Monday, September 30, 2019

The Performing Arts and the Social Sciences

Music & Storytelling: When all of the slaves were freed in The Invisible Princess, there was â€Å"music and dancing and storytelling. † Visual Art: Faith Ringgold says that â€Å"art is about more than just technique and style. It's about ideas† ( Talking to Faith Ringgold, p. 23). She gets her ideas from events that are happening around her. (Refer to the painting on pp. 23-24. ) Creative Drama: Martin Luther King, Jr. is famous for his â€Å"I Have a Dream† speech. The class can spin ideas from the book and research other African Americans who made a big impact on the freedom of their race.From here, the class can stage a production play. Language Arts: The Invisible Princess is an original fairy tale. The conflict in most fairy tales is good vs. evil. Fairy tales originated from dreams. Social Studies: The location of the terminals on the Underground Railroad are all across the United States. Tar Beach is set in Harlem during the Great Depression. Science â⠂¬â€ Cotton was grown on most of the large plantations in the South. The students can learn about the production of cotton and the other industries related to it. 2. Harry Sue by Sue Stauffacher, Illustrated by Sue Stauffacher. Yearling (April 10, 2007)Harry Sue is the moving, heartfelt, and sometimes funny story of a girl desperate for her mother’s love, and how compassion, resilience, and friendship can help a person survive just about any hardship that life can dish out. The Performing Arts and the Social Sciences Language Arts: Early on in the book, Harry Sue says, â€Å"Everybody has a back story, Fish. Garnett, Mary Bell, Homer, me. Remember that when you’re eyeballing a new con. The real story starts somewhere in the past. † (p. 23) This can be a good writing exercise for students; they will think about their â€Å"back stories† and create a narrative.Drama: There are parts of the story that are especially suited to a live performance, such as the standoff between Harry Sue and Granny in the basement, or one of the meals that Baba and Harry Sue share together in the art room. Students can learn their lines and to rehearse their scenes for a performance. Social Studies: Baba shares with Harry Sue his experiences and terrible personal loss as one of the â€Å"Lost Boys of Sudan. † The students can learn about the Sudanese civil war that resulted in thousands of refugees, and the story of how many of these boys were brought to the United States to start a new life.As a child of an incarcerated parent, Harry Sue is at greater risk of dropping out of school, abusing drugs and alcohol, experiencing mental illness, and committing crimes than children whose parents are not imprisoned. Students can research children of prisoners and and report on their findings. As an extension, the students can brainstorm what they can do as a class to help children of prisoners in their own community. Science: With a T-5 spinal cord injury, Homer Price is a quadriplegic. Unable to use his four limbs, he can only use the parts of his body above the neck: his head, mouth, and tongue.J-Cat introduces Homer to a device that allows him to draw using a light pen held in the mouth. With technology, Homer is again able to work out his inventions on paper. Students can research advances in spinal cord injury technology, and how severely disabled people like Homer are using these technologies to better their lives. Harry Sue finds solace in Mrs. Mead’s garden, and at the end of the story, she gardens with Moonie Pie and the other children at Baba and J-Cat’s day care center as a way of healing her heart and her brain. Students can research gardening or horticultural therapy and how it is used.In the spring, plant a Harry Sue flower garden with native flowers and plants that are as tough and resilient as Harry Sue. Art: J-Cat compares Homer’s situation to that of the great artist Henri Matisse toward the end of his life. When Matisse was no longer able to hold a paint brush, his assistants fastened a pencil to his hand so he could continue to draw. He also used large scissors to create the body of work known as cutouts. Students can explore the late work of Henri Matisse via the public library and the Internet. Students can then create their own cut paper collage inspired by the work of Matisse.BOOKS FOR GRADES 4-8 1. The Egypt Game by Zilpha Keatley Snyder, Yearling (December 1, 1985) In The Egypt Game, April Hall, an insecure and lonely 11-year-old, comes to live with her grandmother and surprises herself when she forms an immediate friendship with her neighbor Melanie Ross. April and Melanie, who share an unusual interest in ancient Egypt, use their intellect and vivid imaginations to develop an elaborate game of â€Å"Egypt. † Gradually, the game becomes more and more real, and frightening things begin to happen in the neighborhood. The children are faced with a soul-searchin g question: Has the game gone too far?The Performing Arts and the Social Sciences Language Arts: Each participant in The Egypt Game chooses an Egyptian name and its hieroglyphic symbol. Students can research library about the gods and goddesses of ancient Egypt. They can select an Egyptian name for themselves and create its hieroglyphic symbol. They can also compose a paragraph telling why they selected their particular names. Mysteries are solved in The Egypt Game and The Gypsy Game. At the end of The Egypt Game, April and Marshall's picture is in the newspaper along with a story about how Marshall helped the Professor save April.Students can write the article that appears in the newspaper. They can include quotations from each of the children of â€Å"Egypt,† various people from the neighborhood, and the Professor. Theater Arts: The characters in the book commune in a vacant lot where they play a game where they play specific roles as they try to reenact ancient Egyptian ri tuals. Students can learn about drama and how to study and act out a character. A play production of the book can also be staged. Social Studies: April and her friends conduct research about Egyptians and Gypsies before engaging in their games.Students can be asked to name other ancient cultures that they have studied, such as the Incas and Aztecs, and the ancient Babylonians, Chinese, and Greeks. Students should be equipped to speculate on which of the cultures would most likely interest April and Melanie and why. The Egypt Game, the children decide to perform an Egyptian â€Å"Ceremony for the Dead. † They think they will mummify the bird. Students can research the process of mummification, and how scientists determine the age of ancient mummies. 2. Adam of the Road (Puffin Modern Classics) by Elizabeth Janet Gray.Puffin (October 5, 2006) Adam of the Road is the story of eleven-year-old Adam who wishes to be a minstrel like his father, Roger. The story takes place in thirte enth-century England. Adam with his minstrel father, Roger, and his faithful cocker spaniel, Nick, are on their way to the Fair of St. Giles. Even good minstrels like Roger are not kept by their masters during the summer months and are forced to travel the countryside in search of work. While walking along the great roads of southern England, Adam's dog, Nick, is stolen. As he tries to catch the thief, he becomes separated from Roger.So begins a time of adventure for Adam. During nearly a year, while Adam continues to look for his dog and his father, he meets many strangers — jugglers, minstrels, plowmen, and nobles — who try to convince him that their life is best. Instead, Adam chooses to be a minstrel and is completely happy when he is reunited with his beloved father and his dog. The Performing Arts and the Social Sciences Language Arts: The English used in the book is mostly the terms used in the time of its printing, and outdated words are to be encountered.The b ook is for seventh grade Language Arts and fits well within an interdisciplinary unit on the Middle Ages. There are also 29 other books cited in the book, as well as excerpts from poetry. Students can research such literary pieces and that could be an aid to them in learning about the literature of Medieval Europe. Performing Arts: Music is a vital aspect of this book, as the main character is a singer and also a harp player. Moreover, the minstrels in the book also are singers. There is a great deal of singing here, and many characters are described as singing famous songs of that time.Social Studies: When the students are studying Medieval Europe in social studies, they can be reading Adam of the Road and researching life in the Middle Ages in Language Arts class. In the book, the presence of minstrels and knights in specific are interesting points to tackle. History: The book is set in Medieval Times and students can also research about the significance of that era and how we can relate the events in that time to our time today. There can be sessions where students can compare and contrast the past and the present.Science:Science as we can deduce, is not yet as advanced in the book as it is today. People back then travel by horse-drawn vehicles such as carriages and horse carts. Students can research about how transportation evolved and the Medieval Times may be their starting point. REFERENCES Pat Scales, Director of Library Services of the South Carolina Governor's School for the Arts and Humanities in Greenville, SC. http://www. randomhouse. com/catalog/display. pperl? isbn=9780517885437&view=tg Colleen Carroll, Education Consultant, Curriculum Writer and Author.http://www. randomhouse. com/kids/catalog/display. pperl? isbn=9780375832741&view=tg http://www. randomhouse. com/teachers/catalog/display. pperl? isbn=9780440422259&view=tg Deborah Gaulin 1997. http://www. sdcoe. k12. ca. us/score/adam/adamtg. html Aunt Harriet's Underground Railroad in the Sky by Faith Ringgold, Illustrated by Faith Ringgold. Dragonfly Books (1995) Harry Sue by Sue Stauffacher. Illustrated by Sue Stauffacher. Yearling (2007) The Egypt Game by Zilpha Keatley Snyder, Yearling (1985) Adam of the Road by Elizabeth Janet Gray. Puffin (2006)

