Monday, September 30, 2019
Orsat Gas Analysis
Orsat Gas Analysis Experiment I. Objectives To analyze the dry exhaust gas (DEG) from a combustion system using the Orsat apparatus. II. Apparatus As shown in figure, the Orsat apparatus consists of a water-jacketed 100-m1 burette B connected at its top to a glass manifold M and at its bottom to a leveling bottle L. The glass manifold M is connected to three reagent bulbs called pipettes P1, P2 and P3 via three cocks C1, C2 and C3. Each tube is filed with its own absorbing chemical solution: P1: potassium hydroxide (30 % w/v) to absorb CO2 P2: alkaline pyrogallol to absorb 02 P3: cuprous chloride in hydrochloric acid to absorb CO.Pipettes P1 and P2 are partly filled with glass tubes to increase the contact surface area between liquid and glass. P3 contains copper wire to protect acid against possible oxidation. The 3-way cock C4 is used to connect manifold M to the atmosphere (via suction pump SP), to connect it to the sampler tube or to isolate the trapped gas. III. Procedure a) Pre paratory Steps -Fill the system with water & chemicals as applicable. -By opening one of the cocks C1, C2, C3 at a time and keeping all other cocks close, and manipulating bottle L bring the solution in each pipette to the top mark on the stem of the pipette.Then close the isolating cock. -Now connect the sampler line to suction pump SP by turning the 3-way valve C4. Operate the pump to purge all air from the sampler line. b) Trapping the Gas Sample -By turning the cock C4 connect the glass manifold M to the sampler line. -Lower bottle L slowly until the water level in burette B is slightly below the zero mark on the scale. Then close C4 and disconnect the sampler line. -Slightly lift cock C4 off its seat to equalize the pressure inside burette B with the ambient pressure. Then raise bottle L gently until water level in the burette coincides with the zero mark.This ensures that the burette now contains 100 ml of exhaust gas at atmospheric pressure. c) Absorption of Gas Constituents The following steps should be done for each pipette, one at a time, in the order P1 then P2 then P3. -Open cock C1, and slowly raise bottle L to allow the gas to flow into pipette P1 until water in the pipette reaches the (100)-mark. -Slowly lower bottle L to let gas leave pipette P1 and re-enter burette B until the chemical solution in pipette P1 reaches the top mark on its stem. Close C1. -Bring the levels of water in burette B and bottle L to coincide.Read the scale on burette B to get the volume of CO2 absorbed, measured at atmospheric pressure. -Repeat this procedure a few times until the reading becomes constant which means that all CO2 has been absorbed. Then close cock C1. -For the next pipettes, the volume absorbed is obtained as the difference between the current scale reading and the one just preceding it. IV-a Experiment No. 1: Get acquainted with the apparatus and the procedure by measuring the volume fraction of 02 in atmospheric air. A value of 79% should be obtained. IV-b Experiment No. : Measure the volume fractions of CO2 and 02 in a sample of dry combustion products from the continuous combustion unit in the heat engines laboratory (fired with LPG). V. Requirements 1. Your report about the experiment should be detailed. In particular you should write the combustion equation assuming the fuel composition to be unknown, and representing it by an equivalent hydrocarbon CxHy. Show details of your calculations. 2. Based on the results of the dry exhaust gas analysis, calculate: (a) The atom ratio (y/x) in the fuel formula b) The air/fuel ratio [A/F] (c) The relative air/fuel ratio ? 3. Compare your results under item (2-a) with the volumetric composition of LPG as consisting of 30% propane C3H8 and 70% butane C4H10. v. Observations Ambient Conditions: PA= KPa, TA= OC Zero Reading Ro= ml ââ¬â> Vsample= 100-Ro= CO2 Reading RCO2= ml ââ¬â> VCO2= RCO2-Ro= O2 Reading RO2= ml ââ¬â> VO2= RO2-RCO2= CO Reading RCO= ml ââ¬â> VCO= RCO-RO2= Vo lume of Nitrogen ââ¬â> VN2= 100-RN2=
Sunday, September 29, 2019
Mid-Term Exam Remedial Law
Mid-Term Exam 1. Distinguish Cause of action from action SUGGESTED ANSWER: A CAUSE OF ACTION is an act or omission of one party in violation of the legal right or rights of the other (Maao Sugar Central vs. Barrios, 79 Phil. 606; Sec. 2 of new Rule 2), causing damage to another. An ACTION is an ordinary suit in a court of Justice by which one party prosecutes another for the enforcement or protection of a right, or the prevention or redress of a wrong. (Section 1 of former Rule 2). 2. What is the concept of remedial law? SUGGESTED ANSWER:The concept of Remedial Law lies at the very core of procedural due process, which means a law which hears before it condemns, which proceeds upon inquiry and renders judgment only after trial, and contemplates an opportunity to be heard before judgment is rendered (Albert v. University Publishing, G. R. No. L-19118, January 30, 1965). Remedial Law is that branch of law which prescribes the method of enforcing the rights or obtaining redress for thei r invasion (Bustos v. Lucero, G. R. No. L-2068, October 20, 1948; First Lepanto Ceramics, Inc. v. CA, G. R. No. 110571, March 10, 1994). 3.How shall the Rules of Court be construed? SUGGESTED ANSWER: The Rules of Court should be liberally construed in order to promote their objective of securing a just, speedy and inexpensive disposition of every action and proceeding. (Sec. 6, Rule 1 1997 Rules of Civil Procedure. ) ADDITIONAL ANSWER: However, strict observance of the rules is an imperative necessity when they are considered indispensable to the prevention of needless delays and to the orderly and speedy dispatch of Judicial business. (Alvero vs. Judge de la Rosa, 76 Phil. 428) 4. Distinguish between substantive law and remedial law.SUGGESTED ANSWER: SUBSTANTIVE LAW is that part of the law which creates, defines and regulates rights concerning life, liberty, or property, or the powers of agencies or instrumentalities for the administration of public affairs. This is distinguished f rom REMEDIAL LAW which prescribes the method of enforcing rights or obtaining redress for their invasion (Bustos v. Lucero, G. R. No. L-2068, October 20, 1948). 5. Distinguish jurisdiction from venue? SUGGESTED ANSWER: JURISDICTION treats of the power of the Court to decide a case on the merits, while VENUE refers to the place where the suit may be filed.In criminal actions, however, venue is jurisdictional. Jurisdiction is a matter of substantive law; venue, of procedural law. Jurisdiction may be not be conferred by consent through waiver upon a court, but venue may be waived, except in criminal cases (Nocum et al. v. Tan, G. R. No. 145022, September 23, 2005; Santos III v. Northwest Airlines, G. R. No. 101538, June 23, 1992). 6. Give the effects of the following: 1 Splitting a single cause of action: and 2 Non-joinder of a necessary party. SUGGESTED ANSWER: 1.The effect of splitting a single cause of action is found in the rule as follows: If two or more suits are instituted on th e basis of the same cause of action, the filing of one or a judgment on the merits in any one is available as a ground for the dismissal of the others. (Sec. 4 of Rule 2) 2. The effect of the non-joinder of a necessary party may be stated as follows: The court may order the inclusion of an omitted necessary party if jurisdiction over his person may be obtained. The failure to comply with the order for his inclusion without justifiable cause to a waiver of the claim against such party.The court may proceed with the action but the judgment rendered shall be without prejudice to the rights of each necessary party. (Sec. 9 of Rule 3) 7. Rolando filed a petition for declaration of the nullity of is marriage to Carmela because of the alleged psychological incapacity of the latter. After trial, the court rendered judgment dismissing the petition on the ground that Rolando failed to prove the psychological incapacity of his wife. The judgment having become final, Rolando filed another petit ion, this time on the ground that his marriage to Carmela had been celebrated without a license.Is the second action barred by the judgment in the first? Why? SUGGESTED ANSWER: No, the second action is not barred by the judgment in the first because they are different causes of action. The first is for annulment of marriage on the ground of psychological incapacity under Article 36 of the Family Code, while the second is for declaration of nullity of the marriage in view of the absence of a basic requirement, which is a marriage license. [Arts, 9 & 35(3),Family Code]. They are different causes of action because the evidence required to prove them are not the same. [Pagsisihan v. Court of Appeals, 95 SCRA 540 (1980) and other cases]. . The plaintiff sued the defendant in the RTC for damages allegedly caused by the latterââ¬â¢s encroachment on the plaintiffââ¬â¢s lot. In his answer, the defendant denied the plaintiffââ¬â¢s claim and alleged that it was the plaintiff who in fa ct had encroached on his (defendantââ¬â¢s) land. Accordingly, the defendant counterclaimed against the plaintiff for damages resulting from the alleged encroachment on his lot. The plaintiff filed an ex parte motion for extension of time to answer the defendantââ¬â¢s counterclaim, but the court denied the motion on the ground that it should have been set for hearing.On the defendantââ¬â¢s motion, therefore, the court declared the plaintiff in default on the counterclaim. Was the plaintiff validly declared in default? Why? SUGGESTED ANSWER: No, the plaintiff was not validly declared in default. A motion for extension of time to file an answer may be filed ex parte and need not be set for hearing. [Amante vs. Sunga, 64 SCRA 192 (1975)]. ALTERNATIVE ANSWER: The general rule is that a counterclaim must be answered within ten (10) days from service. (Rule 11, sec. 4). However, a counterclaim that raises issues which are deemed automatically joined by the allegations of the Compl aint need not be answered. Gojo v. Goyala, 35 SCRA 557 (1970)]. In this case, the defendantââ¬â¢s counterclaim is a compulsory counterclaim which arises out or is connected with the transaction and occurrence constituting the subject matter of the plaintiffââ¬â¢s claim. It raises the same issue of who encroached on whose land. Hence, there was no need to answer the counterclaim. 9. The plaintiff sued the defendant in the RTC to collect on a promissory note, the terms of which were stated in the complaint and a photocopy attached to the complaint as an annex.Before answering, the defendant filed a motion for an order directing the plaintiff to produce the original of the note so that the defendant could inspect it and verify his signature and the handwritten entries of the dates and amounts. 1 Should the judge grant the defendantââ¬â¢s motion for production and inspection of the original of the promissory note? Why? 2 Assuming that an order for production and inspection was issued but the plaintiff failed to comply with it, how should the defendant plead to the alleged execution of the note? SUGGESTED ANSWER: 1) Yes, because upon motion of any party showing good cause, the court in which the action is pending may order any party to produce and permit the inspection of designated documents. (Rule 27). The defendant has the right to inspect and verify the original of the promissory note so that he could intelligently prepare his answer. (2) The defendant is not required to deny under oath the genuineness and due execution of the promissory note, because of the non-compliance by the plaintiff with the order for production and inspection of the original thereof. (Rule 8, sec. 8). ALTERNATIVE ANSWER: 2) The defendant may file a motion to dismiss the complaint because of the refusal of the plaintiff to obey the order of the court for the production and inspection of the promissory note. [Rule 29 Sec. 3(c)]. 10. What is forum shopping? SUGGESTED ANSWER: Forum shopping is the act of a party which consists of filing multiple suits, simultaneously or successively, for the purpose of obtaining a favorable judgment (Leyson v. Office of the Ombudsman, G. R. No. 134990, April 27, 2000; Yulienco v. CA, G. R. No. 131692, June 10,1999; Chemphil Export & Import Corp. v. CA, G. R. Nos. 112438-39, December 12, 1995).
