Saturday, August 31, 2019

Local Coffee Shops and Chain Coffee Shops Essay

Coffee shops have always been important for British people. When they want to read a book and newspapers ,meet new people, follow commodity prices, have knowledge of political issues, learn about what others think of a new book, be aware of the latest scientific and technological developments, have a chat with friends, they are going to coffee shops. In the past, there were only local coffee shops which are also named as high street coffee shops. Nevertheless, today, the number of coffee shop chains is increasing dramatically. Therefore, it becomes so difficult for the owners of the high street coffee shops to run their own businesses. This will be analyzed by comparing the upside and the downside of both shop types in this essay. First of all, giant companies have the advantage of a location which can be more convenient and also easier for locals, in particular students, to shop quickly. For instance, a big company can set up a coffee shop in such a good place like in a shopping park or a centre, in a train or a bus station, in an airport and in a popular street of a town centre, however, this is usually not possible for a local business person. Secondly, the latter has got the advantage of a popular brand name, but the former does not have this opportunity. Finally, giant corporations’ coffee shops are more modern and organized than local ones. On the other hand, there are some advantages of high street coffee shops. For example, a high street coffee shop has got a better atmosphere than a shop of a chain. The staff of local one is more friendly and hospitable. In addition, in a local coffee shop, most customers know each other and they can make new friends and discuss whatever they want with other customers. Thus, they feel more comfortable in these local shops. However, it is obviously difficult to provide a friendly environment in a giant corporation’s coffee shop because the personnel are more formal when they deal with customers. Also, people can get a delicious meal and a cup of coffee with a cheaper price in local shops compared to others. To sum up, even though there are some advantages of local coffee shops, particularly a kindly atmosphere of them, it is still challenging for them to compete with giant corporations. However, I believe that, in order to keep local coffee shops alive, there are some measures which can be taken. For instance, councils can reduce the amount of the rates and the rents for local businesses. Besides, all shopping centers should be outside of towns and local people should encouraged to go to local coffee shops.

Friday, August 30, 2019

God of Small Things Essay

In â€Å"God of Small Things†, written by Arundati Roy, Roy talks about many things but one thing that stood out was her negativity of what the colonist had brought over into India. Her argument could be that the colonist brought materialism into their culture making the natives think that they need things that they really do not need. The colonist bring the thought that making money any way possible is acceptable and Roy points out that ritual dances are even being used as a way of profit. Roy is just pointing out what effect colonialism has had on the people of the native country. Like many other text from post-colonial nations â€Å"God of â€Å"Small Things† points out the negative aspect of colonialism. Roy throughout the book talks about the city of Ayemenem and the river that used to flow through it. On one side of this river there was a place called the â€Å"history house†. Roy describes this place as a worn and old abandoned estate in a couple of her chapter but in one chapter she is describing what it looks like now and how different it is from when she was just a child. In chapter five a hotel is described; this is the chapter that I think she criticizes the rich and how they have become rich. Roy is showing her disapproval for the colonist making what was once an abandoned land fill into a tourist attraction that is no longer an eye sore and is now a beautiful estate. In chapter five Rahal returned to the river she used to know as a child. She describes how it used to be compared to how it is now that she has returned. Rahal does not seem to care about progress â€Å"So now they had two harvests a year instead of one. More rice-for the price of a river† (Roy 59). Sure people were making a profit from the rice but there will always be someone that is making a profit from something. The only good thing that Roy sees from the people making barges is that there is one more harvest; there are many rewards from having another harvest and they are not recognized; it is not that she probably does not see them but she is just pointing out the negativity from the colonist. Roy continues on and describes a five-star hotel that had bought what they used to call the â€Å"Heart of Darkness†. She says that the History House no longer could be approached from the river and that the house had turned its back on Ayemenem. Roy described this place as an abandoned haunted estate that nobody ever went to when she was a child but she says that it has turned its back on Ayemenem. Once again progress is looked at in a negative way. The hotel guests were transported to the estate by a speed boat through the backwaters and Roy describes the boats as leaving a film of gasoline. She does say that the hotel does have a beautiful view but says that they try to cover up the slum part of Ayemenem, which is understandable, it is not nature, all the slum was man made and they do not want to look at slummy areas. There was not much that the hotel could do about the smell of the waist. Roy makes many assumptions about the â€Å"hotel people†. First the thoughts are that the people actually care what is going on around them, and they do not care. She calls the estate a â€Å"smelly paradise†; the guest are to get used to the smell as they have become immune to other peoples poverty; with that statement she is claiming that everyone that owns the hotel and stays there is rich and does not know what poverty taste like; everything was a matter of discipline, nothing more to them. Roy then goes on to criticize the way the people are making money; through selling their history. In chapter five Roy not only criticizes and shows the negatives of progress, with hardly any positives, but also criticizes the way the people are making a living and profit. The â€Å"hotel people† advertise their estate as a paradise with history making many sensational claims just to draw the tourist to their paradise. She called many of the buildings that had history for sale â€Å"Toy Histories†. Roy does not like the fact that these people are trying to make a profit off of their own history and culture. The biggest thing of all probably is when the hotel hires dancers to perform dances that are classic ritual dances that have actual meaning and are not just for show; six hour classics are turned in to 20 minuet shows for pleasure. The ancient ritual dances were diluted into nothing more than entertainment where at one time they had meant something to the culture that those people once love so dearly. Here it is easy to see why Roy would criticize so much but one must realize that everyone cannot be pleased and never will be pleased. The colonial effect had some good effects and had bad, but Roy again only seems to point out the negativity that the colonialism has brought to the nation. Roy brings up many problems in her native land; I know that the point of her book is to point out the negativity of post-colonialism on her country but still, point out some more good things that did come out of colonialism. In many texts it is the same way though. In â€Å"God of Small Things† it speaks negatively of people from the native land sending their children to boarding schools in Britain, not directly but you can see that she is making a point that all the negativity is geared at those from the culture who have brought British culture and British economics back to their land. Whereas in Soyinka’s â€Å"Death of the King’s Horseman†, the horseman’s son has gone to Britain to study but comes back. After coming back he sees that his father has gone against customs and he decides to take it upon himself to see that the act is fulfilled in some form or another; in this text you have a native that stayed true to his native land but in Roy’s case the natives that went to Britain did not stay true and keep up their own culture but rather adopted another’s culture. Another example of colonist having an influence on the children of the native land and infiltrating through them is in Things Fall Apart, Okonkwo’s son becomes a Christian and Okonkwo does not like that, it is the beginning of his culture being put to a halt. Roy, I do not think, is pointing out all the people who sent their children to Britain but rather that even though India was â€Å"Independent† it still had Britain’s influence impacting almost everything in daily lives. In conclusion, Roy makes descriptive negative images because it is what she sees and has seen from the start. People that have not grown up in her culture from birth and seen the changes she has seen cannot fathom what she has seen. If someone from a more developed country was to go there they would see progression as a positive aspect because it is what they have grown up with but for people in that culture they can see the negative aspects of some progress; and that is what Roy is pointing out, she does point out some positives but the majority of the description about the way society is looked at is negative. The book becomes a very dreary read and quite depressing at some points because of all the negativity and horrible things that happen. However, all of the description of even the negative parts make you really get a since of what Roy is trying to say and that is that even with all the negativity one can break barriers. At the end of the day it is not the colonist fault for making Roy’s society what is but rather the people that refuse to change what needs to be changed. It does not matter about how much negativity is directed at the colonist, if the native people do not take responsibility they are to blame just as much as the British. The negativity is not geared at the British but rather her own society and own people.

