Tuesday, December 31, 2019

Eroticism and Mortality in Shakespeares Sonnet 73 Essay

Eroticism and Mortality in Shakespeares Sonnet #73 William Shakespeares sonnet cycle is famous with its rich metaphorical style. The depth of each sonnet comes from its multilayered meanings and images, which are reinforced by its structure, sound, and rhythm. Sonnet #73 provides an excellent example. This sonnet shows the speakers agony over human mortality and, moreover, his/her way of coping with it in an effective way. The speaker, especially in terms of his cognizance of time, experiences dramatic changes in two ways: (1) from time measured by quantity to time as quality, (2) from cyclical time to a linear one. These changes, manifested by a set of images (autumn, twilight, glowing), enable him/her to embrace†¦show more content†¦The second quatrain also gives a description of quantitative time as saying: the twilight ... Which by and by black night doth take away(5-7). The twilight, an arbitrary name of a particular moment or light among a full range of a day and a full spectrum of light, can be taken away littl e by little (Italic mine). Both quatrains share a basic assumption that time is something that one is losing throughout his/her life. Still, however, the second quatrain distinguishes itself from the first one in that it doesnt have such violent images as the first one. At least, death wouldnt come in a sadistic way as in the first quatrain but come as it seals up all in rest(8).1 On the other hand, in the last quatrain, time is not something measurable but a qualitative entity. Here, time turns to a glowing fire that burns through his/her lifetime. Since it is a continual process, death becomes a part of ones life. Ones youth nourishes the fire until it expires in his/her death-bed and until the ashes of his youth itself chokes the last ember (10-12). Furthermore, the diction of this quatrain supports this positive attitude of the speakers. For instance, the speaker does not say that the fire must be extinguished but must expire(11). This usage of an intransitive verb makes death felt not as an imposed or a forced result but as a part of lifes own cycle. His/her saying Consumed also gives a more

Monday, December 23, 2019

Discrimination And Gender Discrimination - 957 Words

Discrimination simply means to differentiate between two or more people, in such a way as to restrict rights. The law view discrimination as distinguishing, separating, differentiating, unequally treating people which, being equal, must be treated with the same degree (Gidro and Gidro. 2016.p65). Harassment and sexual harassment, common forms for discriminations, are actions that go against the principle of gender equality and are described as discriminatory on the basis of gender. Harassment, a form of discrimination based on protected class characteristics, is an obstacle to understanding equal employment opportunity (Welsh.2013.p267). The Equal Employer Opportunity Commission (EEOC) defines sexual harassment as unwelcome sexual†¦show more content†¦2011. p 330). Under Meritor, an employees harassment is unlawful if it leads to a hostile or abusive work environment. Even if a term of employment is not affected, the harassment remains unlawful if it is sufficiently severe o r pervasive. In this case both severe (sexual assault) and pervasive (repeated harassment over years) conduct were exhibited. Harassment causes numerous problems to women. In addition to psychological damages, women also experience fear that verbal harassment will escalate into physical harm, including rape, and experience added emotional distress, depression, anxiety, and stress. It is not required by law for employees to be treated nice or civil; however, employees do have the right to work in a hostile free environment. In the Singleton v. Department of Correctional Education case, Singleton sued the Department of Correctional Education for harassment. Hired as a prison librarian, Singleton complained about harassment by a supervisor from another agency that worked at the prison. She was verbally harassment by the supervisor approximately four times a week from the time of her initial employment in July 2000 to October 2001. The supervisor made comments to another male supervisor that the woman should be spanked every day, insistent complimented her appearance and how attractive she was, gawked at her breasts during conversations, measured her skirt for the purported purpose of determining whether it complied with theShow MoreRelatedSexual Discrimination And Gender Discrimination1384 Words   |  6 PagesSexual discrimination, sex based discrimination, gender discrimination or sexism is a type of prejudice or discrimination based on a person s sex or gender usually by the opposite gender. Thus, it generally refers to discrimination against a male by a female or a female by a male. Feminism can therefore be considered a form of sexism. More often than not however, sexism is commonly applied to the unfair treatment of women, the denial of opportunity to women or an injustice towards women, whichRead MoreRacial Discrimination And Gender Discrimination962 Words   |  4 Pagesincreasingly being seen, especially on social media. It s a single word which people are using instead of the longer phrases disability discrimination or disability prejudice. Racial discrimination and gender discrimination have their own single words - racism and sexism - and so those ideas can be expressed a little more easily. Disability discrimination is often complicated and misunderstood. At one end of the scale, buildings with steps instead of ramps may be said to be ableist. Less obviousRead MoreDiscrimination Based On Gender And Gender Discrimination1574 Words   |  7 PagesINTRODUCTION: Gender discrimination, also known as sexism, refers to prejudice or discrimination based on sex and/ or gender, as well as conditions or attitudes that foster stereotypes of social roles based on gender (Women and Gender Discrimination). Sexism is a social injustice that is not applied only to women but, to men as well. Certain personalities and characteristics are expected from both genders starting as children. Little girls are expected to play with dolls, while little boys areRead MoreDiscrimination Based On Gender Discrimination973 Words   |  4 PagesDiscrimination, especially discrimination based on gender, should be looked at through Deontology. This is because discrimination based on gender affects the rights of many, requires duties of other to not discriminate and have respect for others, and can have large consequences. It is important we look at rights, duties, and consequences rather than only evaluate gender discrimination based on its consequences in order to be abl e to create a way to virtuously handle gender. While gender discriminationRead MoreGender, Discrimination, Harassment, And Discrimination1421 Words   |  6 Pageswith Gays and Lesbians, coming out in the sports world has shown to be an alienating and difficult experience for homosexual athletes and coaches. In most cases the athletes are subject to discrimination, harassment, threats and violence (Gregory 2004). This paper will discuss the ideology and attitudes toward gender role stereotyping and homophobia in sports and take a look at the stories of athletes who have publically come out about their homosexuality. The social arrangements, in the institutionRead MoreRacial Discrimination And Gender Discrimination2298 Words   |  10 PagesDiscrimination is an ongoing problem that exists in many forms and is often studied by social psychologists. According to Bordens and Horowitz (2014), discrimination is defined as â€Å"overt behavior- often negatively directed toward a particular group and often tied to prejudicial attitudes- which involves behaving in different ways toward members of different groups† (p. 106). Although discriminatory behaviors have seemed to simmer down over the past decades, individuals still to this day continueRead MoreGender Discrimination1518 Words   |  7 PagesGender Discrimination Written by: Brent Davey TABLE OF CONTENTS Introduction--------------------------------------------------------------------3 Gender Discrimination Defined-------------------------------------------3 Gender Discrimination at Work-------------------------------------------5 Gender Discrimination and Politics--------------------------------------6 Conclusion---------------------------------------------------------------------6 Works Cited-------------------------------------------------------------------8Read MoreSexual Discrimination And Gender Discrimination2076 Words   |  9 Pagesdemand is a kind of employment discrimination. The sex discrimination of employment the female encounter is especially extrusive. At present, females of China more and more fall in a weak position in employment market. So, what is gender discrimination? Gender discrimination, also known as sexual discrimination, is any action that specifically denies opportunities, privileges, or rewards to a person (or a group) because of gender. The practice of letting a person s gender become a factor when decidingRead MoreGender Discrimination1008 Words   |  5 Pages Gender-bias within the workplace has existed as long as both males and females have worked together, and even now, it is a prevalent issue in modern society. Discrimination classified as gender-bias is the unequal treatment or employment due to the gender of an individual. While U.S. Code Title 42, Chapter 21, 2000e-2 prohibits discrimination based on gender, religion, age, disability, race, and national origin (Cornell), illegal and unfair employment practices still affect many people. DespiteRead MoreGender Discrimination5921 Words   |  24 Pages GENDER DISCRIMINATION By Nkechi AGBOGO TABLE OF CONTENT 1. Abstract 2. Introduction 3. What does sex discrimination cover 4. Sex discrimination possible scenes 5. Forms of sex discrimination 6. Reasons for sex discrimination 7. Policies which should help reduce gender discrimination 8. Conclusion 9. Reference ABSTRACT Gender discrimination is an acute and persistent problem, especially

Sunday, December 15, 2019

Howard Hughes Free Essays

Legend of the Aviator Howard Hughes is a man of many mysteries, very few actual facts are known about him. Historians constantly argue to decipher which of their theories are correct and which are Just over glorified rumors. The fact is Hughes liked to keep to himself. We will write a custom essay sample on Howard Hughes or any similar topic only for you Order Now This man left behind not only the â€Å"Legend of the Aviator† but also one of the biggest gaps in the world of film and aviation. â€Å"Hughes was the ambassador who ushered in a new era of living and a new way of life† (Hack 5). He introduced new ideas and accomplished things that people had deemed impossible. He believed that with his oney nothing was impossible, he made that very apparent through his invention’s. He designed planes and made some of the most revolutionary movies that captivated the minds of millions. Howard lived his life behind closed doors, hiding all of his true ambitions and how he achieved them. He also hid the world from not only his crazed ideas but also his mental illness, perhaps because he himself did not know that he was mentally ill. Howard Hughes related every aspect of his life to modernism. Not only did he relate to modernism but he himself was a modernist. His ingenious ideas ere thought to be radical for his time but at the same time they were somewhat inspirational. He was an idealistic man who looked beyond the possible and did not take no for an answer. Because of this, he broke world records and raised the bar for the upcoming 20th century. In order to truly understand this man, his actions, and how the â€Å"Legend of the Aviator† started one has to look into early life. If there ever was a more crucial part of anyones life it was Howard Hughes’ upbringing. Hughes birth place and date are not precisely known and are still a major controversy. What ou need to know is that he was born somewhere in Texas in the year 1905. He was born to a very fortunate family. At the time Hughes father Robert was the sole owner ofa crucial piece of equipment that was used to drill oil. His father made it rich selling land that contained massive oil deposits and by designing and selling the only drill bit that was strong enough to penetrate hard layers of granite. This drill bit was also the only one that could actually drill deep enough to tap into large oil reserves. In later years Hughes took over the family company after the death of his father in 1924. He inherited 75 percent of Hughes Tool Co. and later bought out the other 25 percent from the rest of his family (Hack 43). He was inspired to be like his father, a businessman. At heart, Hughes was not a businessman but his positive â€Å"go get ’em† attitude helped him seem like one. Hughes’ company was once accused of being a monopoly, his response was simply â€Å"We don’t have an monopoly. Anyone who wants to dig a well without a Hughes bit can always use a pick and shovel† (Howard 1). Howard Hughes was one of the most iconic fgures of the earlier half of the 20th century. He revolutionized the airline industry, presenting ideas that made flights smother and took less time from takeoff to landing. He single handedly defeated the social norms of his time and was known for setting a certain standard of class. Modernism by broad definition is, â€Å"a style or movement in the arts that aims to break that his individual attitude and matches that of modernism. In 1927 the film industry was booming, and Hollywood was at its highest peak in setting new standards. Out of now where a 23 year old millionaire came from Texas and dropped millions of dollars nto one single film. People were skeptical and thought of this producer as a crazed Texan with money that Just wanted to find a way to spend it, but as proven by Howard Hughes they were wrong. Three years later Hughes’ movie was release. He had successfully raised the bar for film industry. The movie Hell’s Angels had broken the record for the highest budget spent, most time ever spent on a film and the highest yield (Hell’s 1). The critics withdrew their previous remarks and Howard Hughes’ name in the film industry was established. Now the man not only owned a great share of the oil arket but now had his foot in the film industry. He produced films, directed movies, and threw around his money around as if it would never leave his side. Some would call it a gamble, and it was but he never did lose that money. Many people that tried to follow in his footsteps ended up broke, and with nothing left in their pockets. For Hughes it was never the case, he was an invincible man. He could do anything he wanted and have any thing he desired. His bank account kept on growing despite his vast expenditures on his little projects. After working on Hell’s Angels he got more nvolved in aviation. Howard Hughes, the man who is known as the Aviator. After production on Hell’s Angels was wrapped up, Hughes became more involved in aviation and started designing his own planes† (Hack 103). He created some of the fastest planes and thought up ideas that seemed impossible or even pointless. For example, the Hughes H-1 Racer. He designed this plane to be fast, his goal was to take off everything on the plane that i t did not need and by doing so he made it light and aerodynamic, thus giving the plane greater speed. He sunk the screws into the aluminum exterior educing wind resistance and made many other small advancements that gave his plane a design that was superior to others. Because of this fascination with planes he always had work. Aviation design opened the door for government contracts designing and creating prototypes of spy planes. Once this door was opened, it shaped Hughes future for years to come. His government contracts were the basis of most of the rumors about Hughes. In his later life scams arose about Howard Hughes, himself trying to plot ways to kill Cuban leader Fidel Castro, along with CIA operations that were claimed to be associated with Hughes. These claims were later discovered to be coverups for a CIA reconnaissance mission of a Soviet Union Nuclear Submarine. To allude the attention of the public to their massive ships trolling international waters, the CIA claimed that it was simply a drilling rig operation owned by Howard Hughes (Central 2). It was later discovered that he had absolutely nothing to do with this government reconnaissance mission and had no knowledge of it. This man didn’t always have the best of luck. On two occasions he came close to death. He dodged death and survived two deadly plane crashes. In his first plane crash he was one of the two survivors, out of the four XF-11, â€Å"a military plane that was designed with a counter rotating double propeller system† (History 1). It was the first of its kind and in early experimental stages. Hughes took the XF-11 for its first test flight. Upon his return to the Air Force base after a very successful first flight, he lost oil pressure in one of the right engines. Rapidly losing altitude he attempted to crash land in a Beverly Hills mansion. Upon impact the plane’s fuel tank ruptured and ignited. Hughes barely managed to escape eath, sustaining third degree burns on most of his body and this left him with a severe case of â€Å"Complex Regional Pain Syndrome† (Hughes’s 1). The Aviator died on April 4, 1976 (Hack 215). At this point in his life he was dependent on opiates and codeine and had a hygiene issues. He would only cut his hair once a year and was supposedly seen with long grown out fingernails. He became so mentally ill that he believed that the germs did not come from him but came from the world which is ironic because his health was in very poor condition. He died of malnutrition and kidney damage. X-rays later revealed hat he had five broken off hypodermic needles in his arm. How to cite Howard Hughes, Papers