Saturday, September 28, 2019
Narrow Identities and Violence
Personal identity of individual includes many feature of the individual such as race, religion, profession, personal interests, ethnicity, and language among other attributes. Yet all over the world we see individuals and groups defining themselves in narrow and exclusive terms. We take the view that, in day to day life, the different aspects of personality remain latent. Social and economic context present a background against which individuals choose to retain these different possibilities or to commit to one of these possibilities and to renounce the others. Religious Indentity and violence There are few topics that challenge the capabilities of historians more than religion and violence. When the two subjects are combined, the challenge is only increased. How do historians, discuss the often extreme, or alien manifestations of religious belief?And how should we explain religiously motivated violenceââ¬âor violence that seems to be inspired by religious beliefs or authorities? Religious and violence opens up a very territories for our consideration. This is the assumption that religious violence is really not fundamentally about religion that other interests, claims, or identities of an economic, ethnic, political, or even psychological nature are at stake. With this assumption it seems to imply that religion can be reduced to something else.I certainly endorse the idea that in most situations in medieval and early modern ages, religious violence is ââ¬Å"reallyâ⬠about religion. This may be less true of more recent times. I wonder, however, how consistently useful it is to think of religion as a social identity in medieval and early modern ages. Situations certainly existed in which people assigned religious labels to one another and/or thought of themselves as part of a religious group, most obviously in religious borderlands or in regions where multiple religious groups lived alongside one another. But the insight first provided by Wilfred Cantwell Smith and subsequently refined by a number of historians, namely that it was only over the course of the late Middle Ages, and especially in the wake of the Reformation, that the concept of ââ¬Å"religionâ⬠took on something approaching its modern sense of an organized set of beliefs and practices about the divine rather than an attitude of piety toward the gods, is an important one to keep in mind. And while it is certainly true that many forms of religious violence in late medieval or early modern Europe were directed against neighbors assigned some fixed label such as ââ¬Å"Jews,â⬠ââ¬Å"Dalits,â⬠incidents of religious violence may have been especially likely to occur at moments when new beliefs were spreading into an area and the religious situation was far too fluid to be neatly defined. So when public scenes of disrespect to the consecrated host sparked violent Catholic retaliation in France around 1560, the violence was motivated by outrage against those so depraved as to attack God's body, but the clash cannot be usefully analyzed as one between two groups with fixed social identities. The violence was all about rival beliefs and their public manifestation and defenseââ¬âa clear matter of ââ¬Å"religionâ⬠as a symbolic system. To go from there to speaking of religion as an irreducible identity is a linguistic step it probably isn't useful to take.
Friday, September 27, 2019
Paper review on haematological malignancy Essay
Paper review on haematological malignancy - Essay Example One of the key enzymes of the pathways resulting in the production of prostaglandins is Cyclooxygenase-2 (COX-2) specifically in the tissue, which is being insulted, and either on the way to transform to or has been transformed to a malignant tissue. Among these cancers, some common ones are: lung, head and neck, ovarian, uterine cervix, colorectum, and breast. Even in the presence of high level of convincing data supporting the role of COX-2 in the progression of cancer, no definitive evidence is available which provides any clue to the relationship between COX-2 and haematological cancers. Myeloma (MM) is very well described as the deregulation of the cytokine network accompanied by secretion of inflammatory cytokines. A study was carried out to look for the COX-2 deregulation in the pathogenesis of MM. For this purpose, a sample of 142 specimen form 132 patients with plasma cell dyscrasias were taken and further tested for the expression of the proteins by Western Blot (WB) method. These patients were at different stages of the diseases as far as the advancement or severity was concerned. These specimen samples were taken after the informed consent from the patients were obtained. Clinical features of all the patients were documented. Apart from WB, real time Polymerase Chain Reaction (PCR) were also carried out for some specimen. Along with these, COX-2 immunochemistry as well as separation of plasma cells was also performed. For statistical inferences, descriptive, univariate and multivariate analyses were done by using Cox model. Apart from the validation and assessment of MM samples and correlation between COX-2 expression and clinical parameters, the prognostic value of COX-2 expression in MM was also determined. It was found that median overall survival (OS) follow up for the study participants was 48 months and the relationship between COX-2 positive and negative was (28 months vs 52 months) and it was significantly different. While Progression Free survival (PFS) was estimated as 18 months for positive and 36 months for negative patients and it was also significantly different. COX-2 was found to be related to MM as a prognostic factor and it opened the venue for treatment options for MM as well as for more research work in the same and related areas to further explore any other associations. Significant contribution of the study The research work presented in this article is the first scientific report on the relationship between Cyclooxygenase-2 (COX-2) and Multiple Myeloma (MM). This is indeed an important finding, which adds to the available evidence on two facets: 1) apart from solid tumor, COX-2 has got a relationship with haematological malignancies especially with multiple myeloma where it showed statistically significant association with short progression free period in COX-2 positive patients as compared to COX-2 negative patients (18 vs 36 months; P < .001) and at the same time poor overall survival in COX-2 positive
Thursday, September 26, 2019
Evaluating training, development and learning and their importance at Assignment
Evaluating training, development and learning and their importance at work - Assignment Example or effective and competent employees who can innovative and sustain those innovations through their abilities and respond to the changing environment in a favorable manner. As such, training and development form the cornerstone of success for both the employeeââ¬â¢s and the organizationââ¬â¢s career. Training in simple words is a tool which aims at enhancing the current knowledge, skill set, abilities and competencies of people to achieve some specific outcomes. Built around specific result expectation, it takes the form of an organized activity with structured and successive stages in between which tend to impart technical, managerial, and inter-personal and such other know-how to the employees. Overall, such skills enable a candidate to better his /her performance through careful decision making and analysis capabilities. In the words of Flippo, ââ¬Å"training is the act of increasing the knowledge and skills of an employee for doing a particular jobâ⬠. Planned and strategic training programme at work results in the creation of intellectual capital which often supplies competitive advantage to organizations (Noe 2010). With human resources shifting its focus from traditional to strategic viewpoint, need and rationale for training at work puts on greater numbers. Globalization, competition, productivity, quality, cost effectiveness and a lot more have made the training platform more complicated and urgent too (Blanchard & Thacker 2004:117). The foremost concern is to strike a balance between proactive and reactive training measures to be adopted in response to market forces. Factors creating urgency in the rationale of training are: Technology can spell success or failure for a organization and this depends upon how competent and skilled the workforce is in handling the technology and also getting adapted to the fast paced changes taking place. Globalization rests on the continuous development in technology and it automatically calls for a proportionate increase in
Aspects of Contract & Negligence Assignment Example | Topics and Well Written Essays - 3750 words
Aspects of Contract & Negligence - Assignment Example 1). For example, a contractor agrees to construct a building on a specific site for the site owner within a particular timeframe and pursuant to detailed specifications in consideration of a specific price to paid by the site owner. In ordinary circumstances this would be a gratuitous exchange of promises. However, since the parties (site owner and contractor) intend to create legal relations, the agreement is a contract and therefore the voluntary undertakings and promises become legal obligations under the law (Koffman and MacDonald, p. 1). For instance, if the contractor fails to construct the building within the specific timeframe, the site owner has a right to sue the contractor for a breach of contract and can seek compensatory damages for the same. Likewise, if the contractor lives up to his or her undertakings and promises and the site owner fails to pay the promised price for the same, the contractor can sue the site owner for breach of contract and may seek compensatory dam ages as well. In a typical case, the parties to a contract will expressly state or write out the terms of the contract. In this regard, each of the partiesââ¬â¢ undertakings and promises will be articulated. The parties will then have a legal obligation to abide by those express terms (Ashcroft and Ashcroft, p. 50). The express terms of a contract will often have an impact on other persons who are not parties to the contract, although the right to enforce the express terms of a contract will only be applicable to the parties who have formed the contract and negotiated its terms and conditions (Ashcroft and Ashcroft, p. 51). The impact on other parties not parties to the contract can arise in specifically defined circumstances. For example a contract for a contractor to install doors and windows in a dwelling house for a site owner who leases the house to tenants will impact the tenants. In the installation of windows and doors, the tenants will be subjected to disruptions and int erruptions in their daily lives as the construction takes place. Therefore if for some reason either the contractor or the site owner delays the installation of the doors and windows, the tenants will be disadvantaged. Therefore in an action for breach of contract on the part of the contractor, the site owner may be entitled to claim additional damages for having to compensate the tenants either by a reduction in rent or a temporary relocation as a result of the delay. Therefore, although privity of contract only means that only the parties to the contract are bound by the specific terms and conditions in the contract, the impact of breaching those terms and conditions on third parties may increase the obligations of the parties to the contract (Koffman and MacDonald, p. 476). In the example provided (a contract for installing doors and windows), the contractor will also have to rely on other parties to ensure that he or she lives up to her specific terms and conditions. For example , the contractor will have to order doors and windows and will also have to enter into a contract for the delivery of the windows and doors. Therefore, two other contracts will come into play under the main contract and any breaches of these incidental contracts can impact the contractorââ¬â¢s ability to live up to the terms and conditions of the main contract (Koffman and MacDonald, p. 477). Therefore, if the windows and doors are not delivered on time, the contractor may be in breach of the contract with the site owner and in an action
Wednesday, September 25, 2019
Vizir Case Analysis Article Example | Topics and Well Written Essays - 500 words
Vizir Case Analysis - Article Example Proctor and Gamble is aware that Vizir is only recognized as a somewhat mediocre product, so the question of whether it might be profitable in Europe remains. However, if managed and advertised well, Vizir does show some promise of success. 2. Having used the tools described above, identify the key issues that the company should focus on - relate it to the reading in the Grant text for that week. Tell the reader why those are the root issues and not just symptoms of something deeper. The key issues that the company will need to focus on are the items necessary for success in Europe. This includes marketing strategies as well as overall management skills. Advertising will be key, as it always is, to bring the new product to light across Europe. Effective advertising should be able to introduce Vizir into the market successfully. 3. Find and cite three benchmark companies that face similar issues or counterpoint issues TODAY. Do not just look for companies with identical issues. If the issue you identified was "inadequate capitalization," find other companies with capitalization problems - you should not look for other companies in the same industry that had other issues. Focus on the issues, not the company or the industry.