Thursday, August 29, 2019

Preparing to Conduct Business Research Essay

On September 12, 2012 the New York City Health Department voted eight-zero with one vote abstaining, to enact a city wide ban on sugar-sweetened beverages in containers over 16ounce in size (Susman, 2012). At the urging of New York City Mayor Michael Bloomberg the health department is hoping that this ban will have an impact on the growing obesity problem among New York citizens (Susman, 2012). Opposition to the ban was evident before the final vote by citizens believing violations of his or her freedom are occurring and vendors who see the choices in what he or she serve the customers under dictation from city hall. Perhaps the group with the most to lose is the beverage industry; the ban limits servings of sugar sweetened drinks to 16 ounces or less in the city’s 24,000 restaurants, delis, movie theaters, sports venues, and street carts (Petrecca, 2012). This means no 20-ounce bottles, no super-sized drinks, no monster drinks at the movie theater, the fact is most of these establishments consider a 16-ounce beverage a small or medium drink (Petrecca, 2012). So smaller drinks mean smaller profits; however, it may be possible that this is not the case. The ban does not limit the number of 16-ounce drinks a person may purchase; the possibility for additional sales does exist (Petrecca, 2012). Because only restaurants offer free refills, it is possible that the smaller size drinks will result in greater quantities of sales at the other locations. Business Research The CEO of the Coca Cola Company is communicating with Learning Team A, hiring Learning Team A to research potential issues and opportunities resulting from the ban on containers over the limit of 16 ounces of sugar sweetened beverages in the city of New York. Coca Cola is showing interest in learning what the consumer thinks of the ban; how the customers believe it will affect his or her recreational and dining experiences. Coca Cola is not only showing interest in this information as it pertains to New York City but also because the interest this ban is attracting from other large cities and what it would mean to the company if this became common practice in other locations (Koebler, 2012). Hypotheses Team A offers several hypotheses to the ban and the effects it will have on the citizens, vendors, and distributors of sugar sweetened beverages: ? Team A hypothesizes that the ban on sugar sweetened beverages will cause a decrease in beverage sales that contain sugar, costing the Coca Cola company millions of dollars in sales. ? Team A hypothesizes that the ban on sugar sweetened beverages larger than 16 ounces will cause consumers to purchase multiple quantities of beverages in replacement of what they use to purchase. Also the sale of sugar free beverages will rise; this will cause an increase in revenue for the Coca Cola Company. ? Team A hypothesizes that the public will be unreceptive to the ban and believes that the government body responsible for it has overstepped their bounds. The public will think that the removal of this choice goes against the constitutional rights every person has and that he or she will attempt to find a way around the ban. ? Team A hypothesizes that although there will be citizens upset in regard to the ban, the citizens will embrace the law proving a measurable difference on the obesity problem in New York City. Variables to Consider and Questions to Ask In an effort to offer to the Coca Cola Company the most complete information, the best recommendations, and a reliable foundation on which to base future changes it is necessary to research as many variables as possible. Variable questions to include in the research include: 1) â€Å"The various age groups of the consumers, and their drink preferences. † 2) â€Å"How the vendors plan on handling this new rule and will the vendor adjust the prices, add free-refills, implement buy one get one programs, and add additional drink dispensers to accommodate customers. 3) â€Å"How these bans encourage customers to leave the city limits and visit establishments in the suburbs? † 4) â€Å"How the consumer understands the reasoning behind the ban and the obesity issue with the removal of beverage choice? † 5) â€Å"Coca Cola currently holding a 70% market share in New York; this is a significant margin over the competition (Petrecca, 2012). It is important to research if the customer loyalty level will hold up to â€Å"deals† by the competition and how aggressive Coca Cola is going have to be with marketing and pricing. † 6) â€Å"Is Coca Cola willing to embrace this ban, explore ways to market their diet products and fruit juices as an alternate to the sugar sweetened beverages? † Ethical Considerations Ethics play a critical role in conducting research projects (Donald R. Cooper, 2011). It is critical to examine how the results of the research issue breach the rights of the citizens. In the case of the New York City law that limits the sales of sugar sweetened drinks there are several ethical questions that arise. The strongest being, â€Å"how will this state law infringe on an individual’s rights to choose the size of their desired beverage? † The motivation behind the law is the unhealthy factors of sugary drinks, targeting one unhealthy option. Supporters of the law believe that this law will help prevent obesity; however, opposition believes it is unfair to place the weight of this issue on one product. Also at question â€Å"Is it ethical to restrict a consumer’s right to choose what he or she wants to drink? † Along with sugar sweetened beverages there are other unhealthy products available that have proven effects on weight with no restrictions. Vendors and beverage makes can argue that the law shows bias and is discriminatory. This leads to another ethical issue; does the law give preference or competitive vendor advantage over consumer’s advantage. A consumer, who may wish to purchase a larger drink, may find the need to purchase multiple drinks, thereby increasing the sales of the company but yet not eliminating the risk of obesity. Also under consideration is the ethical question, â€Å"does the beverage company have a responsibility to their customers to reduce the chance of obesity, knowing that these beverages offer empty calories with no nutritional value? † Conclusion Moving into the future it is important to understand what difficulties a company will be facing. Knowledge from research projects provide companies the possibility to develop contingency plans and reduce the chance that the unknown will alter the course of a successful business plan. Earlier this month the New York City Health Department passed a law that has altered the way beverage makers and vendors conduct their business and altering the freedom consumers have in choosing something as simple as the beverage he or she drinks. The Coca Cola Company is looking to go forward armed with the knowledge they will need to maintain their superiority in the New York Market. This task has fallen on Learning Team A, as they will research and discover what the market and consumers will demand to remain customers of Coca Cola. References Donald R. Cooper, P. S. (2011). Business Research Methods, Eleventh Edition. McGraw-Hill Company. Koebler, J. (2012, September 12). Experts: Courts Likely to Uphold New York Soda Ban. Retrieved September 20, 2012, from U. S. News: http://www.usnews. com/news/articles/2012/09/14/experts-courts-likely- to-uphold-new-york-soda-ban_print. html Petrecca, L. (2012, July 18). Coke, Pepsi, others launch assault against NYC beverage ban. Retrieved September 20, 2012, from USA Today: http://usatoday30. usatoday. com/money/industries/food/story/2012-07-09 /coke-pepsi-fight-soda-ban/56279302/1 Susman, T. (2012, September 13). New York City bans big sugary drinks in restaurants. Retrieved September 20, 2012, from LA Times: http://articles. latimes. com/2012/sep/13/nation/la-na-soda-ban-20120914.

Wednesday, August 28, 2019

Amanda Knox Court Case Essay Example | Topics and Well Written Essays - 2500 words

Amanda Knox Court Case - Essay Example Following four days and nights of interrogation, Amanda implicated herself and her employer at a bar in disputed circumstances. The police then arrested Amanda, Sollecito, and her employer Mr. Lumumba, although the later was released after Rudy Guede, an Ivorian raised in Perugia, was implicated by forensic evidence (Follain 12). Guede was convicted of the murder and sexual assault of Kercher and sent to prison. Sollecito and Amanda were found guilty during the first stage of the trial process and sentenced to 25 and 26 years in jail respectively. However, the second level of their trial saw them acquitted. The Background of Amanda Marie Knox Amanda Knox was born to Curt Knox and Edda Mellas in Seattle on July 9th, 1987. However, her parents divorced when she was still a baby. She grew up playing soccer in a bourgeois neighborhood where she earned the nickname Foxy Knoxy due to her athletic skills, a nickname that haunted her during the trial (Knox 25). Her relatives later described her as someone who did not have the full ability to pick up diverse social cues. While at school, Amanda took up an interest in the culture of the Italians and visited Italy as a fifteen-year-old together with her family. While on this trip, she decided that she would like to study there. She preferred a city such as Perugia that would allow her to meet real Italians, rather than Rome where she would mix with American expatriates (Knox 26). However, her stepfather discouraged her from moving there because he still considered her too naive. On graduating in 2005 from Seattle Preparatory High School, Amanda joined Washington University for a Linguistics Degree. As a college student, Amanda was named on the Dean’s list and was an ordinary college student with friends recalling that she was a gentle and kind individual. In the continuation of her â€Å"go-getter† attitude, Amanda decided to further her Linguistics Degree by heading for Perugia in Italy, where she was to sp end twelve months at the Foreigners University (27). On getting to Perugia, she met 21-year-old student Meredith Kercher from the UK, who also studied linguistics and roomed with her. Meredith had joined the University of Foreigners where she was to study Creative Writing, German, and Italian (27). According to media reports, while Amanda Knox was to most people a young and confident woman, her family and friends felt that she was a compulsive diarist, especially since she was averse to all types of conflict. These traits, which she showed during her time in high school and Washington University, including yoga practice at inappropriate times and her open and bubbly personality, were to have an effect on the trial. These traits made her more conservative, and reticent room and apartment mates viewed her critically while also causing the Italian police and prosecutor to be suspicious of her. The Murder of Meredith Susanna Cara Kercher Meredith Kercher was a UK citizen born in 1985 in South London’s area of Southwark. On joining the University of Foreigners, Kercher checked into a ground floor apartment with four bedrooms at Via della Pergola. This house was thought of as locals to be in a bad neighborhood, although most liked it for its panoramic view of Perugia. Her apartment mates included Amanda Knox and two other women. Meredith Kercher’

Tuesday, August 27, 2019

Discussion Question Assignment Example | Topics and Well Written Essays - 250 words - 23

Discussion Question - Assignment Example Over 86% of the cities in America report violence each year. Women have also proven to be part of the violence adding up to 8% of the gangsters (ABC News). With this information, the community officials together with the community at large should coordinate to stop the violence. The first way to fight violence is making the youth busy. The government needs to create youth initiatives such as sports or games that will make them busy. The teens also need jobs. Lack of gainful employment makes them indulge in unauthorized activities that end up in violence. Hence, the community must condemn idleness especially in the streets (ABC News). Chicago being on the highlight in violence, the security force in the area needs enhancement. In as much as security is governments role, people in the neighborhood should also be on the watch out to report any suspected cases that can result in violence. Mainly, the residents should form mechanisms for reporting crimes and community policing. They should also help the authorities to inspect and flush out illegal gun holders among them. In addition, parents and guardians, being responsible for their small boys need to educate them on the ill effects of violence and warn them not to get involved (ABC News). In conclusion, enacting organization such as Fight Violence, with a group of youths moving around the streets educating the youths on the effects of violence can result in a positive outcome. Above all, the community needs to come together as one and fight

