Saturday, December 28, 2019

Swot Analysis Of Rowland Co And Owc Company - 1045 Words

I like to have a mutual understanding of the possible cooperation between Rowland Co and OWC company where I is cofounder and a managing partner. I totally understand, that the capital investments involves risk. In order to help you with the risk assessments I would like to hear from you, what is most important information you need to realistically look at the big picture and make the decision. We can describe the risk by evaluation of Financial, Market , Technical and Management feasibility for our enterprise. Financial: OWC invested available capital into developing engineering solutions and knowhow for the depleted oil wells and reservoirs. Significant studies, testing and deployment were done in the Soviet Union and the†¦show more content†¦The Short-term Energy outlook for the end of 2016 is $40/b, For 2017 $50 The Forecast West Texas Intermediate (WTI) at the end of 2016 around $38/b Operating Cost In the US Average Operating cost per barrel $13.50. The most expensive is the shale operations. The cost varies from the Texas Permian Basin to the Marcellus shale. For conventional well cost-effective prices to maintain many existing wells is $10/b across the US. To increase the oil output the oil operators are facing the decision: drilling new wells or subscribe to the Enhancing Oil Recovery (EOR). We can argue that the correct EOR is more cost effective to the drilling new wells. In many places the drilling is financially prohibited at the current oil price. Technical: There are many methods intended to increase the wells productivity: Chemical, thermal, magnetic pulse generators ,CO2 and many others . All of the above methods in certain circumstances could make improvements in few additional barrels. It is not my intention to conduct and provide comparison studies. Our methods were built around the Hydro Slotted Perforation. The technology is based on the uploading rock stress around the wellbore zone and in opening a hydrodynamic communication that instigates the drastic increase in the oil output. Depending on the formation, we can increase oil output in average to 25 barrels/day. We could use additional methods centered

Friday, December 20, 2019

False Appearances in Macbeth - 895 Words

Darkness, fear, mayhem, guilt and hypocrisy are all important themes which are carried throughout the play. The use of imagery in reference to blood, light versus dark, false appearance and disease reinforce these themes. The imagery appears to tiptoe through every scene to create a malevolent atmosphere of shame and false pretence. One of the key themes in the play that was reinforced and highlighted by the use of imagery was false appearance. The use of imagery to portray false appearance can be seen when Lady Macbeth tells Macbeth to ...look like the innocent flower but be the serpent under it. Also, this portrayal of false appearance can be seen after the murder of Duncan, when Donalbain states that â€Å"There are daggers in men’s†¦show more content†¦In act five Macbeth wishes that the doctor could have the power to restore his country back to having pristine health. This is ironic because it seems that he is unaware that he is the disease of the land. This imagery highlights the theme of corrupt kingship in the play. Kingship is often linked with blood in Macbeths role throughout the play. The use of bloody imagery occurs over fifty times in the play. Thus, it is safe to say that blood is the dominant image used. The first few scenes are blood-soaked. For instance in the opening scene a soldier runs in from war, gives Duncan the latest news and then cries my gashes cry for help! this effectively sets the tone of blood of the play. Also in the first scene Macbeths sword is described to have been used with â€Å"bloody execution† as he killed through the many ranks of his enemies. Though it can be said that the bloody imagery is just that (of murder and injury); it can also be said that blood has also been used to portray guilt. The guilt Macbeth feels for murdering Banquo is apparent when he sees his (Banquos) ghost in the banquet scene. He shouts at the spirit to stop waving its gory (blood-soaked) locks at him. But, Macbeth is not the only one to feel remorse; Lady Macbeth is plagued by an image of a damned (red) spot of blood on her hand which can symbolise the inescapableShow MoreRelatedAppearance vs. Reality; The Cause of a Hero’s Downfall1025 Words   |  5 PagesIn the tragedy Macbeth; the reader witnesses the inevitable downfall of the tragic hero Macbeth as he attempts to do the impractical. While Macbeth turns from an admirable nobleman into the traitor fiend that is the result of his wife’s relentless coaxing, the reader distinguishes more and more of the â€Å"appearance versus reality† or the â€Å"things are not what they seem† theme that intertwines with Macbeth’s hubris thus leading to his downfall. As Macbeth furthers his plans, which fall in step with theRead MoreMacbeth - Appearance vs. Reality1537 Words   |  7 PagesAppearance vs. Reality – Macbeth: Commentary Macbeth is a play written by William Shakespeare, which focuses on the life of Macbeth. Out of the four Shakespearean play categories, it is categorized as a tragedy, as the events of the play ultimately lead to the downfall of the protagonist, Macbeth. The theme of appearance versus reality is constantly repeated throughout the play, as it greatly contributes to the development of the plot. The idea is constantly conveyed by the characters using a pleasantRead MoreMacbeth Appearance vs Reality1046 Words   |  5 PagesAppearance vs. Reality The role of deception and the motif of appearance and reality had a large role in Shakespeare’s play, Macbeth. The motif of appearance and reality is first introduced by Shakespeare early on in the play when Macbeth must cover up for the murder of Duncan. This motif of appearance versus reality, or deception, appears again when Macbeth fools the murderers that killed Banquo. Macbeth tricks the murderer’s into believing it was Banquo’s fault that they led such miserableRead MoreAppearances are Deceiving in Shakespeares Macbeth. Reference quotes to the text and lines cited.1495 Words   |  6 PagesThe Renaissance play The Tragedy of Macbeth, written by William Shakespeare, truly demonstrated a compelling tale of greed, power, and jealousy. The play revealed the turn of a good nobleman into a powerful and greedy king. It showed audiences how one crime led to another and eventually to a gruesome melee. Throughout the tragedy there appeared to be a reoccurring th eme stated finest as appearances are deceiving. The audience is first introduced to the theme in the first scene of the play where theRead MoreDeceptive Appearances in Macbeth1362 Words   |  6 PagesShakespeare’s Macbeth, a selfish Scottish thane becomes over-ambitious and commits several murders in order to gain and stay in power. After the murders, Macbeth evades suspicion by hiding his guilt and intentions, therefore deceiving others into thinking that he is innocent. Other characters including Lady Macbeth, the witches and the Scottish thanes also use their appearances to hide the truth and deceive others. With these examples, Shakespeare shows that appearances can be deceiving. Macbeth usesRead MoreAppearance vs Reality in Macbeth772 Words   |  4 PagesFair is foul and foul is fair, chant the witches in the opening scene of Macbeth. With this apparent contradiction a seed is sown for the examination of what is indeed a major theme of the play. False appearance and apparition recur regularly throughout the story. The audience and even the characters themselves are often unsure of the distinction between what appears to be real and what actually is. Shakespeare makes a great statement through the play of how easily one can deceive and be deceivedRead MoreSupernatural in Hamlet754 Words   |  4 Pagesplays. In two such plays, Hamlet and Macbeth, the supernatural is an integral part of the structure of the plot. It provides a catalyst for action, an insight into character, and augments the impact of many key scenes. The supernatural appears to the audience in many varied forms. In Hamlet, the most notable form of the supernatural that appears is the gh ost. However, in Macbeth, a ghost, a floating dagger, witches, and prophetic apparitions make appearances. The role of the supernatural is veryRead MoreAnalysis Of Shakespeare s Macbeth By William Shakespeare1236 Words   |  5 PagesDanna Santillan English H 2 Period 2 22 October 2016 Are Things Truly How They Appear? All things have an appearance, most of the time blissfully untainted or highly corrupt. Dependent upon the appearance something is illustrated to have, we layout our own supposition about it. This idea of equivocation is abundant in Shakespeare’s tragedy, Macbeth. In Macbeth, Shakespeare exposes literary devices such as illustrative imagery, sarcastic similes, and dubious diction to unveil one of his manyRead More Comparing the Supernatural in William Shakespeares Hamlet and Macbeth 921 Words   |  4 PagesComparing the Supernatural in William Shakespeares Hamlet and Macbeth  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚   In the time of William Shakespeare there was a strong belief in the existence of the supernatural. Therefore, the supernatural is a recurring theme in many of Shakespeares plays. In two such plays, Hamlet and Macbeth, the supernatural is an integral part of the structure of the plot. It provides a catalyst for action, an insight into character, and an augmentation of the impact of many key scenes. TheRead MoreWilliam Potter s Macbeth 1247 Words   |  5 PagesMacbeth, a tragedy play written by Shakespeare, illustrates the damaging physical and psychological effects of political ambition on those who seek power for its own sake. Harry Potter, a series of fantasy, fiction novels written by J.K Rowling, chronicles the life of a young wizard, Harry Potter, a chain adventure of his friends, all of whom are students at Hogwarts School of Witchcraft and Wizardry. Despite the fact that these two books may seem completely unreliable, there are indeed, certain

