Thursday, October 31, 2019

The Epic of Gilgamesh Essay Example | Topics and Well Written Essays - 750 words - 1

The Epic of Gilgamesh - Essay Example Gilgamesh basically describes the reason as to how and why Gilgamesh was thought of as a role model for the coming classic poems of the time. It has brought to the notice the beauty tangents and the power of the relationship that Gilgamesh and Enkidu had between them. Within the Epic of Gilgamesh, the bond which was demonstrated between Gilgamesh and Enkidu is distinctive in its own right. The reason for this is that the two an adversarial relationship with one another. Being a fable of love and that too in its truest form, Gilgamesh is an epic without a shadow of a doubt. It has involved lingering grief which has caused pivotal changes to take place within his character. Gilgamesh is a story of a person who is both respected as well as feared at the same time. He loves and shows hatred; he is one person who lives life to the maximum possible levels. Even though Gilgamesh’s voyage is larger than life, yet somehow or the other it ends up with death. The fate of mankind is expos ed through Gilgamesh and thus the undeniable factor of change gets its manifestation as well. Gilgamesh exhibited true power before the arrival of Enkidu (Kovacs 1989). There was no other human being who had equal match when it came to Gilgamesh himself. He showed his personal liking to glory and power and the best part was that he boasted with regards to the very same. He abused power in addition to showing off his attitude (and arrogance). The city of Uruk went into a state of injustice and people were ferocious all round. However Gilgamesh did not mend his ways and continue to display his wrath and power to all and sundry. It was after the death of Enkidu that Gilgamesh tried his levels best to explore the ways to reach immortality as he attempted to cross the ocean. He wanted to find the same in a pretty dire fashion. He did his best to carve out a life which had immortality written all over it. He continued with his expedition in an out and out fashion. His state of being like this was in essence entirely different from the arrogance that he showed at the starting of the epic itself. Thus he transformed into a scary person more than anything else. Also the slain of Humbaba changed Gilgamesh in entirety (Foster 2005). Since Humbaba was considered evil right from the onset, a number of people who were residents of Uruk started to fear Gilgamesh. Some people would reckon that Gilgamesh himself is a representation of evil but then again there could be debates in the wake of such a proposition. The fact that he used to have sex with the virgins, going about doing things on his and offending the gods at his own free will is a manifestation of what his personality was in essence. Gilgamesh was able to pen his name as a successful hero. However the price he had to pay for it is something totally different. Much could be written about the very same.  The amount of loss and suffering which was eventually put down on the part of the people, perhaps he could have m ade an effort to turn things around and do something different. As a matter of fact, Gilgamesh and his brother were able to achieve what the rest of the people could not even think of in those times. Gilgamesh and Enkidu were able to capture the world under their feet but the untimely death of Enkidu changed everything. Gilgamesh started to understand that he was just a human