Monday, August 26, 2019

Social Work Essay Example | Topics and Well Written Essays - 10000 words

Social Work - Essay Example and Impact of unemployment 21 3.8 Scale of unemployment 23 Chapter 4: Findings 4.1 Employment policies for people With Mental Health Issues 24 4. 1.1 Disability Discrimination Act (DDA) 1995 24 4.1. 2 Effectiveness of the DDA (1995 24 4.1. 3 Pathways to Work 26 4.1. 4 Effectiveness of Pathways to Work 27 4.1. 5 Access to Work 28 4.1. 6 Effectiveness of Access to Work 29 Chapter 5: Discussion 5.1 Obstacles to Employment Inclusion Policies 30 5.1.1 Stigma and Discrimination 31 5.1.2 Employers attitudes 32 5.1.3 Benefit system 33 5.1.4 Low expectation from General Practitioners 34 5.1.5 Impact of Mental health issue to an individual 36 5.2 Strength and Limitations of the project 37 5.3 Implications to social work practice 38 5.4 Recommendation 44 5.5 Conclusion 46 Bibliography 47 Acknowledgement The Author of this project wishes to thank all those who contributed to the development of this project. Particular thanks go to all my Tutors especially those who directed me on a number of sou rces for information. Similar thanks go to all my colleagues right from year one and other friends who responded to some of my queries during the course of the project. Special thanks go to my family and relatives particularly my wife who has been genuinely supportive in all aspects regardless during all the difficult and hard times and to my lovely children who have been very patient and understanding throughout my entire course. List of Abbreviations UK United Kingdom SEU Social Exclusion Unit ODPM Office of the Deputy Prime Minister DWP Department for Work and Pensions DOH Department of Health DIUS Department for Innovation Universities and Skills DDA Disability Discrimination Act WFIs Work Focused Interviews PACTs Placing Assessment and Counselling Teams NHS National Health Service NIMHE National Institute for Mental Health in England NSF National Service Framework SCMH Sainsbury Centre for Mental Health EHRC Equality and Human Rights Commission TNS The National Statistics CIPD Chartered Institute of Personnel and Development NHSCCA National Health Service and Community Care Act PCS Personal, Cultural and Structural Model Abstract Purpose: Different individuals experiencing mental health issues would like to work but they are excluded from employment, therefore the United Kingdom government policy is now focusing more on employment for people with mental health issues to ensure social inclusion. This project explores the effectiveness of some of the government polices that have been put forward to promote inclusion within this sector. Project Approach: To find and synthesize current research on the theory and practice of helping people facing mental issues enter the work place, especially the effectiveness of policies aimed at doing so. However, in the many policies established, I will only sample three: Disability Discrimination Act 1995, Pathway to Work and Access to Work. Findings: There is little research on the effectiveness

Group Discussion Pocess Essay Example | Topics and Well Written Essays - 250 words

Group Discussion Pocess - Essay Example This is basically because I got an opportunity to not only read about different views from various students but also to retain more as well as learn much better. This was a unique group as compared to the others that I have attended before. For instance we would sometimes discuss ideas on online forum and at other times we would just leave our messages and wait for the other members’ response. I could also leave messages and later on find responses from the rest of the members. Sharing as well as free discussing of information was also a common feature of this group. This experience is definitely relevant to group work in organizations since we learnt and shared a lot as a group about team work .Thus, each member in a group was tasked with a certain responsibility to perform and given a timeline. This is something very important since it teaches an individual the importance of discipline as well as responsibility; two great values in group work in any organization. It does not really matter to the group that it is an online class, since we were able to not only accomplish our set goals but also communicated and coordinated well; just like in the conventional groups. It’s all about knowing your role in the group and what you are supposed to do and at what time. Group work in an online class can be improved by setting clear goals to be met by individuals in the group, setting adequate time especially when all group members are available and making sure there are no disruptions to internet access. Finally, the discussion atmosphere ought to be responsible as well as supportive of all group members. It was really a great learning opportunity, very applicable in my

Sunday, August 25, 2019

Management accounting for business Essay Example | Topics and Well Written Essays - 1500 words

Management accounting for business - Essay Example It needs to be fully aware of the costs it takes to run the business, to produce and to distribute its products. It also needs to have the knowledge of different methods of cutting down the costs in order to design an effective pricing strategy, to enhance the profit for its business. In this process, the management has to take many decisions upon choosing best suitable alternatives in different situations. These decisions encompass various steps in a business cycle. They range from deciding upon the right quantity to produce, right price for the product, acquisition, liquidation, investment involving several alternative options. All these decisions rely upon the company’s financial records for the current as well as previous years. This is the step where accounting information is required. Therefore, accounting information needs to be evaluated at the first step of the decision making process because management can be enabled to decide upon different alternatives only if the company’s complete accounting information is readily available. The management is the major user of accounting information who uses this information to decide upon choosing different alternatives to influence the product costs so as to fix a price for that particular product. Management uses cost accounting to determine the accurate costs incurred in producing and distributing a product. These costs may be Avoidable costs that can be reduced fully or partially by choosing an alternative or they may be relevant costs that differ between various alternatives and here, the management has to enter into the decision-making process. Therefore, the accounting information required in the management and organisational decision making process must include the following steps to deal with the constraints, as given by Goldratt, E.M. (1990) in the theory of constraints: The accountants should identify the

Saturday, August 24, 2019

Gender Inequality Research Paper Example | Topics and Well Written Essays - 1500 words

Gender Inequality - Research Paper Example This report stresses that there is statistical evidence regarding the roles of men and women in society. Men are paid better than women for the same services. Women possess less properties, physical assets, financial resources, and are not equal to men in education and technology usage. They word harder than men but it cannot be economically proved as they don’t get rewarded for that. Women are not independent in making decisions whether at home or the community they belong to. Cultural traditions and assumptions come in the way of treating women equally to men. They carry higher risk to violence and rape than men. Gender inequality is inherent in society as it is based on cultural beliefs, societal attitudes, power and independence. This essay makes a conclusion that the media watch-dogs should keep an eye on finding and checking gender stereotypes and partial attitude towards women. They should observe that regulation and standards are adhered to by speaking non-sexist language. Gender issues should be included in the production and use of media so that gender stereotypes no more remain a roadblock in the partnering of men and women in all aspects of life. It is a human rights responsibility also to eradicate negative gender behavior and attitude from all walks of life. Media and advertisement organizations need to be transparent in their policies if they are keen on discouraging gender based discrimination through policy initiatives, and increase their credibility rating. Only media can be the best platform to be used as a tool in empowering gender equality, which will result in economic and social growth.

Friday, August 23, 2019

Small and Medium Enterprises in Green Business Industry Research Proposal

Small and Medium Enterprises in Green Business Industry - Research Proposal Example In this section of the study, the current research on the industry would be analyzed with respect to the business operations and its effect on customers’ issues. The discussion would be segregated based on the theories and business operations. Vectair Holdings is a privately held company which has been categorized under the holding companies. The company is involved in the process of manufacturing and selling hygiene products. The company has a workforce of 40 employees and  £9.90 million. Previous years the sales of the product were  £9.2 million. This shows that the company has been growing steadily. The demand for these products is increasing at a robust rate and it is believed that such companies will drive the green business industry. Likewise, another renowned SME of Southern England, Basingstoke Skip Hire & Southern is a company involved in the business of waste management services. The company has net sales of  £9.90 million and employs around 68 people. The company is highly recognized as one of the most responsible citizens of society. The green business industry is considered for this study because firstly, green business is the future of the global market and extensive research and learning are going on in this industry. Among the SMEs, the green business is one of the top industries which have become the most inspiring segment in the world market, according to the London Stock Exchange (London Stock Exchange, 2013d).

