Wednesday, August 26, 2020

Corporate Business Ethics and Social Responsibility

Question: Talk about the Corporate Business Ethics and Social Responsibility. Answer: Presentation: The most well known web index that the world uses on regular premise is Google, which has risen as the most gainful web organization on the planet (Google.com 2017). Google has made numerous items, for example, you tube, Android, Google Glass Google Plus and Google wallet. Google is as of now confronting the issue concerning the security strategy and utilization of the individual data of the clients. There are many hazard and moral issues looked by Google and it needs address on steady premise. In the innovation business, Google has consistently the moral direct. In spite of this, Google has been blamed for having a piano disposition towards the security strategy. It has been blamed for damaging the clients protection. Different protection issues looked by Google has brought down the trust of the clients and trust is exceptionally fundamental for the clients in making communication with the organization. Google has confronted difficulties concerning the protection notwithstanding the selection of various methodologies in dealing with the security. There is a need to address the moral and the security issues looked by the organization while keeping up its productivity (Hartman et al. 2014). It isn't satisfactory with respect to the global, for example, Google to satchel benefit without taking into accounts the necessities of its representatives, buyers, networks and condition. Conversation: The methodologies taken by Google are broadened due to the wide cluster of the items gave. Partners of Google originates from various gatherings and they are affected by the changed business of the association. They incorporate clients, workers, financial specialists, promoters, networks and government. Clients are considered the most critical as far as the impact on the firm. Google has program and approaches that tends to the enthusiasm of all gathering of partners. The technique of the organization is to concentrate on the clients and this prompted well known and helpful items that are useful to the client, financial specialists and clients and in this way making the business productive (Grant 2016). The coming of versatile innovation and web has empower the association, for example, Google to serve the requirements of its partners. It has the duty to guarantee that the privileges of the partners are ensured. All the systems are planned to improve the notoriety and the validity am ong the partners. In social obligation, Google has made incredible steps and there has consistently been opportunity to get better (Crane et al. 2013). Google has taken a few activities to serve the current investors by offering differentiated items. The partners of the organization have been believed to be existing in the various kinds the various gatherings that are working in changed organizations. A portion of the partners gatherings of the organization have been found as far as clients, representatives, Governments, speculators, clients, networks, promoters and different clients. Google has taken a few activities identified with the execution of the Corporate Social Responsibilities (Khan et al. 2013). The most basic partners incorporate the clients of Googles internet searcher and Chrome. Consequently, organization has taken a few activities to offer consistent support in the related zone. In a few different cases the advancements identified with the related improvement identified with the partners has been found regarding the persistent turns of events, which are being made in these stages. The representatives of the organization are viewed as the second most significant need for the organization. It has been seen that the workers are in tried as far as getting of satisfactory degree of remuneration and compensating experience for the organization. The pay system set by Google supposedly is higher as far as the other leaving programming organizations. It has been additionally observed that the organization is mindful giving more significant compensations and motivators to the workers. A portion of the activities taken by Google for the representatives are found regarding creating methodologies, which will offer fun working conditions. The laborers are given the adaptability to work out, appreciate sharing thoughts and mess around. The fundamental set of accepted rules has been believed to be provided by Google Supplier Code of Conduct which has been believed to consider factors, for example, wellbeing and security of the workers (Meyer 2015). It has been additionally observed that from the year 2004, Google began to consider the speculators a significant type of partners of the Google. Thus, it has been seen the organization can devise procedure, which has guaranteed the held intrigue do the investors of the organization. The nonstop offices gave by the RD group of the organization have had the option to guarantee that the organization can build the value of the items and apply the equivalent for the benefit of the organization (Morris et al. 2014). Government is likewise observed as a significant type of partners of the gathering. It has been seen that organization gets a few help from the legislature in type of the assortment of the information identified with the geological and spatial data. It has been additionally observed that the Government apparently is keen on guaranteeing Googles administrative consistence (Kuenkel, Petra and Andrew 2015). These partners of the organization are believed to be making a significan t stride as far as favoring Googles business activities in their individual locales. The organization has been additionally observed to serve different clients to improve the fame of the item and improving the general market reach. Thusly, it has had the option to add to the organizations administrations (Baumann-Pauly et al. 2015). It is conceivable to improve the lives and increase the trust of partners if the Google discover approaches to make sure about the private data structure the clients with the goal that it isn't freely spread. Google ought to make a few secure documents of the data they have assembled with the end goal of insurance. Any data that recognizes the clients and which should be imparted to the untouchable or the outsiders must have assent of the partners. Google needs to take some extra systems in securing the protection of the clients on the grounds that satisfying the targets of the partners is at times at the expense of the data of the clients. Such data are utilized to tailor the promotion and this data ought to be imparted to the pariahs with the assent of the clients. Google can regard protection and still keep up its productivity yet the clash of the clients security are something that the Google needs to manage for quite a while. So as to keep up the productivity, Google depends on following alongside some different exercises to keep up its benefit. Google utilize the data produced from the following for redoing the administrations to the individual clients. Google has continually refreshed the security strategy of Google so it would be advised to consent to the necessities and needs of the clients with regards to their private data. Google redid their security strategy in the year 2012 by consolidating the data assembled from the diverse Google administrations (Pearson 2013). It was expressed by the Google that the clients are given the choice of turning certain highlights that gathers the data. The new arrangement would remain exceptionally dedicated to the security of clients and would not influence the measure of information erased or assemb led. Google has encountered a lot of moral issues being a huge organization. One of the significant analysis concerning protection about the Google is monitoring clients looked through things and making sure about data of some upset hack assaults (Murphy and Schlegelmilch 2013). The new approach embraced by Google focusing on the security of the clients with no conflict with the productivity would make the association to play out its tasks flawlessly. Keeping the productivity and the clients security independently without one affecting the other can be clarified by the model. The greater part of the clients utilize the Google web crawler ensuring that their private data isn't spilled to programmers and it made sure about. In such manner, Google has the ability to keep up the two issues independently. A portion of the huge change concerning the protection can be taken by Google, which will help it in keep up its benefit. Google can put a cost on protection and the default internet searcher for marked in clients can be upgraded. It can move to make sure about servers and the guidelines should be changed. It have to draw a barely recognizable difference between keeping up gainfulness by utilizing informations of clients and abusing protection of clients (Slavin et al. 2016). Google basically rely upon following to keep up its gainfulness and subsequently in such manner, it attempt to build straightforwardness in its activities and improve its protection rehearses. Comparable to WiFi, applications and cell phones, the clients of Google is given the terms and conditions that are should have been acknowledged all together for the establishment of any administrations. Google would make benefit once the clients acknowledge the terms and conditions, regardless of whether the clients recognize the terms and condition or not. In the event that Google deals with keeping up the security of its clients and changing the norm, which suits to the need of the clients while ensuring their protection, this is naturally make the foundation of producing the productivity (Bygrave 2014). Google need to make savvy interest in keeping up the client data strategy. Different components impacting the protection of the clients ought to be examined and as needs be the speculation ought to be made. From the point of view of an association, security assurance is simply one more component of overhead until there is lost the private data of the clients. Along these lines would help Google in accomplishing the productivity. The protection of Google would give the stage and give a hit to the working exercises of Google and hence keeping up the benefit

Saturday, August 22, 2020

The Great Awakening Essay Example | Topics and Well Written Essays - 1000 words

The Great Awakening - Essay Example The engaging of the tremendous arousing to the Americans colonialist especially none-elites was on the grounds that they needed to change a portion of the practices. The practices had been brought into the mentalities of certain people with a perspective on bringing a change more than ever. The non-elites had a goal towards the incredible arousing, however they came up short on the important help from both the provinces and the old pastors. As I would see it, the heritages of the incredible recovery didn't add to the breaking with Great Britain. Rather, it fortified the relationship through the affecting the British chapels as well as the Dutch and the Germans. The Great Awakening report tends to specific issues. The significant test was the attention on the American character. Because of the distinctions in the character and races, the competition in the provinces developed. The competition being tended to is through the appearance of the evangelists. The test of rivalry isn't just a pioneer issue however involved both the houses of worship that overwhelmed during frontier time. The archive, then again, digs into saving of culture. Social standards and the kindness of administering individual are set to be a need in spite of the contention that is seen. Extraordinary Awakening positively affected the social effect of the assemblage. The new divisions considered both the cracking of the current arrangements and the new pilgrim rules. Extraordinary Awakening had consequences for the whole solidarity of the country.

Tuesday, August 18, 2020

Creating and Cultivating Global Parents COLUMBIA UNIVERSITY - SIPA Admissions Blog

Creating and Cultivating Global Parents COLUMBIA UNIVERSITY - SIPA Admissions Blog Alumna Stephanie Meade (MIA ’02)  launched an online magazine for parents raising little global citizens: InCultureParent.com. She says it will focus on culture, language, and traditions that appeal to parents raising  multicultural and multilingual children, as well as global parenting practices. “SIPA gave me the foundation and tools to  move my career in international relations to a new level. Plus  a community of amazing and talented friends who still inspire me. With children, I didnt want to travel as much as I used to in my career, so I chose to incorporate my passions into something that matters to me InCultureParent.com.”