Sunday, September 29, 2019

Ksa Self Eval

I am definitely a quick learner which is very beneficial to on the spot coverage for a co-worker, was trained for basic process to handle JABBER for only half a day since my co-worker needs to go to an emergency leave for 3 weeks, midyear n 2013 and helped my peer with relaying referrals to JABBER when she had a foot surgery which leads me to be an alternate on handling JABBER. I was managing authorizations for all local primary care that goes to a native facility, SEC Orthopedic and .NET after ELL was passed on to one of my peers.I was assigned to be a mentor to new employee to assist with all work related issues. On late December 201 3, was asked by my Supervisor to manage JABBER in place of my peer that volunteered for another task. I was handling all officer consults, authorizations and referral management along tit SF which is also considered a big task due to a number of patients that's being sent to their facility and all other local primary care that are being sent to native facilities for almost 9 months. Created a spreadsheet via Microsoft Excel for all JABBER clinics for easy tracking.I volunteer to work TOT every Saturday to take down Mammography consults and all other categories that needs to be worked on. I have been asked questions and advice by my peers (Nurses and Ma's) on work related issues, especially new employees. Questions about work processes, most specially computer related, mostly bout trouble shooting and vendor information. I also helped on answering the phones (ACED Line) when needed. I was the first MASS in our department to have tried the process of the PC program. Wowed some of my peers the step by step process of submitting consult/ referrals/ authorization through scanning to the program. I practically started the process and showed/ trained some of my peers, even the leads. I created the letter for veterans (fixed it, since it was from a flyer in PDF format that needs to be converted to Microsoft Word document), I also created the main coversheet for PC we use whenever we amend, deny, re-route a secondary request/ authorization and put together a verbiage to be used whenever we create an authorization for Tries. Tot tied to work on JABBER, SF and other local primary (native facility) which leads me to just occasionally helping with PEG. However, the main person who has been processing PC authorizations still seek my advice most of the time, as far as trouble shooting PC processes. I also contributed a lot to our temporary MASS working with faxes even though was not assigned to be her mentor, she always seeks my advice most of the time. I am one of the Ma's who were trained to close/ complete consults by scanning medical notes/ documents to CPRM.Although am not the main person for PC anymore, I volunteered on updating and forwarding the PC Provider List every Monday. Currently, have been helping to close out consults (since almost the end of fiscal year) by scanning medical documentations/ notes to CPRM. Added the ASK submitted when I was promoted for GAS 6 just for a refresher. GAS-6 Medical Support Assistant (Advanced) Demonstrated Knowledge, Skills, and Abilities: 1 . Ability to collaborate, communicate, set priorities, and organize the work in order to meet deadlines, ensuring compliance with established processes, policies, and regulations.In my current position as a Medical Support Assistant with the VASS Integrated Care Service, I am responsible with the review (after being approved by MR.), scheduling and authorization process of consults in collaboration with the CICS patient care team and communicating with non-VA medical facilities, this include determining urgency of care to ensure timely and best purchased care for our veterans. I've been constantly picked by my supervisor to process urgent or implicated consults on account of having an excellent attention to details and accuracy.Due to my ability to learn new skills quickly, I became a part of the reconciliation team r egardless of being new, working on a spreadsheet via Microsoft Excel consisting of over 2000 plus claims to determine, track down, adjust or cancel used or unused authorizations on a weekly task to recoup funds that had been obligated to vendors but never used, it was then used for processing backlogged pending authorizations for this FYI. In addition I was also assigned by the chief of our department to assist on identifying/ recessing denied and duplicate claims.I efficiently identified hundreds of duplicate/denied claims from previous FYI. I've been a part of a group of Mass and nurses working to close out thousands of outdated consults. I assisted going through a spreadsheet determining which authorizations needs to be closed (nickered) out freeing up funds for use of unprocessed and pending authorizations. 2. Ability to communicate tactfully and effectively, both orally and in writing, in order to meet program objectives. This may include preparing reports in various formats an d presenting data to various organizational levels.I became the point of contact for all veterans from the Electronic Wait List (ELL) that are being seen in Providence Health & Wellness, Providence Senior Care Center, Mat-Us and Southeastern Foundation for their local primary care. Constantly communicating with the vendors and patients to coordinate appointments, consults, ERR visits and authorizations to ensure care for our veterans. Maintaining/ Updating a spreadsheet and writing appropriate notes/ comments to track down number of veterans being seen for local primary care outside VA.As an alternate MASS for JABBER, assist in coordinating all veteran consults between the Joint Venture Hospital and Veteran's Administration. I am one of the only two Mass with access to the computerized medical records system at Elmsford Air Force Base Hospital. I assist in entering consults and authorizations for all care received at the Joint Venture. Assists on directing veterans, their dependents , and beneficiaries via telephone communication when covering the ACED line. 3.Advanced knowledge of the technical health care process as it relates to access to care. Proficient in CPRM, r-BCC Authorization, Vista, Microsoft Access (NBC Letters) which is utilized in consult management and referral process. Skilled in operating FIBS Distribution and Processing which utilize when working with the reconciliation and claims, SUCH which is utilized for entering BIER consults, scheduling and printing notes/ reports such as referrals, orders and reports for labs, CT, MR., Grays etc.Equally competent in utilizing systems such as RPM which is comparable to Vista, Signature and LATA which is comparable to CPRM, AFC System for electronic receipt Of documents faxed available for review and processing of healthcare providers. 4. Advanced knowledge of managing a clinic. This includes independently utilizing reference sources, decision-making, and empowering the team to collaborate and resolve pr oblems within a complex systems environment.Worked as a Case Manager Assistant at the Alaska Native Medical Center, Internal Medicine Clinic managing one of the 7 sub-specialty clinics, General Medicine with two Case Managers (nurses) and 3 doctors responsible for having the doctors review the consults according to urgency, coordinating appointments or patients, scheduling surgeries/ procedures, taking care of patient's travel and lodging. – Manages consults, authorizations, updating spreadsheet (monitoring and tracking) of the Electronic Waiting List (ELL) for four locally and out of town clinics.Such clinics are as follows; Providence Health and Wellness, Providence Senior Care Center, Providence Mates-Regional and South Central Foundation. Am currently assigned to manage consults/ referrals, scheduling and authorization for Native Agreements, .NET, Orthopedic and an alternate for JABBER specialty clinics. 5. Advanced knowledge of policies and procedures associated with ope rational activities that affect the patient flow, patient care, and the revenue process.

Saturday, September 28, 2019

L200 Essay †Crucible Experience Essay

The purpose of this essay is to identify, describe, and justify a crucible experience from my life; discuss how that experience influenced my personal leadership style, beliefs, philosophy, or behaviors; and explain how it will influence me as an organizational leader. To lay the ground work to do this, I believe it is important to first define what a crucible experience actually is. According to Warren G. Bennis and Robert J. Thomas, in their article titled C rucibles of Leaders hip, a crucible is defined as: â€Å"A transformative experience through which an individual comes to a new or an altered sense of identity.† 1 Based on this very broad definition, I discovered that it was difficult to identify just one particular experience that had a profound impact on my sense of identity. Over the course of my forty four years on this earth, half of that serving our great Nation, I have experienced many opportunities to grow as a person and as a leader. For this paper, I chose to use an experience from when I was a newly promoted Corporal and Infantry Mortar squad leader in the Salute Guns Platoon of the 3rd US Infantry Regiment, â€Å"The Old Guard†, back in 1990. During a a standard monthly counseling session with my immediate supervisor, a Staff Sergeant that will remain nameless in the event my essay is ever published, I received some advice that had such a profound impact on me that I decided to leave the Active Duty Army at the end of my first term of service, join the National Guard, and attend college. He counseled me that if I wanted to be a strong leader in the Army, I must always put the Army first. The mission must always come before my family, even if it meant I would lose them. His advice challenged my paradigm of: God, family, country. This caused me to take a deep look at what kind of man I wanted to be remembered as at the end of my life. Would an Army career bring me fulfillment? If I stayed in the Army, and listened to his advice, would my family still be there at the end of an Army career? Was this Staff Sergeant the type of leader I wanted to emulate? Did I really need to sacrifice my family to serve my country? Was his advice sound? I identify these questions as the recognizable beginning to my lifelong journey to become an effective leader, not just in the Military; but also as a father, a husband, a son, and as a man in general. I say this because I believe that an effective leader at work must also be an effective leader at home in order to lead by example in all areas of life. In the process of refining and answering those questions, I discovered what I believe are the basic tenants of an over-all effective leader in life; at the individual level, as well as the organizational level. To answer the first question; yes, an Army career is my chosen profession, and it has continuously brought me a sense of accomplishment and purpose. I discovered while I was a member of the Kansas Army National Guard and working for Xerox Business Services as my full-time employment, that there was a big difference between being a manager in the corporate world and being a leader in the Military. Army leaders are taught to lead by example, to lead from the front, and to care for the Soldiers under their command as if they were their own family. That mindset is very different from corporate leadership. Business managers and supervisors in the civilian work place only care that their employees show up on-time and do their work, what they do off the clock is of no concern. Army leaders must know every possible detail about their Soldier’s lives. A Soldier’s family is as important as the Soldier him / herself and Army leaders must be much more empathetic to the whole situation a Soldier is facing than the civilian supervisor is of an employee. So, part of what that Staff Sergeant was trying to say is true. In the Army it is mission first and Soldiers always, but an effective leader must find a balance between serving as a leader in the Army and serving as a leader of his own family. Yes, sometimes the mission requires my full attention and my family must wait. That is why it is important to be an effective leader at home when I am there. Just as it is my duty to mentor and grow young leaders in the Army to carry on the mission in my absence, I must also mentor my family to carry on when the Army requires me to be absent from home. I see leadership as fulfilling God’s will for my life, and that is all encompassing in every aspect of life. Just as a father must teach his children to become leaders so they can become successful in their lives, a leader in the Army must teach his subordinates, as well as his peers and supervisors how to be effective leaders. I feel that is the true purpose of leadership; to grow and develop more leaders. After nearly a decade in the civilian work force, I applied to return to the Army because I missed the Army way of life. I was disappointed in uncaring management I had experienced in the civilian work force and missed the true leadership I had experienced in the Army. The only caveat was that I had to ensure I maintained balance between my spiritual, personal, and professional life. To answer the next question; it depends, whether my family would still be there at the end of a successful Army career was really not completely within my power to control. As it turned out, I lost my family anyway. I discovered the hard reality that if a Soldier’s family does not share the same commitment to serving our great country, they probably do not share a common bond in other areas of life either. I have been able to counsel many of my Soldiers, and even some peers to carefully consider things before they throw away their career because they are afraid their spouse will leave them if they stay in the Army. Almost every time I have seen a Soldier get out of the Army to save their marriage, the marriage ends anyway. I am not sure this experience is universal, but I see serving in the Military as a family affair, that is why it is imperative that Army leaders engage on a more personal level than civilian supervisors do. Military family members must be willing to sacrifice just as much as their Soldiers do. A few years ago, I learned from a fellow Old Guard member that the Staff Sergeant that advised me that I must put the Army before my family also lost his family to divorce a few months after I ETSed. Apparently, his commitment level was higher than his spouse’s. I have learned the importance of achieving balance at work and home, and the importance of mentoring my Soldiers to do the same. In the Army, there is not a clear cut delineation between a Soldier’s personal life and professional service. Learning how to find a balance in my own life has given me the empathy to understand why it is important to help fellow Soldiers to find that same balance. I now understand that all leaders must remain cognizant of the importance of maintaining balance in life when leading Soldiers from the one-on-one level all the way up to the largest of organizational levels. In answering the third question, I discovered the real crucible of my leadership experience. I have met all kinds of leaders during my life; some are worthy of emulation, some only serve as an example of what not to do. The lesson I learned from that Staff Sergeant was to have patience and be more tolerant of those hard charging leaders who are so narrowly focused on the mission at hand, they overlook the big picture. The Army is not just about accomplishing the mission, we have a responsibility to also ensure the well-being of our Soldiers and their families under our care at the same time. In the Army; it is not mission or family, it is mission and family. This delicate balancing act of accomplishing the mission while taking care of Soldiers is what sets Army leaders apart from civilian supervisors. I firmly believe that if the Army were to be defined as a business, with an end product, the final product would be: leadership. Everything the Army does is tied together and driven by leadership. A truly effective leader mentors new leadership to work themselves out of a job so they can move on to positions of greater responsibility. This is totally different from civilian management positions where people are afraid to teach someone else how to do their job because they could possibly lose their job when it is discovered that someone else can do it just as well. Leaders who forget to account for Soldier’s families because they are overwhelmed with the responsibilities of the mission, may be looked upon as toxic leaders and bring the morale of the entire unit to its knees. In garrison, I have learned the importance of including family social events and Soldier family time into the unit training calendar to ensure those events do not get counted as white space and postponed when a last minute training idea comes up. Even at the highest organizational level of the Army, the Chief of Staff of the Army, the importance of taking care of Army families is at the top of the priority list. In conclusion, this essay has covered at least three leadership topics, concepts, or issues that we have discussed during our leadership lessons this year. According to the L101 lesson on developing organizations and leaders, paragraph 11-3 of Field Manual 6-22 states that: â€Å"Successful organizational leadership tends to build on direct leader experiences. The modern organizational level leader must carefully extend his influence beyond the traditional chain of command by balancing his role of warrior with that of a diplomat in uniform.† 2 Balancing mission and family can seem like a diplomatic task much of the time. In lesson L109 we learned that: â€Å"The Army is people; its readiness to fight depends upon the readiness of its people (Soldiers and their families), individually and as units. We improve our readiness and foster a ready state of mind by training, motivating and supporting our people, and by giving them a sense of participation in the Army’s important endeavors.† 3 This statement was made by former Army Chief of Staff Creighton Abrams, which goes to show that no matter how high up the chain we go, taking care of Soldiers and their families is always important. The key take away I learned from lesson L112, Organizational Leadership Philosophy, was: â€Å"Competent and confident leaders seek input and improvements over the entire span of their careers.† 4 Becoming a leader in life is an ongoing process, no matter how big the organizational responsibility.

