Saturday, August 31, 2019

Why Did Franklin Delano Roosevelt Win the 1932

Why did Franklin D. Roosevelt win the 1932 presidential election? Franklin D. Roosevelt won the 1932 presidential election reasons. His margin of victory over Herbert Hoover was the largest in recorded history up to that time. One of the foremost reasons why Roosevelt won was because people believed that he could take America out of the Great Depression unlike Hoover. They believe he will take real action to deal with the Depression. His policies and ideals were much more popular and suitable for the situation they were in. Hoover believed in ‘rugged individualism’ where people should not expect help from the government and that the government will not interfere. Whereas Roosevelt promised his ‘New Deal’, which would provide jobs and relief for the poor, and the unemployed, action to help industry and agriculture and resolve the banking crisis. Roosevelt promised the government would help and starting funding charities and many construction projects, whereas under Hoover the government rarely funded relief programmes or charities, which relied on generous wealthy individuals and towns and cities. He believed the power of the government should be used to create a fairer society, bringing hope to many Americans. Also all Hoover promised in his election was that the USA had ‘turn the corner back to prosperity’ whereas Hoover had his ‘New Deal’, which seemed much more promising. Also when Hoover won his first term election he said that every American would have two cars in the garage and chicken in the pot. However, many people were now unemployed and homeless. Many people did not trust Hoover or his promises. However the main reason that Roosevelt triumphed over Hoover would be because he was immensely popular, his public image was much better. Hoover had the image of an uncaring heartless person, whereas Roosevelt was seen as a fighter, having fought polio and running as president even though paralysed waist down. Furthermore, what he had done for the ordinary people of New York as governor added to his caring image. Hoover had taken office shortly before the Crash. Many Americans blamed him for it and not doing enough. The way they conducted their campaigns were also vital. Roosevelt’s smile and optimism proved far more popular with the electorate than Hoover’s grim looks. Furthermore, Roosevelt got out to meet the people, toured around America far more than Hoover. People got to know him and he was willing to listen to their problems. There are many images of him talking and shaking hands with ordinary people. When talking to crowds he would mention ordinary individuals he had talked to and there problems – a woman with a baby, a miner, an old fellow†¦ This gave Roosevelt the image of someone who cares for the ordinary person, whereas Hoover didn’t seem interested in his or her problems. Moreover, since Hoover believed the economy would eventually recover by itself, therefore not providing much relief, it further added to Hoovers image of being uncaring and heartless, which is unfair because he eventually did take a little actions, but definitely not enough and was not seen as the right man for the task of bringing about a recovery. A crisis point was reached in the summer of 1932 where bonus marchers, people who fought in World War One, marched in Washington DC demanding their payment of $500. Hoover reacted badly to this, using tanks, the army and tear gas to disperse the marchers. Two of them died. Many people did not like how Hoover treated the people who risked their lives for their country. Furthermore, Roosevelt promised to bring end to the extremely unpopular prohibition of alcohol. People wanted a drink – free and legal. People were tired of all the problems Prohibition had caused – the gangsters, killings, crooked dealings by big businesses etc. Overall, Roosevelt’s proposed policies, optimistic attitude and smile, campaigning around the country, talking to listening to the ordinary person and his promise to end the unpopular prohibition was more than a match for Hoovers grim looks, uncaring and heartless image, ‘rugged individualism’ and the way he conducted his campaign. Hoover was not an evil man, however, he was not the right man to lead America and the world through the Great Depression. Roosevelt was extremely popular, had a great public image and relationship, and seen as the only person who could lead America out of the Depression.

Friday, August 30, 2019

Individual Reflection : Handling Difficult Conversation

This paper is my individual reflection on how to handle difficult conversations. We are faced with difficulty to transfer the message we want the other to understand and comply or support. Because of this complexity of communication barrier we end up in a conflict or a confrontation. When this happens we let go of the problem – forget it , avoid it, avoid being involved or ignore it. Learning two way conversation and certain strategies to handle a difficult conversation, is a step to better yourself in the way you voice out without any personal intent.In our everyday lives whether professional or personal we always encounter a difficult conversation – conflict on one and confrontation on the other. Most in some cases goes for the best of intentions for the benefit or interest of the person or the company. But what makes it a difficult conversation is how you relay the message on board, how one decides to handle it, how you understand it, how your message is being unders tood by the other and whether to comply or give support.My individual reflection for this is an incident that has occurred between two directors of the company whom are also the proprietors of the company – my mother and I. As much as my mother and I are the sole owners of the company, my late father left behind, I would like to use it in relation to this topic of difficult conversations in a professional setting. My mother and I have different ways of doing things and have different ideals when it comes to running a business. She is my superior as the Managing director of the company.She is old fashioned in her approach to things and also does not read or write and I am kind of what I’ll like to describe as transforming. There was a situation that occurred when some of our clients were complaining about the quality of the TV sets in their rooms and how they didn’t like the idea of them having to pay that much money for a night in the hotel and have to watch a b oxed TV instead of the new flat screen TV that were in vogue. I decided to have a meeting with my mother on this matter to explain the importance of upping our standards in terms of quality.My mum found this statement from me demeaning and queried me that it’s not in my place to talk to her about such matters. I on hearing those exact words flamed up and attacked saying I had as much rights and power as her when it meant running of the company and as such my opinions as well as decisions matters whenever I decide to put them forth. Next thing I noticed was that our conversation became so heated and filled with argument that we weren't even talking about the success of the business anymore but moved from away from its professional discussion to that of a personal confrontation.I decided to stop talking about this because I noticed my mother wasn't being receptive to anything I was saying at that moment, so I let the topic drop for that moment but went on to contact my aunt and explained to her my views on the issue and how difficult it was for my mother to see my view on the issue. This turned out to be a good idea as my aunt was able to relay my opinion concerning the company and its improvements and she helped to straightening out a lot of things also.Using my aunt as an intermediary between my mother and I was effective as it was able to quell the discord we were having as well as relay my opinions on the pressing issue at hand at that moment in time. But as time goes by I sat and thought over things that I cannot be using my aunt as an intermediary all the time my mother and I are having an argument. I had to think of a more approachable way to rely my messages across to my mother without creating any misunderstanding. I realized that I needed to deliver the message towards thinking of it as a two-way learning conversation.  (Christensen, 2011).When I thought over our argument I realized I involved too much emotions and forgot about the companyâ₠¬â„¢s interest. In that I noticed how money, as well as emotions are factors that lead to difficult conversations as Christensen. K (2011). Moreover I also didn’t take into consideration the age difference, refinement of etiquette, difference of seeing things and also literateness.I sat with my mother on a normal day and asked her â€Å"Mom, how did you understand when I told you we had to upgrade the quality of services we offer in the hotel?†, she said â€Å"Mariah, I am not stupid you know, I do not know how to read and write and that is not my fault because my parents couldn’t send me to school but I give you the opportunity and you benefitted to where you are today, and when you want to say something, talk to me in a manner you don’t have to be sarcastic. † It took me a while to understand what she meant by me being sarcastic. I wondered whether my being straightforward telling her the truth was unacceptable or was it the way I said it.As acco rding to Amy & Diana I realized I had a personal motive conflict between my mother and I when there are better ways to voice it out calmly without involving any personal interest or have any personal intention whatsoever Moreover I remembered what my father told me once that in business don’t argue to win or to imply who is right or wrong. A problem or an unpleasant event has happened instead of sitting there and complaining and arguing what should and should not be done, take the professional actions to solve the problem if it benefits the company and everybody at the end. No loss occurred and incurred.Well, if I had listened to my father I do not think I would end up having an argument with my mother and wasting time to solve the problem. Nevertheless, from this course I have learned from Amy & Diana to practice self – management â€Å"the ability to examine and transform the thoughts and feelings that hijack one’s ability to reason cally when conflicts heat up†, reflecting on spontaneous reactions – â€Å"once a conflict triggers an emotional reaction, reflecting can cool one’s own emotion down by turning the automatic â€Å"go† response into a more deliberate â€Å"know† response†, reframing and manage conversations.Moreoevr according to Engels, he stated that when you deliver difficult messages you should avoid ordering/directing, warning/threatening, preaching/moralizing, advising/giving solutions, evaluating/blaming and interpreting/diagnosing. In which I realized I was having a rather ordering tone with my mother. Being that I am able to admit where I am having a problem with delivering my messages, from what I have learned I would be well prepared to most especially listen before I react and plan for a better conversation and find a more comfortable way in relaying my messages across.

Thursday, August 29, 2019

Jewish Temple Sections

Sections of the Jewish TempleMrs. McCurdy Mostly From Icons, p. 10-11 The Outer Court is also known as the Court of Gentiles Gentiles or non-Jews were not allowed beyond this court. Traders could be found here selling birds and animals to be used for sacrifices. It was also a place to change Roman money into Temple money (money-changers). [When Jesus got angry with these people and threw them out of â€Å"His Father’s House† he did this because they were giving the people a very poor exchange rate, and so were make lots of money at their expense, after all, they had to buy the sacrifices with Temple money! The Court of Women Women and children were not allowed to beyond this area. It was a favourite meeting place for families when they came to Jerusalem on pilgrimage. [This was probably where Mary would have been looking for Jesus when he was 12 years old. ] The Court of Israelites Only Jewish men were allowed to enter here. They would see the altar of sacrifice and the offers being made to God. At the time of Jesus, animal sacrifices were an important part Temple worship. The Court of Priests This was exclusively reserved for priests. In this area was the altar on which the birds and animals were sacrificed. Only domestic animals would be sacrificed. This included pigeons and doves, the offerings of poor people. The Holy of Holies This was the innermost and most sacred part of the Tempe. A large veil covered its entrance. Only the high priest was allowed to enter, and he only went in once a year, on the Day of Atonement, Yom Kippur. He offered sacrifices and asked God’s forgiveness in the name of all the people. On this day only he spoke aloud, in full, the name of God. [You will learn much later from the Gospel of Jesus’ trial that during this trial, before the High Priest, when asked, Jesus said he was the Son of the â€Å"Blessed One†. The Jewish authorities were then able to accuse Jesus of blasphem, because only the High Priest was allowed to speak out aloud the name of God, so under Jewish law, Jesus was committing a grave sin. ] This day marked a new start, a renewal of faithfulness to the laws of God.

