Thursday, October 31, 2019

L-6 vertebrae Case Study Example | Topics and Well Written Essays - 500 words

L-6 vertebrae - Case Study Example This paper discusses the problems caused by L-6 vertebrae and their solutions. Six lumbar vertebras can occur at any age on anybody. It has no known cure because doctors have not gotten its causative diseases. This means that this abnormality has different effects on people depending on a number of factors. Some of the factors are; age, physical activity that an individual engages in, historical body health among others. Many doctors have suggested that most of the back pains on people with L-6 lumbar vertebra as appearing because of this abnormality. Some of the spinal diseases have been associated with this disorder among the victims (Sellone & Long, 2007). People with complex physical exercise have trouble when they turn to the sides. They may also develop tumors that reduce their efficiency in physical exercise. Old people with this L-6 lumbar vertebra have problems that are more serious because of their inflexible bodies. It is a healthy practice for any human being to have physical exercise to remain fit. However, for old people it is hard for them to re main fit due to lack of exercise or very small exercise if any. Parts of the vertebral column where the L6 lumbar vertebra meets the L5 vertebra also has been reported to develop some diseases due to the friction that may occur sometimes as a result of inadequate cerebrospinal fluid (Weaver & Poloso, 2005). This phenomenon is often seen when the L6 lumbar develops at older ages of life. The logic underlying this phenomenon is that, normal body metabolism enables it to produce just enough cerebrospinal fluid for its normal functioning. Additional joint between L6-L5 lumbar vertebrae calls for extra cerebrospinal fluid. It takes time for the body to adjust to new metabolism. Sometimes it may not adjust at all, imposing serious health problems to the victim (Sellone & Long, 2007). Nevertheless, to some people, this abnormality has no demerits at all;

Tuesday, October 29, 2019

None Essay Example | Topics and Well Written Essays - 500 words - 34

None - Essay Example Philosophical works in the form of poetry written by Hesiod as early as eighth century BC indicated the presence of scarcity among human beings. Hesiod refers to competition as a real conflict amongst business. He ascertains the impact of entrepreneurial force in the creation of scarcity of resources in the community. As scarcity develops, human beings tend to scramble for the available resources. The philosopher further agrees to the fact that competition amongst business and the nature of scarcity of resources needs governorship by justice and the law. Philosophical theories frequently highlight the relevance of scarcity of resource and competition in the society. Their arguments remain ideal reflections of the occurrence in the business world (Spiegel 1). In modern business, healthy competition acts as a booster in the development of the society. Businesses compete for market share that leads to improvisation of marketing strategies that aims at increasing customer relations. Such improvement in customer preference to individual companies correlates to increased quality of service provision and hence productivity of the economy. Modern economic theories on competition as aforementioned agree Hesiod philosophies on existence of competition. Hesiod supported the existence of competition in the society and its relation to the measure of productivity. He affirms the relationship between competition and productivity through his literary works on Homeric poetry written between 830-750 BC. Hesiod describes competition as either destructive or productive of which the later forms part of contemporary economic productivity (Jr and HÃ ©bert). Productivity of the economy in a modern setting relates to hard work and determination. Such economic theory is in agreement with Hesiod philosophies. Hesiod believed that idleness and productivity could not rhyme. He criticized the former

Sunday, October 27, 2019

Acoustic Cryptanalysis of RSA and Its Counter Measure

Acoustic Cryptanalysis of RSA and Its Counter Measure Prof. J P Agrawal Saurabh Sharma Siddharth Gupta ABSTRACT Acoustics has come up as a new vulnerability in the field of information security. The RSA encryption algorithm, although h very hard to break mathematically, has been broken recently by using acoustics and power analysis of emanations. Acoustic Cryptanalysis is the side-channel attack which targets implementations of cryptographic algorithms. The cryptographic algorithms are quite secure at the mathematical level, but inadvertently leak secret information through signatures in power consumption, electromagnetic emanations, timing variations, and acoustical emanations. This paper presents a software based countermeasure which is based on application of specific mitigation techniques to ensure that even if there is leakage of information it would bear minimal useful information. INTRODUCTION Acoustic cryptanalysis is a form of side channel attack that aims at deriving the private key in a public key cryptography system using acoustical vibrations of a laptop. A side channel attack is basically an attack that gives attacker an additional channel of information about the system, the noise generated by computers is one such potential channel other channels include keystroke acoustic emanations, acoustic emanations from printers, power analysis via the USB port and timing attacks. Side channel attacks can only be performed on public key cryptography system because the encrypted text i.e. ciphers text depends upon the text that is encrypted. So while decryption the cipher text produces a unique acoustic spectrum which helps the attacker to extract the key. In this case we put our emphasis on a different source of computer noise i.e. vibration of electronic components like capacitors and transistors in the circuit of the CPU. These acoustic vibrations are related to the system activity since the amount of power drawn from the CPU depends upon the operation which is performed. As a study case, we will focus on the GnuPG (GNU Privacy Guard), a cross-platform, open-source implementation of the OpenPGP Standard. We will demonstrate a key extraction attack that can extract 4096-bit RSA secret keys when used by GnuPG running on a laptop computer by analyzing the vibrations generated by the computer during decryption of chosen cipher texts. RELATED WORK Analysis of acoustical vibrations is relatively a newer practice commonly used in military context such as identification of vehicles through the sound signature of their engine. Similarly computer programmers monitor the functioning of their systems by listening to sound generated by mechanical components. Some of the successfully implemented experiments involving side channel attacks include : à ¯Ã¢â‚¬Å¡Ã‚ · Electromechanical ciphers. à ¯Ã¢â‚¬Å¡Ã‚ · Keyboard acoustic emanations. à ¯Ã¢â‚¬Å¡Ã‚ · Acoustic emanations from printers. à ¯Ã¢â‚¬Å¡Ã‚ · Power analysis. à ¯Ã¢â‚¬Å¡Ã‚ · Power analysis via the USB port. à ¯Ã¢â‚¬Å¡Ã‚ · Timing attacks. THE EXPERIMENTAL SETUP (A) laptop on which the decryption is being performed (B) Brà ¼elKjà ¦r 4190 microphone capsule mounted on a Brà ¼elKjà ¦r 2669 preamplifier held by a flexible arm. (C) Brà ¼elKjà ¦r 5935 microphone power supply and amplifier, (D) National Instruments MyDAQ device with a 10 kHz RC low-pass filter cascaded with a 150 kHz RC high-pass filter on its A2D input (E) laptop computer performing the attack. Here, the microphone power, amplification and some filtering are done by an integrated, battery operated Brà ¼elKjà ¦r 5935 microphone power supply. After a self-built 10 kHz RC low-pass filter cascaded with a 150 kHz RC high-pass using capacitors and resistors, A2D conversion is done by the compact, USB-operated National Instruments MyDAQ device. The MyDAQ device captures at 200 K sample/sec. The Brà ¼elKjà ¦r 5935 amplifier is limited to a frequency of 100 kHz. OBSERVING THE ACOUSTIC LEAKAGE 1. Distinguishing various CPU operations We can distinguish between various operations performed by CPU by analyzing the low bandwidth leakage of acoustical emanations. Our analysis begins by taking into account simple operations like: HLT (CPU sleep), MUL (integer multiplication), FMUL (floating-point multiplication), main memory access (forcing L1 and L2 cache misses), and REP NOP (short-term idle). We concluded that these operations exhibit a unique frequency spectrum on execution. 2. Distinguishing various code lengths These acoustical emanations can also determine the length of loop being executed. For example the leakage produced by a code executing 10000 ADD instructions in an infinite loop will have a different acoustic spectrum than a program executing 20000 ADD instructions in an infinite loop. 3. Leakage source The observed acoustical emanations are not caused by the rotation of the fan, hard seeks or audio speakers as it is verified by disabling these components. Rather it is caused by the capacitors and resistors in the power regulation circuit of the CPU. The precise source of the emanations is difficult to characterize, since it is different in every machine and it is typically located in hard to reach places. Acoustic localization is also difficult due to mechanical coupling of capacitors and resistors and because of acoustic reflections due to other components. PERFORMING THE ATTACK The attacker sends an encrypted email to the target machine. This email when received by the target machine undergoes the process of decryption so as to extract the data that has been sent. The email which is sent involves sending a chosen ciphertext, it cannot have any random data in it. The data which is sent via the email has to be a specially crafted ciphertext. Through this attack we try to get the ‘q’ i.e. one of the prime factor of the key ‘n’. Enigmail provides an integrated graphical user interface and handles e-mail encoding and user interaction; the actual cryptography is done by an external GnuPG executable. Received e-mail messages are decrypted upon the user’s request. In addition and by default, Enigmail automatically decrypts incoming e-mail messages. Thus, an attacker can send a suitably-crafted e-mail message to the victim, containing a chosen ciphertext. When this e-mail message is fetched by the target computer, the attacker observes the acoustic emanations during decryption, and obtains a bit of the secret key. The attacker then sends additional e-mail messages, until all key bits are recovered. If the messages are backdated or made to look like spam messages, they may even go unnoticed. But this doesn’t affects our attack as it will still be decrypted by the email client. Choosing the ciphertext q is a 2048 bit number q2048 q2047 q2046 q2045†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ q2 q1 GnuPG always generates RSA keys in which the most significant bit of q is set, i.e., q2048 = 1. Considering we know the first i-1 bits of q e.g. i=4 , we know q2048 q2047 q2046 =110 Now we need to find the next bit of q , which can be 0 or 1 So , we create a ciphertext with first i-1 bits equal to that of first i-1 bits of q, the next bit 0 and the remaining bits to be 1 q2048 q2047 q2046 0 111111†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.11111 Recording the emmisions We use our experimental setup to record the acoustic emissions that are created during the decryption. Placing the microphone with respect to the laptop body has a large influence on the obtained signal. Laptops have cooling system for heat dissipation. It has a fan that requires large intake of air and some exhaust holes. Also, there are other holes and gaps for ports such as USB, Express Card slot, SD card reader, and Ethernet port. Any of these ports can be used as a position for the microphone. Typically, the best microphone placement is near the Ethernet port or the fan exhaust vent. We record the sound using the LABVIEW software. We compute the sliding-window Fourier transform of the trace, yielding a sequence of spectra, and then aggregate these spectra by taking the median value of each bin. (The use of median effectively rejects temporally-local outliers, such as transient spikes.) The spectrum is truncate to the frequency range of interest (determined manually). Extracting the key The most significant bit of a prime number is always 1. Using this fact we create a desired ciphertext and obtain the power frequency templates for 0 and 1. Thus, if the attacker were to have two spectrum templates describing the leakage of zero and one bits, he could classify an unknown signal by checking the similarity between it and the templates he has. Concretely, in our case a template is a vector of real numbers describing the signal power at each frequency bin. The classification is based on computing the correlation of the Fourier spectrum of the leakage with the two templates. Recall that q is chosen to be a prime such that its most significant bit is always set to one. Moreover, this information is known to an attacker. Thus, obtaining an example of a leakage of a one bit can be done by measuring the leakage resulting from the decryption of g2048;1. Obtaining an example of a leakage of a zero bit is more tricky. This is because the attacker does not know in advance the location of the first zero bit in q. However, this problem can be easily avoided. Consider any number l such that q 2048 1). Notice that the reduction of l modulo q is equivalent to computing l q and will cause the bits of the result to be random thus achieving a similar spectrum as the sound of zero bits of q at the beginning of the attack. After this we compare the data acquired with the templates of 0 and 1 and the output of the comparison gives one bit of the q. Then this attack has to repeated 2048 times to get all the bits of q. These templates are updated dynamically in the matter of 20 bits. After receiving the acoustic spectrum of every attack bit we try to match the frequencies with the ones in the predefined templates. Whenever we get a matching frequency we check it’s corresponding value for power if this value is in range according the given threshold of the template we classify the bit as 0 or 1. By repeating this same procedure to attack every bit we obtain all the 2048 bits of prime q and in turn find the key. COUNTER MEASURE Cipher text randomization : One countermeasure that is effective in stopping our attack ciphertext randomization. If we have a cipher text c, instead of decrypting c immediately what we can generate a 4096 bit random value r, compute re and then decrypt re* c and multiply the result by r^-1. Since ed = 1 mod (n) It does not stop the attacker from extracting the key but it masks the original key so that even if the attacker is able to extract the key he doesn’t has the correct key. In implementation we have used the random library of python. Using this library random.randint(range) generates a random integer which can be multiplied to the value of cipher text and it changes the acoustic spectrum of the ciphertext which masquerades the original key. Why software based countermeasures are better than hardware based countermeasures? Enforce a proper layering can seem to be an effective countermeasure. Unfortunately, such low-level physical leakage prevention, is most of the times, impractical due to the significantly bad cost vs. security tradeoff because of the following reasons : (1) Suitable manipulation at the higher levels can amplify any leakage remnants, similar to what we do in our chosen-ciphertext attack (2) Low-level mechanisms try to protect all computation, even though most of it is insensitive or does not induce easily-exploitable leakage (3) Essential performance-enhancing mechanisms produce leakage as an inevitable side effect. REFRENCES [1] M. Hanspach and J. Keller, à ¢Ã¢â€š ¬Ã¢â‚¬ ¢In guards we trust: Security and privacy in operating systems revisited,à ¢Ã¢â€š ¬- in Proc. 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust, Washington D.C., USA: IEEE, Sept 2013. [2] M. Hanspach and M.Goetz, à ¢Ã¢â€š ¬Ã¢â‚¬ ¢On Covert acoustical mesh network in air, revisited,à ¢Ã¢â€š ¬- in Journal of Communications Vol. 8, No. 11, November 2013. [3] R. Otnes, A. Asterjadhi, P. Casari, M. Goetz, T. Husà ¸y, I. Nissen, et al., Underwater Acoustic Networking Techniques, ser. Springer Briefs in Electrical and Computer Engineering, Springer, 2012. [4] R. Frankland, à ¢Ã¢â€š ¬Ã¢â‚¬ ¢Side channels, compromising emanations and surveillance: Current and future technologies,à ¢Ã¢â€š ¬- Department of Mathematics, Royal Holloway, University of London, Egham, Surrey TW20 0EX, England, Tech. Rep., Mar. 2011. [5] Daniel Genkin, Adi Shamir, Eran Tromer, RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis December 18, 2013. [6]Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications: the insecurity of 802.11 [7] H. E. Bass and Roy G. Keeton. Ultrasonic absorption in air at elevated temperatures. The Journal of the Acoustical Society of America. [8]Taher ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms.IEEE Transactions on Information Theory, 31(4):469–472, 1985. 1