Thursday, August 22, 2019

Evidentialist Method Apologetics Essay Example for Free

Evidentialist Method Apologetics Essay Introduction Apologetics comes in several different methods that are utilized to defend one’s faith and also to evangelize. One method of apologetics is Evidentialism, also known as Natural Theology. Evidentialism is probably the most popular form of apologetics, if not the one that leads the field. Our current world demands proof and supporting data and Evidentialism stresses the deliverance of accurate substantiation with the hope of bringing cynics and criticizers to the truths of Christianity. Evidentialism continues to excel in the field of apologetics and does well in confronting the major worldviews with the truths of the Christian faith that can be proven with factual analysis. This review will provide the reader with a summary of the Evidentialist Method, a critique of the Evidentialist Method, and a list of some of the more popular Evidentialists. Summary of the Evidentialist Method Apologetics comes from 1 Peter 3:15 and is most properly defined as giving a defense. In his commentary, John Walvoord states, â€Å"(apologian, the â€Å"defense† which a defendant makes before a judge; (Acts 22:1; 25:16) for their hope in Christ.† It is the impetus for Evidentialist apologetics to follow this call and seek to â€Å"Always be prepared to give an answer to everyone who asks you to give the reason for the hope that you have.† Another writer, Dan Story, states, â€Å"This is ‘evidential’ apologetics, and it works on the premise that the weight of the evidence will always support Christianity and always refute contradicting beliefs.† In order for Evidentialism to be effective, it must hold to its premise of dispensing the truths about Christianity by establishing factuality. The Evidentialist is able to take any offered topic and utilize it as evidence as they are stimulated by the antagonist’s desire to deliberate logic and reason. In Acts 19:8, the Apostle Paul was diligently â€Å"arguing persuasively about the kingdom of God.† Yet, Paul understood completely that there was none other that could open the hearts of men except God (Acts 16:14). Critique of the Evidentialist Method The Evidentialist Model for apologetics is a very sensible method to be utilized in evangelism. The world today demands physical, tangible proof and relies only on what can be seen and studied, and the Evidentialist is quite versed in the practicality and effective use of the method to clarify God’s truths. The method accepts the essential foundations of the non-believing doubter and tries to supply purposeful truth to that individual area. This reason-giving model has established its effectiveness in apologetics. There are a couple of issues of concern when it comes to the application of Evidentialism. One concern that stands out is that it adopts the thought that the fallen man can come to the supposition of Christ as Savior. It is my contention and belief that aside from the Holy Spirit man cannot come to this conclusion. However, I do feel that via the logical evidence presented, God opens the non-believer’s heart. Story clearly shows the â€Å"Holy Spirit also convicts and convinces people of the truth through extra-biblical evidences.† Popular Evidentialists History shows that the method of Evidentialism has been utilized for quite some time. There have been many superior thinkers who have used the method and have contributed greatly to the enhancement of apologetics. Although the list is long, a few of these men merit mention, William Paley (1743-1805), John Locke (1632-1704), and more contemporarily, Norman Geisler, William Lane Craig, Lee Strobel, Gary Habermas and Ravi Zacharias. These stellar thinkers have all utilized Evidentialism in furthering apologetics. There is an organization worthy of mention, Answers in Genesis, who employs the use of Evidentialism in explaining creationism to minister the truths of God, which also includes the explanation of the Gospel to many non-believing skeptics that exist within many secular evolutionist groups. Conclusion The Great Commission demands that all believers be prepared to defend their faith and be ready to offer a defense for those beliefs. There are many opposing worldviews that stand between men and salvation. When these opposing views are confronted in a loving and practical manner, much misconception can be dispelled in a practical manner. Using Evidentialism, the world that desires substantiation, a method driven apologetic is very successful. Bibliography Booth, Anthony Robert. The Two Faces of Evidentialism. Erkenntnis 67:3 (2007), http://search.proquest.com.ezproxy.liberty.edu:2048/docview/195447959 (accessed January 18, 2013). Story, Dan. Defending Your Faith. Grand Rapids, MI: Kregel Publications, 1997. Story, Dan. Engaging the Closed Minded: Presenting Your Faith to the Confirmed Unbeliever. Grand Rapids, MI: Kregel Publications, 1999. Sudduth, Michael. Reformed epistemology and Christian apologetics. Religious Studies 39:3 (2003), http://search.proquest.com.ezproxy.liberty.edu:2048/docview/197230405/abstract?accountid=12085 (accessed January 18, 2013). Walvoord, John F., Roy B. Zuck, and Dallas Theological Seminary. The Bible Knowledge Commentary: An Exposition od the Scriptures. Wheaton, IL: Victor Books, 1983. The Holy Bible: New International Version [ 1 ]. John F. Walvoord, Roy B. Zuck and Dallas Theological Seminary, The Bible Knowledge Commentary: An Exposition of the Scriptures (Wheaton, Il: Victor Books, 1983-), 1Peter 3:15. [ 2 ]. The Holy Bible: New International Version, Biblegateway.com. http://www.biblegateway.com/passage/?search=1 Peter 3:15version=NIV (accessed January 18, 2013). [ 3 ]. Dan Story, Engaging the Closed Minded: Presenting Your Faith to the Confirmed Unbeliever (Grand Rapids, MI: Kregel Publications, 1999), 64. [ 4 ]. Dan Story, Defending Your Faith (Grand Rapids, MI: Kregel Publications, 1997), 4.

Wednesday, August 21, 2019

Webform2 †wireless LAN, users and access points management Essay Example for Free