Friday, September 27, 2019

Advantages and weaknesses portrayed by GAP with regard to contemporary Essay

Advantages and weaknesses portrayed by GAP with regard to contemporary technology - Essay Example The company to focus on in the paper is GAP which has had tremendous impact on people with regard to clothing. Research Problem What are some of the value chain advantages and weaknesses portrayed by GAP with regard to contemporary technology? Literature Review Gap is one of the oldest clothing companies in the United States of America. Since its founding in the year 1969, the company has had numerous milestones that it has overcome. This built the company’s reputation in the 1990s making it one of the top clothing sellers in the United States. Despite the fortune that it made, its market went down with the dawn of the new century due to numerous factors. However, the year 2010 saw the company begin rising again against all economic odds. It is imperative to analyze the internal situation of Gap amongst other factors in an effort to gain an in-depth understanding of the company. Analyzing the resource capabilities of the company, one major aspect to observe is the incorporatio n of intangible assets. Overlooking of these assets is a contemporary trend when understanding the structure of a company because people pay more attention to the corporeal assets within a company. However, it is important to understand that these assets play a key role in either the success or failure of a company. Technology is the intangible asset to focus on. In an effort to uphold quality inventory in its earlier years, Gap ensured that it had innovative technology that would also help the company reach a larger audience. The easy to navigate website captured the attention of many customers making it very simple for people to order clothing. As years have gone by, the company has incorporated modern age technology in an effort to increase the market value of its products. In 2009, Gap introduced a software package that would assist in monitoring its workflow and make forecasts on the effects caused by various real estate decisions made. Moreover, it acquired a system that would help intensify its e-commerce trades by faster processing of orders. With the advent of new technology, the company is bound to make even higher sales (Fleisher, 2008, 48). With relation to tangible resources, it is important to note that the company has made numerous strides in an effort to keep in touch with advancements in the industry. The company has had the ability to buy new machinery that has assisted in cutting down the costs per production. This is from the fact that in earlier years, the company had faced numerous challenges having to outsource some of its departments facing the uneven market demographics. Human resource has also worked to ensure that the company gets back to its high market position that it enjoyed in the 1990s. This is from the increased number of retail shops around the world majoring in the sale of Gap products Understanding the relative price position of Gap is also vital in comprehending the internal situation of the company. With the increase in i ts sales over the 90s decade, Gap made the mistake of lowering the quality of its products due to high demands and also increased the prices of its products. However, by the year 2003, the company had reduced its income from the loss of customers. The company thus reduced the prices of its commodities with an effort to lure back the customers but it faced numerous challenges from the market entrance of other clothing lines. The year 2010 saw the company increase the sales of its products from the moderation of prices innovation introduced by a new Chief Executive. By the month of May that year, the net sales had increased by

Thursday, September 26, 2019

Managing a Diverse Workforce Around the World Research Paper

Managing a Diverse Workforce Around the World - Research Paper Example   This is because this phenomenon not only is capable of influencing the employers and employees working for an organization, but it also inflicts huge impact on the customers, suppliers, market reputation, and external stakeholders. They naturally drag along their cultures with themselves too and if leaders hesitate in making it their business to step in to look where one culture might crush the values of another culture either by mistake or with intention, big issues can develop and the ultimate consequences signify a major drop in the annual production rate. Therefore, developing the right kind of environment that is positive and healthy from the start is highly important in order to manage a culturally diverse workforce. It remains the job of the leaders to make the workforce understand that certain things which might be acceptable in one culture might appear to be truly inappropriate for workers coming from a different cultural background. Communication and teamwork if used to gether can combat the challenges raised by mismanaged workplace diversity. In the present global marketplace, conflicts originate often when the workers happen to be extremely self-involved and oblivious to the cultural circumstances around them due to which certain ideas might be presented by them that antagonize the cultural values of other workers. A culturally diverse workforce should not only be open to communication but it should be willing to collaborate. When the leaders invest wisely, the payoff might just turn out to be astounding. This is especially important as the payoffs literally affect every area of a business. In addition to better recruitment and employee retention as mentioned earlier, there is enhanced customer loyalty, stronger market position, innovative ideas, creativity, better attitudes, language skills, intuitive global understanding, and improved proposals to complex issues (Andrade, 2010). That is what results when the leaders decide to make a wise invest ment in developing a diverse workforce which is to be maintained later on by relying on teamwork and mutual collaboration as such a strategy helps in tacking the diversity challenges. It is increasingly important that the employers and managers inculcate this thing about how not being able to relate to cultural diversity can wreak havoc for an entire organization very earlier on their minds. This is because acknowledging an issue often serves as the first step to designing a solution. As discussed earlier whenever diversity is not respected at a workplace, one finds oneself entrapped between two opposing ideas as a result of which mental distortion speeds up and dissonance increases.  Ã‚  

BP oil company Knowledge management Assignment Example | Topics and Well Written Essays - 2000 words

BP oil company Knowledge management - Assignment Example This is then followed by a discussion on Knowledge management leadership provision and the research reveals that mid-level BP leadership together with excellence coordinators are responsible for tracking dialogue and knowledge exchange initiatives. The paper also contains an extensive assessment of learning cycle, and this illustrates that the learning sequence is prior to, during and subsequent to any experience and is supported by straightforward process tools. The paper recommends that it is crucial for BP to facilitate sharing of knowledge within its highest quality, in order not to sacrifice integrity of the company and the entire knowledge management system. The group needs to assign more individuals who will be responsible for reviewing, approving and enhancing quality of knowledge and learning cycle before it is shared to other personnel. However, the paper acknowledges that knowledge and learning scheme at BP has resulted in gains amounting to more than hundreds of billions of dollars mostly due to informal personnel networks, in addition to supplementary workplace practices. Introduction BP is among the world leading global oil and Gas Company and it offers its clients with energy for transportation, retail services plus petrochemicals products. The company makes annual sales and additional operating revenues amounting to $375,517 million as of last year. BP has over 83.400 employees spread in over 30 nations with retail sites totalling 21800 (BP Global, 2012). The company has two business segments, which are exploration, production/ refining and Marketing. However, a detached business referred to as, Alternative Energy deals with low-carbon businesses as well as future growth alternatives of oil and gas, such as solar, wind, hydrogen, and bio-fuels. The company business activities are structured into four key areas, comprising the upstream, the downstream, the chemicals, and the gas and power divisions. They all add up to around 150 self-directed bus iness units.   BP organizational structure has changed considerably to be more of an entrepreneurial emphasized business unit. Thus, the company board sets up the goals, come up with broader policy measures, and monitors the group CEO performance (Groot, 2009). However, the board does not manage the group businesses, but it delegates responsibility and executive authority to a single point, that of the CEO who is then responsible for refining and marketing affairs. The argument by BP is that a flat organization enables faster decisions making, and at the same time encourages entrepreneurial creativity from its employees along with ideas being managed better. Below the chief executive officer there is the group vice president along with the senior group vice president in charge of safety and operations, and below them there are regional vice presidents whereby individuals such as refinery managers report directly to them. Thus, every business unit contains a high level of independe nce. nevertheless they all share logic of interdependence, in addition to awareness that so as to fulfil their performance goals they will have to become skilled at both from and by each-other. The central corporate organization helps and supports individual business units, and as such individual performance contracts play a crucial role. This brings out commitment to a set of