Monday, October 28, 2019

Effects of U.S. Policy in the Middle East Essay Example for Free

Effects of U.S. Policy in the Middle East Essay The end of World War II was a mark and a start of a new era for mankind and the inhabitants of this planet. It completely changed the way of life of the people as well as the relationship between states. In the process of establishment of new world order where US emerged as the authoritarian state due to its strong position in the world post world war, every state either parted or joined alliances with the US. Every state has witnessed the mass destruction caused by the nuclear attack from the US on Hiroshima and Nagasaki, thus, that helped the US to establish itself completely as the super power of the world and since then its foreign policy has not been limited and spread to states even way far away to Vietnam or now even in the Europe where the Missile Shield program has already ignited yet another cold war scenario between the US and Russia. (Light Groom, 1985) The aim of this paper is to present the research carried out on the effect of the U. S. foreign policies and actions in the Middle East. The paper focuses specifically on the geographical politics as well as provides a general analysis of the different changes brought about by the policies adopted by the U. S. lobby. History Revisited With the culmination of World War there was a need to reestablish the Jews unsettled in Europe and settle them in an area where ideologically they will feel at home. This place could only be the legendary and prophesized Biblical area in the east of Mediterranean inhabited by Palestinians. During the World Wars it was also observed that Muslims supported Germans and they also needed to be properly â€Å"sized up†. (Levinson, 2008) Therefore based on historical evidences that there existed Jewish state in the area and holy scriptures have prophesized the reemergence of a Jewish state the whole theory was crafted and drafted in a way that an ideological Jewish state could emerge on world map. As outlined above US emerged the sole international force and it was backed by another so-called super power Russia in the creation of a Jewish state in the name of Israel. The state was promptly recognized by international comity of nations. Back in US the authors of Israeli nation know in their heart that the area is surrounded by Arabs who are all divided on the basis of their geographical locations and also the fact that the Saudi Arabia was crafted by Britishers, and as such though being large in area they would not go against the creation of Israel. (Ries, 2003) The divide and rule policy for Muslims paid dividends and initially their reaction were not so strong that it could create ripples in the US policy. US started fully supporting the Israel in all respects i. e. economically, armaments, political. The powerful Jewish lobby which started dominating the US politics after World War as majority of intellectual prisoners were Jewish who wholeheartedly supported US to buy freedom and also work towards a cause. Slowly the US foreign policy the authors, major authors for which were Jews started revolving to a single point that Israel must remain in existence and all those who are against the existence if Israel must pay the price. On the other hand slowly US policy also started reflecting factor i. e. back door diplomacy to soften the stand on Israel by the Arab hardliners. These needed twisting arms by creating an image of Israel in which it was proved that it is simply a might which has to be seen with fright. The Arab- Israel wars were all proving factors that Israel army is invincible. (Altunisik, Spring 2005) Over passage of time Arab rivalries were cultivated to fortify Israel and one of the most important cases was of Iraq. Saudis were supplied with AWACS for surveillance of Saudi Arabia and it was an irony that Israeli planes flew over its air space for hours both to and fro and went into Iraq, raided the Iraqi nuclear plant and they were not detected by any surveillance machinery. (Levinson, 2008) This was partly a success story of US foreign policy in which Saudis were directed to be careful about Iran but feel no threat from Israel. Critical Analysis These entire years the Jewish lobby in US was economically getting stronger and their presence in the world economic scene was absolutely critical as the world started becoming a global village and the dependency on business started getting more and more. The indulgence of business community in political fund raising became a swaying factor for all the presidents of United States and also other countries. Elections became a business venture which need to be funded and the funds could come from business community – the result was dictating the policies by businesses. Since the election campaigns in US are the costliest in the world therefore more indulgence of business community about their terms for financing the event. That is why we see that over the years the US government shave started looking towards Israel as an integral part of its foreign, economic and armament policy and Israel’s violations of human rights and violations of agreements with Palestinians are ignored or brushed aside. (Levinson, 2008) The causes of unrest in the Middle East are historical, religious, economic and geo-political. Ancient history and ancient civilizations can serve as a framework for understanding some of the existing enmity. Iranians and the Iraqis have been fighting for more than 3,000 years. However, the current unrest in the Middle East is the result of Western ethno centrism and colonialism (covert and overt), combined with religious and sectarian conflicts. The impact of US interference in the Middle East cannot be overstated. (Hafez Kenny, 2000) Indeed, the term â€Å"Middle East† is an artificial term that has no meaning except in the context of its geographical relationship to Europe. The most active period of Western interference in the Middle East was after the collapse of the Ottoman Empire and up to the present time, although there were substantial economic, military, and political interests in the Middle East for the previous two hundred years. Prior to World War I the primary interest of the Western powers in the Middle East was geo-political, mostly concerned with shipping lanes Mediterranean Sea, Black Sea, Suez Canal and Red Sea for military and economic gain. Following World War I, the primary interest of the US in the Middle East became oil, although Great Britain was already actively involved in the exploitation of Iranian oil as early as 1908 (Bostock, 2008). The possibility of large deposits of oil in Iraq had already been recognized prior to World War I (Siegman, 2008). Thus, the partitioning of the areas that had made up the Ottoman Empire and German colonial holdings, including Iraq, Jordan, Palestine, Lebanon and Syria, following World War I had the smell of oil around it. Great Britain and France, with the support of the USA, used the League of Nations to obtain mandates, colonial power, over most of the Middle East. Unfortunately, along with the exploitation of oil came the oppression of the people of the Middle East, the results of which are evident today in the lack of democratic governments in the area. Each time a country tried to become a democracy, the implied threat of the possibility of oil being withheld from the military machines of the Western powers led to the destruction of the democratic elements and to the installation of kings and dictators that served the interests of Great Britain, France and the USA (Linklater, 2000). The distortions in policy are evident from the fact that on the one hand Israel is allowed to produce arms, become nuclear and amass weapons but this is not allowed to Iraq and rather the whole Iraqi government was invaded, toppled and destructed by US. Then enters a new dimension in the international and US foreign policies all led by US. This is the Iranians toppling the Shah of Iran and creation of an Islamic Iranian state led by Ayatollah Khomeini. Initially it was felt that with the passage of time the Iranians will be looking towards Shah for finishing the Islamic rulers. However the myth soon lost its charm as over a period of time the Islamic Iran became consolidated and their presence also started motivating the masses of other neighboring countries (Levinson, 2008). US soon realized this situation and attempts were made mobilize uprisings, than economically cripple Iran and finally direct overthrow of government. All these attempts failed. Iranian government started benefitting from these failures rather capitalized all these towards their consolidation as they started mobilizing public opinions through two slogans â€Å"Death to Israel† and â€Å"America the great Satan†. These slogans were infused into the new generations by making the Tehran University as the main hub of all demonstrations and activities. The only way left was to impose economic sanctions on Iran. US led sanctions isolated Iran but being an oil exporter it was able to circumvent the sanctions (Altunisik, Spring 2005). The hatred increased with the passage of time and Iran became more vocal against Israel as it believes that US policy was dictated by Israel and Israel should be wiped of the globe. The Iranians in order to prove their ideological war against these two counties started supporting Palestinian faction Hamas openly at war with Israel and also supported Syria and its allies in Lebanon who are against Israel (Siegman, 2008). The Iranian diplomatic moves were all against the US stand on Israel and there is a great danger that if the Iranians succeed in their diplomacy and their support makes Syria and Lebanon politically and militarily strong than there is all the likelihood that other nations in the neighborhood would soon be pressurized by their people to follow suit (Frankel, 1969). This dilemma in the US policies is a thaw which needs to be taken care of as the war between Hezbollah and Israel broke the myths about the Israeli militarily might and this is an alarming situation for the architects of US foreign policy. This situation was partially addressed by Mr. Bush who declared Iran as part of â€Å"evil nexus† and also declaring Iran as a country aspiring to become nuclear state militarily. As detailed above the US policy is primarily focused on Israel to be recognized by its neighbors as a formal independent nation and above all its might should also be accepted by them. As it was also state above that back door diplomacy was also used in the region to achieve the above objectives