Wednesday, August 28, 2019

The Ruritanian Project Essay Example | Topics and Well Written Essays - 2000 words

The Ruritanian Project - Essay Example Organizations can choose to conduct environmental scanning of varying level such as, multinational, regional and national. In case of multinational, a wide range of aspects are assessed to identify, forecast and monitor the trends. These trends include the political and economic trends of the countries (Deresky, 2006; Lall and Sahai, 2008). In this case, the company, which is headquartered at United Kingdom, is planning to open its new manufacturing unit in Ruritania. Ruritania is a developing Eastern European country with a stable political and economic condition. This report focuses on providing an analysis of the impact on financial aspect of the organization owing to its operation in this country. The analysis is based on the data provided in the case. Figure 1: Environmental forces affecting the organization (Source: Kerin, Hartley and Rudelius, 2010) Market growth For Foreign Direct Investment, decision making of the multinational enterprise in the host country, market size, pe r capita income, degree of development and changes of market growth, play an important role. The host countries with higher degree of economic development, increasing market size and rapid economic growth are seen to provide better opportunities to the MNEs to exploit the ownership advantages and accomplish economies of scale. It has been suggested that market growth and market size are some of the driving forces that helps the foreign firms with location specific decision making. The market growth plays a leading role in the developing economies to decide on the development of the country from two perspectives such as, increasing domestic market and higher amount of industrial growth. Per capita income, market growth and market size are the traditional economic variables that attract the FDI. From the perspective of the company, they are more likely to invest in the countries with larger market size, higher purchasing power and higher growth potential, rather than the countries wit h smaller market size, lower purchasing power and dawdling economic growth. Market related variables such as, GDP growth, GDP per capita and GDP are also used by the FDIs as important determinants. The level of GDP is seen to capture prospective economies of large scale production and specifically helps in measuring the size of the market. FDI is nothing but a unit of the foreign organization that is trying to establish one of its units in the host country. The absolute and relative sizes of the market are used for estimation. The absolute size of the market is captured by the level of GDP, whereas the growth rate of the GDP is represented by the relative size. A higher amount of GDP per capita generates similar results as the lower balance of payment deficit. The FDIs are seen to be attracted to the host country if they have greater size of potential market and higher amount of GDP (Buxheli, 2011). In the Ruritanian case, the GDP of the country has shown an average growth of 6 perc ent for the past five years, but in the current year, it has shown growth rate of only 0.07 percent, which is poor. This clearly indicates that the GDP growth rate has decreased and the economy is not in a healthy state. A higher growth rate of the GDP implies a robust economy, thereby simultaneously suggesting that the level of unemployment is low and wage increases. On the contrary, if the GDP growth rate is low or negative, then it implies that the economy is in an

Tuesday, August 27, 2019

Problem solving Essay Example | Topics and Well Written Essays - 250 words - 1

Problem solving - Essay Example Additionally, organizations can resolve to have single mode of software installation authentication method. In this case, instead of selling licenses to customers and software users, the organizations can require that all software activation requirements are conducted online to ensure that every copy is only activated using one unique product key (Microsoft, 2015). For organizations that require software installation to a vast number of machines, the installation files can be configured to contain equivalent number of activation codes as the number of machines. For every used code, the installation media would connect to the internet verifying that the software is genuine and one among the provided codes has been used to activate one workstation. When addressing the issue of software piracy, there are various levels of consideration that organizations put take into account. For instance, the cost of data loss and the inability to generate sustainable profits are two major threats caused by piracy. With reference to the two examples, it is evident that based on value and use, different organizations address the challenge of software piracy differently. With respect to the magnitude of anticipated losses and the corresponding cost of software development, some companies invest more funds in developing anti-piracy strategies while others concentrate on economies of scale by developing free or cheap software (Microsoft,

Civil Engineering Management Portfolio Assignment

Civil Engineering Management Portfolio - Assignment Example Construction has a long history, almost parallel to the development of civilization. Across the globe, construction is the biggest industry which is churning billions of dollars every year and providing employment to a large workforce - skilled as well as unskilled. As far as the UK is concerned, its output is worth over 100bn a year. It accounts for 8% of Gross Domestic Product (GDP) and provides employment for around 3 million workers (Vadera, Shriti and Woolas, Phil et al. 2008). Civil Engineering and the associated sub-disciplines are changing rapidly as a result of technology enhancements, growing concerns on local & global environment problems & commitment required to the ecosystem and the overall management system & quality control procedures that collectively comprise of the management portfolio of the profession. The job of a Civil Engineering Project Manager is no longer planning & execution of construction projects but is also linked with commitment to local & global envir onment, the local ecosystem, the society and the overall safety of the infrastructure from the perspective of the workers and the end users. The Management Portfolio thus needs to include all these responsibilities and organized to form an organization structure that can effectively deliver as per all such requirements. The local special interest groups and the legal & statutory system of the nation carry lot of influence on the projects and hence they need to be satisfied effectively by sending to them regular updates & reports and allowing them to audit the proceedings as and when demanded. Hence, every project is expected to comprise of the following management challenges: (a) Health & Safety

Monday, August 26, 2019

Civil Rights & Civil Liberties Essay Example | Topics and Well Written Essays - 500 words

Civil Rights & Civil Liberties - Essay Example In this case, political rights are lined up with other civil rights and liberty Civil rights in America are enshrined in the Civil Act of 1964. The Act was enacted during the presidency of John Kennedy, who rose to power in the year 1960. A large number of contemporary have a bill of rights or a constitutional document that seeks and enumerate to guarantee civil rights. In the united state of America, several constitutional amendments have been effected to ensure that every person enjoys civil rights to unlimited levels. In addition, additional clauses have been enacted to the 1964 Act to ensure that the government of the day does not undermine them (Baker, Thomas, 2006). During the 2008 run-off for presidential elections, the then senator for Illinois delivered a highly spirited campaign speech that was full of charming promises. Political analysts declared that should the pledges embedded in the speech be actualized, the Americans would experience excellent political and economic atmosphere. In the speech, commonly known as ‘’a more perfect union’’, Obama explained the electorates the steps he would take to reduce the poverty index in the united state of America. To eliminate the gap between the poor and the rich, Obama outlined the tax measures that his government would implement. The policy would exempt the poor from bearing tax burden, and hence more income would be available for their use (Baker, Thomas, 2006). Concerning the war in Iraq, the then-senator advocated for immediate withdraw of American troops. In his speech, he asserted that a long lasting solution would be established through consultative engagements, not through military operation. In addition, Obama promised good working condition for all workers and increased social security for retiree. Furthermore, he promised to improve the economy so as to cut down on unemployment and reformed heath sector. To a large extent, the

Sunday, August 25, 2019

Country analysis by 17 criteria Coursework Example | Topics and Well Written Essays - 750 words

Country analysis by 17 criteria - Coursework Example The second criterion involves population growth. It can be scrutinized that population growth in Argentina in 2013 stood at 0.90% whereby the growth of Argentina population created a wider market for UNIQLO products. The third criteria entail the rate of unemployment in Argentina which stood at 7.50%. This means that higher unemployment rate subjected UNIQLO to incur higher cost of labour in the production of Apparel and footwear industry (Encyclopaedia, 2013). The forth demographic criteria entail income distribution which stood at a weight of 46.30% in 2013. This means that as the income distribution increases among Argentina population, more people could manage to buy more apparel and footwear products and hence leading to an increase in sales volume and profitability of UNIQLO Company (Arnold, 2011). The fifth criteria entail Argentina population demographics of people between the ages of 15 to 64 years. It can be observed that the Argentina population of people between the ages of 15-64 years increased to 36897.8 whereby, most people at this age are financially independent and could afford to buy UNQLO products. The sixth criteria involved urban population which stood at 38517. An increase in urban population caused the demand of apparel product by urban population to increase and consequently making the sale units made by UNQLO Company to rise (International Monetary Fund, 2013). The seventh criterion entails GDP (purchasing power parity); the Argentina population in 2013 was 977983, the higher the GDP means that the economy of Argentina was performing exceptionally well which in turn created a higher demand for Apparel and footwear products. Under the eighth criteria, the real growth rate in Argentina stood at 3%. This means the rate of growth of GDP from one year to another changed at the rate of 3%. The higher

Saturday, August 24, 2019

Macroeconomics of my own life Essay Example | Topics and Well Written Essays - 1000 words

