Tuesday, December 31, 2019

Sojourner Truth, An Abolitionist And Women s Rights

Sojourner Truth, an abolitionist and women’s rights activist, was very important to United States history. She did many things in her life to help and improve our country. Sojourner Truth was very brave and not afraid to stand up for what she believed in. She knew that the racism in that time period in the United States was not right, so she did everything she could to fix it. Sojourner Truth not only helped our country, but she also made the United States a better place to live in. Sojourner Truth was born in 1797, in Ulster County, New York. Her birth name was Isabella Baumfree, but she changed it to Sojourner Truth when she got older. Her parents were James and Elizabeth Baumfree, but were owned by Colonel Hardenbergh. She lived with her family on their slave owner’s estate. Sojourner Truth was born into slavery, and spent her childhood as a slave. She was taken away from her family, when she was sold at an auction, at nine years old. She was sold many more times after that. When she was sold the last time, Sojourner Truth ended up on the property of John Dumont, at West Park, New York. Dutch was the main language Sojourner Truth spoke. Her childhood slave owner, Colonel Hardenbergh, spoke Dutch. She learned how to speak English for the first time with her final slave owner, John Dumont. In 1815, Sojourner Truth fell in love with another slave named Robert. Robert was owned by slave owners from a neighboring farm. They had a daughter, name d Diana,Show MoreRelatedNarrative Of Sojourner Truth1559 Words   |  7 Pagesheritage of glory.† Written by Sojourner Truth (The Narrative of Sojourner Truth) To many people the name Sojourner Truth may sound old, outdated or may even sound obsolete, all things considered that it is one name that should live on in within the hearts of every American and it should receive praise from years to come. Sojourner Truth was an American legend, one that worked for freedom of slaves, women rights and equality for all. We should reflect on Sojourner Truth on account of each speech sheRead MoreSojourner Truth : Black Truth1521 Words   |  7 Pagesin America. Sojourner Truth was both of these things and worked her entire life to get the rights she deserved. Though she never lived to get all of her rights, she was an influential figure in working towards these rights. Sojourner Truth was one of the most famous orators of her time, speaking out against slavery and inequality to anyone who would listen. Being born into slavery, Sojourner Truth witnessed many injustices and, as a result, worked her entire life to fight for the rights of others byRead M ore Sojourner Truth - Ex-slave and Fiery Abolitionist Essay1286 Words   |  6 PagesSojourner Truth - Ex-slave and Fiery Abolitionist According to many sources â€Å"Ain’t I a Woman?† is Sojourner Truths most recognized impromptu speech. The speech was given at a women’s rights convention in Akron, Ohio in 1851. Frances Gage, a feminist activist and author, recorded the event. The speech was published more than twelve years later in 1863. Frances Gage reported that Truth encountered hissing and hostility as she began to speak. Yet there is much debate and conflicting reportsRead MoreSojourner Truth And Maya Angelou Essay1505 Words   |  7 Pagescenturies, Maya Angelou and Sojourner Truth led parallel fights for African American equality. Despite living in different time periods, both of these women laid the groundwork for activists to come. Sojourner Truth was born into slavery in 1797, she later escaped which led her to become an abolitionist to fight for the freedom of others. Maya Angelou was born almost 150 years later in 1928, and faced much of the same hate-fuelled racism. Living in the south during the Civil Rights Era pushed Angelou toRead MoreSojourner Truth During The Late 1700 s And Early 1800 S1127 Words   |  5 PagesSojourner Truth played a vital role in inspiring people to stand up against slavery and injustice. She stood up for herself and every African-American. She had the courage to stand up an d leave her slave owner. She stood up for herself and her son in court when he was sold illegally to a slave owner in a different state. She had the moxy to become a public figure and talk about injustice against women and African-American slaves. In the late 1700’s and early 1800’s, no one had ever heard of a womanRead MoreWomen s Rights And Abolitionist Movement Essay985 Words   |  4 PagesBeginning of Women’s Rights Abolitionist Movement Women’s Rights Abolitionists Back in the nineteenth century men and women were not treated equally as they are now. Women did not have as much freedom as the men did and that caused a national movement. Not only were the women segregated from the men, but the discrimination against the African American race was a huge ordeal as well. With both movements combined, it led to a controversial development at that time. Not only were women fighting forRead MoreWomen s Rights By Margaret Brent1213 Words   |  5 PagesWomen’s rights did not officially begin to be a problem until 1848. Many believe that it’s been a problem from at most the 1600’s. Colonial women didn’t give a thought about their rights, but there were some female political leaders. Margaret Brent, a woman who had been given power-of-attorney from Lord Baltimore. Judith Sargent Stevens Murray, the writer of the United States’ first feminist theory. â€Å"Will it be said that the judgment of a male of two years ol d is more sage than that of a female theRead MoreSojourner Truth By Nell Irvin1257 Words   |  6 PagesSojourner Truth is an ex-slave and fiery abolitionist who dazzles listeners with her wit and originality. She is straight talking and unsentimental, Truth became a national symbol for strong black woman. Like Harriet Tubman and Frederick Douglass, she is regarded as a radical of immense and enduring influence; however, she is more remembered more for her myths than her personality. In the book, Sojourner Truth A Life, A Symbol, the author Nell Irvin Painter, goes beyond the myths, words, and photographsRead MoreAfrican American Women During The Civil War1137 Words   |  5 PagesAfrican American Women In American history there have been many truly extraordinary women. These women range from all different time periods, races and other backgrounds. Over the years women have participate or become involved in multiple different themes including: politics, midwives or physicians, inventors, literary or arts figures, feminists, suffrage or equal rights activist, wealthy women, academics, fighters- physical or metaphorical etc. This paper will exemplify three special women, all the whileRead MoreThe Importance Of The Civil Rights Movement1692 Words   |  7 PagesUnited States have been through numerous community changes that occurred and altered the history. The Civil Rights Movement of the 1960’s was one of the most significant and important for the equality of all people and their free rights. Since the ending of slavery in 1863, there had been a continuous conflict between the races of people who lived in the United States. In addition, the Civil Rights Act was a crowd protes t movement against racial segregation and discrimination in the southern United States

Monday, December 23, 2019

Sigmund Freud s The Bluest Eye Essay - 1328 Words

Have you ever wonder why people act the way they do? Do you know what is going on in their mind? Inspired by his influential, Sigmund Freud observed and researched about human mind and behaviors. He examined hysterical patients and tried to treat them in various ways. There are causes and reasons for every act of human beings. There are so many thoughts going on in people’s mind that you would not know until they tell you. Eventually, Freud came up with psychoanalytic theory and explained it thoroughly in â€Å"Five Lectures on Psychoanalysis.† Freud’s theory has influenced many writer and is also illustrated in Literatures. The Bluest Eye, by Toni Morrison, portrays psychoanalytic concepts of Sigmund Freud where characters experience displacement, wishful impulse, and repression of cruel memory in the unconscious. Claudia experience the theory of displacement which is introduced in Third Lecture. Freud gives an anecdote about the joke of the critic’s op inion on the portraits to illustrate displacement. The critic would not say his actual opinion about the portraits that he has in his mind. Instead, he makes a joke to make others confused. The critic knows what he really thinks about the pictures, but he disguises his thoughts. He substitutes his insult with the joke. In The Bluest Eye, whiteness is an ideal standard of beauty where girls want to have light skin, blue eyes, and yellow hair. On Christmas day, Claudia gets white doll with blue eyes for her gift. She hates it

Sunday, December 15, 2019

Business Studies †Investigating three shops Free Essays

The following assignment investigates people and work at three different stores. The first is Sainsbury’s Savacentre, a hypermarket located in Beckton. Very wide ranges of items are sold here, not just groceries but clothes and technology too. We will write a custom essay sample on Business Studies – Investigating three shops or any similar topic only for you Order Now I have also chosen two specialist shops, each selling a product available in the hypermarket. I have selected ‘The Card Shop’ as one of my specialist shops. This is a store, local to my area, specialising in the sale of greetings cards, one of the products made available by the hypermarket. In addition to this, I have chosen Kashmir Store as a specialist shop. This small family run business specialises in the selling of halal meat and certain Asian foods. The Savacentre hypermarket has recently begun to sell some of these products in-store. The aim of this report is to address certain key ideas related to work and industry. This assignment hopes to demonstrate the key ideas in a work environment. The principal key ideas tackled in this project are listed below. 1) There is an important relationship between the level of technology and the nature of work. 2) Workers in different industries are interdependent and modern industry is characterised by specialisation. 3) The way in which industry is organised has an important effect on job satisfaction. Key idea number one suggests that certain types of work require higher levels of technology than other types of work. For example, I would expect office workers to use more technology in the way of photocopiers and computers than builders who use less technology such as cement mixers. Key idea number two suggests that workers from different industries are interdependent. That is to say, the computer manufacturing industry is dependent on the retail industry to sell its product. One cannot survive without the other. Furthermore, the key idea states that modern industry is characterised by specialisation. This means that industry today is specialised and specific or fills a niche. Overall, this key idea implies that because industries are very specific, they may be limited and therefore need to be interdependent. This is analogous to a newspaper and a newsagent. The production of a newspaper is a specialised industry as is the newsagent. Both however are interdependent as the paper cannot be sold without the newsagent and the newsagent will suffer financially without the newspaper. Finally, the third key idea suggests that job satisfaction is influenced by the way in which industry is organised. Job satisfaction is a term to describe how much a person enjoys their job and finds it fulfilling. Industry organisation can lead to poor or very good job satisfaction. This can affect workers quite drastically. For example, poor job satisfaction may lead to inefficient work and high employee turnover, which is not good for the company or industry. In order to find out if these hypotheses are true for the retail industry and more importantly, for the shops that I have chosen, I will carry out two methods of investigation, a questionnaire and general observation. By collecting data using a questionnaire, a large sample can be targeted and answers compared amongst respondents. Due to time restrictions and work place limitations, a structured interview will not be employed. Instead, a questionnaire will be used so that staff can respond in their own time. However, questionnaires are rather limited in the types of data they generate. Boredom in filling out the forms can also lead to falsified results. To combat this, I will directly observe workers. This technique allows for study of behaviour in the ‘natural setting’. The interaction between workers can be studied, as can the behaviour and attitude of individuals. In an ideal situation, I would use participant observation instead but as it is unrealistic to take up employment in order to join the workers, I will just observe as a customer. I will carry out direct observation by visiting the stores and making notes on employee behaviour. I will then obtain questionnaire information by ringing the stores in question for permission to carry out my research. Once this has been established, I will visit the shops and then distribute questionnaires amongst the staff. The research will be carried out in this order to prevent staff from changing their behaviour after filling in their questionnaires. How to cite Business Studies – Investigating three shops, Papers

Saturday, December 7, 2019

Classical vs Baroque Era Music free essay sample

Classical vs. Baroque Era Baroque Period- Musical texture during the Baroque period was also polyphonic and/ or homophobic. Composers used melodic patterns to evoke certain moods. The use of text depiction continued. Rhythmic and melodic patterns are repeated throughout the composition. With the addition of instruments and the development of certain musical techniques such as basso continuo, music during the Baroque period became more intriguing. Composers during this period were more open to experimentation and Improvisation.Major and minor scales and chords were used during this time. Baroque music has unity of mood throughout the composition. Rhythm Is also more constant. Rhythmic and melodic patterns tend to be repeated, although beats are more pronounced and there are also pitch changes within a composition. Even the dynamics tends to stay the same for most of the piece, but sometimes there is also an alternation of dynamics. Classical Period- The themes within a movement of a Classical composition have more contrast of mood and it can change either gradually or suddenly. We will write a custom essay sample on Classical vs Baroque Era Music or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The rhythm is more flexible and there are at times sudden pauses and changes in beats. Music Is more melodic and often homophobic. A change In dynamics Is gradual. The Plano became a popular Instrument during this period and composers showcased the Instruments capableness. This period also signaled the end of the basso continuo. Instrumental compositions usually had 4 movements and each movement may consist of 1 to 4 themes. Similarities- In both the Baroque and Classical periods, composers were strongly tied o, connected to, and employed by the court of a Royal or Noble family of some sort, or a church. Mozart was employed by the Emperor of Austria, and Bach was employed by several deferent chapels in his lifetime. These wealthy patrons, establishments or families usually provided for the composers welfare and lifestyle. Baroque and Classical music both share basic functional harmony that Is not very adventurous In modulation, however, the rend to late Classic period begins to show signs of harmonic exploration to a wider degree. Some Baroque progressions are not Forms of the Baroque laid ground for many periods to come.Techniques and styles Newer not forgotten as the Classical period came to noticeable rise around the death of Bach. Composers still wrote famous and striking operas, concertos, masses, and sonatas Aspects of Classical era opera are: all of the words are sung, the style of singing must be powerful enough to project the words and music throughout the opera house, words are often not in English, and the plots of operas are usually shortened, cause more time is required to express a thought in music than simply speaking.Also, Classical opera requires the suspension of realities that affect any drama. For example, a change of scene most likely means that a large amount of time has passed between these two scenes within the opera. The purpose of Classical opera is not to imitate reality, but rather heighten it to a degree that is not bound by logic. It appeals to the imagination of the audience The music of an opera consists of recitatives, arias, and choruses. The chorus usually participates on stage from behind the main characters.Several traditions exist about the type of voices and the characters portrayed. The heroine and hero usually a soprano and tenor, and the villain or authority fugue is often a bass. Two types of operas were important during the Classical period: opera series and opera buffo. Opera series was the traditional tragic opera that often featured stories about ancient Greek and Roman heroes and gods. Opera buffo (comic opera) was filled Ninth fun and frivolity.

