Monday, December 30, 2019

Promotional Strategies For Promotional Activities - 983 Words

2.4 All-inclusive strategy that will make the event more interesting and memorable for all This section will focus on the promotional strategies. Promotional mix consists of six elements. They are as follows: Selected tools for promotional activities Promotional Mix Organizational Agenda Gift Item Advertisement (Newspaper, television, and radio etc.) Creating brand awareness among the huge target segments and other stakeholders. ï  ¶ Arranging show name â€Å"Rexpose† involving popular celebrity and providing Samsung phone as gift. ï  ¶ Providing free sample to the opinion leaders of the society. ï  ¶ Arranging lottery program with young segment of the society. ï  ¶ Providing free ticket for the popular show like â€Å"Premier League† in UK. Public Relation Creating Positive brand image through building strong public relation channel. Sponsorship Participating in popular show as a sponsor for improving the brand recognition and brand knowledge of the target segments and other stakeholders. Task 3: Be able to develop communication processes Communication refers to the combination of all activities which will facilitate the transmission of messages from sender to receiver. It includes several key decisions like selecting the appropriate messages to be sent, and selecting appropriate channel through which the messages will be sent (Feingold, 1987). To General Manager Samsung UK Sub: Developing robust communication channel that will establish a linkage between employer and communityShow MoreRelatedPromote Products And Services For International Markets1653 Words   |  7 PagesPromote products and services to international markets Assessment Task 2: Project – Plan promotional activities Part A: Plan and conduct promotional activities 5 key information sources that can assist you to plan promotional activities in the identified country. Information sources Summarization Culture: https://geert-hofstede.com/ This website demonstrate different cultural dimension by various countries. IT could compare one country to another. This dimension include Power Distance Index (PDI)Read MoreA Report On The International Markets And We Are Aiming The Marketplace Of Malaysia1323 Words   |  6 PagesMalaysia. The proposed and recommended promotional strategies will be applying Media announcement and Employee functions. Their total spending budgets will be $2300, wghich is far below the required budget level. I have designed each involved staff roles and responsibilities for these promotional strategies and make sure you have a clear clue of each activity’s starting date and ending date, as you will be accountable for each responsible promotional activity. Following this meeting I have arrangedRead MorePlan The Integration Of Promotional Strategy For A Business Or Product Essay1521 Words   |  7 Pages 11 LO- 4.3: Plan the integration of promotional techniques into the promotional strategy for a business or product. LO- 4.1: Follow an appropriate process for the formulation of a budget for an integrated promotional strategy. LO- 4.2: Carry out the development of a promotional plan for a business or product. LO- 4.4: Use appropriate techniques for measuring campaign effectiveness. The personalRead MoreNotes On Trade Practices Act1285 Words   |  6 Pages which is Bahasa Melayu, Bahasa Cina or English language for different ethnic group in Malaysia. Last but not least, the advertising techniques or activities apply to the target market should not be immoral or in an unethical way which may offend the competitors or customers †¢ Describe the overseas media that can be used for promotional activities. ï‚ § Email marketing: This method can be used to introduce Tropical North Queensland to our targeted market which is Malaysia without geographicallyRead MorePromoting Products And Services : International Market For Ttnq For The Exploration1217 Words   |  5 Pagesinternational markets Assessment Task 2: Project – Plan promotional activities I will consider the country Thailand as the targeted international market for TTNQ for the exploration. Part A: Plan and conduct promotional activities From: maha_7682@yahoo.com To: ling@barklycollege.com Subject: Planned promotional activities for TTNQ Hi Ling, I am sending you the report of promotional activities for TTNQ. The objectives of the designed strategies are to: - Help to improve the current business imagesRead MoreThe Secrets of Cross-Promotion: Article Analysis670 Words   |  3 Pagesexcellent points are made with regard to the planning, execution, evaluation and modification of cross-promotional campaigns and programs. The author defines how cross-promotional strategies can lead to greater synergistic effects on reaching a broader market while also driving greater levels of awareness, interest, desire and action on the part of prospects. There is also an example of a promotional program which went awry and led to the sponsoring company having to pay for entrants stamps and postageRead MoreBlue Orb Case1388 Words   |  6 PagesPro o Inability to convert free subscribers to paid subscribers o Whether to accept The FightWare Proposal as a part of marketing campaign o Whether to do in-house promotional SwitchBlade Pro gaming competition as a part of marketing campaign Situation analysis Blue Orb Inc. must develop a comprehensive marketing strategy in order to create awareness for their SwitchBlade Pro software to generate revenue. They are in this situation due to a low volume of paid subscribers. They need to convertRead MoreSports Marketing Mix1487 Words   |  6 Pagesorganizations have to base their marketing strategies on four core marketing mix elements. These elements include product or service strategies, pricing strategies, promotion or communication strategies, and distribution or place strategies. The marketing mix enables a company to present its products or services to its most potential target market in the most effective fashion (Lancaster Withey, 2007). The product strategies include all those activities and actions of the company which are relatedRead MoreSleep Well Motel1261 Words   |  6 Pages Time Context April of 1980 View Point Mr. Will Shelton the interested buyer of Sleep Well Motel property. Statement of the Problem What marketing strategy suited for the Sleep Well Motel? Objective 1. To identify the advantage and disadvantage of Mr. Will Shelton owing a Motel 2. To identify what best marketing strategy suited for the motel. Area of Consideration In identifying the area of consideration of this case study, a SWOT Analysis is considered. The SWOT analysisRead MorePlace Promotion Strategy1264 Words   |  6 PagesAppropriate Place Promotion Strategy Developing a strategic marketing plan should include the appropriate place and promotional strategy to ensure that what goes on behind the scenes positively impacts the view the consumer has on the product for long-term sustainability. A keen awareness of the marketplace and customer need is essential to ensuring the appropriate amount of advertising is conducted to distribute product. Having a sound marketing strategy in place ensures that marketing objectives

Sunday, December 22, 2019

Self Identity Influenced by Love - 1663 Words

Self Identity Influenced by Love After the study and discussion of a handful of the great literary works of the nineteenth century it is apparent that love is a powerful and recurring theme. Within many of these texts an idea of self identity influenced by love of another is presented through the characters and plot. Whether this concept is unintended or deliberately placed by the author, self discovery is an underlying message. In The Symposium, Plato presents various intellectual perspectives on the subject of love. The speech given by Aristophanes focuses on a search for wholeness culminating with the discovery of a soul mate. This idea is articulated by George Eliot in Silas Marner. Silas leads a lonely existence, cut off from the†¦show more content†¦Relationships come in various types, and while lovers can bring about self discovery, so can other influential individuals. Many times the influence of a single person can alter an existence forever. Aristophanes speech gives reason as to why humans search for a soul mate. This is accomplished through his tale of the separation of a single being into two halves, each destined to find the other. Discovery of this person brings about wholeness and self discovery. George Eliot in Silas Marner articulates and develops the idea set forth by Plato in The Symposium. A single person can completely alter the existence and outlook of another, simply by becoming a part of their life. Silas Marner is the story of the miraculous healing and redemption of Silas Marner, a weaver. Silas was a broken, closed, selfish, unhappy hermit, with an accumulation of money. In his isolation, he shared nothing. His sad, lonely life revolved around his work and the money he collected. When Silas is robbed of his precious gold, he removes himself from social interaction. His love for money had led him to a life of greed and sorrow. Silas had lost recollection of his past and was unable to connect with his society. His lack of trust and concern for others made his life a miserable one. The climax of the story is without a doubt the introduction of Eppie into Silass life. During a snowstorm one night, a woman and her child struggleShow MoreRelatedThe Theory Of Human Development Theory1642 Words   |  7 Pagesand organize existing observations and to try to explain and predict human behavior. It is important to recognize the complexity of human development and the theories that explain human development. (Berger, pg. 23). The three theories that have influenced by development are Jean Piaget’s Cognitive Theory, Abraham Maslow’s Humanism and Erik Erikson’s Psychosocial Development Theory. 1. The first Human development theory is that of Jean Piaget’s, who believed that all human development and behaviorRead MoreEssay about The Bluest Eyes1180 Words   |  5 Pages A Search For A Self Finding a self-identity is often a sign of maturing and growing up. This becomes the main issue in Toni Morrison’s novel The Bluest Eyes. Pecola Breedlove, Cholly Breedlove, and Pauline Breedlove are such characters that search for their identity through others that has influenced them and by the lifestyles that they have. First, Pecola Breedlove struggles to get accepted into society due to the beauty factor that the norm has. Cholly Breedlove, her father, is a drunk whoRead MoreThe Picture Of Dorian Gray971 Words   |  4 Pagesviolent acts he commits as long as he appears beautiful on the outside. Since external beauty is valued, Wilde argues that people tend to lose their individualism and conform to society’s expectations. With this in mind, Dorian gray grows more corrupt, self-centered as he focuses more on the pleasure for himself as he becomes more vulnerable to his own misgivings. He loses his individualism, because he is conforming to society’s form of asethics. I agree with Wilde’s arguement about Dorian Gray, thatRead MoreF. Scott Fitzgerald s The Great Gatsby1381 Words   |  6 PagesNick Carraway, is disparate from others due to the place he grew up which is exemplified when he moves to New York from the Midwest. Tom Buchanan satisfies his desire for love by having women in his life as well as his wife Daisy. Jay Gatsby and Daisy Buchanan have been fond of each other since they met many years ago and their love for one another made Gatsby determined to create a new rich and extravagant lifestyle in order to completely win over Daisy. Nick Carraway’s personality is unique in NewRead MoreThe Group to Which We Belong to Provides Us with Our Identity1200 Words   |  5 Pagestime, other factors such as our peers, circle of friends and work colleagues also contribute to deciding our characters. Groups shape our identity significantly and the fact that we belong to a certain group sometimes defines who we are, altho ugh our own identity may need to be compromised in order for us to belong. Our sense of self is usually shaped and influenced by communities we are part of, however, our individuality is constantly altered and adjusted by the world beyond us as we come to interactRead MoreAmory Blaine : A True American Character1586 Words   |  7 Pagesclasses – one that was composed of successful people and the other that was composed of unsuccessful individuals. This proneness could be observed in Amory Blaine too, and that is one reason why he can be considered a typical American character. Being influenced by the ideology of the American Dream (a dream that was also shared by Fitzgerald but was never completely attained in reality), Amory Blaine tended to look at the world and the society as composed of individuals who either belong to the class ofRead MoreErikson s Psychosocial Theory Of Development Essay1200 Words   |  5 PagesIn this Individual Theory Paper, I decided to write ab out Erikson’s Psychosocial Theory of Development. Erik Erikson is greatly influenced by Freud but instead of concentrating on psychosexual stages, Erikson choose to focus more on the individual’s psychosocial stages as well as their personality development. Psychosocial theory can be defined as a study about human development as an outcome of the interaction in which involves the psychological or the needs of an individual, and the expectationsRead MoreDevelopmental Theories, Erikson And Freud Essay979 Words   |  4 PagesFreud. In addition, compare their similarities and their differences. Erikson was a psychologist who was greatly influenced by Freud. Although influenced by Freud there are some differences in there developmental stages. Erikson believed that development in an individual was molded by society, culture, and environment. While Freud’s belief was that development is in some way is influenced by the fixation of sexual interest of different areas of the body. The stages in Erikson’s development theory outlineRead MoreThe Family Bond Between Bone And Her Mother Dorothy Allison s Bastard Out Of Carolina939 Words   |  4 PagesIdentity is an essential part of the human personality; the first stages of identity development often form the core and foundation of who a person will become. While there are multitudes of contributing factors in the formation of identity, such as class, ethnicity, and social norms, familial influence is the most evidenced factor in Dorothy Allison s Bastard out of Carolina. The core identity of the main character and narrator of the book, Bone, is largely influenced through the slow breakingRead MoreJane Joyce s Eveline : Gender Differences1068 Words   |  5 Pagesequality of men in the social, political, and economic fields, primarily in the postcolonial times at which this book was written in. As Eveline’s life was greatly influenced by people of the male gender, her decision at the end of the short story suggests that she was significantly influenced by her religion, economic status, as well as her identity as a woman during this time period in Dublin, Ireland. During the postcolonial times the presence of the Roman Catholic Church dominated the Republic of Ireland

