.

Saturday, August 31, 2019

Free Trade and Poor Countries

Why free trade is in the interest of the world’s poorest countries Free trade has been a much discussed topic since the 1770s, when Adam Smith presented his theory on trade and absolute advantages. Most sources argue that free trade will benefit the poor nations in the long run (Anderson et al. 2011; Bussolo et al. 2011; Madely 2000; Winters et al. , 2004). How-ever, the size of the benefits will vary in terms of which trade reforms are made, who the poor are, and how they support themselves (Winters et al. 2004).The purpose of this paper is to discuss why and how free trade is in the interest of the world’s poorest countries. The essay will commence by a description of the traditional trade theories, followed by a discussion of the advantages and the im-pact free trade has on the poorest nations including different theories and findings. There are two classic elements in the definition of trade. The first is Adam Smith’s rule of ‘mutual gain’, asses sing that for two countries trading with each other both must gain.Furthermore Adam Smith argues that trade is based on ‘absolute advantages’, which means that free trade will benefit all nations, if they specialise in producing the goods in which they are most efficient. The countries will then be able to produce at a lower price and trade the surplus for goods where they are less effective. This will allocate the world’s resources in the best possible way (Dunkley 1997; Irwin 2002; Madely 2000; Smith 1776) The second element to trade is Ricardo’s (1817) argument that trade and specialisation is based on ‘comparative advantages’.If one country has the absolute advantages in all goods com-pared to another country both nations can still benefit from trading. The country with the absolute disadvantage should specialise in producing the goods in which the absolute disadvantage is small-est and then import the goods in which the absolute disadvant age is largest. In the perspective of comparative advantages, freeing up trade would give the developing countries a chance to specialise in the production of primary goods and export the surplus to the developed countries in exchange of e. g. industrial goods (Salvatore 2012).However, some sources argue that when the trading is between a poor country trading primary goods and a rich country trading industrial goods the latter will benefit the most, because the poor country will have to export more in order to import a similar amount (Madely 2000). In contrast, Samuelson (1939) argues that any kind of trade is better than no trade and Salvatore (2012) concludes that developing countries should continue trading as long as they gain. The capital they get from the trade should be used to improve their technology, which will change their comparative advantages from primary goods to more refined goods.This is supported by Winters et al. (2004) who point out that connection be-tween the l iberalisation of trade and growth have not yet been completely proven, however there is no proof that trade should be harmful to growth. Moreover, barriers of free trade are not the only factor causing poverty; wars, corruption, diseases, and natural disasters are just a few internal fac-tors that keep the poor countries in poverty (Salvatore 2012). Another argument for free trade is that it would utilise the developing countries unutilised resources, caused by the insufficient national demand, more efficient.Free trade would give productions in developing countries a chance to sell their surplus on a greater market and with this give the developing countries a vent for their surplus (Salvatore 2012). Furthermore, free trade would increase the efficiency of domestic producers in order for them to compete with foreign companies. In addition, the expanding of the market size would form a basis for division of labour and economies of scale (Salvatore 2012). Advocates of free trade argu e that free trade will maximise the world’s welfare (Bussolo et al. 2011).This is supported by the theory of imposing tariffs in small and large countries (Salvatore 2012). A small country is defined as a country where changes in the domestic market would not affect the international market price and a large country is defined as a country where changes would affect the international market prices (Salvatore 2012). If a small country imposes import tariffs they will experience an overall loss in welfare, because of deadweight loss which is caused by inefficiency in domestic production. If a large country imposes tariffs they will xperience an improvement in welfare because they are able to affect the international market price, the producer’s surplus rise and the government’s revenue increases (Salvatore 2012). However, gains from tariffs are often only short term; when a large country imposes tariffs their trading partners probably will too. This will result in reduced traded volume, which in the long term will cause a decrease in world welfare. Madely (2000) argues that free trade, historically, has raised the welfare of many nations, however, but not for the poorest nations.He claims that free trade mostly benefits the multinational companies, because the rise of food import has forced the smaller farmers to sell their land to the larger companies. Furthermore, the multinational companies do not have any commitment or loyalty to the country in which they are active, which means that the poorest stay poor. In contrast Dollar (2005) claims, that the fast growth and reduction of poverty has been strongest in the developing countries that have included themselves in the world economy most rapidly.Furthermore, Salvatore (2012) states that trade will move new technologies, ideas, and managing skills from the developed countries to the developing countries. So even though multinational companies are taking over the small farmer’s land t hey still provide the producing country with new knowledge and tools that can help the country develop new comparative advantages. Winters et al. (2004) claim, that freeing up trade is one of the easiest ways to reduce poverty.Agricultural trade reforms would have the largest and most positive impact on poverty, because three-quarters of the world’s poorest people still hinge on farming as their main source of income (Anderson et al. 2011). Furthermore, the poor countries also often have a large number of unskilled workers, which give the poor nations a comparative advantage in exporting labour-intensive goods (Bhagwati & Srinivasan 2002). This paper determines that free trade overall would be in the interest of the poorest countries. Free trade will increase the global welfare and help the poor countries develop their comparative ad-vantages.Multinational companies’ investments in the poor countries will result in moving of tech-nology, ideas and skills. However, theo ry is not always consistent with practice, why it is important to examine the different perspectives in each case. Abolishing the world’s trade tariffs would indeed help the world’s poorest countries access a greater market to sell their goods, however, freeing up trade alone would not completely eliminate poverty; wars, diseases, corruption, and catastrophes are also strong influential factors of poverty.

Friday, August 30, 2019

Business Law Court Paper Assignment Essay

On November 5, 2008, I came to observe a proceeding in the King County Superior Court where the judge’s name was Shaffer Catherine. I did observe the closing arguments and the jury’s motion to the case in a criminal proceeding where subject of the case was assault in the second degree. Mark Alan Bell, as the defendant in the observed case, was charged with second degree assault for punching a man named Jesse Gill at a wedding reception, and eventually knocking him down to the ground. Bell was alleged to have punched Gill because the latter was then sexually harassing women at the wedding reception. Gill, with all freedom, also alleged to have harassed Bell’s wife and in return he got punched in the face by Bell. To stop the commotion caused by the harassment by done Gill and the eventual punching against him, people at the wedding responded by calling the police. The state ended up charging Mark Bell for assault in the second degree for the alleged punching against. With Bell having been charged with assault in second degree in a criminal proceeding, it was a big surprise to me when Judge Jude Shaffer changed the case into civil one because of self defense invoked by defendant Bell. At this point, the court went to recess before bringing the jury back out. While in court recess, we went to the defendant’s lawyer and asked him a couple of questions. I am not sure as to what the lawyer’s name but she was the only one that was willing to talk to us about the case. The prosecutor simply walked out as soon as the court went to recess. The defendant’s lawyer told us that the trial has been going on for about two weeks then and that luckily the judge had decided that the defendant was not guilty to the second degree assault charge when we came to observe. The same lawyer also told us that she was still waiting for the jury to come out and decide whether or not Bell should get the money back from the state, e. g. money he had lost from work while in court, lawyer fees, parking fees, etc. The defendant’s lawyer gave us a very informative briefing and was very helpful. After talking to the defendant’s, lawyer the court resumed and the jury was brought into the courtroom. It was interesting to see them come right out and sit in a very organized manner. The defendant’s lawyer and the prosecutor both talked to the jury and explained their side of the argument. The defendant’s lawyer seemed to convince the jury that the state should pay Bell all of the money that he had lost as a result of being brought to court. After the prosecutor and the defendant’s lawyer got done explaining their views to the jury, the judge summarized parts of the case to the jury and concluded by saying that the defendant was not guilty to the second degree assault charge. The judge then asked the jury two questions. The jury could only say a simple â€Å"yes† or â€Å"no† to each question and nothing else. All twelve said â€Å"yes† to each question. Soon after that the criminal case was dismissed by the court, happiness broke out for the defendant, his lawyer, and his family. The prosecutor quickly congratulated the defendant’s lawyer and walked out the court thereafter. Bell had about three family members that were in the court. Including us, it was a total of 5 people listening to the case. This seemed odd to me because I had always thought that a lot of people would be inside the court just like the movies and television shows. As we were leaving the court, we also congratulated the defendant’s lawyer and thanked her for the help. We asked the lawyer if we could get some documents explaining the case and what had happened during the two week trial. The lawyer gave us a case number and told us to go down to the sixth floor and use the computers they have there to search documents using that case number. We did as she had said, but unfortunately we found no documents as they were not yet available for this case. Part 2 – Opinion This case was a very interesting event. I always knew but never truly accepted the fact that any offense in this country could actually go to court. Protecting yourself or others could still get you into trouble and you could still be made to answer in the court of law. Mr. Bell was found by police to be the one assaulting but his act as came out of decision was in defense of other persons including his wife from being harassed. His act of punching Gill, the harassing person, was seen by the police as an act of assault and for which reason he was charged with a crime of assault in second degree. But since Bell was doing what was normal in humans, as found by court, in order to assert their right of defending other people’s honor or person, then, I believe the courts’ decision to change from criminal case to civil case must not be baseless after wall. The court may have found that there was no criminal intent on the part of the Bell to be charged of the crime since Bell was fully exercising a valid of defending another person including his wife or primarily defending first his wife before the others. Indeed how could he be charged something when he was not doing the punching to attach Gill for nothing but was using necessary the means to alert Gill that was already out of his mind or perhaps committing a crime in making the harassment? Having right people to help you out and protect you in a court case or situation must be interesting because one’s honor or liberty is at stake. I mean the defendant could either win or lose the case. If he loses he goes to prison or if he wins he gets free. If Mr. Bell did not have a good lawyer to help him out, he would have been totally charged with assault and would then have to face serious consequences. To have observed the defendant’s lawyer in helping Mr. Bell out with all the accusations against him was rather touching. So much pathos has to be used in order to overcome the facts on paper. In other words, the lawyer had to be emotional by having others imagine if they were in such a situation. I think it is the human drama in court that made my court experience very much interesting although I may not agree with the outcome of the court’s decision. My reason for disagreeing in the decision is that I would be mad if my girlfriend was sexually harassed or other women in front of me but I find not a valid excuse to lay a hand on someone else for mere harassment. I don’t believe that I should have the right to defend someone else, unless they are being physically hurt and even then the best thing to do is to stop the action and not cause more damage. In my understanding, Mr. Bell was never once touched during the wedding; rather he started the fight and the damage by â€Å"punching† another guy. As bad as it sounds to a person’s pride or ego, Mr. Bell should have totally been charged with assault. I thought that the attorney did a pretty decent job defending Mr. Bell. I mean, given the fact that I am against the outcome of the court, the lawyer must have done a good job to get him out of the trouble that I think he should be in. Perhaps my understanding was not supported by evidence as presented or controverted by the lawyer as there is the possibility that the fight did not really start from Mr. Bell and that he was acting in defense of his wife’s honor. If such was the real case borne by evidence, I believe there should be justification for the dismissal of the charge against Bell. To believe this latter version would seem reasonable because the punch was in direct response to the dishonor caused to the wife due to the harassment. I mean punching a man by another to the defend a wife’s honor need not me unreasonable enough to justify the assault. But then as I said, this latter version is different from my own understanding as stated earlier. The trial could be described as well run with the defense lawyer, prosecutor, the judge and the jury having performed their functions in the case. But again, since I do not agree with the decision due to my own understanding of the facts, I feel not emotionally at ease with the way things have come about. However, the fact that the criminal proceeding was change to civil proceeding and the fact that the judge had the agreement from the jury on the questions propounded, it stands to good reason that perhaps justice is served upon the accused or defendant. The fact the lawyer also mentioned about the defendant having to claim the lost amount of money or damages against as a result of Bell being dragged to court, may be taken as a reason to merit the strength of the decision acquitting the defendant. To sum it all, I believe the difference of my opinion as to what should have been done by court and my disagreement with the result would have to be considered really on the basis of what really happened as borne by evidence. Since I may not know the complete facts if my only basis is my observation, I believe I should have the access to more information that may have to answer questions in my mind as to the result of this case. I believe the case is important or any even any case that would merit the attention of the judge and jury. To be brought to court which could put one’s life, honor, property or person at stake must be of paramount importance. Nobody wants to have a guilty person set free but nobody wants to see an innocent person also to be in jail. Work cited TITLE LXII, Criminal Code, Chapter 631, Assault And Related Offenses, Section 631:2, {www document} URL, http://www. gencourt. state. nh. us/rsa/html/LXII/631/631-2. htm, Accessed November 18, 2008

