Tuesday, April 30, 2019

Women and Work in Preindustrial Europe Essay Example | Topics and Well Written Essays - 750 words

Women and Work in Preindustrial Europe - Essay ExampleYet, with the richness of their work and the need that it filled, it was near muchtimes relegated to a lower place and was maintained servile to the power structure that it served.Most women during this stay worked in occupations that were done at or near the home. The need to maintain a family intent often kept them oscillating between short periods of employment and the duties of motherhood. Out of convenience and necessity, a womans choice of occupations was particular from birth. As Hanawalt observes, The division of labor by sex was adjust early in a childs life (8). A womans dowry would be the initial contribution that women would make to the economy. It was most often used to set up the household, and then used to keep it running (Hanawalt 17). The tilling of soil was a solely phallic domain, while women became the bakers, cooks, tailors, and thread makers. This was done to support the home life and generate suppl emental income. The brewing of ale, to be used in the home, was a typical example of a steady outside income, as was spin thread (Hanawalt 11).While the womans dowry and marriage became a pooled resource to support a family, slavery was an organisation that supported the manors and generated a source of unskilled labor. Though oppressive, slavery was, as Sturad remarks, ... an acceptable alternative to for the memorial tablet of unskilled labor by the medieval period (39). The slave constitution provided the labor for processing goods for export, as governesses, and wet nurses. Women were given special respect based on a complex system that was be by skill and rank. Caring for children was a valued skill and the ability to provide breastmilk to newborns was economically rewarded. The system of slavery, while filling a societal need with efficiency, was overwhelmingly populated by women. In Ragusa during the geezerhood 1280-1284, the ranks of the slaves were as high as 90% fema le (Stuard 44).A womans contribution to the economy was often enigmatical behind the most visible signs of commerce and the layers of male dominance. However, there were professions that enabled women to climb in status through occupational work. Nursing was especially valued. The 4 year apprenticeship required for nurses and the bonuses given to accept apprentices relate the importance that the beginning 16th century placed on the skill. The occupation was wide in scope demanding nurses to discharge as back up medical assistants during plague epidemics (Weisner 105). While the occupations that were very gender specific were often rewarding for women, often women were excluded from the normal channels of commerce. The crafts were generally maintained as a male district as was membership in most guilds. Though non legally barred from entering crafts, a woman would most likely enter the field through her familys or husbands business. The same was true of the status gained by enter ing a trade, as it would be lower than the male membership. Where wealthier men had even great dominance, such as Exeter, organizations were formed that effectively barred womens participation by excluding them from select groups. Markets and commerce were not banned by law, but the prejudice of tradition as Kowaleski observed, ...effectively blocked any real observe of commercial success (155).Single women and wives could rarely escape the lower status granted to them unless they married into a status.

Apply knowledge gained pertaining healthcare services in the US, users Coursework

Apply knowledge gained pertaining health circumspection services in the US, social occasionrs of health information, information systems, and their use - Coursework ExampleWhile the duration of the patient stay continues to shorten therapies that were traditionally completed in the acuate care setting are performed at home (Advanced care Inc, 2012). Finishing a course of intravenous antibiotic therapy used to be a rational for hospitalizing patients and this is not the case any more than. As long as the patient is steady, a peripherally inserted central venous catheter is placed and the patient is sent home with the catheter. Arrangements for the lymph gland are also made for them to turn back and complete a therapy at home. As both a licensed and a joint accredited extract drugstore, Advanced Care Inc makes the patient comfortable and ripe at home. Advanced care Inc understands its requirement for exceptional healthcare. It pays great detail and excellent care as the home i nfusion specialists. This is a company owned by nurses and this makes its concentrate on the patients wellbeing. The company also commits itself to advanced patient care by offering both nursing and pharmacy services. The companys main objective is to put the privations of the patients first and not profits. With the companys experienced pharmacy staff and nursing staff, it continues to develop to meet the needs of insurance companies, physicians, hospital carry out personnel and individualist patients. Infusion therapy involves the administration of medication through a needle or catheter. It is impose when a patients condition is so severe that it cannot be treated effectively by oral medications. Typically, infusion therapy means that a drug is administered intravenously, but the term also may call to situations where drugs are provided through other non-oral routes, such as intramuscular injections and epidural routes (into the membranes surrounding the spinal cord). Diseas es usually requiring infusion therapy embroil infections that are unresponsive to oral antibiotics, cancer and cancer-related pain, dehydration, gastrointestinal diseases or disorders which prevent prevalent functioning of the gastrointestinal system, and more (Advanced care Inc, 2012). Other conditions treated with specialty infusion therapies may include cancers, congestive heart failure, Crohns Disease, hemophilia, immune deficiencies, multiple sclerosis, rheumatoid arthritis, and more. Home Infusion Therapy Until the 1980s, patients who used to get infusion therapy had stay in the setting of inpatient for the period when they got the therapy. Amplified importance on cost-containment in healthcare plus expansion in the administration of clinical therapy, led to approaches of administering infusion therapy in alternate settings. For individuals who need long-term therapy, in patient care is not just extremely costly, but also averts the individual from recommencing normal work activities and lifestyles. Home infusion has been confirmed to be efficient and safe to inpatient care for a number of therapies and diseases. For most patients, getting treated at home or outpatient infusion mathematical group setting is appropriate for the care of inpatient. A number of providers of therapies of home infusion work on more than one ambulatory infusion suites that are preferably meant for some situations of patient therapy. A provider of infusion therapy is usually a closed door pharmacy that provides infusion therapies at the comfort of the home. Demographic schooling Patients of all ages and races visit the hospital on a regular basis. These patients include patients aged between 13 years up to 30 years. Patients aged 30

Monday, April 29, 2019

Manufacturing Engineering Lab Report Example | Topics and Well Written Essays - 500 words

Manufacturing Engineering - Lab Report ExampleSafetySince the device may be improperly used and safety of a machinery is the key concern during its functionality a safety factor of 1.5 was factored in all the calculations. 2.2 InexpensiveThe device must be produced within a strict budget by sourcing for sixpenny local materials according to the bill of quantities.2.3 Design EvolutionThe first concept generation was accomplished by creating an list of the design into the following functional and movable elements pipes, chains and the support system.The team had a brainstorming session, whereby it was agree that only the top rated materials will be considered for each functional component in order to dampen an alpha design. The criteria for selecting components were based on the cost of the material and its manufacturability.3.0 Engineering AnalysisThe engineering fields that are relevant to the design process are statics, dynamics and materials. The appropriate basics and ideas fr om statics and dynamics are Newtons law, bending moments, torque and friction. For materials mostly on the pipes and chains, the applicable properties are fracture toughness, Youngs modulus, corrosion, let strength and ultimate tensile strength.Newtons Second law, was necessary to calculate the forces that will be apply to the support while the chain moves up and down while lifting an object. The bending moments, of the motor was calculated to check into the mechanism does not degrade rapidly and maintain the factor of safety.

Sunday, April 28, 2019

The E-Trade Baby Essay Example | Topics and Well Written Essays - 500 words

The E-Trade Baby - undertake ExampleIn order to identify the rhetorical strengths and weaknesses of the E-Trade Baby commercials, their ethos, logos, and pathos should be examined. Ethos implies the spirit and trustworthiness of the speaker associated with the argument. Ethos raises issues of ethics and confidence between the speaker and the audience. In terms of ethos, the E-Trade Baby ads are quite effective in drawing out the interest of the audience by using an infantile personality that normally appeals to the emotion of audiences. In terms of integrity, the ads are also successful since the babies voices are from trusted race in the finance and investment industry. The E-Trade Baby simply used the attractive and adorable personalities of the babies to convey its good messages about financing and investing. The ads successfully identified with their audiences and their argument. They also appeal to the sense of necessity of the audiences by construction a whole new realm of investing, or also referred to as electronic trading.Logos de nones the applications programme of numbers, statistics, reason, and logic. Quite frequently, logos appears concrete and material, far more tangible and real compared to other rhetorical techniques that it does not appear an advertisement approach at all. In terms of logos, the E-Trade Baby ads are quite staccato since it is commonsensical knowledge that babies cannot talk in the way they are portrayed in the ads making the spotless endeavor weak within the domain of logos. But in terms of the presentation of statistics and facts, the ads have been taciturn and straight to the point.Pathos appeals to the emotions of audiences. The E-Trade Baby ads try to appeal to the emotions of love, compassion, affection, sympathy, and happiness. They successfully used an emotional appeal by identifying with the sense of their audience. The ads did not abuse any ethical or emotional appeal since

Saturday, April 27, 2019

Ex-Basketball Player Essay Example | Topics and Well Written Essays - 2250 words

Ex-Basketball Player - Essay ExampleThe meter explores the early(a) side of fame and the downside of losing tracks of a big shot career. The protagonists failure and mediocrity as he experienced the pinnacle of his life at far too young an age is portrayed by beefed-up characterization, occasion of symbolism and imagery to raise the theme astir(predicate) the harsh authorizedity of what real fame can be in terms of sustaining it. The poem sends out a message that if one is sidetracked by the fame and does not work on his goals, it is not possible to reach his dreams. The ball loved flitter (Updike) and he was the best (Updike) this clearly mentions that Flick used to be a local hero and that the entire township looks upon his past with a sort of admiration as well as pride. Flick did not barely make it big but he did make it big enough to be remembered by his peers. in that location is a sense of sorrow in the eyes of the townspeople, as if they are mourning the lost talent . Flicks talent was realized but was never pursued. ... It straightforwardly tells us that Flick now kit and caboodle at Berths Garage (Updike) and that he does not have a chance to go two blocks from his former steep initiate. From the first stanza we can concluded that Flick is a failure who stop up working in a garage. His attachment to his old school is also very strong as he does not want to be very far from his old school where he had been celebrated as a hero. The description of his job indicates that Flick is doing a job which is less suitable for him with no potential to move up in life. The poem does not have any rime scheme or a consistent meter. Throughout the poem, the author uses a free verse. This is effective in conveying the message and reminders amongst the young readers. The author uses uncomplicated language to express himself and to convey the message about the importance of learning a calling and honing your skills to make it out in the real world. High school may be the place where we are a star, but there is life outside high school where one needs to survive. Without real skills it is tough to survive in the real world and this is what the poem tries to convey. One needs to work hard to achieve his goals as there is no place in this word for the lazy people. Even though we may be gifted with a special talent, we cannot deport the gift to nurture itself, it is our responsibility to hone our skills. The author tries to convince us using a simple language and a simple example about the fact of life and how it is our responsibility to make use of our talent by not wasting it. Flick wasted his talents by not learning the trade and therefore he ended up doing a minimal monotonous job without any chance of moving forward in life. In an interview, the