Saturday, December 14, 2019

Sugar Cane Alley Free Essays

Alexandra Mitchell Dr. Lamont King GAFST 200 November 30, 2010 Sugar Cane Alley Jose understands at a young age that in order to escape the indentured life of working in a sugar cane plantation like his ancestors before him, he must do something different. In the classroom, Jose is a very bright student as seen through his peers and especially his professor who eventually helped Jose get into a prestigious school because of his academic excellence. We will write a custom essay sample on Sugar Cane Alley or any similar topic only for you Order Now He assures his grandmother who is his sole provider and family that one day she’ll no longer have to work tirelessly in the sugar cane plantation.Jose dreams of taking work in a more profitable and higher field then the plantation his community is chained to all being done by attaining a high education. Through the life of a plantation worker and the ones seen in Van Onselen’s article as a migration worker, slavery may have been abolished, but their freedom is severely limited. At the end of the film, the plantation workers were singing a song and one line of its lyrics clearly summed up what is needed to end the forced monetary economy many of the African Americans are trapped in, â€Å"Money and justice are what’s needed to end our suffering. In his article titled, â€Å"Social Control in the Compounds,† Van Onselen does a good job portraying the hard lives of the Chibaro people working in a nearby mine plantation. These workers paralleled the lives of the ones working in the sugar cane plantation where they were both trapped and limited in their freedom. They were oppressed under the proletarian labor economy that made it difficult to move up in the labor field and many were financially indentured to their plantation living day-by-day and paycheck-to-paycheck.This system made it extremely hard for the African Americans to move around and find better work somewhere else. There was almost total control over the labor and the whole idea of this widespread control was to lengthen its cycle. There were laws passed, credits to pay off, and the inflation of food prices making it a widely controlled monopoly. One law called for labor contracts detailing what was needed of the workers and many were paid by tokens or coupons that proved useless outside the plantation which in turn lengthened the workers time spent at one location.Many Chibaro workers as cited in his article couldn’t even pay off simple life necessities such as groceries, which forced them to have credit further lengthening their stay at each plantation. Many times the communities only had one grocery store, so for more control, the labor industry would inflate the prices making it nearly impossible for the people to be out of debt and even able to leave their workplace in search of more prominent work availabilities.For example, in the movie, a woman and her family couldn’t afford her groceries so she asked the clerk to put it on their tab which would need to be paid off making their stay permanent until they were free from debt. But this proved impossible to clear debt, because a worker’s paycheck given by the tightly controlled economy never amounted to what a family needed to get by. Mr. Mdeouze acts as a mentor and he opens Jose’s eyes to the corrupt society and how it in some ways mirrors the past.Although they are free from slavery, their freedom is limited by the labor-controlled economy making any further progress beyond the abolishment of slavery nearly impossible, â€Å"†¦we were free but our be llies were empty. † Mr. Mdeouze does although make one factor clear to Jose and that is the distinct value of education the power it has. The wise old man cited the life of a free African American man working on the sugar cane plantation perfectly when mentoring young Jose, â€Å"learning is second key that opens to our freedom. He is traditional in that he doesn’t believe that he’s a free man and reiterates that he won’t return to Africa until he’s dead and buried. Jose learns through Mr. Mdeouze that Africa has yet to return to it’s roots and white power is still perceived to be the dominant race in it’s every attempt to control all aspects of the African American life and still hold their power to utilize them for hard labor. Leopold is a young mulatto living amongst the plantation and is the son of the white landowner of the Sugar Cane plantation.When his father falls ills and is on his deathbed, he refuses to pass down his position to Leopold with the explana tion of it being a white man’s job and not one of a Mulatto. Leopold lived in his family’s nice home with his African mother then denying the African roots in him by his family’s societal stance. By not allowing Leopold to inherit the plantation as a legitimate landowner, this then denies also the white man roots in him.Therefore by being rejected by both sides of the race spectrum unsurprisingly lead to the demise of Leopold. He found himself hopeless in terms of his identity and in mounds of trouble as seen at the end of the movie. I believe Leopold’s fate was inevitable because he was rejected and out casted in his own community and no longer had an adequate place in society. The tightly controlled labor economy in the early twentieth century made African American’s freedom severely limited.There were all but few ways to escape this corruptly controlled monetary system, but one way was through attaining a higher education as learned by young Jose. He quickly discovered that education can provide him with more work opportunities and a better life all together. In summary, as seen through the movie and read in the article by Van Onselen, there still seemed to remain obvious elements of slavery in the lives of plantation and mine African American workers even after slavery had been long abolished. How to cite Sugar Cane Alley, Papers

Friday, December 6, 2019

Advance Accounting Theory

Question: Discuss the various approach to the accounting theories which was proposed by different authors. Answer: The summary summarizes various approach to the accounting theories which was proposed by different authors. Some authors were endeavored to integrate the economic theory with the accounting theory, so that the concepts of economics can be applied in the accounts as well. The authors have argued for the primacy of new approaches. They endeavored to adapt the economics model into the world of accountants. Authors such as Gilman seeks to rationalize diverse practices. The neo classical economic theory which ignores the historical costs has been incorporated with the accounting theory. Some of the writer who were mainly economists such as Canning and Alexander relied on true income theory which argued that the recording of data should be done at current values rather than following a system of historical record keeping and used the various economics terms in the accounting context. Other writer such as Paton, wanted to drew a clear cut distinction between realized and unrealized income. He said that estimated gross margin value cannot be reliable and it should not be recognized until the actual sales value is derived (Rutherford 2013). Canning applied the opportunity costs analysis theory of economics into accounts and proposed a method of assessing the asset value at current cost by indirect valuation. Another author such as MacNeal, Moonitz, Bell was of the view that the historical recording keeping of the assets should only be done when it is not possible to assess the acceptable market selling prices and viewed accounting as a succession of balance sheet rather than income statement. So , the common recommendation made by the authors was that the economic decision making should be done at current price information. Some other authors such as Hatfield and Gilman were of the opposite view and made recommendation on the inconsistencies in the financial statements. They considered current prices as irrelevant to the transactions and are not verifiable . this would lead to disturbance in the homogeneity of financial statements contents (Beattie 2014). Littleton has proposed an accounting Darwinism which views that accounting is continuing an evolution. On the other hand, Ijiri who is another theorist did reverse inductive analysis and defended historical costs on the ground of current costs. The measures which are unambiguous is viewed as the sine qua non of accountability. The attempts by these authors attempts to formulate the implicit accounting models for the purpose of global application and to make the alteration in the feasible area. In an inductive study , in order to develop the hierarchy of generalizations , principles and postulates can be adopted as framework. Reference : Beattie, V., 2014. Accounting narratives and the narrative turn in accounting research: Issues, theory, methodology, methods and a research framework.The British Accounting Review,46(2), pp.111-134. Rutherford, B.A., 2013. A pragmatist defence of classical financial accounting research.Abacus,49(2), pp.197-218.