Wednesday, September 25, 2019

Issues and Challenges in Integrating Information Technology into the Essay

Issues and Challenges in Integrating Information Technology into the Curriculum - Essay Example As a result, ICT and its capability in improving student performance have been marginal as well. How then, should these new technologies be implemented by teachers in order to successfully integrate them into the curriculum As this essay will argue, the successful integration of information technology into the curriculum requires a paradigm shift from the teachers perspective, together with their acquisition of the technical skills required to use ICT, and a good support system from the school to create a contextually relevant environment that will make teachers more receptive in using new technologies and encourage learning from students. As Jonassen, Peck, and Wilson (2003) claim, ICT today is not simply a medium where information is transferred, but a tool that students learn with, assisting the learning process itself. At the very least, one could infer that ICT is changing the nature of education today - from the school, to its curriculum, each facet of education is being revised to cope with the fast development in ICT in an effort to effectively integrate such new technologies (Williams and Price, 12). However, it is imperative to note that the implementation of ICT is just a single aspect within the larger context of school reform. Thus, it is important to understand that school reform today, insofar as ICT is concerned, places emphasis not just on quantifiable outcomes, such as an increase in the amount of ACT available in schools, but on the quality of learning experiences for students - the degree that ICT enriches students' learning experiences (Godfrey, 2001, p.15). Unfortunately, most teachers do not fully comprehend such relationship between ICT and education. According to a study conducted in Australian schools, the purpose of ICT in the curriculum continues to be ill defined and poorly understood by teachers (Fifoot, 2000). An implication of such is that ICT causes frustration among teachers, which eventually forces them to abandon it altogether. If not, they just end up using it ineffectively, as a tool to substitute typewriters and calculators, for example. Using ICT in such ways do not only waste valuable investments made for the improvement of learning, but it can also have negative effects in the student's learning process because it leaves them incapable of integrating ICT effectively in their daily lives as well. Teachers, therefore, need to know how to use technology to successful use it in the classroom. However, it is imperative to differentiate between knowing how to use technology for its sake from knowing how to use technology for the sake of improving student learning (Fishman, et. al, 2001). As Tiene and Ingram (2001, p.xv), puts it, teachers "need to expand their awareness of ... educational technologies [and] the critical issues associated with the effective utilization of these technologies." Aside from understanding ICT implementation within the context of school reform, it is also imperative to understand the changes and trends surrounding ICT and school reform. Grabe and Grabe (2004, pp.35-39) outlined this shift in terms of changes in student and teacher roles,

Tuesday, September 24, 2019

The Historical Development of the Juvenile Court Essay

The Historical Development of the Juvenile Court - Essay Example In 1825, a refuge institution was opened in New York that was the first of its kind to deal with the juvenile delinquents, followed by the opening of two other institutions of the same kind. The methods of treatment used in these institutions included corporal punishments and heavy labor. Voices were raised against such a treatment of the children and eventually, a juvenile court bill was passed in 1899 in Illinois. The main role of these courts was to rehabilitate and reform neglected children, children who committed offences not deemed appropriate for their age and who committed offences that would be considered crimes if carried out by adults. 2. Discuss the development of due process rights for juveniles through several key U.S. Supreme Court cases. Answer: The U.S. Supreme Court did not recognize procedural restrictions for juvenile courts because of their rehabilitative nature as opposed to punitive nature. But the Gerald Gault case of 1964 set precedent for the subsequent deve lopment of the due process rights for juveniles. In this case, the child was initially institutionalized for six years, the punishment for the similar offence for adults was a mere 50$ or a few months detention. On the appeal of the parents, the Supreme Court reversed the Arizona case decision and the development of due process rights started taking shape. Other significant developments in defining procedural restrictions which resulted from case trials were: the decision in the Mckiever v Pennsylvania case that the states had the right to use jury trials independently in juvenile cases but this was not a constitutional requirement, the Roper v Simmons case which resulted in the minimum age for death penalty being set at 18 years and many other such cases. 3. What are different models used to transfer a juvenile to adult court? Why would a state want to transfer a juvenile out of the juvenile justice system? Answer: There are three models of transferring juveniles to adult courts: a ) Judicial Waiver: It is the instance of transferring a juvenile case to a criminal court due to the transfer or waiver of jurisdiction by the judge himself. b) Concurrent Jurisdiction: It is also known as the Prosecutorial Discretion because in these cases the prosecution has the choice of either filing the case in the juvenile court or the criminal court. c) Statutory Exclusion: The cases where the criminal courts have original jurisdiction, the juvenile cases are transferred through this model. The reason why some of the juvenile cases are transferred to adult courts is that the nature of their offences is extremely violent and the public outrage over some of the offences like school shootings etc. makes it difficult to prosecute them under juvenile due process.  

Monday, September 23, 2019

Admission Essays for EMBA Admission - The University of Chicago Booth Essay - 1

Admission Essays for EMBA Admission - The University of Chicago Booth School of Business - Essay Example My current key engagement is the implementation of the new Cloud Computing Hosting Centres for the utility based services provider iTricity at Belgium, The Netherlands and Luxembourg (IBM, 2008). Cloud computing represents a new paradigm in the manner computing will be done in business enterprises. The potential of cloud computing as a business activity is very large, with estimates suggesting that the market for cloud computing in the next five years will touch $95 billion (King, 2008). Cloud computing is an emerging technology for Information Technology that provides rapid delivery of computing resources that a business enterprise requires. These resources like computing services, storage services and networking services are made available in a simplified way and on demand. Such an approach makes for rapid innovation and management of these innovations (IBM, 2009). My role in IBM’s activities in the new cloud computing services is to help business enterprises, irrespective of size, to make use of the opportunities presented by this effective computing model (IBM, 2008). My experiences as a project manager implementing innovative projects have led me to believe in the advice of Drucker 1985, p. 98 that â€Å"knowledge-based innovations can be temperamental, capricious and hard to direct†. Interacting with business leaders to understand customer what customers want and how this innovative technology would boost their business activities are an essential component of my role in the successful development of the cloud computing networks of IBM (Bower & Christensen, 1995). The purpose of cloud computing centres is to provide a solution to business enterprises, currently facing issues of ever increasing hardware and application software for their computing needs, and I will need to be able to convince business leaders that this innovative solution will create value for them (Sawhney, Wolcott & Arroniz,

Sunday, September 22, 2019

The Meaning of Human Existence Essay Example for Free

The Meaning of Human Existence Essay In both the Metamorphosis and The Stranger the authors focus on the irrationality of the universe and explore the insignificance of human life. Both of the novels main characters, Gregor (from the Metamorphosis) and Meursault (from The Stranger) live lives of silent desperation. In the Metamorphosis Franz Kafka introduces us to Gregor, an ordinary young business man supporting his unappreciative family. The startling element to this novel is that Gregor has just turned into a beetle. The Stranger by Albert Camus tells a story of a very physically different character, named Meursault, yet both books convey similar messages. Gregor and Meursault start out unaware of their circumstances however throughout each of the novels they become more aware and learn to accept their fate. The Metamorphosis begins where your typical story is at its climax; we have no idea how or why Gregor has made this physical transformation to a beetle. This is the principal expression of the irrationality that exists in the novel. Gregor resists this situation for which he has had no control over nor can he change. It is an unfortunate irony that Gregor cannot accept the fact that he is no longer a human, this is seen on page five when he says, In fact, Gregor felt fine, with the exception of his drowsiness, which was really unnecessary after sleeping so late How can this man wake up one morning, look into the mirror and see a giant bug staring back at him, and then carry on with his day as usual? This brings up a serious issue; Gregor wakes up and his only thought is of getting to work, there is nothing that is going to stop him from getting there, even waking up as a giant vermin. Throughout the novel Kafka presents us with a man obsessed with his profession, in search of his parents approval, jus t as many of us live day in and day out. Meursault does not face the same physical obstacles as Gregor but is similar in that he possesses neither rational thought nor lives in a rational world. He exists solely as a physical being, there is no thought or emotions put into his choices. When Meursault is hungry he eats, when he is tired he sleeps, when he needs a woman he goes to his girlfriend. This desire for physical relief is presented multiple times throughout the novel: I ate almost everything. She left at one oclock and I slept awhile. (Page 36) Meursault does not display any emotion or rationale; he doesnt stop question anything, just accepts life as it is and carries on. Meursaults predicament stems from his choice to shoot and kill an Algerian man. During his trial the prosecuting attorney questions Meursaults morality because he did not grieve appropriately for his mothers death. When he faces the attorneys interrogation he answers each question telling the truth and doesnt try to skew things. Meursault didnt mean to maliciously go out and kill the Arab man, he simply allows himself to fall into these immoral situations because of his lack of thought and consideration. The attorney is playing his game and attempts to fabricate a rational reason for his behavior, but in reality Meursault was simply irrational. Camus uses this situation to comment on the way that we try to rationalize every situation that we are faced with, but sometimes things happen without a reason. Camus takes a perspective similar to the scientific viewpoint, that as humans we do not know anything for certain except that we will die. We are born, live out our lives, repopulate and then die to be forgotten forever, but I dont think that this is how Kafka feels we are meant to function. In his novel family has more of a presence, Gregors family does not love him because of his character, but rather because he provides them with a comfortable lifestyle. He lives the busy working mans life because he has to if he is to receive any respect from his family. As humans we need to be loved and as the provider of his family this is the closest that Gregor gets. Gregor feels the responsibilities of being concerned for everyone but himself which is shown by this quote, So, to spare her even (his) sight, one day he carried the sheet on his back to the couch and arranged it in such a way that he was now completely covered up. He is willing to cover himself up so as that he doesnt upset his mother with h is appearance. There is something very wrong with this scenario; Kafka uses this extreme example not to tell us how to live our lives, but to simply show us that this is how we should not live. Family plays a very different role in Camus novel. All of Meursaults family is gone; his mother has just died so her expectations of him are non- existent. Albert Camus uses his mother, Maman, as a tool to tell us of the lack of importance that human life has. On page three Meursault says, Maman died today. Or yesterday maybe, I dont know. His mother was elderly, and he decided to place her in a retirement home because she had become an inconvenience to him; she had stopped talking not to mention the trouble of getting (her) to the bus, buying tickets, and spending two hours travelling. (Page 5) To Meursault there is no one person that he truly cares for besides himself, he even feels indifferent towards his girlfriend. Camus uses. Meursault symbolizes everyone in todays world, and uses this situation as a way of commenting on how our life is. Again, just as Kafka, Camus is not attempting to tell us that our lives are meaningless, but that this is how we are treating ourselves. We ne ed to make a cha nge to recognize that human existence is of greater importance than we give it credit. As both of the novels move along Gregor and Meursault slowly decay until their death. Both characters make a transformation or come to a realization. As the novel progresses Gregor moves away from his human tendencies and becomes more and more insect like, accepting and even embracing his insect qualities. The symbols for this are the references to his head, for example on page 22 He could not raise his head anymore. It is at this point that we can tell that Gregor has lost some kind of connection to humanity. This representation is repeated multiple times throughout the novel, each time the situation Gregor less and less resembles a human until he finally dies and is swept out with the trash. Meursault too comes to accept his situation and his fate as he awaits his execution with no optimism, yet content and at peace with himself because he is no longer a stranger. Our lives are indeed meaningless to a certain degree, we are on earth to perform our function and then die. Even the most distinguished of our generation will one day be forgotten as just another person trying to make their mark on the world, so why do we live our lives in search of control and the ability to make rational decisions. We live in an irrational world where the only thing we know for sure is that we will one day die. This was not quite what every person expects to hear as an answer to the meaning in life, but life becomes meaningful only because we perceive it to have a purpose. Reflect on your own life. Do not live from moment to moment without questioning who you are as it is better to live forty years of knowing who you are and what you are doing with your life than live 100 years without a thought of anyone else, because life is only what we make of it.