Macroeconomics of my own life - Essay Example On a day-to-day basis, our firm refines crude oil into useable forms, be it diesel, petrol or gas among others. The global market exhibits a great need for these products and this need does not get fully satisfied at any particular time. As such, even when we produce in excess, there would always be market for the products. But an interesting phenomenon I observed was the fact that with increased need for our products in the market, the prices would go up. Such are the times when, say, we receive more than usual orders. Macroeconomics refers to this need as demand (Sexton 105). This observed phenomenon has been documented by Mankiw (69) who notes that with increase in demand, there would be a consequent increase in price, all other factors held constant as retrieved from the demand curve. Even though the demand curve dictates that there would a proportionate decrease in price with decrease in demand, our firm often takes time to decrease its prices with decrease in demand. And even t he minimal decrease in price would not be comparable to the price increase trend. This could be attributed to factors held constant when theorizing the demand curve as documented by Mankiw (69). In our company, these factors could be customer loyalty and the limited substitute options in the industry since our firm controls a significant portion of the oil market in its locality. Furthermore, the government has set guidelines that govern the pricing in the gas industry because of the important role that the industry plays in driving the economy. In macroeconomics, the government would be said to have interest in the aggregate supply which encompasses the economy’s productive capacity for goods and services (Sexton 167). To further illustrate the effect of demand on the prices of our products, the 2008 economic recession provides an appropriate example. During this time, a majority of the countries were facing hard economic times and could therefore not engage in meaningful pr oduction activities. Similarly, a majority of air travels for instance reduced as people sought for ways of cutting down on their expenses. This meant that the demand for our products should have declined during the same period. But on the contrary, the demand increased with other countries joining in the list of our existing customers. As such, the prices of our commodities kept rising to an all-time high before the government set up proper guidelines on pricing. Information acquired from macroeconomics argues against this trend for the good of the economy. The increase in prices of oil products slows down economic activities, which in turn reduces the final goods and services which the country produces for its market at any given time, referred to as gross domestic product, GDP by (Sexton 585). This would be determined by summing up the output from each enterprise to give a total. The GDP serves as a significant indicator of the living standards of a country. The government apprec iates this fact and would thus step in to contain any factors that threaten the economy such as excessive increase in the cost of production, say due to increase in the prices of oil products. Whereas there would be times when the firm receives plenty of supplies of crude oil, there would also be times of limited supply. With oil producing and exporting countries being prone to wars, war would be the leading reason for limited supplies from such countries. During such times of low

Friday, August 23, 2019

Qualitative research study using a pediatric toolkit to decrease the Thesis

Qualitative research study using a pediatric toolkit to decrease the discomfort and anxiety of a pediatric patient in an emergency department - Thesis Example This toolkit would assist them in the care of the pediatric population being treatment in the chaotic environment of a busy emergency trauma center. The toolkit would consist of distraction techniques, position changes, and advocacy for early pain management enhancing the emergency department experience for child, while simultaneously improving the satisfaction of the parents. With the 2011 health care reform bill staring health care providers in the face, patient-centered outcomes are prominently vital for reimbursement purposes. Accountability of health care providers, particularly nurses, and how the patient and their families perceive the delivery of such care greatly influence the report cards. Therefore, a dissatisfied patient or family member who documents their concerns in a letter to the Chief Executive Officer of a hospital causes great consternation. The horizon of health care is rapidly approaching with the introduction of the numerous facets healthcare reform presents. Report cards specifically honing in on patient outcome and satisfaction will greatly affect the amount of Medicare funding. Consequently, hospitals are paying a great deal of attention to improving the patient safety status and raising the bar of patient outcomes and satisfaction. Our hospital’s CEO recently received, in a one-month period of time, 3 letters to administration complaining about the lack of compassion demonstrated by Emergency Department nurses to the pediatric population. Parents of pediatric patients complained emergency department nurses were not compassionate, but rather cold and seemingly uncaring toward their ill or injured child. During mandatory Emergency Department staff meetings, this issue was discussed at great length, and a fix-it quick plan was generated. Suddenly, with the down turn of the US economy, the main

Thursday, August 22, 2019

Do the Environmentalist Overstated Their Case Essay Example for Free

Do the Environmentalist Overstated Their Case Essay From this article you will see that environmentalists are concern about the environmental catastrophe. Some of them claimed that world was in danger and we shouldn’t neglect about this issue. But Lomborg opposed in his article that the environmentalist have been overstated from the real situation. The author said that some of environmental organizations are using only selective information and also distort the truth. Also from the author research evidence shown that environment is in good condition In my opinion, l agreed with Lomborg that some organization overstate their case. Also one of the word he wrote in his article that â€Å"thing was better now but they are still not good enough†. It is true that nowadays we have more food per person than we need. In contrast food are in increasing in slow rate while the rate of population continue rising. If we don’t control the rate of child‘s birth. Moreover in my point of view the state that fewer people are starving is not true. Because nowadays there are a lot of people in the world suffer from malnutrition. Owning to quality of land, soil and fertility is important for production process but now in response to the increase using of pesticides. Also about deforestation even it is true as research said that globally forest has been reduced in very small portions even so we shouldn’t loss even more forest because forest is the most important resource for living things. Forest is not only providing valuable products but they also keep ecosystem in balance. They reduce problem about air pollution. So why don’t we trying to protect and increase in the forest. Last issue is about global warming. This is a long-term problem. It is true that doomsday not going to happened soon but if we keep ignoring about this issue. This might chase up global warming to happen faster. So for me it is time to concern about environment and plan for our next generation. Because as you see nowadays each of person prefer a high standard of living. But if we serve everybody demand the supply of environment resources must be lower and lower. This is the proper time to care about our earth use the environment resource in economize and benefit ways. Then the story that many environmental organizations keep telling us will not happen in the nearly future like them expected.

Wednesday, August 21, 2019

Book Cover Analysis on the Pinocchio Effect Essay Example for Free

Book Cover Analysis on the Pinocchio Effect Essay Upon going through the vast artwork, one particular piece grabbed my attention. It was of a line up composed of men in boxer shorts in different colors. The overall look of the work gave it almost a vintage feeling because of the way the figures were drawn. It gave a sort of â€Å"pin-up† feel. Although composed of men, you can not help but be transported through time just by the visual aspect. The book was entitled â€Å"The Pinocchio Effect: On Making Italians, 1860-1920†. It dawned on me that these were Italians lined up, in a way that is reminiscent of a group of new recruits waiting to get their gears for war. As I further observed, these figures were progressing, starting from left to right. And taking this into consideration, I realized that this was a crude depiction of the evolution of an Italian man. The use of this illustration was very effective in stirring up intrigue in the work and as well as reinforcing what the book was about. Further research on the contents of the book revealed that this was indeed a book about the progression of the Italians after different Italian states began uniting into one nation (Stewart, 2007). This artwork was done by Isaac Tobin, an artist particularly renowned for his works on graphic design. The original look of the figures depicted in the work was compromised by the addition of color on the trunks. This added a comical feel to the overall mood of the figures, but is nonetheless effective in drawing out attention and to provide a contemporary feeling for the art. Overall, this artwork leaves a lasting impression and certainly a valuable addition to the cause of the book. It took the theme of the book and properly wielded the appropriate sources to tell its story at a moments glance.