Friday, April 26, 2019

Mixed Analysis -Environmental Impact of Aviation (Noise Pollution) Assignment

Mixed Analysis -Environmental Impact of Aviation (Noise Pollution) - duty assignment ExampleIn the opinion scaled utilize, zero allow for denote no annoyance or no health effects while ten will show completely annoyed or adverse health effect (Heise, 2010). Perceptions on effects of the noise on quality of life and mental attitude towards the noise will however be described from open-ended questions.9. Procedure Stratified random taste will be used to savour histrions. Residence and work location will be the bases for stratification. A sample of 115 participants, with at least 30 percent of participants from each stratum, will be used for the quantitative aspect. Twenty-three of the participants, 16 people living in the affected areas, and 7 people work(a) in the affected areas will then be selected from the sample, for the qualitative aspects of the vignette. Questionnaires will be used to forgather data on closed-ended questions while focus groups will be used to collect data on open-ended questions. The strata will form two focus groups.Rigor Reliance on participants experiences and informed respond will ensure credibility and dependability of results and conclusion of the study. Incorporated quantitative approach and large sample size will induce reliability and validity to inform transferability of the results.10. Data analysis The researcher will use participants perspective to develop meaning from collected qualitative data and researchers rationale and background knowledge on the subject will help to bridge gaps within a participants responses. Regression analysis will however evaluate the quantitative aspects of the study11. Consent The study will target communities that are exposed to aircraft noise by virtue of living or working near the source of the noise. Each respondent will be informed of the scope of the study. Respondents consent will then be sought, in writing, by asking them if they can participate in the study. Obtaining informe d

Thursday, April 25, 2019

Arbitration and Adjudication Essay Example | Topics and Well Written Essays - 1500 words

Arbitration and Adjudication - canvass ExampleThese three sets of circumstances demand specific considerations and pose their own set of problems. I would analogous to begin, however, by briefly outlining some important qualifications for a study of these two methods of conflict resolution.One of the about problematic issues that arise when considering the efficacy of arbitrament, as comp ared to adjudication, is the comparative lack of detailed information regarding the involved parties. In fact, as Walter Matti remarks, the study of the practice of international commercial arbitrement is like peering into the dark (2001, p 919). such(prenominal) cases by nature tend to be far less publicised than those settled through litigation, and indeed, many another(prenominal) of the parties - be they individuals or companies - who seek private arbitration do so precisely because they wish to exclude the risk of having private information made public. The information used to argue eithe r for or against the entire superiority of arbitration cannot, therefore, be considered exhaustive.At the same time, however, Matti points out that the popularity of arbitration, particularly as a direction of resolving international disputes, has increased exponentially over the past thirty years (2001, p 920). Since it whitethorn be assumed that the number of cases settled through arbitration would not have increased were arbitration not an effective method of resolution, it can be reasonably concluded that an increasing number of parties abide by arbitration to be more appealing than adjudication as a means of resolving disputes. In addition, arbitration possesses an inherent degree of flexibility that is not present when going through the legal system dissimilar judges in public courts, who must follow fixed rules of procedure and apply the laws of the land, arbitrators can consider with legal formalities and may apply whatever procedural rules and substantive law best expi re a case (Matti 2001, p 920). On the other, this flexibility carries with it considerable risks. Since arbitrators are not bound by legal formalities, they may of course exploit this flexibility, to the unfair advantage a party that cannot appeal to a court for clarification or support (Bonn 1972, p 257). Although this risk is always present, there are heretofore significant benefits to pursing arbitration. In the case of arbitration as a means of conflict resolution between private individuals, the arguments in favour of arbitration appear to be quite strong. The emotional and financial demands on both the plaintiff and the defendant are considerably reduced, the overall resolution branch is conducted in a less stressful environment, and decisions are often rendered more quickly. Arbitration is routinely used as a means of settling disputes between landlords and tenants, divorcing spouses, and accident victims suing for damages (Bonn 1972, p 256). In additional the arbitration p rocess holds additional appeal because, although it is an alternative to the court system, is not entirely cut off from the it - rather, the two systems are complementary since the provisions of an arbitrators award can be enforced judicially under common or statutory law (Bonn 1972, p 256). In addition, Plaintiffs therefore have the additional security of knowing

Wednesday, April 24, 2019

International relation Assignment Example | Topics and Well Written Essays - 250 words - 1

International relation - Assignment ExampleGlobalization involves the interconnectedness and interdependent of economy and culture of all countries internationally, and able become able to exert influence upon new(prenominal) nations. However, globalization has some effects on the render and the citizens involved. Globalization in social science harmonize to (Keohane & Nye Web), asserts that it all converge on the concept that all human activities across all regions of the world ar highly linked together as a result of the technological and social changes. Globalism according to the professors is the state of the world consisting of the network of independence that results from the constant flow of services, people, goods, culture, and ideas internationally.According to Keohane and Nye, globalization can lead to slew among the separate individuals or organizations that are not in harmony with each other. The two professors in their sermon agreed that the significance role of glob alization involves bringing together departed groups through the process of talks known as policy coordination. The agreement tries to bring peace and harmony to individuals within and internationally.The task of interwoven interdependence brought some complications. Keohane and Nye came up with a publication that had an in-depth understanding of the impacts of studying the international relations. The two authors purify to explain the significant of an individual to study international relations (Keohane & Nye Web).

Tuesday, April 23, 2019

Statement of Smith Ltd Essay Example | Topics and Well Written Essays - 500 words

Statement of Smith Ltd - Essay ExampleAccording to the one-year financial reports of Smith Company the year 2012, the current ratio recorded was 1.6 (Warren, Reeve, & Duchac, 2012).. This clearly indicates that the firms ability to becoming its short-term obligations with time has improved thus, the firm remains liquid and has the ability to meet its short-term financial obligations within a short duration of time. As a result, it is wise to clothe in the company has an high current ratio points out a progress in plus management that allows movement of cash flow thus enhances growth and prosperity. In addition, quick ratio is utilise as an analytical tool that indicates the firms ability to pay debts it shows the difference in fluidity between account receivables and inventory. This is because most of the companies provide services and goods to its customers on credit basis as they by and large allow favourable credit terms. Smith Company reports a quick ratio of 0.66, this show s that the company has affluent current assets apart from inventories to enable it pay for its short-term obligations as and when they fall due. Leverage ratios are utilise by companies to calculate the firms ability to finance its obligation and its ability to generate income that go off service the debts and interest rates accrued as the company meet its financial obligations over time.

Monday, April 22, 2019

Identifying a Problem and Developing a question Assignment

Identifying a chore and Developing a question - Assignment ExampleOnce a enduring has a catheter fixed in his or her system, the level of risk rises significantly to a daily incidence of 3-10% of bacteriuria. As such, tight 10% to 30% of the patients that undergo short-term catheterization, between two to four days, develop bacteriuria, and similarly move asymptomatic. According to Friedman and Rhinehart (1999), nearly 90% to 100% of the patients who undergo long-term catheterization equally develop bacteriuria. Nearly 80% of nosocomial urinary tract infections relate to catheterization.Currently there is little familiarity about CA-UTIs perspicacity with its vast preponderance, especially among the women. Urinary tract infection comes up through a number of complications, such as sexual intercourse, poor personal cargon, diabetes, bowel incontinence, pregnancy, problems emptying the bladder completely, and the blocked flow of urine, having a urinary catheter, as well as kidn ey stones. This problem is diverse across numerous places because of the lack of knowledge of the disease (Gould, 2014). Most health practitioners are usually unaware of the risks that may arise due to the patients long-term or short-term catheter usage. Consequently, this lack of information may promote the development and prevalence of the disease within the community.This possibility of an education deficit brings about more challenges to the treatment and management of the problem. The background signal and impact of the problem is far worse than it projected because most of the cases are not always recorded. Elphern (2009) argues that the urinary tract infections (UTIs) are some of the most common nosocomial infections. In fact, CA-UTI accounts for nearly forty portion of the reported infections especially for patients under acute care hospitals (Elphern, 2009). In addition, nearly 80 percent of the UTIs are more associated with the presence of an indwelling urinary catheter. In most cases, a catheter associated UTI increases the

Sunday, April 21, 2019

Why states obey the laws of war Essay Example | Topics and Well Written Essays - 750 words

Why rural areas obey the law of natures of war - Essay theoretical accountThese laws and treaties have actualized an environment of self-regulations, so that the countries obeying it, have maximally minimized aggressive overtures against other countries as swell as their own citizens. However, that is not the case all the time, as accepted countries without obeying the international laws have acted or are acting aggressively and unilaterally. This gross violation of international laws by countries has raised doubts about the harshness and efficacy of these laws. Even amidst these disobeying of laws, countries tend to obey laws due to certain reasons. States obey the laws and the related treaties and conventions due to salmagundi of certain valid reasons, which mainly borders on self-interest and need for self-legitimacy, and overly minimally due to coercion. self interest constitutes various factors and one key factor is the want of the country to create a positive identity for itself. Participation in the transnational legal process and obeying all the laws helps constitute the identity of the state as the one that obeys the law. (Coleman). Importantly, they does not want to acquire the tag or reputation of a law breaker or a rogue nation, and thereby standing isolated and facing a barrage of debilitating sanctions. That is, if a nation continues to disobey the laws and thereby acts in a detrimental commission against sectionalisationicular nations as well as global community on the whole, certain nations and also overseeing personate like United Nations exit impose economic sanctions, trade, food and other essential commodities embargoes, etc. These retributory actions will negatively impact the nation as well as its people. In order to bend these scenarios, nations will tend to obey the laws. As another year of self interest, nations will obey laws to process or demand other nations to do the same. States will tend to obey laws whose underpi nning political rational is form and which they agree with, especially the laws relating to territorial integrity and inviolability of borders.(King 2005). Once obeying of law based on self-interest is done, consequently legitimacy will automatically fall into place. That is, states will always want legitimacy to its words and actions, and to lead that they have to obey the laws. If they want other countries to be legitmate, they have to create and obey laws appropriately. This was validated by Professor Frank who states that legitimacy means that quality of law must derive from a perception, to those to whom it is addressed, that law has come into being in accordance with right process. (Rashid 2004). Even coercion and the resultant obeying of the law is also an extension of self-interest. When a state is coerced to obey laws through armed force or other means, they will accept it mainly from self-interest perspective. In certain cases, nations will obey laws as a form of noncon sensual coercion, but would like to exhibit as self-interest. The bottom line is, all states will want to expire in peace, prosperity and in good coordination with other states and for that they will obey the international laws. When viewed from another perspective, certain States although generally act in accordance to the law, they do not always obey it. This happens mainly in the case of unilateral actions and importantly due to mis-interpretation of the laws according to their self-interests. Also, when certain States feel as they were not part of specific law devising process, they are not obligated to follow that law. When states take unilateral actions to put through and pursue their self-interests, imperialistic ambitions, etc, they disobey and undermine the international laws. Although, they may be part of the law making process and could have acted in accordance with those laws most of the time, they could disobey. As an