Webform2 – wireless LAN, users and access points management Essay Private void Page_Load(object sender, System. EventArgs e) { // intializing the sqlDataAdapter and dataSet sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1); sqlDataAdapter3. Fill(usersDataSet11); sqlDataAdapter2. AcceptChangesDuringFill = true; sqlDataAdapter3. AcceptChangesDuringFill = true; } private void Button9_Click(object sender, System. EventArgs e) //add button(users) { //saving the data the manager insert and adding it to the users table//goto each AP checked by the manager using SNMP protocol and add //them the user String user_name,user_id,user_MAC; String str2=,str3=; int i,j,tmp,k; user_name = TextBox1. Text. ToString(); user_id = TextBox2. Text. ToString(); user_MAC = TextBox5. Text. ToString(); int items = CheckBoxList1. Items. Count; // APs will hold the names of all the APs that the user // can access string[] APs = new string[items]; k=0; APs. Initialize(); try { apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); // add this user to the table // str2 has the names of all the APs coulms // str3 has the values of all the coulms j=0; for(j=0;ji;j++) { str3= str3 + arr[j]. ItemArray. GetValue(0) .ToString()+, ; } str3 = str3. Remove(((str3. Length)-2),2); str2= +user_name +, + user_id +, +user_MAC + , ; tmp = CheckBoxList1. SelectedIndex; for(j=0;ji;j++) { if (tmp==j) { APs[k]=CheckBoxList2. SelectedItem. Text; k++; str2= str2 + 1, ; CheckBoxList1. SelectedItem. Selected = false; tmp = CheckBoxList1. SelectedIndex; } else str2= str2 + 0, ; } str2 = str2. Remove(((str2. Length)-2),2); SqlCommand insCommand = new SqlCommand( INSERT INTO APusers (userName, id_num, mac_adr, + str3 + ) VALUES ( + str2 + ),sqlConnection1); insCommand. Connection. Open(); insCommand. ExecuteNonQuery(); insCommand. Connection. Close(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); / the steps to update the access points:   1. for each AP in the APs array: *  Ã‚  Ã‚   1. 1 get the AP IP address from the AP database. 1. 2 get the add entry to table object ID *   1. 3 call snmpSET function */ /* String IPaddr,OID; * for(i=0;ik;i++)   {*     DataRow [] arr = apDataSet1. AP. Select(Apname ='+APs[i]+); *  Ã‚   IPaddr = arr[0]. ItemArray. GetValue(1). ToString(); *  Ã‚   OID = avaya. addEntry(); *  Ã‚   snmpexe. snmpSet(IPaddr,OID,user_MAC); * } */ } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } TextBox7. Text=; TextBox1. Text=; TextBox2. Text=; TextBox5. Text=; TextBox3. Text=; TextBox4. Text=; } private int GetIndexofelement(string [,] arr,string elem) { int j,i = arr. Length; for(j=0;ji;i++) { if (arr[0,j]. ToString() == elem) return j; } return -1; } private void Button3_Click(object sender, System. EventArgs e) //remove user button. { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; Label3. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList1. Visible=true; Button6. Visible=true; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Select the user you wish to remove and press remove; /////////////////// //bring the users list into the dropdown box DropDownList1. Items. Clear(); int i=0; try { usersDataSet11. Clear(); sqlDataAdapter3. SelectCommand. CommandText = SELECT userName FROM APusers; sqlDataAdapter3. Fill(usersDataSet11); DataRow [] arr = usersDataSet11. APusers. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList1. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11,APusers); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button1_Click(object sender, System. EventArgs e)// add AP button { CheckBox1. Visible=true; Label12. Visible=true; TextBox7. Visible=true; DataGrid2. Visible=false; DataGrid1. Visible=false; Label1. Visible=true; Label2. Visible=true; Button10. Visible=true; TextBox3. Visible=true; TextBox4. Visible=true; TextBox5. Visible=false; Label10. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Insert the AP detials and press add; } private void Button4_Click(object sender, System. EventArgs e) //remove AP button. { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; DropDownList2. Visible=true; Button8. Visible=true; Button9. Visible=false; TextBox5. Visible=false; Label10. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Select the AP you wish to remove and press remove; //bring the APs list into the dropdown box try { DropDownList2. Items. Clear(); int i=0; apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList2. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button5_Click(object sender, System. EventArgs e) //show all users button { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=true; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; try { sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11,APusers); DataGrid1. DataSource = usersDataSet11; DataGrid1. DataBind(); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } Label6. Text=which operation would you like to perform? ; } private void Button6_Click(object sender, System. EventArgs e) // remove button(users) { //goto all APs listed for this user and remove the user from //ther table and then remove the user from the data base String user_name; try { user_name = DropDownList1. SelectedItem. Text. ToString(); Label6. Text=Remove user + user_name; /* * the steps to update the access points: * 0. create an array with the APs name * 1. for each AP in the APs array: *  Ã‚  Ã‚   1. 1 get the AP IP address from the AP database *  Ã‚  Ã‚   1. 2 get the remove entry to table object ID *  Ã‚  Ã‚   1. 3 call snmpSET function */ /* String IPaddr,OID; * for(i=0;ik;i++) * { *  Ã‚   DataRow [] arr = apDataSet1. AP. Select(APname ='+APs[i]+); *  Ã‚   IPaddr = arr[0]. ItemArray. GetValue(1). ToString(); *  Ã‚   OID = avaya. removeEntry(); *  Ã‚   snmpexe. snmpSet(IPaddr,OID,user_MAC); * } */ SqlCommand DelCommand = new SqlCommand(DELETE FROM APusers WHERE userName = + user_name + ,sqlConnection1); DelCommand. Connection. Open(); DelCommand. ExecuteNonQuery(); DelCommand. Connection. Close(); usersDataSet11. Clear(); sqlDataAdapter2. Fill(apDataSet1); sqlDataAdapter3. Fill(usersDataSet11); //todo: refrash list DropDownList1. Items. Clear(); int i=0; usersDataSet11. Clear(); sqlDataAdapter3. SelectCommand = new SqlCommand( SELECT userName FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11); DataRow [] arr = usersDataSet11. APusers. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList1. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11,APusers); } catch(Exception ev). {Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button10_Click(object sender, System. EventArgs e) //add button(AP) {//updata the APs table and init the AP String AP_name,AP_ip,Location; bool active; try { AP_name = TextBox3. Text. ToString(); AP_ip = TextBox4. Text. ToString(); Location = TextBox7. Text. ToString(); active = CheckBox1. Checked; apDataSet1. AP. AddAPRow(AP_name,AP_ip,Location,active); sqlDataAdapter2. Update(apDataSet1); SqlCommand myCommand = new SqlCommand(ALTER TABLE APusers ADD +AP_name+ bit,sqlConnection1); myCommand. Connection. Open(); myCommand. ExecuteNonQuery(); myCommand. Connection. Close(); //todo: make all the users in the APusers table marked as not allowed to this AP myCommand = new SqlCommand( UPDATE APusers SET +AP_name+= 0,sqlConnection1); myCommand. Connection. Open(); myCommand. ExecuteNonQuery(); myCommand. Connection. Close(); /* the steps to update the access points: * 1. connect to the AP IP address from the AP database * 2. get the remove entry to table object ID *3. call snmpSET function */ /* String IPaddr,OID; * for(i=0;ik;i++) * { *  Ã‚   OID = avaya. setName(); *  Ã‚   snmpexe. snmpSet(AP_ip,OID,AP_name); *  Ã‚   OID = avaya. setLocation(); *  Ã‚   snmpexe. snmpSet(AP_ip,OID,Location); * }   */ }catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } TextBox7. Text=; TextBox1. Text=; TextBox2. Text=; TextBox5. Text=; TextBox3. Text=; TextBox4. Text=; } private void Button8_Click(object sender, System. EventArgs e) //remove button(AP) {//remove the APs table String AP_name; try { AP_name = DropDownList2. SelectedItem. Text. ToString(); Label6. Text=Removing AP + AP_name; SqlCommand DelCommand = new SqlCommand(DELETE FROM AP WHERE APname = + AP_name + ,sqlConnection1); DelCommand. Connection. Open(); DelCommand. ExecuteNonQuery(); DelCommand. Connection. Close(); apDataSet1. Clear();sqlDataAdapter2. Fill(apDataSet1); sqlDataAdapter3. Fill(usersDataSet11); sqlDataAdapter2. AcceptChangesDuringFill = true; sqlDataAdapter3. AcceptChangesDuringFill = true; DataGrid1. DataSource = apDataSet1; DataGrid1. DataBind(); //todo: refrash list DropDownList2. Items. Clear(); int i=0; apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList2. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); //todo: remove the AP_name culomn from the APusers table SqlCommand myCommand = new SqlCommand(ALTER TABLE APusers DROP COLUMN +AP_name,sqlConnection1); myCommand. Connection. Open(); myCommand. ExecuteNonQuery(); myCommand. Connection. Close(); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } /*SNMP: * goto the selected AP * a. go to the data base and get the AP IP number * b. snmp. snmpSet(IP,DisableAllUsers) */ } private void Button2_Click(object sender, System. EventArgs e) // add user button. { int i=0; CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; Button9. Visible=true; TextBox1. Visible=true; TextBox2. Visible=true; TextBox5. Visible=true; Label10. Visible=true; Label3. Visible=true; Label4. Visible=true; Label5. Visible=true; CheckBoxList1. Visible=true; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Insert the user detials and press add; //bring to the checkbox list all the APs available CheckBoxList1. Items. Clear(); apDataSet1. Clear(); Try { sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); int j =i; while (i! =0) { CheckBoxList1. Items. Add(arr[j-i]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button11_Click(object sender, System. EventArgs e) //show all APs button { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=true; DataGrid1. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; try { DataGrid2. DataSource = apDataSet1; DataGrid2. DataBind(); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } Label6. Text=which operation would you like to perform?; } private void Button7_Click(object sender, System. EventArgs e) { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; Label3. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; DropDownList3. Visible=true; Button12. Visible=true; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Select the user whose details you wish to update; bring the users list into the dropdown box DropDownList3. Items. Clear(); int i=0; try { usersDataSet11. Clear(); sqlDataAdapter3. SelectCommand. CommandText = SELECT userName FROM APusers; sqlDataAdapter3. Fill(usersDataSet11); DataRow [] arr = usersDataSet11. APusers. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList3. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11,APusers); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } }private void Button12_Click(object sender, System. EventArgs e) { string user, id_num, mac_addr; int i=3, length; int APnum; user= DropDownList3. SelectedItem. Text. ToString(); original = user; Label6. Text=Update user + user; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=true; Label14. Visible=true; Label15. Visible=true; Label16. Visible=true; TextBox6. Visible=true; TextBox8. Visible=true; TextBox9. Visible=true; CheckBoxList2. Visible=true; Button13. Visible=true; //filling the text boxs with the existing user data CheckBoxList2. Items. Clear(); sqlDataAdapter3. Fill(usersDataSet11); DataRow [] arr = usersDataSet11. APusers. Select(userName ='+user+); id_num = arr[0]. ItemArray. GetValue(1). ToString(); mac_addr = arr[0]. ItemArray. GetValue(2). ToString(); //displaying the current user data in text boxs TextBox6. Text=user; TextBox8. Text=id_num; TextBox9. Text=mac_addr; CheckBoxList2. Items. Clear(); apDataSet1. Clear(); try { sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr1 = apDataSet1. AP. Select(); APnum = arr1. GetLength(0); i = APnum; int j =i; while (i! =0) { CheckBoxList2. Items. Add(arr1[j-i]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); for(i=0;iAPnum;i++) { SqlCommand myCommand = new SqlCommand( SELECT + CheckBoxList2. Items[i]. Text + FROM APusers WHERE (userName = + user +),sqlConnection1); myCommand. Connection. Open(); SqlDataReader data = myCommand. ExecuteReader(); data. Read(); CheckBoxList2. Items[i]. Selected = data. GetBoolean(0); myCommand. Connection. Close(); } } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button13_Click(object sender, System. EventArgs e) { String user_name,user_id,user_MAC; String str2=,str3=; int i,j,tmp; user_name = TextBox6. Text. ToString(); user_id = TextBox8. Text. ToString(); user_MAC = TextBox9. Text. ToString(); int items = CheckBoxList2. Items. Count; try { apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); //todo: add this user to the table //todo: create str2 with the names of all the APs coulms //todo: create str3 with the values of all the coulms j=0; for(j=0;ji;j++) { str3= str3 + arr[j]. ItemArray. GetValue(0). ToString()+, ; } str3 = str3. Remove(((str3. Length)-2),2); Label6. Text =CheckBoxList2. SelectedIndex. ToString(); str2= +user_name +, + user_id +, +user_MAC + ,; tmp = CheckBoxList2. SelectedIndex; for(j=0;ji;j++) { if (tmp==j) { str2= str2 + 1, ; CheckBoxList2. SelectedItem. Selected = false; tmp = CheckBoxList2. SelectedIndex; } else str2= str2 + 0, ; } str2 = str2. Remove(((str2. Length)-2),2); Label6. Text =str2; SqlCommand delCommand = new SqlCommand(DELETE FROM APusers WHERE userName = + original + ,sqlConnection1); delCommand. Connection. Open(); delCommand. ExecuteNonQuery(); delCommand. Connection. Close(); SqlCommand insCommand = new SqlCommand(INSERT INTO APusers (userName, id_num, mac_adr, + str3 + ) VALUES ( + str2 + ),sqlConnection1); insCommand. Connection. Open(); insCommand. ExecuteNonQuery(); insCommand. Connection. Close(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } /*SNMP: * goto the selected user * a. get all the APs IP numbers * b. for each IP *  Ã‚  Ã‚      if checked. *  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   snmp. snmpSet(IP,addUsers) *  Ã‚  Ã‚      else *  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   snmp. snmpSet(IP,removeUsers) */ Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; } private void Button14_Click(object sender, System. EventArgs e) { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=true; Button16. Visible=true; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Select the AP you wish to update and press select; //bring the APs list into the dropdown box try { DropDownList4. Items. Clear(); int i=0; apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr.

