Wednesday, October 30, 2019

Ecology - sprawl field trip Essay Example | Topics and Well Written Essays - 750 words

Ecology - sprawl field trip - Essay Example Accordingly, this brief essay will consider but a few of these factors with relation to the field trip that was engaged upon by our class outing to the Sprawl site earlier in the semester. The first and most pressing ecological concern is the fundamental way that the Sprawl region and growth of infrastructure and Big Box retailers has fundamental changed the water runoff for the region.1 Although adding parking lots, interchanges, and large multiple thousand square foot warehouses is itself harmful to the ecology and environment of the given region, the particular region in question experiences these negative points in a compound sense due to the overlapping nature of how one big box retailer is practically side by side to another which is side by side to a large highway interchange. This compound effect causes the drainage and water runoff of the region to be fundamentally changed in a highly negative way. Firstly, such a situation means that not only is water flow disrupted from it s normal course but a high number of added pollutants are introduced into the water table as a result of the large number of parking lots that have been added. Although seemingly benign, parking lots serve as collection points for all manner of pollutants and disrupt the flow and absorption of water into the environment in question.2 Due to the fact that cars leave all manner of fluids behind where they have been parked, it is conceivable for everything from trash associated with packaging from the store, to oil, to brake fluid, to transmission fluid, anti-freeze, and a host of other chemicals to collect on the tarmac and find their way into the water table once a healthy rain has washed over the area. Hence, the disruption of the water flow itself is but the first concern; the larger concern is concentric upon the fact that key pollutants are introduced with the presence of a number of parking lots and highway interchanges within the region.3 Of course, the issue is further compoun ded by the topography of the region in question. Whereas a general dilution of these negative environmental aspects would be seen if the topography of the site were more elevated and allowed for a greater diffusion of these pollutants prior to reaching reservoirs of lower lying land, the fact of the matter is that Big Box retailers of course seek the â€Å"perfect site† which will invariably be located in a somewhat flat or low-lying region.4 This is generally the case due to the fact that the Big Box retailers, strip malls, and other such firms want to spend as little money as possible on site improvement and grading. Hence, the ecological impact of this is the fact that the topography of the site and the presence of the pollutants readily find their way directly into the reservoirs and creeks/streams/rivers of the given site. The same can of course be said for the Sprawl site that was visited earlier in the semester. When one considers the map of the site and sees the prese nce of t

Monday, October 28, 2019

Fire Prevention and the Federal Government Essay Example for Free

Fire Prevention and the Federal Government Essay Many government agencies make fire prevention as part of their mission. America has the highest fire death rate is the highest in the world. Fires kill 3,700 and injure over 20,000 people each year. Property loss is about $11 billion per year. The United States Fire Administration (USFA) has helped to reduce fire deaths by half. They have contributed to fire prevention and suppression more than any other government agency. In 1974, Congress established the United States Fire Administration . Their mission is to provide national leadership to local fire and emergency services. It is a division of the Federal Emergency Management Agency (FEMA). FEMA became part of the Department of Homeland Security on March 1, 2003. Their mission is to â€Å"reduce the loss of life and property and protect the Nation from all hazards, including natural disasters, acts of terrorism, and other man-made disasters† (â€Å"About USFA†, n. d. ). The Department of Homeland Security was formed after the September 11, 2001 terrorist attacks. Their primary mission is to protect the country from terrorism. Since the USFA was created for the sole purpose of the prevention, preparedness, and response to fires and other emergencies, it has contributed the most to the cause. â€Å"America’s fire death rate is one of the highest per capita in the industrialized world† (â€Å"About USFA†, n. d. ). Thus, it is still an improvement since more than twenty years ago. In 1971, 12,000 people and 250 firefighters died as a result of fires. USFA continues to make our communities and society safer today. Reference U. S. Fire Administration. About the U. S. Fire Administration. Retrieved August 3, 2008 from http://www. usfa. dhs. gov.

Saturday, October 26, 2019

Midsummer Nights Dream :: essays research papers

Midsummer Night’s Dream Questions and Answers 1. What does Shakespeare accomplish by setting most of the action at night and in the wood? Explain thoroughly. Use examples. Setting most of the action at night and in the woods creates a dreamlike world. There is no other place that holds more myth than the forest. Obernon makes clear that nighttime is fairies’ time. Theseus, who is present during the daylight, represents reason.The visions of fairies and magic are all related to the nighttime forest setting. Shakespeare was interested in how dreams worked, in how the events in the play transpired, and how time seems to change and loses track. Throughout the entire play, the young lovers are overcome by the magical power of the woods. They are put into a situation that is unrealistic which leads to bizarre mishaps. Even uncanny incidents happen to the fairies of the woods. Titania is put under a love spell and falls in the love with the ass-headed Nick Bottom. Puck reminds us in the end that if the play has offended anyone, they should simply remember it as being a dream. This helps make the play an incredible occurrence, rather than an intense dra ma. 2. Explain how Theseus represents the voice of reason and moderation. Be specific. Use examples and quotes (include act and line numbers) Theseus represents the voice of reason and moderation in the play because he seems to be the only normal character left. He only appears in the play during the daytime, when nothing magical occurs. He is the only character who shows complete sanity in the dreamlike fantasy world around him. He is the Duke of Athens so many people come to him with their problems. When Egeus comes to Theseus about the problem he is having with his daughter, Hermia, Theseus takes power over the situation. He explains to Hermia that if she goes against her father’s rules, by his words, she will be sentenced to death or sent to a convent. (Act 1, Scene 1, Pages 4 and 5, Lines 30-34). He states, â€Å"For you, fair Hermia, look you arm yourself to fit your fancies to your father’s will; Or else the law of Athens yields you up,- which by no means we may extenuate,- to death, or to a vow of single life.† Hermia is so in love that she can not make a reasonable decision, so she runs off in to the imaginative woods with Lysander.