Saturday, September 21, 2019

The History Of The Digital Watermarking Techniques

The History Of The Digital Watermarking Techniques Abstract Digital watermarking techniques have been developed to protect the copyright of media signals. This study aims to provide a universal review and background about the watermarking definition, concept and the main contributions in this field. The study will start with a general view of digital data, the Internet and the products of these two, namely, the multimedia and the e-commerce. The study will presents an extensive and deep literature review of the field of digital watermarking and watermarking algorithms. Introduction Digital watermarking techniques have been developed to protect the copyright of media signals. Different watermarking schemes have been suggested for multimedia content (images, video and audio signal). This study aims to provide an extensive literature review of the multimedia copyright protection. It presents a universal review and background about the watermarking definition, concept and the main contributions in this field. Digital Intellectual Property Information is becoming widely available via global networks. These connected networks allow cross-references between databases. The advent of multimedia is allowing different applications to mix sound, images, and video and to interact with large amounts of information (e.g., in e-business, distance education, and human-machine interface). The industry is investing to deliver audio, image and video data in electronic form to customers, and broadcast television companies, major corporations and photo archives are converting their content from analogue to digital form. This movement from traditional content, such as paper documents, analogue recordings, to digital media is due to several advantages of digital media over the traditional media. Some of these advantages are: The quality of digital signals is higher than that of their corresponding analogue signals. Traditional assets degrade in quality as time passes. Analogue data require expensive systems to obtain high quality copies, whereas digital data can be easily copied without loss of fidelity. Digital data (audio, image and video signals) can be easily transmitted over networks, for example the Internet. A large amount of multimedia data is now available to users all over the world. This expansion will continue at an even greater rate with the widening availability of advanced multimedia services like electronic commerce, advertising, interactive TV, digital libraries, and a lot more. Exact copies of digital data can be easily made. This is very useful but it also creates problems for the owner of valuable digital data like precious digital images. Replicas of a given piece of digital data cannot be distinguished and their origin cannot be confirmed. It is impossible to determine which piece is the original and which is the copy. It is possible to hide some information within digital data in such a way that data modifications are undetectable for the human senses. Copyright Protection of Intellectual Property An important factor that slows down the growth of multimedia-networked services is that authors, publishers and providers of multimedia data are reluctant to allow the distribution of their documents in a networked environment. This is because the ease of reproducing digital data in their exact original form is likely to encourage copyright violation, data misappropriation and abuse. These are the problems of theft and distribution of intellectual property. Therefore, creators and distributors of digital data are actively seeking reliable solutions to the problems associated with copyright protection of multimedia data. Moreover, the future development of networked multimedia systems, in particular on open networks like the Internet, is conditioned by the development of efficient methods to protect data owners against unauthorized copying and redistribution of the material put on the network. This will guarantee that their rights are protected and their assets properly managed. Copyright protection of multimedia data has been accomplished by means of cryptography algorithms to provide control over data access and to make data unreadable to non-authorized users. However, encryption systems do not completely solve the problem, because once encryption is removed there is no more control on the dissemination of data. The concept of digital watermarking arose while trying to solve problems related to the copyright of intellectual property in digital media. It is used as a means to identify the owner or distributor of digital data. Watermarking is the process of encoding hidden copyright information since it is possible today to hide information messages within digital audio, video, images and texts, by taking into account the limitations of the human audio and visual systems. Digital Watermarking: What, Why, When and How? It seems that digital watermarking is a good way to protect intellectual property from illegal copying. It provides a means of embedding a message in a piece of digital data without destroying its value. Digital watermarking embeds a known message in a piece of digital data as a means of identifying the rightful owner of the data. These techniques can be used on many types of digital data including still imagery, movies, and music. What is Digital Watermarking? A digital watermark is a signal permanently embedded into digital data (audio, images, video, and text) that can be detected or extracted later by means of computing operations in order to make assertions about the data. The watermark is hidden in the host data in such a way that it is inseparable from the data and so that it is resistant to many operations not degrading the host document. Thus by means of watermarking, the work is still accessible but permanently marked. Digital watermarking techniques derive from steganography, which means covered writing (from the Greek words stegano or covered and graphos or to write). Steganography is the science of communicating information while hiding the existence of the communication. The goal of steganography is to hide an information message inside harmless messages in such a way that it is not possible even to detect that there is a secret message present. Both steganography and watermarking belong to a category of information hiding, but the objectives and conditions for the two techniques are just the opposite. In watermarking, for example, the important information is the external data (e.g., images, voices, etc.). The internal data (e.g., watermark) are additional data for protecting the external data and to prove ownership. In steganography, however, the external data (referred to as a vessel, container, or dummy data) are not very important. They are just a carrier of the important information. The internal data are the most important. On the other hand, watermarking is not like encryption. Watermarking does not restrict access to the data while encryption has the aim of making messages unintelligible to any unauthorized persons who might intercept them. Once encrypted data is decrypted, the media is no longer protected. A watermark is designed to permanently reside in the host data. If the ownership of a digital work is in question, the information can be extracted to completely characterize the owner. Digital watermarking is an enabling technology for e-commerce strategies: conditional and user-specific access to services and resources. Digital watermarking offers several advantages. The details of a good digital watermarking algorithm can be made public knowledge. Digital watermarking provides the owner of a piece of digital data the means to mark the data invisibly. The mark could be used to serialize a piece of data as it is sold or used as a method to mark a valuable image. For example, this marking allows an owner to safely post an image for viewing but legally provides an embedded copyright to prohibit others from posting the same image. Watermarks and attacks on watermarks are two sides of the same coin. The goal of both is to preserve the value of the digital data. However, the goal of a watermark is to be robust enough to resist attack but not at the expense of altering the value of the data being protected. On the other hand, the goal of the attack is to remove the water mark without destroying the value of the protected data. The contents of the image can be marked without visible loss of value or dependence on specific formats. For example a bitmap (BMP) image can be compressed to a JPEG image. The result is an image that requires less storage space but cannot be distinguished from the original. Generally, a JPEG compression level of 70% can be applied without humanly visible degradation. This property of digital images allows insertion of additional data in the image without altering the value of the image. The message is hidden in unused visual space in the image and stays below the human visible threshold for the image. When Did the Technique Originate? The idea of hiding data in another media is very old, as described in the case of steganography. Nevertheless, the term digital watermarking first appeared in 1993, when Tirkel et al. (1993) presented two techniques to hide data in images. These methods were based on modifications to the least significant bit (LSB) of the pixel values. How Can We Build an Effective Watermarking Algorithm? It is desired that watermarks survive image-processing manipulations such as rotation, scaling, image compression and image enhancement, for example. Taking advantage of the discrete wavelet transform properties and robust features extraction techniques are the new trends that are used in the recent digital image watermarking methods. Robustness against geometrical transformation is essential since image-publishing applications often apply some kind of geometrical transformations to the image, and thus, an intellectual property ownership protection system should not be affected by these changes. Visible vs. Invisible Watermarks Digital watermarking is divided into two main categories: visible and invisible. The idea behind the visible watermark is very simple. It is equivalent to stamping a watermark on paper, and for this reason its sometimes said to be digitally stamped. An example of visible watermarking is provided by television channels, like BBC, whose logo is visibly superimposed on the corner of the TV picture. Invisible watermarking, on the other hand, is a far more complex concept. It is most often used to identify copyright data, like author, distributor, and so forth. Though a lot of research has been done in the area of invisible watermarks, much less has been done for visible watermarks. Visible and invisible watermarks both serve to deter theft but they do so in very different ways. Visible watermarks are especially useful for conveying an immediate claim of ownership (Mintzer, Braudaway Yeung, 1997). Their main advantage, in principle at least, is the virtual elimination of the commercial value of a document to a would-be thief, without lessening the documents utility for legitimate, authorized purposes. Invisible watermarks, on the other hand, are more of an aid in catching a thief than for discouraging theft in the first place (Mintzer et al., 1997; Swanson et al., 1998). Watermarking Classification There are different classifications of invisible watermarking algorithms. The reason behind this is the enormous diversity of watermarking schemes. Watermarking approaches can be distinguished in terms of watermarking host signal (still images, video signal, audio signal, integrated circuit design), and the availability of original signal during extraction (non-blind, semi-blind, blind). Also, they can be categorized based on the domain used for watermarking embedding process, as shown in Figure 1. The watermarking application is considered one of the criteria for watermarking classification. Figure 2 shows the subcategories based on watermarking applications. Figure 1: Classification of watermarking algorithms based on domain used for the watermarking embedding process Figure 2: Classification of watermarking technology based on applications Digital Watermarking Algorithms Current watermarking techniques described in the literature can be grouped into three main classes. The first includes the transform domain methods, which embed the data by modulating the transform domain signal coefficients. The second class includes the spatial domain techniques. These embed the watermark by directly modifying the pixel values of the original image. The transform domain techniques have been found to have the greater robustness, when the watermarked signals are tested after having been subjected to common signal distortions. The third class is the feature domain technique. This technique takes into account region, boundary and object characteristics. Such watermarking methods may present additional advantages in terms of detection and recovery from geometric attacks, compared to previous approaches. The algorithms in this study are organized according to their embedding domain, as indicated in Figure 1. These are grouped into: Spatial domain techniques Transform domain techniques Feature domain techniques However, due to the amount of published work in the field of watermarking technology, the main focus will be on wavelet-based watermarking technique papers. The wavelet domain is the most efficient domain for watermarking embedding so far. However, the review considers some other techniques, which serve the purpose of giving a broader picture of the existing watermarking algorithms. Some examples of spatial domain and fractal-based techniques will be reviewed. Spatial Domain Techniques This section gives a brief introduction to the spatial domain technique to gives some background information about watermarking in this domain. Many spatial techniques are based on adding fixed amplitude pseudo noise (PN) sequences to an image. PN sequences are used as the spreading key when considering the host media as the noise in a spread spectrum system, where the watermark is the transmitted message. In this case, the PN sequence is used to spread the data bits over the spectrum to hide the data. Transform Domain Techniques Many transform-based watermarking techniques have been proposed. To embed a watermark, a transformation is first applied to the host data, and then modifications are made to the transform coefficients. In this section, the state of the art of the current watermarking algorithms using the transform domain is presented. The section has three main parts, including discussions of waveletbased watermarking, DCT-based watermarking and fractal domain watermarking. Digital Watermarking Using Wavelet Decomposition This algorithm can easily be built into video watermarking applications based on a 3-D wavelet transform due to its simple structure. The hierarchical nature of the wavelet representation allows multi-resolutional detection of the digital watermark, which is a Gaussian distributed random vector added to all the high pass bands in the wavelet domain. Discrete Cosine Transform-Based Digital Watermarking Several watermarking algorithms have been proposed to utilize the DCT. However, the Cox et al. (1995, 1997) and the Koch and Zhao (1995) algorithms are the most well-known DCT-based algorithms. Cox et al. (1995) proposed the most well-known spread spectrum watermarking schemes. Figure 3 shows the block diagram of the Cox algorithm. The image is first subjected to a global DCT. Then, the 1,000 largest coefficients in the DCT domain are selected for watermarking. They used a Gaussian sequence of pseudo-random real numbers of length 1,000 as a watermark. This approach achieves good robustness against compression and other common signal processing attacks. This is a result of the selection of perceptually significant transform domain coefficients. However, the algorithm is in a weak position against the invariability attack proposed by Craver (1997). Also, the global DCT employed on the image is computationally expensive. Fractal Transform-Based Digital Watermarking Though a lot of work has been done in the area of invisible watermarks using the DCT and the wavelet-based methods, relatively few references exist for invisible watermarks based on the fractal transform. The reason for this might be the computational expense of the fractal transform. In fractal analysis, similar patterns are identified in an image and only a limited amount of binary code can be embedded using this method. Since fractal analysis is computationally expensive and some images do not have many large self-similar patterns, the techniques may not be suitable for general use. Feature Domain Techniques (Second Generation Watermarking) First generation watermarking (1GW) methods have been mainly focused on applying the watermarking on the entire image/video domain. However, this approach is not compatible with novel approaches for still image and video compression. JPEG2000 and MPEG4/7 standards are the new techniques for image and video compression. They are region or object-based, as can be seen in the compression process. Also, the 1GW algorithms proposed so far do not satisfy the watermarking requirements. Second generation watermarking (2GW) was developed in order to increase the robustness and invisibility and to overcome the weaknesses of 1GW. The 2GW methods take into account region, boundary and object characteristics and give additional advantages in terms of detection and recovery from geometric attacks compared to first generation methods. Exploiting salient region or object features and characteristics of the image achieve this. Also, 2GW methods may be designed so that selective robustness to different classes of attacks is obtained. As a result, watermark flexibility will be improved considerably. Digital Watermarking and Image Processing Attacks Digital watermarking was claimed to be the ultimate solution for copyright protection over the Internet when the concept of digital watermarking was first presented. However, some problems related to robustness and security of watermarking algorithms to intentional or unintentional attacks still remain unsolved. These problems must be solved before digital watermarking can be claimed to be the ultimate solution for copyright ownership protection in digital media. One of these problems is the effect of geometrical transformations such as rotation, translation and scaling on the recovery of the watermark. Another is the security of the watermarking algorithm when intentional attackers make use of knowledge of the watermarking algorithm to destroy or remove the watermark. Watermarking Standardization Issue The most important question about watermarking technology is whether watermarking will be standardized and used in the near future. There are several movements to standardize watermarking technology, but no one standard has prevailed at this moment in time. Some researchers have been working to develop a standardized framework for protecting digital images and other multimedia content through technology built into media files and corresponding application software. However, they have lacked a clear vision of what the framework should be or how it would be used. In addition, there was a discussion about how and whether watermarking should form part of the standard during the standardization process of JPEG2000. The requirements regarding security have been identified in the framework of JPEG2000. However, there has been neither in-depth clarification nor a harmonized effort to address watermarking issues. It is important to deduce what really needs to be standardized for including the watermarking concept in JPEG2000 and to what extent. The initial drafts of the JPEG2000 standard did not mention the issue of watermarking. However, there is a plan to examine how watermarking might be best applied within JPEG2000. The features of a given watermarking scheme are likely to offer designers an opportunity to integrate watermarking technology into JPEG2000 for different application such as distributing images on the Internet. Also, standardization of digital watermarking will influence the progress in imaging standards of JPEG2000 where the data se curity will be part of this standard. Therefore, the likelihood is that watermarking technology will be used in conjunction with JPEG2000 (Clark, 2000). Future Highlights Nevertheless, the future seems bright for digital watermarking. Many companies have already been active in digital watermarking research. For example, Microsoft has developed a prototype system that limits unauthorized playback of music by embedding a watermark that remains permanently attached to audio files. Such technology could be included as a default playback mechanism in future versions of the Windows operating system. If the music industry begins to include watermarks in its song files, Windows would refuse to play copyrighted music released after a certain date that was obtained illegally. Also, Microsoft Research has also invented a separate watermarking system that relies on graph theory to hide watermarks in software. Normally the security technology is hack able. However, if the technology is combined with proper legal enforcement, industry standards and respects of the privacy of individuals seeking to legitimately use intellectual property, digital watermarking will en courage content creators to trust the Internet more. There is a tremendous amount of money at stake for many firms. The value of illegal copies of multimedia content distributed over the Internet could reach billions of dollars a year. It will be interesting to see how the development and adoption of digital watermarking plays out. With such high stakes involved for entertainment and other multimedia companies, they are likely to keep pushing for (and be willing to pay for) a secure technology that they can use to track and reduce copyright violation and capture some of their foregone revenues. Finally, it is expected that a great deal of effort must still be put into research before digital image watermarking can be widely accepted as legal evidence of ownership. Conclusion This study was started with a general view of digital data, the Internet and the products of these two, namely, multimedia and e-commerce. It provided some initial background and history of digital watermarking. This study gave an extensive and deep literature review of the field of digital watermarking. The concept of digital watermarking and the requirements of digital watermarking were discussed and digital watermarking algorithms were reviewed. They were grouped into three main collections based on the embedding domain, that is, spatial domain techniques, transform domain techniques or feature domain techniques. The algorithm of the frequency domain were further subdivided into wavelet, DCT and fractal transform techniques. Finally, the future perspective of digital watermarking was highlighted.