Saturday, December 7, 2019

Future Generation Communication and Networking †MyAssignmenthelp

Question: Discuss about the Future Generation Communication and Networking. Answer: Introduction A private biomedical 5 star organization, is comprised of 3 story building that are adjacent to each other. The length of both buildings is about 50 meters whereas width is approximately 15 meters. The distance between both buildings is approximately 40 meters. Their main objective is to change the existing network into modified system for making it beneficial as the company grows in terms of number of employees. The existing network is old and that is required to upgrade. They have an idea for setting two IT rooms having 20 systems. The programmers will sit in one room whereas Web Designers will sit in other room. The 5 star organization wants to set virtual machines that needs to be operated online. The organization wants to implement WAN at the branch offices which are just recently opened. 100 systems will be set up in their branch offices that can be used for video conferencing with other offices. The new branch office is 200 km the head office. Hence, all the offices need to be on WLAN for the future communication. WLAN is similar to LAN. The only difference between them is the radio signals which are used as transport medium in spite of wires. The main purpose of WLAN it is connected with the mobility of the users by implementing it in simple way and easy configuration. The main challenge in implementing WLAN is its security that also includes its legacy as well as complexity in its implementation. The enhanced adaptability of Wireless LANs results in the profitable work groups, better contribution from staff and also satisfies the employees as implementing WLAN makes staff more flexible and it increases the mobility of staff. (Dr. Singh, G., 2012). The main objective of the organization is to make network better so that the branch offices can communicate with the head office of biomedical organization without any interruption. The organization wants to operate virtual machines online so that employees can have mobility to work from anywhere. The organization also wants to implement video conferencing so that branch office can communicate with their head office on very less expenses. The organization wants to be at the top in their networking. Also, the implemented WLAN should be enough for future if number of employees increases. Challenge of Network Security The remote networking system provides access beyond the physical limits of the staff or the building. Anyone can use the enterprise wireless network. So it is necessary to implement the effective security to wireless network as the staff can have the rogue access to the enterprise network without having the knowledge to the management. Dissimilar to wired network systems, the signal of a remote system can be broadcast to the imparting hubs. A hacker has the ability to hack the wireless network by intercepting the radio signals. He can also remotely hack the network from any remote location. So it is necessary to implement a security policy in the organization to secure the wireless network. With the increase in the growth of WLAN, more systems can have access on the network. It must be necessary for network administrator to provide some extra access points so that others users can also have access to the network. So it is necessary for the network administrator to implement security policy centrally from the server. (Avaya Inc., 2011). Wireless network (WLAN) should be implemented in such a way that remote users who are outside the office can have the access to the network in a secure methodology. The best solution for providing remote access to the outside users is setting VPN which enables users to securely transmit data over VPN server by having centralized network access. VPN also provides flexibility to its users as it helps users to carry IP protocols as per IPSec standards. It also helps to rationalize all its resources in order to avoid any type of waste. It encrypt the data which is transferred through the network. (Bourdoucen, H., Naamany, A., A., 2009). The transmission capacity of various access points can be set to 10Mbps or more in order to give enough transmission capacity for the network traffic, whereas the information or packet size to be sent was set at 1400 bytes. The remote system standard utilized was 802.11n and this was set as the uniform for all the points. (Ochang, P, A. Irving, P., 2016). The number of network users will expand in future. There must be centralized security system which must be centralized managed by network administrator. The network must be enough efficient in order to deliver appropriate throughput to its users. The quality of audio and video conferencing must be good. (Finneran, M., 2004). The various hardware which are required for successfully implementation of WLAN includes switch, router, cisco firewall, laptops, phones, printers etc. Firewalls have been developed with additional security features like application assessment capacities, which gives the capacity to inspect, recognize, and check application as well as to treat traffic as indicated by various policies that depends on various variables. This helps to block unwanted network traffic who want the unethical access to the entire network of the organization. The firewall secures the access at various key system points, guaranteeing, for instance, that sales representative can't access the financial system or payroll of the ERP. (https://www.cisco.com, 2017). Mesh topology is the best solution for implementing WLAN in order to provide remote access. Implementing mesh topology is cost effective as well as it provides secure solution for remote access. It enhances the unique solution for mesh topology and also. Also, it adequately underpins current systems administration necessities, and establishes the framework for the combination of business applications. A remote mesh network can be defined as the communication network which is built by radio hubs which possess two pathways of communication to every hub. It constructs routes between hubs as required by originating nodes. If a hub wants a route to a goal for which it doesn't have route, it communicates a route request packet over the network. Nodes mainly monitor the route request through source IP address and broadcast ID. It is the progression towards giving high data transmission solution over a particular scope range. It is stable network topology. (https://www.solwise.co.uk, 2017). In order to provide end-to-end networking access, the center layer interconnects a few other system frameworks that are executed in various parts and other parts of the building. Utilizing VSS to virtualize the center layer into logical framework stays transparent to each system device that interconnects to the VSS-empowered center. A logical IP gateway builds up a point-to-point network topology in the distribution block, which removes customary protocol and empowers the system to work at full limit. (https://www.cisco.com, 2017). Conclusions An ever increasing number of ventures are perceiving the wireless LAN (WLAN) innovation. Versatility builds business benefit through enhanced profitability, upgraded ongoing network communication, and new business applications. The wireless LAN network have a high adaptability factor. They give continuously on network availability, yet don't require a system link. When a better network topology is adopted, it helps to enhance profit of the organization and also helps to fulfill the customer's goals for flexibility, and execution. One of the destinations as a system originator should be to enable the customer to develop a couple of philosophies and techniques for realizing framework organization. References Bourdoucen, H., Naamany, A., A. (2009). Impact of Implementing VPN to Secure Wireless LAN. World Academy of Science, Engineering and Technology 27 2009. Retrieved from- https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.309.2682rep=rep1type=pdf Community College and Vocational Education (CCVE) Design Overview. Retrieved from - https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Education/CCVE/CCVE_DG/CCVE_Ch3.html Deploying secure wireless network services. Avaya Inc. (2011). Retrieved from - https://www.avaya.com/en/documents/dn5244.pdf?t=0 Dr. Singh, G. (2012). Security Issues in Wireless Local Area Networks (WLAN). Global Journal of Science Frontier Research Mathematics and Decision Sciences Volume 12 Issue 11 Version 1.0 year 2012. Retrieved from - https://globaljournals.org/GJSFR_Volume12/8-Security-Issues-in-Wireless-Local-Area.pdf Finneran, M. (2004). Five critical planning steps for wireless LANs, Step 5: Manageability -- Switching to WLAN switches. Retrieved from - https://searchnetworking.techtarget.com/tutorial/Five-critical-planning-steps-for-wireless-LANs-Step-5-Manageability-Switching-to-WLAN-switches Iyer, A. Badgujar, A. (2013). Voice and Video over Wireless LAN. International Journal of Scientific and Research Publications, Volume 3, Issue 9, September 2013. Retrieved from - https://www.ijsrp.org/research-paper-0913/ijsrp-p21106.pdf Ochang, P, A. Irving, P. (2016). Performance Analysis of Wireless Network Throughput and Security Protocol Integration. International Journal of Future Generation Communication and Networking Vol. 9, No. 1 (2016), pp. 71-78. Retrieved from - https://www.sersc.org/journals/IJFGCN/vol9_no1/7.pdf Outdoor wireless including linking buildings and wide area coverage. Retrieved from - https://www.solwise.co.uk/downloads/files/linking-buildings-using-wireless.pdf Ro, E. (2002). Wireless Local Area Network Proposal. CAO - ITS. Retrieved from - https://www.csun.edu/~esr46044/Documents/WLAN_Sacto.pdf Wireless and Network Security Integration Solution Design Guide. Retrieved from - https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/secwlandg20/sw2dg/ch6_2_SPMb.html

Friday, November 29, 2019

qer tqr Essays - Makale, Zel, Ndan, Ttr, Sonu, Giri, Niversiteler

trwrhwrb retqwe rew rwert ret re eter ttr erterttwetweter r tesrtdgdfg ert erta er tqtt eqtrtqq Essay yazarken bir kompozisyonda olduu gibi uymanz gereken belirli kurallar vardr. Bu a?klamalarn sonunda ?ok sayda essay ?rnei bulabileceiniz ?eitli nternet adreslerini vereceiz. Essay'nzda giri, gelime ve sonu? b?l?mlerini a?k bir ekilde belirtmelisiniz. Baz ?niversiteler ?ok soru y?neltip her soruya ksa cevaplar niteliinde bir essay isteyebileler. Dier baz ?niversiteler ise sorduklar bir tek sorunun cevabi olarak bir makale isterler. Not ortalamas ?ok parlak olmayan kiilerin bile gayet g?zel bir essay ile anslarn y?kseltebilmelerinin m?mk?n olduunu unutmayn. Essay ile ilgili nternet adresleri sayesinde bakalar tarafndan yazlm y?zlerce es saylara ulaabilirsiniz.