Thursday, August 29, 2019

BHM 443 -Legal Aspects of Health Care (Module 4-SLP) Essay

BHM 443 -Legal Aspects of Health Care (Module 4-SLP) - Essay Example The case was rather simple and the death of the victim could have been prevented. In fact, the cause of his death resulted from Clostridum difficile infection ( complication of antibiotic therapy ). The patient had dental abscess in which the doctor prescribed antibiotic therapy. Due to the aforementioned infection, the patient experienced severe diarrhea for five days that led to dehydration and shock. Unfortunately, the doctor did not even suspect that the cause could have been the antibiotics administered to the patient that led to C. dif infection. Later, the patient was transferred to Eden Medical Center since he was already in shock and undergoing respiratory distress on November 24, 2005. He died the following day and the coroner’s report showed that his death was the result of â€Å"cardiovascular collapse due to clostridium difficile infection.† What is unfortunate here is the fact that the patient’s death was not related to his mental illness nor its symptoms. Moreover, other medications such as Flagyl could have prevented the diarrhea if only the physician checked the charts well and studied the prolonged cause of diarrhea. â€Å"a cause of action for the death of a child who leaves no surviving spouse, issue, or issue of deceased children, caused by the wrongful act or neglect of another, may be asserted by decedents parents.†( CCP Section 377.60(a), Probate Code Section 6402, Nelson v County of Los Angeles (2003) 113 Cal.App.4th 783). The case was a clear manifestation of neglect from the doctor’s side since she did not even consider the idea that Clostridum difficile could have caused the diarrhea considering that the doctor was even a medical internist. The facility was also sued ( vicarious liability ) since the staff did not even inform the doctor that the patient’s condition worsened as he began soiling his

Wednesday, August 28, 2019

Discussion Board Assignment Example | Topics and Well Written Essays - 250 words - 12

Discussion Board - Assignment Example This simply means that the conditions one experiences in prisons may vary from one place to another. Therefore, asserting that convict criminologists have more credibility in regard to their information of prison life is a farfetched idea. On the other hand, prison is a dynamic place where people get convicted on a daily basis with different criminal offenses. Political systems are also changing on a daily basis meaning that new rules and regulations governing human actions are formulated and implemented each time, thus an action that was not considered a crime in the early 90’s could be considered a crime in the contemporary society and vice-versa. This creates a need for continuous learning on issues ascribed to prison life, thus one person cannot claim that owing to the fact that he was convicted ten years ago, he is in a better position to comprehend prison-related issues than other scholar. In conclusion, the credibility of convict criminologists, does matter, they have a unique source of knowledge that is not possessed by people who have never been

Tuesday, August 27, 2019

Abnormal family Essay Example | Topics and Well Written Essays - 1250 words

Abnormal family - Essay Example , this easy examines the various problems that women face all over the world such as relationship issues in marriage, their happiness, fertility issues, self identity, and freedom. I would like to thank my dear mother who took care of me and encouraged me to follow my dream of being a writer, despite being a woman. Notwithstanding all the problems she went through for educating her girl child, she was able to educate me to university level, and study the course of my dream. Thanks to all mothers out there who have done the same for their children in order to create a better world. Furthermore, I thank all female organizations that have purposed to educate women on the importance of fighting for their rights in relationships and independence. In the novel, the two women Jane and Akiko live in different parts of the world, but are connected by a cooking TV show known as ‘The American Wife’, which shows American housewives making wholesome American meat dishes (Ozeki 8). The show is produced by Jane the filmmaker, while Akiko watches it and prepares the meat dishes to her husband, but she runs to the bathroom to throw up. However, according to (Ozeki 12), the meat is used as a metaphor, in which the cows refers to women, chattel to wives, the meat or flesh refers to the bodies of women, as well as the sexual and the irreducible element of human identity. The television is used metaphorically to refer to the meat market, and Jane represents the physical image of the American housewives that satisfy the needs of the Japanese TV consumers. The year of meats is makes a deductive argument by highlighting lesbianism issues in the society. People in the society usually have negative attitudes towards people who are not heterosexual mainly in terms of relationships, identity and community. This is called homophobia and mainly leads to discrimination of such people. It occurs in terms of workplace discrimination, physical attacks, and homophobic jokes among others.

Monday, August 26, 2019

Are Health Hazards Greater If A Person Begins To Smoke As A Teen Research Paper

Are Health Hazards Greater If A Person Begins To Smoke As A Teen - Research Paper Example 1). The number of teen smokers is increasing daily with around 3,900 of them below 18 years of age and 1,500 of them become habitual smokers in the future (Teen Smoking par. 4). Teen smoking declined in the middle of the 1990s but again increasing in number (Teen Smoking par. 1). The American Lung Association report mentioned that 4,800 teenagers are tasting their first cigarette every minute (par. 1) during their sixth or seventh grade (Teens and Smoking par. 6), and 2,000 of them will become chain smokers (par. 1). Girls smoke tobacco products as much as boys do (American Cancer Society 4). Everyday, around 6,000 individuals below 18 years start out to smoke (Teen Smoking Statistics par. 2). With around 2,000 of them to continue smoking, they comprise the new 800,000 new smokers annually (par. 2). The present statistics of adult smokers has 80 percent that started as teenagers (Teens and Smoking par. 1). ... 2). During the 2009 survey, for every four high school children, one is a tobacco user (American Cancer Society 1). Statistics have also shown an increase in smoking among Hispanic and white teenagers, but a decline among the black (Teen Smoking par. 2). Current trend indicate that an estimate of 6.4 million adolescents and teens will â€Å"die prematurely from a smoking-related disease† (Teen Smoking Statistics par. 2). With continued use as teens get older, they will have the following problems: early heart disease and stroke, chronic lung diseases (e.g. emphysema, bronchitis), gum disease and tooth loss, hearing loss, and vision loss (e.g macular degeneration) (2). There are around 4,000 chemicals (Some of the Chemicals par. 1) found in tobacco products (many of them cause cancer, cardiovascular and respiratory diseases) such as, Acetaldehyde, Acetone, Acrolein, Acrylonitrile, 1-Aminonaphthalene, 2-Aminonaphthalene, 3-Aminobiphenyl, 4-Aminobiphenyl, Ammonia, Anabasine, Anat abine, Arsenic, Benzene, Benzo[a]pyrene, 1,3-Butadiene, Butyraldehyde, Cadmium, Carbon monoxide, Catechol, Chlorinated doxins/furans, Chromium, Cresols, Crotonaldehyde, Eugenol, Formaldehyde, Glycerol, Hydrogen cyanide, Hydroquinone, Isoprene, Lead, Menthol, Mercury (Example Constituents 1-8), and numerous others. Smoking will expose a teen or adolescent with so many harmful and toxic chemicals from tobacco that can cause cancer and other diseases. The body of a child smoker is still fragile and undergoing development which can be affected by the toxic components. Starting to smoke as a teen poses greater health hazards to a person due to toxicity of cigarette chemicals, the fragility of a teen’s body, and addiction nicotine induces on the smoker. Causes of Teen