Tuesday, August 20, 2019

E-voting system

E-voting system CHAPTER 1: INTRODUCTION Introduction Motivation Objectives The aim of this project is to design an e-voting system that makes use of Java and Bluetooth technologies. The specific objectives of this project are: To create voting software that using Java 2 Micro Edition (J2ME) that can run on any mobile devices which will act as server and clients. To develop Java 2 Micro Edition (J2ME) based voting system that able to fully utilize the functionality of Bluetooth technologies by transferring data (voter database, voting records, etc.), between two mobile devices. To build a low cost and reliable client-server based voting system. Outline of Thesis The content of this thesis is organized according to the chapter. Chapter 1 is mainly about the brief introduction of the project done with some motivation and objectives. Chapter 2 is generally about the literature review of Java 2 Micro Edition (J2ME), Bluetooth and JSR-82 technologies, and also overview about the BVote itself. Next, Chapter 3 is about the methodology and details of the design whereas Chapter 4 is about the implementation of program through simulator and hardware devices since it is the output of the work done on Chapter 3. Chapter 5 is in relation to the presentation of data of the program with some program module hierarchy and classes used for Java programming. Then, Chapter 6 is concerning the discussion about the program outcome and its limitation. Finally, Chapter 7 is the final part of any reports or thesis which is the conclusion and some recommendations for future research. CHAPTER 2: LITERATURE REVIEW Overview of Java Micro Edition (Java ME) Introduction Java is a programming language originally developed by James Gosling at Sun Microsystems, which is now a subsidiary of Oracle Corporation. It was released in 1995 as a core component of Sun Microsystems Java platform. Java is general-purpose, concurrent, class-based, and object-oriented, and is specifically designed to have as few implementation dependencies as possible. It is intended to let application developers write once, run anywhere. Recognizing that one size doesnt fit all, Sun has defined and supports four editions of Java aiming different application environments and segmented many of its APIs so that they belong to one of the platforms. The platforms are: Java Card aimed for smartcards. Java Platform, Micro Edition (Java ME) aimed at small and memory constrained devices by means of environments with limited resources. Java Platform, Standard Edition (Java SE) aimed at standard desktop and workstation environments. Java Platform, Enterprise Edition (Java EE) aimed at heavy duty server systems, large distributed enterprise or Internet environments. Java ME was formerly known as Java 2 Platform Micro Edition (J2ME), is a Java platform designed for mobile devices and embedded systems. Java ME technology was originally created in order to deal with the constraints associated with building applications for small devices with as little as 128KB of RAM and with processors a lot less powerful than those used on typical desktop and server machines. Thus, Sun defined the basics for Java ME technology to fit such a limited environment and make it possible to create Java applications running on small devices with limited memory, display and power capacity. There are three core concepts in the Java ME technology: Configuration provides the most basic set of libraries and virtual machine capabilities for a broad range of devices. Profile set of APIs that support a narrower range of devices. Optional package set of APIs in support of additional, common behaviours that dont really belong in one specific configuration or profile J2ME consists of a set of profiles. Each profile is defined for a particular type of device and consists of a minimum set of class libraries required for the particular type of device and a specification of a Java virtual machine required to support the device. A profile itself does not do anything; it just defines the specification. Since profiles are subsets of configurations, profiles are implemented with a configuration. Ultimately, Java ME platform has been divided into two base configurations which is Connected Device Configuration (CDC) and Connected Limited Device Configuration (CLDC). Java ME was designed to use profiles and configurations to enables devices of varying ability to able to run Java ME applications on the Kilobytes Virtual Machine (KVM), which is the micro version of Java Virtual Machine (JVM). Figure 1 illustrates how the CDC and the CLDC together make Java ME. The diagram also shows an overview of the components of Java ME architecture, and how it fits in the overall Java model. Configurations Configuration is a preliminary Java platform for devices with similar requirements with respect to total memory, processing speed, power and display constraints. Specifically, a configuration consists of Java language features, JVM features and a limited set of generalized APIs. Configurations are closely linked with JVM. In fact, configuration is a term identifying Java language features as a set of APIs and a specific JVM for that particular configuration. The dividing line as to what configuration applies to a device is for the most part, dependent on the memory, processing power, network connectivity and display constraints of a device. Connected Limited Device Configuration (CLDC). The Connected Limited Device Configuration (CLDC) is a fundamental part of the architecture of the Java ME that targeting resource-constraint devices like mobile phones. It is specifically designed to meet the needs for a Java platform to run on devices with limited memory, processing power and graphical capabilities. CLDC contains a strict subset of the Java-class libraries, and is the minimum amount needed for a Java virtual machine to operate. CLDC is basically used to classify myriad devices into a fixed configuration. When coupled with one or more profiles, the CLDC gives developers a solid Java platform for creating applications for consumer and embedded devices. CLDC is designed to bring the many advantages of the Java platform to network-connected devices that have limited processing power, memory, and graphical capability. Target devices typically have the following capabilities: A 16-bit or 32-bit processor with a clock speed of 16MHz or higher. At least 160 KB of non-volatile memory. At least 192 KB of total memory available for the Java platform. Low power consumption, often operating on battery power. Connectivity to some kind of network, often with a wireless, intermittent connection and limited bandwidth. On top of the different configurations Java ME platform also specifies a number of profiles defining a set of higher-level APIs that further define the application. A widely adopted example is to combine the CLDC with the Mobile Information Device Profile (MIDP) to provide a complete Java application environment for mobile phones and other devices with similar capabilities. Connected Device Configuration (CDC) CDC is a specification of a framework for Java ME applications describing the basic set of libraries and virtual-machine features that must be present in an implementation. The targets for CDC-based technology comprise a broad range of consumer and embedded devices like smart communicators, pagers, high-end personal digital assistants (PDAs), and set-top boxes. Within this range, CDC is the basis for several standard API bundles that address the needs of developers of applications for specific categories of devices. Devices that support CDC typically include a 32-bit microprocessor/controller and make about 2 MB of RAM and 2.5 MB of ROM available to the Java application environment. The CDC configuration was designed to bring the many advantages of the Java platform to a broad range of network-connected consumer and embedded devices. CDC versus CLDC The CLDC is different from, yet also a subset of the CDC. The two configurations are independent of each other, however, so they should not be used together to define a platform. The CLDC is a proper subset of the CDC. Neither the CLDC nor the CDC is a proper subset of the J2SE platform, however, because both of these configurations add new classes necessary to deliver services on their respective families of devices. Like the CDC, the CLDC specifies the level of support of the Java programming language required, the required functional support of a compliant Java VM, and the set of class libraries required. Figure 2 shows the relationship between the two configurations and the J2SE platform. Profiles Profiles are an extension of its underlying configuration. A profile simply is a set of APIs but unlike configurations, profiles are closer and specific to the target device capabilities. They are intended to include device specific APIs providing those functionality missing at configuration level such as user interface, persistence, etc. Profiles obtain the required foundation from configuration and hence are layered above configurations. Currently, there are a handful profiles available and a few more are being finalized. MIDP is a profile supported by CLDC while CDC support three different profiles namely the Foundation Profile (JSR 219), Personal Basis Profile (JSR 217) and Personal Profile (JSR 216). Foundation Profile (FP) Foundation Profile is the most basic of the CDC family of profiles. It is a skeleton upon which a developer can create a new profile. The FP APIs, together with CDC APIs provides a complete Java ME JRE for consumer electronics and embedded devices. It is a set of Java APIs tuned for low-footprint devices that have limited resources that do not need a graphical user interface system. It provides a complete Java ME application environment for consumer products and embedded devices but without a standards-based GUI system. Version 1.1.2 is specified in JSR 219 and implements a subset of Java SE 1.4.2, including a set of security-related optional packages, such as Java Authentication and Authorization Service (JAAS), Java Secure Socket Extension (JSSE), and Java Cryptography Extension (JCE). The Mobile Information Device Profile (MIDP) The Mobile Information Device Profile (MIDP), combined with the Connected Limited Device Configuration (CLDC), is the Java runtime environment for todays mobile information devices such as phones and entry level PDAs. MIDP provides the core application functionality required by mobile applications including the user interface, network connectivity, local data storage, and application lifecycle management. Currently, there are three version of MIDP which are MIDP 1.0, MIDP 2.0 and MIDP 3.0. With the configuration and profiles, the actual application then resides, using the different available APIs in the profile. Following in the tradition of Java parlance, MIDP applications are called MIDlets. A MIDlet is a Java application that uses the MIDP profile and the CLDC configuration, created by a Java ME software developer, such as a game, a business application or other mobile features. These MIDlets can be written once and run on every available device conforming to the specifications for Java ME technology. The MIDlet can reside on a repository somewhere in the ecosystem and the end user can search for a specific type of application and having it downloaded over the air to another device. Kilobyte Virtual Machine (KVM) The Kilobyte virtual machine (KVM) is a virtual machine derived from the Java Virtual Machine (VM) specification. The VM that comes with the CLDC reference implementation is called the Kilobyte Virtual Machine (KVM) because it uses only a few kilobyte of runtime memory as opposed to megabyte. It is a reference implementation that adheres to the CLDC specifications description of a compliant VM. It is designed for small devices as it has a small memory footprint. It supports a subset of the features of the higher end JVM. For low-end, resource-limited products, Java ME and the KVM support minimal configurations of the Java virtual machine and Java APIs that capture just the essential capabilities of each type of device. KVM can be deployed flexibly to address a range of trade-offs between space and functionality. The KVM is engineered and specified to support the standardized, incremental deployment of the Java virtual machine features and the Java APIs included in the Java ME architecture. Overview of Bluetooth Technology Introduction Bluetooth is a proprietary open wireless communication protocol for exchanging data over short distances by using short length radio waves from fixed and mobile devices, creating personal area networks (PANs). The Bluetooth wireless connectivity technology was originally envisioned in 1994 by Ericsson as a way for mobile devices to communicate with each other at short ranges up to 30 feet, or 10 meters. While Bluetooth is positioned as a replacement for cable, infrared, and other connection media, it offers a variety of other services, and creates opportunities for new usage models. It can connect several devices, overcoming problems of synchronization and it works quietly, unconsciously, and automatically in the background. Bluetooth has client-server architecture. In client-server architecture, the one that initiates the connection is the client, and the one who receives the connection is the server. Bluetooth is a great protocol for wireless communication because its capable of transmitting data at nearly 1MB/s, while consuming 1/100th of the power of Wi-Fi. In order for Bluetooth devices to communicate properly, they all need to conform to the Bluetooth specification. The Bluetooth specification, like any other specification, defines the standard that a Bluetooth device should adhere to, as well as rules that need to be enforced when communicating. The Bluetooth protocol stack and profiles together comprise the Bluetooth specification. Bluetooth Protocol Stack Bluetooth uses a variety of protocols. Core protocols are defined by the trade organization Bluetooth Special Interest Group (SIG). Additional protocols have been adopted from other standards bodies. The Bluetooth stack is the software or firmware component that has direct access to the Bluetooth device. The Bluetooth protocol stack is split in two parts: a controller stack containing the timing critical radio interface, and a host stack dealing with high level data. It has control over things such as device settings, communication parameters, and power levels for the Bluetooth device. The stack itself consists of layers, and each layer of the stack has a specific task in the overall functionality of the Bluetooth device. Since Bluetooth device manufacturers are not required to use all of the layers in the stack, listed below are the overview of the core protocols and those adopted protocols that are widely used and implemented in almost every Bluetooth