Thursday, December 12, 2019

Historical Structure of Chicagos and LAs Racism free essay sample

Headgears analysis of the Hamburgs, and the Conservative Vice Lords in Chicago, and the Crisp and Bloods videos analysis of gangs in LA, discuss how Headgears concept of demoralizing, and Cornell Wests concept of nihilism, have an objective basis in the historical structure of Chicago and LAs racism. In John M.Headgears book A World of Gangs he states, An increasingly frustrated and demoralized population will reluctantly turn to armed non-state actors who can provide security of a sort, a sense of identity, perhaps the sole local supply of Jobs, ND rudimentary services that the state cannot or will not offer (Headgear p. 21). This notion Is supported when one analyzes and considers the story of the Hamburgs and the Conservative Vice Lords of Chicago.Consider the following; during the industrial era many newly freed slaves of the South moved North into industrialized cities looking to build a better future, rather than having their kids become accustomed to the same racism they dealt with day In and day out In the South. People in their community started to become users and this led to dysfunctional families where the mom is a drug addict and dad is in jail for being apart of the gangs that distribute and make their money off of the only line of work that was available to them.With the drug game being dominated primarily by males, women sought income too by selling their bodies to prostitution. That said, the economic factors were not the primary drivers of C.V. into the drug business, Other contributing factors Were the deterioration f their Allendale community, caused by denationalization that drove the C.V. to a third world trajectory of social exclusion (Headgear p. 83). The Hamburgs (HA) enjoyed a much different outcome. In essence, the C.V. became isolated due to no political, police and/or social acceptance.This is the defining role of modern day demoralizing in ghettos all across the world. Nihilism can be defined as lifelessness, hopelessness, loveless-news and gang based mentality (No matter how bad I got it Ill always have something). Cornel West states, Nihilism among African Americans spread after the 1 9605, though most feel that its roots go all the way back to the time of slavery and years and years of racism (Headgear p. 57). He goes on to say that, He hope of the asss was blown up when the IIS government failed to live up to its promises of the war on poverty (Headgear p. 57). For example, these nihilistic fallacies are expressed by famous rapper Kenya West in a hit song, Cue when you try hard, thats when hay die hard his meaning being washes the point of trying in a white dominated country where if I try my hardest, in the end you will just be left more disappointed due to no acceptance. This led to African Americans feeling cynical about freedom.In the video Bloods and Crisp: Made in America it was clear that gangs replaced immediate families, were about unity and gave members a sense of purpose that they had lost as a result of social exclusion and other educational, occupational, and economical opportunities. Question #2: Discuss the significance of Manuel Chattels devastating picture Of the popularization and social exclusion Of the Fourth World and are the concepts of institutionalizing and defensible spaces, for understanding he history of gangs in Chicago, Cape Town, and ROI De Jeanine.Social exclusion and economic popularization are key elements in what Castles says are policies aimed at the dismantling of the welfare state in the IIS and the West. He says that when the state can no longer provide adequate employment, protection, services, or security for expanding, closely tied and quartered urban populations that the potential for illegitimate forces of violent, private groups can and will move in to fill the void. (Headgear p. ) According to Manuel Castles and John Headgear major gangs that have been round for decades have spread outside their original neighborhoods, and have evolved from wild peer groups to organized criminals with a gang identity are labeled or defined as institutionalized. Gangs are considered institutionalized because they are continually increasing the members in their group and have some sort tie to their community. They are impossible to remove, because their members and those, or the youth, that will ultimately become their members have no other options.The fact is they have been around and exist for years and years. Some may raise the question, Well, if o incarcerate the top dog Or the kingpin Wont everything just fall apart? The answer is no. Many gangs of today and also in the past are highly decentralized. This means that they are not laid out in a bureaucratic or hierarchical fashion; there is not one chief at the top of the pyramid and many foot soldiers below. Headgear states that, Institutionalized gangs are not merely an expendable tool of dynamic leaders or sustained only by profits of drug sales.These gangs are living organisms instilling in their members, as well as the community, a belief in the organization itself (Headgear p. ). Its like a tradition that is handed down from generation to generation. Defensible Spaces can be defined as areas or communities in which those who do not live in that community do not want to be visited by the general public or police. This creates an invisible barrier where these communities become safety nets for gang bangers, drug dealers, prostitutes etc. Here they consciously know that they can commit a violent, crime with little chance of getting caught. The business of the gang can be managed unencumbered. As described in the movie Bloods and Crisp: Made in America, there was an invisible line drawn right through the center of south LA, one side being black and the other white. With a police force of predominately white male officers their inclination was to patrol and keep safe the people of their own community and leave the poor black communities to fend for themselves.The fact that the gangs in Chicago, Cape Town, and ROI De Jeanine were able to sell drugs within defensible spaces allowed them to institutionalize. Whether in housing projects or vales (as they are know in ROI De Jeanine) the affect was the same, it provided a safe haven from police. In Chicago, dense ND crowded projects provided a defensible space for gangs to carry out their drug trafficking without the threat of police activity. In ROI De Jeanine, on the other hand, they built their vales in the mountains, this location separated them from exotic beaches and pr ovided natural barrier. Their buildings were very close and tight quartered living conditions made it easier for them to keep their trafficking under the radar, another benefit to this was that they could see police coming to from a far so they used tactics similar to the military to alert everyone in the vales to take cover and hide all incriminating evidence. In Cape Town, the gangs control the turf, not the police; and it has been that way for many generations.It is clear as Headgear points out that, defensible spaces appear to be important conditions for the institutionalizing of gangs (Headgear p. 15). In conclusion, the history and perseverance of gangs in Chicago, Cape Town, and ROI De Jeanine lead one to conclude that even if conditions change overtime, gangs are able to adapt to these circumstances, and make due with resources given. Also, a loss of leadership to prison or death will not deter their ability to adapt and thrive in he changing environment around them.Question #3: Why does Headgear ar gue that hip-hop and its gangs rap variant are cultural answers to the permanence of racism and oppression, and have become a contagious culture of rebellion that expresses a resistance identity for youth worldwide? Rap and hip-hop are the base of the contagious culture of rebellion. This is true because the certain kind of music that African Americans portray is how they are affiliated with their community, it is how they express themselves and how they see themselves not by how others project statistics and how they see things.Hip-hop would give people that lived in ghettos a sense of hope and helped take their mind off of their nihilistic thoughts of how they live. Complementing my last statement, Africa Bumboat, respectfully known as the grandfather to the origination of hip-hop once stated, When we made hip-hop, we made it hoping it would be about peace, love, unity and having fun so that people could get away from the negativity that was plaguing our streets (Headgear p. 93).Bombasts goal was to pull kids from the self-hatred and destructive behavior that is an all-too common response to poverty and schism (Headgear p. 95). With this insight from an innovator of hip-hop culture we can point out that hip-hop was more positive than negative because it had th e capacity to point kids into a better direction and change their lives. On the other hand gangs rap, which is actually a submerge of hip-hop was more hardcore in the fact that Macs rapped about how they lived and put into perspective how they thought about the public, government, police etc.With popularity in this specific area of music and culture there was money to be made and the ghettos where these rap artists were derived from id not see much of this profit, the liberal white businessmen saw money signs so they had the financial ability to exploit this lifestyle. Therefore gangs rap skyrocketed in all musical polls all across the country; not only was it was it residing in ghetto communities that were listening to this contagious music and lifestyle, it was actually aimed mostly towards affluent white teenagers that fantasized about exotic experience of thug life.The most power that comes with this mass spread of negative violent genre topping music boards is that it gave many people across the country the mindset of Im going to get rich, or die tr ying (50 Cent). This quote made famous by African American rapper Curtis Jackson (50 Cent), did not show people of color to condone themselves into the drug market and gang life but provoked it.