Tuesday, September 24, 2019
Interview project Article Example | Topics and Well Written Essays - 1500 words
Interview project - Article Example e from bullying at schools to the interactions between the staff and students in ways that would benefit the school and the environment for education in the school. The interview also covered aspects like involving the parents in assessing the needs of their children and helping out the teachers in mentoring them better. The main purpose of the interview was to find out from the leader in education about the project on which she was working while she was in Australia. The idea behind the interview was to implement some of the methods that she worked upon as part of a comprehensive student management policy that she developed as part of her work in Australia. To give an idea about her experience, she was a principal in a primary school that taught classes KG- 7 for over thirty years and hence she has a wide range of expertise and enough experience in the field of education. The person whom I interviewed introduced far ranging changes in her school and helped the school make a name for itself in the field of imparting quality education and treating its children well. The overall objective was to make the students leaders in their chosen fields and equip them with the necessary skills to face the future without fear and with confidence. The stakeholders in the project that she was involved with are the students, teachers, parents and the leadership forum. From the outset, it was made clear to all the stakeholders that the agenda for the project ought to be clearly defined and understood and if any of them had any issues with the agenda, they were to report the same in writing to the leadership team to get them clarified and spelt out exactly what they wanted. The common goals for the project was the express purpose of implementing a comprehensive student management policy that included an anti-bullying plan among other things and the fact that every school must have a code of conduct that makes corporal punishment illegal and hence an offence. Upon reflection of
Monday, September 23, 2019
Efficient Market Hypothesis and Market Behaviour Essay
Efficient Market Hypothesis and Market Behaviour - Essay Example In fact, market prices are frequently nonsensicalâ⬠(Warren 1984, p17). This statement was made by Warren Buffett in reference to security prices and how they cannot be determined by individuals. To Buffett, market prices often do not make sense, and therefore he argues that financial experts should not dwell on the stocks themselves, but on stock pickers and investors who frequently determine market indices. However, the Efficient Market Hypothesis offers a totally contrasting view to the issue of market indices. The Efficient Market Hypothesis is a financial theory that affirms that it is not possible to ââ¬Ëbeat the marketââ¬â¢ since financial markets are believed to be infomationally efficient. In other words, the theory asserts that efficiency in the stock market normally leads to a clear reflection of relevant information on the existing share prices. According to the EMH theory, stocks will normally trade at their fair value on the market, which would make it imposs ible for traders to buy undervalued stocks or sell them at inflated prices.à As such, it would not be possible to do better than the overall market through market timing or even professional stock selection. If an investor wants to obtain higher returns he would have to purchase riskier investments. Believers of the efficient market hypothesis argue that there is no need to look for undervalued stocks or try and predict trends in the stock market through technical or fundamental analysis. Tenets of Efficient Market Hypothesis EMH was a financial theory developed by Eugene Fama in the 1960s. In his 1965 paper, Fama noted that ââ¬Å"on the average, competition will cause the full effects of new information on intrinsic values to be reflected instantaneously in actual pricesâ⬠(Fama 1970, p386) According to the efficient market hypothesis, when one buys and sells securities, they are not using skill, rather, they are ââ¬Å"engaging in a game of chanceâ⬠. EMH was widely ac cepted until behavioural finances became mainstream in the 1990s according to Hebner (2007). There are different aspects of what should constitute an efficient market and it all depends on the kind of information that is available (Desai 2011). These aspects are grouped into the three forms of the efficient market hypothesis: the weak form, the semi-strong form and the strong form (Fama 1970). The Forms of Efficient Markets The weak form of EMH asserts that historical market prices and data or information are reflected fully in securities prices (Fama 1970). This implies that technical analysis is not useful at all. Analyzing prices from the past according to this form cannot be used to predict future prices. This means that investment strategies that are based on past share prices and data cannot be used to earn excess returns in the long run (Jung and Shiller 2005). What this implies is that if stock prices are random, then it is not possible to use past prices to foretell future ones. In the weak form of efficient markets, information arrives randomly, thereby making stock price changes to occur randomly. Most financial research supports the view that financial markets are weak. The semi-strong form of efficient markets asserts that securities prices reflect any publicly available information as well as future expectations (Fama 1970). If this is the case, then
Sunday, September 22, 2019
Woodlands Community Center Corporation Case Analysis Essay Example for Free
Woodlands Community Center Corporation Case Analysis Essay The Woodland Community Center Cooperation (WCCC) had been established in 1926 by a social worker who thought that Woodland, an East Coast seaport town, would benefit from a variety of social and human services. Alain Yates, the longest serving executive director, was a long standing icon in the organization for many years, and due to a mixture of longevity and assertion, had shaped the organizational culture of the agency during his time of leadership. He had established a culture that didnââ¬â¢t necessarily reward what would be considered the ââ¬Å"normâ⬠; such has hard work and excellence. Instead he rewarded seniority and loyalty to the organization, and above all, loyalty to him. Employees advanced through becoming Yatesââ¬â¢ ââ¬Å"petâ⬠employees, and received perks such as parking and expensive trips to out of state conferences. This preferential behavior created a rift within the organization and its employees. If people complained, then they were slowly trickled out by Yates, and replaced by more loyal employees. After 25 years of service, Yates retired, and while naming his suggestion for a successor, the board quickly and surprisingly undermined his influence and hired Fred Chambers. Fred was a man of substance and experience, and they needed someone to come in and not only change he organizational culture, but improve it. Fredââ¬â¢s wife had advised against taking this appointment, yet Fred took on the challenge, and in this case analysis we meet Fred just as he is beginning to take in the breadth of this challenge. Organization culture at Woodland Community Center Corporation was based on the values imposed by Yates. He believed that ââ¬Å"seniority was sacrosanct, and neither creativity nor hard work replaced itâ⬠(McShane 539). This created a dominant organizational culture that believed that loyalty to Alan Yates was all that mattered, considering that the employees enjoyed a secure work environment as few employees ere fired for poor work ethic. ââ¬Å"The key to employee survival and its attendant rewards was loyalty, not competency. Furthermore, loyalty was the sole way to advance in the agency or to receive pay increases for the agencyââ¬â¢s over 100 employeesâ⬠(McShane 539). As Yates continued his tenure, the organization was becoming more incestuous and a breeding ground for a groupthink mentality. ââ¬Å"the agency had one characteristic in common: they swore undying loyalty to Yatesâ⬠(McShane 539). Although Yates dominated the organizational culture with his own values, there was still a certain subculture that opposed him. The employees who were not impressed by Yates created the counterculture considering that they directly opposed the dominant values in the organization. They tried to maintain the organizationââ¬â¢s standards of performance and ethical behavior as one employee stated ââ¬Å"we are committed to working for the betterment of the agency and its clients, and we will stay despite Yates preferential treatment of pet employeesâ⬠(McShane 539). They tried to maintain the values that kept the firm aligned with the needs of the society and other stakeholders. The subculture opposed to Yates could have been helpful in changing the dominant culture upon his retirement, but the executive director was able to suppress it over time. Employees that were part of the subculture began to retire of slowly trickle out because they could not longer tolerate ââ¬Å"employment injusticesâ⬠(McShane 540). Each employee that left would then be replaced by a loyal Yates supporter, which made in the more difficult for the New Executive Director Fred Chambers to change contaminated culture. In reading about organizational cultures, our text places images of strong, adaptive cultures. Cultures where the employees strive to improve customer focus and carry on long standing traditions that have carried the success of the companies. However, in this weekââ¬â¢s case study, we find a great example of what a weak organizational structure is. Alan Yates has instilled a weak organizational culture during his tenure at WCCC. While at WCCC Alan Yates has allowed an organization culture that has slide away from customer services and has not become