Friday, October 25, 2019

Brave New World and Farhenheit 451 :: essays research papers

Imagine a world where free will is obsolete. Nobody has any freedom; most people do not even have a yearning for autonomy. The direction the world is heading right now could possibly produce such a world. Both Brave New World, by Aldous Huxley, and Fahrenheit 451, by Ray Bradbury, envision this world which lacks liberty. These books, both of which are supposed to be set in the future, have numerous theme similarities throughout them. Of all their common factors, the ones that stand out most would have to be the outlawed reading of books and the theme of the protagonist being a loner or an outcast from society because of his differences in beliefs as opposed to the norm. In the societies of both of these books outlawed reading is a common and almost completely unquestioned law. In Brave New World reading is something that all classes are conditioned against from birth. In the beginning of the novel there is a group of infants who are given bright, attractive books but are exposed to an explosion and a shrieking siren when they reach out for them. This thus prevents them from wanting the books and causes them to scream and shrink away in horror at the mere sight of the books. In reference to the accomplishment of this conditioning, the director said, "Books and loud noises...already in the infant mind these couples are compromisingly linked; and after two hundred repetitions of the same or a similar lesson would be wedded indissolubly. What man has jointed, nature is powerless to put asunder," (Huxley 21-22). We come to learn that the basic reasoning behind this conditioning against reading in Brave New World was because "you couldn't h ave lower-caste people wasting the Community's time over books, and there was always the risk of their reading something which might undesirably decondition one of their reflexes" (Huxley 22). In Fahrenheit 451 the outlawing of book reading is taken to an even greater extent. In this novel the whole purpose of a firefighter isn't to put out fires, rather it is to start fires. The reading of books in their society is completely forbidden and if someone is suspected of even owning a book, the firefighters are dispatched to go to that person's residence and start a fire. They start fires for the sole purpose of destroying books, as illustrated here, "They pumped the cold fluid from the numeraled 451 tanks strapped to their shoulders.

Thursday, October 24, 2019

Gardening to Reduce Stress

Stress can really weigh down on our life and limit our activeness. There are many ways that one can use to manage the high level of stress. One of the most effective ways is to burn up that stress. One will do something, whether conscious of it or not as a way of draining the tension in every day life. These activities may involve physical and mental exertion or engaging in a pleasurable activity.However it should be noted that the activity that one use to burn away tension are usually unique and very idiosyncratic to an individual person. It is therefore important for every one to try and find out which activity can be considered as a stress releaser. In this paper we are going to illustrate gardening as one of those activities which can be successfully used to manage stress.GardeningIn our daily life, many of us garden because we have to grow and produce our own fruits, vegetables, and other types of foods.   Other will do so for economic activities. In our home compound, we may do gardening to create an attractive landscape where we can sit with our friends and relax.However gardening, regardless of the purpose with which it is done can be therapeutic. It is used as a way of fighting and relieving tension in our life. For some of use grading can relax our mind, body, and spirit. However we should understand that it is not gardening that is relaxing our mind, but it is the way we approach it. Once gardening is taken as a chore, it cannot effectively relax our bodies and mind but it turns out to be stressing. To relieve stress with gardening, it should be viewed as an enjoyable activity.While gardening, focusing on the main activity that one is undertaking or the activity at hand is the key to relieve stress and relax the body.  Ã‚   The continuous gardening activities like digging, chopping, and to an extent hitting motions are also key to relieve stress and tension in life.There are also strenuous activities in gardening which act as an outlet for aggres sion and consequently wades of the aggression burning in our body which can be a cause of stress and anxiety.However it is not only strenuous activities which can relieve stress in gardening. Just taking a simple walk around the garden can be sufficient for others to take away their stress.When you take a walk around the garden, ensure that you take in all the available colors, textures, and fragrances available. This will give you a different experience from that of your house or your usual workplace. By the time you complete your walk around the garden you should be feeling better.If you want to relieve stress through gardening, take into consideration the following points:Make a â€Å"to do† list which should be short so that you can stick to every activity planned for. It is advisable that not to put all activities in on list or try to do everything in one afternoon, evening or a weekend.Since you are doing gardening for the purpose of relaxing, it is advisable to follow the normal exercise cycle or pattern of stretching, warm up, control, and others.Ensure that you apply the same vigor to garden activities like digging beds, turning composite, or cultivating as in other exercising activities like weight lifting, playing football, running or swimming.After a hard work in the garden, stop and take a rest. Be conscious and try to control your breathing.   Take a deep breathe, stretch your body and relax during the resting period.While resting, stop and take a moment to observe what is around, hear, smell, touch and taste all what is around you. To add variety, you can listen to music while gardening.You can also use markers in your garden, and every time you see such a marker, stop, relax and take a deep breatheIn our society, stress is weighing down the life of many people. It is better to allow the natural rhythms of gardening in order to slow you down and calm you. When you pay attention to gardening you will get more involved and fulfilled. It i s also important to remember that how you garden is more important than just gardening.  When you find time, you can volunteer. There are many areas in gardening where you can volunteer including horticultural therapy programs. If you cannot find gardening more fulfilling in your home, you can volunteer in nursing homes, day care center facilities or in hospitals and engage in gardening.ConclusionStress affects the life of many people. However many people suffer in silence without knowing how to cope with that stress.   It is important to realize that there are many activities in our surrounding that can help us to relive our stress. Gardening is one of the most important activities that can assist you to relieve stress.You should take gardening not only as an economic activity but it can also help you to relax. However your approach to gardening is important to help you relieve stress. Next time you feel stressed, think about gardening. It may help you to relax and reduce you s tress. But remember, the approach is more important than the activity itself