Monday, November 25, 2019

Research General Surgery Essay

Research General Surgery Essay Research: General Surgery Essay Surgical Nurse In today’s world in terms of education and profession nursing is one of the major scopes. The study about the health care of the families, publics and individuals is known as nursing. Before in the 19th century nursing was very difficult and know as dirty profession and in middle of 19th century many patients died of surgery and it was dangerous ( Khan, 2012). There are various sectors of studies and specialist in the nursing career. I graduated as a nursing student from University Of Western Sydney and I am a registered nurse now. I am planning to study further as a surgical nurse specializing on general surgery. Surgery is one of the difficult and challenging tasks to perform in the medical area. The area of study where the nurses help the patient during the surgery period, before and after the surgery is known as surgical nursing. I have the personality to take care of the people who are facing the hard times and I am very kind, loving and caring towards the people. During my undergraduate studies I used to work on age care looking after the old people and I found it very interesting and learned how to interact with the patients. When I was studying in 8th grade I had appendix and I had to go through the surgery. At that time I was so nervous and afraid because it was my first time but at the same time one of the nurses who were looking after me provided me the strength. The nurse was a very kind and caring person, she told me not to be afraid and described all the procedures and told she would look after me the whole time. Although, I was so afraid by the convincing and loving suggestion f rom her somehow I was ready for the surgery. I was so impressed by her personality and from that moment I wanted to be the nurse in future and help the needy people like she did to me. As, my background I am from Nepal where boys are not allowed to study nursing so I came to Australia to study nursing and chase my dream. Now I am a registered nurse and for further study I want to specialize on general surgery under surgical nursing so I can help the patients who are going under the surgery and treat them better in the near future. The treatment of the injuries, abnormality and diseases using the operative system is known as general surgery. General surgery is a vast area of study and I am willing to complete my master’s degree in this area. Mainly I will be looking after the patients who are admitted for the surgery and looking after them during the surgical time. I will be helping the doctors with some surgical instruments and looking after the vital parts of the surgery. During the surgery patients should go through different tests like, blood tests, urine tests, x-rays and we have to collect the results and report it to the doctors. I will be looking for the patient mainly on pre-surgery and post-surgery. So I will be looking on those

Thursday, November 21, 2019

Macy's short-term debt and shareholder's equity Essay

Macy's short-term debt and shareholder's equity - Essay Example The short-term debt however, declined from $1,103 in 2012 to $124 in February 2nd 2013. This shows a decline by $979. This is due to a decline in the company’s desire for short-term financing (Kline 87). It is also important to check on the financial health of Macy’s Inc. due to the short-term debt. This is done with reference to the cash and cash equivalents of Macy’s. The cash and cash equivalents were on the rise from $1,464 in 2011 to $2,827 in 2012. Thus, the company was in perfect financial position since it could repay the debt from its cash and cash equivalents. The financial health of Macy’s Inc. is evident through increase of short-term debt from the year 2011 to 2012. In the year 2013, the cash and cash equivalents reduced to $1,836. The financial health was also good since the cash and cash equivalents exceeded the short-term debt (Stickney & Weil 69). In the case of shareholders equity, there was a slight increase from $5,530 in 2011 to $5,933 in 2012. It further increased to $6,051 in 2013. The ordinary and preference shares are provided by the shareholders and they run the company in their shareholding capacity. The shares form a part of liability to the company in the form of capital. Therefore, shareholders equity is rising all through but the health of the company is also good since the total assets are more than the shareholders equity. In general, the company has a good financial performance (Khan

Wednesday, November 20, 2019

Strategic management on JJB Sports Essay Example | Topics and Well Written Essays - 3000 words

Strategic management on JJB Sports - Essay Example Against this background, this paper has been designed to identify the strategic change initiative that can be implemented by JJB Sports in order to revitalise its operations that have dipped as a result of the above mentioned factors. Changes are necessary for businesses so that they can gain competitive advantage over other rival competitors. This will also help the company to grab a large market share which can contribute to its viability in the long run. Why change is necessary for JJB Sports The digital competitive environment of 2013 makes it imperative for all organizations that are concerned about their survival to implement certain changes in their operations. In order to keep pace with the changes obtaining in the environment in which an organization operates, it is important to implement certain changes that can be aligned to the current business strategy. The use of new information and communication technology has significantly improved the operations of any business durin g the contemporary period. Therefore, any company that is concerned about its success should harness this new digital marketing and communication strategy. Change is also necessary given that the company will be able to attract more customers since the bulk of business is conducted through the internet during the contemporary period. Many organizations are shifting from traditional to digital marketing practices since the bulk of business is done online during the current period. In this case, JJB Sports should adopt a brick and click strategy in its operations. According to Bricks & Clicks (2013), this strategy integrates both traditional marketing strategies as well as digital marketing communication strategies and it focuses on different lines of business. The advantage of the traditional marketing strategy is that the organization is in a better position to retain its old customers while the use of digital communication will help to improve the efficiency of the organization in its operations. The company’s effectiveness can also be enhanced through the use of new information and technology since it will be in a position to process information at a faster rate. The advantage of new information and communication technology is that it can process large volumes of information at higher speed than information that is manually processed. The other advantage is that it is cost effective compared to other forms of communication. The company can also be in a position to reach a wide range of people through the use of the internet given that it is accessible to people in different geographical locations. Another important consideration for JJB Sports is that it should use aggressive marketing strategies that are aided by new information and communication technology in order to be in a position to gain competitive advantage. The organization ought to realign itself to the needs of the external environment and evaluate the possible outcome of the strategic cha nge programme implemented. There are different strategic management theories that can be used to shape the strategy for the organization. This section of the paper discusses

Monday, November 18, 2019

Human Resource Management in Context Essay Example | Topics and Well Written Essays - 2500 words

Human Resource Management in Context - Essay Example The paper would therefore analyse scholars’ assertion that contemporary trend in HR considerably promotes organizational strategic interests over employees interests (Van Buran, Greenwood & Shehan, 2011). The post industrialization period saw massive changes in the work paradigm. The Ford model became important scientific approach to labour management resulting in greater mechanized production process. While Taylor had identified skills and training for specific job outcome, Fordism was distinct in its managerial control and incentive driven mass production (Rose, 1975; Benyon, 1973). The model proved to be deficient in addressing the needs and requirements of the workers and was later replaced by human relations that took cognizant of workers’ socio-psychological needs. This was vital shift in the human capital employed within production units and businesses which had identified and used human factor as important ingredient of higher work outcome (Cannel, 2004). In the post war era, the emergence of labour union gave huge impetus to employees’ rights and fair working conditions. The concern for workers led to state legislations and organizational policies vis-Ã  -vis employees work conditions, wages, recognizing their rights etc. In the late 1990s, the technology and transforming socio-economic and political dynamics necessitated reconceptualization of employees and employers’ relationship (Hattam, 1993). The rise of Margaret Thatcher in UK witnessed significant change to individualism from collectivism that introduced the term human resource management which primarily indicated more emphatic role of management in the workers’ welfare and output (Lupton & Shaw, 2001). The HRM was deemed as important facilitator between workers and employers that incorporated various human resources activities like recruitment, performance, change management,

Saturday, November 16, 2019

Kenya National Security Strategy

Kenya National Security Strategy From colonial times to present day   Ã‚   Executive Summary After Kenyas independence, Somalia was a big security threats. After the president of Somalia, Siad Barre, was overthrown, Somali citizens fled their unstable country and entered Kenya. This affected Kenyas national security. Jihadist militant group, Al Shabaab, ruled Somalia, and through the arrival of refugees, it made it easier for terrorism to cross the borders from Somalia to Kenya. Small arms and light weapons proliferation is currently one of the most crucial external as well as internal security threat Kenya faces today. The existence of ethnic groups and conflicts spilling over across the border to Somalia as well as the constant flow of refugees, makes proliferation of small arms easier. Health insecurity is a major challenge for Kenyan people as well as the economic development of the country. Health and the countrys economy are positively correlated thus one directly affects the other. Piracy incidents have become more frequent in todays world. Somali pirates affect commerce that is taking place in that region which indirectly affects the economy of Kenya. International intervention failed to bring peace to Somalia. Terrorism arises from such instability affecting Kenyas national security. Joining with international help Kenya wishes to attain political stability in the region. Introduction This briefing paper examines Kenyas security strategy in terms of external and internal threats. It will analyse why Kenya has taken specific measures to tackle threats and challenges from Kenyas colonial period to present day. In terms of geopolitical factors, the Nile was and is a very important river. Britain wanted to capture and control the Nile in the 1800s, in order to increase trade. Additionally, they wanted to have control over Egypt, by capturing the source of the Nile, which helped sustain the country and then move on to control the Suez Canal. By doing so, the British would have full control over trade in the Middle East with Europe. Kenya was colonized from 1885 until 1964, when it gained its independence. Post-Independence Regional Influence The first decade after Kenya gained its independence, Somalia posed one of the biggest security threats. In 1992, after the overthrow of Siad Barre, the president of Somalia at the time, Somali refugees found shelter in Kenya as their country was a very unstable state, and this quickly started impacting Kenyas national security. Somalia was then ruled by jihadist militant group, Al Shabaab, and through the influx of refugees, it allowed terrorism to cross borders to Kenya with kidnappings and hijackings increasing rapidly. Terrorism is still one the most challenging and serious threats Kenya faces today. Another neighbouring country that posed a threat to Kenya was Uganda, in terms of external security. The rise of Idi Amin caused tensions between the two states, as the Ugandan president claimed a part of Kenya. To respond to this threat, Kenya improved its air force and build a stronger army in terms of number of soldiers enrolled. The tension between these two nations was a great challenge for Kenya and a threat it faced and still is today with the proliferation of small arms and the instability of a bordering country. Adding to that, South Sudan poses a great threat to Kenyas national security. In 2011, South Sudan, gained its independence, attention was brought to the Elemi triangle and countries in that region. This challenge was dealt with through peace talks to come to a common resolution in a diplomatic and civil manner, however, it could still pose a threat to regional security and impacting Kenya in the future, as different nations have different interests. Furthermore, internal conflicts in South Sudan also threaten Kenyas national security, as they could spill over and start spreading in other nations which would destabilize the region and its security. Post-Independence Social and Political Security In terms of social security Kenya, since independence, has faced problems with ethnicity influencing internal politics thus affecting the nations national security. These ethnic groups which lead to a divided nation have existed since Kenyas colonial era to post-colonial and even today remain an imminent threat to the security of the country. Kenya understood this challenge, thus included in its constitution, that the government should have a legal requirement in appointing a leader that will reflect and support ethnic diversity and not favour certain ethnic groups. Distinction was made between ethnic groups based on the land they owned, however this lead to ethnic conflicts for land ownership between different groups. Another difference that divided these ethnic groups was language which encouraged strong ethnic identities trying to prevail and ending up in conflicts. Adding to that, the effect that ethnicity had on Kenya, is that it divided the country into 42 different tribes which intensified internal ethnic conflicts that posed a security threat to Kenya before and even after independence and affect Kenyas economic development agenda. In terms of political security, Kenya was influenced largely from its colonizers.   The structure that they adopted into their political system was created by the British who colonized Kenya. However, the diversity of ethnic groups was embedded into politics with culture violence being the only tool Kenyans used to achieve their aim. There was no trust between different ethnic groups and thus leading to a more polarized political system with the risk of increasing cultural violence to resolve issues. Ethnic groups formed their own political parties to establish power to their own people. This lead to election violence, which is still one of the most important internal security challenged the nation faces today. Kenyas political system was and is still is divided between these ethnic groups which could potentially lead Kenya into a civil war which could simply be used as a political statement. After Kenya gained its independence the government of Kenya tried uniting the nation into thinking as a unity instead of being segregated into the 42 ethnic groups and tribes, hoping to put an end to political rivalry and focus on issues such as poverty and health security as one nation. Policies were formulated to achieve regional stability as well as continental unity to depolarize the world from the two superpowers at the time (USA vs. USSR). Kenya was always a neutral country during the time period 1960-1970 as it had a vision of a united Africa. The second decade after Kenya gained its independence, Somalia still posed a threat to the nation, as it continued receiving support from the Soviet Union. The end of the Cold War had a negative impact on Kenya as the US tried promoting democracy which led to a negative response by some Kenyan ethnic groups.   These rallies that took place to promote democracy, often resulted in violence. Economic Development To obtain economic security Kenya has to ensure that it has financial stability, access to resources and that its citizens have sufficient income. However, Kenya still suffers from high levels of unemployment, poverty, and segregation of different income classes. In terms of economic dominance, Kenya has seen its industries grow and help finance some of the projects Kenya envisioned in the Vision 2030, an ambitious plan Kenya wanted to implement by the year of 2030. The division of people in terms of wealth is very visible in Kenya. Poverty is at high rates which leads to unstable settlements and the rise of criminal behaviour, as people have to compete with each other for basic resources such as food and water. Reasons why the nation has failed to implement policies to reduce poverty and the wealth gap is poor budgeting and overestimating the nations capabilities. There is a lack of appropriate policy frameworks and personnel to carry out these policies. Kenya in recent times, has discovered oil, gas and other mineral resources which could potentially lead to an growth in the countrys economic development. Kenya has responded to these opportunities in a diplomatic and business like manner, already singing contracts with international oil companies for the exploration of its oil as well as training its own people in handling and exploring these sources themselves. However this puts Kenya in a difficult spot as the instability of its region could lead to radicalized groups wanting control of Kenyas oil. The nation wishes to create strategic and business relationships with big international companies in order to avoid these sources falling in the wrong hands. Internal Security Today Political  security and regional stability In terms of political security, with 42 different ethnic groups present in Kenya, Kenya is a divided nation with a lack of a national identity. Ethnic violence has been present in Kenya even before its independence. Even after the nation gained its independence, ethnic groups still divide and pose a challenge to Kenyas national security. Kenyas attempt at resolving this challenge was not successful and therefore Kenyas idea of addressing with the issue is through educating younger generations on how to think like Kenyans instead of following their ethnic prejudices. Kenya has constantly failed at resolving ethnicity and ethnic conflicts is still is a corrupted government. With the segregation of different ethnic groups, presidency is also in favor of the ethnicity of the party elected. In 2008 was the biggest political conflict Kenya has witness with the violence used a s a tool to displace members who were in power of specific ethnic groups. Keya created a legislation and made it a legal requirement to found political parties based on the persons religion or ethnicity and this was also used to prevent gender discrimination. All parties were required to follow a code of conduct. The nation has failed repeatedly as it has not yet resolved the issues with ethnicity and corruption. Corruption in Kenya weakens its agenda on economic development. These ethnic groups are not only present in Kenya but also in other neighbouring countries which makes it very difficult for the country to respond to such an imminent and large threat that it is facing as it is surrounded by unstable nations.. Health and Food Insecurities   Ã‚   Kenya has been struggling with health security for a long time. Incidences of malaria, HIV/AIDS, Tuberculosis and other diseases have affected, not only Kenyans but also national economic development. More of the nations funds are directed towards building a better health care system that would cater to everyone and could be afforded by everyone. This eventually leads to a slower economic growth for the country, which leads to lower incomes for certain groups of people and thus resulting in a higher percentage of poverty. Kenya focuses on education, health and poverty as key instruments in developing the country and creating this prosperous nation it has envisioned by 2030.

