Thursday, October 31, 2019

This 2009 research study uses Essay Example | Topics and Well Written Essays - 250 words

This 2009 research study uses - Essay Example For parents of children with cognitive disability or those diagnosed with type I diabetes it is a lifelong condition interspersed with periods of satisfaction. This sorrow is akin to that experienced on the demise of a dearly loved one. However there is never a sense of closure as when one mourns a departed soul. Triggers such as hospitalization or anxiety about the result of poor control in managing the disease bring about a revival of sorrow. Later the sense of being cut off when children transition from the pediatric clinic to the adult clinic makes parents feel cut off and anxious about their children’s ability to manage on their own. Just as in chronic sorrow the parents of children with cognitive disability feel the guilt and grief of their child not being like other normal children, especially as they grow older and their abilities degenerate; so too parents of children with type I diabetes revisit their grief as anxiety mounts when they come across another patient who has had to undergo an amputation, or reading about or viewing the many risks of complications that could arise. Parents overwhelmingly agree that emotional support and reassurance from health care professionals is necessary to see them through difficult periods. â€Å"Greater understanding of parents’ long-term emotional responses and recognition that grief may never resolve in these parents may enable healthcare professionals to provide appropriate and timely support at critical times† opine Bowes, Lowes, Warner and Gregory (Bowes et al, 2009) Another suggestion for nursing practitioners was that the transition from the pediatric to adult clinic could be gradually achieved to minimize the sense of losing control which parents feel as they are not part of the consultations at the adult clinic. Perhaps if this was done in a phased manner parents would gradually get used to the fact that their children were old enough to manage on their own. After

Tuesday, October 29, 2019

Corporate law Essay Example | Topics and Well Written Essays - 3000 words

Corporate law - Essay Example The accuser has the hard work to prove the accused is guilty. If the Australian Securities and Investment Commission will sustain this theory and it can be proven by evidence, this would constitute vitiation ( impairing the quality or effectiveness of an act such as to contaminate, spoil, make invalid) of consent which would make the contract voidable ( contract is valid unless it is questioned or objected, then, it is made illegal or void).(www.allwords.com). Under the corporation law of Australia, the contract is invalid if voidable. A voidable contract may be held valid if there is failure to question the same within You could reference see point in time legislation and updates to determine if you are following the law. If Bevin could prove fraud there will be cancellation of contract and a possible award of damages to Bevin. Since Bevin signed and approved the sale of his shares, then his negligence for not reading the fine print is not ground for cancellation of contract. To answer the SUB ISSUE no 1, the possible defenses and remedies of Wonders to uphold the validity of the contract is as follows. DISCUSSION:Wondersteel could invoke the defense of good faith by proving that it did not compel Bevin to sell his share because other stockholders were also offered to sell their share aside from Bevin. Under a free market economy, the seller offers a stock or product at a proposed selling price. The buyer or bidder then gives a bid price, usually lower than the offer price. If they both do not agree to the offer and bid, then the seller may lower his offer price and the buyer may increase his bid price. This is the normal practice in the Australian Stock Exchange. No force or intimidation was seen in the situation here. In answering ISSUE NO. 2, Regarding possible loan contract violation between Wondersteel and XYZ bank my opinion is as follows. The case states that Mr Malcolm _______ http://www.asx.com.au/index.htm (2005) http://portsea.austlii.edu.au/pit/ (2005) www.newadvent.org (2005) used some of the loan funds to pay Malcolm's mortgage repayments of his luxurious Sydney home and private school fees for his children. He also transferred a very large amount out of the loan funds to an overseas corporation, which owns 51% of Wondersteel' shares. In fact Wondersteel even defaulted on its repayment to XYZ and a receiver was appointed under the terms of the charge document. DISCUSSION: It appears that Wondersteel ,by prima facie, violated its contract with XYZ Bank. Although XYZ Bank is not without recourse, when a receiver was appointed under the terms of the charge, the use of the loan funds is still unjustified. Mr. Malcolm as director owes loyalty to Wondersteel. Under the law ,directors are agents or trustees of the corporation. As agents or trustees they hold a fiduciary relationship with their corporation which is their principal. The directors, according to the Australian Corporation law, required to safeguard the assets and

Sunday, October 27, 2019

Ammonium Dihydrogen Phosphate (ADP) Crystals Structure

Ammonium Dihydrogen Phosphate (ADP) Crystals Structure Ammonium dihydrogen phosphate (ADP) crystals are widely used as the second, third and fourth harmonic generator for Nd:YAG and Nd:YLF lasers. It belongs to the tetragonal system with the space group I-42d 1. These crystals are widely used for electro-optical applications such as Q-switching for Ti–sapphire and alexandrite lasers as well as for acousto optical applications2–4. Tris(thiourea)zinc(II) sulphate (ZTS) is a semi-organic nonlinear optical (NLO) material which finds applications in the area of laser technology, optical communication, data storage technology and optical computing because it has high resistance to laser induced damage, high nonlinearity, wide transparency, low angular sensitivity and good mechanical hardness compared to many organic NLO crystals5-8. It belongs to the orthorhombic system with noncentrosymmetric space group Pca21 and point group mm2. Growth, spectral, optical and thermal studies of rare earth neodymium(III) doped ZTS9, cerium(III) doped ZTS10,11 have been reported. We have also investigated the influence of Ce(III)- doping12 effects of ADP crystals. In the present investigation, the effect of La(III)-doping on ADP and ZTS crystals has been studied using FT-IR, XRD, SEM, EDS, UV–vis, thermal and Kurtz powder SHG measurements. ADP (E. Merck) was purified by repeated recrystallization. ZTS was synthesized as reported earlier13. To avoid decomposition, low temperature ( ZnSO4 ·7H2O + 3(CS(NH2)2) à ¯Ã¢â‚¬Å¡Ã‚ ® Zn(CS(NH2)2)3SO4 After successive recrystallization processes, crystals were grown by slow evaporation solution growth technique (pH = 6.2). Doping of lanthanum (5 mol %) in the form of lanthanum(III)- chloride (Aldrich) was used as such in the aqueous growth medium. The crystallization took place within 10–15 days and the high quality transparent crystals were harvested from the aqueous growth medium. Best quality and highly transparent seed crystals are used in the preparation of bulk crystals. Photographs of the as-grown crystals are shown in Fig. 2.2.1. The FT-IR spectra of pure and doped crystals reveal small shifts in some of the characteristic vibrational frequencies (Table.2.3.1.1.) and it could be due to lattice strain as a result of La(III)- doping. The vibrational patterns of lanthanum doped ADP exhibit slight variations as compared with pure ADP. PO4 stretching and bending vibrations are observed at ~1100, ~910 cm-1 and ~453, ~546 cm-1 respectively. Symmetric stretching vibrations of NH4+ ion are observed in the range of ~1407 cm-1. Vibrational peak at ~1280 cm-1 corresponds to OH bending. Broad peaks observed at ~3234 cm-1, ~3120 cm-1 correspond to N–H ·Ã‚ ·Ã‚ ·O stretching vibrations. A close observation of FT-IR spectra of pure ZTS and doped specimens also reveals that the doping results in slight shifts in some of the characteristic vibrational frequencies. It could be due to lattice strain developed as a result of doping. An absorption band in the region 2750–3400 cm-1 corresponds to the symmetric and asymmetric stretching frequencies of NH2 group of zinc(II) coordinated thiourea. The absorption band observed at ~1620 cm-1 in the spectra of pure and doped specimens corresponds to that of thiourea (~1625 cm-1)14 of about the same frequency and it can be assigned to NH2 bending vibration. The CN stretching frequencies of thiourea (1122 and 1502 cm-1) shifted to higher frequencies for pure and La(III)- doped ZTS crystals (~1128 and ~1500 cm-1). The C-S is stretching frequencies (1398 and 712 cm-1)15 are shifted to lower frequencies (~1394 and ~706 cm-1) for pure and doped samples. These observations suggest that metal coordinate with thiourea through The powder XRD patterns of La(III)-doped samples are compared with that of undoped one (Fig. 2.3.2.1). No new peaks or phases were observed by doping with inner transition metal lanthanum. However, a drastic reduction in intensity is observed as a result of doping. The most prominent peaks with maximum intensity of the XRD patterns of pure and doped specimens are quite different. The observations could be attributed to strains in the lattice. The cell parameters are determined from the single crystal X-ray diffraction analysis and the values of pure and doped crystals are given in the Table 2.3.2.1. The ionic radius of the dopant La(III) (117 pm) is very small compared with that of NH4+ (151 pm)16. Hence, it is reasonable to believe that the dopant can enter into the ADP crystalline matrix occupying predominantly substitutional positions without causing much distortion. However, the valance of the dopant is different from the host and hence one cannot expect only the simple substitut ional occupancy leading to inhomogeneous strains in the crystal17. It is also appropriate to mention here that in the case of dopants having a dissimilar valance and size from the substituting element of the host lattice, due to expected strain, even small thermal/ mechanical fluctuations during the growth process lead to easy formation of structural defects18,19. It clearly shows that the crystal undergoes non-uniform strain in the lattice. The cell volume of the La(III)- doped ZTS crystals increased (Table. 2). It could be due to the small ionic radius of Zn2+ (88 pm) in comparison with that of La(III) (117 pm)17. This type of behavior (the unit cell volume of the doped materials not varying regularly with the ionic radius of the dopant) has been explained by the electron-doping effect counteracting the steric effect20. The concentration of absorbing species can be determined using the Kubelka-Munk equation21, The direct and indirect band gap energies obtained from the intercept of the resulting straight line with the energy axis at [F(R)hÃŽ ½]2 = 0 and [F(R)hÃŽ ½]1/2 = 0 are deduced as 5.35 eV and 5.50 eV respectively for ADP:La and 5.37 eV 5.70 eV for ZTS:La (Fig. 2.3.3.1). The effect of the influence of dopant on the surface morphology of ADP crystal faces reveals structure defect centers as seen in SEM images (Fig.2.3.4.1). A plate like morphology with a layered structure is exhibited. The incorporation of lanthanum in the ADP crystal matrix results in cluster of scatter centers and voids than those of the undoped specimen. The flower like morphology is observed in ZTS doped specimens. Pure ZTS contains small defect centers in the plate surface and incorporation of La(III) increases the surface roughness (Fig.2.3.4.1(b)). The incorporation of La(III) into the crystalline matrix was confirmed by EDS performed on ADP and ZTS (Fig.2.3.5.1). It appears that the accommodating capability of the host crystal is limited and only a small quantity is incorporated into the ADP and ZTS crystalline matrix. EDS reveals that the accommodating capability of ZTS is much better than ADP as shown in Fig.2.3.5.1(b). The amount of doping in ADP:La and ZTS:La specimens are estimated using AAS and the foreign metal ion entering into the ADP/ZTS crystal matrix is much smaller but significant. Further, the final dopant concentration within the host lattice is not proportional to the prevailing concentration of dopant in the solution at the time of the crystallization process, since the host crystal can accommodate the dopant only to a limited extent. The AAS data reveal that the La(III) ion concentration in ADP and ZTS crystalline matrix are 7.5 ppm and 11.3 ppm respectively. High incorporation of the dopant takes place in the case of lanthanide doping in ZTS compared to ADP. TG/DTA thermogram reveals the purity of the material. The thermogram curve shows a gradual mass loss and residual mass obtained at 1000 ËÅ ¡C is only 10% Fig.2.3.6.1 (a) An endothermic peak is obtained in the DTA analysis for ADP:La at a higher temperature (200ËÅ ¡C) than the pure ADP crystals (191 ËÅ ¡C). The melting point of the material was confirmed by using Sigma instruments melting point apparatus (200ËÅ ¡C). The investigation shows that there is no physically absorbed water in molecular structure of crystals grown from the solution. The simultaneous TG-DTA curves in nitrogen for ZTS and ZTS:La systems at a heating rate of 20 ËÅ ¡C/min are given in the Fig.2.3.6.1(b). The absence of water of crystallization in the molecular structure is indicated by the absence of weight loss around 100 ËÅ ¡C. The melting point of pure ZTS is 231ËÅ ¡ C. A good thermal stability of ZTS:La is observed up to ~235 ËÅ ¡C and the thermal behavior is not very much altered in the presence of the dopant. The sharp endothermic peak at 235 ËÅ ¡C is may be due to melting point. TG curves show a gradual mass loss and residual mass obtained at 1000 ËÅ ¡C is ~20 %. The sharpness of the peak shows the good degree of crystallinity of the material. No decomposition up to the melting point ensures the stability of the material for application in lasers, where the crystals are required to withstand high temperatures. In order to confirm the influence of doping on the nonlinear optical properties (NLO) of the as-grown crystals, these were subjected to SHG test. The SHG efficiency of the materials was performed by Kurtz powder SHG method22. Input radiation used is 2.5 mV/pulse. The output SHG intensities of La(III) doped ADP and ZTS specimens give relative NLO efficiencies of the measured specimens. The doubling of frequency was confirmed by the green color of the output radiation whose characteristic wavelength is 532 nm and it indicates that the doped material exhibits second order NLO effect. The efficient SHG demands specific molecular alignment of the crystal to be achieved facilitating nonlinearity in the presences of a dopant. Incorporation of La(III) into ADP and ZTS crystalline matrix also enhances the SHG efficiency (Table.2.3.7.1) and hence La(III) is a useful dopant. The efficient SHG demands specific molecular alignment of the crystal facilitating nonlinearity in the presence of dopant or it may be due to the improvement in the crystalline perfection of ADP/ZTS crystals by low level La(III)- doping. The effect of various dopants on the SHG efficiencies of ADP/ZTS has been listed in Table.2.3.7.2. The comparative SHG oscilloscope traces of the powder samples ADP:La (blue) and ZTS:La (red) are displayed in Fig. 2.3.7.1. The influence of La(III) doping on the ADP and ZTS crystal has been systematically studied. The reduction in the intensities observed in the powder XRD patterns and slight shifts in vibrational frequencies in FT-IR indicate minor structural variations in the doped materials. Morphological changes in the doped specimen are observed in the SEM micrographs. The studies indicate that the crystal undergoes lattice stress as a result of doping. Energy dispersive X-ray spectrum reveals the incorporation of La(III)- into the crystalline matrix of ADP/ZTS crystals. AAS studies also confirm the above observations. It is clear that the incorporation of La(III)- is comparatively high in the case of ZTS. The thermal analysis reveals the purity of the material. Enhancement in SHG efficiency is observed in ADP/ZTS as a result of La(III)- doping became of facile charge transfer.