Wednesday, October 23, 2019

Rfid at the Metro Group

RFID at the Metro Group Mierdorf and Wolfram are preparing their report to the RFID steering committee next month and they have three options to recommend. They can: * Expand the scope of the current pallet level RFID rollout * Move to case level RFID tagging with the manufacturers currently engaged in pallet level rollout * Stop the expansion of the RFID and focus on traditional process improvement opportunities Given the facts in the case and as outlined in more detail in this case study, it is our recommendation that Mierdorf and Wolfram move to the case level RFID tagging process.The improvements up and down the supply chain in accuracy, inventory control, reduced labor costs are enough to at least continue with the RFID rollout at the pallet level. However, there is ample financial data that supports quite forcibly the added benefits of RFID at the case level. Now, with any initiative as bold and challenging as this as far as logistics between manufacturers, distribution centers , and retail stores, implementation of technology that is emerging almost daily, and not to mention the substantial capital expenditures has its inherent risks.We identify those risks later in this study. However, we contend that despite the obstacles that lie ahead, the benefits for this initiative are overwhelming. The potential for this technology given the reporting capabilities, the versatility of product specific inventory levels, and the opportunity to make the RFID tag universal worldwide are endless. Furthermore, as more manufacturers, retailers, shippers, distribution centers, etc. incorporate RFID into their supply chain the more cost effective it becomes for the entire industry.In this study, we examine the process flow of the supply chain; the financial analysis of both pallet level and case level tagging; the risks associated with RFID tagging at both levels; and conclude with a timeline chart starting from the beginning of the project up to this juncture. Process flow of the supply chain Pallets are assembled at the manufacturer’s plant after the production line. These pallets are either stored at the manufacturer’s warehouse or shipped to a distribution center (DC). From here, the pallets are either shipped to one of Metro’s DCs or directly to a Metro store.Commonly, pallets at the Metro DC are unbundled and repackaged as mixed pallets. Pallets sizes can range from 60 to 80 cases per pallet and in extreme situations as much as 900 cases on a pallet. One can imagine the labor force required to receive a pallet from a manufacturer, check it in, break in down and reassemble and then ship it out to a retail location who then must receive it, check it in and break it down into the cases. At this point, the stockroom must determine how much of the product can be moved directly to the sales floor and how much was to remain in the stock room.It was common to have to return product marked for the sales floor back to the stock room d ue to lack of display space. Furthermore, products would be moved within the sales floor for promotional events which necessitated handling the product again. A retail store could receive shipments directly from the manufacturer or from a variety of Metro DC’s. The shipments from the manufacturer or Metro DC varied from week to week and store to store. This made it difficult for the stores to anticipate what would be delivered on a day to day or week to week basis.In addition to the various locations the shipments originated, the pallet sizes, the pallet mix, the randomness of the delivery schedules, and the number of times it took to handle the pallets, there were also the times when the product had to be returned for quality issues or product damage. Process Flow Chart without RFID – Manufacturer Process Flow Chart without RFID – Metro DC Benefits of RFID In general the benefits for implementing the RFID process would be labor productivity, accuracy of invento ry count, improved product availability, and reduced costs.More specifically, the case study identified three areas that would benefit from the implementation of the RFID tagging process. Benefits of RFID at Pallet Level At the pallet level the RFID tagging would make the shipment from the manufacturer more accurate and efficient. With RFID, all pallets could be scanned while being loaded onto the truck. The need for manually scanning the pallets was eliminated and now the truck driver can monitor the pallets being loaded on his truck. Furthermore, the forklift drivers would no longer need to preassemble the pallets and store them in the shipping area in advance of the delivery trucks’ arrival.This greatly reduces the need for supervision over the forklift driver. Metro estimated a cost savings to the manufacturer of approximately â‚ ¬0. 20 per pallet shipped. Benefits of RFID at the Case Level At the case level there were two significant areas of improvement. One had to d o with the mixed pallet picking at the Metro DC and the other was improving the shelf restocking at the stores. At the Metro DC, pickers were used to reassemble a mixed pallet. The pickers used a hand held scanner to track what cases were picked for the pallet.Metro estimated that the picking errors amounted to . 05% of the cases that were picked. Using RFID tagging, the process would be automated by the forklift drivers. The RFID could alert the picker if they had too many or too few of the proper cases or if they had picked the wrong case altogether. With these controls in place, the need for additional supervision and rechecking were virtually eliminated. Between the time savings of automatically scanning the picked cases and the elimination of rechecking the 1% cases, Metro estimated a combined savings of about â‚ ¬. 2 per case which amounts to a total savings of â‚ ¬ 511,000 per year. In addition, Metro estimated that with the increased accuracy of the cases shipped to th e stores it would greatly reduce if not eliminate the need to send product back to the DC or worse, throw it out. Another beneficiary of the RFID tagging at the case level would be restocking at the stores. Due to the lag between products being received in the stock room in the mornings and the sales floor being restocked at night, the chances that the store would be under stocked were great.Using an RFID reader in conjunction with point of sale data, the store personnel would easily track inventory levels and restock more efficiently. The restocking efficiency was estimated to boost gross sales by . 05% which would result in an increase in gross profit of â‚ ¬. 05 per additional product sold. Financial Benefits The details and comprehensive analytics are within attachment #1. The attachment describes three main topics: 1. Hardware, Software, and Maintenance Expenditures 2. Pallet RFID Program Analysis 3. Case RFID Program AnalysisWithin those analytics it provides much of the de tail analysis that supports our recommendation. We will provide the following highlights; Hardware, Software and Maintenance Costs, Productivity and Shrinkage Savings, and NPV/IRR calculations. Initial Hardware and Software Costs | Pallet Costs Per Store| Case Costs Per Store| Hardware Costs| â‚ ¬ 8,500. 00| â‚ ¬ 14,045. 00| Software Costs| â‚ ¬ 17,000. 00| â‚ ¬ 28,090. 00| Total Costs| â‚ ¬ 25,500. 00| â‚ ¬ 42,135. 00| Annual Maintenance for Full Rollout| â‚ ¬ 3,400. 00| â‚ ¬ 5,618. 00| Total Hardware and Software Costs| â‚ ¬11,118,000. 00| â‚ ¬ 18,370,755. 00| Total Maintenance for Full Rollout| â‚ ¬1,482,400. 0| â‚ ¬ 2,449,434. 00| Full Rollout Total Costs| â‚ ¬ 12,600,400. 00| â‚ ¬ 20,820,189. 00| When comparing the initial costs for both implementing the pallet or case RFID program the pallet option shows less initial hardware, software, and maintenance cost compared to the case option. The below information will provide further detail of the initial costs. These costs take into account that each retail store (436 initial stores plus an annual increase 1. 5% stores year over year) of under the pallet RFID program would need one portal per store and the distribution centers would need two portals.Whereas, under the case RFID program each store would need the same amount of portals as the pallet program but would require 872 readers at the stores and 50 readers at the DC’s. The cost of the software is twice the amount of the hardware costs and the maintenance cost is 20% of the software costs. The distribution centers costs calculations are further detailed below. | Pallet Costs Per DC| Case Costs Per DC| Hardware Costs| â‚ ¬ 17,000. 00| â‚ ¬ 30,862. 00| Software Costs| â‚ ¬ 34,000. 00| â‚ ¬ 61,725. 00| Total Costs| â‚ ¬ 51,000. 00| â‚ ¬ 92,587. 00|Annual Maintenance | â‚ ¬ 6,800. 00| â‚ ¬ 12,345. 00| Total Hardware and Software Costs| â‚ ¬ 510,000. 00| â‚ ¬ 925,869. 00| Total Ma intenance for Full Rollout| â‚ ¬ 68,000. 00| â‚ ¬ 123,449. 00| Full Rollout Total Costs| â‚ ¬ 578,000. 00| â‚ ¬ 1,049,318. 00| The entire hardware, software, and maintenance expense for both the retail stores under the pallet RFID program is â‚ ¬13,178,400 and under the case RFID program is â‚ ¬21,869,508. While the initial investment of each program are substantially different the costs outlay is only part of the overall evaluation of the program.Productivity and Shrinkage Cost Analysis One of the more interesting items within the analysis is how each program would affect productivity and shrinkage. Under the pallet RFID program the analytics the program would experience the following over a 5 year period: * Total Shrinkage savings of â‚ ¬ 14,214,946. 52 * Total Productivity savings of â‚ ¬ 568,214. 400 Under the case RFID program the analytics the program would experience the following over a 5 year period: * Total Shrinkage savings of â‚ ¬65. 02MM * Tot al Productivity savings of â‚ ¬23. 11MMThe productivity and shrinkage savings is the main driver as to why the net present value and IRR should be used in determining the best options for Metro. Below are the final NPV and IRR calculations for each of the options. Pallet RFID Program | Pallet| IRR| NPV sum PV| (â‚ ¬5,507,634. 51)| -8%| NPV excel| (â‚ ¬5,006,940. 46)| -16%| Case RFID Program (In millions) | Case| IRR| NPV sum PV| â‚ ¬ 9. 60 | 21%| NPV excel| â‚ ¬ 8. 73 | 10%| It is evidenced in the analysis that implementing the case RFID program would result in both a positive NPV and a higher rate of IRR.Whereas, implementing the pallet RFID program would result in a negative NPV and a negative IRR. From a Metro perspective it would be advisable to implement the case RFID program over the pallet program. Risks associated with RFID technology RFID tags were still undergoing development and testing. The first generation tags had problems with country-specific frequenci es and power regulations and were not compatible with the existing ISO standards. The second generation tags, Gen 2, were not due to be released until 2006.The Gen 2 tags were meant to become a global standard that were more in line with ISO standards. However, analysts predicted it would take years, possibly even a decade, of testing, implementation, and running systems in parallel with bar codes before RFID would take over as the primary means of product identification. The risks associated with the RFID tag technology manifested into problems for Metro during the initial rollout of pallet level tagging. Suppliers, trying to save money, often purchased tags that would not meet Metro’s high quality requirements.Also, because suppliers were not formally bound to any brand of tag, tags of low quality or wrong frequency made them unreadable. To minimize these risks Metro planned to move to the Gen 2 tags in the second phase of the RFID initiative. These new tags would have one global standard, offered improved read rates, and were less expensive. Risks associated with case level tagging Metro knew that RFID implementation at the pallet level would involve significant upfront costs for all parties involved. Suppliers would have to purchase RFID tags and printers and create a process of attaching the tags to the correct locations on the pallet.Metro would have to purchase additional hardware called portals that are equipped with RFID readers and antennae. In addition Metro would need to design middleware, or software, that would filter the reader’s data and send it to the enterprise application. Essentially, both Metro and its suppliers would have to invest in a RFID infrastructure, process design, and training. Moving to the case level would increase costs for the suppliers as they would have to buy more tags and make significant process changes. Metro would have to make changes o its IT systems in order to distinguish between backroom and selling f loor inventory. This data would also have to be combined with point-of-sale data to alert store employees to replenish floor stock from backroom inventories. During the initial rollout of the first phase many suppliers could not participate because of the strict process requirements. Problems of tag placement or missing tags would be compounded at the case level. Also, with the move to the Gen 2 tags Metro would have to replace the old readers with new ones compatible with the new tags.The risks associated with case level tagging could be minimized by moving forward with the major suppliers already involved at the pallet level. These suppliers would have already invested in the RFID technology and processes so would likely be more receptive and better equipped to continue on to the next phase. Project Strategy Metro’s strategy of the project is one of leadership and offense. In 2004 when Metro announces its RFID rollout other major retailers, including Wal-Mart and Tesco, hav e made it clear that they believe RFID technology could significantly improve the supply chain.Since 1999 Metro has taken a lead role in the development of RFID systems. They are a founding member of Global Commerce Initiative (GCI) whose objective is to enhance global commerce and improve international supply chains. Mierdorf, Metro’s CIO, is a co-chairman of GCI and is actively involved with the EPC working group that is designing the Gen 2 tags. GCI is a strong supporter of RFID implementation using the EPC standard. Clearly the actions and involvement of Metro senior management in the development and implementation of RFID technology demonstrate a company that is focused on an offensive and leading strategy.Productivity levers The productivity levers that the project primarily focuses on are a reduction or complete elimination of manual processes and improvements in labor productivity through automating processes. Existing processes are replaced with more efficient ones. These productivity levers will affect both Metro and their suppliers and include the following: reduced supervision time of trucks being loaded at manufacturers, reduce picking errors at Metro DCs, increase in-stock rate resulting in increase of store sales, and transmission of point-of-sale and inventory data to the suppliers.Timeline The following outline places in order the events that lead up to the current status of RFID practices adhered to by the METRO group and their RFID partners. These events lead into the recommendation from our analysis of the direction the Metro group should move toward in future RFID practices. In addition to the summary of historical business decisions made by the Metro group through 2005 there is also included in the introduction a brief outline referencing to the development of RFID technology and its associated protocols.In the 1930’s remote identification was born with the invention of Radar ID and British aircraft transponders. The develop ment of this technology continued through to the 1970’s where the work of American entrepreneurs on passive transponder identification helped it take a large step forward. By the early 2000’s the stage was set for the use of first generation RFID technology in the commercial and retail industry. RFID technology improvement continued to be made from early versions to more standardized specifications and by early 2004 EPC global began developing a new electronic product code protocol called â€Å"Gen2†.In Dec of 2004 the â€Å"Gen2† standard was released. ISO required additional changes to the â€Å"Gen2† and changes weren’t complete until late 2005. After all the improvements, standardization and development some analysts have still speculated that it could take close to a decade before RFID would be the sole source of product identification. The Metro group has taken an active role in forging ahead to accelerate the schedule on this technolo gy and drive innovation and implementation. The Metro group, which started back in 1965, was a local wholesale business serving commercial customers in Germany.By the 1970’s the Metro group had moved into Europe for a boarder market and retailing as a larger scope of its business mission. By 2005 the Metro group had become the world’s third largest retailer with sales of â‚ ¬36. 4 billion and had developed some major clout in swaying industry practices with regards to adoption of the RFID technology. Moving back to 1996 we see that Zygmunt Mierdorf, Metro‘s CEO, helped create the Metro group information technology IT subsidiary. Then in October of 1999 the Metro group became a founding member of the global commerce initiative or GCI.Metro’s CEO Mierdorf became the co-chairman of GCI and appointed MGI’s managing director, Dr. Gerd Wolfram, to co-chair GCI’s intelligent tagging working group. Three years later the Metro group launched the Fu ture Store initiative. Wolfram was the executive project manager of the FSI and by 2003 the initiative had been joined by over 40 partners. In early 2004 Metro announced that by Nov 2004 100 Metro suppliers would be using RFID on pallets delivered to 10 warehouses and 250 stores.During the period of time from announcement to roll out on pallet tagging the Metro group deployed RFID readers and associated infrastructure. It develop middleware, created RFID-enabled processes, select suppliers, found internal candidates to help roll out the implementation and helped train the associated parties and partners. For instance in July of that same year the Metro group opened an innovation center to support partners with RFID implementation.Also during this time period a 12 person steering committee was developed to help oversee all issues related to the RFID roll out. By November of 2004 Metro began deploying RFID at the pallet level to most but not all of its announced stores and distributio n centers. Between Nov of 2004 and July of 2005 Metro’s read accuracy increased from 30% to 90% which improved the confidence in the technology. By mid 2005 Metro began seeing other benefits including immediate verification of incomplete shipments and truck unloading cut down by 20 min from the old process.Following this first rollout and implementation Analysis was under taken to understand what the next direction would be. After evaluation of the current options both financial and operational it was determined that moving forward with case-level RFID tagging was optimal and a positive NPV project. Wolfram and Mierdorf would next be meeting with the management steering committee on December 13th where they would present the findings with recommendation that Metro should proceed with case-level tagging.