Friday, November 29, 2019

African Diaspora Essay Example

African Diaspora Essay Example African Diaspora Essay African Diaspora Essay The Pan African movement was dedicated to establishing independence for African nations and cultivating unity among black people throughout the world. During this time leaders across the nation held conferences in which they discussed the de-colonization process in Africa. The primary leader during this movement was W. E. B Dubois. He attended many conferences where many people believed him and followed in his direction. The first conference was held in London in 1900 and was convened by Henry Sylvester- Williams. This conference brought people from African decent together where they discussed their common fate and unity amongst the African community. The next conferences were organized by W. E. B Dubois which took place in 1919 and 1927. The conference in 1919 discussed W. E. B Dubois trip to Paris where he reported discrimination amongst black soldiers in the US army who were station in France. Also he spoke at the Versailles Peace Conference where he ensured African interests were addressed. The Manchester conference of 1945 won the reputation of a pace-maker for decolonization in Africa and in the British West Indies. It marked a significant advance in the participation of workers in the Pan African cause. It demanded an end to colonial rule and an end to racial discrimination, while it carried forward the broad struggle against imperialism, for human rights and equality of economic opportunity. The Pan-African Congress strategy positioned the political and economic demands of the Congress within a new world context of international co-operation. 2. When W. E. B. Du Bois and Marcus Garvey had their first contact in May 1915, Du Bois already was a Black leader in the US, while Garvey had just the month before established his UNIA in Jamaica. Du Bois was on a visit in Jamaica, and received a very friendly welcomeletter by Garvey. Soon afterwards they met in person, shook hands and Garvey told Du Bois briefly of his plans, eager to find a supporter in him. Almost one year later, Garvey came to the US for a speaking tour through the country to raise money for a project in Jamaica. Garvey wanted to invite Du Bois in person to his first lecture and therefore visited the NAACP headquarters. As Du Bois was not there, he left an invitation that was declined in a polite way by Du Bois, but nevertheless Du Bois announced Garveys tour in his magazine the Crisis. During his tour Garvey decided, that the US was the place for his ideas and that he should therefore stay in the United States. He started speaking weekly in Harlem, soon found a huge amount of followers, officially founded the US branch of the UNIA end of July 1918 and short afterwards established the UNIA newspaper The Negro World 3. The African response to slavery was divided into three instances in which slaves which successful in freeing themselves. The first instance was the maroons of Jamaica. From 1494 to 1655 Jamaica was a Spanish colony. Spain established the plantation system and started to grow and export agricultural crops. In 1655 Great Britain challenged Spanish occupation of the island and captured it. During the war between Spain and Great Britain slaves on the plantation took the opportunity and escaped into the mountains. When the war was over the British demanded that the slaves return but the slaves argued that they were slaves of the Spanish and since the Spanish were no longer there, they were now free. Great Britain insisted that they were still slaves. The slaves reaction was â€Å"if you think we are slaves come and get us†. Due to the slaves reaction war ensued between the maroons and the British soldiers from 1655 to 1738. In 1738 the British governor of Jamaica believed that in the interest of the security of planters and the stability of the island it would be wise to make peace with the maroons. Based on his decision the British government did an unprecedented agreement. At the press conference they wrote out a peace treaty with the maroons. In the peace treaty Great Britain agreed to recognize the freedom and independence of the maroons. They decided to give them land in Jamaica where they could establish their own communities, governor themselves, and they would be free of taxation. The British government created a state within a state. The maroons promised that they would not allow runaway slaves to use maroon settlements as sanctuaries. Runaway slaves that were found on maroon land would be returned to his owners. The British governor believed that the maroons were not upholding the second part of their agreement because they were not returning runaway slaves. The maroon argument was that if they seen any runaway slaves they would return them but so far they have not seen any. As a consequence a second war broke out between the maroons and the British government in 1795. During this war large numbers of maroons were captured and deported to Canada as punishment and eventually transported to the west coast of Africa. This was the first instance were a group of slaves freed themselves. Next, the second group of slaves that freed themselves was the Republic of Palmers in Brazil. During the slavery period the Portuguese had the right to trade in slaves from the time of the Treaty of Tordisellas in 1494 between Spain and Portugal. Portugal and Brazil transported more African to be enslaved in Brazil than the rest of the country combine. There were vast areas in Brazil suited to the plantation system. Most plantations were in Bahia and Pernambuco. At the beginning of the 17th century slaves escaped in mass from these providences. These slaves escaped into the interior of Brazil and establish their own communities and government. Slaves in other parts of Brazil knew their only was to be freed was to find their way to palmers. The Republic of Palmers grew by leaps and boundaries. By the end of the 17th century the planters of Brazil complained to the government that the existence of the Republic of Palmers was destabilizing through the plantation system in those providences. The government sent troops against the Republic of Palmers at the end of the 17th century which caused slaves to escape further into the interior where they lived. The last instances of slaves freeing themselves were the Haitian Revolution were the Haitian people abolished slavery. The coming of free trade forced planters to sell their products on world markets. Secondly, the decline in productivity caused farmers to lose products. Next, investors in Europe where reluctant to give planters loans because of all the money they lost in Haiti. Finally, the impact of public opinion in Europe government forced them to end slavery in America. They feared that if slavery continued the same thing that happened in Haiti would happen elsewhere. This pressure caused the British to abolition the slave trade in 1807.

Monday, November 25, 2019

Free Essays on Coca Cola

The Coca-Cola company started out as an insignificant one man business and over the last one hundred and ten years it has grown into one of the largest companies in the world. The first operator of the company was Dr. John Pemberton and the current operator is Roberto Goizueta. Without societies help, Coca-Cola could not have become over a 50 billion dollar business. Coca-Cola was invented by Dr. John Pemberton, an Atlanta pharmacist. He concocted the formula in a three legged brass kettle in his backyard on May 8, 1886. He mixed a combination of lime, cinnamon, coca leaves, and the seeds of a Brazilian shrub to make the fabulous beverage. Coca-Cola debuted in Atlanta's largest pharmacy, Jacob's Pharmacy, as a five cent non-carbonated beverage. Later on, the carbonated water was added to the syrup to make the beverage that we know today as Coca-Cola. Coca-Cola was originally used as a nerve and brain tonic and a medical elixir. Coca-Cola was named by Frank Robinson, one of Pemberton's close friends, he also penned the famous Coca-Cola logo in unique script. Dr. John Pemberton sold a portion of the Coca-Cola company to Asa Candler, after Pemberton's death the remainder was sold to Candler. Pemberton was forced to sell because he was in a state of poor health and was in debt. He had paid $76.96 for advertising, but he only made $50.00 in profits. Candler acquired the whole company for $2,300. Candler achieved a lot during his time as owner of the company. On January 31, 1893, the famous Coca-Cola formula was patented. He also opened the first syrup manufacturing plant in 1884. His great achievement was large scale bottling of Coca-Cola in 1899. In 1915, The Root Glass Company made the contour bottle for the Coca-Cola company. Candler aggressively advertised Coca-Cola in newspapers and on billboards. In the newspapers, he would give away coupons for a free Coke at any fountain. Coca-Cola was sold after the Prohibition Era t... Free Essays on Coca Cola Free Essays on Coca Cola The Coca-Cola company started out as an insignificant one man business and over the last one hundred and ten years it has grown into one of the largest companies in the world. The first operator of the company was Dr. John Pemberton and the current operator is Roberto Goizueta. Without societies help, Coca-Cola could not have become over a 50 billion dollar business. Coca-Cola was invented by Dr. John Pemberton, an Atlanta pharmacist. He concocted the formula in a three legged brass kettle in his backyard on May 8, 1886. He mixed a combination of lime, cinnamon, coca leaves, and the seeds of a Brazilian shrub to make the fabulous beverage(Things go better with Coke 14). Coca-Cola debuted in Atlanta's largest pharmacy, Jacob's Pharmacy, as a five cent non- carbonated beverage. Later on, the carbonated water was added to the syrup to make the beverage that we know today as Coca-Cola. Coca-Cola was originally used as a nerve and brain tonic and a medical elixir. Coca-Cola was named by Frank Robinson, one of Pemberton's close friends, he also penned the famous Coca-Cola logo in unique script. Dr. John Pemberton sold a portion of the Coca-Cola company to Asa Candler, after Pemberton's death the remainder was sold to Candler. Pemberton was forced to sell because he was in a state of poor health and was in debt. He had paid $76.96 for advertising, but he only made $50.00 in profits. Candler acquired the whole company for $2,300. Candler achieved a lot during his time as owner of the company. On January 31,1893, the famous Coca-Cola formula was patented. He also opened the first syrup manufacturing plant in 1884. His great achievement was large scale bottling of Coca-Cola in 1899. In 1915, The Root Glass Company made the contour bottle for the Coca-Cola company. Candler aggressively advertised Coca-Cola in newspapers and on billboards. In the newspapers, he would give away coupons for a free Coke at any fountain. Coca-Cola was sold a... Free Essays on Coca Cola John Pemberton invented Coca Cola in 1886. He was a pharmacist who worked in Atlanta, Georgia. John made patent medicines and produced Coca Cola. His bookkeeper, Frank Robinson thought of the name because it was made of coca leaves and kola nuts. In John’s first year of selling Coca Cola he only made fifty dollars. John became very ill and he sold two-thirds of his company in 1888. John died. A man named Asa Candler, an Atlanta wholesale druggist, and his brother bought The Coca Cola Company for 2,300 dollars in 1891. Coca Cola was registered for a patented trademark in 1893. Since it was made with cocaine, Asa reduced the amount of coca leaves because of the dangers of cocaine. Asa only had a patent on the name and not the drink syrup itself. Other companies made soda with coca nuts such as the Pepsi company, which was Coca Cola’s major competitor. Asa spent 11,000 dollars on advertisement. The logo was shown on walls, posters, calendars and drinking glasses. A candy store owner installed bottled machines which had bottled coke but before it was only sold in soda fountains. In 1894 the company opened its first production plant in Dallas, Texas. In 1915 Asa Candler retired from the coca cola company and into politics. He passed it on to his children. Later he was elected mayor of Atlanta. In 1899 Benjamin Thomas and Joseph Whitehead, from Chattanooga, Tennessee, bought rights to distribute Coke syrup to bottlers for only one dollar. Asa saw very little profit in bottling and wanted to give up that part of the business. Benjamin and Joseph split their partnership because of time and money. In 1919, the whole Candler family sold the Coca Cola Company to Ernest Woodruff for twenty-five million dollars. In 1923, Ernest’s son, Robert, was elected the companies president. Robert made two new slogans which were â€Å"The pause that refreshes† and â€Å"It’s the real thing†. During World War II, Ernest Woodruff increased Cokeï ¿ ½... Free Essays on Coca Cola The Coca-Cola company started out as an insignificant one man business and over the last one hundred and ten years it has grown into one of the largest companies in the world. The first operator of the company was Dr. John Pemberton and the current operator is Roberto Goizueta. Without societies help, Coca-Cola could not have become over a 50 billion dollar business. Coca-Cola was invented by Dr. John Pemberton, an Atlanta pharmacist. He concocted the formula in a three legged brass kettle in his backyard on May 8, 1886. He mixed a combination of lime, cinnamon, coca leaves, and the seeds of a Brazilian shrub to make the fabulous beverage. Coca-Cola debuted in Atlanta's largest pharmacy, Jacob's Pharmacy, as a five cent non-carbonated beverage. Later on, the carbonated water was added to the syrup to make the beverage that we know today as Coca-Cola. Coca-Cola was originally used as a nerve and brain tonic and a medical elixir. Coca-Cola was named by Frank Robinson, one of Pemberton's close friends, he also penned the famous Coca-Cola logo in unique script. Dr. John Pemberton sold a portion of the Coca-Cola company to Asa Candler, after Pemberton's death the remainder was sold to Candler. Pemberton was forced to sell because he was in a state of poor health and was in debt. He had paid $76.96 for advertising, but he only made $50.00 in profits. Candler acquired the whole company for $2,300. Candler achieved a lot during his time as owner of the company. On January 31, 1893, the famous Coca-Cola formula was patented. He also opened the first syrup manufacturing plant in 1884. His great achievement was large scale bottling of Coca-Cola in 1899. In 1915, The Root Glass Company made the contour bottle for the Coca-Cola company. Candler aggressively advertised Coca-Cola in newspapers and on billboards. In the newspapers, he would give away coupons for a free Coke at any fountain. Coca-Cola was sold after the Prohibition Era t...