Sunday, August 25, 2019

Describe the types of communication mechanisms that can be adopted by Essay

Describe the types of communication mechanisms that can be adopted by A&S fashions limited to help ensure better understanding a - Essay Example Staff members who will receive the message are the decoder while the channeling could be through word of mouth or a written memo. Once the staff members receive the message, they may relay back some feedback to management. In this paper, the most effective ways Alex and Sons fashion limited could use to help solve structural and coordination problems it is currently facing will be outlined. The paper will identify the exact coordination problem that faces this business. Further, it will formulate a work plan on the best way forward. Alex and sons fashion limited faces a few coordination/communication problems. The marketing department feels that the human resource people are not recruiting the right talent to drive sales upwards. They also feel that the finance department is not allocating enough funds to enable it carry out promotions and marketing operations. Marketing department also has a query with the people in logistics and operations unit (O'rourke, 2009, p.23).  They belie ve that this department is taking too long to deliver inventory such that once it arrives to the trading floor, it is no longer fashionable and customers will not buy. The operation department feels that their suppliers are being lured by more attractive incentives from the competitions and as such are not as responsive to their supplies team. They also feel that the marketing department is not motivating their people with incentive such as bonuses and commissions to help drive sales upwards. Further, they believe that the finance department is not allocating enough resources to recruit better designers. The finance department in turn thinks that if all departments could work together, they could meet the company’s goal that is to maximize profit. The result of this will in turn mean that they have enough funds to disburse to different departments. The staff members also have issues with the management team. As result of remarks made by Alex recently in an interview, the staf f feel threatened and have issued a strike notice and gone ahead to strike. They want their job security and the temporary workers want to be employed on a permanent basis with benefits. To solve this myriad of problems, the following communication techniques can be employed. Bringing in an expert in communication can be a very effective way to solve some of these problems. The expert may organize seminars, training or lectures on communication. Timely advice on the best way forward and detailed action plan would be draw by the expert. The guru could work on a consultancy basis and will be coming in to monitor how effective the techniques suggested are coming through (Fielding, 2005, p.34).  There are several firms involved in communication, most charge a few hundred pounds to several pounds depending on the duration they will be involved with a firm. One of the best ways to improve communication in an organization is to solicit feedback from each member on how effective they thin k each member communicates. A&S fashion limited could organize weekly meetings solely dedicated to this. At these meetings, members would solicit feedback and further ask for suggestion on the best communication techniques they think would apply to them (Coghill & Garson, 2006, p.54).  In addition, weekly status report should be organized. During this meeting, what has been

Saturday, August 24, 2019

Recharch in business Essay Example | Topics and Well Written Essays - 1500 words

Recharch in business - Essay Example In general these people are called or considered as leaders within their particular field of operation. The term leadership simply means the method of influencing a group of people & guiding them towards the accomplishment of a common objective. Our present topic of discussion is the effect of leadership within a workplace and its application within the management of an organization. Generally the organizations get highly benefitted by the implementation of proper leadership approaches as it results in improved quality of goods & services produced by the organization (Maslanka, 2004). What is leadership? Leadership refers to the way by which an individual organizes a group of people so as to achieve a common goal. Leadership is a process of social influence in which an individual attempts to gain the support and help of a group of people to accomplish a common goal (Northouse, 2010, p.4). â€Å"Effective leadership is not about making speeches or being liked; leadership is defined b y results not attributes†-Peter Drucker (RAUP, 2012). â€Å"A leader is one who knows the way, goes the way, and shows the way†- John C. Maxwell (Akbarzadeh, 2011, p. 123). ... A leader must be reliable, and must be able to offer trust and confidence to his or her followers. A leader must be able to communicate to his or her followers clearly and efficiently. Proper supervision is essential. A leader must be modest, helpful and co-operative as because he or she have to lead a team of followers. Dictatorship is an important characteristic of a leader, but it needs to be fair and just. Overconfidence and ruling attitude has a negative impact. A leader must be capable of handling responsibilities and take strategic decisions as per requirement (Maxwell, n.d). Leadership styles 1. Transformational Style- in this style the leader guides and transforms the staff. The leader makes continuous efforts to address the grievances of the employees and motivate them for improved performance. Here open communication between the staff and the leader is always encouraged and the leader follows participative style of management. The staff gets highly influenced by the leader in Transformational Leadership Style. (Lai, 2011) 2. Transactional Style- Here the main focus of the leader is on management’s objectives. In this style the leader constantly motivate his followers by offering rewards for completed tasks. These leaders are mostly work oriented; they usually follow a particular structure and practice directive style of management. In this style of management, innovativeness and creativity are ignored and people are often motivated by the use of extrinsic motivational factors like incentive and holiday trip (Hood, 2007, p.16) 3. Laissez-faire Style- This is also termed as Passive Leadership which exercises least control on the staff. The managers avoid the responsibility of setting objectives and

Friday, August 23, 2019

Lerning orgnistion Case Study Example | Topics and Well Written Essays - 5500 words

Lerning orgnistion - Case Study Example In this context, the key str'tegic m'n'gement question is, wh't strengths must 'n org'niz'tion develop to rem'in relev'nt 'nd competitive' This contextu'l shift, implies th't the competitive 'dv'nt'ge, even surviv'l, of enterprises depends on their 'bility to le'rn f'ster th'n their competitors 'nd to 'pply or embed le'rning in systems, processes, 'nd pr'ctices. It is underst'nd'ble th't concepts such 's 'ction le'rning, te'm le'rning, org'niz'tion'l le'rning, work-b'sed le'rning 'nd cross-cultur'l le'rning h've become ' centr'l focus. It is the purpose of this p'per to 'ssist in bridging the g'p by suggesting ' pr'ctic'l 'ppro'ch to workpl'ce le'rning th't is linked with org'niz'tion'l objectives 'nd integr'ted with project m'n'gement. The p'per develops the models of org'niz'tion'l le'rning 'nd work-b'sed le'rning 's well 's provides the discussion of differences in these two 'ppro'ches. The b'rriers to work-b'sed le'rning 're covered in the c'se study th't critic'lly demonstr'ted the 'ppro'ch of org'niz'tion'l le'rning 'nd project-b'sed le'rning on the ex'mple of p'rticul'r org'niz'tion. This p'per h's two p'rts. ... e, even surviv'l, of enterprises depends on their 'bility to le'rn f'ster th'n their competitors 'nd to 'pply or embed le'rning in systems, processes, 'nd pr'ctices. It is underst'nd'ble th't concepts such 's 'ction le'rning, te'm le'rning, org'niz'tion'l le'rning, work-b'sed le'rning 'nd cross-cultur'l le'rning h've become ' centr'l focus. It is the purpose of this p'per to 'ssist in bridging the g'p by suggesting ' pr'ctic'l 'ppro'ch to workpl'ce le'rning th't is linked with org'niz'tion'l objectives 'nd integr'ted with project m'n'gement. The p'per develops the models of org'niz'tion'l le'rning 'nd work-b'sed le'rning 's well 's provides the discussion of differences in these two 'ppro'ches. The b'rriers to work-b'sed le'rning 're covered in the c'se study th't critic'lly demonstr'ted the 'ppro'ch of org'niz'tion'l le'rning 'nd project-b'sed le'rning on the ex'mple of p'rticul'r org'niz'tion. This p'per h's two p'rts. P'rt ' suggests ' model for project-b'sed workpl'ce le'rning th't integr'tes work 'nd le'rning with theory 'nd pr'ctice within ' project m'n'gement fr'me. This 'ppro'ch dr'ws on the liter'ture rel'ting to c'p'bility, org'niz'tion'l le'rning, 'nd project m'n'gement. P'rt B is ' c'se study of the 'pplic'tion of this 'ppro'ch in 'n British public sector 'gency. The lessons le'rned m'y be 'pplied in other settings 'nd 'lso provide opportunities for focused rese'rch on org'niz'tion'l le'rning. P'rt ': ' Model of Project-B'sed Workpl'ce Le'rning 1. Org'niz'tion'l le'rning 't le'st three dilemm's 're r'ised by the liter'ture on org'niz'tion'l le'rning: whether to develop ' le'rning org'niz'tion before developing org'niz'tion'l le'rning; whether to invest consider'ble le'd time to develop (or 'd'pt) the preconditions 'nd co-requisites for effective

Bill of Rights 2nd Amendment Essay Example | Topics and Well Written Essays - 1750 words

Bill of Rights 2nd Amendment - Essay Example 1). Arms in this case include any kind of firearms (handguns, rifles, and shotgun among others). The Second Amendment, as intended by the founding fathers, gives individuals the constitutional right to bear arms although the state reserves the mandate to regulate their ownership and use. This paper will analyze the Second Amendment to the Constitution of the United States in light of its history and controversial nature. Although the Second Amendment was ratified in December 1791, it was passed by Congress on September 25, 1789 (National Constitution Center par. 1). The history of the Second Amendment to the American Constitution traces its roots to the English law which held that people have natural rights to defend themselves against aggression. Before the American Revolution English Settlers in America held the view that the right to bear arms or state militia was important for several reasons. Some of the reasons that that they assigned to bearing arms included: to repel invasion; to facilitate self-defense; for law enforcement; to suppress insurrection; to prevent tyrannical government; and to enable the organization of a militia system (Adams 47). This was indeed the case in the different states that today make up the United States as evidenced by their individual constitutions. For example, the Constitution of Pennsylvania expressly stated that the people have a right to arms for which they c an use to defend the state or themselves. Before the American Revolution took place, colonists who pledged their allegiance to the British government bore arms, forming a colonial militia (Adams 82). However, with the passage of time some colonists developed mistrust for the British government and by extension, distrust toward those who were loyal to it. The colonists who favored independence from British rule established colonial legislatures that were free of the control of the British government. They used these

