Thursday, October 31, 2019

Budget of a city Research Paper Example | Topics and Well Written Essays - 1500 words

Budget of a city - Research Paper Example Each department head articulates their own segment of the budget and presents it to the Village Manager and the Financial Director and consequently funds are allocated in accordance with the evaluations made. The estimations made are then finalized and presented to the Finance Committee and Village Board for review and direction which is then adopted by the Mayor and Board of Trustees (The Village of Niles 1-20). THESIS STATEMENT This paper intends to conduct a descriptive study of the budget prepared for the Village of Niles for the FY 2014.The paper would also provide a detailed study of the different priorities of the budget plan along with the sources of funding for the entity and their strengths and weaknesses. Furthermore, an explanation of the different segments where the money would be spent would also be provided in the paper. Different ways in which the local government could handle an economic recession would also be ascertained. DISCUSSION Explanation of the Priorities of the Budget Plan. It is considered that every budget plan is prepared with a prime motive. Fiscal budget is essentially prepared to support a number of imperative facets of a nation that require adequate assistances. With reference to the FY budget 2014 of Village of Niles, a few of the priorities that have been stated are listed hereunder: Community Development The community development department is essentially associated with issuing building permits, providing inspectional services within the village and keeping a track of the business and rental licensing within the village. Moreover, the department is also associated with property maintenance inspection within the village. It is worth mentioning that since 2013 the department has also undertaken the responsibility of the Fire Prevention Bureau and economic development marketing of the village. The major reason behind selecting the community development department as one of the priorities for the FY budget 2014 is to develop th e village zoning code in order to meet the growing need of the community, develop short term and long term goals with an aim to develop the economic condition of the village and also to market the village in the national level. The budget also aims to develop the information technology (IT) software associated with the licensing, maintenance and health division within the village for better efficiency that would facilitate to provide more quality services to the public. The budget allotted for the department also covers vital facets such as amended language for Chapter 46, Fire Prevention. It has not been addressed by the government. The budget also aims at inspecting 1300 business within the village (The Village of Niles 28-35). General Government Department The General Government Department is concerned with two primary objectives i.e. to provide high quality service to the villagers and to maximize the efficiency of village service delivery through the use of cost efficiencies. T he vital reason behind selecting the department as the other priority for the FY budget 2014 is to establish a coordinated relation amid the elected officials and the staff of the different departments within the village. The budget allotted for the department also aims to update the emergency operation center plan, the department also plans to collaborate with the Niles Park District Plan for conducting successful

Monday, October 28, 2019

Kite Runner Film Adaption Essay Example for Free

Kite Runner Film Adaption Essay â€Å"The Kite Runner† is a movie that has been adapted from the novel written by Khaled Hosseini. According to the past, certain characters and events of the films that had been based on the novels have been left out. Unexpectedly, there are merits in this film that should be acknowledged. The movie follows the story quite closely through those points, and telling the story adequately. They are the additions to the screenplay, the sensory experience and the narration respectively. The changes made in the movie had a significant effect on the overall message of the story. One of the parts in the film that differs from the novel is the birthday gift for Hassan. When Hassan’s birthday takes place in the novel, he gets paid a surgery by Baba to get rid of his harelip. But in the film, when Hassan celebrates his birthday, he receives a kite from Baba. Apparently, the kite is more suitable in the context, because it completely relates to the title, but also a symbol of friendship. The film helps the audience to have a thoroughly understanding of the culture of Afghan. It attempts to present the cultural sights and sounds of Afghan life. By transferring the story to screen, it has taken advantage of visual elements, showing sensory experience of the kite combat and the appearance of bazaar. Moreover, Afghan’s music is added in the movie to increase the mood and realistic. The replacement of the first person narration plays an essential part in the movie. The novel is written from Admir’s point of view where his own thoughts and opinions are also included. The personal narrative of the book is what makes the story poignant. Therefore, the third person point of view in the movie would be completely different. It is more objective and immediate, and more details are included. The deletion from the novel, sensory experience, and the replacing of the narration has made a slightly difference form the novel. But still, they are essential to the movements of the story and play an important role in the film.