Friday, November 22, 2019

Dicussion on movie Essay Example | Topics and Well Written Essays - 250 words

Dicussion on movie - Essay Example In this film, ultimate gender performance is apparent in the way each manages realize their respective motives whereby Toby becomes a distinguished porn actor and Bree waitress in a place where there earlier her role encompassed washing dishes. Both key character deem they represent the opposite of what they are based on gender. Toby while indulging oneself into the acts of gay appears to be the recipient who through his charm arouses those of the same orientation. This is also evident with Bree who through her conduct all males whom she encounters end up exhibiting interests in without suspecting anything except that kid in the hotel. The latter among all other scenes is the sole incident, which I can concretely contend Bree utterly failed but all others she managed to masquerade as a woman. Conversely, Toby is successful all through and no incident where he seems to contradict who he is evident in the easily prostates to supplement their budget and lie proceeds were from selling drugs. In the film, the essence of nudity encompasses unveiling controversial aspects used to develop varied scenes constituting the entire movie as well as satiating audiences’ curiosity. For instance, Toby through nudity manages to know exactly Bree’s condition, which from the onset of the film viewers could only hear through discussion. In addition, nudity serves the role of advancing plots such that the film continues to progress, which is evident with the case of Toby having known who exactly Bree is an incident of rift between them develops until reconciliation in the end of the film. The film though its scenes might seem different from that of â€Å"The Hitch-Hiker (1953)† there earlier I watched, their general basis encompasses how the involved and key characters manage to scrutinize the reality of each other . In both films, there are hitchhikers

Wednesday, November 20, 2019

General Style of Writing Essay Example | Topics and Well Written Essays - 750 words

General Style of Writing - Essay Example General Style of Writing There are going to be a number of principles of basic editing that I am going to employ. Some of these include the need to read over all my projects; for at least twice before presenting them. In my case, I made three major symbolic representations in my general writing presentations to make up my general style of writing. These symbolic representations are in no certain order, the use of themes, exclusive use of examples and the use of counter arguments. By the use of themes, reference is being made to the fact that all projects that are written are given precise division to make the discussions well organized. Examples and scenarios are also used in most cases in order to help in elaborating points and ideas that are raised in the cause of the writing. The final section of my style has to be the use of counter arguments to help in brings out clarity on why the side of an argument I held is more justified than the other side I did not support. All in all, my writing cannot be judged as perfect and has its own weaknesses and strengths. Strengths in my Writing Through remarks received from supervisors and in accordance with a number of academic texts studied in the course o f the semester’s study, there are three major strengths I identify in my writing. These are clarity of construction, organization of thoughts and insightfulness in argument. In the first place, I have often used language and syntax that are simple and down to earth to allow for the easy understanding of sentences and contents I put up. In my first project for instance, in my first two projects, there were positive remarks I received from my supervisors specifically for the fact that my thoughts were straight forward and easy to understand. This point is indeed supported by Murray (1998) as a major strength in all forms of writing as he remarks that â€Å"I write my way toward meaning with discovery drafts that usually make the subject come clear.† Secondly, I have always focused on the need to make my writings well organized and structured. I do this by giving themes and sub-heading to major points. Once this is done, there is always the room to make the identification of major points that have been raised in the writings easier and accessible. Finally, I combine simplicity with insightfulness to ensure that the fact that I try to keep the structure and content of my papers simple does not take away from them the in-depth of explanations that the arguments deserve. Weaknesses in my Writing Not withstanding the major strengths discussed about my style of writing, there are a number of weaknesses that can be seen. These weaknesses are evident when reading through some of the major laid down principles in putting up an excellent paper; such as the one presented by Murray (1998). In light of this, it would be said that I have a very wrong approach to accepting criticism that pertain to writing. Contrary to this, Murray (1998) admonishes that â€Å"they must accept the criticism of others and be suspicious of it; they must accept the praise of others and be even more suspicious of it.† The writer makes this point referring to writers who seek t o excel in their writing. This means that common mistakes that are made in my writing and are pointed out by friends, colleagues and supervisors must always be taken in good faith and improved upon. Unfortunately, m supervisor seem to be the only person whose input I consider for change. As evidence in my first three project works, there are major corrections that my learning partner pointed out to me, which I ignored. When I finally took the completed work to

Monday, November 18, 2019

The Marketing Macroenvironment Essay Example | Topics and Well Written Essays - 1500 words

The Marketing Macroenvironment - Essay Example This is defined as one of the central ideas and concepts of marketing (Moore and Pareek 2006). But what is marketing exactly? Well, for one, marketing as a word has many definitions. For the common and layman’s terms, it is associated with selling or advertising. However, it has more meanings to it than that. For one, it is the process of creating, distributing, promoting and pricing goods, services or ideas in order to foster a satisfying relationship between manufacturers or other sources of goods, and the customers (Pride and Ferrell 2012). Also, one of its goals is to maintain this relationship as favorable as possible in order to facilitate more exchanges, not just with the buying customers but also other stakeholders as well, This would include other people that may not be necessarily buying the goods or services, but have financial input in the product or firm. This may also include people that do not have any direct interaction with the company itself, but may have pot ential as customers or stakeholders in the future. Another definition of marketing is defined by the American Marketing Association in 2005 as: â€Å"an organizational function and a set of processes for creating, communicating, and delivering value to customers and for managing customer relationships in ways that benefit the organization and its stakeholders† (Ries and Trout 2006). Also, in the realm of marketing, it is said that the customer holds the key as to whether the company or firm would be able to thrive or even become successful in terms of profits and development. Therefore, in order to become successful, a firm or company must be able to give satisfaction to their customers, and this lasting positive relationship between them would define the company as a whole (Silk 2006). The whole concept of marketing has many aspects as well as other deciding factors in the course of action of a firm or company. These would very well depend on the marketing environment. It is defined as the environment surrounding a company and its organization which can have an effect on its profits or even its reputation (Petzer, et al. 2006). For example, in the law of supply and demand, if there is low supply and a large demand, all competing companies would have a chance to create relationships to all customers, and by creating better services than the competition would make the company successful. However, if there is a large supply coming in from different competing groups of companies, the competition would be tougher since there would be more opponents to face, as well as the large market being divided among the competitors. Thus, being able to stand out among the rest would really make or break the company as a whole, as compared to only having a few competitors at hand (Petzer, et al. 2006). The marketing environment also has different factors that can affect it. These can be either be the microenviroment or the macroenvironment. The microenvironment is found in the company organization itself. The influence of the organization

Saturday, November 16, 2019

Clinical Patient Management System

Clinical Patient Management System Clinical Patient management is introduced to optimize clinics operation. Because of huge changes in management nowadays, management for clinic is important due to the widely spread of technology. This system is proposed for those clinics which are still using paper-based to record down patient record, disease history and etc. This system is to manage the clinics operation efficiently. The area consists of the user in clinic which is doctor and clinic assistant. Basically there are no such systems in the clinic. The traditional paper-based management method has caused a lot of problems to the user. This system will help out the user in the clinic in managing the work. 1.2 Problem Statement and Motivation Clinical Patient management system is enhanced from the traditional paper-based management system that has been using in the clinic. Based on the previous system, the patient who comes to the clinic for the first time is registered via the system. The assistant assist the patient by write down the personal detail in a form. The patient gets the treatment and information about the treatment is record in a file. The system manages the activities in the clinic but the previous system has cause problems to the user. Problems of using paper to record down the records of patient: Only one copy, emergent consult problem Waste time to search the record Easy to lost record or duplicate record Waste money on purchase paper Waste space for store record These problem are so important is because they will affect the operation of clinic cause decrease of patients visits, inefficiency and increase of cost. Clinical Patient management is developed to overcome the problems. The system has few modules such as patient registration, inventory module, medical certificate, disease history, patient record search, appointment, billing and reporting. Objectives The project aims to overcome the problem exists in the previous system. In order to overcome the problem exists in the previous system, we must determine the problems existing in previous system, find out the reason cause the problems in previous existing system and create a solution to solve the problems. Investigate on system/user request and define new requirements. To achieve this objective need to determine who the user is, understanding the user request, verify the request can be achieve or not. Make user easy to maintain record Determine what record is requiring in the system. All the records will be kept in database. Ensure the system useful to user as it help in daily activity in the clinic. Determine how will the system work/operate and understand daily activity in the clinic. Project scope There are nine modules in the system: Patient Registration Patient must register first. Patients IC number, name, address, age, gender, phone number, specified relative IC. Disease History This module manages data about patients treatment history and register for various type of disease. It allows doctor to add, edit and update the disease history. Medical certificate This module allow doctor to create the medical certificate to patients. Allow user to add, edit, delete. Inventory module This module manages all the medicine stock in the clinic. It allow user to add, edit and delete the medicine information. It will show current quantity of medicine in the clinic. It includes the record search. Backup Backup the system setting and database. 1.5 Project significance Clinical Patient Management System is used by the doctor and clinic assistant. The user will feel the system is useful because it has benefits to manage the clinics operation efficiently. The web-based Clinical Patient Management gives profit to user as the user can retrieve information regard to themselves through the internet. They can access the clinic system throughout the internet and those who have difficulties to go the clinic will find it practical. The system makes record keeping more efficient and secure from an unauthorized people. Only authorized user has the right to retrieve their own information. This will secure the patients information. This system has also overcome the problems in paper-based management system. Besides that, the system is easy for the management to maintain record about the patient and inventory. The time for retrieving the information needed will be less compare to the manual. This will help the clinic assistant in doing the job. The system also helps in minimize the loss of data. The clinic assistant can view and generate report for the specified data. CHAPTER 2 LITERATURE REVIEW 2.1 Web-based clinical patient management Undeniable computerize medical services is a general trend, this web site will provide medical information for the user, the user can find out the message they want. CMS provide online appointment feature, which accept patients to make the appointment through internet. Besides, doctors can manage the clinic daily work by using CMS. (Andrew Ho 2002, Louis Leong 2002, Onofre da Costa 2002). In journal article Clinics Management System (CMS) based on Patient Centered Process Ontology (Vissers J. M. H. 1998), conducted study and found one of the important trends in business managements is the focus on processes to create value added services for their ultimate customers. This is to get rid of unwanted, time consuming, unnecessarily repeated business activities of the processes and to monitor how value for customer is as efficiently as possible In the journal entitled, Best practice Clinic: The making of a good quality management system written by Dwyer, G. (2004), he said that to be manageable and effective, a quality management system should be easy to manage and involve minimal or no allocation of additional staff, and work in tandem with existing initiatives, systems and structures. In the case study of Lance Technologies LLC The web-based system kept track of all patient schedule information. Thus, patients could visit the web service at any later date and cancel or re-schedule their appointment based on Agho Clinic policies. A web-based administrative system provided password-protected access to patient scheduling data to Agho Clinic staff, allowing them to see schedules and patient contact information. The staff also used the same system to manage in-office scheduling as well. All provider schedules and office hours were also database-driven. (Lance Technologies LLC (2006). In Web Based Patient Scheduling with IVR Backend. Retrieved March 13, 2012) From article state in above they appears in nowadays all clinics are necessary to automate its daily functions. Furthermore, regardless of the type clinic, owning and operating it can be a lot of work. Web-based system is a technology important to clinic domain because it can help them face the problem of increasing diversity and differentiation by improve their competitiveness, efficiency and provide better convenient to patient. 2.2 Fact Finding In a personal interview with a clinic assistant, the clinic assistant had explained in detail about the clinic daily operation. Through the information provided by the clinic assistant, the following function has been listed out. 2.2.1 Functions of the System Patient Function Allow patients to view the doctors schedule. If want to supply a direct appointment way on web. The system require to show out the doctors schedule of working day. Making appointment is several simple steps. The patients can log in by using the User ID and Password. For the first time to log in, the patients can register on the web site and set their own ID and Password. Doctors can check and review the Medical history of a patient through patient ID. The Patients can check their own disease history through the web browser, which include the patient info, such as Name, address, age, gender, record of diagnose, any allergic reaction. Doctor Clinic Assistant Function The system must provides the calendar for the doctors, to check the calendar and appointment on the day. The calendar permit the staff to apply different kind of leave. Such as, annual leave or non-paid leave and so on. By using the system, the medicine inventory records can be checked. They can view the information of the medicines such as medicines name, quantity, expired date, prices, supplier info (Address and contact number) and description. During the consultation, the doctor can check the patient treatment from the website, such as patient diagnosis, medicines, drug allergy, chronic disease. After the checking, the doctor will add the information and status in the system. Finally the system will calculate the total amount and print out the receipts. Through the functions state in above, a list of system module had been arranged out and already writes down in project scope, you can refer it on page 3. 2.3 Critical Remarks of previous works BioAXS Adastra Proposed system Patient registration Finger print verification Make appointment Scheduling Disease history Medical certificate management Billing Inventory management Reporting Backup Web-Based Figure 2.3 Existing system compare with proposed system From figure 2.3 above we can found that both of the existing system BioAXS and Adastra they dont have include most of the feature in proposed system. Many patients need to get medical certificate to rest at home, so the proposed system include the feature of medical certificate management to manage the record. Most of the clinic requires billing management feature in the management system to help them manage and record daily expense and revenue. The inventory in proposed system can help clinic manage the medicine stock, so the clinic assistant can always monitor on the quantity of various medicine. The backup feature in proposed system allow user to backup their data, this can prevent loss of data. If the system accidently down, user can through restore backup file to recover the data. CHAPTER 3 METHODOLOGY 3.1 Prototyping The methodology I choose for develop the system is prototyping. Prototyping include 5 phases planning, analysis, design, implementation, delivery. A prototyping-based methodology performs the analysis, design and implementation phases concurrently, and all three phrases are performed repeatedly to build the first version, with user feedback, repeat these three phases a cycle until system complete. In figure 3.1 it shown how prototyping works. C:UsersKelvin GiottoDesktopprototype.png Figure 3.1 Prototyping 3.1.1 Planning The project planning starts in this phase. First, the information is gathered from the clinic staff. Then, the scope, objectives and the goals for the proposed system are set up. The tentative schedule consists of project work plan and Gantt chart is developed. 3.1.2 Analysis In this phase, we have to understand previous system problems and find out analysis existing system find out their pros and cons. We also have to realise clinic daily operation process to investigate and define new requirements. The problem statement of the system can be defined throughout the observation. It will become the objective for the system. The scope can be extracted from the objective to develop the system. 3.1.3 Design Database design, where a design for the database is form. It can support the Clinical Patient Management System operational and objective, as Microsoft Access is choose for the database management. The minimum requirement for the installation need to be confirmed first in order for the DBMS in the server to run smoothly. Moreover, the Entity Relationship Diagram (ERD), and data dictionary is create where it will explain the main basic workflow of the system. All relationship between the tables, define the storage structures and the access paths will be known. For interface design, we will regard to user request and make it more user-friendly. 3.1.4 Implementation In implementation phase is start working on programming, after complete the first version of prototype, we will delivery it to user to testing the prototype, test for performance, integrity, and concurrent access and security constraints. Other than that, testing and evaluate the system parallel with application programming is done. This phase involve all the users in Clinic Management system that will use this system. In this stage it can be define that the users meets their requirement. Once the data insert into the database, the processes such as tests and fine-tunes will be carried out for purposes of performance, integrity, and concurrent access and security constraints. The testing and evaluation phase occurs in parallel with applications programming. If the database implementation fails to meet the users requirement, several options will be consider in order enhancing the system. Implementation Issues and Challenges Many issues and challenges will be face In develop clinical patient management system. Develop this system can be say like start from zero, require to learning new programming language, new development software and make it operate on server. Unfamiliar Programming language C# The system is develop through Microsoft Sharepoint 2013, and it require using C# programming language to develop. Unfamiliar system area The web-based Clinical Patient Management system is a medical area system, this will cause negligence on the development of software features. Unfamiliar development tools Microsoft Sharepoint 2013 is a new development tools, many useful feature for developer, so require to take some time to learning how to use it. Blur on User Interface design Due to the user of the system are doctor and clinic assistant, difficult to design a user-friendly that is suitable for them. Timeline 3.3.1 Current Semester Figure 3.3.1 Current Semester In figure 3.3.1, meeting to discuss the process of the final year project is a recurring task, the task is execute on everyweek Wednesday. Took totally 12 days on choose project title. Totally 17 days use for create preliminary report, start from 16 Feb 2012 to 9 March 2012. For develop the comb-bound project proposal, this task totally used 21 days start from 12 Mar 2012 to 9 Apr 2012. 3.3.2 Next Semester Figure 3.3.2 Next Semester In figure 3.3.2, planning phase start from 28 May 2012, take 6 days to complete it. Due to using the prototyping methodology to develop the system, so Analysis, Design and Implementation should be recurring task and start from 13 Apr 2012 to 17 Aug 2012. The system should be delivery on 20 Aug 2012. Requirement Specification User Requirement Functional Patient Registration Disease History Medical certificate Inventory Inventory Backup Non-Functional User authentication Fast response time Maintainability Integrity 3.4.2 System Performance Definition Software Requirement Development tool Microsoft SharePoint Designer 2013 Microsoft Visual Studio 2012 Operating System Windows Server 2012 Database system Microsoft SQL Hardware Requirement Minimum Hardware Requirements Processor 64-bit, quad-core processor, 3 GHz RAM 8 GB for single server and multiple server farm installation for production use. Hard disk 80 GB Programming language C# C#, as part of the .NET framework, is compiled to Microsoft Intermediate Language (MSIL), which is a language similar to Javas bytecode. MSIL allows C# to be platform independent and runs using just in time compiling. Therefore programs running under .NET gain speed with repeated use. Furthermore, because the other languages that make up the .NET platform (including VB and Cobol) compile to MSIL, it is possible for classes to be inherited across languages. The MSIL, like bytecode, is what allows C# to be platform independent. Microsoft SharePoint 2013 In-alignment with SharePoints approach of doing more with no additional resources, investments like the integration with Visual Studio 2012 will enable our customers to rely on existing pools of programming expertise to enrich the SharePoint platform and increase the quality and ROI on their investments. Can be used to build any kind of web solution, including Internet publishing sites share contents, applications, and data to improve collaboration and provide a unique user experience CHAPTER 4 CONCLUSION Briefly this chapter describes on literature review and project methodology. Information for literature review is gathered from journals in library, online journal, magazines and article. All the information is useful to support the statement from the approaches that has been made. In project methodology, it described about methodology that will be develop for the system. It consists of 5 phases which has been explained in this section. Furthermore, in project requirements, it tell about the software and hardware that been choose to develop the project. Gantt chart attached is to help to manage project schedule so that this project will be finished on time. Managing time is the way to assuring the project can be finish according to the plan.

