Sunday, December 22, 2019

Life of a Vietnam Soldier - 582 Words

Wars are fought for freedom and independence and usually when soldiers come home we receive them with open arms ready to praise them and thank them for putting their lives on the line. If you were asked to describe a soldier, you’d probably say heroic, brave, courageous, or honorable. After the Vietnam War, parades weren’t the welcoming soldiers got; instead, they were shunned and booed at. People’s opinion on the war was greatly influenced by the media. During the Vietnam War, the horrors that were happening on the battlefield were shown to Americans in their living rooms. There was no censorship meaning Americans back home saw dead bodies, Vietnamese children being shot and villages being burnt, all done by American Soldiers. Watching children, babies and old people being killed caused people to label soldiers as murderers and baby killers. Before Vietnam, soldiers had always been shown in a heroic way. But now, reporters would show only parts of a story, the parts that made soldiers look bad. In the Vietnam War, reporters could literally follow soldiers onto the battle fields and show it on television. Also, most photographers were interested in showing the bad aspects of the war such as the remaining destroyed village of Vietnamese or the suffering of soldiers. The media built stereotypes of soldiers at war as part of anti- war protests so photographers would show the parts that benefited anti-war protests and captured only half the story in his photograph. ForShow MoreRelated Sweetheart of the Song of Tra Bong as Metaphor Essay1150 Words   |  5 PagesSweetheart of the Song of Tra Bong as Metaphor  Ã‚   The Vietnam War is a strange and unexplainable event in American history. The controversies surrounding the American involvement in Vietnam and the need for Vietnam veterans to tell their stories of the war are prevalent in the post-Vietnam culture of America. The stories that will last forever are those that swirl back and forth across the border between trivia and bedlam, the mad and the mundane(89). The story of the sweetheart of the SongRead MoreThe Vietnam War, Grandpas Story1281 Words   |  6 Pagesâ€Å"The Vietnam war was a costly and very long conflict that eroded the communist regime of North Vietnam and its allies against the South Vietnam and its ally, us the United States of America (Unknown Source).† The Vietnam War began on the eve of 1959, causing a struggle between two of our major national forces. These two forces were attempting to unify the country the both love, Vietnam. Many of the young souls were young men, such as my grandfather who felt that they were helping their country.Read MoreThe Impact of the Vietnam War on Veterans Essay966 Words   |  4 PagesHow did a Vietnam soldiers life change during and after the war. Society had a lot of different views regarding the soldiers and the war. When coming home veterans faced many distinct challenges. The Vietnam Veterans Memorial helped to heal the nation. The Vietnam War had a major impact on the United States and the soldiers who fought in it. The Vietnam War was a violent and costly war that needed many men to fight for its cause. These men are now known as the Vietnam veterans. Numerous veteransRead MoreThe Things They Carried By Tim O Brien899 Words   |  4 PagesDuring the Vietnam War, a range of emotions occurred within every soldier. Even though some veterans can move past their memories of war, many soldiers became haunted by their dark memories. In Tim O’Brien’s fictional novel The Things They Carried, O’Brien takes his readers through several different events and emotions that occurs to his character during the Vietnam War. Although his character sometimes faces a tough time telling the story, O’Brien manages to inform his readers of the differentRead MoreThe Things They Carried By Tim O Brien1459 Words   |  6 Pages1950’s, the Vietnam War turned to be the modern pinnacle for battles resulting in the deaths of 58,000 American soldiers and millions of Vietnamese death. I t saw the viable destruction of modern technology such as the newly fashioned M-16 rifle and the Apache, a helicopter made for mass destruction. For the soldiers experiencing Vietnam, it was truly an experience which would shape their hearts and minds forever. As evidenced in Tim O’ Brien’s The Things They Carried, The Vietnam War was an emotionalRead MoreThe Vietnam War Was A Long And Bloody1502 Words   |  7 Pages The Vietnam War was a long and bloody one. The war began on November 1, 1955 and ended on April 30, 1975. The war lasted nearly 20 years. Over this period, 9,087,000 men from United States were deployed, 58,220 were killed and more than 300,000 were wounded. The war also killed an estimated 2 million Vietnamese civilians, 1.1 million North Vietnamese troops, and 200,000 South Vietnamese troops. The Vietnam War was the first war America ever lost and this lost would lead to a heavy impact on theRead MoreWar in Films: Universal Soldier1320 Words   |  6 Pagesagainst the Vietnam War made their views known by many forms of protesting such as forming organizations, rallying, and anti-war protest music. Anti-war protest music was an opportunity to put people’s perspectives into song to hopefully spread their message. Buffy Sainte-Marie wrote the song â€Å"Universal Soldier† in 1962 and her message was that â€Å"Universal Soldier is about individual responsibility for w ar and how the old feudal thinking kills us all† (Boulanger). The song â€Å"Universal Soldier† was usedRead MoreThe Effect of Vietnam War on the Soldiers1679 Words   |  7 Pages The Vietnam War was the longest and the most unpopular American war of the twentieth century. The United States was involve in the Vietnam from 1944 to 1973, but it was only during the last years that the U.S deployed ground troops (Lawrence 1). For the first time the United states was the aggressor. Vietnam is situated thousands of miles from the United States, so Vietnam was not a direct threat to the United States’ safety. The Vietnam leader Ho Chi Minh seem to look up to the United States,Read MoreA Compare and Contrast Analysis of Experiences in the Iraq and Vietnam Wars832 Words   |  4 Pages COMPARE AND CONTRAST EXPERIENCES OF IRAQ VIETNAM: Thousands were killed, and many more were wounded in the Vietnam war, a war that many are to this day still living with the consequences. The Things They Carried, written by William Timothy OBrien. The story takes place in Vietnam, during the war, sometime in the 1960s. First Lieutenant Jimmy Cross, and his unit are in Vietnam serving for the United States. Jimmy, is in love with a college woman named Martha from back home. Martha writes JimmyRead MoreReality of the Vietnam War843 Words   |  4 Pagesof the Vietnam War During the Vietnam War the reality of warfare brought many soldiers back to a home that didnt want them. Their feelings torn by atrocities, the loss of friends, and the condition of loneliness only made the experience worse. Did the issues on the home front affect the issues on the frontline? The novel Fallen Angels by Walter Dean Myers is a perfect example of the conflict and diversity among other soldiers during the Vietnam War. It shows the reality many soldiers faced and

