Wednesday, July 31, 2019

Foreign aid vs. International trade Essay

Foreign aid vs. international trade is a long lasting debate as to which strategy leads to the greatest level of economic development. Foreign Aid is defined as any assistance that is given to a country not provided through normal market forces. There are numerous forms of aid, from humanitarian emergency assistance, to food aid, military assistance, etc. Development aid has long been recognized as crucial to help poor developing nations grow out of poverty. International trade is the exchange of goods or services across international borders. Economic development as defined by AmartyaSen, 1998 Nobel prize laureate, â€Å"requires the removal of major sources of unfreedom: poverty as well as tyranny, poor economic opportunities as well as systematic social deprivation.† (1) In 1970, the world’s affluent countries agreed to give 0.7% of their GNI (Gross National Income) as official international development aid, annually. Since then, these rich nations have rarely met their actual promised targets. â€Å"The US is often the largest donor in dollar terms, but ranks amongst the lowest in terms of meeting the stated 0.7% target.† The two charts below, reproduced from the OECD publications (2012) shows aid granted in constant dollars and as a percentage of GNI. Both support the conclusion regarding the failure to meet agreed upon aid commitments and the level of decreasing donations. (2)Billions have been donated, but it appears that Africa which has received the most aid remains a continent impoverished. As Dambisa Moyo in the Wall Street Journal writes â€Å"money from rich countries has trapped many African nations in a cycle of corruption, slower economic growth and poverty. Cutting off the flow would be far more beneficial†¦Ã¢â‚¬ ¦.the insidious aid culture has left African countries more debt-laden, more inflation-prone, more vulnerable to the vagaries of the currency markets and more unattractive to higher-quality investment. It’s increased the risk of civil conflict and unrest †¦.. Aid is an unmitigated political, economic and humanitarian disaster†. (3) Wall Street Journal, March 21st, 2009 Over the past 60 years at least $1 trillion of development aid has been granted to Africa. And unfortunately real per-capita income in 2014 is less than it was in the 1970s. â€Å"More than 50% of the population — over 350  million people — live on less than a dollar a day, a figure that has nearly doubled in two decades† (4) Wall Street Journal, March 21st, 2009 In 2005, the International Monetary Fund’s report â€Å"Aid Will Not Lift Growth in Africa.† concluded that governments, donors and campaigners should be more modest in their claims that increased aid will solve Africa’s problems. (5) Historically Asia was underdeveloped too. Yet various policies by governments to enhance international trade have resulted in many Asian countries i.e. Korea, Taiwan, Malaysia, and Singapore achieving spectacular economic growth and along with it, higher standard of living for its citizens. Dato Kim Tan, the co-founder and trustee for the Transformational Business Network (TBN) wrote â€Å"growing up din Asia, I saw the Asian tiger economies that 30-40 years ago had a lower GDP than Uganda or Kenya, transform themselves through enterprise, not through aid and philanthropy.† (3)Paul Kagame, President of the Republic of Rwanda and that country’s first democratically elected president wrote: â€Å"There is bad aid and there is good aid. The bad aid is that one which creates dependencies, as we’ve known for a long time now. But good aid is that which is targeted to create capacities in people so that they are able to live on their own activities.†¦ In the long-term they have to depend on themselves rather than depend on aid.†(4) Poverty Cure The issue to be addressed is whetherforeign aid achieveslong-term growth and development – is it a positive or negative catalyst to economic well being. And the corollary to this statement is whether international trade is a better alternative to economic achievement. Trade Theory: The historical basis for concluding that there is gain from trade originates from David Ricardo’s work: Principals in Political Economy and Taxation. The historical context of the time was the protectionist English corn laws, restricting wheat imports. Ricardo’s conclusion, arrived at by his theory of comparative advantage, showed that countries could benefit if they  specialized and promoted free trade. Figure 1: Comparative Advantage Country A has an absolute production advantage of both goods A and B because it can produce more of these goods. Since the PPC is not parallel we can presume that the opportunity cost are both different. As a consequence specialization and mutually beneficial trade can occur. Country A has a comparative advantage in the production of good B and Country B has a comparative advantage in the production of good A. Country B PPF curve has a lower slope therefore its comparative advantage of production is the good on the horizontal axis. To establish a policy of international trade, governments need to develop programmes that require important changes in the society. For example, states must develop competitive market economies based on environmental sustainability, infrastructure, establish a stable currency, a transparent political framework and legal system, security, and educated populace as prerequisites. Good A= Capital Goods Good B= Consumer Goods Figure 2: PPF curve with improved production via exports Country A allocates its resources to mostly consumption. Country C allocates its resources towards investment/capital goods. Countries that allocate their resources mainly in investment/capital goods are greater to have long-term growth than those countries who are more focused on consumption who are using up more current resources. With respect to Aid, money that is allocated to current consumption will not improve future conditions where as aid money allocated for such production of infrastructure, health, etc. will in the long run exhibit economic growth. Interestingly,South Korea’s economic growth from the early 1960s to the late 1990s was one of the world’s fastest, and South Korea remains one of the fastest growing developed countries in the 2000s.This experience is known as the Miracle on the Han River. Like many underdeveloped society’s, S. Korea  possessesno natural resources and suffers from overpopulation.In addition, the Korean War destroyed much of its infrastructure. The solution was South Korea adapting an export-oriented economic strategy.Remarkably in 1980, the South Korean GDP per capita was $2,300, about one-third of nearby developed Asian economies such as Singapore and Japan. In 2010 South Korean GDP per capita advanced to $30,000 – almost thirteen times since 1980. (See two charts below on Korean Economic Growth and South Korean Economic Recovery after 1997.) It is acknowledged that the Korean GDP per capita in 1960 was lower than some sub-Saharan African countries. The growth of the Koreanindustrial sector was the principal stimulus to economic development. It is true that initially some foreign aid was granted by the U.S. given the contentious communist threat, nevertheless, it was from strong domestic government support and a move toward competitive markets and international trade that resulted in the investment of modern technology and newly built facilities at a rapid pace. The export to foreign markets and the plowing of the foreign currency back into further industrial expansion was the strategy for growth. In addition, this economic strategy suited South Korea given its poor natural resource endowment, low savings rate, and small domestic market. Labour-intensive manufactured exports, permitted South Korea to develop a competitive advantage. No doubt government initiatives were essential to this process. â€Å"The inflow of foreign capital was greatly encouraged to supplement the shortage of domestic savings. These efforts enabled South Korea to achieve rapid growth in exports and subsequent increases in income.†(5) Finally, the later development of a unique multinational firm known as the chaebol – family-controlled firms owning numerous international enterprises,enhanced Korean economic growth. There is strong cooperation with government receiving financial support and guidance i.e. innovation and research. Today of these multinationals are Samsung, Hyundai, and LG. Thus, it is evident that South Korean expansion and wealth for its citizenry has derived from the adoption of a competitive market manufacturing economy, and the development of a high-tech commercethat emphasizes international trade. Foreign loans, supportive government policies, and not aid have been the critical catalyst to such a Han miracle. Aid Theory: Aid assists, mostly economic which is normally provided to distressed communities or underdeveloped countries for the enhancement of their socioeconomic condition. Aid is linked to need, is often not linked to the ability to enhance trade. Trade can result in inefficient distribution of income while if aid is mishandled the distribution of aid will be unfair, with people being deprived of the benefits of aid and effect economic growth of the country. Does Aid lead to the establishment of good infrastructure? Development aid is given by governments, i.e. the US being the largest aid donor in the world (As of 2010) and other organizations such as the World Bank. â€Å"Aid to all countries in the world declined† (2007, World Bank) An overview of a number of African countries that have been recipients of aid will consider the use and allocation of the foreign aid, and assess the outcome of these donations upon the populace of the continent. One would note initially that there is a need for humanitarian aid to assist in emergencies and alleviate suffering but long term growth and development requires a different approach. Besides charity aid is a minimal portion of the over-all aid from governments. In the Democratic Republic of Congo, according to a report by Transparency International, the Zairian president Mobutu Sese Seko (1965-1977) is listed as having embezzled at least $5 billion form the nation. (6) Transparency International In 2009, the former president of Malawi – Bakili Muluzi was prosecuted for stealing $12 million allocated for aid. And Zambia’s former president, Frederick Chiluba is under investigation for taking millions from money that was set aside for health, infrastructure, and education. Thus, these examples of corruption pervert the opportunity for aid to assist the average African improve their conditions. Economic theory will emphasize that inefficiency will result from government intervention and in particular ‘free’ funds. Bad government worsens the situation as they are often bureaucratic in addition to corrupt. The civil service is inefficient and vulnerable to cronyism which has consequence for responsible governance. Economic incentives are nullified and governments need not respond to citizen needs. Investors require transparency in government and business but such a prerequisite is not  required when donations are the source of funds. Policies such as taxation can be deferred since donations flow in to the country. The priority is to remain in power. Africa continues to be the most unstable region. There are numerous examples of civil strife as exemplified by the current war in Southern Sudan and The Congo. According to the Stockholm International Peace Research Institute, Africa had a greater number of wars than elsewhere in the world. Obviously, such strife has immense impact upon daily life and thwarts any possibility of private investment. Aid thus fills the vacuum. As stated in his book, Dead Aid: Why Aid Is Not Working and How There is a Better Way for Africa, by D. Moyo, â€Å"†¦aid-financed efforts to force-feed democracy to economies facing poverty and difficult economic prospects remain, at best, precariously vulnerable.† (7) Further evidence of endemic problems is observed in Nigeria. This government is one of the most mismanaged in Africa. For example, during the World Economic Forum of 2005 in Davos Switzerland, four state governors were being investigated in the U.K. for money laundering. Large amounts of aid are looted. â€Å"Speaking at the New Partnership for African Development (NEPAD) meeting in Abuja, Nigeria, in December 2003, the former British secretary of state for international development, Lynda Chalker, noted that 40 percent of the wealth created in Africa is invested outside the continent.† (8) Advantages and Disadvantages to Trade: Trade provides development countries with an important base for their own improvement. Countries can develop their own strategies and outcomes to achieve their development objectives i.e. focusing on agriculture of manufacturing services. Countries are the determinants of their own economic destiny. One difficulty of trade is the international economic system imposes impediments i.e. trade barriers. The global market is not an international free trade market i.e. tariffs, taxes and subsidies, regulations and such restrictions operate to the disadvantage of the developing countries. The donor country puts restrictions on the recipient country i.e. the requirement for government transparency, human rights, political support at the UN or Ideological support. Japan gains support from small countries on whale killing/harvesting using trade. Developing countries have weak economic power to challenge economic injustices i.e. EU and USA  have large program of subsidies and economical protectionism.One argument states that trade is a foundation for international cooperationi.e. one country is the resources base and the other importing country is the manufacturing base. Trade would benefits those countries who are engaged in trade (based on the market). Trade relationships would result in a more equitable partnership and thus might be a catalyst for investment and growth. Developing country could receive direct foreign investments and the benefits that would sue from that, technology, employment etc. The result of this would lead to lower prices, greater choice, more efficient allocation of resources, foreign exchange and idea flowing between countries. Once getting passed trade impediments it can seen as long-term development strategy for a developing country. A summary of the advantages and disadvantages: Advantages A country may import things which it cannot produce Maximum utilization of resources Benefit to consumer Reduces trade fluctuations Utilization of surplus produce Fosters international trade Disadvantages Import of harmful goods It may exhaust resources Over specialization Danger of starvation One country may gain at the expensive of another It may lead to war Advantages and Disadvantages to Aid: Aid has been said to decrease the development for countries with their own improvement. Aid has many advantages but as it can be seen using examples such as African countries it can be seen that aid has decreased the development for countries. Countries can be giving aid for ethical reasons,  if there was a natural disaster and were in need of assistance. Aid is based on need, aid permits to countries to retain their dignity because aid if often perceived as condescending. There are different types of aid, tied and untied. Tied aid is foreign aid that must be spent in the country providing the aid or in a group of selected countries. Untied aid is assistance given to developing countries, which can be used to purchase goods, and services in virtually all countries. Jeffery Sachs (UN advisor) argued that aid is important, it is essential to break the poverty cycle and a determinant of long term growth. His argument stated that poor countries are not wealthy because of diseases such as malaria, they need to remove problems such as disease because the free market will not due this. Giving of aid is perceived as an inducement to behave or support certain policies. Aid can be used as blackmailing or getting the upper hand on another country in order to gain their vote in the UN. William Easterly (Professor of economics, NY university), aid does more harm than good, its often wasted, it inhibits peoples inventiveness, devising their old solutions. Aid is corrupt because its given to corrupt officials and often its fragmented that there is many donors and misallocations of the funds. Aid often comes with a lot of preconditions. Furthermore, aid has often come with a price of its own for the developing nations. Aid is often wasted on conditions that the recipient must use overpriced goods and services from donor countries. Most aid does not actually go to the poorest who would need it the most. Aid amounts are dwarfed by rich country protectionism that denies market access for poor country products, while rich nations use aid as a lever to open poor country markets to their products. Large projects or massive grand strategies often fail to help the vulnerable as money can often be embezzled away. Conclusion: In conclusion, it appears that generally trade is more beneficial to  long-term growth and development than aid. African examples discussed are proof that aid is counterproductive and the road to economic failure. The opposite appears true. Those countries able to divorce themselves from aid dependency are more likely to succeed as evidenced by China, India, and even South Africa. A strategy of transparent government, efficient civil service to meet social needs i.e. education, incentives, entrepreneurship, the rule of law, patent protection, institutions to attract foreign direct investment by creating attractive tax structures and reducing the red tape and complex regulations for businesses. Private capital investment into sustainable companies, with aid directly to community based non-profitable organizations is recommended. African nations should also focus on increasing trade, but there have been cases where rapid growth in international trade has led to bottlenecks and impediments to growth and development. There appears to be no panacea but one does conclude that in order to achieve economic, social, and political progress there are essential non-economic and economic prerequisites – cultural (i.e. individualism, attitudes of personal achievement, hard work, etc.) political (i.e. transparent governments, stability, the rule of law,) and economic (i.e. infrastructure, communications network, merit goods i.e. education and health etc.). Each nation is unique with regard to trade and aid. The answer is not either or – aid or trade .but accountable and transparent aid in conjunction with sustainable trade and honest and efficient government. Bibliography: (Complete bibliography after check by Ms. Kerr) 1. Amartya Sen. 1999. Development as Freedom. Oxford university press 2. http://www.globalissues.org/article/35/foreign-aid-development-assistance 3. wall street journal 4. wall street journal 5. http://www.povertycure.org/voices/kim-tan/ 6. http://www.povertycure.org/voices/president-paul-kagame/ 7. http://books.google.ca/books?id=_adMWevoEq0C&pg=PA137&dq=The+inflow+of+foreig n+capital+was+greatly+encouraged+to+supplement+the+shortage+of+domestic+savings.+These+efforts+enabled+South+Korea+to+achieve+rapid+growth+in+exports+and+subsequent+increases+in+income.%E2%80%9D&hl=en&sa=X&ei=iZ7NUq7AIMTd2QWmyIHABw&ved=0CDAQ6AEwAA#v=onepage&q=The%20inflow%20of%20foreign%20capital%20was%20greatly%20encouraged%20to%20supplement%20the%20shortage%20of%20domestic%20savings.%20These%20efforts%20enabled%20South%20Korea%20to%20achieve%20rapid%20growth%20in%20exports%20and%20subsequent%20increases%20in%20income.%E2%80%9D&f=false 8. OECD Development Statistics Online, last accessed April 7, 2012 9. http://www.bbc.co.uk/news/uk-20405140 10. http://www.guesspapers.net/1593/advantages-and-disadvantages-of-international-trade/ 11. http://www.moeasmea.gov.tw/ct.asp?xItem=72&CtNode=263&mp=2 12. http://www.globalissues.org/article/35/foreign-aid-development-assistance 13. http://www.ryanallis.com/sustainable-capitalism-and-the-role-of-aid-vs-trade-in-prosperity-creation/ 14. http://www.cato.org/publications/economic-development-bulletin/african-perspectives-aid-foreign-assistance-will-not-pull-africa-out-poverty