Tuesday, August 20, 2019

GPU-Accelerated Impact Maximization in Professional Networks

GPU-Accelerated Impact Maximization in Professional Networks GPU-Accelerated Impact Maximization in Large-Scale Professional Networks Dr. M. Rajasekhara, Babu B. V. Arunragavan Abstract Impact Maximization means to discover the top-K fascinating people to expand the impact spread inside a professional networks, which remains important yet difficult issue. Turned out to be NP-hard, the impact expansion issue pulls in gigantic studies. In spite of the fact that there exist fundamental eager calculations which may give great close estimation to ideal result, the ill effects of low computational proficiency and unnecessarily long execution time, restricting the application to substantial scale informal communities. In this paper, to quicken the impact boost by leveraging the parallel transforming ability of design handling unit (GPU). The enhancement of the current greedy calculations and outline a base up traversal calculation with GPU usage, which contains inbuilt parallelism. To best fit the proposed impact expansion calculation with the GPU construction modeling, we further create a versatile K-level mix technique to amplify the parallelism and redesign the impact c hart to minimize the potential disparity. We do far reaching explores different avenues regarding both certifiable and professional network follows and show that with IMGPU model. KEY WORDS: Index Terms—Impact maximization, GPU, large-scale professional networks, IMGPU, bottom-up traversal algorithm. INTRODUCTION: The organizations, for example, linkedIN, visualCV and meetup play a critical part as productive media for quick spreading data, thoughts, and impact among gigantic population, and such impact has been significantly amplified with the quick increment of online clients. The organizations present extraordinary open doors for expansive scale viral advertising, a showcasing methodology that advances items through verbal impacts. While the force of professional systems has been investigated more to amplify the profit of viral showcasing, it gets to be crucial to understand how we can amplify the impact over the interpersonal organization. This issue, alluded to as impact amplification, is to choose inside a given interpersonal organization a little set of compelling people as beginning clients such that the normal number of affected clients, called impact spread, is expanded. The impact amplification issue is intriguing yet testing. Tis is turned out to be NP-hard and proposed a fundamental eager calculation that gives great rough guess to the ideal result. On the other hand, their methodology is genuinely restricted in productivity since it needs to run Monte-Carlo reproduction for extensively long time period to ensure a precise gauge. Despite the fact that various progressive deliberations have been made to enhance the proficiency, condition of-the-craftsmanship methodologies still experience the ill effects of unreasonably long execution time because of the high-computational intricacy for large scale informal communities. Then again, representation preparing unit (GPU) has as of late been generally utilized as an issue broadly useful figuring gadget and indicated guaranteeing potential in quickening reckoning of chart issues. In this manner, The utilization of GPU to quicken the processing of the impact boost issue. Then again, the parallel handling ability of GPU can be completely misused in taking care of assignments with normal information access design. Sadly, the chart structures of generally real world organizations are very discontinuous, making GPU increasing speed a nontrivial assignment extreme execution debasement. The primary difficulties of full GPU quickening lie in the accompanying viewpoints. In the first place, the parallelism of impact spread calculation for every conceivable seed set is restricted by the quantity of hubs at each one level. Consequently, the computational force of GPU cant be completely misused on the off chance that we specifically outline issue to GPU for quickening. Second, as the level of hubs in generally social organizes essentially take after a force law dispersion, serious disparity between GPU strings will happen amid impact spread processing, genuinely corrupting the generally execution. Third, because of the unpredictable nature of true professional network, the memory gets to show poor spatial area, making it hard to fit the GPU computational model. To address the above difficulties, we propose a Gpu accelerated impact expansion skeleton, IMGPU, which goes for completely leveraging the parallel preparing ability of GPU. We first change over the social chart into a regulated non-cyclic chart (DAG) to evade excess count. At that point a Bottom-up traversal calculation (BUTA) is outlined and mapped to GPU with CUDA programming model. Our methodology gives generous change to the current successive methodologies by exploiting the inalienable parallelism in handling hubs inside a informal community. In light of the gimmick of the impact augmentation issue, we propose a set of versatile systems to investigate the most extreme limit of GPU and upgrade the execution of IMGPU. Specifically, we create a versatile K-level blend strategy to augment the parallelism among GPU strings. In the interim, we redesign the chart by level and degree conveyance to minimize the potential uniqueness and blend the memory access to the most extreme degree. We direct broad explores different avenues regarding both true and manufactured social system follows. Contrasted and the condition of-the-workmanship calculation Mixgreedy, IMGPU attains up to 60 speedup in the execution time and has the capacity scale up to remarkably huge scale systems which were never expected with the current consecutive methodologies. As an issue, the commitments of this paper are predominantly twofold. First and foremost, we show BUTA, a proficient base up traversal calculation which contains inborn parallelism for the impact boost issue. The BUTA to GPU building design to adventure the parallel transforming ability of GPU. Second, to best fit the GPU computational model, we propose a few viable streamlining systems to expand the parallelism, evade potential uniqueness, and blend memory access. The rest of this paper is composed as takes after: Area 2 gives preliminaries on impact expansion furthermore surveys related work. The IMGPU structure and relating GPU improvements are introduced in Section 3 furthermore Section 4, individually. We assess the IMGPU plan by far reaching tests and report the exploratory brings about Section 5. 2. PRELIMINARIES AND RELATED WORK In this segment, we introduce preparatory prologue to influence maximization, and survey related work. In influence maximization, an on-line informal organization is demonstrated as an issue graph G =(V,E,W), where V= {v1,v2,v3 ) speaks to the set of nodes in the graph, each of which relates to an individual client. Every node can be either dynamic or idle, and will change from being idle to being dynamic on the off chance that it is influenced by others nodes. E V  V is a situated of directed edges speaking to the relationship between diverse clients. Take Linked-In as an illustration. A directed edge will be secured from node vi to vj , if vi is trailed by vj , shows that v j is open to get tweets from vi , and therefore may be influenced by vi . G =(V,E,W), where V= {v1,v2,v3 ) is the weight of every node which shows its commitment to the influence spread. The weight 137 is instated as 1 for every node, implying that if this node is influenced by different nodes, its commitm ent to the influence spread is 1. The span of node set is n, and the quantity of edges is m. Node vi is known as a sink on the off chance that its out-degree is 0, and called a source on the off chance that its in-degree is 0. The independent cascade (IC) model is one of the most decently mulled over dispersion models. Given a beginning set S, the dissemination procedure of IC model unfolds as takes after: At step 0, just nodes in S are dynamic, while different nodes stay in the inert state. At step t, for every node vi which has recently changed from being inert to being dynamic, it has a solitary opportunity to enact every at present dormant neighbor v w , and succeeds with a likelihood . In the event that vi succeeds, v and w will get to be dynamic at step . In the event that v w has numerous recently initiated neighbours, their endeavours in actuating v w are sequenced in a subjective request. Such a procedure runs until no more actuations are conceivable We utilize to mean the influence spread of the introductor y set S, which is characterized as the normal number of dynamic nodes toward the end of influence proliferation. Given a graph G =(V,E,W) and a parameter K, the influence maximization issue in the IC model is to choose a subset of persuasive nodes S V of size K such that the influence spread is augmented toward the end of influence dissemination process. We proposed Mixgreedy that diminishes the computational many-sided quality by registering the minor influence spread for every node G =(V,E,W) in one single reenactment. Mixgreedy first figures out if an edge would be chosen for engendering or not with a given likelihood. At that point all the edges not chose are evacuated to structure another graph G =(V,E,W) . With this treatment, the negligible addition from adding node vi to S is the quantity of nodes that are reachable from vi , however inaccessible from all the nodes in S. To process the influence spread for every node, a fundamental execution is doing BFS for all verticess which takes O(m,n) MixGreedy incorporates Cohen’s randomized algorithm for estimating the marginal influence spread for each node, and afterward selects the node that offers the maximal influence spread. Embracing the above streamlining methods, MixGreedy can run much faster. In any case, the change is not sufficiently viable to lessen execution time to an adequate range especially for huge scale professional networks. In addition, Cohens algorithm provides no precision ensure. 3 IMGPU FRAMEWORK Here, we depict the IMGPU framework that empowers GPU-accelerated processing of influence maximization. Initially, we create BUTA that can exploit intrinsic parallelism and adequately lessen the complexity with guaranteed accuracy. 3.1BOTTOM-UP TRAVERSAL ALGORITHM We can get another graph from the original graph after haphazardly selecting edges from G. As opposed to doing BFS for every node which is noticeably wasteful, we can find that the negligible impact calculation of every node just depends on its child node; subsequently, we could get the impact spreads for all the node by crossing the diagram just once in a bottom-up way. The level of a node vi, is: We initially change over the graph to a DAG to keep away from repetitive computation and potential deadlock. Fig. 1.Bottom-up traversal. Fig. 2.Relation of nodes. Algorithm 2 displays the points of interest of BUTA, where R signifies the quantity of Monte-Carlo simulations. In each round of recreation, the graph is initially reproduced by selecting edges at a given likelihood and changing over into a DAG Then we begin the bottom up traversal level by level We utilize the in parallel build to demonstrate the codes that can be executed in parallel by GPU. Impact spreads of all hubs at the same level can be ascertained in parallel and the mark of every hub is then decided for future cover reckoning. After R rounds of reenactment, the hub giving the maximal negligible increase will be chosen and added to the set S. Fig. 3. Graph data representation. The advantages of BUTA is that we can enormously decrease the time and BUTA can promise preferred accuracy over Mixgreedy as we precisely figure impact spread for every node while Mixgreedy approximates them from Cohens calculation. 3.2BASELINE GPU IMPLEMENTATION In this area, we first depict the graph data structure utilized as a part of this work, and afterward discuss about the baseline implementation of IMGPU in point of interest. 3.2.1 DATA REPRESENTATION To execute IMGPU over the GPU structural planning, the customary nearness lattice representation is not a decent decision particularly for large-scale social networks. The reasons are. First and foremost, it costs memory space which altogether confines the span of informal community that can be taken care of by GPU. Second, the dormancy of information exchange from host to gadget and worldwide memory access is high, corrupting the general execution. Therefore, we utilize the compressed sparse row (CSR) format which is generally utilizedfor scanty framework representation 3.2.2 BASELINE IMPLEMENTATION The graph information is initially exchanged to the global memory of GPU. At that point, we allocate one string for every node to run the impact spread computation kerne. The impact spread processing bit meets expectations iteratively by level. Along these lines, the parallel handling ability of GPU is abused for impact maximization acceleration. 4 GPU-ORIENTED OPTIMIZATION In this area, we analyze figures that influence the execution of benchmark GPU usage and give viable improvements to accomplish better performance. 4.1DATA REORGANIZATION BUTA executes level by level in a bottomup manner. Strings in a twist are in charge of preparing diverse node. Then again, because of the SIMT peculiarity of GPU, strings in a warp execute the same direction at each one clock cycle. Subsequently, if strings in a twist are appointed to process hubs at distinctive levels, uniqueness will happen and affect diverse execution ways, which will essentially degrade the execution. Likewise, amid BUTA execution, strings need to acquire the visit data and the impact spreads of their child nodes. As the degrees of hubs in genuine informal communities principally take after a force law dissemination, there may exist incredible difference between the level of distinctive nodes. Such dissimilarity will seriously lessen the usage of GPU centers and corrupt the execution. To address these issues, we revamp the graph by presorting the graph, with the motivation behind making strings in a warp process nodes that are at the same level and with comparable degree however much as could reasonably be expected. 4.2ADAPTIVE K-LEVEL COMBINATION Baseline IMGPU usage computes impact spreads of node from bottom up by level, and subsequently its parallelism is restricted by the quantity of node at each one level. We can advantage more if there are sufficient node having a place with the same level to be handled, overall the parallel preparing capacity of GPU would be underexploited. For most cases, there is satisfactory parallelism to adventure since this present reality interpersonal organization is normally of vast scale. Notwithstanding, there do exist some specific levels which just contain a little number of node because of the intrinsic graph irregularity of social networks. 4.3MEMORY ACCESS COALESCENCE When we register the impact spread of a node, the string needs to get to the impact spreads of all the youngster node. Accordingly, for node with substantial degree, this will bring about countless gets to which will take long execution time. Such node, however representing a little rate of the whole graph, generously exist in a lot of people genuine social networks. 5 EXPERIMENTAL SETUP In our experiments, we use traces professional networks of distinctive scales and diverse types, like LinkedIn We look at IMGPU and its advancement version IMGPU_O with the two existing eager algorithms and two heuristic algorithms, and Mixgreedy , ESMCE , PMIA, and Arbitrary. In addition, we also execute a CPU- based version of BUTA, alluded to as BUTA_CPU, to assess the execution of BUTA and the impact of parallelization. The itemized description of the information sets whats more algorithms can be found in which is accessible in the on-line supplemental material. 6 CONCLUSION In this paper, we present IMGPU, a novel structure that accelerates influence maximization for professional network in-order to spread the job notification by exploiting GPU. Specifically, we design a bottom up traversal algorithm, BUTA, which significantly reduces the computational unpredictability and contains inalienable parallelism. To adaptively fit BUTA with the GPU building design, we also investigate three viable optimizations. Extensive experiments demonstrate that IMGPU significantly reduces the execution time of the existing sequential influence maximization algorithm while keeping up satisfying influence spread. REFERENCES [1] D. Bader and K. Madduri, â€Å"GTgraph: A Suite of Synthetic GraphGenerators,† http://www.cse.psu.edu/madduri/software/GTgraph/, Nov. 2012. [2] W. Chen, Y. Wang, and S. Yang, â€Å"Efficient Influence Maximizationin Social Networks,† Proc. ACM Int’l Conf. Knowledge Discovery andData Mining (SIGKDD), pp. 199-208, 2009. [3] W. Chen, C. Wang, and Y. Wang, â€Å"Scalable Influence Maximiza-tion for Prevalent Viral Marketing in Large-Scale Social Net-works,† Proc. ACM Int’l Conf. Knowledge Discovery and Data Mining(SIGKDD), pp. 1029-1038, 2010. [4] N. Bell and M. Garland, â€Å"Efficient Sparse Matrix-Vector Multi-plication on CUDA,† Technical Report NVR-2008-04, NVIDIA,Dec. 2008. [5] E. Cohen, â€Å"Size-Estimation Framework with Applications toTransitive Closure and Reachability,† J. Computer and SystemSciences, vol. 55, no. 3, pp. 441-453, 1997. [6] P. Domingos and M. Richardson, â€Å"Mining the Network Value ofCustomers,† Proc. ACM Int’l Conf. Knowledge Discovery and DataMining (SIGKDD), pp. 57-66, 2001. [7] J. Barnat, P. Bauch, L. Brim, and M. Ceska, â€Å"ComputingStrongly Connected Components in Parallel on CUDA,† Proc.IEEE 25th Int’l Parallel Distributed Processing Symp. (IPDPS), pp.544-555, 2011.