Wednesday, November 13, 2019

The Use of Immorality in Order to Achieve Popular Rule Essay -- essays

  Ã‚  Ã‚  Ã‚  Ã‚  Throughout The Prince and The Discourses of Livy, Niccolo Machiavelli demonstrates multiple theories and advocacies as to why popular rule is important to the success of a state. Popular rule is a term that will be used to define an indirect way to govern the people of a state. In order to rule the masses, a leader must please the people or revolts will occur, causing mayhem and a lack of stability in oneà ¢Ã¢â€š ¬Ã¢â€ž ¢s state. During both written works, Machiavelli stresses the importance of obedience and order needed for a state, and especially for a leader to be successful. Machiavelli thoroughly states that anything and everything must be done to keep the peace of the masses, even if acts of immorality are used. However, instead of advocating immorality, Machiavelli is saying that to serve the people and the state well, a ruler must not restrict himself to conventional standards of morality. His use of immoral tactics in leadership would appear to be unpopu lar; however the acts of immorality have limitations and are done solely to avoid displeasing the masses or creating disorder. Therefore it is acceptable to practice immorality if it is done only to a small number of constituents, if it is not repeated, and if it is performed to please and benefit the public. It is these limitations that prove Machiavelli is arguing that the use of immoral tactics, to rule the people and in turn be ruled by the people, is needed. He suggests that if the majority of the population is unhappy with a leader, that particular leaderà ¢Ã¢â€š ¬Ã¢â€ž ¢s rule would be in jeopardy, thus falling victim to popular rule.   Ã‚  Ã‚  Ã‚  Ã‚  The first justification for the use of immorality is that it is only practiced upon a small number of residents. Machiavelli summarizes that it is better for a ruler to be immoral to a few of his subjects and prevent disorder from spreading because disorder will damage the community as a whole more than it will damage a few individuals in isolated acts of immorality. The priority of the leader is to maintain order and act to prevent disorder because, à ¢Ã¢â€š ¬Ã…“the whole community suffers if there are riots, while to maintain order the ruler only has to execute one or two individualsà ¢Ã¢â€š ¬? (51). Citizens of a community would much rather live in a peaceful and orderly world which exemplifies how a ruler is actually a slave to the people. It... ...rder, brought unity and made the state as a whole law abiding and peaceful.   Ã‚  Ã‚  Ã‚  Ã‚  Overall Machiavellià ¢Ã¢â€š ¬Ã¢â€ž ¢s perspective does seem harsh and cold at times, but he proves to be an avid supporter of popular rule throughout his writings. He believes in popular rule so strongly that he states it is acceptable to use immoral means to achieve a peaceful government. If the citizens are not happy and feel their ruler disregards their wishes then the populace could become enraged and therefore, the ruler would not be executing his power of indirect popular rule. Machiavelli states that in order to achieve the necessity of popular rule, a leader will have to step outside a moral sphere and do whatever it takes to achieve popular rule. Machiavelli puts clear and strict limits on acts of immorality in leadership. The use of immorality is only acceptable in order to achieve overall good for a government. Engaging in immorality for the sake of popular rule is justified because it is done to serve the people and the state successfully. Works Cited Machiavelli. Selected Political Writings. Trans: David Wooton. Indianapolis: Hackett,   Ã‚  Ã‚  Ã‚  Ã‚  1994.

Monday, November 11, 2019

The Angel – Ted Hughes Poem Analysis

1) What is the poem about? My personal view is that Ted Hughes has attempted to interpret his inner feelings relating to the deaths of his two wives and mother in his writing. The poem is centred around Halifax and I think this is of relevance because Ted Hughes grew up in the town so will always be able to make a connection between the actual place, his family and his upbringing. I find it significant that Hughes was frequently accused of writing poetry which is unnecessarily violent as my opinion is that he was simply being a typically blunt Yorkshire man, describing visions as he sees them. I am aware that the understandings of meanings may vary from reader to reader, but from studying the poem I understand that Hughes is describing a vision of what he thought to be an angel over the Calder Valley landscape. I also think that Hughes may use his poetry as a method to display his emotions and guilt felt towards both of his wives committing suicide. Also you can read Analysis July at the Multiplex 2) How does the poet use language to convey the meaning, give examples of use of any figurative or metaphorical language? Hughes endeavours to use his poetry as a powerful way of reaching our feelings and emotions in a subconscious manner. In his position as a writer, Hughes attempts to help release our suppressed creative energies, and he believes that poetry is particularly effective for this purpose. Hughes technique involves using appropriate wording to influence the reader's imagination which results in the effect being a release of emotional energy. I don't think his language and structure of writing is necessarily easy to understand. My approach to this was to study the background of Hughes as a person, this helped me to appreciate his work and recognize the style in which Hughes aspires to create a vision. I have researched more of Hughes poetry and upon doing so, noticed and become aware of the fact that certain images recur in his work. In his poem The Angel, Hughes uses metaphors such as â€Å"it was a swan the size of a city!† this type of wording will attract the reader's attention with an element of surprise as a metaphor is a phrase or figure of speech in which a word or phrase that ordinarily designates one thing, is used to designate another. The result is it makes an implicit comparison. â€Å"Smoking Snow† is an oxymoron as two contradictory terms are combined. Realistically, it is not possible for snow to smoke but this is designed to add effect as it sounds quite dramatic. â€Å"Rippling its fringed edges† – Rippling is an onomatopoeia as is fluttered. Hughes uses these types of words to imitate the sounds associated with the objects or actions they refer to (such as fluttered referring to dress). â€Å"Glowed like the night-cloud over Sheffield† would be classed as a simile as it is making a comparison and using the word like. I find the wording â€Å"Strange square of Satin† to be alliteration as Hughes is repeating the consonants to result in the same types of sounds. My view is that Hughes has used the word â€Å"enigmatic† as a personification as it is giving a human attribute to an inanimate object (square of satin). 3) What senses is the poet using to convey his vision and meaning? I think Hughes mainly tries to illustrate his poem The Angel as a vision in which we can receive a vivid and quite clear picture in our heads of the events and images. I think this is particularly correct of the sentence â€Å"She was cast in burning metal† as I can actually envisage the sight of the angel surrounded by the hot, flaming metal. Part of Hughes piece also appeal to my touch senses such as â€Å"When I next saw that strange square of satin I reached out and touched it†. This comment made me think of the soft and silky feel of holding satin in my hand. When Hughes is quoting his vision of the words of advice spoken by his mother it appeals to the senses of sound. Read also  Case 302 July in Multiplex 4) Which pieces of the poem do you especially like and why? The first reason I favour the poem is because I am familiar with the towns he is referring to (Halifax and Sheffield) and I think it is important to comprehend the significance of his Yorkshire origins in order to understand his work. I am curious of the fact that there is often a darker side to Hughes poetry. I particularly enjoyed the section where Hughes was describing his vision of an angel and how it suddenly changed into an omen surrounded by burning metal as I receive a clear picture of the event in my imagination and I can almost feel the terror and panic that Hughes aspires to describe. I like the way that Hughes describes his experiences realistically and does not try to express himself in the traditional and romantic way for which other English poets are famous. I especially favoured The Angel as it arouses strong emotions and it is not a conventional piece. I have noticed that Hughes frequently does not conform to the conventions which society expects of him, and naturally this upsets people.

Saturday, November 9, 2019

Good to Be Back!