Saturday, December 14, 2019

My Trip Free Essays

If I have a lot of money, I will spend it by travelling around the world in 10 days with my friends. The country that I plan visit is Australia,Japan,Canada, Singapore. The purpose of this trip is to enjoy and relax our mind. We will write a custom essay sample on My Trip or any similar topic only for you Order Now The first day,I wake up at 7 o’clock in the morning and meet my friend at the KLIA at 8 o’clock. Our flight will be depart at 11 o’clock. We took the plane for 9 hour and finally arrive at the Melbourne Airport, Australia at midnight. After that we search for the hotel that we have booked named Melbourne Hotel get some rest for the day. The next day we will go to state capital of New South Wales, Sydney. One of the famous place you have to visit in Sydney is the Sydney Opera House. There they got 1000 rooms, 300 corridors and hundreds of tales and secrets. The next day we’ll go to the Art Gallery of New South Wales. the Gallery is one of Australia’s leading museums of art and a Sydney institution, with five levels presenting a diverse range of art. And that’s the end of the second day. The third day, we’ll take flight from Australia to Japan also for 9 hours. There we arrive at the Haneda Airport,Japan. After that we stayed at Hotel Metropolitan Tokyo. The third day, we’ll go to the Japan’s communications and observation tower,Tokyo Tower. The tower acts as a support structure for an antenna. Originally intended for television broadcasting, radio antennas were installed in 1961, but the tower is now used to broadcast signals for Japanese media outlets. The next day, we go to the Kaminari Gate in Asakusa, Tokyo. The Kaminari Gate was first built in 941 by Taira no Kinmasa a military commander. 2] It was originally located near Komagata, but it was reconstructed in its current location in 1635. The fifth day, we go to the Shinjuku for shopping because the Shinjuku is the center of this large district home to many malls, stores, restaurants. The sixth day, we’ll take flight from Japan to Canada for 10 hours and 50 mins. We arrive at the Montreal-Pierre Elliott Trudeau International Airport, Canada. We stayed at the Le Petit Hotel, Motreal and rest for the day. The next day, we’ll go to the Basilique Notre-Dame. This Catholic church has a stunning medieval-style interior that features walnut-wood arvings, exquisite stained-glass windows, 24-carat gold stars in a vaulted blue ceiling, as well as one of the largest Casavant organs in North America. The next day, we’ll go to the Mont (Mount) Royal. This 764-foot mountain provides excellent view of the city and is a popular recreation spot. The ninth day, we’ll take flight to Canada to Singapore about 16 hours and 30 mins. We stayed at the Marina Bay Sands. The next day we go to the Merlion Park. Merlion is a mythical creature with the head of a lion and the body of a fish, used as a mascot and national personification of Singapore. And the next day me go back to Malaysia How to cite My Trip, Papers