Saturday, October 26, 2019

The Computer Resource Management System

The Computer Resource Management System A Computer Resource Management System is used to get up to date information of all the computer resources in an organization. It is basically a management and informative system. This system helps the organization to overcome the complexity in tracing out all the computer resources of the organization by presenting customised reports, there by helps in effective and timely utilization of hardware and software resources. Computer Resource Management System uses the Enterprise JavaBeans Version 1.1; its the component model for the enterprise applications. Enterprise JavaBeans combines server-side components with distributed object technologies such as Java RMI to greatly simplify the task of application development. The EJB automatically takes into account many of the requirements of business systems: security, resource pooling, persistence, concurrency and transactional integrity. One of javas most important features is platform independence. Since it was released, Java has been marketed as write once, run anywhere. Enterprise JavaBeans is not only platform independent -its also implementation independent. Its like JDBC API runs on a Windows machine or on a Unix machine, it can access any vendors relational database that has a JDBC driver. Ideally, an Enterprise JavaBeans component, an enterprise bean, can run in any application server that implements the Enterprise JavaBeans (EJB) specification. That is we can develop and deploy EJB business system in one server, such as BEAs Web logic and later move it to a different EJB server, such as IBMs Web Sphere or Gemstone/J. Implementation independence means that business components are not dependent on the brand of server. Computer Resource Management System uses Oracle 8i as the back-end RDBMS. Oracle 8i is actually a fully Internet supported database system. Oracle 8i perfectly handles the ACID Transactions. A transaction is the execution of a unit-of-work that accesses one or more shared resources, usually databases. A unit-of-work is a set of activities that relate to each other and must be completed together. The ACID properties are nothing but (Atomic Consistent Isolated Durable) properties A transaction to be atomic, it must execute completely or not at all. Consistency refers to the integrity of the underlying data store, consistency is ensured by seeing that a transaction is atomic, isolated and durable. Isolated refers to allowing a transaction to execute without interference from other processes or transactions, i.e., the data that a transaction accesses cannot be affected by any other part of the system until the transaction or unit-of work is completed. Durability means that all the data changes made during the course of a transaction must be written to some type of physical storage before the transaction is successfully completed. This ensures that the changes are not lost if the system crashes. Apart from handling the ACID properties Oracle 8i has higher security level and web compatibility features. 2. Problems of Present System: As of now the resource management in SOFT PRO SYSTEMS LTD is done manually. If an employee intends to know the information regarding the resources pertaining to computers or components and their present and accurate information in the organization, as of now it is being done manually which consumes a great manpower and the process is time consuming. The problem of maintaining the bulk database can be solved by atomizing the resources in the organization, which can be of great help to all the administrators, employee and the management members. Some of the frequent occurring problems in the present manual system are as follows: Finding the current status or position of a component in the organization is a time-consuming process. The Manager has to wait for the manual reports from the development department to know the current status of the resources. In the present system there is no security for the details of the resources as any user who is not authenticated to view the records may see them. To view the details of a computer and to know what are the components that are assigned to it, can be done only by a manual checking of that computer for the hardware and software components is a tedious process. The users of the organization require various reports to be generated in an easy format, which is not so easy when done manually. The Manager may get problems in finding out a user details in hundreds of records. 2.1 Need For Computerization: Maintaining the information regarding all employees, components and computers at single or multiple locations give rise to many problems like: Difficulty in retrieval of data in desired manner. Checking the uniqueness wherever it is required. Availability of information in this manner is subjected to damage. Providing security is also difficult. One way to overcome all these difficulties is to store all the information in the computer. The computerization helps the users a lot. The user can get information in desired manner. Data retrieval is also easy and fast. This also restricts the users to enter invalid data and reduces the burden on the user. 2.2 Benefits of Computerisation: A computer based information system is usually needed for the following purposes. Greater Processing Speed: Using computers inherent ability to calculate, sort; retrieve data with greater speed than that of the human doing and can get results in less time. Visual Basic guaranties for the faster query processing thus we are satisfied with Visual Basic itself supporting in this direction. Better Accuracy and Improved Consistency: The computer carries out computing steps including arithmetic accurately and consistently from which really human is escaped which yields more fatigue and boredom. Cost Reduction: Using computerization we can do the required operations with lower cost than any other methods. Hence by computerization we can reduce the cost drastically. 3. Modules of CRMS: Of course there are many other systems which can maintain all the resources of the company, but there are some defects and difficulties in those systems regarding security and HR dependent issues. The Computer Resource Management System mainly consists of 6 modules and a brief explanation of those is given below. (Overview of Metadata Annotations and EJB 3.0 Bean Files, 2009) 1 Components: Each and every component that is either related to software or hardware will be assigned with a unique number and entered in to a folder or shelf. Whatever goes out will be deducted from the shelf and must be entered either to bin, recycle bin or to a computer. For every component appropriate entry should be made. 2 Computers: Computers will be assembled using the shelf parts. Every computer should be given a unique number. The details of the computer will be entered including its hardware and software profiles with their parts. The computers may be servers, standalones and clients etc. 3 Bin: The damaged components, which are not repairable or replaceable, will be sent to this bin. 4 Recycle Bin: The repairable and replaceable parts will be kept here. A time report is given like when a part is submitted for repairs or replacement and expected back time and able to give warnings of delays etc. 5 Status: The status gives the statistics of the shelf, bin, recycle bin, computers. The status gives the present position of the component where it is situated in the organization. Basing on the status the components are used in different transactions. 