Sunday, May 24, 2020

Lean-Burn Engines

Lean-burn means pretty much what it says. It is a lean amount of fuel supplied to and burned in an engine’s combustion chamber. Gasoline burns best in standard internal combustion engines when it is mixed with air in the proportions of 14.7:1 — nearly 15 parts of air to every one part of fuel. A true lean-burn can go as high as 32:1. If internal combustion engines were 100 percent efficient, the fuel would burn and produce just carbon dioxide (CO2) and water. But the reality is, engines are far less efficient and the combustion process also produces carbon monoxide (CO),  oxides of nitrogen (NOx)  and unburned  hydrocarbons in addition to CO2 and water vapor. In order to reduce these harmful exhaust emissions, two basic approaches have been used: Catalytic converters that clean up the exhaust gases coming from the engine, and lean-burn engines which produce lower levels of emissions by better combustion control and more complete fuel burning inside the engine cylinders. Engineers have known for years that a leaner air to fuel mixture is a frugal engine. The problems are, if the mixture is too lean, the engine will fail to combust, and a lower fuel concentration leads to less output. Lean-burn engines overcome these issues by employing a highly efficient mixing process. Specially shaped pistons are used along with intake manifolds that are located and angled to match the pistons. Additionally, the engine’s inlet ports can be shaped to cause â€Å"swirl† — a technique borrowed from direct injection diesel engines. Swirl leads to a more complete mixing of fuel and air that enables more complete burning, and in the process reduces pollutants without altering the output. The downside of lean-burn technology is increased exhaust  NOx  emissions (due to higher heat and cylinder pressure) and a somewhat narrower RPM power-band (due to slower burn rates of lean mixtures). To address these problems lean-burn engines have precise lean-metered direct  fuel injection, sophisticated computer controlled engine management systems and more complex  catalytic converters to further reduce NOx emissions. Today’s advanced lean-burn engines, both gasoline and diesel, achieve noteworthy fuel efficiency performance during both city and highway driving conditions. In addition to the fuel economy advantage, the design of lean-burn engines results in a high torque power output relative to horsepower rating. For drivers, this means not only savings at the fuel pump, but also a driving experience that includes a vehicle that accelerates quickly with fewer harmful emissions from the tailpipe.

Wednesday, May 13, 2020

Personal Statement Camping Trip - 856 Words

As I held my hand up high, I looked down at my chest and could see the shine glimmering off of my new badge. I repeated the oath after my new chief of police, swearing to uphold the law, the Constitution, and to serve the public. As I said the oath, I looked beyond the chief of police and could see my parents and I thought about how just years prior we were homeless and now my accomplishment brought joy to my family. However, the joy from my new career would run out rather quickly. Before I knew it, I found out that my new career would not last very long as I was confronted with a department plagued by corruption. I was ten years old when we left our home state. My father had recently been in two severe car accidents that had left him physically challenged. Not long after arriving in our new state, my parents left the apartment we had been staying in so we could go on an extended â€Å"camping trip†. The camping trip was last minute since we were evicted from where we had been staying. My parents were able to gather enough money together and we began to live out of various motels as the van my parents had was repossessed. Oddly enough, there was one thing that held my attention and kept me away from getting into any trouble while homeless, and that was law enforcement. I dreamed of the day that I would become a police officer. I idolized law enforcement; I thought the uniform looked sharp and I whole heartily believed in the concepts of helping the innocent and holdingShow MoreRelatedThe Nature Principle By Richard Louv1305 Words   |  6 PagesOne way of doing this is to go outside and play with them. How often have we all heard the phrase, practice what you preach, this is a perfect time to do just that. Whether you are going out for a walk around the neighborhood, a trip to the park or a family camping trip, we all need to take time to get outside more and connect with the beauty of nature all around us. It was interesting to read of Louv’s finding and connections he has made between nature and mental and emotional illnesses. I amRead MoreJourney Essay1466 Words   |  6 Pagesof this statement using the core text, with one piece of text from the BOS booklet together with two pieces of related material. All issues are to speak in relation to Sally Morgans inner journey. The inner journey is a concept that has always been debated, and so has its meaning. The word ‘inner has the alternative meaning of personal. Moreover, the word journey has an alternative meaning of movement. So, the concept of the inner journey, customarily, has the meaning of a personal movementRead More My Place by Sally Morgan, The Road Not Taken by Robert Frost, The Transall Saga and Pay it Forward1436 Words   |  6 Pagesalways been debated, and so has its meaning. The word ‘inner’ has the alternative meaning of personal. Moreover, the word journey has an alternative meaning of movement. So, the concept of the inner journey, customarily, has the meaning of a personal movement. Inner journeys have often been described as the metaphor behind a physical journey. The statement ‘Journey is the reward’ and the idea of a personal movement are depicted in the texts, My Place by Sally Morgan, The Road Not Taken by Robert FrostRead MoreEssay on informative speech about hiking1229 Words   |  5 Pagesï » ¿Speech title: Essentials for an overnight backpacking trip. Specific purpose: At the end of my speech, the audience will be able to understand the basic necessities to go on an overnight backpacking trip. Thesis statement/central idea: Overnight backpacking is fun and with basic understanding and knowledge, anyone can try it. Introduction Imagine yourself walking thru the wilderness, the leaves crunching underneath your feet, birds singing in the distance, squirrels playing in the trees†¦ AreRead MoreBrief Beginning Statement. From Any Walk Of Life, An Eagle1638 Words   |  7 PagesBrief Beginning Statement From any walk of life, an Eagle Scout will say what made them an Eagle was not the award, but the challenges they went through to obtain that rank. As I begin to come closer and closer to the finish line, I am beginning to realize that scouting has instilled upon me life lessons that I will never overlook. Scouting has revealed to me that under no circumstances will I be the best at anything if I do not persist and overcome. Also, it has bestowed upon me valuable lessonsRead MoreComm Informative Speech1167 Words   |  5 Pagesprayer iii. The first YMCA in America was established in Boston, Massachusetts B. Overview of the YMCA i. The YMCA has a significant value because of its mission statement which is to but Christian principles into practice through programs that build healthy, spirit, mind and body for all. The mission statement has a different meaning for everyone. ii. The YMCA is also built on 5 core values. The core values are honesty, respect, responsibility, caring, and faith. If you notice inRead MoreEssay about Reaching My Students Through Real World Experiences2039 Words   |  9 Pagesteachers face the challenge of preparing their students for the real world. Students need real world preparation, not just acumen. Reaching my students involves building encouraging relationships and a sense of security within the classroom. Sharing my personal experiences, as well as the testimonies of others, can be an effective motivational tool for preparing college-bound students for the real world. My role as a teacher involves communicating the many obstacles college students face. Providing studentsRead More1 Analysis Of The Dawn Appears With But1501 Words   |  7 Pageslike â€Å"as,† â€Å"since† or â€Å"like†); in this case her grief is not literally the â€Å"dark outlining the stars† but it’s a very pow erful image, and a moving one. The next stanza begins with possibly the most wonderful line in the poem, which speaks to personal survival, joy, and the continuation of life: â€Å"You laughed with the spirit of your husband who would toss stars!† (Harjo). Here Harjo uses the metaphor again, this time to compare the widow’s tears to a butterfly, which is both beautiful and fragileRead More Personal Narrative- Destruction of Nature Essay examples1624 Words   |  7 PagesPersonal Narrative- Destruction of Nature If you ever get a chance to visit Chaco Canyon National Monument in New Mexico, you should take the time to just stand in the desert and listen. The silence in this place is physical; you can feel it surround you. This is a silence with depth and layers that are unbroken even by the wind, which moves through emptiness and speaks only in occasional sighs through the canyons. The air itself is very clear—the lack of humidity gives the cliffs and buttesRead MoreThe Financial Data Of Publicly Traded Company Essay1344 Words   |  6 Pages An organizational leader, one with familiarity of financial statements and their impact on the business as a whole, has an opportunity to play a vital role in his or her position. The purpose of this paper is to collect, sort, and report on the financial data of publicly traded company. This is much like that which is performed by a Certified Public Accountant. In the case of this exercise, the information is presented from the perspective of a student and future business leader. A summary of both