Abraham Maslow’s Hierarchy of Needs Essay -- Essays Papers

Abraham Maslow’s Hierarchy of Needs When one thinks of what families do for each other, they will most likely think of care. More specifically they think of the care that a parent has for their child. Parents have to meet certain â€Å"needs† for the child in order for the its healthy survival. Children must be fed and clothed. Parents must also watch over the safety of and be the friends of the children. Cheering on in good times and making their child the best it can be are also responsibilities of parents. The family metaphor is used when describing the Human Relations method of management. In this the management of a company is seen as the parents and the employees are seen as the children. Employees, as seen as the children also have certain needs as well. These needs are very similar. Abraham Maslow did studies of the basic needs of human beings. He put these needs into a hierarchical order. This means that until the need before it has been satisfied, the following need can not be met (Encyclopedia, 2000). For example, if someone is hungry they are not thinking too much about socializing. In the order from lowest to highest the needs are psychological, safety, social, esteem, and self-actualization. The first three are classified as lower order needs and the last two are higher order (Hierarchy, 2000). Without meeting these needs workers are not going to be as productive as they could otherwise. The first three are considered to be essential to all humans at all times. The last two have been argued but are mostly considered to be very important as well. A person’s behavior at one specific point in time usually controls their attitude at that time. Managers must be able to understand these basic needs of their workers. If these needs are not dealt with in a certain correct way than workers will not reach their maximum potential. If the lower order of needs is not met than people are not happy. The same can be said of the higher order. Food, water, sleep, and sensory gratification are all at the top of the hierarchy. These and other needs are considered to be part of the psychological needs. These rest at the top of the hierarchy because they are the essence to basic human survival. The list of these needs can be much larger or shorter depending of personal opinion. Maslow himself said that said â€Å"it would be po... ..., safety, social, esteem, and self-actualization needs. He put these needs in a pyramid shape; meaning that without the prior need met the next need can not be met. Managers must know that people must have these certain needs met before they can be productive. If someone is hungry of worried about their safety than they will not be as great of an asset as someone who has these needs met. Not only do managers need to recognize these needs but they also need to find a way to satisfy the needs of their workers. References Encyclopedia Britannica Online. (2000). Maslow, Abraham. Encyclopedia Britannica [online]. Available: (www.britannica.com/bcom/eb/article/410,5716,52534+1,00.html). Goble, F.G. (1970). The Third Force. New York: Grossman Publishers. Heirarchy of Needs, Abraham Maslow (2000). [online]. Available: (www.itconsultancy.com/backround/maslow/index.html). Maslow’s Hierarchy of Needs (2000). [online]. Available: (www.connect.net/georgen/maslow.html). Miller, K. (1999). Organizational Communication. Belmont, CA: Wadsworth Publishing Company. Wilson, C. (1972). New Pathways in Psychology. New York: Taplinger Publishing Company.

Monday, August 19, 2019

Crime and the Media Essay -- essays research papers

Crime and the Media The public depends on the news media for its understanding of crime. Reportedly three quarters (76%) of the public say, they form their opinions about crime from what they see or read in the news (Dorfman & Schiraldi, 2001). After reviewing five hours of reality crime television shows, one is left with a very dismal look on society and a prejudice towards minorities as they are largely depicted as the perpetrators of crime. This new genre commonly referred to as reality television appears to be sweeping the nation by storm. Opinions vary, depending on whom you ask, to what extent reality plays a role versus the selling of a product. Sensationalism, advertising, ratings hype, profiling and fear all comprise the mass medias’ marketing strategy to America. Sadly, what we see portrayed by television shows such as â€Å"COPS† have contributed largely and in some cases unjustly to the prejudices that are present today. The predominant races of the suspects portrayed in the episodes of COPS were African Americans (Langley, 2005). The predominant genders of the suspects were male. However, the May 5, 2005, episode of COPS featured an exclusive on COPS: Bad Girls (Langley, 2005). Combining the special episode with the four and a half hours of regular viewing of COPS the numbers still reflect the predominance of suspects featured are African American males (Langley, 2005). In two cases out of the nineteen viewed, the suspects were Caucasian, and the reason for the stop was expired tags. This stop was handled much differently than the previous stop. The officers were not aggressive when they approached the car, and the incident proceeded in a civilized manner. Ironically, in the scene prior to the present, the officers had observed an African American suspect in a drug area with expired tags, and the encounter was very different. A car chase ensued, an ultimate arrest with the suspect forced to the grou nd in an aggressive manner, searched, and hand cuffed. The officers suggest to the audience their suspicions that drugs may be involved. Ultimately, their suspicions prove correct when the cameras capture the crack cocaine hidden in the pants of the suspect. Of the crimes, featured 90% were drug related and 10% were associated with domestic crimes. On the COPS episode aired on May 6, 2005, the suspect, African American observed in an undercover sti... ...stice system. Dr. West points out â€Å"The urgent problem of black poverty is primarily due to the distribution of wealth, power, and income-a distribution influenced by the racial caste system that denied opportunities to most "qualified" black people until two decades ago.† (West, 1994. p. 93-5). Clearly, economics contributed to the criminal propensities of the suspect viewed. The African American suspects compared to their counterparts, appeared scary, drug crazed and out of control. While it is unfortunate, people still believe, if it is on television it must be true. Reality crime television provides a false sense of legitimacy. Those that watch the show, often forget that in the final analysis, it is television, and the main point of television programming is to entertain, sell advertisement and achieve the best ratings possible. References Dorfman, L, & Schiraldi, V. (2001). Off balance: youth, race & crime in the news. Building Blocks for Youth Law Center. Retrieved May 5, 2005, from www.buildingblocksforyouth.org Langley, J. (Producer). (2005). COPS. (Television series). New York: Fox. West, C. (1994). Race matters. New York: Vintage Publishers.