Good to Be Back! Good to Be Back! Good to Be Back! By Maeve Maddox Im sure no one noticed, but Ive been away from my desk for the past fortnight. Although I didnt touch a computer keyboard during that time, language was very much on my mind as I toured Sicily in the company of 15 other English-speakers. The countries represented among us were England (London and Yorkshire), Australia, South Africa, and the United States (New York, California, North Carolina, and Arkansas). The accents were splendidly varied, butthanks to standard grammar and vocabularycommunication was not a problem. On this first day back Id like to add a couple of postscripts to two of the articles that appeared while I was away. Principal Parts of the Verb to fit In this article I wrote that fit/fit/fitted are the principal parts of the verb in British usage. Reader Peter set me straight: Make that fit, fitted, (have) fitted. One of my English traveling companions said that fit might be heard as the simple past, but the occurence would be rare and it would sound very old-fashioned. You Too Can Sponsor A Word Thanks to everyone who pounced on the spelling in the Online Etymology Dictionary article. Although miniscule has its defenders, you wont find it in the OEtyD. Ive gone back and changed it to minuscule. One of the delights of my trip was the privilege of listening to the musical English of numerous Italian guides. My admiration for their linguistic skill is profound. Listening to them I became aware of some ESL traps that are probably worth a future post or two. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the General category, check our popular posts, or choose a related post below:Dialogue Dos and Don'ts20 Rules About Subject-Verb Agreement45 Idioms with "Roll"

Wednesday, November 6, 2019

Past Year Question Pad120 Essay Example

Past Year Question Pad120 Essay Example Past Year Question Pad120 Essay Past Year Question Pad120 Essay UNIVERSITI TEKNOLOGI MARA(UiTM) PAD 120: Introduction to Political Science PAST EXAMINATION QUESTION PAPERS (2007 – 2010) COURSE: INTRODUCTION TO POLITICAL SCIENCE COURSE CODE : PAD 120 EXAMINATION : OCTOBER 2010 TIME : 3 HOURS This question paper consists of two (2) parts. Part A (5 Questions) Part B (4 Questions) Answer ALL questions from Part A and any two (2) questions from Part B in the Answer Booklet. Start each answer on a new page. PART A QUESTION 1 a) Define Politics. (5 marks) b) Explain the relationship between economics and political science. 5 marks) QUESTION 2 Explain TWO(2) criticisms of the theory of separation of powers. (10 marks) QUESTION 3 Describe the theory of force. (10 marks) QUESTION 4 Explain the concept of constitutionalism . Provide examples to support your answer. (10 marks) QUESTION 5 Describe TWO(2) types of sovereignty. (10 marks) PART B QUESTION 1 Describe FOUR (4) disadvantages of democracy. (25 marks) QUESTION 2 Elaborate on TWO (2) types of law. (25 marks) QUESTION 3 Describe FOUR (4) elements of the State. (25 marks) QUESTION 4 Elaborate on FOUR (4) merits of a federal government. (25 marks) END OF QUESTION PAPER COURSE: INTRODUCTION TO POLITICAL SCIENCE COURSE CODE: PAD 120 EXAMINATION: APRIL 2010 TIME : 3 HOURS This question paper consists of two (2) parts: PART A (5 Questions) PART B (4 Questions) Answer ALL questions from Part A and any two (2) questions from PART B in the Answer Booklet. Start each answer on a new page. PART A QUESTION 1 Elaborate on any TWO (2) disadvantages of an unwritten constitution. (10 marks) QUESTION 2 Describe any TWO (2) features of Theory of Force. (10marks) QUESTION 3 Explain any TWO (2) concepts of constitutionalism. (10 marks) QUESTION 4 Explain custom and adjudication as TWO (2) important sources of law. (10 marks) QUESTION 5 Describe any TWO (2) types of autocracy. (10 marks) PART B QUESTION 1 Elaborate on any FOUR (4) methods to carry out research in political science. (25 marks) QUESTION 2 Elaborate on any TWO (2) merits and demerits of unitary government. (25 marks) QUESTION 3 Describe any FOUR (4) features of a presidential form of government. (25 marks) QUESTION 4 Elaborate on any FOUR (4) characteristics of sovereignty. (25 marks) END OF QUESTION PAPER COURSE: INTRODUCTION TO POLITICAL SCIENCE COURSE CODE: PAD 120 EXAMINATION: OCTOBER 2009 TIME : 3 HOURS This question paper consists of two (2) parts: PART A (5 Questions) PART B (4 Questions) Answer ALL questions from PART A and any two (2) questions from PART B in the Answer Booklet. Start each answer on a new page. PART A QUESTION 1 Explain any TWO (2) scopes of political science. (10 marks) QUESTION 2 Identify any Two (2) disciplines of social science that are interrelated with the study of political science. (10 marks) QUESTION 3 Explain any TWO (2) sources of power. (10 marks) QUESTION 4 Describe ONE (1) advantage and ONE (1) disadvantage of a written constitution. (10 marks) QUESTION 5 Elaborate on any TWO (2) elements that constitute a state. (10 marks) PART B QUESTION 1 Elaborate on any FOUR (4) sources of law. (25 marks) QUESTION 2 Elaborate on any TWO (2) merits and any TWO (2) demerits of democracy. (25 marks) QUESTION 3 Describe any FOUR (4) types of sovereignty. (25 marks) QUESTION 4 Elaborate on any FOUR (4) characteristics of a presidential form of government. (25 marks) COURSE: INTRODUCTION TO POLITICAL SCIENCE COURSE CODE: PAD 120 EXAMINATION: APRIL 2009 TIME : 3 HOURS This question paper consists of two(2) parts: PART A (5 Questions) PART B (4 Questions) Answer ALL questions from PART A and two (2) questions from PART B. PART A QUESTION 1 Describe any TWO (2) arguments to support the study of political science as a science. (10 marks) QUESTION 2 Describe any TWO (2) features of the Force Theory of the origin of state. (10 marks) QUESTION 3 Elaborate on any TWO (2) characteristics of law. (10 marks) QUESTION 4 Explain any Two (2) features of a good constitution. (10 marks) QUESTION 5 Elaborate on any TWO (2) types of sovereignty. (10 marks) PART B QUESTION 1 Discuss any FOUR (4) features of democracy. (25 marks) QUESTION 2 Elaborate on any FOUR (4) types of autocracy. (25 marks) QUESTION 3 Discuss any FOUR (4) features of the federal form of government. (25 marks) QUESTION 4 Elaborate on any FOUR (4) essential elements of the state. (25 marks) END OF QUESTION PAPER COURSE : INTRODUCTION TO POLITICAL SCIENCE COURSE CODE : PAD 120 EXAMINATION : OCTOBER 2008 TIME : 3 HOURS This question paper consists of two (2) parts: PART A (5 questions) PART B (4 questions) Answer ALL questions from PART A and two (2) questions from PART B. PART A QUESTION 1 Explain public administration and international relations as sub-fields of political science. (10 marks) QUESTION 2 Describe the meaning of popular sovereignty and legal sovereignty. (10 marks) QUESTION 3 Explain any TWO (2) features of a constitution. (10 marks) QUESTION 4 Power is a complex subject in political science. Elaborate on any TWO (2) sources of power. (10 marks) QUESTION 5 Describe population and government as the elements of the state. (10 marks) PART B QUESTION 1 Elaborate on FOUR (4) features of the unitary form of government. (25 marks) QUESTION 2 Discuss any FOUR (4) features of the Social Contract Theory of the origin of the state. (25 marks) QUESTION 3 Compare any FOUR (4) differences between unitary and federal forms of government. (25 marks) QUESTION 4 Law is made to regulate an individual’s and a group’s conduct. Explain any FOUR (4) sources of law. (25 marks) END OF QUESTION PAPER AM/APR 2008/PAD 120 UNIVERSITI TEKNOLOGI MARA COURSE : INTRODUCTION TO POLITICAL SCIENCE COURSE CODE: PAD120 EXAMINATION: APRIL 2008 TIME : 3 HOURS Answer ALL questions in PART A and TWO (2) questions from PART B. PART A QUESTION 1 Elaborate on any TWO (2) ways for a leader to obtain authority. (10 marks) QUESTION 2 Describe any TWO (2) characteristics of monarchy government. (10 marks) QUESTION 3 Elaborate on any TWO (2) features of the theory of Divine Rights in the origin of the state. (10 marks) QUESTION 4 Explain TWO (2) criticisms in the practice of the separation of powers. (10 marks) QUESTION 5 Describe ONE (1) advantage and ONE (1) disadvantage of a flexible constitution. (10 marks) PART B QUESTION 1 a) Define Political Science. (5 marks) b) Explain any FOUR (4) methods used by the political scientist in the study of political science. 20 marks) QUESTION 2 a) Define sovereignty. (5 marks) b) Differentiate with examples internal sovereignty from external sovereignty. (20 marks) QUESTION 3 a) Define government. (5 marks) b) Differentiate the practices of a parliamentary system from a presidential system. (20 marks) QUESTION 4 a) Define autocracy. (5 marks) b) Elaborate on any FOUR (4) forms of autocracy. (20 marks) END OF QUESTION PAPER AM/OCT 2007/PAD 120 _____________________________________________________________________________________ UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION _____________________________________________________________________________________ COURSE : INTRODUCTION TO POLITICAL SCIENCE COURSE CODE : PAD 120 EXAMINATION : OCTOBER 2007 TIME : 3 HOURS INSTRUCTIONS TO CANDIDATES 1. This question paper consists of two (2) parts. PART A (5 Questions) PART B (4 Questions) 2. Answer ALL questions from PART A and Two questions from PART B. 3. Answer to each question must be written in the Answer Booklet. Start each answer on a new page. 4. Do not bring any material into the examination room unless permission is given by the invigilator. 5. Please check to make sure that this examination pack consists of : i) the Question Paper ii) an answer Booklet provided by the Faculty. PART A ANSWER ALL QUESTIONS QUESTION 1 Explain any TWO (2) benefits of the study of Political Science to a student. (10 marks) QUESTION 2 The study of Political Science can be considered as a science. Identify any TWO (2) arguments to support the statement. (10 marks) QUESTION 3 Explain any TWO (2) ways for a government to achieve legitimacy. (10 marks) QUESTION 4 Discuss any TWO (2) functions of the state. (10 marks) QUESTION 5 Explain any TWO (2) features of evolutionary or historical theory on the origin of state. (10 marks) PART B ANSWER TWO (2) QUESTIONS ONLY. QUESTION 1 Elaborate on any FOUR (4) types of law. (25 marks) QUESTION 2 Describe any FOUR (4) methods of establishing a constitution. 25 marks) QUESTION 3 Elaborate on FOUR (4) differences between unitary and federal forms of government. (25 marks) QUESTION 4 Discuss FOUR (4) weaknesses of democracy. (25 marks) END OF QUESTION PAPER UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION COURSE : INTRODUCTION TO POLITICAL SCIENCE COURSE CODE : PAD 120 EXAMINATION : APRIL 2007 TIME : 3 HOURS INSTRUCTIONS TO CANDIDATES 1. This question paper consists of TWO (2) parts. PA RT A ( 5 Questions) PART B ( 4 Questions). 2. Answer ALL questions from PART A and TWO (2) questions from PART B. 3. Answers to all questions must be written in the Answer Booklet. Start each answer on a new page. 4. Do not bring any material into the examination room unless permission is given by the invigilator. 5. Please check to make sure that this examination pack consists of: i) the Question Paper ii) an Answer Booklet provided by the Faculty _________________________________________________ AM/APR 2007/PAD120 PART A ANSWER ALL QUESTIONS. QUESTION 1 Describe any two (2) methods used by researchers in the field of political science. (10 marks) QUESTION 2 Explain briefly two (2) rationale of separation of powers. 10 marks) QUESTION 3 Elaborate on two (2) ways in which a government obtains authority. (10 marks) QUESTION 4 Elaborate on two (2) types of constitution. (10 marks) QUESTION 5 Describe two (2) types of democracy. (10 marks) PART B Answer any TWO (2) of the following: QUESTION 1 Explain any TWO (2) advantages and TWO (2) disadvantages of parliamentary government. (25 marks) QUESTION 2 Explain FOUR (4) characteristics of sovereignty. (25 marks) QUESTION 3 Describe FOUR (4) essential elements of a State. (25 marks) QUESTION 4 Elaborate on FOUR (4) sources of law. (25 marks) END OF QUESTION PAPER

Monday, November 4, 2019

Procedures in the Physical Sciences Essay Example | Topics and Well Written Essays - 1000 words