Wednesday, November 13, 2019

Alzheimers Disease Essay -- Alzheimers Disease Essays

Alzheimer's Disease Alzheimer ¡Ã‚ ¦s disease is a slow, progressive, and degenerative disease of the brain. This disease is marked by a gradual loss of memory and other cognitive functions. "Alzheimer's Disease is also known as the most common cause of dementia--a general term referring to the loss of memory and the ability to think, reason, function, and behave properly" (Medina,1999). It primarily affects adults in their 60's or older and eventually destroys a person's ability to perform simple, routine tasks or even to care for themselves. Statistics show that "as many as 10 percent of all people 65 years of age and older have Alzheimer's," and that approximately "50 percent of all people 85 or older also have the disease" (WebMD, n.d.). Originally it was thought to be a rare condition affecting only young people, and was referred to as pre-senile dementia. Today late-onset Alzheimer ¡Ã‚ ¦s disease is recognized as the most common cause of the loss of mental function in those aged 65 and over. "Alzheimer ¡Ã‚ ¦s in people in their 30s, 40s, and 50s, called early-onset Alzheimer ¡Ã‚ ¦s disease, occurs much less frequently, accounting for less than 10 percent of the estimated 4 million Alzheimer ¡Ã‚ ¦s cases in the United States" (Encarta, 2004). Alzheimer's disease advances in stages, progressing from mild absentmindedness and cognitive impairment to widespread loss of mental abilities. In advanced Alzheimer's, people become dependent on others for every aspect of their care. The most common cause of death among Alzheimer's patients is infection. Even though scientists are still learning about Alzheimer ¡Ã‚ ¦s, there is no cure. Alzheimer's disease is named after Dr. Alois Alzheimer, a German doctor. "In 1906, Dr. Alzheimer noticed changes in the brain tissue of a woman who had died of an unusual mental illness. He found abnormal clumps (now called amyliod plaques) and tangled bundles of fibers (now called neurofibrillary tangles) within the brain"(ADEAR, 2004). Scientists have found that tangles and plaques cause the neurons in the brains of Alzheimer ¡Ã‚ ¦s patients to shrink and eventually die. They start in the memory and language centers and finally invade throughout the brain. &qu... ... former president Ronald Reagan was diagnosed with disease, it has been a major news headline ever since. There are thousands of organizations and webpage ¡Ã‚ ¦s on the internet that are filled with valuable information helping the public be aware of this disease, what the signs are, and where to go for help. With our baby-boomers aging, the disease is sure to emerge more in the next couple of years. Alzheimer ¡Ã‚ ¦s disease has touched many people since its discovery by Alois Alzheimer. Its effects on the brain cause its victims to lose some, if not most of their memory. This causes the patient to forget things such as who and where they are, who their relatives are, how to get home, or even when or how to eat. It is a personal tragedy for the patient as well as for those whom love and bear the burden of caring for them. Alzheimer ¡Ã‚ ¦s disease is a slow, progressive disease with no known cure. The treatment for Alzheimer's is still in the early stages but there are many drug treatments available which help slow its progression, and help with cognitive functions. As our population ages, Alzheimer ¡Ã‚ ¦s is only a tragedy that will affect more and more people.

Monday, November 11, 2019

Marriage – Argumentative Essay

Marriage is a social institution under which a man and woman establish their decision to live as husband and wife by legal commitment, religious ceremony, etc. This is the kind of marriage that we are all used to. Nowadays, in reality, there are some people who found love not to someone that are the opposite sex, but to those who are the same sex. A lot of people have been debating about the legality of gay marriage. From relating it to religion and its affect on the traditional family values, there are a lot factors that can make this into a controversy. Even though gay marriage is still an illegal action in the majority countries there are some factors that should be considered to make it become legal. Opponents of gay marriage claim that homosexuality is a sin in most religion. However, this statement violates the First Amendment of Constitution about the free exercise of religion on a person’s religious views must be protected. Which means that the government cannot make a law that is based on a certain religion rule. Additionally, the civil marriage and the religion marriage are a total different institution; therefore a law in the government that is based on a religion rule should not be made. Moreover, legalizing gay marriage also consistent with the Equal Right Amendment on the first text about the Equality of rights under the law shall not be denied or abridged by the United States or by any State on account of sex. Therefore the legalization of gay marriage will make an equal marriage for all in the eye of the government based on those two Amendments. The other arguments that the opponents mentioned is that the Institution of Marriage will get less respect and the definition will become unclear. They said that the purpose of marriage which is to pro-create, hence the marriage between a man and women is the possible one. However, when we see the divorce rate in America for the past decade, the number is stable at 50% for the first marriage. This gives the impression that even the straight marriages give less respect to the institution it self. Moreover, if we look into the simple, deeper of marriage it self, marriage is a constitution between two people that are brought together by love. So, love is the basic aspect in this Institution of Marriage. Therefore gay marriage won’t give less respect or make the definition become unclear because basically they already fulfill the ground aspect of marriage, which is love. The final argument from the opponents of gay marriage is that family contains a mother and father. However, this meaning of family has become biased since in reality there are a lot of other families that doesn’t have a mother and father but we can still call them a family. So basically the meaning of family has changed due to the different things that occur in the reality. For instance, single mother and single father families are a common thing nowadays, with this one parent cover the two different role of two parents. Therefore there is no exception for the gay couple if they want to extend their family. As long as they will provide their kids with love, support, shelter, and things that the kids will need. Additionally there are a lot of kids that have been waiting to have their own family, so adoption in gay marriage will help both the kids and the gay couple in creating their own family. In conclusion, gay marriage is just like any other marriage with a twist of the same sex between the couple. Therefore the legalization of gay marriage will make an equal marriage for all in the eye of the government based on those two Amendments. Additionally, gay marriage won’t give less respect or make the definition become unclear because basically they already fulfill the ground aspect of marriage, which is love. Moreover there is no exception for the gay couple if they want to extend their family. As long as they will provide their kids with love, support, shelter, and things that the kids will need because there are a lot of kids that have been waiting to have their own family, so adoption in gay marriage will help both the kids and the gay couple in creating their own family. Furthermore, in my opinion everyone deserve an equal right to marry someone they love because everyone deserves to be happy. SEKAR RINDANG FASHION MANAGEMENT 1401125124 REFERENCES Dictionary. com 5 December 2011 Messerli, Joe. â€Å"Should Same-Sex Marriages be Legalize? † balancedpolitics. org 19 November 2011. 5 December 2011 Tsivkin, Roman. â€Å"Marriage Laws In The USA. † livestrong. com 8 April 2010. 5 December 2011 Wikipedia. com 5 December 2011 Wikipedia. com 5 December 2011 divorceguide. com 5 December 2011

Saturday, November 9, 2019

The Meanings and Variations of Father

The Meanings and Variations of Father The Meanings and Variations of Father The Meanings and Variations of Father By Mark Nichol Father derives from the Old English term faeder, which is cognate with the Latin and Greek word pater. (From the Latin term such words as paternal and paternity are derived.) The term refers not only to a male parent but also to an older man who serves as a mentor; it was also long employed as a respectful term of address for an elderly man, though this use is almost obsolete. A stepfather is a man who marries one’s mother, and a father-in-law is the father of one’s spouse. Fatherly describes paternal behavior, and fatherlike alludes to a resemblance to the qualities of a father. Fatherhood and the less common fathership describe the quality or state of being a father. A father figure is an older man one looks up to as to a father, whereas â€Å"father image† pertains to an idealization of someone in that role. Figuratively, the term father may pertain to one who originated or was significantly responsible for the development of something (such as a founder of a movement or as in the epithet â€Å"Father of our Country† for George Washington) or to a leading man of a community, or, impersonally, to a source or prototype. In religious contexts, it is a title for a priest or, capitalized, for God. (A father confessor is a clergyman who hears confessions or, by extension, any man a person trusts with secrets.) The verb father pertains to the act of contributing to biological or figurative birth. Fatherland describes one’s home country, although the term is tainted by its association with Nazi-era Germany. Father Time is the personification of time as an elderly man. Idioms referring to the word include the proverbs â€Å"The child is father to the man,† which expresses that a person’s personality forms in childhood, â€Å"Like father, like son,† alluding to a resemblance in behavior or qualities between a man and his son, and â€Å"The wish is father to the thought,† with a figurative meaning that beliefs often become perceived as facts because someone desires them to be so. Expressions that use the term include the stock phrase â€Å"Not your father’s,† followed by the name of a product or other object, to communicate that something is not to be associated with an outdated counterpart, and â€Å"when (one) was a twinkle in (his or her) father’s eye,† referring to a period when a man had a notion of being a father but the child had not yet been conceived or born. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:10 Rules for Writing Numbers and Numerals40 Fish IdiomsIf I Was vs. If I Were