Thursday, October 24, 2019

Barriers Of Implementing Technology In Education

Over the past fifty years or so, teachers and parents have read and heard forecasts of an impending educational revolution each time a new technological innovation arrived on the scene. Fifty years ago, radio broadcasting was suppose to revolutionize education. Soon thereafter, teaching machines were predicted to bring sweeping changes.Next, television was touted as the medium that would solve problems facing education. Now, the computer is being hailed as the next technological innovation to have a major impact on the educational process.Modern education, in fact, has sustained a long-term interest in the use of educational technology as a means to design more efficient learning opportunities for students. There are tools on how to use the new electronic technologies and this includes: skills software; computer graphics; word processors; telecommunications; simulations; multimedia/hypermedia; virtual reality and distributed learning.. In a field with such a wide range of powerful an d complex tools, experts cannot help but disagree about what teachers need to know and even where they should begin.Not long ago, many experts advised teachers who wanted to become capable computer users learn to write computer programs in languages such as FORTRAN and BASIC. To become computer literate, many assumed that teachers needed to know enough about the technical workings of computers to follow. Few people today believe that teachers need this much technical skill, but textbooks still provide wide varieties of information for beginning technology users. The following steps are needed to take by the beginning technology users: †¢ Develop a philosophy.Teachers must observe where current resources and types of applications fit in the history of the field. Then they must begin developing personal perspectives on the current and future role of technology in education and in their own classrooms. †¢ Purchase products. Teachers must become informed, knowledgeable consume rs of computer products and select wisely among available alternatives. †¢ Identify the problems. Teachers must be able to troubleshoot computer systems they use frequently in order to discriminate between problems they can correct and those that will require outside help.†¢ Speak the language. Sufficient understanding of the terms and concepts related to technology allows users to exchange information with other teachers and experts and to ask and answer questions to expand their knowledge. †¢ See where technology fits in education. In perhaps the most important- and the most difficult- challenge, teachers must identify specific school activities where technology can help to improve existing conditions or to create important educational opportunities that did not exist without it. As part of this process, teachers decide what they need to make these changes occur.This process of determining where and how technology fits is known among users of educational technology as integration. Successful integration requires a connection between how people learn and how teachers employ technology to assist and enhance this learning. DISCUSSION Computer networks offer a significant opportunity for improving the educational climate, especially in situation calling for teaching at a distance in settings which are either primarily educational or primarily business oriented. Computer-based education networks are characterized by a large-scale central computer connected by a communication link to remote terminals.Students work at the remote terminals either individually or in groups. The major advantage of computer-based systems to the student is the potential for individualizing instruction.. Student progress can be continuously evaluated and the student can be assigned to appropriate learning activities. Individualization of instruction is possible because of the one-to-one interaction between the educational system and the student. As far as the student is co ncerned, this is a confidential interaction between himself or herself and the system.The fact that the student is one of many persons using the system at the same time, and the fact that a record is often made of the students’ progress, do not seem to detract from the feeling of individuality and confidentiality on the part of the student. The significant problem for many students in using computer-based system, especially adults, is the typing ability required for the use of the system. The need for typing can be minimized by the use of programming techniques that limit the complexity of responses. System malfunctions are another disadvantage of computing networks and are very frustrating to the individual student.Malfunctions can occur either in the computing itself or in the communication links between the computer and the terminal. While the geographic and time-scheduling of computer-based systems can be an advantage, it can also be a limitation. The terminals themselves and communication links are expensive. At present they cannot be universally located throughout the world. The distribution of other educational materials, such as books, can be accomplished with considerably more ease. Information technology (IT) can be a very effective distance learning medium.The IT package consisted of word processing, spreadsheet and communications software (via Telecom Gold) and a personal computer. IT is an interesting teacher. It can make learning easier and more attractive; for example, a resource for learning about animals could include written information about their habitat, and pictures of it. There could be video clips showing the animal running, accompanied by animated diagrams of the operation of their skeletal structure and muscles. IT is also a patient and responsive teacher. Software does not tire of waiting for a response.Computer Aided Learning software can give pupils immediate feedback. Pupils are rewarded as they make incremental progress. T his can be particularly helpful where pupils have learning difficulties. Rewards can be structured so that pupils are motivated to learn. IT is pupil centered. Unlike traditional didactic teching, strategies for teaching IT will emphasize pupil centered, resource-based learning. This helps IT teachers with the particularly exaggerated problems they have in planning and controlling continuity, progression, differentiation, and breadth and depth of learning.After citing some of the benefits derived from using IT, what therefore, has inhibited a greater use of IT in management education? One reason may be a paucity of good quality educational material for use with computers. Another reason may be a lack of incentive or a resistance to change. Economic reason is also a possibility. Until very recently the use of IT as an instrument for individual learning has been prohibitively expensive. However, the reduced purchase price of the microcomputer has helped lower that barrier. Many teache rs are busy with their daily routines and can find any excuse when asked to add something new.â€Å"Why change what is working? † Many teachers find that it is easier to maintain the status quo: staying with what has been comfortable. Some teachers are afraid of taking any risk and exposing themselves as lacking skills, especially in front of their students. According to Rick Maurer, this fear of change can be categorized into three levels of resistance. Level One: â€Å"Resistance to any use of technology. † These teachers do not understand what the administration is trying to accomplish, or doubt if the school realizes how much technology will cost in time or money.They have their own ideas about what the school should do-they like the status quo, and believe the timing is wrong. Their main concern may just be fear of letting others know what they don't know. Level Two: â€Å"Deeper than the use of technology. † These teachers believe the administration has ma de promises before which they did not keep. They are afraid that technology use is really the start of something deeper and fear if they do not use technology, they will no longer be included as â€Å"in. † Actually, many of these teachers may be worn out by taking on so many changes all at once and may not be completely opposed to using technology.Level Three: â€Å"Deeply embedded resistance. † These teachers may have developed deeply entrenched distrust over many years. They fight anything the administration is supporting because values differ from what teachers want and what administration is proposing. Teachers need a great deal of motivation when it comes to implementing technology in the classroom (Gahala, 2001). There are many obstacles to overcome. Technology can be very intimidating for many teachers â€Å"because introducing technology almost always requires new learning† (Dyrli & Kinnaman, 1994).â€Å"Teachers may lack the time and the motivation to learn technology skills . The integration of technology into the curriculum will not succeed without giving teachers ample time to practice, explore, conceptualize, and collaborate† (Gahala, 2001). This can be done by inviting them to join the school technology planning committee. â€Å"Solicit teachers' participation on the technology planning committee and explain why their participation is important† (Conner, 2002). Another barrier to consider is the cost of technology to be implemented.Computer-based systems are more expensive to set-up. Hardware and softwares must be purchased and staff must be re-trained or recruited. Some disturbance and expense can be expected due to the need for the installation of additional electrical power circuits and computer network cabling and redecoration in parts of the school. Besides the high initial cost, the primary problem with investing in technology is the changing pattern of technology usage along with revisions in the associa ted definition of â€Å"adequate resources†.Maintenance and security for existing resources also became important cost issues. In the 1980’s and 1990’s, new directions in technology use replaced the emphasis on microcomputers with the trend toward multimedia and integrated learning systems. Schools now face a dual challenge that seems likely to remain the only constant amid changing educational technology. Monetary costs associated with the implementation of computer-based technology system includes : 1) Capital cost of computer and network hardware and software; 2) Installation cost, including classroom and laboratory renovation.; 3) Hardware and software upgrades; 4) Support personnel for hardware and software installation, repair, and maintenance; 5) Support personnel and facilities for training and support of users (instructors and students). Obsolete computers are replaced with more powerful computers, which include more sophisticated peripherals and networ k connections. These computers, software, and the associated infrastructure require a greater level of training to use and maintain. Public school systems in the U. S. are currently spending $4,100,000,000 on hardware and software [8].A detailed study of K-12 education estimates that a reasonable target spending for technology should be approximately $300/student, compared to $70/student now being spent [9]. A 1996 forecast predicts spending on educational technology by K-12 and higher education to rise from $6Ãâ€"109 to $14Ãâ€"109 by the year 2000 [10]. As a specific example in higher education, Virginia Tech, which has 25,000 total students, is spending $10-million over four years in an Instructional Development Initiative for classroom and faculty infrastructure.Computer projection equipment is being installed in classrooms, and approximately 1500 faculty members are receiving information technology training and a computer. Once all faculty members complete the course, another 4-year cycle will begin. The dollar amount of this initiative does not include money spent by individual colleges, departments, and research groups for information technology for educational use. Oberlin quotes a total expenditure of $40-million on information technology for a Research-I university of 25,000 students [11].This figure translates to $1,600 per student per year, and does not include the money spent by individual students who can afford their own personal computers, peripherals, and software. Whether purchased with government support, tuition, student fees, or personal funds, the use of information technology is increasing the cost of education. Moreover, other problems may arise during the implementation of technology and these include the following: 1) Methods of working are distorted to fit the requirements of the software used.If the software is not sufficiently flexible so that it can be changed to support current or proposed methods of working then these may have to be adjusted to match the requirements of the software. 2) Bringing new IT-based systems into use can be time-consuming, as it is prudent to continue with both the old system and the new system until it is clear that the new system is working effectively. 3) Software may not do what is required of it. This may happen when the software does not work as it should or because new demands are made for additional facilities that the software is not designed to supply.CONCLUSION/RECOMMENDATION: Nowadays, technology is rapidly moving and we cannot help but to cope with the advancement. It is true that using technology in education is very expensive and time consuming but it was worth the cost. Unfortunately, lack of global long-range planning often amounts to wasted efforts and excessive costs. For an innovation to be successful, teachers need to learn new skills and they may need to unlearn beliefs about students or instruction that have dominated their professional careers (Darling, Ham mond & McLaughlin, 1996).Thus teacher professional development is at the heart of sustaining an innovation. Student support and enthusiasm for the local innovation also played an important role in motivating teachers to continue to carry out and improve the innovation. Teachers want to do what is best for students to enhance their learning. If they believe that students are benefiting from a particular innovation, they in turn will be willing to devote additional time and effort required to maximize the advantage brought on by the innovation.Likewise, educators must resolve many complex issues in order to apply technology solutions to educational problems. They must address many concerns before and during implementation to ensure that technology will have the desired effects on students and schools. These concerns range from funding to selection and placement of technology resources. The author believes that regardless of the downfall of technology, computer-based system of educatio n must go on to continuously improve learning. REFERENCES: 1. Conner, D. (2002, April 12). Technology planning: Closing the communications gap Education World.Retrieved March 19, 2004, from http://www. educationworld. com/a_tech/tech152. shtml 2. Crawford, R. (1997). Managing information technology. London: Roulledge. pp. 131-135. 3. Dyrli, O. E. , and Kinnaman, D. E. (1994, January). Gaining access to technology: First step in making a difference for your students. Technology and Learning, pp 16-50. 4. Crawford, R. (1997). Managing information technology. London: Roulledge. pp. 131-135. 5. Gahala, J. (2001, October). Critical issue: Promoting technology use in schools. Retrieved March 29, 2004, from http://www. ncrel.org/sdrs/areas/issues/methods/technlgy/te200. htm 6. Maurer, Rick. (1995) Beyond the Wall of Resistance: Unconventional Strategies that Build Support for Change. Bard & Stephen. 7. Norton, P. & Sprague,D. (2001). Technology for teaching. USA: Allyn & Bacon. pp. 23-30. 8. Data from a Quality Education Data (QED) report(1996), quoted in J. Chem. Ed. 73, A248. 9. Glennan, T. K. ; Melmed. (1996) A. Fostering the Use of Educational Technology: Elements of a National Strategy; RAND: Santa Monica, CA. http://www. rand. org/publications/MR/MR682/contents. html 10. CCA Consulting Inc.(1996) quoted from News, Resources, and Trends, June 28, 1996, SyllabusWeb, Syllabus Press: Sunnyvale, CA. http://www. syllabus. com/ntr06_28_96. html. 11. Oberlin, J. L. (1996) â€Å"The Financial Mythology of Information Technology: The New Economics,† CAUSE/EFFECT , 19(1) issue of Spring 1996, 21; http://cause-www. colorado. edu/information-resources/ir-library/abstracts/cem9616. html 12. Darling-Hamilton, L. & McLaughlin, M. W. (1996). Policies that support professional development in an era of reform. In M. W. McLaughlin & I. Oberman (eds. )Teacher learning: New policies,new practices. NewYork: Teachers College Press.