Thursday, August 22, 2019

The Kite Runner Essay Example for Free

The Kite Runner Essay During the late 70s early 80s there was a strong disagreement between races in Afghanistan. In particular the Pashtun and the Hazarah. Two forms of the same religion but with only 1 difference. The Pashtun were higher up in the community than the Hazarah. The Pashtun were considered clean and fit to rule because they were primarily of pure descent unlike the Hazarah (Pashtun encyclopedia Britannica page 2). The Hazarah were looked down upon because they are usually of mixed families and were considered below the Pashtun (joshuaproject. net page 1-3). ?As the higher ups the Pashtun were wealthier and had more friends in the higher up chain of command in the Afghani government. They had servants who were normally Hazarah. The Hazarah were lower in class and used their labor to make a living by becoming servants to the Pashtun. Like Hassan was to Amir and Baba. ?Amir the main character and novel narrator is of the Pashtun religion and because of this he is accustomed to having the things he wants handed to him on a silver platter. The only things Amir feels deprived of is a deep connection both emotionally and figuratively with his father Baba. He blames it on himself because he is so different than Baba in so many ways. He also feels responsible for the death of his mother who died during Amir’s birth (muse. jhu. edu page 1-5) ? Hassan who is Amir’s best friend is of the Hazarah religion and is a lower class than Amir and the Pashtun. Amir overlooks this fact and is a loyal friend to Hassan until Hassan gets raped and Amir didn’t do anything to stop it or help him. After Hassan gets raped something changed in Amir. He began to feel guilty and his guilt began eating away at him. He became a total jerk to Hassan and Hassan had no idea why (Hazara encyclopedia Britannica page 1-3). ?Some of Amir’s guilt is directed towards Hassan who receives Baba’s affection instead of Amir. Amir feels that Hassan (a Hazarah and one of his family’s servants) is beneath him and shouldn’t be getting Baba’s affection as much as he is. ?Baba sees Amir as a coward when he is a boy. Amir lets Hassan fight all his battles for him which is why in my opinion Hassan gets more of the affection from Baba. Baba wishes that Amir would learn to fight his own battles from Hassan and ultimately grow a backbone and become more of a man that Baba wants him to become. Although its hard to see in some parts of the novel, religion is always present. Whether it be the beginning of the novel where Amir and Hassan are flying kites or it be at the middle where Amir and Baba are traveling to America. Once in America Baba and Amir began to bond more and ultimately become as close as they wanted to be for a very long time. Baba falls ill after Amir graduates from college. Baba’s last great act before his death is he (on Amir’s behalf) asks for an Afghani general’s daughter’s hand in marriage. Amir then marries her right before Baba’s death. After Baba’s death Amir focuses on his writing the stories he came up with. Once his first novel gets published he gets a call from Baba’s friend back in Afghanistan and he asks Amir to come back to the land of his childhood and take care of him. Amir agrees and travels back to Afghanistan (the kite runner page 194). Once back he meets Baba’s friend and he learns that Hassan wrote him a letter shortly before his murder at the hands of the Taliban. Amir learns that Hassan was actually his brother and that Hassan had a son that got sent away to an orphanage after his murder and it became Amir’s duty to go and find Hassan’s son. ?As Amir takes on the challenge of tracking down Hassan’s son he travels all over Afghanistan until he finally finds where the boy is. Amir talks to the man who took Hassan’s son and saw that he was using the boy for his own entertainment by attaching bells to his hands and feet and made him dance. (the kite runner page 278) The reason why the man is making Hassan’s son dance it to assert his authority and put the Hazarah boy in his place below the man who now is his guardian before Amir gets ahold of him (Hazarah encyclopedia Britannica page 1).

