Monday, September 30, 2019

Fashion Blogging †the Impact on Sales Essay

Thus, we first investigate whether blogging activity leads to (differential) market outcomes. We then examine whether managerial communication (magazines advertising) and blogging are synergistic. We assemble a unique data set from fashion containing market outcomes (sales), new media (blogs) and traditional media (magazines advertising) for a brand of clothing, and a brand of shoes. Each category has at least one product launch during the duration of our sample periods. We specify a simultaneous equation log-linear system for market outcomes and the volume of blogs. Our results suggest that blogs are predictive of market outcomes, new and traditional media act synergistically, pre-launch magazines advertising spurs blogging activity but become less effective post-launch and that market outcomes have some effect on blogging. We find detailed support for some of these findings via a unique and novel text mining analysis. We discuss the managerial implications of our findings. I-Introduction Consumer generated media (CGM) such as blogs (a contraction of the term â€Å"Web logs†) have witnessed explosive growth in the last few years. For example, the number of blogs worldwide is estimated to be 184 millions with a readership of 346 million (March 2010). In contrast, in March 2003, the number of blogs was essentially zero. Other types of CGM have also seen similar growth patterns, e. g. , Facebook, which started in February 2004, now has about 400 million members worldwide (February 2011). There are also indications that blogs are now being seen as similar to mainstream media sites – the number of blog sites in the top 100 most popular sites (blogs and mainstream media) worldwide was twenty-two in 2008 and blogs were being viewed by consumers as â€Å"sites for news, information, gossip etc. † (2008). In 2010, four of the top ten entertainment sites were blogs (March 2010). It is clear from these statistics that there is considerable activity (multi- media posting, blogging, visits, traffic etc. ) on the part of consumers. However, an important question, from a managerial perspective, is whether this activity leads to (differential) business outcomes such as sales or profits. In addition, little is known about the relationship between traditional or old media (where the company creates content and delivers it to consumers) and consumer generated, or new, media (where consumers create content and there in an exchange of this content between other consumers and potentially, the company). That is, are there any synergies between new media and old media? In this research, we take the first step towards answering these questions. Blogging is perhaps the most established and largest form of consumer generated media at this point in time. The total worldwide viewership of blogs is estimated to be about 346 million (March 2010). Wikipedia defines as a blog as â€Å"a Web site, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse-chronological order. Blogging is a worldwide phenomenon with the two biggest blogging markets being the United States and Japan. The number of blogs in the United States is about 23 million (about 12% of all US Internet users) and about 8 million in Japan (about 5% of all Japanese Internet users) in 2009. However, if one examines the total number of posts by language, Japanese language posts account for 37% of all posts worldwide followed closely by English language posts at 36%. Fina lly, readership of blogs in these two markets is ery high – about half of all Internet users in the US and about one-fifth of all Japanese Internet users have read a blog in the past year. While there are many informal opinions on the effectiveness of CGM in general (and blogs in particular) vis-a-vis market outcomes, there is limited empirical research that sheds light on this issue, especially for the launch of new products. The majority of the existing research has focused on online chatter (newsgroup postings, reviews and ratings) and its effect on market outcomes. There is some evidence that volume of online user ratings is positively correlated to sales. Blogging, on the other hand, has been seen as a unique type of user generated content as being a highly personal, non-directed communication tool. As Kumar (2005) note, blogs are unique for sociological reasons – they comprise a â€Å"highly dynamic, temporal community structure† that â€Å"focuses heavily on local community interactions† – and for technical reasons – blogs â€Å"offer us a ready-made view of evolution (of content) in continuous time. † In addition, blogging activity was probably the most pervasive CGM activity on the web during the time of our data. Given these unique characteristics of blogs as opposed to reviews, it is not obvious that bloggers’ activity should affect market outcomes. Surprisingly, there is very little research that has tried to quantify the effect of blogs on market outcomes, especially in the presence of traditional media and/or an examination of pre- and post-launch changes in the role of old and new media. Two recent empirical papers have focused on blogs and market outcomes. Dhar and Chang (2009) explore the relationship between music album sales (imputed via sales ranks on Amazon. om) and online chatter (as seen in blogs and on social networks). Using 108 music albums in early 2007 (before four weeks and after four weeks of their release), they find a positive correlation between both the number of blogs and Myspace member intensity with future music sales. Gruhl (2005) propose a new methodology to automatically generate a query of blog keywords to detect spikes in Amazon. com’s book sales rank. They conclude that their new algorithm could adequately predict the changes and spikes of future sales ranks. Thus, while these two studies suggest that there may be a correlation between blogging activity and market outcomes, they do not use actual sales data but only sales ranks from Amazon. com. To the best of our knowledge, the second issue that we outline above – the positive relationship between traditional media and new media – has not been investigated in the literature. Our expectation is that there will be a positive correlation between the quantity of traditional media and new media as traditional media is likely to provide discussion materials for bloggers. From a managerial perspective this issue is crucial, as managers have no direct control over CGM (blogs in our case). However, if there is indeed a synergistic relationship between traditional media, which are under managerial control, and new media, which are outside managerial control, then managers can leverage this relationship. Specifically, they can carry out â€Å"better† resource allocation and media planning (to traditional media) as they can take the spillover effect (from traditional to new media) into consideration. We examine the role of new media with respect to market outcomes as well as the relationship between new media and traditional media using data of two different clothing and shoes brand that are both promoted in fashion blogs. We consider the number of units sold, customers or subscribers (all a proxy for demand) as market outcomes, blogs as representations of consumer generated media and magazines advertising as traditional media. We specify a simultaneous equation model that links sales to advertising and blogs as well as a model that links blogs to advertising. Our results, after controlling for many temporal and cross-sectional factors, suggest that first, the volume of Blogstock (cumulative sum of past blog posts) is positively correlated with market outcomes (volume of clothing sold, and the volume of shoes sold) post launch. Second, the interaction between blogs and magazines advertising has a positive effect on market outcomes. Third, we also find that traditional media (magazines advertising) positively affects new media (the volume of blogs) pre launch. In other words, bloggers consume advertising, independent of the product, and this ncreases their blogging activity. Finally, we find that the effect of blogs varies between pre and post launch. In general, the positive relationship between magazines advertising and the volume of blogs pre-launch becomes weaker after launch. This result suggests that while magazines advertising can independently increase blogging pre-launch via the provision of information and content, post-launch (i. e. , once the product is available), consumers may rely less on traditional media, leading to a much weaker relationship between new and old media at that point. These last three sets of results shed light on the possibility that, broadly speaking, advertising and blogs act synergistically (with the relationship changing somewhat post-launch). The process explanations for our findings is not obvious. We take the first step in eliciting process explanations by carrying out a novel text mining analysis of the blog posts for the two markets (shoes and clothing) for which we have access to the textual content data. The findings from the text mining analysis suggest that blogs may affect market outcomes as they represent a rich source of product information and consumer opinion for other consumers. Also, bloggers do use advertising as a subject for blogging pre-launch but turn their attention to product attributes post-launch. II-Data Our data come from fashion market. We consider data from two brands – clothing and shoes. We first describe the market outcome data for each product market and then we describe the measurement of traditional and new media. III-Market Outcomes The daily sales of clothings were made available for the total fashion market based on a nationally representative consumer panel. The data include daily sales of two new pieces of clothing introduced in the period from January 2013 to March 2013. For shoes, the outcome variable we use is based on the same principle. We have data of two new models that were released (launched) in the period from January 2013 to March 2013. IV-Traditional Media The traditional marketing variable we use is magazines advertising. This was measured in units of daily or monthly Gross Rating Points (GRPs). There are some differences in the patterns of magazines advertising pre and post launch across the two brands. For clothing, most of the advertising is post launch. Typically, commercial ads in this market begin to air about five days pre launch and then the heavier advertising kicks in post launch. In contrast, for shoes, pre-release magazines GRPs are larger (on average) than the post-release magazines GRPs. Specifically, peak advertising for shoes was, not surprisingly, a week before its launch date in order to generate high demand at the time of the opening. V-New Media We obtain blogging data from blog 1 (www. leblogdebetty. com) for clothing data and blog 2 (www. sorayabakhtiar. com) for the shoes data. Both the brands scan and index the two blogging sites on a daily basis using keywords with coverage of about 64% of all blog articles. They then aggregate the data and provide the count of the daily number of blogs that mention a particular keyword on a specific temporal period such as day or month (multiple mentions in the same temporal unit are counted as one). As is typical for most blogs, its contents appear in a reversal chronological order and also include the blogger’s profile, â€Å"trackbacks† (links showing other websites, typically other blogs, that a blog is linked to), and comments. Buzz Research archives the contents of all blog posts. It also carries out lexical analysis of the contents of each tracked blog by using a proprietary text- mining method and classifies each blog as positive, negative and/or neutral with respect to a given keyword. We therefore have access to the actual content of all posts as well as the daily percentage of positive, negative and neutral blogs for the movies and cellular phone service markets. There is big increase in the average number of blogs per period post launch in all two brands. Interestingly, for the two brands markets where we have valence data, the biggest growth is in the percentage of neutral blogs post launch. To illustrate the relationship between marketing outcomes and both traditional and new media, we pick a product across our two brand markets. The figure suggests that magazines advertising, blog volume and shoes buyer are temporally correlated. Dividing the data temporally at the date of release we see that magazines GRPs and the number of blogs exhibit an increasing trend pre-release, but a decreasing one post-release. While we illustrate a typical data pattern through this example, the pattern is not identical for all brands across product markets. In conclusion, these data are novel in the sense that they combine marketing data for both traditional and new media along with market outcomes from a market where new media have proven to be important (at least in terms of activity). Our data are also novel in the sense that they enable us to focus on new product launches. In addition, the fact that we have data from two different brand markets (frequently purchased consumer goods) with varying characteristics (e. . , more versus fewer new product launches) will help us determine if the relationship between market outcomes and new media as well as the relationship between new media and traditional media generalizes across product markets. Finally, the availability of the actual blog post text (for two categories) opens up the possibility to conduct a deeper text-mining analysis. VI-Managerial Implicati ons So far, we have discussed the findings purely from a statistical point of view. However, it may be useful to translate these findings in a manner that uantifies the effect sizes from a managerial point of view. We therefore ran two experiments – the first to get a sense of how managers could change resource allocation and the second to see how managers could use blog data to improve sales forecasts. In the first experiment, we use the estimates from the clothing market data. To illustrate short-term effects, in the experiment, we assumed there were only three periods, two in the pre-release and one in the post-release. Recall that blogging is outside the control of managers. We therefore used the marketing instrument under managerial control in our data set – traditional magazines advertising. In the experiment, we increased the Adstock by one percent in the first pre-release period. The output we measured was the percentage increase in the size of the daily volume sold in the post-release period. A ten percent increase in the Adstock results in a 3. 3 percent increase in the number of blogs at the second pre-release period. As a result of this increase in the Adstock, we find that the net increase in the sales volume is 2. 1 percent. A decomposition of this overall increase due to traditional media versus new media suggested that the increase in the Adstock directly enhances the sales by 0. 13 percent while the interaction between blogging and advertising increases the sales by 0. 1 percent. Furthermore, the largest and most significant increase in the sales volume at post-launch is led by the indirect impact from advertising via blogging activity, which accounts for 1. 9 percent. Similar experiment for the other product markets also support these findings with the overall effect being slightly smaller for shoes (0. 4%). In addition to simulating the short-term effects of advertising, we use a simulation setting similar to the above experiments and expand the time horizon from one period to ten periods. The largest indirect effect of the ten percent increase in Adstock decays slower than do the other two effects across two product categories. The peaks of the indirect effects are located at the third period for t he clothing and at the second period for the shoes. These are resulted from the larger estimates of the carry-over constants of Adstock and Blogstock at post-launch in the blog equations. In the second experiment, we hold out the last observation from each brand and re-estimated the model. We then use the model estimates for prediction and computed the difference in the predicted value and the actual data across all the held out observations. We do this for the full model and a restricted version of the full model where the response coefficients for the number of blogs and the cumulative number of blogs were set to zero. Thus, the difference in prediction (based on the Root Mean Square Deviation) between these two models shows the extent to which the use of blog data can improve sales forecasts. The improvement in RMSD is very high for shoes, and modest for clothing. VII-Conclusion, Limitations and Directions for Future Research This paper adds to the very limited, but rapidly growing field of research into the effectiveness of new media, especially in the case of new product launches. Using a unique dataset from two product markets (a major new media market), we are able to combine into a single source, data on market outcomes, traditional media (magazines advertising) and new media (volume and content of blogs). We used a simultaneous equation model to capture the effect of new media on market outcomes and the effect of market outcomes on new media. While this in itself is somewhat novel, we were also able to include the major marketing activity (mgazines advertising) in both equations, both directly and via interactions. Thus this allows us to investigate two open questions in this domain – (a) whether new media (blogging activity in our case) leads to (differential) market outcomes and (b) whether traditional marketing actions (i. e. , magazines advertising) and new media act synergistically. We also make a first attempt, to the best of our knowledge, to use the content of the blog posts to shed â€Å"process† light on our econometric findings via a careful and methodical text mining analysis. Using data from clothing, and shoes brands, we find that patterns across the two categories showing clear linkages between traditional media, new media and market outcomes. In general, we find that cumulative blogs (Blogstock) are predictive of market outcomes, blogs and magazines advertising act synergistically, pre-launch advertising spurs blogging activity (that is predictive of marketing activity) but becomes less effective in inducing blogging activity post- launch and market outcomes also do have some effect on blogging activity. Our text mining results provide additional support for some of these findings. From a managerial point of view, in the experiment using clothing estimation results, we find that a one percent increase in the traditional marketing instrument (magazines advertising) leads to a median increase in market outcomes of 0. 2%, with a majority of the increase coming from the increase in blogging activity generated by the advertising pre-launch. Our analyses do also have a few limitations (driven mostly by the nature of the data). First, as noted earlier, the aggregate nature of our data makes it very hard to offer micro-level causal explanations of the effectiveness of new media and the synergistic relationship between new and traditional media. While our text mining analyses shed some light on our findings, it would be very beneficial to obtain datasets that link individual activity to market outcomes for a larger variety of new media. Second, our measures of new media are at present limited to blog content – volume – and in two product markets, keywords and valence. ). Third, our model could be improved with the potential use of non-parametric models to model the effects of both old and new media and the associated interactions. Finally, our data do not contain information on all marketing instruments and hence we use proxies (such as lagged sales in the case of distribution). We hope that with better data, future research will be able to address these limitations.