Strategic Planning Process

Strategic Planning – Week 1 Keyla (Bolin, Niu) Keiser University MKT531 Marketing Management Dr. Jeff Ritter 03/09/13 Strategic Planning Process Strategic planning is refers to the development of the organization’s long- term goals and put forward into practice (Peter, 2013).Strategic planning system is the strategy, objectives, environmental factors, it is a process about the internal conditions and various elements integration and used to guide the rational allocation of limited resources enterprise for a certain period of time, in order to reach the goal of the management activities Some big enterprise have particular plan for next fifth years. Strategic planning can be separate to three steps, the first step is to determine the objective goals, during the enterprise development, it should be meet all kinds of challenges that successful achieve the goal.The second step is to formulate the planning, after manger determine the goal, manager should consider what measure s can be successfully to process the project, this is what I understannd about strategic planning. According to the requirements of the strategic planning, the characteristic about strategic planning can be summarizing by these points (Aldehayyat, & Twaissi, 2011): 1. Strategic planning system set broke through the traditional thinking mode which is not planning at present project, but the goals are for enterprise future direction of planning and financial.It pays much more attention to how to adjust business environment and innovation. 2. The settings of strategic planning are often led by very few top management leader directly control. It doesn’t like short-term business plan by a wide range of many people to participate in. 3. The strategic planning system is focus on the changing the external environment and innovation about enterprise, it involved the possibility of market opportunity which is hard to control and requires the enterprise have random and rapid response. 4 .The strategic planning plan can be set with external environment, business industry structure, customer and competitor’s information; however, the enterprise manager can understand the company’s internal standards through this process. 5. Strategic planning is a big change plan which is enough to change the enterprise future direction. It is combined with the strategic business goals and strategic key points that will make the enterprise get comprehensive change. The famous managerialist Drucker thinks that the enterprise of top managers’ first priority is to formulate and implement strategy.Through the company's mission, he thought, to reflect on the basic task of the management, is to put forward such a question: our company is what kind of business? It should reach to what kind of business? To this end, enterprises should develop their strategic target, strategic and plan, make decisions for the future. Clearly, this is actually the strategic planning proces s. From western developed countries the large enterprise, the management strategy is the framework of the strategic plan system.Is not normative system, of course, also can produce excellent strategy? But, regardless of the manner, the formulation of strategic planning system is intertwined in the processes for management activities, and the strategic management plays an important guiding role. It makes enterprises at all levels of staff have been involved in the process. I. e. , the enterprise employees should participate in the formulation or implementation of the strategic planning system, it's just them to participate in different degree of prevention is.Each employee in the enterprise bear the plan the worker roles at the same time, also has the characters such as organizer and commander. In this sense, the enterprise strategic planning system plays a sustained and coordinated the important role of strategic management and daily business activities, also prompted enterprise emp loyees to form a strong cohesion and a sense of belonging (Robinson, & Pearce, 1988). The effective decision system of corporate strategic planning must start with a strong organization.Enterprises in determining the strategic planning system, the corresponding processes must be designed so that the audit in the enterprise between various departments, as well as the correlation between their activities and planning, influence each other and mutual dependence. Generally speaking, due to the historical development of each enterprise, decision-making habits, thinking mode of different leaders, led to its approach in formulating strategic planning system is also ifferent. The strategic planning system of the scientific program should be determined based on the each company’s actual situation. Enterprise brand, family brand (brand) category and product brand constitute the brand level, different levels of brand both relate to each other, and influence each other (Kraus, & Schwarz, 2006). For example General motors, the enterprise brand, Chevrolet is general motors' family brand (brand) category, and sail (sail) is the product brand.Gm gives customers the brand association is a U. S. auto giant, a global fortune 500 companies, has a good reputation, and so on; The Chevrolet brand is one of the largest brands, gm's global sales volume since introduced the first product in 1912, total sales has more than 100 million vehicles, market coverage to 70 countries, has a record of sales of a new car every 40 seconds. Chevrolet 2004 global sales of more than 3. million units, in the global sales of every 16 a new car is a Chevrolet, Chevrolet brand to the customer's brand association is a reliable, pragmatic, intelligent and friendly, full of vitality; And sail (sail) brand, convey the differentiation characteristics of the product. The three levels of brand together, can put enough brand messages to customers, and make customer to sail (sail) this has just set up soon products produce good brand association and brand identity. References Robinson, R. B. ; Pearce, j. A. (1988). Planned Patterns of Strategic Behavior and Their Relationship to Busi- ness-Unit Performance.Strategic Management Journal, 9, 43-60. Peter, J. , ; Donnelly, J. (2013). Marketing Management Knowledge and Skills. New York, NY: McGraw-Hill. Aldehayyat, j. S. ; Twaissi, N. (2011). Strategic Planning and Corporate Performance Relationship in Small Business Firms: Evidence from a Middle East Country Context. International Journal of Business and Management, 6 (8), 255-263. Kraus, S. , Harms, R. , ; Schwarz, E. j. (2006). Strategic Planning in Smaller Enterprises: New Empirical Findings. Management Research News, 29 (6), 334-344.