Wednesday, October 23, 2019

The Benefits of Vocational Education

The Benefits of Vocational Education Most high schools offer some form of vocational education program. Vocational education is training for a specific career or trade, excluding the professions. Vocational education focuses on practical applications of skills learned, and is generally unconcerned with theory or traditional academic skills. Students at vocational educational typically receive more hands-on, career-minded education than students at traditional schools. Individuals are given the opportunity to explore and identify potential career goals, and are provided with the resources needed to achieve them. Most vocational education recognizes the importance of general academic studies as well as career preparation, and offer fully accredited high school diplomas. Depending on a student's abilities and interests, a vocational high school can provide several advantages. Vocational training thus provides a link between education and the working world. It is usually provided either at the high school level or in a two year colleges. In my view, high school and two-year colleges should offer vocational education because it will be benefit for students’ future. First of all, vocational education in high school focuses on specific training for a career or field. This hands-on training can be helpful in high school as students make decisions that will affect the rest of their lives. Many  vocational  high  schools provide students with career preparation in health care, computer science,  education, business, and any number of highly specialized trades. Individuals have the opportunity to gain the knowledge and experience necessary to become carpenters, electricians, machinists, painters, plumbers, or other professionals. Some programs administer licensing or certification examinations in such programs that allow students to become eligible for employment immediately after graduation. Many high school juniors and seniors have yet to choose a definite career field and path to pursue. Though a student may be most certain that the college path is definitely not the one she wants to follow, a career still must be chosen for the sake of finding a place in the workforce. For students who have not chosen a career yet, technical training is a good way to get hands-on experience in areas that may interest that student. There are students who are certain as to what career they would like to join as a high school graduate. For this group, high school vocational education becomes a preparatory tool for those students who already know they want to work in the nursing profession, for instance. Also a wide variety of vocational education programs for high school students can provide hands-on experience in a real work environment. These skills can provide long-term benefits, as high school students can learn to adapt to new situations and develop necessary problem solving skills. Success in vocational-education programs can develop work ethic, feelings of self-worth, communication skills and the ability to relate to others, as well as life skills that are important in the transition to post-high school life. Vocational-education programs can provide a positive learning environment in which students have first-hand knowledge of managing their time, finances and other aspects of their lives. The focus of vocational-education programs is for high school students to develop tools, so they can succeed. Many high school students have no work experience by the time they reach the junior or senior year. High school technical education provides work experience to all students, including those who had none previous to the attendance in vocational education situations. Most health occupation technical education classes, for example, prepare students for the field of nursing and take place in an actual hospital or nursing facility. In these instances, students are required not only to perform in a professional manner the tasks assigned to them, but other real-life workplace expectations are placed on students regarding having a tidy appearance, being on time and respecting a chain of command, for example. Vocation or technical training education not only provides high school students with the ability to develop skills at present, but can also prepare them for the workforce and increase the opportunity to access jobs later. Vocational programs can be either at schools with basic classes in the trade, on actual job sites or both. Work on actual job sites allows students the opportunity to work with company employees and clients on a regular basis. The ability to work on projects on-site can help students understand if it is the right area for them and provide a networking opportunity to talk about the field with seasoned professionals. Such programs can help provide basic knowledge with real working experience necessary to enter the workforce directly after high school without a college degree. On-site programs often offer a personalized approach with specific deadlines to meet and the support of a mentor who can answer questions and provide guidance in the subject area. If a student shows serious interest, employers often invest in them to replace those who are retiring in the workforce as employers look at them as trained applicants with the ability to perform in a skilled occupation. Even employers who require a college education may offer the opportunity for students to come back and be considered for first hire. In addition, participation in vocation-education programs in high school can help a person decide if this is the right career choice and avoid investing in an education that won't be used. This can give them the ability to make critical decisions regarding their education. For instance, in some states, schools have started to offer student-teaching opportunities for seniors in high school. These programs offer the ability to work one-on-one with a teacher who is a mentor. Unfortunately, many colleges save the student teaching experience until the last year of the degree, making it difficult for someone to really know whether they want to teach. Furthermore vocational educations of two-year College also have benefits for students. First, a degree or certificate is an accomplishment that no one can take away from us. Two-year colleges give the opportunity to advance our career or simply learn about careers that interest us. Once we have found a career path we enjoy, we can begin taking courses and working toward our degree. Most technical colleges will help us complete our associate degree (or certificate program) in one or two years, depending upon our field of study. Second, the diplomas and associate's degrees that students earn after completing a two-year course are recognized by companies and employers as proof of a person's technical abilities. Their degree, even if it's not a four-year course degree, gives them an advantage when applying for jobs that require specific technical skills. For example, a person who completed a wo-year course in clerical and office management will know practices in filing essential documents and can be considered for a secretarial job. Graduates of technical colleges are also highly trained in their specialization because most of the two years cover an extensive internship and application of knowledge. For example, a welder who finishes a degree in a two-year technical college has probably accomplished several projects in a real welding shop during his or her internsh ip. Another major advantage of a two-year college is the availability of job placement resources. Guidance counselors at two-year colleges typically have access to career information and a number of different resources for students who want to find immediate work while attending courses or after they graduate. In addition, many employers and labor unions are closely affiliated with vocational schools, and give preference to job applicants who have completed such programs. With recommendation from guidance counselors and teachers, many students are able to obtain paid apprenticeships or entry-level jobs with ease. Critics say that the nature of two-year courses can be considered a double-edged sword. Although it allows students to graduate early and work right away, it can also saturate the employment market of certain technical skills. For example, a lot of welders graduate every two years, but the need for welders in a certain city or area may not actually meet the supply. Some conventional companies also prefer graduates of four-year courses since there is a belief that four-year degree holders are more trained in their chosen field. For example, a graduate of a two-year IT course may find it hard to compete with a computer engineer who has a four-year degree. Furthermore, Teachers are primarily hired for their technical knowledge and not on their teaching skills. While these professionals often are very good at what they do, it can be hard to convey that information in a way that other people can use and learn. This can be a major drawback. Since it takes two years or less to complete many vocational programs, the schools can graduate a lot of students in a short span. This can saturate the job market with people who all have the same skills and training. If the school does not provide or require internships or hands-on experience, this can be another obstacle for graduates. In conclusion, vocational education offers training for specific jobs. Since vocational training often begins in high school, students can graduate prepared to take a high-paying, skilled job immediately. Graduates of trade or vocational schools have an advantage over informally trained job-seekers because an independent organization certifies that they have the skills needed to successfully perform a specific, skilled occupation. According to the National Center for Education Statistics, 88 percent of public high schools and 29 percent of private high schools offer some type of vocational program. a well-administered vocational education for high schools and two-year colleges will have multiple benefits. It will expand students’ horizons and help them become ready for the working world. It will benefit the world-work also by providing needed workers. Therefore, governments should create vocational education program as well as possible as an investment in everyone’s future. References: http://www. ehow. com/info_7853695_disadvantages-vocational-schools. html http://www. ehow. com/list_6514932_technical-school-disadvantages. html http://www. ehow. com/info_8505391_pros-high-school-provides-jobs. html http://www. ehow. com/about_5387981_high-provide-students-job-skills. html http://en. wikipedia. org/wiki/Vocational_education http://www. collegeview. com http://careers. stateuniversity. com/pages/854/Vocational-Training. html http://www. debate. org/debates/Vocational-Training-in-High-School

Tuesday, October 22, 2019

Knowledge and Power

Knowledge and Power Free Online Research Papers Much as I would like to be the fist-pounding orator, I’d like to begin by asking you to close your eyes and imagine. Imagine an emperor poised on his throne, armies at his command, wealth at his disposal, and servants at his beck and call. Then, imagine him illiterate about the world. And while we’re imagining things, let’s suppose he has a Grand Visor who is well-versed in science, politics and the social issues of the day. Which of the two do you think commands the real power of the throne? Let’s examine history. There have been eras where large populations were enslaved by empires. The Egyptian, the Roman and the British Empires are all examples. There have been monarchies where the rights of ordinary citizens were suppressed and they were ruled with an iron fist. Ivan the Terrible, the frightful tsar of Russia comes to mind, who regularly butchered his subjects on a whim. The French monarchy is known to have indulged in luxury while the citizenry toiled to make ends meet. All of this transpired under the umbrella of ignorance; the antithesis of knowledge. And what happened? What does history tell us? When the light of knowledge dawned on these people, the balance of power shifted dramatically. Domineering kings fell victim to the blows of enlightenment being struck against them by ordinary folk. Knowledge and power are intricately linked to one another. It’s true that there are several systems in the world, some would argue, the ugly side of the feudal system in Pakistan is one of them, where one doesn’t seem to require a lot of knowledge to exert influence. After all, these feudal lords are no Einsteins! Yet, I would argue that it is in fact the LACK of knowledge among the serfs that is responsible for the hold these lords have on them. But perhaps politics is not your cup of tea. Perhaps you’re thinking, what about science? What about art? Scientists are no kings. Artists don’t embrace thrones and issue decrees. And you’re right, they don’t. But if anyone thinks that an eminent scientist or a writer, or an artist has had no power, he or she is sorely mistaken. Again, history instructs us. Galileo overturned an entire era of philosophical thought by announcing that the Earth was actually NOT at the center of the universe. That simple suggestion rocked the theocracy of the time, who were terrified by the idea and threatened by the son of a musician from Pisa. It escalated to the point, where he had to offer a public apology of sorts, in essence for being ‘right’. There is no dispute among historians, scientists and theologians today that the ideas of people like Galileo forever altered the intellectual, social and political landscape of the world. Or how about Socrates? A short, ugly, unassuming man who grazed the streets of Ancient Greece, without a job or any resources, yet influenced some of the most prominent thinkers of the ancient world. Socrates influenced Plato who in turn was invaluable in educating and motivating the young Alexander, son of King Philip of Macedonia. Yes, indeed, I am speaking of Alexander the Great, conqueror of the known world, a man known to wield tremendous power. Can we really take away the inextricable linkage of knowledge from his power? To me, that is impossibility! In conclusion, knowledge and power appear to be two facets of the same process. The process of altering the world and the people in it. Of influencing minds and shaping ideas. The challenge before the human race is to use our knowledge wisely and to foster goodness wherever and whenever we can. In my humble opinion, that is the essence of true power! Thank you very much. Research Papers on Knowledge and PowerBringing Democracy to AfricaAssess the importance of Nationalism 1815-1850 EuropeComparison: Letter from Birmingham and CritoCanaanite Influence on the Early Israelite ReligionHip-Hop is ArtAnalysis Of A Cosmetics AdvertisementRelationship between Media Coverage and Social and19 Century Society: A Deeply Divided EraAppeasement Policy Towards the Outbreak of World War 2The Effects of Illegal Immigration