Wednesday, November 6, 2019

Never Put Off Till Tomorrow What You Can Do Today Essays

Never Put Off Till Tomorrow What You Can Do Today Essays Never Put Off Till Tomorrow What You Can Do Today Essay Never Put Off Till Tomorrow What You Can Do Today Essay More than 30 years ago the hypothesis of an interventional approach in patients with unstable angina or non–ST-segment elevation myocardial infarction (NSTEMI) was considered only after a cooling-off period. This negative attitude was in part justified by the lack of effective antithrombotic adjunctive therapies and devices in the management of lesion containing thrombus and the subsequent early hazard of percutaneous coronary intervention (PCI). The delay- many days or weeks after hospital admission- to interventional treatment could result in an apparent stabilization of the acute coronary syndrome (ACS) with a high incidence of early recurrent ischemia or nonfatal myocardial infarction (MI) in the more favorable cases or in a definitive cooling of the patients. During this long period many trials comparing an early invasive strategy with a conservative strategy in patients with unstable angina or NSTEMI have produced conflicting results that have delayed the current general consensus regarding the benefit of an early invasive strategy, which is more evident in high-risk patients and mainly driven by the decrease in MI and the need for percutaneous or surgical coronary revascularization. This troubled history might be explained at least in part by the design of most studies that randomized patients before cardiac catheterization and the use of a wide temporal windows- from 24 to 48 h to 5 days- for the definition of early intervention. Randomization before cardiac catheterization resulted in the enrolment of a high percentage (30%) of patients who did not receive coronary revascularization, because of mild or absent atherosclerotic coronary artery disease in most of them, making the comparison of an early invasive strategy versus a conservative or a delayed invasive strategy in selected patients distorted by the high number of patients at low risk of events whatever the strategy adopted. The use of temporal windows as long as 24 to 48 h to several days for the definition of an early treatment hides the potential benefit of a true early treatment (within 24 h of patient presentation) and contributes to maintaining considerable uncertainty about the optimal timing of cardiac catheterization and revascularization for patients with unstable angina or NSTEMI. The study by Sorajja et al. 1) in this issue of the Journal overcame these 2 critical points and provides important data on the impact of delay to PCI on clinical outcome in the large cohort of patients with ACS enrolled in the ACUITY (Acute Catheterization and Urgent Intervention Triage strategY) trial who underwent PCI (2). Patients who underwent PCI (7,749 patients) were stratified by time from hospital presentation to PCI into 3 groups: 24 h. A delay to PCI 24 h after clinical presentation was associated with 50% increase in 30-day and 1-year mortality as compared with patients who were treated earlier. Moreover, true early PCI was associated with a decreased rate of nonfatal MI. The incremental risk of death attributable to PCI delay 24 h was greatest in high-risk patients. The study results are consistent with those of the ISAR-COOL (Intracoronary Stenting With Antithrombotic Regimen Cooling-Off) trial (3). This elegant study is the only randomized trial comparing early intervention (delay to PCI 24 h after clinical presentation than among patients who had earlier PCI: no deaths at 1 year in the Thrombolysis In Myocardial Infarction (TIMI) risk score 1 to 2 subgroup with a time-to-PCI 2% in the subgroup with a time-to-PCI 24 h. This point is really important, because it outlines a major limitation of risk-scoring before cardiac catheterization in the individual patient and at the same time weakens a strategy of deferring for expedited cardiac catheterization only patients with a high risk score. A low TIMI risk score might correspond to a very-high-risk angiographic profile. This event is frequent and confirmed also by early coronary angiography in the PCI-ACUITY patient cohort (1). Nearly one-half of patients who underwent coronary angiography within 24 h of presentation had a baseline target vessel TIMI flow grade 2. A strategy of plaque passivation before PCI could be effective in decreasing PCI complications in the portion of patients who spontaneously or with an intensive antithrombotic treatment may experience improved coronary flow. Also in this subset of patients with an initial favorable course, the incidence of recurrent refractory ischemia is high- as is MI even after successful emergency PCI- whereas a remarkable portion of patients will not respond to antithrombotic therapy: in the ACUITY PCI study, 38% of patients who underwent coronary angiography with a delay 24 h still had a baseline target vessel TIMI flow grade 36 h after randomization). The difference between groups in the primary study end point (6-month death, MI, stroke) rate was not significant (9. % of patients in the early-intervention group, and 11. 3% in the delayed intervention group) (hazard ratio [HR]: 0. 85; 95% confidence interval [CI]: 0. 68 to 1. 06, p = 0. 15). As in previous trials with similar results, the lack of significant difference in outcome between the 2 strategies might be explained by the fact that the study could be underpowered for the primary end point (the study was stopped prematurely because of recruitment challenges ), involved mainly low-intermediate-risk patients with a subsequent low rate of PCI (

Monday, November 4, 2019

Saving Private Ryan Movie Review Example | Topics and Well Written Essays - 1000 words - 1

Saving Private Ryan - Movie Review Example To create this point of view, Spielberg had to show us shots of Captain Miller looking at something and then shows us how the captain reacts to what the captain witnesses. This subjective point of view, not only appears during the first epic battle scene but also in other battle scenes throughout the film. There is another remarkable battle scene later in the film where the soldiers encounter German troops in the bombed-out remains of a French town. Spielberg is keen to show the viewer that men who fight in the war put their life on the line for others, not for heroism, but because it is their duty to do so. He clarifies this point by using Captain Miller’s point of view. Miller is a delightful, soft-spoken individual that experiences the horrifying violence of the battle scene as he sees other soldiers lose their lives. As the leader of his group, Captain Miller lets us in on the importance of winning the war and at the same time shows the viewer on his determination to complete his mission of saving Ryan’s life so that he can go back home.  One controlling motif in the film is the use of noise and silence. This motif is clearly brough t out especially since Spielberg uses Captain Miller’s point of view. There are moments of blasting noise around the soldiers, especially during the battle scenes. In these moments, the soldiers have to carry on regardless of the fact that they cannot even hear themselves or their captain. During the battle, there are also moments when Miller is oblivious to all that is happening around him and even though he can see everything clearly, it seems like everything around him is on mute. This happens during the first battle scene on the beach where a soldier tries to ask him for orders, and he snaps out of the silence back to the noise.  

Saturday, November 2, 2019

Daisy Miller (Henry James) and The Other Two (Edith Wharton) Essay

Daisy Miller (Henry James) and The Other Two (Edith Wharton) - Essay Example The paper undertakes an analysis of two works – the novella Daily Miller by Henry James and the play, ‘The Other Two’ by Edith Wharton in this light especially comparing the interaction of human nature with social traditions. The novella ‘Daisy Miller’ reveals a timeless story of an innocent and courageous American girl who does not abide by the social customs despite warnings from her friends. She reaches Switzerland with her family and meets Winterbourne through her young brother Randolph. Winterbourne is an American who lived in Italy since he was a boy. Another character, Mrs. Walker is also American, but she also has been working in Rome for years. Both of them (Winterbourne and Mrs Walker) have adapted to the values of the European society and understand the restrictions that a young girl is supposed to follow especially during the late nineteenth century Europe. Daisy is presented here as the ‘outsider’ to social customs. ... Walker tells her that she is old enough to be talked about just as she is old enough to be out in the night. Towards the end of the story, when Winterbourne finds Giovanelli and Daisy sitting at the Colosseum he gets angry with the former and tells Daisy that she is under the risk of catching Roman fever. She does not care and laughs it away. In the end she dies of the fever and Giovanelli also declares to Winterbourne that Daisy was the most innocent woman he met. The novel is a timeless novel if seen from the perspective of individuality versus social customs. Though the customs have changed but the conflict between individuality and the traditions remains the same. In contrast to Daisy the readers are introduced to the conservation aristocratic personality of Mrs. Costello who criticizes Daisy’s shamelessness in agreeing to visit places with a gentleman who she has known only for a brief time. Her innocent ignorance stands in stark contrast to the concepts of a ladylike beh avior and the bindings of the society due to which she cannot see through the intention of Giovanelli and her dream to be a part of the rich urban society carries her in the wrong direction but what makes her character significant is the brave way in which she accepts death without any repentance whatsoever for the steps taken. (James) The female central character of the play ‘The Other Two’, Mrs. Alice Waythorn according to her present status has married twice before. Mr. Waythorn has the impression from his wife’s account of her past that she has been brutally treated as it is conducive for a man to think this way, rather than the reverse. With time he notices that his wife is a liar though she seems to be extremely sophisticated and apparently sensitive to

Thursday, October 31, 2019

Microeconomices Research Proposal Example | Topics and Well Written Essays - 1750 words

Microeconomices - Research Proposal Example reover, the presence of the conventional firm places monopoly theory in the prime scene because of the comparable attributes of a colossal firm to a monopolistic corporate power. The concept of monopoly power was initially applied during the 1930s to the traditional theory of the firm by some well-known economists. This breakthrough in the discipline of the economy provided useful tools for economists examining the performance and behavior of firms and industries. However, as expected in every emerging idea, the concept has met strong oppositions and spiteful criticisms, in this case from scholars trained in the conventional assumption of perfect competition. Monopoly theory does not merely go against several of the principles of perfect competition but roused significant doubts on the good organization of laissez-faire capitalism itself (Cleaver 2004). While the new-fangled theory had attracted numerous disbelievers, it was also strongly protected from criticisms. Since the first monopoly framework was derived from perfect competition, the two theories are much in common in terms of their opinion about â€Å"profit maximization, marginal analysis, and mathematical rigor† (Karier 1994: 27). It was easier said than done for advocates of perfect competition to hit on the assumptions in the monopoly model without disparaging their own. Provided with little prospect of locating lapses in the new theory, critics were disposed to plainly disregard it or relegate monopoly as nothing more than a unusual occurrence in the actual economy (ibid). The introduction of monopoly theory into conventional economics was both a success and a disappointment. It was a success because it made available an alternative to the romanticized model of perfect competition. Yet, it was also a disappointment since the circumstances for the typical monopoly framework were ordinarily just as idealized and confusing as perfect competition. Where perfect competition necessitates an unlimited

Tuesday, October 29, 2019

Sociology and Friends Essay Example for Free

Sociology and Friends Essay How Can I Help My Friends Realize Their Value How Can I Help My Friends Realize Their Value Words: 713 The value of friendship is said to be the greatest one among mankind. True friends make others realize their true value. Trying to make someone realize their value can be a difficult process because they might not even realize it themselves. Showing someone how important they are will result in them being a stronger person and in you being a better friend. Friends are meant to help others out in times of need and by doing so we need to show our friends their true value and accomplishing such a task may at times prove to be difficult. Having true friends is very important as it gives us the chance to get advice in times of need, a shoulder to cry on and the ability to share the happiest moments of our life. In all of this we sometimes forget to show others how important they are to us and this can degrade the friendship over a period of time. In today’s fast society there is just not the time to take out and relax. We live in a world that is moving at a very fast rate and taking out time for loved ones usually gets put on the back burner. We need to take out time for our friends and show them their importance but also do something genuinely for them from the bottom of our hearts. We need to put them top on our priority list because value is only given to something that is at the top of our lists. We are investing time with them and it not only shows how much time you want to spend with them but also how you truly value them. Realizing someone’s importance can be hard but once we lose them it suddenly becomes clear to us. We need to give our friends respect because without respect you will not get any back and it just shows, â€Å"you care†. Friends share their most inanimate secrets and help each other out in times of need. This is actually a very important part in friendship because with sharing your problems with your friend it shows that you trust him or her enough to be sharing it with them in the first place. This also shows that you value their advice. You are open to them and you give them the courage to come and talk to you which shows them how important they are in your life and you challenge yourself by giving a part of yourself to them. You need to acknowledge them in such a way by showing them that they are of some importance to your life; and without them it would be difficult for you to go on in life. Show your friends that you truly appreciate them and you are grateful that they are there for you. We should stop looking for the flaws in other individuals. As a society we follow social norms and due to that we like to look for flaws in others, bring others down or show others that we are better than them. In the process of doing so we are bringing other individuals down and abating their value. We need to show our friends that we worry for them and when they are afflicted pain so are we. We need to show our support for them every step along the way and if they are in pain and suffering not look down up upon them but help them bring their head up high and give them the confidence that they are in need of. Friendship is a strong relationship that needs time and energy just like any other relationship in the world. We need to take out time for our friends and help them in desperate times of need. We need to view them as our partners instead of a burden or responsibility that we have to fill. As a society now days we view friendship as harmful at times because of fear that our friend might beat us in any competition of any kind but that is because trust is lost and when we start trusting each other and giving respect these problems will go away on their own. Give values to your friends as than they will realize their true value.

Sunday, October 27, 2019

Mobile Ad Hoc Networks (MANETs)