Tuesday, July 30, 2019

History Isu: Juno Beach Essay

Some of the greatest battles in Canadian history took place during the course of World War II. Most would argue it to have been Stalingrad, The Battle of the Atlantic, or even the Battle of Scheldt. The Battle at Juno Beach was a defining moment in Canadian history that led to the rise of a great nation. On June 6, 1944, after having prepared for more than four years, Canadian troops in Britain took place in an invasion that would become the greatest turning point in Canadian history. â€Å"†¦ early in the morning of June 6th, 1944 under cover of a massive air and naval bombardment, ships started ferrying 150 000 American, British, and Canadian troops across the channel of Normandy.† After courageous fighting and tremendous struggles, the Canadian, American, and British troops managed to get the farthest inland to secure a position against allied invaders. â€Å"†¦the German defences at Juno Beach had been shattered and Canada had established the beachhead.† Because Canadian troops were able to secure the beach, â€Å"Operation Overlord† led to great victories amongst the Allied Troops. Juno was the largest amphibious battle to have taken place in history. â€Å"155,000 soldiers, 5,000 ships and landing craft, 50,000 vehicles and 11,000 planes were massed for the greatest seaborne invasion in history.† Canadian troops, being the only commonwealth nation, were assigned 1 out of the 5 beaches at Normandy to secure. First, Canada was to create a beachhead on Juno beach. The American, Canadian and British troops task was to capture and seize all sea towns ashore of the beach and get further inland after breaking through enemy lines. Also, their objective was to secure the Carpiquet airport and create a link that would be able to attach the British beachheads on the other two beaches, Sword and Gold beach, and also to secure the Caen-Bayeux highway. â€Å"The challenge facing the Canadians was to overcome the coastal defences and capture ground positions that could be defended against German counter attacks.† The task the Canadians were given was one that would take a lot of courage and self-determination to push through. â€Å"†¦ Germans had turned the coastline into a continuous fortress of guns, pillboxes, wire, mines and beach obstacles.† Although the Germans had displayed strong thresholds, the allied troops managed to keep pushing their way through German defences. With the lead of Major General R.F.L Keller, the 3rd Canadian Infantry along with many men, tanks, and vehicles helped to secure and take over Juno Beach. â€Å"The 3rd Canadian Infantry Division supported by the 2nd Canadian Armoured Brigade would land on Juno beach in brigade groups. Two brigades would land in the initial assault followed later by the reserve brigade which would pass through the lead brigades on to the divisional objectives . More than 20,000 men, 200 tanks and hundreds of other vehicles were under the command of Major-General Keller.† The allied troops were successful in securing the position on Juno beach. â€Å"†¦in the face of heavy shelling and deadly machine gun fire, the Canadians fought their way past the German defences.† The troops were able to penetrate farther inland then all other allied forces could. Securing Juno beach was a huge success and as a result, has helped Canada to become a greater nation. Since Juno Beach, the troops that were involved with the invasion are greatly recognized and forever appreciated. Securing Juno Beach may have been one of the best things to have happened. After having done so, many great victories came along. They extended their beachhead further inland, and continued to move northwestward. They were able to liberate several French channel ports, which included Dieppe, which was a great success, because a number of Canadians had lost their lives at such place two years back. Also, because of such a great achievement at Juno Beach, the liberation of Europe took place, along with the defeat of Nazi-Germany, which lead up to the end of World War 2. The defeat of Nazi-Germany became a very proud accomplishment for many. â€Å"Allied to serve the common cause of freedom and democracy, Canada, Great Britain, the United States, the countries of the British Commonwealth and free nations suffering under Nazi occupation counter-attacked.† Due to Canada being able to accomplish many victories, they proved that coming together as a nation could lead to great victories and successes. Also, it helped make and build the independence of Canada. It showed that Canada is a powerful country, and doesn’t need to hold hands with Britain per se, but still work together. â€Å"So many different roads to Victory, conquered through determination and courage and at the price of many human lives.† Although â€Å"Operation Overlord† took the lives of many brave soldiers, it was one step closer to the complete defeat of Nazi-Germany. With great success comes a price, and although the capture of Juno Beach was accomplished, many soldiers were wounded, killed, or captured. â€Å"Fourteen thousand Canadians landed in Normandy on D-Day and to ensure the victory 340 Canadians had given their lives. Another 574 had been wounded and 47 taken prisoner. The casualties were less than expected, but heavy nonetheless.† Despite the many loses Canada suffered, soldiers were still encouraged to move forward and keep on fighting. The Canadian troops relied heavily on goods and services that were being shipped to them. The government greatly supported the troops, providing them with the many necessities needed to be successful. â€Å"Canadian troops relied on a tight organization and on a wide range of services that provided food, shelter, medical care, intelligence, communications and more. They also relied on ships, aircrafts, tanks and weapons needed to face the enemy.† Funding for the invasion was very costly, but in conclusion, led to great victory for the allied troops. Canada at the Battle of Normandy had a great impact on war. It changed the way many thought of the word â€Å"impossible.† After what was done, and how much was conquered, anything is possible. Being able to get further inland than any other before and securing a position that later on led to the liberation of Europe and the defeat of Nazi-Germany isn’t just a small accomplishment, it’s something that has changed the way war is seen and the way troops continue to fight. Without the necessary goods and services being sent over to the allied troops, not much would have been possible. Many brave troops stood against German defences and took their lives so the rest of their brothers could continue on and make Canada proud. â€Å"Many would die there but, for the Canadian forces, D-Day was a triumph that is still honoured at home and on the beach they called Juno.† It is with great success that Canada as a nation, is able to say proudly that they fought strongly to secure Juno beach on June 6, 1944, and because such a great event took place, the rise of a nation began. ——————————————– [ 1 ]. Jill Coyler, Jack Cecillon, Graham Draper and Margaret Hoogeveen, Creating Canada A History- 1914 to present ( McGraw-Hill Ryerson, 2010) , 239 [ 2 ]. CBC News, D-Day: The allied invasion of Normandy, 1944, http://www.cbc.ca/news/canada/story/2009/06/02/f-dday-history.html, June 5, 2009 [ 3 ]. CBC News, D-Day: The allied invasion of Normandy, 1944, http://www.cbc.ca/news/canada/story/2009/06/02/f-dday-history.html, June 5, 2009 [ 4 ]. Lane, D.W. â€Å"Juno Beach – The Canadians On D-Day†1944, http://members.shaw.ca/junobeach/juno-2.htm, Operation Overlord – Plans and Preparation [ 5 ]. Lane, D.W. â€Å"Juno Beach – The Canadians On D-Day†1944, http://members.shaw.ca/junobeach/juno-2.htm, Operation Overlord – Plans and Preparation [ 6 ]. Lane, D.W. â€Å"Juno Beach – The Canadians On D-Day†1944, http://members.shaw.ca/junobeach/juno-2.htm, Operation Overlord – Plans and Preparation [ 7 ]. Jill Coyler, Jack Cecillon, Graham Draper and Margaret Hoogeveen, Creating Canada A History- 1914 to present ( McGraw-Hill Ryerson, 2010) , 239 [ 8 ]. Juno Beach Centre, â€Å"Canada in WWII†, http://www.junobeach.org/e/2/can-eve-rod-e.htm, Roads to Victory [ 9 ]. Juno Beach Centre, â€Å"Canada in WWII†, http://www.junobeach.org/e/2/can-eve-rod-e.htm, Roads to Victory [ 10 ]. Lane, D.W. â€Å"Juno Beach – The Canadians On D-Day†1944, http://members.shaw.ca/junobeach/juno-2.htm, Operation Overlord – Conclusion [ 11 ]. Juno Beach Centre, â€Å"Canada in WWII† http://www.junobeach.o rg/e/4/can-tac-e.htm Arms & Weapons [ 12 ]. CBC News, D-day: Canadians Target Juno Beach 1944, http://archives.cbc.ca/war_conflict/second_world_war/topics/1317/ 2003

Monday, July 29, 2019

It is up to you Research Paper Example | Topics and Well Written Essays - 750 words - 1