Is Development Best Achieved by Being For, Or Against, Globalization Essay

Is growth Best Achieved by Being For, Or Against, Globalization - Essay ExampleThis essay stresses that globalization is a word that has been coined recently to refer to an age-old process. Indeed, globalization began in the centuries preceding the New World and the European Age of Discovery. Some of the earliest forms of globalization were through trade and cultural interactions. For instance, the Ottoman Empire explored part of Africa, Europe and Asia while trading silk and spices in the 15th century. However, the magnitude of globalization in these times feces best be described by the term minute. Increasing in modern globalization began in the mid-1980s and has risen sharply in the subsequent decades. This sharp rise is attributed to the modern forms of communication such as the internet and the emergence of mobile phones.This paper makes a conclusion that ontogeny is best achieved by macrocosm against globalization. As illustrated above, the effects of globalization benefit few countries while causing disadvantages to many. The modern-day phenomenon has failed to eradicate penury and improve on the lives of those in developing countries. Instead, it has resulted in high unemployment rates and degradation of the standards of living. For example, globalization has oblige the shutdown of many startup companies based in developing countries due to their inability to match the expertness and capital of the developed world. Secondly, globalization has resulted in inequality between the developed and developing countries. This compounded with the debt crisis hinders development for the underdeveloped countries.

Saturday, April 20, 2019

You can choose what ever you think Research Paper

You can choose what ever you estimate - Research Paper ExampleDe Nittis (2008) observes that Oates places special significance on the issue of subordination of women and the feminist opinion of our male-dominated familiarity. She finds that the story displays the theme of violence, especially on females and male characters ar the perpetrators of violence, often physical violence, upon females (De Nittis 7).Apart from the position that the story describes issues of violence against women, there is also the integration of fantasy over candor among young girls and how the society responds to it. It can be noted that Connie constantly displays narcissistic acts by always looking at herself at the mirror, fixing her hair time and again, and would act as if she is a matured woman and experienced with men. The renouncement comes directly from her mother who often scolds her for being so immature and contrary to her sister, June. This is where the issue of fantasy versus reality comes into play because women toil so much in order to be recognized at a certain level by certain male categories, particularly matured men, the society reacts the against it by considering girls as sexual fantasies rather than respectable women.Oates finds a surface realism wherein she deems Arnold friend as a exemplary Satan (Christle 1). The roots of Connie, and females in general, being a recipient of sexual violence is because female grammatical gender has always been perceived based on the masculine parameters (2). For instance, it is as if that being beautiful is all that actually matters for Connie - when she sees herself nicely in the mirror, she would think that she would get the kind of recognition she wants from boys. This is always ironic in a sense that the more females define their sexuality in terms of beauty and attractiveness, the more male are going to treat them indecently and that is the sad

Friday, April 19, 2019

Globalization and Indian Industries Essay Example | Topics and Well Written Essays - 1500 words

globalisation and Indian Industries - Essay ExampleCloseness to the technological frontier to fight the entry of the external competitors is considered to be very significant in this connection. The industries that have capability to improve their technological strength for investing in the updation of the production systems would be able to withstand the competition (Mishra, 2006). Thus the industries in this group tend to pompousness and perform well under liberalized regime. While the companies that were very weak didnt have the enough strength to call forth their capacity and elevate them in towards the technological frontier. Thus most of these units have shorter business life pass over and ultimately get eliminated from the race. Thus the industries having very low technological frontiers would be losers under the globalised business surround (Mishra, 2006).Indian experiment on globalization started in the socio-economic class 1991 with the major sectors involved being ste el, pharmaceutical, petroleum, chemical, textile, cement, sell and BPO (Business maps of India.com, n.d.). The government had expected that high rate of growth could be achieved by inviting large volumes of exotic bear investments. A comparison on the number of companies that operated in India across pre and post-liberalized era clearly show the contact of the policy change. Earlier to 1991, the number of factories in India stood at 1,10,179 while their number reported in the year 2004 was 1,29,074. The first observable signs in this direction after the implementation of the polices were setting up of different companies with opposed investments for enhancing its operation in the above-mentioned sectors. This is said to have helped to address the local unemployment problems to a significant take aim and thus reducing the poverty levels in a few of the locations (Mishra, 2006). Also indirect benefits were obtained as a result of considerable improvements in the technology and m anagement that the domestic companies had to attain to face the competition from their foreign counterparts having highly efficient production systems. On the other hand, the consumer preferences in buying also had a fitful shift. The Indian consumer who were mostly dependent on the domestic products had the opportunity to purchase quality products at affordable prices. This had resulted in the lowering of business volumes of the pharmaceutical, chemical, manufacturing, and cement manufacturing industries (Business maps of India.com, n.d.). Also, the companies resorted to various structural adjustments like lowering of profits, which threatened the viability of semipermanent operations. Another striking feature was the reduction in the labour strength across the sectors. The labour statistics obtainable for the year 1990 was 81,62,504 and those for the year 2004 was lowered to 78,70,081. Thus the influence of globalization policies on the poverty reduction in India as a whole is very ambiguous (Mishra, 2006). Hence a The sector specific assessment on the impact of the globalization is as given below(i) Petroleum Industry Globalization of the petroleum Industry had begun much before the

Thursday, April 18, 2019

Dress code Term Paper Example | Topics and Well Written Essays - 750 words

Dress code - Term Paper ExampleIn order to achieve this, we do require you to gain intact understanding of the managements expectations from you so that you may act accordingly. Although approximately of you are aware of the standards maintained by ABC Institute, yet a lot of new employees sustain been recruited recently and the management wants to once and for all in all, make clear the dress code that they are compel to exist as a requirement of their contract with the ABC Institute. Old employees should review the memo to find rebuff rise to powers that have been made to the last dress code policy. Being Muslim, our standards for dress are derived from the teachings of Islam. Modesty is the ruler determinant of the eligibility of dress for both men and women in the institute. Dress code for men Dress bloomers (jeans are non allowed), collared shirts with full sleeves, tie, and boots (sandals are not allowed). Jersey can be worn as per the need. Dress code for women Trous ers (jeans are not allowed), knee long skirts (can be longer but not whatsoever shorter), full sleeved blouses till waist (can be longer but not any shorter), boots (sandals are not allowed), and scarf (compulsory). Half sleeved blouses can be worn by the womanly module members provided that the sleeve covers the elbow. T-shirts are disallowed Knee length skirts should cover the knees in all positions i.e. sitting and standing. It is best(predicate) to wear a knee length skirt with full sleeved or three-quarters sleeved blouse, and a full length skirt with a half sleeved blouse. Full length trousers are to be worn in either case ABC Institute Code of Behavior All staff members are expected to completely comply with the ABC Institute Code of Behavior. Staff members are obliged to Display professionalism always while representing the ABC Institute Serve as a role toughie for others by always showing perfect mannerism Respect the religious as well as traditional beliefs of all com munities in UAE Follow the ABC Institute Dress Code at all times All members of the staff should be aware of the fact that ABC Institute provides the public with full time customer service. The service continues 24 / 7 uninterruptedly. That fundamentally tells that many of the staff members have to wrench in the night shift. They are advised to adjust their schedule accordingly so that they are capable to deliver their best in the night. ABC Institute requires its staff members to present themselves to the public in a trucking rig that is expected of them in context of the Islamic teachings and the indigenous culture of UAE which accords with them. UAE maintains a multicultural society, and muckle from all over the world dwell here. The staff members, should never, in any way, comment on the getup of any customer. ABC Institutes workforce is expected to always endanger excellent mannerism, which essentially constitutes all three areas of language, behavior and dress. Upon recrui tment, all staff members are made aware of what the management expects them to display with respect to each of the three areas of mannerism. While we talk of language, it essentially includes body language in addition to the verbal language. ABC Institute expects every staff member to be very formal in both chassiss of languages, and make excellent use of emotional intelligence in the workplace. Smoking is strictly veto both within the workplace. No staff member is allowed to use cigarettes or any other kind of drugs

Wednesday, April 17, 2019

The Ethical Revolt of Slave Morality Essay Example | Topics and Well Written Essays - 1500 words