Wednesday, May 6, 2020

Mao Zedong`s Dictatorship Free Essays

By all standards, Mao Zedong belongs in the company of the few great political men of our century. Born and raised in the obscurity and restrictions of nineteenth-century rural China, he rose to assume the leadership of the Chinese Revolution, rule the largest population in the world with the most pervasive and intense government known in history, and finally has clung to life long enough to become the last of the political heroes of the great generation of World War II. His life spans the emergence of modern China and his character has shaped the manner and style of the Chinese Revolution. We will write a custom essay sample on Mao Zedong`s Dictatorship or any similar topic only for you Order Now His name has become the label for revolutionary extremists throughout the world, â€Å"the Maoists,† yet it is Mao Zedong with whom leaders throughout the world seek audiences. The Pope in one day admits to his presence more people than Mao Zedong grants audiences in a year. When Mao last appeared publicly, more than a million people expressed tumultuous joy, and since then the occasions for allowing a select few into his presence have been newsworthy throughout the world. The announcement that the American Secretary of State has had a couple of hours of discussion with the Chairman is a signal to all that the Secretary has been favored, indeed, honored; and, of course, when a trip to China does not include a visit with the Chairman, the universal interpretation is that favor is being withheld. The extraordinary appeal of Mao Zedong is hard to identify. Some may suggest that it lies less in the man and more in the nature of Chinese society, for the Chinese do seem compelled to make all of their leaders into imperial figures. Yet, the fact remains that many non-Chinese, who have no affinity for his rural origins but represent a host of varied social and personal backgrounds, seem to find inspiration for their political lives in his words and his example. Restless youth scattered throughout the world who have more formal education than he had feel that in his revolutionary ardor and purity he speaks for them. What is the character of the man that lies behind all this greatness? Merely to raise the question is an act of sacrilege for many. For the Chinese and other worshippers of Mao and his thoughts, it is enough to dwell on his public virtues, read only hagiographies, and reject all else as being in bad taste. For his detractors, the whole spectacle is revolting, and Mao the man must be the devil behind the Chinese version of socialist totalitarianism. Yet between these extremes there are those who are honestly curious. The public record reveals a man at home in rural China, a man of the peasantry, who knows the myths and folklore of traditional China. Yet, although he received a Confucian education, Mao was also part of the first full generation of Chinese to explore Western knowledge. From his rural isolation, he moved effectively into the chaotic, competitive world of Chinese student politics and revolutionary scheming. As soldier, ideologist, and planner, he became the symbolic leader of the Chinese Communist guerrilla struggle. As victorious ruler he was a visionary who looked beyond immediate problems of administration to the goals of a new society and to the molding of a new form of man. The paradox of Mao Zedong is that while his claim to greatness is unassailable, in every specific sphere whether as philosopher, strategist, economic planner, ideologue or even world statesman, his qualities are not the match of his right to greatness. Since Mao’s greatness lies so clearly in the realm of emotions, the problem of Mao Zedong is a problem in political psychology. To treat Mao merely as an intellectual or as a calculating strategist is to miss the essential dimensions of his historic role. Furthermore, if we are to understand how Mao came to be so successful in mobilizing the feelings of the Chinese, and of others, we must explore his own emotional world and discover the dynamics of his psychic relations with others. As an individual, Mao is intrinsically fascinating. His acts and his words are startling and unexpected. In his conversations he will bring up the most unlikely subjects: Why are some Africans more dark-skinned than others? Have not all the advances in medical science only increased the number of diseases? The Chinese people have always known Marxism because they have always appreciated contradictions. A dedicated materialist, Mao can suddenly speak as a conventional believer in the hereafter: â€Å"I shall soon be seeing God† (Cheek 124). â€Å"When we see God, or rather Karl Marx, we will have to explain much† (Cheek 115).   At times he has depicted himself as an outstanding hero of Chinese history: â€Å"Yes, we are greater than Ch’in Shih Huang-ti† (Cheek 79). â€Å"We must look to the present to find our heroes† (Cheek 80). Intrinsic fascination aside, Mao’s character demands serious analysis because there is much in the history of modern China that cannot be explained except in terms of Mao Zedong’s personality. In the fluid circumstances of the Chinese Revolution, time and again events and processes took on decisive form in direct response to the personality of Mao Zedong. In stable societies with solid institutions the scope for the influence of personality considerations is constrained to the narrow limits of how different individuals may perform established roles. In the case of Mao Zedong there was no defined role for him to fill; rather his own personality created his own roles and thereby shaped Chinese history. When the story of modern China is systematically related to the activities of Mao, a key element of Mao’s genius is immediately highlighted: his remarkable capacity to perform different, and even quite contradictory, roles at different times. As Mao took on the roles of peasant organizer, military commander, ideological spokesman, political strategist, and ruling statesman, he also vacillated between such contradictory public persona as fiery revolutionary and wise philosopher; dynamic activist and isolated recluse; preacher of the sovereign powers of the human will and patient planner who knows that history cannot be rushed. In a very strange manner Mao Zedong has been able to communicate a sense of the integrity of the human spirit precisely because he has defied logic and spoken for exactly opposite points of view. He has praised books (indeed sanctified the presumed magic of his own â€Å"Little Red Book†) and he has denounced bookish knowledge–â€Å"Reading books only makes myopic children† (Cheek 117). He has equally extolled and denounced violence. He has championed reason and also scorned the paralyzing impulses of reasonableness. His intellectual integrity is as unassailable as folk wisdom, with its appropriate sayings for every option. Mao’s revolutionary ideas, like those of his intellectual compatriots elsewhere, drew inspiration from both experience (observing and doing) and intellectual exercise. They were a response to the genuine plight of large numbers of poor, illiterate, and exploited people, although they were also the result of profound romanticization and sometimes willful ignorance of who and what the people really were. They reflected a strong inclination to distrust complex patterns of administration and governance — in a word, bureaucracy-because these only served the interests of ruling elites; and they relied upon popular enthusiasm and passion as substitutes for technical expertise and intellectual sophistication, and too frequently as a means for mobilizing (and manipulating) the masses. Moreover, they displayed an inconsistency born of a human inability to divorce oneself completely from one’s cultural environment, with its heavy baggage of traditions, habits, and customs. Thus, rebellion against the decrepit and defeatist past of China was accompanied by appeals — sometimes disguised, sometimes not — to the social virtues, modes of discourse, and general spirit of that same past. If from a classical Marxist standpoint Lenin was wrong to represent Russia as an appropriate site for a Marxist revolution, Mao erred in proclaiming the same for China despite his disingenuous contention in 1942 that â€Å"Marxism-Leninism has no beauty, no mystical value; it is simply very useful† (Cheek 127). Much evidence existed, of course, to sustain an argument that China needed fundamental changes in its economic, social, and political order. Chinese had been debating this for many decades. It was also clear that foreign powers had an enormous impact on China’s development, fostering it in some ways, but distorting and exploiting it in others. Mao’s writings reveal that he understood quite well that his country’s vulnerability to external aggression resulted largely from internal weaknesses, and that this relationship lay at the heart of his analysis and his demand for revolution. The doctrine of the mass line did not develop in isolation but reflected what was arguably the most fundamental of Mao’s attitudes: voluntarism. Like Lenin, whose successes must have been instrumental in showing Mao the value of seizing the moment, Mao was a committed voluntarist — a believer in the ability of human will to overcome virtually any obstacle, despite the essential irrelevancy of human motivation to Marx’s revolutionary theory. By seeking to foster revolution in places unsuitable theoretically for such a process, both Lenin and Mao had to relinquish Marxist principle and emphatic determinism (the revolution will follow under the right, organically evolved, socioeconomic conditions) in favor of willful action (the revolution will occur under whatever conditions we can take advantage of). For the sake of possibly seeing the revolution transpire in their own lifetimes, they had to impose their own wills on circumstances and equate volition with accomplishment. Marxism’s attraction was, thus, also its weakness. The theory was supposed to ensure that revolution would occur, but it never promised that it would occur to suit the timetables of revolutionaries. For tremendously egotistical men like Lenin and Mao, Marxist determinism had to be balanced by a voluntarist spirit, men and women had to help make the revolution by whatever means they could be sold on, and time had to be made an ally and not an enemy. The succession to Mao Zedong will in time   worked out, and China has new leaders. Regardless of whatever private feelings they may have about Mao, they acknowledged his greatness in the making of modern China. As all great men in history he will be honored, especially by those who will seek the magic of his greatness to insure the legitimacy of their authority. Thus it is likely that as time goes by the public Mao became increasingly shrouded in myth, and it   became even more difficult to penetrate to the domain of the private man where must lie the secrets of his greatness. Just possibly, however, history may take a slightly different turn, and, as unlikely as it may seem now, there may be revelations of more facts about the life of Mao Zedong making it possible to evaluate better our interpretation of his greatness. Mao Zedong’s place in Chinese history is, however, secure, and his successors, whoever they may be, will be of quite different character. Mao’s belonged to the era of China’s response to the modern world: He wanted China to change, to become strong and powerful in the eyes of all the world; yet he also wanted China to be true to itself. He was a leader out of rural China, educated in a provincial setting, and unacquainted with any foreign language. His distrust of cities refiected in part that be was not at home with the more cosmopolitan generation of Chinese who went further in exploring foreign ways than he was ever ready to do. Works Cited Cheek, Timothy. Mao Zedong and China’s Revolutions: A Brief History with Documents. Boston: Bedfort, 2002. How to cite Mao Zedong`s Dictatorship, Essay examples

Monday, May 4, 2020

Explore How Shakespeare Creates a Dramatic Climax in the First Meeting between Romeo and Juliet Essay Example For Students