device: L2CAP: The Logical Link Controller and Adaptation Protocol used to send packets between host and client. This layer is the multiplexer of all data passing through the unit. It receives application data and adapts it to the Bluetooth format. Qualities of Service (QoS) parameters are exchanged at this layer. LMP: The Link Manager Protocol uses the links set up by the baseband to establish connections and manage piconets. Responsibilities of the LMP also include authentication and security services, and monitoring of service quality. SDP: The Service Discovery Protocol is used to find services on remote Bluetooth devices. HCI: The Host Controller Interface is the interface between the radio and the host computer. HCI is the dividing line between software and hardware. The HCI is the driver interface for the physical bus that connects these two components. RFCOMM: The Radio Frequency COMMunication is very easy and uncomplicated. Widely known as the virtual serial port protocol, it is used to stream simple data. OBEX: The Object Exchange communication protocol is used to exchange physical data such as files, images, and so on in binary format. Bluetooth Profiles Bluetooth profiles are intended to ensure interoperability among Bluetooth-enabled devices and applications from different manufacturers and vendors. A Bluetooth profile is a designed set of functionality for Bluetooth devices that defines the roles and capabilities for specific types of applications. If Bluetooth-enabled devices want to interact, having the bare minimum Bluetooth stack is not enough. It also needs to conform to a particular profile. Listed are some of the Bluetooth profiles: The Generic Access Profile defines connection procedures, device discovery, and link management. It also defines procedures related to use of different security models and common format requirements for parameters accessible on the user interface level. At a minimum all Bluetooth devices must support this profile. The Service Discovery Application and Profile defines the features and procedures for an application in a Bluetooth device to discover services registered in other Bluetooth devices, and retrieves information related to the services. The Serial Port Profile defines the requirements for Bluetooth devices that need to set up connections that emulate serial cables and use the RFCOMM protocol. The LAN Access Profile defines how Bluetooth devices can access the services of a LAN using PPP, and shows how PPP mechanisms can be used to form a network consisting of Bluetooth devices. The Synchronization Profile defines the application requirements for Bluetooth devices that need to synchronize data on two or more devices. Bluetooth Network Topology Bluetooth-enabled devices are organized in groups called piconets or also known as Personal Area Network (PAN). A piconet consists of one master and up to seven active slaves. The slaves in a piconet can only link to the master. Slaves cannot directly transmit data to one another. In fact, the master acts as a switch for the piconet and all traffic must pass through the master. A master and a single slave use point-to-point communication. If there are multiple slaves; point-to-multipoint communication is used. A master unit is the device that initiates the communication. A device in one piconet can communicate to another device in another piconet, forming a scatternet. A Bluetooth unit can be a slave in two or more piconets, but only one Bluetooth can be a master. Devices that participate in two or more piconets may act as gateways, forwarding traffic from one piconet to another.Notice that a master in one piconet may be a slave in another piconet: The basic concepts of any Bluetooth application consist of the following five components: Stack Initialization Device Management Device Discovery Service Discovery Communication Bluetooth vs. Infrared The major difference between the two methods of data transmission is that Bluetooth is based on radio technology (from 2.4GHz bands upwards), while Infrared utilizes invisible light in the 400 700nm wavelength. Infrared is fairly reliable and doesnt cost much to build into devices but it does have drawbacks: Its line-of-sight, so a sender must align with its receiver. Its one-to-one, so a device cant send to multiple receivers at the same time. Infrareds advantages are consequences of its disadvantages: Because its line-of-sight, interference is uncommon. Because its one-to-one, message delivery is reliable: each message sent goes to the intended recipient no matter how many infrared receivers are in the room. Bluetooth vs. 802.11b Both Bluetooth and IEEE 802.11b are wireless communication protocols and both operate in the 2.4GHz band, but they are designed to accomplish different goals. A major difference is that 802.11b was not designed for voice communications, while any Bluetooth connection can support both data and voice communications. The 802.11b protocol is designed to connect relatively large devices with lots of power and speed, such as desktops and laptops. Devices communicate at up to 11 Mbit/sec, at greater distances (up to 300 feet, or 100 meters). By contrast, Bluetooth is designed to connect small devices like PDAs, mobile phones, and peripherals at slower speeds (1 Mbit/sec), within a shorter range (30 feet, or 10 meters), which reduces power requirements. Overview of Java APIs for Bluetooth Technology (JSR-82) Java APIs for Bluetooth Wireless Technology Bluetooth is an important emerging standard for wireless integration of small devices. The specification standardizes a set of Java APIs to allow Java-enabled devices to integrate into a Bluetooth environment. Previously, there has been no standardized way to develop Bluetooth applications until JSR 82 came into play JSR-82 is a standard defined by the Java Community Process for providing a standard to develop Bluetooth applications using the Java programming language. It is the first open and non-proprietary standard for developing Bluetooth applications. The JSR-82 API hides the complexity of the Bluetooth protocol stack behind a set of Java APIs that allow to focus on application development rather than the low-level details of Bluetooth, by exposing a simple set of Java APIs. JSR 82 is based on version 1.1 of the Bluetooth Specification. JSR 82 consists of two optional packages: the core Bluetooth API and the Object Exchange (OBEX) API. The latter is transport-independent and can be used without the former. The Java APIs for Bluetooth do not implement the Bluetooth specification, but rather provide a set of APIs to access and control a Bluetooth-enabled device. JSR 82 concerns itself primarily with providing Bluetooth capabilities to J2ME-enabled devices. Java APIs described in the JSR-82 interface for following Bluetooth Protocols/Profiles: SDAP Service Discovery Application Profile RFCOMM Serial Cable Emulation Protocol L2CAP Logical Link Control and Adaptation Protocol GOEP Generic Object Exchange (OBEX) Profile The API Architecture The goal of the specification was to define an open, non-proprietary standard API that can be used by all J2ME-enabled devices. Therefore, it was designed using standard J2ME APIs and CLDC/MIDPs Generic Connection Framework. JSR 82 requires that the Bluetooth stack underlying a JSR 82 implementation be qualified for the Generic Access Profile, the Service Discovery Application Profile, and the Serial Port Profile. The stack must also provide access to its Service Discovery Protocol, and to the RFCOMM and L2CAP layers. The APIs are designed in such a way that developers can use the Java programming language to build new Bluetooth profiles on top of this API as long as the core layer specification does not change. JSR 82 includes APIs for OBEX and L2CAP so that future Bluetooth profiles can be implemented in Java, and these are already being used for that purpose. Figure 4 shows where the APIs defined in this specification fit in CLDC/MIDP architecture. Capabilities of JSR-82 These are the properties and capabilities of JSR-82 in a nutshell. The JSR-82 API is intended to provide the following capabilities options: Manage the Local Bluetooth Device settings. Discover other Bluetooth devices in the neighbourhood. Search for Bluetooth services on the discovered Bluetooth devices. Connect to any of those Bluetooth services and communicate with it. Register a Bluetooth service on the Local Bluetooth Device, so that other Bluetooth devices can connect to it. Establish RFCOMM, L2CAP, and OBEX connections between devices Manage and control the communication connections. Provide the security to all of the above options. Reasons on Using Java Platform Micro Edition (Java ME) Java ME has significant advantages over other languages and environments that make it suitable for Bluetooth Voting System (BVote). The advantages of Java are as follows: Most of mobile devices nowadays are compatible and supports Java ME application development. Java ME has a particularly high market penetration. According to Morales and Nelson, approximately 68% of mobile phones are Java ME capable, which equates to more than 350 million Java ME capable mobile devices worldwide. Java ME is an open source and free. There are no licensing expenses needed for the SDK. Java ME is platform-independent. Java has the ability to move easily from one computer system to another.Java is a platform-independent at both the source and binary levels. It can run on any operating system without modification Simplicity and ease-of-use. Java was designed to be easy to use and is therefore easy to write, compile, debug, and learn than other programming languages. Java uses automatic memory allocation and garbage collection. In addition, the I/O and network library is very easy to use. Java ME is robust. Java compilers are able to detect many problems that would first show up during execution time in other languages. Java ME is interpreted. An interpreter is needed in order to run Java programs. With Java, the program need only be compiled once, and the bytecode generated by the Java compiler can run on any platform. Reasons on Using Bluetooth Technology There are various reasons to use a Bluetooth technology. These reasons are mainly based on the advantages of the Bluetooth technology itself that it offers to users. Availability of Bluetooth connectivity wireless technology in mobile devices. Bluetooth has already become a standard inclusion and important feature on most mobile phones nowadays. No cost per transmission. As an alternative for the current Short Message Services (SMS) that would be charge per transmission, Bluetooth cost no charge for its communication. Low energy consumption as Bluetooth uses low power signals. Thus, the technology requires little energy and hence uses less battery or electrical power. Standardize technology. Since Bluetooth is a standardized wireless specification, a high level of compatibility among devices is guaranteed. In addition, Bluetooth is a universal, world-wide, wireless standard. Ability to keep information private. In order to make a transfer or allow someone to access the files in the phone, it will need to give the access by accepting or rejecting the request through the phone. Therefore, authentication will prevent unauthorized access to important data and make it very difficult to listen in. Signals are omni-directional and can pass through walls. Communicating devices do not need to be aligned and do not need an unobstructed line of sight. Besides, Bluetooth uses frequency hopping. Its spread spectrum approach greatly reduces the risk that communications will be intercepted. Overview on Bluetooth Voting System (BVote) The name of this project is BVote. BVote is being developed using Java 2 Micro Edition (J2ME) programming language in order to create an open source, freely available and platform-independent mobile voting platform with basic connectivity options to expedite the process of data transfer and multi-user collaboration. It consists of two parts which are server and client. The server is the one that become the administrator. The administrator is responsible to manage all the registration of the voters and set the question(s) of the voting. As for the client, it can only log in the voting system as a voter and vote for the question that is being sent. In order to create such a program like BVote, it must meet some basic requirements before the application can be run. Firstly, as BVote is being developed using J2ME, therefore both server and client must use mobile devices as their platform. In addition, both server and client must be able to communicate with each other through Bluetooth technology. Last but not least, since BVote is voting system application software, BVote must accept processing, storing, and updating functions especially for the server part. Research on E-Voting System http://en.wikipedia.org/wiki/Electronic_voting http://en.wikipedia.org/wiki/Electronic_voting_examples http://en.wikipedia.org/wiki/Indian_voting_machines http://www.topbits.com/e-voting.html http://www.howstuffworks.com/e-voting.htm http://avirubin.com/vote/analysis/ CHAPTER 3: DESIGN METHODLOGY AND DETAILS This chapter addressed issues that arise when implementing and using the Java APIs for Bluetooth Wireless Technology and designing the software application using Java 2 Micro Edition (J2ME). Lastly, this section discusses issues on the hardware and technology that involved on the implementation and development of Bluetooth Voting System. Hardware Mobile Phone Mobile phone is acting as the main hardware for Bluetooth Voting System, both for server and client part. Nowadays, a mobile phone in market is growing up rapidly with respectively to mobile technology. The fast growing of the mobile technology has benefited and improved the quality of life. In addition, the Bluetooth technology has become the main features in all the latest product of mobile devices available on market. With this specification, the objective to develop a low cost system has been met. As this project make the most of the Bluetooth as a connection medium for voting process, mobile phone has been fully utilized due to its ability in supporting Bluetooth. PC or Laptop In the development work, PC has been used as a workstation for programming and simulation process. For the simulation purpose, it had been perform in PC by using Java IDE and mobile phone emulator generated by Sun Wireless Toolkits. After the simulation work is done, a .jar executable file will be installing in mobile phones for real time hardware testing. Software and Development Toolkit The following software will be used: J2SDK1.5.0 Eclipse 3.0.1: one of the best Java IDE 😉 J2ME Wireless toolkit 2.2 EclipseME 0.7: Eclipse plugin to help develop J2ME code ProGuard 2.1: class file shrinker and obfuscator. Wireless Toolkit 2.5.2 The Sun Java Wireless Toolkit for CLDC (formerly known as Java 2 Platfo