Wednesday, August 21, 2019

Working Together to Safeguard Children | Policy Analysis

Working Together to Safeguard Children | Policy Analysis This paper will consider the impact of the â€Å"Working Together To Safeguard Children† child protection policy on the clinical practice of the nursing profession in a general community clinic. The current legislative framework for child protection will be considered with regard to the 1989 Children’s Act, with special reference to the obligations of health professionals working with vulnerable children and their families. Research evidence on the role of nurses in the detection of child abuse will be considered. Furthermore, the paper will discuss the implications of developing existing general practice child protection procedures to include a more active and explicit role for child protection by medical and nursing staff. As Stower (2000) has argued, â€Å"Child protection is the term used by all agencies when there is a suspicion that a child or children (all or some of the children in a family) are at risk of being abused by any adult, family member or non-family member† (p 48). The 1989 Children’s Act was introduced to improve inter-agency cooperation between social services, health and education agencies in the provision of assessment and intervention with vulnerable children. One category of vulnerable children addressed by the legislation were children that have been subject to abuse. The central aim of the 1989 Children’s Act was to emphasis that the welfare of the child is of paramount importance at all times, and that professionals working with vulnerable families should promote cooperation and partnership where-ever possible. It afforded children the right to protection from abuse and the right to have inquiries made about their individual circumstances to safeguard them from harm. The Children’s Act 1989 raised the controversial issue of parental rights, patient confidentiality and a duty of health professionals to protect children and share information with appropriate other agencies with a view to protecting a child. In 1991, Working Together under the Children’s Act was published and it updated guidance on child protection, with an emphasis on different professional groups â€Å"working together† towards the interests of the child. This was replaced by Working Together to Safeguard Children in 1999. This policy document made it very clear that protecting the child was a higher priority than maintaining confidentiality. However, it recommended that parents should be informed when a professional was going to make a referral to social services, unless asking for permission from parents was likely to place the child ‘at risk’ of significant harm. The â€Å"Working Together To Safeguard Children† (WTSC) polic y was based on the legislative framework of the Children’s Act 1989. It outlined the specific roles and responsibilities of community nurses where child protection concerns had been experienced in their clinical practice. It stated that where child abuse was suspected by nursing staff, careful records of parental attitudes and behaviours should be made. This might include reference to the grounds for suspicion, such as a delay in seeking treatment for an injury, unexplained injuries on a child or variation in parental account of how an injury occurred over time, or between parents (Benger and Pearce, 2002). WTSC recommends a non-confrontational, information gathering approach to early investigations of child abuse by community nurses staff, with a strong emphasis on discussing concerns with the child’s GP, who may have detailed knowledge on the circumstances of the child and their family. Where there are concerns that the child maybe at â€Å"at risk of significant ha rm†, nursing and medical staff may contact the social services department to make an official referral. It is standard practice for the GP to make a child protection referral, but â€Å"when there are conflicting opinion, either by medical, managerial or senior colleagues, if the nurse is still convinced that there is a child protection issues, she or he is individually accountable and should refer it to social services† (p 51). However, under the current legislative framework, social services personnel may wish to contact the referral agency for further information on the child’s health and to undertake â€Å"network checks† with all the agencies involved. The GP or nurse maybe invited to an inter-agency strategy meeting attended by social services staff, the police and other relevant staff to discuss their child protection concerns and decide upon a plan of action. Furthermore, the GP or nurse maybe invited to a child protection conference that may lead to the decision to record the child on the Child Protection Register. The Child Protection Register is available to appointed child protection staff within health organisations, to check if a child is known to social services for reasons of emotional, sexual and/ or physical abuse, or neglect (WTSC, 1999). General guidelines on child protection are provided as part of the policy document. It is stated in section 1.13 that â€Å"For those chil dren who are suffering, or at risk of suffering significant harm, joint working is essential, to safeguard the child/ ren and where necessary – to help bring to justice the perpetrators of crimes against children† (p 3). It recommends that health professionals should be vigilant to the possibility of child abuse amongst patients and â€Å"be alert† to the potential risk that abusers â€Å"may pose to children†, and â€Å"share and help to analyse information as that an informed assessment can be made of the child’s needs and circumstances† (p 3). The WTSC policy stated that it was important that every organisation that came into contact with children had a child protection policy in place, but gave little guidance on what the child protection policy should be. It can be argued that the child protection policy should be revised regularly to take into consideration new developments within general practice, such as the introduction of electroni c patient record systems, or change of staff or clinical services. Changes to policy should be undertaken collaboratively between GP’s, nurses and administrative staff that have contact with children. The importance of health care systems in the protection of children has been made clear in recent years, and lead to legislative changes that are presently being implemented as part of the 2004 Children’s Bill. Victoria Climbie died in February 2000 as a result of severe and repeated physical abuse and neglect by her caregivers that amounted to 128 separate physical injuries being recorded at the time of her death. The appauling circumstances of her death trigged a public inquiry, led by Lord Laming (2003), who identified 12 opportunities by health, police and social services agencies to protect this eight year old girl from many months of brutal abuse and neglect. One source of criticism in the Climbie report was directed at the health care system, in particular Accident and Emergency departments, that had misdiagnosed her physical injuries of scratches and bruises as being the result of scabies in June 1999. Social services were not notified of any child abuse concerns by do ctors at this time. In July 1999, Victoria Climbie was readmitted to hospital for treatment of burns, but due to poor communication between health professionals, social services and the police no full assessment of the child was ever made (Hall, 2003). The Lord Laming report recommended that agencies work more closely together, with better training and interagency cooperation to prevent child abuse. As Hall (2003) argues, â€Å"Amid the justifiable horror at the death of Victoria Climbià © and the focus on violent physical abuse, we must not neglect the opportunities for prevention. This too is the responsibility of all who work with children, but in the health service it particularly falls on primary care staff, including midwives, health visitors, school nurses, and on those working with mentally ill adults and drug misusers† (p 294). Lord Lamings recommendations were reflected in the 2004 Children’s Bill that aims to set up a central electronic record for every chi ld in the country that would contain sensitive information on professionals who were involved with them. It is believed that such a system would make it easier for appropriate professionals to make ‘informed judgements’ about the safety of children, based on information gathered from other agencies with an interest in the child. However, the new legislation is controversial because of concerns about civil rights, and the Government are currently in consultation with local education authorities with a view to piloting the electronic record system. In the UK, four types of child abuse are currently recognised under the legislative framework. These can be classified as neglect, physical injury, emotional abuse and sexual abuse. Physical abuse and neglect maybe the most often encountered type of child protection problem in community practice, but it is easy to mistake physical abuse for accidental injury (Breslin and Evans, 2004). The estimated burden of physical child abuse in the UK population is 2.7 children per 1000 per year, according to the NSPCC (Breslin and Evans, 2004). This means that every general practice in the country could include a sizeable minority of families registered with them where physical child abuse is occurring at home. When children attending Accident and Emergency departments for treatment, it is standard practice to send a notification of attendance and reason for attendance to the GP. When medical staff have suspicion of child abuse, a careful examination of the medical records may show that a child has a history of injury. Shrivasta (1988) found that 22 out of 108 children (20.4%) had one or more admission to hospital for non-accidental injuries over the 5 year period of the study. Furthermore, Fryer and Miyoshi (1994) have shown that abused children are ‘at risk’ of being re-abused over a relatively short period of time. In their study, 69.2% of children that suffered from a reoccurrence of abuse, did so within 360 days of the prior abuse event. Furthermore, in their study 9.34% of children were re-abused in the four year period of the study, and the risk of multiple reoccurrences increased after every abuse event. Therefore, it is not possible for health professionals to discount evidence of child abuse as being a ‘one off’ episode that is unlikely to happen again, without a full investigation of the child’s needs. It is possible to check if a child is registered with social services on the Child Protection Register. However, this is a poor measure of risk because only the most serious cases of child abuse will ever be registered, and children rarely stay on the Child Protection Register for more than two years due to current social services policy. Greenfields and Statham (2004) have shown that the decision of health agencies to act on suspicious injuries is affected by knowledge of whether they are registered on the Child Protection Register or not and social/ circumstantial factors related to the child and their family, as opposed to the clinical characteristics of the case. Indeed, a third of child protection register custodians felt that health professionals gained a false sense of security from knowing a child was on the register, and did not intervene as much as where the child was not already known to social services. Research has shown that abused children who live with the perpetrator are sixteen times less likely to receive medical care for their injuries, as opposed to abused children where the perpetrator is not resident (Ezzell, Swenson and Faldowski, 1999). Furthermore, retrospective studies of adults reporting that they were abused as children are much higher than official statistics would suggest (Cawson et al, 2000). This suggests that a considerable degree of child abuse is ‘hidden from view’ and community nurses may be in a unique position to befriend families through the delivery of standard health care, such as immunisation, and be vigilant to child protection issues at this time. Furthermore, since research has shown that children at risk of abuse and neglect may not be registered with a GP (Taylor, 2004), the provision of general health checks such as the cervical smear clinic or diabetic annual review provide an opportunity for nurses to enquire after any children in the home that may not be registered at the practice. As the WTSC policy emphasises inter-agency partnership, it is possible for community nurses to contact duty social workers, health visitors and youth workers to facilitate information exchange about vulnerable young people in the area. This also provides an opportunity for information and training about the respective professional disciplines. Nurses in community settings have a potentially high level of contact with abused children and the opportunity to form ‘trusting relationships’ with children and families (Nayda, 2002). It is necessary to formulate general practice child protection policies that make best use of nursing expertise, and facilitate ‘working together’ ideals within practice between nurses, GP’s and other professionals as much as ‘working together’ with external organisations. This means that any child protection policy should include time at a weekly practice meeting where staff can exchange information about children thought to be ‘at risk’, and discuss best child protection practice. Opportunities for information exchange and inter-agency cooperation in child protection enquiries are particularly important since nurses, in one study, felt that other professionals were keen to ‘pass the buck’ rather than engaging in equal profession al consultation (Nayda, 2002). Furthermore, the nurses in this study suspected child abuse on a regular basis, but only reported it when there were no repercussions of reporting; â€Å"Their concerns were not only for the children and their families but also for themselves. One nurse stated that if her own safety was uncertain she would not report a situation where a child was at risk. However, most were concerned about the consequences of reporting for the family† (p 172). Furthermore, the decision to report about child abuse was partly informed by past experience of dealing with the child protection welfare system. As such, â€Å"some of the nurses did not report all cases of suspected abuse, knowing that reporting their suspicions did not necessarily result in action† (p 176). The nurses reported that they were reluctant to report families for child abuse because they felt it destroyed the relationship that they had developed with the families, and reporting child a buse was very much identified as a last resort when all other intervention options had failed. Through this study, it is clear that the ‘ideological’ values underpinning the WTSC policy may not be applied in practice due to difficulties contacting other professionals, and personal confidence and sense of security when making a decision about child protection. As Stower (1999) argues, there is some confusion amongst the nursing profession about their responsibilities under the Children’s Act 1989. The area of parental responsibility is not clearly defined in the legislation, and the term ‘at risk of significant harm’ is open to subjective interpretation. However, Stower (1999) suggests â€Å"This will depend on the degree of the type of abuse, the effect on the child and the circumstances surrounding the event. It must be remembered that single bruises in certain circumstances, for example, a disabled child or very young baby, could be significant an d should not be disregarded† (p 49) In conclusion, research has shown that child abuse is a common problem and one that nurses may encounter as part of their clinical practice. Research shows that community nurses are in a good position to build relationships with families, and to detect child abuse as part of their routine health screening duties. Furthermore, the new child protection policies insist that nurses report child protection concerns, and exchange information with other relevant agencies. However, in a Scottish study of training and supervision in child protection for nurses, it was observed that there was a lack of uniform availability of training opportunities; a situation aggravated by a professional resistance to clinical supervision by nurses who ‘avoided it like the plague’ and a resistance to child protection training that was perceived as not relevant to some nurses practice. â€Å"However, it is important to recognise that supervisors of these nurses may have little or no expertise in child protection issues, therefore the ability to access a specialist child protection worker in relation to specific pieces of work may be critical† (Lister and Crisp, 2005, p 67). Therefore, effective training and clinical supervision programmes, that meet nurses’ needs, may be central to their increased involvement in child protection screening and referral in general practice. References Benger J and Pearce A (2002) Quality improvement report: Simple intervention to improve detection of child abuse in emergency departments. BMJ 324, pp 780 – 782 Breslin R and Evans H (2004) Key child protection statistics. Retrived from: http://www.nspcc.org.uk/inform/Statistics/KeyCPstats/1.asp : 16th June 2005 Cawson P, Wattam C, Brooker S and Kelly G (2000) Child maltreatment in the United Kingdom (NSPCC, London) Department of Health (1999) Working Together to Safeguard Children (HMSO, London) Ezzell C, Swenson C, Faldowski R (1999) Child, family and case characteristics. Child and Family Studies 8.3 (pp 271- 284) Fluke J; Yuan Y; Edwards M (2005) Recurrence of maltreatment. Child Abuse Neglect 23.7 (pp 633 – 650) Greenfields M and Statham J (2004) The use of child protection registers (Thomas Coran Research Unit, Institute of Education) Hall D (2003) Child protection. BMJ 326: 293 – 294 Keshavarz R, Kawashima R and Low C (2002) Child abuse and neglect presentations to a pediatric emergency department. Journal of Emergency Medicine 23.4, pp 341-345 Lister P and Crisp B (2005) Clinical supervision in child protection for community nurses. Child Abuse Review 14, pp 57 – 72 Lord Laming (2003). Inquiry into the death of Victoria Climbià ©. London: Stationery Office, 2003. Retrieved from: www.victoria-climbie-inquiry.org.uk :18 June 2005 Nayda (2003) Influences on Registered Nurses’ decision making in cases of suspected child abuse. Child abuse review 11, pp 168 – 178 Prescott A, Bank L, Reid J, Knutson J, Burraston B and Eddy J (2000) The veridicality of punitive childhood experiences reported by adolescents and young adults. Child Abuse Neglect 24.3, pp 411-423 Shrivastava R (1988) Non-accidental injuries (Unpublished thesis at University of Liverpool) Stower S (2000) The principles and practice of child protection. Nursing Standard 14, pp 48 55 Taylor (2004) Integrating community child health and hospital information for communication and early warning (Royal Free Hospital Report, London) The Children’s Act 1989 http://www.opsi.gov.uk/acts/acts1989/Ukpga_19890041_en_1.htm