Sunday, September 29, 2019

Religion: God and Moral Standards Essay

The topic that I have chosen to discuss for my final argumentative paper is â€Å"Religion†. I chose this topic because it plays a major role in my everyday life. During this paper I will discuss the most important part about religion, God. I will discuss whether the proof of the existence of God is necessary. I will then talk about the argument for the existence of God that I feel is the strongest and why I feel that it is. Then I will discuss the foundations of the Universe and where it emerged from. Another topic that I discuss is whether or not one can be moral and not believe in God. Next I will discuss whether or not science and religion are in conflict. God’s omniscience and human free will is another topic that will be covered during this paper. The last important topic that I will discuss during this paper is whether or not there is a rational argument for atheism. I believe that this paper will be interesting for me to write. I believe that God will always be real in my heart, whether or not any physical proof is ever found of him. Reading about the various proofs of the existence of God was very interesting for me. I say this because I am a firm believer in God and to think about how some people rationalize his non-existence to them is hard for me to understand. The argument that seems to be the best to me is the â€Å"Cosmological argument†. The argument states that â€Å"if something exists something else had to bring it into existence†. It goes on to talk about how things that exist do so because something else caused it to exist. It calls the something that brought I into existence â€Å"a first cause†. The only thing or being that could qualify as the first cause is God. Therefore, God would be the originating source of the universe, which I truly believe. I believe that philosopher’s have always sought proof of God’s existence because it was hard for them to believe that the world just happen one day. I think that they have always questioned the complexity of the world and knew there had to be some type of designer. I agree with this because the world is just too amazing and complex to just appear one day. Even if you believe in evolution, you still would have to question where the first being or animal came from. Everything has an origin and I believe that God is the origin of the universe. So the next topic to be discussed is the foundation of the universe and from where did the universe emerge. It has been said many times that â€Å"scientists believe that our universe began with one enormous explosion of energy and light, which is called the Big Bang†. This is considered to be the start of space and of time itself. However, it is believed that something that is outside of space, time and matter that caused this to come into existence. This theory was proven by astronomer Edwin Hubble in the late 1920’s. The way that the Big Bang theory is described parallels what the bible says about the beginning of life. The bible states â€Å"In the beginning, God created the heavens and the Earth†¦and God said ‘let there be light and there was light†. I believe that this could be considered proof regarding the existence of God. I know that some scientists disagree and want to say that the universe came from the laws of physics, but none of these things existed before the initial blast. Another part of religion is being a moral person. So a question that has been asked is â€Å"can one be moral and not believe in God†? There are some people in today’s society that believe that you don’t need God to be moral, but I don’t necessarily believe that. They believe that people can set their own rules for life, and have their own personal values. I don’t believe that this would be a good idea considering the fact that everyone’s values are different, so there would be no standard for us to live by. In order for us to judge whether or not something moral or good then we should have a set of certain values that you would judge them by. It is said that to believe in God means that you believe in moral standards. Philosopher Immanuel Kant pointed out â€Å"we need an omnipotent God to enforce moral standards to make sure that everyone is properly rewarded and punished†. He stated this because he believed that â€Å"moral standards without moral sanctions don’t mean much†. I believe that people live a more meaningful life when they believe in the morals created by God and not by man. I say this because I believe that man will come up with moral standards that will only benefit him, but God comes up with morals that will benefit everyone. However, I don’t think this means that everyone that does not believe in God is immoral. There are some that still do good and behave responsibly without believing in him. I think that it just depends on the person and how they chose to live their lives. We will now go on to discuss whether or not science and religion are in conflict. It is said that most of the time science and religion are not in conflict, and that they only conflict on certain topics. One example of their conflict would be whether or not the Earth is the center of the universe, or the sun the center of the universe. The church teaches that the Earth is the center and that the Sun, Moon and other planets revolve around it. However, some scientists have taught that the Sun is the center of the universe and that the Earth and other planets revolve around the Sun. Another example of conflict between science and religion is regarding the creation of man and Earth and evolution. Cosmologists believe that the universe is about 13. 7 billion years old, but the Earth is only 4. 5 billion years old. So this would mean that the universe was here long before the Earth, so therefore the universe could not revolve around the Earth. I still don’t fully understand how they came up with their calculation, so I don’t believe them. I still believe that God created the Earth and the universe at the same time. It has been stated that the conflict exist because â€Å"science is based on observation of nature†, and religion is â€Å"largely based on faith†. I am more of a faith based person, so that is why I believe the God created the universe. We will now discuss whether or not God’s omniscience and human free will can be reconciled. Personally I don’t think they can be reconciled. Free will is defined as â€Å"the power of acting without the constraint of necessity or fate; the ability to act at one’s own discretion†. It was said that because God’s foreknowledge determines all human choice and activity, then God’s omniscience conflicts with human free will. I am a believer in human free will, but I also believe in God’s omniscience. I believe that God does predetermine how he wants our lives to be, but he also gives us choices that will decide which path our lives will take. I have always believed that God has put certain people in our lives for a reason, and we are also sometimes put into certain situations for a reason. I believe that this is done in order to teach us a lesson and so we can learn to make better decisions on our own. So I believe that ultimately the two can work together perfectly. The final topic I will discuss is whether or not there is a rational argument for Atheism. Personally I don’t agree with atheism, but I do understand that everyone has right to their own beliefs. It has been stated that people believe in atheism for a number of reasons. One example that is given is that they get tired of â€Å"watching the multitude of bad things happening to good people in the world†. As far as this statement goes, I was taught in church that â€Å"it rains on the just (good), just like it rains on the unjust (bad), so you should not use this as an excuse to not believe in God. Another example is the people will say â€Å"look at how some â€Å"so-called† Christians live and behave. I lead a better life than most of them do†. However, just because a person is a Christian and believes in God doesn’t mean they will do no wrong. I was taught that there is no big sin or little sin, but as long as you repent and ask for forgiveness then you will be saved by the grace of God. I simply just don’t believe that there is a rational argument for atheism, because I have been blessed too many times without a rational explanation for me not to believe in God. I say this because about fifteen years ago I was told by a doctor that I had a mass on my brain that looked like a tumor and that I would need to see a specialist in see if it was cancer. I went home upset and crying, but I pray all night. I went to church that Sunday and asked for prayer, the congregation prayed for me. I went to see the specialist the next week, who stated that there was not mass and that it was just part of my brain and there was no cancer. So I know personally what prayer can do, and nobody can make me feel different. In conclusion, I would like to rein irate how important religion is in my life. I actually enjoyed writing this paper because it made me realize why I truly believe in God. There is no scientist or atheist that can make me stop believing in God. I never realized how much Philosophy deals with God until I took this course. It was interesting to read about the different Philosophers, and how they try to prove that existence and non-existence of God. I hope that after reading this paper you can get a better understanding of my position on religion, and why I am a firm believer in God.