Procedures in the Physical Sciences - Essay Example Measurement is a very important parameter in the field of physical sciences. Different methods of measurements have used to determine various aspects of the physical environment. Units precede every kind of measurement. They help in giving a description of the physical quantity in question hence enhancing comparison. The three major quantities in physics include length measured in meters, time measured in seconds and mass that is measured in kilograms. The Metric system of measurement has been adopted in most of the countries of the world while the British System of measurement, famous for use inches, miles, and pounds among others has a minimal use in the world despite its ubiquitous use the United States of America. Despite the technological progress experienced in the world today, several challenges are encountered in the measurement of the physical environment. Every measurement made has an associated error that should be recognized whenever a quantity is measured. This error has a numerical value that tries to correct the quality of the estimation done through measurement. Furthermore, it can be in form of a standard uncertainty, whereby the error has a standard figure or a coverage interval whose figure will have a given range of values. However, efforts have been made in trying to minimize these uncertainties. The International Organisation for Standardisation (ISO) has developed â€Å"The Guide to the expression of Uncertainty in Measurement† to help in enacting a common approach to the errors encountered in measurement. In astronomical sciences, it is difficult to use direct measurement calling for indirect measurement strategies. A unique method utilised by the astronomers is the parallax method. This method involves observation of the position of heavenly bodies at different times. They consider factors such as the precise location of the body, the time, the diameter of the earth’s orbit, the angle of viewing to elucidate the distance f rom the earth the heavenly body is located. Geometry is a key science in the calculations since the process involves analysing angles and distances to obtain an unknown distance (Finkelstein 2009). Such distances are unverifiable hence the exact distance especially for heavenly bodies to the sun cannot be determined in precision. Another major setback in measurement is lack of coherence in the communication of measurements. In quantum mechanics, disparities occur because of non-compliance with the recent regulations but instead trusting the predefined and pretested strategies. Space and time are aspects that have depicted some major measurement differences because of their reconstruction from observable quantities. This has created massive measurement challenges in quantum mechanics (Gambini and Pullin, 2012). According to the duo, there occur instances when the quantum state of the machine cannot be differentiated from the statistical components throughout the measurements made. Th is dimension of thought predicts the possibility of other errors in the measurement of a physical system. Technology has influenced the way measurements are done in a great way. The advancement in the computing methods has revolutionised the way measurement of physical elements is made. It has become apparent that most of the measuring instruments have been digitised or they have a

Saturday, November 2, 2019

The Group Project Essay Example | Topics and Well Written Essays - 1500 words

The Group Project - Essay Example polycentric strategy and the geocentric strategy (Tiwari 2013); the ethnocentric strategy entails applying the parent company’s HR practices in the host countries while the polycentric strategy involves recruiting local staff and adopting the host nation’s HR practices (Reiche 2006). Contrariwise, the geocentric strategy entails simply paying attention on the skills of the employees and adopting the best HR practices that serve the MNCs purposes, regardless of their nationality. Given that all these HR selection and recruitment strategies have their unique pros and cons, MNCs often make a choice, on which one to use based on numerous considerations (Banai & Sama 2000); these include the nature of businesses they engage in, their organizational strategy, and leadership structure, in addition to their previous experiences. The company that applies the polycentric strategy in the selection and promotion of its international human resources usually goes by the assumption that every country is unique from all the others and its foreign subsidiaries must adapt practices that are locally appropriate to every market through the direction and supervision of local managers. The Atlanta-based soft drink giant Coca Cola has managed to build both a global organization and a multi-local enterprise whose internationalization strategy entails adapting to local needs, laws and cultures through polycentric policies. The company has a global presence in more than 200 countrie s and in all its global subsidiaries, the company strives to employ as many local nationals as possible because it considers the HCNs to be more suitable to the home markets (Anfuso 1994). Traditionally, the polycentric approach to the selection and promotion of employees in the management of international subsidiaries entails low costs of recruitment and training (Tiwari 2013). Similarly, the polycentric approach is mired with lesser adjustment and communication challenges, primarily because all the

Thursday, October 31, 2019

Do cell phones cause cancer Review the science about the potential Essay

Do cell phones cause cancer Review the science about the potential hazard to human health - Essay Example hildren and adults, and the actuality that these phones emit radio- frequency waves, researchers and health specialists have raised concern about the safety of cellular phone utilization. With regard to cancer, the focus is on whether the users of cell phones are more prone to the risk of brain tumors and other tumors in the neck and head area. The radio frequency waves from cell phone are given off through the antenna. The nearer the cell phone is held to the head, the closer the antenna and a greater exposure to radio frequency energy of the person using the cell phone. A number of factors affect the quantity of radio frequency waves absorbed by the brain, including: total time the person spends on phone, as different phones emit different amount of waves therefore the model of phone being used, how close the phone is held to the head, and the amount of cell phones a specific area at the time. Public health specialists and researchers throughout the world are busy in vigorous discussions concerning whether radiation from the cell phones lead to brain cancer or not. The early studies of short term cell phone use did not find any evidence for augmented risk of brain cancer, but the studies conducted for long-term cell phone utilization, have instituted a greater risk of developing two types of brain cancers on the ipsilateral side, that is, the side of brain on which the mobile phone is mostly held. The two types of cancers are: A multinational case-control study was developed by the International Agency for Research on Cancer (IARC), in the late 1990s. It was named â€Å"INTERPHONE† and its purpose was to attend to rising public concerns about the safety of cell phones which were becoming very strong. The objective of the INTERPHONE case study was to look into and determine whether the radio frequency radiations which are emitted by the cell phones are carcinogenic. Thirteen countries were participants of this project and the study took place from year 2000 to

Tuesday, October 29, 2019

Concussions in football Essay Example for Free

Concussions in football Essay Injuries in professional sports are always occurring, but in football the risk of injury is much higher considering it is a contact sport. Although One of Americas most precious pastimes; American Football is the most dangerous sport because of the risk of concussions. Concussions in football have been a major concern though the years especially in recent years and the seriousness of this particular injury must be bought to the attention of not only the players, but to the media and professional leagues . Advancements in technology and health protocols have brought attention to the actual severity of concussions in football. Many NFL players that have had a concussion, or multiple concussions, not only struggle when they return to the field, but also struggle with normal aspects of their lives. The relevance of concussions has risen so far as of late, that former NFL players who previously suffered from concussions have gotten together to sue the NFL for improper information and protocol when they suffered their concussions. The concern of concussions has risen to a point where people have debated whether football should be banned altogether. The risk of concussions in football is very high compared to other sports. The constant contact and trauma that the head takes from being hit can sometimes lead to a concussion, but they are usually sustained through one powerful hit to the head. â€Å"The impact of one player running into another has almost twice the strength then one person running into a standing, or placed individual† (Onion). This would prove noteworthy for the kickoff or punt return aspect of football. During these situations the opposing teams are running full speed toward each other, and the ball carrier is usually the one who is at the most risk for concussion. The discussion of removing kickoffs and punts has been a major topic of discussion because of these facts. There are also different levels of concussions. â€Å"A minor concussion or grade one concussion may involve being dazed, head ringing, a minor headache, and a very brief loss of consciousness. A more severe concussion such as a grade 2 concussion may cause being blacked out, confusion, a pounding headache, and blurred vision. The most server concussion or grade 3 concussion may cause being blacked out, nausea or vomiting, loss of short term memory, and saying the same thing over and over†(Swierzewski). The most dangerous symptoms occur when a player is cleared to play before he has fully recovered from their concussion. When an athlete is cleared to play before he has fully recovered that is when death can occur. Retired players that have played professional football at some time in their life who sustained concussions have also had many problems in their retirement. One of these many retired players include former defensive lineman George Visger who frequently has memory loss or severe headaches. Visger said that he believes that he â€Å"accumulated close to hundreds if not thousands of concussions throughout his football playing career, some documented, some not† (Smith). Some problems that occur from concussions could end up being more life threatening then Visgers symptoms. â€Å"The suicides of former Chicago Bears Defensive end Dave Duerson and Owen Thomas, a University of Pennsylvania defensive end, have shown that the severity of concussions can psychologically destroy a person† (Compton). These symptoms that Visger, Duerson, and Thomas have or had experienced have happened to many other retired football players as well, which shows that this is very common among concussion recipients. Visger was also one of more than four thousand former NFL players who filed a seven hundred and seventy five million dollar lawsuit against the NFL for lack of information of concussions, and neglecting of the severity of concussions (Farrar). This settlement was reached and the money was granted to the players, but the fact is that these men must live with consequences that they received when they played the game of football. Not only is everyday life a struggle for these gentlemen, but the risks that they took can sometimes lead to their untimely death. Although most athletes are aware of concussions, not everyone is aware of the long lasting effects of them which are up to coaches and staff to explain. â€Å"The obligation of an employer to provide its employees with a safe workplace free from recognized hazards is well established. In the absence of specific standards for an industry, an employer is required under OSHAs general duty clause to provide its employees with a workplace free from recognized hazards which cause or are likely to cause death or serious physical harm†(Holmquist). In this case the employee is the athlete and the employers would be the football team’s staff and coaches. It is up to them to explain the long term consequences to these players, and enforce the safety protocol that must happen if they ever obtain a concussion. By doing this, the player is more informed of the risks of injury and the steps they have to take to either change the way they play, or simply don’t play the game at all. Equipment is also a major factor in dealing with concussions. The regulation helmet used in the NFL has gone through rigorous changes to keep concussions to a limit, but there is only so much you can do to prevent a concussion. â€Å"What helmets do not do well is significantly slow down the contents of the skull when the head is struck and moved suddenly† (Compton). The design of a helmet is made to prevent skull fractures not to prevent the fast impact of a hit to the head. Although technology will probably continue to improve the quality of helmets in football, the brute force of a hit to the head can probably never be covered up by any sort of helmet. The discussion of banning football due to the high risk of concussions has been a topic of debate also. Although it is ultimately the decision of someone to do what they want, they might not know the full consequences of what they’re getting into. It is important to educate athletes on the full on risks of concussions and how serious they really. If the overall topic of concussions can be explained to athletes, then football can be that much safer.