Friday, December 6, 2019

Spatiotemporal Dynamics Of Human Movement â€Myassignmenthelp.Com

Question: Discuss About The Spatiotemporal Dynamics Of Human Movement? Answer: Introducation The technology known as the WiMAX, known as the Worldwide Interoperability for Microwave Access, is used to facilitate wireless connectivity among devices by using the IEEE 802.16 standard. The technology is used to command a wide ranges in connection by using the core principles of multiple input multiple outputs (MIMO) and orthogonal frequency division multiplexing (OFDM) techniques (Rengaraju, Lung and Srinivasan 2012). The less time for feasibility and the fewer requirements in cost is the main motivational need for the acceptance of this technology. The main encryption standards for these technologies are the DES, TripleDES and RC2. The Data Encryption Standard (DES) is termed as a symmetric key algorithm which is used for the encryption of the data. The main use of the technology is in the application of cryptography. The operational method of DES includes the transformation of a text bit of a specific length to a cipher bit text of the same length. The cipher block size is 64 bits. The method of encryption includes the presence of a key for decrypting the ciphered texts (Rengaraju, Lung and Srinivasan 2012). The symmetric key algorithm of the TripleDES is the same as that of the DES with the sole difference in its mode of operation. The application of encryption is usually done three times. The concept of this technology is used to cause an increase in the key size without applying any changes in the algorithms. This method uses two different keys (j, k) and applications of encryption are done by each of them (Kamali, Bennett and Cox 2012). As the two key methods are vulnerable to middle key threats and risks, the use for three keys is adopted to mitigate them. The RC2 algorithm is also termed as a symmetric key algorithm for encryption standards. However, the size of the key is 40 bits. The main developer of this standard is Ron Rivest. The size of the key is supposed to be variable (Kamali, Bennett and Cox 2012). The main specifications of the standards are the presence of 18 rounds where 16 of them are of one type and the remaining two are of another type. The two types are either MIXING or MASHING. Algorithm Developer Key size Block size Algorithm Rounds Compatibility to WiMAX DES IBM 56 bits 64 bits Feistel Network 16 Yes TripleDES IBM 112 bits 64 bits Feistel Network 48 Yes RC2 Ron Rivest 8-128 bits 64 bits Heavy source Feistel Network 18 Yes Table: Comparison between the three standards Personal area network (PAN) is basically used to connect among various devices present in the vicinity. The devices can range from computers to mobile devices with connectivity access. In addition, the devices can also be connected to the internet where one of them is used as the router for internet connections. As the technology is used to provide connectivity in the vicinity, the rage of connection is up to a few meters. This section discusses about the various PAN technologies namely the Bluetooth and the ZigBee. Bluetooth: The use of ultra high frequency (UHF) band is used to provide communication features accepting a short range in connectivity. The range used for communication is 2.4 GHZ and the modulation techniques used is the Gaussian Frequency shift keying (GFSK) and 8DPSK. Due to the advancement in technologies, the presence of various risks is evident in communicating with Bluetooth (Carpenter, Fowler Adler, 2012). These are default configuration of the device, loss or theft, person-in-the-middle, denial of service and service mapping. The default configuration is the presence of pre-installed configurations in the system which is already applied by the manufacturers during its development. Due to the complex nature of the configuration, people often neglect their reconfiguration. When the Bluetooth is in ON mode, the BD_ADDR and clock will be noticed by the other devices present in the vicinity of the user. This is the main problem where unethical attackers can get access to the systems to steal information. Loss or theft of information is another concern for risks in the systems. A Bluetooth device always stores the access keys of the other devices in their memory. In case a device falls into wrong hands, it can be used to get access to all the paired devices (Versichele et al. 2012). This is a main concern and the security implications are to be addressed. This can also be used to eavesdrop into the systems and steal information. The person-in-the-middle attack is also another security challenge of Bluetooth. Due to the advancements in technologies, attackers can get access to the private keys of devices in the vicinity. Their device can then be used to get access to the other devices in vicinity. The main mode of operation includes the mimicry of the attackers device to act like normal devices. When they try to establish connection to the other device, it is usually seemed to be a known device and thus connection is established. This is also another reason for unethical access and eavesdropping. The denial of service (DOS) attacks, are another risks of Bluetooth technologies. Although these attacks are not reported, it can be used to lock a user from accessing their devices. This implies that the device will not be able to do the normal operations. In addition, due to the presence of various home appliances in the system, the signal jamming is a common method for use against such devices. Moreover, the attacker may also try to drain out the battery of the device by sending constant requests to connect. The last method of attacking includes the service mapping techniques. In general, when a device has to connect, it sends out signals to connect to look for an open signal. This is mainly done by the service discovery protocol (SDP) which is the most universal method used by all devices (Versichele et al. 2012). This