Saturday, October 26, 2019

Cluster Computing: History, Applications and Benefits

Cluster Computing: History, Applications and Benefits Abstract This report will provide a detailed review of the cluster computing. In this report we look at the birth of cluster computing till the present and the future direction the technology is headed. After the literature review, we move on to the explanation of theories involved from the author’s point of view. The final section of the report covers the current trends and future evolution of the technology as perceived from the author’s point of view. The essence of the report would be a better understanding of the cluster computing and its many uses in today’s world. Introduction A computer cluster consists of a set of loosely connected or tightly connected computers that work together so that in many respects they can be viewed as a single system. The components of a cluster are usually connected to each other through fast local area networks (LAN), with each node (computer used as a server) running its own instance of an operating system. Computer clusters emerged as a result of convergence of a number of computing trends including the availability of low cost microprocessors, high speed networks, and software for high performance distributed computing. Clusters are usually deployed to improve performance and availability over that of a single computer, while typically being much more cost-effective than single computers of comparable speed or availability.[1] Computer clusters have a wide range of applicability and deployment, ranging from small business clusters with a handful of nodes to some of the fastest supercomputers in the world such as IBMs Sequoia. [2] Literature review In 1967 a paper published by Gene Amdahl of IBM, formally invented the basis of cluster computing as a way of doing parallel work. It is now known as Amdahl’s Law. It is a model for correlation between the expected speedup of parallelized implementations of an algorithm relative to the serial algorithm, assuming the problem size remains the same. [3] Types of Clusters Computer clusters are used in many organizations to increase processing time, faster data storing and retrieval time, etc. These computer clusters can be classified in three main types of clusters but these can be mixed to achieve higher performance or reliability. High performance clusters High availability clusters Load Balancing clusters High Performance Cluster: High performance computing sometimes refer to as high performance computing are used for computation-intensive applications, rather than handling IO-oriented applications such as web service or databases.[4] examples of HPCs can include the computational simulations of vehicle crashes or weather. Very tightly coupled computer clusters are designed for work that may approach supercomputing. The worlds fastest machine in 2011 was the K computer which has a distributed memory, cluster architecture.[5] High Availability Cluster: High availability clusters are commonly known as failover clusters. They are used to improve the availability of the cluster approach. In high availability clusters, redundant nodes are used which take over in case of component failure. It is used to eliminate single point of failure by having redundant cluster components.[6] High Availability clusters are often used for critical databases, file sharing on a network, business applications, and customer services such as electronic commerce websites. Load Balancing Cluster: Load balancing clusters, as the name suggests are the cluster configurations where the computational workload is shared between the nodes for better overall performance. One of the best examples of load balancing cluster is a web server cluster. It may use a round robin method to assign each new request to a different node for overall increase in performance. [7] Benefits of Clusters: There are numerous advantages to using cluster computing. Some of these are detailed below. Cost: Cluster technique is cost effective compared to other techniques in terms of the amount of power and processing speed being produced due to the fact that it used off the shelf hardware and software components as compare to the mainframe computers, which use custom build proprietary hardware and software components. Processing speed: In a cluster, multiple computers work together to provide unified processing, which in turn provides faster processing. Flexibility: In contrast to a mainframe computer, a computer cluster can be upgraded to a higher specification or expanded by adding extra nodes. Higher availability: Single component failure is mitigated by redundant machines taking over the processing uninterrupted. This type of redundancy is lacking in mainframe systems. Cluster Management: Message passing and communication The two most often used approaches for cluster communications are PVM and MPI. PVM stands for parallel virtual machine. It was developed around 1989 by Oak Ridge National Laboratory. It is directly installed on every node and it provides a set of libraries that make the node a â€Å"parallel virtual machine†. It provides a run time environment for resource task management, fault notification and message passing. User programs written in C, C++ or Fortran can use PVM.[8][9] MPI stands for message passing interface. It emerged in 1990s and supersedes PVM. MPI design is based on various commercially available systems of the time. Its implementation typically uses TCP/IP and socket connection. Currently it’s the most widely used communication system enabling parallel programming in C, Fortran, Python etc.[9][10] Task scheduling Task scheduling becomes a challenge, when a large multiuser cluster needs access to huge amounts of data. In a heterogeneous CPU-GPU cluster, mapping tasks onto CPU cores and GPU devices provide quite a challenge because it’s a complex application environment and the performance of each job depends on the abilities of the underlying technologies. Task scheduling is an active area of ongoing research and there have been proposals to build an algorithms which combine and extend MapReduce and Hadoop. [11] Node failure management Node failure management is a technique used to handle a failed node in a cluster using strategies such as â€Å"fencing†. It isolates the node or a shared resource when it detects a malfunction. There are two types of fencing. First is to disable the node and the second is to prevent access to resources like shared disks. [12] The first method uses STONITH. Which stands for â€Å"Shoot The Other Node In The Head†. This method disables or power off the malfunctioning node. For example, power fencing uses a power controller to turn off the faulty node. [12] The second method uses the resource fencing approach, which prevents access to resources rather than to turn off the node. For example, fiber channel fencing can be used to disable the fiber channel port. [12] 1137395 Muhammad Khurram Shehzad Trends The demand for powerful computers that can be used for simulation and prediction are of great interest to both the public and private sector. Last decade, was the most exciting periods in computer development. As a result of Moore’s law, microprocessors have become smaller, denser, and more powerful. The result is that microprocessor based supercomputing is rapidly becoming the technology of preference in attacking some of the most important problems of science and engineering. A recent report from Intersect360 Research highlighted some interesting trends in HPC. Below are a few of the highlights. [13] More Memory with Multi-core: While memory usage per core is nearly constant in years past, the broader adoption of multi-core systems is creating a demand for more memory. This can be expected but the report also warns of additional system costs as the need for more memory rises.[13] Processors per Nodes: According to summary of the report, two-processors per node is still the preferred configuration with 60% of the market, with just 14% opting for four-processor nodes. These ratios have stayed about the same over the past five years.[13] Future Outlook High Performance Computing (HPC) is expected to increase with which Big Data is analyzed to address variety of scientific, environmental and social challenges, especially on very large and small scales. In order of magnitude more powerful than laptop computers, HPC processes information using parallel computing, allowing for many simultaneous computations to occur concurrently. These integrated machines are measured in â€Å"flops† which stands for â€Å"floating point operations per second.† [14] As of June 2013, Tianhe-2 (or, Milky Way-2), a supercomputer developed by China’s National University of Defense Technology, is the world’s fastest system with a performance of 33.86 petaflop/s. [15] HPC is expected to move into â€Å"exascale† capacity by 2020, developing computing capacities 50 times greater than today’s most advanced supercomputers. Exascale feasibility rests on the rise of energy efficient technology: the processing power exists but the energy to run it, and cool it, does not. Currently, the American supercomputer MIRA, [16] while not the fastest, is the most energy efficient thanks to circulating water-chilled air around the processors inside the machine rather than merely using fans. Applications of the technology High-performance computing (HPC) is a broad term that in essence represents compute intensive applications that need acceleration. Users of application acceleration systems range from medical imaging, financial trading, oil and gas expiration, to bioscience, data warehousing, data security, and many more. In the information age, the need for acceleration of data processing is growing exponentially and the markets deploying HPC for their applications are growing every day. The HPC expansion is being fueled by the coprocessor, which is fundamental to the future of HPC. 1137784 Samra Mohammad 8Future trends, outlook and applications of cluster computing: Computer plays an important role in the information age. Different countries have undertaken thorough studies on computing to improve the information level. I may observe some current trends and speculate a bit about the future of parallel programming models. As far as we can foresee today, the future of computing is parallel computing, dictated by physical and technical necessity. 8.1New trends in cluster computing: These days, there is a new computing paradigm as computer networks called the Grid. It becomes very cheap and very fast .What is a Grid? It is a big system of computing resources that provides to users a single point of access and performs tasks. It is based on the WWW (World Wide Web) interface, to these distributed resources[17] The Grid technology is currently in progress intensive development. The Grid is also the first tools which are already available for developers. In this type of application, we can use a high-speed network in regarding the interconnection between the parts of the grid via internet. Nowadays , the Grid is agree to enable for scientific collaborations to share resources on an unprecedented level and geographically distributed groups to collaborate together in a manner that were previously impossible by using scalable, secure, high performance mechanisms for discovering and negotiating access to remote resources. 8.2Future: In the future, the increase of industry support for low latency clusters will help in availability and performance, but restrictions may require a departure from the current multicast-oriented data distribution strategies. However, latency and bandwidth performance will continue to improve in the Ethernet with a very low cluster with multicast support. 8.3Application and outlook: Obviously, cluster computing is quickly becoming the architecture of choice. One of the categories of applications is called Grand Challenge Applications (GCA). It are defined as fundamental problems in science and engineering with broad economic and scientific impact whose solution can be advanced by applying high performance computing and communication technologies. The high scale of complexity in GCAs demands enormous amount of resources needs, such as processing time, memory space and communication bandwidth. A common characteristic of GCAs is that they involve simulations that are computationally intensive. Examples of GCAs are applied fluid dynamics, environmental modeling, ecosystem simulation, biomedical imaging, biomechanics, molecular biology, and computational sciences. [17] Other than GCAs, cluster computing is also being applied in other applications that demand high availability, scalability and performance. Clusters are being used as replicated storage and backup servers that provide the essential fault tolerance and reliability for critical applications. For example, the internet, search engine, Google uses cluster computing to provide reliable and efficient internet search services. Conclusion Cluster computing offers a comparatively cheap, alternative to large server or mainframe computer solutions. New trends in hardware and software technologies are likely to make clusters more promising. Statement of contribution Member 1: Muhammad Khurram Shehzad (1137395), Abstract, Introduction, Literature review Conclusion as a Group and Trends, Future Outlook applications as individual. Member 2: Samra Mohammad (1137784), Abstract, Introduction, Literature review Conclusion as a Group and Trends, Future Outlook applications as individual. Member 3: Muhammad Faheem Abbas (1137391), Abstract, Introduction, Literature review Conclusion as a Group and Trends, Future Outlook applications as individual. References: [1] Bader, David; Robert Pennington (June 1996). Cluster Computing: Applications. Georgia Tech College of Computing. Retrieved 2007-07-13. [2] Nuclear weapons supercomputer reclaims world speed record for US. The Telegraph. 18 Jun 2012. Retrieved 18 Jun 2012. [3] Amdahl, Gene M. (1967).Validity of the Single Processor Approach to Achieving Large-Scale Computing Capabilities.AFIPS Conference Proceedings(30): 483–485.doi:10.1145/1465482.1465560 [4] High Performance Computing for Computational Science VECPAR 2004 by Michel Daydà ©, Jack Dongarra 2005 ISBN 3-540-25424-2 pages 120-121 [5] M. Yokokawa et al The K Computer, in International Symposium on Low Power Electronics and Design (ISLPED) 1-3 Aug. 2011, pages 371-372 [6] Evan Marcus, Hal Stern: Blueprints for High Availability: Designing Resilient Distributed Systems, John Wiley Sons, ISBN 0-471-35601-8 [7] High Performance Linux Clusters by Joseph D. Sloan 2004 ISBN 0-596-00570-9 page [8] Distributed services with OpenAFS: for enterprise and education by Franco Milicchio, Wolfgang Alexander Gehrke 2007, ISBN pages 339-341 [9] Grid and Cluster Computing by Prabhu 2008 8120334280 pages 109-112 [10] Gropp, William; Lusk, Ewing; Skjellum, Anthony (1996). A High-Performance, Portable Implementation of the MPI Message Passing Interface. Parallel Computing. CiteSeerX: 10.1.1.102.9485 [11] K. Shirahata, et al Hybrid Map Task Scheduling for GPU-Based Heterogeneous Clusters in: Cloud Computing Technology and Science (CloudCom), 2010 Nov. 30 2010-Dec. 3 2010 pages 733 740 ISBN 978-1-4244-9405-7 [12] Alan Robertson Resource fencing using STONITH. IBM Linux Research Center, 2010 [13] http://www.intersect360.com/industry/reports.php?id=67 (Accessed 12/05/2014) [14] http://ec.europa.eu/digital-agenda/futurium/en/content/future-high-performance-computing-supercomputers-rescue (Accessed 12/05/2014) [15] http://www.top500.org/system/177999#.U3ORpPmSzDs (Accessed 12/05/2014) [16] http://en.wikipedia.org/wiki/IBM_Mira (Accessed 12/05/2014) [17] http://www.slideshare.net/shivakrishnashekar/computer-cluster (Accessed 14th May 2014)

Thursday, October 24, 2019

Euthanasia of Pretamture Babies :: Free Euthanasia Essay

Amy gave birth to a baby boy after only 24 weeks gestation. The premature child weighed only 1 1/4 lbs and was only 13 inches. Statistically, the child has between a 5% and a 20% chance of survival and over a 50% chance of growing up with intellegence disabilities, cerebral palsy, blindness, and deafness. Should money be continually spent on medical treatment or should the parents and/ or doctor be given the rigt to take away the life support? What is euthanasia? Is it just a murder, or is it a helpful procedure to end people's suffering? It is the "act of helping a person end his or her life in a painless fashion to relieve unbearable suffering". It is the taking of a human life by another person to prevent further pain and misery. There are four types of euthanasia: Active, Passive, Voluntary and Involuntary. Active Euthanasia is when a second party, whether is be a doctor or someone else, discretely introduces a lethal amount of medication into the sick or dying person. Passive Euthanasia involves the removal of medical treatment from the suffering individual. Voluntary Euthanasia is when the patient asks his or her doctor to assist in the procedures to ensure the end of the patient's life. Involuntary Euthanasia is present in Amy's case, along with Passive Euthanasia. It is when the individual who is suffering is either in a coma, incompitent, or a premature child that cannot speak for itself, and instea d of the patient making the decision, the family and/ or doctor does. Prematurity is when a child is born within less than 36 weeks gestation. The child is usually born with low birth weight, some type of physical deformity and / or any kind of mental problems that can all lead to a future of being outcatsed. Around half the babies born at 24 weeks are at risk of growing up with severe disabilities. Minor disabilities dont usually occur until further in the child's life, approximately once the child begins attending school. Reading and learning problems may occur. Obviously, the earlier the child is born the less chance of survival and health there is. This is because the babies have not yet fully developed the lungs, causing sudden collapses with every breath the child takes. "Matters involving the most intimate and personal choices a person may take in a lifetime...are central to the liberty protected by the 14th amendment.