Friday, September 20, 2019

Analytical Toos/Charts for Law Enforcement Intelligence :: essays research papers

A Demographic Analysis gives information about an areas population in relation to the ages, race, gender, income, ethnic origin, and level of education. The demographic analysis is mostly used for strategic assessment and long term planning for law enforcement. The reason for analyzing this type of information is to predict by the indicators of the population the threat of criminal activity within an area. If it is known that the male population between the ages of 18 to 23 with an income of $30,000 or more are more likely to participate in drag racing and the population of an area just increased with these factors than the potential for accidents due to road racing will probably increase. By using the demographic analysis, the law enforcement agency can save lives and decrease the criminal activity before it is to late.   Ã‚  Ã‚  Ã‚  Ã‚  An Event Flow Analysis depicts events listed chronology. Most of the time the event flow analysis is used for one particular criminal activity. This type of analysis can show how a criminal activity is leading up to (or leading away from) another activity. This kind of analysis can be done as events unfold, because you have to wait for the events to occur, or you can demonstrate the events that have already occurred and conclude that the probability of another occurrence is likely.   Ã‚  Ã‚  Ã‚  Ã‚  A Telephone Record Analysis is an analysis that is built by collecting of telephone bills or nonaudio wire receipts. This type of analysis is a good way to find out what organizations or individuals a criminal is calling and can identify conspirators or other individuals that are that the criminal is either selling illegal merchandise to or buying it from.