Canadian writing and the language of the colonizer :: Essays Papers

Canadian writing and the language of the colonizer During the latter part of the twentieth century, Canadian writers have looked at the effects of colonialism on the original native population. The culture of the indigenous peoples and the oral tradition used, was for a long time on the verge of being eradicated, as the enforced language of the colonizer became the accepted norm. As many contemporary authors believe that they have been marginalized, they argue that they are similar to the tribal inhabitants, becoming â€Å"...spectators, not elements in what goes on† (Weibe, Rudy. â€Å"Where Is the Voice Coming From?† Canadian Short Fiction, 274). As Canadians they are forced to use a language which is for the most part alien, employing words which have meaning for a metropolitan audience but have little relevance within a Canadian context. In their desire for recognition and in attempting to create an independent identity, authors such as Rudy Weibe and Dennis Lee detail the problems encountered by those who wish to record their experiences, but have been denied a voice. In Where Is the Voice Coming From? , Weibe explores the position of the Cree population, whose oral language was silenced by the sterile, yet powerful voice of the colonizer. Since colonization, the history of Canada has been conveyed from the point of view of the settlers, who ignore the vivid language of the Cree, placing greater emphasis on cold fact and uniformity. While the players in history, ranging from Queen Victoria to the Royal Canadian Mounted Police, are given their full titles, their existences reinforced by recorded evidence, the lack of solid fact ensures that the Cree have been almost erased from Canadian history. For Weibe, English descriptions of Almighty Voice provide little evidence of his life, as he has been allocated the role of demonized and feminized scapegoat, in contrast to the white heroes whose masculinity is never questioned. Until recently, when the oral tradition began to be recorded by native writers, including Harry Robinson and Thomas King in All My Relations, the Cree and other tribal inhabitants were unable to provide any alternative to the already existing facts, their experiences resigned to a collective â€Å"...wordless cry† (Weibe, 380). While Weibe brings native concerns to public attention, his choice of subject matter illustrates the problems existing within Canadian literature in general. Driven by a collective sense of guilt, this white reaction ultimately denies the Cree the privilege of telling their own stories.

Monday, August 19, 2019

Tuberculosis Essay -- Biology Medical Biomedical Disease TB

Tuberculosis Tuberculosis is caused by Mycobacterium tuberculosis (M.TB.), has a unique cell wall, making it difficult to kill and stain. Three matjor components compose the cell wall: mycolic acids, cord factor, and Wax-D. M.TB. is also hard to culture and can only thrive in the body. It is an obligate aerobe and an acid-fast bacteria. Tuberculosis can be diagnosed through the Mantoux test and by staining methods such as the Ziel-Neelsen method. Chest x-rays are also used in the diagnosis process to detect any damage done to the lungs. Tuberculosis is caused by M.TB. This bacterium is hard to kill because of its cell wall, which is 60% lipid. M.TB. is also difficult to stain and culture (Todar, Kenneth paragraoh 14). Skin tests and microbiologic smears and cultures are the main methods used to diagnose TB, though the full diagnosis consists of many more tests. M.TB. is a rod-shaped bacterium related to the Actinomycetes. The rods are 2 to 4 um long and 0.2 to 0.5 um wide. This bacterium is an obligate aerobe, an organism that needs oxygen to survive. It is a tough bacterium that can withstand weak disinfectants and can survive in a dry state for weeks. M. TB. is a slow-growing bacterium that divides every 16 to 20 hours, which is extremely slow compared to other bacterium, which have division times measured in minutes (Wikipedia paragraph 1). Although M.TB. contains peptidoglycan in their cell wall, it is neither Gram-positive nor Gram-negative because it lacks the chemical characteristics of either. The Mycobacterium species is classified as acid-fast bacteria because it is virtually impermeable to certain dyes and stains, but once stained, the dye is permanent. The Ziehl-Neelsen method is one method used to stain Mycobac... ...ed as an acid-fast bacilli because of its impermeability to stains. The Mantoux skin test, Ziel-Neelsen method, BACTEC system, and the chest x-rays make up the most common methods used to diagnose tuberculosis. Although M.TB. is difficult study under a microscope, the understanding of the cell wall structure helps scientists to invent treatments for tuberculosis. â€Å"Tuberculosis.† Todar, Kenneth. Todar’s Online Textbook of Bacteriology. 2006 University of Wisconsin-Madison, Department of Bacteriology. 2007 23 July 2006 http://www.textbookofbacteriology.net/tuberculosis.htm â€Å"Tuberculosis.† Wikipedia. 27 July 2006 Wikipedia Foundation, Inc. 22 July 2006 http://en.wikipedia.org/wiki/Tuberculosis â€Å"Tuberculosis.† University of Michigan Health System. 14 March 2005 University of Michigan Health System. 22 July 2006 http://www.med.umich.edu/1libr/aha/aha_tb_crs.htm

Sunday, August 18, 2019

Essays --

Consequently, California higher education has increased in student fees in order to gain the amount of the state budget. Larry Gordon, Gale Holland, and Mitchell Landsberg, authors of the article â€Å"The California Fix,† have pointed out that CSU system has raised student fees by a total of 32% and is commanding 24 furlough days for all employees, including college presidents in 2009. Indeed, the UC system has a reduced freshman enrollment by 6% and hiking undergraduate fees by 9.3%. Then, Governor Jerry Brown has fund higher education but not enough. Laurel Rosenhall, author of the article â€Å"After Massive Cuts,† has revealed in 2010, state funding for CSU went up by more than 11% over in 2009 while UC moved up by more than 12%. In 2011, Brown decided to intend cutting $500 million each from the University of California (UC) and California State University (CSU) systems and another $400 million from a California Community College (CCC). Brown also has plans to ra ise fees on community colleges from $26-$36 a unit which means a full-time student would actually pay $1,080 per school year in fall 2011 (Rosenhall). According to Investment Weekly News, May 17, 2012, the California Student Aid Commission will resist to proposed Cal Grant cuts and the rearrangement of the Cal Grant Entitlement Program. The proposal of Cal Grant cuts will reduce college opportunity for students. This will affect the greatest free funding at the UC and CSU when the Governor’s proposal to eliminate Cal Grant which low income students cannot afford the rising cost of higher education. Michele Siqueriro, commissioner of the Campaigns for College Opportunity, explains that Cal Grant students whose family incomes are $50,000 a year for a family of four would lose t... ...ion in funding. However, California is struggling due to the economy so CSU will have to look for ways to modernize and educate students in difficult finaincal times (Dulaney). Although our parents thought the higher education system is the key to success, the budget cuts is causing the state and people to save money in California. Conversely, students are concern about the reductions that will extend the time it takes to gruaduate in four years. Most likely higher tuition is distressing many students to pay their student loans. For example, Dior Sweeney, a senior at UC Berkeley, has works two jobs while going to school, but he believes when he graduate that he will owe more than 20,000 student loans. He also worries about paying his tuition, rent, transportation, and food because the economy is effecting him to think that he will not get a job with a B.A. (Chea 7).