Saturday, September 28, 2019

Countries grow at different rates because they accumulate capital at Essay

Countries grow at different rates because they accumulate capital at different rates. Is this true Explain your answer - Essay Example Accumulation of wealth can be viewed in two ways. The first is where one party amasses wealth at the expense of another. The second is where there is an increase in the amount of wealth for both parties. It happens due to a mechanism in place that generates wealth for both parties. These two mechanisms cannot work in isolation. In the economic wars, available countries are using both tactics to gain economic advantages over others. A look at the two graphs above reveals a significant difference in the rate of GDP growth between a developed country and a developing country. There are three theories that expound how the difference in the rate of accumulating wealth determines the variation in the rate of growth between the various countries. The theory argues that the economic growth of a country is dependent on the output of its individual citizens. In country where the capital per individual is large, the rate of economic growth is higher. Therefore, in countries where the level of technology is high, lesser employees are required per unit of output. This cuts down the labour cost and increases the capital goods which have higher returns on the inputs. This confirms that the higher the capital goods per individual, the more the more the returns per input and hence a higher growth rate is achieved (Setterfield 2010, p.49). Karl Marx in his theory argues that, the rate of accumulation of wealth is determined by how much profit is returned back into the production process in order to produce more profit. He measures the rate of wealth accumulation by how much the capital is grown. The amount invested back into the production process determines how fast the wealth of the nation grows. He further explains that, the process of accumulating wealth involves legal trading between two parties for the purpose of making profit or just acquiring property from someone at their expense. This two process breeds both fair and unfair competition among nations for the

Friday, September 27, 2019

Water storage tank control Essay Example | Topics and Well Written Essays - 1000 words

Water storage tank control - Essay Example After establishing these values, further identification of comparative indicators could be assessed to put the switch in on or off position. Under the condition where net water supply reaches the maximum level, the water supply must be stopped to prevent unnecessary flow of water. This level is designated as level 3. In general, three set of interconnected gates direct the level of water in the tank. The Not gate operates to institute a connection between level 1 and water tank empty indicator as this is linked with the alarm. As soon as the provided value falls below the numerical value of 3, light is switched on. On the basis of this, it can be inferred that the water level is decreasing and water in the tank is attaining lower level and it is the time to take some measure in order to impede the water from touching the lowest level. The ensuing course endures till the alarm is switched off, an indication of exhausting the water. In a situation where water level drops to level 1, at tentiveness and safeguard are desired to be practiced to prevent the pump from incurring any sort of damage; the purpose of switch is to prevent such a disaster. Beside the level 1 point, the provided switch is required to show as well as act to turn off while the indicator is required to express the task of turn off. The figure illustrates the situation of incorporating distinctive function device, an inverter that provides a mechanism of certifying facility alternative.

Thursday, September 26, 2019

Explore and discuss the opportunities and challenges associated with Essay

Explore and discuss the opportunities and challenges associated with the PEEP report in terms of paramedic clinical practice - Essay Example Reports later emerged that community paramedics were treating more patients at home, thereby providing primary care out of hour’s services, responding more efficiently and effectively to non-urgent 999 calls and reducing more visits to accidents and emergencies, there was need to advance education and teaching of paramedics to create a workforce that could provide a greater range of mobile urgent care with further suggestions that the education and training should focus on clinical decision making. The Paramedic Evidence-Based Education Project (PEEP) was commissioned in August 2013 to address this issue of delivery of paramedic teaching. It was accepted that paramedics were well known by the general population and equipping them with urgent care skills will be very beneficial to the wider community. This report provided the following recommendations: The paramedic profession has made rapid progression since its inception. The paramedic profession was registered as an occupation in the year 2000 when paramedics were required to register with the Council for Professions, an organization that is known as the Health Professions Council (HPC) (Donaghy, 2008). In the earlier times, horse-drawn carts and carriers were being used to carry and treat the sick and ambulances were later developed and they were used during the First and the Second World Wars (Claggs and Blaber, 2008). In the 1960s the drivers of the ambulances had roles to carry the sick and injured from home to hospital. However, little or no training was provided to these drivers and what was required from them was good driving skills and to be strong. After some time it was evident that basic emergency care like first aid could be provided by ambulance drivers. However, even with this information, equipping ambulance drivers with knowledge remained negligible and they onl y relied on delivery

Wednesday, September 25, 2019

Scientific discoveries Essay Example | Topics and Well Written Essays - 500 words

Scientific discoveries - Essay Example Molecular electronics face two types of challenges. The first challenge is building molecular structures that act as switches and the second challenge is combining these molecules into a complex circuit in order that they are able to perform a specific function. These two tasks demand reproducible organic molecular conductors and insulators. Polyphenylene based molecules besides carbon nanotubes have been considered as possible candidate molecules capable of these tasks (3). In October 2009 a team of researchers led by bio-designer N. J. Tao reported success in the development of key electrical component of the diode on a phenomenally tiny molecular scale, namely the single-molecule diode. (4). Diodes constitute critical components for a wide range of applications that include power conversion equipment, radios, logic gates, photodetecters and light emitting devices. In all these applications diodes make up the components that permit current to flow in one direction, but not in the other direction in an electrical circuit. To bring this specific function down to the level of a molecule, the molecule should be physically asymmetrical, where one end of the molecule has the capacity to form a covalent bond with the negatively charged anode terminal and the other end capable of bonding with the positively charged cathode terminal. A symmetrical molecule allows current to flow in both directions, which is similar to an ordinary resistor. On the other hand an asymmetrical molecule allows current to flow in only direction similar to a diode, which is the more important and difficult component to replicate. With the size of a transistor in the field of electronics nearing a few te n nanometers or about twenty times larger than a molecule, the development of a molecular diode is exciting. (5). The Tao led research team studied conjugated molecules for the purpose of developing a molecular diode. In conjugated molecules the atoms are stuck together by alternating

Tuesday, September 24, 2019

Family theory use for the dementia Disease Essay

Family theory use for the dementia Disease - Essay Example ortant that nurses continue to improve their care services beyond that of re-establishment of family balance to encompass that of family health support and health protection through extensive awareness. The capability of families to reveal self-care skills is crucial to advance mental and physical health within the family and curb the mortality and morbidity that persists to transpire as an outcome of chronic health problems (Doane, 2004). Being a service-oriented profession, nurses working with families in illness and health have an obligation to enhance individual health but the health of the entire family. The objective of this paper is to explore some of the features of the family system theory. Primarily, the repercussions of an organismic family systems model to dementia will be taken into account. Then, consistent with the principles of a competence theory, there will be an exploration of the features of the family systems theory. And lastly, based on research on family systems, several dimensions of family systems will be discussed with regard to their relevance to nursing practice with vulnerable families of dementia patients. The family systems theory was conceptualised by Murray Bowen which maintains that understanding of an individual is impossible in separation from one another, but instead understanding of an individual as a member of their family. The family, as espoused by the theory, is an emotional entity. In the family systems approach, the family is viewed as a system of interrelated and mutually dependent individuals. Moreover, the theory stipulates that families are systems in which all of its members had tasks to fulfil and rules to obey. System members are anticipated to respond to each other in a definite manner in accordance to their responsibility, which is established by relationship agreements (Titelman, 2003). Within the system boundaries, trends emerge as behaviour of a particular member of the family is attributable to and sources