Mobile Ad Hoc Networks (MANETs) Introduction What is Mobile Ad Hoc Network? With rapid development of wireless technology, the Mobile Ad Hoc Network (MANET) has emerged as a new type of wireless network. MANET is a collection of wireless mobile nodes (e.g. laptops) that dynamically function as a network without the use of any existing infrastructure and centralized administration. It is an autonomous system where each node operates not only as an end system but also as a router to forward packets for other nodes. Since the nodes in MANET move around, the wireless links break and re-establish frequently. Furthermore, most of mobile nodes are resource limited in computing capability and battery power and therefore traditional computing content routing protocols are not suitable for MANET. Several ad hoc routing protocols have been proposed for each node acting as router and maintaining routing information. There are many other applications of MANET. For examples, MANET can be used to provide emergency Services when the network is impaired due to the damaging of existing infrastructure [8]. Computer scientists have predicted a world of ubiquitous computing in which computers will be all around us, constantly performing mundane tasks to make our lives a little easier. These ubiquitous computers connect in mobile ad hoc mode and change the environment or react to the change of the environment where they are suited. MANET is also found useful in the so-called sensor dust network to coordinate the activities and reports of a large collection of tiny sensor devices which could offer detailed information about terrain or environmental dangerous conditions. Problem Statement and Motivation Most current ad hoc routing protocols assume that the wireless network is benign and every node in the network strictly follows the routing behavior and is willing to forward packets for other nodes. Most of these protocols cope well with the dynamically changing topology. However, they do not address the problems when misbehavior nodes present in the network.A commonly observed misbehavior is packet dropping. In a practical MANET, most devices have very limited computing and battery power while packet forwarding consumes a lot of such resources. Thus some of the mobile devices would not like to forward the packets for the benefit of others and they drop packets not destined to them. On the other hand, they still make use of other nodes to forward packets that they originate. These misbehaved nodes are very difficult to identify because we cannot tell that whether the packets are dropped intentionally by the misbehaved nodes or dropped due to the node having moved out of transmission range or other link error. Packet drop significantly decreases the network performance.Traditional security mechanisms are generally not suitable for MANET because: The network lacks central infrastructure to apply traditional security mechanism such as access control, authentication and trusted third party. Limited bandwidth, battery lifetime, and computation power prohibits the deployment of complex routing protocols or encryption algorithms. New security models or mechanisms suitable for MANET must be found. Network topologies and memberships are constantly changing. Thus new intrusion detection system and entity recognition mechanisms that are suitable for mobile ad hoc networks must be designed to avoid or mitigate the behavior to the networks. Trust management systems have been recently introduced as a security mechanism in MANET. In a trust management system, a communicating entity collects evidence regarding competence, honesty or security of other network participants with the purpose of making assessment or decisions regarding their trust relationships. Here trust Objective and Sub-tasks means the confidence of an entity on another entity based on the expectation that the other entity will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other entity . For example, a trust-based routing protocol can collect the evidence of nodes misbehaving, form trust values of the nodes and select safest routes based on the trust metrics.Reputations systems are often seen as a derivation of trust management system. In the reputation system, an entity forms its trust on another entity based not only on the selfobserved evidence but also on the second hand information from third parties. One of the influential reputation systems is the DSR protocol. In the trust management system, reputation system and other trust-based systems, route selection is based on the sending nodes prior experience with other nodes in the network. Its opinions about how other entities are honest are constantly changing. Thus, we call the trust manag ement systems and their derivations as dynamic feedback mechanisms. The dynamic feedback mechanisms are usually applied on the current ad hoc routing protocols to rate the trust about other nodes in the network and make routing decisions based on the trust matrix, which is formed according to the evidence collected from previous interactions. By incorporating the dynamic feedback mechanism in the routing protocol, misbehaved nodes are identified and avoided to forward packets. In this way,misbehavior can be mitigated. Objective and Sub-tasks The primary objective of this thesis is to Investigate the state of the art of dynamic feedback mechanisms and protocols analyze, implement and evaluate DSR protocols to see how it improves the network performance and what are the side effects of introducing the mechanism to the mobile ad hoc network. Following tasks must be done to achieve the primary objective. Study the preliminary knowledge that is required to carry out the main tasks. For example, to understand DSR protocol one must have some knowledge of Bayesian analysis; to do performance analysis one must learn the methodologies of conducting performance analysis and processing simulation data. Investigate security issues of mobile ad hoc network and current dynamic feedback mechanisms or protocols that are used to solve or mitigate the issues. Investigate and learn how to use the network simulation tool. There are several popular network simulation tools available and we need to choose the one that best suits our needs. The selected network simulator should be studied so that we can use it as platform to implement protocol and conduct simulations. Analyze and implement the DSR protocol based on Dynamic Source Routing protocol (DSR); evaluate the network performance. Structure of the Report Since we have almost gone through the chapter one, we only briefly present the content of the subsequent chapters in this section. Preliminary Information State of the Art Analysis Design Implementation and Tests Performance Analysis Conclusion and Future Work Preliminary information we have introduced the MANET. This chapter presents other preliminary information and concepts that will be used in other parts of the thesis. Firstly four general modes of routing operations are introduced and compared. The DSR protocol, which is used as underlying routing protocol in the thesis, is explained in detail. Secondly Bayesian estimation and Beta function are explained to pave the way for the analysis of the reputation model of DSR in the chapter 4. Thirdly some techniques regarding simulation and performance analysis are presented. Finally, several popular network simulation tools are discussed and compared. Mobile Ad Hoc Network Routing Protocols Nowadays there are various routing protocols proposed for the MANET. The most popular ones are DSDV (Destination-Sequenced Distance Vector), TORA (Temporally- Ordered Routing Algorithm), DSR (Dynamic Source Routing) and AODV (Ad-hoc On Demand Distance Vector). These routing protocols can be categorized in different routing operation modes. Mode of Routing Operations These two modes concern whether or not nodes in an ad hoc network should keep track of routes to all possible destinations, or instead keep track of only those destinations of immediate interest Proactive protocols store route information even before it is needed. This kind of protocols has advantage that communications with arbitrary destination experience minimal delay. However it also suffers from the disadvantage that additional control traffic is needed to continually update stale route information. This could significantly increase routing overhead especially for the MANET where the links are often broken. Reactive protocols, on the contrary, acquire routing information only when it is actually needed. However, the latency of the communication increases tremendously especially when a node communicates to another at the first time. Source routing vs. Hop-by-hop routing These two modes concern whether the source node decides the route for a packet to be forwarded to the destination or the intermediate nodes are allowed to decide the next hop until the packet arrives at the destination. In the source routing protocols, the source node decides the route and puts the route information in the packet header. All the intermediate nodes forward the packet along the route faithfully. This kind of protocols has advantage that the intermediate nodes are not required to maintain the routing information. But it suffers from the disadvantage that the packet size grows because of source routing information carried in each packet. In the hop-by-hop routing protocols, it is sufficient for the source to know only how to get to the next hop and intermediate nodes find their own next-hops until the destination. In contrast to source routing protocols, hop-by-hop routing protocols do not increase packet size but they requires all the intermediate nodes to maintain rout ing information. Table 2-1 Categories of routing protocols has compared the performance of these four routing protocols . The results show that DSR has best throughput performance (above 95%) at all mobility rates and movement speeds. Thus we will use DSR as basic routing protocol in this thesis. The Dynamic Source Routing Protocol (DSR) John et al. proposed the dynamic source routing protocol (DSR) [1] which is a routing protocol for use in multi-hop wireless ad hoc networks of mobile nodes. DSR is an ondemand protocol, in which route are only discovered when data need to be transmitted to a node where no route has yet been discovered. The advantage of this on-demand routing protocol is that there are not any periodic routing advertisement and reducing the routing overhead. DSR is also a source routing protocol, allowing multiple routes to any destination and allows each sender to select and control the routes used in routing the packets. DSR is composed of the two main mechanisms: Route Discovery and Route Maintenance which are explained below. Route Discovery Route Discovery aims at finding routes from a source node to destination. Figure 2-1 illustrates the procedure of Route Discovery. When a source node S wants to send a data packet to some destination node D, it first searches its route cache to find whether there is a route to D. If there is no route to D, then S will initiate a Route Discovery and send out Route Request message which is propagated to all the nodes within its transmission range. At the mean time, it saves the data packet in its send buffer. The Route Request message contains the addresses of source node and destination node, a unique route request identifier and a route record which records all the intermediate nodes that this route request packet has traveled through. S appends itself to the beginning of the route record when it initiates the message. When a node receives the Route Request message, it compares the destination address in the message with its own address to judge whether itself is the destination node. If it is not, it will append its own address in the route record and propagate the message to other nodes. If the node is the destination node, it will send a Route Reply message to the source node and the message contains the source route record which is accumulated when the Route Request message is forwarded along its way to the destination. When the destination sends the Route Reply, if it uses MAC protocols such as IEEE 802.11 that require a bidirectional link, it just reverse the source route record and use it as route to send Route Reply to the source node. Otherwise it should find the route by searching its route cache or sending out a Route Request which piggybacks the Route Reply for the source node. When the source node receives the Route Reply message, it puts the returned route into its route cache. From t hen on all the packets destined to the same destination will use this route until it is broken. Route Maintenance Since the ad hoc network is dynamic and the topology of the network changes frequently, the existing routes maintained by nodes in their route cache are often broken. After forwarding a packet, a node must attempt to confirm the reachability of the next-hop node. If the node does not receive any confirmation from the next hop during a certain period of time, it will retransmit the packet. If after a maximum number of retransmission it still does not receive any confirmation, it will think the link to the next hop is broken and will send a Route Error message to the source node. DSR proposes three acknowledge mechanisms to confirm that data can flow over the link from that node to the next hop: Link-layer acknowledgement which is provided by MAC layer protocol such as IEEE 802.11. Passive acknowledgement in which a node hears the next-hop node forwarding the packet and thus confirms the reachability of the link. Network-layer acknowledgement in which a node sends an explicit acknowledgement request to its next-hop node. Passive Acknowledgement Passive Acknowledgement (PACK) is important in DSR protocol because it is used to detect whether the next hop forwards the packet or drops it. We explain it in detail in this section. Passive acknowledgement is used with the assumption that: Network links operates bi- directionally. The network interface is in the promiscuous mode. When a node taps a new packet in promiscuous mode after it originates or forwards a packet, it consider it as an acknowledgement of the first packet if both of following check success. The Source Address, Destination Address, Protocol, Identification, and Fragment Offset fields in the IP header of the two packets MUST match. If either packet contains a DSR Source Route header, both packets MUST contain one, and the value in the Segments Left field in the DSR Source Route header of the new packet MUST be less than that in the first packet. If no matched packet is found during PACK timeout, the node will consider the link between the next hop and itself is broken and will send Route Error message to the source node. Additional features DSR has additional features such as replying to route requests using cached routes, caching overheard routing information, packet salvaging and flow state extension and etc. We will introduce them in section 4.1 and discuss how they will impact the performance of network, how they will interact with DSR and whether they will be enabled in our simulation. Performance Analysis Techniques This section introduces the performance analysis techniques and methodologies that will be used in the performance evaluation. Factors and Primary Factors There are many parameters that will influence the simulation results and need to be carefully chosen in the simulations. Some parameters are chosen based on experience values or the conditions of the network we want to simulate. Others need to be tuned to optimize the network performance. We distinguish the two kinds of parameters as follows: Factors are the variables that affect the simulation result and have several alternatives. Normally they are decided based on experience. Primary factors are the factors whose effects need to be quantified. This kind of factors usually needs to be adjusted through simulation. Data Measurement The key step of the network performance analysis is to interpret the simulation result and summarize the characteristic of the network. To avoid the inaccurate simulation results due to an extreme scenario, we usually run simulations on several different scenarios. The data set of these simulations are called sample. A single number must be presented to give the key characteristic of the sample and this single number is called an average of the data. There are three alternatives to summarize a sample Mean is obtained by taking the sum of all observations and dividing this sum by the number of observations in the sample. Median is obtained by sorting the observations in an increasing order and taking the observation that is in the middle of series. If the number of the observations is even, the mean of the middle two values is used as a median. Mode is obtained by plotting a histogram and specifying the midpoint of the bucket where the histogram peaks. Confidence Interval for the Mean In our performance evaluation, the main objective is to compare the simulation results of DSR and Standard DSR to see whether there is any performance improvement. However, most simulation results are random in some degree due to the particularity of the node movement scenarios and we cannot tell whether the two systems are different. One way to minimize the random effect is to repeat the simulations with different scenarios as many times as possible and get a large sample space. Unfortunately, due to the time limitation we cannot conduct many simulations. points out that using confidence interval we can tell whether the two systems are different with smaller sample space. The confidence interval for the mean can be calculated using If the confidence intervals of the simulation results of the two systems have no overlap, then we can claim the two systems are different and one system is superior or inferior to the other. GloMoSims source and binary code can be downloaded only by academic institutions for research purposes. Commercial users must use QualNet, the commercial version of GloMoSim. OPNET Modeler OPNET Modeler is commercial network simulation environment for network modeling and simulation. It allows the users to design and study communication networks, devices, protocols, and applications with flexibility and scalability [30]. It simulates the network graphically and its graphical editors mirror the structure of actual networks and network components. The users can design the network model visually.The modeler uses object-oriented modeling approach. The nodes and protocols are modeled as classes with inheritance and specialization. The development language is C. Comparison When choosing a network simulator, we normally consider the accuracy of the simulator. Unfortunately there is no conclusion on which of the above three simulator is the most accurate one. David Cavin et al. has conducted experiments to compare the accuracy of the simulators and it finds out that the results are barely comparable [31]. Furthermore, it warns that no standalone simulations can fit all the needs of the wireless developers. It is more realistic to consider a hybrid approach in which only the lowest layers (MAC and physical layers) and the mobility model are simulated and all the upper layers (from transport to application layers) are executed on a dedicated hosts (e.g. cluster of machines). Although there is no definite conclusion about the accuracy of the three network simulators, we have to choose one of them as our simulation environment. We compare the simulators using some metrics and the results are summarized After comparing the three simulators, we decide to choose ns2 as network simulator in our thesis because Ns2 is open source free software. It can be easily downloaded and installed. The author of the thesis has used ns2 in another network related course and gotten familiar with the simulation. Ns2 uses TCL and C++ as development languages for which the author has some programming experience. The author of the DSR protocol has conducted simulation on GloMoSim and gotten performance results. We want to do the simulation on a different simulation to form comparison. State of the Art In this chapter we will introduce the start of the art security solutions in MANET with emphasis on dynamic feedback mechanisms. Firstly, we will present the general security issues/requirements of MANET to pave the way for the future investigation. Then we will discuss the state of the art security mechanisms for MANET such as payment system,trust management system, reputation system, etc. Finally, we will summarize all the security solutions we discussed in this chapter. Security