Monday, October 21, 2019

Colonial Research Paper

Colonial Research Paper Colonial Research Paper Michael Hermo 10/15/13 Colonial Research Paper In the 13 colonies, the crime and crimes’ punishment was very different from today. The 13 colonies had 3 regions, New England, Middle, and Southern. Religious practices in each region differed greatly. Some religions were more strict then others, and it showed in the way they made laws and wished for people to obey them. The churches reach extended beyond their congregation and into the government of the colony itself. The reason why the justice systems differed in each of the three regions in Colonial America was because they were heavily influenced by different religious beliefs. Most of the citizens in the New England Region followed the Puritan religion. The Puritan religion was one of the more rigid religions in Colonial America. The New England region’s citizens mostly originated from England and came to the â€Å"new world,† hoping for religious freedom. The New England region consists of: Massachusetts (which included what is now Maine), New Hampshire, Vermont, Rhode Island, and Connecticut. On days of worship, people sat in the meeting houses almost all day on small, uncomfortable wooden benches. iThe growth of the Puritans' community was very important to the church. They wanted as many people as possible and considered non-followers as a threat to their community.ii The Puritans had many principles and guidelines to obey to be a part of their community. If those guidelines were not obeyed, punishment was in order. This sense of community guidelines carried over to governing the colonies. Some people who were loyal members to the church and were consistently attending religious ceremonies were a part of the government for their employment. Therefore the Puritans had a strong influence on the decisions made in punishing criminals. For example, a common punishment for more minor crimes was to wear somewhere on your body a letter identifying the crime committed.iiiNot only did the Puritans take action on their own followers and people from their own community, but they also acted against members of the religious communities around them. Protestors of the Puritans' way of life were severely punished. The Puritans would whip, crop ears, and in some situations hang people who criticized or dissented against their community.ivThe Puritans had very high expectations of their community and the people around them, and were immensely influential in deciding laws and disciplinary acts in the government. In the Southern Region, the Anglican church was most followed. The Southern region, like the Middle region, was diverse in religion, but the Anglicans outnumbered the others. The colonies in the Southern region were: Maryland, Virginia, North and South Carolina, and Georgia. The colonies in this region were very strict when it came to religion. In Virginia, it was a law that everyone had to attend Anglican worship and be a part of that faith's community. In the Southern region, the Anglican church was recognized by the state, which meant that

Sunday, October 20, 2019

The Commonly Confused Words Explicit and Implicit

The Commonly Confused Words Explicit and Implicit In some contexts (as explained in the usage notes below), the words explicit and implicit are antonyms - that is, they have opposite meanings. Definitions The adjective explicit means direct, clearly expressed, readily observable, or laid out in full. The adverb form is explicitly.The adjective implicit means implied, unstated, or expressed indirectly. The adverb form is implicitly. Examples I gave you an explicit order. I expect to be obeyed.(James Carroll, Memorial Bridge. Houghton Mifflin, 1991)Most states consider sexually explicit images of minors to be child pornography, meaning even teenagers who share nude selfies among themselves can, in theory at least, be hit with felony charges that can carry heavy prison sentences and require lifetime registration as a sex offender.(Associated Press, Teen Sexting Prompts Efforts to Update Child Porn Laws. The New York Times, March 17, 2016)Love is one of those words that illustrate what happens to an old, overworked language. These days with movie stars and crooners and preachers and psychiatrists all pronouncing the word, its come to mean nothing but a vague fondness for something. In this sense, I love the rain, this blackboard, these desks, you. It means nothing, you see, whereas once the word signified a quite explicit thinga desire to share all you own and are with someone else.(John Updike, Tomorrow and Tomorrow and So Forth. The Early Stories: 1953-1975. Random House, 2003) You must listen carefully and critically to understand Snoops implicit message.In academia, implicit bias, or implicit racial bias as it is here, refers to subtle forms of possibly unintentional prejudice affecting judgment and social behavior.(Rose Hackman, Black Judge Effect: Study of Overturning Rates Questions If Justice Is Really Blind. The Guardian [UK], March 17, 2016) Usage Notes These two words come from the same Latin root meaning to fold. When something is explicit, its unfolded, laid open for people to see. Implicit is the opposite of that. It means folded in, in the sense that its meaning is covered or contained within something else and isnt explicit. . . .An explicit statement makes a point distinctly, openly, and unambiguously. . . . An explicit picture, book, film, etc. depicts nudity or sexuality openly and graphically. . . .When something is implicit, its implied, not plainly stated. . . . Implicit belief, implicit confidence, implicit faith, etc., involve having no doubts or reservations.(Stephen Spector, May I Quote You on That?: A Guide to Grammar and Usage. Oxford University Press, 2015)The words seem perfect antonyms- but for the unexpected fact that they join in implying that what they describe is undoubtable. Implicit trust is as firm as explicit trust because quite as real. Note that implicit makes its point absolutely but that implied req uires telltale loose ends (see imply, infer). . . . Tacit is often used in the same way as implicit. A tacit reconciliation is one that both parties acknowledge and act upon without speaking of it.(Wilson Follett, Modern American Usage: A Guide, rev. by Erik Wensberg. Hill and Wang, 1998) Practice (a) Though most people would agree that the media almost never deliver a message that explicitly encourages violence, some people argue that violence in the media carries the _____ message that violence is acceptable.(Jonathan L. Freedman, Media Violence and Its Effect on Aggression, 2002)(b) Cigarette packs carry _____ health warnings. Answers to Practice Exercises (a) Though most people would agree that the media almost never deliver a message that explicitly encourages violence, some people argue that violence in the media carries the implicit message that violence is acceptable.(Jonathan L. Freedman, Media Violence and Its Effect on Aggression, 2002)(b) Cigarette packs carry explicit health warnings.

Saturday, October 19, 2019

Issuanc of sukuk and bonds in Malasiay Essay Example | Topics and Well Written Essays - 2750 words

Issuanc of sukuk and bonds in Malasiay - Essay Example The following discourse delves into Sukuk issuance with specific focus being on the Malaysian economy. According to Ayub (2009), Sukuk may be defined as certificates of equal value that represent an undivided interest in the ownership of an asset or investment. It should be noted that Sukuk have the benefit of being backed by assets hence they offer better protection to the investors as compared to the conventional bonds. Investors who require fixed investment return with low risk find Sukuk to be an ideal choice (Kuran, 2004). One of the forms of Sukuk is known as the Ijarah Sukuk. This kind of Sukuk is based on letting of property rights for a given property on an agreed price. Sovereign issuers have an inclination towards issuing Ijarah Sukuk on a sale and leaseback agreement for a given piece of real estate. The other type of Sukuk is known as Mudharabah Sukuk. This is essentially an agreement between the investors and managers of capital. These are investment Sukuk that represen t ownership of units with an equal value in equity. The holders of such Sukuks own shares and are entitled to the returns based upon the percentage of ownership. The key characteristic of Mudhabarah Sukuk is that the holder of the shares is not given a guarantee by the issuer on the capital and fixed profit but rather, the profit is based on a percentage of the given capital (Muhammad, 2009). Musyarakah Sukuk involves the contribution of capital by two parties to incorporate a common motivation. The issuer contributes a given amount of money to obtain a subscription of a given number of shares whilst the originator may contribute either capital or in kind. The profit is shared in a certain ratio and the losses are shared according to capital contribution. Sukuks known as Istisna’s are used to finance the purchase of a project item. The holder of the Sukuk offers finance for a given project and in turn obtains a title to the asset. The title can be returned to the developer at an agreed repayment methodology. It should be noted that Istisna’s Sukuk cannot be traded in the secondary market. Government bonds are issued by the government in order to finance the projects that they require. One of the key characteristic of government bonds is that they have a set maturity date. This implies that the issuer guarantees to give back the principal amount invested the bond after a certain period regardless of how the investment performs. Government bonds also have interest payments. The interest payment can be on a fixed rate whereby a fixed interest is paid periodically for the life of the bond or floating interest whereby the interest rate is determined periodically. The principal investment repayment is also a key characteristic of government bonds. According to Sharma (2007), â€Å"it is an obligation of the issuer to repay the principal amount in lump sum upon the maturity of the bond.†`p. 234. Some bonds also have a call feature whereby the iss uer has the liberty to return the bond before its maturity date and be paid a percentage of its principal amount. Once the callable bond is paid, the government stops paying interest on the bond. Government bonds are subject to a given minimum investment and have credit ratings. Bonds are income investment because the issuer pays a certain rate of interest for a given period of time until the bond

Strategic Management-Case study Research Paper Example | Topics and Well Written Essays - 500 words - 1