Tuesday, August 20, 2019

Integration of WLANS, PAN, LAN and GSM in Hmanets

Integration of WLANS, PAN, LAN and GSM in Hmanets INTERWORKING ISSUES IN INTEGRATION OF WLANS, PAN, LAN AND GSM IN HMANETS KEY TO SYMBOLS OR ABBREVIATIONS AP Access Points AMASS Architecture for Mobile Ad-hoc Systems and Services AODV Ad Hoc on Demand Distance Vector Routing BS Base Station BNEP Bluetooth Network Encapsulation Protocol CDMA Code-Division Multiple Access CGSR Cluster-head Gateway Switch Routing CSMA/CA Carrier Sense Multiple Access with Collision Avoidance CTS Clear to Send DBTMA Dual Tone Multiple Access DSDV Destination Sequenced Distance Vector Routing DSR Dynamic Source Routing GEO-TORA Geographical Temporally Ordered Routing Algorithm GPRS General Packet Radio Service GPS Global Positioning System GRDL Grid Resource Description Language GSM Global System for Mobile Communication HF High Frequency HMANET Heterogeneous Mobile Ad Hoc Network HOLSR Hierarchical Optimized Link State Routing IP Internet Protocol LBR Location Based Routing LLC Logical Link Control MAC Medium Access Control MACA Multi Hop Collision Avoidance MACAW Medium Access Protocol for Wireless LAN MAN Metropolitan Area Network MANET Mobile Ad Hoc Network MPR Multipoint Relays NAT Network Address Translation NFS Network File System OLSR Optimized Link State Routing OSI Open Systems Interconnection PDA Personal Digital Assistant QoS Quality of Service RREP Route Reply RREQ Route Request RERR Route Error SCTP Stream Control Transmission Protocol SDR Software-Defined Radio TBRPF Topology Broadcast Based on Reverse Path Forwarding TC Topology Control TCP Transmission Control Protocol TDMA Time Division Multiple Access TORA Temporally Ordered Routing Algorithm VHF Very High Frequency WAN Wide Area Network WLAN Wireless Local Area Networks WPAN Wireless Personal Area Network WSDL Web Services Description Language WSN Wireless Sensor Network ZRP Zone Routing Protocol Chapter 1 1 INTRODUCTION Recent developments in wireless communications have taken possible applications from simple voice services in early cellular networks to newer integrated data applications. IEEE 802.11 family i.e. Wireless Local Area Networks (WLANs) have become popular for allowing low cost data transmissions [1]. The most common and approachable places, such as airports, hotels, shopping places, university campuses and homes have been provided with WLAN Access Points (AP) which provide hotspot connectivity . The future advances in modern radios like Software-Defined Radio (SDR) and cognitive radio technologies will surely facilitate the need of multi-mode, multi-interface and multi-band communication devices. This heterogeneous networking paradigm will certainly enable a user to enjoy better service quality, ease of use and mobility, while keeping in view the application needs and types of available access networks e.g. cellular network, WLAN, wireless personal area network (WPAN) etc. 1.1 Mobile Ad hoc Networks The Mobile Ad hoc Network (MANET) is a network formed by mobile wireless hosts without (necessarily) using a pre-existing infrastructure and the routes between these hosts may potentially contain multiple communication hops [2]. The autonomous nature of participating mobile nodes enables MANETs to have dynamic and frequently changing network topology. The nodes are self-organizing and behave as routers. The ease and speed of deployment and decreased dependence on infrastructure have made ad hoc networks popular within very short span of time. MANET variations include Personal area networking (e.g. cell phone, laptop, ear phone), Military environments (e.g. soldiers, tanks, aircraft), Civilian environments (e.g. cab network, meeting rooms, sports stadiums), and foremost Emergency operations (e.g. search-and-rescue, policing and fire fighting). MANETs rapid deployment, ease of use and subsequent properties make them a hot choice for many important applications. 1.1.1 Resource Sharing One of the intended aspects of MANETs is that it will facilitate the sharing of resources. These include both technical and information resources. Technical resources like bandwidth, Quality of Service (QoS), computational power, storage capacity and information resources include any kind of data from databases. Resource sharing among mobile devices require the devices to agree on communication protocols without the existence of any dedicated servers. 1.1.2 Coordination System Mechanisms that enable the sharing of resources between different mobile devices, i.e. different coordination system is necessary for sharing dissimilar resources. Examples of such mechanisms are Samba, Network File System (NFS) for sharing disk space and the distributed dot net client for sharing processor cycles. 1.1.3 Trust Establishment Before nodes start sharing any resource, they demand a certain amount of trust between them or systems with which they share resources. The level of trust depends on the kind of information or resources that is to be shared. For instance, sharing processor cycles require less trust than the sharing of personal information. Similarly, sharing of profit-making or highly sensitive information can require another level of trust establishment. There are systems currently in operation that can provide a certain amount of trust like the public key infrastructure that makes use of certificates. 1.1.4 Node Discovery Before any node starts communicating with other node, that node must be discovered. When a node enters the network, it has to be capable of communicating to the other nodes about its capabilities e.g. it is a Personal Digital Assistant (PDA) and it has a camera, Global Positioning System (GPS) capabilities and Global System for Mobile Communication (GSM) capabilities etc. When a node is detected, other users can send a query to the new device to find out what it has to offer. Commercial service providers can advertise the resources they have to offer through Internet Protocol (IP) multicasts. There is a myriad of standards that include resource description protocols like Standards Grid Resource Description Language (GRDL), the Web Services Description Language (WSDL) for telling all offer devices a way to describe and publish their specific resources and needs. There are also various different systems currently available that can gather these resource descriptions and structure them for other devices to use. 1.1.5 Resource description For any device to be able to use any resource, a way to identify and describe the resource has to be agreed upon by all available devices. If, for instance, storage capacity is to be shared, it first has to be clear what the capacity of each device is, and, what the storage need is. Although there are techniques to describe certain resources but not one technique that is able to provide this service for all resources. The available techniques combined, however, cover most of what is needed. 1.2 MANET Classifications Mobile Ad hoc Networks are usually categorized as Homogeneous MANETs and Heterogeneous MANETs. 1.2.1 Homogeneous MANETs When MANETs operate in fully Symmetric Environment whereby all nodes posses identical capabilities in terms of battery, processing powers, responsibilities and hardware and software capabilities, thus having no diversity, the network is Homogenous MANET. 1.2.2 Heterogeneous MANETs In certain environments, mobile nodes may have asymmetric capabilities in terms of transmission ranges, Medium Access Control (MAC), battery life, processing powers, speed of movement and software variations etc. Mobility rate may also differ in ad hoc networks due to varying traffic characteristics, transmission ranges, reliability requirements and communication needs. Similarly, addressing and traffic flows like host-based addressing, content-based addressing or capability-based addressing patterns may be defined in certain scenarios; for example, people sitting at an airport lounge, metro taxi cabs, sportsmen playing and military movements etc Homogenous MANETs do not allow for the heterogeneity in the network, which is seriously required in many scenarios, for instance, in a military battlefield network, where soldiers usually carry light portable wireless devices and more powerful equipment like High Frequency (HF) or Very High Frequency (VHF) is installed on vehicles. So, heterogeneous mobile nodes may co-exist in a single ad hoc network making it a Heterogeneous MANET. 1.3 Criterion for Heterogeneous MANETs The integration of different communication networks like cellular networks, WLANs, and MANETs is not straightforward due to various communication scenarios, different interface capabilities and dynamic mobility patterns of mobile nodes. This exhibits many possible application scenarios where devices may unexpectedly interact, create and receive random data streams (video and music etc), or request different network services. The drawback is that each network type typically uses its own protocol stack especially in the case of medium access. In fact, frequency allocation becomes more complicated since different wireless technologies like IEEE 802.11 a and IEEE 802.15.4 may possibly operate in the same frequency band, which makes coexistence mechanisms increasingly important. A heterogeneous MANET paradigm needs to be capable of providing subsequent characteristics. 1.3.1 Transparency The network should be capable of providing seamless end-to-end communication among mobile nodes i.e. the MANET user must not be informed about the route followed or network interfaces traversed by a communication session [3]. 1.3.2 Mobility Integration among dissimilar communication networks must facilitate mobile nodes via some mobility management framework that can manage flow of information through different medium access techniques [4]. 1.3.3 Addressing Most of the IP based networks consider each communication interface as an independent network device running under its own protocol stack [5]. However, this mechanism makes it difficult to remember destinations by IP addresses. So, there must be some mechanism similar to domain name service to recognize mobile nodes with more logical and easy to remember names. 1.3.4 Configuration Various configuration options like network ID, willingness for cooperative communications, desired mobility level and intended services shall be provided to mobile users for their convenience [6]. 1.3.5 End to End security Integration between various networks and data transfer over multiple wireless hops can even expose data to malicious nodes. Security mechanisms must take care of end-to-end data security as well as route security [7]. 1.3.6 Transmission Power and interference of Nodes MANET routing protocols must take care of issues arising due to various communication ranges like communication gray zones [4] and issues arising because of various communication technologies like Bluetooth and WLAN working in same frequency band [1]. 1.3.7 Utilization of Resources In heterogeneous networking paradigm, there may arise situations where some or most of the mobile nodes are installed with different kind of resources. For example, there may be some nodes installed with location monitoring devices like GPS. Now it is the responsibility of routing protocol to benefit from such capabilities in order to facilitate location aided routing and similar services [8]. 1.4 Problem Statement Current research efforts in mobile ad hoc networks are mainly converging towards inclusion of dissimilar communication technologies like IEEE 802.11 [9] and IEEE 802.15.4 [10] to a single mobile ad hoc network. Integrations of different networks like Wide Area Networks WANs (1G, 2G, 2.5G, 3G) and Metropolitan Area Networks MANs (IEEE 802.16) wherein users can access the system through a fixed base station (BS) or AP connected to a wired infrastructure in single hop fashion are also extending towards multihop communication environment using the new and revolutionary paradigm of a mobile ad hoc networks (MANETs), in which nodes constituting MANET serve as routers. Comprehensive research efforts have been done to address the issues related to infrastructure-less multihop communications among nodes installed with dissimilar communication capabilities [3, 11, 12, 13]. However, an investigation needs to be made in order to analyze and address the issues arising from such integrations. Such problems relate to both end users convenience (For example, remembering each destination with its IP address is a cumbersome job specially when every destination may carry multiple IP addresses and any communication interface may optionally be connected or disconnected) as well as networks performance; for example, routing to the best possible interface when there are multiple interfaces installed at destination. Likewise, optimized neighborhood sensing and position based routing can help to improve heterogeneous ad hoc networks performance and scalability. 1.5 Objectives The objective of this thesis is to study the integration of different technologies like WPAN, WLAN and GSM having different capabilities and protocol stacks to mobile ad hoc networks. Performance improvement issues relating to network configuration, human understandable naming mechanism and sophisticated location aided routing mechanisms will also be discussed and evaluated on an actual ad hoc network testbed. 1.6 Thesis Organization Chapter 2 describes the different design and technological challenges arising from integration of multiple communication interfaces. Chapter 3 includes an overview of famous heterogeneous routing protocols architectures, interworking issues encountered, the limitation and solution suggested. Chapter 4 specifically discusses the adopted solution. Chapter 5 presents the details about solution implementation, protocol evaluation testbed, proposed test cases for evaluation of the proposed mechanisms and results obtained, whereas; chapter 6 concludes the research work. Chapter 2 2 LITERATURE REVIEW 2.1 Introduction The literature available on heterogeneous MANETs has suggested different combination of access technologies but no comprehensive solution comprising of maximum access technologies has been suggested yet. Some of the suggested techniques will be discussed in succeeding paragraphs. 