Explore How Shakespeare Creates a Dramatic Climax  in the First Meeting between Romeo and Juliet Essay The first meeting between Romeo and Juliet is a special moment in the play for numerous reasons: their love amid the hate of the feud between their families, the time of their meeting and the place in which they meet all contribute to the dramatic climax. To draw attention to Romeo and Juliets first meeting, Shakespeare uses the sonnet a complex and highly artificial verse form, popular in the 16th century and generally regarded as the proper medium for love poetry. Romeo starts with devout religious utterance: If I profane with my unworthiest hand, This holy shrine He develops the religious image for four lines, which rhyme alternately (ABAB), then Juliet picks up the same image, speaking the next four lines in the same pattern (with rhyme CBCB). A third quatrain is shared between the two (rhyme DEDE) and a final couplet is spoken the first line by Juliet, the second by Romeo, who clearly takes advantage to kiss Juliet at the end of this line. Then move not while my prayers effect I take The sonnet form is used to emphasise the lovers isolation from the society in which they live; and the way in which they share the same extended image and same verse form emphasises the harmony of their thoughts. Even so, one should notice that Juliet manages to tease Romeo a little within the solemn expression of devotion. The effect of the religious imagery is to show the strength and intensity of the relationship that is developing, as religious devotion is considered the highest devotion. The references to pilgrimage are also appropriate because in Italian the name Romeo means pilgrim to Rome. After the kiss, it appears that the lovers are about to start a second sonnet, but they are interrupted. This interruption could be seen as prophetic of the separation and ill-fortune to come. Dramatic irony creates tension as Romeo woos Juliet, unaware that Tybalt has just pledged to end his life for intruding on the Capulet celebrations. The love between Romeo and Juliet contrasts with the hate of Tybalt and the hate between the Capulets and Montagues, and this love amidst hate is one of the main themes of the play. Romeo himself says: Heres much to do with hate, but more with love The audience is challenged to make sense of this paradox. Prophetic irony is abundant in Romeo and Juliet: before they go to the Capulet ball, Benvolio tells Romeo to: Compare her face with some that I shall show And I will make thee think thy swan a crow. Romeo does, and the result is that Rosaline is forgotten and he falls in love with Juliet. However, the main purpose of prophetic irony in the play is to create tension: in Romeo and Juliet it is quite clear that the lovers have to die, that they are doomed. Shakespeare here has a simple conception of tragedy: that the lovers are the victims of circumstances. They are not responsible for their destinies: a terrible succession of twists of fate destroys them. Had any one of so many things been different, all would have been well: had Friar Laurences letter been delivered, had Juliet woken earlier, etc. These coincidences are hardly realistic, but they do serve an important dramatic purpose: because things keep going against the lovers we begin to feel that a hostile fate is working against them. Shakespeare deliberately encourages this view throughout the play. At the very beginning the chorus tells us that we are to see a pair of star-crossd lovers and from then on there are repeated ominous suggestions that Romeo and Juliet are fated to die. Even before Romeo has seen Juliet, as he is about to join Capulets party, he says: my mind misgives Some consequence yet hanging in the stars some vile forfeit of untimely death. He is, of course, right, and the audience, hearing these lines, fears as much. The moment after they have met, each lover has a similar foreboding that this love will end in disaster. When Benvolio says Away, be gone. The sport is at its best, Romeo replies Ay, so I fear, meaning he fears things can only get worse from now on. When he discovers that Juliet is a Capulet, Romeo says: Is she a Capulet? O dear account! My life is my foes debt. Juliet, on learning Romeos identity from the Nurse, says: Prodigious birth of love it is to me That I must love a loathed enemy References like these throughout the play gradually increase the air of foreboding and strengthen the impression, which the sad succession of hostile chances has given, that there is nothing Romeo and Juliet can do. One recurring kind of remark works particularly strongly to darken the atmosphere of the play. She herself first speaks like this the moment after she has met Romeo: Go ask his name If he be married My grave is like to be my wedding bed. Time and again, Shakespeare introduces the idea that Juliet will be the bride of Death. William Shakespeares Hamlet EssayThe other noticeable change in Romeo is best illustrated by Mercutios remarks: Why, is this not better now than groaning for love? Now art thou sociable, now art thou Romeo; now art thou what thou art, by art as well as by nature: for this drivelling love is like a great natural, that runs lolling up and down to hide his bauble in a hole. Romeo had been downhearted and melancholy whilst pining over Rosaline, but once he meets and falls in love with Juliet, his friends notice that a marked change in him, in that he is witty and sociable, and himself again. Juliet also undergoes a change, but she is never presumptuous and silly like Romeo in the earlier part of the play. She is modest, subdued, and quite without knowledge of the nature and power of love when we first meet her. When her mother suggests that Paris might make a good husband, Juliet simply replies: Ill look to like, if looking liking move. But no more deep will I endart mine eye Than your consent gives strength to make it fly For Juliet, the meeting with Romeo is an awakening to what love is, and with this she discovers a new resolution: she flatly contradicts her promise of obedience by marrying Romeo secretly. She emerges as a strong and practical personality far more so than Romeo. In the balcony scene, she addresses Romeo directly and plainly, asking down-to-earth questions to which Romeo replies with elaborate images. When she discovers that Romeo has overheard her confessing her love for him, she does not deny it, but with startling and winning directness dismisses all the forms of courtship: But farewell compliment! Dost thou love me? I know thou wilt say Ay. And I will take thy word. Shakespeare admired this kind of honesty: it is Juliet, one notices, who first mentions marriage and sets Romeo on to arrange it. Thus, both hero and heroine undergo a clear change. It is to make this plain that Shakespeare does not bring them together until the end of the first act. By then, we have got to know their characters and situation and can better appreciate the transformation that occurs. Seeing it, the audience cannot but admire their love, believe in its power and sympathise with the lovers predicament. The beauty of the scenes in which the lovers meet is in itself proof enough that Shakespeare wants the audience to respond wholly and totally to this love. Did he not want this, he would not have made it sound so attractive, nor would he have made Romeo and Juliet such appealing people. However there is a further significant element in the play which affects the audiences response. The parents that Romeo and Juliet defy are engaged in a feud. The love of the hero and heroine is set in a context of hate. This is an extremely important point to grasp. The plays first scene is concerned with this feud; we are made aware of it before ever we meet Romeo and Juliet. Indeed, it is the very first thing the Chorus mentions in the Prologue: Two households, both alike in dignity In fair Verona, where we lay our scene, From ancient grudge break to new mutiny, Where civil blood makes civil hands unclean Throughout the play the audience is constantly reminded of this feud. Although it is not revealed what began it (and so the audience cannot take sides) it is of very long standing (an ancient grudge). There is a reason that Shakespeare spends so much time on this feud: although everyone else in the play may be full of good sense, they are all also engaged in a feud which is the opposite of love. The audience cannot prefer their way of life to that of Romeo and Juliet, who want nothing to do with the feud. In short, the world of Romeo and Juliets love seems a haven of peace and love removed from all this brawling and hate. There are many factors that contribute to the dramatic climax at Romeo and Juliets first meeting. By the end of Act 1, Shakespeare has fully engaged the audience in the love story of which the first meeting is the beginning, yet it feels like a climax given its context and nature. The prologue tells the audience at the very beginning of the play that this is to be a great and tragic love story, and thus the lovers first meeting at the end of Act 1 is long-awaited and -expected by the audience, creating dramatic tension. The first meeting is short but intense private yet in a public place and tragedy immediately threatens. The young lovers are presented sympathetically, encouraging the audience to believe in the prospects of the relationship, even against their better judgement, and to rejoice at their happiness. The meeting also creates anticipation for the rest of the play, as the audience wonders what will become of Tybalt, the feud, and most importantly of Romeo and Juliet.

Saturday, March 7, 2020

The eNotes Blog Quoth The Raven Its My Birthday! Poes Poem turns168

Quoth The Raven Its My Birthday! Poes Poem turns168 Yesterday marked the anniversary of   the publication Edgar Allan Poes classic, creepy poem The Raven. Although there is some dispute, the first publication of the work is generally attributed to  The New York Mirror.   The poem made Poe a star, but sadly, not a fortune. In the poem, a raven continuously visits a man who has been unlucky in love. The object of his affections, a woman named Lenore has been lost to him evermore. The poems internal rhymes and alliteration, along with its spooky, supernatural content made its lines easy to remember and it soon became incredibly popular. Once upon a midnight dreary, while I pondered, weak and weary, Over many a quaint and curious volume of forgotten lore - While I nodded, nearly napping, suddenly there came a tapping, As of some one gently rapping, rapping at my chamber door. Tis some visiter, I muttered, tapping at my chamber door - Only this and nothing more. The appeal to a broad audience was no accident. Poe deliberately constructed his lines for popular appreciation, but, as he explains in his essay, The Philosophy of Composition, he also sought critical praise. It is my design, he argues,   to render it manifest that no one point in its composition is referrible [sic] either to accident or intuition - that the work proceeded, step by step, to its completion with the precision and rigid consequence of a mathematical problem. Let us dismiss, as irrelevant to the poem  per se,  the circumstance - or say the necessity - which, in the first place, gave rise to the intention of composing  a  poem that should suit at once the popular and the critical taste. Poes formula obviously worked, as it is still popular with both critics and the public alike to this day. Feeling like you want a little fright? Take a listen to the perennially  creepy Christopher Walken read the poem in its entirety:

Thursday, February 20, 2020

The Book of Romans Term Paper Example | Topics and Well Written Essays - 750 words

The Book of Romans - Term Paper Example Jewish Christian: What did you receive through Jesus? Saint Paul: I received apostleship and grace so that I would be able to proclaim the word of the lord. Jewish Christian: What was the main reason of writing the Book of Romans? Saint Paul: the main reason for writing this book was to share the word of God to all the people of Rome. Jewish Christian: why do you confer to the holy people residing in the city of Rome? Saint Paul: I confer to them through grace and peace that is obtained from God and passed to us through Jesus Christ. I believe that Grace is regarded as a blessing and strength from God. Divine peace indicates the presence of Christ in our mind and heart (Lin 32). Jewish Christian: Why are you not ashamed of the Good News? Saint Paul: This is because the power of God to offer salvation to every individual who believes in him. Jewish Christian: how will God deal each person during the hour of judgment? Saint Paul: Basically, according to what he or she has done. Being a teacher and apostle of God, I believe that I am a classic example of a person saved by the righteousness of God. We should be saved by God’s grace and not by the Jewish law (Stendahl 43). Jewish Christian: What is the true attitude of God towards sin? Saint Paul: regards of you being a Jew or a Christian, everybody will have to pay for their sins. Nobody can escape judgment day. Jewish Christian: Who is justified in the eyes of God? Saint Paul: The people who are justified in the sight of God are not the hearers of the law but it is the doers of the law. Jewish Christian: what are the personal questions that a Jew is supposed to ask himself? Saint Paul: if you are a person who teaches the Law of Moses to other, are you also teaching yourself? If you claim that a man should not steal, then why do steal? If you say thy shy not commit adultery, then why does someone commit adultery? You should follow the Laws of Moses to the latter. Jewish Christian: Who do you believe is a tru e Jew? Saint Paul: a true Jew is a person that follows his religion inwardly. This is a spiritual convent with you and your God. Jewish Christian: regardless of religion what can you say about righteousness? Saint Paul: A man will be regarded as righteousness as long as he places his faith on God. The law does not define this. Jewish Christian: Thank you for your time Saint Paul: you are welcome. Analysis and issues raised This book provides good insight of the perspective and sociological approaches that help to understand the practices of the Jewish communities. This was evident in the first century when the Romans and the Roman society were experiencing some tension with regards to Paul’s mission for the churches (Engberg-Pedersen 54). The Book of Romans is basically about the life of Paul, who is the apostle of Christ to the Jews and Gentiles. Despite the fact that this is not a comprehensive biography, this book provides a segment of Paul’s life when he had to str uggle with the spread of Gospel amongst God’s people. The issue of whether or not to engage with the Gentile mission was quite a daunting task since there was a serious tension in early Christianity while it was still a Jewish phenomenon. Paul had to deal with a clash between the Gentiles and the Jews both in the practical and theological terms. Paul had a difficult time defending the gospel. One of the reasons why Paul wrote the book to the Romans is because he saw that the Romans lacked leadership as there were no apostolic leaders (Porter 65). Christianity in Rome was not