Wednesday, December 4, 2019

Organisational and Environmental Factors †Free Samples to Students

Question: Discuss about the Organisational and Environmental Factors. Answer: Introduction During the past few years there has been a solution which appeared in the field of the information technology, which is the cloud computing, it is impossible to ignore it since the cloud computing enables the business to outsource the data, electronically mail, folders as well as the other programs via the virtual setups via the medium of the servers that are attached between them. This data could be reached wherever anytime (Abadi, 2009). The only necessity for the cloud computing would be to have an offered connection of the internet. The influences of the cloud computing has brought a number of changes not merely in the global efficiency of the business, in addition to their internal organization particularly in the IT department. This opportunity is modifying on the way the usual method in the business are carried out such as the back-up of the data (Abadi, 2009). The cloud computing has brought new tools as well as new perspectives of the evolution for the business which are usi ng it. The term cloud computing is regarded as the data which is stored and could be accessed via the internet and not in the traditional way from the hardware of the computers. The cloud computing for business is aimed at providing the holistic view of how cloud computing relates to the business world (Abdollahzadegan, Hussin, Razak, Moshfegh Gohary and Amini, 2013). In this research it will provide a review of the advantages and the disadvantages to which the cloud computing has brought to the business. The aim of this research is to explore on the current cloud computing market with the critical analysis of the advantages and the disadvantages it bring to the businesses (Abadi, 2009). This is geared as being the reference point to the business enterprises who are willing to use the cloud in utilizing its objective. The scope of this study has been limited to the peripheral of the cloud computing complexity and that of the business. This research would give the common reader a clear understanding to the issue which will be discussed (Alshamaila, Papagiannidis and Li, 2013). This study has a wider coverage but the focus of the study is on the advantages and the disadvantages of the cloud computing for the business. Analysis of the advantages and disadvantages of cloud computing In this section of the literature review it will highlights on the main advantages and disadvantages of the cloud computing for the business. Advantages of the cloud computing The cloud computing presents a lot of benefits for the business, some of these are as follows; Cost efficiency: The cloud computing is regarded as the cost effective method to use, sustain as well as upgrade for the business (Aljabre, 2012). The traditional desktop software cost business a lot in relation to the finances. Increasing to the licensing fees for the numerous users that could turn out to be very costly particularly for the establishment which are concerned. With regards to the cloud computing it really is offered at an appreciably lower rates and therefore it could lower on the company costs (Alshamaila, Papagiannidis and Li, 2013). Additionally, there are numerous onetime payment, pay while you go along with other scalable options available, that makes it to be particularly reasonable for the organizations. Backup and recovery: This benefit is important in that all the data is stored in the cloud, backing it up in addition to restoring the same is extremely easier than storing it on the bodily devices for example the hard drives (Alshamaila, Papagiannidis and Li, 2013). Furthermore, many of the cloud services providers are in a position to the level that they can handle the recovery of the data (Aljabre, 2012). Consequently, this make the entire process of backing along with the recovery to be much easier than the other traditional methods which are useful for storage of the data. It is also crucial that you note that in some instances, the cloud itself could be utilized as the repository backup of the data especially to the local computers. Automation of the software integration: when it comes to the cloud computing, the software integration is something which occurs automatically. This hence signifies that one does not have to take the additional initiatives to be able to personalize in addition to integrate on the software according to one preferences (Al-Rousan, 2015). This aspect typically takes care of itself. Furthermore, in the cloud computing it enables one to personalize on the numerous alternatives with significantly ease (Assuno, Calheiros, Bianchi, Netto and Buyya, 2015). The businesses are able to handpick the services as well as the software programs which they think will suit best to their organization. Scalability and performance: The aspect of scalability is an in-built feature for the deployments of the cloud. Example the cloud are integrated instantly only as required and as result, one only require to pay for the programs in addition to the data storage that one needs (Velte, Elsenpeter and Elsenpeter 2010). Hand in hand, it also comes flexibility, given that the clouds might be extended to satisfy on the altering information technology system demands (Al-Rousan, 2015). In relation to the performance, the system usually use distributed architectures which offer a great speed of the computations. Additionally, the responsibility of the provider could be to make sure that the solutions could operate on the cutting edge machinery (Al-Rousan, 2015). The situations can certainly be added for the immediately enhanced performances and the clients will surely have a use of the overall tools of the primary of the cloud through their dashboards. Device diversity and the location indepen dence: The cloud computing services could be accessed via the plethora of the electronic devices that are in a position to have accessibility to the internet. These device constitute not merely the conventional PCs, however along with the smartphones and the tablets (Assuno, Calheiros, Bianchi, Netto and Buyya, 2015). With the cloud BYOD policy they could be designed very easily, enabling the employees to bring their private owned devices to the work environment. Additionally, a client might determine which the devices to use are along with the where to access the service from (Assuno, Calheiros, Bianchi, Netto and Buyya, 2015). There is absolutely no restriction of the place and the medium. Businesses can gain access to their programs and the data from anywhere on the globe, hence making this approach to be essential for the business (Sajid and Raza, 2013). The cloud computing is this manner since it is appealing to the internal organization since it offered the versatility for the employees to gain access to on the business files whenever they are. Reduced support and hardware needs: As one move much more crucial application for the enterprise in the cloud, they might most likely note that there is no need for upgrade of the computers consistently as many of the staff can do without the higher end of the computers (Assuno, Calheiros, Bianchi, Netto and Buyya, 2015). The reason being the actual computing is not taking place on the computer. An example a two hundred dollars tablet can access the salesforce as well as the Google Apps accounts much quicker as the two thousand dollars premium computers (Aljabre, 2012). The cloud computing infrastructure requires a much smaller information technology employees as comparison to the traditional IT set up which does. This is because the organization will not be managing on the software anymore. Disadvantages of the cloud computing The business have encountered many drawbacks of the cloud computing, these aspect are discussed as below: Security: Although the providers of the cloud services implement the best security protocols, standards and the industry specification, storage of the data and vital files to the external service provider could pose a risk to the business (Assuno, Calheiros, Bianchi, Netto and Buyya, 2015). Through use of the cloud powered technologies highlights that one needs to offer your service provider with the use of these types of essential business data. Furthermore, being a public service opens up cloud providers to the security issues each day (Garrison, Wakefield and Kim, 2015). The easy of procuring along with accessing the cloud services could offer nefarious users the ability to scan, recognize along with exploit the loopholes and the vulnerabilities that might be within the system (Alshamaila, Papagiannidis and Li, 2013). An illustration might be in the multi-tenant cloud architecture in which there are several users who are hosted on the similar servers, an attacker might try to brea k into the data of the other business that are managed as well as stored on the same servers. Nonetheless, these exploits and loopholes which are inclined not to surface and the likelihood of the compromise is not great. The cloud vendors heading out of the business: The cloud computing is evolving field, and there is undoubtedly the danger that a new business might cross the business or maybe radically change on the service (Marston, Li, Bandyopadhyay, Zhang and Ghalsasi, 2011). Any specific sudden change in the service might not be too detrimental in case one was using the application for one time project, but this could be disastrous if a business is using it for the entire donor database (Rittinghouse and Ransome, 2016). When one is evaluating the cloud providers, it is important to find which options one could have when it comes to backing up as well as extracting on the data. Contracts and the obligations: when a business put their applications in the cloud they may think there application is safe. But they do not forget that the programs needs to be maintained and the OS needed to host the applications and they need to be managed and patched more regularly (Garrison, Wakefield and Kim, 2015). If the business does not make sure who is responsible for the security of the programs you are in sure trouble (Garrison, Wakefield and Kim, 2015). Therefore, when it comes to signing of a contract with the cloud service providers it is important to make it clear what are the obligations of the business and those of the cloud providers in regards to cloud security, management and data privacy. Technical issues It is true that the data as well as information on the cloud might be accessed anytime and from anyplace, there are time nevertheless that the system might have severe irregularities concerns (Raghava and Singh, 2014). The businesses should know the fact that the technology is actually prone to the outages along with other technical issues (Chandrasekaran, 2014). Even the best cloud service providers can come across such trouble, despite the high standards of the maintenance. Furthermore, organizations requires a good connection of internet to be logged to the server all the times. In case there is network and the connectivity problems the organization could be stuck. Cost: initially, the cloud computing application would seem to be less expensive compared to a particular software solution which is set up and run in-house (Garrison, Wakefield and Kim, 2015). Moreover, the companies need to ensure that the cloud programs have all the capabilities which the software should have and to identify the ones that are missing functions (Chandrasekaran, 2014). There is a need for a total cost assessment which must be carried out to make sure that these application are not costly. Most of the cloud computers vendors they present themselves as the utility dependent providers, and they more regularly claim which they only charge for which the clients use , however this is not true ins many of the case (Nkhoma, Dang and De Souza-Daw, 2013). An organization should commit to a predetermined contract that is independent to the actual use. Businesses should look closely with regards to the pricing plans and the details for each of the program. There is the challenge of inflexibility: when the organization choose a cloud computing vendor, it means they will be locking their proprietary application or the formats (Chandrasekaran, 2014). An example, it becomes impossible to insert a document which is created in another program into the Google Docs spreadsheet (Chandrasekaran, 2014). Additionally, a business needs to be able to add or even subtract the cloud computing user as necessary as their business grow. Conclusion The cloud computing has been a quick changing area which will continue undoubtedly in playing the major role for the organizations. Like everything else, the cloud computing has advantages as well as disadvantages. This technology can prove to be a great asset to the business, however it can also result in harm in case it is not comprehended and used accordingly. The cloud computing can be an opportunity for the business to balance on the efforts that are implied by the information technology management , which is limited to the disadvantage of the cloud , as discussed in the research . The major concern raised is the security concern which relates to the organization taking their business data in then cloud. The recommendation to this issue is to adopt the cloud computing to the scaled-down section of the business application to allow business to count down the advantages and determine the risks. References Abadi, D.J., 2009. Data management in the cloud: Limitations and opportunities. IEEE Data Eng. Bull., 32(1), pp.3-12. Abdollahzadegan, A., Hussin, C., Razak, A., Moshfegh Gohary, M. and Amini, M., 2013. The organizational critical success factors for adopting cloud computing in SMEs. Aljabre, A., 2012. Cloud computing for increased business value. International Journal of Business and social science, 3(1). Alshamaila, Y., Papagiannidis, S. and Li, F., 2013. Cloud computing adoption by SMEs in the north east of England: A multi-perspective framework. Journal of Enterprise Information Management, 26(3), pp.250-275. Al-Rousan, T., 2015. Cloud Computing for Global Software Development: Opportunities and Challenges. In Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications (pp. 897-908). IGI Global. Assuno, M.D., Calheiros, R.N., Bianchi, S., Netto, M.A. and Buyya, R., 2015. Big Data computing and clouds: Trends and future directions. Journal of Parallel and Distributed Computing, 79, pp.3-15. Apostu, A., Puican, F., Ularu, G.E.A.N.I.N.A., Suciu, G. and Todoran, G., 2013. Study on advantages and disadvantages of Cloud Computingthe advantages of Telemetry Applications in the Cloud. Recent Advances in Applied Computer Science and Digital Services. New York: Wseas, 200, pp.118-123. Chandrasekaran, K., 2014. Essentials of cloud computing. CRC Press. Garrison, G., Wakefield, R.L. and Kim, S., 2015. The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations. International Journal of Information Management, 35(4), pp.377-393. Gutierrez, A., Boukrami, E. and Lumsden, R., 2015. Technological, organisational and environmental factors influencing managers decision to adopt cloud computing in the UK. Journal of Enterprise Information Management, 28(6), pp.788-807. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J. and Ghalsasi, A., 2011. Cloud computingThe business perspective. Decision support systems, 51(1), pp.176-189. Nkhoma, M.Z., Dang, D.P. and De Souza-Daw, A., 2013, May. Contributing factors of cloud computing adoption: a technology-organisation-environment framework approach. In Proceedings of the European Conference on Information Management Evaluation (pp. 180-189). Raghava, N.S. and Singh, D., 2014. Comparative study on load balancing techniques in cloud computing. Open journal of mobile computing and cloud computing, 1(1). Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press. Sajid, M. and Raza, Z., 2013, November. Cloud computing: Issues challenges. In International Conference on Cloud, Big Data and Trust (Vol. 20, No. 13, pp. 13-15). Velte, A.T., Velte, T.J., Elsenpeter, R.C. and Elsenpeter, R.C., 2010. Cloud computing: a practical approach (pp. 1-55). New York: McGraw-Hill.