It is up to you - Research Paper Example Why is this still existing? Are women incompetent or what? This paper aims at explaining the existence of glass ceiling at workplace in our society despite the enormous efforts towards creating equality. There are a lot of reasons why we have few women in leadership roles. First, women don’t devote more of their time to their career. A lot of men spend a considerable time on their careers. This is not the case with women. They are more family oriented than work oriented. A man, in the workplace, always dreams or receiving promotions and rising up ranks of leadership. That is not the case with women. They have family oriented mindsets which rotate around their homeplace issues. Even though a woman may be liking the kind of the leadership role she is serving, she will like to spend some of her time with her family. Women feel happy being near their children and nurturing them up. They always prefer a work/family balance which reduces their time devoted to their careers (Byron, 2005). As an employer, be sure I will prefer men for leadership responsibilities because of their readiness to work for long hours. A leader who shows value for their job is likely to be entrusted with le adership responsibilities. This feature is common with men than women hence the reason behind existence of glass ceiling. Secondly, the issue of less experience due to childbearing and childrearing with women hinder them from acquiring leadership roles. Married women are bound to get pregnant at some point in their lives. Assume that we have a very competent woman who we have just entrusted with leadership responsibilities in our organization. She falls pregnant, and we are forced to grant her maternity leave. In her absence, we need a new leader. We will be forced replace her with a competent individual to lead us. She may take long to return from her leave. Her experience will be limited by her absence in this role. Upon returning, we may not re-instate

Sunday, July 28, 2019

OBJECTIVE data collection of a patient who has Peripheral Vascular Coursework

OBJECTIVE data collection of a patient who has Peripheral Vascular Disease - Coursework Example Therefore, this indicates that she is at a higher risk of getting a peripheral vascular related disease. Her state of health was well until 9pm the night she reported to the hospital. She describes that her pain began on her lower leg when she was moving her furniture in her living room. She took some pain killers but when the pain further persisted, her husband decided to bring her in for a check-up. She denied any form of dizziness, nausea, vomiting and diaphoresis. On her physical examination, her appearance is that of a slightly slim white woman lying on the bed with an indication of severe pain in her toes.She is complaining of havingvery severe leg cramps. Based on the assumptions of the symptoms indicated by the patient, diagnostic procedures for peripheral vascular diseases are carried out. An angiogram is conducted on the veins and arteries in order to detect any form of blockage of the vessels. The Doppler technique is also conducted so as to measure the access of the flow of blood. The final test conducted is that of the treadmill exercise where by the patient is required to walk on the treadmill in order to monitor her pulse rate (Weber, Kelly & Sprengle, 2014). On inspection of the thorax and lungs there is an indication of bibasilar rales. The diaphragm moves slightly well during respiration, percussion there are signs of dullness and no rhonchi, rubs and wheezes. The x-ray taken also shows the effect of the tobacco use that the patient is inhaling into her system as dullness is seen in the chest region. On inspection of the heart and neck vessel, the cardiac examination indicates that there are no hives or thrills. The rhythm is regular with an extra heartbeat. The normal s1/s2 is narrowly split. There is a positive s4 gallop. 2/4 systolic injection murmur is being heard at the left sternal border with no radiation. The pulses can be noted for the sharp carotid upstrokes. The pulmonary vessel in

Saturday, July 27, 2019

Introduction to GPS and static positioning Essay

Introduction to GPS and static positioning - Essay Example The system was introduced by the US military but today anyone can access its services through the use of a GPS receiver (McNamara, 52). The satellite system uses a trilateration principle to determine the location of the receiver (Maini and Varsha, 428). In three dimension trilateration, the requirement for the system to generate the exact location of the receiver is a direct line of signal from at least three satellites and the distance between a receiver and the satellites (Maini and Varsha, 411). These details are obtained by the receiver from analyzing the high frequency radio signals from the satellites. This distance is derived from a calculation of the time used by the frequencies to travel from one satellite to the receiver on a location that is on earth. This measurement is only possible if the time in both the satellite and the receiver are synchronized. Otherwise the delay would not give an accurate value of the distances obtained. To synchronize the time in space and the time in the atmosphere where gravity pulls are varied requires both the receiver and the satellite to have atomic clocks. However atomic clocks are very expensive and as such, the GPS system uses an error correction method that involves the fourth satellite. From the fourth satellites transmission of signals, the inaccuracy in trilatration is appropriately adjusted (Maini and Varsha, 308). The calculation for the error adjustment by the receiver is repeated several times to make the receiver just as effective without the atomic watch for synchronization. Further errors are bound to arise in the process of calculating the distance and location of the receiver. These include the effect of delays of signals in different layers of the atmosphere. However, the speed of electromagnetic waves is not affected and travels at the same speed as that of light. In different substances, the speed is considerably reduced. These variations in the speed of the waves are

Friday, July 26, 2019

Artificial lung Research Paper Example | Topics and Well Written Essays - 1250 words

Artificial lung - Research Paper Example The respiratory system is a complex yet beautiful system to behold. The breathing that the body does cannot take place without the respiratory system. This system consists of the nose, throat, voice box, wind pipe and the lungs. â€Å"We live because we breathe. Inhaled breath brings life sustaining oxygen into our body. Oxygen is the fuel that makes our body function. Every minute we breathe in about 13 pints of air. Our lungs are essentially 2500 km of airways, through which oxygen is delivered to all parts of the body from the lungs, and carbon dioxide exhaled from the lungs is sent out into the atmosphere† (Colon, San Miguel and Zayas, 2004). â€Å"With this in mind, the scientists have developed devices that can help or replace the natural lung. These devices help our respiratory system during an operation or afterwards, but can only be used for a recuperation time† (Colon, San Miguel and Zayas, 2004). â€Å"People who need a lung-transplant can only wait and hope that a donor organ will materialize in time. But all too often, time runs out. In response to the United States' critical shortage of donor organs, researchers have been racing to develop artificial organs that would serve as a "bridge" to transplantation. One such device is the Bio Lung, which may be tested in people soon† (Downs, 2011). This device is called, the artificial lung. The only purpose of the artificial lung is to make sure that the blood has oxygen. This device is not the same as the heart-lung machine, because this one is placed inside the body and it is supposed to replace the work of the natural lungs for a long duration of time. In contrast, the heart-lung machine is outside the body and it is used for short periods, only when needed. According to Marcus (2008), â€Å"Early artificial-breathing devices include the tank respirator, or "iron lung," introduced in the late 1920s and known for its role in treating polio victims. Current treatment for lung failur e is to hook patients up to an artificial respirator. It is costly, immobile and requires intubation, a process that can cause infection, says John Conte, a heart-and-lung transplant surgeon and associate professor at Johns Hopkins University School of Medicine. ‘You don't want to take a patient who's been flat on his back, with poor muscles and infection at the IV site, and do a transplant. That's a recipe for disaster.’ Artificial lungs are small and portable, however, and are designed to allow patients to remain mobile and therefore stronger for surgery.† How the Artificial Lung Works With lungs that are healthy, the vessels that carry blood take in the oxygen that has been pumped from the heart, and after that, they let go of carbon dioxide by breathing out. â€Å"The idea was to develop a new way to study the lung that would be useful in drug development and might serve as a replacement for animal studies. The device, about the size of a pea, mimics the func tion of air sacs called alveoli, which transfer oxygen through a thin membrane from the lung to the blood. The device has three parts -- lung cells, a permeable membrane and tiny blood vessel or capillary cells† (Steenhuysen, 2010). According to Downs (2011), â€Å"The system now used in hospitals is known as ECMO, or extracorporeal membrane oxygenation. ECMO machines take over the

Relationship between natural environment, social development, and Essay

Relationship between natural environment, social development, and economic progress - Essay Example He argues that the modern world’s inequalities trace its origin to many centuries ago. He notes that archaeological discoveries and histories show that different continents were experiencing different rates of development from 11, 000 B.C. to A.D. 1500, thus resulting to inequalities that were experienced in A.D. 1500, and to a greater extent in modern times (Diamond 1). He observes that while many Native American peoples and Aboriginal Australians remained Stone Age hunter and gatherers, many Eurasian peoples and most peoples of the sub- Saharan Africa and Americas gradually developed metallurgy, complex political organization, and agriculture (Diamond 2). Environmental/ external conditions are critical for development; this assertion is greatly evident in Diamond’s discussion on Papua and its inhabitants. The inhabitants of Papua were mostly hunters and gatherers and had the simplest technology compared to most people of that time. They did not have shields, specialized stone tools, and could not start fire among other characteristics of â€Å"underdevelopment†. The environment that they lived in seemed to be the main reason leading to their situation at that time. They did not have contact with the rest of the world since the bridge that was initially linking them to the land had been severed. Prior to the coming of Europeans in the mid- seventeenth century, they were completely isolated from other humans. To make the matter worse, Papua inhabitants were not just isolated but they were also the smallest of the human population in the world (Diamond 9). As such, accumulation of innovations could not happen thus inhibit their development. Furthermore, Diamond is of the opinion that man inspired the collapse of civilizations as evidenced by Easter Island. His opinion is informed by the argument that the Europeans invaded Easter Island for slaves, in addition to spreading

Thursday, July 25, 2019

Vodafone Essay Example | Topics and Well Written Essays - 500 words

Vodafone - Essay Example Vodafone is a mobile system operator whose headquarter is in Newbury, England. It has been credited for being the biggest telecommunications network company all over the world with a market worth of close to hundred billion pounds. Currently, this company has equity benefit in twenty-five countries and associate network in forty-one countries. Vodafone’s current strategy in business is to develop through geographic extension, maintenance of present customers, attainment of fresh customers, and increase usage through technological innovation (McLoughlin and Aaker, 2010: 111). Vodafone’s results presented by the CEO on 19th May 2009 left everyone unimpressed. Before this report, it had been expected that the group would see free cash flow, increases in revenue, and adjusted profits (McLoughlin and Aaker, 2010: 111). Colao had been appointed as the CEO in July 2008with the intention that the company’s performance would boost significantly. Colao is currently employing strategies to improve Vodafone’s performance in the future. He intends to reduce costs by 1 billion dollars by the end of 2011. One of the current strategic issues is a revenue-boosting factor. This shall be guided by a push indented to convince more customers to purchase mobiles competent of linking to the internet (McLoughlin and Aaker, 2010: 111). A further strategy by the CEO is to trade telecoms services to other companies. There is a further strategy involving expansion of services to other countries. A resource based analysis of Vodafone involves an investigation of the capabilities and resources that results to its strengths and weaknesses. For a careful analysis of Vodafone’s current strategy, some essential issues affecting the company both externally and internally need to be examined. Some of these issues include political factors, infrastructure, economic factors, social-cultural factors,

