answer.Being made aware of his shortcoming, instilled in him a desire to further explore it. Leaving the Socratic dialogue left Laches wan ted more; because it ended in aporia, the only piece of knowledge he got of the conversation was that his definitions were wrong. Instead of giving Laches the answer, and having him just accept it as true, Socrates invited him to search for it, because in searching for an answer to the definition of courage, Laches would gradually begin to question and search for other pieces of knowledge relevant to his life, and it would become an ongoing process.However, other Athenians eventually grew tired of Socrates’ extensive questioning and can be seen in The Apology putting Socrates on trial for it. Instead of taking Socrates’ conversations for what they were worth, they labeled him as argumentative and a man who was corrupting the youth of the city. By breaking down his interlocutors’ various thoughts, ideas, and theses, Socrates was trying to reveal to them that they were not in fact wise and that the knowledge they thought they possessed was not true knowledge.Socra tes himself was only considered wiser than his fellow Athenians because he considered his one piece of knowledge to be that he didn’t know anything. By breaking down, piece by piece, the arguments of those he conversed with, he intended for them to realize that their knowledge was relative and therefore meaningless in the grander scheme of things. By recognizing this, only then could they begin living a life in search of finding true meaning. In searching for meaningful things they would have to learn to question things.While he is on trial in The Apology, Socrates tells the jury that, â€Å"The unexamined life is not worth living† (Plato pg. 24) Living life without asking questions, and without inquiry, is not living life at all, and is therefore worthless. As an Athenian himself, Socrates wants to help the fellow men of his city led â€Å"examined† lives and is quick to let them know, if they do away with him, there might never be someone else who does for the m what he is attempting to do. In conclusion, Socrates is