Friday, October 25, 2019

Max Weber on Society Essay -- Max Weber sociology sociological Essays

Max Weber on Society Max Weber was one of the world's greatest sociologists and wrote a lot about the capitalist world he lived in. He had a different conception of capitalist society than most of his contemporaries. He looked at capitalism from all the different aspects that the philosophy was made of. Some of these aspects are state power, authority, class inequality, imperialism, and bureaucracy. To understand how Weber thought one must look at each area separately then put them all together in a global package. Weber describes history in terms of the constant struggle for power. He bases all significant historical changes on the power struggle that caused them. Weber describes power as a zero sum game. That means for one person to gain power, someone else has to loose the same amount of power. A fundamental aspect of the power struggle is the state, and its power. Weber states that the state is the monopoly of legitimate force. The state is a compulsory of power, and the laws within it are its powers to enforce its power. The main struggle for power is that of force verses authority. Force is power that can be used to get one's way, and authority is the legitimate use of power to rule. Within the struggle for power, Weber defines three forms of authority: rational-legal authority, traditional authority, and charismatic authority. Rational-legal authority is anchored in impersonal rules that have been legally established. This type of has come to characterize...

Thursday, October 24, 2019

Science: Tsunami and New York

Dependent Variable: Velocity of wave (wave velocity) Constants: Plastic storage container Piece of wood Height from which the wood is dropped and the way it is held before each time it is dropped Gravel-like substance that creates an uneven bottom—this includes both its physical material and the amount of it that is placed on the bottom of the tank during each treatment Time at which the stopwatch is started after the wooden block is dropped and a wave is created Problem: It is a known fact about tsunamis that if the level of the water is higher, then the velocity of the wave will be greater.How does an uneven bottom affect the velocity of tsunami waves at different water levels? Hypothesis: I believe that an uneven bottom will still result in the velocity of the wave being greater when the water level is higher. 5 MLA References with Annotations: 1. Michelle, Maranowski, PhD. â€Å"The Science Behind Tsunamis: Study the Effect of Water Depth on Wave Velocity. † Science Buddies. Science Buddies, 2005-2012. Web. 13 Sept 2012. http://www. sciencebuddies. org/science-fair-projects/project_ideas/OceanSci_p014. html#background †¢This electronic source inspired my project idea, and provided me with the materials and procedure that I would need to execute my project. In addition, it helped me understand exactly what the original project would be testing, and also how I could make it my own. 2. â€Å"What are Tsunamis? † CBC News. Canadian Broadcasting Corporation/Radio Canada, 29 Sept 2009. Web. 13 Sept 2012. http://www. cbc. ca/news/world/story/2009/09/29/f-tsunami-forces-of-nature. html †¢This electronic source provided me with basic tsunami information.I believe that it is important to have as much information as possible about my topic, so that I am able to get the most out of my project and understand it to the fullest. 3. â€Å"Tsunamis. † National Geographic. National Geographic Society, 1996-2012. Web. 13 Sept 2012. http:/ /environment. nationalgeographic. com/environment/natural-disasters/tsuna mi-profile/ †¢This electronic source was helpful to me by providing me with even more background information on tsunamis and their effects. In addition, a video on National Geographic allowed me to view a real tsunami in action. 4.Luhr, James F. Earth. Smithsonian. Smithsonian Institution. New York, New York: DK Publishing, 2003. Print. (P. 123, 143, 151, 190, 192, 271, 429, 501) †¢This printed source helped me understand the different things that can cause a tsunami. This includes a variety of submarinal conditions, and-although this is rare- those reasons related to meteors. 5. Cramer, Deborah. Ocean. Smithsonian. Smithsonian Institution. New York, New York: Collins Publishing, 2008. Print. (P. 62) †¢This printed source was very helpful, because it showed me a tsunami's effect on the whole ocean.This is an important thing to note, because it helps put into perspective how a tsunami is not only devastating once it hits shore, but also before it hits shore and is still a violent wave uncontrollably speeding across the ocean toward the shore, destroying almost everything in its path. Materials: 1. Plastic storage box (at least 40 cm long x 5 cm deep) 2. Source of water 3. Small gravel or pebbles (to be spread over bottom of storage box as representation of an uneven bottom in the ocean) 4. Piece of wood (2 in thick x 4 in wide x 8 in long) 5. Sharpie permanent marker 6. Metric ruler 7. Digital stopwatch . Bright ceiling light (above location of experiment) 9. Hand towel 10. Volunteer to run stopwatch 11. Lab notebook 12. Graph Paper Procedure: 1. Find a well-lit location at which to execute experiment (favorably indoors and free of commotion) 2. Remove any items away from location that could be damaged by potential splashing water from storage box 3. Place storage box on white sheet and under bright ceiling light with no surrounding lights in order to see waves as clearly a s possible 4. Cover bottom of storage box with layer(s) of gravel/pebbles as needed until bottom of box cannot be seen 5.Fill storage box with a few centimeters (cm) of water 6. Draw small line with sharpie on a shorter end of the box’s exterior, approximately 2. 5 cm below rim of box (this marks the spot from where piece of wood will be dropped) 7. Begin practicing making and tracking waves 8. Line up bottom of wood at marked line and drop, immediately thereafter watching for resulting wave traveling from one end of tank to the other 9. Begin executing real experiment once comfortable creating and tracking waves 10. Empty/fill water tank after practice runs until 1 cm of water is left in tank. Use metric ruler for accuracy.This water depth will be used as the measurement for the first treatment 11. Create appropriate data table in lab notebook 12. Notify volunteer with stopwatch when they should start and stop timing the wave’s path (those times should be as soon as w ooden block is dropped and wave is formed, and as soon as wave returns and hits other end of box) 13. Record the time in data table from lab notebook 14. Repeat step 11 nine more times (nine more tests), always waiting for water to settle before dropping wood again from consistent position each test 15. Fill box with water depth 2 cm (confirm with ruler) 16. Repeat steps 11-13 17.Fill box with water depth of 3 cm (confirm with ruler) 18. Repeat steps 11-13 19. Empty box and repeat steps 9-16 four times so that end result is 5 trials (10 tests per trial) for each of the 3 depths 20. Analyze data for each water depth for each trial across the 10 tests and record data in notebook 21. Average time data across the three trials from the numbers calculated in step 19 22. Measure and record distance between where wave was created (leading edge of mark from where wood was dropped) and other end of box 23. Divide distance by average time it took for wave to move from one end of tank to the ot her for each water depth.The answer recorded in notebook will be wave velocity 24. Plot data (x-axis=water depth, y-axis=wave velocity) 25. Answer the following questions: †¢What is the relationship between the water depth and the wave velocity? †¢Is it a linear relationship? †¢Does the wave velocity increase or decrease with increasing water depth even with an uneven bottom? †¢Does this result make sense to you according to the research that you have done on tsunamis that seems to state that, in general, if the level of the water is higher then the velocity of the wave will be greater? If it does not match, then the conclusion should be that an uneven bottom does affect the velocity of tsunami waves. 26. Equation 1, below, shows the mathematical relationship between the wave velocity in shallow water as a function of water depth. Equation 1 states that velocity is the square root of the product of the acceleration of gravity and the water depth: V = vgd V = Velo city in meters/second (m/s) g = Acceleration of gravity (9. 8 meters/second2) d = Water depth in meters (m) 27. Using equation 1, plot wave velocity as a function of water depth. How does the plot compare to results from the storage box/model-tsunami?