Strategic Management-Case study - Research Paper Example They have been quite successful in providing a great experience to the consumers through their stores. The stores are planned at locations meant for social interaction among people between work and office. This particular strategy has helped Starbucks to attract a large number of consumers. Starbucks provided its consumers with a place where they could get together or meet people on a periodical basis when they were not working. This strategy followed with the idea of a leading brand of specialty coffee which is professed to be a reasonably priced luxury helped the company to fit in and promote the coffee culture among the consumers (Gambardella, 2009; Kachra, 1997). Starbucks has effectively recognized and projected itself to be a place apart from work and home where the consumers can indulge in some superior quality coffee and relax themselves. This image was developed by the company through proper planning of the stores and making them comfortable with the help of furniture and soothing music. Starbucks should adeptly leverage its capabilities as well as resources by offering an array of services along with the rich ambience. It should entail services like handicapped access, common spaces for the purpose of teamwork and alliance, wireless internet and also complimentary books (Gambardella, 2009; Kachra, 1997). They should also expand their menus in order to lead in the competition and to cater to the altering requirements of the consumers. Starbucks should keep bringing in fresh products. It should focus on expanding its stores at places where a high traffic is observed for the stores. Their stores need to be located at convenient places that would be easily accessible for people who are quite busy with their work schedule. Starbucks should also plan international advertising programs and venture into various distribution channels as well. Leveraging its resources and objectives through the suggested ways

Friday, October 18, 2019

HRM Essay Example | Topics and Well Written Essays - 2000 words - 5

HRM - Essay Example According to the organization, the employees should be highly engaged within the system as this would increase their work efficiency. The employees of the airline are aware that the organization is not only concerned about the satisfaction of the customers, but also about the employee security. SouthWest Airlines provides high job security to the employees to ensure their long term interest in staying with the organization. The compensation policies of the organization include heavy usage of collective payment for the performance. This policy is highly attractive for motivating the employees. The organization aims at hiring the candidates with the highest potential in order to improve the overall efficiency. Providing them with the appropriate training and development programs help them in adapting to the organizational culture, understand the pattern of job and finally, perform better. American Express Train is the member of the international niche of forty air links that perform th e task of carrying the flying passengers from and to the airports. It is renowned in terms of human resource and maintenance of employee relations. The human resource policies of AET are similar to the policies adapted by South West airlines to some extent. Although both the organizations possess different set of business strategies, yet the human resource policies for meeting the goals and objectives of the organizations are similar. Thus, the alignment of the human resource policies and practices with the business strategies is very important for improving the performance of the organization. As the economic environment is evolving in a rapid manner, the change results in the shift of demands of customers and investors along with increase in the product and market competition. For competing successfully within the environment, the organizations require to improve their performances constantly by means of cost reduction, product innovation, process innovation and improvement in pro ductivity as well as product or service quality. Performance of an organization consists of a broad concept including efficiency, productivity, effectiveness and competitiveness. Most of the researches have been done on the impact of the human resource management on the performance of an organization. In the year 1997, there had been a research conducted by Paauwe and Richardson which had encompassed thirty various studies in order to establish a relationship between the range of HR practices and the human resource management outcomes like, motivation, employee satisfaction, absenteeism, commitment and turnover. It had also focused on the relationship between these human resource management outcomes and the performance outcomes in the organizational level like, research and development, productivity, quality, customer satisfaction, profit and many other factors. Research has also been done related to the theories of human resource management and performances and the ways in which th ey are linked with each other. Organizational performance is based upon the effectiveness with which the services or products are being offered to the customers. The human resources of the organizations are responsible for designing, producing and delivering these services. Thus, the organizational performance is highly dependent upon the human resource management policies of the system as these policies determine the individual performances of these employees (Thussu and Freedman 22; Ruppel

Strengthening of concrete using fiber reinforced polymers (FRP) Dissertation

Strengthening of concrete using fiber reinforced polymers (FRP) - Dissertation Example Further, the energy dissipation capacity increases in multiples of 10of the retrofitted column-beam joints under increased displacements, till failure at 0.4g for unconfined frame and at 0.5g for confined frame. Accelerations of the shake table at 0.2g and 0.4g are observed and it is found that the acceleration of the shake table is higher under 0.4g by at least a factor of 10. Comparing accelerations of the left and right joints of the first and second floors respectively, it is found that the acceleration increases by at least a factor of 10between the floors and also based on higher accelerations of 0.4g when compared to 0.2g. The relative displacements of the first and second floor joints are measured and it is found that the relative displacement of the second floor joint was high (almost 4 times) to the point of breakdown while that of the first floor joints was same as that of the shake table at 0.4g. ... elative displacements of the two floor joints with respect to shake table are observed for 0.4g and 0.5g for confined frame and it is observed that while the displacement of the shake table is almost same or slightly higher by a factor of 10 for 0.5g as compared to displacement at 0.4g, there is little difference in displacement at the two floors at 0.4g, it is noted that the relative displacements of the two floors remain almost the same at 0.5g when compared to the same with those at 0.4g. Stability of the frame is more at 0.4g than at 0.5g. It is also more for the second floor joints than at the first floor joints. As axial compression is more at the first floor joints than at the second floor joints, the torsional capacity and ductility are high for the square RC column-beam joints. Further, as the FRP is bonded at the tension zones, in this case, the joints of beam-column, with external mounting, the flexure strength is increased and the seismic behaviour is improved with TFCÂ ® composite bonding at the joints of both the

Thursday, October 17, 2019

Reflection Essay Example | Topics and Well Written Essays - 500 words - 44

Reflection - Essay Example Indeed, as an international student from UAE, my school allocated me a class that comprised of students from other countries. Although most students came from U.K and U.S there were a significant number of students from other countries like Nigeria, Japan, and Mexico. Most uniquely, I was the only student from UAE and this posed a great challenge to my social and academic life. It was clear from the onset that most of the students came from different cultural, religious, economic, and social backgrounds. I was surprised how the differences among the new students will allow us to succeed in our academic pursuit. However, upon settling down in class, one of the administrators explained the organizational culture of the school and the need to adopt diversity in our class. The administrator defined the school’s policy and advocated for the cultural diversity and respect to the code of ethics. Indeed, he stated that English is the official language of communication and studying at the school and that all students should respect the cultural and religious backgrounds of all students. With this, the administrator guaranteed good cohesion and unity of purpose in our studies and relevant extra curriculum activities. The administrator stated that the school’s policy respects all religions and disregards any discrimination based on social and economic status. He also stated that all students have a right to interact with any students and noted that our studies will include group discussions, which will include students from different backgrounds. He therefore encouraged us to share our cultural values for purposes of adopting the cultural values that will boost our academic pursuit. This experience taught me the need to adopt cultural diversity in my studies. It also taught me that I cannot exist in isolation and that it requires the

Relationships between Critical Thinking & Ethics Essay

Relationships between Critical Thinking & Ethics - Essay Example These values are such as justice, wisdom, care, and compassion, which are lacking in the case of execution of prisoners in order to sell their body parts. Critical thinking enables individuals to make decisions based on verified information and truths. In the case of human organ selling, there is an apparent deviation in the act by the military through their brainwashing due to money. The military and Dr. Dye fail to identify the importance of life due to greed for money. In both cases, the military and the doctor failed to ensure the human right to life. Restricting to logical rules and guidelines will not require ethical decision-making process. Critical thinking determines ways of analyzing and differentiating facts from fiction or a way of understanding or making new discoveries (Ruggiero, 2011). Critical thinking influences culture that determines the way of life of a person through equipping one with a mental process of evaluation. The mental process forms a ground that determines the ethical standards. An inference that critical thinking forms the overall determination of moral values can be made. In the scenario considered, if the military, doctor, and the prospective customers did put considerable thought to the inhumanity of the business, they would not have been

Wednesday, October 16, 2019

Reflection Essay Example | Topics and Well Written Essays - 500 words - 44

Reflection - Essay Example Indeed, as an international student from UAE, my school allocated me a class that comprised of students from other countries. Although most students came from U.K and U.S there were a significant number of students from other countries like Nigeria, Japan, and Mexico. Most uniquely, I was the only student from UAE and this posed a great challenge to my social and academic life. It was clear from the onset that most of the students came from different cultural, religious, economic, and social backgrounds. I was surprised how the differences among the new students will allow us to succeed in our academic pursuit. However, upon settling down in class, one of the administrators explained the organizational culture of the school and the need to adopt diversity in our class. The administrator defined the school’s policy and advocated for the cultural diversity and respect to the code of ethics. Indeed, he stated that English is the official language of communication and studying at the school and that all students should respect the cultural and religious backgrounds of all students. With this, the administrator guaranteed good cohesion and unity of purpose in our studies and relevant extra curriculum activities. The administrator stated that the school’s policy respects all religions and disregards any discrimination based on social and economic status. He also stated that all students have a right to interact with any students and noted that our studies will include group discussions, which will include students from different backgrounds. He therefore encouraged us to share our cultural values for purposes of adopting the cultural values that will boost our academic pursuit. This experience taught me the need to adopt cultural diversity in my studies. It also taught me that I cannot exist in isolation and that it requires the

Tuesday, October 15, 2019

The mutual effect between project quality management and project cost Essay - 1

The mutual effect between project quality management and project cost management - Essay Example Different people will be assigned various roles in the completion of the assignment. Here the president, vice president and secretary to the projected will be selected including board members. The project is divided into three parts that is the quality management part, cost management part and the mutual effect between the two. Each part can take approximately two weeks each thus. An activity schedule will be produced to assign the time and date for each part. Next, a spreadsheet detailing the highlights of the project, audits dates and deadlines must be produced. When all the dates, role allocations meetings schedules and time duration have been set in place, the cost of the completion of the project is to be set. Here each task and materials needed have to be written down together with their estimated cost. The overall budget allocation must be estimated to find out if the funds are available. The cost of the overall project will be around one thousand dollars to complete. Next is the communication plan since the project is now obvious. Communication includes meeting times and project