Tuesday, October 22, 2019

Outline and assess the different roles Australian women played in World War 2 Essay Example

Outline and assess the different roles Australian women played in World War 2 Essay Example Outline and assess the different roles Australian women played in World War 2 Essay Outline and assess the different roles Australian women played in World War 2 Essay Essay Topic: Girl in Translation The Second World War bought significant changes to womens roles in Australias society. By working in munition factories or serving in auxiliary forces etc, women were able to make a greater contribution to the war effort, than they had during the First World War.These women of the 1940s went from domestic roles to active service and war related work, as well as this work bringing changes to womens roles, women also found financial independence and freedom that was thought of as a huge benefit. While most women returned to domestic roles after the war, women did stay on in some areas of work such as on trams, bus driving and postal work.In my essay I will outline and assess the significant roles Australian women played and the main contributions they made to the Second World War.One of the most important roles that women played in World War 2 were jobs previously done by men.Robert Engwerda states that:For the first time women entered a range of occupations that were traditionally con sidered to be carried out by men: Tram conductors, bread carters, bus and taxi drivers, to mention but a few.(Engwerda, 1999, pg 210)It wasnt till the invasion of Australia was feared, that the government came to rely on the contribution of women. The huge increase in employment of women threatened some trade unions as women took on jobs such as postal work and metre readers, but they came to realise that mens labour needed to be freed for active service and war related work.It was not only postal work that women were involved in during World War 2, increasing numbers of women were found in factories and steel mills.Women working in industry took on the huge role of mechanical work such as material production (making weapons).In 1943 the number of women employed in such work jumped from 1000 to 145000.(Darlington Hospodaryk, 1999, pg 104)These women worked hard at their job but didnt get any where near as much money as men did.As one woman put it:It was hard work and boring too. We worked for long hours and it was dirty and very, very noisy. We were always tired.(Coup, 1998,pg 109)While in cities women were found in factories and steel mills, the women from rural areas took on shearing, dairying, crop planting and harvesting.From early in the war there were land armies formed to boost agricultural production.Over 3000 women joined the Australian Womens Land Army (AWLA). They worked full time helping farmers with whatever work needed doing. The Government arranged for them to grow food for Australian and American troops, they didnt have the machines they needed to grow too much food and harvest it quickly. Land Army girls were frequently sent to work and live in bush camps in remote areas; they were moved after a certain period of time depending on how much they were needed. Despite the fact that Women in the Land Army were separated from their families, they felt they were better off than most.In Esme Corcorans story, she states:We girls in the Land Army were better off than most other people as all our work clothes are provided. Also, because I was on a farm I had plenty of butter, milk, eggs and meat, so I was able to send my ration coupons down to my mother.(Cotter Engwerda, 1999, pg 211)As well as serving in the Australian Womens Land Army (AWLA), around the same time womens Auxiliary forces of the Army, Navy and Air Force were formed, but these services were more military based.The contribution of women to these services was thought of as a vital role in the war effort.Over 18000 women joined the Australian Womens Army Service (AWAS); Over 16000 joined the Womens Auxiliary Australian Air Force (WAAAF) and around 1400 in the Womens Royal Australian Navy Service (WRANS). About 500 of the women who joined the Army went to New Guinea and the rest stayed In Australia.The work women did were things like back-up work for the army, plane spotting and were trained in transport, communication and maintenance. They were also trained in comba t, in case Australia was invaded.When the women first signed up to the army, they werent treated very well.They hated usthey didnt want a Womens Army.In training, we had no uniforms, only the long winter coats.The instructors were not happy about our assignment.(Frieda Helen Simon, discovery.com/area/freshhistory/fresh1.4.html pg 1-2).The Womens Royal Australian Navy Service (WRANS) had similar roles to those in the AWAS.Women worked as transport drivers, dental mechanics, telegraphists, typists, cooks, supply assistants, translation interpreters and much more.The Navy also formed nursing services but these were much smaller organizations.The last branch of services that was considered a vital role in World War 2 was the Womens Auxiliary Australian Air Force (WAAAF).These women were trained and taught jungle and ocean survival.The terrain, climate, lack of civilisation and most of all the bestiality of the enemy, are all taken into account in the training.(Eshuy, et.al. 1996, pg 229 )By doing postal work, working in factories or serving in Auxiliary forces, Australian women certainly developed a strong respect for their achievements but it was also the contribution of the 78000 women that enlisted in either the Australian Army Medical Womens Service (AAMWS), The Australian Army Nursing Service, RAAF Nursing Service or the Voluntary Aid Detachments, that made Australia proud.Women served in the Armed forces in World War 2 but only the nurses served in combat areas.These women would have undertaken the most gruelling roles and would have suffered the hardships of the war along with the men that were fighting.Countless women served in all branches of the service, and relieved or replaced men from combat duties. They earned the respect of their fellow soldiers as they sloughed through mud, lived in tents, dived into foxholes and dugouts during horrendous air raids.(http://userpages.aug.com/captbarb/femvets.5.html pg 2)Not only were there hard working nurses, some women voluntarily undertook nursing because they thought it was a vital role they could play.There were orgainsations formed that were especially for women who were prepared to volunteer for war related work such as: Women Accepted for Volunteer Emergency Service (WAVES).R.S Dowling writes:These young Australian Women have voluntarily undertaken one of the most gruelling, and certainly most horrendous tasks open to RAAF Nursing ServiceThey are referred to as Flying Angels, Angels of Mercy or Ministering Angels.(Eshuys, et.al. 1996, pg 229)All these roles women played in World War 2 were extremely important, because there would have been a huge lack of men fighting for Australia.The Government denied womens involvement in World War 1 but in World War 2 they relied heavily on their contribution.All those nurses that provided medical care for the wounded straight away states the importance of women in war.But it wasnt only nurses, it was also very important to have women in communicati on and signalling also in factories making weapons for use in the war.Womens roles in the 1940s were underestimated enormously by Australias society but as this essay shows each and every role that was played by the women of Australia was vital, but the most significant included, all the nurses that provided help to the wounded and the skills they learnt that saved the lives of many men of Australia.