6. Search / View: The users can search or view the information of different resources based on their unique number given to them. The proposed system will be designed by using Java beans as front end and Oracle 8i as RDBMS of the system that is oracle as back end of the system. Hyper text mark-up language is used to hyper text the information which can be moved from one platform to other, and JDBC concepts will be used. 4. Analysis of the Project: System Planning is one of the important items to be considered before actually beginning the project. Planning is performed on the issues like defining Life Cycle Model and an organizational structure project, configuration management, quality and validation activities. In the process of the System Planning various phase-dependent tools, techniques and notations are determined. Preliminary cost estimates for the system development and preliminary development schedules are established. Preliminary estimates of the computing resources required to operate and maintain the system are developed, glossary of terms are prepared. 4.1 Information Gathering: Information relevant to the Computer Resource Management System of Laila Infotech is collected from the Laila Infotech Limited and the finance department of the company. The information regarding company activities is gathered from the companys website www.lailainfotech.com. 4.2 Feasibility Study: An initial investigation culminates in a proposal that determines whether an alternative system is feasible than the present candidate system. To do feasible study we have to do Economic, Technical, Behavioural feasible studies. 4.2.1 Economic Feasibility: It is the most frequently used method for evaluating the effectiveness of a system. It is also called as cost/benefit analysis. In this project Computer Resource Management System, for the development of the candidate system the costs that have to spend is the computer resources like the required software and hardware that supports the software in an effective and efficient manner and the money to be paid to the developers. As the company itself is a development centre all the resources are in the company itself and no extra cost are spent for Computer Resource Management System. Hence our candidate system production is economically feasible. 4.2.2 Technical Feasibility: Technical feasibility centres on the existing computer system (software/hardware) configuration and good software facilities in such a way that any new candidate system can be implemented without a large alteration of the lab nut with slight modification of the existing system. Hence our candidate system production is technically feasible. 4.2.3 Behavioural Feasibility: People are inherently resistant to change. Our candidate system is developed in such a way that it is very user friendly, easy to learn how to work with and there is also not much resistant to this package from the staff side also. As the company is basically a development centre it will be very easy for the employees of the company to learn about the developed candidate system. Hence our candidate system production is behaviourally feasible. 5. Conclusion: This project aimed at developing a Computer Resource Management System (CRMS) is a total management and informative system, where up-to date information of all the computer resources in the company can be provided. It helps the companies to overcome the difficulties in tracking the resources of the company by presenting customized reports, which helps the company to effectively and timely utilise hardware and software resources. References: David Austin., (2000), Using Oracle8, Eastern Economic Edition, 2000 Edition. Overview of Metadata Annotations and EJB 3.0 Bean Files, Retrieved march 15, 2009 from http://e-docs.bea.com/wls/docs100/ejb30/program.html#typical_steps Patrick Naughton., and Herbert Schildt., (1999),The Complete Reference Java 2, TATA McGRAW-HILL., 1999 Edition. Pressman, R., S., Software Engineering: A Practitioners Approach, seventh edition, Retrieved 06 march, 2009 from http://www.rspa.com/spi/ Roman, Ed.,(1999), Mastering Enterprise Java Beans and the Java 2 Platform, Enterprise Edition, WILEY., 1999 Edition. Tom Valesky., (2000), Enterprise JavaBeans, Pearson Education Asia, 2000 Edition. Project proposal: 1. Introduction: A Computer Resource Management System (CRMS) is used to get up to date information of all the computer resources in an organization. It is basically a management and informative system. This system helps the organization to overcome the complexity in tracing out all the computer resources of the organization by presenting customised reports, there by helps in effective and timely utilization of hardware and software resources. A transaction to be atomic, it must execute completely or not at all. Consistency refers to the integrity of the underlying data store, consistency is ensured by seeing that a transaction is atomic, isolated and durable. Isolated refers to allowing a transaction to execute without interference from other processes or transactions, i.e., the data that a transaction accesses cannot be affected by any other part of the system until the transaction or unit-of work is completed. Durability means that all the data changes made during the course of a transaction must be written to some type of physical storage before the transaction is successfully completed. This ensures that the changes are not lost if the system crashes. Apart from handling the ACID properties Oracle 8i has higher security level and web compatibility features. 2. Background of the project: The purpose of proposed system is to provide a computer based system which can manage total resources of an organization. In previous systems the resource management was done manually, which wastes so much of time and the man power. The most important thing is the lack of security in previous resource management system. The atomized management system is efficient enough to maintain the resources. The development of the proposed system is needed for so many reasons such as security aspects, ease of use for the employees of organization. The disadvantages of the paper based or existing system can be rectified by implementing the proposed system. The disadvantages of paper based system are mentioned below: Finding the information about a component in the system is difficult and time taking course of action. In the existing system any user, who is not authenticated can also view the information and change it, which leads to poor design and implementation of the total system. A lot of manual work is required in finding and generating the reports about various sections in the organization, because of this work people can become irritate and get bored of doing the work. The employees