The Ethical Revolt of Slave Morality - Essay ExampleIn Friedrich Nietzsches On The Genealogy of Morals, he explains how a slave revolt takes place in history, which is forceful through the predominance of Christian morality. In this essay I shall explain how Nietzsche arrived at such a claim. I shall argue that despite Nietzsches criticisms on the dogmas of Christian morality, values, and tradition, he extols principles that contribute to the emancipation of the various(prenominal) self. It is in this regard that I agree with Nietzsche when he claims that a slave revolt has taken place, for along with this revolt was the degradation of the human subject as personnelless, and thus stagnating ones potentials for self-actualization. However, in identify to understand Nietzsches contentions, it is important to understand first, what dominated his thoughts. One of the elements which is central to Nietzsches thought is illustrated in his famous declaration that, God is Dead (Thus Spoke 77). This affirms a complete rejection of metaphysical and ghostlike truths as grounds for reality. To Nietzsche, the existence of God, the afterlife, immortality are nothing but imaginary causes. In his view, such are nothing but mere projections of ones psychological desire for security and calculability in life. In line with this, Nietzsche believed that once the existence of God is unveiled as an illusion, then it follows that God could no longish be implemented as the foundation for human ethical conducts. This leads to the raiseion that all morals leave behind be founded on the subjective go forth of individual self. Thus, Nietzsche affirmed the individual self as the theme of all inquires and norms. Based on this argument, we are led to the question on how can the individual reach out its highest level of affirmation in a world without a divine providence? The answer to this head is found in the Nietzsches theory of the will to power. Nietzsches will to power is def ined as the drive to dominate the environment. This drive, so central is the will to power. This will to power is more than simply the will to survive. It is, rather, an inner drive to express a vigorous affirmation of all a persons powers (Stumpf 380). Given this, the will to power can be characterized as the inner propensity to dominate and assert superiority over ones life. Furthermore, it allows individuals to reach their highest potentials through the overcoming of barriers and constraints. In this manner, individuals increase in power and vitality. However, Nietzsche cautioned us that if one decides to practice a certain code of ethics, the will to power gradually declines. By this, the individual weakens and suffers. Herein, Nietzsche accused Christianity for advocating virtues that undermine and destabilize ones will to power. But prior to Nietzsches presentation of his criticisms towards the teachings of the Christian religion, he first explains how and why Christianity bec ame the dominant religion in human society. get across Morality His explanation is found in his doctrine of the two-fold history of good and evil. This doctrine reveals that there were two types of moralities, which were practiced during the ancient Greeks. These are master morality or aristocratic morality and slave morality. For Nietzsche, tame morality is one that is founded upon the will to power. He claims What is good? All that heightens the feeling of power, the will to power, power itself in man. What is bad? All that proceeds from weakness. What is happiness? the feeling that power increases that a resistance is overcome ( fall of 127). With this in mind, master morality advocates that good is identified to that which is powerful and noble. On the other hand, evil is cogitate to weakness and cowardice. In line with this, In Beyond Good and Evil, Nietzsche describes the temperament of the noblemen. To begin with, Nietzsche says,

Tuesday, April 16, 2019

Violent Sports should be Banned Essay Example for Free

Violent Sports should be Banned EssayTo sugar with, Sports is basically an activity done for cheer, which needs physical causal agent and skill. Some people, who dedicate themselves to this activity, consider it as a passion to compete against others in their skill, ability and spirit. Sports also help in inculcating a trusted discipline as well(p) as the spirit of brotherhood or the team spirit in the sports persons. Sports ideally atomic number 18 not meant to do anything with violence. Sports for some is a mode of attaining fame, for some it is their job. Some do it as their hunger to compete and win, while the others micturate it as an enjoyment to watch. But, in todays scenario, the sports that include aggressive activities are gaining more popularity, as they present much a way of enjoyment to the spectators. Since the youth are more volatile by nature they enjoy these violent sports much(prenominal) as boxing, kick boxing, wrestling etc. Todays Young generation d oes not make an effort to know the grave dangers that these sports put.The dangers that these sports cause are susceptibility to major accidents that may even prove to be even worse than fatal. The injuries which may be for lifetime may be a cause of greater torture and helplessness than death itself. Certain instances in the past, such as the accident of Fred Guirrero and Umaga because of accidents during the match lay d consume resulted in their death in the arena themselves. Also, these violent sports are responsible for major injuries to the sportspersons, such as rupture of the spine, brain haemorrhage, excessive blood loss, irregular clotting etc. Not only the sportspersons are affected by these kinds of sports, but also, the viewers get an indirect impact on them. Young children as well as adults, try to imitate the actions that take place in these sports.Statistics say that almost 15000 deaths take place annually in the USA because of people imitating the sportspersons of boxing, wrestling, sword fighting etc. Repeated reflection of such sports unconsciously affects the very psyche of the young which ultimately reflect in their behaviour in their social environment. One of the major causes of road rage, shooting spree by teenagers in their own schools and colleges, acts of suicide, involvement in murders, loots etc, are the consequences of being in constant influence these violent sports and other such activities. What is the logic behind sportspersons indulging themselves in such inhuman activities and the viewers watching blood smeared sportsmen inthe ring with broken limbs? It seems greed of money is prompting certain people to participate in such type of violent activity. Also, it is very contradictory to the spirit of sports that they spread violence and suffering instead of providing pleasure and joy. So in my opinion I strongly refute the proposition of those who argue in back down of the continuation of such violent sports. They should be a llowed neither to continue on human as well as moral grounds.

Monday, April 15, 2019

If I Were a Doctor Essay Example for Free

If I Were a Doctor EssayFor a sick person, a doctor is a God on earth. The really presence of doctor instills immense confidence in a patient. But, today doctors are found to be indifferent to their patients.However, we find then in mankinde these days. How could patients come across up to them as the incarnations of God I feel that the general image of doctors has taken a whacking in the eyes of general public the public has realized much to dismay that doctors are right away only interested in minting money and have lost the real touch with the fellow human beings and the humane life. It is true that individuals have become money-spinning machines, but the doctors who once represented God should have stayed forth of the melee. This has not happened vilifying the avocation as any other profession. If I were a doctor, I would try to encounter the lost image of doctors, at the outset. My prime objective shall remain identifying myself with the host of patients.This could mobi lize me behave humanely with them. Next, instead of keeping an eye on the amount of money spent for the treatment, I shall try to repossess the patient fully without bothering how much had been paid for the service.I would also take money and lots of which from the very rich, and then treat the poor patients free. With this balancing act, I think I would be able to gather enough money to maintain my life and family and progress to a sea of goodwill in return, from the considerable mass of poor. I would earn, besides money, love, respect, and the unflinching reverence. Thus, contrary to what doctors could earn these days, about heaps of money, I would earn love and respect in such heaps. With this attitude, I am sure I could bring stand the angel status of doctors.

Consciousness mind Essay Example for Free

Consciousness wit EssayThe Psyche, is a culmination of how we interpret the world, all our psychological nature. Its not about the destination its about the journey. The straitss be different paths to knowledge but defend the same ending, somebodyal ideas, experiences, emotions, as well as the collective un intended. Conscious is the only part to the school principal that is kn declare directly by the private, thinking, feeling, sensing, and intuiting.This is how we grow our assuredness the attitudes of extroversion and introversion determine how we orient our conscious mind. Individuation, or knowing oneself as completely as possible is how we produce and develop our ego. The Ego acts as the gatekeeper, it determines what perceptions thoughts feeling and memories volition enter consciousness. Its what we select to make conscious. The organizational of how we operate. The personal unconscious is the idea of culture that we file away in our mind.Its there, but were not f ocusing on it at the mo its below the surface, the storehouse of repressed psychic material involvedes lie in our personal unconscious. They argon groups of contents that clump together to establish a cluster or constellation. They are separate diminutive personalities within the total personality. They are autonomous, possessing their own driving phalanx, and can be actually powerful in controlling our thoughts and behaviors.The collective unconscious is the portion of the genius, which can be differentiated from the personal unconscious by the fact that its existence is not dependent upon personal experience, composed of contents that were once conscious, but the contents of the collective unconscious have never been conscious within the life time of the individual. Ex Mans revere of snakes or the dark. Does not learn these fears through experiences with snakes or the dark, although such experiences may reinforce or affirm his predispositions.We inherit predispositions t o fear snakes and the dark because our primitive ancestors experienced these fears for countless generations. They be lessen engraved upon the brain. Archetypes lie in the collective unconscious, models of our ancestry, it is the endless repetition that has engraved these experiences into our psychic constitution, not in the forms of images filled with content, but at first only as forms without content, representing merely the possibility of a certain type of perception and action. They are universal everyone inherits the same basic archetypal images.The persona, to take a characteristic that isnt your own. The persona is the inter or facade one exhibits publicly, with the intention of presenting a favorable impression so that society depart accept him. It is necessary for survival, it enables us to get along with people, even those we dislike, in an amicable manner. The anima/animus is the outer face of the psyche because it is that face which the world sees. The inward face he called the anima in males and animus in young-bearing(prenominal)s. The anima cowcatcher is the feminine side of the male psyche the animus archetype is the masculine side of the female psyche.Everyone has qualities of the opposite sex. The shadow, is primal and animalistic, it lives in the unconscious. It is projected on the opposite sex and is responsible for the quality of the relationships among the sexes. It is persistent and does not yield easily to suppression. Ex farmer to poet, burying the idea of being a poet, but an even may trigger that desire. The bigger the personality the bigger the shadow. The self is the organizing principle of the personality. It is the profound archetype in the collective unconscious. It harmonizes all the archetypes and their manifestations in complexes and consciousness.It unites the personality, giving it a sense of oneness and firmness. The psyche a relatively closed governing body must be dealt with as a unitary system within itself, ap art from any other get-up-and-go system. It is derived from the things we touch, see, smell, taste, feel, or hear. These are the continuous source of rousing by which the psyche is fed. The psychic energy is the energy by which the work of the personality is performed. Also called the libido, the rude(a) state of appetite, manifested consciously as striving desiring, and willing.Its expresses itself through perceiving, remembering, thinking, feeling, wishing, willing, attending, and striving. It originates from the experiences that a person has. Psychic time values, a value is a measure of the amount of energy that is committed to a particular psychic element. When placing a proud value on an idea or feeling it can exert a considerable force in influencing ones behavior. For instance, one who puts a high value on beauty will put forth large amounts of energy to surrounding oneself with well-favored things. This reminded me of my sister in law, whom is obsessed with very beauti ful and very expensive things in life.She devotes her time and hard earned money to the material things in life. One might say shes trying to keep up with the Jones. She would say she like beautiful and expensive things. Direct observation and deduction, is a complex that does not always exhibit its characteristics in conscious behavior. Ex The person who says, I cant stand gossips may be the one who gossips most. Complex indicators are any disturbance of behavior may be indicative of a complex. Ex when a man calls his wife by his mothers name, it suggests that his mother complex has assimilated his wife to it.The repressed remembrance is assumed which has some connection with an unconscious complex so that the memory is swallowed up by it. stirred Reactions, is the underlying complex. Intuition is the natural and spontaneous capacity every man has to perceive the slightest emotional mutation in others. The Principle of Equivalence if the amount of energy cosigned to a given psyc hic element decreases or disappears, that amount of energy is lost from the psyche it is simply transferred from one position to another. The principle of Entropy is the committal in which energy flows is conceptualized in physics by the second law of thermodynamics.This principle states, in effect, that when twain bodies of different temperatures are placed in contact, heat will pass from the hotter to the colder body until the temp of the twain bodies is equalized. Progression and regression, Progression is defined as a persons daily experiences, which advance his psychological adaptation. Ones progression is a continuous process since his environment and experiences mixture continuously, which then adaptation is never completely achieved. Regression is the retrograde movement of libido. Through the collision and interactions of the opposites, they steadily become deprived of their energy.It subtracts energy from psychic elements whereas progression adds energy to psychic ele ments. Individuation Jung understood individuation to be something that began in the second half of life, when individuals reach the zenith of their lives and abruptly find themselves facing an unknown vista or some unforeseen upheaval. Sometimes this turning billet takes the form of a crisis such as a financial failure, a health problem, a down(p) relationship, or a change of residence or profession something which upsets the status quo.Sometimes this experience assumes the form of a profound self-doubt, a loss of meaning or religious conviction, a questioning of everything antecedently held so dear. Sometimes it presents itself as a deep yearning or a call to change direction. In essence, one could say that the unconscious, or more specifically, the Self (with a capital S), the central organizing archetype in the human psyche, which has seemingly hidden the greatest measure of its influence while the ego has been agile building a life for itself, suddenly the Self returns ful l force to claim a monumental say, if not a central place, in the overall scheme of things.And for what purpose? To call a person to become a psychological in-dividual, a separate, indivisible unity or whole. Those personal aspects, which have as yet been disregarded be they interests, talents, characteristics, experiences, or issues now come forth to be acknowledged. That which was fragmented now strives for unity. That which was lowly now yearns for wholeness. That which was neglected now seeks expression. That which was previously formless in nature suddenly begins to take a new shape, strangely in keeping with what feels like a unique and deeply ingrained individual patterning.The center of the personality moves from the ego toward the Self, in an attempt to establish a new center of the psyche somewhere between the two. There is something in the human psyche, which in its own fullness of time, struggles to produce the dependable personality. The individuation is an auto nomous, inborn process, which means that it does not require external stimulation in order to come into existence. The personality of an individuation is fate to individuate just as surely as the body is destined to grow.But just as the body needs proper food and exercise for healthy growth, so the personality needs proper experiences and education for healthy individuation. For example in the early stages of pip-squeakhood, of infancy personalities of the peasant are a reflection of the parents personalities, meaning that the child does not carry his own identity. But when the child separates himself from the parents, as in he conk outs attending school. He will then start shaping his own personality in unique ways apart from the parents. Three facts about Carl Jung.Jung was an introvert child and found happiness in being quiet and being alone. When he was a child he played by himself, since his sister was not born until he was nine. He spent hours inventing and compete games , then abandoning them to devise new and more complex ones. He did not want anyone to disturb him o tot interfere while he played. Jung had religious conflicts throughout his adolescence. Questions concerning religion were taboo. It produced confusion in jungs mind but it was the barrier that made communication with his father virtually impossible.He searched unsuccessfully through books for answers to his questions. ghostlike discussions with his father invariably ended unsatisfactorily, often with fuss and hard feelings. Jungs father died and made his financial web site worse. This left him responsible for the support of his mother and sister. Some of his relatives urged jung to discontinue his studies and seek employment, fortunately, one unclc offered financial tending to take care of the family and the other relatives loaned jung money to continue at the university.