Wednesday, October 23, 2019

Privatization of Public Space

Privatization and Advertising in Public Space The fight to take over the world has begun. This fight is between big corporate companies and their race to take over the most public space and plaster it with their advertisements or just simply control it. In this paper I will examine a variety of opinions on how they have invaded public space and if this invasion is benefiting the public or not. In some cases when big companies come take over in a public location it can be positive.Shea Stadium, although it was not exactly public, was greatly improved when Citigroup bought it and rebuilt the park. It improved the viewing experience at the Mets games and Citigroup gets publicity because people associate the park with them. Many people say that this sort of privatization by a big company can have numerous positive effects for people who use the space. Boston’s South Station has also been privatized in recent years. â€Å"The MBTA entered into a ground lease with Beacon South Stat ion Associates, a wholly owned entity of Beacon Properties Corporation, on January 28, 1988†.The MBTA still uses the station for the trains and buses but the company that leases it can set its own rules for within the space and has the right to sell advertising space within the station. Although commuters can still use the space for travel purposes the space is no longer public. During Occupy Boston the protesters peacefully assembled in South Station when the weather became colder but were asked to leave by police because there were not allowed to congregate there per rules of the company leasing the space.According so Una Spencer, an activist and protester during the occupy movement, â€Å"everywhere we are encountering â€Å"public† spaces which we are told are under control of private companies†. She also mentions that’s our taxes are being used to police these areas that are owned by private companies. Spenser is â€Å"seeing is a chipping away of ou r civil rights from many directions† and our tax dollars are paying the police who keep us from practicing these rights.David Morris, co-founder and vice president of Institute for Local Self-Reliance, brings forward the idea that companies should â€Å"compete on an equal footing, and where those with the most money do not necessarily speak in the loudest voice. † Sometimes companies with the most money are able to get their name out more that a smaller company through advertising. By having ads plastered around a city, a consumer is more likely to choose that company’s product than a smaller company. He believes that by seeing ads for specific companies stifles our ability to choose freely between different things.Morris believes in having public spaces where people within a community can congregate that is free of commercialism where people can share ideas. In Sao Paulo, Brazil people are in agreement with ideas similar to Morris’s and laws are being pu t into place to remove advertising. Larry Rohter, American journalist, covered the decision in Sao Paulo, Brazil to remove all advertising from the city. Sao Paulo is South America’s largest and most prosperous city and there has been much controversy over the law.Rohter quotes Brazilian columnist Roberto Pompeu de Toledo saying the law â€Å"is a rare victory of the public interest over private, of order over disorder, aesthetics over ugliness, of cleanliness over trash. † One controversy over this law is that people who work for companies creating advertising may lose jobs. Big companies who’s advertisements will be taken down are claiming â€Å"consumers will be less informed in their purchasing decisions and even that streets will be less safe at night with the loss of illumination from signs. Not only would the law ban billboards, but it would also ban ads on buses, blimps, and plains, and restrict the size of signs that stores would be allowed to have. Ro hter reported one women in Sao Paulo saying â€Å"the truth is that there are so many banners, billboards, placards, signs, and posters all over the place that they’ve lost their impact. † The mayor or Sao Paulo talks about bringing advertising back in the future, but with many restrictions and limitations. The city will become â€Å"an outdoor metropolis with no outdoor advertising. The Internet is another place that has become a common ground for advertising. Facebook used to be a free online community created by a group of college kids. Initially Facebook was supposed to be free of advertisements and that set it apart from other social networking sites. Now, not only does Facebook have advertisements, the advertisements are tailor made to each user based on that person’s likes and activities posted on their profile. On my Facebook is see ads for snowboard websites because I have the posted as one of my activities.Facebook says it needs to have ads because it keeps Facebook free for users. They say it’s also beneficial for advertisers because the right group of people will see their ads. The Internet is just another place where companies are fighting to broadcast to more customers. Along with the Internet, companies also have influence in restaurants, a place where we may not have even suspected it. Have you ever been to a restaurant and when you ordered a coke and the waitress asks, â€Å"is Pepsi ok? This is because restaurants have deals with soda companies and they â€Å"receive additional benefits when they decide to be exclusive. † By having restaurants that are exclusive the soda company theoretically has won that restaurant over and all the customers in that restaurant. It’s like a war to see which soda companies can have the most restaurants exclusively sell their soda. After careful consideration of all these opinions I cannot say I have come to a final conclusion on advertising in public space. I can see how in some cases advertising and privatization have gone overboard.Losing our ability to congregate in South Station seems a little absurd to me because our tax dollars are paying to enforce laws that are keeping us out of a once public space. However, what would a place like Time Square in New York City be without its huge glowing billboards and signs? And in Sao Paulo they are outlawing blimps as a part of the anti-billboard law, and I think of Boston’s Hood blimp that I can see on the skyline from my dorm room window. Is it really such an obstruction to public space? I don’t think so. And it also doesn’t affect what milk I choose to drink because I still am not a big fan of hood milk.In my opinion the best solution would be to haves stricter laws about advertising and privatization. I think Time Square would lose all its magic if the ads were to be taken off the buildings but in places like schools advertising should really be obsolete. As for privatization , I think if a public space is going to be privatized then public dollars should not be used in that space in any way. In South Station the Transit Police should not be enforcing rules put in place by a private organization when it is tax dollars paying the transit police, not the company.I think it’s a pretty fine line and it is the responsibility of government officials to get the balance between public space, advertising, and privatization right. Bibliography â€Å"Advertising on Facebook. † Facebook. 2 Oct 2012. https://www. facebook. com/about/ads/ Morris, David. â€Å"Curbing the Commercialization of Public Space. † Institute for Local Self-Reliance. 15 Jan 2009. 2 Oct 2012. http://www. ilsr. org/curbing-commercialization-public-space/ Rohter, Larry. â€Å"Streets are Paved with Neon’s Glare, and City Calls a Halt. † New York Times. 2 Dec 2006. 2 Oct 2012. ://www. nytimes. com/2006/12/12/world/Americas/12paulo. html? pagewanted=print&_r=0 Spe nser, Una. â€Å"Occupy Boston: the Privatizing of Public Spaces. † Daily Kos. 30 Oct 2011. 2 Oct 2012. http://www. dailykos. com/story/2011/10/30/1031512/-Occupy-Boston-the-privatizing-of-public-spaces â€Å"Why Aren’t Coke and Pepsi Sold Together at Restaurants? † Xatal. 12 Mar 2009. 2 Oct 2012. http://xatal. com/miscellaneous/why-arent-coke-and-pepsi-sold-together-at-restaurants/ ——————————————– [ 1 ].Una Spenser. â€Å"Occupy Boston: the Privatizing of Public Spaces. † Daily Kos. 30 Oct 2011. 2 Oct 2012. http://www. dailykos. com/story/2011/10/30/1031512/-Occupy-Boston-the-privatizing-of-public-spaces [ 2 ]. Una Spenser. â€Å"Occupy Boston: the Privatizing of Public Spaces. † Daily Kos. 30 Oct 2011. 2 Oct 2012. http://www. dailykos. com/story/2011/10/30/1031512/-Occupy-Boston-the-privatizing-of-public-spaces [ 3 ]. Ibid [ 4 ]. David Morris. â€Å"Curbing the Commercialization of Public Space. † Institute for Local Self-Reliance. 15 Jan 2009. 2 Oct 2012.

Tuesday, October 22, 2019

Visual Arts Essays - Aesthetics, Art Movements, Art History

Visual Arts Essays - Aesthetics, Art Movements, Art History Visual Arts Kendall R. Beard University of Phoenix Define Visual Arts Visual expressions are the making of a person's creative ability in various types of workmanship, for example, canvases, drawing, film, photography, makes, music, gems plan and so forth. These works of art are made to empower the faculties of feeling, feeling, and thought about the onlooker. The visual craftsmanship makes an extraordinary affair for each individual eyewitness whether the response is furious, happy, or tragic. The workmanship should make this sort of response which may contrast from one individual to the next. Because one individual does not comprehend the message that the craftsman is attempting to send does not imply that different onlookers won't get the message. Everybody individual has their own kind of reaction and response. Differentiate the visual arts from other forms of creative expression. All through the historical backdrop of craftsmanship, various craftsmen have made some kind of workmanship expressions that vary from each other inside their own class. For instance, works of art have their own diverse sorts of inventive expressions that communicates the craftsmen message using distinctive styles of hues and shapes inside the canvas. A few craftsmen like to delineate sensational scenes and some like to make depictions of genuine articulations of reality. Underneath will list distinctive inventive expressions including painting: Realism - Realism creative expression delineates scenes that are conspicuous as being reasonable. A case of authenticity expression is the well-known Mona Lisa painting. Impressionism - Numerous well known painters, for example, Renoir and Manet use impressionism. Impressionism delineates striking visual scenes of area, water, and air that is seen through the craftsmen eyes. A lake, lake, or a delightful scene demonstrating the mountain perspective and meadows is a case of impressionism. Photo-realism - Photorealism is like realism yet rather than painting the craftsmanship, photographs are utilized to express what the craftsmen sees, for example, light and shade of a specific item. Street Art - Street Art is an extremely mainstream innovative expression regularly utilized by young people. The craftsmen would portray their social and political studies through wall paintings and graffiti. A large portion of these specialists have not had the preparation, for example, craftsmen that utilization authenticity and impressionism inside their specialty. While compositions have diverse styles of communicating the craftsmen creative ability and innovativeness, there are different types of making imaginative expressions that have their own style. Music for instance is a work of art expression that has numerous classes. Music is shaped through various classification sorts, for example, nation, pop, traditional, metal, rock and move, reggae, and so forth. Music has numerous more sorts of kinds and styles then the class of artworks. There is even a classification of music that the performer makes with their mouth which is called beat-boxing which is genuinely new, presented in the 21st century. Likewise, in numerous areas all through the world are different societies and legacy that have their own one of a kind sorts of music. Trinidad and Tobago are known not steel skillet that make exceptionally one of a kind sounds while K-Pop of Korea are known not appealing beats with a blend of rock, pop, hip-jump, and RB. Music is an extremely well known type of craftsmanship expression that is utilized as a part of today's general public more than a work of art. List the different media of visual art such as painting, sculpture, photography, and so on. There are a wide range of mediums that can be utilized to show the specialists creative energy, sentiments, and feeling. These mediums can go from works of art, models, calligraphy, photography, and so on. Beneath will list the kind of mediums utilized as a part of visual workmanship alongside its depiction: Painting - Painting is one of the main extraordinary present day workmanship developments. The work of art fine art generally speaks to the specialist's creative energy through painting on some kind of canvas or paper. The craftsmen utilize a brush and numerous sorts of hues to make workmanship. Numerous can say that work of art is a path for the specialists to speak with the gathering of people. The craftsmanship can be either a scene, still life, pop workmanship, and some more. Leonardo da