Thursday, November 28, 2019

Guava fruit Essay Example

Guava fruit Essay The intestinal digestive enzymes alpha-glucosidase and alpha-amylase are plays a vital role in the carbohydrate digestion. One antidiabetic therapeutic approach reduces the post prandial glucose level in blood by the inhibition of alpha-glucosidase and alpha-amylase enzymes. These can be an important strategy in management of blood glucose. The aim of the present study was to investigate the phytochemical bioactive compounds of the methanolic extract of Psidium guajava leaves, its in vitro anti-diabetic activity.The assay results suggests that the presence of bioactive compounds, could be responsible for the versatile medicinal properties of this plant including diabetes, the extract exhibit the dose-dependent increase in inhibitory effect on alpha-glucosidase enzyme (upto 89. 4%), and alpha-amylase enzyme (upto 96. 3%). The current study proves that the antidiabetic activity of methanolic extract of Psidium guajava leaves by in vitro studies. * Keywords Psidium guajava; Phytochemica l; alphaglucosidase; alpha-amylase Introduction Diabetes mellitus is a complex and a diverse group of disorders that disturbs he metabolism of carbohydrate, fat and protein. The number of diabetes mellitus cases has been increasing worldwide in recent years. In 2000, the world health organization estimated a total of 171 million of people with diabetes mellitus from the global population, and this report projected to increase to 366 million by 2030 (Wild et al. , 2004). With a long course and serious complications often resulting in high deathrate, the treatment of diabetes spent vast amount of resources including medicines, diets, physical training and so on in all countries.Thus searching for a new class of compounds is essential to overcome diabetic problems. There is continuous search for alternative drugs (Syamsudin, 2010). 15 Int. J. Curr. Microbiol. App. Sci (2013) 2(2):15-19 Psidium guajava Linn. (Myrtaceae) is commonly known as Peru or Guava in English. The Psidium guajava leaves are used in the treatment of diarrhoea, cough, stomachache, dysentery and decoction of the leaves for cholera patients, toothache and gum boils. The leaves showed hypoglycemic, cardioprotective, myocardial depressant, antimicrobial, antispasmodic actions (Ross, 1999).Inhibition of alphaamylase and alpha-glucosidase enzymes can be an important strategy in management of post prandial blood glucose level in type 2 diabetes patient (Ali et al. , 2006). Thus, objective of the present study is to investigate the phyto chemical, invitro antidiabetic activity of methanolic extract of Psidium guajava leaves. reducing sugar, tannins, flavonoids, steroids and alkaloids by using standard phytochemical procedures (Evans, W. C and Evans, T. 2003). In vitro methods employed in antidiabetic studies Inhibition of alpha-amylase enzyme A starch solution (0. 1% w/v) was obtained by stirring 0. g of potato starch in 100 ml of 16 mM of sodium acetate buffer. The enzyme solution was prepared by mix ing 27. 5 mg of alpha-amylase in 100 ml of distilled water. The colorimetric reagent is prepared by mixing sodium potassium tartarate solution and 3, 5 di nitro salicylic acid solution 96 mM. Both control and plant extracts were added with starch solution and left to react with alpha- amylase solution under alkaline conditions at 25? C. The reaction was measured over 3 minutes. The generation of maltose was quantified by the reduction of 3, 5 dinitro salicylic acid to 3amino-5- nitro salicylic acid.This reaction is detectable at 540 nm (Malik and Singh, 1980). Materials and Methods Plant material and extraction The fresh leaves of Psidium guajava were collected locally and authenticated by the department of Botany, St. Joseph College, Trichy. The shade dried Psidium guajava leaves were powdered mechanically and stored in an air tight container. The extraction was carried out by hot percolation method using Soxhlet apparatus. The solvent used was methanol. About 100 gm of powder was extracted with 600 ml of methanol. The extract was concentrated to dryness under controlled temperature 4050Â °C.The percentage yield was found to be 10. 15%. The extract was preserved in refrigerator till further use. Phytochemical Screening For preliminary phytochemical analysis the freshly prepared crude methanolic extracts of leaves were tested for the presence or absence of phytoconstituents such as 16 Inhibition of alpha-glucosidase enzyme The inhibitory activity was determined by incubating a solution of starch substrate (2 % w/v maltose or sucrose) 1 ml with 0. 2 M Tris buffer pH 8. 0 and various concentration of plant extract for 5 min at 37Â °C.The reaction was initiated by adding 1 ml of alpha-glucosidase enzyme (1U/ml) to it followed by incubation for 40 min at 35Â °C. Then the reaction was terminated by the addition of 2 ml of 6N HCl. Then the intensity of the colour was measured at 540nm (Krishnaveni et al. , 1984). Int. J. Curr. Microbiol. App. Sci (2013) 2(2):15-1 9 Calculation of 50% Inhibitory Concentration (IC50) The concentration of the plant extracts required to scavenge 50% of the radicals (IC50) was calculated by using the percentage scavenging activities at five different concentrations of the extract.Percentage inhibition (I %) was calculated by I % = (Ac-As)/Ac X 100, (Shai et al. , 2010). where Ac is the absorbance of the control and As is the absorbance of the sample. Table 1 Phytochemical analysis of methanolic extract of Psidium guajava leaves S. No. Phytochemical Constituents Name of the Test Mayer s test Dragondraff test Wagner Test Molish Test Fehling Test Benedicts Test Lead Acetate Ferric chloride. Ammonia Salkowaski H2So4 Liebermann s Burchard Test H2So4 Ammonia Shinoda s Test Ferric chloride Sodium chloride Borntrager s test Methanolic Extract + + + + + + + Condensed Tannin + + + + + _ Alkaloids 2 3 4 5 6 Carbohydrates Tannins Pseudo tannins Chlorogenic acid Steroidal Glycosides Anthocyanin Steroidal Glycosides Saponins g lycosides Flavonoids Flavones Phenols Coumarin Phytochemical constituents Results The preliminary phytochemical screening tests for the methanol extract of Psidium guajava leaves (Table 1) revealed the presence of carbohydrates, alkaloids, flavones, tannins, steroidal glycosides, phenols and coumarin. Any of these secondary metabolites, singly or in combination with others could be responsible for the anti-diabetic activity of the plant.There was a dose-dependent increase in percentage inhibitory activity against alphaamylase enzyme. At a concentration of 0. 2 ml of plant extract showed a percentage inhibition 27. 8% and for 1. 0 ml plant extract showed inhibition of 96. 3% (Table 2). The Psidium guajava methanol extract revealed a significant inhibitory action of alpha-glucosidase enzyme. The percentage inhibition at 0. 2-1. 0 ml concentrations of Psidium guajava extract showed a dose dependent increase in percentage inhibition. The percentage inhibition varied from 89. 4% 31. 7% for highest concentration to the lowest oncentration (Table 3). 7 8 9 10 11 12 13 14 +++= High; + = Present; ++ = Moderate; = Absent Table. 2 In vitro antidiabetic activity of alpha-amylase method S. No 1 2 3 4 5 Concentration of Sample (ml) 0. 2 0. 4 0. 6 0. 8 1. 0 % of Inhibition 27. 8 48. 9 62. 5 87. 2 96. 3 17 Int. J. Curr. Microbiol. App. Sci (2013) 2(2):15-19 Table 3 In vitro antidiabetic activity of alpha glucosidase method S. No 1 2 3 4 5 Concentration of Sample (ml) 0. 2 0. 4 0. 6 0. 8 1. 0 % Of Inhibition 31. 7 53. 9 68. 2 76. 5 89. 4 Discussion Diabetes mellitus is a metabolic disorder with increasing incidence throughout the world.Insulin is a key player in the control of glucose homeostasis. Lack of insulin affects carbohydrate, fat and protein metabolism (Rajiv Gandhi and Sasikumar, 2012). Management of diabetes without side effects is still challenge to the medical community. It was proposed that inhibition of the activity of such alpha-amylase and alpha-glucosidase would delay the degradation of carbohydrate, which would in turn cause a decrease in the absorption of glucose, as a result the reduction of postprandial blood glucose level elevation (Rhabaso Lhoret and Chiasson, 2004).In the present study, research has been carried out to evaluate the preliminary phytochemical investigation and the potential of methanol extract of Psidium guajava leaf in inhibiting alpha-glucosidase and alpha-amylase. The present finding of Phytochemical screening of the plant extract confirmed the presence of several bioactive compounds like alkaloids, flavones, tannins and phenols which could be responsible for the versatile medicinal properties of this plant. The present finding reveals that Psidium guajava efficiently inhibits both alpha18 mylase and alpha-glucosidase enzymes in vitro in a dose dependent manner. The aqueous extracts from Syzygium cumini seeds and Psidium guajava leaves both showed a dose dependent inhibitory effect on alpha-amylase activity (K arthic et al. , 2008). The antidiabetic action of Psidium guajava can also be attributed to the intestinal alpha-amylase and alphaglucosidase inhibitory activity. Further studies are required to elucidate whether Psidium guajava have antidiabetic potential by in vivo for validating the traditional claim of the plant.In this present study we evaluated in vitro alpha amylase and alpha glucosidase activity of crude methanol extract of Psidium guajava leaves. The plant showed significant inhibition activity, so further the compound isolation, purification and characterization which is responsible for inhibiting activity, has to be done for the usage of antidiabetic agent. Acknowledgement The authors are grateful to Dr. P. Selvaraj, Chairman, Shivani Group of Institutions, Trichy, whose spacious heart cheered our efforts to process this venture properly, successfully to complete the task.Also we extend our thanks to The Secretary, The Principal and The Staff members of the SSK Polytechni c College, Trichy, Tamilnadu, India. References Ali, H. , P. J. Houghton, and Soumyanath, A. 2006. J. Ethnopharmacol. 107: 449-455. Evans, W. C. , and Evans, T. 2003. Pharmacognosy, 5th Edn. , Cambridge University Press, London, 336-93. Int. J. Curr. Microbiol. App. Sci (2013) 2(2):15-19 Karthic, K. , K. S. Kirthiram, S. Sadasivam, and Thayumanavan, B. 2008. Identification of amylase inhibitors from Syzygium cumini Linn seeds. Indian J. Exp. Biol. 6:677- 680. Krishnaveni,S. , B.Theymoli, and Sadasivam,S. 1984. Food Chem. 15: 229. Malik,C. P. , and Singh, M. B. 1980. Plant Enzymology and Histoenzymology, Kalyani Publishers, New Delhi, p. 278. Rajiv Gandhi, G. , and Sasikumar, P. 2012. Antidiabetic effect of Merremia emarginata Burm. F. in Streptozotocin induced diabetic rats. Asian. Paci. J. Tropi. Biomedicine. 2: 281-286. Rhabaso Lhoret, R. , and Chiasson, J. L. , 2004. Glucosidase inhibitors. In: Defronzo R. A, Ferrannini E, Keen H, Zimmet P. (Eds. ), International Textbook of Di abetes Mellitus, Vol. 1, third ed. John Wiley and Sons Ltd. , UK, pp. 901-914. Ross, I. A. 1999. Medicinal Plants of the World, Chemical constituents, traditional and modern medicinal uses. Human Press Inc. , Totowa, NJ. 263-272. Shai, L. J. , P. Masoko, M. PMokgotho, S. R. Magano, M. A. Mogale, N. Boaduo, and Eloff, J. N. 2010. South African J. Bot. 76: 465 470. Syamsudin,S. , 2010. Standardization of extract of Leucaena leucocephala (lmk) De Wit seeds by -glucosidase inhibitor. Int. J. Phytomedicine. 2. 430-435. Wild, S. , G. Roglic, A. Green, R. Sicree, and King, H. 2004. Global prevalence of Diabetes estimates for the year 2000 and projections for 2030. Diabetes care. 27:1047-1053. 