Monday, October 14, 2019

Evaluation of a Business Code of Ethics Essay Example for Free

Evaluation of a Business Code of Ethics Essay The purpose of this assignment is to assist you in refining problem-solving capabilities that organizations already possess for use in business ethics applications. This paper uses a structured, objective format sometimes called a system of inquiry. This assignment is a systematic formalized inquiry into or examination of the code of ethics of an organization and its effects to achieve a specific level of ethical behavior in employees, management, and executives. Each business should have a framework for ensuring ethical behavior. The structure, format, and scope of codes vary depending on the company’s business. An oil companys code, for example, would probably have different criteria and emphases than a healthcare providers code of ethics. Sometimes, codes of ethics are called by other names, such as an employee code of conduct. A code of ethics, though, should be differentiated from standard good operating practices. Evaluation and analysis includes problem solving and behavior in assessing organizational ethics along with decision-making processes. In this case, you are evaluating your own company’s code of ethics, or that of another company if your employer does not have a code of ethics. Write a 1,200- to 1,400-word paper, one not using question-and-answer format, discussing your organization’s code of ethics in detail. Perform the following steps: Â · Obtain a copy of your employers code of ethics or find an example on the Internet from a major corporation, such as Shell Oil Company’s Statement of Ethics. This is the document upon which to base your inquiry. Â · Write a general information paragraph on the company, including its mission statement. Â · Determine the type of ethical system used by the firm and reasons or examples upon which you based your decisions. Ethical systems include ends-driven, relativistic, entitlement, and duty-driven (legal or religious) ethics. Â · Identify and discuss how the code of ethics is used. Include several paragraphs on each use: one for employees, one for management, one for the board of directors, and so forth. Some of this information comes from the company’s code of ethics. Others may be available through an Internet search. Consider the following: o Why it is used—the general or special circumstances o How it is used o When it is used Note. You may not be able to find all the information. In that case, state this fact and indicate which sources were examined with no results. Â · Why might the organization need to modify their existing code of ethics? Consider how you might modify the code if you were the new CEO and how you would implement the changes. Â · What possible reactions to the code are to be expected from employees and managers? What effects does the organizational culture have on the acceptance of the code? Â · What is the effect of the code on the organization? Â · Summarize the results of your systematic analysis or inquiry into the code of ethics of this organization.

Sunday, October 13, 2019

Maxillary Central Incisor Tooth Form, Facial Form and Gender

Maxillary Central Incisor Tooth Form, Facial Form and Gender Title: Correlation of the maxillary central incisor tooth form with face form and gender in a section of the North Indian population – An AutoCAD analysis ABSTRACT Aim: An esthetically pleasing restoration or prosthesis should not be identifiable as artificial, but should be in harmony with the natural tooth arrangement of an individual. This study aimed to determine whether a correlation exists between the maxillary central incisor tooth form and the facial form and gender of subjects in a selected sample of the North Indian population. Materials and Methods: The study was conducted in the Department of Prosthodontics and Crown and Bridge and Implants, Manav Rachna Dental College, Faridabad. Two standardized photographs each (portrait [closed lips] and teeth in occlusion [with cheek retractor]) of 200 subjects of North Indian origin (age range 18-25 years) studying at Manav Rachna International University were assessed for facial form and tooth form, using the AutoCAD © (Autodesk Inc. 2013, California, USA) software. Results and Conclusion: A statistically significant correlation of the maxillary central incisor tooth form with the inverted face form of the subject was found in a section of the North Indian population. However, the correlation between the maxillary central incisor tooth form and gender of an individual was found to be statistically insignificant. Keywords: Maxillary central incisor, tooth form, face form, gender, AutoCAD Introduction Esthetic dentistry is fast becoming a key consideration for dentists and their patients. Although, a smile is characterized by numerous factors involving both the teeth and surrounding soft tissues, the esthetic appearance of the anterior teeth contributes to a persons self confidence and how attractive he/she is perceived by others.1 For an esthetically pleasing smile, the position, form and colour of the maxillary central incisors are the most essential factors.2 Since the maxillary central incisors play a key role in the dental composition, various anthropometric and biometric references are used in their design and selection in esthetic accordance with the facial form of the patient.3 When only parts of the dentition have to be restored, the remaining natural dentition can serve as a guide, providing a relatively simple and direct procedure to design artificial teeth that blend with or complement the natural dentition. However, in cases where all the teeth are missing and the entire dentition has to be restored, and no information can be gained from the remaining natural teeth, old photographs, or cast models, other methods have to be applied to select and design the missing teeth.1 These methods are not only useful for complete dentures but also for any complex anterior restoration.2 Esthetic dentistry tries to produce a prosthesis that defies detection. This is possible only when, the tooth form, shade and tooth size of the patient are in optimum harmony with their facial form, dimensions and facial complexion. In 1914, Williams 4 was the first to suggest that a correlation existed between the upside down facial shape and the shape of the upper central incisors. Form shape came to be guided by comparison with the inverted shape of the face. According to this classification, the dental outlines of the upper incisors were in three shapes: tapered, ovoid and square, which is still considered by prosthodontists.5 In 1955, Frush and Fisher6 introduced the concept of dentogenics or the dentogenic theory which stated that the correct tooth form should be designed or selected with regard to the patients sex/gender, personality and age (SPA factor). The prosthodontics literature pertains primarily to the non-Indian population and there is a lack of information on the selection and design of artificial anterior tooth forms in the Indian population. The knowledge of racial norms for facial appearance might aid practitioners, since the treatment given would be in harmony with the facial appearance for patients of different races. Most studies,7, 8, 9 on the subject of artificial teeth design and selection, with respect to facial form and gender, have been based on subjective evaluation and assessments of different individuals; with lack of standardized methods and techniques and unavailability of technological resources. Hence, their reliability has been questionable. This study attempts to increase the accuracy of the methodology by employing a software known as AutoCAD © (Autodesk Inc. 2013, California USA) Auto Computer Aided Design and Drafting. AutoCAD is a 2-D and 3-D, vector based, computer-aided drafting software application used in architecture, construction and manufacturing to assist in the preparation of blueprints and other engineering plans. 10 This high end technology has been applied to make the process of evaluating the maxillary central incisor tooth form, easier, objective and more accurate. The present study aims to assess whether a correlation exists between the maxillary central incisor tooth form and face form of the subject and also to assess if any gender differences could be seen in relation to the form of the maxillary central incisor. The null hypothesis of this study is that there are no gender specific differences in tooth form as well as no correlation between facial form and tooth form of a person. Materials and Methods A total of 200 dentulous subjects of North Indian origin (age range 18-25 years) studying at Manav Rachna International University, with well aligned natural maxillary anterior teeth were randomly selected. The subjects being young adults belonging to different parts of North India formed an appropriate representative sample. Each subject was interviewed, to confirm the inclusion criteria and to rule out the exclusion criteria. The exclusion criteria were: subjects with anterior teeth fractures, subjects having maxillary anterior teeth with extensive carious lesions, subjects with incisal wear of maxillary anterior teeth, subjects with gingival hyperplasia in the maxillary anterior teeth, subjects who have undergone orthognathic surgery, orthodontic treatment, and those with congenital or surgical facial defects, those with microdontia or macrodontia and subjects with any type of prosthetic restoration on their anterior teeth. A participant informed consent form (PICF) was provided in both english and hindi languages. The informed consent form was explained to each participant and was signed by them before starting the procedure. A standardized photographic procedure was used to obtain images of the face and the maxillary central incisors. Each subject was made to sit upright on a chair with the occlusal plane of the maxillary teeth parallel to the floor. Two standardized photographs were taken for each subject: portrait (closed lips) and the maxillary incisors (without lips). For each photograph, standardized distances (portrait – 100cms, teeth- 12cms) were used (from the tip of the subject’s nose to the centre of the camera lens). A fixed focus of 1:1 was used for each subject, with theEF 100 mmf/2.8 Macro USM lens. The height of the Canon EOS 1100D DSLR camera mounted on a tripod (Traveller Mini Pro Tripod For Canon EOS 1100D) was adjusted individually according to the position of the subject’s face and teeth. A full face photograph with closed lips was obtained, with lens positioned parallel to subject face. The subject’s hair did not cover any part of the face and the teeth we re in contact [Figure 1]. The standardized photographic procedure was followed as per the earlier method followed by Wolfart S et al.2 Intraoral photographs of maxillary central incisors were obtained until the lens was parallel to the labial surface of the teeth. Cheek retractors were used to obtain full exposure of the maxillary central incisors. The maxillary incisors were centred in the photograph, with the midline centred and perpendicular to the incisal plane [Figure 2]. Using the image editing software (Adobe Photoshop 8.0.1, Adobe systems, San Jose, California), the images were adjusted so that the maxillary incisors remain centred in the image, one at a time, with the long axis set vertically. [Figure 3]. The mathematical assessment of the photographs was done according to the methodology proposed by Wolfart et al 2. The outline of the upper right incisor was traced and in the next step, the median of the tooth was drawn in the sketch. (X) was the most apical point of intersection between the median and the outline. Mesial and distal tangents were constructed to the outline – parallel to the median. Two perpendiculars were drawn on the median starting from the most apical (O1) and most incisal (O2) point of intersection between the outline and the tangent. They define two points of intersection (S1 and S2). The line S1S2 was bisected (S). By taking the width of the tooth through (S) the widest stretch across the tooth was defined (TB). Dividing the line SX into five parts, the line TA could be constructed parallel to TB on 4/5 of the length of XS. The outline sketch was turned upside down for the evaluation of the face shape. The lines FB (the widest stretch across the face) and FA (a defined parallel stretch to line FB) were constructed in an analogous manner to the lines TA and TB. [Figu re 4]. For the evaluation of the face shape, the outline sketch of the portraits was turned upside down. The facial outline form was determined by the outline of the temporal bone at the height of the hairline, temporal process of the zygomatic arch and the gonion. The facial quotient (FQ) was calculated in an analogous manner to that of the tooth quotient (TQ) [Figure 5]. According to the numerical values that were obtained, dental and facial forms were classified as: [2] Tapered (≠¤ 0.61) Oval (≠¥0.61 and ≠¤ 0.70) Square (≠¥ 0.70) The data, for each subject were recorded in a standardized proforma, along with the photographs of the subject before and after analysis. Results The data obtained were arranged systematically and transferred to Statisticals Package for the Social Sciences (SPSS) version 20, IBM Inc. for analysis. The following statistical methods were employed: descriptive statistical tests, chi square tests, independent t-tests and Spearman correlation. The level of statistical significance was set at p-value ≠¤ 0.05. Chi-square test was used for comparison between categorical variables. Student’s ‘t’ test was used for comparing two groups with respect to continuous and normally distributed variables. Discussion The design and selection of maxillary anterior teeth for esthetically pleasing prosthetic rehabilitation has long posed a challenge in clinical practice. A reliable and reproducible method is required for prosthetically restoring anterior teeth in terms of their size and form, which are in proportion to the face and gender of the patient. Our first objective was to determine the maxillary incisor tooth form of each subject using the AutoCAD software. The study was then classified into three forms ovoid, square and tapering. The oval category was the most prevalent tooth form among the study population while the square tooth form was the least prevalent. These findings were in accordance with the study by Brunetto et al 11 on a Brazilian population. However, in a study conducted by Wolfart et al 2 on a German population, although the oval category of tooth form was most prevalent, the least prevalent tooth form seen was the tapered form. These differences may be due to ethnic and genetic population variability and greater software accuracy, adopted in the present study. Our second objective of the study was to determine whether a correlation existed between the maxillary central incisor tooth form and the face form. Since this finding is statistically significant in the present study sample, therefore, the null hypothesis of the study, was rejected. This was in accordance with the results of studies by Selg 12 and Sellen et al 3 which postulated that the face form of a patient was helpful in selecting the artificial tooth form for their prosthesis. Our results also confirmed William’s â€Å"law of harmony† which states that a correlation exists between the inverted facial shape and the shape of the maxillary central incisors.4 Some studies 5 and literature reviews 3,13 confirm that even despite controversies surrounding the authenticity of William’s law of harmony, it is still the simplest, the most useful and the most predictable method of artificial tooth selection for anterior teeth. On the other hand, the validity of William ’s classification has been questioned by various authors. 14,2,15,16,8,17,18 The positive correlation seen between tooth form and face form in this study as compared to statistically insignificant results obtained in various previous studies 2 can be attributed to the use of a more practical, technically advanced and precise AutoCAD © (Autodesk Inc. 2013, California USA) software which enhanced the accuracy and reliability of the analysis. Previous studies were mostly based on visual and subjective determination of the tooth and face forms and hence did not provide valid results. The genetic variability of different populations, on which past studies have been conducted, may also have some influence on the final results. Our third objective was to determine whether a correlation existed between the tooth size and the gender of a person. This correlation was found to be statistically significant. The size of the maxillary central incisor in men was found to be larger than that of women. This is in accordance with studies which concluded that tooth size is known to correlate with gender.1,19,20,21 Our fourth objective was to determine whether there was a correlation between the tooth form and the gender of the person. This correlation was found to be statistically insignificant. This result was in agreement with that of Wolfart et al 2 and Berksun et al 16 who noted no significant differences in tooth form between the genders. However, Horvath et al 1 and Brunetto et al 11, reported that maxillary anterior teeth do have gender specific differences and that tooth shapes are gender specific. In our study, the oval tooth form was found to be the most prevalent in both the genders. This was similar to the results obtained by Brodbelt et al 22 and Wolfart et al 2. Hence, choosing the oval form has a better chance of matching the original tooth, irrespective of the gender. A higher percentage of the square tooth form was seen in women as compared to men. This result was also similar to that of Wolfart et al 4 and Brunetto et al. 11 This finding suggests that opting for a square toot h form for a male patient is statistically more likely to result in a mismatch. Hence, the dentogenic concept that suggests that the female teeth should be more rounded and the male teeth should be more squarish is not supported by the results of this study. Conclusion Within the limitations of this study, it was found that in a section of the North Indian population that: The oval tooth shape was most common while the square tooth shape was least common. The tooth size was generally found to be larger in males than in females. A significant correlation could be found between the face form and tooth form of a person, thus validating William’s law of harmony.2 No correlation or gender- specific differences could be found between the tooth shape and gender of a person. Hence, the dentogenic (SPA) concept was which states that tooth form is related to the SPA of the patient is not validated and supported by this study. 1