Wednesday, July 24, 2019

The Berlin Conference of 1884 and Africa Research Paper

The Berlin Conference of 1884 and Africa - Research Paper Example The continent was relatively isolated from the rest of the world especially the western countries but historians have recorded early trade in Africa. Trans-Saharan trade is one of the earliest recorded commerce, carried out in Africa between eighth and 16th century (Wright, 2007). According to Wright (2007), Trans -Saharan trade was concentrated in the northern Africa and it involved countries around the Mediterranean Sea and West Africa. The trade route crossed the Saharan desert and the caravans travelled for long distances to obtain goods in various regions covered in the larger frontier. The Arabs dominated the trade and it mainly involved precious metals such as gold that was mined in West African region, ivory, salt and agricultural products. In addition, slave trade was an important component of Trans- Saharan trade, and African servants were transported to the north to work as soldiers and domestic workers (Wright, 2007 pp76-81). Conditions Leading to the Berlin Conference Th e rich gold deposits and success of the Trans-Saharan trade attracted the attention of Europeans and in the 15th century, Portuguese traders opened new trade routes along the West African coast that had rich gold deposits (Wright, 2007 p 137). ... In the mid 1870, Henry Morton successfully completed the Congo River basin expedition that had remained the last unchartered frontier in Africa (Emerson, 1979). Henry Morton was later appointed by King Leopold II of Belgium as an envoy to Congo that eventually became Congo Free State, a Belgian colony (Emerson, 1979 p69). In central Africa, France moved to the western part of the Congo basin and established Brazzaville in 1881. Great Britain conquered and occupied the Ottoman Empire in Egypt that ruled Sudan and the Somaliland. Germany declared territorial ownership of Namibia, Cameroon, and Togo while Italy claimed Eritrea in the horn of Africa in 1882 (Koponen, 1993 p124). The scramble for more African colonies generated intense competition among the European powers leading to violent conflicts and the need to have a more organized criterion for partitioning Africa became apparent. Germany had become an influential European power and other countries, including France and Britain we re aggressively seeking new colonies to assert their power in Europe. In view of the emerging power changes in Europe, Germany was determined to maintain its leading influence in Europe. Therefore, it was important to formulate a reasonable formula of partitioning African continent among the competing European powers to avoid the risk of conflict that would threaten Germany influence in Europe and the globe (Koponen, 1993, pp 129-133). The Berlin Conference At the request of Portugal, the German chancellor Otto von Bismarck invited leaders of fourteen European countries with territorial interests in Africa, and the United States for a conference in Berlin in 1884 (Collins,

Tuesday, July 23, 2019

Proposal Essay Example | Topics and Well Written Essays - 2000 words - 3

Proposal - Essay Example The section of methodology would attempt to highlight the methods that can be used to gather data especially from secondary sources in a bid to explore the forces that often influence consumer behaviour to buy brands or products associated with Arsenal FC. The major aims of the study involve an investigation of how the behaviour of the consumers is influenced by sponsors of Arsenal football club. The study would also aim to highlight the impacts of sponsorship on soccer and how it affects the performance of clubs and how it yields the overall behaviour of consumers in the UK. The study is very significant in that it would attempt to investigate the behaviour of the consumers if it is influenced by the sponsors in any way as far as soccer is concerned. The study would also aim to investigate the impact of sponsorship on the performance of football clubs. Arsenal Football Club (FC) is a UK based English Club which plays in the Premier League and is regarded as one of the richest and most successful clubs as far as English soccer is concerned. The club was founded in 1886 and is also popularly known as the ‘Gunners’ which spot traditional white and red colours. Thus, according to information obtained from Arsenal FC’s website, they have a record of winning thirteen titles in the first division as well as thirteen Premier league titles. They have also won a record ten FA cups and two League cup winners as well as eleven charity/community shield winners among others in their history and this makes them one of the most highly rated clubs in English football. The Premier League therefore is the world’s most watched league and the most prestigious according to the Premier League’s website. It attracts players from virtually the whole world and was established in 1992. Since its inception, the Premier league has strove to attract quality

Monday, July 22, 2019

Night by Elie Wiesel Essay Example for Free

Night by Elie Wiesel Essay Elie Wiesel, a famed author and survivor of the Holocaust stated quite simply that anyone who witnessed a crime, and did nothing to stop it is just as guilty as the one committing it. Elie Wiesel learned a lot about mans nature by surviving the Holocaust, but his statement about a bystander being just as guilty as the actual criminal is wrong. People are responsible for there own actions, and it is not fair to blame someone for a crime they did not commit, whether they could have done something to stop it or not. During the Holocaust there were over 6 million people persecuted, but there were many more silent bystanders who were unable to do anything because they feared for their lives. It is human nature to look after your own wellbeing and those closest to you, and many people felt if they tried to do something to stop the persecution of Jews it would endanger them in one way or another. In some cases somebody can witness a horrible atrocity, but have no power to stop it. Elie wrote in his book about how he and his fellow Jews were forced to watch the hanging of a young and innocent child by the S.S. The Jews that witnessed the hanging of the boy were all silent bystanders who, according to Elie, should be punished in the same manner that the executioner was. This shows how wrong Elies judgment is. The Jews were unable to do anything to help the boy for fear of their own lives, people cannot be blamed for their most fundamental and primitive instinct which is self preservation. Elie Wiesel experienced a lot of pain and suffering during the Holocaust, but the silent bystanders cannot be punished the same way the actual criminal is no matter what the circumstance is. If Elie truly believes that a silent bystander is just as guilty as a criminal, then that would mean that he is guilty of hanging a young innocent boy and deserves to be killed or sent to prison. Although its easy to see where Elies statement is coming from and why he chose to make it, it is clear that he made his statement more out of emotion than actual logic. I disagree with his judgment because silent bystanders do not always have the power to stop or intervene with the crime without endangering themselves.