technique can be used to get the lists of devices in the vicinity and connect accordingly. However, for this attack to work, the attacker needs to stay close to the devices. ZigBee: ZigBee technologies have compliance to the IEEE 802.15.4 standards to facilitate small range connectivity. The main applications of these technologies are in home automations. The security implications of the ZigBee technologies are the absence of any security in physical access. In case a device is stolen, it can be used to get access to the home network (Rohitha et a., 2012). The technology mainly integrates the key in the physical hardware of the device which is used to get access. Thus, this is a big problem for the ZigBee network. The key attacks are other security implications of the technology. The technology uses two types of keys, the pre-shared keys and the over the air keys. Due to the lack of security measures and intruder detection in the IEEE 802.15.4 standard, access is easily acquisitioned. Energy harvesting in wireless sensor networks: The devices now-a-days need to utilize the various energy coefficients required for implementing the internet of things concept. As the presence of vulnerabilities and threats are increasing with each modernization trends, it is required for the devices to stay under working conditions for a long time (Energy harvesting in wireless sensor networks: A comprehensive review, 2017). The need for harvesting the surrounding energy is the main aim for an energy harnesser. In case when a certain node of a particular device goes offline, the work to be done is also removed. This creates a need for the devices to stay in working conditions for a long time. In addition, the provide source tells about the various sources for the energy harvesting. These sources are either natural or man-made. Moreover, the disadvantages of the systems are also considered in the document. The main considerations along with their installation, implementation of prototypes and compliance to the various standards or protocol are to be considered before commencing with the development of the technology required (Energy harvesting in wireless sensor networks: A comprehensive review, 2017). Furthermore, the journal concludes by showing the various advantages of the applied systems. Energy Harvesting Wireless Communications: A Review of Recent Advances The different contributions in the area of wireless communications are talked about in the journal. Along with this, the conceptual networks for implementing the connections as well as the resources needed and their compliance with the existing standards and policies are also included in the journal. In addition, the theoretical calculations for the process are also referenced in the provided journal (Energy Harvesting Wireless Communications: A Review of Recent Advances, 2017). In addition, the provide source tells about the various sources for energy harvesting which includes either natural or man-made sources. The main objectives of these advancements are their applications in the areas of medical science, environmental and safety related aspects. The summary of the theoretical recommendations are included in section 2 whereas the section 3 discusses the throughput optimization (Energy Harvesting Wireless Communications: A Review of Recent Advances, 2017). Moreover, the various co nsiderations to be taken care of are referenced in the next sections in a sequential order. References: Carpenter, C., Fowler, M. Adler, T., 2012. Generating route-specific origin-destination tables using Bluetooth technology.Transportation Research Record: Journal of the Transportation Research Board, (2308), pp.96-102. Energy harvesting in wireless sensor networks: A comprehensive review. (2017). [ebook] Faisal Karim Shaikh a,b,n , Sherali Zeadally c. Available at: https://1712033_1136814880_2016Energyharvestinginwireless.pdf [Accessed 22 Sep. 2017]. Energy Harvesting Wireless Communications: A Review of Recent Advances. (2017). [ebook] Available at: https://1712034_414472103_2015EnergyHarvestReview.pdf [Accessed 22 Sep. 2017]. Kamali, B., Bennett, R.A. Cox, D.C., 2012. Understanding WiMAX: An IEEE-802.16 standard-based wireless technology.IEEE Potentials,31(5), pp.23-27. Li, S.H., Cheng, K.A., Lu, W.H. Lin, T.C., 2012. Developing an active emergency medical service system based on WiMAX technology.Journal of medical systems,36(5), pp.3177-3193. More, S. Mishra, D.K., 2012, November. 4G revolution: WiMAX technology. InInternet (AH-ICI), 2012 Third Asian Himalayas International Conference on(pp. 1-4). IEEE. Olexandr, L. Sergiy, G., 2013, April. Slot allocation model and data burst scheduling in downlink WiMAX technology. InElectronics and Nanotechnology (ELNANO), 2013 IEEE XXXIII International Scientific Conference(pp. 455-459). IEEE. Rengaraju, P., Lung, C.H. Srinivasan, A., 2012, August. Communication requirements and analysis of distribution networks using WiMAX technology for smart grids. InWireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International(pp. 666-670). IEEE. Rohitha, P., Kumar, P.R., Adinarayana, N., Venkat, T. Narayana, R., 2012. Wireless networking through ZigBee technology.International Journal of Advanced Research in Computer Science and Software Engineering,2(7). Sergey, G. Abed, A.H., 2013, February. Slot allocation model and data burst scheduling in downlink WiMAX technology. InExperience of Designing and Application of CAD Systems in Microelectronics (CADSM), 2013 12th International Conference on the(pp. 97-100). IEEE. Talaviya, G., Ramteke, R. Shete, A.K., 2013. Wireless fingerprint based college attendance system using Zigbee technology.International Journal of Engineering and Advanced Technology (IJEAT) ISSN,2249, p.8958. Versichele, M., Neutens, T., Delafontaine, M. Van de Weghe, N., 2012. The use of Bluetooth for analysing spatiotemporal dynamics of human movement at mass events: A case study of the Ghent Festivities.Applied Geography,32(2), pp.208-220.