Monday, October 21, 2019

What Is a Good SAT Subject Test Score

What Is a Good SAT Subject Test Score SAT / ACT Prep Online Guides and Tips What's a good Subject Test score? This might soundlike a straightforward question, but it's actually a little more complicated. What makes a good score varies by SAT Subject Test as the number of test takers differs from test to test. For instance, in 2017 more than 140,000 students took the Math Level II Test, more than 48,000 students took the Literature Test, and only 453 took the Modern Hebrew Test. As you'll see below, most good scores for SAT Subject Tests are in the 700s, but there are other factors to consider as you set your target scores. Let's take a look at the average scores and percentiles so you can know what a good score is for each individual SAT Subject Test. While we'll be looking at statistics and college requirements to answer this question, it's also important you learn to define what "good" means to you. Ultimately, with effort and preparation, you should be proud of the Subject Test scores you achieve! What Are the Average SAT Subject Test Scores? Good SAT Subject Test scores tend to be a fair deal higher than good scores on the general SAT since high academic achievers tend to take the Subject Tests. The following chart shows the 2018 averages for each SAT Subject Test. For a full breakdown of what these average scores mean, check out this article. SAT Subject Test Mean Score Chemistry 666 Chinese with Listening 760 Ecological Biology 618 French 628 French with Listening 668 German 620 German with Listening 618 Italian 666 Japanese with Listening 703 Korean with Listening 761 Latin 626 Literature 607 Math Level I 605 Math Level II 693 Modern Hebrew 612 Molecular Biology 650 Physics 667 Spanish 647 Spanish with Listening 662 U.S. History 640 World History 622 Source: The College Board See how the average score for Korean with Listening is an incredibly high 761? The average for Math Level I looks like a more reasonable 605. So a "good" score would be higher than average, maybe even in the top 25% of test takers, or top 5% if you're shooting for the Ivy League. Based on these averages, a score of 700 could mean completely different things depending on the test. It would be a strong score on the Literature test but only slightly above average on Math Level II. And on the Korean with Listening test, a 700 would be way below average. Now that you have a sense of the average scores for each test and why they matter for your percentile,let's look at the most recent score percentiles. What Are the SAT Subject Test Score Percentiles? Along with getting a score somewhere between 200 and 800, you also get a score percentile, which compares you with other students who took the test. Scoring in the 80th percentile, for example, means you scored higher than 80% of students. The charts below show how scores translated to percentiles for test takers in 2018. All information is taken from the College Board. Literature, History, and Math Subject Tests Score Literature U.S. History World History Math Level I Math Level II Score 800 99 97 96 99 79 800 790 98 95 94 98 75 790 780 96 93 92 98 71 780 770 94 90 90 96 67 770 760 93 87 87 95 63 760 750 91 83 85 92 60 750 740 88 80 83 89 57 740 730 85 76 80 86 54 730 720 82 72 76 82 50 720 710 79 68 74 78 48 710 700 75 64 71 74 45 700 690 71 60 68 71 42 690 680 67 56 64 68 39 680 670 65 52 61 65 37 670 660 60 49 58 61 34 660 650 56 46 55 57 31 650 640 53 42 52 54 28 640 630 49 39 49 51 26 630 Science Subject Tests Score Biology E Biology M Chemistry Physics Score 800 97 94 90 87 800 790 96 91 87 84 790 780 95 89 83 81 780 770 92 86 80 77 770 760 91 82 76 74 760 750 88 79 72 70 750 740 86 75 68 67 740 730 83 72 64 63 730 720 80 68 60 60 720 710 77 64 57 57 710 700 74 61 54 53 700 690 70 57 50 50 690 680 67 53 47 47 680 670 63 50 44 43 670 660 60 46 41 41 660 650 55 42 38 38 650 640 52 39 35 35 640 Language With Listening Subject Tests Score Chinese French German Japanese Korean Spanish Score 800 62 80 96 88 62 94 800 790 46 78 96 75 47 91 790 780 35 76 92 68 36 86 780 770 30 73 90 63 30 82 770 760 25 70 88 55 25 78 760 750 22 66 83 50 21 74 750 740 20 64 80 46 18 69 740 730 17 61 76 43 16 66 730 720 15 57 73 40 13 62 720 710 14 55 70 35 12 58 710 700 12 53 66 33 11 55 700 690 11 49 63 32 10 51 690 680 10 47 60 29 9 46 680 670 9 44 57 27 8 43 670 660 8 40 54 25 7 40 660 650 7 38 52 24 6 38 650 Language (Without Listening) Subject Tests Score French German Modern Hebrew Italian Latin Spanish Score 800 87 93 85 88 94 92 800 790 86 88 81 81 92 90 790 780 84 85 77 77 90 87 780 770 81 82 75 72 89 84 770 760 79 81 74 69 86 80 760 750 77 76 71 64 82 77 750 740 74 73 70 61 81 74 740 730 72 71 68 57 77 70 730 720 69 67 66 54 74 67 720 710 67 66 66 52 70 64 710 700 65 63 63 49 67 60 700 690 62 60 62 46 66 57 690 680 60 59 60 43 62 54 680 670 58 56 59 40 60 50 670 660 55 53 57 38 57 47 660 650 53 51 55 36 54 44 650 640 50 49 53 33 51 41 640 630 47 47 51 31 49 38 630 As you can see, there's a lot of variation in percentiles among SAT Subject Tests. That's what makes answering the question of what's a good SAT Subject Test score a bit more complicated. Some tests are considered easier than others, and percentiles can be more competitive depending on the population of test takers. Based on this data, here are my suggestions for good and excellent scores for each test. These are the scores you should aim for if you want to achieve the 70th percentile or above, 80th percentile or above, or 90th percentile or above. Disappointed with your scores? Want to improve your SAT score by 160points?We've written a guide about the top 5 strategies you must be using to have a shot at improving your score. Download it for free now: Good and Excellent SAT Subject Test Scores The last way to identify a great SAT Subject Test score is to find out which score you need in order to hit a certain percentile. Below, we've compiled all of the scores needed to reach the 70th, 80th, and 90th percentiles on each Subject Test: Subject Test 70th %ile+ 80th %ile+ 90th %ile+ Chemistry 740-750 770 800 Chinese with Listening 800 800 800 Ecological Biology 690 720 750-760 French 720-730 760-770 800 French with Listening 760 800 800 German 720-730 750-760 790-800 German with Listening 710 740 770 Italian 760-770 780-790 800 Japanese with Listening 780-790 790-800 800 Korean with Listening 800 800 800 Latin 710 730-740 780 Literature 680-690 710-720 740-750 Math Level I 680-690 710-720 740-750 Math Level II 770-780 800 800 Modern Hebrew 740 780-790 800 Molecular Biology 720-730 750-760 780-790 Physics 750 770-780 800 Spanish 730 760 790 Spanish with Listening 740-750 760-770 780-790 U.S. History 710-720 740 770 World History 690-700 730 770 Source: The College Board Some tests, such as Math Level II, Chemistry, Physics, Chinese with Listening, French, French with Listening, Italian, Japanese with Listening, Korean with Listening, and Modern Hebrew, require near-perfect scores to get a high percentile! Don't feel overwhelmed by this, though. A lot of these tests have high averages and low standard deviations, meaning that most well-prepared students are able to get a high score near or above the average. If these subjects are your strong suit, then you are statistically likely to be able to achieve a very high score. On the flip side, if you're not so strong in math, chemistry, physics, or these other subjects, keep in mind that the grading curve is very competitive- you'll be competing with students likely bound for top engineering and technical schools, such as Caltech and MIT (or native speakers for any of the language tests). Reflect on your academic strengths and subject mastery to determine whether one of these tests is right for you. As I mentioned earlier, good SAT Subject Test scores are higher than good scores on the general SAT. As you can see, to score in the 70th percentile or higher, you'll have to get in the 700s for almost allsubject tests. There is one more consideration when determining good scores on the SAT Subject Tests: the colleges you're applying to. Your percentiles are comparing you with all students who took the test- but not all of these students are applying to the same colleges as you. Therefore, it's helpful to get a sense of what the average Subject Test scores are for your colleges specifically. What scores do they expect to see? Do admitted students usually score in the low 700s or high 700s? Will the school overlook a low percentile on a Subject Test if it knows the curve for that test was particularly competitive? Let's consider these questions a little more in-depth. Uncovering your college's requirements might take a bit of detective work. What SAT Subject Test Scores Do Your Colleges Want? As with all the other parts of your application, you want to know what your colleges are looking for. What SAT scores do you need? What do they consider a strong GPA? Unfortunately, colleges can be pretty evasive when it comes to giving you answers to these types of questions. Instead, they stress that it's a holistic process andthat admissions officers are looking at all elements of your application to get a sense of who you are as a person. While this is all well and good and you wouldn't want your candidacy to be boiled down only to facts and figures, it still leaves you a bit stuck when it comes to the SAT and SAT Subject Tests. The first step you can take is toresearch the admissions websites of your colleges. Simply Google the name of the college along with "SAT Subject Tests" or "average SAT Subject Test scores" and you might find exactly what you're looking for. If this is a dead end, you could try calling admissions officers and asking if they will share this data (or at least their recommendations). If you're concerned about bothering them, don't be! Lots of admissions officers have tons of valuable information and are happy to share. Plus,demonstrating that you have a vested interest in the college- for example,by speaking with people on campus, visiting the school, or even just putting your name on mailing lists- will further strengthen your application. With the college process, there's nothing helpful about playing hard to get. Put yourself out there! If your sights are set on the Ivy League, check out our article on the Subject Test scores and requirements for the Ivy League. Finally, let's step outside statistics and requirements and consider your own personal goals. Did you celebrate 3/14 this year? Show off your affinity for math by scoring high on the Math Subject Test. How to Customize Your Target SAT Subject Test Scores What are your personal goals for the SAT Subject Tests? Have you memorized the first 100 digits of pi, or are you always the one who calculates the tip at dinner? If you consider yourself a math whiz, then it might be very important for you to score highly on the Math Subject Test. When I was in high school, I absolutely loved English class. Reading and analyzing books revealed new ways of thinking about the world and human relationships. Even when it was hard work, it was work I wanted to do. This doesn't mean I was naturally able to score a perfect score on the Literature Subject Test, though. That test used a much different way of demonstrating subject mastery than my normal classwork did, especially considering its strict time limits. But I felt driven to score well, so I studied practice questions and trained myself to read passages and answer questions under tight time limits. By reflecting on your strengths and interests, as well as by taking practice tests and scoring them yourself, you can develop your own sense of what a good Subject Test score is for you. Once you've set your target scores, tape them to your wall so you can see them every day. Sharing your goals with friends, study buddies, or family members is another good way to stay focused. Once you've set your goals based on this information and your colleges' expectations, you can start preparing for the SAT Subject Tests you've chosen.The College Board offers a helpful breakdown of each Subject Test in addition to practice questions. You can also check out our other resources below to answer any other questions you have about the Subject Tests or SAT. What's Next? You know what makes for good scores on the SAT Subject Tests, but have you decided which ones you're going to take? Check out our expert guide on which Subject Tests you should take. Are you also studying for the SAT? Just as with the Subject Tests, you'll want to set score goals for yourself and work toward achieving them. Read here about good scores, bad scores, and excellent scores on the SAT. If you're considering the ACT instead, this article breaks down the scoring system and helps you set your target ACT scores. Need a little extra help prepping for your Subject Tests? We have the industry's leading SAT Subject Test prep programs (for all non-language Subject Tests). Built by Harvard grads and SAT Subject Test full or 99th %ile scorers, the program learns your strengths and weaknesses through advanced statistics, then customizes your prep program to you so that you get the most effective prep possible. Learn more about our Subject Test products below:

Sunday, October 20, 2019

A narration of St Marys miracles

A narration of St Mary's miracles Religious storytelling was one form of popular religion used to teach commoners. Simple stories connected religious ideas to ordinary people, events, and objects that were relatable and also taught moral lessons in a way that commoners could understand, much like a Biblical parable. The content and intended purpose of the stories and lessons depended upon the intended audience as well as the teacher reaching out to that audience. Jacques de Vitry’s religious purpose of writing The Virgin Mary Saves a Monk and His Lover differs from King Alfonso X’s political purpose of including Song 159 in The Cantigas de Santa Maria, but they are both able to accomplish their intended purposes by telling stories of miracles performed by Saint Mary and using the characters, their actions, and story outcomes to teach a moral lesson. Jacques de Vitry, a Christian priest and scholar, wrote The Virgin Mary Saves a Monk and His Lover to teach lay people about moral living.[1] Because of the high cost of producing Bibles and high levels of illiteracy among commoners, many commoners â€Å"had a simple understanding of their faith† and religion.[2] Commoners depended on priests for biblical knowledge and instruction.[3] As a priest, de Vitry’s duty was to teach his parishioners, but he was also a scholar. He was challenged to the teach the people at a basic level that they could understand, a level of understanding more basic than his own. Stories about â€Å"saints’ lives reached a wide audience†, and clergy â€Å"encouraged the writing of vernacular poetry on biblical themes which could be recited publicly†.[4] Commoners were interested in listening to these stories, and the stories were memorable, easy to understand, and easily spread. De Vitry’s writing was able to fulfill his purpose by effectively reaching and teaching commoners. King Alfonso X of Castile and Leon compiled The Cantigas de Santa Maria, which contains Song 159, to praise the Virgin Mary and to unite his subjects. He was a Christian king and â€Å"a great patron of law, science, and the arts†.[5] Lyric poetry from Song 159 incorporated his value of art as well as Christian values— praise to the Virgin Mary. Popular saints like Saint Mary â€Å"could unite a country, bolstering its political order†.[6] King Alfonso could unite religious and political communities throughout his kingdom in their common belief and praise of the Saint Mary. Additionally, he could gain political support as king. Alfonso’s purpose for compiling these songs may have been personal but was more likely to promote himself politically. In The Virgin Mary Saves a Monk and His Lover, pious (moral) attitudes and actions were encouraged through praise of approval and reward. The â€Å"pious matron came frequently to the church frequently and served God most devoutly, day and night†, and the monk was the â€Å"guardian and treasurer of the monastery, had a great reputation for piety, and truly he was devout†.[7] Through repeated acts of service, which demonstrated devotion and humility, the monk and matron both had positive reputations for being pious. Even after the scandal, their pious actions were rewarded. When they confessed their sins and prayed to the Virgin Mary, she was â€Å"overcome by their prayers [and] summoned the demons who had caused the deed† to â€Å"bring the infamy to an end†.[8] They were rewarded with the forgiveness of sins and a miracle from Mary, which saved their reputations as well as the reputation of all religious people. The people were taught that if they follo wed the examples of the pious matron and monk that they too would be looked on favorably, praised, and rewarded. Through disapproval and punishment, immoral attitudes and actions were discouraged. The devil temped the monk and matron with carnal love and caused them to steal possessions from other before abandoning their positions of treasurer and wife.[9] Their acts of service became acts of lust and selfishness. When the people they had wronged brought them back, they â€Å"threw them into prison. Moreover so great was the scandal throughout the whole country and so much were all religious persons reviled that the damage from the infamy and scandal was far greater than from the sin itself†.[10] In addition to the punishment of being thrown into jail, the monk and matron has to suffer the shame and guilt of tarnishing their reputation as well as the reputations of other religious people. The people were taught that if they followed the immoral examples of the scandalous matron and monk they too would be frowned upon, shunned, and punished. In Song 159, the pious actions and attitudes of the pilgrims are, like the monk and matron, recognized and rewarded as encouragement. The nine pilgrims â€Å"were going to Rocamador to pray simply and humbly as good Christians†.[11] By praying simple prayers in a humble manner and going on a pilgrimage, which is beyond essential practice, they are credited with the reputation of being â€Å"good Christians†.[12] When they again pray to the Virgin Mary to find the missing steak, she makes the steak miraculously hop inside the trunk where it had been hidden.[13] They find the steak in answer to their prayer and are rewarded with a spectacular miracle. The pilgrims were examples for the people to follow if they wanted favorable outcomes. The immoral actions and attitudes of the pilgrims were privately recognized, and although unpunished, they were still discouraged because they had the chance of being discovered by someone else. The narrator stated that the pilgrims asked Mary for their pious prayers to be heard, and as soon as they had finished their prayers, they hurried â€Å"back to the inn where they waited for dinner impatiently†.[14] The narrator discretely mocked the pilgrims by highlighting the irony of offering prayers of self â€Å"piety† to the pious Saint Mary and by noting their ability to be impatient in prayer and in waiting for their dinner. The pilgrims’ impatience was far from piousness. The idea of the narrator being able to see the pilgrims’ secret actions and attitudes, with or without them even knowing, was similar to the Christian belief of being unable to hide secrets from an all-knowing. The potential for a secret action or attitude to be discovered was almost as dangerous as if it had been discovered, and the risk would deter some people from immoral behavior. Jacques and Alfonso were both Christians in positions of authority, and they both used popular stories about the Virgin Mary to teach a moral lesson. They both encouraged behaviors that convey attitudes of obedience, servitude, and humility and discouraged behaviors that convey attitudes of disobedience, selfishness, and greed, but their motivations for teaching these lessons were different. Jacques was teaching people how to live as â€Å"good Christians† while encouraging praise for the Virgin Mary, but Alfonso was teaching people how to live as â€Å"good citizens† while encouraging praise for the Virgin Mary and ultimately himself. They teach morals lessons to their audiences, and they also demonstrate their personal morals through their purposes and motivations.

Friday, October 18, 2019

Impact of the Industrial Revolution Research Paper

Impact of the Industrial Revolution - Research Paper Example However, the use of the initial spinning machines was dependent on water power hence the production cite had to be at the proximity of rivers. Nevertheless, this led to more innovations through which steam engines were discovered and thus substituted the reliance on waterpower. However, it is worth noting that despite the discovery of the spinning mule in 1785, the production efficiency in textile industry was not any better than through hand until higher modifications were done. This would explain the reluctance observed in adoption of the machine at the time. Gradual acceptance of the machine took place and this led to the full adoption of the discovery in the mid nineteenth century. Preface The late 18th century to the early 19th century saw a shift in mechanisms and practices that were traditionally used in manufacturing to modernized systems of manufacturing. There was a shift from production methods, which involved hand production methods to the introduction, and adoption of me chanization processes. Production mechanisms in use prior to the revolution encouraged the furtherance of such vices as slave trade, which supplied the required labor cheaply for higher gains in production especially within the western economies. Previously, the efficiency in production was greatly compromised because of the use of such crude mechanisms of production as the hand/manual labor. This period marked the introduction of simple machines, iron production as well as chemical manufacturing. The processes adopted encouraged the extensive use of steam power for running engines besides improvisation of machine tools. Discovery of coal and its use for fuel equally dates back to the period where coal proved to be more effective as a source of power over wood as well as other bio fuels that were in use previously. However, it is worth noting that the revolution points its origin from Britain though it easily dispersed to other parts of the world from Europe to the US. The revolutio n is shown to have had some sort of impact to merely every aspect of human life. For instance, such aspects of social economic lives of human beings as average income as well as population growth changed; there was a notable growth in both of these aspects. The living standards of all populations had thus a celebrated notable improvement, which illustrated growth patterns. Generally accepted is the fact that the revolution had great influence on social and economic change across the globe. However, it is worth noting that the industrial revolution has been a topic of great debates with both advantages as well as disadvantages of the same being postulated. Discussion As indicated from the photo, the textile industry received and exhibited great evolution with the commencement of industrial revolution. Industrial production of textile products was wholly dependent on human labor prior to the commencement of industrial revolution. In fact, it is estimated that the output levels were ve ry low as this depended on all factors that would influence the productivity of a human being. Such factors as the level of motivation as well as environmental factors would inhibit massive production in the textile indus

Sometime in the future oil will become more expensive. investigate the Essay - 1

Sometime in the future oil will become more expensive. investigate the effects of this on the market for oil and the market for oil and the market for other fuels - Essay Example Hubbert (1956) had predicted that the production of oil in America followed a bell shaped graph trend. He stipulated that the peak of oil production was to be attained in 1970 after which production will assume a downward trend. His prediction reigned despite sharp criticisms. He then predicted a global peak to be witnessed in the year 2000. Michael Lynch fronted that the production of oil must be closely tied to oil prices. He argued that Hubbert committed a mistake in assuming that geology is the motivating factor to the discovery, production and depletion of oil. He advocated for supply and demand as the key determinants in the oil industry. "To an economist, the drop in exploration reflects optimal behavior: they do not waste money exploring for something they will not use for decades.† he added. Factors that influence the price of oil. Economic growth is one of the key factors that affect oil prices. A steadfast economic growth will result in an increase in the demand for oil and its byproducts. It thus exhibits a direct relationship with the price of oil. Even as countries seek to experience a rapid economic growth, they need to focus on other sources of energy so that their increased demand for energy can be met adequately. Another factor according to Watson (1987) that affects the price of oil is the seasonal changes. It has been observed that during winter oil prices increases rapidly in Europe and the U.S.A due to the increased demand. Before the beginning of winter, consumers tend to buy excess of oil and its products due to fear of possible. However during

Necessity for adaptation of flora and fauna of Galapagos; geological Essay

Necessity for adaptation of flora and fauna of Galapagos; geological formations, invasive species, numbers of species, % of species and calculating the effects - Essay Example Ever since this incredible land was discovered, it has captured the imagination of many. The unique and exotic inhabitants of the island have always mesmerized me. In this document I have endeavored to present an in-depth understanding of the ecosystem of the Galapagos Islands. By the end of this presentation you will have a clear idea about the ecosystem of the Islands and also about flora and the fauna that thrives there. I have documented the necessity for adaptation for the floral and the faunal populations of the islands, their interactions and adaptations. I shall also discuss about the geological formations, introduction and negative impacts of invasive species on the synchronized equilibrium of the Galapagos ecosystem. I consider myself qualified to present such an important documentation to you because, with the help of professional tour guides, I have gained a broad understanding of the culture of Ecuador and they provided me the chance of successfully immerging myself in to their culture. Experiencing the islands from such a close distance, my attention was immediately drawn towards its ecosystem and its plight which lured me to conduct an in-depth research on the issue. I gained a complete understanding of the ecosystem and the threat posed by the invasive species that have been introduced in the islands. I consider that it is necessary for me to share this information with my audience because of the simple fact that they need to understand that there are very fragile and sacred environments in this planet that are worth fighting for. The Galapagos have been a conceptual landmark since its discovery and continues to grant us insight into concepts of evolutionary biology. The true essence of these islands lies in their biodiversity which is under threat; however, researchers believe that Galapagos is standing at cross roads and though the degradation rate is increasing, but