Monday, October 21, 2019

Poor parenting revealed in mary shelleys frankenstein Essays

Poor parenting revealed in mary shelley's frankenstein Essays Poor parenting revealed in mary shelley's frankenstein Poor Parenting Revealed in Mary Shelley?s Frankenstein Upon giving birth to a child, it is expected of the parents to teach and raise them with good morals. It is assumed that parents demonstrate both love and affection towards their infant. However, there are instances in which some parents neglect their children, which is what the main character, Victor did in the novel Frankenstein. In Mary Shelley?s novel Frankenstein, Victor demonstrates how the neglect of his creation translates into havoc and violence of those in his life. These two aspects are caused because of the mistreatment that Victor displayed to his ?child?. He wasn?t aware of how dangerous this ?child? could come out to be since it was not raised appropriately. This led to the ?child?s? insufferable loneliness and anger. Displaying neglect towards an infant leaves them emotionally and mentally unstable. In the novel, Victor?s neglect towards his creation, the Creature, caused his affliction. This act of disdain occurred because Victor was displeased with the appearance of his offspring. Victor calls him out on being a ?Devil? and even questions him, ?Do you dare approach me? And do you not fear the fierce vengeance of my arm wreaked on your miserable head? Begone, vile insect!? (page 68). No parent should ever behave this way towards their child. Victor traumatizes his ?child? causing a mental toll on him by calling him names and telling him to go away. The Creature believes what he is told since he sees it for himself, ?But how terrified was I, when I viewed myself in a transparent pool!? (pg 80). The Creature now seems to understand why others have shown disregard towards him. He now realizes that his neglect is because of his guise. According to article 18, ?Unwanted and Un-intended Long Term Resu lts of Overindulging Children? by Dawson and Bredehoft, ?It is difficult to be happy unless one looks good?. This is thought out to be because of overindulgence in children, which is a form of child neglect; it was the main reason why the Creature went about creating chaos. He committed murders to get revenge on Victor because of the neglect he showed towards him and his appearance. This was a type of emotion that the Creature displayed to let out his anger on his guise. It?s believed that a person who is crestfallen with their appearance tends to have a ?low self-esteem, and a sense of shame surrounding the parent?s absence? (?Effects of Abandonment?, Wolf). Since Victor neglected his creation due to his appearance he was never there for the Creature. Showing negligence towards a child can be traumatizing. If it is not stopped, it leads to unnecessary repercussions and is the easy way out towards abandonment. When a child encounters abandonment, the outcome will be negative because they did not receive the necessary love and affection from their parent. The child will be in a state of desolation and question their abandonment. Due to Victor?s forsaking of the Creature, leads to the Creature questioning him, ?Have I not suffered enough, that you seek to increase my misery? I was benevolent and good; misery made me a fiend? (pgs. 68-69). The Creature appears to be miserable because he was left derelict. This question is an effect from child abandonment, it ?Left the Creature with lingering question about his self worth? (Effects of Abandonment in Children by Jennifer Wolfe). He cannot understand why his ?parent? would want to make him suffer more than he already has. The Creature was an altruistic being before, but because of his abandonment it caused him to undergo this state of misery. When helping a child to cope with abandonment it is advised to, ?Reassure the child that they did not do anything to cause their parent to leave? (Coping with the Effects of Child Abandonment by Stacy Hensley). In this case, Victor did not demonstrate this action towards the Creature. The Creature is aware that his abandonment is because of his appearance, which is what ignited Victor to forsake him. Due to Victor?s carelessness of the Creature it created a negative impact on him along with a lack of love and affection. These components were an

Sunday, October 20, 2019

AP English Literature - Learn What Score You Need

AP English Literature - Learn What Score You Need AP English Literature and Composition is one of the more popular Advanced Placement subjects. Nevertheless,  roughly 175,000 more students took the AP English Language course and exam in 2018. The literature course is primarily focused on college-level literary analysis, and students who do well on the AP English Literature exam will often earn college credit for composition or literature. About the AP English Literature Course and Exam The AP English Literature course covers important literary works from a range of genres, periods and cultures. Students learn close-reading and analytical skills, and they learn to identify a literary works structure, style, tone, and use of literary conventions such as imagery and figurative language.   Students in AP Literature work at becoming active readers; in other words, they learn to become thoughtful and critical readers who can analyze and appreciate the various writing strategies employed by a wide range of authors.   The course has no required reading list, and individual AP instructors are free to choose any literary works that invite a rewarding reading experience. Genres will include poetry, drama, fiction, and expository prose. Most texts will have been originally written in English and may have originated in the United States, Canada, England, Africa, India, and elsewhere. A few works- such as a Russian classic or Greek tragedy- might be read in translation. The focus of the course, however, is much more on reading and writing skills, not specific authors. On the writing front, students learn to write effective analytical essays that employ a wide-ranging and appropriate vocabulary, effective and varied sentence structures, logical organization, strategic use of both generalization and specific detail, and careful attention to rhetorical forms, voice, and tone. AP English Literature Score Information Many colleges and universities have a composition and/or literature requirement, so a high score on the AP English Literature exam will often fulfill one of these requirements. The AP English Literature and Composition test has a one-hour multiple-choice section and a two-hour free-response writing section. The score on the is based on a combination of the multiple choice section (45 percent  of score) and the free-response essay section (55 percent of score).   In 2018, 404,014 students took the exam and earned a mean score of 2.57. Close to half of those students (47.3 percent) received a score of 3 or higher indicating that they have enough mastery of the subject matter to potentially earn college credit or course placement. The distribution of scores for the AP English Literature exam is as follows: AP English Literature Score Percentiles (2018 Data) Score Number of Students Percentage of Students 5 22,826 5.6 4 58,765 14.5 3 109,700 27.2 2 145,307 36.0 1 67,416 16.7 The College Board has released preliminary score percentages for the 2019 exam. Keep in mind that these numbers may change slightly as late exams are added to the calculations. Preliminary 2019 AP English Literature Score Data Score Percentage of Students 5 6.2 4 15.9 3 28 2 34.3 1 15.6 College Credit and Course Placement for AP English Literature The table below provides some representative data from a variety of colleges and universities. This information is meant to provide a general overview of the scoring and placement information related to the AP English Literature exam. For schools not listed below, youll need to look on the colleges website or contact the appropriate Registrars office to get AP placement information. AP English Literature Scores and Placement College Score Needed Placement Credit Hamilton College 4 or 5 Placement into some 200-level courses; 2 credits for score of 5 and B- or higher in a 200-level course Grinnell College 5 ENG 120 LSU 3, 4 or 5 ENGL 1001 (3 credits) for a 3; ENGL 1001 and 2025 or 2027 or 2029 or 2123 (6 credits) for a 4; ENGL 1001, 2025 or 2027 or 2029 or 2123, and 2000 (9 credits) for a 5 Mississippi State University 3, 4 or 5 EN 1103 (3 credits) for a 3; EN 1103 and 1113 (6 credits) for a 4 or 5 Notre Dame 4 or 5 First Year Composition 13100 (3 credits) Reed College 4 or 5 1 credit; no placement Stanford University - No credit for AP English Literature Truman State University 3, 4 or 5 ENG 111 Introduction to the Short Story (3 credits) UCLA (School of Letters and Science) 3, 4 or 5 8 credits and entry writing requirement for a 3; 8 credits, entry writing requirement and English Comp Writing I requirement for a 4 or 5 Yale University 5 2 credits; ENGL 114a or b, 115a or b, 116b, 117b A Final Word on AP English Literature Keep in mind that another benefit to the successful completion of an AP Literature course is that it helps demonstrate your college readiness in a core subject area. Most of the countrys highly selective colleges and universities have  holistic admissions, and the admissions officers look not just at your GPA, but  how challenging your course work is. Colleges would much rather see you successfully complete a challenging college preparatory class in English than an easy English elective. AP Literature shows that you are taking the most advanced course possible in literature. So even at a school like Stanford that does not award any credit or placement for AP English Literature, your decision to take the class still strengthens your application. To learn more specific information about the AP English Literature exam, be sure to visit the  official College Board website.

Saturday, October 19, 2019

Quality Management Essay Example | Topics and Well Written Essays - 750 words

Quality Management - Essay Example But it so happens that sometimes what the staff's thinks as quality care does not always agree the patient's satisfaction. PDSA (Plan, Do, Study, Act) cycle is also known as PDCA (Plan, Do, Check, Act) cycle, which also called the Deeming wheel, or cycle. The Deeming wheel is used by organizations that are continuously engaged in continuous improvement to train their employees or staff in problem solving matters. Continuous improvement is a process that seeks ways to improve the operations of an organization. When implementing a continuous improvement concept in a hospital or a health care centre the management of that institution must follow some procedures. 1) Train the staff of the hospital or health care centre in the methods of improving quality and their performance when dealing with patients. 2) The staff should make statistical process control method a daily part of their operations and tasks. 3) The management should make work teams and involve the staff. And introduce problem solving in the work teams. Plan is the first step in the Deeming Wheel. Plan basically means that to make a strategy or plan ahead before a change and to predict the result and then analyze it. Therefore when planning the team basically selects a process for example an activity like when an emergency is bought in the ER the nurse monitors and checks the vital signs of the patient and prepares the patient for treatment. Therefore the improvement to take place the management has to make sure the nurses in the ER are trained for the any kind of emergencies and the ER is fully equipped and the staff is on alert because the patients need to be treated quickly ad efficiently. Do Do is the second step in the Deeming Wheel. Do basically mean that the team implements the plan and then it monitors the process. For example q patient is brought in the ER with a heart attack problem. The patient will receive immediately oxygen and will have an ECG as soon as possible. Therefore with the right kind of equipment and the staff well trained only then the patient's life will be saved. Check Check is the third step in the Deeming Wheel. Check basically means that the staff or the team basically analyses the data that was collected during the Do step to basically find out that the results match to the predicted result in the plan step. It the staff of the ER is well trained and the ER is fully equipped and when the patient does arrive with a problem and is quickly dealt with the right kind of treatment and it the result of this outcome matches with the prediction then the institution is right on track with the continuous improvement process. Act Act is the fourth step in Deeming Wheel. Act basically means if the results are successful then this process becomes a standard procedure in the Emergency Room to train the staff how to deal with the patients and to have the ER fully equipped with the right kind of machines and instruments. References 1) Plan-Do-Check-Act Cycle. Accessed from www.asq.org on June 5, 2008 2) Krajewski, Lee J., & Ritzman, Larry P. (2002). Operations Management: Strategy & Analysis. 6th Edition. Prentice Hall.