Thursday, November 28, 2019

The Death Of A Salesman Essay Willy Gets Fired Example For Students

The Death Of A Salesman Essay Willy Gets Fired Instability Lead Life to Its EndThe character Willy Loman from the play Death of a Salesman has been read throughout the years with distinct interpretations. Many people have given different reasons to what led to Willys tragic fate. One interpretation I took was that Willys instability in his life led to his death. Some point that led in to my interpretation were his early family life, his relationship with Biff, and his job. Willys early family life was a difficult one with its many inconsistencies. In Willys early childhood his father left; this left him with many questions about his father and how to be a father. In one scene we see Willy talking to Ben and Willy voices questions and comments about when their father left. Willy asks Where is Dad? and says Dad left when I was such a baby and I never had a chance to talk to him. Willy also voices his concerns about being a father. He says sometimes Im afraid that Im not teaching them the right kind ofBen, how should I teach them? In this early life Willy and his family move around a lot. People and places changed around them fairly swiftly. Another inconsistency in his early family life was his relationship with his brother, Ben. Ben left Willy without looking back. Ben comes in and out of Willys life. We will write a custom essay on The Death Of A Salesman Willy Gets Fired specifically for you for only $16.38 $13.9/page Order now Willys relationship with Biff has its highs and lows throughout the play making it difficult to establish a feel for their feeling towards each other. In the eyes of an early Biff there is nothing but love and devotion towards his father. Even Willy says Biff would go into the jaws of hell for me. This type of affections changes after Biff finds out about his fathers infidelity. Biff loses total respect for his father and calls Willy a liar and a fake. Willy saw early Biff as being a son he could be proud of with all Biffs football victories and successes with girls. As time passes and Biff comes home from the west it is evident that Willy no longer feels pride towards Biff. Biff has no job and wasnt making much money at his last job therefore Willy feels no pride towards Biff. Near the end of the play Willys feelings towards Biff change once again. Willy comes to believe that Biff loves him. Willy starts to says things like that boy is going to be magnificent. Willy was once again f eeling love towards Biff. Willys job causes him extra stresses involving loneliness and money. Willy continually was on the road causing him to have a lack of constant surrounding. We see this with all the people that come in and out of his life and his head. We also see a consequence of this with Willys loneliness. Willy gives the reason for his infidelity as being that he was lonely, terribly lonely. Another repercussion of Willys job was his money problems. At times Willy worked on commission causing extra stress on selling his product. Towards the end of the Broadway production, we saw a scene where people were rotating around Willy while Willy was also rotating. This scene shows nicely the instability that Willy was going through. Willy Lomans tragic death was in direct consequence to his instabilities. Words/ Pages : 582 / 24

Monday, November 25, 2019

Advantages and Disadvantages of Home Schooling Essays

Advantages and Disadvantages of Home Schooling Essays Advantages and Disadvantages of Home Schooling Essay Advantages and Disadvantages of Home Schooling Essay Homeschooling is an education option for children which means that the children do not have to go to school to study, but they study in their own home by the guidance of their parents or tutors. This education option is recognized and also accepted in many countries. For example in Indonesia there is a law that protects and accepts informal education such as homeschooling. It is written in UU No 20/2003 about Education National System article 27. In the past, some parents belive that it was not a good ideas to give the children homeschooling because they were worried if they give their children homeschooling then their children’s knowledge will not develop as good as other children who take common schools. Nowadays people seems to change their mind, they started to think about giving their children homeschooling. About 1, 35 million USA children in 2007 take homeshooling (Kompas news paper), and even more in present. In some parents’ opinion, they gave their children ho meschooling because they want to prevent their children from bullying that often happens in common schools. There are two advantages of giving children homeschooling. The first advantage that many parents think before they give their children homeschooling is that they want to prevent their children from aggressive environment for example is students bullying because so many cases about bullying that happens in school even though it had not been report in media. Usually the younger or smaller kids who become the victims of the older kids’ bad attitude, this can happen because in common schools the students are not in the same ages. There are age gaps among them and due to the age gaps, the bully action might happen because the older students see the younger students as weak people that will not fight back to the older students if they hurt them. This is what the parents are worried because they cannot always protect their children if their children take public scho