19 Guava fruit Essay Example Guava fruit Essay The intestinal digestive enzymes alpha-glucosidase and alpha-amylase are plays a vital role in the carbohydrate digestion. One antidiabetic therapeutic approach reduces the post prandial glucose level in blood by the inhibition of alpha-glucosidase and alpha-amylase enzymes. These can be an important strategy in management of blood glucose. The aim of the present study was to investigate the phytochemical bioactive compounds of the methanolic extract of Psidium guajava leaves, its in vitro anti-diabetic activity.The assay results suggests that the presence of bioactive compounds, could be responsible for the versatile medicinal properties of this plant including diabetes, the extract exhibit the dose-dependent increase in inhibitory effect on alpha-glucosidase enzyme (upto 89. 4%), and alpha-amylase enzyme (upto 96. 3%). The current study proves that the antidiabetic activity of methanolic extract of Psidium guajava leaves by in vitro studies. * Keywords Psidium guajava; Phytochemica l; alphaglucosidase; alpha-amylase Introduction Diabetes mellitus is a complex and a diverse group of disorders that disturbs he metabolism of carbohydrate, fat and protein. The number of diabetes mellitus cases has been increasing worldwide in recent years. In 2000, the world health organization estimated a total of 171 million of people with diabetes mellitus from the global population, and this report projected to increase to 366 million by 2030 (Wild et al. , 2004). With a long course and serious complications often resulting in high deathrate, the treatment of diabetes spent vast amount of resources including medicines, diets, physical training and so on in all countries.Thus searching for a new class of compounds is essential to overcome diabetic problems. There is continuous search for alternative drugs (Syamsudin, 2010). 15 Int. J. Curr. Microbiol. App. Sci (2013) 2(2):15-19 Psidium guajava Linn. (Myrtaceae) is commonly known as Peru or Guava in English. The Psidium guajava leaves are used in the treatment of diarrhoea, cough, stomachache, dysentery and decoction of the leaves for cholera patients, toothache and gum boils. The leaves showed hypoglycemic, cardioprotective, myocardial depressant, antimicrobial, antispasmodic actions (Ross, 1999).Inhibition of alphaamylase and alpha-glucosidase enzymes can be an important strategy in management of post prandial blood glucose level in type 2 diabetes patient (Ali et al. , 2006). Thus, objective of the present study is to investigate the phyto chemical, invitro antidiabetic activity of methanolic extract of Psidium guajava leaves. reducing sugar, tannins, flavonoids, steroids and alkaloids by using standard phytochemical procedures (Evans, W. C and Evans, T. 2003). In vitro methods employed in antidiabetic studies Inhibition of alpha-amylase enzyme A starch solution (0. 1% w/v) was obtained by stirring 0. g of potato starch in 100 ml of 16 mM of sodium acetate buffer. The enzyme solution was prepared by mix ing 27. 5 mg of alpha-amylase in 100 ml of distilled water. The colorimetric reagent is prepared by mixing sodium potassium tartarate solution and 3, 5 di nitro salicylic acid solution 96 mM. Both control and plant extracts were added with starch solution and left to react with alpha- amylase solution under alkaline conditions at 25? C. The reaction was measured over 3 minutes. The generation of maltose was quantified by the reduction of 3, 5 dinitro salicylic acid to 3amino-5- nitro salicylic acid.This reaction is detectable at 540 nm (Malik and Singh, 1980). Materials and Methods Plant material and extraction The fresh leaves of Psidium guajava were collected locally and authenticated by the department of Botany, St. Joseph College, Trichy. The shade dried Psidium guajava leaves were powdered mechanically and stored in an air tight container. The extraction was carried out by hot percolation method using Soxhlet apparatus. The solvent used was methanol. About 100 gm of powder was extracted with 600 ml of methanol. The extract was concentrated to dryness under controlled temperature 4050Â °C.The percentage yield was found to be 10. 15%. The extract was preserved in refrigerator till further use. Phytochemical Screening For preliminary phytochemical analysis the freshly prepared crude methanolic extracts of leaves were tested for the presence or absence of phytoconstituents such as 16 Inhibition of alpha-glucosidase enzyme The inhibitory activity was determined by incubating a solution of starch substrate (2 % w/v maltose or sucrose) 1 ml with 0. 2 M Tris buffer pH 8. 0 and various concentration of plant extract for 5 min at 37Â °C.The reaction was initiated by adding 1 ml of alpha-glucosidase enzyme (1U/ml) to it followed by incubation for 40 min at 35Â °C. Then the reaction was terminated by the addition of 2 ml of 6N HCl. Then the intensity of the colour was measured at 540nm (Krishnaveni et al. , 1984). Int. J. Curr. Microbiol. App. Sci (2013) 2(2):15-1 9 Calculation of 50% Inhibitory Concentration (IC50) The concentration of the plant extracts required to scavenge 50% of the radicals (IC50) was calculated by using the percentage scavenging activities at five different concentrations of the extract.Percentage inhibition (I %) was calculated by I % = (Ac-As)/Ac X 100, (Shai et al. , 2010). where Ac is the absorbance of the control and As is the absorbance of the sample. Table 1 Phytochemical analysis of methanolic extract of Psidium guajava leaves S. No. Phytochemical Constituents Name of the Test Mayer s test Dragondraff test Wagner Test Molish Test Fehling Test Benedicts Test Lead Acetate Ferric chloride. Ammonia Salkowaski H2So4 Liebermann s Burchard Test H2So4 Ammonia Shinoda s Test Ferric chloride Sodium chloride Borntrager s test Methanolic Extract + + + + + + + Condensed Tannin + + + + + _ Alkaloids 2 3 4 5 6 Carbohydrates Tannins Pseudo tannins Chlorogenic acid Steroidal Glycosides Anthocyanin Steroidal Glycosides Saponins g lycosides Flavonoids Flavones Phenols Coumarin Phytochemical constituents Results The preliminary phytochemical screening tests for the methanol extract of Psidium guajava leaves (Table 1) revealed the presence of carbohydrates, alkaloids, flavones, tannins, steroidal glycosides, phenols and coumarin. Any of these secondary metabolites, singly or in combination with others could be responsible for the anti-diabetic activity of the plant.There was a dose-dependent increase in percentage inhibitory activity against alphaamylase enzyme. At a concentration of 0. 2 ml of plant extract showed a percentage inhibition 27. 8% and for 1. 0 ml plant extract showed inhibition of 96. 3% (Table 2). The Psidium guajava methanol extract revealed a significant inhibitory action of alpha-glucosidase enzyme. The percentage inhibition at 0. 2-1. 0 ml concentrations of Psidium guajava extract showed a dose dependent increase in percentage inhibition. The percentage inhibition varied from 89. 4% 31. 7% for highest concentration to the lowest oncentration (Table 3). 7 8 9 10 11 12 13 14 +++= High; + = Present; ++ = Moderate; = Absent Table. 2 In vitro antidiabetic activity of alpha-amylase method S. No 1 2 3 4 5 Concentration of Sample (ml) 0. 2 0. 4 0. 6 0. 8 1. 0 % of Inhibition 27. 8 48. 9 62. 5 87. 2 96. 3 17 Int. J. Curr. Microbiol. App. Sci (2013) 2(2):15-19 Table 3 In vitro antidiabetic activity of alpha glucosidase method S. No 1 2 3 4 5 Concentration of Sample (ml) 0. 2 0. 4 0. 6 0. 8 1. 0 % Of Inhibition 31. 7 53. 9 68. 2 76. 5 89. 4 Discussion Diabetes mellitus is a metabolic disorder with increasing incidence throughout the world.Insulin is a key player in the control of glucose homeostasis. Lack of insulin affects carbohydrate, fat and protein metabolism (Rajiv Gandhi and Sasikumar, 2012). Management of diabetes without side effects is still challenge to the medical community. It was proposed that inhibition of the activity of such alpha-amylase and alpha-glucosidase would delay the degradation of carbohydrate, which would in turn cause a decrease in the absorption of glucose, as a result the reduction of postprandial blood glucose level elevation (Rhabaso Lhoret and Chiasson, 2004).In the present study, research has been carried out to evaluate the preliminary phytochemical investigation and the potential of methanol extract of Psidium guajava leaf in inhibiting alpha-glucosidase and alpha-amylase. The present finding of Phytochemical screening of the plant extract confirmed the presence of several bioactive compounds like alkaloids, flavones, tannins and phenols which could be responsible for the versatile medicinal properties of this plant. The present finding reveals that Psidium guajava efficiently inhibits both alpha18 mylase and alpha-glucosidase enzymes in vitro in a dose dependent manner. The aqueous extracts from Syzygium cumini seeds and Psidium guajava leaves both showed a dose dependent inhibitory effect on alpha-amylase activity (K arthic et al. , 2008). The antidiabetic action of Psidium guajava can also be attributed to the intestinal alpha-amylase and alphaglucosidase inhibitory activity. Further studies are required to elucidate whether Psidium guajava have antidiabetic potential by in vivo for validating the traditional claim of the plant.In this present study we evaluated in vitro alpha amylase and alpha glucosidase activity of crude methanol extract of Psidium guajava leaves. The plant showed significant inhibition activity, so further the compound isolation, purification and characterization which is responsible for inhibiting activity, has to be done for the usage of antidiabetic agent. Acknowledgement The authors are grateful to Dr. P. Selvaraj, Chairman, Shivani Group of Institutions, Trichy, whose spacious heart cheered our efforts to process this venture properly, successfully to complete the task.Also we extend our thanks to The Secretary, The Principal and The Staff members of the SSK Polytechni c College, Trichy, Tamilnadu, India. References Ali, H. , P. J. Houghton, and Soumyanath, A. 2006. J. Ethnopharmacol. 107: 449-455. Evans, W. C. , and Evans, T. 2003. Pharmacognosy, 5th Edn. , Cambridge University Press, London, 336-93. Int. J. Curr. Microbiol. App. Sci (2013) 2(2):15-19 Karthic, K. , K. S. Kirthiram, S. Sadasivam, and Thayumanavan, B. 2008. Identification of amylase inhibitors from Syzygium cumini Linn seeds. Indian J. Exp. Biol. 6:677- 680. Krishnaveni,S. , B.Theymoli, and Sadasivam,S. 1984. Food Chem. 15: 229. Malik,C. P. , and Singh, M. B. 1980. Plant Enzymology and Histoenzymology, Kalyani Publishers, New Delhi, p. 278. Rajiv Gandhi, G. , and Sasikumar, P. 2012. Antidiabetic effect of Merremia emarginata Burm. F. in Streptozotocin induced diabetic rats. Asian. Paci. J. Tropi. Biomedicine. 2: 281-286. Rhabaso Lhoret, R. , and Chiasson, J. L. , 2004. Glucosidase inhibitors. In: Defronzo R. A, Ferrannini E, Keen H, Zimmet P. (Eds. ), International Textbook of Di abetes Mellitus, Vol. 1, third ed. John Wiley and Sons Ltd. , UK, pp. 901-914. Ross, I. A. 1999. Medicinal Plants of the World, Chemical constituents, traditional and modern medicinal uses. Human Press Inc. , Totowa, NJ. 263-272. Shai, L. J. , P. Masoko, M. PMokgotho, S. R. Magano, M. A. Mogale, N. Boaduo, and Eloff, J. N. 2010. South African J. Bot. 76: 465 470. Syamsudin,S. , 2010. Standardization of extract of Leucaena leucocephala (lmk) De Wit seeds by -glucosidase inhibitor. Int. J. Phytomedicine. 2. 430-435. Wild, S. , G. Roglic, A. Green, R. Sicree, and King, H. 2004. Global prevalence of Diabetes estimates for the year 2000 and projections for 2030. Diabetes care. 27:1047-1053. 19