Wednesday, October 23, 2019

Research Proposal on Childhood Obesity

Child obesity is a condition characterized by the child having too much fat in the body to an extent of his or her health being in danger. In adults, it could be described as a state of having a body mass index of more than thirty (Paxon, 2006). Parents feeding them with too many calories bring about obesity in children. The excess calories are converted to fats that accumulate in the child’s body. This child will develop a big body because he or she will add weight and become quite fleshy. Obese children are at a risk of getting very adverse health effects, some of which are fatal. The study found that high blood pressure in childhood was only a weak predictor of early death and high cholesterol was not associated with premature death, but experts suggested those factors were easier to control with medication. A rare study that tracked thousands of children through adulthood found the heaviest youngsters were more than twice as likely as the thinnest to die prematurely, before age 55, of illness or a self-inflicted injury. Being overweight during childhood and adolescence increases the risk of developing high cholesterol, hypertension, respiratory ailments, orthopedic problems, depression and type 11 diabetes as a youth. One disease of particular concern is Type 11 diabetes, which has linked to overweight and obesity and has increased dramatically in children and adolescents. Watching television, using the computer, and playing video games occupy a large percentage of children’s leisure time, influencing their physical activity levels. Overweight children and adolescents are more likely to become overweight or obese adults. It is an extremely difficult cycle to break. An unhealthy diet and a sedentary lifestyle are known risk factors for the three leading causes of death in adults: cancer, stroke and cardiovascular disease. Hypertension is the commonest problem facing man at present. Though the understanding of hypertension has improved considerably with an increased awareness of the disorder in the general population, the control of hypertension has been dismally poor. During my research, I personally have found that blood pressure levels often equate with low birth weight, body mass, maternal age, racial factors, childhood obesity, insulin levels, an elevated blood pressure during childhood, and a positive family history. In fact, children from hypertensive families generally tend to have higher blood pressure levels than kids from normotensive families. Besides, there is also a greater association in blood pressure levels between fathers and their children. One of the major causes of obesity to be addressed is eating excess calories from energy rich foods. Eating a variety of healthy foods is necessary for optimal growth and development, Protects against disease and provides energy to play, explore and learn. This is also accompanied by inadequate exercising or working out. This results in fats accumulating in the body. Parents should monitor their children’s feeding habits and take them for regular check-up. There are many ways that parents can help their children on a healthier path. Start early to establish healthy eating practices at home; be a role model, kids love to follow if lead by example. Plan healthier snacks that meet the nutritional needs and kids enjoy eating as well. To determine whether a child is obese or not, his or her body mass index is measured. It is then compared to the child’s height. In case a child is obese, treatment should be sought promptly before more damage is done by this condition. The diet should be balanced and meals should be eaten in a regular schedule. The child should also be assisted to shed the unnecessary weight. This should be done using the safest method. The child should also be encouraged to work out a lot and be very active. The find acquired so far include prevention and the long-term effects that would be brought on by by obesity. To prevent obesity from affecting one’s child, the parent should ensure that he or she eats low-calorie foods. The child should also increase the intake of fruits, vegetables and water. A child should be encouraged to participate in outdoor activities such as sports and games. If a child becomes obese and little or nothing is done, there are long-term effects. These include diseases like coronary issues and problems with respiratory system. Due to poor health, children may not live up to their potential. Parents’ spending a fortune for their child treatments brings non-satisfaction and potential depression (Kazaks & Stern, 2009). Mothers who have jobs do not directly cause weight problems in their children, but families that are busy not really having the time to prepare food that rely on fast food and frozen dinners. Addressing obesity in children is a very vital issue. It is important to understand what causes this condition, how to identify it, treat and prevent it. The health of our children is the most important thing. No parent would like their children to suffer terminal diseases or die at an early age especially because of obesity. Children would also want to live up to their dreams and achieve their best. Obesity has been noted to cause not only body disorders but also mental instability in children. A child who is obese will probably have low self-esteem, suffer depression and be very inactive. It is important to address the problem in order to avoid all the likely consequences caused by obesity.

Tuesday, October 22, 2019

How Fiber Optics Work essays

How Fiber Optics Work essays Thesis: In a fiber optic tube, the speed of light reflects from the cladding no matter what angle the fiber itself gets bent, even a full circle. Furthermore, because the cladding does not absorb any light from the core, the light waves can travel great distances. 3. Where was Fiber Optics discovered H. Transmitting Light through Fiber Optic Cables Our current age of technology is the result of many brilliant inventions and discoveries, but it is our ability to transmit information, and the media we use to do it, that is perhaps most responsible for its evolution. Progressing from the copper wire of a century ago to todays fiber optic cable, our increasing ability to transmit more information, more quickly and over longer distances has expanded the boundaries of our technological development in all areas. Fiber optic technologies are based on the same concept as the signal fires used in ancient China. Instead of sending the signals through the open air, however, a laser sends pulses of light to their destination through a thin strand of transparent glass. At the receiving end, an optical sensor decodes the light pulses with a complex set of standard codes. In some ways, it's also similar to the way people decode the dots and dashes of Morse code. In a fiber optic tube, the speed of light reflects from the cladding no mat ter what angle the fiber itself gets bent, even a full circle. Furthermore, because the cladding does not absorb any light from the core, the light waves can travel great distances. Craig C. Freudenrich, Ph.d defines fiber optics (optical fibers) as long, thin strands of very pure glass about the diameter of a human hair. They are arranged in bundles called optical cables and used to transmit light signals over long distances (par 2). Scientists at Corning Glass Works & Bell Telephone Labs, in the early 1970's, made the significant breakthroughs in optical fiber, to make it realistic to use...

Monday, October 21, 2019

Ethics of human cloning essays

Ethics of human cloning essays On February 23, 1997, news traveled around the world that scientists in Scotland had successfully cloned an adult sheep. What had previously seemed impossible, even to many scientists, was suddenly a reality. The sheep, named Dolly, had only one biological parent and possessed a genetic code identical to that of her original parent. Within days, the publics amazement over this development turned to questions of whether the technology that had produced Dolly could also be used to clone human beings. President Bill Clinton declared a moratorium on federal funding for human cloning research and appointed a commission to review the legal and ethical issues associated with the cloning of humans. More than three years later, there is still uncertainty about whether it will ever be possible to safely clone human beings. The scientists who cloned Dolly succeeded only once in a project involving the creation of 278 sheep embryos. The possibility of deformities and health risks in human children, as well as overwhelming public opposition to unrestricted cloning research, has led some U.S. lawmakers to call for a ban on human cloning, although no federal legislation has yet been passed. Medical and technical considerations are certainly not the only concerns surrounding the possibility of human cloning. The most contentious and difficult questions associated with human cloning are moral and religious in nature. Any discovery that touches upon the human creation is not simply a matter of scientific inquiry, President Clinton said in an Oval Office ceremony. It is a matter of morality and spirituality as well. In a recent poll presented by the Pew Forum on Religion and Public Life and the Pew Research Center for the People unrestricted scientific research related to human cloning and respondents most ofte ...

Sunday, October 20, 2019

RB

RB Alborz Zinabadi Mr. Richard Urias American Literature December 15, 2000 Rhythm and Blues There are many types of music in the world but the one that stands out in everyone's mind is the sound of Rhythm and Blues. It has been around for many decades. It has captured people's interest around the world. Rhythm and Blues(RB), or as it was called before "black music", started in the early 1940's by slaves in the south. This phenomenon brought about new music, fashion, and dance styles.The white people thought of RB as black music during the 1940's and early 50's. It has the single greatest influence on music worldwide for most of the 20th century. Its influence can be traced in forms of rock music, country, gospel, jazz even Nigerian Juju -a style of dance music. Rhythm and Blues was started in the South, but later on moved to Midwest, Northeast, and West Coast cities due to the shift in American demographics, after World War II.The Rhythm and the BluesOne of two significant developments, which occurred that had an effect on RB was the invention of the Magnetic Tape, the other was the formation of broadcasting companies. (Schneider 40) The invention of the magnetic tape was a tremendous help to those who wanted to start their own independent record companies. Since no major record companies would accept music that was produced by black people, their formation of these independent record companies was crucial to RB recording. Most white radio stations did not play "black music", and when they did start playing RB, they were not obligated to play it. After noticing that the youth was more into RB they played it since they wanted to keep their young audience. In addition, the invention of the electric guitar had a tremendous effect on...

Saturday, October 19, 2019

Knowledge Management Techniques Essay Example | Topics and Well Written Essays - 3000 words - 2

Knowledge Management Techniques - Essay Example Uriarte, 2008). The parking and preservation of corporate knowledge is relevant especially in today’s era, given that majority of work force oriented service is solely composed of knowledge workers. To successfully compete in the economy, companies have to treat the personnel providing the knowledge just as they would pay attention to any other strategic irreplaceable asset (Leistner, 2010). At high levels of the hierarchy of knowledge worker, certificates and university degrees from guilds or various organisations provide the self imposed labels that professionals and managers use in order to qualify for one of the positions in the organisation (Miltiadis et al, 2008). Knowledge workers have an overall picture of the business as oppose to the lower level front line workers, but there is the likeliness duplication of mistakes in the various departments since there is no strategy or media for information sharing example in an organisation professionals in various departments ma y be doing some experiments with out sourcing, independently each discovering that saving promised is far much less that suggested in the popular business press. Knowledge management is fundamentally about a systematic approach to other information and managing intellectual assets in a way that the company is provided with an edge to competitive advantage. Knowledge management is an optimisation strategy for business, and it is not limited to a particular source of information or technology (Uden and Eardley, 2010). A wide variety of IT (Information Technologies) plays a key role in knowledge management initiatives, simply because of the effort provided over manual operations and savings in time. Knowledge management is agnostic when it comes to source and type of information, ranging from a document describing the process a customer support representative uses to escalate

Friday, October 18, 2019

Let's Start Paying College Athletes Essay Example | Topics and Well Written Essays - 750 words

Let's Start Paying College Athletes - Essay Example This paper focuses on outlining the colleges should start paying students who participate in sports and the underlying issues within college sports. The author states that National College Athletics Association (N.C.A.A.) is a national college organization that oversees the activities of national athletics in colleges and universities. The reason for the author to mention about N.C.A.A is to emphasize on the fact that the organization is responsible for college sports affairs.N.C.A.A regulates and controls the activities of college and university sports. It is also a non-profit making organization and its main role is to oversee the events involved in college and university sports. Mark Emmert is the president of N.C.A.A. and he is the overall leader and overseer of the college sports in America. He is mentioned by the author due to his contribution in sport. He opposes the issue of paying players significant salaries stating that it would change players to be employees of colleges and universities. He regards himself as a reformer and is known to make some changes in the organization since he became the president of the organization. He is described as a former president of University of Washington (Nocera 1). Emmert claims that students should not be paid since this would act as a way of making students subcontractors for their universities. This would make them employees of universities and the college would not even be interested in their grades but their performance in the sport. He also claims that paying students for their participation in sport would kill college athletics because the involved students would engage in various behaviors due to the payments they get.The author outlines this fact to show how N.C.A.A. is opposed to the idea of paying the players. When the author states about the â€Å"hypocrisy†, he is mainly referring to the action of N.C.A.A. where the organization engages in various