Monday, September 23, 2019

FAMILY UNIT. FUNCTION, SHAPE AND IT'S PRESENT ROLE IN SOCIETY Essay

FAMILY UNIT. FUNCTION, SHAPE AND IT'S PRESENT ROLE IN SOCIETY - Essay Example In other words the size of the family was larger earlier whereas at present it becomes lesser and lesser. Nuclear families and single parent families are gaining popularity at present because of the changing perceptions about life philosophies. Family relationships were stronger earlier; but these relationships are getting weaker and weaker as the time passes. People became more selfish and current generation sees fewer roles of family in their social life. This paper briefly analyses the function, shape and role of family in the present society. Most of the current families consist of only the parents and their children. The concept of larger families has given way for nuclear families. In a larger family the commitments of the family members would be more compared to that of the members of a nuclear family. The concepts of nuclear family evolved because of the changing trends in social life. People started to migrate to distant places in search of better opportunities and settled t here. Thus, their contacts with family members started to decrease which resulted in feeble relationships with the family members. Pearl S. Buck criticized current system of family on part of emotional security aspects. He said "The lack of emotional security of our American young people is due, I believe, to their isolation from the larger family unit. No two people - no mere father and mother - as I have often said, are enough to provide emotional security for a child. He needs to feel himself one in a world of kinfolk, persons of variety in age and temperament, and yet allied to himself by an indissoluble bond which he cannot break if he could, for nature has welded him into it before he was born (Jay) In a larger family, people get more support from others in solving their problems. For example, in larger family consisting of grandparents, children will get immense benefits from the advices of their grandparents. Grandparents have already faced many of the challenging life situa tions and they can streamline the junior members in the family in the right tract when problems occur. The nuclear family members may not get the services of the grandparents. â€Å"Being a daughter implies that there is a mother or father. A daughter or son reasonably expects physical care and emotional support to a certain age, and parents might expect increasing domestic responsibility and self-direction with their child's physical maturation† (Family Roles - Role Expectations And Demands). The above concept was a traditional one as far as a family is concerned. However, current families are not much bothered about such concepts. It is not necessary that a daughter or son may get the support of both the father and mother in their family at present. Single parent families are more common everywhere at present. The increased divorce rate prevents children from enjoying the support of both father and mother nowadays. The current generation is too much focused on their profess ion and they are giving less importance to family needs. For example, lots of working women leave their infants in day care centers before entering their office. These infants are deprived from getting the much needed care and love for their emotional developments. Such children develop fewer relationships with their parents and in future they may create lot of problems in the family. They will never obey their parents and do things as they like. It is quite possible that children who failed to get adequate

Sunday, September 22, 2019

The European Human Rights Act Essay Example | Topics and Well Written Essays - 1250 words

The European Human Rights Act - Essay Example "In contrast to the importance attached to the democratic accountability of Parliament, institutional checks and balances, and the rule of law as means of safeguarding individual liberties, comparatively little significance was attributed to the European Convention on Human Rights before passage of the Human Rights Act." (Akehurst, Michael & Malanczuk, Peter 1997 p.65) This may be seen as a surprise considering the fact that the UK was an early signatory to the European Convention, and the UK was instrumental to the drafting of the human rights convention. The effects of the incorporation of the European Convention on Human Rights on the English Legal System however, seem to be limited by the constitutional doctrine of dualism, which distinguishes international law from national law. "Considerations of national and parliamentary sovereignty require that treaties alone are unable to alter the internal laws of the UK, because the executive alone enters into treaties on behalf of the United Kingdom. Otherwise, the government could evade parliamentary scrutiny of its proposals through the exercise of its treaty-making powers." (Human Rights Act Research Project 2001) Therefore, as treaties are not self-executing the terms of these treaties must be incorporated into an act of Parliament in orde... courts. "While the European Convention, as an agreement between national governments, imposed obligations on the United Kingdom in international law, it did not impose obligations on Parliament or the government under British domestic law." (Council of Europe 2000) Another challenge is posed by the desire to upgrade the legal status of the individual rights as described in the substantive provisions of the European Convention, while at the same time ensuring the preservation of traditional or orthodox notions of parliamentary sovereignty. "The courts are not given the power to invalidate acts of Parliament that are incompatible with the rights listed in the European Convention, but may only issue a declaration of incompatibility, which does not itself affect the validity or enforceability of an incompatible act." (Akehurst, Michael & Malanczuk, Peter 1997) Thus, the incorporation of the European Convention on Human Rights has had a significant impact on the English Legal System, and to the concept of parliamentary sovereignty. 2. a) Do you believe that section 3 of the Human Rights Act 1998 creates a new rule of statutory interpretation for judges Yes, section 3 of the Human Rights Act 1998 does create a new rule of statutory interpretation for judges. "The Human Rights Act 1998 is an Act of Parliament of the United Kingdom which received Royal Assent on 9 November 1998, and mostly came into force on 2 October 2000. The Act makes available in UK courts a remedy for breach of a Convention right, without the need to go to the European Court of Human Rights in Strasbourg. It also totally abolished the death penalty in UK law, although this was not required by the Convention in force for the UK at that time" (British Medical

Saturday, September 21, 2019

Plan to Improve Organizational Sturcture and Recapture Market Share Essay Example for Free

Plan to Improve Organizational Sturcture and Recapture Market Share Essay Over the past few years, WordPlay Greetings has experienced a sharp decline in market share as well has extremely high turnover of sales staff. The first major challenge discussed was the limited supply of items that are also sold to other national retailers and create competition against Word Plays smaller company owned and franchised stores. The second issue highlighted in our discussion was that operations have been inefficient which also leads to decline of profitability. WordPlay Management was fearful that high turnover of sales staff was a major cause of inefficient operations and stressed the importance of addressing this issue. Technological advances are certainly an issue that every industry must consider when trying to keep with or beat competitors. Online options for the greeting card industry have greatly advanced over the past few years offering ways to send expressions electronically and even customize them with photos and voices without having to leave home. It is critical revive WordPlays website and make stores more appealing to visit with new product lines and customization options that will attract customers and keep them coming back and telling others. Hiring and retaining talented and caring staff is goes hand in hand with keeping up with technology. Knowledgeable and caring sales people are just as important as the product. Developing an organizational culture that inspires and motivates will help spark new creative designs and product offerings for WordPlay Greetings. Bryce Dancetty has performed industry research, employee and market surveys, leading to job redesign, development of new marketing and product design teams, and improved organizational reward programs that aim at reducing turnover for WordPlay Greetings and getting them back on a path to profits. Introduction Bryce Dancetty Consulting has been working with WordPlay Greetings over the past several months to analyze their business, develop plans to reduce sales staff turnover, revive its product line, improve its organizational culture, and implement new programs that will motivate employees and enrich jobs and career paths. In this report we will review the methods used to collect data and form plans for change. Causes of Business Downturn WordPlay Greetings market share has seen sharp declines over the past few years. Company leaders concluded that causes for this problem stemmed from the limited supply of items that are also sold to other national retailers and create competition against Word Plays smaller company owned and franchised stores. An additional contributor to their decline was believed to be high turnover with in their sales division. WordPlay leaders agreed to work with Bryce Dancetty Consulting to look deeper in to these issues and how they could be resolved to help them regain market share and do better at hiring and retaining a highly skilled and motivated sales team. Bryce Dancetty Consulting employed the DECIDE Model which is based on statistical science to examine all aspects of the WordPlay business and its environment. The Decide Model allowed us to define the problem(s) and/or opportunities, along with objectives and constraints. Next, the possible decision factors that make up the alternative courses of action (controllable uncontrollable) are enumerated (given numeric values). Then, relevant information on the alternatives and possible outcomes is collected. The next step is to identify and select the best alternative based on chosen criteria or measures of success. Then a detailed plan to develop and implement the alternative selected is created and put in to effect. Last, the outcome of the decision process itself is evaluated. We addressed issues by performing a market research and analysis that focuses on the following questions: †¢How can Word Play develop products that are exclusive, unique and will help recapture a higher market share? †¢Can store hours be adjusted based on traffic flow and peak sales times in order to reduce labor costs and increase profitability? Are there colleges in the area that may have marketing and/or design students that would be willing to intern and help bring new/fresh product designs to Word Play Greetings? Research was done and information was gathered via surveys, questionnaires, interviews, and focus groups that Bryce Dancetty designed and assembled. Surveys and questionnaires provided a wealth of information quickly in a non-threatening manner. Most were completely anonymous and done at a very minimal cost. They were administered via mail as well as online. Feedback received via surveys concluded that Wordplay Greeting Cards current product line was being described as â€Å"stale† by former customers. This perception must be changed in order for the company to regain and increase its market share going forward. Focus Groups were utilized to explore topics related to operational efficiency, product design, marketing strategies, and common complaints regarding products to gain a more in-depth perspective on the best ways to increase market share and profitability. Focus groups yielded results that supported job redesign for the sales division, developing new product design and marketing teams, and creating an organizational culture that motivates and inspires. Sales Division and Sales Clerk Turnover Interviews of corporate employees as well as store staff were performed to better understand their impressions of the current state of the company, their experiences, and their ideas for improvement. From the information gathered, Bryce Dancetty provided a revised job description which is attached in the appendix for review. In addition to revising the job description for sales clerks, Bryce Dancetty made several recommendations that do not involve compensation adjustments that can also increase retention of sales staff for Wordplay Greetings. There is a significant need for WordPlay to increase feelings of participation within the organization. While allowing sales associates greater freedom in creating store displays, it is recommended that contests be incorporated to help motivate employees to put forth their best efforts. Allowing sales associates to take responsibility for deciding on how to put together displays is an example of vertically loading the job. Their autonomy increases and they feel more personal accountability for the outcome of their efforts (Hodgetts Heger 2008, pg. 306). Involvement in new product selections through the creation of employee focus groups is also highly recommended. The focus groups will be allowed to participate on conference calls and in web training to assist with selection of new products that will be carried in the stores and also learn how these choices impact the company financially. This feeds an employee’s desire to learn and grow in their career, knowledge, and skill (Heathfield 2012). A recent McKinsey Quarterly survey underscores this type of opportunity. Respondents felt that the chance to lead projects or task forces were often more effective at motivating than financial increases (McKinsey Quarterly 2009). Another way to build a connection within an organization and increase the sense of belonging that employees feel is to create a company newsletter. Newsletters helps share what is happening on a higher level by sharing hot company news being discussed by executives, sharing status on company goals, and stock standings. When there are multiple locations, newsletters help to share what is happening elsewhere and are a great way to share creative ideas, contest winners, and announce new contests. Employee Profiles can be included to highlight accomplishments both inside and outside of the company. The newsletter is also a great way to share benefit information, deadlines, health tips, and volunteer opportunities. Lastly, increased communication between employees and local as well as corporate management will be a key to retention of sales staff. Well-designed jobs anticipate the need for communication. Most employees want to know what is expected of them in the job, how they are doing, how they can improve, what latitude they have in changing how they do their tasks, what should be discussed with a supervisor and when the discussion should occur. Employees rarely complain about too much communication with their supervisor. They often want more communication (Hodgetts Heger 2008, pg. 306). The implementation of a regular newsletter as mentioned above will help with communication, however we are also strongly urging WordPlay Greeting Cards to provide a stronger line of communication via email that will allow employees to contact corporate offices more efficiently for feedback if they have concerns that are not being addressed at a local level and/or ideas that they want to share for improvement. Bryce Dancetty Consulting is confident that the revision of the sales clerk job description which increases responsibility and sense of participation will not only attract more applicants but also encourage company loyalty and lead to retention of a high quality sales staff that can be promoted in to management positions as the business grows. Job Enrichment Job enrichment is a way to motivate employees by giving them increased responsibility and variety in their jobs. Our plans for job enrichment will focus on allowing employees to have more control in planning their work and deciding how the work should be accomplished. Job enrichment efforts will include adding and clarifying: Skill Variety – the number of different types of skills used to do a job. This is important because using only one skill to do the same task repeatedly can get very boring. When employees get bored productivity decreases over time. Task Identity – A matter of realizing a visible outcome from performing a task. Being able to see the end result of the work they do is an important motivator for employees. This can be accomplished through Job Enlargement. WordPlay will move towards this goal by adding more tasks and responsibilities to existing jobs. To illustrate this concept – a customer service representative will follow a client’s issue from start to finish (phone inquiry through problem resolution). Customer service reps will be given greater access and authority to make account/claim adjustments so that fewer inquiries need to be escalated. They will be able to take pride in knowing they solved a problem themselves and customer satisfaction is also sure to increase. Task Significance – How a job impacts others in the organization. If this is clearly defined, employees will make greater efforts to do their best.