Sunday, October 27, 2019

Geophysical Methods Used In Groundwater Exploration

Geophysical Methods Used In Groundwater Exploration The role of geophysical methods in Groundwater Exploration is imperative. Its chief aim is to understand the hidden subsurface hydrogeological setting correctly and effectively. As the base of any geophysical methods is the contrast between the physical properties such as the features, objects, and layers and the surroundings. Parker et al, (2009) indicated that object are only confirmed when the contrast is sufficiently large enough to change the geophysical signal depicting the anomaly as an alien feature of the subsurface i.e., different physical and/or chemical properties than the surroundings in which it is located. They also indicated that geophysical method does not only characterise the subsurface but also spot inhomogeneous features or target that are not characteristics of the surrounding host material in water, water-covered, soil or sediments. Thus the better the contrast or anomaly, the better would be geophysical response and hence the identification. So, the efficiency of any geophysical techniques lies in its ability to sense and resolve the hidden subsurface hydrogeological heterogeneities or disparity. For groundwater exploration a cautious appliance or combination of techniques is most vital to become successful in exploration, technologically as well as cost-effectively. It is undeniably conceptualized that groundwater cannot be detected directly by any one of the geophysical methods and therefore the interpretation is appropriate and a broad understanding of the subsurface hydrogeological condition or setting is a must. Hubbard S.S et al., (2000), Ugur Yaramanci et al., (2002) and Ramke L. Van Dam (2010) emphasizes the use of two or more complementary geophysical methods to enhance data interpretation. With multiple collocations of geophysical data available, excellent results will be produced with significantly better interpretations than when with a single method. Conventional geophysical methods have often been used to map the geometry of aquifers such as seismic, electrical and electromagnetic methods (Wattanasen et al (2008)). These methods have been used to determined and estimate locations, transmission properties, storage and the aquifer materials despite the ambiguity of the interpreted results due to limitation in each method and the site dependence. But with the improvements in instruments, the development of better methods as resulted in a widening of its applications. Surface Electrical Resistivity The primary purpose of resistivity method is to determine the subsurface resistivity distributions by making measurements on the ground surface. There by measuring the potential difference on the surface due to the current flow within the ground. From this measurement the true resistivity of the subsurface can be estimated. The mechanism responsible for the fluid flow and electric current and conduction in porous media according to P.M Soupious et al., 2007, are generally governed by the same physical parameters and lithological attributes, thus the hydraulic and electric conductivities are dependents on each other, while H.S. Salem et al., 1999, indicated that electric-current conduction is affected by various mechanisms in a saturated systems and can be represented by a two-phase model (grain-matrix conductance) known as dispersed phase, and pore-fluid conductance also known as continuous phase. The two-phase model can further be developed into a five-phase model, consisting of sur face conductance occurring at the charged fluid-solid interface, ion-exchange conductance, Maxwellian-effects conductance of both solids in the matrix and those suspended in the pore fluid, grain-matrix conductance and pore fluid conductance. The electrical conduction in the subsurface is mainly electrolytic because most minerals grains are insulators, therefore, the conduction of electricity is through the interstitial water/ or fluids in the pores and fissures. These pore space and fissure of rocks are filled by groundwater which is a natural electrolyte. The factors responsible for the flow and conduction of electrical resistivity in soil and rocks are extremely variable and can vary by several orders of magnitude. These factors according to Loke, 1999 are porosity, degree of water saturation and concentration of dissolved solids, O.A.L. de Lima et al., 2000; tortuosity and porosity, P.M Soupious et al., 2007; lithology, mineralogy, size, shape, packing and orientation of mineral grains, shape and geometry of pores and pore channels, permeability, compaction, magnitude of porosity, consolidation and cementation and depth and water distribution. The resistivity of sedimentary rocks, which are usually more porous, with high water content is highly variable with low resistivity and depends on its formation factor. Formation factor is a very powerful tool in resistivity surveys as it allows pore fluid resistivity to be calculated directly from bulk earth resistivity measurements. This relationship can also be used to convert earth resistivity contours in to fluid conductivity or TDS contours. Bulk resistivity of the ground is measured from direct current resistivity and it obeys an empirical law within an aquifer. This was first proposed by Archie (1942) and the relationship may be expressed as: à Ã‚  = a à Ã¢â‚¬ ¢- m S- n à Ã‚ f Where à Ã¢â‚¬ ¢ is the porosity of the rock formation, S is the degree of saturation, a, m, and n are constants that depend upon the formation, à Ã‚ f is the resistivity of pore fluid. Archies Law shows that bulk resistivity à Ã‚  of fully saturated formation of a granular medium containing no clay depends significantly on the resistivity of the pore fluid à Ã‚ f. This is mainly as a result of the resistivity of the fluid much lower than that of the solid grains in the matrix. Given that, matrix conduction is negligible and the electric current passes almost entirely through the fluid phase, thus making resistivity methods much more important for hydrological studies. (S.R Wilson et al., 2006). Archies law can thus be expressed as: à Ã‚  = a à Ã¢â‚¬ ¢- m à Ã‚ f, assuming that at saturation, S is1. where à Ã‚  is the bulk resistivity, à Ã‚ f is the fluid resistivity, à Ã¢â‚¬ ¢ is the porosity of the medium, m is known as the cementation factor and a, the tortuosity factor, cementation intercept, lithology factor or lithology coefficients is associated with the medium and its value in many cases departs from the commonly assumed value of one. It is meant to correct for variation in compaction, pore structure and grain size. According to H.S. Salem 1999, the cementation factor of Archie;s equation has specific effects on electric conduction processes in porous media and exhibits extensive disparities from sample to sample, formation to formation, interval to interval in the same medium and from medium to medium. Because of its dependence on various properties, m has been referred to as cementation factor, shape factor, conductivity factor, porosity exponent, resistivity factor, and cementation exponent. The dependence of m on the degree of cementation is not as strong as its dependence on the grain and pore properties (shape and type of grains, and shape and size of pores and pore throats). Therefore it is more appropriate to describe m as shape factor instead of cementation factor. Resstivity survey has been used for a number of geological purposes. S. Srinivas Gowd, 2004, J.O. Oseji, 2006, A.G. Batte et al., 2010, used surface electrical resistivity surveys to delineate groundwater potentials, A. Samouelian et al.,2005, used electrical resistivity survey in soil, S.R. Wilson et al., for saline interface definition, M. Arshad et al., 2006, for lithology and groundwater quality determination, A. Turesson, 2006, for water content and porosity estimations. S.R Wilson, et al, (2006) applied earth resistivity methods in defining saline interface in Te Horo on the Kapiti Coast in New Zealand. They used vertical electric sounding (VES) and direct current resistivity traversing which has been mostly successful in defining subsurface areas of higher salinity by providing a two-dimensional image of the bulk resistivity structure. A VES technique has been used most frequently to locate the extent of saline interface using the Schlumberger array geometry. It shows variation in bulk resistivity with distance from the coast and this could be related to the degree of saline mixing but fails to give in depth picture of both the location or structure of the saline interface. However, with the location of the estimated saline interface known, resistivity traversing can be used to improve its location and shape. They result clearly show the potential of resistivity traversing in mapping and in understanding the structure and progression of saline interface in coastal aquifers. Even though VES data may resolve one-dimensional resistivity structure beneath a sounding location, any two- dimensional interpretation of the data requires interpolation between discrete measurements. In contrast, resistivity traversing data provide continuous two-dimensional image of both lateral and vertical variations in resistivity. The important contrast in the electrical resistivity of saline and fresh water allows direct imaging of a sharp saline interface. However, they used formation factor to interpret resistivity data from a much wider area. The formation factor for an aquifer is defined from Archies Law with an assumption that at saturation S is 1, as F =p/pf=aà Ã¢â‚¬ ¢-m Sharma et al (2005), carried out an integrated electrical and very low frequency (VLF) electromagnetic surveys to delineate groundwater- bearing zones in hard rock areas of Purulia districts, west Bangal, in India for the construction of deep tube-wells for large amounts of water. The location of potential fractures zones in hard rock areas to yield large amounts of groundwater is very difficult and therefore cannot be easily done using one approach. Hence groundwater potential of any location in hard rock areas requires several approaches, geophysical as well as hydrogeological techniques to increase groundwater yield. Electrical and electromagnetic geophysical methods have been extensively used in the search for groundwater as a result of good correlation between electrical properties, fluid content and geology. Groundwater in hard rock areas is normally found in cracks and fractures and therefore the yield depends on the interconnectivity and size of the fractures. The combined use of DC resistivity soundings, SP measurement, Wenner profiling and VLF electromagnetic were used to map the fractures in hard rock areas. VES method was used to determined resistivity variations with depth but cannot be performed everywhere without the priori information. The VLF was successful in mapping resistivity contrast in boundaries of fractures with high degrees of connectivity and also as a result of their high resistivity they have been proved to yield a higher depth of penetration in hard rock areas. Additionally, VLF data is useful in determining suitable strike direction to perform resistivity sounding i.e. parallel to strike and thus improving the chances of success. Resistivity profiling and SP measurement also give important information about the presence of a conductivity fracture and groundwater movement. They concluded that VLF measurement only give indications of the presence of conductive zone but cannot differentiate between deep and shallow sources. Hence, it is essential to follow the location of these VLF anomalies with a technique that investigate the depth of these conductive sources. Consequently, the Schlumberger sounding technique was proved to be effective in determining resistivity variation with depth. A review on the use of electrical resistivity survey as applied to soil was carried out by Samoulian et al, (2005) to re-examine the basic concept of the method and the different types of arrays devices used (one-, two- and three-dimensional arrays), the sensitivity of electrical measurements to soil properties which includes the degree of water saturation i.e. water content, arrangement of voids such as porosity and pore size distribution connectivity and the nature of the solid constituents such as particle size distribution and mineralogy and the main advantages and limitations of the method. They review indicated that electrical resistivity is non-destructive and can make available continuous measurements over a large scope of areas as compared to the conventional soil science measurements and observation which disturb the soil by random and or regular drilling and sampling. As a result of these temporal variables such as water and plant nutriment, depending on the internal structure can be monitored and quantified without changing the soil structure. Thus the application is numerous which includes; determination of soil horizonation and specific heterogeneities, follow-up of the transport phenomena and the monitoring of solute plume contamination in a saline or waste context. However, they suggested that electrical measurements do not give straight access to soil characteristics that is of interest to the agronomist and therefore preliminary laboratory calibration and qualitative or quantitative data interpretations must be carried out in order to connect the electrical measurements with the soil characteristics and function. Direct and indirect method of groundwater investigation was carried out in southern Sweden using magnetic resonance sounding (MRS) and vertical electrical sounding (VES) by Wattanasen et al, (2008). The aim of the survey was to compare MRS with VES and other geophysical methods. The MRS results were consistent with VES. It is a successful tool in groundwater exploration particularly in an area of sedimentary rocks of high magnitude of earth magnetic field. A good quality data was obtained as a result of low ambience noise, low variation in the earth magnetic field and high level of MRS signal. The MRS was effective in determining the depth to water layers, water content and their thickness. It can also detect water in areas with high conductive clay layer that is close to the surface, a factor that limits the penetration depth of other geophysical methods like GPR. Hydraulic properties are essential parameters in hydrogeology for accurate modelling of groundwater flow and rate of movement of contaminant or pollution. These properties; hydraulic conductivity, transmissivity and storage coefficient are used to describe and quantify the capacity of the materials composing aquifers and confining units to transmit and store water. The hydraulic conductivity and storage coefficients (storativity) are aquifer properties that may vary spatially because of geologic heterogeneity. Traditionally, pumping test or laboratory techniques when core samples are available have been used to determine the aquifer hydraulic parameters. These methods have been proved to be invasive and expensive and provide information only in the vicinity of the boreholes and the sample locations. The application of geophysical techniques could be seen as a means of providing important complementary information that might help to reduce the costs of hydrogeological investigations. Aristodemou et al., (1999) and Soupious et al., (2007) also applied surface geophysical techniques to determine the hydraulic conductivity values using both Kozeny-Carman-Bear equation and the Worthington equation. According to Worthington equation: Fa=Fi .