Sunday, November 24, 2019

The History of the Electric Telegraph and Telegraphy

The History of the Electric Telegraph and Telegraphy The electric telegraph is a now outdated communication system that transmitted electric signals over wires from location to location and then translated into a message. The non-electric telegraph was invented by Claude Chappe in 1794. His system was visual and used semaphore, a flag-based alphabet, and depended on a line of sight for communication. The optical telegraph was later replaced by the electric telegraph, which is the focus of this article. In 1809, a crude telegraph was invented in Bavaria by Samuel Soemmering. He used 35 wires with gold electrodes in water.  At the receiving end,  the message was read 2,000 feet away  by the amount of gas produced by electrolysis. In 1828, the first telegraph in the USA was invented by Harrison Dyar, who sent electrical sparks through chemically treated paper tape to burn dots and dashes. Electromagnet In 1825, British inventor William Sturgeon (1783-1850) introduced an invention that laid the foundation  for a large scale revolution in electronic communications: the electromagnet. Sturgeon demonstrated the power of the electromagnet by lifting nine pounds with a seven-ounce piece of iron wrapped with wires through which the current of a single cell battery was sent. However, the true power of the electromagnet comes from its role in the creation of countless inventions to come. The Emergence of Telegraph Systems In 1830, an American named  Joseph Henry (1797-1878) demonstrated the potential of William Sturgeons electromagnet for long distance communication by sending an electronic current over one mile of wire to activate an electromagnet, causing a bell to strike. In 1837, British physicists  William Cooke and Charles Wheatstone patented the Cooke and Wheatstone telegraph using the same principle of electromagnetism. However, it was Samuel Morse (1791-1872) who successfully exploited the electromagnet and bettered Henrys invention. Morse started by making sketches of a magnetized magnet based on Henrys work. Eventually, he invented a telegraph system that was a practical and commercial success. Samuel Morse While teaching arts and design at New York University in 1835, Morse proved that signals could be transmitted by wire. He used pulses of current to deflect an electromagnet, which moved a marker to produce written codes on a strip of paper. This  led to the invention of Morse Code. The following year, the device was modified to emboss the paper with dots and dashes. He gave a public demonstration in 1838, but it wasnt until five years later that Congress, reflecting public apathy, awarded him  $30,000 to construct an experimental telegraph line from Washington to Baltimore, a distance of 40 miles. Six years later, members of Congress witnessed the transmission of messages over part of the telegraph line. Before the line had reached Baltimore, the Whig party held its national convention there  and nominated Henry Clay  on  May 1, 1844. The news was hand-carried to Annapolis Junction, between Washington and Baltimore, where Morses partner Alfred Vail wired it to the capitol. This was the first news dispatched by electric telegraph. What Hath God Wrought? The message  What hath God wrought? sent by Morse Code from the old Supreme Court chamber in the United States capitol to his partner in Baltimore officially opened the completed line on May 24, 1844. Morse allowed Annie Ellsworth, the young daughter of a friend, to choose the words of the message and she selected a verse from Numbers XXIII, 23: What hath God wrought? to be recorded onto paper tape. Morses early system produced a paper copy with raised dots and dashes, which were translated later by an operator. The Telegraph Spreads Samuel Morse and his associates obtained private funds to extend their line to Philadelphia and New York. Small telegraph companies, meanwhile began functioning in the East, South, and Midwest. Dispatching trains by telegraph started in 1851, the same year Western Union began business. Western Union built its first transcontinental telegraph line in 1861, mainly along railroad rights-of-way. In 1881, the Postal Telegraph System entered the field for economic reasons and later merged with Western Union in 1943. The original Morse telegraph printed code on tape. However, in the United States, the operation developed into a process in which messages were sent by key and received by ear. A trained Morse operator could transmit 40 to 50 words per minute. Automatic transmission, introduced in 1914, handled more than twice that number. In 1900, Canadian Fredrick Creed invented the Creed Telegraph System,  a way to convert Morse code to text. Multiplex Telegraph, Teleprinters, Other Advancements In 1913, Western Union developed multiplexing, which made it possible to transmit eight messages simultaneously over a single wire (four in each direction). Teleprinter machines came into use around  1925 and in 1936 Varioplex was introduced. This enabled a single wire to carry 72 transmissions at the same time (36 in each direction). Two years later, Western Union introduced the first of its automatic facsimile devices. In 1959, Western Union inaugurated TELEX, which enabled subscribers to the teleprinter service to dial each other directly. Telephone Rivals the Telegraph Until 1877, all rapid long-distance communication depended upon the telegraph. That year, a rival technology developed that would again change the face of communication:  the telephone. By 1879, patent litigation between Western Union and the infant telephone system  ended in an agreement that largely separated the two services. While Samuel Morse is best known as the inventor of the telegraph, he is also esteemed for his contributions to American portraiture. His painting is characterized by delicate technique and vigorous honesty and insight into the character of his subjects.

Thursday, November 21, 2019

Dental Office Network Systems Case Study Example | Topics and Well Written Essays - 750 words

Dental Office Network Systems - Case Study Example Despite the robustness of the proposed network, the report will details its risks along with its benefits. Network Requirements The entire organization, which has five offices, must connect to a central repository where all data will be stored. Because of this reason, proposed network must have a server to store all files for the five offices. In addition, the need for a fast and reliable network calls for a fast network connection that supports high throughput such as T1 lines. In the new organization, four dentists are mobile, which calls for a provision of remote connectivity such as VPN along with switching services using routers and layer three switches. With the network responsible for securing patient’s data as per HIPPA laws, the network must allow data encryption and authentication of users who access the network. Safety of Information Safety of patient’s data is an paramount goal the proposed network must address effectively. Since the organization will be dea ling with crucial information about patients, all information about patients including admission and treatment records be safe and secure. This will be possible if the files server will encrypt data using encryption such as EAS. Moreover, the network must protect data during transmission using encryption techniques and technologies such as VPN. Among the five offices, the network must allow senders and recipients of data to authenticate before transmission of data. The VPN technologies will mobile workers to connect to the central file server securely without compromising on safety of data (Baldauf & Stair, 2011). The network must also have a firewall and intrusion detection system to prevent any unauthorized access to the organization’s data. Users will also need to authenticate their devices before using the network especially wireless access points due to security concerns. Network Type, Components, Devices, and Equipment for the Network A metropolitan network (MAN) system is the best network type that will match the requirement of the new organization. A MAN network has the capacity to span several cities and capable of delivering high bandwidth connections using existing telecommunication lines (Morley & Parker, 2009). The proposed network will have several components to link the five offices and the remote workers. Consequently, the proposed network will have five routers connected with serial cables in a mesh topology. These routers connect to layer three switches to enable packet switching and separation of departments using VLANS. The switches must have at least enough number of ports and support security protocols such as IPSEC. For remote workers, each will have a laptop and a VPN enabled dongle that will allow them establish a secure connection to the central database. With security being a vital issue, devices such as firewalls and backups devices must be located within the network to improve security and recovery process. Most important, t he network must have a network server that will store all data and identifiable using a static IP address and a secondary backup in the cloud to provide continuity during an outage. The servers must have power backup and standby power generators not to mention hot swap features to avoid taking the server offline during service. Network Design Diagram The network diagram for the proposed netw

Wednesday, November 20, 2019

European Integration Essay Example | Topics and Well Written Essays - 2250 words - 3

European Integration - Essay Example It was through this European Integration Roundtable of Industrialists is that the transnational corporations tried to influence the European integration process, the nineteen eighties. It was this ERT forum from where a number of industrialists of Europe helped in the forming of agenda and the re-launching of the single market program. This also led to the development of transnational elite capitalists you brought in a number of neo-liberal concepts and ideas which eventually helped the formation of a single market program. Adriaan H. Dierx(2004, p. 237) states ‘The process of European integration and the past decade has been closely associated with the single market program (now evolved into the internal market strategy) and economic and monetary union. This process has been pushed forward by highly publicized deadlines and target dates giving the first impression of abrupt change in the economic environment. In practice, however, businesses and consumers tend to anticipate such change and modify their behavior even before the formal change is made. On the other hand, often the full impact of the economic reform is felt only years after their introduction. This implies that European integration as a continuous process, one in which the speed of progress may be affected by policy initiatives such as the SMP and the EMU and which takes place in conjunction with other events influencing the behavior of economic agents and the performances of the economy, such as globalization or the ICT revolution.à ¢â‚¬â„¢ The ERT can be viewed as an elite comprising of trans-national capitalists who have neoliberal concepts and who occasionally takes part in the social struggle for dominance in the European culture. Europe is not is becoming a part of the global economy, politically and financially. Therefore the businesses in Europe are transforming to globalized and transnationalised businesses. There are basically three large economic blocks in the world:  USA, Japan, and Europe.  

Monday, November 18, 2019

Substance abuse in teenager Scholarship Essay Example | Topics and Well Written Essays - 1500 words

Substance abuse in teenager - Scholarship Essay Example It has been seen that there are 2.5 million deaths each year due to alcohol consumption. There are a lot of people between the age group of 15 and 29 who are dying from ‘alcohol- related causes† and disorders due to intake of drugs is found in 15.3 million people (Substance Abuse, 2011). When the use of drugs goes beyond the realm of experiment into a â€Å"problematic involvement† then it is specified under different classification system. Diagnostic and Statistical Manual of Mental Disorders (DSM- IV), fourth edition is a one such primary system which has mentioned the major indicators of substance abuse. It includes â€Å"role impairment, physically hazardous use, recurrent substance related legal problems and drug related social and interpersonal difficulties (Mash & Barkley, 2009, pp.185). Substance abuse has now become very common in case of teenagers in United States and this necessitates proper treatment programs and preventive measures. Substance abuse is a phenomenon which has become very common among different sections of the population especially the teenagers or adolescence. Adolescence period is a very crucial time in a child’s life because it a time when changes are observed on â€Å"biological, cognitive and social levels.† They come across new scenarios in their lives and often many are involved in substance abuse. Teenagers often resort to drugs and alcohol as they think them to be the mediums to become stress free. At times in their quest to â€Å"fit in with peers† or in trying to model the behavior of some family member they take the help of drugs and alcohol (Berman, 1995). The use of alcohol and drugs among the teenagers has increased over the years across the world. In United States, the studies have shown that more than half of the students in 12th grade had consumed illicit drug. Almost 76.8% students had consumed alcohol. A number of students in the 8th grade were also found to have taken drugs and alcohol. Drug use does not