Friday, October 18, 2019

Walt Whitman Research Paper Example | Topics and Well Written Essays - 1000 words

Walt Whitman - Research Paper Example Whitman’s background was not among the stereotypical academic roots. Born from a working class family, he was not a highly candidate to be educated formal. It was in 1830, while maintaining a job and other forms of education through self motivation, that he was able to attend school. The meager income of the household was not enough to sustain the family of nine in their hometown of New York. Later on, he found his way to work in journalism to earn a living. He also became an educator, though with love and hate relationship with this profession as some disillusionments set in. by 1938 he was able to put up his own newspaper named ‘The Long Islander’ where he labored in every detail of its publication. This was where his first published poem appeared titled, ‘†Our Future Lot.† This endeavor soon end and he continued on writing for other papers and concentrated more on the poem genre in relation to current events (Kellingsworth, pp.2-3). â€Å"Come Said My Soul† and â€Å"Song of Myself† are two very different and yet at the same time similar poems of Walt Whitman. At first sight, it would be apparent to note that the main distinction lies in the length of the two poems. The first one being one single stanza with 11 lines while the latter is almost an entire book with 52 stanzas numbered accordingly. But while this is the obvious difference, the fundamental elements of the poems are the same and are quite susceptible to having the trademark that is palpable of a perceptibly Whitman creation through and through. The theme of the poems are the same. The persona speaks of struggles and overcoming adversities and a predisposition to one’s acts through his character. It would not be an ovestatement to note that the persona speaking in first person in both poems are the author himself. In â€Å"Come SaidMy Soul,†

Child temperaments and parenting styles Essay Example | Topics and Well Written Essays - 250 words

Child temperaments and parenting styles - Essay Example e to act as friends to their children and the children with the flexible temperament work with the parent developing a plethora of room for the development and growth of the kids. The children consider their parents as warm and low in control to indicate high levels of trust, and the child is able to confide in the parent (Richters 22). On the other hand, children of the highly permissive parenting style may end up lacking the necessary self-control since the parents expect nothing from them. The flexible children with permissive parents become impulsive and may live life with no definite direction. Children with flexible temperaments and with permissive parents develop into domineering and stubborn adults who do anything to achieve what they desire. The behavior gets developed due to the parent’s understanding nature. However, parents with permissive parenting styles with children with flexible temperament give more attention to their children’s activity while maintaining a distance not to control most aspects (Richters 22-23). Richters, Kayla S. Child Temperament, Parenting Styles, and Internalizing and Externalizing Behaviors as part of a Comprehensive Assessment Tool. University of Wisconsin-Stout, 2010. May 31,

Human Elephant Conflict. Human Invasion Into The Wilderness Essay

Human Elephant Conflict. Human Invasion Into The Wilderness - Essay Example The article by Perera (2009) reported in Gajaha points out that most Asian nations are facing a drastic decline in the number of elephants. Similar trend was visible in Africa where the number of elephants declined from over 5 million to anywhere between 470,000 and 630,000 in a matter of hundred years. Thus, while the African elephants are termed ‘near threatened’ by the IUCN Red List, their Asian counterparts are classified ‘endangered’ by the Red List of the World Conservation Union (International Union for Conservation of Nature and Natural Resources, 2011). However, before blaming humans for all these, it is necessary to look into the numbers of yearly manslaughter by elephants. According to Handwerk (2005), nearly 500 people are killed by elephants in a year, and the number is on rise year by year. Thus, it becomes evident that there is a conflict between men and elephants. This work looks into the various factors behind the conflict and the various ef fects of the conflict. Human invasion into the wilderness- the first reason It is pointed out by Nelson et al (2003) that one reason for increased elephant-human contact is the changes in land use. People started converting forest land for crop cultivation, settlement, and livestock grazing. The scholars make the observation that as human landscape reached such areas which were previously occupied by wildlife, there is higher chance for human-elephant conflict. Another point comes from Houghton (1994). ... Then, elephants move towards the farmlands and settlements in the near vicinity for water. There are many more reasons in the pipeline. According to Lahm (1996), one reason is logging. As already noted, elephants live on secondary vegetation and successional forest. When logging occurs, the cleared land gives birth to thick growth of secondary vegetation. Thus, elephants tend to move to these newly developed areas for food. Yet another vital point as put forward by Kangwana (1995) is that increased human interference leads to the development of canals and cattle fences. When such developments block the natural migration routes of elephants, and when humans settle along the boundaries of such protected areas, the possibility of human-elephant conflict increases. Also, there is the revelation from Naughton et al (1999) that as the economic situation of people has improved, there is a considerable decline in tolerance to elephant presence. There is a totally different aspect of the issu e explored by Anderson and Grove (1987). According to them, there are various factors that lead to the development of enmity in humans towards elephants (ibid). The most important factor is the development of national parks by governments. Such parks tend to exclude the local people making them feel alienated from the entire plan. As a result, the area becomes ‘frozen’ in a short while. So, the local people start resenting the wildlife, and dominant wild animals like elephants are the main victims of this hostile attitude. The scholars argue that this resentment is exacerbated by the feeling that the animals have access to such political, economic, and land advantages which are inaccessible for the native people (ibid). Yeager and Miller

Thursday, October 17, 2019

For and against reforming the Toxic Substances Control Act (TSCA) Article

For and against reforming the Toxic Substances Control Act (TSCA) - Article Example The TSCA provisions do not apply the same to new and existing chemicals. According to TSCA, any new chemical substances are any chemical that is not part of the chemical substance list collected and published under TSCA section 8(b). This list is referred to as the â€Å"TSCA Inventory†. The TSCA act has had a great impact in ensuring protection of the American citizen and the environment. EPA has had successes compiling data on chemical toxicity, market use, and exposure under TSCA’s section 4 which allows EPA to do testing and information provisions. However, these results have been limited because very few test policies and rules have been enacted by the TSCA. Through the new chemicals program set by TSCA has proven to be a successful example of a precautionary review policy. These provisions apply at the pre-manufacture level of manufacturing before the product is let out to the public. This provision sets disciplinary reviews to assess risks associated with new chemicals. This ensures that there is protection against potentially harmful chemicals. Due to its high disciplinary measures, this has scared investors who are venturing into new and advance technology in chemical industry. The regulations have high legal threshold which is almost impossible to meet. The TSCA program for existing chemicals has ensured that the EPA is able to monitor its inventory and also analyze manufacturing and consumption by the public. On the other hand it has been viewed by many to be a failure. The existing chemicals have pose a challenge on EPA to prove that chemicals already approved will not present risk and that the benefits of regulation overpass the costs. Lack of assurance favors the keeping of these chemicals on the market. EPA limitation on power to regulate existing chemicals provides a hindrance to bringing safer chemicals to market. While chemical manufacturers invest important

Wednesday, October 16, 2019

Article Review Research Paper Example | Topics and Well Written Essays - 750 words

Article Review - Research Paper Example The members of the board are not answerable to the president; moreover, they have regulatory authority over each and every public company in the US. It is pertinent to note that with the passage of Sarbanes-Oxley Act, Security Exchange Commission pegs the cost of â€Å"internal controls† for an average company in US at $91,000 per year. Commission also acknowledges the fact that the cost has increased substantially. In 2008, SEC surveyed thousands of corporations to assess the cost implications in the post SOX period and it was found that an average company needs to spend $2.3 million to comply with the provisions of Section 404. The disturbing part is that small companies have to bear the brunt of it in a much larger proportion relative to their assets. In this survey, only 19% companies confirm that the benefits of section 404 are significant to outweigh its costs. The author argues that investors are, to a large extent, skeptical about the benefits of this law. Legal Issues The section 302 of the Sarbanes-Oxley act prescribes that senior management of the company needs to authorize the accuracy of the financial reports and section 404 is all about establishing ‘internal controls’ and reporting methods specifying the adequacy of these controls. This legality has enhanced the cost of compliance substantially of all listed companies in the US. Managerial Perspective The whole purpose of enacting the law is to restore investors’ confidence in the companies. However, SEC survey establishes that a large proportion of the respondents do not agree that Section 404 has been able to enhance confidence of the investors in their companies. Section 404 encompasses even minor issues that place a huge burden of cost on the companies while complying with the law. It is ironical that majority of the foreign companies are contemplating de-listing from US exchanges and many small foreign firms have abandoned the idea to enter into American Capital Ma rkets. This means that Sarbanes-Oxley Act works as a deterrent to the small and foreign firms. Though credit raters and securities analysts, in a separate survey done by SEC, give favorable view about section 404 but at the same time admit that the benefits from Section 404 cannot be quantified. The most troublesome part is that ever since the enforcement of law, US firms have reduced their investments on research and development and capital expenditures vis-a-vis firms of other developed countries such as Canada and UK. The reason being directors and senior managers are scared of criminal penalties involved while undertaking risky investments that are difficult and costly to monitor. This certainly does not augur well for the economy of the nation. Reference Freeman J. (2009). The Supreme Case against Sarbanes-Oxley. The Wallstreet Journal. Retrieved August 23, 2012 from

For and against reforming the Toxic Substances Control Act (TSCA) Article

For and against reforming the Toxic Substances Control Act (TSCA) - Article Example The TSCA provisions do not apply the same to new and existing chemicals. According to TSCA, any new chemical substances are any chemical that is not part of the chemical substance list collected and published under TSCA section 8(b). This list is referred to as the â€Å"TSCA Inventory†. The TSCA act has had a great impact in ensuring protection of the American citizen and the environment. EPA has had successes compiling data on chemical toxicity, market use, and exposure under TSCA’s section 4 which allows EPA to do testing and information provisions. However, these results have been limited because very few test policies and rules have been enacted by the TSCA. Through the new chemicals program set by TSCA has proven to be a successful example of a precautionary review policy. These provisions apply at the pre-manufacture level of manufacturing before the product is let out to the public. This provision sets disciplinary reviews to assess risks associated with new chemicals. This ensures that there is protection against potentially harmful chemicals. Due to its high disciplinary measures, this has scared investors who are venturing into new and advance technology in chemical industry. The regulations have high legal threshold which is almost impossible to meet. The TSCA program for existing chemicals has ensured that the EPA is able to monitor its inventory and also analyze manufacturing and consumption by the public. On the other hand it has been viewed by many to be a failure. The existing chemicals have pose a challenge on EPA to prove that chemicals already approved will not present risk and that the benefits of regulation overpass the costs. Lack of assurance favors the keeping of these chemicals on the market. EPA limitation on power to regulate existing chemicals provides a hindrance to bringing safer chemicals to market. While chemical manufacturers invest important