Thursday, November 28, 2019

About Me Essays - Big Five Personality Traits, Free Essays

About Me Essays - Big Five Personality Traits, Free Essays About Me There are many different places in the world that have their own features. Besides that, different people also have different personalities. People like places that make them feel comfortable and relaxed, and that place can express the personality of that person effectively. I chose the airport as the best place to define who I truly am as a person and how I relate to others. It best describes my personality because I am a very complex individual. When you are in the airport, you would get mixed feelings about every aspect that's happening around the area. I feel like it best sums up the mixed emotions that I usually feel every single day. In my opinion, the broad spaces and various people from all around the world in the airport are bright symbols of my outgoing, curious, friendly and organized personality. The airport is a wide area of opportunities. It opens its door to people coming from any place in the world. They come from all sorts of entrances. Those that arrive to come home, those that are in for business trips, and those who are just enjoying the free time of spending some vacation time in the place. I can relate the different gates of entrance in the airport with my very adaptive attitude; because of this attitude, I have met certain people from different walks of life. I am not shy or afraid to talk with them; instead, I am an outgoing person and feel happy to communicate with them. As an International Student, this relates very closely to me. Every person I meet, no matter how different they are culturally, I am comfortable with in every single day. I know how to relate to people like me who are not locals in community, those who are staying here for the benefit of a good school. It best shines on my complex personality wherein I can accommodate people even when they are no t locals. Because I am an outgoing person and meet many people in my life, I am very curious about them and their lives. Other times, when I go out or talk with people in my circle, I also get to know people who are just traveling by, enjoying what this place can bring to them. Although they are different in their own ways, I would tend to get too curious and be sucked up to what these people could tell. You would get an impression that I am a curious person. I want to learn about other aspects in people's life. I hunger for more information and more things to learn about. Furthermore, like the airport, it never run out of portals to get sources of information as different people come to pass by here. I learn more and more each day and do not get tired of absorbing every bit of information about different types of people. Not only do these people vary from each other in different ways, they bring me interesting tales and let me realize some important things that help me overcome the challenges of day-to-day life from these tales. That's another side of me that I tremendously acknowledge: I love to learn how to plan. With this personality, the stories that people share to me contribute to my being complex and to my being absorptive of my own developmental personality. Like the airport as well, the place being open and welcoming also talks about another personality of mine: I am a very friendly person. The airport accepts people all around the world. I have this similarity with the airport. I love to meet new people. I do not choose who to associate with or to be reluctant to people who feel that they are outsiders; I am an open book ready to accept friendship from any person willing to come by and add to the pages of my life. This personality has helped me gain not only good connections in society, but it also made me even more flexible on how to socialize with people. This personality keeps me from being a part of the modern and classical world. This personality has absolutely opened several doors for me as well. Once you open

Monday, November 25, 2019

The Flag of the United States of Mexico

The Flag of the United States of Mexico There have been a few looks for the flag of Mexico since its independence from Spanish rule in 1821, but its overall look has remained the same: green, white and red and a coat of arms in the center that is a nod to the Aztec Empires capital of Tenochtitlan, formerly based in Mexico City in 1325. The flag colors are the same colors of the national liberation army in Mexico. Visual Description The Mexican flag is a rectangle with three vertical stripes: green, white and red from left to right. The stripes are of equal width. In the center of the flag is a design of an eagle, perched on a cactus, eating a snake. The cactus in on an island in a lake, and beneath is a garland of green leaves and a red, white and green ribbon. Without the coat of arms, the Mexican flag looks like the Italian flag, with the same colors in the same order, although the Mexican flag is longer and the colors are a darker shade. History of the Flag The national liberation army, known as the Army of the Three Guarantees, officially formed after the struggle for independence. Their flag was white, green and red with three yellow stars. The first flag of the new Mexican republic was modified from the armys flag. The first Mexican flag is very similar to the one used today, but the eagle is not shown with a snake, instead, it is wearing a crown. In 1823, the design was modified to include the snake, although the eagle was in a different pose, facing the other direction. It underwent minor changes in 1916 and 1934 before the current version was officially adopted in 1968. Flag of the Second Empire Since independence, only on one occasion has the Mexican flag undergone a drastic revision. In 1864, for three years, Mexico was ruled by Maximilian of Austria, a European nobleman imposed as the emperor of Mexico by France. He redesigned the flag. The colors stayed the same, but golden royal eagles were put in each corner, and the coat of arms was framed by two golden griffins and included the phrase Equidad en la Justicia, meaning   Equity in Justice.† When Maximilian was deposed and killed in 1867, the old flag was restored. Symbolism of the Colors When the flag was first adopted, the green symbolically stood for independence from Spain, the white for Catholicism and the red for unity. During the secular presidency of Benito Juarez, the meanings were changed to mean green for hope, white for unity and red for the spilled blood of fallen national heroes. These meanings are known by tradition, nowhere in Mexican law or in the documentation does it clearly state the official symbolism of the colors. Symbolism of the Coat of Arms The eagle, snake, and cactus refer back to an old Aztec legend. The Aztecs were a nomadic tribe in northern Mexico who followed a prophecy that they should make their home where they saw an eagle perched on a cactus while eating a snake. They wandered until they came to a lake, formerly Lake Texcoco, in central Mexico, where they saw the eagle and founded what would become the mighty city of Tenochtitln, now Mexico City. After the Spanish conquest of the Aztec Empire, Lake Texcoco was drained by the Spanish in an effort to control continuous lake flooding. Flag Protocol February 24 is Flag Day in Mexico, celebrating the day in 1821 when different rebel armies joined together to secure independence from Spain. When the national anthem is played, Mexicans must salute the flag by holding their right hand, palm down, over their heart. Like other national flags, it may be flown at half-staff in official mourning upon the death of someone important. Importance of the Flag Like people from other nations, Mexicans are very proud of their flag and like to show it off. Many private individuals or companies will fly them proudly. In 1999, President Ernesto Zedillo commissioned giant flags for several important historical sites. These banderas monumentales or â€Å"monumental banners† can be seen for miles and were so popular that several state and local governments made their own. In 2007, Paulina Rubio, famous Mexican singer, actress, TV hostess, and model, appeared in a magazine photo shoot wearing only a Mexican flag. It created quite the controversy, although she later said that she meant no offense and apologized if her actions were viewed as a sign of disrespect of the flag.

Thursday, November 21, 2019

Should there be any liability for Omission in criminal Law and if so, Dissertation

Should there be any liability for Omission in criminal Law and if so, how much it should be extended and Why Penalties for Omiss - Dissertation Example In some jurisdictions, the penalty involves depriving the person of his life. Because the punitive nature of criminal laws invades upon a persons’ rights, the nature of the offences must be such that a harm had been inflicted upon another by the deeds of the accused, which he had clearly intended, in order to justify the harshness of the punishment. These two elements – the offensive act and the malicious intention to inflict harm – must therefore be evident. However, where the offence done had been an omission to perform a deed, then the moral question arises as to whether the absence of an act would justify the imposition of punishment. This is the crux of the debate on criminal liability attached to omissions. This study explores the nature of omissions and the reason why certain types of omissions, and not others, would be worthy of sanction. Since omissions are construed as failure to perform a duty, the types and sources of duties are also examined to gain insight into the type of harm inflicted by the omission. The study delved into the philosophical arguments and set of attributes upon which to base an assessment of whether criminal liability should be attached to omissions. ... SIONS IN CRIMINAL LAW 12 2.1 Elements of a crime 12 2.2 Definition of ‘omission’ 12 2.3 Distinguishing acts from omissions 13 2.4 Omissions as a source of liability 14 Chapter 3: SOURCES OF DUTY AS BASIS OF OMISSIONS 18 3.1 Liability for omissions under the common law 18 3.2 Statutes that impose a duty to act 19 3.3 Failure to prevent or report criminal conduct 19 3.4 Duty arising from special relationships 20 3.5 Duty to avert a danger that was created by defendant 27 3.5 Failure to provide medical treatment 28 Chapter 4: TYPES OF SOURCES OF DUTIES 33 4.1 First type: voluntary assumption of duty 33 4.2 Second type: voluntary performance of an act that incurs a duty 34 4.3 Third type: justification without voluntariness 35 Chapter 5: SPECIAL ISSUES IN OMISSIONS 38 5.1 Corporate manslaughter by omission: omissions by police officers 38 5.2 Liability for omissions in international criminal law 43 Chapter 6: ANALYSIS 45 6.1 The central debate on attaching liabilities to omi ssions 45 6.2 The Act-Omission Paradox 48 6.3 Summary 50 Chapter 7: CONCLUSION 53 Bibliography 56 Table of Cases Airedale National Health Service Trust v Bland [1993] AC 789, All ER 821 Director of Publi Prosecutions v Santa-Bermudez, EWHC 2908 [2003] (Admin). Fagan v Metropolitan Police Commissioner [1969] 1 QB 439, [1968] 3 All ER 442, [ 1968] 3 WLR 1120, DC Lennard’s Carrying Co., Ltd. v Asiatic Petroleum Co., Ltd. [1915] AC 705. R v Adomako, [1994] HL R v Chattaway [1922] 17 Cr App R 7 R v Gibbins & Proctor, [1918] 13 Cr App R 134. R v Instan, [1893] 1QB 450 R v Khan, [1998] Crim LR 830 R v Lowe, [1973] QB 702 R v Stone & Dobinson, [1987] QB 354. R v Miller [1983] ] UKHL 6, 2 AC 161 R v Senior [1899] 1 QB 283 R v Yuthiwattana (1984) 80 Cr App R 55 Re B (A Minor) (Wardship: Medical Treatment)

Wednesday, November 20, 2019

Rebuttal Argument Essay Example | Topics and Well Written Essays - 1000 words

Rebuttal Argument - Essay Example Furthermore, studying the article is necessary in order to acknowledge that there are companies that consider diversity training as one of the tools that led their companies into success. According to Dobbin, Kalev, and Kelly, diversity training is an expensive training tool. The researchers added that this process only has extremely few and even no effects on companies that practice diversity training. Also, diversity training is only present because it is mandated by law. Furthermore, this obligatory training cannot at all eliminate biases that are already engraved within employees (611). One of the points of the article is that diversity training does not work. Nonetheless, it is important to provide a concrete definition of diversity training that can easily be grasped by the audience. This may be a small part of the argument, but defining it in a simpler manner will bring light to the heavy issue being tackled. In this case, it is essential to define diversity training as a prog ram that enables employees and future employees to give importance to diversity. This training also aims in lessening discrimination in the workplace (Ford and Fisher qtd. in Konrad, Prasad, and Pringle 63). Furthermore, in any business, it is essential to be constantly reminded that the employees are the most vital tool for the success of a company. Therefore, with this fact, it is inevitable that a company or a business will fund for the continuous training and learning of its employees, which also include diversity training. The article emphasizes, as supported by a research that there have been no positive implications of diversity training. It cited that there has been no increase of female or minority managers in companies. However, it is indispensable to acknowledge that diversity training does not only aim to increase the number of female or minority managers, but it aims to allow an efficient and productive working environment for every individual. Such as in Sodexo, a serv ice company that manages food and facilities services which incorporates diversity learning materials to its business philosophies. The company had successfully incorporated diversity training in all aspect of the company which led the company to$14.8 billion revenue (Anand and Winters 363). In addition, diversity training aims to discuss the similarities and differences of every individual and to inform every employee of the legalities of prejudices in the working environment (Tropp 183). Also, diversity training is composed of different methods and approaches; therefore, holistically considering it with no positive implications to a company will be unfair. The different approaches and methods bring different results, and with a continuous improvement and usage of different approaches, a company will eventually find the right model for its industry and employees. Also, in the article, it cited that diversity training produces backlash and that it could also produce and ignite biase s. Moreover, the result of the study also shows that there is the stereotypes and the biases that are already inculcated within the employees cannot be easily diminished in a one-day seminar or workshop in relation to diversity in the workplace (Dobbin, Kalev, and Kelly 591 and 611). In contrary, diversity training must be inculcated in every employee and must become a habit. It is