Tuesday, February 4, 2020

Analysis on the cycle of violence of Hector Tobar's novel The Tattooed Essay

Analysis on the cycle of violence of Hector Tobar's novel The Tattooed Soldier - Essay Example In order to pinpoint the sketching of cycle of violence in the novel The Tattooed Soldier, it is much important to find out the basic information regarding the cycle of violence at the first place. In a literal context, the cycle of violence is a pattern to find out the way in which emotional or physical violence is observed among individuals. It should also be noted that the ultimately the cyclic pattern is more likely to end up as a revenge. There is no actual numbers of cycles that would be noted among individuals. It is mainly because it works in a systematic manner including incident noting, tension building, making up or reconciliation and calming down the victim. This cycle has been used in a couple of novels in pervasive manner. Tobar has also made use of the cycle of violence in his novel but in a very sensitive manner. Physical violence has been noted to as lesser in the fiction whereas in real life incidents, the cycle seems to continue and is much applicable (Tobar). The novel The Tattooed Soldier takes us to the journey of two individuals who are merely the immigrants in United States. The fact remains that both the characters of the novel namely Antonio and Longoria have shown their respective experiences in United States by emigrating from Guatemala. The author has basically shown that the cycle of violence provides two different roles to those who are involved with it. These roles are mainly for the victim and abuser. In the story, The Tattooed Soldier, it is much easier to note that the experiences of both the characters are merely different from each other. One has been the victim of the cycle of violence while the second have been the abuser in the cycle (Tobar). The character of Antonio seems to be the victim of the cycle of violence. His wife and son were killed in the war by a soldier named Longoria. As he was a new immigrant in United States, it was not easier for him to sustain a better and comfortable lifestyle in Los Angeles. It is because of this reason that Antonio had to leave his home as he could not pay the rent. The author has noted that the cycle of violence in the context of United States is critical for the immigrants. But even then the experiences of all immigrants can be different from each other. Following quote explains this very well, â€Å"Someone once told Antonio it was the pollution in the air that made the evening sky this way. Like everything else in Los Angeles,  even the beautiful sunsets were man-made† (Tobar 42). First of all, being a homeless person, Antonio ultimately had to be a victim of series of incidents where he had to be looked down upon. Emotionally, Antonio was broken that he is among the lower class who can not even afford the houses. He found out later that he had to live as a refugee which surely made him understand that he is the minority. The intensity is evident from the quotes â€Å"they were stacked...like disease cords of wood† (Tobar 69). The abusers as those who were working class did not give much concern to the homeless and considered them to be onus on the society. As a result, it was noted that Antonio becomes violent and spreads a message among people like him who could not get any job and had no place to live. Antonio shows the readers that the cycle of