Friday, November 15, 2019

Effect of Free Trade on a Countrys Economy

Effect of Free Trade on a Countrys Economy Table of contents 1.0 Introduction 2.0 Free trade does add wealth to the economy 2.1 Analysis 2.1.1 Advantages 2.1.2 Disadvantages 2.2 Evaluation 3.0 Conclusion 4.0 Recommendation 4.1 Greater Competitiveness 4.1.1 Cannot ignore trade protection policy 4.1.2 Adverse Working Conditions 5.0 Appendix 6.0 Reference 1.0 Introduction This report aimed to discuss the effect of free trade for the country’s economy, so free trade is a system in which goods, capital, and work flow freely between nations, without barriers which could delay the trade process. Actually, many nations have free trade agreements, and some international organization promotes free trade between their members. Because of free trade provide lower prices for goods and services by promoting. However, there are a number of quarrels both for and against this practice, from a variety of economists, politicians, industries, and social scientists. According to Tom Chmielewski (2014), a lot of economists approve NAFTA has caused some general enhancement in US jobs, but with bad effects. Free trade can cause disorder in parts of a national economy, for instance long-established industrial slices already in a weak position to global competition. Besides that according to Edward Alden, a researcher at CFR, wages have not kept pace with output of w ork, and income unfairness, and these phenomena indicate that trends speeded to some range of free trade. Due to this information, this report will research the relationship between free trade and economy, and find out the economic impact of the free trade. 2.0 Free trade does add wealth to the economy Free trade promotes innovation and competition. Free trade is a kind of really fair trade because it offers customers the most choices and the best chances to improve the standard of living. Free trade fosters competition, spurring companies to introduce and develop better products and to take more of their goods and services to market, keeping costs low and quality high in order to retain or increase their market share. By fostering opportunities for the country businesses, free trade rewards risk taking by increasing gross revenue, profit margins, and market share. The companies can opt to build on those profits by spreading out their operations, putting down new market sectors, and creating better paying occupations. Free trade, reinforced by the dominion of law, removes such incentives for corruption by spurring economic growth, increasing the number of better paying jobs, and finally increasing the level of prosperity. Free trade policies can also attract Higher Foreign Investme nts, free markets encourage more investment in the land. Foreign directed investment goes to where capital is needed, improving productivity and driving increase in many nations. However, for the economic, nowadays the most important feature is economic globalization. Economic globalization can be determined as the procedure by which markets and output in different nations are becoming increasingly interdependent due to the Dynamics of trade in goods and services and flows of capital and technology. The acceleration of free trade can bring down the tariffs and eliminate discriminatory treatment in international trade. Developing countries open up many types of free economic zones in ports and traffic areas in order to build up the economy and promote its exports. For example Shanghai free trade zone, NAFTA. 2.1 Analysis From a worldwide perspective, free trade certainly increases the overall amount of wealth in the economy. By getting rid of barriers to trade, governments encourage members of the economy system to specify in performing whatever they perform best and then trading to fulfill their desires and demands. When trade is efficient, a firm can concentrate its production ability completely on the country in which it holds a relative advantage. Free trade can put manufacturing nations such as the United States at a disadvantage relative to less developed countries. Businesses in the United States are heavily limited by health, confinement, and environmental rules. This often makes production in less developed nations less expensive than production in the US. There is no doubt that everything has two positions. For these problems, I have done some research to obtain a figure of advantages and disadvantages: 2.1.1 Advantages 1. Internal influences: a. Customer Satisfaction Because free trade leads to a global marketplaces, customers benefit from the competition and diversity brought to the marketplaces. When other countries produce some goods cheaper, the customers will want to choose the others products. Another advantages to customers is increased improvements. For a free trade expands, at the same time, the competition also expands. In order to keep competitive, companies must find a lot of ways to create the relative benefit. So this contributes to increased improvement that improves products. b. Regional economic growth and employment Due to free trade may cause employees in any special area that make them feel strangeness, but works in the exporting and importing sides will be improved by them. When productivity increases in importing and exporting, salaries also incline to rise. c. Foreign Exchange Gains and Decreased Poverty When a country purchases some products from another country use money, they basically send the exporting country non-interest-bearing IOUs in exchange for real items. So the exporting country must utilize the money within the state that imported the products. For instance, the United States purchases steel from China use US dollar at the current market value. In addition, after they purchase items that China will also utilize the US dollar to purchase computer systems from the United States at the future market value. In a word, States that open their trade environment to permit free trade have the chance to enter the worldwide securities industry, which will increase income for the country. In the 1990s, developing countries that lifted trade restrictions tended to raise three times faster than countries that restricted trade. 2. External influences: During the international direction of value principle, free trade can excite international competition and boost the development. Free trade also has promoted the international division of labor and the development of trade. And increasing the international market is one of the advantages. Besides that it makes some countries which have the advantage of investment environments easy to grip foreign capital. For example, In 2004 China began to reduce tariffs for more than 500 kinds of products. An agriculture company harvested trade reached $ 1,020,000, increasing 38%. Its growth is higher than 2003. Vegetable exported $ 450,000, an increase of 31.8%, fruits $ 230,000, an increase of 25.4%, aquatic $ 180,000, an increase of 59.1%. Since the adoption of free trade, corporate profits and employee income growth. 2.1.2 Disadvantages 1. Economic Dependence Free trade increases the economic dependence on other countries for some necessary products such as food, clothes, raw materials, etc. So dependence shows harmful, mostly during wartime. 2. International Monopolies: Free trade may lead to international monopolies. It promotes the formation of transnational corporations. These corporations tend to gain a monopoly situation and therefore harm the interest of the citizenry. 3. Harmful to Less Developed Countries: a. Competition under free trade sometimes is unfair. Because the fewer developed countries are very difficult to get advances on the developing countries. b. Under free trade, gains of trade are unfair distributed relying on the level of development of different nations. The relationship of trade are friendly for the developed countries, and unfavorable for the poor countries. For example: Free trade policy accepted by the British government in India led to the end of Indian cottage and small scale manufactures. 2.2 Evaluation From the above, it can be seen that free trade is a kind of â€Å"more good than harm† economic ways. Free trade is intended to cancel unfair barriers to global business and promote the economy system in developed and developing countries the same and significantly alters the business relationship between nations, many of the changes are beneficial. These advantages can positively stimulate economies. 3.0 Conclusion Free trade is all important to a developing economy. It opens up huge markets. Resources flow to where they are the most rich. Productivity is enlarged, and more competition equally to lower prices. In addition, higher savings are a consequence, and the poor and all others have larger income, and thus the economy turns. Investment can be blown up with growing revenues and competition. However, for low income economies such as Vietnam have a huge bonus, higher needs for works equally to higher salaries and employment. In total, it improves the salaries of employees, improves employment and economy, and creates peace. 4.0 Recommendation Developing countries should pay attention to the impact of free trade: 4.1 Greater Competitiveness Free trade means that national economies are exposed to higher market competition, which local firms must learn to adjust to. 4.1.1 Cannot ignore trade protection policy Developing countries cannot give up economic intervention due to trade liberalization. Moderate free protection policy can let developing countries obtain better effects in some infant industry 4.1.2 Adverse Working Conditions For weak countries try to cut costs to get a price advantage, many workers in these countries have low wages, deficient working conditions and even forced labor and use child labor and insulting them. 5.0 Appendix Appendix 1: The major world trading powers Source: http://europa.eu/pol/pdf/flipbook/en/trade_en.pdf. Appendix 2: The EU’s biggest trade partners: goods Trade and investment flow spread new ideas and innovation, Benefits for the trade include lower prices and greater choice for consumers, as imported food, consumer goods and components for products manufactured in Europe become cheaper 6.0 Reference http://www.investopedia.com/terms/f/free-trade.asp http://smallbusiness.chron.com/negative-effects-trade-5221.html http://economyincrisis.org/content/managing-foreign-trade-does-trade-create-wealth-nation http://www.forbes.com/sites/realspin/2012/11/15/in-an-increasingly-globalized-economy-free-trade-is-more-important-than-ever/ http://smallbusiness.chron.com/explanation-trade-advantages-3843.html http://smallbusiness.chron.com/negative-effects-trade-5221.html http://www.theaustralian.com.au/higher-education/free-trade-in-ideas-will-generate-wealth-for-all/story-e6frgcjx-1226062159428 http://www.ehow.com/list_6733682_effects-trade-developing-nations.html Level 1 Asia Pacific University 1

Wednesday, November 13, 2019

Management and Leadership Essay -- GCSE Business Marketing Coursework

Management and Leadership What is leadership? Leadership is having the ability to give guidance to those that will follow. Those that follow will help to complete the mission. Leadership is a soft science, just as anthropology, sociology and psychology. It cannot be proven exactly what it is. Leadership is an art, the skillful application of leadership behaviors beyond techniques is much the same as the skillful application of brushstrokes by a master painter. Leadership is both rational and emotional. It involves both sides of human experience. It includes actions and influences based on reason and logic as well those based on inspiration and passion. Leadership is a social process shared among all members of a group. Leadership development comes through experience. We all learn from our different experiences. Whether positive or negative, they are our tools for growth and development. What is management? Management is a position of authority. Management says what need to get done and supplies the material to get it done. Management tends to be the more educated than the experienced. Managers can be trained to hold a position. Management is a position of leadership. Can leadership and management be the same? Leadership and management are not the same. Anyone can be a manager and not have any followers. Being able to manage is knowing the aspects of a mission. A leader knows the aspects, has the knowledge and the skills to accomplish the mission. But leadership and management work hand in hand with each other. The management sets the stage and the leadership makes it happen. Leadership is a human relationship process. No scientific method can be used for testing leadership. Leadership is based on human factors and no two humans are the same. Managers are not only interested in status quo, but also production, expansion and growth. Management was a system to control machines. Leadership can never be controlled. Where one sits in life determines what you see. To be a good manager one must look at views from different perspectives. As situations change, leadership relations change. Leadership cannot be transactional. It can only work if both parties keep their agreements. A class survey was held to compare leaders to managers. The overall opinion was that they are similar in many ways. A leader and a manager can be one in the same. The difference be... ...ent opinions. Many studies have been done and know one still knows what makes a true leader. We are far from finding conclusive answers to them. Even those individuals with extensive knowledge of leadership research may be poor leaders. Leadership does not occur without followers, and followership is an easily neglected component of the leadership process. Leadership is everyone business and everyone responsibility. Thinking about leadership can help a person become a better leader than you are right now. In conclusion, my opinion is as follows. The leadership process is a total learning process. We all are leaders in our own way at different times in our lives. For example a father or mother with children, their children look to them for guidance. They also learn their values and about their culture through them. That is having leadership abilities. Friends look to each other for advice and different experiences that each of them have done. Some people perform leadership acts on the daily basis and don ´t even realize it until they think about it or until someone brings it to their attention. That ´s why it ´s said that a part of learning about leadership is to always think about it.