Friday, September 20, 2019

Advantages And Disadvantages Of Interlock Parity Information Technology Essay

Advantages And Disadvantages Of Interlock Parity Information Technology Essay Detecting and correcting errors is the major problem for handling on chip errors. For this purpose error detection and correction techniques are used which are suitable for NoC. Error control codes are used to detect single or multi bit errors. Errors correcting schemes put an overhead of extra hardware on the system. Most of the coding techniques are used to correct single bit error. Due to the increase in size and complexity of very large scale integrated (VLSI) chips the problem of multi bit errors have been increased, so to over come the problem of multi bit errors, researchers have explored various multi bit error detection and correction techniques. Multi bit errors can completely corrupt the packets which need to be discarded and retransmitted. As on chip errors are more dangerous than off chip networks more over on chip resources like storage and processing are limited, therefore techniques that take care such limitations are more appropriate for NoC. Here we are going to introduce a new error detection technique. This technique has the limitation of only detection of errors. We compare this technique with few other error detection and correction techniques and deduce the results about our purposed error detection techniques. We purpose the name of new error detection technique as Interlock Parity. In the next section the complete introduction and proposed format of the Interlock Parity is given. Next we look some advantages and disadvantages of Interlock Parity technique. 5.2 Interlock Parity This is a new purposed technique to detect the bit errors on the network on chip communication. This technique is designed to work with 32 bits of data word. After 8 bits of data next bit is fixed for parity bit. Similarly after that 8 bits the next bit is again fix for parity bit and in this way 32 bits of data include 4 parity bits. We name these parity bits as P1, P2, P3 and P4. The option for choice of even parity or odd parity is open i.e any method is used to fix the parity bit, but all 4 parity bits must follow the same parity scheme either even or odd parity checking. Similarly we name the first 8 data bits as d1, second data bits as d2, third data bits as d3 and last portion of data bits as d4. So after the induction of parity bits our date packet size will increase from 32 bits to 36 bits. Keep in mind there are few additional bits are reserved for the purpose of control information discuss in detail later in this chapter. Following figure 5.1 shows the packet layout of the Interlock Parity scheme. Header d1, Data bits (8 bits) P1 d2, Data bits (8 bits) P2 d3, Data bits (8 bits) P3 d4, Data bits (8 bits) P4 Figure 5.1 Interlock Parity packet format If number of 1s in d1 is even then P1 = 0 other wise 1. Next if number of 1s in d2 is even then the value of P2 is set to zero and bit value of P3 and P4 will be set according to the number of 1s in d3 and d4. More generally we can write as even then Pi = 0. where 1 à ¢Ã¢â‚¬ °Ã‚ ¤ i à ¢Ã¢â‚¬ °Ã‚ ¤ 4 If No. of 1s in di = odd then Pi = 1. where 1 à ¢Ã¢â‚¬ °Ã‚ ¤ i à ¢Ã¢â‚¬ °Ã‚ ¤ 4 Data block is transferred form source to the destination according to the control information header. At the destination first of all value of Pt is checked and if the Pt value is correct then the packet is accepted for further processing, in case of detection of some error in Pt bit value, process of evaluation of Pi values started. Each Pi value is checked according to the data present in di block. If there found any mismatch among di and corresponding Pi then di is discarded and retransmission request of that particular di is generated to resend the data. This reduces the probability of frequent bit flips in the data blocks. 5.3 Advantages and Disadvantages of Interlock Parity 5.3.1 Advantages of Interlock Parity Scheme Easy to calculate parities due to limited computation resources in NoC. In case of bit flip error detection only a limited portion of data needed to be retransmitted with in the packet. Easy to locate erroneous portion of data. Due to the probability of occurrence of multiple bit flip errors this technique of Interlock Parity restricts the multiple error occurrences in a byte size data. 5.3.2 Disadvantages of Interlock Parity Scheme Have to calculate 4 parity bits. Limited to detect errors if only single bit or odd number of bits flipped. Unable to detect errors if even number of bit flips occurred. This technique is not suitable for multiple errors. Errors correction is not possible at the receiver side. 5.4 Packet Format In this section we describe and closely look the format of the Interlock Parity scheme. Packet is divided into two portions. First portion is known as header and contains all the necessary information which uses to transfer packet from sender to the receiver. The second portion of the packet is known as data portion. In this section of the packet data is divided into 4 different parts along with the parity of each part. 5.4.1 Header Portion Header portion contains the following information. Source Address Destination Address Packet Number Data Portion Number Control Information Source Address field contains the information about the source and 5 bits are reserved for the source address. Destination address is the address of the destination and 5 bit are reserved for the destination address. Packet number denotes the number of the packet which is 10 bit long address. Data portion number denotes one of the four data portions in the date portion part. It can assume at the maximum 2 bits as we have maximum 4 data portions in our packet. 6 bits are reserved for control information can be used for future purpose or depend upon the routing algorithm requirements. Following figure depicts the structure of the header portion of the Interlock Parity packet format. Header Source Address Destination Address Packet Number Data Portion Number Control Information 5 bits 5 bits 10 bits 2 bits 6 bits Figure 5.2 Interlock Parity packet header format 5.4.2 Data Portion Data portion of the Interlock Parity packet format is divided into 4 parts. Each part is 9 bits long divided into 8 bits for the data and 1 bit for the parity bit corresponding to the data bits associated with the parity. In this way total size of the data portion along with parities is 36 bits. Following figure shows the structure of the data portion of the Interlock Parity packet format Data Portion d1 P1 d2 P2 d3 P3 d4 P4 8 bits 1 bit 8 bits 1 bit 8 bits 1 bit 8 bits 1 bit Figure 5.3 Interlock Parity packet data portion format. 5.5 Communication Strategy As during the communication of data packets, errors may corrupt the data so there is a need for reliable communication. Fundamentally few capabilities are required to handle the bit errors. Few of these fundamental capabilities to handle presence of bit errors are as mention below Error detection: A mechanism is needed to allow the receiver side to detect the occurrence of bit errors. There should be a mechanism which allows the receiver to detect and possibly correct bit errors. Receiver Feedback: since sender and receiver are typically executing at different nodes. The only way for the sender to know whether packet is delivered correctly to the receiver is by providing explicit feedback to the sender. For this purpose positive or negative acknowledgements are used by the receiver to sender. Retransmission: a packet received in error at the receiver will be retransmitted by the sender. Data packet is generated at the sender and sends to the receiver. At the receiver side checking of errors will take place, if packet received without any errors then it is accepted for further processing other wise packet is discarded. In case of any erroneous bits ARQ strategy will be used to correct the errors. As from the previous section our data portion of packet is divided into 4 data parts so only portion with errors in that data bits is requested to transmit again. We only use not acknowledgement (NAK) packet to communicate to sender for the retransmission of the particular erroneous portion of the data. Following figure shows the structure of the NAK packet format NAK Packet Source Address Packet Number Data Portion Number 5 bits 10 bits 2 bits Figure 5.4 NAK packet format. During the communication it does not allow reassembly or fragmentation at intermediate nodes. These operations can be performed at source and destination. As fragmentation and reassembly is a time consuming process, by removing this functionality from the intermediate nodes and placing it in the source and destination will definitely speeds up the communication. We implement interlock parity for end to end communication. Complete discussion and all the experimental results are presented in the next chapter. Chapter 6 Implementation and Experimental Results As discussed in previous chapters that network on chip provides a practicable way out to counter the incompetence of buses in the present very large scale integrated on chip interconnects. As we know in packet based communication a flipping error of bit(s) can corrupt the data packet which raise a question mark on the correctness and trustworthy of data transfer from source to destination. In the presence of stated problems it is essential to provide some vigorous protective solutions against such problems. As a solution to the above problems, network on chips have been proposed by different researchers to get rid of the ineffectiveness of on chip buses in scaling chips. Later it was discovered that network on chip also faces the same problems of transient faults as faced by VLSI chips. So chips designed with error detection and correction codes require high energy and area overheads as discussed in [65]. On network on chip we have limited resources of computation and storage; it is significant to present solutions which are low cost in term of memory and energy without compromising on reliability and performance. Here we are going to introduce a new error detection technique. This technique has the limitation of only detection of errors, while error correction takes place by retransmission of corrupt data packet. We compare our new purposed technique with few other error detection and correction techniques and deduce the results about our purposed error detection techniques. We purpose the name of new error detection technique as Interlock Parity. Complete introduction of Partial Party technique is given in chapter 5. In the next section the complete introduction about network on chip communication model, interest to use C/C++ and setup about implementation of Interlock Parity is given. We work on the different error detection methods given below, Simple Parity Cyclic Redundancy Check Checksum Mathod Repeated Bit Method along with our newly developed concept Interlock Parity method. We implement and present the implementation and comparative analysis results of Interlock Parity with above mentioned techniques. Major concern of this research is to make a comparative analysis between mentioned techniques in the following areas Encoding Techniques impact over the network throughput. Encoding Techniques impact for power consumption. Delay time comparison for packet delivery from sender to receiver i.e. latency comparison. Instead of using simulator we design our own network simulator designed in C/C++ program for the implementation purpose and get results for analysis. The purpose of personally designed simulator is to gain in depth working knowledge of different encoding techniques. 6.1 NoC Communication Model We use network on chip as 2 dimensional mesh topology with packet level communication. We use a data bus of size 128 bits which is wide enough to simultaneously transfer all bits of data present in the packet in any direction. As we discussed in chapter 5 packet consists of a header and data portion. The header contains identification information about source and destination, packet unique identifier, data portion identifier which varies from 1 to 4. Data portion of the data contains actual data along individual parity bits. Along with data packets we also use NAK packet. Sender will inform only in case of packet received with bit errors. NAK packet is also use to intimate the sender in case of packet loss. For the reasons of simplicity and well suitability for mesh based network on chips we adopt different routing strategies for the result analysis. NAK packet is assumed to have higher priority than data packet. Figure 6.1 2D Mesh [6] Data packet is generated at the sender and sends to the receiver. At the receiver side checking of errors will take place, if packet received without any errors then it is accepted for further processing other wise packet is discarded. We only use not acknowledgement (NAK) packet to communicate to sender for the retransmission of the particular erroneous packet/portion of the data. During the communication it does not allow reassembly or fragmentation at intermediate nodes. These operations can be performed at source and destination. As fragmentation and reassembly is a time consuming process, by removing this functionality from the intermediate nodes and placing it in the source and destination will definitely speeds up the communication. 6.2 Let Us C/C++ Instead of using simulator we design our own network simulator designed in C/C++ program for the implementation purpose and get results for analysis. The purpose of personally designed simulator is to gain in depth working knowledge of different encoding techniques. 6.2.1 Using C/C++ The C/C++ language is based on sequential programming, also suitable for the programming and modeling of concurrent activities. As we know most digital systems and hardware models require a notion of delays, clocks or time, such features are also present in C/C++ as a software programming language. So complex and detailed systems can be easily and comfortably designed in C/C++ language. Finally the data types present in C/C++ are helpful for implementation. To address all these problems new dedicated data types and communication mechanisms are available with C/C++. Basic language elements such as modules, processes, event, channels, and event driven simulator kernel are also present in C/C++. 