Tuesday, October 15, 2019

New Privacy Issues Related to Cyberspace Objective Essay Example for Free

New Privacy Issues Related to Cyberspace Objective Essay Select three organizations within the same industry for analysis 1. Students should pick one industry from the displayed list below, and within that single industry, name 3 organizations for analysis. (BANKS-JP Morgan Chase, Citigroup, and Wells Fargo) 2. Describe the mission of each (from their website), and examine and compare details of each stated privacy policy, then 3. For each organization, recommend policy changes that will enable each organization to (a) use sensitive customer information to increase business advantage and profitability, and (b) also protect customer personal information to avoid possible privacy or liability issues. You may need to use trade journals and newspaper stories in your reference list. However, try to avoid opinion pieces (like blogs) that may not be factual. You may state your own opinions, but these must be strengthened by scholarly references. Table of Contents: 1. Introduction 2. Industries missions and privacy policies a. JP Morgan Chase b. Citigroup c. Wells Fargo 3. Recommended policy changes to increase business advantage and profitability a. Also include the good aspects of current policy that increases business advantages and profitability 4. Recommended policy changes to protect customer personal information to avoid possible privacy or liability issues a. Also include the good aspects of the policy that protect the customers information 5. Conclusion: JP Morgan Chase Mission Statement: JPMorgan Chase Co. is a leading global financial services firm and one of  the largest banking institution in the United States, with operations worldwide. JPMorgan Chase conducts operations in more than 60 countries and has assets amounting to over $2trillion and its corporate headquarters are located in New York City. Their mission statement is as follows: At JPMorgan Chase, we believe that being profitable and doing good works for the people and the world around us aren’t exclusive of each other; they’re integrated goals. When our business is strong and well governed, we’re in a better position to translate positive financial results into sustainable community and environmental efforts that benefit everyone.