Thursday, October 17, 2019

The Effect of Tsunamis on Marine Life Research Paper

The Effect of Tsunamis on Marine Life - Research Paper Example The most common cause of tsunami is the undersea earthquake. Such earthquakes may be too small to trigger a tsunami, but they may help in landslides, which may trigger Tsunami. On 26th December, 2005, early morning, northwest of Sumatra saw a huge tsunami. The earthquake generated a tsunami that was among the deadliest disasters in modern history, killing well over 200,000 people. The most surprising fact about this disaster is that the tsunami was not generated in Pacific Ocean, but in Indian Ocean. The earthquake originated in the Indian Ocean just north of Simeulue Island, off the western coast of northern Sumatra, Indonasia. The resulting tsunami devastated the shores of Indonasia, Srilanka, South India, Thailand and other countries with waves up to 30m . The following picture shows the blow of tsunami to one of the sandy beaches in Srilanka. Caption: A devastated Sandy beach in Sri Lanka after the Tsunami in 2006. The tsunami of 2005 was just one example of this devastating natu ral disaster. There have been a number of incidences of tsunami across the world, that have produced enormous destructions in the affected nations. (Bryant pp. 3-7; Commonwealth Veterinary Association p. 1) General Impact of Tsunami on Marinelife The coastal ecosystem gets damaged due to tsunami. The mangroves, estuarine, sea grasses, mudflats and coral reefs are usually among the most affected ones. Most of these physical structures are damaged by the huge force, which the waves produce as shown in the following picture. Caption: Damages to the Physical structures in coastal region by the Tsunami in Chennai Physical removal of flora and fauna and increased sediment load kill sediment sensitive corals and sea grasses by smothering. The extent of this damage considerably varies on the basis of local topography and hydrology of the surrounding environment. Some of the general impacts of tsunami can be as follows: Saltwater intrusion is a chemical change that occurs in the Pacific Ocea n, which is now also being happening in the Indian Ocean. All these occur due to heavy run off from the sewage, even the decomposition formed by the flora as well as the fauna of that place. These also include un-recovered bodies as well. Exotic species which are used for aquaculture escape badly. The structure of the ecosystem biologically gets disrupted. Since the structure of the ecosystem alters due to tsunami, the whole ecosystem gets affected Since coral reefs are considered as the natural defense of the ecosystem and it is generally seen that the ecosystems of these areas are largely intact even after the hit by tsunamis. For example, the Surin Island, chain off Thailand’s west coast, may have survived better than areas where the coast has been modified by urban development, aquaculture and to the new formed ecosystem during the tsunami of 2005. Mangroves are generally considered to be very significant natural barricade as well as a source of high quality profitable ti mber. Tsunamis produce significant adverse effects on mangroves. For example, in the Tsunami of 2005 that hit the coasts of India, Sri Lanka, Indonesia, etc., areas with highly dense mangroves areas suffered fewer human casualties and relatively less harm to physical properties compared to those areas that did not covered with mangroves. Tsunamis

Advanced Accounting Theory & Practice Assignment

Advanced Accounting Theory & Practice - Assignment Example In addition, IAS also prescribes for leases within the financial statements of both the lessees and lessors (Barth et al., 2008). The prescriptions capture both financial leases and operating leases. The main characteristics of IAS 17 include the classification of leases, both the finance leases and operating leases, within financial statements of the lessor and the lessee. The scope section outlines the lease agreements for which IAS 17 is applicable. Additionally, the section also lists various agreements in which IAS 17 does not apply. According to paragraph three of the Standard, agreements transferring an asset’s right-of-use require application of IAS 17 (Selling, 2013). The need for the lessor to provide considerable value of services with regards to the operation and maintenance of the leased assets does not nullify the application of IAS 17. Paragraph two of IAS 17 lists four instances that the standard may not be applied (IFRS Foundation 2011). The agreements are contracts for services lacking a transfer of the asset’s right to use (Selling, 2013). In classifying leases, the International Accounting Standards Board (IASB) took into consideration of both the lessee and the lessor (Reinstein & Weirich, 2005). Similarly, IASB also took into account the extent to which the lessee or the lessor may accrue subsidiary rewards from the possession of a leased asset. The risks taken into account include the possibilities of losses arising out of technological obsolescence or idle capacity. In addition, the risks also include potential losses due to digression in return as a result of varying economic conditions. On the other hand, the rewards are characterised by the prospect of a profitable operation over the economic life of the leased asset (Kirsch, 2012). The rewards also comprise the gains arising from appreciation in value of the leased asset. Additionally, the rewards also include any realisation of some residual value. A lease is

Wednesday, October 16, 2019

Question to answer Assignment Example | Topics and Well Written Essays - 1000 words - 1

Question to answer - Assignment Example The terms connectionless and connection-oriented describe different kinds of communication. Connection-oriented means that ‘when devices communicate, they perform handshaking to set up an end-to-end connection. The handshaking process may be as simple as synchronization such as in the transport layer protocol TCP, or as complex as negotiating communications parameters as with a modem. Connection-Oriented systems can only work in bi-directional communications environments. To negotiate a connection, both sides must be able to communicate. This will not work in a unidirectional environment. On the other hand, connectionless means that no effort is made to set up a dedicated end-to-end connection. Connectionless communication is achieved by transmitting information in one direction, from source to destination without checking to see if the destination is still there, or if it is prepared to receive the information. When there is little interference, and plenty of speed available, these systems work well. In environments where there is difficulty transmitting to the destination, information may have to be re-transmitted several times before the complete message is received. Walkie-talkies, or Citizens Band radios are good examples of connectionless communication. You converse into the mike, and the radio transmitter sends out your signal. If the person receiving you doesnt understand you, theres nothing his radio can do to correct things, the receiver must send you a message back to repeat your last message’(InetDaemon). 3. What are the four important steps to follow while programming sockets for communication? Hint: Use the code given on blackboard and check the flow of the code from top to bottom for helpful information on how sockets work. One, ‘we create an object of class TcpClient (namespace System.Net.Sockets0 to connect to the server. The connection is established by calling TcpClient method

Advanced Accounting Theory & Practice Assignment

Advanced Accounting Theory & Practice - Assignment Example In addition, IAS also prescribes for leases within the financial statements of both the lessees and lessors (Barth et al., 2008). The prescriptions capture both financial leases and operating leases. The main characteristics of IAS 17 include the classification of leases, both the finance leases and operating leases, within financial statements of the lessor and the lessee. The scope section outlines the lease agreements for which IAS 17 is applicable. Additionally, the section also lists various agreements in which IAS 17 does not apply. According to paragraph three of the Standard, agreements transferring an asset’s right-of-use require application of IAS 17 (Selling, 2013). The need for the lessor to provide considerable value of services with regards to the operation and maintenance of the leased assets does not nullify the application of IAS 17. Paragraph two of IAS 17 lists four instances that the standard may not be applied (IFRS Foundation 2011). The agreements are contracts for services lacking a transfer of the asset’s right to use (Selling, 2013). In classifying leases, the International Accounting Standards Board (IASB) took into consideration of both the lessee and the lessor (Reinstein & Weirich, 2005). Similarly, IASB also took into account the extent to which the lessee or the lessor may accrue subsidiary rewards from the possession of a leased asset. The risks taken into account include the possibilities of losses arising out of technological obsolescence or idle capacity. In addition, the risks also include potential losses due to digression in return as a result of varying economic conditions. On the other hand, the rewards are characterised by the prospect of a profitable operation over the economic life of the leased asset (Kirsch, 2012). The rewards also comprise the gains arising from appreciation in value of the leased asset. Additionally, the rewards also include any realisation of some residual value. A lease is

Tuesday, October 15, 2019

Chinese martial arts Essay Example for Free

Chinese martial arts Essay Shamis: Way to Shaolin is a traditional dance performed by the Kung Fu Monks of Shaolin. Dance exists in many forms and can fulfil different functions: ritual, social or artistic. This particular dance fits into the ritual and artistic function. When performed and practised, ritual dance serves a strong function in sustaining the life of people through the culture and its procedures. Artistic dance is performed to be looked at and to entertain onlookers. The work itself can also be a means of expressing ones thoughts and feelings (Snook. B, 2004, p47-49). This essay will prove that the ritual function is most predominant in Shamis: Way to Shaolin. The ancient collection of Chinese martial arts referred to as Shaolin Kung Fu was created by a Buddhist Monk called Bodhidharma or Tamo who attempted to teach the monks of Shaolin the discipline of Zen meditation. They were not physically capable for the rigorous regime so he then continued to create a series of exercises to build up their health and increase their stamina (History of Shaolin Kung Fu, N/D, para 2). The exercises were both physiological and physical; the â€Å"goal being to control the body through the power of the mind† (The History of the Shaolin Monastery, 2008, para 1). The martial arts were developed out of necessity as the monks had to defend the monastery from thieves who tried to rob them of their treasures (History of Shaolin Kung Fu, N/D, para 3). Today, Shaolin Kung Fu is still practised and used for self-defence, health, fitness, character development, spiritual cultivation and life enrichment (Aims and Objectives of Practising Kung Fu, ND, para 3, 4 and 6). The ritual function is clearly the most predominant function in the performance of Shamis: Way to Shaolin, because of the great history and meaning of Shaolin Kung Fu to the Buddhist monks and the way it is performed. The dance components in Shamis: Way to Shaolin clearly fulfil the ritual function of dance due to the culture and beliefs represented. The dancers are all male Chinese Buddhist monks and they are wearing traditional outfits. The orange robes are dated back centuries and were originally chosen because of the dye available at the time. They are meant to symbolize simplicity and detachment of materialism (Exotissimo, 2010, para 1). The dancers are respecting themselves and others as they all bow together at the beginning of the performance and stand in a meditation position on one leg before dancing. The thin, wooden poles used in the performance of Shamis: Way to Shaolin are martial art weapons used for defence. The monks are representing themselves as warriors protecting their beloved monastery which is part of their history. This is realised as the stage is representing the outside of their monastery with large doors opening outside to steps which lead downwards and have 2 Chinese statues guarding them. The movements of the Shaolin monks are also very sharp and aggressive. They shout HA! loudly together on particularly strong movements as a warning signal and to show it is their territory and monastery. This is a characteristic of ritual dance as the performance is portraying a function. The dancers engage themselves entirely on the performance using immense concentration and focus. Repetition, a characteristic of ritual dance, is used as the monks repeatedly twirl their poles and bang them on the ground. The ritual function is most predominant as the Buddhist monks are dancing for themselves for enlightenment as well as for their culture and beliefs. There are also dance components that fulfil the artistic function of dance within Shamis: Way to Shaolin. It is choreographed and performed onstage for an audience. The dance begins with a loud gong and then fast-paced, traditional music is played which is whistling and chiming. The music is played to assist the audience in understanding and enjoying the performance. The monks mostly all dance together in sync at the same time, the majority of the time in a 3 straight lined formation facing the audience. This is an artistic element because the dancers have practised their routine so that it would be appealing to watch. A smoke machine is used when the male dancers enter onto the stage and go down the steps which provide levels within the performance. Levels are again used during the dance because they are regularly leaping, crouching and jumping. At the end most of them go to either side and sit while watching 2 monks fight dance with poles in the middle. These components are all used for the benefit of the audience and the overall effectiveness of the dance. Therefore the dance is also clearly fulfilling the artistic function. The ritual and artistic functions are seamlessly combined in this dance. The artistic function includes music, formations, cannons and levels. The ritual function is more complex representing their culture and beliefs with the dancers being Buddhist monks, wearing traditional outfits, doing meditation and Martial Arts/Kung-Fu etc. Together the two functions create an unforgettable production with the ritual being the most predominant. Bibliography Exotissimo Blog (December 21, 2010) [online] Why do Buddhist monks wear orange robes and shave their heads? http://www. exotissimo. com/blog/buddhist-monk/ (13/03/2013) DVD Shamis: Way to Shaolin. 2001. (Live show video recording) South Australia, IMS Entertaining SA. Schaffhausen Book Snook. B, (2004) Dance Count Me In, McGraw Hill PTY LTD (p47-49) Shaolin Kung Fu History (date unknown) [online] ChinatownConnection. com http://www. chinatownconnection. com/shaolin-kung-fu-history. htm (date accessed 2/03/2013) The Aims and Objectives of Practising Kung Fu (date unknown) [online] General Kung Fu Aims http://www. shaolin. org/general/kungfu-aims. html (date accessed 2/03/2013) The Mystical power of Shaolin Kung Fu (2008) [online] The History of the Shaolin Monastery http://www. shaolinmonksinmalta. com/ (date accessed 2/03/2013).