adaptive. The organizational culture has become one were loyalty and servitude has more value than ability and knowledge. ââ¬Å"The key to employee survival and its attendant rewards was loyalty, not competencyâ⬠(McShane 539). From this quote, it is clear to see that Alan Yates has created a culture of ââ¬Å"yesâ⬠people, loyal to him and unable to correctly serve their client base. Furthermore, the organizational culture is being eroded as ââ¬Å"adaptiveâ⬠employees leave the company (McShane 467). As stated before, the organizational culture is further weakened by Mr. Yates as more experienced and ââ¬Å"adaptiveâ⬠employees are alienated and replaced by ââ¬Å"in-crowdâ⬠employees. As the experienced employees leave, they erode the company by taking away many of the ââ¬Å"rituals, legends and ceremoniesâ⬠of the company (McShane 464). As the more experienced employees leave the company, many of the rituals, legends and ceremonies that had made WCCC successful will be lost, as they will be lost in the transition to new employees. The text also describes the three important functions of a strong culture, ââ¬Å"Control system, Social glue and Sense makingâ⬠(McShane 466). Again, it is interesting to see how a weak organizational culture works. Looking at WCCCââ¬â¢s control system with Mr. Yates, it is evident that a ââ¬Å"deeply embedded form of social control that influences employee decisions and behaviorâ⬠is present in the company (McShane 466). The only problem is the control system is too strong and influential. An example from the case study cites ââ¬Å"Both, regardless of how they arrived at the agency, had one characteristic in common: They swore loyalty to Yatesâ⬠(McShane 540). As more employees became loyal to Yates, the control system became to strong. The weakest part of the culture is tied to the ââ¬Å"social glueâ⬠(McShane 466). ââ¬Å"Organizational culture is the ââ¬Å"social glueâ⬠that bonds people together and makes them feel part of the organizational experienceâ⬠(McShane 466). The case study talks of a ââ¬Å"growing riftâ⬠among employees that are loyal or not to Yates (McShane 539). The organizational culture suffers from a split in the employees as more experienced employees feel left out by Yates. This effectively shows a lack of ââ¬Å"social glueâ⬠within the organizational culture of WCCC. Overall, it is easy to see that the organizational culture during Mr. Yates tenure has been significantly decreased at WCCC. The company lacks any ââ¬Å"social glueâ⬠that could improve employee moral and it further harmed by the overbearing control of Mr. Yates. During his 25 year stay at WCCC, Mr. Yates has turned the organizational culture to nothing more than a ââ¬Å"yesâ⬠culture. Fred Chambers is well aware how much organizational change is needed at the Woodland Community Center Corporation. There are both driving and restraining forces for change found in this case which will make Fred Chambersââ¬â¢ new position of executive director a difficult one. It is his goal to effectively manage these forces in order to successfully point the Woodland Community Center Corporation into a new direction. Alain Yates left a divided and unhappy workforce for Fred Chambers to fix. ââ¬Å"Yates had encouraged policies of ââ¬Å"double standardsâ⬠that de-motivated some long-term and industrious agency employees. (McShane 532) Yates had his favorite employees and those who were within his inner circle. Certain people had reserved parking spots, whereas others had to park far away and take the long walk to the building from their car in inclement weather. Others were not allowed to go to training sessions to further their knowledge while they stood buy and watched certain employees go to expensive out of state conferences. ââ¬Å"Yatesââ¬â¢s actions resulted in a small but noticeable agency fissure that led to a growing rift between employees who sought to excel and those who just got by on their loyalty. ( McShane 532) Employees wanted to be rewarded for their work ethic and not their loyalty. People would no longer go the extra mile if they werenââ¬â¢t in Yatesââ¬â¢s inner circle. This is a definite driving force for change. Fair and equal treatment needs to be implemented throughout the corporation. Despite all of the negative practices that Alain Yates implemented, those employees who were not treated fairly did not leave WCCC. They were paid very well and had a drive to help the clients that the agency worked with. Eventually, most of these employees left and were replaced by loyal supporters of Yates. Chambers needs to drive home that sense of loyalty to Woodland Community Center Corporationââ¬â¢s clients to those employees who remained despite not being in Yatesââ¬â¢s inner circle. These employees need to still be competitively paid and reassured that their work will be appreciated. On the other hand, most of the employees of WCCC are loyal to Alain Yates and Fred Chambers will have an up road battle to convince the supporters of Yates that he will do a great job. Fred Chambers will most likely face many restraining forces for change. In some situations employees may be worried about the consequences of change, such as how the new conditions will take away their power and status. In other situations, employees show resistance because of concerns about the process of change itself, such as the effort required to break old habits and learn new skills. â⬠(McShane 490) Fred Chambers needs to set a standard of equality. Yatesââ¬â¢s inner circle no longer exists, and these employees need to know that they have to step up to the challenge and prove themselves. One resistance to change is the fear of the unknown. Employees do not know what is in stored for them. People resist change out of worry that they cannot adjust to the new work requirements. â⬠(McShane 491) Workers might not have performed up to their potential because they were favored by Yates. Another resistance to change is when a routine is broken. ââ¬Å"This means employees need to abandon behavioral routines that are no longer appropriate. â⬠(McShane 491) Employees will not be used to the style of Fred Chambers. He most likely wants to do things differently, and they will have to adjust accordingly. Fred Chambers needs to approach organizational change from an evolutionary perspective. Alain Yates had run the WCCC for twenty five years. Many of the employees had been there for a long time and have been accustomed to his leadership style. Fred Chambers needs to implement certain changes right away, but at the same time, one does not want to rock the boat too much. He must create a more equal and level playing field for all employees. Chambers must gain the trust of all his workers and prove to them that he is dedicated to them, the organization, and most importantly, the companyââ¬â¢s clients. By being too aggressive in his actions, Chambers will not give off a good impression and turn a lot of people off. He needs to use tact and apply his experiences to his new position. Over the next year or two, employees will realize that they are valued by the work they do and not by the personal connections they may have. Fred Chambers is required to make a lot of changes, and to convince a staff who has been conditioned to be loyal to a man who is no longer at the helm of the ship. Additionally, it seems that decisions had been made that werenââ¬â¢t pro-business, only pro-Yates. These will need to be reversed, which will naturally result in push back from the employees who had had these perks-who wants to give up a good parking spot? We believe that change really needs to begin at the bottom with the employees. First, Chambers should hold a meeting, outlining some initial changes within the organization, as well as explaining what in the world would make the board make such decisions. Providing some transparency at the top would help build some trust from employees. It would be important to not dwell on the past, but to focus on the future. He should talk about how important it is that people focus on the increased productivity and services of the organization, as opposed to the past which was riddled with preferential treatment and poor business decisions. The opportunities here far outweigh negativity brought by employees entrenched in the previous culture. This is an opportunity to have the employees really concentrate and recommit to the mission and vision of the organization. Perhaps he could do a workshop outlining goals, and the mission/vision of the organization. The future of the organizations fiscal and organizational health lies in Fredââ¬â¢s ability to gain the trust of the employees and then steer them towards good work product output, expectations of advancement when warranted through good work, and perhaps some leaner times financially, if there need to be lay offs. Fred needs to make the employees feel as though they belong to an organization who works well together. Create a sense of belonging. This is how Yates succeeded in turning the culture in his way, and it wonââ¬â¢t be too difficult to do the same. Chambers also has a leg up when it comes to cost cutting. He will be able to outline to the entire organization that expenses such as trips, far away conferences and training will not be available to anyone, regardless of the reason or connection. This will allow people to see that Chambers will not play favorites, which has been an issue of concern in the past. It also tells the employees that there are financial concerns, and they should be cognizant of where they spend money. While there will be some initial push back, Chambers can and we believe will succeed. He has experience in running non profits; he is a seasoned professional in dealing with non-profit staff. Chambers should approach this challenge with the belief that what one poor leader had done can be undone by a strong leader with a good understanding of the culture, the people, and a strong commitment to the success of the organization.