Sunday, July 21, 2019

Mandibular Prognathism by BSSO Study

Mandibular Prognathism by BSSO Study METHODOLOGY METHODOLOGY Population Consisted of all the patients who reported to the Out Patient Department of Oral And Maxillofacial Surgery for correction of facial deformity involving maxilla and mandible. Sample Consisted of 33 patients who underwent BSSO setback for mandibular prognathism followed by Rigid Internal Fixation at the Department Of Oral And Maxillofacial Surgery, Mar Baselios Dental College. Inclusion Criteria Patients above age of 20 years for males 18 years for females. Patients who were treated by BSSO setback along with Rigid Internal Fixation for mandibular prognathism. Exclusion Criteria Patients undergoing Bimaxillary surgeries. Patients undergoing Genioplasty along with BSSO. Patients with Medically compromised conditions. Patients with Craniofacial anomalies, Syndromes. A retrospective study was conducted on 33 patients (15 females and 18 males), with mean age of 22 years (age range of 19 28 years), who were operated for mandibular prognathism by BSSO at the department of oral and maxillofacial surgery, Mar Baselios Dental College, Kothamangalam. The patients were selected according to above mentioned inclution and exclusion criterias. The surgical procedure was done by one chief operating surgeon. No maxillomandibular fixation was used postoperatively. Pre and postsurgical orthodontics was carried out at the department of orthodontics and dentofacial orthopaedics, Mar Baselios Dental College, kothamangalam. A standardised lateral skull radiograph with adequate quality and exposure was taken pre operatively and after 6 months of follow up in natural head position [Frankfurt’s horizontal plane parallel to the floor, the tongue in relaxed position and the mandible in centric occlusion] with exposure values of 80 KVp, 10 mA, and 1.30 seconds. Tracings of the lateral cephalograms were pencil traced on acetate paper. To improve the consistency the tracings and measurements were taken by the same investigator. Horizontal reference line was taken as 7 ° to SN at nasion. Vertical reference line was constructed perpendicular to horizontal reference line through Sella. Superimposition of traced preoperative and postoperative lateral cephalogram was done with respect to the horizontal and vertical reference lines. The following cephalometric points and measurements were used. S Sella: Center of sella turcica N Nasion: Most anterior point of frontonasal suture ANS Anterior Nasal Spine: Anterior tip of the nasal spine PNS Posterior Nasal Spine: The most posterior aspect of the palatal bone A Point A: Innermost point on contour of maxilla between anterior nasal spine and incisor tooth Is Incision Superior: Midpoint of incisal edge of most prominent maxillary central incisor Ii Incision Inferior: Midpoint of incisal edge of most prominent mandibular central incisor B Point B: Innermost point on contour of mandible between incisor tooth and bony chin PG Pogonion: Most anterior point on osseous contour of chin ME Menton: Most inferior midline point on mandibular symphysis Cm Columella point: Midpoint of columella of nose Sn Subnasale: Point at which columella merges with upper lip in midsagittal plane SLS Superior Labial Sulcus: Point of greatest concavity in middle of upper lip between subnasale and labrale superius Ls Labrale Superius: Most anterior point of upper lip Li Labrale Inferius: Most anterior point of lower lip SLI Inferior Labial Sulcus: Point of greatest concavity in midline of lower lip between labrale inferius and soft tissue pogonion pg’ Soft Tissue Pogonion: Most prominent or anterior point on chin in midsagittal plane me’ Soft Tissue Menton: Lowest point on contour of soft tissue chin Stoms Stomion Superius: Most inferior point of upper lip Stomi Stomion Inferius: Most superior point of lower lip Sn-Stoms Upper lip length Stomi-me Lower lip length G-Sn-PG’ Facial Convexity: Angle between soft tissue glabella, subnasale and soft tissue pogonion Cm-Sn-Ls Nasolabial Angle: Angle between columella and labrale superius Li-SLI-pg’ Labiomental Fold: Angle between lower lip and chin contour Research methodology In the horizontal plane linear changes at following hard tissue [ANS, A, Is, Ii, B, PG, ME] and soft tissue [Sn, SLS, Ls, Li, SLI, pg’, me’, Stoms, Stomi] cephalometric points were measured in millimeters with mean and standard deviations were calculated. In the vertical plane linear changes at following hard tissue [ANS, A, Is, Ii, B, PG, ME] and soft tissue [Sn, SLS, Ls, Li, SLI, pg’, me’, Stoms, Stomi] cephalometric points were measured in millimeters with mean and standard deviations were calculated. Scatter plot diagram with Correlation Regression Analysis was done for the following points Li vs Ii, SLI vs B, PG vs pg’, ME vs me’ were done in both horizontal and vertical plane. Change in length of lower third of face; upper lip [Sn-Stoms] length and lower lip [Stomi-me] length were calculated along with mean and standard deviation. The mean change in facial profile, Nasolabial angle and mentolabial fold were calculated. The ratio of change in the soft tissue reference points will be compared with movements of corresponding 4 hard tissue references: Li to Ii, SLI to B, PG to pg’ and ME to me’ in the horizontal plane. SURGICAL PROCEDURE All the patients had undergone BSSO for correction of horizontal mandibular excess [mandibular prognathism]. All surgeries were carried out by the same surgeon. During the positioning of the patient before surgery the head end of the table is tilted by about 15 °. Hypotensive anaesthesia technique was used. Both these are intended to reduce intra operative bleeding. At the beginning of the procedure 2% lignocaine hydrochloride with 1: 2,00,000 epinephrine is infiltrated into the buccal vestibule upto the midramus region of the mandible on both sides. Incision and dissection The incision is placed over the anterior aspect of the ramus extending from the midramus region running down over the external oblique ridge upto the first molar region where it curves down to the buccal vestibule. Retracting the soft tissues buccally, before placing the incision prevents the initial exposure of the buccal fat pad. A sharp dissection is done in the ramus upto the periosteum. Periosteal dissection is started on the lateral aspect of the mandibular body from anterior ramus upto the second molar region extending to the inferior border. On the lateral aspect of the ramus dissection may be minimal only to achieve proper access and visibility. Medial dissection is done subperiosteally with a Howarth’s periosteal elevator and should be above the level of lingula and mandibular foramen which usually coincides with the deepest concavity of the anterior border of ramus. Later a channel retractor is inserted for medial retraction so as to protect the mandibular neurovascular bundle. Osteotomy Osteotomy is done with surgical micromotor and burs. Its initiated on the cortical bone of the medial side of ramus above the lingula extending from behind the mandibular foramen [half to two-third of the anteroposterior dimension of the ramus] running down onto the superior aspect of the body of the mandible and then extended to the external oblique ridge over the lateral aspect of the mandibular body upto the 1st molar region. Extending the cut towards the 1st molar region gives better accessibility for intraoral plating. The depth of the cut should be minimal only to reach the cancellous bone. The vertical cut is extended to include the inferior border so that the direction of the split is controlled. During the vertical cut a channel retractor is placed on the lateral aspect so as to protect the buccal soft tissues and facial artery. Following the osteotomy, a small spatula osteotome is malleted into the site beginning from the medial cut, down the ramus, over the body upto the vertical cut. The spatula osteotome is directed laterally beneath the cortical plate so that the neurovascular bundle is protected. Later larger osteotomes are used and finally the fragments are prised apart using a Smith spreader. As the fragments are prised the neurovascular bundle is visualized and care is taken to maintain it to the medial tooth bearing fragment. If the neurovascular bundle is found to be attached to the proximal condylar segment a small periosteal elevator is used to free the bundle and bring it to the medial fragment. Once this is done osteotomes in a wedging fashion or the Smith spreader is used vigourously until the spilt of the fragments are completed. The osteotomy is repeated on the opposite side of the mandible. When the mandible is setback, release of the medial pterygoid and masseter muscle is stripped, if needed to prevent the displacement of the condylar segment posteriorly. Later the tooth bearing medial segment is pushed back as much as needed and the overlapping buccal plate of the proximal condylar segment is trimmed such that the proximal segment rest passively on the cancellous part of medial segment with condyle in proper position. Stabilization and fixation The position of jaw is adjusted and intermaxillary fixation is done with splint in position. Rigid internal fixation using 2mm four hole mini plate with gap and 2 Ãâ€" 6mm monocortical screws is the preferred way of fixation. The intermaxillary fixation is removed after the rigid fixation. Wound closure Wounds are irrigated and bleeding is controlled. Wounds are closed with 3-0 vicryl sutures in layers. 1