2.2 Service Architecture for Heterogeneous IP Networks It was presented by Joe C. Chan and Doan B. [14]. This proposal is presented to resolve two main issues i.e. universal connectivity and MANET location management in heterogeneous networks. The new architecture suggested for Mobile Ad-hoc Systems and Services (AMASS) introduces a new abstraction layer called Mobile P2P overlay in order to cater for the problems such as transparency, dynamic routing, unique addressing, association, and application independence. Mobile users can associate local resources from neighboring devices, build wireless on-demand systems which is independent of location, hardware devices, networking technology and infrastructure availability. Five key design considerations considered were Mobile Peer-to-Peer Overlay, Internet Interworking, Intelligent Overlay Routing, Infrastructure-free Positioning and Application Layer Mobility. Three enhanced mobility models offered in this approach are Personal Mobility (using different IP devices while keeping the same addr ess), Session Mobility (keeping the same session while changing IP devices) and Service Mobility (keeping personal services while moving between networks). The architecture is built on a peer-to-peer communication model to integrate MANETs seamlessly into heterogeneous IP networks. Mobile Peer-to-Peer System(P2P) is a distributed Middleware addresses the demand of direct communication needs by creating spontaneous community. Whenever the Mobile P2P system has global connectivity, it works with its peer system and other applications systems by generic P2P signaling. It consists of Ad-hoc Network layer and Mobile P2P Overlay. The former layer includes wireless hardware and MANET routing software offering homogeneous connectivity among nodes with same wireless interfaces. These nodes act as a router forwarding traffic toward its destination. The later layer includes the following core services: (i) Membership Services offers single sign-on, naming, profile and identity features; (ii) Discovery Services for peer/resource discovery and caching; (iii) Communication Services for Internet interworking, intelligent routing, session control, pres ence and service delivery; (iv) Location Services for infrastructure-free positioning, and user mobility management functions; (v) Adaptation Services for application and network services adaptation. Members of the Mobile P2P system should first sign-in a â€Å"common group† with their exclusive name and password. Some stationary nodes may also join to offer its resources such as Internet connection, printer, video conferencing. Whenever these client devices are within range of each other, they would work together as a team leading to a wireless adhoc service community where local resources could be shared by individual at its will. These members will then be available by intimating their capabilities and location information to the central location server. Information regarding physical location is also essential to offer spatial locality relationships and enable mobile content customization. The results which were achieved through this process can be summarized as first, it maximizes the synergies of MANETs and P2P for building wireless on-demand systems and services. MANETs provide dynamic physical connectivity while P2P offers dynamic associations of entities (users, devices, and services) for direct resources sharing. Second, its Mobile P2P overlay unites mobility, user-centric connectivity, and services for universal communications. This allow dynamic service adaptations pertinent to user location, application requirements, and network environments. Third, it presents a flexible network structure stimulating fixed and wireless networks convergence. The result is an â€Å"Integrated Mobile Internet† which makes our future environment lot better. 2.3 Transparent Heterogeneous Mobile Ad hoc Networks The idea was suggested by Patrick Stuedi and Gustavo Alonso[3]. The paper discussed that performance issues in a personal area network (PAN) or wireless sensor network (WSN) may have less priority than an office network. In contrast, battery life and low cost is vital to PANs and WSN while most probably it is not an issue in an office network. Consider a scenario where in a certain university campus the students carry variety of personal devices like mobile phones, PDA or laptops equipped with different communication technologies tailored to their capabilities. The mobile phones or PDA will be using Bluetooth whereas laptops have 802.11 as well as a Bluetooth interface built in technology. Ubiquitously combining all these devices into one mobile ad hoc network could invite new applications and services such as location based services or VoIP. So there may be an occasion where a personal device of one particular PAN might communicate with a personal device of another PAN in a multi-ho p fashion with the underlying MAC scheme changing per hop. In this scenario two issues needs to be solved i.e. broadcast emulation and handover. Broadcast emulation is not directly supported in Bluetooth (nor on nodes comprising both Bluetooth and 802.11). Handover is an issue because, in the case of heterogeneous MANETs, a handover might include a change in how the medium is accessed. A handover can be caused by node mobility, a change in user preferences (where due to energy constraints the user chooses to use Bluetooth instead of 802.11), or performance reasons. [15] Any device or node supporting multi interface though having different protocol stack will be specific to the interface at lower level. This characteristic will deteriorate the ability of a device to switch from one network to the other. The objective of such network is to provide an end-to-end communication abstraction that hides heterogeneity. The different possible design differs from each other with regard to application transparency, performance and mobility. There is another issue of handover which includes route changes as well as MAC switching. In principle, there are three possible scenarios 2.3.1 Horizontal Handover The horizontal handover between the participating nodes take place when the route changes and underlying MAC technology remains the same. 2.3.2 Vertical Handover The route does not change but the given neighbor is now reached through a new physical interface. 2.3.3 Diagonal Handover The diagonal handover takes when the MAC technology and route between the participating nodes change simultaneously. To address all these issues an IP based heterogeneous mobile ad hoc test bed using Bluetooth and IEEE 802.11 that implements a virtual interface approach as the end-to-end abstraction is presented. 2.4 Stream Control Transmission Protocol Another approach presented by R. Stewart, Q. Xie, and K. Morneault is [16] Stream Control Transmission Protocol, a transport protocol defined by the IETF providing similar services to TCP. It ensures reliable, in-sequence delivery of messages. While TCP is byte-oriented, SCTP deals with framed messages. A major involvement of SCTP is its multi-homing support. One (or both) endpoints of a connection can consist of more than one IP addresses, enabling transparent fail-over between hosts or network cards. Each interface could be separately cond and maintained (AODV-UU [17] e.g., supports multiple interfaces). This solution seems to be quite valuable in terms of performance since SCTP optimizes the transmission over multiple links. In fact, if one particular node can be reached through several interfaces, SCTP switches transmission from one interface to another after a predefined number of missing acknowledgements. Unfortunately, the solution lacks transparency. Applications running traditional unix sockets would have to be changed to use SCTP sockets instead. Another problem arises with the connection oriented nature of Bluetooth. In Bluetooth, interfaces appear and disappear dynamically depending on whether the connection to the specific node is currently up or down. Therefore, this is something that both the ad hoc routing protocol as well as SCTP would have to cope with. 2.5 Global connectivity for IPv6 Mobile Ad Hoc Networks R. Wakikawa, J. T. Malinen, C. E. Perkins, A. Nilsson, and A. J. Tuominen, in 2003 through IETF Internet Draft, 2003 presented Global connectivity for IPv6 Mobile Ad Hoc Networks, suggested one of the solutions for connecting heterogeneous MANETs. Before this work, the issue was solved by the traditional Internet model. But by adopting the approach presented by them the non structured MANETs were made to operate in structured environment, and inevitably limit the extent of flexibility and freedom that an evolving Mobile Internet can offer. Current mobile positioning and network mobility solutions are mainly infrastructure-driven which is contradictory to infrastructure-less MANETs. Without a flexible and user-centric network structure, existing solutions are generally insufficient to handle the dynamic and on-demand requirements of MANETs. 2.6 Conclusion Heterogeneous MANET service architectures and routing protocols have been talked about and it is established that lots of enhancements need to be introduced to the heterogeneous ad hoc networks. First of all, different issues like IP addresses to hostname mapping and seamless communication need to be addressed. Secondly, ad hoc networks must seamlessly utilize all underlying interfaces. Finally, research efforts need to converge towards real-world network deployment as very few MANET service architectures have been evaluated on actual network testbeds. Chapter 3 3 INTEGRATION CHALLENGES 3.1 Introduction The invention of mobile devices like laptops, personal digital assistant (PDA), smart phones and other handheld gadgets having dissimilar communication interfaces smooth the progress of data transmissions without any predetermined infrastructure and centralized administration. [18]. Such data transmissions can only be made on top of infrastructure-less networks composed of fully autonomous mobile nodes. But, these infrastructure-less networks do possess many complexities like dynamic and ever changing topology, heterogeneity in nodes, energy constraints, bandwidth constraints, limited security and scalability. However, there user-friendliness and rapid deployment make them an imperative part of 4th Generation (4G) architecture allowing the mobile users to communicate anytime, anywhere and with the help of any device. 3.2 Technological Challenges The specialized nature of MANETs enforces many challenges for protocol design by incorporating changes in all layers of protocol stack [2]. For instance, all the changes in link characteristics must be dealt with physical layer. MAC Layer should ensure fair channel access and avoidance of packet collision. Calculation of best possible routes among mobile autonomous nodes must be done by the network layer. Transport layer must modify its flow control mechanism to tolerate Packet loss and transmission delays arising because of wireless channel. The continuous making or breaking of connection due to nodes mobility be handled by application layer. These issues at each layer need to be handled effectively in order to smooth the transition from traditional network to advanced MANETs. 3.2.1 The Physical Layer In heterogeneous MANETs there can be a node which may be able to access multiple networks simultaneously. If a node on one hand, is connected to a cellular network, and on the other hand it exists within the coverage area of an 802.11b AP, the network or the node should be able to switch between them. Moreover, in heterogeneous environment, different wireless technologies may operate in the same frequency band and it is significant that they coexist without degrading each others performance. Therefore, techniques to reduce interference between nodes are important. For example, a node communicating with other nodes via multihop path may have lesser interference than a node communicating directly with AP. This is due to the attachment of increased number of nodes to the AP. Another way of reducing interference is Power control techniques applied in code-division multiple access (CDMA)-based cellular networks and MANET [15]. The research issues range from designing considerations to power control techniques include efficient design of nodes that can efficiently switch between different technologies and ensure higher data rates, development of Interference attenuation techniques between various wireless access technologies, modulation techniques and coding schemes that improve the performance of a given technology and frequency planning schemes for increasing the utilization of frequency spectrum 3.2.2 Link Layer The data link layer can be divided into Logical Link Control (LLC) and Medium Access Control (MAC) layers. When a node needs to communicate to another node having cellular interface, it uses a centralized MAC access like Time Division Multiple Access (TDMA) or CDMA with a data rate upto 2.4 Mb/s. On the other hand, when a node communicates in 802.11 environments, it uses distributed random access scheme like Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) upto a data rate of 11 Mb/s. So, this difference of data rate is going to be one of the interworking considerations. Due to dissimilar access technologies at intermediate hops, the performance of ad hoc networks deteriorates. The problems such as hidden and exposed terminals also limit the capacity of MANETs. The need of evolving mechanisms such as power control and power aware MAC protocols is mandatory to improve the performance of ad hoc networks. In a heterogeneous network, the cross-layer design may play a significant role in providing useful information to upper layers. Another important issue to be considered at the link/MAC level is Security. Although, end-to-end security is the responsibility in the application layer, some wireless access technologies provide a certain level of security at the lower layers. Although the link and MAC layers in a multi-interface node can operate autonomously, but their operations have to be optimized to provide definite service to the upper layers. Some of the open issues include design of efficient link and MAC layer protocols to support QoS in Heterogonous MANET, channel administration schemes that consider different categories of traffic, and allow call blocking and handoff failure probabilities and security at Link / MAC layer. 3.2.3 Network Layer The network layer needs to integrate all underlying communication interfaces; therefore, it is the most challenging task. The presence of nodes with multiple communication interfaces allow to have different physical and MAC layer technologies which need to be taken into account while dealing with an integrated routing process. But, the problem of MANETs such as frequent route changes due to mobility, higher communication overhead to learn and uphold valid routes, higher end-to-end delay and limited end-to-end capacity due to problems at the lower layers are main contributing factors in designing of routing process [19]. In order to reduce network control traffic, improve throughput and increase the range, the idea of integrating MANETs with infrastructure networks is evolved. Hence, mechanism to find gateways and correctly con IP addresses is required by such nodes in a MANET. The network layer has to find the best route between any source and destination pair. To define the best route, including number of hops, delay, throughput, signal strength, and so on several metrics can be used. Moreover, the network layer has to handle horizontal handoffs between the same technology and vertical handoffs between different technologies in a seamless manner. Several routing protocols have been presented for heterogeneous MANETs but the design of integrated and intelligent routing protocols is largely open for research with issues like development of routing capability in a heterogeneous environment that supports all communication possibilities between nodes forming MANET, scalability in multihop routing withou t significantly escalating the overhead and study of the impact of additional routing constraints (like co-channel interference, load balance, bandwidth), and requirements (services, speed, packet delay) needed by nodes and networks. 3.2.4 Transport Layer In connection oriented transport session, as in case of Transmission Control Protocol (TCP), packet loss is assumed to occur due to congestion in the network. This assumptions leads to the performance degradation of TCP and factors such as channel errors, jitter and handoffs are overlooked. Moreover, in heterogeneous environments, the transport protocol has to handle the high delays involved in vertical hands off (while switching from one interface to another), server migration, and bandwidth aggregation [16]. Sometimes, a node changes its IP address when it needs