(1 + BQvà Ã‚ w)- 1 (1) where, Fa is the apparent formation factor, Fi is the intrinsic formation factor and the BQv term is related to the effects of surface conductance, mainly due to clay particles. In case surface conductance effects are non-existent, the apparent formation factor becomes equal to the intrinsic one. Thus, 1/Fa= 1/Fi +( BQv/Fi)à Ã‚ w (2) Where 1/Fa, is the intercept of the straight line and BQv/Fi represents gradient. Thus, by plotting 1/Fa versus fluid resistivity à Ã‚ w, we should in principle, obtain a value for the intrinsic formation factor, which will subsequently enable us to estimate porosity from the formula à Ã‚ o = a à Ã‚ w à Ã¢â‚¬ ¢- m where à Ã‚ o is the bulk resistivity, à Ã‚ w is the fluid resistivity, à Ã¢â‚¬ ¢ is the porosity of the medium and m is the cementation factor, although it is also interpreted as grain-shape or pore-shape factor; the coefficient of a is associated with the medium and its value in many cases departs from the commonly assumed value of one. The apparent formation factor Fa =à Ã‚ o/à Ã‚ w, where à Ã‚ o is the bulk resistivity obtained from the resistivity inversion and à Ã‚ w is the fluid electrical resistivity obtained from the borehole. These porosities were subsequently used to estimate the hydraulic conductivity through the Kozeny-Carman-Bear equation. K = ( ÃŽÂ ´wg / ÃŽÂ ¼) . (d2 /180) . [ (à Ã¢â‚¬ ¢3 / (1 à Ã¢â‚¬ ¢2 ) ] Where d is the grain size, ÃŽÂ ´w is the fluid density, and ÃŽÂ ¼ is the dynamic viscosity. Andreas Hordt et al., (2006) and Andrew Binley et al., (2005) used spectra induced polarization to determine the hydraulic conductivity. There work was focussed on laboratory experiments in order to establish a semi- empirical relationship between complex electrical resistivity and hydraulic parameters and then applied the field technique to evaluate the feasibility of the method. Thus the hydraulic conductivity, k was then calculated from the Kozeny- Carman equation based on formation factor and inner surface area. K = 1/ F(Spor)c, The exponent c is an adjustable parameter. Complex electrical conductivity was used as a convenient means of hydrogeological applications; à Ã†â€™ = à ¢Ã¢â‚¬ Ã¢â‚¬Å¡ à Ã†â€™Ãƒ ¢Ã¢â‚¬ Ã¢â‚¬Å¡eià Ã¢â‚¬ ¢ = à Ã†â€™ + ià Ã†â€™ Where à Ã†â€™ and à Ã†â€™ denote real and imaginary part, and à ¢Ã¢â‚¬ Ã¢â‚¬Å¡Ãƒ Ã†â€™Ãƒ ¢Ã¢â‚¬ Ã¢â‚¬Å¡ and à Ã¢â‚¬ ¢ denote magnitude and phase, of the conductivity à Ã†â€™. Formation factor was calculated from the equation: F = à Ã†â€™ w/ Re(à Ã†â€™) Im (à Ã†â€™)/l where à Ã†â€™w is the pore fluid conductivity. The factor l is the ratio between imaginary and real part of the surface conductivity. The pore space- internal surface area, Spor is an empirically derived equation from laboratory. Anita Turesson (2006), applied ground- penetrating radar and resistivity independently to evaluate their capability to assess water content and porosity for saturated zone in a sandy section, since dielectric and the resistivity of rocks and sediments are very much dependent on moisture content. Archies empirical formula was used in the resistivity method to determine the relationship between resistivity and porosity (Andrew Binley et al., 2005) in the sedimentary clay free rocks based on the formation factor, which is the ratio of resistivity of the porous media to that of the pore fluid. The results obtained shows good agreement between the two methods in the saturated zone and they use of the independent methods greatly strengthen the results. Another subsurface geophysical techniques is the Induced Polarization (IP) technique which over the past years has been used successfully for mineral exploration by providing in situ information about rock mineralogy mainly disseminated ores and mineral discrimination. More recently the method has been applied in the field of environment and engineering studies to materials which do not contain conductive minerals but rather clay minerals for the mapping of polluted land areas, movement of contaminants and grain size distribution parameters in unconsolidated sediments (E. Aristodemou et al.,(2000); Andreas Hordt et al., 2006, 2007)). In theory, induced polarization is a dimensionless quantity whereas in practice it is  measured as a change in voltage with time or frequency. The time and frequency IP  methods are fundamentally similar, however, they differ in a way of considering and  measuring electrical waveforms. In the former, a direct current is applied into the  ground, and what is recorded is the decay of voltage between two potential electrodes  after the cut off of the current (time-domain method). In the latter, the variation  of apparent resistivity of the ground with the frequency of the applied current is  determined (frequency-domain method). In another type of frequency method, which is called Complex Resistivity (CR) method, a current at frequency range (0.001 Hz to 10 kHz) is injected in the ground and the amplitude of voltage as well as its phase with respect to the current is measured. That is a phase-angle IP measurement. Various studies have been carried out most recently to establish an empirical relationship between hydraulic properties and induced polarisation measurements, though only limited number of studies exists so far at a field scale. The reason for this is that hydraulic properties depend on both porosity and geometry of the pore space. Induced polarisation (IP), is the only geophysical methods that depends on surface characterisation and has been used in hydrology as the possible link to hydraulic properties. (Binley et al., (2005)). Semi-emperical relationships between IP and hydraulic properties have been extensively investigated. Andreas Hordt et al., (2007), estimated hydraulic conductivity from induced polarisation using multi-channel surface IP measurement over a sand/gravel aquifer at Krauthausen. Despite carrying out measurement over a broad frequency range called spectra IP, the hydraulic conductivity analysis was restricted to single frequency data based on the Borner model and Slater and Lesme model. They however, used two different approaches to determine the hydraulic conductivities from the IP results. The first approach is the Bà ¶rner method refered to as the constant-phase angle (CPA), where real and imaginary parts of complex electrical conductivity was sufficient to estimate the hydraulic conductivity from the Kozeny-Carman type equation; k=1/F(Spor)c, based on two parameters; the formation factor and the pore-space related internal surface area, Spor which was empirically derived from laborat ory measurements . The second approach suggested by Slater and Lesme was based on an empirical relationship between k and the imaginary part of conductivity at 1 Hz without using the real part and/or the formation factor: K=m/(b)n. This was based on the argument that hydraulic conductivity primarily depends on the specific inner surface. Andrew Binley et al. 2005, worked on the relationship between spectra induced polarisation and hydraulic properties of saturated and unsaturated sandstone. They tried to observe the spectra IP response of samples taken from the UK sandstone aquifer and compared the measured parameters with the physical and hydraulic properties. There result shows that the mean relaxation time, Æ ¬, is a more suitable measure of IP response for these sediments, with a significant inverse correlation existing between the surface area to pore volume ratio and the Æ ¬, suggesting that Æ ¬ is a measure of a characteristic hydraulic length scale. This was supported by a strong positive correlation between log K and log Æ ¬. There results revealed significant impact of saturation on the measured spectra, thus limiting the applicability of hydraulic-electric models in utilizing the SIP measurements. However, in contrast, they suggested new opportunities for development of physically b ased models linking unsaturated hydraulic characteristics with spectra IP data. The resistivity method was used to solve more problems of groundwater in the types alluvium, karstic and another hard formation aquifer as an inexpensive and useful method. Some uses of this method in groundwater are: determination of depth, thickness and boundary of an aquifer (Zohdy, 1969; and Young et al. 1998), determination of interface saline water and fresh water (El-Waheidi, 1992; Yechieli, 2000; and Choudhury et al., 2001), porosity of aquifer (Jackson et al., 1978), water content in aquifer (Kessels Induced Polarization Fundamentals The induced polarization (IP) method is an electrical geophysical technique, which measures the  slow decay of voltage in the subsurface following the cessation of an excitation current pulse. Basically, an electrical current is imparted into the subsurface, as in the electrical resistivity  method explained elsewhere in this chapter. Water in the subsurface geologic material (within  pores and fissures) allows for certain geologic material to show an effect called induced polarization  when an electrical current is applied. During the application of the electrical current, electrochemical  reactions within the subsurface material takes place and electrical energy is stored. After  the electrical current is turned off the stored electrical energy is discharged which results in a  current flow within the subsurface material. The IP instruments then measure the current flow.   Thus, in a sense, the subsurface material acts as a large electrical capacitor. The induced polarization method measures the bulk electrical characteristics of geologic units;  these characteristics are related to the mineralogy, geochemistry and grain size of the subsurface  materials through which electrical current passes. Induced polarization measurements are taken together with electrical resistivity measurements  using specialized IP instruments. Although the IP method historically has been used in mining  exploration to detect disseminated sulfide deposits, it has also been used successfully in ground  water studies to map clay and silt layers which serve as confining units separating unconsolidated  sediment aquifers. Advantages Induced polarization data can be collected during an electrical resistivity survey, providing the  proper equipment is used. The addition of IP data to a resistivity investigation improves the  resolution of the analysis of resistivity data in three ways: 1) some of the ambiguities encountered  in resolving thin stratigraphic layers while modeling electrical resistivity data can be reduced by  analysis of IP data; 2) IP data can be used to distinguish geologic layers which do not respond well  to an electrical resistivity survey; and 3) the measurement of another physical property (electrical  chargeability) can be used to enhance a hydrogeologic interpretation, such as discriminating  equally electrically conductive targets such as saline, electrolytic or metallic-ion contaminant plumes from clay layers. Limitations The induced polarization method is more susceptible to sources of cultural interference (metal  fences, pipelines, power lines, electrical machinery and so on) than the electrical resistivity method. Also, induced polarization equipment requires more power than resistivity-alone equipment   this translates into heavier and bulkier field instruments. The cost of an IP system can be  much greater than a resistivity-alone system. This, plus an added amount of complexity in the  interpretation of the IP data and the expertise needed to analyze and interpret this data may exceed  the resources of some contractors and consultants. Induced polarization fieldwork tends to be labor intensive and often requires two to three crew  members. Like electrical resistivity surveys, induced polarization surveys require a fairly large  area, far removed from power lines and grounded metallic structures such as metal fences, pipelines  and railroad tracks. Instrumentation Induced polarization instruments are similar to electrical resistivity instruments. There are two  different types of induced polarization systems. Probably the most common type of IP instrument  is the time-domain system. This instrument transmits a constant electrical current pulse during  which time the received voltage is sampled for an electrical resistivity measurement, acting like a  conventional electrical resistivity system. The electrical current is then shut off abruptly by the  system, and after a specified time delay (several milliseconds) the decaying voltage in the subsurface  is sampled at the IP receiver, averaging over one or more time windows or time gates. The  units of measurement are in millivolt-seconds per volt. The second type of IP instrument is the frequency-domain system. In this type of system,  transmitted current is sinusoidal at a specified frequency. Since the system is always on, only an  electrical resistivity measurement can be collected at a particular frequency. To collect induced  polarization data, two frequencies are used, and a percent change is apparent electrical resistivity  from measurements collected at the two frequencies is calculated. This number is called the  percent frequency effect or PFE, and the units are dimensionless in percent. Two frequencies  commonly used are 0.3 and 3.0 Hertz, representing low and high frequency responses, respectively. Other types of Induced polarization may be encountered, although not commonly in environmental  applications. These include spectral induced polarization, complex resistivity, and phase  systems. A detailed description of these systems is beyond the scope of this chapter and the reader  is advised to consult the literature for an extensive discussion of these systems. Electrical resistivity surveying is an active geophysical technique that involves applying an electrical current to the earth and measuring the subsequent electrical response at the ground surface in order to determine physical properties of subsurface materials. The general principle of resistivity testing is that dissimilar subsurface materials can be identified by the differences in their respective electrical potentials. Differences in electrical potentials of materials are determined by the application of a known amount of electric current to these materials and the measurement of the induced voltage potentials. Ohms law states that the voltage (V) of an electric circuit is equal to the electric current (I) times the resistivity (R) of the medium (V-IR). Resistivity surveys are conducted by: 1) applying a known amount of electric current (I) to the earth; 2) measuring the induced voltage (V) ; and, using these two measurements, 3) determining the resistivity (R) of the volume of earth being surveyed. Resistivity methods usually require that both current inducing and measurement electrodes to be pushed or driven into the ground. With connecting wires from the instruments to the electrodes, electrical current is introduced into the ground using the current electrodes and resistivity measurements are performed using different measurement electrode configurations and spacings. There are a number of standardized testing procedures, some of which are described in detail in this section. Resistivity surveys identify geoelectric layers rather than geologic ones. A geoelectric layer is a layer that exhibits a similar electric resistivity response. A geoelectric layer can, but does not always, correspond to a geologic one. For example, an isotropic homogeneous sand, which is saturated with a fluid exhibiting a single conductivity response, will appear to be a single geoelectric layer. The same sand, if filled with fluid layers containing different conductivities, (i.e., salinities) will appear to be more than one geoelectric layer. The interpretation of resistivity data is therefore best made in conjunction with other geophysical techniques (i.e., seismic refraction) or conventional subsurface investigations (i.e., soil borings Historically, it was the use of galvanic measurement systems that gave rise to the IP method which  demonstrated its high efficiency in resistivity surveys for mineral prospecting and structural applications. Induced polarization is a complex phenomenon controlled by many  physical and physicochemical reactions associated with passage  of current through rocks. The Induced Polarization method of geophysical exploration is something of a rarity. It is the only new geophysical method to come into use in over fift