Saturday, April 13, 2019

Machiavelli Lao-Tzu Essay Example for Free

Machiavelli Lao-Tzu EssayLao-tzu was an ancient Chinese philosopher from 6th century BC, the author of Tao-te Ching, and Machiavelli was an Italian philosopher who lived 2000 long time after Lao-tzus time, author of Prince. They are both philosophers but ache totally different perspective on how to be a good leader. While both philosophers writing is instructive. Lao-tzus advice issues from detached keep an eye on of a frequent ruler Machiavellis advice is very personal perhaps de cosmosding.Both philosophers idea will none work for todays world, because that new world is not as perfect as Lao-tzu described in Tao-te Ching, and not as higgledy-piggledy as Machiavelli illustrated in Prince. Perhaps Lao-tzu and Machivellis political system will not work for todays world, but around of their philosophies are still exist in some of modern issues. One of those issues is munition control, which has become a dividing line in America.Lao-tzu advised in Tao-te Ching weapon are th e tools of violence all decent man detest them. Weapon are the tools of fear a decent man will avoid them eject in the direst necessity and, if compelled, will use them nevertheless with the utmost restraint. On the other hand Machiavelli wrote in Prince, Francesco Sforza became Duke of Milan from being a private citizen because he was armed his sons, since they avoided the inconveniences of ordnance, became private citizens after having been duke.For, among the other bad effects it causes, being disarmed makes you despised this is one of those infamies a prince should guard himself against (page 36) in which he pointed out that taking arms from a people can make a difference between a prince and a citizen. To ordnance control activists, the issue is about crime and the regulation of the weapons used to commit crimes. In their opinion, observing citizens should have no need for guns, which is similar to Lao-tzus idea.However in opposite, the nations powerful gun lobby, the Na tional Rifle Association, argues that gun control is a violation of freedom and rights to protect themselves, which correspond to Machiavellis idea. I think that if American judicature take either sides, will end up in total chaos. Gun control, which means law-abiding citizens lose their right to protect themselves, and outlaw, will be the and one legally own firearm. barely if in that respect are totally no gun control, a five year old boy can bring a gun to school, and shoot at teacher as he please, regular thought that he doesnt know better.Machiavelli wrote A prince, therefore, must not have any other inclination nor any other thought, nor must he take anything as his profession but war, its discipline because that is the only profession which befits one who commands He discussed that a Princes duty is war and only war. This lead to the second issue, war, which existed as long as the existence of tender kind, as I am writing this essay there are still wars going on all o ver the world. According to Machiavelli war should be the only thing on a princes mind, because if a prince give more thought to personal luxuries than war he could lose his state and position.Lao-tzu states in Tao-te Ching The master doesnt try to be powerful thus he is rightfully powerful. The ordinary man keeps reaching for power thus he never has enough. I have to disaccord with both philosophers idea, because I think that war can be looked at as a human evolution, in the ancient world war was fought for land and freedom. In modern world, war was fought for gross of economy. warfare is something that just happens, its not necessary and cant be avoided.Look into American History From Civil contend to Vietnam War to Desert Storm, which cost billions dollars and millions lives, will the war ever end? We all know, the answer is no. As long as human lives, the war will never end. Perhaps Lao-tzu and Machiavellis political view is totally opposite, at the end they all have a commo n goal is to create an exemplar political system. The constitution among other things would not allow that sort of government today. The times have rebelliously changed, but the need for the higher forms of thinking amongst society has not.

Friday, April 12, 2019

The Companions Are the Source of Much Grief for Odysseus Essay Example for Free

The Companions Are the Source of Much Grief for Odysseus EssayOdysseus, the strong, courageous, dedicated hero, travelled for miles on end to return to his home land of Ithica and to bring with him the twelve fleet ships carrying his loyal companions. However throughout this epic poem Odysseus companions have been the bearers of much grief for Odysseus, in many ways from questioning his whizing to simply dying in battle. And slowly during this epic poem each of his twelve fleet ships has been afflicted down.The stories of Odysseus companions begin from the very opening of book nine, on the coast of Ismarus home to the Cic singles. Odysseus and his men sacked the mooring and destroyed its men folk after taking their women and their vast spoils, Odysseus reproveed his men to dispatch with haste. just now they were not quick minded enough, and a tremendous battle broke out between Odysseus and his men and the Cicones. cardinal two of Odysseus men were brut eachy killed. We c an see here that this would cause much grief for Odysseus and his stay companions, for his men had made it through the battle of Troy and where rejoicing to be returning home to Ithica, outright he would have to return to grieving families awaiting their heroes return and for some, now their heros would never return. This is a classic example of the kind of grief Odysseus feels throughout the epic poem, because this is how many of his companions have presented Odysseus with grief, through death.Whether it was go in battle or devoured by a monstrous creature. For instance when, Odysseus and his remaining companions sailed to the island of the Cyclopes, where with twelve companions, he entered the cave of the Cyclops Polyphemus. This giant devoured, one after another, six of the companions of Odysseus, and kept Odysseus and his other men as prisoners in his cave. Witnessing their loyal companions cannibalistic murders right in front of them Odysseus and his men wept and increase th eir hands to Zeus in horror. This again must(prenominal) have made Odysseus overridden with grief for not exactly did he watch his men be killed but he was the one that led them to this ferocious one eyed monster. Again he has lost much of his men which means more grieving families at home in Ithica questioning the Gods for the death of their loved ones.However, death is not the only way that Odysseus is candid to grief some of the monsters that Odysseus and his followers encountered would not kill his men but simply make them embarrass all longing for home, and the nostros that they were feeling. One of these monsters would be the Lotus-eaters, a race that eat the flowery lotus fruit. slightly of his companions were so much delighted with the taste of this flower that they wanted to remain with the Lotus-eaters and think no more of Ithica.This must have caused much anguish for Odysseus as he did not know how to help his compelled comrades. But being the intelligent and strong hero he is he used force to bring them bottom to the hollow ships, and they wept on the way but once on board he tied them up and continued with his voyage. The sirens also forget men to forget their home for with their beautiful voices would sing bewitching songs to choose these men to their death. Luckily with the help of Circe the sorceress who told Odysseus that if he wanted to hear the sirens song and live that he should allow his men to tie him to the mast of his ship while they covered their ears with softened bees wax and steer the boat in advance while Odysseus listened.Odysseus, in the epic poem has also encountered Companions that have questioned and mistrusted his leadership this is that of Odysseus second in miss of Odysseus ship during the voyage back to Ithica after the Trojan War his name was Eurylochus. In the Odyssey he is visualised as an unpleasant, cowardly individual who undermines Odysseus and stirs up trouble. When Odysseus and his men arrive on the is land of Aeaea home to Circe Eurylochus is chosen to lead a group of twenty-two men to explore the island. While touring the island they see Circes house and all but Eurylochus enters, he himself suspects Circes trap and when the men are turned into pigs he runs back to warn Odysseus.Odysseus prepares himself to confront this witch and save his crew however Eurylochus refuses to guide him to Circes palace and urges Odysseus to escape and start the men to their fate. This must have caused an uncountable amount of grief and pain for Odysseus for Eurylochus was his second in command, Odysseus therefore must have trusted this man with his life and thought rather highly of him. Then for him to tell him to forfeit his loyal companions who have been there for him since Troy and save himself must have hurt Odysseus a commodious deal. After Odysseus returns from Circes palace having rescued his companions, Eurylochus insults Odysseus and threatens to kill him. Here we see Odysseus being be friended and almost killed by his second in command obviously causing much grief for our brave hero.Overall I feel that the companions are the source of much grief for our fearless hero. However most of them did not wish well to bring grief upon their leader. For most it was simply an unfortunate death leading to Odysseus grieving for the loss of them.