Monday, August 19, 2019

Personal Narrative: My Visit to Agra and the Taj Mahal Essay -- essays

Taj Mahal Out of many places I visited all around the world, the place I like the most is the beautiful city of Agra. It’s a quite town located on the North of India. When we talk about Agra one image that comes in mind is Taj Mahal. Yes one of the seven wonders is here. Agra is full of architectural monuments. And I also visited Agra Fort, Fatehpur Sikri, and Buland Darwazaand. Food was not really good. Besides Taj Mahal, Agra is famous for handicrafts, leather and fine arts. It was fun shopping at Agra. Taj Mahal. ( Mahal is the word in urdu language used for Palace) How can I describe The Taj Mahal? You can’t its impossible. You just have to experience it. To gaze in wonder at that magnificent dome and elegant gardens will be a moment that you remember for the rest of your life. It is one of the greatest sights in the world, some say the greatest, and like Victoria Falls, The Grand Canyon, and Macchu Picchu, it simply is one of those things you have to see in your life. The architectural grace and symmetry of the Taj Mahal just takes your breath away. We had chosen our visit carefully--the sun was setting and the light that washed over the Taj was golden in color. The minarets were now stark against the setting sun . The actual dome was a surprise, it is not yellow-white but blue-white and covered in inscriptions and detail. From below it looked like something out of "Arabian Nights." But inside were the tombs of Mumtaz Mahal and Shah Jahan. The central tomb is a lofty cham ber with light streaming through fine latticework, and hanging above was an elaborate lamp. Words cannot describe its beauty when you stand on that marble platform overlooking the Yamuna, with the setting sun turning it into a golden ribbon. You may a... ...traditions. I brought Agra rugs, Agra Marble. As the world famous Taj Mahal is made purely of Marble, it is natural that the markets must be flooded with the replicas of the Taj in marble, little stone elephants, and lovely marble coasters. Agra is also famous for leather industry, The leather workers of Agra offer shoes, slippers, sandals, purses, wallets, bags, belts, clothing, lampshades, furniture, beanbags and many more items made of leather. We can purchase for affordable prices with wide choices. Different people have different views of the Taj but it would be enough to say that the Taj has a life of its own that leaps out of marble, provided you understand that it is a monument of love. As an architectural masterpiece, nothing could be added or subtracted from it. I think everyone should visit Taj Mahal at least once in their life, if they get a chance.

Sunday, August 18, 2019

The Powerful Message of Ayn Rand’s Atlas Shrugged Essay -- Atlas Shrug

The Powerful Message of Ayn Rand’s Atlas Shrugged       Capitalism, according to John Galt, is "mutual trade to mutual advantage," (Rand Atlas Shrugged 989) or as Adam Smith put it: "[trade] by mutual consent and to mutual advantage." In true capitalism, the economy is strictly separated from the state, just as there is a separation between church and state in the USA. This basic tenet of capitalism describes the only economic system that can be morally justifiable. Communism, fascism, socialism, dictatorships and "regulated capitalism" are all systems that breach upon an individual's basic rights, while capitalism respects and recognizes a man's right to control the product of his mind. In her philosophical treatise Atlas Shrugged, Ayn Rand uses fictional characters and events to dramatize the only economy that is consistent with man's rights and virtues.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Before Ayn Rand, no one had ever seriously attempted to justify capitalism on moral grounds. It was a given that capitalism was immoral; the proponents of capitalism merely tried to exhibit the efficiency of the system (i.e., it is a "necessary evil"). Economists did this because they focused only on the people who would be helped by an anti-capitalist society: the "needy." What Ayn Rand presents so masterfully through Atlas Shrugged is the objective perspective of what is occurring in societies where people may take from others for the "public good"; in the novel, she repeatedly begs the question: "At whose expense?" When the People's State of Mexico nationalizes the San Sebastià ¡n mines, Ayn Rand clearly presents what is really happening: a gang of looters is robbing an honest business for their own benefit. In any other case, this wo... ...and certainly undeserving Orren Boyle can use it without compensation. Is that justice? It is clear that capitalism is the only economic system that gives people what they deserve; capitalism is economic justice.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Capitalism has been proven time and time again to be the most "effective" (in terms of production) economic system in existence, but this is only secondary to the primary fact that it is the only moral economy. In Atlas Shrugged Ayn Rand shows that, by its very nature, capitalism is freedom: the freedom for a man to do what he wants to do with the product of his own mind and effort and, the corollary to that, the freedom to live.    Works Cited Rand, Ayn. Atlas Shrugged. New York: Random House, Inc., 1957. ---. "Man's Rights." Capitalism: The Unknown Ideal. New York: The New American Library, 1967. 286-94.      

Essay --

ley Mack Ms. Barr English 9 Honors December 11, 2013 The Morality of It All â€Å"A system of morality which is based on relative emotional values is a mere illusion, a thoroughly vulgar conception which has nothing sound in it and nothing true†; this Socratic idea demonstrates a very distinct concept of morality. It shows that morality is not to be based on emotion, but on logic. If a person chooses to use their emotions to fuel a system of morality, things could go downhill quickly. Just like Socrates had to choose between emotions and logic, in Homer’s epic poem, The Odyssey, the protagonist Odysseus struggles between emotions and logic as he tries to get his crew back safely after the Trojan War has ended. As he embarks on his journey home, he is faced with many obstacles and options that question his ethical beliefs. As time goes by and more and more of his crew eventually die off, he successfully moves on past his setbacks and finds himself back in his kingdom of Ithaca, only to discover it crawling with suitors attempting to woo his wife , Penelope. Odysseus is mostly construed as a tragic war hero with many flaws. He finds himself in many life-threatening situations as a direct result of his actions, he is characterized by having too much pride, and he is unfaithful to his wife. However, Odysseus is very much so still a hero because he perseveres and has an internal drive that gets him home no matter what, despite the fact his hubris is one of his biggest hindrances, his pride gets his men out of many dangerous situations, and even though he is physically adulterous to his wife, he emotionally longs for her then entire time he tries to reach home. Particularly, Odysseus is challenged with many treacherous obstacles, yet he finds... ...pon himself. As well. He reveals that he blinds the son of a god, and he falls to temptation. Throughout this experience, though, Odysseus tries to better himself, as you can see when he moves past Circe and Calypso to try to get home to his wife. He may still make a mistake now and then, but he is better than he was before. Odysseus is very much like people today. He tries his hardest to be the best he can, but sometimes fails to reach his goal and makes and error. Just like modern-day people, Odysseus is flawed. He had his hindrances, just like them. Newer generations most likely learn to make mistakes because they grow up watching their elders make mistakes. It is human nature to do something wrong now and again. Just because someone has flaws does not make them a bad person and Odysseus demonstrates how a good person could have imperfections through their values