of the organization must produce the reports in a simple and understanding way, generating of such reports is not that easy to do. Authentication of a user cannot be given in the existing system, and there is so much difficulty in taking out and recovery of data in a preferred manner. The present system is going to provide the security to the database, and atomizing the system to manage the resources in the organization by using the enterprise java beans, oracle 8i as front end and back end of the system. To develop this system a good knowledge about life cycle model of software development, different functions of the organization and about marketing strategies is required. The knowledge of various reports that are to be generated which are helpful to different branches in the organization is required. In the development of the proposed system the different phase dependent tools, methods and document specifications are determined. (Roman, 2002) 3. Aims and objectives: Aim: To design an automated computer based system and to get up-to-date information about components which helps organizations to conquer the complexity in tracking all the resources of the company by generating reports that are more easily understandable and to improve security for database. It provides proper initiatives and approaches that need to be undertaken, thereby avoiding the huge cost of implementing a new system or by simply adapting to one currently deployed. Objectives: The main objectives of this study are as follows: The main objective of Computer Resource Management System is to provide an automated system to maintain the resources of the company. To provide a user friendly and multi-user interface for handling the application. To provide a user authentication and different interface depending upon the type of user logged in. To provide maximum level of security for the data. To provide the necessary reports to various users in time. 4. Intellectual challenge: 4.1 System Architecture: 4.1.1 Physical Architecture Model: 4.1.2 Layered Architecture: Database Layer Contains the data and database-related objects like stored procedures, triggers, packages, etc. Application Layer Contains the objects addressing the business logic; Most of the middle-level Java objects will be here in application layer. Web Interface Layer It will be on the web server; It contains the web pages (JSPs) of the application which will interact with the front-end browsers Client Layer Contains the web browser which interacts with web server 4.2 DATAFLOW DIAGRAM: LocID 1 User Authentication USER ID AND PASSWORD Location User Profile Users 2 Master Administrator Setup 5 Normal User Setup 3 Hardware Administrator Setup 4 Purchase Manager Setup 4.3 System Design: SYSTEM DESIGN phase follows system analysis phase. Design is maintaining a record proof design division and providing a blueprint for the implementation phase. Design is the bridge between system analysis and system implementation. System design is transition from a user oriented, document oriented to programmers or database personnel. The design is a solution, a how to approach to the creation a new system. This is composed of several steps. It provides the understanding and procedural details necessary for implementing the system recommended in the feasibility study. Design goes through logical and physical stages of development, logical design reviews the present physical system, prepare input and output specifications, detail the implementation plan, and prepare a logical design walkthrough. (Dennis, A. Wixom, B. H. (2000)) The database tables are designed by analyzing various functions involved in the system and the format of the fields is also designed. The fields in the database table should define their role in the system. The unnecessary fields should be avoided because it affects the storage areas of the system. Care is to be taken to encode the lengthy names. Then in the input and the output screen design, the design should be made user friendly. The menu should be precise and compact. 4.3.1 Objectives of Design System design is like a blue print for a building, it specifies all the features that are to be in the finished product. Design states how to accomplish objectives determined in the analysis phase. Logical Design The design of an information system produces the details that state how a system will meet the requirements identified during systems analysis. This stage is login design. Physical Design The process of developing program software is referred to as physical design. In this stage the logical design elements are specified which support the business activities. The physical design ensures the system features to meet the user requirements. 5. Schedule: The above mentioned project is said to be start in March 2010 and ends on September 2010. The total duration required to develop the system is 5 months. Task no. Description Duration 1 Collect the information about the current project and conduct research to know about the previously implemented systems in various organizations 3 weeks 2 Studying the technologies used in developing the proposed project 2 weeks 4 Analyzing the outcomes of the project and draw a flowchart for the modules to be developed 2 weeks 5 Designing the typical architecture of the project and steps involved in it 2 weeks 6 Developing the project code based on the architecture and requirements 2 weeks 7 Testing and validating the designed system 2 weeks 8 Writing guidelines for end users 1 week 9 Preparing the final report of the proposed system 2 weeks 10 Possible amendments and closing up everything into a report 4 days 11 Final submission 1 day 6. Deliverables: The final result of this project is as follows. Ordinary users can do the simple operations like searching, viewing the components by some key words. Any changes in the all modules, like deleting the components, adding components will be done by master administrator, and he will be having total permissions to do any changes or modifications to the database. By using the up-to date information various reports will be generated in less time. Maximum security of database will be achieved. Atomization of system will be done and the system will become user friendly and multi user interface. Provides good trust among the customers. 7. Resources: The resources required can be summed up as: Accessing the IEEE explorer technical papers from the university library. Latest technical papers and journals about HTML, Java, Oracle 8i, and design implementations. Database system management text books to know how to implement tables in the system. Books on current trends in CRMS Collections of Library Resources and Archives Real time assessment of an online business retailer to know the current trends involved. 8. Requirements: Software and hardware: Operating System: Windows NT98 Web Server: Server side Application Software: Java Server Pages (JSP) Business Logic Software: Enterprise Java Beans. (EJB) Client Side Application Software: Java Script, HTML Data Base: Oracle 8i Client Browsers: Internet Explorer 5.0 or Netscape Navigator 4.7 Dream Weaver 3.0/JRUN4.0s Hardware: Pentium PCs with 128 MB RAM/ 20 GB HDD.