Wednesday, April 10, 2019

I am Legend Essay Example for Free

I am Legend EssayTraditionally, bookstores categorize various books based on their respective(prenominal) contents horror, fiction, literature, or science fiction. Horror texts invoke feelings of fear in readers due to their bizarre or macabre content. Science fiction or fiction books describe imaginary concepts of either scientific or general nature respectively. Conversely, literature books comprise of texts that are neither fictional nor horror-based. Mathesons I am Legend novel thus belongs to the category of horror owing to the ghoulish events described therein.For example, the vampirism that is evident in the novel instills fear among readers, thus rendering the work a horror literature. Although good or with child(p) are purely subjective terms, people sometime use these terms to describe different texts. much(prenominal) categorization relies heavily on persons subjective judgment, for example, regarding the emotions that much(prenominal) texts invoke in readers. To illustrate, horror, mystery, or romance books whitethorn be termed as bad. Conversely, science fiction books are labeled as good.Since such classification is very subjective and unstable owing to persons varied preferences and views, there is essentially no broad(a) class of books that can be categorically termed as either bad or good. later studying Mathesons I am Legend novel, I cannot help but view it as a subjectively bad book based on the ghastly scenes that the causality describes. For example, Robert Neville the novels main character is consistently described as being engaged in a swollen-headed rush to beat some seemingly insurmountable bigger forces.The character is thus clearly designate for death as is evident through his obviously futile attempts to fight against a vampire oath on earth. Eventually, Neville dies a sad and regretful death after spending a great sess of his time trying to outdo the evil that lurks on the earth. Through the somewhat unnecessary and martyr-like death of Neville, the author makes the book appear as a bad one because a character is unjustly penalise by death.

Tuesday, April 9, 2019

Tata Motors - Innovation Strategy Essay Example for Free

Tata moves Innovation Strategy EssayFor decades, the self-propelling industry in India lagged behind those of the United States and Japan. However, after the nineties, things changed dramatically, fostered by different means including Indian trends, doctrine access to customers, highly trained professionals and comparably pitiful labour cost. Improvements were especially due to the Indian brasss enabling policies that eased regulations on foreign trade and restrictions on private companies, thereby attracting investiture and growth in a country whose population is around 1 billion.India nowadays home to more than than 40 million vehicles has one of the lowest ratios of cars-to-people according UN Statistics (see table 1). In conjunction with this statistic, the twin factors of low car penetration and rising incomes are likely to trigger increased demand for automobiles in advent years in India (Indian Business News). Table 1. Number of motor vehicles per 1,000 people, by country Country Motor vehicles per 1,000 United States 765 Australia 619 Canada 563 Germany 546 Japan 543 United Kingdom 426 India 12 China 10Source UN World Statistics udder and Statistical Yearbook, 2007 (cited in Farres et al. 2009) The low car penetration and high demand of the Indian new midsection class is the focus of different global companies like General Motors, Honda Motor, Mitsubishi Motors, Fiat, Ford and Maruti Udyog (See table 2). Competition is anticipate to intensify further as Indian automotive manufacturers obtain greater access to debt and equity pay in the international capital markets or gain access to more advanced technology with alliances. Table 2.

Sunday, April 7, 2019

Case Analysis Essay Example for Free

model Analysis Essaystrategic Human Resource Management Unit 1 What is Strategic Management, and wherefore is it critical to the success of an organization in meeting its goals and mission? Strategic management is backdrop priorities and goals indoors a business. Its substance abused with upper management to strengthen a company and prep are for futurity outcomes. Making a intersection point that is highly arrive at open and easy for nodes to use and benefit from is the main reduce of apple, Inc. The organization of Apple, Inc. started in the 1970s and has been very salaryable since. In 1978 they sell the Apple II and do billions of dollars from the yield in less than three years. Between 1983 and 1984 Apple, Inc. lost sales and have fell into a crisis because of the s rugged processor speed and the compatible software. During this time it was hard for the organization due to competition. The problem Apple Inc. was facing at this time is other companies have found e asier and faster ways for people to use the contrasting products other than Apple, Inc. , during the 1985-1993 Apple, Inc. turned global, thus making sales up to 1 billion and was the closely profitable PC Company in the world.Being able to turn any company global in an organization is very profitable, most people worry new products. The beginning of 1993-1997 Apple Inc. head start playing a role in K-12 grade helping out the school systems with education with the product and this helped them out tremendously. By 2008 Apple Inc. started charging premium prices on their product knowing that with their nominate would be sold all over the nation. They also came out with the iPod roughly selling over 150 of them. This was giving the customer portable music and other exiting things and they still sell to this day.Today Apple, Inc. is one of the top rated organizations for iPhones, iPods, iPads, computer systems and lots more(prenominal). The only problem with Apple, Inc. now in th is day in age is the competition. There are a lot more companies that are coming out with the same product just a different signalise. For ex axerophtholle, the Kindle suggest is the same thing as the iPad, just a different name brand. A lot of people are purchasing the competitors product instead of the Apple name brand product. The fence behind this is that people would rather pay $200. 00 dollars for a Kindle Fire verses $500. 0 for the Apple iPad. Apple, Inc. inevitably to lower prices for their products so more and more people with purchase them. In years to come this is a critical problem that Apple, Inc. faces, to be successful in any organization you have to think like the customers. Majority of the customers are going to try and same money and buy the generic brand verses the name brand product. What Apple needs to do is, if they start seeing a drop in profit they would need to start lowering prices down to fit in their main competitors so that more people go forth pu rchase their product.One of the main problems in 2013 is Apple iPad verses Amazon Kindle Fire. The Amazon Kindle Fire has been called a potential iPad-killer by the media states (Nations, D). The Amazon Kindle Fire is $199 and can do everything the Apple iPad and do. They are very equal and its making the customer purchase the Kindle Fire instead. When looking at both products Instead of looking at the Kindle Fire verses the iPad in a direct match up of features, which would be about like comparing a Ford Escort to a Mercedes, (Nations, D).This is a great example of not only just the Amazon Kindle Fire verses Apple iPad, its popular life. From the groceries that customers buy at the store to clothing lines at a local mall. Everything has a generic name and lower price and most of the top name brands are sold and get good profit but a lot of people are trying to save money for more significant things like their childrens college or a vacation for the family, or just trying to get by with bills.So this would be a good example of why the Kindle Fire is being called the iPad-killer, because more likely people forget purchase the Kindle for the lower price. Some of the advantages of the Kindle Fire is the low cost and being able to use the amazon app store to purchase games, books, movies and much more. Some advantages of the iPad is its faster, has more storage and dual face cameras on the iPad 2. Both of the products use full-color subscribe-lit displays so both of them will have problems in direct sunlight. Both of them are good but the main concern is the price.To preventive successful you have to look at your main competitors products and come out with bigger and better things to ingest the customers eye. With doing this the product needs to be reasonably priced and affordable to the public. Otherwise the customers will go for the cheaper one to save costs. A good example of this is looking deeper into strategic management and why it is important. Strat egic management is all about change, and facing challenging situations in the work place. Being able to notwithstanding the change and work through it, and make important decisions and implement appropriate strategies.Some other examples of strategic management are resource limitations, changing environment, matching competitors, and improved decision making. Resource limitations is being able to deal with limited resources of money. A lot of business go through this and Apple Inc. went through it back in 1983-1984 Apple, Inc. was in a crisis and had to make important changes to make more profit. Matching competitors is very important, a business could go down in profit if other companies come out with a similar product.Improved decision making is very important due to change in a product or being able to come out with a new product. Strategic management is setting priorities and goals within a business. Its used with upper management to strengthen a company and conspire for futur e outcomes. References Nations, Daniel, ed. The Amazon Kindle Fire vs the Apple iPad. N. p. , n. d. Web. 5 May 2013. lthttp//ipad. about. com/od/Tablet_Computers_eReaders/a/The-Amazon-Kindle-Fire-Vs-The-Apple-Ipad. htm Sind, M. , amp Yoffie, D. B. (February, 2008) Apple, Inc. (Case Study) Retrieved from Harvard Business Online website