Globalisation , the World Economy and MNE's mini essay

Globalisation , the World Economy and MNE's mini - Essay Example However, a host country needs to have a minimum absorptive capacity and the ability to link these investments with domestic enterprises (Ruane & Gorg, 1998). FDI policies affect both potential and existing foreign investments either directly or indirectly. The host country justifiably sets its policies based on information, business failure, and intervention (Lall, 2000; Moran, 1998). Some of the policies include: A government should efficiently analyse and evaluate international firms before they invest in the country. Screening aids in identifying the purpose of the firm and the validity of its actions. Secondly, in ownership restraints, the host state decides to exclude foreign investors from certain parts of the economy (Hill, 2011). Exclusion based on the grounds of healthy competition and national security. For example, India implemented certain foreign ownership policies, which governed the retail sector since foreign traders almost put local supermarkets out of business (Mukherjee, 2005). Finally, performance requirements enable a country to optimize FDI benefits and minimize on the costs employed to the host country. Operational policies assist in controlling the activities of foreign companies in the host country. Governments implement operational activities through site restrictions, export requirements and persistence on partial ‘local content.’ Based on location policies, the state needs foreign investors to lay foundation in regions where they provide labour market. Secondly, based on the industrial activities, firms should locate to regions where they will not disrupt other forms of infrastructure or cause harm to the inhabitants. Export policies aim at managing foreign company exports mainly to create a balance between it and the domestic export (Moran, 2005). States implement export regulations through taxation policies. It also permits the exportation of only a set

Latin Western European Business Culture Essay Example | Topics and Well Written Essays - 2000 words

Latin Western European Business Culture - Essay Example Collectivism, the propensity of people to stay within a long-term group, is also rated high. The Masculinity rating corresponds to emphasis laid on the traditional viewpoint of men's and women's roles, while Uncertainty avoidance rating indicates that rules and long-term employment within the same structure are preferred. Finally, the long term / short-term rating is in favour of longer term attitudes, based on perseverance and relationships ordered by status. These cultural dimensions give a basis from which to assess certain aspects of Latin Western European Business Culture. However it is not the complete picture. In the areas of business communication, particularly in face-to-face communication and business negotiations, it is also of interest to compare the concepts advanced by Hall (Hall) and in particular that of the high context and low context cultures. According to Hall, in a high context business culture, the information transmitted in a communication is minimised because implicitly much of the information required is already present in the setting. Low context cultures are the reverse: the communication contains far more information because this information is not present in the setting. According to this model, Latin culture is high-context. Besides the situations already mentioned, this model also finds particular application in the advertising and promotional activities that most businesses engage in. This kind of communica tion remains somewhat basic and even terse in Latin countries as compared to the other Western European groups (Anglo, Germanic and Nordic). Hall also elaborated a second theory of how different cultures structure their time, which he refers to as polychronic or monochronic time orientation. A top-level approach for Latin countries puts them into the polychronic category. The immediate implications are of the priority of interpersonal relations over schedule and appointments, the simultaneity of tasks and the mixing of work time and personal time. Like the other theories alluded to above, this generates different results when we consider the four countries on an individual basis. Because the creation of the European Community has encouraged the individual member countries to trade more among themselves and, by extension, with the rest of the world, it is interesting to note how the Latin Western European countries and their businesses fare in a cross-cultural context. In particular, a different principle is applied here, that of the Self Referencing Criteria or SRC defined by Lee (Lee). In essence, this describes the cultural trap of assuming that other countries use the same cultural values as one's own. It is the failure to perceive things from the standpoint of a person of a different culture. The Latin countries that we are dealing with here display marked differences in this regard. The first country to be examined using these tools of cultural investigation is France. It is a country which at the same time is Mediterranean and Latin, but which also exhibits a number of non-Latin characteristics, in keeping with its proximity to, or common borders with, a number of (mainly) Germanic countries such as Germany, Belgium and Switzerland. Of the five cultural dimensions, French business culture can be classified as follows. Power-distance is relatively high with top

Thursday, October 17, 2019

Health care marketing Essay Example | Topics and Well Written Essays - 250 words - 12

Health care marketing - Essay Example only use products that appeal to me because of their quality, durability, and features that I value or I need rather than those that others value or need. The most popular mode of data collection in marketing is questionnaire. Using questionnaire as a means of data collection provides the researchers with the opportunity to collect data from the research participants without having to personally interact with every research participant individually, and collect the information, because interviewing is a very time consuming process and is governed by different kinds of biases. On the other hand, questionnaires can be easily filled by the research participants, particularly when they are brief and the statements are short and clear in their meaning. In marketing research, researchers can use a variety of questionnaires; audiences may be motivated to send answers to a particular email address in a lucky draw scheme advertised on television or the marketers can collect data by asking customers to fill questionnaires on

Human Rights Essay Example | Topics and Well Written Essays - 4000 words - 1

Human Rights - Essay Example The Nuremburg trials shocked most of the world, including the United Kingdom, when the terrible treatment of human beings was revealed to the world. The trials did help to impact the concept that some sort of universal justice is necessary in order to make individuals feel safe, or just, about the world and the law of the world. The atrocities revealed during the trials turned the stomachs of many of the people, as well as the governments, in Europe. It became clear that some sort of restructuring was needed, and that European countries would need to cooperate in order to attain this reconstruction. Therefore, many countries were inspired to start considering aspects of human rights1 The idea of a human rights list in the United Kingdom and Europe is not a new one. Many individuals were pushing for this after World War II. However, the United Kingdom was also aware that Europe was working on a larger-scale concept of human rights in general, which would eventually become the European Convention. This may have been a reason for the United Kingdom’s delay in making its own list of individual rights. The United Kingdom has followed the laws of the convention for many years. Laws were beginning to be laid down by this new, European group, and all of Europe was eager to follow. For instance, at the Congress of the Hague in 1948, delegates and observers from 26 countries breathed life into the Council of Europe – making human rights its guiding spirit. The Council of Europe was officially launched in May 1949 with founder members Belgium, Denmark, France, Ireland, Italy, Luxembourg, the Netherlands, Norway, Sweden and the UK. These member countries then put together a charter of rights as well as a European court system that would help those individuals who had had their rights violated. They were able to use examples from the United States and hammered out a

Wednesday, October 16, 2019

Latin Western European Business Culture Essay Example | Topics and Well Written Essays - 2000 words

Latin Western European Business Culture - Essay Example Collectivism, the propensity of people to stay within a long-term group, is also rated high. The Masculinity rating corresponds to emphasis laid on the traditional viewpoint of men's and women's roles, while Uncertainty avoidance rating indicates that rules and long-term employment within the same structure are preferred. Finally, the long term / short-term rating is in favour of longer term attitudes, based on perseverance and relationships ordered by status. These cultural dimensions give a basis from which to assess certain aspects of Latin Western European Business Culture. However it is not the complete picture. In the areas of business communication, particularly in face-to-face communication and business negotiations, it is also of interest to compare the concepts advanced by Hall (Hall) and in particular that of the high context and low context cultures. According to Hall, in a high context business culture, the information transmitted in a communication is minimised because implicitly much of the information required is already present in the setting. Low context cultures are the reverse: the communication contains far more information because this information is not present in the setting. According to this model, Latin culture is high-context. Besides the situations already mentioned, this model also finds particular application in the advertising and promotional activities that most businesses engage in. This kind of communica tion remains somewhat basic and even terse in Latin countries as compared to the other Western European groups (Anglo, Germanic and Nordic). Hall also elaborated a second theory of how different cultures structure their time, which he refers to as polychronic or monochronic time orientation. A top-level approach for Latin countries puts them into the polychronic category. The immediate implications are of the priority of interpersonal relations over schedule and appointments, the simultaneity of tasks and the mixing of work time and personal time. Like the other theories alluded to above, this generates different results when we consider the four countries on an individual basis. Because the creation of the European Community has encouraged the individual member countries to trade more among themselves and, by extension, with the rest of the world, it is interesting to note how the Latin Western European countries and their businesses fare in a cross-cultural context. In particular, a different principle is applied here, that of the Self Referencing Criteria or SRC defined by Lee (Lee). In essence, this describes the cultural trap of assuming that other countries use the same cultural values as one's own. It is the failure to perceive things from the standpoint of a person of a different culture. The Latin countries that we are dealing with here display marked differences in this regard. The first country to be examined using these tools of cultural investigation is France. It is a country which at the same time is Mediterranean and Latin, but which also exhibits a number of non-Latin characteristics, in keeping with its proximity to, or common borders with, a number of (mainly) Germanic countries such as Germany, Belgium and Switzerland. Of the five cultural dimensions, French business culture can be classified as follows. Power-distance is relatively high with top

Tuesday, October 15, 2019

Human Rights Essay Example | Topics and Well Written Essays - 4000 words - 1

Human Rights - Essay Example The Nuremburg trials shocked most of the world, including the United Kingdom, when the terrible treatment of human beings was revealed to the world. The trials did help to impact the concept that some sort of universal justice is necessary in order to make individuals feel safe, or just, about the world and the law of the world. The atrocities revealed during the trials turned the stomachs of many of the people, as well as the governments, in Europe. It became clear that some sort of restructuring was needed, and that European countries would need to cooperate in order to attain this reconstruction. Therefore, many countries were inspired to start considering aspects of human rights1 The idea of a human rights list in the United Kingdom and Europe is not a new one. Many individuals were pushing for this after World War II. However, the United Kingdom was also aware that Europe was working on a larger-scale concept of human rights in general, which would eventually become the European Convention. This may have been a reason for the United Kingdom’s delay in making its own list of individual rights. The United Kingdom has followed the laws of the convention for many years. Laws were beginning to be laid down by this new, European group, and all of Europe was eager to follow. For instance, at the Congress of the Hague in 1948, delegates and observers from 26 countries breathed life into the Council of Europe – making human rights its guiding spirit. The Council of Europe was officially launched in May 1949 with founder members Belgium, Denmark, France, Ireland, Italy, Luxembourg, the Netherlands, Norway, Sweden and the UK. These member countries then put together a charter of rights as well as a European court system that would help those individuals who had had their rights violated. They were able to use examples from the United States and hammered out a