Monday, October 14, 2019

Modernity and Modernism in Literature

Modernity and Modernism in Literature 1.2. Modernity and Modernism The first seeds to modernist literature were implanted with the emergence of modernity. Modernity is a post traditional or post-medieval historical period that characterized a radical shift away from traditions. It is the epoch marking the rise of the age of reason which began with the Enlightenment (About 1687 to 1789). Scientists such as Immanuel Kant, Renà © Descartes and most importantly Isaac Newton believed that through science the world could be saved and that through reason they can establish a foundation of universal truth. Modernity was also brought to light by political leaders such as Niccolà ² Machiavelli who believed that peace could be established with reason resulting major movements such as Capitalism, Industrialism and Urbanization. Post Modernity as a theory evolved around criticizing modernity and what modernity stands for, it criticizes industrialization and the effects that last one had on the peasants in the fields and the workers in factories, and the power capitalists had over the people.(Barret 17-18). In other words, postmodern refers to a time of interfused styles, mixed cultural layers, oddly merging traditions and multi-cultural pluralism. (Bradbury WII) Modernism as described by Barth is a term that describes the modernist movement; it was a revolt against the conservative values of realism. Modernism is often understood through the work of authors who were productive after the turn of the twentieth century. Writers such as T.S Eliot, Ezra Pounds and James Joyce allowed it to be historically and politically understood in their literary works. (Childs 5) 1.2.1 Modernist literature Modern literature is a literature that flourished in the new capitalist art market during a period of time where writers were no longer pointed when it comes to what they write neither by the church nor by monarchies. They also no longer had to answer to the old system of artistic patronage; to the contrary, they signified their allegiance to all what is new. (Hutchens-Suggs 20). The First World War showed artists how ridiculous life could be, Life was not fair to Europeans and continued to be with the Second World War taking the lives of over 50 million person and damaging the understructure of Europe unsling it from what was generally referred to as the Belle Époque . Later on and when the flames of war finally came to end, this period was seen as a period of calm before the storm. (Ara Mergian CNN.com- November 9, 2014 The modernist artistic movement is an intellectual movement that broke aesthetic and social boundaries. It appeared in the early 20th century and aimed to uncover invisible systems and unconscious codes or rules by explaining various phenomena using attractive and coherent style in writing, painting, sculpture and all artistic and creative performances (Barret 22). Modernists referred to themselves as avant-garde, they were rebellious against restrictions, had a futuristic vision and no limitation when challenging social values. 1.2.2 Modernist Aesthetics and Criticism To some, Modernist art is old and even finished, but that isnt completely true since it was once very progressive, bringing a new art for a new age under of the cape of a social and economical revolution that swept over the, new back then, urban and industrial Europe(Barret P 20). One of the most important specifications of modernism was that it abolished the idea of beauty as the ideal of art (Atkins 56). Malcom Brudbury said One of the defining features of modernism has been the breaking down of traditional frontier of matters of literary and cultural concern ( p114). Artists dropped subject matters as essentials and writers changed their presented works as rapidly as the intellectual life was changing. Poets likewise sought to account for the rapid changes. Due to its difficulties, modernist poetry is hard to enjoy having a wider and less comprehensive sense (Marry Warner 1 2) Artists eliminated the need to have an artwork be different from ordinary objects; they made an unofficial statement that beauty has no established scale to be acknowledged. Douglas Crimp (1990) argued that the demise was brought about by the invention of photography which allowed the reproduction of images mechanically including art images stripping away from the artwork its uniqueness. Other critics see that aestitic revolutions of modernism are formed by the expansion of the comprehensive system of globalized world open to outer cultures and regions (Child 31). 1.3 JAMES JOYCE (1882 1941) James Joyce was, and still is, a major figure of modernism. The famous writer was born on the 2nd of February 1882 at 41 Brington Square West in Rathgar and was named James Augustin Joyce after his great grandfather and grandfather (Noris 59). James was born to a Catholic family but he had always been a rebellion, he rebelled against his father who encouraged him into becoming a priest and choose, or might have been destined to, become a literatures crooked genius (Philips 191). He subsequently studied languages and philosophy at Clongowes Wood and Belvedere Colleges. Coming from a middle-class family, James was brilliant; Hildegard Tristman considered him to be A writer who lost his brain to forgetting (Tristman 230). Needless were notebooks, his memory was so good that he could retrieve any information he heard or read at any moment. The name Joyce is derived from the French word joyeux and James was supposed to hold the holly spirit of joy. He mostly referred to himself as James Joyceless,a Joy of Evil and as Joyce in the wilderness (Ellmann 12). Growing-up, James was a well-behaved, slim little boy with a set of blue eyes and a pale face. Doing his Jesuit masters, James didnt feel at ease with their teaching techniques but later on in his life when he was asked by August Suter about what he retained from his years in Jetsuit he replied :I have learned to arrange things in such a way that they become easy to survey and to judge (Ellmann 27).He got from Jesuits his hairy platonic idealism and the grounded Aristotelian realism as the question of his Catholic faith was raised by father Daly who indicated that his religious and spiritual manifestations were mysterious(Philip P4) Joyce was head of his class at Clongowes, his memory was absolute, and he was a good athlete too, playing Rugby and Cricket. The fascinating boy came back home with several cups (P 30). James was keen of music and all sorts of art that he took Piano lessons as well. The family had serious financial problems and that did impel James to move closer to Dublin. John Joyce, James father, sold many properties of his in order to provide a better life for his children. The caring father with a pension of  £132 a year struggled to provide comestible, pay school tuitions for the children and to keep a roof over their heads after moving to The Lionville house at Carysford Avenue, Blackrock. The stress caused by the economical difficulties affected James  starting from his teen-years that some indicated a flair of drama in his personality and thats when he attained a reputation for being spiritual and conscious of everything happening around him. At Belever, Joyce acquired Italian as a third language to go with Latin and French pursuing to read European literature at the expense of his own grades. In 1897 and by love for art and need to help his family, James participated in the Intermediate Examinations and received an exhibition of  £30 a year and  £3 prize for best English composition in his grade in Ireland (P 51). In the fall of 1898 James attended University College, Dublin from wich he graduated in 1902. During this time, Dublin was a town with many important pillars of literature such as William Butler Yeat, Lady Augusta Gregory, James Clarence and George Moore walking its street. James was influenced by all these writers especially Yeats whom he met privately in early October 1902 on the streets of Dublin and had a deepened conversation with. That strongly showed on his statement of method and intention and the way in which he strongly defended all what is temporary and modern. On April 1900 Ibsens New Drama by James A Joyce was published on the Fortnightly Review and after that, James was no longer an Irishman, he was European. Graduating from U.C Dublin, James main focus was to travel; his targeted city was Paris were he didnt reside easily. At that time, his fame and readership were not  particularly widespread (Goldman 84). To stay there was a pointless move so, so he went home for Christmas and then decided to stay when he knew of his mothers health issues. His mother died on August 13th, 1903. After this tragedy, Joyce focused more on making reviews for the Irish Homestead magazine and during this time he met Nora Barnacle and the two moved to Pola in late 1094 where he occupied a teaching position at Berlitz school. The next few years were difficult for James who suffered from financial problems and a major drinking problem too. After that he became disconnected from the people around him. Eventually Joyce, Nora and their child settled into a new life in Paris where he finally was able publish Ulysses but continued to have problems, this time health problems especially with his sightedness (Ellman 2 25-229). Difficulties continued to cross Johns path as his relationship with publishing houses delayed Dubliners from emerging for a decade. Better days were yet to come as he gained an award from the Royal Literary Found in 1915 followed with the publication of A Portrait of the Artist as Young Man in 1916. His work as a whole, Ulysses and Finnegans Wake predominately served to change the face of novels; they represented a playful mixture of English and other languages and novels completely free from the limitations of normal consciousness. James was a relentlessly autobiographical writer, a man who never doubted himself and in August 1929 his self-esteem extended even more as he was praised by George Moore who wrote to John Elton, He (Joyce) was distinguished,  courteous, respectful, and I was the same. During their short encounter in London Moore said, I have been only a revolutionary, while you have been a heroic revolutionary, for you had no money (Ellman 617). On January 1935, James moved along with his entourage back to Paris. He didnt feel as blind as Homer, nor as exiled as Dante having as many friends as he did. They moved again to southern France but eventually settled again in Zurich. On January 9th 1941 James was hospitalized, the doctor assured him that he didnt have cancer and that he needed an immediate surgery which George, his father offered to pay for saying well manage Somehow or other (Welcker 53). The surgery was successful as he recovered consciousness but at one Oclock in the morning he relapsed into coma. At 2:15 on January 13,1941, one of the most influential writers of the twentieth century died leaving behind a considerable amount of scholarly interesting works(Cope, Cope 2). 1.4 DUBLINERS James Joyces Dubliners is a collection of stories that aims to portray middle class life in Dublin, Ireland in the early twentieth century. It is a set of 15 short stories published in 1914 where Joyce made to appear the literary portrait of an entire society glimpsing into the lives of different social classes and exploring what it means to be Irish (Joyce VI). Moments of sudden insights arise frequently throughout Dubliners, it have been described and analyzed by critics as a series of fifteen epiphanies coupled with frustrating and enlighten characters with significant and illuminating experiences that are trapped in a city where nothing ever changes. Dubliners stories spotted the paralysis in the Irish society and how helpless in their daily life those individuals are; thanks to Joyce artistic vision which simplified the image of Dublin. (Carter Mc Raf 165) Nothing would explain Joyces purpose in writing Dubliners more than his own words: My intention was to write a chapter of the moral history of my country and I chose Dublin for the scene because the city seemed to me the centre of the paralysis. I have tried to present it to the indifferent public under four of its aspects: childhood, adolescence, maturity and public life. The stories are arranged in this order. I have written it for the most part in a style of scrupulous meanness and with the conviction that he is a very bold man who dares to alter in the presentment, still more to deform, whatever he has seen and heard. (Gillie 94) 1.4.1 Epiphany in Jamess Dubliners An epiphany is: 1_an illuminating realization or discovery, often resulting in a personal feeling of elation, awe, or wonder; its a state of Nirvana, a complete cessation of suffering, and a blissfull state attained through realization of sunyata, simply an enlightened and heightened experience. 2_ a Christian feast celebrated on the 7th of January (Oxford 127) Epiphany in James dictionary is a religious term that refers to the revelation of the infant Jesus to the Magi in the season of time of the Christian church year; he considered it to be a structural device. (Cope-Cope 4) The stories of Dubliners are distinctive to the reader by the sudden insight about the plot and characters who are kept from seeing who they really are. At the first look, the reader might think that the characters, those Dubliners, are taking their journey in a rhythmic way, he might think, hope them to achieve the expectable, but suddenly, a dramatic alternation occurs. Father Flin and Eveline are probably the best examples to this. Father Flin ended up as a spiritually crippled man Unable to cope with his life choices; Eveline was too afraid to escape her miserable life that she missed the opportunity to start over in a new country with the man she loved. James takes us into deep Dublin, showing us versions of citizens who happened to have a bleared vision of their city, families, and of themselves. The last story of the fifteen stories collection The Dead represents both the synthesis and climax of Dubliners. The story took place on January sixth, which is the Christian feast of epiphany, at Kate and Julia Morkans house. This story focuses on Gabriel Conroy from beginning to end throughout his encounter with the party gests who, one by one, ended up revealing his weakness; even his short encounter with the made Lilly turned in to a revealing scene of his lack of sympathy. 1.4.2 The Dead The Dead is one of the finest short stories in English literature. Written by James Joyce, it is known as the most famous and emotionally affecting story of his collection of fifteen stories Dubliners. The story was a late addition long enough to be a novella. The Dead includes much believable dialogue and had a more positive tone and is often referred to as an exception to the generalization made about Dubliners. The Dead also anticipates Joyces move away From the short story and toward the novel, Joyce wrote no other short story after it He had it substantially completed by the 6th of September 1916. This story serves as a final chorus of the book presenting holiday life, the celebrating of Christmas. The Dead is in a way a story of the dead people ghosts who return in envy of the living. (Kelleher 414) The Dead is a fitting conclusion to the stories collected in Dubliners; it could be seen as another capacity within the Joycean oeuvre, James let Symbolism flow freely throughout his short story and utilizes his main characters and objects to impress upon his readers and show them the real crippled condition of the Dublin he saw and the Dublin that negated him. Critical Reception of The Dead The nineteenth-century novel explored the external world, whereas the modern novel has dedicated itself to the inner world of the human consciousness (Fletcher 246) The modern epoch has found in critical reception both a mirror with which it could examine the many vices and perversions that define it and an obscure tapestry of almost fundamentalist punishments that are entirely alien to it. The twentieth century novelist James Joyce is a vivid example of modern writers who managed to not only engage with the world but to reform it as well. The tradition bound culture has a dangerous capacity for stifling rather than nourishing the life instinct. Like most of his contemporary writers, Joyces story in The Dead anticipates the traumatic moment of self-discovery by a series of images that convey the protagonists unacknowledged estrangement from nature (Sullivan P4) Writers make images vivid in any number of ways, James imagination was trained to be a compiler of aspects. The Deads scenes take place at night, when things arent usually so clear (Phillips 198) Ghosts are present in the character of Michael Furey who was in love with Gretta and died in Galway, Gabriel knew that, and all over the sudden perceived the tormenting truth; he has always had a competitor who had been capable of greater love than he could ever be. 2.1 Psychoanalytic Theory in The Dead Psychoanalysis is to be understood in its wider meaning to include all psycho-dynamic theories and therapies, regardless as to whether they emanate from Freud or Jung or elsewhere. Although the Freudian professional organizations regard the term psychoanalysis as one which refers solely to their own theory and practices, and although the Jungians and Adlerians call themselves analytical and individual psychologists respectively in the hope of differentiating themselves from the Freudians, these distinctions have never caught on even among the well-informed laity, which has always been more impressed by the similarities of the schools than by their differences (Rycroft 08) Freudian. Psychoanalytic theory is basically historical; it treats learning as cumulative, so that early experiences influence later experiences. 2.2 The Irish case The general history of a nation may fitly preface the personal memoranda of a solitary captive ( John Mitchel, Jail Journal. Dublin 1918). The Irish Question is a phrase used to describe Irish nationalism and the calls for Irish independence. It encompasses issues such as religion, the Irish-British politics and land ownership (Amato Demi Petrone P3). The 20th century marked the end of the British colonial project in Ireland leaving the country with an outdated agricultural system and a weak industrial economy. The English informal  colonization created a nation that is neither native Irish nor wholly British. (Duke 18) The Irish are descended from the Celtic people who originally inhabited the Island and who are old Catholics, while the English descended minorities were protestant. A sense of belonging and national solidarity arises among the natives and this resulted into a typical of national consciousness about the imperial ascendency the British Empire had on Ireland. In 1536, Henry VIII decided to conquer Ireland and he was proclaimed King of Ireland in 1541. The Irish Catholics rebelled against the British crown and ruled over Ireland (1642-1649) until Oliver Cromwel, the English military and political leader, the man known as the protector of England, re-conquered Ireland in1653 and ruled over it with the Kings blessing. (Amado Demi Petrone P5 6). Therefore, in the course of the century there were several movements reclaiming Britain to return the Irish lands its real possessors and France offered military help. The English Prime Minister Pitt was frightened by the idea of having the Irish lands uses as a structural military base against the English soil and persuaded the Irish Parliament to agree to its own abolition. In the course of centuries Ireland witnessed ups and downs in its relation with the British crown starting from The Union with Britain (1801-1912) to the Home Rule Bill of 1912 which was suspended for the war. In 1920 English Parliament passed the Government of Ireland Act establishing separate domestic legislatures for the north and south and in1949 Ireland finally broke the link with Britain Commonwealth and became an independent republic (Ibid 17). Modern Ireland and from the early 1970 faced many challenges that were mainly related to religion. The Catholics did not feel safe in Ireland; forming The Civil Rights Association they were attacked by Protestants in 1968 and 1969. The IRA (Irish Republican Army) got involved right after the RUC failed to stop the anarchy. The IRA troops split into two wings: The officials whose first duty was to establish peace; and The Provisional who declared war on Britain; that last one responded by taking over Northern Ireland in 1972. IRA replied by bombing Westminster Hall and London; assassinating Lord Mountbatten and MP Airey Neave in 1979 and attempting to blow the Grand Hotel while Mr. Thatcher is a denizen of it. In 1985 the Anglo-Irish Treaty was signed, both sides agreed to collaborate and work together fighting terrorism establishing a new, and hopefully, a lasting peaceful state of coexistence. 1.2.1 Emigration, Exile and contemporary Ireland There is the personal element in exile, an element that muffles and beclouds the works effects, the insistent self-dramatizations as another factor, a major one. (Peter 627) The Irish society like any other society had many great problems that dwelt deeply in everyday life. Unemployment and poverty reached their peak in the late interwar period. The failure of the potato crop in the mid 1840 effected several areas leaving behind according to Sir William Wild; the father of the well-known emigrant Oscar a poor, weak, old, lame, sick, blind, dumb, imbecile and insane population (Fitzpatrick I). The Irish emigration from the Irish lands had everything to do with the potato famine economy and the exploitation of labor in the fields. By the 1900s Northern Ireland was suffering from stagnation, its population was overwhelmed by famine, immigration, hopelessness, paralysis in all forms. Alcohol was another massive problem according to Larry Harrison who stated that North Irish study group contained a significantly higher proportion of heavy drinkers and thats why the Irish man was and still widely known and stereotyped as a heavy consumer of alcoholic drinks.(P 59) The disoriented Anglo-Irishry of after 1922 aimed to reconstruct the consciousness of nineteenth-century Irish people who felt as if all their dreams and life goals are thrown in the deep St George channel. For the majority f the Irish middle class, being abroad was a common thing, they traveled to all parts of Europe but Britain was often their first destination. Emigration as a concept must include the middle-class or petit bourgeois (Foster P 283) who found in places such as London the solid soil and deep settled state they needed to form a literary career. Britain was, and everyone agreed, a Modernist wonderland. 1.2.2 Who is Gabriel Conroy? It has often been pointed that James self-consciousness was found and showed over years of writing various and confusing fictional phenomenon we call the novel today. The Edwardian Irishman promoted the movement of  «Imagism » as a new rhythmic practice which employ the language of common speech and have complete freedom in subject matter. Joyce took his style to a new and highly experimental level by inventing, dreaming and creating new characters so that he would ultimately get modern and unique plots. Gabriel Conroy is one of his most controversial Characters ever; a man that represents a variety well known and present in the Irish society. (Gillie 90) Gabriel Conroy is the main character in Joyces short story The Dead. The man has the portray of an educated intellectual Irish gentleman but when looking beyond and analyzing the events of the night we notice that he is nothing more than a privileged brat with very low self-esteem and tremulous self-respect. The man had a fatuous self-righteousness that was present as a result to the imaginatively records of Joyces literary and dramatic revision of themes and context. ( Shelly Jr 134) 2.2.4 Paralysis in The Dead For it is well known that one of the oldest and most persistent clichà ©s of Joycean criticism has been to associate the Dublin of Joyces oeuvre with the one inhabited by his Dubliners. Garry Leonard voiced reservations as to the implications made by James and asked a very accurate Question: If Dublin is the center of paralysis, what is the periphery? (Leonard P320)