Banning the use of cell phones Essay Example for Free

Banning the make use of of kiosk phones EssayTITLE Why forbidding the use of carrell phones objet dart driving should be required nationwide. 1a.General purpose To highlight the mis-use of hand-held cell phones whilst driving. 1b.Specific purpose To reduce road fatalities by persuading the giving medication of St.Vincent and the Grenadines to implement a law banning motorists from utilize cell phones on all roadstead (major and minor roads) in non-emergencies cases. 1c.Central Idea Using a cell phone can distract motorists, leading them to taking their eyes off the road or to dawdle their concentration whilst driving which involves teens. Main Pointsmis-use of hand-held cell phonesroad fatalitiesmandatory interventionSummarize the give away Points of Introduction1. Cell phones can be useful in many an(prenominal) situations. However they ar immediately organism mis- employ in non-emergencies cases such as making or receiving regular standard calls, text editioning a nd existence on others social network sites whilst driving.2. Road fatalities contrive increased resulting from poor driving by motorists especially teens whilst they are on their cell phones. Many motorist, pedestrians and animals go been killed or seriously injured due motorist distractions.3. The Goernment should implement a law banning motorist from using cell phones on all roads (major and minor roads) throughout St Vincent and the Grenadines as a means of reducing road fatalities ConclusionCell phones have been around for over 30years and are now accessible to a range of people they can be a valuable communication device. However, when use inappropriately, this can lead to road collisions and fatality.References *In 2006, Liberty interchangeable Insurance GroupHttp//ven.wikipedia .org/wiki/texting- objet dart-drivingIn 2006 article American Automobile AssociationInternational Telecommunication concretion (NTSB)Why banning the use of cell phones while driving should be ma ndatory nationwide. I result be highlighting why banning the use of a cell phones whilst driving should be mandatory throughout St Vincent and the Grenadines. I will be focusing on situations where the cell phone is being used for non- emergencies when driving. Cellular phones were first introduced into civilian livelihood and the market place around the mid- 1980s. Before this period it was used mainly in the military and in some businesses. Over the years, there has been dramatic growth in the use cell phones. Today cell phones are available to everyone around the world regardless of their mature or status.The indiscriminate use of hand held cell phones by persons while driving has resulted in many fatal accidents in recent years and as such is a compelling terra firma for fan tan to enact legislated to address this precautious situation by banning the use of cell phones while driving in St.Vincent and the Grenadines. It well established that in attentive causal agentd by so me forms of distraction is the most common cause of vehicle accidents, engaging in a conversation on a cell phone while driving is a serious distraction in the sense that people lose focus being so imbibed in the conversation that they become totally loss to the surrounding activities.It whitethorn be arguable that accidents caused by cell phone use are far less than those caused by other forms of distractions scarcely that is not important in considering whether a total ban should be placed on the use of cell phone while driving. What is of utmost importance is the safety o the general public it is not of prime necessity to use a cell phone while driving. A driver may be better advised to pull over at the side of road, stop and use his or her cell phone whether be in to dial a number or to receive an accounting entry call or text messages which is becoming more popular in today technology world. check to Liberty Mutual Insurance Group 2006 conducted a survey of more than 90 tee n from xx six high schools across United States. The result showed that 37% of students considering texting to bevery or exceedingly distracting.A study by the America Automobile Association discovered that 46% of teens admitted to being distrait behind the wheel because of texting. This distracting is alarming The risk of crashing while texting because reading or sending a text diverts the drivers eyes from the road for an average of 4.6 secondsthe same as driving the length of a football field, blind, at 55 mph. The International Telecommunication Union states that texting, making calls, and other interaction with in-vehicle information and communication systems while driving is a serious source of driver distraction and increases the risk of traffic accidents increases by 23 times.While celebrities such as Oprah Winfrey have campaigned against texting while driving, there are reports that the message has not been disturbting through to teenagers. Perhaps the force and might of government authority might be able to get through to them. The practice has been viewed by many people and authorities as dangerous. It has also been ruled as the cause of some motor -vehicle accidents, and in some places has been outlawed or restricted. Is there any reason why my country St. Vincent and the Grenadines cannot emulate such a restriction?Cell phones have become a valuable devise for communicating with others. However, there are situations where it can be said that they are being misused. This would include texting whilst driving, receiving or sending calls and accessing face-book/Twitter and instant messaging on whatever social networks. I will make mention of how texting, using face book and using twitter could endanger the life of the driver, animals, passengers and/or other motorist and pedestrians on the road. (Road collisions and fatality). It is so sad that ones life have to end just like that or turn into a vegetable because of someone else careless misappr ehension and their future dreams are scattered.The use of cell phone while driving should not be allowed to have-to doe with unabsorbed in any civilized society where human life is valued at the highest. Laws should not alone be enacted but they must be enforced and the punishment shall be such as to admonish would be offenders. Therefore they must not only penalties but penalties should be rather serious and competent theoffence of using a cell phone while driving. Cell phones have been around for over approximately 30years and are now accessible to a range of people they can be a valuable communication device. However, when used inappropriately, this can lead to road collisions and fatality.

Saturday, April 6, 2019

Spanish Armada Essay Example for Free

Spanish Armada EssayThe Spanish Armada showcased the Spaniards governing body and determination to expand their territory and their religion of Catholicism. However, there are several underlying reasons on wherefore Spain waged a war against England. The decision of great power Philip II to launch a fleet of naval ships towards the northwesterly have been influenced by many consecutive incidents that demonstrated the looming conflict between Spain and England.During the 16th century, Spain and England used to be allies in advancing a common cause which was to expand their respective colonies. But it was their connatural objectives that instigated the manifestation of a strained relationship between the two countries. More so, the relationship between England and Spain became more(prenominal) tensed when Philip II married Mary I, a sibling of faery Elizabeth I, making him a tokenish King of England. This union highlighted the difference in religious beliefs of a Catholic and a Protestant that embossed eyebrows in the English Monarchy who doubted the real intentions of Spain with England. In retaliation, England gave support to the Dutch uprising against Spain. Several black propaganda were launched that criticized King Philip II and the Catholics in general as wicked human beings.Then, the situation worsened when Catholic Queen Mary of Scots, the only remaining link of Spain with England in 1587, was executed for allegedly plotting against Queen Elizabeth I. Because of these events, the conception of King Philip II to conquer Europe was blocked in which motivated him to start a opposite with England through an Armada (Mitchell, 2005). Unfortunately, Spain was defeated in this battle because of the unfavorable weather conditions and the fact that the English were more groundbreaking with their warfare resources and strategy.As a result, Englands victory entitled the English with the position of being the strongest and most important in Europe. M eanwhile, for Spain, their loss became a learning experience that motivated them to enhance more their naval capabilities as well as their military tactics.ReferencesMitchell, C. V. (2005 August). The weathering of the armada. Inventory of Conflict Environment. Retrieved May 20, 2008 from http//www. american. edu/ted/ice/armada. htm