Definition of Friendship Essay Example for Free

Definition of Friendship Essay As a child, there was a plaque on my father’s den wall that I would read everyday. It read, â€Å"A friend is someone who knows all about, and loves you anyway.† I did not understand what it meant. I though it was a cynical quote against friendship, being my father was the sarcastic type. As an adult, I have to admit secret apologies to my dad, because now I understand the concept and meaning, and hold it to be true in my heart of what friendship is about. Being an evolving emotion, friendship enters and flees life, faster than the speed of light. You will never know when you might meet a true friend, and cannot fathom the day that you will part company with one. In the third grade, while playing jump rope with classmates, we engaged in a huge (by a 3rd grader’s opinion) argument, over some unknown aspect of the game. Everyone chose sides and split camps. The repercussions lasted so long in each of our memories; we continued our grudge into the following school years. Eventually, some people moved away, others stayed, some even forgot about the feud. Only the loyal could not let the honor of the pack be diminished. Loyalty is one of the first elements of friendship that we learn as a child. No matter the circumstance, as children, we lived and died, for the name of our neighborhood block, school, and friends. There was nothing more honorable than the chance to â€Å"take one for the team.† We associated loyalty as the sign of ultimate friendship, undying in our young hearts, until we are forced to move away, or attend different schools. As we grow, we understand the price of loyalty to a friend. The act was so innocent that we did not understand why we were being treated this way. You run the risk of being an outcast, shunned by former friends and ridiculed by classmates. Over the years, we begin to deal with the issues of being popular and going with the crowd, and end up forgetting the quality in friendship of being loyal to each other. I played basketball, in junior high school; I wasn’t much of an athlete, but I loved the game. I was put on a team, with some very experience players. One of whom, I did not get along with. She was loud and rambunctious, everything I despised in a person. I guess being her opposite; I must have repulsed her as well. We practiced and played many games, learning each others moves and techniques, and came to understand each others different contribution to the team. Respect is another quality of friendship. As we grow, we understand that the value of friendships mature. We are no longer envious of each other, or jealous. We use each other’s success as a tool to achieve our dreams. When you can appreciate what makes a person different, there is a natural attraction to the unknown. Realizing the fact that you cannot change a person into what you want them to be, will save you time and effort in friendships and relationships. Respect is often tried when a friend is making a huge mistake of something you have already experienced. We try to warn, coax, and plead them to change their minds, and the friendship is tested. The friend might become angry, and may not understand our motives. Though friends may not listen or do what we want them to do, we have to respect their decisions. For we all have to live our own life, and experience our own downfalls. As a part of growing, we often engage in practices we regret. Once I played the game of â€Å"Truth or Dare† with classmates, and was forced to commit an act with another classmate, that we both did not want to do. We were shy about it, and never so much as spoke to each other again after that incident. Years went by, and we continued to go to school together. We were finally able to look at each other and talk about what happened. We were honest and laughed about it, until we cried. We had no shame after we were truthful with each other. Honesty, whether right or wrong, is the ultimate backbone of friendship. As the quote says, a true friend should know all about you. Being honest with your friends will bring respect and loyalty from them. The truer you are with you feelings, the freer you will be. Opening up your heart helps to heal emotional wounds and reminds friends of your appreciation for them. Often times, we forget to remind our friends of how special they are to us and letting them know that you do trust them with your problems as well as you triumphs. As adults we learn that opening up to our trusted friends is natural, not â€Å"corny† and â€Å"un-cool† as in our youn ger days. People don’t talk much about the love friends have for one another. When people describe friends, they often use the word like. â€Å"Like† isn’t strong enough to describe the bond shared between friends. In a true friend, you never get tired of their company, and you can always be yourself. You can confide and depend on them in ways we never knew we could with others. What we must realize is the fact that during our adolescent years, our friends were forced, through school and other activities. As an adult, we make our own choices, and befriend those that we deem worthwhile. We also learn that the number of these friends drops dramatically, in some cases to two or three people. That fact does not mean a person is unfriendly, it is just a reality that there are only so many people who will actually be there for you. When I say there, I mean emotionally, mentally, financially, etc. A true friend can understand why you need a little help this month on bills, or why you don’t want to hang out. Friends can see right through you, like looking through fiberglass. They know just how to approach you, when they are concerned, and take into account your pride and shamefulness. They know how to stroke your ego, and build you up; and break you down and make you humble again. The jump rope queen, the jock, and the shy guy all became my absolute true friends. I did not know it then; but who knows these things? Now as adults, we look back on our past, and wonder why we stuck together. Individually, we have been through good times and bad, arguments and vacations. We have spent months not speaking to each other, and nights where we cannot get off the phone. Like peas in a pod, we stuck together. We have seen each other grow, into people we never thought we would see. Our relationships continue to grow and change over time, but that is expected. There does not seem to be anything else we could do to each other that would tear us apart.