Saturday, September 21, 2019
Transport Layer Network Layer Protocols Attack
Transport Layer Network Layer Protocols Attack Chapter 1: Introduction 1.1: Background Data Communication technologies and the underlying protocols in the twenty-first century is one of the critical elements that acts as the backbone for electronic commerce and use of the world-wide-web (Todd and Johnson, 2001[1]). The increase in the growth of electronic commerce as well as other forms of internet-based secure communication have increased not only the risks associated with networking related attacks that involve in the loss of personal information and possible financial loss to the victims. One of the major components in the Internet communication is the underlying protocol that governs the compilation and communication of the information from the source computer to the target and back (Nash et al, 2001[2]). The role of the protocols in the networking also has a key influence on its ability to securely deliver the information as part of the overall communication architecture. This makes it clear that the robustness of the protocol and the extent to which a given proto col architecture can resist intruder attacks through encryption efficiency etc dictates the security associated with the information transfer as argued by Todd and Johnson, (2001). In this report a critical overview on the transport layer and the network layer protocols of the TCP/IP protocol architecture is presented to the reader. The research aims to throw light on the possible security attacks on these protocols and the possible countermeasures in order to prevent such attacks. The attacks in these cases mainly concern with the infringement of the information through unauthorised access bypassing the security or breaking the encryption surrounding the information being transported. 1.2: Aim and Objectives The aim of this research is to investigate the possible attacks on the Transport layer Network layer protocols and present possible countermeasures on overcoming the threat of these attacks on the day-to-day Internet-based data communication. The above aim of the research is accomplished through embracing the research on the following objectives To conduct a literature review on the Transport and Network layers of the TCP/IP protocol architecture. To conduct a critical overview on the possible types of attacks on the Transport Layer and Network Layer protocols. To present a critical analysis on the possible countermeasures to prevent the attacks on the Transport layer protocols. 1.3: Research Methodology A qualitative approach is used to conduct the research. Since there are five layers to the TCP/IP model of which the research aims to investigate the protocols associated with the Transport and Network layer, a qualitative approach is deemed effective as the infrastructure required to simulate tests for conducting a quantitative research is limited for conducting the research. As it is also apparent that the analysis on the five layers of the TCP/IP model is beyond the scope of the research conducted in this report, the research conducted mainly focuses on the key threats and possible types of attacks on the protocols of the TCP/IP layers discussed. 1.4: Chapter Overview Chapter 1: Introduction This is the current chapter that presents the aim, objectives and brief overview on the research conducted to the reader. Chapter 2: Literature Review This chapter presents an overview on the layers of the TCP/IP model followed by a detailed overview on the key Transport layer and Network layer protocols. The chapter also presents a brief overview on the network attacks and the possible threats associated with the Internet data transfer. Chapter 3: Protocol Attacks This chapter presents a critical overview on the types of attacks on the Transport Layer and Network Layer protocols. The chapter presents a critical analysis on the methods used and the potential losses that may result due to the attacks. Chapter 4: Countermeasures This chapter presents a critical overview on the possible countermeasures that are implemented in order to prevent the attacks discussed in chapter 3. A comparative study on the countermeasures discussed is also presented in this chapter. Chapter 2: Literature Review 2.1: Internet Security in the twenty-first century The increase in the need for internet security from unauthorised access and malicious attacks is not only due to the need protecting personal/sensitive information of the users but also the service providers (Ganesh and Thorsteinson, 2003[3]). This is naturally because of the fact that the service providers can perform effectively only when the requests sent to the server are valid thus making justifiable use of the resources (Rayns et al, 2003[4]). The use of the resources in terms of the number of connections and the allocation of memory to cater for each connection established with the web server of the service provider is deemed to attribute to the extent to which a given website establishment performs effectively. This makes it clear that the need for internet security is not only a matter of protecting personal information but also effective utilisation of the computer resources dedicated for the purpose as argued by Rayns et al (2003). Walden (2007)[5] further argues that the security over the internet is mainly accomplished through implementing security measures on the connection-oriented and connection-less protocol used for transferring information from one end to another. It is interesting to note that the above focuses especially on the resource utilisation and protection of computer from malicious attacks through ensuring that the communication to and from the computer are not only secure but also valid. It is necessary to ensure both the validity and security of a given connection over the internet because of the former corresponds to the availability of the service whilst the later attribute to the reliability of the available service (Walden, 2007). It is also interesting to note that the prevention of unauthorised access to information systems connected to the Internet is deemed effective as opposed to implementing access control on each individual system as argued by Todd and Johnson (2001). This makes i t clear that the implementation of the security over the Internet is mainly through implementing the preventive measures against malicious attacks through strengthening the protocols used in the various layers of the TCP/IP model. As the TCP/IP model forms the basis for communication over the internet, it is apparent that the robustness of the protocols implemented in each layer of the TCP/IP stack dictates the effectiveness of the Internet security implemented (Walden, 2007). In the next section a critical overview of the TCP/IP model is presented to the reader. 2.2: TCP/IP Model ââ¬ËTCP/ IP is a set of rules that defines how two computers address each other and send data to each otherââ¬â¢ as argued by Blank (2004) (p1)[6]. Naturally the above makes it clear that TCP/IP is merely a framework that governs the methods to be deployed in order to enable communication over the internet between two computing devices. As TCP/IP is platform independent in nature, it provides a communication framework that can be deployed across any given operating system on a computing device connected to the Internet or even a dedicated network as opposed to the World Wide Web. This further opens room for development of new protocols and communication standards/rules that can be implemented using the TCP/IP model on any one of its five layers as argued by Rayns et al (2003). Hence securing the information being transferred from one end to another over a given network or the Internet can be accomplished through implementing a combination of protocols to operate within the laye rs of the TCP/IP framework. The five layers of the TCP/IP model are Application Layer Transport Layer Network Layer Data Link Layer and Physical Layer. From the above it is evident that TCP/IP can be implemented in a given network using any number of protocols in each layer of the TCP/IP model depending upon the level of security required and the speed in data transfer. This is because of the fact that the increase in the number of protocols naturally increases the size of the data packet being transferred as part of the communication thus having a direct impact on the speed of communication as argued by Rayns et al (2003). It must also be noted that the protocols presented in each layer of the TCP/IP model shown in Fig 1 is merely a selection and not the exhaustive list of the protocol suite. From the model represented in Fig 1 one should also appreciate that the layers of the TCP/IP model are arranged in a logical fashion so that the protocols closer to the top at the layer 1 associate themselves with the computing applications that handle data encryption and security. The protocols to the bottom of the TCP/IP stack on layer 5 on the other hand associate themselves with the actual data transfer from one end to another through establishing connection and enabling communication between sender and receiver as argued by Blank (2004). As the research presented in this report focuses on the Transport and Network layers of the TCP/IP model a detailed overview on the five layers is beyond the scope of this report. A brief overview on each TCP/IP layer is presented below. Application Layer ââ¬â This layer of the TCP/IP model comprises of the protocols that associate with the handling of data and the encryption of the information order to effectively transfer the information from one end to another. The application layer is also deemed as the layer of the TCP/IP model that communicates with the actual application that is handling the information prior to its transfer over the Internet. The protocols of the application layer enable the interaction between the computer and the actual web application that performs the business logic associated with the application prior to preparing the information for transfer over the Internet. This makes it clear that the application layer encryption is mainly associated with the segmentation of the data into packets and allocates the associated headers in order to enable their transfer over the Internet. This also makes it clear that the security associated with the information transfer is not implemented at the A pplication Layer of the TCP/IP model. This makes it clear that the application layer protocols are extensively used in case of client server applications where the data transfer between the client and the server is in the full-duplex mode (Feit, 1998[7]). Transport Layer ââ¬â This is the actual layer that manages the connection between the two computers and the success or failure of the information being transferred as argued by Blank (2004). The purpose of the Transport layer protocol as the name suggests is to ensure the secure and successful transfer of information over the Internet between the communicating parties as argued by Ganesh and Thorsteinson (2003). The process of enabling end-to-end communication for successful data transfer is the major task that is accomplished using the Transport layer of the TCP/IP model. It is also interesting to not that the transport layer of the TCP/IP model provides the error tracking, flow control and data fragmentation capabilities independent of the underlying network as argued by Feit (1998). The transport layer of the TCP/IP model also performs the task of assigning the header to the data fragment off the overall information being transferred from one end to another. The transport layer of the TCP/IP model implements two forms of communication strategies. These are connection-oriented and connectionless implementation as discussed below. Connection-Oriented Implementation ââ¬â The TCP (Transmission Control Protocol) protocol of the transport layer accomplishes the connection-oriented strategy of data communication. The connection-oriented approach o data communication corresponds to the process where a connection must be available between the communicating parties in conformance with the authentication and association rules prior to actually performing data transfer. This makes it clear that the data transfer in case of a connection-oriented approach depends on the extent to which the connection being established is live between the communicating computers. This makes it clear that the data transfer in a connection-oriented implementation can be accomplished only with the ability to maintain the connection between the computers thus making the data transfer reliable as argued by Feit (1998). This is naturally because of the fact that termination of the connection of loss of connection established during the cours e of the communication/data transfer would trigger a request to resend the information thus providing room for transferring all the information from one end to another. The session based communication strategies in terms of enabling the communication security is one of the key features of the connection-oriented implementation as prolonged inactivity or termination of the session will naturally terminate the connection established thus protecting the information transferred over the internet. Public Key Infrastructure (PKI) which will be discussed in the next section depends on the establishment of a connection-oriented communication strategy in order to ensure that the communication between the two computers using the connection oriented approach will help protect the information being transferred by the transport layer protocol. As discussed earlier, the transfer of information from one end to another in a communication channel is accomplished through segmenting the information in to equal sized segments of data called packets that are assigned a header containing the details of the packet as well as its sequence in the information being transfer. The connection-oriented implementation of the transport layer has following key features Sequential data transfer ââ¬â This is method which follows the First-in First-out (FIFO) strategy. Thus the sequence in which the data packets are received is the same in which it is being sent from the source computer. This approach is deemed secure to ensure that the information being