6.2.2 Advantages of using C/C++ As C/C++ is firm programming language accepted all over the world, C/C++ holds all the features of a complete programming language which makes easier to write complex programs with minimum efforts. C/C++ supports all the data types supported by any language. C/C++ provides the facility of user friendly, which saves lot of money and precious time. C/C++ adds the idea of timing signals which is important to simulate synchronous hardware designs. This facility gives C/C++ an edge over other programming languages. C/C++ supports the design at higher abstraction level; this enables large systems to be modeled easily without worrying the implementation of it. C/C++ also support concurrency and can be used to simulate the concurrent behavior of the digital system. 6.3 Experimental Setup Instead of using simulator we implement Interlock Parity technique along with four other encoding techniques. For the implementation of Interlock Parity scheme, we use 2D mesh network topology. We use (4 X 4) mesh network at the initial stage of the experiment. To transfer all bits of the data simultaneously, we use 128 bits wide data bus in each direction. Figure 6.2 2D (4 x 4) Mesh [6] As we discuss the packet format in the previous chapter in detail. Our packet consists of 2 parts. One is header part and the other is data part also known as payload part. The header portion contains useful information like packet ID, source address, destination address, routing information, total nodes in the network and some control information etc. the payload or data portion holds the original data. Further in our implementation of Interlock Parity scheme, we categorize packets into two classes. Data packets Control packets As data packets hold useful data, while control packets contains information about the reliable delivery of the data packet send from some source to the destination. For the simplicity we only use negative acknowledgment (NAK) control packet. How this mechanisms work is illustrated below If data packet received with out any error at the destination, then accepted and no acknowledgement is send back to the sender. If data packet received with any error at the destination, then packet is discarded and NAK is send to the sender requesting the source node to send the packet again. This research also take care the lost packet impact on encoding technique. 6.3.1 Lost packet If some packet is lost on the way from source to destination, say packet n is lost, NAK is send to sender informing about not receiving the packet n. this packet is resend to destination after receiving NAK about packet n. 6.3.2 Lost NAK packet If some NAK packet lost, then after some time interval same NAK is send again until desired packet received. Following algorithm illustrate the communication between sender and receiver Packet Generate Send to Destination Error Yes NAK Accepted Queued No Figure 6.3 Flow diagram For better result purpose we implement our encoding techniques on the following routing strategies. X-Y routing Path Exploring(P.E) routing Gossip routing 6.4 Experimental Results 6.4.1 Clock Cycles Analysis On over own designed network simulator we first simulate a single packet and compute the computer clock cycles for the following phases of the packet. For the construction of header portion of the packet For the construction of the data portion of the packet Clock cycles required to put encoding check at the packet Clock cycles required to check data integrity at receiver side Clock cycles required for retransmission of packet for unreliable delivered packet In case of packet loss , clock cycles required to enforce the mechanisms to find out lost packet To achieve the above mention objective we send a packet on our designed network simulator. Our network simulator is equipped with reliable, unreliable and packet loss mechanisms. We randomly choose a sender and sender send a packet for randomly chosen destination node. Initially we ignore time for the network traversal and up till now our objective of this module is to gather the clock cycles for the formulation of packet, clock cycles required for enforcing encoding technique , rechecking the integrity of data and clock cycles required to handle the packet loss scenario. To get more accurate result we perform this simulation module for 10 times and average results are presented in the following table 6.1 Sr.No Algorithms Header Portion Data Portion Encoding Technique Reliable Delivery Unreliable Delivery Packet Loss 1 Simple Parity Checking 2 4 1 3 7 6 2 Cyclic Redundancy Check 4 8 10 10 20 13 3 Repeated Bit Method 2 12 2 4 10 8 4 Checksum Method 2 10 5 7 16 10 5 Interlock Parity Checking 3 6 4 6 14 9 Table 6.1 Clock cycle breakdown Clock CyclesFigure 6.4 Clock cycles breakdown The above analysis shows the comparison of clock cycles consumed by different encoding technique for different phases of packet construction and for checking and enforcing the encoding techniques. It is very clear from the above analysis that Cyclic Redundancy Check encoding technique takes longer time to impose the header and data portion part. Similarly CRC technique also takes longer clock cycles for the enforcement of encoding technique mechanisms. Similarly it is clear from the above analysis that checksum method encoding technique takes longer time to impose the header and data portion part. Similarly checksum technique also takes longer clock cycles for the enforcement of encoding technique mechanisms. Our new purposed Interlock parity check technique consume relatively less clock cycles for header and data portion. Thats means packet construction is relatively fast in out new purposed technique. In case of reliable delivery Interlock parity scheme again consume less clock cycles and has an advantage over the CRC and checksum method. While in unreliable delivery checking case Interlock parity scheme again consume less clock cycles and has an advantage over the CRC and checksum method. Lastly in packet loss handling scenario Interlock parity scheme consume 14 clock cycles which is less than from the clock cycles consumed by checksum method and CRC. The other two techniques simple parity and repeated bit method are consuming less clock cycles, but remember these clock cycles are required for the construction and enforcement of encoding techniques only. Network traversal i s not included up till this point of research. Next we present the percentage utilization of clock cycles for the sender node and for receiver node. Following table shows the result comparison for sender and receiver. Receiver Sender Sr.No Algorithms Header Portion Data Portion Encoding Technique Reliable Delivery Unreliable Delivery Packet Loss 1 Simple Parity Checking 28.57 57.14 14.29 18.75 43.75 37.50 2 Cyclic Redundancy Check 18.18 36.36 45.45 23.26 46.51 30.23 3 Repeated Bit Method 12.50 75.00 12.50 18.18 45.45 36.36 4 Checksum Method 11.76 58.82 29.41 21.21 48.48 30.30 5 Interlock Parity Checking 23.08 46.15 30.77 20.69 48.28 31.03 Table 6.2 Clock cycles breakdown for the sender and receiver side. Table 6.2 shows the clock cycles breakdown for the sender and receiver side. These results are also shown graphically in Figure 6.5. This graphical analysis consists of three compariosions Header portion comparision Data portion comparision Implementation of encoding technique During the construction of header portion our proposed technique required little larger time as compared to the other techniques. Reason is that header of our proposed technique require little extra bits to take care about different data segment with in a packet as disscussed in previous chapter. But uptill this point we can tolerate this large time for the construction of header as variance of timings for all techniques range between 10 to 30 clock cycles. As header portion contains small portion of packet so we can accept this drawback of interlock parity scheme. When we look at the data portion timing overhead comparisions, it is very clear that our proposed technique required less amout of time for the construction of data portion in the packet. As data portion consists of more bits of data then it is an advantage of our proposed tehnique for utilizing less clock cycles for the construction of data portion. Finally for the implementation and enforcement of encoding technique our proposed interlock parity checking technique requires comparatively balanced clock cycles. For this comparision we can say that our technique utilize less clcok cycles at the sender side for the administrative steps. Clock Cycles (%)Figure 6.5 Clock cycles breakdown for sender side Similarly at the receiver side we check three different scenarios. Clock cycles required to check whether packet received in reliable delivery Clock cycles required to check the unreliable delivery of the packet Clock cycles required to invoke the verification module about the loss of a packet. These statistics are depicting in the Figure 6.6 below. In this comparison it is clear that all encoding techniques required almost same amount of clock cycles for the implementation of above mention sceneries. Our proposed technique has an advantage of other compared techniques in the case of packet loss. In case of packet loss interlock parity scheme required comparatively less clock cycles to invoke the packet loss module. In case of unreliable packet delivery all mentioned techniques required same number of clock cycles. There is little variation among the encoding techniques which is neglectable. Clock Cycles (%) Figure 6.6 Clock cycles breakdown for receiver side Sr.No Algorithms Reliable Delivery Unreliable Delivery Packet Loss 1 Simple Parity Checking 0.2747 0.3846 0.3571 2 Cyclic Redundancy Check 0.8791 1.1538 0.9615 3 Repeated Bit Method 0.5495 0.7143 0.6593 4 Checksum Method 0.6593 0.9066 0.7418 5 Interlock Parity Checking 0.5220 0.7418 0.6044 Table 6.3 Encoding mechanism checking time measured in seconds Next we present the time required for different encoding techniques at sender side. As we see from the output results given in Figure.6.7 in case of reliable delivery our proposed interlock parity checking technique needs less time as compared to other encoding techniques. In case of unreliable delivery all the encoding techniques require large amount of time as compared to reliable delivery case. In this comparison interlock parity scheme has advantage over CRC and Checksum method. While repeated bit takes approximately same time as taken by interlock parity scheme. Simple parity checking technique is the only technique consume less time as compared to others. Reason is being its simple nature. In packet loss case our proposed technique less time as compared to the other techniques. So after this comparison we can say that interlock parity checking consumed less amount of time. Time Figure 6.7 Encoding Mechanism checking time measured in seconds If we look this comparison in different way, then the following Figure 6.8 gives the comparison of different encoding techniques in the context of reliable delivery, unreliable delivery and packet loss scenario. Simple parity checking encoding technique takes less amount of time as compared to other encoding techniques. In the contrast interlock parity checking technique consume less amount of time as compared to CRC, repeated bit method and checksum method. TimeFigure 6.8 Encoding Mechanism checking Time measured in seconds 6.4.2 Encoding Techniques and Routing Strategies Analysis In the all above discussion we are not considering network delays and routing strategies. To check the performance of encoding techniques we implement these techniques on different network strategies. These routing strategies include Encoding technique with XY routing strategy Encoding technique with PE strategy Encoding technique with gossip routing strategy For better results we further adopt two methods for the enforcement of encoding techniques. One is end to end (E2E) and second is node to node (N2N). In E2E strategy packet is checked only at the destination node, no checking is made at the intermediate nodes. This technique has an advantage of less traffic congestion. While in node to node strategy incoming packet is checked at each and every intermediate node. Packet is discarded as found in error. Forwarding node is intimated and retransmission takes place. This technique faces the problem of network resources and network congestion. We make different comparisons for above mentioned strategies for both E2E and N2N cases. 6.4.2.1 Encoding Techniques and XY (E2E) Routing Strategy Following table 6.4 shows the results of encoding techniques with E2E XY routing strategy. Table 6.4 gives the clock cycles required for different encoding techniques for different cases e.g. reliable delivery, unreliable delivery and packet loss. Sr.No Algorithms Simple Parity Checking Cyclic Redundancy Check Repeated Bit Method Checksum Method Interlock Parity Checking 1 Reliable Delivery 18 40 26 32 27 2 Unreliable Delivery 28 56 40 47 41 3 Packet Loss 27 49 38 41 36 Table 6.4 Encoding technique with XY (E2E) Strategy Figure 6.9(a) present these results graphically. Our proposed technique consumes less clock cycles as compared to other encoding techniques. Simple parity check is the only technique which has advantage over our proposed technique. But interlock parity check technique has advantage over all other techniques other than simple parity check techniques. Clock Cycles Figure 6.9(a) Encoding technique with XY(E2E) Strategy Figure 6.9(b) present these results graphically in other context. In case of reliable delivery our proposed technique consumes less clock cycles as compared to checksum method and CRC. While for repeated bit method case, the comparison is almost same. Simple parity check method has little advantage over interlock as well as other encoding techniques. When we come towards the analysis of unreliable delivery case, this segment takes more time as compared to the reliable delivery scenario. Our proposed technique also consume less clock cycles as compared to other encoding techniques other than simple parity check method. Packet loss case takes more time than reliable delivery but consumes less clock cycle