Thursday, November 21, 2019

Different Kinds of Engineering Material Assignment - 1

Different Kinds of Engineering Material - Assignment Example Brittle fracture basically is a fracture where there is a rapid run of cracks within the stressed material. In this case, the crack works much faster and it is difficult to understand the fracture before failure occurs. The scientific principle in the brittle fracture is that the crack moves close to the perpendicular where the stress is applied, because of this action, there remains a perpendicular fracture which leaves a flat surface at the broken area. Apart from having a flat fracture surface, brittle material more or less showcase a pattern on their fractured surface. Fatigue is the most common material failures found in the engineering field. Fatigue is a kind of failure mode where the material tends to fracture by means of progressive brittle cracking with regard to a repeated cycle of stress. Here, the stress implied on the material is of lesser intensity which means below the average strength. Creep is a failure mode which occurs on engineering materials at an elevated speed. Basically, it is seen on stainless steel when there is constant stress on the material with exposure to high temperatures. According to â€Å"The stress that produces a specified minimum creep rate of an alloy or a specified amount of creep deformation in a given time (for example, 1% of total 100,000 h) is referred to as the limiting creep strength or limiting stress†. The destructive test method is performed to understand the strength, hardness, and toughness of a material. The test utilized here is the stress test and for this purpose, the material chosen was the aluminum crank arm. The specimen was obtained and different loads and stresses were applied on the same. The destructive testing which is also known as mechanical testing displayed some results when stress was put on the iron with the help of a hammer.  

Wednesday, November 20, 2019

Estimating and purchasing cost control Essay Example | Topics and Well Written Essays - 2500 words

Estimating and purchasing cost control - Essay Example In this approach, the design package is reviewed and fully comprehended followed by the performance of a quantity survey of the scope of the project in question. In case little or no design and plan information is available, the Order-of-Magnitude Estimates approach is highly recommended. However, it is imperative that the contractor ensures he/she has all the requisite information to ensure accurate estimation of the cost of a construction project. This paper explores the type of information useful in the estimation of the cost of redeveloping a storey building near a river and the implications of the absence of competition in the cost estimation and the bidding processes for the contract. Information for Construction Project Cost Estimation There are several factors on which the successful completion, accessibility and utilization of a construction project hinges. These factors include the level or quality of engineering work that goes into a project and the survival of the contrac ting business that accompanies a project. Also, the market competition and the ability of a company and its contract management are equally important to the success of construction projects (Garold & Trost, 2001). More affected by the above factors are construction projects and redevelopment projects along water bodies such as rivers and lakes. It is thus of the essence that construction contractors and managers look into these various factors so that they strategically compete and win tenders by accurately estimating and mitigating project risks and costs. Importantly, such a strategic planning and estimation of project risks and costs would be quite integral to the quality of construction projects, more so with regard to project monitoring and control for the realization of project goals. In this strategic cost estimation and risk analysis, contract manager should consider the current national and international contract and construction laws, regulations, design documents, technic al standards and engineering safety requirements (Garold & Trost, 2001). The Case Study It is quite apparent that construction firms and contract managers involved in construction projects along, next or adjacent to rivers are exposed to a rather wide range of construction risks especially form their work environment. Besides the primary risk of flooding, other construction risks in construction projects near water bodies include site drainage, plant operations, bad ground condition, site accessibility and tidal impact. However, it should be acknowledged that even these construction projects will definitely have far reaching influences on these water bodies. Examples of the effects of construction projects on rivers that construction projects and managers should be conversant with are reduced water levels, change in local water body regime, navigational effects, environmental pollution and scour on siltation. From these risks and effects, it is quite clear that projects and contract managers should arm themselves with the right skills and competencies to help them identify, estimate and manage risks and the associated costs. One way of

Monday, November 18, 2019

The balanced scorecard Dissertation Example | Topics and Well Written Essays - 7250 words

The balanced scorecard - Dissertation Example Research Methodology 16 Qualitative Research 16 Data Collection 17 Research Limitations 17 Research Findings- Empirical Evidence 17 Conclusion 30 Reference 33 Bibliography 36 Introduction 3 Literature Review 5 Overview of the Balanced Scorecard 5 Development of the Balanced Scorecard 8 Benefits of using the BSC 11 Balanced Scorecard Implementation in large enterprises and SMEs 12 Criticisms of the Balanced Scorecard Methodology- challenges of implementing the Balanced Scorecard 14 Research Methodology 16 Qualitative Research 16 Data Collection 17 Research Limitations 17 Research Findings- Empirical Evidence 17 Conclusion 30 Reference 33 Bibliography 36 Introduction Emerged as the most commonly used strategic performance management tool supported by proven automation tools and design methods, the balanced scorecard is extensively used by managers in organizations today for keeping track of activities undertaken by staffs and monitor and control the consequences resulting from these activities. Today’s organizations are amidst a revolutionary transformation in the business environment which is gradually transforming itself from industrially competitive structure into an information competitive one. Arising out of this cut throat competition organizations have been increasingly looking at improving their businesses further and thus the importance of initiatives like just-in-time system, total quality management systems, Re-engineering, employee empowerment etc have gained prominence. Even though such initiatives were successful in bringing about improvement in shareholders’ value, their disjointed structure primarily looked at short term growth and performance. The demand for creating long range competitive capabilities and improving the model of the historical cost financial accounting triggered the creation of the Balanced Scorecard. Widely used in industries and businesses the scorecard acts as a strategic management and planning system used the government and non profit organizations with the aim to align business activities of the organization with its strategic vision and mission, improve its internal and external communications and finally to monitor performance of the organization against strategic objectives. Originated by Dr. Robert Kaplan and David Norton this performance management frame successfully adds the no financial performance measures with the financial metrics and allows managers to have a comprehensive and balanced view of the organization performance. Kaplan (1994) has particularly used the example of Rockwater Company for explaining the developmental process of the balanced scorecard for ensuring that companies are able to realise their goals and objectives. Industries such baking and insurance have been particularly benefitted through the implementation of the process. Kaplan has explained the management structure of connecting the business units’ strategies with the entire interest of the company. Martinson (1999) has also made use of the case study method for exploring the impact on a corporate information system operation department through the adoption and implementation of the balanced scorecard in four different perspectives such as user orientation, corporate value, internal process and future preparation for the measurement and evaluation of the performance of information systems. The results have clearly shown that balanced scorecard can be effective in serving as a successful measurement system in a strategic information system (Chi & Hung, 2011, p.226). On the other hand Chia and Hoon (2000) has tried to study the procedures for the promotion of the balanced scorecard and the criteria establishment process in two of the largest merchandise circulation firms based in Singapore. The results have shown that the promotion of the system has been particularly effective in clarifying the vision of these companies and in the preparation of the strategy to be practiced. Numerous other empirical evidences have shown positive results with the implementation and use of balanced scorecard in organizations. The project brings forth an analysis of the effectiveness of the balance