Monday, November 18, 2019

Attributes & Qualities that can Enhance Mentor's Effectiveness Essay

Attributes & Qualities that can Enhance Mentor's Effectiveness - Essay Example Awareness and implementation of appropriate mentor attributes establishes the correct environment for the nursing learner to benefit from the outcomes (Aston and Hallam 2011, p64). In this discourse, the attributes required for a mentor to deliver improved learner outcomes in the nursing profession are highlighted and elaborated. Despite the fact that psychological and learning relationships are factors of a myriad principles and elements, a few stand out exceptionally well as discussed in this discourse. A mentor takes the form of a special teacher mainly due to the basic learning experience that the student obtains from a successful mentorship program where the learning nurse develops (Clark, Jasper & West, (2007, p15). The difference between the mentor and the ordinary teacher surrounds the discharge of professional nurturing for a longer time than the actual course period. The continuation of the relationship until the learner completely settles in nursing is important, which mak es the relationship different from teacher-student relationship. A mentor should exhibit certain desirable traits that are important in the establishment of the expected outcomes in the mentorship relationship. In order for the students to obtain the quality learning outcomes preparing them for a good professional nursing experience, the mentor needs to demonstrate certain level of dedication and understanding of issues at the psychological level (Hinchcliff 2004, p65). Among the most important qualities of a mentor, confidence, assertiveness, and empathy facilitate successful mentorship process. Confidence In nearly every nurturing relationship, the senior party needs to demonstrate confidence to the junior party in order to develop the desired outcomes with time progression. In order for the learner to understand every aspect of nursing profession with the appropriate confidence, the figure looked to for the training and experience must be the sole sources of confidence. Despite t he role of the teacher in terms of academic and professional attitude cannot be underestimated in the building of confidence, the significance of confidence building outside the lecture hall in nursing is specifically important. To illustrate the significance of a secondary trainer with better confidence training opportunity, the mentor’s professional relationship with the student captures a longer and direct participation than the teacher’s position. Professional confidence demonstrated by the mentor therefore captures important professional practice that may not be imparted in the classroom (Hughes and Kinnell 2010, p78). The novice nurses are required to demonstrate impeccable leadership and professional concentration that depends on the quality of faith they have in their discharge of duties. To demonstrate the highest quality of professional prowess, the trainers’ quality must not bear a blemish. In view of the mentor’s role ion instilling confidence and professional belief in the novice nurse, it is imperative that confidence levels remain at top-notch level at every mentorship episode. Confidence entails demonstration of masterly and willingness to provide leadership in every task that the nurse will undertake. Within the correct frame of mind influenced by confidence, the nurse gets extra skills to tackle challenges that a learner without confidence would not solve. If the mentor is confident, the novice nurse gains better professional ideas and therefore less likely to make mistakes. An

Friday, November 15, 2019

The History Of Cyber Predator Media Essay

The History Of Cyber Predator Media Essay It has been said that the internet is to information and social networking as fire was to the caveman (Hudson, 1997, p. 7). The internet is a wealth of information, some of which may be used in research, continuing of education, as a tool to communicate with old friends or discover new acquaintances. For others, its a place to spend time shopping, for some a way to travel to far off places, for a few, a place to express anger and to bully the unsuspecting. For the perverted, its a place to entice and prey on the youngest web surfer and lure them into the deepest, darkest place the net has to offer. The cyber predator lurks on the internet with the most deceitful and cunning intentions, continuously attempting to attract the innocent to satisfy their own perverted sense of pleasure. Cyber Predator The internet has ignited excitement for learning on a global scale. Adults and youth alike surf the internet for the purpose of shopping, social networking and occasionally the thrill of the instant message or chat. A false sense of security combined with the perception of anonymity, with little regard for personal information obscures the dangers that lurk beneath a mesmerizing facade. Online interactions can expose youth to an insidious danger that can expose their safety and literally become a threat to their well being. What is this major threat that can harm the most internet savvy youth of today? With the exponential growth of online social networking, within sites such as MySpace or Facebook, predators lurk with intentions that reach far beyond friendship. Social networking sites are the fastest growing forms of universally accessible communication. The knowledgeable cyber predator already has this figured out. Between the years 2007 and 2009, MySpace evicted 90,000 profiles of convicted sex offenders (ABC 2009). Preceding 2007, 29,000 sex offenders had been identified and removed from the social networking site. These networking sites have become the new playgrounds for our youth. The Predator Who is the cyber predator? Look around at the next PTA meeting, church social gathering, or soccer game. They could be your Priest, Rabbi, doctor or lawyer, family friend or the neighbor next door. The cyber predator does not wear a sign, they are not of any particular age or race, and they rarely announce their intentions. They hide with anonymity. Picture a middle aged man, lonely, maybe a widower, divorced or who has lost the spark in his marriage. While surfing the web, a fantasy develops of a younger woman, looking for an experienced man, someone to show her the way. During one of his trips into cyber space he finds his way into one of the many famous on-line chat rooms, looking for romance in his local area. There he meets an exciting young girl, the one in his fantasy. At this point, its not important what they have in common. They chat for a while and agree to chat again. Over time, he thinks the relationship is developing. He begins to gains her trust. They exchange email addresses and phone numbers and manages to get her home address. Emails are sent, many photos are exchanged and eventually the phone call is made. The meeting is set. But wait, she is not really 18. Was that part of the fantasy? He begins to build her confidence and trust into what she is looking for in an online relationship. She seems so mature at times, yet naive and innocent without many of life experiences. He will show her what she needs to know. He convinces her to meet would be acceptable. Well just meet, talk and get to know each other. The meeting is set. He has bought her a gift. He will buy her dinner and all will be fine once she gets to know him. Its just an innocent meeting, right? Or is this a common method of the predator? Todays scheming predator relies on the internet and support groups to aid in the identification and methods to exploit children (Davis, McShane, Williams, 1995). They often use false profiles to lull parents into a false sense of security about the strangers presence within the family structure (Mahoney and Faulkner, 1997). This false sense of security often aids in the deception of what actually is occurring. They use their knowledge of computer technology as a method to gain the information they are desperately seeking. The expertise and skills they possess is not strictly related to collecting child pornography, downloading and trading of encrypted pornographic photos and movies, or searching peer to peer file sharing sites. This is only part of their pattern of behavior. The crafty predator searches the social networking sites, blogs, online game rooms, surveys and contests for details containing personal information such as; club affiliations, school names, neighborhood friends , parents names, addresses or locations that might be significant in their future search. From there, they begin their search in one of the popular search engines, keying off of a personal name, names of parents or step parents, addresses, friends names or the name and address of a school. They might get lucky and come up with a few personal pictures or additional details to help them extend the search. For the unsuspecting, the details provided in chat profiles can contain a wealth of information. But what does the predator look for? What are the details for that perfect match that will be the enable for him to proceed and get to know his a found friend? The Victim In todays fast paced world, the internet has a way of providing immediate feedback; some of that feedback can be a fun and thrilling challenge. The fast response of the chat can be filled with humor, sarcasm, or trust for developing friendship. For the unsuspecting, it can be a place to share feelings and the frustrations of their young life. More often then not, many kind sympathetic strangers will be willing to lend an ear, offer advice, or just listen to ones problems with their parents. Children are often naive and trusting of others and simultaneously are in need of attention and affection. In the vastness of the cyber world, its easy for a skilled predator to pick up on the signs of loneliness (McKenna Bargh, 2000) and befriend the young and impressionable. With advice and a kind word, they seem compassionate and more understanding than their parents. On the outset, they share the perception of common feelings. As the chat progresses, the skillful predator is looking for someone who seems lonely or maybe detached from their families. The victim now has a new friend, someone who seemingly understands their problems better than their parents do. With the illusion now set and with a little convincing, the problems seem magnified and a secret alliance is now formed. For the young victim, it is not clear they are chatting with a seasoned pro, the online predator. The Method When one thinks of the child predator, the vision of a stranger showing up at the playground with candy and photos of lost puppies comes to mind. This common or traditional method of child victimization, usually involved a target that was in close proximity; sporting events, youth activities or church groups and the resulting abduction was quick and with devastating results. Today, the new playground is a virtual world, and the predator hides in cyber space. In contrast, with past scenarios, the predators of today typically have a large number of attempts and a small number of successes. Their process is slow and gradual, building a trust as they progress towards getting to know their victim. This clever manipulation is commonly referred to as Grooming. Grooming involves a skillful process of manipulation typically initiated through a non sexual approach, designed to entice the victim into a sexual encounter (Brown, 2001). The predators friendship is the initiation into the grooming process. The exploitation is unhurried and measured; without reference to anything sexual, over time this gradual process intensifies. Through ongoing interactions, online conversations, gifts, and phone calls the child begins to lower their inhibitions and no longer perceives the predator to be an outsider. This close bond is the enabler that creates a victim more likely to comply with sexual advances. After months of this online relationship, the childs def ense mechanism is gone and the predator is now viewed as a peer. Todays youth is exposed to pornography in many different ways. Accidental exposure may result from a mistyped word in search engine or spam emails. Others may seek pornography on-line or freely share provocative pictures of themselves to friends and peers. This exposure, accidental or not, has desensitized the youth of today to pornography. All forms of youth exposure pornography have aided the methodical predator in his online quest for sexual solicitation. Gradually, the predator exposes the child to more pornography and begins the acceptance process of the child to nudity. Over time, he gradually suggests the child photograph themselves in sexually provocative poses, then pass along the photos, convincing them that this will help validate the relationship. The predator may send child pornography, hoping to stimulate curiosity and convince the child that sexual relationships with adults is accepted and widely practiced. Once again, building on the relationship, the predator knows, the closer the bond, the more likely the victim will be to comply with sexual advances. Once the stage is set, it is easy for the confident predator to arrange and establish the face to face meeting. The unassuming victim, over time, may have learned to trust the predator more than their own parents and nothing will stop them. The predator, having convinced the victim they live locally, may travel great distances to facilitate the meeting. As seen in the popular television series, To Catch A Predator (Dateline NBC) many predators are caught up in the moment and do not see anything wrong with their intentions. Others know exactly what they are doing and will go to great lengths to preserve the relationship to satisfy their perverse behavior. Summary A year long survey conducted in 2001 of 129 internet-initiated sex crimes involving victims age 17 or younger, found face-to-face meetings had occurred in 74 percent of the cases. Ninety three percent of those encounters included sexual contact. Seventy-five percent of the victims were girls. A large number of the victims report they had willingly met and had sexual encounters with the predator (Lewis, Miller, Buchalter, M. P. AR. 2009). Researchers have concluded the increase in online child exploitation can be directly linked to increased internet accessibility and anonymity as well as the commercialization of exploitive material and the production and dissemination of digital imagery. By 2005, ninety one percent of all children had access to the internet (Whitaker, Bushman, 2009) and sixty six percent stated they had no parental supervision while using the internet. The first line of defense in preventing children from becoming victims of online predators must be the parents and primary caregivers. A communicative parent-child relationship, appropriate sexual education and parental participation in child internet activities are critical factors in preventing children from falling victim to the online predator.