Monday, October 14, 2019

A Remote Desktop Application For Android

A Remote Desktop Application For Android The aim of this project is to develop a simple-to-use remote desktop application which enables users to remote view contents of their desktop and view, create, edit and delete files and folders remotely. The application runs on a portable device (such as a cell-phone or tablet) which fully supports the Android mobile platform and is equipped with features like WiFi, touchscreen, document editor etc. An important goal of this endeavour is to keep the application user-friendly and easy-to-use. The application uses the same protocol as Microsoft Windows for file sharing. Thus, implementing and using the application in a domain environment where each user has access to specific files and folders makes sense. This also enables true mobility and control over the user-account in a university or office setting. In conclusion, the application works perfectly when the target remote machine is in the same network as the mobile device. For accessing a domain share, the device needs to be connected to the domain via VPN (Virtual Private Network). The application is expected to work in the same fashion with a VPN like it does over an actual network. Chapter 1 Introduction 1.1 Motivation In computing, the term remote desktop refers to software or an operating system characteristic which allows applications, often including graphical applications, to be run remotely on a server while being displayed locally (1). In practise, the term remote desktop has a very broad meaning which could pertain to any of the specific uses of this feature. Also, each implementation of programs that enable remote access is different as the services provided by each of them vary. Applications of remote desktop are numerous and depend on the setting in which it is used. An important use is in the domain environment where a central server machine (or group of servers) controls all the other clients that are connected to it. In such a situation, certain programs which need a lot of resources are run on the server and are accessed by the client computers via remote sharing. This approach eliminates the need for multiple licenses or expensive client machines. Network administrators can also use remote desktop to maintain and when required, troubleshoot a remote client machine. This reduces the need for a large number of technical support staff (2). Remote desktop also serves as a handy utility for the end-user. It allows an employee to work from home by making available the same set of software and settings which are provided at office. A student can access all their important files and documents stored at the university computer without being physically present anywhere near the campus. A novice user can get help with installation of particular software remotely from an expert (3). To use remote desktop, one needs specialised software. Though there are a plethora of remote desktop clients available for the desktop on all major operating systems, the options for mobile platforms are quite scarce. This is majorly due to a variety of operating systems in use and restricted resources available in mobile devices. In addition to it, the few usable solutions are either quite expensive or are no longer supported. This prompted me to take up the challenge of developing a practical, easy-to-use remote desktop application for the ultra-portable platform which needs no technical know-how to setup and run. Chapter 2 Literature Survey 2.1 The Android Platform Today, there exist a number of operating platforms for mobile devices. A majority of them are proprietary and are adopted by a handful of device manufacturers. Thus, developing for such platforms would provide little in way of commercial value to the application. Also, it will be available to only a small section of smartphone users. Porting the app to other mobile platforms is also not an alternative as this would require drastic changes in its code which would require additional man hours. An exception to the above mentioned problem is the Android platform for mobile devices. Android is a software stack for mobile devices that includes an operating system, middleware  [1]  and key applications (4). Android was originated by a group of companies known as the Open Handset Alliance, led by Google. Today, many more companies which involve cellular service providers, OEMs and developers have invested in Android and have adopted it for their products (5). As can be seen from the following figure, the architecture of the platform is no different from traditional PC architectures. Figure 1: The Android Architecture (Source: Wikimedia Commons) The lowest layer of the architecture consists of the Linux kernel which has all the drivers needed to communicate with the hardware. This layer is also called the Hardware abstraction layer. The layer above it has android core libraries written in C/C++. It also has the Dalvik virtual Machine which provides inter-process abstraction. On top of the libraries is the API  [2]  layer which enables component re-use and better application design. The topmost layer has all core applications which ship with the OS. An important attribute of the Android platform is that it is open-source. Thus, its source code is freely available which enables developers to use readily available APIs for developing robust applications quickly. Also, as the system requirements of Android are quite less, it is suitable for mid-range to ultra-high-end devices. As a result, Android can be seen in mobile phones, e-readers, PDAs and even netbooks (6). There is also an active developers community for Android which provides support via e-mail and web forums. Thus, it is not hard to see why Android provides an ideal platform for application development. Figure 2: A typical home-screen for Android devices (Source: developers.android.com) The screenshot above shows a home screen of an android device. This device is a mobile phone and thus has applications such as contacts, phone and messaging on the home screen. A variety of tablet computers, electronic book readers and netbook computers also use android and have icons relevant apps on the home screen. The white bar on the top is the notification bar which works the same way as the notification area in Microsoft windows. It displays battery level, signal strength, time and current network connection. 2.2 Android Application basics Applications for the android platform are written in the JAVA programming language. For deploying an application to a device, the java code is first compiled and then bundled into an android package which is in the .apk format. The latter operation is done by the Android Asset Packaging Tool or aapt. In Android, every application runs in its own Linux process. Android starts the process when any of the applications code needs to be executed, and shuts down the process when its no longer needed and system resources are required by other applications. Each process has its own virtual machine (VM), so application code runs in isolation from the code of all other applications. No other application is aware about the existence of the other. By default, each application is assigned a unique Linux user ID. Permissions are set so that the applications files are visible only to that user and only to the application itself. 2.3 Application components A unique feature of the android platform is that each application can use a feature provided by some other application without having to actually implement it. This encourages code-reuse and saves precious man hours spent in development. Unlike applications on most other systems, Android applications dont have a single entry point for everything in the application (no main() function, for example). Rather, they have essential components that the system can instantiate and run as needed. There are four types of components: 2.3.1 Activities An activity is a visual representation for any task that application intends to fulfil. For example, an activity could be a list of images in a gallery, a menu with settings for the user or a phonebook with contacts. An activity can spawn another activity whenever an event occurs. In the phonebook activity, when a user clicks on a contact, another activity is created which allows the user to either call or send a text message to that contact. Each activity has a view associated with it. This view provides visual elements such as text fields, buttons, checkboxes etc. These elements might have some listeners associated with them which trigger an action when interacted with. 2.3.2 Services A service might not be visible to a user but it runs indefinitely in the background and could be used by an activity. For example, a service might play background music as the user attends to other matters, or it might fetch data over the network or calculate something and provide the result to activities that need it. A prime example is a media player playing songs from a play list. The player application would probably have one or more activities that allow the user to choose songs and start playing them. However, the music playback itself would not be handled by an activity because users will expect the music to keep playing even after they leave the player and begin something different. To keep the music going, the media player activity could start a service to run in the background. The system would then keep the music playback service running even after the activity that started it leaves the screen. Like activities and the other components, services run in the main thread of the application process. So that they wont block other components or the user interface, they often spawn another thread for time-consuming tasks (like music playback). 2.3.4 Broadcast receivers A broadcast receiver is a component that does nothing but receives and reacts to broadcast announcements. These announcements can be anything that are meant to inform user about occurrence of an event such as email arrival, low battery indication, change of track in the music player and so on. Applications can also initiate broadcasts for example, to let other applications know that some data has been downloaded to the device and is available for them to use. An application can have any number of broadcast receivers to respond to any announcements it considers important. Broadcast receivers do not display a user interface. However, they may start an activity in response to the information they receive, or they may use the Notification Manager to alert the user. Notifications can get the users attention in various ways flashing the backlight, vibrating the device, playing a sound, and so on. They typically place a persistent icon in the status bar, which users can open to get the message. 2.3.5 Content providers A content provider makes a specific set of the applications data available to other applications. They basically provide for interprocess communication. The content provider extends the ContentProvider base class to implement a standard set of methods that enable other applications to retrieve and store data of the type it controls. However, applications do not call these methods directly. Rather they use a ContentResolver object and call its methods instead. A ContentResolver can talk to any content provider to manage communication with processes. Whenever theres a request that should be handled by a particular component, Android makes sure that the application process of the component is running, starting it if necessary, and that an appropriate instance of the component is available, creating the instance if it is necessary. 2.4 A typical Android project directory structure Figure 1 shows the directory structure of an android project named filegetter. Here, the first folder src holds the java source files for the project. These files contain actual java code which is written by the developers. In this case, the source files are held in a package named hardik.test.browse. The package helps to keep the source files together allowing easy access to data and variable within the project. Figure 3: Directory structure of an Android project The next folder is gen which consists of auto generated java files. These files are generated when the project is build/compiled. Information about variables, strings and layouts are stored in these files. Android 1.6 is the build of the android platform against which the application is being created. This is important as each build has some special classes which may not be present in an earlier one. Referenced Libraries consists of list of all third party or external libraries used for our project. In our case, it will consist of the JCIFS library (explained later). The assests folder in generally unused and it may hold required files if needed. The res folder has drawable, layout and values subfolders. Drawable consists of icons and other graphical elements of the application and is divided into three subfolders according to resolution of target device. The layout folder holds .xml layout files which decide elements like button, text box, list etc. for the application. The values folder is used for providing id for different components of the application. The AndroidManifest.xml is an important element of an android project. In this file, all the activities and services of the application are described. Other elements such as application permissions for the application are also described. Finally, the default.properties file has an entry for the build of target devices for which the application is being developed. 