Saturday, August 17, 2019

High Divorce Rates

Family Institution (High Divorce Rates) Have you ever been to a traditional wedding? They are the most beautiful breath taking experience that you have ever seen; many symbols like the exchange of rings, uniting candle, flowers, bride’s maids and best man, and the bride in a beautiful white dress. Also weddings are a lot of fun too. They are the start of a family institution. On the flip side they are expensive and stressful for the couple at hand and the odds of staying together are only one out of every five marriages ended divorced within the first five years.Nowadays unlike the past more people are living together without getting married. According to the Associated Press the divorce rate was down to the lowest at 3. 6% (per 1000) since the 1970. The peak of divorce was in 1981 it was 5. 3% (per 1000). Some experts still say that marriages are as unstable as ever, but because couples are living together instead of marrying the rates are lower for marriages too. So it makes sense that the divorce would be down because not as many couples are getting married and living together instead and there is no data that shows at break-up unlike divorce has data.Nowadays, divorce is one of the most serious social problems that American society is currently facing. This is why it is extremely important to find out the main factors contributing to the growth of the divorce rate and possible solutions of the problem. Families are structured through marriage and reproduction is needed to keep the family institutions health and operating in society. There are many causes of divorce, just to name a few: changing woman’s roles, lack of stability, domestic violence, and lack of communication, which are highlighted below.Some solutions to these problems are needed because divorce plays a very significant role in the life of society, family and each individual. The first significant cause of recent rise in the rates of divorce is that women completely change in rol es. In the past, men had to earn all the money to afford the expense of family, whereas woman only do housework, since women have no money leading to depend on husbands’ money. Because of these situations, it is too difficult for most women to separate from their husbands. Nonetheless, these situations entirely changed nowadays. The quality between men and women in roles are very clear at the moment, thus women can work outside to earn money, while men share the household tasks such as cooking, cleaning, washing clothes as well as caring for children. It can be clearly seen that women are independent from money as they can earn money by them to support their living cost. But this as I stated has been huge changes and not always accepted in all marriages. Next let’s look at stability with the high rates of company down sizing. Many people are losing their highly paid job and either can’t replace it or have to replace it with a much lower paying job.This is a big problem because couples are not able to make their monthly mortgages and the relationship because very stressful. Many even have to turn to other resources such as government funded programs. Stress like this leads to divorce in some cases. Domestic violence is another big reason couples are getting divorce, because of the no-fault divorce it is more accepted that if you want out of the marriage just go get a divorce. Prior to 1969, countries which permitted divorces also required proof by one party that the other party had committed an act incompatible to the marriage.This was termed â€Å"grounds† for divorce (popularly called â€Å"fault†) and was the only way to terminate a marriage. Most jurisdictions around the world still require such proof of fault. In the United States, no-fault divorce is now available in all 50 states and the a District of Columbia-New York, the last state to still require fault-based divorce, passed a bill this year (2010) permitting no-fau lt divorce.According to Time magazine women are simple happier with out men and father are not necessary. Media has a high impact on the belief that shows like Sex and the City are the new shape of society. Women are financial stabile and don’t need men for financial stability. Family Institution (High Divorce Rates) Have you ever been to a traditional wedding? They are the most beautiful breath taking experience that you have ever seen; many symbols like the exchange of rings, uniting candle, flowers, bride’s maids and best man, and the bride in a beautiful white dress.Also weddings are a lot of fun too. They are the start of a family institution. On the flip side they are expensive and stressful for the couple at hand and the odds of staying together are only one out of every five marriages ended divorced within the first five years. Nowadays unlike the past more people are living together without getting married. According to the Associated Press the divorce rate wa s down to the lowest at 3. 6% (per 1000) since the 1970. The peak of divorce was in 1981 it was 5. 3% (per 1000).Some experts still say that marriages are as unstable as ever, but because couples are living together instead of marrying the rates are lower for marriages too. So it makes sense that the divorce would be down because not as many couples are getting married and living together instead and there is no data that shows at break-up unlike divorce has data. Nowadays, divorce is one of the most serious social problems that American society is currently facing. This is why it is extremely important to find out the main factors contributing to the growth of the divorce rate and possible solutions of the problem.Families are structured through marriage and reproduction is needed to keep the family institutions health and operating in society. There are many causes of divorce, just to name a few: changing woman’s roles, lack of stability, domestic violence, and lack of comm unication, which are highlighted below. Some solutions to these problems are needed because divorce plays a very significant role in the life of society, family and each individual. The first significant cause of recent rise in the rates of divorce is that women completely change in roles.In the past, men had to earn all the money to afford the expense of family, whereas woman only do housework, since women have no money leading to depend on husbands’ money. Because of these situations, it is too difficult for most women to separate from their husbands. Nonetheless, these situations entirely changed nowadays. The equality between men and women in roles are very clear at the moment, thus women can work outside to earn money, while men share the household tasks such as cooking, cleaning, washing clothes as well as caring for children.It can be clearly seen that women are independent from money as they can earn money by them to support their living cost. But this as I stated has been huge changes and not always accepted in all marriages. Next let’s look at stability with the high rates of company down sizing. Many people are losing their highly paid job and either can’t replace it or have to replace it with a much lower paying job. This is a big problem because couples are not able to make their monthly mortgages and the relationship because very stressful. Many even have to turn to other resources such as government funded programs.Stress like this leads to divorce in some cases. Domestic violence is another big reason couples are getting divorce, because of the no-fault divorce it is more accepted that if you want out of the marriage just go get a divorce. Prior to 1969, countries which permitted divorces also required proof by one party that the other party had committed an act incompatible to the marriage. This was termed â€Å"grounds† for divorce (popularly called â€Å"fault†) and was the only way to terminate a marriage. Most jurisdictions around the world still require such proof of fault.In the United States, no-fault divorce is now available in all 50 states and the a District of Columbia-New York, the last state to still require fault-based divorce, passed a bill this year (2010) permitting no-fault divorce. According to Time magazine women are simple happier with out men and father are not necessary. Media has a high impact on the belief that shows like Sex and the City are the new shape of society. Women are financial stabile and don’t need men for financial stability.

Friday, August 16, 2019

Definitions of Optical Coupler, Resistor and Transistor

Optical coupling is a portion that exchanges electrical flags between two separated circuits by using visible radiation every bit indicated as a portion of Fig.6.4. It keeps high electromotive forces from act uponing the model accepting the mark. Industrially accessible opto-isolators with stand information to-yield voltages up to 10 kilovolts and electromotive force homeless people with gaits up to 10 kV/ & A ; mu ; s. A typical sort of opto-isolator comprises of a Drove and a phototransistor in the same package. Opto-isolators are by and large utilized for transmittal of advanced ( on/off ) marks, nevertheless a few schemes permit use with simple ( matching ) marks. An opto-isolator contains a beginning ( emitter ) of visible radiation, rather frequently a close infrared Light-Emanating Diode ( Drove ) , that changes over electrical information signal into visible radiation, a unopen optical channel ( to boot called di-electrical channel ) and a exposure detector, which distinguishes nearing visible radiation and either creates electric verve specifically, or regulates electric current sloping out of an outer power supply. The detector can be a exposure resistance, a photodiode, a phototransistor, a Silicon-Controlled Rectifier ( SCR ) or a triac. Since LEDs can feel light notwithstanding radiating it, development of symmetrical, bidirectional opto-isolators is imaginable. An opto-coupled strong province hand-off contains a photodiode opto-isolator which drives a force switch, usually a correlate brace of MOSFETs. An opened optical switch contains a wellhead of visible radiation and a detector, nevertheless its optical channel is unfastened, all owing ordinance of visible radiation by outer points hindering the manner of visible radiation or reflecting visible radiation into the detector A resistance is a two-terminal electronic section intended to curtail an electric current by making a electromotive force bead between its terminuss in extent to the present, that is, as per Ohm & A ; apos ; s jurisprudence. Resistors are utilized as a constituent of electrical systems and electronic circuits. They are to a great degree typical in most electronic cogwheel. Handy resistances can be made of different mixes and films, and in add-on opposition ( wire made of a high-resistivity complex, for illustration, nickel/chrome ) . The indispensable properties of resistances are their opposition and the force they can circulate. Different attributes integrated temperature coefficient, blare, and induction. Less no uncertainty understood is know aparting opposition, the quality beneath which control airing restrains the greatest allowed current watercourse, or more which the breakage point is connected electromotive force. Basic opposition relies on the stuffs representing the resistance and its physical measurings ; its controlled by constellation. Resistors can be incorporated into mixture and printed circuits, and coordinated circuits. Size, and place of leads ( or terminuss ) are of import to gear conceivers ; resistances must be physically sufficiently expansive non to overheat when scattering their energy. Variable resistances are movable by altering the place of a contact on the resistive constituent, for illustration, with a versatile skiding contact, known as a potentiometer. There are extraordinary kinds of resistance whose opposition alterations with different sums, the bulk of them have names, and articles, they could name their ain: the opposition of thermal resistors displacements tremendously with temperature, whether exterior or because of airing, so they can be utilized for temperature or current detection ; metal oxide varistors drop to a low opposition when a high electromotive force is connected, doing them suited for over-voltage confidence ; the opposition of a strain pot differs with mechanical load ; the opposition of exposure resistances fluctuates with enlightenment ; the opposition of a Quantum Burrowing Composite can differ by an component of 1012 with mechanical weight connected ; etc. The appraisal of a resistance can be measured with an ohmmeter, which may be one capacity of a multimeter. Normally, trials on the coatings of trial leads interface with the resistance. A gate driver is a power amplifier that accepts a low-power input from a accountant IC and engenders a high-current thrust input for the gate of a high-octane transistor such as an IGBT or power MOSFET. Gate drivers can be provided either on-chip or as a distinct faculty. In kernel, a gate driver consists of a quality shifter in pile with an amplifier. It is frequently verbalized that transistors such as MOSFETs with stray gate electrodes can be driven without a authority beginning, which is non real. In contrast to bipolar transistors, MOSFETs do non necessitate changeless power input, every bit long as they are non being switched on or off. The stray gate-electrode of the MOSFET forms a capacitance ( gate capacitance ) , which must be charged or discharged each clip the MOSFET is switched on or off. As a transistor requires a peculiar gate electromotive force in order to exchange on, the gate capacitance must be charged to at least the needed gate electromotive force for the transistor to be switched on. Similarly, to exchange the transistor off, this charge must be dissipated, i.e. the gate capacitance must be discharged. When a transistor is switched on or off, it does non instantly exchange from a nonconductive to a conducting province ; and may transiently back up both a high electromotive force and carry on a high current. Consequently, when gate current is applied to a transistor to do it to exchange, a certain sum of heat is engendered which can, in some instances, be plenty to harry the transistor. Therefore, it is indispensable to maintain the switching clip every bit abruptly as possible, so as to minimise switching loss. Typical shift times are in the scope of microseconds. The switching clip of a transistor is reciprocally relative to the sum of current used to bear down the gate. Therefore, exchanging currents are frequently required in the scope of several hundred mill-amperes, or even in the scope of amperes. For typical gate electromotive forces of about 10-15V, several Watts of puissance may be required to drive the switch. When astronomically huge currents are switched at high frequen ces, ( e.g. in DC-to-DC convertors of sizably voluminous electric motors ) , multiple transistors are sometimes provided in parallel, so as to supply sufficiently high exchanging currents and exchanging authority. The switching signal for a transistor is conventionally engendered by a logic circuit or a microcontroller, which provides an end product signal that typically is constrained to a few mill-amperes of current. Consequently, a transistor which is straight driven by such a signal would exchange really bit by bit, with correspondingly high power loss. During exchanging, the gate capacitance of the transistor may pull current so efficiently that it causes a current over draw in the logic circuit or microcontroller, doing overheating which leads to dateless harm or even masterful ravagement of the bit. To debar this from transpirating, a gate driver is provided between the microcontroller end product signal and the authority transistor Each MOSFET is bulwarked against dv/dt and di/dt rampart as shown below