Wednesday, November 13, 2019

Different Uses of Virtual Reality :: Expository Essays Research Papers

Different Uses of Virtual Reality Virtual reality (VR) is the use of a computer to create an artificial environment that appears and feels like a real environment and allows users to explore a space and manipulate the environment. In its simplest form, a VR application displays what appears to be a three-dimensional view of a place or object, such as a landscape, building, molecule, or red blood cell, which users can explore. For example, architects can use VR software to show clients how a building will look after a construction or remodeling project. In more advanced forms, VR software requires that users wear specialized headgear, body suits, and gloves to enhance the experience of the artificial environment (Vance and Reed 34-58). The headgear displays the artificial environment in front of the users eyes.i[A] The body suit and the gloves sense motion and direction, allowing a user to move through, pick up, or hold items displayed in the virtual environment. Experts predict that sooner or later the body suits will provide tactile feedback so users can experience the touch and feel of the virtual world. Many gamers, such as flight simulators, use virtual reality. In these games, special visors allow users to see the computer-generated environment. As the user walks around the game’s electronic landscape, sensors in the surrounding game machine record movements and change the view of the landscape accordingly. Companies increasingly are using VR for more practical commercial applications, as well. Automobile dealers, for example, use virtual showrooms in which customers can view the exterior and interior of available vehicles. Airplane manufacturers use virtual prototypes to test new models and shorten product design time. Many firms use personal computer-based VR applications for employee training (Shelly Cashman Series ® Microsoft Word 2000 Project 2). As computing power and the use of the Web increases, practical applications of VR continue to emerge in education, business, and entertainment.ii[B]iii[C] Works Cited Holloway, April I. â€Å"The Future of Virtual Reality Applications.† Computers for Today, Tomorrow, and Beyond Sep. 2001: 46-52. Shelly Cashman Series ® Microsoft Word 2000 Project 2. Course Technology. 3 Sep. 2000. http://wwwscsite.com/wd2000/pr2/wc3.htm. Vance, Dale W., and Karen P.

Monday, November 11, 2019

Coffee and Starbucks Executives Essay

Starbucks developed continuously and rapidly after Howard Schultz bought it. It was entered in â€Å"Fortune 500 companies† in March 2003. Because of the saturation of the market, Starbucks can not only relied on the American market, but also had to venture abroad and paid close attention to the growth of subsidiaries. During the expansion, Starbucks stuck to its basic principles and innovated constantly to cater to the taste of the native. Although Starbucks was operated successfully, it also experienced losses in many countries and faced many challenges and risk. It is essential for MNCs to choose the right mode of entry in any markets and make structural changes to motivate strategic changes, even mature MNCs, which can transfer some risk. Starbucks decided to use three strategies to enter into the international markets-licensing, wholly owned subsidiaries and joint ventures. Every strategy has its advantages and disadvantages, so managers of Starbucks need to consider carefully before entering other countries. Starbucks makes the different ways to enter in the markets according to the different situations of countries. For instance, Canada is close to America so the cultures and the habit of drinking coffee are close too. Starbucks chooses wholly owned subsidiary type to enter Canadian market. Some Asian countries such as Japan and Hong Kong, China, Starbucks selects joint ventures to get in these countries because their taste of coffee is different from American’s. Moreover, the strategic adjustment of Starbucks was to cover over an area in new stores. That can not only assist to disperse consumers and reduce their waiting time, but also decrease the costs and increase revenues. It also innovated some new products and cooperated with local companies. Culture, government, environment and the condition of Starbucks, all these can affect the choice of strategy. In short, before choosing strategy, managers of Starbucks ought to analyze the SWOT of Starbucks, the key environmental factors and how will this strategy influence the development of the company. Starbucks went international because it wanted to seek new international markets and opportunities of growth. Starbucks did many good management and analysis of risk before entering into different markets. It further researched the prospect of the products in other countries’ markets. Then it tried to sell in the local fashionable shops and was operated by expert managers from Seattle. Starbucks persisted in keeping their No Smoking principle and broad floor area, which attracted many Japanese women. That is a successful alliance that through using its own resources and cooperating with Sazaby, it understood the Japanese habits of drinking coffee drinks and introduced new products. Starbucks realized that young people in Asian countries were interested in the western way of life so it seized that mentality and attracted them successfully. Starbucks adjusted constantly to adapt the cultures of the host countries. For example, it offered meat buns and curry puffs to Asian countries because Asians like eating some food when drinking coffee. It is popular that the best coffee around the world is in Europe. However, Starbucks executives thought that coffees in Europe now is not as great as in the late 1990s so stores were opened quickly and bravely in Europe. The romantic atmosphere, No Smoking environment and self-help service mode of operation were the main reasons that attracted the young. Also, Starbucks provided an independent region for Middle East ladies because of its distinct culture. From the above examples, it seems that Starbucks considered completely. It did internal analysis to use its key success factors to help the company make full use of the opportunities abroad. It also analyzed the culture and environmental risk of the local markets. Starbucks faced many challenges and risk in the international operation. Firstly, the unstable political environment of the Middle East is one of the problems for Starbucks. The close relationship between America and Israel made Arab students boycott American services and goods. This is the political risk to Starbucks. Secondly, Starbucks faced crisis from non-governmental organizations. They asked Starbucks to afford the authentication of coffee beans to insure the production of coffee beans was proceeded under a certain social and financial condition. This is the environmental risk. Thirdly, Starbucks has country risk that the economic recession in some countries made the sales and revenues dropped sharply. Fourthly, Starbucks faced drastic industrial competition, high costs of developing business and resistance from customers who objected to globalization, especially in Europe. This is the strategic risk. Fifthly, complex joint ventures and application license agreement, lack of well-trained employees and appropriate store address, all of these made Starbucks hard to gain more profit and control the costs of international operation. This is the operational risk. Starbucks try to reduce the risk in many methods. First and foremost, Starbucks decided to offer new products to control the costs of international operation. Then, it announced to slow down the pace of expansion and close the defective stores. Also, Starbucks should reconsider the entry strategy and keep a watchful eye on price. The most important is to be careful to the international environment because there are many factors can affect the Starbucks’ decision-making. Starbucks recombined its structure and changed its strategy with its internationalization.

Friday, November 8, 2019

TSS -- Therapeutic Support Staff or One to One Aide

TSS Therapeutic Support Staff or One to One Aide Definition: A TSS or Therapeutic Support Staff, is staff that supports individual students. They are often called one to one aides or wrap around staff. Therapeutic support staff are hired to work with an individual student. Their employment is usually named as an accommodation in that students IEP. TSS are often paid for or paid by the local (county) mental health agency rather than the school district. Qualifications:   Being a TSS does not require a college degree, but often graduates with degrees in psychology find work as a TSS while they are pursuing advanced degrees. Requirements for employment as a TSS or One on One (as they are often popularly referred to) may vary from state to state or agency to agency, but often some college is required.    Usually these positions are considered educational rather than custodial, and many states are trying to avoid using TSSs.   Some are economic, but some are educational, as a student with a TSS often becomes prompt dependent and unable to function independently. Responsibility:   A TSSs primary responsibility is to the student for whom they are hired. They may help the teacher or other students in order to create a positive environment for their student, but they are not supervised directly by the teacher, but by the IEP. Hopefully, a TSS will see him or herself as a part of the educational team.   There is no question that the teacher, as the leader in a classroom, should command the cooperation of the TSS.   Often a TSS is assigned so that a child can spent more time in a general education classroom, and will work one on one with the student to help him or her do age appropriate general education curricular tasks.   Sometimes the TSS will bring the students folder of modified word from the special education resource room to complete parallel.    It is important for the General Educator to communicate with the TSS to establish which general education tasks (especially in content, such as science or social studies) the student can do with the class, rather than what may be in their folder.   A Partnership:   Although the TSSs responsibility is for the student, when the special education teacher works closely with the TSS and the General Educator, it is more likely both the student and the classroom teacher will benefit.   When the other students in the general education classroom see Mr. Bob, or Ms. Lisa as partners in leadership, you can ask them to push   in with their student into learning centers or in small group discussion.   Modeling how to get the student more involved by fading support is also critical.   Also Known As: One to One Aide, Wrap Around, Wrap Around Aide Examples: Because of his self injurious behavior, Rodney has a TSS at school, who sees that Rodney does not bang his head on the tray of his chair, or on the wall.