Monday, October 14, 2019

The mesh generation

The mesh generation Describe general methods (structured, unstructured, hybrid, adaptive, etc.) and discuss their key features and applications A key step of the finite element method for numerical computation is mesh generation. One is given a domain (such as a polygon or polyhedron; more realistic versions of the problem allow curved domain boundaries) and must partition it into simple â€Å"elements† meeting in well-defined ways. There should be few elements, but some portions of the domain may need small elements so that the computation is more accurate there. All elements should be â€Å"well shaped† (which means different things in different situations, but generally involves bounds on the angles or aspect ratio of the elements). One distinguishes â€Å"structured† and â€Å"unstructured† meshes by the way the elements meet; a structured mesh is one in which the elements have the topology of a regular grid. Structured meshes are typically easier to compute with (saving a constant factor in runtime) but may require more elements or worse-shaped elements. Unstructured meshes are often computed using quadtrees, or by Delaunay triangulation of point sets; however there are quite varied approaches for selecting the points to be triangulated The simplest algorithms directly compute nodal placement from some given function. These algorithms are referred to as algebraic algorithms. Many of the algorithms for the generation of structured meshes are descendents of â€Å"numerical grid generation† algorithms, in which a differential equation is solved to determine the nodal placement of the grid. In many cases, the system solved is an elliptic system, so these methods are often referred to as elliptic methods. It is difficult make general statements about unstructured mesh generation algorithms because the most prominent methods are very different in nature. The most popular family of algorithms is those based upon Delaunay triangulation, but other methods, such as quadtree/octree approaches are also used. Delaunay Methods Many of the commonly used unstructured mesh generation techniques are based upon the properties of the Delaunay triangulation and its dual, the Voronoi diagram. Given a set of points in a plane, a Delaunay triangulation of these points is the set of triangles such that no point is inside the circumcircle of a triangle. The triangulation is unique if no three points are on the same line and no four points are on the same circle. A similar definition holds for higher dimensions, with tetrahedral replacing triangles in 3D. Quadtree/Octree Methods Mesh adaptation, often referred to as Adaptive Mesh Refinement (AMR), refers to the modification of an existing mesh so as to accurately capture flow features. Generally, the goal of these modifications is to improve resolution of flow features without excessive increase in computational effort. We shall discuss in brief on some of the concepts important in mesh adaptation. Mesh adaptation strategies can usually be classified as one of three general types: r-refinement, h-refinement, or p-refinement. Combinations of these are also possible, for example hp-refinement and hr-refinement. We summarise these types of refinement below. r-refinement is the modification of mesh resolution without changing the number of nodes or cells present in a mesh or the connectivity of a mesh. The increase in resolution is made by moving the grid points into regions of activity, which results in a greater clustering of points in those regions. The movement of the nodes can be controlled in various ways. On common technique is to treat the mesh as if it is an elastic solid and solve a system equations (suject to some forcing) that deforms the original mesh. Care must be taken, however, that no problems due to excessive grid skewness arise. h-refinement is the modification of mesh resolution by changing the mesh connectivity. Depending upon the technique used, this may not result in a change in the overall number of grid cells or grid points. The simplest strategy for this type of refinement subdivides cells, while more complex procedures may insert or remove nodes (or cells) to change the overall mesh topology. In the subdivision case, every â€Å"parent cell† is divided into â€Å"child cells†. The choice of which cells are to be divided is addressed below. For every parent cell, a new point is added on each face. For 2-D quadrilaterals, a new point is added at the cell centroid also. On joining these points, we get 4 new â€Å"child cells†. Thus, every quad parent gives rise to four new offsprings. The advantage of such a procedure is that the overall mesh topology remains the same (with the child cells taking the place of the parent cell in the connectivity arrangement). The subdivision process is similar for a triangular parent cell, as shown below. It is easy to see that the subdivision process increases both the number of points and the number of cells A very popular tool in Finite Element Modelling (FEM) rather than in Finite Volume Modelling (FVM), it achieves increased resolution by increasing the order of accuracy of the polynomial in each element (or cell). In AMR, the selction of â€Å"parent cells† to be divided is made on the basis of regions where there is appreciable flow activity. It is well known that in compressible flows, the major features would include Shocks, Boundary Layers and Shear Layers, Vortex flows, Mach Stem , Expansion fans and the like. It can also be seen that each feature has some â€Å"physical signature† that can be numerically exploited. For eg. shocks always involve a density/pressure jump and can be detected by their gradients, whereas boundary layers are always associated with rotationality and hence can be dtected using curl of velocity. In compressible flows, the velocity divergence, which is a measure of compressiblity is also a good choice for shocks and expansions. These sensing paramters which can indicate regions of flow where there are activity are referred to as ERROR INDICATORS and are very popular in AMR for CFD. Just as refinement is possible by ERROR INDICATORS as mentioned above, certain other issues also assume relevance. Error Indicators do detect regions for refinement, they do not actually tell if the resolution is good enough at any given time. In fact the issue is very severe for shocks, the smaller the cell, the higher the gradient and the indicator would keep on picking the region, unless a threshold value is provided. Further, many users make use of conservative values while refining a domain and generally end up in refining more than the essential portion of the grid, though not the complete domain. These refined regions are unneccesary and are in strictest sense, contribute to unneccesary computational effort. It is at this juncture, that reliable and resonable measure of cell error become necessary to do the process of â€Å"coarsening†, which would reduce the above-said unnecessary refinement, with a view towards generatin an â€Å"optimal mesh†. The measures are given by sensors referred to as ERROR ESTIMATORS, literature on which is in abandunce in FEM, though these are very rare in FVM. Control of the refinement and/or coarsening via the error indicators is often undertaken by using either the solution gradient or soultion curvature. Hence the refinement variable coupled with the refinement method and its limits all need to be considered when applying mesh adaptation A hybrid model contains two or more subsurface layers of hexahedral elements. Tetrahedral elements fill the interior. The transition between subsurface hexahedral and interior tetrahedral elements is made using degenerate hexahedral (pyramid) elements. High quality stress results demand high quality elements, i.e., aspect ratios and internal angles as close to 1:1 and 90 °, respectively, as possible. High quality elements are particularly important at the surface. To accommodate features within a component, the quality of elements at the surface of a hexahedral model generally suffers, e.g., they are skewed. Mating components, when node-to-node contact is desired, can also adversely affect the models element quality. Even more difficult is producing a tetrahedral model that contains high quality subsurface elements. In a hybrid model, the hexahedral elements are only affected by the surface mesh, so creating high quality elements is easy. Minimal effort is required to convert CAD data into surface grids using the automated processes of pro-surf. These surface grids are read by pro-am. The surface grid is used to extrude the subsurface hexahedral elements. The thickness of each extruded element is controlled so that high quality elements are generated. The interior is filled automatically with tetrahedral elements. The pyramid elements that make the transition are also generated automatically. A hybrid model will generally contain many more elements than an all-hexahedral model thus increasing analysis run-time. However, the time saved in the model construction phase the more labor intensive phase more than makes up for the increased run-time. Overall project time is reduced considerably. Also, as computing power increases, this â€Å"disadvantage† will eventually disappear. Hexahedral Meshing ANSYS Meshing provides multiple methods to generate a pure hex or hex dominant mesh. Depending on the model complexity, desired mesh quality and type, and how much time a user is able to spend meshing, a user has a scalable solution to generate a quick automatic hex or hex dominant mesh, or a highly controlled hex mesh for optimal solution efficiency and accuracy. Mesh Methods: Automated Sweep meshing Sweepable bodies are automatically detected and meshed with hex mesh when possible Edge increment assignment and side matching/mapping is done automatically Sweep paths found automatically for all regions/bodies in a multibody part Defined inflation is swept through connected swept bodies User can add sizing controls, mapped controls , and select source faces to modify and take control over the automated sweeping Adding/Modifying geometry slices/decomposition to the model also greatly aids in the automation of getting a pure hex mesh. Thin Solid Sweep meshing This mesh method quickly generates a hex mesh for thin solid parts that have multiple faces as source and target. Can be used in conjunction with other mesh methods User can add sizing controls, mapped controls, and select source faces to modify and take control over the automated sweeping MultiZone Sweep meshing This advanced sweeping approach uses automated topology decomposition behind the scenes to attempt to automatically create a pure hex or mostly hex mesh on complicated geometries Decomposed topology is meshed with a mapped mesh or a swept mesh if possible. A user has the option to allow for free mesh in sub-topologies that cant be mapped or swept. Supports multiple source/target selection Defined inflation is swept through connected swept bodies User can add sizing controls, mapped controls and select source faces to modify and take control over the automated meshing Hex-dominant meshing This mesh method uses an unstructured meshing approach to generate a quad dominant surface mesh and then fill it with a hex dominant mesh This approach generally gives nice hex elements on the boundary of a chunky part with a hybrid hex, prism, pyramid, test mesh internally Tetrahedral Meshing The combination of robust and automated surface, inflation and tet meshing using default physics controls to ensure a high-quality mesh suitable for the defined simulation allows for push-button meshing. Local control for sizing, matching, mapping, virtual topology, pinch and other controls provide additional flexibility, if needed. Mesh Methods: Patch conforming mesh method: Bottom-up approach (creates surface mesh, then volume mesh) Multiple triangular surface meshing algorithms are employed behind the scenes to ensure a high quality surface mesh is generated, the first time From that inflation layers can be grown using several techniques The remaining volume is meshed with a Delaunay-Advancing Front approach which combines the speed of a Delaunay approach with the smooth-transitioned mesh of an advancing front approach Throughout this meshing process are advanced size functions that maintain control over the refinement, smoothness and quality of the mesh Patch independent mesh method: Top-down approach (creates volume mesh and extracts surface mesh from boundaries) Many common problems with meshing occur from bad geometry, if the bad geometry is used as the basis to create the surface mesh, the mesh will often be bad (bad quality, connectivity, etc.) The patch independent method uses the geometry only to associate the boundary faces of the mesh to the regions of interest thereby ignoring gaps, overlaps and other issues that give other meshing tools countless problems. Inflation is done as a post step into the volume mesh. Since the volume mesh already exists, collisions and other common problems for inflation are known ahead of time. Note: For volume meshing, a tetrahedral mesh generally provides a more automatic solution with the ability to add mesh controls to improve the accuracy in critical regions. On the contrary, a hexahedral mesh generally provides a more accurate solution, but is more difficult to generate. Shell and Beam Meshing For 2-D planar (axisymmetric), shell and beam models, ANSYS Meshing provides efficient tools for quickly generating a high quality mesh to accurately simplify the physics. Mesh Methods for shell models: Default surface meshing Multiple surface meshing engines are used behind the scenes to provide a robust, automated surface mesh consisting of all quad, quad dominant or all tri surface mesh. User can add sizing controls, and mapped controls to modify and take control over the automated meshing Uniform surface meshing Orthogonal, uniform meshing algorithm that attempts to force an all quad or quad dominant surface mesh that ignores small features to provide optimum control over the edge length Describe key features of ALL existing meshing options in Ansys Mesh module and discuss their applications The meshing tools in ANSYS Workbench were designed to follow some guiding principles: Parametric: Parameters drive system Persistent: Model updates passed through system Highly-automated: Baseline simulation w/limited input Flexible: Able to add additional control w/out complicating the workflow Physics aware: Key off physics to automate modelling and simulation throughout system Adaptive architecture: Open system that can be tied to a customers process CAD neutral, meshing neutral, solver neutral, etc. By integrating best in class meshing technology into a simulation driven workflow, ANSYS Meshing provides a next generation meshing solution.

Sunday, October 13, 2019

To Kill A Mockingbird Essays: Civil Rights and Civil Wrongs :: Free Essay Writer

Civil Rights and Civil Wrongs in To Kill a Mockingbird In Harper Lee's novel, To Kill a Mockingbird, the author uses the small town of Maycomb, Alabama as a forum for different views on civil rights. On a smaller scale, Lee uses the relationship between Scout, her aunt, her father, and her housekeeper, to show how racism affects everything. The question of civil rights plays out not only through the trial of Tom Robinson, but also through the everyday interaction between the Finch family and their housekeeper Calpurnia. In the process of growing up Scout must chose where she fits into the whole racial scheme, and her relationship with her housekeeper plays a crucial part in deciding this. Harper Lee's novel, To Kill a Mockingbird, focuses on the maturation of a brother and sister in the "tired old town(Lee 3)" of Maycomb, Alabama, in the 1930à ­s. Maycomb, a classic southern town full of gossip, tradition and burdened with a legacy of racism, seems a strange place to stage a drama which encourages equal treatment and non prejudice. However, the narratorà ­s fresh outlook on the sleepy town furnishes the reader with a multitude of viewpoints on civil rights. The traditional Southern racism of Maycomb is looked at through the eyes of our young narrator, Scout Finch. Scoutà ­s innocent perspective compels her to ask questions about why whites treat blacks the way they do. These questions are crucial in Scoutà ­s search for her own identity. Scout must come to terms with the racism of her town and how it affects the people in her life. She must find her own position and what role she will play in the whole racial game. A number of people greatly influence Scout. The t wo major role models in her life, her Aunt Alexandria and her father Atticus, pull Scout in two opposing directions. Through their dealings with Calpurnia, the Finch's black housekeeper, both the reader and Scout are able to distinguish what path each individual wants Scout to follow. Brought into the Finch household to teach and act as a female role model for young Scout, Aunt Alexandra begins by demonstrating to Scout Calpurniaà ­s inferior position. For Aunt Alexandra, Calpurnia will not do as a role model for Scout. Aunt Alexandra from the beginning shows Scout who posses the power. "Put my bag in the front bedroom, Calpurnia,' was the first thing Aunt Alexandra said(Lee 127).