Monday, January 27, 2020

Fish Recognition and Classification System Architecture

Fish Recognition and Classification System Architecture 1.1 Introduction In the previous chapter, the architecture and the approaches of object recognition and classification system were shown in details. Moreover, the features of shape characters of fish that will be used for classification stage are provided. Therefore, this chapter focuses on some background of literature approaches on related work and concepts in the field of object recognition and classification. In particular, a main component to design fish recognition and classification system architecture is used; it will show these experiments history of development in several cases. The following literature review is divided into four main sections. The fish recognition and classification, first aspect is covered. The second aspect relates with image segmentation techniques to segment underwater images are presented. Investigates most of the feature extraction and selection by shape representation and description, the third aspect is applied. Finally, the classifiers technique for object recognition and classification in aspect of support vector machine is reported. 1.2 Fish Recognition and Classification Recently, there were many researchers who attempted to design and apply the interaction between an underwater environment and learning techniques to develop the recognition and classification system in order to classify the fish. Therefore, Castignolles et al., (1994) used off-line method detection with static thresholds to segment the images that recorded by S-video tapes and enhance image contrast by using background lighting. Furthermore, to recognize the species a Bayes classifier was tested after extract twelve geometrical features from fish images. However, this method needs control on the light of background, determine the value of threshold and multiple imaging. Moreover, where fish are lined up close to each other, the applications tend to be impractical for the real-time. The moment-invariant for features extraction is fast and very easy to implement. Therefore, Zion et al. (1999) stated the features extraction from dead fish tails by using moment-invariants in order to identify of species. Moreover, the image area is used to estimate fish mass. Furthermore, the accuracy of 99%, 93% and 93%, respectively, for grey mullet, St. Peters fish and carp is got for identification of fish species. Therefore, later Zion et al., (2000) tested this method with live fish swimming in clean water. The accuracies were 100%, 91% and 91%, respectively for fish species identification. However, the features of the tail in the image which were extracted by the moment-invariant are strongly affects by the water opaqueness and fish motion. This method needs clear environments and all features appear clearly. An automatic system to select the desirable features for recognition and classification object is needed. Therefore, Chan et al., (1999) developed a 3D point distribution model (PDM) in order to extract the lateral length measurement automatically from the images without an extensive user interaction to locate individual landmark points on the fish by using an n-tuple classifier as a tool to initiate the model. Moreover, the WISARD architecture is used as a Look-Up Table (LUT) which holds information about the pattern that the classifier tries to recognize, in order to assess the performance and usefulness of the n-tuple classifier in the application of fish recognition. However, this method needs to fix the pre-defined threshold value, amount of prior knowledge for the fish and the bigger training set. Determine the landmarks as tips of snout or fins for fish are very important to recognize the fish. Therefore, Cardin Friedland (1999) stated the morphometric analysis by biometric interpretation of fish homologous landmarks as tips of snout or fins for fish stock discrimination. However, they did not refer to algorithms for determining landmarks and the external points are not satisfactory because their locations are subjective. From other aspect, Cardin (2000) reviewed the landmarks of shape by using morph metric methods for stock identification of fish. Moreover, Winans (1987) used the fins points, extremities point and arbitrarily landmarks in order to identify the fish from those points. Therefore, the attachment of fin membranes were found to be more effective for finfish group discrimination than landmarks located on extremities. Furthermore, Bookstein, (1990) stated the homologous landmarks were found to be more effective in describing shape than other arbitrarily located landmarks. However, these methods should be considered fish sample size, life history, stage of development and the features discriminating power. Fourier descriptor for geometric features description is very famous algorithm. Therefore, Cadieux et al., (2000) stated the Fourier descriptors of silhouette contours, the geometric features described by seven of moment-invariants stated by Hu (1962) are developed in order to count fish by species from fish ways mounted next to river. Therefore, the 78% of accuracy is achieved by using a majority vote of three classification methods. However, this method needs sensors that generate silhouette contours as the fish swim between them and the hardware based on a commercial biomass counter. The manual measurement for the landmarks points is more accurate to identify the object. Therefore, Tillett et al., (2000) proposed the modification of point distribution model (PDM) in order to segmented fish images by means is proposed. Moreover, the edge and its proximity in order to attract landmarks are considered. Furthermore, the average accuracy of 95% by estimating fish length to manual measurement is compared. However, this method required manual placement of the PDM in an initial position close to the centre of the fish, thereby affecting the accuracy of the final fitting. Also, neighboring fish images forced the PDM away from the correct edges and fish whose orientation was very different from the initial PDM or were smaller than the initial values could not be correctly fitted. The combining of more than one classifier is important to get more accuracy to classify the objects. Therefore, Cedieux et al., (2000) proposed intelligent system by combining the result of three classifiers in order to recognize the fish. Therefore, Byes maximum quantification classifier, a learning vector classifier and One-class-One-Network of neural network classifier are used by analysis algorithm of an infrared silhouette sensor to acquire the fish and the majority vote. Moreover, the results depended on at least two from three classifiers should be show the same result. However, this method needs other approach for feature selection in order to improve the recognition performance and to optimize the selection of relevant characteristics for fish classification. Moreover, it needs more computational to identify and classify the object. Detection, representation the features of object and then the classification are the main steps for any recognition and classification system. Therefore, Tidd Wilder (2001) stated a machine vision system to detect and classify fish in an estuary by using a video sync signal to drive and direct the strobe lighting through a fiber bundle into a 30 cmÃÆ'-30 cmÃÆ'-30 cm field of view in a water tank. Moreover, to segment fish images and eliminate partial fish segments, the window-based segmentation algorithm and an aspect ratio are used by means of the segment aspect ratio and a length test. Furthermore, Bayes classifier is used to classify three fish species from extracted fish image area and aspect ratio. However, this method is tested on only 10 images of each of the species, and needs more computation. Moreover, they concluded that the system and method have the potential to operate in situ. The monitoring objects in underwater is difficult problem. Therefore, Rife Rock (2001) proposed Remotely Operated Vehicles (ROV) in order to follow the marine animal in underwater. However, this method needs continuous hours of the pieces movements. Locating the critical points of object is very important to determine the length, weight and the area of the objects. Therefore, Martinez et al., (2003) stated an underwater stereo vision system is used to calculate the weight of fish from their length by using a prior knowledge of the species in order to find points of the fish image and linking them with real-world coordinates. Moreover, in order to find caudal fin points and the tip of the head, the template matching with several templates is used. Furthermore, accuracy of 95% and 96% for estimated fish weight is reported. However, this method needs a prior knowledge of the species, critical points to calculate the length and only used to find the weight. The shape of object is very important feature to recognize and identify the objects. Therefore, Lee et al., (2003) developed automated Fish Recognition and Monitoring (FIRM) system, as shape analysis algorithm in order to locate critical landmark points by using a curvature function analysis. Moreover, the contour is extracted based on these landmark points. Furthermore, from this information species classification, species composition, densities, fish condition, size, and timing of migrations can be estimated. However, this method utilizes high-resolution images and determines the location for the critical points of fish shape. In a conventional n-tuple classifier, the n-tuple is formed by selecting multiple sets of n distinct locations from the pattern space. Therefore, Tillett Lines (2004) proposed an n-tuple binary pattern classifier with the difference between two successive frames in order to locate the initial fish image for detecting the fish head. Moreover, the dead fish hanging in a tank are used to estimate the mean mass. However, the estimation accuracy was low for live fish images due to poorer imaging conditions and larger fish population density. The different features can used together to classify the object. Therefore, Chambah et al., (2004) proposed Automatic Color Equalization (ACE) in order to recognize the fish spaces. Furthermore, the segmentation by using background subtraction was presented. The geometric features, color features, texture features and motion features are used. Then, Bayes classifier is used to classify the selected fishes to one of the learned species. However, this method depends on the color features that need lightness constancy and color constancy to extract visual information from the environment efficaciously. The semi-local invariants recognition is based on the idea that a direct search for visual correspondence is the key to successful recognition. Therefore, Lin et al., (2005) proposed neighbor pattern classifier by semi-local invariants recognition to recognize the fish. Moreover, when they compare it with integral invariants, they found it less mismatching. Furthermore, they compare wavelet-based invariants with summation invariants and found it has more strong immunity to noise. However, this method needs some critical point of the fish shape. The Bayesian filter was originally intended for statistical recognition techniques, and is known to be a very effective approach. Therefore, Erikson et al. (2005) proposed fish tracking by using Bayesian filtering technique. Moreover, this method models fish as an ellipse having eight parameters. However, this method considers only counting the fish without looking into its type. Furthermore, the fish may be having varying in number of the parameters. From other aspect, Lee et al., (2008) stated several shape descriptors, such as Fourier descriptors, polygon approximation and line segments in order to categorize the fish by using contour representation that extracted from their critical landmark points. However, the main difficulty of this method is that landmark points sometimes cannot be located very accurately. Moreover, it needs a high quality image for analysis. Table 1.1: Critical Analysis of Relevant Approaches Author Algorithm Remarks Castignolles et al. 1994 Off-line method This method needs control on the light of background, determine the value of threshold. Moreover, where fish are lined up close to each other, the applications tend to be impractical for the real-time. Zion et al., 1999 Moment-invariants The features of the tail in the image which were extracted by the moment-invariant are strongly affects by the water opaqueness and fish motion. Therefore, this method needs clear environments and all features appear clearly. Chan et al. 1999 PDM this method needs to fix the pre-defined threshold value, amount of prior knowledge for the fish and the bigger training set. Cardin and Friedland 1999 Morphometric analysis They did not refer to algorithms for determining landmarks and the external points are not satisfactory because their locations are subjective. Cardin 2000 Develop Morphometric analysis These methods should be considered fish sample size, life history, stage of development and the features discriminating power. Cadieux et al. 2000 Fourier descriptor This method needs sensors that generate silhouette contours as the fish swim between them and the hardware based on a commercial biomass counter. Tillett et al. 2000 Modify PDM This method required manual placement of the PDM in an initial position close to the centre of the fish, thereby affecting the accuracy of the final fitting. Also, neighboring fish images forced the PDM away from the correct edges and fish whose orientation was very different from the initial PDM or were smaller than the initial values could not be correctly fitted. Cedieux et al. 2000 Intelligent System This method needs other approach for feature selection in order to improve the recognition performance and to optimize the selection of relevant characteristics for fish classification. Moreover, it needs more computational to identify and classify the object. Tidd and Wilder 2001 Machine Vision System This method is tested on only 10 images of each of the species, and needs more computation. Moreover, they concluded that the system and method have the potential to operate in situ. Rife and Rock 2001 ROV This method needs continuous hours of the pieces movements. Martinez et al., 2003 Template Matching This method needs a prior knowledge of the species, critical points to calculate the length and only used to find the weight. Lee et al. 2003 FIRM This method utilizes high-resolution images and determines the location for the critical points of fish shape. Tillett and Lines 2004 n-tuple The estimation accuracy was low for live fish images due to poorer imaging conditions and larger fish population density. Chambah et. al. 2004 ACE This method depends on the color features that need lightness constancy and color constancy to extract visual information from the environment efficaciously. Lin et al., 2005 Neighbor Pattern Classifier This method needs some critical point of the fish shape. Erikson et al. 2005 Bayesian Filtering Technique This method considers only counting the fish without looking into its type. Furthermore, the fish may be having varying in number of the parameters. Lee et al. 2008 Several Shape Descriptors The main difficulty of this method is that landmark points sometimes cannot be located very accurately. Moreover, it needs a high quality image for analysis. 1.3 Image Segmentation Techniques Basically, there are different techniques that would help to solve the image segmentation problems. Therefore, Jeon et al., (2006) categorized these techniques into, thresholding approaches, contour approaches, region approaches, clustering approaches and other optimization approaches using a Bayesian framework, neural networks. Moreover, the clustering techniques can be categorized into two general groups: partitional and hierarchical clustering algorithms. Furthermore, partitional clustering algorithms such as K-means and EM clustering are widely used in many applications such as data mining, compression, image segmentation and machine learning (Coleman Andrews 1979; Carpineto Romano 1996; Jain et al., 1999; Zhang 2002a; Omran et al., 2006). Therefore, this research will focus on the literature review relates with image segmentation techniques to segment fish of underwater images by using k-means algorithm and background subtraction approaches. 1.3.1 K-Means Algorithm for Image Segmentation In general, the standard K-means clustering algorithm is employed in order to cluster a given dataset into k groups. Therefore, the standard K-means algorithm consists of four steps: Initialization, Classification, Centroid computation and Convergence condition. Moreover, several methods attempt to improve the standard K-means algorithm related to several aspects associated to each of the algorithm steps. Furthermore, regarding the computational of the algorithm the steps that need more improvements are initialization and convergence condition (Amir 2007 Joaquà ­n et al., 2007). Therefore, the following sections will be focused on this step in order to represent and address the review for this step. 1.3.1.1 The Initialization Step of K-Means Algorithm Basically, the earliest reference to initialize the K-means algorithm was by Forgy in 1965 that choose points randomly and used as the seeds. Therefore, MacQueen, introduced to determine a set of cluster seeds by using an online learning strategy (MacQueen 1967 Stephen 2007). However, this method can be choosing the point near a cluster centre or outlying point. Moreover, repeating the runs is the increased time taken to obtain a solution. The approach in order to divide the dataset to classes without prior knowledge of classes is required. Therefore, Tou Gonzales (1974) suggested the Simple Cluster Seeking (SCS) method by Calculating the distance between the first instance in the database and the next point in the database, if it is greater than some threshold then select it as the second seed, otherwise move to the next instance in the database and repeat until K seeds are chosen. However, this method depends on the value of threshold, the order of pattern vectors to be processed and repeating the runs is the increased time taken to reach the seeds chosen. For optimal partition of dataset which can achieve better variation equalization than standard. Therefore, Linde et al., (1980) proposed a Binary Splitting (BS) method, based on the first run for K = 1, Then split into two clusters until convergence is reached and the cycle of split and converge is repeated until a fixed number of clusters is reached, or until each cluster contains only one point. However, this method increased the computational complexity by split and the algorithm must be run again. Good initial seeds for clustering algorithm are significant in order to rapidly converge to the global optimal structure. Therefore, Kaufman Rousseeuw (1990) suggested selecting the first seed as the most centrally located instance, then the next seed selected based on the greatest reduction in the distortion and continue until K seeds are chosen. However, this method needs more computation in choosing each seed. In order to select the optimal seed artificial intelligence (AI) is used. Therefore, Babu Murty (1993) and Jain et al., (1996) proposed a method by using genetic algorithms based on the various seed selections as population, and then the fitness of each seed selection is assessed by running the K-means algorithm until convergence and then calculating the Distortion value, in order to select of near optimal seed. However, this method should be run K-means for each solution of each generation. Moreover, a genetic algorithms result depends on the choice of population size, and crossover and mutation probabilities. Enhancement approach in order to improve the clustering quality and overcome computational complexity is required. Therefore, Huang Harris (1993) stated the Direct Search Binary Splitting (DSBS) method, based on Principle Component Analysis (PCA), in order to enhance splitting step in Binary Splitting algorithm. However, this method also required more computational to reach k seeds chosen. Calculating the distance between all points of dataset in order to select the seed is used. Therefore, Katsavounidis et al. (1994) proposed the algorithm as the KKZ algorithm based on preferably one on the edge of the data as the first seed. Then, chosen the second seed based on the point which is furthest from the first seed. Moreover, choosing the furthest point from its nearest seed is repeated until K seeds are chosen. However, this method obvious pitfall from any noise in the data as preferably seed. In order to increase the speed of the algorithm based on divide the whole input domain into subspaces is required. Therefore, Daoud Roberts (1996) proposed approach to divide the whole input domain into two disjoint volumes, and then this subspace is assumed that the points are randomly distributed and that the seeds will be placed on a regular grid. However, this methods refers at the end into randomly choose. The mean of the any dataset is important value in order to estimate the seed depends on it. Therefore, Thiesson et al., (1997) suggested approach to calculate the mean of the entire dataset based on randomly running time of the algorithm to produce the K seeds. However, this method uses the random way to repeat the steps until reach the desirable clusters. In order to find better clustering initialization of k-means algorithm, Forgys method is used. Therefore, Bradley Fayyad (1998) presented a technique that begins by randomly breaking the data into 10, or so, subsets. Then it performs a K-means clustering on each of the ten subsets, all starting at the same set of initial seeds, which are chosen using Forgys method. However, this method needs to determine the size of the subset and used the same initial seed for each subset. A way of reducing the time complexity of initialization for k-means algorithm calculation is to use structures like k-d trees. Therefore, Likas et al., (2003) stated a global K-means algorithm which aims to gradually increase the number of seeds until K is found, by using the kd-tree to create K buckets and use the centroids of each bucket as seeds. However, this method needs to test the results to reach the best number of clusters. The performance of iterative clustering algorithms depends highly on initial cluster centers. Therefore, Mitra et al., (2002) and Khan Ahmad (2004) proposed a Cluster Centre Initialization Method (CCIA) based on the Density-based Multi Scale Data Condensation (DBMSDC) by estimating the density of the dataset at a point, and then sorting the points according to their density and examining each of the attributes individually to extract a list of possible seed locations. The process is repeated until a desired number of points remain. However, this method depends on other approach to reach the desired seeds, which lead to more computation complexity. On the other read, in order to reduce the time complexity of initialization for k-means algorithm calculation is to use structures like k-d trees. Therefore, Stephen Conor (2007) presented a technique for initializing the K-means algorithm based on incorporate kd-trees in order to obtain density estimates of the dataset. And then by using the distance and the density information sequentially to select K seeds. However, this method occasionally failed to provide the lowest value of distortion. Table 1.2: Critical Analysis of Relevant Approaches Author Algorithm Remarks Forgy 1965 and MacQueen 1967 Random initial K-means This method can be choosing the point near a cluster centre or outlying point. Moreover, repeating the runs is the increased time taken to obtain a solution. Tou and Gonzales 1974 SCS This method depends on the value of threshold, the order of pattern vectors to be processed and repeating the runs is the increased time taken to reach the seeds chosen. Linde et al., 1980 BS This method increased the computational complexity by split and the algorithm must be run again. Kaufman and Rousseeuw 1990 Selecting the first seed. This method needs more computation in choosing each seed. Babu and Murty 1993 GA This method should be run K-means for each solution of each generation. Moreover, a genetic algorithms result depends on the choice of population size, and crossover and mutation probabilities. Huang and Harris 1993 DSBS This method also required more computational to reach k seeds chosen. Katsavounidis et al. 1994 KKZ This method obvious pitfall from any noise in the data as preferably seed. Daoud and Roberts 1996 two disjoint volumes This methods refers at the end into randomly choose. Thiesson et al. 1997 the mean of dataset This method uses the random way to repeat the steps until reach the desirable clusters. Bradley and Fayyad 1998 randomly breaking technique This method needs to determine the size of subset and the same initial seed for each subset. Likas et al. 2003 Global K-means This method needs to test the results to reach the best number of clusters. Khan and Ahmad 2004 CCIA This method depends on other approach to reach the desired seeds, which lead to more computation complexity. Stephen and Conor 2007 kd-trees This method occasionally failed to provide the lowest value of distortion. 1.3.2 Background Subtraction for Image Segmentation The basic approach for automatic object detection and segmentation methods is the background subtraction. Moreover, it is a commonly used class of techniques for segmenting out objects of a scene for different applications. Therefore, Wren et al., (1997) proposed running Gaussian Average based on ideally fitting a Gaussian probability density function on the last n pixels values in order to model the background independently at each pixel location. Moreover, to increase the speed the standard deviation is computed. Therefore, the advantage of the running average is given by the low memory requirement instead of the buffer with the last n pixel values are used. However, the empirical weight as a tradeoff between stability and quick update is often chosen. The detection of objects is usually approached by background subtraction based on multi-valued background. Therefore, Stauffer Grimson (1999) proposed the multi-valued background model in order to describe the foreground and the background values. Moreover, the probability of observing a certain pixel value at specific time by means of a mixture of Gaussians is described. However, this method needs assigning the new observed pixel value to the best matching distribution and estimating the updated model parameters. Density estimators can be a valuable component in an application like in the use of object tracking. Therefore, Elgammal et al. (2000) proposed a non-parametric model based on Kernel Density Estimation (KDE) by using the last n background values, in order to model the background distribution. Moreover, the sum of Gaussian kernels centered as one sample data by the most recent n background values as background is given. However, complete model estimation also requires the estimation of summation of Gaussian kernels. The eigen-decomposition methods are computationally demanding by involving the computation of each eigenvector and corresponding eigenvalues. Therefore, Oliver et al., (2000) proposed eigen backgrounds approach based on eigenvalues decomposition by using the whole image instead of blocks of image. Moreover, this method can be improving its efficiency, but depend on the images used for the training set. However, this method not explicitly specified what images should be part of the initial sample, and whether and how such a model should be updated over time. In order to generate and select of a plurality of temporal pixel samples derived from incoming image, the temporal median filter is used. Therefore, Lo Velastin (2001) proposed temporal median filter based on the median value of the last n frames as the background model. Moreover, Cucchiara et al. (2003) developed the temporal median filter by computing the last n frames, sub-sampled frames and the time of the last computed median value in order to compute the median on a special set of values. However, the disadvantage of the temporal median filter approach, the computation by a buffer with the recent pixel values is required. Moreover, the median filter does not provide a deviation measure for adapting the subtraction threshold. The information of the difference frames is accumulated, in order to construct a reliable background image. Therefore, Seki et al., (2003) proposed the background subtraction based on co-occurrence of image variations. Moreover, it works on blocks of N x N pixels treated as an N2 component vector, instead of working at pixel resolution. However, this method offers good accuracy against reasonable time and memory complexity. Furthermore, a certain update rate would be needed to cope with more extended illumination changes. Background modeling of a moving object requires sequential density estimatio