transferred is not tampered with and loss of one of the packets will enable the sender to resend the entire information again. However, the major disadvantage is that the increase in the size of the information will result in poor performance in terms of speed of data transfer. Higher level of error control ââ¬âAs the connection oriented approach ensures that the connection established is live between the sender and the receiver throughout the entire communication process, it is clear that the error control is accomplished successfully through enabling the sender to resend the packets that were not received in the initial transfer. The control in the loss of packets using the above resend strategy naturally minimizes the error associated with the data transfer. Duplication Control ââ¬â The connection-oriented strategy also has the inherent ability to eliminate duplicate data packets transferred thus allowing the connection-oriented architecture to ensure consistency in the information being transferred. Congestion Control ââ¬â The TCP protocol monitors the network traffic as part of the transport layer activities. This ensures that that the session established between the sender and the receiver can transfer the required information successfully prior to reaching the session time-out situation as argued by Feit (1998). The client-server communication over the internet is a classical example for the implementation of a connection oriented strategy in the Transport layer of the TCP/IP model. The use of the PKI in the communication is one of the key aspects of the connection-oriented implementation that makes the TCP protocol a key element in the secure data transfer strategies of the day. Connectionless Implementation ââ¬â As the name suggests the connectionless implementation is the case where a dedicated connection is not required to complete the data transfer between the communicating computer as argued by Blank (2004). The User Datagram Protocol (UDP) is used in the case of connectionless implementation where the transfer of the data packets merely comprises the packet order and the source/target details alone. This makes it clear that the transfer of data can be achieved at a higher rate as the authentication and validation of the data transferred is not restricted to a time frame or the session that controls the communication. However, the major issue associated is the lack of security and inaccuracy of the data transferred. Alongside, the key issue with the UDP protocol and the connectionless implementation is the lack of traceability of the information thus resulting in a non-reliable communication channel as argued by Blank (2004). The UDP is thus deemed to be an insecure mode of communication over the internet due to the lack of security measures apart from authentication and identification of the communicative parties. It is further important to appreciate that implementing PKI using the connectionless approach would result the exposure of the information and the lack of effective acknowledgement of the authentication between the communicating computers thus affecting the information security providing room for network attacks that can directly affect the information being transferred through the connection. Network Layer ââ¬â Blank (2004) argues that the network layer of the TCP/IP model performs the task of delivery of the data within the network one the data packet has reached the appropriate network subnet. This makes it clear that the network layer of the TCP/IP model plays a critical role in identifying the correct network target/destination in order to enable effective communication between the communicating parties as argued by Feit (1998). In case of the World Wide Web, the Network Layer plays the vital role of identifying the destination network and enabling the routing of the packets through the network in order to effectively reach the destination without the data being tampered by unauthorised users. The protocols that are widely used in the Network layer include the Internet Protocol (IP) and the Internet Control Message Protocol (ICMP). The Routing Information Protocol (RIP) of the information TCP/IP model which is predominantly used in the Application layer plays a vi tal role in the network layer for enabling routing of the information across the networks in order to effectively reach the target computer in the communication channel established over the Internet. It is further critical to appreciate the fact that the routing of the packets alone is not the task of the network layer protocols but also to enable the transport layer protocol to effectively enable the communication and data transfer between the communicating computers. This makes it clear that network attacks over the internet by hackers to affect the performance of the communicating computers in order to gain unauthorised access is accomplished through manipulating the communication strategies implemented by the protocols in the Transport and Network Layers of the TCP/IP model. The access to information and the actual infringement of the information which is deemed as the consequence of the hacking or network attack is related to the infringement of the information at the applicati on layer protocols that hold the actual information being transferred (Blank, 2004). However, the attacks themselves that facilitate the aforementioned are accomplished through manipulating the procedures associated with the Transport Layer and Network Layer protocols. The attacks typically include spoofing, overloading, flooding etc., which are discussed in detail at chapter 3 of this report. The Data Link Layer and the Physical Layer of the TCP/IP model involve the actual hardware based communication strategies that are beyond the scope of this research. Hence these two layers of the TCP/IP model are not discussed any further. It is important to appreciate the fact that the top three layers of the TCP/IP stack interact frequently in order to enable the secure communication and allocation of computing resources on the computing devices involved in the communication (Blank, 2004). 2.3: Public Key Infrastructure ââ¬â an overview PKI implements a form of cryptography known as the asymmetric cryptography in order to enable secure communication between two computers over the Internet as argued by Todd and Johnson (2001). This process mainly involves the use of a public key and private key that are used for encrypting and decrypting the information at the client and server ends respectively (Blank, 2004). The process of encryption is beyond the scope of this research although its role in the secure communication and the extent to which a hacker can manipulate the authentication strategies for launching an attack is relevant to the research. Hence the discussion in this section mainly concerns with the handshake and the communication strategies deployed along with an overview of the players in the PKI. This will help in identifying the various attacks plausible and the level manipulation that can be implemented by the hacker over the protocols used in order to infringe the communication between the client and ser ver computers. It is deemed that the PKI is a reliable communication strategy to implement secure communication through the use of Trusted Third Party (TTP) authentication and approval of the overall communication process between the server and the client computers. The key components of the PKI infrastructure that enable successful and reliable communication over the internet are discussed below Certificate Authority (CA) ââ¬â The CA is the issuer and control of the public key and the digital certificate associated with the authentication and transfer of secure information over the connection established using the TCP protocol. The primary role of the CA is to generate the public and the private keys simultaneously for a given server computer or service provider (Blank, 2004). The public key as the name suggests is made available over the public domain for encryption/decryption of the information at the client-end of the connection. The private key is not shared and stored at the server which is used for encryption/decryption of the information as applicable at the server end of the connection established for communication. From the above description it is evident that the role of the CA in the PKI is pivotal for the effective implementation of the PKI for secure communication free of network attacks. This is because, if the server hosting the CA application is attacked either using cross site scripting or flood attacks, the public keys stored as well as the associated certificates for verification are compromised thus resulting in the hacker gaining control over the communication channel without the knowledge of the server or the client as argued by Blank (2004). This makes it clear that the security at the CA computer is critical to establish a reliable TTP computer for implementing connection-oriented communication using TCP protocol of the TCP/IP model. Registering Authority (RA) ââ¬â The RA as the name implies is the verifier of the digital certificate before it is issued to a requestor as argued by Todd and Johnson (2001). The role of the RA computer in the PKI implementation is to enable an independent authorisation of the digital certificates issued thus providing a secondary verification of the information prior to communicating to the server. This presence of an independent verifying program or computer as part of the communication makes the PKI a reliable communication strategy to implemented connection-oriented communication over the internet in a secure fashion. It is also deemed to the key weakness of the PKI strategy owing to the fact that the reliability of the RA as a TTP in the communication process dictates the effectiveness of the communication and the protection of the server from intruder attacks as argued by Todd and Johnson (2001). However, the reliability of the CA or RA is not the issue of debate in this re search but the potential attacks that threaten the stability of the computers hosting the CA and RA programs in order to enable secure connection oriented implementation across the Internet. The key area where the attacks can be accomplished by hackers to disable the RA or the CA computer eventually compromising the information held within is the use process of handshake where the RA or the CA computer is expected to receive an acknowledgement (ACK) from the requesting computer for each message successfully communicated. It is through manipulating these handshake communications a CA or RA can be compromised as the communication channel is expected to open for a specific time period to receive the ACK as well as allocate sufficient resources to complete the data transfer. Abuse of this feature is one of the major areas where the connection-oriented communication faces threat of attacks. These are discussed in chapter 3 elaborately. Directories ââ¬â The directories are the locations on the public domain that host the public keys for enabling the encryption of the information. The keys are normally held in more than one location in order to enable easy/quick access to the information as well as a verification strategy to ensure that the key retrieved is indeed the valid one for data transfer between the client a given server computer. Certificate Management System (CMS) ââ¬â This is the application that controls or monitors the certificates issued and facilitates the verification process. The CMS forms the core of the PKI infrastructure as the CA and RA computers in the given PKI implementation are expected to host a validated CMS program to enable the connection-oriented communication between the client and the server. The key issue associated with the case described above is the fact that the CMS program itself is an independent application and hence its reliability/robustness to prevent malicious attacks alone dictates the extent to which a given CA or RA is reliable over the Internet. The key security strategy in case of the PKI implementation is the sharing of the public key whilst retaining the private key at the server computer as argued by Burnett and Paine (2001) [8]. This strategy allows the server computer to effectively encrypt or decrypt the information without depending upon the public key and hence leading a two pronged attack as the information encrypted using private key can be deciphered using the public key and vice versa. Although the use of the two independent keys helps overcome the security threats to the information being transferred, the transfer process itself is not governed by the PKI. This is the major weakness of the PKI infrastructure that allows room for malicious attacks that can hamper the performance by the CA, Ra or the host server computers as argued by Burnett and Paine (2001). From the above discussion it is evident that the security established using the PKI is mainly dependant on the following key elements of the PKI infrastructure CA and RA ââ¬â The validity and reliability of these computers play a vital role in the effective implementation of the PKI. Apart from the fact that the client computer sending the information depends upon these computers security of the information in its entirety, it is also clear that the availability of these computers and their responses in terms of session time control and preventing session time-out cases are critical to enable successful communication in a connection-oriented implementation using the TCP protocol. An attack on the hosting server for the CA or the RA mainly in terms of flooding or denial of Service will result in the failure of the PKI infrastructure in terms of lack of availability. This situation is one of the major elements that must be addressed as part of the security strategies to be implemented on the transport layer protocols. Encryption Algorithm ââ¬â The encryption algorithm used for issuing the public and private keys is another element that influences the security and reliability of the PKI as argued by Burnett and Paine (2001). The effectiveness of the hashing algorithm used for the purpose is not only essential for ensuring the security of the information through encryption but also dictates the size of the information for transmission after