Thursday, September 19, 2019

Cystic Fibrosis :: essays research papers

CYSTIC FIBROSIS   Ã‚  Ã‚  Ã‚  Ã‚  ONE OUT OF EVERY 2,500 BIRTHS IN THE UNITED STATES WILL BE DIAGNOSED WITH CYSTIC FIBROSIS. THIS FACT MAKES CYSTIC FIBROSIS ONE OF THE MOST COMMON GENETIC DISEASES IN THE NATION. ABOUT 30,000 AMERICANS HAVE THE DISEASE, BUT EVEN THOUGH CYSTIC FIBROSIS IS THE NATIONS MOST COMMON GENETIC DISEASE THE MAJORITY OF AMERICANS KNOW LITTLE ABOUT IT. CYSTIC FIBROSIS IS RELATIVELY COMMON IN CALCASTION PEOPLE BUT RARE IN AFRICAN-AMERICAN. THE DISEASE IS VERY UNCOMMON IN MONGOLIANS. FIVE PERCENT OF THE POPULATION IN THE UNITED STATES ARE CARRIERS OF THE GENETIC DISEASE.   Ã‚  Ã‚  Ã‚  Ã‚  CYSTIC FIBROSIS, SOMETIMES CLASSIFIED AS MUCOVISCIDOSIS, IS A DISORDER IN WHICH THE EXCRORINE GLANDS SECRETE ABNORMALLY THICK MUCUS. THIS LEADS TO THE OBSTRUCTION OF THE PANCREAS AND CHRONIC INFECTIONS OF THE LUNGS, WHICH GENERALLY CAUSES DEATH IN CHILDHOOD OR EARLY ADULTHOOD. SOME MILDLY AFFECTED PATIENTS MAY SURVIVE LONGER. PATIENTS WITH PANCREATIC INSUFFICIENCY TAKE PANCREATIC ENZYMES WITH MEALS. THOSE WITH RESPIRATORY INFECTIONS ARE TREATED WITH ANTIBIOTICS, MOSTLY WITH AEROSOLS THAT RELIEVE CONSTRICTION OF THE AIRWAYS. PHYSICAL THERAPY IS USED TO HELP PATIENTS COUGH UP THE OBSTRUCTING MUCUS. INTESTINAL OBSTRUCTION, WHICH OCCURS MOSTLY IN INFANCY, MAY REQUIRE SURGERY.   Ã‚  Ã‚  Ã‚  Ã‚  IN 1989, RESEARCHERS FOND THE ABNORMAL GENE THAT CAUSES CYSTIC FIBROSIS. THIS GENE IS LOCATED ON CHROMOSOME 7 . A PERSON WHO HAS TWO CYSTIC FIBROSIS GENES HAS THE DISEASE . A PERSON THAT CARRIES ONE OF THE GENES DOES NOT HAVE THE GENETIC DISEASE, BUT IS A CARRIER.   Ã‚  Ã‚  Ã‚  Ã‚  THE SYMPTOMS OF CYSTIC FIBROSIS SOMETIMES OCCUR IMMEDIATELY AFTER BIRTH. MUCUS SECRETIONS MAY APPEAR IN THE BABY’S INTESTINES, WHICH CAN CAUSE OBSTRUCTION IN THE INTESTINES. IN ALL CASES, THE CHILD WILL GAIN LITTLE WEIGHT RIGHT FROM BIRTH, BECAUSE THE PANCREAS IS NOT PRODUCING ENZYMES. LITTLE TO NO NUTRIENTS ARE ABSORBED IN THE CHILD’S SYSTEM. A CHILD WITH CYSTIC FIBROSIS MAY HAVE REOCCURRING RESPIRATORY INFECTIONS, ALONG WITH COUGH AND FEVER. THIS MAY BE MORE SEVERE AND PERSISTENT THAT NORMAL THIS IS A RESULT OF THE THICK, STICKY MUCUS THAT WILL HOLD AND TRAP GERMS IN THE BRONCHIAL TUBES. IT SHOULD BE TAKEN IN TO CONSIDERATION THAT CHILDREN WITH CYSTIC FIBROSIS HAVE LARGE APPETITES AND EAT A GREAT DEAL. IN SPITE OF THEIR MALNUTRITION, THEY ART NOT IN PAIN AND DO NOT GENERALLY FEEL IT.   Ã‚  Ã‚  Ã‚  Ã‚  EXTRACTS OF ANIMAL PANCREAS, IN POWDER OR GRANULE FORM, ARE PRESCRIBED TO REPLACE THE MISSING ENZYMES FROM THE PANCREAS, AND THE AMOUNT OF FAT IS DECREASED IN THE CHILD’S DIET. WITH THIS TREATMENT THE CHILD BEGINS TO GAIN