Uses Of Computer Network Data Transmission Modes Information Technology Essay

Uses Of Computer Network Data Transmission Modes Information Technology Essay We all are aware with some sorts of communication in our day to day life. For communication of information and messages we use telephone and postal communication systems. Similarly data and information from one computer system can be transmitted to other systems across geographical areas. Thus data transmission is the movement of information using some standard methods. These methods include electrical signals carried along a conductor, optical signals along an optical fibers and electromagnetic areas. Suppose a Managing Director of a company has to write several letters to various employees . First he has to use his PC and Word Processing package to prepare his letter. If the PC is connected to all the employees PCs through networking, he can send the letters to all the employees within minutes. Thus irrespective of geographical areas, if PCs are connected through communication channel, the data and information, computer files and any other program can be transmitted to other computer systems within seconds. The modern form of communication technologies like e-mail and Internet is possible only because of computer networking. Computers are powerful tools. When they are connected in a network, they become even more powerful because the functions and tools that each computer provides can be shared with other computers. Networks exist for one major reason: to share information and resources. Networks can be very simple, such as a small group of computers that share information, or they can be very complex, covering large geographical areas. Regardless of the type of network, a certain amount of maintenance is always required. Because each network is different and probably utilizes many various technologies, it is important to understand the fundamentals of networking and how networking components interact. In the computer world, the term network describes two or more connected computers that can share resources such as data, a printer, an Internet connection, applications, or a combination of these. Prior to the widespread networking that led to the Internet, most communication networks were limited by their nature to only allow communications between the stations on the network. Some networks had gateways or bridges between them, but these bridges were often limited or built specifically for a single use. One common computer networking method was based on the central mainframe method, simply allowing its terminals to be connected via long leased lines. This method was used in the 1950s by Project RAND to support researchers such as Herbert Simon, in Pittsburgh, Pennsylvania, when collaborating across the continent with researchers in Santa Monica, California, on automated theorem proving and artificial intelligence. At the core of the networking problem lay the issue of connecting separate physical networks to form one logical network. During the 1960s, several groups worked on and implemented packet switching. Donald Davies, Paul Baran and Leonard Kleinrock are credited with t he simultaneous invention. The notion that the Internet was developed to survive a nuclear attack has its roots in the early theories developed by RAND. Barans research had approached packet switching from studies of decentralisation to avoid combat damage compromising the entire network. By mid-1968, Taylor had prepared a complete plan for a computer network, and, after ARPAs approval, a Request for Quotation (RFQ) was sent to 140 potential bidders. Most computer science companies regarded the ARPA-Taylor proposal as outlandish, and only twelve submitted bids to build the network; of the twelve, ARPA regarded only four as top-rank contractors. At years end, ARPA considered only two contractors, and awarded the contract to build the network to BBN techologies on 7 April 1969. The initial, seven-man BBN team were much aided by the technical specificity of their response to the ARPA RFQ and thus quickly produced the first working computers. The BBN-proposed network closely followed Taylors ARPA plan: a network composed of small computers called Interface message processor (IMPs), that functioned as gateways (today routers) interconnecting local resources. At each site, the IMPs performed store-and-forward packet switching functions, and were interconnected with modems that were connected to leased line, initially running at 50 kilobit/second. The host computers were connected to the IMPs via custom serial communication interfaces. The system, including the hardware and the packet switching software, was designed and installed in nine months. The first-generation IMPs were initially built by BBN Technologies using a rough computer version of the Honeywell DDP-516 computer configured with 24 Kilobyte of expandable core memory, and a 16-channel Direct Multiplex Control (DMC) Direct Memory Access unit. The DMC established custom interfaces with each of the host computers and modems. In addition to the front-panel lamps, the DDP-516 computer also features a special set of 24 indicator-lamps showing the status of the IMP communication channels. Each IMP could support up to four local hosts, and could communicate with up to six remote IMPs via leased lines. 1.2 ARPANET The Advanced Research Projects Agency Network (ARPANET), was the worlds first operational Packet Switching network and the core network of a set that came to compose the global Internet. The network was created by a small research team at the Massachusettas Institute of Technology and the Defense Advanced Research Projects Agency (DARPA) of the Defence Department of United States. The packet switching of the ARPANET was based on designs by Lawrence Roberts of the Lincoln Laboratories. Packet switching is the dominant basis for data communications worldwide and it was a new concept at the time of the conception of the ARPANET. Data communications had been based on the idea of Circuit Switching, as in the traditional telephone circuit, wherein a telephone call reserves a dedicated circuit for the duration of the communication session and communication is possible only between the two parties interconnected. With packet switching, a data system could use one communications link to communicate with more than one machine by collecting data into Datagram and transmit these as Packet onto the attached network link, whenever the link is not in use. Thus, not only could the link be shared, much as a single PostBox can be used to post letters to different destinations, but each packet could be routed independently of other packets. 1.3 SNA Systems Network Architecture (SNA) is IBMs proprietary Computer Network architecture created in 1974. It is a complete Protocol Stack for interconnecting Computer and their resources. SNA describes the protocol and is, in itself, not actually a program. The implementation of SNA takes the form of various communications packages, most notably Virtual telecommunications access method (VTAM) which is the mainframe package for SNA communications. SNA is still used extensively in banks and other financial transaction networks, as well as in many government agencies. While IBM is still providing support for SNA, one of the primary pieces of hardware, the IBM 3745/3746 communications controller has been withdrawn from marketing by the IBM Corporation. However, there are an estimated 20,000 of these controllers installed and IBM continues to provide hardware maintenance service and micro code features to support users. A strong market of smaller companies continues to provide the 3745/3746, features, parts and service. VTAM is also supported by IBM, as is the IBM Network Control Program (NCP) required by the 3745/3746 controllers. IBM in the mid-1970s saw itself mainly as a hardware vendor and hence all its innovations in that period aimed to increase hardware sales. SNAs objective was to reduce the costs of operating large numbers of terminals and thus induce customers to develop or expand Interactive terminal based-systems as opposed to Batch Processing systems. An expansion of interactive terminal based-systems would increase sales of terminals and more importantly of mainframe computers and peripherals partly because of the simple increase in the volume of work done by the systems and partly because interactive processing requires more computing power per transaction than batch processing. Hence SNA aimed to reduce the main non-computer costs and other difficulties in operating large networks using earlier communications protocols. The difficulties included: A communications line could not be shared by terminals whose users wished to use different types of application, for example one which ran under the control of CICS and another which ran under Time Sharing Option. Often a communications line could not be shared by terminals of different types, as they used different vernacular of the existing communications protocols. Up to the early 1970s, computer components were so expensive and bulky that it was not feasible to include all-purpose communications interface cards in terminals. Every type of terminal had a Hardwired Control communications card which supported only the operation of one type of terminal without compatibility with other types of terminals on the same line. The protocols which the primitive communications cards could handle were not efficient. Each communications line used more time transmitting data than modern lines do. Telecommunications lines at the time were of much lower quality. For example, it was almost impossible to run a dial-up line at more than 300 bits per second because of the overwhelming error rate, as comparing with 56,000 bits per second today on dial-up lines; and in the early 1970s few leased lines were run at more than 2400 bits per second (these low speeds are a consequence of Shannon-Hartly Theorm in a relatively low-technology environment). Telecommunications companies had little incentive to improve line quality or reduce costs, because at the time they were mostly monopolies and sometimes state-owned. As a result running a large number of terminals required a lot more communications lines than the number required today, especially if different types of terminals needed to be supported, or the users wanted to use different types of applications (.e.g. under CICS or TSO) from the same location. In purely financial terms SNAs objectives were to increase customers spending on terminal-based systems and at the same time to increase IBMs share of that spending, mainly at the expense of the telecommunications companies. SNA also aimed to overcome a limitation of the architecture which IBMs System/370 mainframes inherited from System/360. Each CPU could connect to at most 16 channels (devices which acted as controllers for peripherals such as tape and disk drives, printers, card-readers) and each channel could handle up to 16 peripherals i.e. there was maximum of 256 peripherals per CPU. At the time when SNA was designed, each communications line counted as a peripheral. Thus the number of terminals with which powerful mainframe could otherwise communicate is severely limited. SNA removed link control from the application program and placed it in the NCP. This had the following advantages and disadvantages: Advantages Localization of problems in the telecommunications network was easier because a relatively small amount of software actually dealt with communication links. There was a single error reporting system. Adding communication capability to an application program was much easier because the formidable area of link control software that typically requires interrupt processors and software timers was relegated to system software and NCP. With the advent of APPN, routing functionality was the responsibility of the computer as opposed to the router (as with TCP/IP networks). Each computer maintained a list of Nodes that defined the forwarding mechanisms. A centralized node type known as a Network Node maintained Global tables of all other node types. APPN stopped the need to maintain APPC routing tables that explicitly defined endpoint to endpoint connectivity. APPN sessions would route to endpoints through other allowed node types until it found the destination. This was similar to the way that TCP/IP routers function today. Disadvantages Connection to non-SNA networks was difficult. An application which needed access to some communication scheme, which was not supported in the current version of SNA, faced obstacles. Before IBM included X.25 support (NPSI) in SNA, connecting to an X.25 network would have been awkward. Conversion between X.25 and SNA protocols could have been provided either by NCP software modifications or by an external protocol converter. A sheaf of alternate pathways between every pair of nodes in a network had to be predesigned and stored centrally. Choice among these pathways by SNA was rigid and did not take advantage of current link loads for optimum speed. SNA network installation and maintenance are complicated and SNA network products are (or were) expensive. Attempts to reduce SNA network complexity by adding IBM Advanced Peer-to-Peer Networking functionality were not really successful, if only because the migration from traditional SNA to SNA/APPN was very complex, without providing much additional value, at least initially. The design of SNA was in the era when the concept of layered communication was not fully adopted by the computer industry. Applications, Database and communication functions were come together into the same protocol or product, to make it difficult to maintain or manage. That was very common for the products created in that time. Even after TCP/IP was fully developed, X Window system was designed with the same model where communication protocols were embedded into graphic display application. SNAs connection based architecture invoked huge state machine logic to keep track of everything. APPN added a new dimension to state logic with its concept of differing node types. While it was solid when everything was running correctly, there was still a need for manual intervention. Simple things like watching the Control Point sessions had to be done manually. APPN wasnt without issues; in the early days many shops abandoned it due to issues found in APPN support. Over time, however, many of the issues were worked out but not before the advent of the Web Browser which was the beginning of the end for SNA. 1.4 X.25 and public access Following on from DARPAs research, packet switching networks were developed by the International Telecommunication Union (ITU) in the form of X.25 networks. In 1974, X.25 formed the basis for the SERCnet network between British academic and research sites, which would later become JANET. The initial ITU Standard on X.25 was approved in March 1976. The British Post Office, Western Union International and Tymnet collaborated to create the first international packet switched network, referred to as the International Packet Switched Service (IPSS), in 1978. This network grew from Europe and the US to cover Canada, Hong Kong and Australia by 1981. By the 1990s it provided a worldwide networking infrastructure. Unlike ARPAnet, X.25 was also commonly available for business use. X.25 would be used for the first dial-in public access networks, such as Compuserve and Tymnet. In 1979, CompuServe became the first service to offer electronic mail capabilities and technical support to personal computer users. The company broke new ground again in 1980 as the first to offer real-time chat with its CB Simulator. There were also the America Online (AOL) and Prodigy dial in networks and many bulletin board system (BBS) networks such as The WELL and FidoNet. FidoNet in particular was popular amongst hobbyist computer users, many of them hackers and radio amateurs. 1.5 UUCP In 1979, two students at Duke University, Tom Truscott and Jim Ellis, came up with the idea of using simple Bourne shell scripts to transfer news and messages on a serial line with nearby University of North Carolina at Chapel Hill. Following public release of the software, the mesh of UUCP hosts forwarding on the Usenet news rapidly expanded. UUCPnet, as it would later be named, also created gateways and links between FidoNet and dial-up BBS hosts. UUCP networks spread quickly due to the lower costs involved, and ability to use existing leased lines, X.25 links or even ARPANET connections. By 1983 the number of UUCP hosts had grown to 550, nearly doubling to 940 in 1984 1.6 Uses of Computer Networks Computer networks have many uses in present life. However, the usage goes on increasing from day to day, More and more people use networks for their corresponding applications and thus increasing the area of usage. However, we categorize the usage of computer network as follows Resource Sharing: The global here is to make all programs equipment and especially data available to anyone on the network without regard to the physical location of the resource and the user. High Reliability: Always all the files could be replicated on one or more machine. So if one of them is unavailable the other copies could be used for the reference. Saving money: Small computers have a much better price / performance ratio than larger ones .Mainframes are roughly a factor of ten faster than personal computers, but they cost Thousand times more. This imbalance has caused many system designers to build systems Consisting of personal computers, with data kept on more than one machine Communication medium: A computer network can provide a powerful communication medium among widely separated employees. Using a network, it is easy for two or more people who live far apart to write a report together. When one person makes a change, the other can easily look into that and convey his acceptance. Access to remote information: Many People, pay their bills, manage their accounts, Book tickets, electronically. Home shopping has also become popular, with the ability to inspect the on-line catalogs of thousands of companies. There are also cases where people are able to get information electronically. Email: Electronic Mail or E-Mail is an application through which a person can communicate With another person present anywhere. E Mail is used today by millions of people and they Can send audio or video in addition to text. WWW (World Wide Web) : A main application that falls into the application category is access to information systems like the current World wide Web, which contains information about arts, books, business, cooking, government, health so on. 1.7. Data Transmission Modes: Data communication circuits can be configured in a huge number of arrangements depending on the specifics of the circuit, such as how many stations are on the circuit, type of transmission facility, distance between the stations, how many users at each station and so on. Data communication circuits can however be classified as either two point or multipoint . A two-point configuration involves only two stations, whereas a multipoint configuration involves more than two stations. Regardless of configuration, each station can have one or more computers, computer terminals or workstations. A two point circuit involves the transfer of digital information from a mainframe computer and a personal computer, two mainframe computers, two personal computers or two data communication networks. A multipoint network is generally used to interconnect a single mainframe computer to many personal computers or to interconnect many personal computers. Coming to transmission modes, there are four modes of transmission for data communication circuits namely- 1. Simplex 2. Half-Duplex 3. Full Duplex Simplex In a simplex mode, the transmission of data is always unidirectional. Information will be sent always only in one direction Simplex lines are also called receive-only, transmit-only, or one-way-only lines. A best example of simplex mode is Radio and Television broadcasts. Fig. 1.1 Simplex Communication Half-Duplex In the half-duplex mode, data transmission is possible in both the directions but not at the same time. When one device is sending, the other can only receive, and vice-versa. These communication lines are also called two-way-alternate or either-way lines. Fig. 1.2 Half Duplex Communication Full Duplex In the full-duplex mode, the transmissions are possible in both directions simultaneous, but they must be between the same two stations. Full-duplex lines are also called two-way simultaneous duplex or both-way lines. A good example for full-duplex transmission is a telephone Fig. 1.3 Full Duplex Communication Types of Data Transmission Modes There are two types of data transmission modes. These are: Parallel Transmission Serial Transmission 1. Parallel Transmission In parallel transmission, bits of data flow concurrently through separate communication lines. Parallel transmission is shown in figure below. The automobile traffic on a multi-lane highway is an example of parallel transmission. Inside the computer binary data flows from one unit to another using parallel mode. If the computer uses 32-bk internal structure, all the 32-bits of data are transferred simultaneously on 32-lane connections. Similarly, parallel transmission is commonly used to transfer data from computer to printer. The printer is connected to the parallel port of computer and parallel cable that has many wires is used to connect the printer to computer. It is very fast data transmission mode. 2. Serial Transmission In serial data transmission, bits of data flow in sequential order through single communication line. Serial dat transmission is shown in figure below. The flow of traffic on one-lane residential street is an example of serial data transmission mode. Serial transmission is typically slower than parallel transmission, because data is sent sequentially in a bit-by-bit fashion. Serial mouse uses serial transmission mode in computer. Synchronous Asynchronous Transmissions Synchronous Transmission In synchronous transmission, large volumes of information can be transmitted at a time. In this type of transmission, data is transmitted block-by-block or word-byword simultaneously. Each block may contain several bytes of data. In synchronous transmission, a special communication device known as synchronized clock is required to schedule the transmission of information. This special communication device or equipment is expensive. Asynchronous Transmission In asynchronous transmission, data is transmitted one byte at a time. This type of transmission is most commonly used by microcomputers. The data is transmitted character-by-character as the user types it on a keyboard. An asynchronous line that is idle (not being used) is identified with a value 1, also known as Mark state. This value is used by the communication devices to find whether the line is idle or disconnected. When a character (or byte) is about to be transmitted, a start bit is sent. A start bit has a value of 0, also called a space state. Thus, when the line switches from a value of 1 to a value of 0, the receiver is alerted that a character is coming.