Sunday, November 10, 2019

Stefan’s Diaries: Origins Chapter 25

Excitement coursed through my veins as I stole out of the house, across the dew-dropped lawn, and toward the carriage house. I slid past Emily, who held the door open for me, and bounded up the stairs. I no longer needed the candle to find my way to Katherine. There, in the bedroom, she was wearing her simple cotton nightdress and absentmindedly swinging a crystal necklace that sparkled in the moonlight. â€Å"I think Father may be persuaded to call off the siege. At least he's willing to talk. I know I'll be able to change his mind,† I exclaimed, twirling her around the room. I expected her to clap with glee, for her smile to mirror my own. But instead Katherine disengaged herself from my grip and placed the crystal on her nightstand. â€Å"I knew you were the man for the job,† she said, not looking at me. â€Å"Better than Damon?† I asked, unable to resist. Finally Katherine smiled. â€Å"Y need to stop ou comparing yourself to Damon.† She stepped closer to me and grazed my cheek with her lips. I shivered with pleasure as Katherine pulled my body toward hers. I held her tightly, feeling her back through the thin cotton of her nightdress. She kissed my lips, then my jaw, running her lips, feather light, down the curve of my neck. I moaned and pulled her even closer, needing to feel all of her against all of me. Then she plunged her teeth into my neck. I let out a strangled gasp of pain and ecstasy as I felt her teeth inside my skin, felt her draw blood from me. It felt as though a thousand knives were piercing my neck. Still I held her more tightly, wanting to feel her mouth on my skin, wanting to fully submit myself to the pain that fed her. Just as suddenly as she bit me, Katherine broke away, her dark eyes on fire, agony etched on her face. A small stream of blood trickled from the corner of her lip, and her mouth twisted in excruciating pain. â€Å"Vervain,† she gasped, stepping backward until she collapsed on the bed in pain. â€Å"What have you done?† â€Å"Katherine!† I put my hands to her chest, my lips to her mouth, trying desperately to heal her the way she had healed me back in the forest. But she pushed me away, writhing on the bed, clutching her hands to her mouth. It was as if she were being tortured by an unseen hand. Tears of agony spilled from her eyes. â€Å"Why did you do this?† Katherine clutched her throat and closed her eyes, her breath slowing into guttural gasps. Every anguished cry from Katherine felt like a small stake in my own heart. â€Å"I didn't! Father!† I shouted as the dizzying events of that evening occurred to me. My brandy. Father. He knew . There was a clatter from downstairs, and then Father burst in. â€Å"Vampire!† he roared, holding up a crudely made stake. Katherine writhed on the floor in pain, shrieking in a high-pitched tone I'd never heard before. â€Å"Father!† I shouted, holding my hands up as he used his boot to prod Katherine. She moaned, her arms and legs kicking in opposite directions. â€Å"Katherine!† I fell to my knees and held Katherine's body close in my arms. She shrieked, her eyes rolling back so all I could see was white. Foam appeared at the corner of her blood-caked lips, as though she were a rabid animal. I gaped in horror and let go, her body falling to the floor with a sickening thud. I inched back, sitting on my heels and gazing at the ceiling as if in prayer. I couldn't face Katherine, and I couldn't face Father. Katherine let out another high-pitched wail as Father prodded her with his stake. She reared up –foaming at the mouth, her fangs bared, her eyes wild and unseeing–before falling back in a writhing pile. Bile rose in my throat. Who was this monster? â€Å"Get up.† Father dragged me to my feet. â€Å"Don't you see, Stefan? Don't you see her true nature?† I gazed down at Katherine. Her dark curls were matted to her forehead by sweat, her dark eyes were wide and bloodshot, her teeth were covered with foam, and her entire body was shaking. I didn't recognize any part of her. â€Å"Go get Sheriff Forbes. Tell him we have a vampire.† I stood transfixed in horror, unable to take a step in any direction. My head pounded, my thoughts whirled in a confused tangle. I loved Katherine. Loved her. Right? So why now did this †¦ creature disgust me? â€Å"I did not raise my sons to be weak,† Father roared, shoving a bundle of vervain in my shirt pocket. â€Å"Now go!† My breath came in deep rasps. The heat was suddenly stifling, unbearable. I couldn't breathe, couldn't think, couldn't do anything. All I knew was that I couldn't stand being in that room for one second longer. Without a backward glance at my father or at the vampire writhing on the floor, I rushed out of the house, taking the steps three at a time, and raced for the road.

Friday, November 8, 2019

The Tuki Matsuri essays

The Tuki Matsuri essays What in the world could make the population of one city double in just one week, you ask? Well, not only does this unique festival attract so many people but it is one of the few places around the world where warm and cheerful celebrations are taking place, in the beginning of February. The Yuki Matsuri can be found right in the center of Sapporo, Japan. Laughing, playing, drinking, fine dining, and none other than snow and ice sculptures are all part of this festival. These and other traditions light up the faces of those in Japan and also from other cultures around the world. Japanese festivals are a wonderful sight to see, but the Yuki Matsuri exceeds the excellence of most other festivals. Not only does this special snow celebration attract thousands from Japan, but the festival has an accumulative estimate of two million others, annually. This one-of-a-kind event is said to be enjoyed by Japan residents and those flocking to Japan from all around the world. The history of this celebration is a magnificent story. The festival originated in the winter of 1950, when six small snow statues were created by high-school children in Odori-koen, the citys park main park. (The Yuki Matsuri Sapporo tourist info.). Eventually, the idea caught on and, by 1955, the Japanese army, known as the Self Defense Force (SDF), was pitching in to help build the gigantic snow sculptures. (The Yuki Matsuri Sapporo Tourist Info.). The SDF even created a life-size replica of the Taj Mahal. Ever since then, the fiesta has typically been held on the fifth to the eleventh of February every year. It has been a tradition in Japan, but is also starting to lose its status with the Japanese population. After fifty-five years of snow and ice sculptures and other common events taking place at the Yuki Matsuri, the people of Japan claimed they no longer visited the snow festival, and it ha...

Wednesday, November 6, 2019

Coryphodon - Facts and Figures

Coryphodon - Facts and Figures Name: Coryphodon (Greek for peaked tooth); pronounced core-IFF-oh-don Habitat: Swamps of the northern hemisphere Historical Epoch: Early Eocene (55-50 million years ago) Size and Weight: Up to seven feet long and half a ton, depending on species Diet: Plants Distinguishing Characteristics: Squat body; quadrupedal posture; semiaquatic lifestyle; exceptionally small brain About Coryphodon A mere 10 million years after the dinosaurs went extinct, the first giant mammals, the pantodonts, appeared on the planetand among the biggest pantodonts was Coryphodon, the largest species of which only measured about seven feet long from head to tail and weighed half a ton, but still counted as the largest land animals of their day. (Its important to remember that mammals didnt suddenly spring into existence after the K/T Extinction; they existed alongside bigger dinosaurs for most of the Mesozoic Era, but in small, shrew-like form, cowering in the tops of trees or burrowing underground for shelter.) Coryphodon wasnt the first identified pantodont of North America, however; that honor belongs to the slightly smaller Barylambda. Coryphodon and its fellow pantodonts seem to have lived like modern hippopotami, spending a large part of their day in weed-choked swamps and uprooting plants with their powerful necks and heads. Possibly because efficient predators were in short supply during the early Eocene epoch, Coryphodon was a relatively slow, lumbering beast, equipped with an unusually small brain (only a handful of ounces compared to its 1,000-pound bulk) that beckons comparison with those of its sauropod and stegosaur predecessors. Still, this megafauna mammal managed to populate most of North America and Eurasia during its five million years on earth, making it a true success story of the early Cenozoic Era. Because it was so widespread, and left so many fossil specimens, Coryphodon is known by a bewildering array of species and outmoded genus names. Within the last century, it has been synonymized with the would-be pantodonts Bathmodon, Ectacodon, Manteodon, Letalophodon, Loxolophodon and Metalophodon, and various species were described by the famous 19th-century American paleontologists Edward Drinker Cope and Othniel C. Marsh. Even after decades of pruning, there are over a dozen named Coryphodon species; there used to be as many as fifty!

Monday, November 4, 2019

Avoiding System Development Pitfalls in the IT Decision Making Dissertation

Avoiding System Development Pitfalls in the IT Decision Making Processes - Dissertation Example Likewise, a brief observation of these categorized characteristics of various applications, many categories have been projected. Sprague and Watson proposed the performance dimension of the systems can be categorized or can be divided in to four levels i.e. basic data processing systems, integrated data processing systems, management information systems and decision support systems (Hogue, 1985). However, the research and technology for the DSS continue to revolutionize and by 1996, Whinton and Holsapple proposed five particular types of DSS. These specialized DSS types were text-oriented DSS, database-oriented DSS, spread-sheet-oriented DSS, solver-oriented DSS, and rule-oriented DSS (Power,). Moreover, these last four DSS types were again divided into seven categories proposed by Arnott and Pervan (Burstein & Holsapple,). The seven categories are (Burstein & Holsapple,) personal DSS, group support systems, negotiation support systems, intelligent DSS, knowledge management-based DSS , executive information systems/business intelligence, and data warehousing. However, these sub categories overlaps with some of them but they introduced a diverse advancement of past research. Afterwards, these four levels were categorized as transaction processing systems (TPS), Management Information Systems (MIS) and Decision Support Systems (DSS). Information Technology has revolutionized. Business organization dependent on information systems, cater information for decision making. The revolutionized information technology completely modified the business structure and the information required for decision making process. A term called strategic management focuses on building a powerful competitive advantage. It also involves the development of corporate strategy along with the management of the organization according to that strategy (Strategic management.2007). The BRAC university has launched a world class Integrated library system (ILS) (BRAC university launches integrated library system koha dhaka, bangladesh — koha - open source ILS - integrated library system). It is â€Å"an interrelated group of computer programs that automates multiple library operations† (Ebenezer, 2002). The ILS will redefine customer services by advance information technology services that will enhance the process of delivering both electronic information and printed documents. Keeping in mind the long term perspective, the strategic goals for the ILS are constructed as: The infrastructure of the library will be enhanced and well maintained Maximizing the access to the customers for the printed information resources (not digital). Maximizing access to the customer of digital information resources. Establishing strategic affiliation with other libraries locally and globally including schools, colleges and universities. Build learning environments in all accessible locations connected with the library. The strategic goals are to define the library’s strate gic plan and as well as Information technology strategic plan. The current infrastructure has inadequate capacity, size and functionality which are not fulfilling user requirements. Current system has issues related to performance and functionality which is affecting the users. The system cannot be maintained as it needs to be re-designed. The decision for the replacement of the system was made because of