2.5 Android in the Market According to a May report by market research group NDP, the Android operating system performed quite well in the first quarter (Q1) of 2010, moving past Apple to take the number-two position among smartphone operating systems. NPDs wireless market research reveals that based on unit sales to consumers last quarter the Android operating system moved into second position at 28% behind Research In Motions Blackberry OS (36%) and ahead of Apples OS (21%) (7). These figures indicate a rise in popularity in the android platform. Also a large range of available handsets means that consumers will be able to choose according to their needs and budgets. This increase in market share also means that more developers will be willing to develop for Android making it a competitive, mainstream product. 2.6 Remote Desktop Implementation Currently, there exist a variety of applications for PC which use either proprietary or generic/open-source protocols for remote desktop implementation. All of these applications are based on the server-client model where the server side of the software operates on the target machine and the client application is run on the remote host. Either of the machines may function as client or server provided both of them are equipped with required software. Figure 4: Implementation of a traditional client-server model (Source: acm.org) Various protocols can be used for remote access. Each of these provides a specific set of functionalities that may be common to another protocol or unique to that particular protocol. Listed below are some of the protocols used for remote access and file sharing. These are widely used in several desktop clients in the market today. 2.6.1 RDP (Remote Desktop Protocol) It is a proprietary protocol developed by Microsoft which provides remote display and input capabilities over network connections for windows-based applications running on a server (8). The RDP is encapsulated within the TCP layer and uses separate virtual channels for carrying data, licensing information, encrypted information and so on. All versions of windows after windows XP support Remote Desktop via RDP. But only the professional and ultimate versions come with the Remote Desktop Server program which enables a user to share their screen (9). 2.6.2 RFB (Remote Framebuffer) Protocol RFB is a simple protocol for remote access to graphical user interfaces. Because it works at the framebuffer level it is applicable to all windowing systems and applications, including Linux, Windows and Macintosh. It is primarily used by the VNC (Virtual Network Computing) software and its derivatives. By default, it uses TCP port 5900 for the client and port 5500 for the server (10). 2.6.3 SMB (Server Message Block) The Server Message Block (SMB) Protocol is a network file sharing protocol which allows a client application in a network to read and write files on and request services from the server on the same network. The SMB protocol requires a secure and encrypted authentication method and is thus more secure than other file sharing methods. Microsoft provides an SMB client and server with its Windows operating system. For Linux based systems, a utility called Samba is freely available for using the protocol (11). Chapter 3 Design One of the major hurdles faced in designing a remote access client is to decide upon the protocol to be used. Out of the available ones mentioned before, the RDP and SMB protocols allow screen-capturing of the remote machine onto the client device. This allows the user to interact with the desktop in real-time. Both these protocols have been implemented successfully in a variety of programs for all three popular (Windows, Mac OS and Linux) desktop platforms. Upon deciding the project, the intent was to use one of these protocols for the application. But the following difficulties were experienced during the development phase. 3.1 RDP and RFB Implementation issues 3.1.1 Absence of library classes While implementing either RDP or RFB, one can use the Robot class present in Java which can mimic the mouse, simulate keyboard interactions and capture the screen of a remote host over the network (12). This class is unfortunately absent in android and thus cannot be used. This makes it difficult to perform the above mentioned functions in android as no alternative classes exist. Current RFB and RDP implementations on Android have made use of similar projects on the desktop environment by forking  [3]  the source code from these projects. These existing projects use external libraries without proper documentation and at times are written in a non-java programming language. Thus, comprehending the original code and then forking it would take a lot more time than the projects duration. 3.1.2 Need for server side installation Both the protocols (RFB and RDP) required a server side program running on the target machine. This program is bundled with server editions of most operating systems but require purchase on all other editions. Also, there may be compatibility issues if the server is running a RDP implementation and the device has a client using the RFB protocol. This will result into failed communication between the server and the client. Due to the aforementioned issues, remote access will be implemented by using the SMB protocol. 3.2 Benefits of the SMB protocol An enhanced version of the SMB called CIFS  [4]  (Common Internet File Sharing) has been in place since Windows 2000 and it provides a host of features when compared to other such protocols (13). 3.2.1 Greater accessibility The SMB protocol for resource sharing has been used by Microsoft for their operating systems since Windows 95. In a domain environment, SMB is used to provide access to relevant resources to every user. In Linux too, a free utility called Samba which uses the SMB protocol, comes with most distributions. Thus, out-of-box functionality can be provided to any client requiring remote access. 3.2.2 Added security CIFS provides flexibility to allow anonymous transfers as well as secure, authenticated access to resources. Policies can also be easily managed and changed whenever required 3.2.3 Support for slow connection Access to shared resources and transfer of resources is also supported on slower connections. Thus, using a 3G or EDGE connection from a device will not be an issue while accessing remote files. 3.2.4 Performance and scalability CIFS servers are highly integrated with the operating system. Thus they function as part of the OS and not third party programs. This guarantees maximum system performance at all times (13). 3.3 SMB Authentication Method Authentication over SMB occurs mainly through the NTLM (NT Lan Manager) that works on systems using windows and on Linux/Unix distributions via the Samba server (14). NTLM is a challenge-response authentication protocol which uses three messages to authenticate a client in a connection oriented environment, and a fourth additional message if integrity is desired (15). The following figure shows exchange of messages between the client and server during authentication. Figure 5: Message sequence to authenticate an SMB session As seen in the above figure, the client negotiates protocol-specific options using the SMB_COM_NEGOTIATE request and the server replies with similar response messages as shown by (1) and (2) respectively. The client then sends an SMB_COM_SESSION_SETUP_ANDX request message. In cases where NTLM authentication is negotiated, within this message an NTLMNEGOTIATE_MESSAGE is embedded. The server responds with an SMB_COM_SESSION_SETUP_ANDX response message within which an NTLM CHALLENGE_MESSAGE is embedded. The message includes an 8-byte random number, called a challenge that the server generates and sends in the ServerChallenge field of the message. The client then extracts the ServerChallenge field from the NTLM CHALLENGE_MESSAGE and sends an NTLM AUTHENTICATE_MESSAGE to the server (embedded in an SMB_COM_SESSION_SETUP_ANDX request message). If the challenge and the response prove that the client knows the users password, the authentication succeeds and the clients security context is now established on the server. To acknowledge this, the server sends a success message embedded in an SMB_COM_SESSION_SETUP_ANDX response message. 3.4 SMB Packet Exchange The following lists an example of a packet exchange between a client and a server via the SMB protocol (16). The client and the server establish a NetBIOS  [5]  connection. The client and server negotiate the Microsoft SMB Protocol dialect. The client logs on to the server. The client connects to a share on the server. The client opens a file on the share. The client reads from the file The connection being full-duplex, file transfer can occur from both ends. Chapter 4 Implementation 4.1 Flowchart In any application, the flow diagram is an important figure that helps one visualize the interactions a user might have with the application and the possible outcomes of these interactions. Figure 6: Flowchart 4.2 UML Use Case diagram Use cases are used to identify and partition system functionality. They separate the system into actors and use cases. Actors represent roles that can are played by users of the system. Those users can be humans, other computers, pieces of hardware, or even other software systems. The only criterion is that they must be external to the part of the system being partitioned into use cases. These actors can interact with the system in a variety of ways which create various outputs. The outputs may be for the users or for other components of the system. Figure 7: Use cases The figure above shows a users interaction with the application. The user can access the Remote resources provided they are logged in to the remote share. Similarly, they can download a file to the local resources only if the file is present in the remote share. Chapter 5 Results 5.1 Experimental Setup For evaluating the results, the application was used on an android handset with Android platform version 2.2. The remote server was a laptop running windows 7. Files and folders were shared using the SMB protocol with mandatory authentication to all shared resources. The target machine and the mobile device were both connected to the same wireless network. 5.2 Application Screenshots Figure 8: On Start-up As seen above, the user is presented with a tabbed view with local file system selected. Different icons are used for various datatypes. Figure 9: Local Photo folder Seen above is the photo folder located on the memory card of the device. The two green arrows on the top represent up and back buttons which are used for navigation. Figure 10: Login screen Login screen on clicking the Remote tab. Figure 11: Unsuccessful login (pop-up appears) Figure 12: Remote download Downloading remote file to memory card on click. Figure 13: Operations on remote file Bibliography 1. Remote Desktop Software. Wikipedia. [Online] [Cited: 25 June 2010.] http://en.wikipedia.org/wiki/Remote_desktop_software. 2. Remote desktop. TopBits Tech Community. [Online] [Cited: 25 June 2010.] http://www.topbits.com/remote-desktop.html. 3. 5 Best Remote Desktop and administration application. TechieZone. [Online] [Cited: 25 June 2010.] http://techiezone.in/reviews/5-best-remote-desktop-and-administration-application/. 4. About the Android Open Source Project. Android. [Online] [Cited: 26 June 2010.] http://source.android.com/about/index.html. 5. Philosophy and Goals. Android. [Online] [Cited: 26 June 2010.] http://source.android.com/about/philosophy.html. 6. List of Android Devices. Wikipedia. [Online] [Cited: 26 July 2010.] http://en.wikipedia.org/wiki/List_of_Android_devices. 7. Android shakes up U.S. smartphone market. NDP. [Online] [Cited: 7 July 2010.] http://www.npd.com/press/releases/press_100510.html. 8. MSDN Remote Desktop Protocol. MSDN. [Online] [Cited: 4 July 2010.] http://msdn.microsoft.com/en-us/library/aa383015.aspx. 9. Understanding the Remote Desktop Protocol (RDP). Microsoft Support. [Online] [Cited: 5 July 2010.] http://support.microsoft.com/default.aspx?scid=kb;EN-US;q186607. 10. Richardson, Tristan. The RFB Protocol Version 3.8 (2009-11-24). RealVNC. [Online] [Cited: 10 July 2010.] http://www.realvnc.com/docs/rfbproto.pdf. 11. Server Message Block Protocol. Search Networking. [Online] [Cited: 25 July 2010.] http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci214214,00.html. 12. Java Remote Desktop Administration. The Code Project. [Online] [Cited: 21 July 2010.] http://www.codeproject.com/KB/IP/RemoteAdminJava.aspx. 13. CIFS. Protocol Base. [Online] [Cited: 20 July 2010.] http://www.protocolbase.net/protocols/protocol_CIFS.php. 14. Integrating additional services. Samba.org. [Online] [Cited: 2 August 2010.] http://www.samba.org/samba/docs/man/Samba-Guide/DomApps.html. 15. Microsoft NTLM. MSDN (Microsoft Developers Network). [Online] [Cited: 5 August 2010.] http://msdn.microsoft.com/en-us/library/aa378749(VS.85).aspx. 16. Microsoft SMB protocol packet exchange scenario. Microsoft Developers Network (MSDN). [Online] [Cited: 10 August 2010.] http://msdn.microsoft.com/en-us/library/aa365236(v=VS.85).aspx.