Issues in Mobile Ad Hoc Network Due to lack of central infrastructural and wireless links susceptible to attacks, security in ad hoc network has inherent weakness. In section 1.2 we have discussed the reasons why mobile ad hoc network imposes security challenges that cannot be solved by traditional security mechanisms. In this section, we present the general security properties required by ad hoc network. Following are general security properties regarding ad hoc network Confidentiality: The confdiantiality property is to protect certain information from unauthorized disclosure. The information includes not only the application data that send over the routing protocol, but also the routing information itself as well as network topology and geographical location. Integrity: The integrity ensures that the transmitted message and other system asset are modified only by authorized parties. In the routing level, it requires all nodes in the network following correct routing procedure. The main challenge of ensuring integrity is that without central infrastructure and powerful computing capabilities, it is difficult to apply existing cryptography and key management systems. Availability: The availability property requires that the services or devices are exempt from denial of service, which is normally done by interruption, network or server overload. Typical examples or denial of service attack are radio jamming, in which a misbehaved node transmit radio to interference other nodes communications, and battery exhaustion, in which a misbehaved node interact with a node for no other purpose than to consume its battery energy. Authentication: The authentication property requires that the communication entitys identification is recognized and proved before communication starts. Access control: This property requires restricting resources, services or data to special identities according to their access rights or group membership. Non-repudiation: This property ensures that when data are sent from sender to receiver, the sender cannot deny that he has sent the data and the receiver cannot deny that he has received the data. Mobile nodes may conduct different misbehavior for different purposes. Po-Wah Yau classifies the misbehaved nodes into following categories. Failed nodes are simply those unable to perform an operation; this could be because power failure and environmental events. Badly failed nodes exhibit features of failed nodes but they can also send false routing messages which are a threat to the integrity of the network. Selfish nodes are typified by their unwillingness to cooperate as the protocol requires whenever there is a personal cost involved. Packet dropping is the main attack by selfish nodes. Malicious nodes aim to deliberately disrupt the correct operation of the routing protocol, denying network service if possible. These four types of misbehaved nodes actually can be categorized in two aspects: whether their misbehaviors are intentional or unintentional, and the severity of the results. Payment Systems Payment systems provide economic incentives for the cooperation in MANET. They consider that each node in MANET is its own authority and tries to maximize the benefits it gets from the network. Thus each node tends to be selfish, dropping packets not destined to them but make use of other nodes to forward their own packets. The purpose of payment systems is to encourage the cooperation within the MANET by economic incentives. There are several variations of payment systems proposed. Nuglets Nuglets is a virtual currency mechanism for charging (rewarding) server usage (provision). Nodes that use a service must pay for it (in nuglets) to nodes that provide the service. A typical service is packet forwarding which is provided by intermediate nodes to the source and the destination of the packet. Therefore either the source or the destination should pay for it. There are two models for charging for the packet forwarding service: the Packet Purse Model (PPM) and the Packet Trade Model (PTM). In the Packet Purse Model, the sender pays for the packet. It loads the packet with a number of nuglets when sending the packet. Each intermediate forwarding node acquires some nuglets from the packet that covers its forwarding costs. If a packet does not have enough nuglets to be forwarded, then it is discarded. If there are nuglets left in the packet once it reaches destination, the nuglets are lost. In the Packet Trade Model, the destination pays for the packet. Each intermediate node buys the packet from previous one for some nuglets and sells it to the next one for more nuglets until the destination buys it. Either of the two models has advantages and disadvantages. While the Packet Purse Model deters nodes from sending useless data and avoids the network overloading, the Packet Trade Model can lead to an overload of the network and the destination receives packets it does not want. On the other hand, in the Packet Purse Model it is difficult to estimate the number of nuglets th at are required to reach a given destination. But thePacket Purse Model does not need to consider this problem. To take advantages of the two models and avoid the disadvantages, a hybrid model is suggested. In this model, the sender loads the packet with some nuglets before sending it.The packet is handled according to the Packet Purse Model until it runs out of nuglets. Then it is handled according to the Packet Trade Model until the destination buys it. Counter To address the problems encountered by the nuglets approach such as difficulty in estimating pre-load nuglets and possible network overload, another payment approach based on credit counter is suggested. In this approach, the current state of each node is described by two variables b and c, where b is the remaining battery power and cstands for the value of its nuglet counter. More precisely, b is the number of packets that the node can send using its remaining energy and c is the number of packets a node canoriginate. A node can originate a number of packets N only when the condition c=N holds. When a node forwards a packet, nuglet counter c is increased by one and b is reduced by one. Thus in order to originate packets, each node must earn credits by forwarding packets. The counter solution requires tamper resistant hardware security module. Spirit S. Zhong et al. proposed Sprite [19], a credit-based system for MANET. As opposed to Nuglets or Counter they do not require tamper-proof hardware to prevent the fabrication of payment units. Instead, they introduce a central Credit Clearance Service (CCS). The basic scheme of the system is as follows. When a node receives a message the node keeps a receipt of the message and reports to the CCS when the node has a fast connection to Credit Clearance Service (CCS). The CCS then determines the charge and credits to each node involved in the transmission of a message, depending on the reported receipts of a message. In this scheme, the sender charges money. A node that has forwarded a message is compensated, but the credit that a node receives depends on whether or not its forwarding action is successful. Forwarding is considered successful if and only if the next node on the path reports a valid receipt to the CCS. Discussion on the Payment Systems The payment systems we describe in above sections either assumes a tamper resistant hardware module is available to ensure that the behavior of the node is not modified or requires a central authority server to determine the charge and credit to each node involved in the transmission of a message. Tamper resistant hardware may not be appropriate for most mobile devices because it demands advanced hardware solution and increases the cost of the devices. Lacking of central authority server is right the inherent property of MANET that causes security challenges so it is also not appropriate. Furthermore, all the approaches described above suffer from locality problems [20] that nodes in different locations of the network will have different chances for earning virtualcurrency, which may not be fair for all nodes. Usually nodes at the periphery of the network will have less chance to be rewarded. Reputation System Reputation systems have emerged as a way to reduce the risk entailed in interactions among total strangers in electronic marketplace. Centralized reputation systems have been adopted by many on-line electronic auctions such as eBay to collect and store reputation ratings from feedback providers in a centralized reputation database. Decentralized reputation systems used by MANET, on the other hand, do not use centralized reputation database. Instead, in these reputation systems, each node keeps the ratings about other node and updating the ratings by direct observation of the behaviorsof neighboring nodes or second hand information from other trusted nodes. Identifies three goals for reputation systems: To provide information to distinguish between a trust-worthy principal and an untrustworthy principals. To encourage principals to act in a trustworthy manner To discourage untrustworthy principals from participating in the service the reputation mechanism is present to protect. Most of the reputation systems in MANET are based on trust management system. Trust is such a subjective and dynamic concept that different entities can hold different opinions on it even while facing the same situation. Trust management system can work without reputation system. For example, a mobile node can form opinion about other nodes by direct experience with the nodes.We can unify reputation system and trust management system to dynamic feedback mechanisms. Former one is a global reputation system and mobile nodes share their own experiences of interaction with other nodes. The later one is a local reputation system in which mobile nodes rating the trustability of other nodes based on its own observation. DSR DSR is a reputation system aiming at coping with misbehavior in MANET. The idea is to detect the misbehaved nodes and isolate them fromcommunication by not using them for routing and forwarding and by not allowing the misbehaved nodes to use itself to forward packets. DSR stands for Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Network. It usually works as an extension to on demand routing Mobile Ad Hoc Networks (MANETs) Mobile Ad Hoc Networks (MANETs) Introduction What is Mobile Ad Hoc Network? With rapid development of wireless technology, the Mobile Ad Hoc Network (MANET) has emerged as a new type of wireless network. MANET is a collection of wireless mobile nodes (e.g. laptops) that dynamically function as a network without the use of any existing infrastructure and centralized administration. It is an autonomous system where each node operates not only as an end system but also as a router to forward packets for other nodes. Since the nodes in MANET move around, the wireless links break and re-establish frequently. Furthermore, most of mobile nodes are resource limited in computing capability and battery power and therefore traditional computing content routing protocols are not suitable for MANET. Several ad hoc routing protocols have been proposed for each node acting as router and maintaining routing information. There are many other applications of MANET. For examples, MANET can be used to provide emergency Services when the network is impaired due to the damaging of existing infrastructure [8]. Computer scientists have predicted a world of ubiquitous computing in which computers will be all around us, constantly performing mundane tasks to make our lives a little easier. These ubiquitous computers connect in mobile ad hoc mode and change the environment or react to the change of the environment where they are suited. MANET is also found useful in the so-called sensor dust network to coordinate the activities and reports of a large collection of tiny sensor devices which could offer detailed information about terrain or environmental dangerous conditions. Problem Statement and Motivation Most current ad hoc routing protocols assume that the wireless network is benign and every node in the network strictly follows the routing behavior and is willing to forward packets for other nodes. Most of these protocols cope well with the dynamically changing topology. However, they do not address the problems when misbehavior nodes present in the network.A commonly observed misbehavior is packet dropping. In a practical MANET, most devices have very limited computing and battery power while packet forwarding consumes a lot of such resources. Thus some of the mobile devices would not like to forward the packets for the benefit of others and they drop packets not destined to them. On the other hand, they still make use of other nodes to forward packets that they originate. These misbehaved nodes are very difficult to identify because we cannot tell that whether the packets are dropped intentionally by the misbehaved nodes or dropped due to the node having moved out of transmission range or other link error. Packet drop significantly decreases the network performance.Traditional security mechanisms are generally not suitable for MANET because: The network lacks central infrastructure to apply traditional security mechanism such as access control, authentication and trusted third party. Limited bandwidth, battery lifetime, and computation power prohibits the deployment of complex routing protocols or encryption algorithms. New security models or mechanisms suitable for MANET must be found. Network topologies and memberships are constantly changing. Thus new intrusion detection system and entity recognition mechanisms that are suitable for mobile ad hoc networks must be designed to avoid or mitigate the behavior to the networks. Trust management systems have been recently introduced as a security mechanism in MANET. In a trust management system, a communicating entity collects evidence regarding competence, honesty or security of other network participants with the purpose of making assessment or decisions regarding their trust relationships. Here trust Objective and Sub-tasks means the confidence of an entity on another entity based on the expectation that the other entity will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other entity . For example, a trust-based routing protocol can collect the evidence of nodes misbehaving, form trust values of the nodes and select safest routes based on the trust metrics.Reputations systems are often seen as a derivation of trust management system. In the reputation system, an entity forms its trust on another entity based not only on the selfobserved evidence but also on the second hand information from third parties. One of the influential reputation systems is the DSR protocol. In the trust management system, reputation system and other trust-based systems, route selection is based on the sending nodes prior experience with other nodes in the network. Its opinions about how other entities are honest are constantly changing. Thus, we call the trust manag ement systems and their derivations as dynamic feedback mechanisms. The dynamic feedback mechanisms are usually applied on the current ad hoc routing protocols to rate the trust about other nodes in the network and make routing decisions based on the trust matrix, which is formed according to the evidence collected from previous interactions. By incorporating the dynamic feedback mechanism in the routing protocol, misbehaved nodes are identified and avoided to forward packets. In this way,misbehavior can be mitigated. Objective and Sub-tasks The primary objective of this thesis is to Investigate the state of the art of dynamic feedback mechanisms and protocols analyze, implement and evaluate DSR protocols to see how it improves the network performance and what are the side effects of introducing the mechanism to the mobile ad hoc network. Following tasks must be done to achieve the primary objective. Study the preliminary knowledge that is required to carry out the main tasks. For example, to understand DSR protocol one must have some knowledge of Bayesian analysis; to do performance analysis one must learn the methodologies of conducting performance analysis and processing simulation data. Investigate security issues of mobile ad hoc network and current dynamic feedback mechanisms or protocols that are used to solve or mitigate the issues. Investigate and learn how to use the network simulation tool. There are several popular network simulation tools available and we need to choose the one that best suits our needs. The selected network simulator should be studied so that we can use it as platform to implement protocol and conduct simulations. Analyze and implement the DSR protocol based on Dynamic Source Routing protocol (DSR); evaluate the network performance. Structure of the Report Since we have almost gone through the chapter one, we only briefly present the content of the subsequent chapters in this section. Preliminary Information State of the Art Analysis Design Implementation and Tests Performance Analysis Conclusion and Future Work Preliminary information we have introduced the MANET. This chapter presents other preliminary information and concepts that will be used in other parts of the thesis. Firstly four general modes of routing operations are introduced and compared. The DSR protocol, which is used as underlying routing protocol in the thesis, is explained in detail. Secondly Bayesian estimation and Beta function are explained to pave the way for the analysis of the reputation model of DSR in the chapter 4. Thirdly some techniques regarding simulation and performance analysis are presented. Finally, several popular network simulation tools are discussed and compared. Mobile Ad Hoc Network Routing Protocols Nowadays there are various routing protocols proposed for the MANET. The most popular ones are DSDV (Destination-Sequenced Distance Vector), TORA (Temporally- Ordered Routing Algorithm), DSR (Dynamic Source Routing) and AODV (Ad-hoc On Demand Distance Vector). These routing protocols can be categorized in different routing operation modes. Mode of Routing Operations These two modes concern whether or not nodes in an ad hoc network should keep track of routes to all possible destinations, or instead keep track of only those destinations of immediate interest Proactive protocols store route information even before it is needed. This kind of protocols has advantage that communications with arbitrary destination experience minimal delay. However it also suffers from the disadvantage that additional control traffic is needed to continually update stale route information. This could significantly increase routing overhead especially for the MANET where the links are often broken. Reactive protocols, on the contrary, acquire routing information only when it is actually needed. However, the latency of the communication increases tremendously especially when a node communicates to another at the first time. Source routing vs. Hop-by-hop routing These two modes concern whether the source node decides the route for a packet to be forwarded to the destination or the intermediate nodes are allowed to decide the next hop until the packet arrives at the destination. In the source routing protocols, the source node decides the route and puts the route information in the packet header. All the intermediate nodes forward the packet along the route faithfully. This kind of protocols has advantage that the intermediate nodes are not required to maintain the routing information. But it suffers from the disadvantage that the packet size grows because of source routing information carried in each packet. In the hop-by-hop routing protocols, it is sufficient for the source to know only how to get to the next hop and intermediate nodes find their own next-hops until the destination. In contrast to source routing protocols, hop-by-hop routing protocols do not increase packet size but they requires all the intermediate nodes to maintain rout ing information. Table 2-1 Categories of routing protocols has compared the performance of these four routing protocols . The results show that DSR has best throughput performance (above 95%) at all mobility rates and movement speeds. Thus we will use DSR as basic routing protocol in this thesis. The Dynamic Source Routing Protocol (DSR) John et al. proposed the dynamic source routing protocol (DSR) [1] which is a routing protocol for use in multi-hop wireless ad hoc networks of mobile nodes. DSR is an ondemand protocol, in which route are only discovered when data need to be transmitted to a node where no route