Wednesday, September 18, 2019

The Death Of Robert F. Kennedy Essay -- essays research papers fc

The assassination of Robert F. Kennedy and its effects on the modern world. Robert Francis Kennedy was born on November 20, 1925 in Brookline Massachusetts. He was the seventh child, and third son of Rose Fitzgerald and Joe Kennedy . "I was the seventh of nine children," he later recalled, "and when you come from that far down you have to struggle to survive."( Alden Whitman, 2001).Compared to his brothers, Robert or Bobby as they all called him, was smaller and he struggled to match his brothers athleticism. As a child Robert had a robust enthusiasm for history. It was his favorite subject in grammar school. At the age of 11, Robert wanted some independence so he got his own newspaper route.( Joe Geringer,1995). He had to get up early in the morning before school to deliver the daily paper. This grueling work schedule would prove to help him learn dedication that was needed to become a successful individual. After high school he attended Portsmouth Academy. After attending school there, he attended Milton Academy to better prepare him for Harvard . Before attending Harvard, he had to put in military service in the Navy during war time. In 1944, he began to attend Harvard University. In 1948 he received his degree in government. Three years later he earned his degree in law from University of Virginia. Education was very important to to Kennedy family, his parents would dicuss history and education at the dinner table "I can hardly remember a mealtime," Robert Kennedy said, "when the conversation was not dominated by what Franklin D. Roosevelt was doing or what was happening in the world."(Alden Whitman, 2001) In 1950, Robert married Ethel Skakel of Greenwich, Connecticut she was the daughter of Ann and George Skakel, founder of Great Lakes Carbon Corporation. (Alden Whitman, 2001). The couple later had eleven children. In 1952, his brother John ran for Senate. This is the year that Robert made his political debate as manager of his brother's successful Senate campaign. In 1953 he briefly served on a Senate Subcommittee of Investigations. Thanks to his investigative skills Kennedy helped confirm that some United States allies during the war against communist China and Korea were shipping the countries goods. He resigned after six months because he didn't approve of Joseph McCarthy's tactics.(Alden Whitman, 2001... ... Kennedy had made it very clear that he supported Israel so being an Arab Sirhan felt the only option he had was to kill him.( Joe Geringer,1995) Sirhan had a swift trail and was sentenced to death. The world mourned the lost of an up and coming leader. Many felt that had he lived he would have become the next president of the United States. Many African Americans were deeply saddened because he had desperately fought for their rights. With the conviction of Sirhan many Americans felt that justice had been served. Yet some felt no sentence was good enough to make up for what he stole, a true American leader. Works Cited Page 1. Joe Geringer."Robert Kennedy Assisination: Revisions and Rewrites."April 26,2002. http://www.crimelibrary.com/assassins/sirhan/2.htm 2. "About Robert F. Kennedy." April 26,2002. http://www.rfkmemorial.org/RFK/index.htm 3. Alden Whitman. "Robert Francis Kennedy: Attorney General, Senator and Heir of the New Frontier". April 26,2002. http://www.nytimes.com/learning/general/onthisday/bday/1120.html 4. " Robert Francis Kennedy (1925-1968)". April 26,2002. http://www.norfacad.pvt.k12.va.us/project/rkennedy/kennedy.htm

Tuesday, September 17, 2019

The Neem Tree: The Village Pharmacy Essay -- Botany

The Neem Tree: The Village Pharmacy The neem tree Azadirachta indica A. Juss. (=Melia azadirachta L. and Melia indica Brandis) is known as the Indian lilac or Margosa (Koul, 1990). Neem is a large evergreen tree with a wide trunk, which can grow 12-24 meters tall. The leaves are bright green with 9-15 leaves, oblique at the base or slightly curved, coarsely toothed, with a pointed tip Shodini, 1997). In India, neem flowers from January to April, and fruits mature from May to August (Koul, 1990). The one-seeded neem fruits are yellow when ripe, and are about one inch long (Shodini, 1997). neem is native to the and regions of the Indian subcontinent, was introduced into Africa, and is presently grown in many Asian countries, as well as tropical areas of the New World (Koul, 1990). Neem trees are fast growers, and in three years may grow to 20 feet in height from seed planting. It will grow where rainfall is only 18 inches per year and it thrives in areas of extreme heat up to 120 degrees. Neem trees can live up to 200 years (Conrick). The neem tree's history goes back a long way, with indications it was used in medical treatments about 4,500 years ago. There is evidence found from excavations at Harappa. and Mohenjo-Daro in Northwestern and western India, in which several therapeutic compounds including neem leaves, were gathered in the ruins (Conrick). India's ancient books of knowledge are called the Vedas. Some of the most ancient surviving documents that have been translated, are the Caraka-Samhita (about 500 BC), and the Susruta Samhita (about 300 AD). These books are the foundations of the Indian system of natural healing, or Ayurveda. These texts mention neem in almost 100 entries for treating many diseases whi... ...Association. http://www.ajtsc.coni/neemtree.htm Koul, Opender, et. al. 1990. Properties and uses of neem Azadirachta indica. Canadian Journal of Botany. v68. National Research Council of Canada. McCaleb, Rob. The Original neem Co. neem Ancient Herb From India. http://www.neemaura.com/. Randhawa, 1997. Cyber India Foundation. http://www.neemfoundation.org/ Sharma, Priya Vrat. 1996. Classical Uses of Medicinal Plants. Chaukbambha Visvabharati. Varanasi 1, India. Sharma, S.B. 1997. ( Book Review) The neem Tree Azadirachta indica A. Juss. and Other Meliaceous Plants: Sources of Unique Natural Products for Integrated Pest management, Medicine, Industry and Other Purposes. International Journal of Nematological Research. E.J. Brill Leiden, The Netherlands. Shodini. 1997. Touch Me, Touch-me-not: Women, Plants and Healing. Kali for Women. New Delhi, India.

Monday, September 16, 2019

China Trade from Early 17th Century to Mid 19th Century Essay

Around 17th and 18th century, Western countries were extremely eager to reach the profitable Chinese market due to its privileged geological location. Although China had traded their riches with Europe along the Silk Road for centuries, Chinese government were afraid that the sea trade to the south would potentially corrupt their â€Å"imperial kingdom† and further try to conquer the country. From 1700 onwards, the government established a set of rigid restrictions imposing the practice of Co-hong to confine foreign trades and merchants in Canton. However, by late 18 century, the trading system seemed to change. The British commenced the opium trade, which created a steady demand among Chinese addicts and further solved the chronic imbalanced trade. As the Opium War broke out with Britain, China was no longer on the top of the world. The Celestial Empire not only was forced to be subservient to British trading regulations, but also somewhat became a semi-colonial country. The East India Company founded in 1600 that held a monopoly in east India by the British government was rapidly enlarging its global trading influence in China. By sending a company trader to address their concern regarding to the unreasonable restrictions on trade in Canton, the representative James Flint was arrested and imprisoned for being breaking the â€Å"Canton trading law†. This incident showed China’s superior attitude toward Westerners and how they manipulated the trade irrationally in their best interest disregarding the concerns of foreign traders. The growing number of foreign traders in the late eighteenth century strongly threatened the Qing. They feared that the trade with foreign merchants would give the opportunity for Westerners to corrupt China; therefore, a set of laws that was so called â€Å"Canton system† was established. The system restricted all European trades to only one port Canton and foreign merchants were forbidden to abode in the city except trading season. Moreover, the Europeans had to obey the licensed Co-Hong merchants, of who were responsible for controlling the trading behavior in Canton. As a result, these complex and irksome rules created a tension between foreigners and Chinese merchants, British traders especially. In 1792, a British ambassador Lord George Macartney set sail to China hoping to seek the approval of the Qing Emperor to loosen some of the trading restrictions to the British traders. Yet, the letters to the Emperor was unreservedly rejected; the response was fairly disappointing. Emperor Qianlong’s edicts to George III in response to McCartney’s demands on English traders showed his arrogant and condescending attitude toward the British. â€Å"As your Ambassador can see for himself, we possess all things. I set no value on objects strange or ingenious, and have no use for you country’s manufacturers. (105 Cheng and Letz with Spence) Furthermore, in his second edict, he stated, â€Å" But your Ambassador has now put forward new requests which completely fail to recognize the Throne’s principle to â€Å"treat strangers from afar with indulgence† and to exercise a pacifying control over barbarian tribes, the world over. † (106 Cheng and Letz with Spence) He describes foreigners as â€Å"barbarians, which showed how he disrespected all Westerners and measured China as the most superior in the world; other countries would have obey Chinese â€Å"law†. British viewed Qing’s legal code as unreasonable and perceived the Chinese officials as obstinate governance, which further exasperated the existed tension between the two nations. Meanwhile, a network of opium was widely distributed throughout China. In order to pay for the tremendous demand of Chinese tea, silk and porcelain pottery in Europe, Britain and other European nations determined to import the one product which became the factor that corrupted the Imperial Empire: opium. Opium addiction level arose in a short period of time, which affected not only the imperial troop but also the governmental officials. Thus, Emperor Daoguang appointed Commissioner Lin to confiscate opium from English ships and refused to pay indemnity to the British traders. The efforts of the Qing dynasty to coerce the opium restraints resulted in the trading conflict, which had already existed for decades between Britain and China triggered the Opium War in 1840. Lord Palmerston’s dispatch to the Emperor of China was a message to inform the Qing that Great Britain would no longer be submissive. The British government therefore has determined at once to send out a Naval and Military Force to the Coast of China to act in support of these demands, and in order to convince the Imperial Government that the British Government attaches the upmost importance to his matter, and that the affair is one which will not admit of delay. † (125 Cheng and Letz with Spence) The dispatc h simply showed the Britain’s intentions to use force to protect its subjects in China, Canton in particular. After the damaging defeats in the war, the first unequal treaty, Treaty of Nanjing was signed after the War, which awakened China from its fantasy of superiority. In the Treaty, China opened several ports and exposed its markets to Western merchants, which turned the central kingdom into a semi-colonial country. Consequently, the role in the national economy had reversed. China was now forced to obey all the demands in the Treaty of Nanjing signed with the British. China was no longer the â€Å"Celestial Empire†; inversely, it was slowly sliding down from the top of the world.