Sunday, August 18, 2019

The Alamo Essay -- History Texas Essays

The Alamo "To the people of Texas and all Americans in the World: I shall never surrender or retreat ... I Am determined to sustain myself as long as possible and die like a soldier who never forgets what it is due to his honor and that of his country-VICTORY OR DEATH." This was a letter sent by William Barret Travis during the siege of the Alamo on February 24, 1836. It was a cry for help to anybody and everybody willing to listen. It all started in 1830 with Stephen Austin, a leader of American pioneers in the wild, living in Texas, under the rule of the Mexican government, who had solved two major problems that the settlers had with the government. The colonist were now allowed to keep slaves in Texas, even though no other areas under Mexican rule owned slaves, and the second was the government made sure that Texans would be protected by the Mexican government from suits to collect debts that they had contracted in the United States before their immigration to Texas. All over the South were signs on bankrupt homes homes saying "Gone to Texas" were they did not have to pay off their debts . Austin and his followers were very hot tempered and ready to start up with any government that they disliked. They soon found a chance to stir up trouble under the changeable Mexican rule. Mexican authorities began to worry that too many Americans were coming into their country. About thirty thousand settlers came to Texas in a ten-year span after Austin had established his settlement. The Mexican government under the urging of President Bustamante made harsh laws against arrival of new immigrants into Texas in 1830. Trade was also restricted with America. All borders were closed to newcomers but the Louisiana border could not be patrolled and settlers continued to arrive in Texas. American settlers were put into jail for the ruckus they caused due to these new laws, among them was Stephen Austin. On July 1833 Austin traveled to Mexico City to plead the cause of the colonists. The colonists wanted to obtain full Mexican statehood and have total control over themselves. Mexican officials would not listen to the Texans. On his way home Austin was arrested for treason on January 3, 1834. The government had intercepted a letter from Austin that said that if his appeal had failed the Texans should establish themselves as a separate state of Mexico. He was j... ...their might charging at the enemy screaming " Remember the Alamo". Their incentive in winning was the one hundred and eighty deaths at the Alamo. This inner strength that they obtained from the defeat at the Alamo helped the others defeat the Mexicans and finally win their freedom from the yolk of the Mexican government and eventually being accepted as the twenty-eighth state in the United States of America. But the acceptance would not come easily. They had problems being accepted due to the fact that the ownership of slaves was considered all right in Texas but the North did not want to accept more slave states. Eventually on February 19, 1846 they were accepted as a state. I never really knew what it was before this and was always wondering why it was such an important event in Texan history. The one thing that confuses me is why the State of Texas would choose a war that they were totally destroyed in as an event that is considered greater than most other events throughout Texan history. But for one thing I truly admire Travis and his followers for fighting to the death like heroes in order to establish freedom and their rights they believed that in all truth deserved.

Saturday, August 17, 2019

Competetive Nucleophiles Essay

Introduction: The purpose of this experiment was to compare the relative nucleophilicities of chloride ions and bromide ions in two different reactions. One reaction involved n-butyl alcohol and the other involved t-pentyl alcohol. We performed the reactions and compared the percentages of alkyl chloride and alkyl bromide in the product. To perform this experiment, we used methods including heating reaction mixture under reflux, extraction using a separatory funnel, drying with anhydrous sodium sulfate, and refractometry. Experiment Scheme: First, we prepared the solvent-nucleophile medium. We combined 44mL 7.7M sulfuric acid with 4.75g ammonium chloride and 8.75g ammonium bromide, and we heated the mixture with stirring to dissolve the salts. We put 17mL into a separatory funnel for use in the second reaction, and placed the rest into a reflux apparatus for our first reaction. We performed the first reaction of the competitive nucleophiles with 1-Butanol. We added 2.5mL of 1-butanol to the solvent-nucleophile medium in the reflux apparatus with a boiling stone and heated the mixture under reflux for 75 minutes. After reflux was completed, we allowed it to cool in an ice bath, and transferred the solution to a clean separatory funnel. The different phases separated, and we drained the lower aqueous layer. We added 5mL water to organic layer, mixed and collected the lower organic layer. We extracted the organic layer with 5mL sodium bicarbonate, drained organic layer and dried with anhydrous sodium sulfate. We decanted the alkyl halide solution and set it aside to be analyzed by refractometry. We performed the second reaction of competitive nucleophiles with 2-methyl-2-butanol. We measured 2.5mL of 2-methyl-2-butanol into the separatory funnel containing 17mL of the solvent-nucleophile medium. We swirled the mixture, venting occasionally until pressure equalized, then shook it vigorously with occasional venting for 2 minutes. We then allowed phases to separate. We drained the lower aqueous layer and poured the top organic layer into a small beaker containing 0.5g sodium bicarbonate. When bubbling stopped and clear liquid was obtained, we decanted the alkyl halide and began analysis by refractometry of the products from both reactions. By refractometry, we measured the refractive index of the products and used Equation 1 and 2 to calculate the percentages of each product (Pavia, Lampman, Kriz, and Engel, Organic Chemistry Laboratory Manual p. 47-50). Reaction 1 (Pavia, Lampman, Kriz, and Engel, Organic Chemistry Laboratory Manual p. 47-50) Discussion: In this experiment we used 2 nucleophiles, the bromide ion and the chloride ion. We performed 2 reactions with these nucleophiles in equimolar concentrations, and they competed with each other for the substrate. Normally, alcohols do not react well in nucleophilic substitution reactions because the hydroxide ion (a strong base) would need to be displaced, and it is not a good leaving group. For that reason, the substitution reaction must take place in acidic solution; the alcohol must first be protonated because water is a stable molecule and a better leaving group. After protonation, the substrate reacts by either the SN1 or SN2 mechanism. 1-Butanol will react by the SN2 mechanism because it is a primary alcohol while 2-methyl-2-butanol will react by the SN1 mechanism because it is a tertiary alcohol. In Reaction 1, the major product was the alkyl bromide and the minor product was the alkyl chloride because bromine is more reactive; bromide is a stronger nucleophile. In Reaction 2, there essentially was no major product because the alkyl bromide and alkyl chloride formed in nearly equal amounts; the product was racemic. This is because it followed the SN1 reaction mechanism. The rate determining step is the loss of the H2O molecule forming a carbocation, and this step does not require a nucleophile (Pavia, Lampman, Kriz, and Engel, Organic Chemistry Laboratory Manual p. 47-50). Important methods used in this experiment included heating reaction mixture under reflux, extraction using a separatory funnel, drying with anhydrous sodium sulfate, and refractometry. When heating under reflux, we used a condenser attached to the flask that we were heating. Under reflux, our system could heat the mixture to boiling and vapors condensed and drop back into the flask. We can heat our mixture for a long time at boiling point without losing any product. In refractometry, we measured the refractive index of our product mixture, which is the ratio of the speed of light in a vacuum to the speed of light in the media of interest. We can use our measured values with the standard values to calculate the percentages of alkyl chloride and alkyl bromide. Sources of error could include the extraction process and the reading of the refractive index values. During extraction, it is possible that the phases may not have completely separated or the reactants did not fully react to form products, so some of the reactants could possibly enter into our final mixture. When finding refractive index values, it is possible to have some error when reading the value. Overall, error did not have a huge effect on our results. We could improve the procedure by being very careful to remove the entire aqueous layer during extraction so none gets into our final product for refractometry testing. In conclusion, the experiment turned out well. Our results align with the expected results. We expected that the alkyl bromide will be the major product of Reaction 1 because it followed the SN2 mechanism, and we expected that the product from Reaction 2 would be a racemic mixture because it followed the SN1 mechanism. Questions: Bromide is a stronger nucleophile because the chlorine is more electronegative than bromine, so it holds electrons in closer. Bromine is less electronegative and has more electrons, and it is able to share unpaired electrons much more easily than chlorine. References ChemSpider Chemical Database. Royal Society of Chemistry, 4 July 2012. Web. Accessed 11 Sept. 2012. Sigma-Aldrich. Sigma-Aldrich. 2012. Web. Accessed 11 Sept. 2012. Pavia, Lampman, Kriz, and Engel. Organic Chemistry Laboratory Manual. Cengage Learning: Mason, OH, 2009. Print.