Saturday, October 12, 2019

Censoring Pleas For Help :: essays research papers

In the article "Censoring Pleas for Help", Dwight R. Lee talks about government price controls. The author likens government price controls to government censorship, arguing prices are how markets communicate with one another. The example used to demonstrate this point is the price regulations the government enforces after a natural disaster, freezing prices on such items as labor, construction materials and basic necesities. However, the article demonstrates later how these regulations, while seemingly in place to help protect consumers (in this case disaster victims), actually hurts them. While the intent of the "price gouging laws" is good, they actually do more harm than good. By controlling the prices of these materials, these laws limit the supply of these materials and effectively stop the free market from communicating its increasing demand. Further more, these laws seem to go against the very idea of a free market. The free market communicates by the fluctuation of prices as the market deals with shortages and surplus until an equilibrium point is found where the price of an item generates an equal amount of quantity supplied and quantity demanded. If the price falls below this point, quantity demanded is greater than the quantity supplied and there is a shortage in the market. This causes the price to rise, and with it the quantity supplied. As the price rises, the quantity demanded falls. Eventually it reaches the equilibrium point. If the price rises above the equilibrium point, there is more of a quantity supplied than a quantity demanded and that will create a surplus. This causes the price to lower, increasing the quantity demanded and decreasing quantity supplied until it reaches equilibrium again. The market depends on these fluctuations in price for communication between suppliers and consumers. With out this communication the market would be in chaos. Suppliers would not know how many products to supply and consumers would have no way to inform suppliers of their wants. These laws misdirect the flow of supply by not allowing the increasing demand for these items to be reflected in the market as an increase in price. This can be demonstrated by looking at a graph representation of the supply and demand curves relative to construction materials. Before the natural disaster struck, the market for construction materials was at its equilibrium price point of Fifty dollars. There is no surplus or shortage of goods at this point.

Friday, October 11, 2019

Effect of Anxiety Disorder

EFFECT OF ANXIETY DISORDER Nowadays people suffer from not only physical healt peoblems but mental problems are also quite common. Anxiety disorder is one of the mental problem which people face to handle commonly. Therefore; what is anxiety disorder ? In article of Anxiety Attacks and Anxiety Disorders explained that ;’’ Anxiety attacks( panic attacks ), are episodes of intense panic or fear’’ (2012)*. Some Effects of the anxiety disorder are faster heart beating and breathing,changing social behaviour. Firstly, one of the main effect of anxiety disorder, faster heart beating and breathing happen with increase adrenalin in human body.Because of the this health problem, people feel always warning and they don’t want to meet and see people around. therefore; this people want to be alone because they afraid if they can be disgraced. One of the point that people should care,not every faster heart beating and breathing mean anxiety disorder,faster heart beating and breathing is quite normal symptom of human being sensation;however,anxiety disorder patients have this beating immediately;moreover,without any symbol. Faster heart beating and breathing is simple and common effect of anxiety disorder problem.Secondly,it is really important and bad effect of anxiety disorder;changing human behaviour. people with anxiety disorder,assume that if they can have panic when they speak or meet someone,As    Lyness, PhD state that â€Å"people who have this illnesses,fear if others dont understand their problem;moreover, if they dont show understandablity,if others can ciriticise his or her behaviour unrighteously. Patient afraid of if they can meet misunderstanding,eventhough the anxiety problem is common,people with the illnesses feel alone and misunderstood (October,2012)**.Anxiety disorder effect of changing behaviour is affect even people social,school and family life. Finaly,effects of anxiety disorder problem are faster heart beating and changing behaviour change human life profoundly. Although it has unwell effects,it isnt unrecover illnesses,it has solution. In article Anxiety disorder,according to Mr. Lyness,PhD,steps of treatment are that Tell a parent or other adult about physical sensations, worries, or fears. Get a checkup and make sure wheather it can be physical problem. Work with a mental health professional.Get regular exercise, good nutrition, and sleep(October,2010). RESOURCES **http://kidshealth. org/teen/your_mind/mental_health/anxiety. html#a_How_Are_Anxiety_Disorders_Treated_(first one: summury from under head of How Anxiety Disorders Affect People,second paragraph.. second one(in final part) is summary of under head of What to Do in article start from second paragraph. ) ————————————————- *http://www. helpguide. org/mental/anxiety_types_symptoms_treatment. htm (Under the head of Anxie ty attacks and their symptoms,first sentence,direct quatation)