Sunday, January 19, 2020

Busl250 – Mid Semester Notes

BUSL250 – Mid-semester Notes Liabilities * Harm may be caused deliberately or carelessly * One person’s single harmful act to another person (deliberately or carelessly) can give rise to one or more legal liabilities * Legal Liabilities Tortious Liability: harmful act can be a tort (civil wrong), other than breach of contract, remedy is compensation (commenced through litigation) * Vicarious Liability: Liability for harmful act caused by another * Statutory liability: harmful act by breach of statute, prosecution is punishment * Contractual liability: harmful act by breach of contract, remedy is compensation * Criminal liability: harmful act and harmful act is a crime, incurs criminal liability, prosecution for punishment * A harmful act may incur one or more legal liabilities Tortious vs. contractual liability: tortious liability can incur in the absence of contract but contract liability can only incur if a contract exists. * Difference between tortious liability and criminal liability * Consequences of causing harm Tort of trespass * Trespass is actionable per se, which means that there is no need for the plaintiff to prove actual loss or damage in order to commence a civil action against the trespasser. It is, however, necessary to prove that the interference was either intentional or negligent. * Types of trespass You commit the tort of trespass to land if you directly and intentional interference with land in the rightful possession of X without X’s consent of other excuse. Lord Bernstein of Leigh (Baron) v Skyviews & General Ltd [1978] 1 QB 479 * * Doesn’t need to be physical trespass of airspace * A tenant in rightful possession of land has the right to sue for trespass, including the right to sue the landlord if the landlord enters the land without permission or lawful excuse. * No trespass to land if there is no attempt to make it clear that you are not welcomed to their land. i. e. mplied permission * You commit the tort o f trespass to goods if you directly and intentionally interfere with goods in the possession of X, without X’s consent or other excuse * Trespass against goods: direct and intentional interference with or use of personal property of another * Conversion: intentionally using/dealing the goods that is inconsistent with the owner or their rightful possession of the good * Dentine: committed when someone either intentionally or careless detains the goods of another. (i. e. carelessly through loosing the good not able to give back when demanded) * Trespass to persons: You commit the tort of battery if you directly, intentionally or negligently cause contact with the body of x without X’s consent. Courts established plaintiff’s not entitled to insist that no one ever touch them, and that a certain minimal level of physical contact is an unavoidable element of daily life. Rixon v Star City Pty Ltd [2001] NSWCA 265 * You commit a tort of assault if you unlawfully threat en another with imminent physical harm * You commit the tort of false imprisonment if you cause total deprivation of X’s freedom of movement without lawful justification or excuse * Defences * Accident * Consent * Necessity Self defence (usually for trespass to person) * Defence of property (usually for trespass to person) Tort of nuisance * You commit the tort of nuisance if you indirectly interfere (i. e. interfere with no actual physical contact e. g. through noise) with X’s use and enjoyment of private or public land * 2 types * Private nuisance * Public nuisance * Defences: * Consent from plaintiff (expressed or implied) * Statutory legislation * Contributory negligence Tort of defamation * You commit the tort of defamation if you publish to a third party, spoken or written form, a statement about x that would damage the reputation of X.Economic torts * Tort of deceit: a tort committed when one person makes a fraudulent misrepresentation to another * If you tell s omeone the truth then something happens that changes those facts, you must notify persons of that change or you will be charged with misrepresentation * You must know that the information you gave was false to misrepresent * No defence to expect plaintiff to check the information * Tort of passing off: a tort committed when one person misrepresents themselves or their product as having some kind of connection with another person or business.Pacific Dunlop v Hogan. * Tort of intimidation: a tort and/or crime committed when one person threatens to commit an unlawful act to force another to do something against their interest Rookes v Barnard. * Tort of interference with contractual relations: a tort committed when one person knowingly induces another to break a contract with a third party. Lumley v Wagner. *