Thursday, August 15, 2019

The term ‘Phlebotomy’ Essay

‘Phlebotomy’ comes from the Greek word phlebos, meaning veins, and tome, meaning incision. Bloodletting is one of the humanity’s oldest medical practices, dating back thousands of years and is linked to many ancient cultures, including the Mayans, Aztecs, Egyptians and Mesopotamians. Evidence suggests bloodletting for therapeutic reasons may have begun in Egypt around 1400B.C. Tomb paintings from this time show the application of a leech to a patient. The purpose was to cure a person suffering from some kind of infirmity (leprosy, plague, pneumonia, stroke, and inflammation, pretty much anything). The patient was pierced or cut and then drained of several ounces of blood until they fainted. In ancient Greek culture, a physician named Galen of Pergamon took the practice in a more scientific direction when he discovered that arteries were filled with blood, not air. Galen’s approach to bloodletting was based on two key concepts. First, Galen believed that blood didn’t circulate, but stayed motionless in the body until it either went stagnant or was let out. Secondly, he thought the balance of the four humors (blood, phlegm, black bile and yellow bile) was the source of health or illness. Mapping out the blood vessels of the body, Galen would cut his patients in different areas, depending on what area he wanted to treat. For example, the right hand would be cut and drained in order to treat liver problems. He was also known to give his patients drugs in order to induce vomiting or urination. Bloodletting was also prominent in the early days of some of the world’s most practiced religions. The Talmud (a central text of Judaism) included rules for days where bloodletting could be practiced. Early Christian writings outlined which saint’s days were the best for the ritual. Bloodletting is also referenced as a treatment for fevers in some early Islamic texts. Continuing into the middle ages both surgeons and barbers were specializing in this bloody practice. Barber poles which still decorate the outsides of barber shops are a leftover tradition dating back to the days of barber bloodletting. The swirling red line on the pole represents the blood itself, the white represents the tourniquet, and the pole itself represents the stick the patient would squeeze in his/her hand in order to dilate the veins. Bloodletting as a medical procedure migrated to the Americas along with the European colonists, stretching in time from the residents of Plymouth to the Founding Fathers. Physician Benjamin Rush  (one of the signers of the Declaration of Independence) recommended bloodletting to his patients on a consistent basis. As a matter of fact, George Washington, the first U.S. president, died in 1799 from a throat infection after having 3.75 liters (9 pints) of blood removed from his body within a 10 hour period as treatment for a throat infection. The draining of 16-30 ounces (1-4 pints) of blood was typical. Blood was often caught in a shallow bowl. When the patient became faint, the â€Å"treatment† was stopped. Bleeding was often encouraged over large areas of the body by multiple incisions. By the end of the 19th century (1875-1900), Phlebotomy was declared quackery. The main process of bloodletting in 19th century medicine included the use of leeches to drain blood from a patient. During the 1830s, France imported approximately 40 million leeches for the purpose of bloodletting. Francois-Joseph-Victor Broussais, a French physician, would reportedly recommend his patients be treated with as many as 50 leeches at a time. Bloodletting, also known as venesection, managed to survive into the first part of the 20th century; it was even recommended in a 1923 edition of a textbook called The Principles and Practice of Medicine. During those days, there were four main bloodletting methods practiced by physicians. The first was the continued use of leeches as a bloodletting source. The second was called arteriotomy, a process in which the arteries in the temples would be punctured and bled. The third was phlebotomy (also known as â€Å"breathing a vein†) where a large external vein would be cut in order to draw blood. The last was scarification – a particularly stomach-turning method which involved one of a varied set of tools made for the purpose of attacking â€Å"superficial† blood vessels. Such devices included spring-loaded lancets and a circular, mutli-bladed, device known as a scarificator. The scarificator had a series of twelve blades. The device was cocked and the trigger released spring-driven rotary blades that caused many shallow cuts. The scarificator seemed more merciful than other bloodletting instruments. The reason bloodletting died comes as no surprise to modern readers that bloodletting killed far more people than it cured. Still, it wasn’t until the 19th century that members of the medical community seriously questioned  the merits of this practice. In the 1830s, Pierre Charles Alexandre Louis convincingly argued against the perceived effectiveness of phlebotomy for the treatment of pneumonia and fever. Ironically, with the gradual decline of bloodletting there was an increase of other dangerous and ineffective treatments, such as the use of electricity, elixirs and potions. These medications gained popularity for the same reason that bloodletting had in earlier times: it sometimes worked as a placebo. Because the patients believed that receiving electric shock therapy would heal their illness, the psychological factor may have been enough to actually make them feel better. As the 20th century brought a myriad of new medical knowledge, technology and medicine, however, these archaic practices (including bloodletting) died out almost entirely within a few decades. With the advent of modern medicine, bloodletting was remembered as a historical fad, similar to the guillotine as a form of death penalty. After nearly a century of new medical knowledge and leaps of progress that include the development of electron microscopes, mapping the human genome and cloning living tissue, how is it possible that the medical field is reconsidering the use of this ancient practice? The answer is fairly straightforward: Where ancient bloodletting was used to treat and prevent almost every infirmity imaginable, modern bloodletting (or phlebotomy) is used only to treat specific medical conditions of which medical research has proven the benefits. Research has shown that bloodletting could improve cholesterol, blood pressure and blood glucose levels for people suffering from metabolic syndrome. Metabolic syndrome is a term used to describe the list of medical problems facing people who are obese, such as hypertension, insulin resistance and glucose intolerance. People with this condition are at risk for clots and strokes. Bloodletting thins down the patient’s blood, helping to prevent these problems. Perhaps the most common use for modern bloodletting is a hereditary iron-overload condition known as hemochromatosis. As iron builds in the patient’s blood, it can have a negative impact on various areas of the body, including the heart and the joints. This can eventually lead to disease and organ failure. Bloodletting, now commonly referred to as a â€Å"blood donation†, is applied as the main treatment for hemochromatosis, with patients having their blood taken on at  least an annual basis for life. There is another modern form of bloodletting worth noting, if nothing else, because it never actually went away in the first place. Leeches have continued to be used for certain medical treatments throughout the 20th century right up to the present day. Whereas leeches were formerly used to treat all sorts of injuries and sicknesses, today they are mostly used by doctors in the reattaching of severed body parts such as fingers and toes. Attaching leeches is effective because they can help to get rid of any extra blood that might start problematically flooding in the tissue. Phlebotomy plays a major role in preventive healthcare, diagnosis and treatment of diseases. Although the instruments and methods used for obtaining blood in the beginning may appear crude in comparison to the instruments and methods we use today, the concept remains the same. The exception being, instead of using bloodletting as a â€Å"cure† to remove the illness we use it as a way to analyze, diagnose and treat the illness. Without phlebotomy the process of accurately diagnosing diseases and infections would be impossible.

Analyzing Both Sides of the Conflict Theory Essay

Conflict theory was the first radical criminological theory proposed by the scholars in the 1960s (Barkan, p. 254). It particularly analyzes the role of conflicts in class, gender, and power in the incidences of crimes in a particular society. It tells that these conflicts are the reasons why people commit crimes.   This specific thought opposes the view of the consensus theory which perceives crime as â€Å"any behavior that violates criminal law† (Barkan, p. 14). To compare, Conflict theory believes that a crime is far more complex than the first definition, assuming that people do not share the same values, beliefs, and dispositions. Because of this, the conflict theory becomes one of the theories that are applicable for larger contextual conditions. In fact, the theory encompasses a wide range of areas which makes it divided into sub- categories, such as radical criminology, peacemaking criminology, radical feminism, and left realism. (Greek, 2005). These minorities—the poor, Blacks, Hispanics, to name a few—are being given focus and importance through the theory. Marx and Engels specified that justice is not attainable and is unfairly being administered to the minorities. Through the conflict theory, an explanation on why minorities get involved with crimes is provided. The theory explains that laws against crimes are made not for the interest of everyone but only for themselves. Laws are made to serve the interest of the powerful who knows that their illegal malpractices can only become legal if the laws will be made based on their needs.   This made conflict theory sounds more realistic with consensus theory. It has able to portray the problem with power struggles as a source of crime motives that other theories disregarded or missed to see. However, proponents of the conflict theory also got blinded and missed to see some of the criticisms regarding the conflict. First of all, it is said that the conflict theory is too generalized and assuming with its discussion on the implementation of laws in societies. Laws connected to the prevention of street crimes such as robbery and murder do not necessarily serve the purpose of the powerful and neglects the less powerful minorities. In fact, such kinds of laws are directed to serve the security of everyone, and not just a little percentage of the people. The theory seems to forget that although people are different in some aspects, they still posses the same characteristics and needs. In this particular situation, all people need security for their lives. The laws protecting people’s lives could not be considered as law protecting only the interests of those who are in power; it is also for the benefit of other people. In addition to this criticism, the theory of conflict also shows a weak spot in terms of labeling disparities. There has been inconsistency in the evidence of such gaps tackling how dominant groups use the law to support their personal interests. In this way, the theory, in some ways, lose slightly its credibility. Nevertheless, the greatest strength of the theory is its vast and radical way of exploring the reason behind crimes in societies. These crimes are deeply rooted in the skins of the people who commit them. Although committers of crime are being treated as lowly kind of persons, their condition is being protected by the conflict theory. The theory will simply said that instead of committers, the minorities are victims of a much bigger crime brought about by the powerful groups to them. The theory, instead of prosecuting them, is aiming to reason out their main reason why they have done such crimes. Conflict theory acts like a lawyer who defends a person who has valid reasons behind the crime he committed. The lawyer may lack reliable and consistent evidence to prove the innocence of his client, but still, he believes in the accountability of the person. References Barkan, S.E. (2005). Criminology:   Sociological Understanding.   New Jersey: Pearson Prentice Hall   Bartos, J.O.   Wehr, P.E. and Paul Wehr. ( 2002). Using Conflict Theory. New York: Cambridge University Press Greek, C.E. Criminological Theory.   November 2005. Retrieved on 4 June 2008. http://www.criminology.fsu.edu/crimtheory/conflict.htm Lenski, G.E. (1966). Power and Privilege: A Theory of Social Stratification. McGraw-Hill. Â