Wednesday, November 6, 2019

Scm Delays Essays

Scm Delays Essays Scm Delays Essay Scm Delays Essay Delays during material purchase and supply are widespread in most projects around the world. Some of the delay happens at the time of purchasing of material for the project that is the period which is before the start of project as well as during actual execution of project is under way. Project schedules are consistently dynamic and uncertain. Several controllable and uncontrollable factors can adversely affect the project schedule and cause delays. These delays definitely create negative impacts on project performance.Schedule delay in the completion of a Construction projects may be a major difficulty for contractors leading to costly disputes and adverse relationships between project participants. The challenge is to measure the net impact of Supply chain delays accurately.. The method of schedule delay analysis technique should be acceptable to all participants through the project. Delays in the completion of projects are often unavoidable. The project schedule which is planned at the beginning of the project is prone to being changed for many times and unfortunately causes delays.As a result, schedule delays may be a major problem for contractors as well as the owners, resulting in costly disputes, controversial issues and adverse relationships between all the 3project participants. Therefore, the identification, quantification and analysis of delays become essential. Contractors are prone to see most of the delays in the responsibility of the owner, while owners usually want to put the blame on the contractor or third parties.Consequently, it is necessary to analyze schedule delays and research the most significant causes of delay in projects to avoid or minimize their adverse impacts on the project and project participants. These delays in purchasing and supply chain management may be due to various factors some of which are internal organizations and some are outside of organization. Internal factors such as delays from other departments, delays from c lient, delays in approvals, external factors include suppliers delays, transportation delays, and other factors may also affect such as act of god, government intervention etc.Analysis of these delays and the detail analysis of reason has to be done to measure the impact of each delays on the project. Delays Different type of delays that can be arise during actual procurement of material are stated as below 1. Import / Export duties clearances 2. Natural disaster. E. g. Cyclones, earthquakes, tsunami etc. 3. Manmade disaster. E. g. War, pirates etc. 4. Strike –Includes mainly labor disputes with management. 5. Quality –Poor quality of delivered materials a. By supplier. b. Damage to vital components during transportation. 6. Inaccurate forecast. a. Due to long lead time. b. Inflexibility at suppliers end. . Procurement of material from single source. 8. Receivable risk – Possibility of being unable to collect on receivables. 9. Inventory risk –Excessive i nventory hurts the financial performances. 10. Information infrastructure breakdown.. 11. Unexpected shutdown of key plant of supplier for certain period. 12. Government strike. 13. Change of design from client. 14. Design approval delays 15. Approval delays 16. Negotiation delays 17. Delays in issuance of transportation papers 18. Delays in submission of documents on site/ vendor. 19. Inspection delays 20. Delays in order follow up. 21. Delays in payment of supplier.

Monday, November 4, 2019

CVS Essay Example | Topics and Well Written Essays - 750 words

CVS - Essay Example As competitors, the two companies monitor the moves of each other thereby ensuring that they change their marketing strategies accordingly. CVS Pharmacy’s products are cheaper than the drugs at Walgreen. The difference in the prices arises from the uniqueness of the markets the two pharmacies target. Drugs at CSV are averagely $1 cheaper than at Walgreen. Walgreen targets the wealthy while CVS targets the middle class a feature that justifies the differences in pricing. The two pharmacies advertise their products and services in different media depending on the cost implications of such besides their effectiveness in reaching the target audience. Such media include billboards, radio, television and newspaper among many others. Additionally, the pharmacies enjoy strategic locations in the cities, a feature that portrays the entrepreneurs’ consideration of place as a fundamental element of the marketing mix. Social media is yet another marketing platform that the two pharmacies use differently in growing their market shares. â€Å"Such different platforms as Facebook and Twitter offer marketers with unique platforms for interactions as both parties share information by posting on the walls of each other.† (Palmer 53). The two pharmacies use the sites differently owing to their unique structures and organizational cultures. CVs pharmacy has numerous Facebook pages and groups in which the company’s marketers interact with their target audiences through posts and comments thereby sharing ideas on the performance of the pharmacy in the market. Besides Facebook, the company has several Twitter accounts, which serves a similar purpose. Walgreen has similar platforms in which it communicates with its target audience while carrying out equally effective marketing researches. CVS Pharmacy for example introduced online shopping owing to the advent of

Saturday, November 2, 2019

Critically discuss the view that the Cournot, Bertrand and Stackelberg Essay

Critically discuss the view that the Cournot, Bertrand and Stackelberg models of oligopoly are fundamentally flawed and are unable to explain recent events in the markets and industries - Essay Example It is a common practice for firms in an oligopoly market to collude in setting up prices with an intention of mitigating the risks that arises in the particular market. However, most of the alliances formed are outlawed in most countries given that they short-change customers because of the less competition that they have unlike in other markets such a perfect competition environment (Vives, 1999). Models developed by three scholars try to explain the concept of an oligopoly market. The Cournot, Bertrand and Stacklerg models are used to explain the theory of oligopoly. The Game theory is widely applied by three models to analyse the market critically under consideration (GineviÄ ius and Krivka, 2008). In a Cournot oligopoly, business entities compete on the basis of production levels. They determine the volume of products they are supposed to produce separately within a specified period. The main assumption made in a Cournot oligopoly is that the core business activity of a business entity is profit maximization. It assumes that the decision of determining the volume level is independent. Furthermore, it is assumed that all players in the market are aware of the cost function and the number of players that exist in the market. However, the cost function may vary from one organization to another (Giocoli, 2003). Some of the implication of the assumptions made in Cournot model is that the production level in the market is likely to be less compared to that of other markets such as the perfect competition market (Kopel and Là ¶ffler, 2008). Additionally, the prices in a Cournot oligopoly are lower compared to those of other markets. Conversely, given the nature of the market, formation of firms are likely to form cartels. Consequently, the model can be transformed to become similar to that of a monopoly market (Day et al., 2002). Cournot models assume firms

Thursday, October 31, 2019

Reflective Analysis Essay Example | Topics and Well Written Essays - 2500 words

Reflective Analysis - Essay Example They are faced with anxiety and remain under pressure to keep up with the changes. Classroom lectures are insufficient and lack interaction. Learning should be an active process with active participation of both the student and the mentor alike. The mentor has to, at all times, urge and motivate the learner to participate in the process of education; to make the learner responsible for their own learning. Knowles defines contract learning thus: "Contract learning is, in essence, an alternative way of structuring a learning experience: It replaces a content plan with a process plan." Malcolm S Knowles (1991, p.39). While the learner faces a challenge to remain updated with the latest skills the mentor faces the challenge to provide an environment that provides active learning. In today’s situation unless the learner is actively involved he tends to withdraw. This has far reaching psychological impact on the overall learning process. Joseph R. Codde, Ph.D., Associate Professor, Michigan State University quotes Knowles in his abstract saying that â€Å"Contract learning is an alternative way of structuring a learning experience: It replaces a content plan with a process plan (Knowles, 1986). According to Knowles (1980), contract learning solves, or at least reduces, the problem of dealing with wide differences within any group of adult learners. Characteristically, in our field we get people with widely varying backgrounds, previous experience, interests, learning styles, life patterns, outside commitments, and learning speeds. Didactic teachers usually cope with this situation by "aiming at the middle," with the hope that those at the lower end will not get too far behind and that those at the upper end will not get too bored (Knowles, 1980). The solution is to help students structure their own learning. We can meet the needs of these widely varied students by the use of learning contracts†. Learning contracts when set up carefully offer benefits both