has yet been discovered. The advantage of this on-demand routing protocol is that there are not any periodic routing advertisement and reducing the routing overhead. DSR is also a source routing protocol, allowing multiple routes to any destination and allows each sender to select and control the routes used in routing the packets. DSR is composed of the two main mechanisms: Route Discovery and Route Maintenance which are explained below. Route Discovery Route Discovery aims at finding routes from a source node to destination. Figure 2-1 illustrates the procedure of Route Discovery. When a source node S wants to send a data packet to some destination node D, it first searches its route cache to find whether there is a route to D. If there is no route to D, then S will initiate a Route Discovery and send out Route Request message which is propagated to all the nodes within its transmission range. At the mean time, it saves the data packet in its send buffer. The Route Request message contains the addresses of source node and destination node, a unique route request identifier and a route record which records all the intermediate nodes that this route request packet has traveled through. S appends itself to the beginning of the route record when it initiates the message. When a node receives the Route Request message, it compares the destination address in the message with its own address to judge whether itself is the destination node. If it is not, it will append its own address in the route record and propagate the message to other nodes. If the node is the destination node, it will send a Route Reply message to the source node and the message contains the source route record which is accumulated when the Route Request message is forwarded along its way to the destination. When the destination sends the Route Reply, if it uses MAC protocols such as IEEE 802.11 that require a bidirectional link, it just reverse the source route record and use it as route to send Route Reply to the source node. Otherwise it should find the route by searching its route cache or sending out a Route Request which piggybacks the Route Reply for the source node. When the source node receives the Route Reply message, it puts the returned route into its route cache. From t hen on all the packets destined to the same destination will use this route until it is broken. Route Maintenance Since the ad hoc network is dynamic and the topology of the network changes frequently, the existing routes maintained by nodes in their route cache are often broken. After forwarding a packet, a node must attempt to confirm the reachability of the next-hop node. If the node does not receive any confirmation from the next hop during a certain period of time, it will retransmit the packet. If after a maximum number of retransmission it still does not receive any confirmation, it will think the link to the next hop is broken and will send a Route Error message to the source node. DSR proposes three acknowledge mechanisms to confirm that data can flow over the link from that node to the next hop: Link-layer acknowledgement which is provided by MAC layer protocol such as IEEE 802.11. Passive acknowledgement in which a node hears the next-hop node forwarding the packet and thus confirms the reachability of the link. Network-layer acknowledgement in which a node sends an explicit acknowledgement request to its next-hop node. Passive Acknowledgement Passive Acknowledgement (PACK) is important in DSR protocol because it is used to detect whether the next hop forwards the packet or drops it. We explain it in detail in this section. Passive acknowledgement is used with the assumption that: Network links operates bi- directionally. The network interface is in the promiscuous mode. When a node taps a new packet in promiscuous mode after it originates or forwards a packet, it consider it as an acknowledgement of the first packet if both of following check success. The Source Address, Destination Address, Protocol, Identification, and Fragment Offset fields in the IP header of the two packets MUST match. If either packet contains a DSR Source Route header, both packets MUST contain one, and the value in the Segments Left field in the DSR Source Route header of the new packet MUST be less than that in the first packet. If no matched packet is found during PACK timeout, the node will consider the link between the next hop and itself is broken and will send Route Error message to the source node. Additional features DSR has additional features such as replying to route requests using cached routes, caching overheard routing information, packet salvaging and flow state extension and etc. We will introduce them in section 4.1 and discuss how they will impact the performance of network, how they will interact with DSR and whether they will be enabled in our simulation. Performance Analysis Techniques This section introduces the performance analysis techniques and methodologies that will be used in the performance evaluation. Factors and Primary Factors There are many parameters that will influence the simulation results and need to be carefully chosen in the simulations. Some parameters are chosen based on experience values or the conditions of the network we want to simulate. Others need to be tuned to optimize the network performance. We distinguish the two kinds of parameters as follows: Factors are the variables that affect the simulation result and have several alternatives. Normally they are decided based on experience. Primary factors are the factors whose effects need to be quantified. This kind of factors usually needs to be adjusted through simulation. Data Measurement The key step of the network performance analysis is to interpret the simulation result and summarize the characteristic of the network. To avoid the inaccurate simulation results due to an extreme scenario, we usually run simulations on several different scenarios. The data set of these simulations are called sample. A single number must be presented to give the key characteristic of the sample and this single number is called an average of the data. There are three alternatives to summarize a sample Mean is obtained by taking the sum of all observations and dividing this sum by the number of observations in the sample. Median is obtained by sorting the observations in an increasing order and taking the observation that is in the middle of series. If the number of the observations is even, the mean of the middle two values is used as a median. Mode is obtained by plotting a histogram and specifying the midpoint of the bucket where the histogram peaks. Confidence Interval for the Mean In our performance evaluation, the main objective is to compare the simulation results of DSR and Standard DSR to see whether there is any performance improvement. However, most simulation results are random in some degree due to the particularity of the node movement scenarios and we cannot tell whether the two systems are different. One way to minimize the random effect is to repeat the simulations with different scenarios as many times as possible and get a large sample space. Unfortunately, due to the time limitation we cannot conduct many simulations. points out that using confidence interval we can tell whether the two systems are different with smaller sample space. The confidence interval for the mean can be calculated using If the confidence intervals of the simulation results of the two systems have no overlap, then we can claim the two systems are different and one system is superior or inferior to the other. GloMoSims source and binary code can be downloaded only by academic institutions for research purposes. Commercial users must use QualNet, the commercial version of GloMoSim. OPNET Modeler OPNET Modeler is commercial network simulation environment for network modeling and simulation. It allows the users to design and study communication networks, devices, protocols, and applications with flexibility and scalability [30]. It simulates the network graphically and its graphical editors mirror the structure of actual networks and network components. The users can design the network model visually.The modeler uses object-oriented modeling approach. The nodes and protocols are modeled as classes with inheritance and specialization. The development language is C. Comparison When choosing a network simulator, we normally consider the accuracy of the simulator. Unfortunately there is no conclusion on which of the above three simulator is the most accurate one. David Cavin et al. has conducted experiments to compare the accuracy of the simulators and it finds out that the results are barely comparable [31]. Furthermore, it warns that no standalone simulations can fit all the needs of the wireless developers. It is more realistic to consider a hybrid approach in which only the lowest layers (MAC and physical layers) and the mobility model are simulated and all the upper layers (from transport to application layers) are executed on a dedicated hosts (e.g. cluster of machines). Although there is no definite conclusion about the accuracy of the three network simulators, we have to choose one of them as our simulation environment. We compare the simulators using some metrics and the results are summarized After comparing the three simulators, we decide to choose ns2 as network simulator in our thesis because Ns2 is open source free software. It can be easily downloaded and installed. The author of the thesis has used ns2 in another network related course and gotten familiar with the simulation. Ns2 uses TCL and C++ as development languages for which the author has some programming experience. The author of the DSR protocol has conducted simulation on GloMoSim and gotten performance results. We want to do the simulation on a different simulation to form comparison. State of the Art In this chapter we will introduce the start of the art security solutions in MANET with emphasis on dynamic feedback mechanisms. Firstly, we will present the general security issues/requirements of MANET to pave the way for the future investigation. Then we will discuss the state of the art security mechanisms for MANET such as payment system,trust management system, reputation system, etc. Finally, we will summarize all the security solutions we discussed in this chapter. Security Issues in Mobile Ad Hoc Network Due to lack of central infrastructural and wireless links susceptible to attacks, security in ad hoc network has inherent weakness. In section 1.2 we have discussed the reasons why mobile ad hoc network imposes security challenges that cannot be solved by traditional security mechanisms. In this section, we present the general security properties required by ad hoc network. Following are general security properties regarding ad hoc network Confidentiality: The confdiantiality property is to protect certain information from unauthorized disclosure. The information includes not only the application data that send over the routing protocol, but also the routing information itself as well as network topology and geographical location. Integrity: The integrity ensures that the transmitted message and other system asset are modified only by authorized parties. In the routing level, it requires all nodes in the network following correct routing procedure. The main challenge of ensuring integrity is that without central infrastructure and powerful computing capabilities, it is difficult to apply existing cryptography and key management systems. Availability: The availability property requires that the services or devices are exempt from denial of service, which is normally done by interruption, network or server overload. Typical examples or denial of service attack are radio jamming, in which a misbehaved node transmit radio to interference other nodes communications, and battery exhaustion, in which a misbehaved node interact with a node for no other purpose than to consume its battery energy. Authentication: The authentication property requires that the communication entitys identification is recognized and proved before communication starts. Access control: This property requires restricting resources, services or data to special identities according to their access rights or group membership. Non-repudiation: This property ensures that when data are sent from sender to receiver, the sender cannot deny that he has sent the data and the receiver cannot deny that he has received the data. Mobile nodes may conduct different misbehavior for different purposes. Po-Wah Yau classifies the misbehaved nodes into following categories. Failed nodes are simply those unable to perform an operation; this could be because power failure and environmental events. Badly failed nodes exhibit features of failed nodes but they can also send false routing messages which are a threat to the integrity of the network. Selfish nodes are typified by their unwillingness to cooperate as the protocol requires whenever there is a personal cost involved. Packet dropping is the main attack by selfish nodes. Malicious nodes aim to deliberately disrupt the correct operation of the routing protocol, denying network service if possible. These four types of misbehaved nodes actually can be categorized in two aspects: whether their misbehaviors are intentional or unintentional, and the severity of the results. Payment Systems Payment systems provide economic incentives for the cooperation in MANET. They consider that each node in MANET is its own authority and tries to maximize the benefits it gets from the network. Thus each node tends to be selfish, dropping packets not destined to them but make use of other nodes to forward their own packets. The purpose of payment systems is to encourage the cooperation within the MANET by economic incentives. There are several variations of payment systems proposed. Nuglets Nuglets is a virtual currency mechanism for charging (rewarding) server usage (provision). Nodes that use a service must pay for it (in nuglets) to nodes that provide the service. A typical service is packet forwarding which is provided by intermediate nodes to the source and the destination of the packet. Therefore either the source or the destination should pay for it. There are two models for charging for the packet forwarding service: the Packet Purse Model (PPM) and the Packet Trade Model (PTM). In the Packet Purse Model, the sender pays for the packet. It loads the packet with a number of nuglets when sending the packet. Each intermediate forwarding node acquires some nuglets from the packet that covers its forwarding costs. If a packet does not have enough nuglets to be forwarded, then it is discarded. If there are nuglets left in the packet once it reaches destination, the nuglets are lost. In the Packet Trade Model, the destination pays for the packet. Each intermediate node buys the packet from previous one for some nuglets and sells it to the next one for more nuglets until the destination buys it. Either of the two models has advantages and disadvantages. While the Packet Purse Model deters nodes from sending useless data and avoids the network overloading, the Packet Trade Model can lead to an overload of the network and the destination receives packets it does not want. On the other hand, in the Packet Purse Model it is difficult to estimate the number of nuglets th at are required to reach a given destination. But thePacket Purse Model does not need to consider this problem. To take advantages of the two models and avoid the disadvantages, a hybrid model is suggested. In this model, the sender loads the packet with some nuglets before sending it.The packet is handled according to the Packet Purse Model until it runs out of nuglets. Then it is handled according to the Packet Trade Model until the destination buys it. Counter To address the problems encountered by the nuglets approach such as difficulty in estimating pre-load nuglets and possible network overload, another payment approach based on credit counter is suggested. In this approach, the current state of each node is described by two variables b and c, where b is the remaining battery power and cstands for the value of its nuglet counter. More precisely, b is the number of packets that the node can send using its remaining energy and c is the number of packets a node canoriginate. A node can originate a number of packets N only when the condition c=N holds. When a node forwards a packet, nuglet counter c is increased by one and b is reduced by one. Thus in order to originate packets, each node must earn credits by forwarding packets. The counter solution requires tamper resistant hardware security module. Spirit S. Zhong et al. proposed Sprite [19], a credit-based system for MANET. As opposed to Nuglets or Counter they do not require tamper-proof hardware to prevent the fabrication of payment units. Instead, they introduce a central Credit Clearance Service (CCS). The basic scheme of the system is as follows. When a node receives a message the node keeps a receipt of the message and reports to the CCS when the node has a fast connection to Credit Clearance Service (CCS). The CCS then determines the charge and credits to each node involved in the transmission of a message, depending on the reported receipts of a message. In this scheme, the sender charges money. A node that has forwarded a message is compensated, but the credit that a node receives depends on whether or not its forwarding action is successful. Forwarding is considered successful if and only if the next node on the path reports a valid receipt to the CCS. Discussion on the Payment Systems The payment systems we describe in above sections either assumes a tamper resistant hardware module is available to ensure that the behavior of the node is not modified or requires a central authority server to determine the charge and credit to each node involved in the transmission of a message. Tamper resistant hardware may not be appropriate for most mobile devices because it demands advanced hardware solution and increases the cost of the devices. Lacking of central authority server is right the inherent property of MANET that causes security challenges so it is also not appropriate. Furthermore, all the approaches described above suffer from locality problems [20] that nodes in different locations of the network will have different chances for earning virtualcurrency, which may not be fair for all nodes. Usually nodes at the periphery of the network will have less chance to be rewarded. Reputation System Reputation systems have emerged as a way to reduce the risk entailed in interactions among total strangers in electronic marketplace. Centralized reputation systems have been adopted by many on-line electronic auctions such as eBay to collect and store reputation ratings from feedback providers in a centralized reputation database. Decentralized reputation systems used by MANET, on the other hand, do not use centralized reputation database. Instead, in these reputation systems, each node keeps the ratings about other node and updating the ratings by direct observation of the behaviorsof neighboring nodes or second hand information from other trusted nodes. Identifies three goals for reputation systems: To provide information to distinguish between a trust-worthy principal and an untrustworthy principals. To encourage principals to act in a trustworthy manner To discourage untrustworthy principals from participating in the service the reputation mechanism is present to protect. Most of the reputation systems in MANET are based on trust management system. Trust is such a subjective and dynamic concept that different entities can hold different opinions on it even while facing the same situation. Trust management system can work without reputation system. For example, a mobile node can form opinion about other nodes by direct experience with the nodes.We can unify reputation system and trust management system to dynamic feedback mechanisms. Former one is a global reputation system and mobile nodes share their own experiences of interaction with other nodes. The later one is a local reputation system in which mobile nodes rating the trustability of other nodes based on its own observation. DSR DSR is a reputation system aiming at coping with misbehavior in MANET. The idea is to detect the misbehaved nodes and isolate them fromcommunication by not using them for routing and forwarding and by not allowing the misbehaved nodes to use itself to forward packets. DSR stands for Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Network. It usually works as an extension to on demand routing