Saturday, January 11, 2020

Filipino Core Values Essay

From the articles that I had read, will reflect the readers’ understanding on different Filipino values, how it defines one, what it means, and if one’s personality changes to fit certain situations. Filipino values have been derived from racial strains and cultural elements such as Aeta, Indonesians, Malayan, Hindu and Chinese which formed the core of our moral conscience, cultural identity coupled with the cultural elements derived from Spain, the United States and from the modern global community, (Panopio and Rolda, 2000). These values are Pagkalinga, Pag-aaruga, Pakialam, Pakikisama, and the Feminist Ethics of Care. Here in the Philippines, values are very important and should be respected. As we grow older, our parents shaped us different values. From the day we are born, Pagkalinga, Pag-aaruga, at Pakialam(Care) were given by them. In our culture, Filipinos were very caring to someone especially to our love ones because caring symbolizes that you loved them deeply and you remember them all the time. This value molds our true Filipino faith, which shows that we are mindful about others. This article wants to show values that are ever-present but seldom acknowledged, much less recognize in the Filipino society. The other one is the Feminist Ethics of Care, it discussed here that how they value the right of men and women. In the article that I have read, they most value the importance of men than women, because the traditional view is that men’s concerns are the more important things such as money, career, advancement and ideas. Women’s preoccupations are under-valued and deemed as less important, such as families, neighbors, friends, and caring. As I interpret it, women are less important before because they knew that they can’t do the things that men can do. I realized that caring is a value that we, Filipino women and men alike, should recognize and give importance to. Pakikisama shows that how Filipino Mingle to others and how they create a good relationship of every individual. In the practice of pakikisama many things are unsaid. Mostly, things are implied in behavioral patterns. This is the typical way of Filipinos relate with one another. As a concept and a trait, it invites us to do good by responding to the call of the others so that we may practice one’s ability that all relationships depends on—the ability to be good and nice companion.

Friday, January 3, 2020

Essay On Plagiarism - 1306 Words

Benjmain Bell Professor Malena Prinzing CIS 50 21 September 2017 Plagiarism in College Work Plagiarism takes various forms. A student may plagiarize doing something as extreme as purchasing a paper, hiring someone to write a paper or turning in a paper freely provided by a friend. Many students unknowingly commit Plagiarism by failing to properly cite their sources crediting the authors. Still others cite, but plagiarize by copying much too much and writing far, far too little of their own synthesized thoughts and ideas. Students must be careful about copying too much. If a paper is mostly other writers’ material, that can be considered Plagiarism, even if the student credits their sources. What Exactly is Plagiarism? According to†¦show more content†¦Sometimes lack of interest may result in a student choosing to Plagiarize instead of taking the time to do a well thought out paper. Brian Domino, a professor of Philosophy wrote a letter to the Chronicle of Higher Education explaining why he believes students plagiarizing goes beyond just wanting to finish quickly. He believed the main cause is a lack of interest and passion in the material being studied. â€Å"A student who plagiarizes has not been asked to reflect on something of importance to her, at least not in a way that she finds meaningful† (Domino, 2007). He tries to get his students to connect with the subject they are studying on a more personal level to inspire meaningful work. Plagiarism Detection How do professors know when students plagiarize? One big give away is when poor or mediocre writing gives way to extremely sophisticated writing. It is clear that the same person did not author both. Another obvious clue to an instructor that a paper has been plagiarized through extensive copy and pasting is randomly formatted text perhaps still including blue hyperlinks and/or random text unrelated to the paper topic. When a professor becomes suspicious of a paper, the professor can use various tools and techniques to investigate. â€Å"Many plagiarism detection approaches involve the comparison of billions of lines of text in large referenceShow MoreRelated Plagiarism Essay1731 Words   |  7 PagesPlagiarism missing works cited Plagiarism is a distinguished sounding word. One would almost think that it sounds like some lofty philosophical ideal named for the great Greek teacher Plagiarus, something to be aspired to. This is not so. Plagiarism is in fact a moral misdemeanor, and an academic felony. By definition, plagiarism is a piece of writing that has been copied from someone else and is presented as being your own work. Socrates, Plato and Aristotle would have frowned on such a practiceRead MorePlagiarism Essay1649 Words   |  7 PagesI think there was far more plagiarism in the last century. It was almost an accepted part of writing. The ethics of writing has changed. Nobody gets upset about whether Shakespeare plagiarized something. But I think the standards have to be pretty high now, particularly for non-fiction writers. [1] Introduction to Plagiarism According to most leading authorities, including The Office of Research Integrity, plagiarism includes both the theft or misrepresentation of intellectual property and theRead More Plagiarism Essay1189 Words   |  5 PagesPlagiarism For many, many years schools have been trying to stop students from plagiarizing materials. Detecting this plagiarism used to be easy because students only had access to books in the library, magazines, and encyclopedias. However, as the popularity of the Internet increased, so did the number of essays and papers being plagiarized. Students can easily go onto the internet and in no time at all find and essay on their topic of choice. For a certain fee they can buy the essay andRead MorePlagiarism Essay887 Words   |  4 PagesIntroduction Plagiarism is copying another persons ideas, words or writing and pretending that they are ones and one’s own work. Whenever another persons work is copied and republished without an appropriate reference it is considered plagiarism. Because it is so easy to copy and paste digital information, plagiarism in the information age has become a serious problem. The best way to avoid plagiarism is to avoid reading anything written by somebody else. In simple words plagiarism is kidnappingRead MoreEssay On Plagiarism1242 Words   |  5 PagesIn colloquial language plagiarism is the concept of stealing someone’s piece of work or someone’s idea. It is clear that plagiarising is unjust and immoral, however now a days it is becoming more difficult to come up with original ideas as the media allows students to have open access to all information and the producer or author must be very careful to not use somebody else’s work unintentionally and claim it as theirs. It is important to educate students about plagiarism as it can carry major consequencesRead MoreEssay on Plagiarism1832 Words   |  8 PagesImmature poets imitate; mature poets steal - TS Eliot Plagiarism is, as defined by the Council of Writing Program Administrators, is â€Å"in an instructional setting, plagiarism occurs when a writer deliberately uses someone else’s language, ideas or other original (not common-knowledge) without acknowledging its source.† Plagiarism is a nice word for cheating. [1] Analyzing that sentence, â€Å"deliberately† and â€Å"without acknowledging its source† are the keywords that cause a lot of confusion in theRead More The Problem of Plagiarism Essay1729 Words   |  7 Pagesresearching topics and sharing ideas, these same students are faced with the temptation to simply copy and paste information as they find it. Instances of plagiarism are on the rise, yet teachers are in a position where they cannot discontinue this type of assessment. Therefore, teachers face the question: How can we stop the rise of plagiarism among students? Input Since teachers have given assessments of any kind, students have attempted to find ways to cheat. Whether they were looking at anotherRead MoreOvercoming Plagiarism Essay1247 Words   |  5 Pages Plagiarism is an ever-increasing problem throughout the world today, as the internet, along with technology such as Iphones and Tablets, has made accessing another person’s useful work as easy as typing a few words into a search bar. Pirating that work is then a simple matter of â€Å"cutting and pasting†. Similarly, advanced word processors have provided a stress-free way of integrating another’s writing into one’s own, or editing a plagiarized work so that it is more difficult to detect. HoweverRead More Plagiarism On The Increase Essay1236 Words   |  5 Pages Plagiarism seems to be an increasing problem in todays society, especially on college and university campuses, with the immense resources presently available to people. Previously, individuals were restricted to finding information in resources such as books, magazines, journals, encyclopedias and newspapers, but with the technology and the growth and popularity of the Internet, plagiarism has truly become an issue. There seems to be a direct correlation with the increasing use of the InternetRead MoreEssay on Cyber-plagiarism1469 Words   |  6 PagesCyber-plagiarism Its two oclock in the morning, youre just one page into a 10-page term paper thats due at eight oclock. A few years ago, that would have been it: You would have submitted the paper late, if at all, and dealt with the consequences. But this is 2005, and so, in your most desperate hour, you try a desperate ploy. You log on to the Internet, enter term papers into an online search engine, and find your way to www.termpaper.com. There you find a paper that fits the assignment