Saturday, November 16, 2019

Securing MANET From Routing Attacks

Securing MANET From Routing Attacks CHAPTER 3 RESEARCH METHODOLOGY 3.1 RESEARCH PROBLEM The increasing demand and utilization of wireless technology is making the need for more secure wireless networks. From the security viewpoint MANET is one of the most interesting research fields. A MANET is generally exposed to vulnerabilities due to its open medium, rapidly varying network topology, lack of centralized control and lack of clear line protection and it suffers from a wide range of security threats and attacks. Attacks can be introduced into all the layers of protocol stack however the attacks on the routing layer are most detrimental. The attacks on the routing layer can be either from the outside the network or can take place within the network. The attacks from outside of the network contain no authentication information and can be avoided by employing authentication techniques and cryptographic schemes. The most common insider attacks include blackhole, wormhole, selective forwarding, RREQ and hello flooding, Sybil, sink hole and so on. Insider attackers are more critical compared to the outsider attack as the insider knows the valuable information and holds the access rights. To solve this issue, security solutions have to be proposed in order to secure MANET. The goal of this thesis is to analyse the impact of blackhole, wormhole and flooding attack under on-demand routing protocols such as AODV and DSR and to propose possible countermeasures to thwart these attacks. 3.2 AIM AND OBJECTIVES The aim of this research work is to secure the MANET from various routing attacks in order to improve the performance of the network. To achieve this aim, the following objectives are formulated: To analyse the impact of blackhole, wormhole and flooding attack under AODV and DSR routing protocol To analyse packet delivery ratio and end-to-end delay in case of black hole, wormhole and flooding attack using AODV and DSR protocol and the results of AODV and DSR are compared to evaluate which of these protocols are more susceptible to these kind of attacks. To develop defence mechanisms against blackhole, worm hole and flooding attack under AODV and DSR protocol. 3.3 SCOPE OF THE THESIS There exists various routing attacks in MANET such as blackhole, wormhole, Sybil, selective forwarding and flooding attack and so on. This research work considers only blackhole, wormhole and flooding attack and its impact on on-demand routing protocols such as AODV and DSR is analysed. Efficient detection techniques have been developed to mitigate the effect of these attacks against AODV and DSR routing protocol. The performance of these routing protocols using the detection techniques are evaluated in terms of packet delivery ratio and end-to-end delay. 3.4 SYSTEM ARCHITECTURE This research focuses on blackhole, wormhole and flooding attacks on AODV and DSR protocol. The architecture of the proposed system is given in Figure 3.1. Efficient techniques such as MSBD and ABM, MCHOP and CDCF, MCLUT and TSPS has been developed to detect blackhole, wormhole and flooding attacks under AODV protocol and techniques such as ABM, CDCF and TSPS have been developed to mitigate against blackhole, wormhole and flooding attacks under DSR protocol. The proposed techniques detect these attacks effectively and provide a secure path. Figure 3.1 An Overview Of Attacks On MANET Routing Protocol And Their Detection Techniques 3.5 DETECTION TECHNIQUES AGAINST BLACKHOLE, WORMHOLE AND FLOODING ATTACKS 3.5.1 MultiShared Bandwidth Approach for Blackhole Attack Detection The AODV protocol is vulnerable to the well-known black hole attack. In this thesis, the multishared approach is designed to prevent any alterations in the default operation of either the intermediate nodes or the destination nodes. Here, watchdog mechanism is incorporated with MultiShared Bandwidth (MSBD) approach to detect misbehaviour or abnormal activity of a node, once an abnormal activity is observed MSBD is initiated. The MSBD converts the data into 16 bit and further splits the 16 bit data into multiple shares. When multishared data is received by a node it checks the bandwidth of neighbouring nodes to transmit the data. Then it chooses the nodes with highest bandwidth along the path and sends the data through these selected paths. 3.5.2 MCHOP-A Cluster based Approach for Wormhole Attack Detection In AODV routing protocol, the intruder will attack the network using the attack like wormhole during the route discovery stage. A cluster based algorithm has been proposed to detect a wormhole attack on AODV routing protocol. In this approach, the network is partitioned into several clusters based on density based clustering algorithm. Here, AODV protocol is modified in such manner that it detects the wormhole attack based on the hop count comparison and time taken to receive RREP packets. The cluster head is responsible for adding certain fields such as hop count, destination address to the RREQ packet and it broadcasts it to the other cluster head in the network. Whenever the intermediate node receives the RREQ packets, it sends an ACK to the source node with hop count information and broadcasts it to the destination node. The destination node then unicasts the RREP to the source node utilizing the reverse path. The RREP is then validated by source node using the hop count informat ion and time taken for receiving the packet. 