Thursday, September 19, 2019

Zora Neale Hurstons Their Eyes Were Watching God Essay -- Their Eyes

Zora Neale Hurston's Their Eyes Were Watching God   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"’†¦but she don’t seem to mind at all. Reckon dey understand one ‘nother.’† A woman’s search for her own free will to escape the chains of other people in Zora Neale Hurston’s Their Eyes Were Watching God. In the continuing philosophical debate of free will versus determinism, the question arises as to whether or not free will exists. Do people really have the capability of making decisions on their own? OR Is life already determined, and whatever we do is (and always was) the only thing that we could have done at that time, conditions being what they were? Given the circumstances in Zora Neale Hurston’s Their Eyes Were Watching God, I would argue that, while free will does exist, in my view, and a person can choose most of their actions through careful decision making, the main character, Janie, has the majority of her life planned out for her already. Whatever Janie does is governed by the laws of cause and effect; every one of her actions has a reaction. In Janie’s quest to find herself, she does make some decisions on her own, but her decisions only lead her to her destiny, so, how can we say that Janie really has free will? The truth is that you cannot determine if J anie has free will or not. Even though it is a fiction novel, and the reader is aware that the author has Janie already figured out, we can still say that Janie does not have free will. Janie’s actions are mainly determined for her by people, events, and other things out of her control. It is because of Janie’s character and personality that the reader can know she does not have the complete power to take her life into her own hands. Janie is an African American woman which is enough to determine a heavy amount of her future for her. Hurston tries to give Janie a chance to think for herself, but, mostly, Janie does not have the power to take on these situations.   Ã‚  Ã‚  Ã‚  Ã‚  According to philosophy professor Steven M. Cahn, premise number two of the argument for determinism states that, â€Å"In the case of every event that occurs, there are antecedent conditions, known or unknown, that ensure that the event will occur.† Zora Neale Hurston was aware of the argument for determinism. Hurston makes her reader believe that, at times, Janie does have free will, but her life is already planned out. With enough knowledge of Janie’s character, the rea... ...gether. It is not until the end of the story that Janie begins to think for herself and find out who she really is.   Ã‚  Ã‚  Ã‚  Ã‚  Janie’s life was planned out for her. She did make a few decisions on her own like when she left her first husband, Logan Killicks, but Janie only brought about more problems for herself by running off with Joe Starks. All of her husbands had control over her because she allowed herself to appear weak and vulnerable. Janie did not know any better. Nanny had kept Janie sheltered, and Janie had to learn about life on her own. At the end of the story, this happens, and Janie does seem to become a stronger person. But Janie never quite gets a grip on life because she is not a strong person to begin with. Her helplessness allows her to be controlled by other people. These other people like Nanny, Logan Killicks, Joe Starks, and Tea Cake make many of Janie’s decisions for her. Much of Janie’s life is determined for her by these people in her life as well as other things and events around her. Janie did not have the knowledge to take care of herself. She was not raised that way. Janie’s life was governed by the laws of cause and effect, and not by her own free will.

Wednesday, September 18, 2019

Theme Huckleberry Finn Essay :: essays research papers

The book Huckleberry Finn, by Mark Twain, has many themes that appear throughout the text. One such theme is that people must live outside of society to be truly free. If one lives outside of society, then they do not have to follow all of its laws and try to please everyone. They would not be held back by the fact that if they do something wrong, they would be punished for doing it.   Ã‚  Ã‚  Ã‚  Ã‚  This theme relates to Huck Finn in a major way. When Huck is with the widow and is learning how to be civilized, he is always feeling uncomfortable. He doesn't like it much and wishes to go back to his normal life out in the wilderness. However, when he thinks about not doing something that the widow is trying to make him do, he remembers where he is, in society. If he doesn't do these things he will be an outsider and society will not accept him as much. As he is on the river, he lays back and relaxes all the time. Whenever he goes back into society, he finds that he can not live within its limits so he always denies who he really is and makes up some false identity all the time. When he finally runs from society at the end, one last time, it was clear that he believed that society was too much for him. Also that they would try to make him civilized again, which he didn't want, so he goes off alone to finally be truly free of his troubles and restraints.   Ã‚  Ã‚  Ã‚  Ã‚  This is also seen in the character Jim. While Jim is with Miss Watson, he is a slave. She isn't the one who made him that way, it was society. She was good to him and never did him any harm, but the fact is that no matter how good she was to him, he still was only a slave. When Jim runs away, he finally sees that there was a way to be truly free and that was to not live within society. When Jim is in the woods on the island, he just starts to realize what it is to be free and what it is like to live on his own. After he meets Huck in the woods he also realizes what it is like to have a friend. Society kept him from having both of these, freedom and friends.

Tuesday, September 17, 2019

Historical Developments of Traditional and Modern Ethics Essay

The discipline of ethics, also called moral philosophy, encompasses systematizing, defending, and recommending views of right and wrong behavior. Philosophers today typically segregate ethical theories into three universal subject matters: metaethics, normative ethics, and applied ethics. Metaethics explores where our ethical doctrines come from, and what they mean. Are they simply social innovations? Do they entail more than idioms of our individual emotions? Metaethical responses to these queries focus on the issues of universal realities, the will of God, the function of reason in ethical judgments, and the significance of ethical terms themselves. Normative ethics stands on a more practical task, which is to come up at moral standards that control right and wrong demeanor. This may require articulating the good habits that we should acquire, the duties that we should follow, or the consequences of our behavior on others. Finally, applied ethics involves probing precise controversial issues, such as abortion, infanticide, animal rights, environmental concerns, homosexuality, capital punishment, or nuclear war. By employing the theoretical tools of metaethics and normative ethics, deliberations in applied ethics try to resolve these controversial issues. The lines of distinction between metaethics, normative ethics, and applied ethics are often unclear. Each thoughtful person ought to be concerned about and fascinated in ethics. For the Christian, being moral is critical to a life that seeks to honor God. A lot of decisions made on a day-to-day basis entail questions of right and wrong. Ethics supply the basis on which one makes those decisions and the root of a moral choice is often as vital as the choice itself. Yet, few people have thought through the way they rationalize their conceptions of right and wrong. Ancient moral theory tries to offer a reflective account of an indispensable human activity so one can grasp what is of primary value in pursuing it. In historical order, the theories that influenced modern ethics today sprung from those of Socrates as offered in specific dialogues of Plato; Plato in the Republic; Aristotle; the Cynics; Cyrenaic hedonism; Epicurus; the Stoics; and Pyrrhonian skepticism. Ethics has been employed to economics, politics and political science, leading to quite a lot of distinct and unrelated fields of applied ethics, consisting of business ethics and Marxism. American corporate scandals such as Enron and Global Crossings are descriptive of the relationship between ethics and business. Ethics has been connected to family structure, sexuality, and how society examines the roles of individuals; leading to several distinct and unrelated fields of applied ethics, including feminism. Ethics has been applied to war, leading to the fields of pacifism and nonviolence. Often, such endeavors take legal or political shape before they are recognized as works of normative ethics. Of all the areas of philosophy, ethics is the one that seems most pertinent to us and it is no overstatement to say that everyone is engaged in ethical thought at most times in their lives, knowingly or otherwise (Newall, 2005).   Ã‚  Ã‚  Ã‚   If ethical consideration is widespread as suggested above then it should come as no surprise that there were many thinkers in the past that put forward their ideas and tried to improve on what came before them. Numerous notions of ethics in the ancient world were based on or prejudiced by the Greeks, particularly Plato and Aristotle. The former thought that people were disposed to be good and desired happiness; the dilemma was to know what would bring about that good in the first place. Some philosophers used God as their foundation, others reason and still others both, but the leaning throughout was that the aim was attainable.   The history of this time is too complex for our purposes here; suffice to say that this movement continued: thinkers explicitly or implicitly influenced by the three assumptions tried to create systems while those who were not disagreed with them, sometimes with other propositions. Reference: Anscombe, Elizabeth â€Å"Modern Moral Philosophy† (1958), Philosophy, 1958, Vol. 33, reprinted in her Ethics, Religion and Politics (Oxford: Blackwell, 1981). Newall, Paul .The Galilean LibraryEthics (2005)http://www.galilean-library.org/int11.html.