Saturday, October 12, 2019

Lord Of The Flies: Chapter 8 Notes :: essays research papers

1. The conch being inexpertly blown and the fact that Piggy has only one lens shows that society has begun to function poorly. The reason for this decline in society is Jack. Jack broke Piggy's lens, and now Jack who has power, represented by the conch, does not know how to blow it properly. This tells us that Jack is an inept leader who misuses power and destroys knowledge. To become an expert at something, such as blowing a conch or leading a society takes time, so this is also significant because it shows that Jack has just recently come to power. Because the conch and Piggy's glasses are crippled, knowledge and power are crippled, but not yet fully eliminated.2. When Simon says, " I think we ought to climb the mountain.", he means that society should conquer its fears and reclaim the island. When the boys first founded society, one of the first things that they did was to climb the mountain and attain knowledge of the island. It is important to note that knowledge was a priority for this early society. Climbing the mountain was also a task undertaken with great enthusiasm and the offering of hope for what their society could be. This was the peak of their civilization. Ever since then their society has been "declining" or going "downhill", so the mountain represents the "peak" or "height" of their civilization. As the boys' civilization fell apart, it became primitive and controlled increasingly by evil elements (Jack). Because of this the boys began to fear a beast. The beast was a symbol of this demise and an obstacle to the return of glory. I say that the beast is an obstacle because they now fear climbing the mountain, a mountain that symbolizes the peak of society. When Simon says that they should climb the mountain, he is also saying that the boys should abandon their primitive fears and return to previous glory.3. The new fire is symbolic because it is Piggy's attempt to rebuild society. Piggy believes that without Jack (evil), he himself (knowledge and civility) can prosper. The first step that Piggy decides to take is the construction of a new fire. The fire represents the domination and manipulation of nature and therefore the return to civility. It is important to note that the fire is in a new location. The new fire represents a new society engineered by Piggy and founded upon knowledge. Lord Of The Flies: Chapter 8 Notes :: essays research papers 1. The conch being inexpertly blown and the fact that Piggy has only one lens shows that society has begun to function poorly. The reason for this decline in society is Jack. Jack broke Piggy's lens, and now Jack who has power, represented by the conch, does not know how to blow it properly. This tells us that Jack is an inept leader who misuses power and destroys knowledge. To become an expert at something, such as blowing a conch or leading a society takes time, so this is also significant because it shows that Jack has just recently come to power. Because the conch and Piggy's glasses are crippled, knowledge and power are crippled, but not yet fully eliminated.2. When Simon says, " I think we ought to climb the mountain.", he means that society should conquer its fears and reclaim the island. When the boys first founded society, one of the first things that they did was to climb the mountain and attain knowledge of the island. It is important to note that knowledge was a priority for this early society. Climbing the mountain was also a task undertaken with great enthusiasm and the offering of hope for what their society could be. This was the peak of their civilization. Ever since then their society has been "declining" or going "downhill", so the mountain represents the "peak" or "height" of their civilization. As the boys' civilization fell apart, it became primitive and controlled increasingly by evil elements (Jack). Because of this the boys began to fear a beast. The beast was a symbol of this demise and an obstacle to the return of glory. I say that the beast is an obstacle because they now fear climbing the mountain, a mountain that symbolizes the peak of society. When Simon says that they should climb the mountain, he is also saying that the boys should abandon their primitive fears and return to previous glory.3. The new fire is symbolic because it is Piggy's attempt to rebuild society. Piggy believes that without Jack (evil), he himself (knowledge and civility) can prosper. The first step that Piggy decides to take is the construction of a new fire. The fire represents the domination and manipulation of nature and therefore the return to civility. It is important to note that the fire is in a new location. The new fire represents a new society engineered by Piggy and founded upon knowledge.

Friday, October 11, 2019

Cross Cultural Understanding Essay

The first culture that would be considered as a client for this paper is a minority culture of Asian Americans in the United States. Statistically, Asian-Americans compose the fourth largest cultural group in America. However, their cultural group is significantly far from the third one which are the Latin American residents of the country. Also, an important point to understand for the Asian-American culture in the United States is that although they are American citizens and are classified under Asian descent, their cultural group and contents as many countries belong to Asia such as Chinese, Indian, Vietnamese, Koreans, Japanese (Zhang, Snowden, & Sue, 1998). However, recently, although there has been a steady influx of Asian nationals who have migrated to the United States in order to find work, family, or any other purpose, there is also a category within the Asian-American community — those who have been descendents of Asians in the country. However, at least for this paper, those two subcategories of Asian-American shall be considered together. For this minority cultural group, we shall approach to the discussion from the point of view of Jessica. Jessica is a Filipino who has migrated to the United States five years ago and whose current occupation is a household domestic helper for a middle-class family in the country. Like many other Filipinos — in fact like many other Asians who have migrated to the United States, although their cultural beliefs have been associated by many people in the country to be either Buddhist, talents, or any one of the far Eastern religions, Jessica is actually a Roman Catholic. Being a Roman Catholic, she has the duties and responsibilities of going to Mass every Sunday and beliefs any many of the teachings of the Roman Catholic Church, although some of the beliefs are culturally different from Roman Catholics in the United States because of her Filipino roots. Also, she was educated up to first-year college in our community back in the Philippines and is a mother of three children who have stayed back in the country and who, at least according to her, she wants to migrate to America over the next years if her savings from her current occupation of as. Her husband is also backing her home country. Having extremely powerful family values, her daughter — the eldest of her children — his plan to go to the United States early next year to start studying here as a scholarship that has been granted to her by the local Filipino community and support group. Jessica, being a resident of the United States and belong to any minority cultural community in the country, is of course entitled to receive social support as is recommended, documented, and legislated by that country’s government (Brown & James, 2000). However, this is not the only reason why Jessica is receiving social services. The fact that she belongs to a minority cultural community in the United States reflects that she is an individual is limping in a different cultural background than what she had been used to back in her home country. In fact, back in the Philippines, living far from the urban metropolis and in the rural areas of the country, Jessica, whenever she feels an ailment, does not immediately go to the local hospital not only because of the certain expenses that are required in order to receive medical treatment, but also because of the long-standing cultural belief that before any medical help and aid is taken and listed by citizens, the first person that one approaches is the local healers of the community (Monzon, 1995). Therefore, here, living in the United States, Jessica suddenly finds herself in situations where he and if she has medical ailments, problems, or even minor conditions — something which is usually felt especially when in the industry of domestic and household work — she does not recognize that she is entitled to various medical rights as she is a taxpayer of the country. And because of the lack of the local healers of the local residents in the United States, Jessica only seeks medical attention when the ailment that she feels reaches an unbearable state. If Jessica was back in the Philippines, although she would have certainly received social welfare and social work services, she would have had local support and be familiar with the system of medical treatment in our country. However, now, being the United States, her problem is that such medical attention is daunting especially for a migrant worker in the country who knows that her income in salary is relatively low compared to other citizens (Huang & Yeoh, 1996). The availability of social work not only for medical access but also for information regarding what the hell services of the country can offer becomes essential in her case and the many other domestic helpers that belong to Asian-American communities in the country. The second person that we take into consideration is an individual named Lucas. Lucas, however, is not the real name of the client for reasons that shall be evident. Lucas belongs to a cultural majority in the United States — African-Americans — who have integrated themselves from family, to environment, culture, and even to work, in greater metro polyps and areas in the United States today. Lucas is 24 years old and works in an advertising agency in one of the many public relations groups in the city. Also, he is single and living separately from his family with an income that current income brackets would classify as under the middle-class. He has received a university education from one of the local state colleges and is planning on taking up a Masters degree in journalism for public communication in the next two years. Also, Lucas is a Baptist Christian and belongs to a tightknit community of families that practice the faith. However, not known to his family members and as he has only revealed to a few people, Lucas is homosexual and has known this for quite some time. He regularly undergoes sexual encounters with men in and around his age belonging to all kinds of races and cultures. Recently, Lucas, upon receiving medical checkup and blood test — as well as an advice from one of his sexual partners — as discovered that he has the HIV virus and that his CD4 count is already below 300. The CD4 count is a indicator of the number of white blood cells a person has. A person without HIV or does not have any immune system problems will usually have 700 to 1000 CD4 count in their blood . Even individuals who have contracted HIV virus do not necessarily have to take medication as long as they are CD4 count remains above 300(Solomon et al. , 1998). However, once this number is breached, certain doses of medication have to be taken every day at a certain time without missing a single dose in order to ensure survival from the disease. In fact, unbeknownst to Lucas or many other individuals who have contracted HIV virus and have been tested, and individual with HIV could survive up to the normal lifespan of human beings given that they either take their medicine every day in regularly without missing a single dose or insuring proper leadership to keep their immune system up if their white blood cell counts have not yet gone below 300 (Veazey & Lackner, 2004). However, because of the negative convention of HIV, many people do not notice. Furthermore, the medication for HIV-positive individuals are extremely expensive (Kalichman et al. , 2000). It is up to social workers to inform individuals such as Lucas that the medications required to fight off the HIV virus and to maintain proper immune system in order to live a full healthy life is actually free and provided by the health services of the local and national government without any charge. In fact, as of recently, any individual who has contracted HIV virus and started the medication that is provided by the government have not experienced deaths over five years because of its efficiency (Cole, Kemeny, & Taylor, 1997). The only problem with HIV is that individuals do not know either if it’s deadly effects, its problems of transmission, or the fact that medicine is distributed freely by the government is once tested this positive. Lucas had only known of this fact when he had received information and help from social workers and the system of health benefits for HIV-positive individuals together with social work scenarios are kept in complete anonymity especially considering the fact that Lucas belongs to a religious sect of Christianity that condone such actions (Nelson, Rosenfeld, Breitbart, & Galietta, 2002). I, on the other hand, am a 28-year-old heterosexual female and have been raised in the country, although discussions with parents and relatives have revealed that I have some Italian and Native American roots. Also, I am deeply religious and believe in large families, as well as a firm believer that sex should only be undergone after marriage as it stopped by the Catholic religion that I fervently practice. As a social worker, it is very essential to understand — especially considering the two clients that have already been mentioned earlier in this paper — of the various contexts they are coming from. In fact, one of the most problematic approach is especially in social work is if we have social workers immediately instigate judgment upon individuals. These two identities, although significantly different from each other and even significantly different from my own, require introspection and interface because it is only through understanding their local social and cultural context would I be able to understand the way they think and therefore also be able to formulate plans on how to help these individuals and even be able to help other in the victuals who belong to the same social and cultural majority or minority in the future. For example, in the case of Jessica, perhaps it may not be logical for me as a American citizens understand why she doesn’t go to healthcare facilities immediately when she feels pain and parts of her body, but then realized that her cultural perspective is that from the Philippines and a small room village community where elements usually go away or if they don’t, are addressed by local medicines and she looks. However, unbeknownst to these individuals is that some diseases — like the ones that have been experienced by Lucas — could only be seen after relative medical examinations and tests have been performed by research facilities and hospitals which look specifically for signs, symptoms, and ailments as a result of years of study by medical professionals in their fields (Woloschuk & Tarrant, 2002). Also, as another example, from the point of view of Lucas, being raised as a Christian Baptist immediately raises a problem in the issue of homosexuality — much more the issue of having contracted HIV because of his many experiences and sexual encounters. Perhaps, from my point of view, it would have been illogical for him not to seek treatment immediately. However, what I must remember again is that from his cultural point of view and perspective — especially from the perspective of religion and family — being a homosexual is a sin not only to local family members but even to his fate as well — much more contracting the deadly HIV virus. As a social worker, even though I believe that sex should only be done after marriage and done in full fidelity to your partner, if I really wanted to help Lucas, I would not deliver this judgment just because of my own cultural Mormon perspective but rather understand it from his point of view and realized that health, among others, must trump the cards from the perspective of my duty as a social worker. References: Brown, D. E. , & James, G. D. (2000). Physiological stress responses in Filipino-American immigrant nurses: the effects of residence time, life-style, and job strain (Vol. 62, pp. 394–400). Am Psychosomatic Soc. Cole, S. W. , Kemeny, M. E. , & Taylor, S. E. (1997). Social identity and physical health: accelerated HIV progression in rejection-sensitive gay men. Journal of Personality and Social Psychology, 72(2), 320. Huang, S. , & Yeoh, B. S. (1996). Ties that bind: state policy and migrant female domestic helpers in Singapore. Geoforum, 27(4), 479–493. Kalichman, S. C. , Benotsch, E. , Suarez, T. , Catz, S. , Miller, J. , & Rompa, D. (2000). Health literacy and health-related knowledge among persons living with HIV/AIDS. American Journal of Preventive Medicine, 18(4), 325–331. Monzon, R. B. (1995). Traditional medicine in the treatment of parasitic diseases in the Philippines. Southeast Asian journal of tropical medicine and public health, 26(3), 421–428. Nelson, C. J. , Rosenfeld, B. J. , Breitbart, W. , & Galietta, M. (2002). Spirituality, religion, and depression in the terminally ill (Vol. 43, pp. 213–220). Acad Psychosom Med. Solomon, L. , Stein, M. , Flynn, C. , Schuman, P. , Schoenbaum, E. , Moore, J. , et al. (1998). Health services use by urban women with or at risk for HIV-1 infection: the HIV Epidemiology Research Study (HERS). Journal of acquired immune deficiency syndromes and human retrovirology: official publication of the International Retrovirology Association, 17(3), 253. Veazey, R. S. , & Lackner, A. A. (2004). Getting to the guts of HIV pathogenesis (Vol. 200, pp. 697–700). The Rockefeller University Press. Woloschuk, W. , & Tarrant, M. (2002). Does a rural educational experience influence students’ likelihood of rural practice? Impact of student background and gender. Journal of Rural Health, 18(4), 492. Zhang, A. Y. , Snowden, L. R. , & Sue, S. (1998). Differences between Asian and White Americans’ help seeking and utilization patterns in the Los Angeles area. Journal of Community Psychology, 26(4).