encryption as well as the speed associated with the data transfer for a given encryption strategy. As the complexity of the encryption algorithm naturally increases the size of the data being transferred thus affecting the speed associated with the communication, it is critical to establish a balance between security and speed in order to enable effective communication over an established connection. It is also important to note that the use of encryption algorithm dictates the extent to which a hacker can hack into the information that is being transfer whil st launching a transport/network layer attack as argued by Burnett and Paine (2001). It is deemed that the hackers through launching malicious attacks at the transport layer or the network layer tend to utilise the time gap to decipher the information being transferred in order to use the data for personal benefits. This makes it clear that the code hacking at the protocol level mainly attribute to the speed with which a given payload data transferred over a connection can be decrypted prior to termination of the connection itself as argued by Burnett and Paine (2001). From the above arguments we can deduce that the encryption poses the threat of single point of failure to the PKI in terms either being weak to prevent infringement or highly strong affecting the communication speed as argued by Nash et al (2001). Advantages or benefits of PKI The major benefits of the PKI include the following The TTP presence enables higher level of security through verification by independent entities in the communication process. The CA and RA in the PKI play a vital role in achieving the aforementioned. The dedication of resources for developing stronger algorithms to generate reliable public and private keys is yet another advantage associated with the PKI implementation. This makes it clear that the transport layer protocol (TCP) of the network layer protocol (IP, ICMP) weaknesses in terms of the request for resend and other key elements of connection verification can be overcome through robust algorithms. The growth f the electronic commerce at an exponential rate is one of the key factors that attribute to the availability of resources dedicated to the development of the PKI security strategies (Nash et al, 2001). The security infrastructure behind the storage and retrieval of the public keys is yet another area where the reliability and effectiveness of the PKI is evident. The fact that in case of reliable CA and RA, the security is indeed robust and the information being transferred is secure as well as the communication process as argued by Nash et al (2001). Constraints, Weaknesses and threats TTP reliability and costs ââ¬â As discussed before the major issue is the TTP reliability. The involvement of the TTP not only questions the
Friday, September 20, 2019
GPS-GSM based Rail Signaling and Tracking System
GPS-GSM based Rail Signaling and Tracking System Abstract: In this paper, we propose a system for monitoring, tracking, and automating the trains. In contrast to the existing methods, we employ a global position system (GPS) and Global System for Mobile communication (GSM). The messages are sent and each train is individually tracked. We utilize signaling techniques like GPS and GSM, which provide information to the loco pilot proactively. The proposed system has advantages in terms of communication range and accuracy with respect to wi-fi based rail tracking method. The work has potential applications in bad weather and emergency situations like collision. Keywords: Train Tracking, Collision Detection, Collision Avoidance, GPS, GSM, Railway Signaling. I. INTRODUCTION Railway tracking in the countries like United States, Russia, China, and India assumes significant attention. The railways traverse the length and breadth of the country and carry over billions of passengers and million tons of freight daily. In recent years, a hectic problem around the world is regarding traffic densities. This is not uncommon in railway sectors either. We often hear about the word train collision and its huge impact on precious human life and time. With great passion for this issue, the paper proposes the solution for this grave problem. Especially if we consider the case of Indian railway, most of the train tracking is based on manual entry from stations. The railway is always looking for the specific tracking methodologies, which will provide prior state of the train before arriving to the station. The GPS-GSM tracking system overcomes many problems like multiple aspect color light signaling, relay interlocking, and various kinds of block working, point operation and train tracking. The proposed system is applicable for reducing the damages to a greater extent and it is helpful to both railway system and loco pilot. Uvaraja et al. presents advanced pre-warning system (Railways). The proposed system is an upgrade of the existing train protection warning system (TPWS) and Anti-collision device (ACD) systems. The system makes use of radio frequency identification (RFID), FLIR cameras and other embedded systems [3]. Immanuel et al. proposes real time wireless based train tracking, track identification and collision avoidance system for railway sectors [4]. Shaik et al. presents rail tracking system (RTS). For transmission and receiving of the information, GPS is utilized. A message exchange link is given between rail tracking system and control room based on the GPS. The location of the train is tracked using GSM technology herein [7, 8]. K. Vidyasagar et al. proposes signaling based system that utilizes radio frequency and infrared technology for train tracking. This paper utilizes a switching logic methodology, technique to meet the issues of the train tracking method. This work also focuses to map the train on the display screen [6]. The above systems have constraints in real time; most of these constraints can be overcome in the proposed GPS-GSM based technique. The objective of this paper is to monitor, track and automate trains based on GPS-GSM techniques. The subsequent section of this paper is organized as follows: In Section II, we describe the GPS-GSM modules used for tracking purposes. Section III discusses the performance evaluation of the GPS-GSM module for tracking of the train. Section IV concludes the paper and discusses the potential future work. II. GPS-GSM MODULES FOR TRACKING AND SIGNALING The proposed system consists of two parts, tracking and signaling. Both tracking and signaling are carried out with the help of GPS and GSM modules. A. RAILWAY TRACKING USING GPS-GSM TECHNIQUE Our proposed method for tracking and signaling relies greatly on the wireless communication. It uses GPS and GSM for the communication between trains and operation centres. When each train gets their own module, it connects using GPS to obtain their position. The module which is mounted on the train sends the position and train details using GSM technology proactively. This data is received by a central sever, which in turn sends this data to the trains on that track and operation centers. Hence, within the required distance, if any train is traversing in a same track can read this data and can calculate the distance the two trains. Therefore, based on the distance between two trains, the various alarm levels are raised, when the distance is less than predefined threshold. Then, the proposed system (Train mounted Module) starts warning the driver to avoid the collision occurrence. The proposed system responds quickly and avoids the train collisions. The Figure 1 illustrates the flow chart of the GSM-GPS based rail tracking system. The distance between the trains can be calculated using latitude and longitude provided by the GPS module. Haversine formula can be used for this calculation and given in terms of inverse tangent formula to obtain the great circle distance between two locations. The formula for calculation of distance using GPS coordinate s is . Whereà signaling terminologies: red signifies stop instantly before entering the next track section occupied by an ahead train; yellow shows move ahead with reasonable speed (45 km/h) as far as the signal. Green signal illustrates that the subsequent track is not occupied and the train may enter that particular section at the maximum possible speed. In heavily rush tracks; two other signal terminologies are also utilized. Two yellow lights show the restricted speed, and one yellow and one green light show the reduced speed. The working of our system is illustrated with an example of two trains A and B. Suppose there are two trains A and B on the same track, As the GPS co-ordinates of the signal post are fixed, we directly encode those positions in the module so that when the train A which is ahead of the train B crosses the signal position and signal is changed to red, the signal which is changed is directly fed into the train B using GSM module and we can show the current signal of the signal post on a screen in the locomotive. In this way it is helpful for loco pilots to observe the signal during bad weather and low visibility conditions. III. PERFORMANCE EVALUATION In this section, experimental setup, hardware details, results and their analysis are provided. A. Experimental Setup Main module used in this work is SIM 908 Module, which has GPS, GSM and GPRS combined and Arduino UNO board. Arduino UNO is a microcontroller board based on ATmega328 as shown in Figure 3. It has 14 digital input, output pins and 16 Analog pins. It can be communicated to the computer via USB cable. All sensors and communicating devices are connected using microcontroller. SIM908 is integrated with a GSM-GPRS technique that is of high performance and a GPS engine as shown in Figure 4. The GSM-GPRS technique is a quad-band module that works on different frequencies like EGSM 900MHz, PCS 1900MHz, DCS 1800MHz, and GSM 850MHz. SIM908 utilizes GPRS multi-slot class 10 and class 8 and CS-1 to CS-4 coding schemes are employed herein. The experimental setup is shown in Figure 5. Figureà trains are subsequently calculated using GPS coordinates and warning system as shown in Figure 6, 7 and 8. Signaling of the train is also achieved successfully. Real time results of GPS coordinates on the map are shown in Figure 9 which shows the effectiveness of the proposed system. IV. CONCLUSION AND FUTURE WORK The proposed system provides the promising and reliable output. The tracking system using GPS and GSM modules may enable the rail department to safeguard the human life from accidents. The position and the current status of the signal in the signal post are directly transmitted to the train and can be displayed on the screen. In future this work may be extended for automation and driver-less train using GPS, GSM and GPRS techniques. Real time data of moving trains like speed and current location may be tracked and monitored at the control station. Such real-time information can be utilized for system upgrade so as to avert accidents due to natural calamities such as landslide and cyclone. An additional geographic sensor and interface with geographic information system may be required for the same. Furthermore the analysis of such data is bound to provide us with much deeper insight as to why such accidents take place. Learning from such an analysis can be applied to the system, further improving it over time as their data is collected and studied. REFERENCES [1]. N. V. Chawale, P. J. Kadam, S. N. Khodke, P. L. Thakre P.S. Borkhade, K. A. Dhobale ZigBee and RFID Based Train Tracking System International Journal of Thesis Projects and Dissertations, Vol. 2, Issue 2, PP (1-3), April June 2014. [2]. G. K. Dwivedy performance of new technologies in signalling systems on indian railwaysIRSE, 2012. [3]. S. Uvaraja and R. V. Prashanth Advanced Pre-Warning System (Railways) International Journal of Engineering and Technology, Vol. 4, No. 2, April 2012. [4]. R.I. Rajkumar, P. E. Sankaranarayanan, and G.Sundari Real Time Wireless based Train Tracking, Track Identification and Collision avoidance System for Railway Sectors International Journal of Advanced Research in Computer Engineering Technology (IJARCET) Volume 3, Issue 6, June 2014. [5]. T. Takashige Railway technology today 8 signaling systems for safe railway transport japan railway and transport system 1999. [6]. K.vidyasagar, P.S. babu,R.R.Prasad, Train Tracking and the signaling system using IR and RF technology International Journal of Computer Applications (0975 8887) Volume 119 No.23, June 2015. [7]. R. Takagi Synchronisation control of trains on the railway track controlled by the moving block signalling system Vol. 2, Issue 3, pp.130-138, September 2012. [8]. Q. Gu , T. Tang and F. Ma Energy-Efficient Train Tracking Operation Based on Multiple Optimization Models IEEE Transactions on Intelligent Transportation Systems, Vol. 17, Issue 3, pp. 882 892, March 2016
Thursday, September 19, 2019
Lockes Views On Education Essay examples -- essays research papers
John Locke had a number of major influences on society in general, but his influences on education have stood the taste of time. His idea of Tabula Rasa, his introduction of empiricism, and idea of the use of all senses are all objectives that are used in schools today. à à à à à The idea of Tabula Rasa is basically defined as a ââ¬Å"blank slate.â⬠Locke believed that everyone is born with a clean mind, a supposed condition that he attributed to the human mind before ideas have been imprinted on it by the reaction of the senses to the exterior world. à à à à à ââ¬Å"Thus the first capacity of human intellect is that the mind is fitted to receive the impressions made on it; à à à à à either through the senses by outward objects; or by its own operations when it reflects on them. This is the à à à à à first step a man makes towards the discovery of anything...â⬠à à à à à à à à à à à à à à à à à à à à à à à à à -John Locke (On Ideas as the Materials of All Our Knowledge) Locke considers the new mind as white paper or wax. It is to be moulded and formed as one pleases. It is up to the teacher to insure that it is formed the correct way and that there is no inate knowledge. This is incorporated into education the grade system. Children start out in kindergarten or pre-school with a blank slate; we start teach...