Thursday, October 10, 2019

Software Security Risk Analysis Using Fuzzy Expert System

| | |Software Level of Security Risk Analysis Using Fuzzy | |Expert System | |[ARTIFICIAL INTELLIGENT] |UNIVERSITI TEKNIKAL MALAYSIA MELAKA FACULTY OF INFORMATION & COMMUNICATION TECHNOLOGY SESSION 2 – 2010/2011 |NURUL AZRIN BT AIRRUDIN – B031010343 | |SITI NURSHAFIEQA BT SUHAIMI – B031010313 | |NUR SHAHIDA BT MUHTAR – B031010266 | | | |LECTURE NAME: DR ABD.SAMAD HASSAN BASARI | | | |[12th APRIL 2011] | SOFTWARE LEVEL OF SECURITY RISK ANALYSIS USING FUZZY EXPERT SYSTEM ABSTRACT There is wide concern on the security of software systems because many organizations depend largely on them for their day-to-day operations. Since we have not seen a software system that is completely secure, there is need to analyze and determine the security risk of emerging software systems.This work presents a technique for analyzing software security using fuzzy expert system. The inputs to the system are suitable fuzzy sets representing linguistic values for software secu rity goals of confidentiality, integrity and availability. The expert rules were constructed using the Mamdani fuzzy reasoning in order to adequately analyze the inputs. The defuzzication technique was done using Centroid technique. The implementation of the design is done using MATLAB fuzzy logic tool because of its ability to implement fuzzy based systems.Using newly develop software products from three software development organizations as test cases, the results show a system that can be used to effectively analyze software security risk. ANALYSIS AND DESIGN The design is basically divided into four stages: 1) DESIGN OF THE LINGUISTIC VARIABLES The inputs to the system are the values assumed for the software security goal thru confidentiality, integrity and availability. The goals are assumed to be the same weight and a particular valued is determined for each of them based on questions that are answered about the specific software.Also the values determined for each of the inpu t are defined as a fuzzy number instead of crisp numbers by using suitable fuzzy sets. Designing the fuzzy system requires that the different inputs (that is, confidentiality, integrity, and availability) are represented by fuzzy sets. The fuzzy sets are in turn represented by a membership function. The membership function used in this paper is the triangular membership function which is a three point function defined by minimum, maximum and modal values where usually represented in 1. [pic]Figure 1: Triangular Membership Function 2) THE FUZZY SETS The level of confidentiality is defined based on the scales of not confidential, slightly confidential, very confidential and extremely confidential. The level of integrity is also defined based on the scales very low, low, high, very high, and extra high. Also, the level of availability is also defined by the scales very low, low, high, very high and extra high. The levels defined above are based on a range definition with an assumed int erval of [0 -10]. The ranges for the inputs are shown in tables 1 and 2. DESCRIPTION |RANGE | |Non-Confidential |0-1 | |Slightly Confidential |2-3 | |Confidential |4-6 | |Very Confidential |7-8 | |Extremely Confidential |9-10 | Table 1: Range of inputs for Confidentiality Very Low |Low |High |Very High |Extra High | |0 – 1 |2 – 3 |4 – 6 |7 – 8 |9 – 10 | Table 2: Range of inputs for Integrity |Very Low |Low |High |Very High |Extra High | |0 – 1 |2 – 3 |4 – 6 |7 – 8 |9 – 10 |Table 3: Range of inputs for Availability |DESCRIPTION |RANGE | |Not Secure |0 – 3 | |Slightly Secure |4 – 9 | |Secure |10 – 18 | |Very Secure |19 – 25 | |Extremely Secure |26 – 30 | Table 4: Level Of Security RiskThe fuzzy sets above are represented by membership functions. The corresponding membership functions for confidentiality, integrity and availability are presented in figures below [pic] Figure 1 : Mem bership functions for Confidentiality Similarly, the output, that is, the level of security risk is also represented by fuzzy sets and then a membership function. The level of security risk is defined based on the scales: not secure, slightly secure, secure, very secure, and extremely secure within the range of [0- 30].The range definition is shown in table above. The membership function for the output fuzzy set is presented in figure below. [pic] Figure 2 : Membership functions for Integrity [pic] Figure 3 : Membership functions for Availability [pic] Figure 4 : Level Of Security Risk 3) THE RULES OF THE FUZZY SYSTEM Once the input and output fuzzy sets and membership functions are constructed, the rules are then formulated. The rules are formulated based on the input parameters (confidentiality, integrity, and availability) and the output i. e. level of security risk.The levels of confidentiality, integrity, and availability are used in the antecedent of rules and the level of sec urity risk as the consequent of rules. A fuzzy rule is conditional statement in the form: IF x is A THEN y is B. Where x and y are linguistic variables; and A and B are linguistic values determined by fuzzy sets on universe of discourses X and Y, respectively. Both the antecedent and consequent of a fuzzy rule can have multiple parts. All parts of the antecedent are calculated simultaneously and resolved in a single number and the antecedent affects all parts of the consequent equally.Some of the rules used in the design of this fuzzy Systems are as follow: 1. If (Confidentiality is Not Confidential) and (Integrity is Very Low) and (Availability is Very Low) then (Security Risk is Not Secure). 2. If (Confidentiality is Not Confidential) and (Integrity is Very Low) and (Availability is Low) then (Security Risk is Slightly Secure). 3. If (Confidentiality is Extremely Confidential) and (Integrity is Extra High) and (Availability is High) then (Security Risk is Slightly Secure). †¦ †¦Ã¢â‚¬ ¦. 125.If (Confidentiality is Not Confidential) and (Integrity is Very Low) and (Availability is high) then (Security Risk is Extremely Secure). The rules above were formulated using the Mamdani max-min fuzzy reasoning. DEVELOPMENT AND IMPLEMENTATION The linguistic variables were determined with the extent of the positive and negative responses to a well constructed security questions that are presented in form of on-line questionnaire. As it was mentioned earlier, MATLAB was used for the implementation. The linguistic inputs to the system are supplied through the graphical user interface called rule viewer.Once the rule viewer has been opened, the input variables are supplied in the text box captioned input with each of them separated with a space. a) THE FIS EDITOR The fuzzy inference system editor shows a summary of the fuzzy inference system. It shows the mapping of the inputs to the system type and to the output. The names of the input variables and the processing methods for the FIS can be changed through the FIS editor. Figure 5: The FIS editor b) THE MEMBERSHIP FUNCTION EDITOR This can be opened from the command window by using the plotmf function but more easily through the GUI.The membership function editor shows a plot of highlighted input or output variable along their possible ranges and against the probability of occurrence. The name and the range of a membership value can be changed, so also the range of the particular variable itself through the membership function editor. [pic] Figure 6: The Membership Function editor c) THE RULE EDITOR The rule editor can be used to add, delete or change a rule. It is also used to change the connection type and the weight of a rule. The rule editor for this application is shown in figure 7. pic] Figure 7: Rule Editor d) THE RULE VIEWER The text box captioned input is used to supply the three input variables needed in the system. The appropriate input corresponds to the number of YES answer in the questionnaire for each of the input variables. For example, in the figure 8, all the input variables are 5 and the corresponding output is 13. 9, which specified at the top of the corresponding graphs. The input for each of the input variables is specified at the top of the section corresponding to them, so also the output variable.The rule viewer for this work is presented in figure 8. [pic] Figure 8: The Rule editor e) THE SURFACE VIEWER The surface viewer shown in figure 9 is a 3-D graph that shows the relationship between the inputs and the output. The output (security Risk) is represented on the Z-axis while 2 of the inputs (Confidentiality and Integrity) are on the x and y axes and the other input (Availability) is held constant. The surface viewer shows a plot of the possible ranges of the input variables against the possible ranges of the output. 4) EVALUATIONThe security risk analysis system was evaluated using three newly completed software products from three different s oftware development organizations. The output determines the security level of software under consideration. The summary of the evaluation is given in figure 11. For product A, 5 is the score for confidentiality, 5 for the integrity and 5 for the availability. |Software |Input |Output |Significance |Security Level | |Product A |5 5 5 |13. |45% slightly secure, 55% secure |46. 33 % | |Product B |8 7 8 |24. 2 |20% secure, 80% very secure |80. 60 % | |Product C |10 10 10 |28. 4 |35% very secure, 65% extremely secure |94. 67 % | Table 5 : Evaluation of Different Input Variables [pic] Figure 9 : The Surface Viewer [pic] Figure 10 : Histogram & 3D CONCLUSION AND FINDINGThus, this work proposes a fuzzy logic-based technique for determination of level of security risk associated with software systems. Fuzzy logic is one of the major tools used for security analysis. The major goals of secure software which are used as the inputs to them system are the preservation of confidentiality (preven ting unauthorized disclosure of information), preservation of integrity (preventing unauthorized alteration of information) and preservation of availability (preventing unauthorized destruction or denial of access or service to an authentic user).It might be necessary to redesign this system in a way that it will be deployable and will be without the use of MATLAB. It might also be necessary to use an adaptive fuzzy logic technique for security risk analysis. We have been able to design a system that can be used to evaluate the security risk associated with the production of secure software systems. This will definitely help software organizations meet up with the standard requirements. A technique for assessing security of software system before final deployment has been presented.The result of this study shows that if the software producing companies will incorporate security risk analysis into the production of software system, the issue of insecurity of software will be held to the minimum if not eliminated. This study has also revealed that if each of the software security goals can be increased to the maximum, then the level security will also be increased and the risk associated will be eliminated. Finally, security risk analysis is a path towards producing secure software and should be considered a significant activity by software development organizations.