Thursday, October 10, 2019

Exploring Sexuality with William Shakespeare Essay

The presence of homoerotic references in the works of William Shakespeare was a direct result of the Elizabethan attitude towards sex during the English Renaissance. Within the privacy of the sonnets, Shakespeare could effusively express a passion that the Elizabethan Era, with its social mores, stifled greatly as it frowned upon homosexuality. Given the freedom to express himself uninhibitedly, Shakespeare cast aside the homophobia of his age and inscribed love sonnets for another male, Mr. W. H. This unrestricted honesty created great tension and drama between Shakespeare and his adversary, the dark lady as well as fueling some of the greatest love poems of all time. Over hundreds of years, it comes to no surprise that many scholars have found the sonnets effective in revealing insight into the biography of William Shakespeare. The emotional pressure contained in many of the sonnets and the fact that many, if not all, are dedicated to a man named ? Mr. W. H. ‘, provide important clues to Shakespeare’s life. It begins with the sonnets’ dedication, a passage written by Shakespeare that opens a world of controversy amongst scholars. The dedication runs as follows: To. The. Only. Begetter. Of These. Ensuing. Sonnets. Mr. W. H. All. Happiness. And. That. Eternity. Promised. By. Our. Ever. Living. Poet. Wisheth. The. Well. Wishing. Adventurer. In. Setting. Forth. T. T. (Shakespeare, 1490) The initials T. T. at the conclusion of the dedication refer to Thomas Thorpe, the original publisher of the sonnets (http://andrejkoymasky. com/liv/sha/sha00. html). However, one question remains, who is Mr. W. H? During the English Renaissance, it was customary for members of high social standings to hire established writers and poets to create masterful love sonnets and other works of literature for their entertainment. For a large portion of his adult life, Shakespeare spent his time writing sonnets for an upper class family, specifically for a young man (Rowse, 96). The beginning sonnets describe a ? lovely youth’ and it is believed that over time, Shakespeare’s sonnets became more personal as the relationship between him and his patron intensified. Scholars have professed that this patron could in fact be â€Å"the only begetter of the sonnets,† Mr.  W. H, or William Hughes. The majority of the sonnets were written between 1593 and 1596, however, they were not published until 1609 and then further edited in 1640, long after Shakespeare’s death (Auden, 86). The randomness of their order leads scholars such as Northrop Frye to question their validity in accurately capturing real life happenings (Fleperin, 96). The publisher who replicated the sonnets in 1640 actually changed the pronouns in sonnets 15 through 126 to make it seem as if the poems were addressed to a woman. The question now at hand is; are the feelings expressed in the sonnets a celebration of homosexual love? And if so, how could such feelings emerge in a time where homosexuality had no place in social life (Taylor, 39)? The sixteen hundreds were a time of strict values and high standards of living. At this time, embracing sexuality was not encouraged and questioning ones sexuality was not an option. During the English Renaissance it was common for men to wear their hair long and dress in silks and ruffles (Taylor, 45). World renowned professor, Edward Hubler, published his book, The Sense of Shakespeare’s Sonnets, in which he points out the Elizabethan men used the term â€Å"lover† between men without embarrassment (Hubler, 17). Author C. L. Barber, in his essay on Shakespeare’s Sonnets, reminds us that the suppressed roles of women in Elizabethan society kept them out of the theater, forcing men to play the roles of women in many of Shakespeare’s productions at the Globe Theater. This openness is most attributed to Shakespeare’s sexual curiosity, and because his masculinity was never in doubt, his sexual awakening quickly progressed. To truly grasp Shakespeare’s feelings for Mr. W. H, we must refer to sonnet twenty, which is the first in the series to address the mysterious love affair. Despite the fact that male friendships were openly affectionate, the sonnets’ powerful emotions are indicative of a deeper love (Cross, 1,490). Line two of the poem describe the subject as the â€Å"master-mistress† of his passion. Right away we sense a conflict between the love for a man and the love for a women. Shakespeare makes it known in lines eight and nine of the sonnet, that W. H was in fact created for a woman’s love and affection, telling his readers that his subject is male. Further into the poem he describes his acceptance of that fact that he was defeated by nature, but continues to acknowledge their love (Cross, 1,4940). Shakespeare’s persistence in his attempt to win over the heart of his acquaintance is noted in sonnets 135-137 (Cross, 1511,1512). It is here that Shakespeare emphasizes the name ? Will’ as seen in italics in nearly every line. It is at this point in the series where it is suspected that the poets love for W. H is being threatened by a woman. In attempts to re-establish the ? dark lady’ in relation to Mr. W. H, scholars have studied specific sonnets in which her character is revealed. We find that the twenty-five sonnets dedicated to a woman, the â€Å"dark lady,† dwell on her imperfections and falsehoods (Barber, 16). For example, in sonnet 127, Shakespeare devotes his energy to expressing a lower love toward the woman and a higher love toward the man. It is not until the later sonnets that Shakespeare begins to feel threatened by the dark lady, and begins to depict a competition for the heart of W. H. In sonnet 138, Shakespeare is almost trying to convince W. H that this woman could never love him in the manner that he was willing to (Cross, 1,870). Shakespeare’s main concern, in the midst of anguished humiliation, is to keep the man’s love, not the woman’s. Shakespeare’s inner conflict expressed in his works evidently developed during a time when his life, outside of the ? dark lady’ and W. H, was relatively normal, and this is another reason as to why the sequence of the sonnets is so important. As we know, Shakespeare married Anne Hathaway in 1582. She gave birth to his children soon after. Was this heterosexual fantasy life all a cover up for the love he shared with W. H? Because no one has been able to figure out the correct order of the sonnets we will never know precisely when these love affairs took place. To label Shakespeare a homosexual would be ignorant, only because the consummation of the love between the poet and his muse was never proven. We can only base our knowledge of his curiosity on the contents of the sonnets, and with that we can gather that Shakespeare was involved in affairs, not necessarily physical, with both a young man, Mr. W. H, and a reticent woman, the Dark Lady. The conflict involving these two characters sparked the fire that fueled the ingenious works of one of the greatest poets of all time, Mr. William Shakespeare. Auden, W. H. Lectures on Shakespeare. New Jersey: Princeton University Press. 2000. Bloom, Harold. Shakespeare: The Invention of the Human. New York: Riverhead Books. 1998. Cross, Wilbur, L. The Yale Shakespeare. New York: Barnes and Noble Books. 1993. Hubler, Edward. The Sense of Shakespeare’s Sonnets. New Jersey: Princeton University Press. 1952 Hugh, Calvert. Shakespeare’s Sonnets and Problems of Autobiography. Braunton: Merilin Books, 1987. Holland, Norman. Psychoanalysis and Shakespeare. New York: McGraw Hill Book Company. 1966 Pitt, Angela. Shakespeare’s Women. New Jersey: Barnes and Noble Books. 1981 Rowse, A. L. The Elizabethan Renaissance: The Life of the Society. New York: Charles Scriber’s Sons. 1971. Taylor, Gary. Reinventing Shakespeare. New York: Weidenfeld and Nicolson. 1989. Internet Sources http://www. onlineshakespeare. com/sonnetsabout. htm http://andrejkoymasky. com/liv/sha/sha00. html http://infopt. demon. co. uk/shakespe. htm http://www. shakespeares-sonnets. com/wilde. htm http://aspirations. english. com. ac. uk/converse/essays/cgonda/loves. acds http://eserver. org/emc/1-2/halpern. html.