3.5.3 MCLUT- Clustering Approach for Flooding Attack Detection The proposed MCLUT approach is used to detect the flooding attack node by enabling the clustering approach and calculating the threshold value of each node in the cluster. Here dynamic threshold value is used. The threshold value is estimated based on the queue length of a node and its neighbour in the cluster. If a node does not satisfy the threshold value then it is considered as an intruder. Once the cluster head confirms that the node is intruder it then broadcast the message to other nodes to isolate the node from the cluster and the suspicious node is kept in observation. 3.5.4 Anomaly based Behaviour Monitoring Algorithm for Black hole Attack Detection under AODV and DSR protocol The proposed Anomaly based Behaviour Monitoring (ABM) algorithm detects blackhole attack on AODV and DSR protocol. This technique periodically checks and verifies whether the number of packets disseminated between source and destination are equal. Through this comparison, the source node could detect the presence of black hole node. 3.5.5 Channel Detection and Cut Defalconin algorithm for Wormhole Attack Detection on AODV and DSR Channel Detection and Cut Defalconin (CDCF) algorithm is proposed to detect wormhole attack on DSR and AODV protocol. This method detects a wormhole attack in the network based on the threshold limit and then provides a new route to forward the packet from source to destination. The threshold value is determined based on Round Trip Time (RTT) and a delay per hop (DPH) is calculated based on the RTT, while forwarding packet from source to destination with the malicious nodes, its take less Round Trip Time (RTT) to forward the packets to the destination, when forwarding packet from source to the destination without any malicious node attack, it takes more RRT to forward the packets to the destination. If the DPH of a node is smaller than all other nodes, then it indicates the wormhole attack presence. 3.5.6Transmission Sequence Based Packet Scanner Algorithm for Flooding Attack Detection on DSR and AODV. Flooding is a Denial of Service (Dos) that is designed to bring down the service of the network by flooding it with huge volume of traffic. Transmission Sequence based Packet Scanner (TSPS) technique has been proposed to detect flooding attack on DSR and AODV. The TSPS identifies the presence of flooding attack based on source id, empty packet, number of hops and transmission sequence number.

Wednesday, November 13, 2019

Dramatica Theory and James Washington Square :: James Washington Square

Dramatica Theory and James' Washington Square In this essay I will review a critique of James' Washington Square. I found the critique to be dry and rather clinical in its approach to this fine work by Henry James. From the beginning the article presents a cold psychological approach to the characters that James' has made live for me in the short novel. The article covers the character's name, gender, a short description of him or her, the role that character plays in the piece and then goes on to list the basic characteristics of him or her. Motivation, methodology, evaluation and purpose are the four characteristics that are used to describe a character. The analysis does refer to the original work in many places. I found this to be helpful. For example when it describes Catherine Sloper it takes a quote from the novel to list her as, "a dull, plain girl she was called by rigorous critics" (James 11). This did help redeem the article somewhat. But the basic problem I found with the analysis kept leaping up. It's too scientific an approach for any literary work. The main problem with "Dramatica," for me, seems to be in that the theory looks at a story in relation to, "the mind's problem solving process" ("What is Dramatica?"). This area of the website goes on to explain that an author must examine all possible solutions to an issue in the story. In an effort to prove that the author's solutions are the best. The Dramatica theory of critique states that if, "you have covered every angle in your argument, you've mapped all the ways an audience might look at the problem and, therefore, all the ways anyone might look at that problem" ("What is Dramatica?"). This mapping turns any piece into a psychological pseudo study and relieves it of any beauty that it may contain.