Monday, September 16, 2019

Shared memory MIMD architecture

Introduction to MIMD Architectures:Multiple direction watercourse, multiple informations watercourse ( MIMD ) machines have a figure of processors that function asynchronously and independently. At any clip, different processors may be put to deathing different instructions on different pieces of informations. MIMD architectures may be used in a figure of application countries such as computer-aided design/computer-aided fabrication, simulation, mold, and as communicating switches. MIMD machines can be of either shared memory or distributed memory classs. These categorizations are based on how MIMD processors entree memory. Shared memory machines may be of the bus-based, drawn-out, or hierarchal type. Distributed memory machines may hold hypercube or mesh interconnectedness strategies.MIMDA type of multiprocessor architecture in which several direction rhythms may be active at any given clip, each independently taking instructions and operands into multiple treating units and runing on them in a coincident manner. Acronym for multiple-instruction-stream.multiple-data-stream.Bottom of Form( Multiple Instruction watercourse Multiple Data watercourse ) A computing machine that can treat two or more independent sets of instructions at the same time on two or more sets of informations. Computers with multiple CPUs or individual CPUs with double nucleuss are illustrations of MIMD architecture. Hyperthreading besides consequences in a certain grade of MIMD public presentation every bit good. Contrast with SIMD. In calculating, MIMD ( Multiple Instruction watercourse, Multiple Data watercourse ) is a technique employed to accomplish correspondence. Machines utilizing MIMD have a figure of processors that function asynchronously and independently. At any clip, different processors may be put to deathing different instructions on different pieces of informations. MIMD architectures may be used in a figure of application countries such as computer-aided design/computer-aided fabrication, simulation, mold, and as communicating switches. MIMD machines can be of either shared memory or distributed memory classs. These categorizations are based on how MIMD processors entree memory. Shared memory machines may be of the bus-based, drawn-out, or hierarchal type. Distributed memory machines may hold hypercube or mesh interconnectedness strategies.Multiple Instruction – Multiple DataMIMD architectures have multiple processors that each execute an independent watercourse ( sequence ) of machine in structions. The processors execute these instructions by utilizing any accessible informations instead than being forced to run upon a individual, shared informations watercourse. Hence, at any given clip, an MIMD system can be utilizing as many different direction watercourses and informations watercourses as there are processors. Although package processes put to deathing on MIMD architectures can be synchronized by go throughing informations among processors through an interconnectedness web, or by holding processors examine informations in a shared memory, the processors ‘ independent executing makes MIMD architectures asynchronous machines.Shared Memory: Bus-basedMIMD machines with shared memory have processors which portion a common, cardinal memory. In the simplest signifier, all processors are attached to a coach which connects them to memory. This apparatus is called bus-based shared memory. Bus-based machines may hold another coach that enables them to pass on straight with one another. This extra coach is used for synchronism among the processors. When utilizing bus-based shared memory MIMD machines, merely a little figure of processors can be supported. There is contention among the processors for entree to shared memory, so these machines are limited for this ground. These machines may be inc rementally expanded up to the point where there is excessively much contention on the coach.Shared Memory: ExtendedMIMD machines with extended shared memory effort to avoid or cut down the contention among processors for shared memory by subdividing the memory into a figure of independent memory units. These memory units are connected to the processsors by an interconnectedness web. The memory units are treated as a incorporate cardinal memory. One type of interconnectedness web for this type of architecture is a crossbar shift web. In this strategy, N processors are linked to M memory units which requires N times M switches. This is non an economically executable apparatus for linking a big figure of processors.Shared Memory: HierarchicalMIMD machines with hierarchal shared memory usage a hierarchy of coachs to give processors entree to each other ‘s memory. Processors on different boards may pass on through inter nodal coachs. Buss support communicating between boards. We us e this type of architecture, the machine may back up over a 1000 processors. In calculating, shared memory is memory that may be at the same time accessed by multiple plans with an purpose to supply communicating among them or avoid excess transcripts. Depending on context, plans may run on a individual processor or on multiple separate processors. Using memory for communicating inside a individual plan, for illustration among its multiple togss, is by and large non referred to as shared memoryIN HARDWAREIn computing machine hardware, shared memory refers to a ( typically ) big block of random entree memory that can be accessed by several different cardinal treating units ( CPUs ) in a multiple-processor computing machine system. A shared memory system is comparatively easy to plan since all processors portion a individual position of informations and the communicating between processors can be every bit fast as memory entrees to a same location. The issue with shared memory systems is that many CPUs need fast entree to memory and will probably hoard memory, which has two complications:CPU-to-memory connexion becomes a constriction. Shared memory computing machines can non scale really good. Most of them have ten or fewer processors.Cache coherency: Whenever one cache is updated with information that may be used by other processors, the alteration needs to be reflected to the other processors, otherwise the different processors will be working with incoherent informations ( see cache coherency and memory coherency ) . Such coherency protocols can, when they work good, supply highly high-performance entree to shared information between multiple processors. On the other manus they can sometimes go overladen and go a constriction to public presentation.The options to shared memory are distributed memory and distributed shared memory, each holding a similar set of issues. See besides Non-Uniform Memory Access.IN SOFTWARE:In compu ting machine package, shared memory is eitherA method of inter-process communicating ( IPC ) , i.e. a manner of interchanging informations between plans running at the same clip. One procedure will make an country in RAM which other procedures can entree, orA method of conserving memory infinite by directing entrees to what would normally be transcripts of a piece of informations to a individual case alternatively, by utilizing practical memory functions or with expressed support of the plan in inquiry. This is most frequently used for shared libraries and for Execute in Place.Shared Memory MIMD Architectures:The distinguishing characteristic of shared memory systems is that no affair how many memory blocks are used in them and how these memory blocks are connected to the processors and address infinites of these memory blocks are unified into a planetary reference infinite which is wholly seeable to all processors of the shared memory system. Publishing a certain memory reference b y any processor will entree the same memory block location. However, harmonizing to the physical organisation of the logically shared memory, two chief types of shared memory system could be distinguished: Physically shared memory systems Virtual ( or distributed ) shared memory systems In physically shared memory systems all memory blocks can be accessed uniformly by all processors. In distributed shared memory systems the memory blocks are physically distributed among the processors as local memory units. The three chief design issues in increasing the scalability of shared memory systems are:Organization of memoryDesign of interconnectedness websDesign of cache coherent protocolsCache Coherence:Cache memories are introduced into computing machines in order to convey informations closer to the processor and hence to cut down memory latency. Caches widely accepted and employed in uniprocessor systems. However, in multiprocessor machines where several processors require a transcript of the same memory block. The care of consistence among these transcripts raises the alleged cache coherency job which has three causes:Sharing of writable informationsProcedure migrationI/O activityFrom the point of position of cache coherency, informations constructions can be divided into three categories:Read-only informations constructions which ne'er cause any cache coherency job. They can be replicated and placed in any figure of cache memory blocks without any job.Shared writable informations constructions are the chief beginning of cache coherency jobs.Private writable informations constructions pose cache coherency jobs merely in the instance of procedure migration.There are several techniques to keep cache coherency for the critical instance, that is, shared writable informations constructions. The applied methods can be divided into two categories:hardware-based protocolssoftware-based protocolsSoftware-based strategies normally introduce some limitations on the cachability of informations in orde r to forestall cache coherency jobs.Hardware-based Protocols:Hardware-based protocols provide general solutions to the jobs of cache coherency without any limitations on the cachability of informations. The monetary value of this attack is that shared memory systems must be extended with sophisticated hardware mechanisms to back up cache coherency. Hardware-based protocols can be classified harmonizing to their memory update policy, cache coherency policy, and interconnectedness strategy. Two types of memory update policy are applied in multiprocessors: write-through and write-back. Cache coherency policy is divided into write-update policy and write-invalidate policy. Hardware-based protocols can be farther classified into three basic categories depending on the nature of the interconnectedness web applied in the shared memory system. If the web expeditiously supports broadcast medium, the alleged Snoopy cache protocol can be well exploited. This strategy is typically used in individual bus-based shared memory systems where consistence commands ( invalidate or update bids ) are broadcast via the coach and each cache ‘snoops ‘ on the coach for incoming consistence bids. Large interconnectedness webs like multistage webs can non back up airing expeditiously and hence a mechanism is needed that can straight frontward consistence bids to those caches that contain a transcript of the updated information construction. For this intent a directory must be maintained for each block of the shared memory to administrate the existent location of blocks in the possible caches. This attack is called the directory strategy. The 3rd attack attempts to avoid the application of the dearly-won directory strategy but still supply high scalability. It proposes multiple-bus webs with the application of hierarchal cache coherency protocols that are generalized or extended versions of the individual bus-based Snoopy cache protocol. In depicting a cache coherency protocol the undermentioned definitions must be given:Definition of possible provinces of blocks in caches, memories and directories.Definition of bids to be performed at assorted read/write hit/miss actions.Definition of province passages in caches, memories and directories harmonizing to the bids.Definition of transmittal paths of bids among processors, caches, memories and directories.Software-based Protocols:Although hardware-based protocols offer the fastest mechanism for keeping cache consistence, they introduce a important excess hardware complexness, peculiarly in scalable multiprocessors. Software-based attacks represent a good and competitory via media since they require about negligible hardware support and they can take to the same little figure of annulment girls as the hardware-based protocols. All the software-based protocols rely on compiler aid. The compiler analyses the plan and classifies the variables into four categories:Read-onlyRead-only for any figure of procedures and read-write for one procedureRead-write for one procedureRead-write for any figure of procedures.Read-only variables can be cached without limitations. Type 2 variables can be cached merely for the processor where the read-write procedure tallies. Since merely one procedure uses type 3 variables it is sufficient to hoard them merely for that procedure. Type 4 variables must non be cached in software-based strategies. Variables demonstrate different behaviour in different plan subdivisions and hence the plan is normally divided into subdivisions by the compiler and the variables are categorized independently in each subdivision. More than that, the compiler generates instructions that control the cache or entree the cache explicitly based on the categorization of variables and codification cleavage. Typically, at the terminal of each plan subdivision the caches must be invalidated to guarantee that the variables are in a consistent province before get downing a new subdivision. shared memory systems can be divided into four chief categories:Uniform Memory Access ( UMA ) Machines:Contemporary unvarying memory entree machines are small-size individual coach multiprocessors. Large UMA machines with 100s of processors and a shift web were typical in the early design of scalable shared memory systems. Celebrated representatives of that category of multiprocessors are the Denelcor HEP and the NYU Ultracomputer. They introduced many advanced characteristics in their design, some of which even today represent a important milepost in parallel computing machine architectures. However, these early systems do non incorporate either cache memory or local chief memory which turned out to be necessary to accomplish high public presentation in scalable shared memory systemsNon-Uniform Memory Access ( NUMA ) Machines:Non-uniform memory entree ( NUMA ) machines were designed to avoid the memory entree constriction of UMA machines. The logically shared memory is physically di stributed among the treating nodes of NUMA machines, taking to distributed shared memory architectures. On one manus these parallel computing machines became extremely scalable, but on the other manus they are really sensitive to data allotment in local memories. Accessing a local memory section of a node is much faster than accessing a distant memory section. Not by opportunity, the construction and design of these machines resemble in many ways that of distributed memory multicomputers. The chief difference is in the organisation of the address infinite. In multiprocessors, a planetary reference infinite is applied that is uniformly seeable from each processor ; that is, all processors can transparently entree all memory locations. In multicomputers, the reference infinite is replicated in the local memories of the processing elements. This difference in the address infinite of the memory is besides reflected at the package degree: distributed memory multicomputers are programmed on the footing of the message-passing paradigm, while NUMA machines are programmed on the footing of the planetary reference infinite ( shared memory ) rule. The job of cache coherence does non look in distributed memory multicomputers since the message-passing paradigm explicitly handles different transcripts of the same information construction in the signifier of independent messages. In the shard memory paradigm, multiple entrees to the same planetary information construction are possible and can be accelerated if local transcripts of the planetary information construction are maintained in local caches. However, the hardware-supported cache consistence strategies are non introduced into the NUMA machines. These systems can hoard read-only codification and informations, every bit good as local informations, but non shared modifiable informations. This is the separating characteristic between NUMA and CC-NUMA multiprocessors. Consequently, NUMA machines are nearer to multicomputers than to other shared memory multiprocessors, while CC-NUMA machines look like existent shared memory systems. In NUMA machines, like in multicomputers, the chief design issues are the organisation of processor nodes, the interconnectedness web, and the possible techniques to cut down distant memory entrees. Two illustrations of NUMA machines are the Hector and the Cray T3D multiprocessor.www.wikipedia.comhypertext transfer protocol: //www.developers.net/tsearch? searchkeys=MIMD+architecturehypertext transfer protocol: //carbon.cudenver.edu/~galaghba/mimd.htmlhypertext transfer protocol: //www.docstoc.com/docs/2685241/Computer-Architecture-Introduction-to-MIMD-architectures