Wednesday, September 18, 2019
Road to Valley Forge :: essays research papers
The Road to Valley Forge à à à à à The book that I choose to review was The Road to Valley Forge, How Washington Built the Army that Won the Revolutionary War, written by John Buchanan. This is a book that covers the beginning of the revolutionary war in America from the time that George Washington is selected as commander-in-chief of the army, until his army enters winter quarters at Valley Forge. It encompasses the weather conditions that Washington and his army had to endure as well as the scrutiny that Washington always seemed to be under. The scrutiny came from people in congress who believed that the war was going to be quick and wanted a large, decisive battle fought. à à à à à George Washington took control of the revolutionary army on 2 July 1775. He took over at outside of Boston, before this his experience was limited to wilderness travel and soldiering. His soldiering experiences had been mainly for his home state of Virginia. The first battle that was of significance in this book was the Battle of Long Island. At this battle Washington and the rebel army are soundly defeated by General Sir William Howe and the British army. After this battle was fought Howe did not follow-up the victory with quick action as the Americans retreated. It could be said that if Howe and the British would continued the attack this rebellion could have been put down right away. This will not be the first time that Howe fails to do this, and it will lead to him being replaced later in the war Sir Henry Clinton. Even though his army was thoroughly defeated Washington is able to get his troops off of Long Island back to Manhattan in the middle of the night, this will also not be the last time that Washington is able to get his à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à 2 army out of harms way. The author briefly discusses the troubles at Kipââ¬â¢s Bay and Fort Washington. à à à à à à à à à à The next subject that Buchanan goes into is Washingtonââ¬â¢s retreat through the state of New Jersey. The key part of this retreat is when Washington crosses the Potomac River he collects all boats from both shores of the river. He later uses them to cross the icy Potomac to win the very important Battle of Trenton. The importance of this battle is that raised the morale of the soldiers. After this Howe decides to go into winter quarters.
Tuesday, September 17, 2019
Native Americans vs. American Settlers Essay
There are a number of dissimilarities between the Native Americans and the American Settlers. Although the Native Americans wanted to live in peace with American Settlers, their cultural differences led to warfare. This essay will compare and contrast a couple differences of these two cultures. I will discuss both groups opinion on land and resources. Then, I will explain both groupsââ¬â¢ views on Nature. Native Americans Conserved land and viewed its resources as scared, while the Americans felt as though the land was nothing but opportunity for their colonies. While hunting, Native Americans used every piece of the animal from the hide to the bones and everything in between. They respected the land and believed it belonged to mother-nature, so it could not be owned or sold. On the other hand, American settlers viewed the land and its resources as limitless opportunity. ââ¬Å"It is little wonder they went land-mad, because there was so much of itâ⬠(Steinbeck 69). They invaded the lands claiming territory, killing buffalo, and plowing through the grassy plains to make room for their crops. American settlers often fought to try to obtain land that they thought was free for the taking, whereas, the Native Americans tried to live in harmony with nature and its inhabitants. In the movie, We Shall Remain, Native Americans would try and negotiate with the Americans only to be threatened with the violence of warfare. Native Americans believed the creator put everything on this earth to live together and be used respectfully. They accepted nature and did not try to change it. The American settlers, however, didnââ¬â¢t hold the same beliefs. ââ¬Å"The railroads brought new hordes of land-crazy people, and the new Americans moved like locust across the continentâ⬠¦ Coal and copper drew them on; they savaged the land, gold-dredged the rivers to skeletons of pebbles and debrisâ⬠(Steinbeck 69). They viewed nature as nothing more than an obstacle and commodity. American settlers engaged in warfare, defending what they thought they discovered, to claim as their own. They were land hungry and the more they got, they more they wanted. American colonist never tried to understand the Native Americanââ¬â¢s culture. Instead they tried to push their European based ways onto them. This, in turn, caused a number of wars between the two. Sometimes itââ¬â¢s better to agree to disagree rather than to wage war on what is believed to be right/wrong. Works cited Steinbeck, John. ââ¬Å"Explaining Relationships: Americans and the Land. â⬠the Composition of Everyday Life. 3rd ed. Boston: Wadsworth, 2010. Pgs. 68-70. Print. We Shall Remain. Dir. Ric Burns. Perf. Benjamin Bratt, Alex Meraz, Dweir Brown. PBS Home Video, 2009. Film.
Monday, September 16, 2019
Stock-Flow Trap in US Economy
The model used in analyzing the article is the Balance of payments model. This model determines payments from one particular country to all the others. It condenses all economic transactions that a country performs in a year. The countryââ¬â¢s exports and imports of commodities may exist in forms of goods, services, financial capital, and transfers. This moulds the countries balance of payments. All transactions resulting to any payment or liabilities from debit holders and credit holders are indicated here. The calculation for the balance of payments involves the Current Account, derived from movement of goods and services; the capital account, consequent to capital transfers and the attainment and the discard of non-financial assets that failed to be produced; and the financial account, which accounts for movement of investments. This model involves the economic ideas found in the article like balances between investments both locally and internationally. It also involves the key reason for the high amount of critical stock of US. This model also touches the issue regarding dollar as a prime currency for both US and the world. However, to further explain the model and relate to the article of Eatwell and Taylor, the American Stock-flow Trap, we will need to define another macroeconomic concept, the liquidity trap. (Catherine) ââ¬Å"When expected returns from investments in securities or real plant and equipment are low, investment falls, a recession begins, and cash holdings in banks rise. People and businesses then continue to hold cash because they expect spending and investment to be low. This is a self-fulfilling trap.â⬠(Mike Moffatt) In the article, the stock-flow trap is the main subject for discussion. ââ¬Å"The stock-flow trap happens when stock/flow ratios become large, players in the financial markets first become suspicious and then may very rapidly flee into liquid holdings as they sell all the liabilities of the economy in question.â⬠(Eatwell and Taylor) The stock-flow trap creates the very foundations for liquidity trap to happen. This condition, as stated in the article, is also likely happen in stable economies like the US. During the 1980s budget deficit is $153 billion. This deficit gradually increases to $233 billion during the 1990s. At present, trade deficit still subsists in US economy. From 1980s, several administrations came out with plans to reduce budget deficit but these discrepancies prove that the policies were not that effective. Among these are the present policies of US President George W. Bush. Based on the article written by Heffner titled ââ¬Å"Bushââ¬â¢s Economic Policies Pt. 1â⬠the US government estimated a $5.6 trillion surplus. But upon office, Bush came up with a towering $2.8 trillion deficit. Because of this budget deficit, the federal government made amends through foreign borrowings that lead them deeper into the arms of stock-flow trap. By having these kinds of policies, the US government failed to eliminate the problem regarding critical stocks. Based on this observation, we can say that the US economy has not significantly change from the last two decades. Thus, a stock-flow trap still bounds to happen. (Heffner) References Catherine, L. M. (August 19, 1999 ). On the Causes of the US Current Account Deficit. Retrieved December 11, 2006, from Peterson Institute for International Economics Web site: http://www.iie.com/publications/papers/paper.cfm?ResearchID=353 Heffner, J. (Mar 21, 2003). Bush's Economic Policies Pt. 1. Retrieved December 11, 2006, from Jobs and the Economy Web site: http://www.mikehersh.com/Bush_Economics_Pt_1.shtml Eatwell, Taylor, J., L. (1999, September).The American Stock-Flow Trap. Challenge. 34-49. Mike Moffatt. ââ¬Å"What Happens If Interest Rates Go to Zero?â⬠à 2006.à The New York Times Company. december 12 2006. ;http://economics.about.com/cs/interestrates/a/zero_interest.htm;. ;
Sunday, September 15, 2019
My Family – Dad
Im a kind of person that really cares for his family. I have a great education from my father and thats why I admire him for many reasons. Hes a generous person, a great businessman, and a really good father. My dad is always helping people around him. He really cares for his family and he works hard to provide for his extended as well as, immediate family. He supports anyone that has problems with money, police, or any other kind of problem. He is the godfather for everyone in our family. My father is always here when they need them. In the same way, he has also helped his friends. For example: when his friend lost everything, he offered unlimited support to get him back on the right track. He thinks that no one else can do it. He always works with the men word with his friend. He doesnt take a check or title from them for the safety of his money. He is a generous person. My dad had a horrible childhood. When he was three years old, his father passed away. He had to support his family, so he sacrificed himself for them. He left school at the age 12 years old and worked for $ 20 a week. He had a lot of bad memories from his childhood as a consequence; it made him stronger and gave him experiences. He succeeds with the years and he got a lot of business experience. Now, he knows how to handle any kind of business. He could start any business and be sure that he succeeds on it. For example: He bought huge land next to the best tourist area in Casablanca for lot of money. Everyone was thinking that it was a big mistake but it wasnt. After many years, the land value has tripled. I could say that he has the feeling of business in his blood. My dad is a good father for our family. He sends his children to the best school and he doesnt care about the money. He is a powerful father, because he gave the education that he didnt get when he was younger. He made himself clear when something is wrong. If I do same thing wrong, he talked to me one time. He was always there when I need him. For example, I failed my high school two times normally. If he had the Muslim mind, he would let me leave the school, but he didnt. He always gave me a new chance. He gave me the energy to believe in myself and start again. He gave me the opportunity to study in United State of America, support my tuition and my living expenses. There are a few fathers in the world that can spend so much money for their children. In my opinion, I think that my father is the best father I could have ever asked for. I will try my best to be like him by being helpful to my children and people around me. I hope to be able to send my children though college and give them the knowledge needed to successful in society.
Subscribe to:
Posts (Atom)