Monday, October 28, 2019

Cultural Sensitivity Essay Example for Free

Cultural Sensitivity Essay The San Joaquin Valley of California is nestled in the center of the state. Within the San Joaquin valley the rich culture of the Mexican people can be seen in almost every facet of living. There are also many nursing schools in the area, approximately five in the area in which I reside. The most current statistic from the census bureau regarding the percentage of Hispanics in Tulare County is 62. 3% (USCB, 2014). This means that over half of the inhabitants of the county are Hispanic. The knowledge, understanding and grasp of cultural sensitivity on the part of non-Hispanic as well as Hispanic nurses is paramount in being able to give the best possible care. The purpose of this writing is to inform the reader of the need to address cultural sensitivity towards the Mexican and Mexican American people and their battle with diabetes. This is a very prevalent disease in this county and amongst this ethnic group. Cultural competency is paramount in communicating effectively and getting the message across that diabetes is a serious but manageable condition (Grant and Letzring, 2003). Mexican American Culture and Diabetes In the Tulare, County area the Mexican American culture can be seen in all areas of healthcare. Many of these people are diabetic. Cultural and dietary differences create challenges in dealing with diabetics in this demographic. Nurses that are culturally competent to their town, city, state or country and who understand what makes up their population may find it more manageable to communicate with their Hispanic patients (Wood, 2004). An excellent article on this subject is entitled Leisure time activity of Mexican Americans with diabetes. This article deals with the issue of Mexican Americans and what they do or do not do in their leisure time and how it affects their diabetes. The aim of the research was to find the proportion of Mexican Americans with diabetes who do and do not exercise as well as preferred types of leisure time 3 Cultural Sensitivity according to age and gender. In addition, the question of the relationship between leisure time activity and treatment of diabetes is discussed. This study found that only six of every ten Mexican Americans with diabetes exercise (Wood, 2003). It was also found that gardening and walking were the most preferred type of leisure time activity. Cultural differences are machismo, language barriers and spiritual beliefs. This can make it challenging for the treating nurse to accomplish his or her tasks. Nurses and Mexican Culture Nurses may find it challenging however, understanding the Mexican culture and learning more of their language is most helpful. In professional practice a registered nurse will find it helpful in knowing that in the Mexican culture it is common for the man to be the strong leader of his family. Also, the men will not want to be present during visits to the Doctor for what they deem as female problems which can be anything from a UTI to a breast exam. In addition there is a culture of hot and cold that affects much of the health and lifestyle of the Mexican American patient. Many refer to placing heat on a hurt area, thereby increasing inflammation to what may be an injury. At other times ice is placed on an area of the foot that is itching. The itching is coming from a tingling they feel that is related to diabetic neuropathy. It should be noted that many Mexican Americans are what many term as Americanized, meaning that they are and have become mainstream in the American culture vs the Mexican culture. However, because many are raised by Mexican parents they too, are just like many of us, bicultural with one culture being dominant. Touch is also an important aspect for nurses to consider in treating the Mexican American. In those that are Americanized this is not an issue. However, for those that are still deeply rooted in their Mexican culture the sex of a nurse could be an issue and create barriers to 4 Cultural Sensitivity care. An example of this would be a male nurse treating a married female. These types of circumstances can make treating their diabetes more difficult. Wood states that In the USA, Mexican Americans are twice as likely to have diabetes then non-Hispanic whites. This deems attention to the need for nurses to be culturally competent. Some of the competencies a nurse needs in treating the Mexican American patient are finding out if they speak English, if they raised in the United States, and finding whether they are second, third or fourth generation and so on. In treating the Mexican American patient the nurse can also offer information in a simple manner. Many times, due to a macho personality that has been glorified in the culture the patient may feel offended or condescended to. In addition one can simplify too much and this too could compound the problem. There is a fine balance that can be made easier to navigate by conversing and educating patients in what may seem a non-clinical approach. Conclusion The need for nurses to be culturally competent is paramount in giving the best possible care. In this group being competent in knowing how to treat a Mexican American patient in the best way possible is to be sensitive in communication by addressing the patient and at times the entire family as this is very normal for their culture. The article that is the subject of this writing concludes by stating several of their findings one of which is that employment and responsibilities limits the time they have for leisure to early evenings when it is dark and safety becomes an issue. Treating diabetes in this ethnic group is best done by realizing what the culture believes, thinks and what it is they eat. I find the eating part just as enjoyable as the rest. 5 Cultural Sensitivity References Barker, A. M. Denisco, S. M. (2013). Advanced practice nursing: Evolving roles for the transformation of the profession. (2nd ed. ). Connecticut: Jones and Bartlett. Grant, MS, RN, L. , Letzring, JD, EdD, T. (2003). Status of Cultural Competence in Nursing Education. The Journal of Multicultural Nursing Health, 9(2), 6-6. United States Census Bureau. (2014, December 4). Retrieved January 21, 2015, from http://quickfacts. census. gov/qfd/states/00000. html Wood, F. (2004). Leisure time activity of Mexican Americans with diabetes. Journal Of Advanced Nursing, 45(2), 190-196.