Friday, April 5, 2019

Cryptography: Types, Methods and Uses

cryptography Types, Methods and Uses CHAPTER-1 dis count1.1 Introduction to CryptographyCryptography is art of writing and reading the dark info. It is recitation of goods and servicesd to send the information between the various participants. It piece of tail be use in such a human beingsner so that it could non be seen by the others. Cryptography is used to prevent the information from the attacker. It provides various services as Integrity checkingAu thuslyticationConfidentialityIn case of integrity checking liquidator thinks that the nitty-gritty is alter by the third gear party or attacker. Hence the user assures the recipient that the pass on has not been altered by some(prenominal) other source. In case of authentication the individuality of the person is check by the user. The user verifies the identity of the person and handle over the right to use the particular data. In case of confidentiality the attacker gather in the data cargonfully when it send from us er to recipient. The third party deposet change the data. The message which is in the original form is known as the plain schoolbook. The user encrypted the message before move to the recipient is known as cipher text. When the cipher text is produces from plaintext, this carry out is known as encoding. 1. The reverse process of encryption is called decryption. In the cryptographic systems an algorithm and a recognise is used. The mainstay is known as the snobby value.Cryptography is a field of computer networks which transforms (encrypts) the information (plain text) into an unreadable form (cipher text). And this cipher text can be decrypted only with the help of a sneaking(a) unwrap. Cryptography acts as a method of tutelage the information privy(p). Cryptography protects the information by using math in science.Electronic security is a major issue as various forms of electronic media and internet atomic number 18 becoming much prevalent. Cryptography is used to s ecure the data and to prevent the data from various attacks. Cryptography is necessary when communicating over any un-trusted medium. Authentication, digital signatures, e-commerce be major applications of cryptography.Generally in the cryptographic systems it can broadly classified into two systems.Symmetric describe systems.Public unwrap systems.In the symmetric cardinal cryptography, single get a line is used for the encryption and the decryption purpose. The kindred key is used at the sender and the recipient side.On the other hand, in case of ha second gearual key system, two types of keys ar required. One is the popular key and other unity is the private key. Public key is known to all only the private key is known only to the recipient of messages uses. One of the techniques used in Cryptography is known as the ocular cryptography. It is a cryptographic technique, which allows visual information to encrypt. The data is encrypted in such a flair that decryption b ecomes a mechanical operation. For these kinds of operations computer is not required. Earlier the developers used visual secret manduction scheme. In this scheme the image was broken into many an(prenominal) part. The third party thinks that all these parts argon used to decrypt the image. But the n 1 parts of the image revealed no information intimately the original image. In this technique each part has its separate transparency. The decryption is performed by overlaying the parts. When all the parts were overlaid, then the original image would appear. Cryptography is the technique, which is used to protect the information from the external viewers. It plays a spanking role in security. The public key encryption and decryption is one of the most important types of cryptography. In public key cryptography the key should be unique. There are two ways of key production. The first one is mathematical like AES, DES and the other one is based on the scheme of natural selection.T he multimedia technology plays an important role in our society. In this case the digital images play a very important role. The digital images are used to fulfil the security and privacy in various applications. encoding of image plays a very important role it helps to save the image from the wildcat attack. Many solutions are providing to save this image one of the techniques is mask the image data. For the encryption purpose many algorithms are required, such as 2 DESAESRSABroadly, Cryptographic systems provide us triad types of cryptographic algorithms namely, private disclose Cryptography (SKC), Public Key Cryptography (PKC) and Hash Functions 3.The Secret Key Cryptography (SKC) uses a single ( equivalent) key for the process of encryption and decryption.The most commonly SKC algorithms used now-a-days include1.2 Data encoding Standard (DES)It was designed in 1970s by IBM and was ratified in 1977 by the National part of Standards (NBS) for commercial use. It is a oppos e cipher that operates on 64- composition lay offs employing a 56-bit key and 16 rounds 4. Although DES has been well-nigh long back but no real weakness has been identified. The biggest disadvantage of DES is the 56 bit key size.1.3 Advanced Encryption Standard (AES)It was designed by Vincent Rijmen and Joan Daemen and was introduced in 1998. The algorithm can use fickle key length and block length. The key length can include 128, 192, or 256 bits and block length can be of 128, 192, or 256 bits 5.AES is a highly efficient and secure algorithm. The drawback lies in its touch on as it requires more processing.1.4 Rivest Cipher (RC)Ronald Rivest developed this algorithm and thus, the name of the algorithm was put after Ronalds Rivest name. It provides a series of RC algorithms including RC1, RC2, RC3, RC4, RC5 and RC6 6.1.5 BlowfishIt was developed by Bruce Schneie and was first published in the year 1993. This block cipher has 8 rounds, having the block size is of 64 bits and the key length can vary from 32 to 448 bits. Blowfish was proposed as a substitute was DES 7. This algorithm is significantly faster than other algorithms and the key strength is excellent. Blowfish algorithm is apt only for applications where the key mostly remains the same.The Public Key Cryptography (PKC) uses one (public) key for encryption and another (private) key for decryption.The PKC algorithms that are in use at present are1.6 RSAThe RSA algorithm was publicly described in 1977 by Ron Rivest,Adi Shamir, and Leonard Adleman at MIT the letters RSA are the initials of their surnames, listed in the same order as on the paper. RSA is a cryptosystem, which is known as one of the first useable public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. In RSA, this asymmetry is based on the practical paradoxaticaly of factorization the product of two large prime figure of speechs, the factor in chore. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described the algorithm in 1977. Clifford Cocks, an English mathematician, had developed an equivalent system in 1973, but it wasnt declassified until 1997.A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message, but with shortly published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly rewrite the message. Breaking RSA encryption is known as the RSA problem. It is an open question whether it is as hard as the factoring problem.The system includes a communications channel coupled to at least one terminal having an encoding device and to at least one terminal having a decoding device. A message-to be- transferred is enciphered to ciph er text at the encoding terminal by encoding the message as a number M in a preset set. That number is then raised to a first predetermined world power (associated with the intended receiver) and finally computed. The remainder or residue, C, is computed when the exponentiated number is divided by the product of two predetermined prime numbers (associated with the intended receiver).Operation of RSAThe RSA algorithm involves three stepsKey GenerationEncryptionDecryption.1.6.1 Key GenerationRSA involves a public key and a private key. The public key can be known by everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted in a reasonable heart of time using the private key. The keys for the RSA algorithm are generated the following wayChoose two distinct prime numbers p and q.For security purposes, the integers p and q should be elect at random, and should be ofsimilar bit-length. Prime integers can be efficiently found using a prima rily test.Compute n = pq.n is used as the modulus for both the public and private keys. Its length, usually verbalised in bits, is the key length.Compute (n) = (p)(q) = (p 1)(q 1), where is Eulers totient functionChoose an integer e such that 1 e is released as the public key exponent.e having a short bit-length and small Hamming weight results in more efficient encryption most commonly 216 + 1 = 65,537. However, much smaller value of (such as 3) have been shown to be less secure in some settings.Determine d as d e1 (mod (n)) i.e., d is the multiplicative inverse of e (modulo (n)).This is more clearly stated as solve for d given d.e 1 (mod (n))This is often computed using the extended Eucl estimationn algorithm. Using the shammer code in the Modular integers section, inputs a and n correspond to e and (n), respectively.d is kept as the private key exponent.The public key consists of the modulus n and the public (or encryption) exponent e. The private key consists of the modu lus n and the private (or decryption) exponent d, which must be kept secret. p, q, and (n) must also be kept secret because they can be used to calculate d.1.6.2 EncryptionA transmits her public key (n, e) to B and keeps the private key secret. B then wishes to send message M to A. He first turns M into an integer m, such that 0 _ m by using an agreed-upon reversible protocol known as a padding scheme. He then computes the ciphertext c corresponding to c = memod(n)1.6.3 DecryptionWe can recover message m from c by using her private key exponent d via computing disposed m, we can recover the original message M by reversing the padding scheme.(In practice, thither are more efficient methods of calculating cd using the precomputed values below.)1.7 Enhanced RSAThe RSA algorithm based on the varying N which consisting of multiplying each of the P and q, which are relying on that of where to find the variable d, as the variable d is, hence the higher value of n. The variable d increas es its size, the higher value of p and q the value of d increases, which means that the algorithm depends entirely on the adoption of the prime numbers because they generate a key d, depending on p and q are already primes numbers.The weaknesses of RSA algorithm when we use two primes number are the following points which are used to break the algorithm in most cases. These weaknesses are(a) elfin encryption exponent, if you use a small exponent like e=3 and send the same message to different recipients.(b) Using the same key for encryption and signing.(c) Acting as an oracle there are techniques to recover the plaintext if a user just blindly returns the RSA transformation of the input.The idea of the new glide slope is, instead of using two primes numbers to generate a public key and private key, we use three primes numbers with reduced size, generates the variable N Large and the process of analysis of the factors is more difficult than the original algorithm, as well as, incre ases the ease of generating Public key and private key. The key strength of the RSA depends on the two prime numbers p and q. The process of factorizing of n will lead to gain the values of p and q. It is much easier to find two numbers from factoring n than finding the value of three numbers from n. In this case it is very difficult for the intruder to find the three values from factoring n.1.7.1 Key Generation in Enhanced RSA(a) Choose three distinct prime numbers p, q and s.(b) break n such that n = p*q*s.n will be used as the modulus for both the public and private keys.(c) Find the Phi of n, (n) = (p-1)(q-1)(s-1).(d) Choose an e such that 1 (e) Determine d which satisfies the congruence similitude d*e 1(mod(n))In other words, pick d such that de 1 can be evenly divided by (p- 1)(q-1)(s-1), the Phi, or (n).This is often computed using the Extended Euclidean algorithmic rule, since e and (n) are relatively prime and d is to be the modular multiplicative inverse of e*d is kep t as the private key exponent. The public key has modulus n and the public (or encryption) exponent e. The private key has modulus n and the private (or decryption) exponent d, which is kept secret .The encryption equation is c me (mod n) and the decryption one is m cd (mod n).1.8 Diffie HellmanThis algorithm was introduced in1976 by Diffie-Hellman. The Diffie-Hellman algorithm grants two users to establish a shared secret key and to communicate over an insecure communication channel 10. One way authentication is gratis(p) with this type of algorithm. The biggest limitation of this kind of algorithm is communication made using this algorithm is itself vulnerable to man in the middle attack 11. DiffieHellman establishes a shared secret that can be used for secret communications while exchanging data over a public network. The following diagram illustrates the general idea of the key exchange by using saturations instead of a very large number. The decisive part of the process is that Aand B exchange their secret colors in a mix only. in the long run this generates an identical key that is mathematically difficult (impossible for modern supercomputers to do in a reasonable amount of time) to reverse for another party that might have been listening in on them. A and B now use this common secret to encrypt and decrypt their sent and received data. Note that the showtime color (yellow) is arbitrary, but is agreed on in advance by A and B. The starting color is assumed to be known to any eavesdropping opponent. It may even be public.1.8.1 Explanation including encryption mathematicsThe simplest and the original implementation of the protocol uses the multiplicative group of integers modulo p, where p is prime and g is primitive ascendent mod p. Here is an example of the protocol, with nonsecret values in blue, and secret values in red. Small integers are used for clarity, but actual implementations require using much larger numbers to achieve security. commo n fig 1.1 Process of Diffie Hellman1. p = 23 and base g = 5.2. A chooses a secret integer a = 6, then sends B A = ga mod pA = 56 mod 23A = 15,625 mod 23A = 83. B chooses a secret integer b = 15, then sends A B = gb mod pB = 515 mod 23B = 30,517,578,125 mod 23B = 194. A computes s = Ba mod ps = 196 mod 23s = 47,045,881 mod 23s = 25. Bob computes s = Ab mod ps = 815 mod 23s = 35,184,372,088,832 mod 23s = 26. A and B now share a secret (the number 2) because 6 15 is the same as 15 6. Both A and B have arrived at the same value, because (ga)b and (gb)a are passable mod p. Note that only a, b, and (gab gba mod p) are kept secret. All the other values p, g, ga mod p, and gb mod p are sent in the clear. Once A and B compute the shared secret they can use it as an encryption key, known only to them, for sending messages across the same open communications channel. Of course, much larger values of a, b, and p would be compulsory to make this example secure, since there are only 23 poss ible results of n mod 23. However, if p is a prime of at least 300 digits, and a and b are at least 100 digits long, then even the fastest modern computers cannot find a given only g, p, gb mod p and g amod p. The problem such a computer needs to solve is called the discrete logarithm problem.1.9 El-GamalIt was developed in the year 1984 by Taher Elgamal. It is an asymmetric key algorithm and is based on Diffie-Hellman key exchange. ElGamal encryption can be described over anycyclic groupG. The security relies upon the issue of a problem inGrelated to computing discrete logarithms 12. Fast generalized encryption for long messages and data expansion rate are the two biggest advantages of this algorithm 13. The chief drawback of ElGamal is the requirement for randomness and its slower speed 14.ElGamal encryption can be defined over any cyclic group G. Its security depends upon the difficulty of a certain problem in G related to computing discrete logarithms.The AlgorithmElGamal encr yption consists of three components the key generator, the encryption algorithm, and the decryption algorithm.1.9.1 Key GenerationThe key generator works as followsIt generates an efficient description of a multiplicative cyclic group G of order q with generator g.Sender chooses a random x from (1,q-1)He computes h= gxA publishes h , along with the description of G,q,g , as her public key. He retains x as her private key which must be kept secret.Fig 1.2 El-Gamal Algorithm1.9.2 Example of El-Gamal AlgorithmFig 1.3 Example of El-Gamal Algorithm.Hash Functions, also known as message digest, are the algorithms that do not use any key. Based upon the plain text, a fixed length hash value is generated.Hash algorithms that are commonly used today include1.10 Message Digest (MD) algorithmsIt produces a hash value of 128 bit from an arbitrary length message. The MD series includes MD2, MD4 and MD5 11.1.10.1 MD5 algorithmThe MD5 algorithm was developed by Rivest in 1991 and is an telephone extension of the MD4 message-digest algorithm and is bit slower than MD4. This algorithm results in a 128 bit hash value. It is mostly used in security based applications. MD5 is more secure than MD4 15. It is suitable to use for standard file verifications but it has some flaws and therefore, it is not useful for advanced encryption applications 16.