Thursday, October 24, 2019

The War On Drugs Essay -- Drugs, argumentative, persuasive

The â€Å"War on Drugs† is the name given to the battle of prohibition that the United States has been fighting for over forty years. And it has been America’s longest war. The â€Å"war† was officially declared by President Richard Nixon in the 1970’s due to the abuse of illegitimate drugs. Nixon claimed it as â€Å"public enemy number one† and enacted laws to fight the importation of narcotics. The United States’ War on Drugs began in response to cocaine trafficking in the late 1980’s. As the war continues to go on, winning it hardly seems feasible. As stated by NewsHour, the National Office of Drug Control Policy spends approximately nineteen billion dollars a year trying to stop the drug trade. The expenses shoot up, indirectly, through crime, hospital stays and such. However, people spend approximately three times as much money buying drugs as the government spends fighting against them. How can this war be won when the government has to spend so much money combating in opposition to it On top of the ridiculous cost of all the factors of the war, the availability of the illegal drugs comp...

Wednesday, October 23, 2019

The Situation of Fdi in Vietnam

The situation of FDI in Vietnam Inflow of FDI In 1987, Vietnam for the first time issued its ever first Law of FDI. Despite its relative short history, Vietnam has managed to attract a substantial amount of FDI. In relative term, Vietnam has been quite successful as compared with other countries, ranking the third recipient in the ASEAN [pic] Firgure 1: FDI Inflow into Vietnam during 2000-2010 (source GSO) Figure 1 shows the overall trend of FDI inflows in Vietnam for period 2000-2010.Together with the number of investment projects, the amount of registered capital for licensed projects were stagnant in the fourth first years of 20th century which is generally referred to as the circumstance of World Crisis period in Vietnam. Beginning the year2004, the amount of registered capital had a sign of developing and the registered capital peaked in the 2008 and dropped sharply subsequently when many multinational companies did not want to share their limited little capital as well as to fo cus on capital to reform their domestic enterprises seriously impact on Vietnamese economy.This phenomenon is most apparent in late 2008 and early 2009. Also, due to the influence of the financial crisis and the contraction of the credit markets, transnational companies are affected more or less. In 2008, merger and acquisition plans of transnational companies has declined 35%, down sharply from 2008. According to recently released statistics report of the Foreign Investment Agency also said that the implementation of FDI capital in 2011 is estimated at $ 11 billion, with the implementation of 2010 and contributed 25. 9% of the total investment of the whole society.Do not complete the plan (the plan is $ 11. 5 billion). Although only 74% compared to 2010, but this figure is encouraging in the context of global economic and domestic difficulties. The amount of registered capital increased by $ 3. 1 billion, 1. 65 times the registered capital increase in 2010 (1. 89 billion USD). This shows that foreign investors remain positive reviews about business and investment environment in Vietnam. FDI made in 2011 is estimated at $ 11 billion, equivalent to 2010 and contributed 25. 9% of the total investment of the whole society. 2. 2 Sectoral distribution of FDITable 1 | |Number of projects |Total registered capital( Mil|Implementation capital (Mil| | | |USD) |USD) | |Total |14998 |229913. 7 |88945. 5 | |1988 |37 |341. 7 | | |1989 |67 |525. | | |1990 |107 |735. 0 | | |1991 |152 |1291. 5 |328. 8 | |1992 |196 |2208. 5 |574. 9 | |1993 |274 |3037. 4 |1017. | |1994 |372 |4188. 4 |2040. 6 | |1995 |415 |6937. 2 |2556. 0 | |1996 |372 |10164. 1 |2714. 0 | |1997 |349 |5590. 7 |3115. 0 | |1998 |285 |5099. |2367. 4 | |1999 |327 |2565. 4 |2334. 9 | |2000 |391 |2838. 9 |2413. 5 | |2001 |555 |3142. 8 |2450. 5 | |2002 |808 |2998. 8 |2591. | |2003 |791 |3191. 2 |2650. 0 | |2004 |811 |4547. 6 |2852. 5 | |2005 |970 |6839. 8 |3308. 8 | |2006 |987 |12004. 0 |4100. 1 | |2007 |1544 |21347. | 8030. 0 | |2008 |1557 |71726. 0 |11500. 0 | |2009 |1208 |23107. 3 |10000. 0 | |2010 |1237 |19886. 1 |11000. 0 | |Prel. 2011 |1186 |15598. 1 |11000. 0 | Table 2 | Number of | Total registered capital( | | |projects |Mil USD) | |TOTAL |13440 |199078. 9 | |Agriculture, forestry and fishing |495 |3264. 5 | |Mining and quarrying |71 |3015. | |Manufacturing |7661 |94675. 8 | |Electricity, gas, stream and air conditioning supply |72 |7391. 6 | |Water supply, sewerage, waste management and remediation |27 |2401. 9 | |activities | | | |Construction |852 |10324. | |Wholesale and retail trade; Repair of motor vehicles and |690 |2119. 1 | |motorcycles | | | |Transporation and storage |321 |3256. 8 | |Accommodation and food service activities |319 |10523. 3 | |Information and communication |736 |5709. | |Fiancial, banking and insurance activities |75 |1321. 6 | |Real estate activities |377 |48155. 