Saturday, July 20, 2019

Biography of Martin Luther :: Protestant Reformation World History Essays

Biography of Martin Luther Martin Luther , who was born in 1483,remains in history known as on of the few unique forces that changed the world fundamentally by force of will and by his ideas. The people who support him call him the â€Å"Protestant hero, a freedom fighter, and a wise insightful church leader.† But there are many people who do not like and the names they call him are a â€Å"heretic, an apostate, and a profane ecclesiastical terrorist.† Often Luther called himself a simple monk or a simple Christian. He was glad that a straight-forward stand of sense of right and wrong had turned him into one of the most talked about people of his time. Little did he know that, that simple Christian and that simple stand for what is right and what is wrong changed the course of World History. I will explain Martin Luther in four main parts of his life. First, his early years; second, Luther’s struggle to find peace and his discovery of grace; third, his problems with the sell of indulg ences; and finally, Luther’s death and legacy. First of all, Martin Luther’s early years of his life. Martin Luther was born to Hans and Margaretta Luther on November 10, 1483 in Eisleben, Germany. He was baptized on the feast day of St. Martin of Tours , of which he was named of. His father owned and worked a copper mine in the nearby town of Mansfeld. Having come from peasantry, his father was determined to see his son rise up to civil service and bring more honor to the family. To achieve this goal Hans sent Martin Luther to schools in Mansfeld, Magdeburg, and Eisenach. When he was seventeen, in 1501, he entered the University of Erfurt. There he received a Bachelors degree in 1502 and a masters degree in 1505. Trying to fulfill his fathers wishes he enrolled in the law school of that university. Little did he know that all that was about to change. While riding a horse during a thunderstorm in the summer of 1505 a lightning bolt struck near him while returning to school. Being in a terrified state he cried out, â €Å"Help, St. Anne I’ll become a monk † Luther was spared his life and so he kept his promise and entered the monastery at his law school.

Friday, July 19, 2019

Shakespeares Hamlet - King Claudius :: GCSE English Literature Coursework

Hamlet’s King Claudius      Ã‚  Ã‚   Salvador de Madariaga in â€Å"Rosencrantz and Guildenstern† discusses from Shakespeare’s Hamlet Claudius’ relationship with the two emissaries and friends of Hamlet, who were escorting the prince to his execution in England:    The two young men receive from the King a commission which, whatever the King’s secret intentions may be, is honorable. Hamlet, the King in fact tells them, is not what he was. The cause of the change "I cannot dream of."    Therefore, I beg you so by your companies    To draw him on to pleasures, and to gather So much as from occasion you may glean Whether aught to us unknown afflicts him thus That opened lies within our remedy. (n. pag.)    Is Madariaga correct in saying that Rosencrantz and Guildenstern were innocent pawns in the hands of a cunning king? This essay intends to present other critical points of view on this and other questions concerning the character of King Claudius.    The drama opens after Hamlet has just returned from Wittenberg, England, where he has been a student. What brought him home was the news of his father’s death and his father’s brother’s quick accession to the throne of Denmark. Philip Burton in â€Å"Hamlet† discusses Claudius’ sudden rise to the Danish throne upon the death of King Hamlet I:    The fact that Claudius has become king is not really surprising. Only late in the play does Hamlet complain that his uncle had "popped in between the election and my hopes." The country had been in a nervous state expecting an invasion by young Fortinbras, at the head of a lawless band of adventurers, in revenge for his father’s death at the hands of King Hamlet. A strong new king was immediately needed; the election of Claudius, particularly in the absence of Hamlet, was inevitable. What is more, it was immediately justified, because Claudius manages to dispel the threat of invasion by appealing to the King of Norway to curb his nephew, Fortinbras; the ambitious young soldier was the more ready to cancel the projected invasion because the object of his revenge, Hamlet’s father, was now dead, and in return he received free passage through Denmark to fight against Poland. (n. pag.)    G. Wilson Knight in "The Embassy of Death" also interprets the character of Claudius as less guilty than he appears to most critics: Shakespeare's Hamlet - King Claudius :: GCSE English Literature Coursework Hamlet’s King Claudius      Ã‚  Ã‚   Salvador de Madariaga in â€Å"Rosencrantz and Guildenstern† discusses from Shakespeare’s Hamlet Claudius’ relationship with the two emissaries and friends of Hamlet, who were escorting the prince to his execution in England:    The two young men receive from the King a commission which, whatever the King’s secret intentions may be, is honorable. Hamlet, the King in fact tells them, is not what he was. The cause of the change "I cannot dream of."    Therefore, I beg you so by your companies    To draw him on to pleasures, and to gather So much as from occasion you may glean Whether aught to us unknown afflicts him thus That opened lies within our remedy. (n. pag.)    Is Madariaga correct in saying that Rosencrantz and Guildenstern were innocent pawns in the hands of a cunning king? This essay intends to present other critical points of view on this and other questions concerning the character of King Claudius.    The drama opens after Hamlet has just returned from Wittenberg, England, where he has been a student. What brought him home was the news of his father’s death and his father’s brother’s quick accession to the throne of Denmark. Philip Burton in â€Å"Hamlet† discusses Claudius’ sudden rise to the Danish throne upon the death of King Hamlet I:    The fact that Claudius has become king is not really surprising. Only late in the play does Hamlet complain that his uncle had "popped in between the election and my hopes." The country had been in a nervous state expecting an invasion by young Fortinbras, at the head of a lawless band of adventurers, in revenge for his father’s death at the hands of King Hamlet. A strong new king was immediately needed; the election of Claudius, particularly in the absence of Hamlet, was inevitable. What is more, it was immediately justified, because Claudius manages to dispel the threat of invasion by appealing to the King of Norway to curb his nephew, Fortinbras; the ambitious young soldier was the more ready to cancel the projected invasion because the object of his revenge, Hamlet’s father, was now dead, and in return he received free passage through Denmark to fight against Poland. (n. pag.)    G. Wilson Knight in "The Embassy of Death" also interprets the character of Claudius as less guilty than he appears to most critics:

Movie Review: The Mirror Has Two Faces :: essays research papers

Movie Review: The Mirror Has Two Faces The movie stares Barbara Streisand as Rose Morgan a lonely, single, low self esteemed woman who lives with her domineering mother Hannah Morgan played by Lauren Becall in New York. Jeff Bridges who plays Gregory Larkin a math instructor at Columbia University is a man in search of the perfect woman who is not interested in sex but only companship. Greg places a personal ad in a singles paper and receives enormous response. He reviews the responses to his ad and decides on a response that featured Rose. Greg calls the number on the response and a woman answers the phone who is Roses sister Claire. Claire explains to Greg that she responded to the ad without Roses consent and that Rose is not a women of great beauty. Greg explains that he is not in search of a woman with great beauty, just a woman for companship. Greg calls Rose on the telephone and the two decide to have dinner as friends. They adore each others companship and start to spend more and more time together as best friends. They become extremely flexibly enmeshed and are very compatible with each other. As time passes and they grow closer to each other they decide to get married by the justice of the peace. Roses mother who is dependent on her objects to the idea and thinks the marriage is wrong. She uses plenty of guilt trying to persuade Rose not to marry Greg. The marriage takes place and the Rose moves into Greg's apartment where their are separate twin beds for Rose and Greg. The first night of living together Greg indirectly suggests the two should have sex. Rose does not understand and falls asleep on Greg. As time passes and the two start to become flexibly connected and share their most hidden secrets with each other. Greg accepts a three month job offer over seas. Rose agrees that he should jump at the opportunity and supports him in his decision. Rose decides that the arrangement of a no sex marriage is not going to work. She decides one night before Greg leaves for three months to seduce him into having sex with her. Greg objects to the idea after about five minuets and explains his feelings to Rose which infuriates her causing her to run back to her mothers chaotically enmeshed home. Greg leaves for work over seas calling Rose on the telephone every spare minute he has only to be greeted by her jealous and domineering mother stating she is not home or available unknown to Rose.