Saturday, October 26, 2019

Simulation of the ALOHA protocol

Simulation of the ALOHA protocol Abstract-The present essay is a tutorial on the OMNeT++ simulation environment, through the analysis of the known ALOHA protocol. The model implements the ALOHA random access protocol on the Link layer, and simulates a host to server instant broadcast. ALOHA is rather simple yet convenient to demonstrate the potential of OMNeT++ in simulating wireless protocols. The final part evaluates the pure and the slotted ALOHA variations, in regard to the theoretical models. Introduction OMNeT++ is a discrete event simulation (DES) environment, developed by Andras Varga as public source, and is accompanied by Academic Public License, which means that it is free for nonprofit academic use. The intention behind OMNeT++ was the development of an open source generic simulation environment, not exclusively dedicated to network simulations as the more known ns-2, or the commercial Opnet. The environment offers instead, a generic and flexible platform to develop simulation frameworks dedicated to complex IT systems, as wireless and sensor networks, the classic IP and IPv6 stacks, queuing networks, optical networks and various hardware architectures. Typical example of a framework that provides simulation components for IP, TCP, UDP, Ethernet and MPLS, is the INET Framework and the MiXiM, which is an aggregation of several frameworks for mobile and wireless simulations. The OMNeT++ ver. 4.0 is built on the known Eclipse CDT ver. 5.0, and uses most of its resources. It is offered for Windows and Linux operating systems. The core of the models is coded in C++, in Linux uses the gcc compiler and in Windows uses the MinGW port for the gcc suite. There is a commercial version called OMNEST, with no significant accessories than the open version, except the optional use of the native Visual C++ compiler for the Windows platform. The ALOHA protocol was one of the oldest random access protocols, invented by Norm Abramson in 1969. The first wireless network, implementing packet switching over radio, used the pure ALOHA variation, have initially established in Hawaii. Later Abramson interfaced the ALOHAnet with the ARPAnet, the primitive form of internet. The ALOHA have inspired the creation of CSMA/CD and the birth of Ethernet. Finally, the random access protocol has evolved to contemporary CSMA/CA, the MAC layer of Wi-Fi. The slotted ALOHA and the later pure ALOHA have simple implementations, appropriate for simulation. It uses only the host to server broadcast instant, but is adequate to calculate the maximum channel capacity and demonstrate some other interesting attributes, as well. OMNeT++ DESCRIPTION The Structure of Models OMNeT++ is based on C++ programming and follows the object-oriented approach with classes and class instances, the so-called objects. The simulation model consists of modules, which communicate by message passing. The core element is the simple module, which is written in C++, and constitutes an instance of a module type from the simulation class library. The next structural element in the hierarchy is the compound model, which is formed from simple modules or other compound models. Every module, simple or compound, has ports to communicate with the external environment, called gates. Gates could be bidirectional or could be restricted to input or output. Modules are connected through their gates via connections and they communicate by exchanging messages, via these connections. The block diagram in Fig. 1 depicts the internal module structure according to the declared hierarchy, in OMNeT++. The connections are limited within the module range but the message exchange can be established across hierarchy levels. This is applicable in the case of modeling wireless systems and the simulation of ALOHA stations will make use of it. Otherwise, messages are traveling through the chain of connections. Modules have parameters, which are used to pass initialization data during the initiation of the simulation. The compound models can pass parameters to the contained sub-modules. The final model which contains the aggregate of the modules is called network model, is represented as a class and each simulation run is executed on an instance of this class. The NED language The structure of the simulation in OMNeT++ is based on the network description language (NED). The NED includes declarations for the simple modules and definitions for the compound modules and the network model. The language programming is accomplished by the integrated graphic editor, as shown in Fig. 2 or the text editor, as shown in Fig. 3. Both editors are producing equivalent code, and the programmer can switch from one another without any derogation. The programming model The typical code development includes the following steps: The programmer creates the network model, by creating the appropriate network_name.ned file, using the IDE. The NED file describes the network name and the topology, which are the names of the sub-modules, simples and compounds. Every sub-module should have its own module_name.ned file, which includes the parameter declarations and other meta-data. As mentioned, the behavior of every simple module is expressed in C++, so there should be two specific files, the module_name.cc and the module_name.h, for every simple module. These files are compiled during simulation execution by the supporting C++ compiler, and linked with the simulation kernel and libraries. The programmer usually tests the behavior of the simulation model according to different inputs. These could be entered manually by the user, during simulation execution, or could be included in a configuration file. Generally, there is a special type of file the omnetpp.ini that contains these parameters and the rest of the building blocks, to support user interaction. The IDE includes an editor for the initialization files, which can switch between form view, as shown in Fig. 4, and source view, as shown in Fig. 5. The two fields are equivalent. There are two fundamental methods to develop C++ code for programming the simple module behavior: The co-routine based and the event processing function. In the first approach, every module executes its own threat of code, which is activated every time it receives a message from the simulation kernel. In the last approach, the simulation kernel calls the module function, having the specific message as argument. Prior to main() function execution, an initialization function declares variables and objects and before program termination, a finalization function saves the data logged during simulation, and produces histograms. OMNeT++ Architecture and Potentiality The following Fig. 6 presents the internal logic structure of OMNeT++. The first block is the model component library, which the programmer develops in C++, and contains the compiled code of simple and compound modules. The simulation kernel and the class library (SIM) instantiates the modules and build the concrete simulation model. The user interface libraries (Envir and Cmdenv or Tkenv) provide the simulation environment, which defines the source of input data, the sink of simulation results and the debugging information. It controls the simulation execution, visualization and animation. Cmdenv provides only command line and text mode input-output, and it is more appropriate for batch simulations. Tkenv is the graphical user interface (GUI) of OMNeT++. It provides automatic animation, module output windows and object inspectors. The following Fig. 7 depicts an active simulation output through OMNeT++/Tkenv. OMNeT++ includes very powerful tools to visualize the interaction among modules. A sequence chart diagram provides a way to inspect the timing of the events during simulation by extracting data from an event log file. During the finalization routine, the logged data are saved to specific result files, the vectors in network_name.vec and the scalars in network_name.sca files, respectively. For the result analysis, OMNeT++ produces the analysis file network_name.anf, which contains aggregated data in vectors and scalars plus any histograms, created during the final stage. All the types of data can be further processed by using pattern rules, in datasets and charts section, to produced advanced charts and graphs. In the ALOHA simulation most of the available choices are used for demonstration. Aloha Simulation Background Theory The slotted ALOHA is the most simple random access protocol. The transmitting station always broadcasts at the full rate R of the channel. The transmission initiates at the beginning of the slot, which is common for the aggregate of the stations. If two or more stations transmit simultaneously, then the condition is called collision and all the stations involved, after a random time different for each, retransmit the frame until successful delivery. The procedure is presented at the following figure: The slotted ALOHA protocol allows each station to transmitat at the channels full speed R, but requires slots to be synchronized in all the stations, something not nessesary for the unslotted or pure ALOHA. The following assumtions are made to simplify simulation: The source generates single frames of length L bits. The inter-arrival times between frames follow exponential distribution. If R bps is the capacity of the wireless link then the slot time is set equal to the transmission time of each frame, which is: tframe=LR sec. All nodes are synchronized and transmit frames only at the beginning of a slot. If a node has a new frame to send, it waits until the beginning of the next slot. If two or more frames collide, then their hosts retransmit after random time, following exponential distribution. If there is no collision, then the node transmits its next frame following exponential distribution. I define N the number of stations operating the slotted ALOHA protocol and p the probability of each station to transmit in the next slot. The probability for the same station to do not transmit in the next slot is then 1-p, and for the rest of the stations is 1-pN-1. Therefore, the probability for a station to have a successful transmission during the next slot is to transmit and the rest of the stations to do not transmit, so it is p1-pN-1, and because there are N stations, the probability that an arbitrary node has a successful transmission is Np1-pN-1. A slot where a single station transmits is called a successful slot. The efficiency of slotted ALOHA is defined as the long run fraction of successful slots, which is: Ep=Np1-pN-1 (1) To find the maximum efficiency, we seek p* that maximizes (1). Then: Ep=N1-pN-1-NpN-11-pN-2=N1-pN-21-p-pN-1 If Ep=0 then p*=1N . Using this value, the maximum efficiency is: Ep*=N1N1-1NN-1=1-1NN-1=1-1NN1-1N (2) For a large number of active stations, the maximum efficiency accrues from (2) as N approaches infinity: limNEp*=limN1-1NNlimN1-1N=1e1=1e=0.368 (3) From (3), the maximum efficiency of slotted ALOHA is 0.368 or 36.8% The unslotted version or pure ALOHA protocol does not have the restriction of slot synchronizing, and the station is able to broadcast when a new frame is available. So pure ALOHA is a full-decentralized random access protocol. When a transmitting station detects a collision, after completing the transmission, it retransmits the frame with probability p. If it chooses to postpone the transmission for a single frame transmission period tframe=LR sec, then the probability is (1-p). The figure below depicts transmissions and collisions in the unslotted channel. The maximum efficiency of pure ALOHA protocol is calculated similarly as the slotted ALOHA. The only difference here is that the rest of the stations should have not begun transmitting before and should not begin during the broadcast of the given station. The probability that the rest of the stations remain idle is 1-pN-1 and the probability that they remain idle is 1-pN-1 again. Therefore, the probability that the given station will have a successful transmission is p1-p2N-1. Again, we seek the value of p* that maximizes (4), which is the probability of successful transmission for the sum of the N stations. Ep=Np1-p2N-1 (4) Ep=N1-p2N-2-Np2N-11-p2N-3=N1-p2N-31-p-p2N-1 If Ep=0 then p*=12N-1 . Using this value the maximum efficiency is: Ep*=N2N-11-12N-12N-1 (5) From (5), the maximum efficiency accrues as N approaches infinity, which is: limNEp*=121e=12e (6) From (6) I assume that the maximum efficiency, for the pure ALOHA protocol, is 0.184 or 18.39%, the half of slotted ALOHA. Another useful diagram is in Fig. 10. It depicts the apparent superiority of slotted ALOHA over the pure ALOHA protocol, despite the limitations that turn it to non-functional. The normalized total traffic is the aggregate traffic, which generated by the source of the station, divided by the channel capacity R and the normalized throughput ? is the average successful traffic (non-collided) divided by R. The slotted ALOHA achieves double throughput than the pure ALOHA and achieves its maximum efficiency when the generated traffic rate equals the channels capacity R. The pure ALOHA although, achieves its maximum efficiency when the generated traffic equals to R/2. Model Development NED language The following paragraphs describe the process of creating a functional model for the simulation of ALOHA protocol in OMNeT++. The object of simulation is to study the behavior of the ALOHA model and to confirm the theoretical values of maximum efficiency for pure and slotted ALOHA. The ALOHA random access protocol is peer based and does not use a server-client architecture. It is convenient to study the effect of collisions and random retransmissions only in the case when one host is receiving (becomes server) and the rest of the hosts are transmitting. The first step is to develop the NED code that describes the network Aloha. The following Aloha.ned file creates the Aloha network, which consist of simple modules, one called server and a number of hosts, equal to numHosts parameter. The txRate defines the transmission rate R, of the wireless channel, and slotTime defines the type of protocol. Zero means pure ALOHA and 100ms defines the slot time length. The parameter @display selects a background image, taken from the library. network Aloha { parameters: int numHosts; // number of hosts double txRate @unit(bps); // transmission rate double slotTime @unit(ms);// zero means no slots (pure Aloha) @display(bgi=background/terrain); submodules: server: Server; host[numHosts]: Host { txRate = txRate; slotTime = slotTime; } } The following Server.ned file describes the servers simple module. It loads an image for the server icon and defines a gate of input type (in), with which it is not necessary to establish a connection. It can receive a message directly from a host via @directIn, something that is usual to wireless simulations. simple Server { parameters: @display(i=device/antennatower_l); gates: input in @directIn; } The following Host.ned describes the hosts simple module. It loads a set of parameters from the omnetpp.ini file, the radioDelay, which is the propagation delay over the radio link, pkLenBits, which is the length of the frame, and iaTime, which is the random inter-arrival time, following exponential distribution. The rest of the parameters, txRate and slotTime, are loaded in Aloha.ned, during sub-module instantiation. simple Host { parameters: double txRate @unit(bps); // transmission rate double radioDelay @unit(s);// propagation delay of radio link volatile int pkLenBits @unit(b); // packet length in bits volatile double iaTime @unit(s); // packet interarrival time double slotTime @unit(s); // zero means no slots (pure Aloha) @display(i=device/pc_s); } Configuration The most critical file is the configuration file omnetpp.ini. It stores the values of the parameters that are loaded in the NED parameter fields. When declaring on the [General] field that Aloha.slotTime=0, is presets globally the pure ALOHA protocol. Similarly, the Aloha.numHosts=20 defines the number of hosts to be 20, the Aloha.txRate=9.6kbps defines the R to be 9600bps. The last definitions load the parameters of Aloha model and consequently the parameters of the simple modules that Aloha model controls, which are the server and the host modules. The definitions Aloha.host[*].pkLenBits=952b and Aloha.host[*].radioDelay=10ms load directly the parameters pk.LenBits and radioDelay on every host submodule, respectively. [General] network = Aloha #debug-on-errors = true #record-eventlog = true Aloha.numHosts = 20 Aloha.slotTime = 0 # no slots Aloha.txRate = 9.6Kbps Aloha.host[*].pkLenBits = 952b #=119 bytes, so that (with +1 byte guard) slotTime is a nice round number Aloha.host[*].radioDelay = 10ms [Config PureAloha1] description = pure Aloha, overloaded # too frequent transmissions result in high collision rate and low channel utilization Aloha.host[*].iaTime = exponential(2s) [Config PureAloha2] description = pure Aloha, optimal load # near optimal load, channel utilization is near theoretical maximum 1/2e Aloha.host[*].iaTime = exponential(6s) [Config PureAloha3] description = pure Aloha, low traffic # very low traffic results in channel being idle most of the time Aloha.host[*].iaTime = exponential(30s) [Config PureAlohaExperiment] description = Experimental mutliparameter demostration repeat = 2 sim-time-limit = 90min **.vector-recording = false Aloha.numHosts = ${numHosts=10,15,20} Aloha.host[*].iaTime = exponential(${mean=1,2,3,4,5..9 step 2}s) [Config SlottedAloha1] description = slotted Aloha, overloaded # slotTime = pkLen/txRate = 960/9600 = 0.1s Aloha.slotTime = 100ms # too frequent transmissions result in high collision rate and low channel utilization Aloha.host[*].iaTime = exponential(0.5s) [Config SlottedAloha2] description = slotted Aloha, optimal load # slotTime = pkLen/txRate = 960/9600 = 0.1s Aloha.slotTime = 100ms # near optimal load, channel utilization is near theoretical maximum 1/e Aloha.host[*].iaTime = exponential(2s) [Config SlottedAloha3] description = slotted Aloha, low traffic # slotTime = pkLen/txRate = 960/9600 = 0.1s Aloha.slotTime = 100ms # very low traffic results in channel being idle most of the time Aloha.host[*].iaTime = exponential(20s) A selection of the SlottedAloha2 configuration overrides the value of slotTime with Aloha.host[*].slotTime=100ms, which fixes the slotted ALOHA protocol with slot time to 100ms. The Aloha.host[*].iaTime=exponential(2s) sets the frame inter-arrival time on every host to follow exponential distribution, with mean time equals to 2 seconds. The Config option PureAlohaExperiment exploits the OMNeTs capabilities of organizing different experiments with simple repetition declarations. The statement Aloha.numHosts=${numHosts=10,15,20} declares three (3) repetitions having 10, 1 and 20 hosts respectively. The statement Aloha.host[*].iaTime=exponential(${mean=1,2,3,4,5..9 step 2}s) declares seven (7) repetitions, with interarrival times equal to exponential distribution and means, 1, 2 ,3, 4, 5, 7 and 9, respectively. The repeat=2 statement doubles the number of runs, so finally the available choices will be 2x3x7=42 from 0 to 41 optional runs. The statement sim-time-limit=90min constrains the simulation time to 90 minutes. C++ model coding The simple modules Host and Server are based on C++ programming. The relevant host.cc, host.h, server.cc and server.h, which are included entirely in the appendix section, implement the model behavior during simulation by exchanging messages directly one-another or with the simulation kernel. The following Fig. 11 is a design- level class diagram, describing the basic relationships among network module Aloha and simple modules, Host and Server. The two last, inherit from cSimpleModule simulation class library, and redefine the basic methods initialize(), handleMessage(), activity() and finish(), according to the desired function. The Aloha network model comprises of several Host objects and one Server, so it keeps an aggregation association with Host and Server classes. It passes also to them some parameter values, some declared in the omnetpp.ini file and some taken from user dialog form. The Host module keeps an one-way association with Server because every Host declares a Server object in the attribute field, in order to send a direct message (pk) later, by calling the sendDirect() function. The scheduleAt() function programs the kernel to send the Host an endTxEvent message when the transmission ends. This is represented by the self-association. Similarly, the Server module programs the kernel to send the Server an endRxEvent, when the reception of the message sent from Host finishes, and is represented as the self-association. The module code is cited commented in the appendix. Here, I will explain the finish() function of the server module, because it creates the result reports, necessary for the exploitation of the simulation. void Server::finish() { EV