9 | |Professional, scientific and technical activities |1162 |976. 1 | |Administrative and support service activities |107 |188. 0 | |Education and trainning |154 |359. | |Human health and social work activities |76 |1081. 9 | |Arts, entertainment and recreation |131 |3602. 6 | |Other activities |114 |711. 5 | | | Table1 shows the total of foreign direct investment in each year from 1988 to early 2011 by the number of projects, the amount of registered capital and the amount of implemented capital for period 1988-2011.Table 2 gives further detailed breakdown by subsectors and by time period. As can be seen in the Table 1, the majorities of FDI inflows in Vietnam are into manufacturing in terms of the number of project register capital and implemented capital as well. Table 1, with its detailed breakdown by smaller economic sectors and by time period provides a much richer picture of the trend of FDI into Vietnam. First, within the manufacturing, while during the early part of 1990s, the majority of FDI inflows were in oil and mining sector, by the end of the last century and earl y this century, light and heavy industry sectors dominate the field. Further, while FDI in agriculture were marginal in the 1990s, now this sector account for a significant share in the total FDI both in terms of the number of projects and registered/implemented capital In the service sector, while getting smaller in relative terms, the hotel and tourism sector still remain significant. An important point is that is that in the early history of FDI, there was no FDI in many important service sectors such the construction of industrial zones, office, apartment, now these sectors start attracting significant portion of FDI inflows. 3. . Regional distribution of FDI [pic] According to official statistics by the Government Statistical Office (GSO) and the Ministry of Planning and Investment (MPI), all sixty four provinces in Vietnam have received FDI. However, the distributions of FDI across provinces are very much uneven. As shown in Figure 3, the South East region (covering Ho Chi Min h city and its surrounding provinces account for the largest share of FDI. In the North, Hanoi and neighboring provinces account for the send largest share of FDI, leaving a very small proportion for other regions.This pattern is due to the fact that Hanoi and Ho Chi Minh city are the two main economic hubs of the country. The concentration of FDI in Hanoi and Ho Chi Minh has been attributed to the increased cost of living and doing business in the two cities. This has led to a tendency that foreign investors are looking elsewhere for the investment location. In addition, the local governments in these provinces have now realized the importance of FDI and are actively attracting inward FDI in their respective regions/provinces. 2. 4 Country of origin Table 3 |Number of Projects | |Total registered | | | | | |capital ( Mil USD) | | |TOTAL |13440 | |199078. 9 | | |Of which | | | | | |Japan |1555 | |24381. | | |Korea Rep. of |2960 | |23695. 9 | | |Taiwan |2223 | |23638. 5 | | |Singapor e |1008 | |22960. 2 | | |British Virgin Islands |503 | |15456. 0 | | |Hong Kong SAR (China) |658 | |11311. | | |Malaysia |398 | |11074. 7 | | |United States |609 | |10431. 6 | | |Cayman Islands |53 | |7501. 8 | | |Thailand |274 | |5853. 3 | | |Netherlands |160 | |5817. | | |Brunei |123 | |4844. 1 | | |Canada |114 | |4666. 2 | | |China, PR |833 | |4338. 4 | | |France |343 | |3020. 5 | | |Samoa |90 | |2989. | | |United Kingdom |152 | |2678. 2 | | |Cyprus |11 | |2357. 9 | | |Switzerland |87 | |1994. 6 | | |Luxembourg |22 | |1498. 8 | | |Australia |261 | |1316. | | |British West Indies |6 | |987. 0 | | |Fed. Russian |77 | |919. 1 | | |F. R Germany |177 | |900. 2 | | |Denmark |92 | |621. 5 | | |Finland |7 | |335. | | |The Philippines |61 | |302. 3 | | |India |61 | |233. 8 | | |Mauritius |34 | |229. 2 | | |Indonesia |30 | |219. 7 | | |Bermuda |5 | |211. | | |Italy |40 | |191. 9 | | |Slovakia |4 | |147. 9 | | |Cook Islands |3 | |142. 0 | | |United Arab Emirates |4 | |128. 4 | | |Chanel Isl ands |15 | |114. | | |Bahama |3 | |108. 6 | | |Belgium |40 | |106. 7 | | |Norway |28 | |102. 4 | | | Poland |9 | |98. 7 | | |New Zealand |18 | |76. | | |Sweden |28 | |71. 7 | | Table 3 documents the distribution of FDI by investors in Vietnam. The top ten foreign investors account for around 80 percent of the total investment in terms of the number of projects, the total investment capital and the registered capital. As can be seen in the Table, the inward FDI in Vietnam was and still is dominated by regional investors. Investors from the Asian region account for 67 percent.Although, the US is a late comer to Vietnam, the inward investment inflow has increased significantly since 2001 after the conclusion of the Bilateral Trade Agreement (Parker et al 2005). For the European investors as a whole, the number of projects account for only about 10 percent, the total investment capital 15 percent and the register capital 20 percent. References : http://www. gso. gov. vn/default_en. aspx ? tabid=491 www. gso. gov. vn/default_en. aspx? tabid=491 https://www. google. com. vn/

Tuesday, October 22, 2019

Usefulness Of Special Stains Example

Usefulness Of Special Stains Example Usefulness Of Special Stains – Coursework Example Usefulness of Special Stains Affiliation Introduction Pathologists carry out the complex diagnosis in terms of histology and pathology (Ramos-Vara & Miller, 2014). No matter how high the clinical suspicion index is, the diagnosis cannot be conclusively established or safely assumed in the absence of any tissue diagnosis. Therefore, in the task of the pathologists to give specific, accurate and sufficiently comprehensive diagnosis, it is significant to diagnose each tissue. Hence, how do the special stains and IHC aid the pathologists in making the diagnosis?In Immunohistochemistry (IHC), pathologists use both the IHC counterstains and special stains for a diagnosis (Kiernan, 2008). The counterstains give immunodetection to enhance the primary label visualization or stain the specific structures. Both fluorescent and chromogenic counterstains are available.Special stains are important in non-routine immunohistochemical staining for the specific cells, organisms, and tissues identifica tion. Moreover, they are also useful in evaluating the state of the disease and in cell biology and histology. For instance, the Alcian Blue (pH 1.0) Stain Kit, stains mucins for the visualization of strongly sulfated mucosubstances. Giema Stain Kit (May Grunwald) is a Hematologic stain used in visualizing hematopoietic tissues and other microorganisms (Joyner & Wall, 2008).Additionally, through innovative H&E solutions, IHC and special stains, digital pathology, and advanced workflow empower laboratory professions and anatomic pathologists to maximize testing efficiency. The integrated, intuitive slide staining and management of workflow platforms optimize the laboratory operations to reduce errors, inform treatment pathology and support diagnosis for anatomic pathology professionals.ConclusionTherefore, from the discussion, it is evident that both special stains and IHC are significant in aiding pathologists in making their diagnosis. They are important as they help them to maximi ze testing efficiency.ReferencesJoyner, A. & Wall, N. (2008). "Immunohistochemistry of Whole-Mount Mouse Embryos". ColdSpring Harbor Protocols Vol. (2):Kiernan J., (2008). Histological and Histochemical Methods. Theory and Practice. Bloxham,UK: Scion.Ramos-Vara A., & Miller A., (2014). "When tissue antigens and antibodies get along: revisitingthe technical aspects of immunohistochemistrythe red, brown, and blue technique.". Veterinary Pathology Vol. 51 (1): 42–87