.

Monday, September 30, 2019

Vehicle Tracking System

Baburao Kodavati, V. K. Raju, S. Srinivasa Rao, A. V. Prabu, T. Appa Rao, Dr. Y. V. Narayana/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 1, Issue 3, pp. 616-625 GSM AND GPS BASED VEHICLE LOCATION AND TRACKING SYSTEM 1 Baburao Kodavati, 2 V. K. Raju, 3S. Srinivasa Rao, 4A. V. Prabu, 5T. Appa Rao, 6 Dr. Y. V. Narayana 1. Asst. Prof in ECE Dept, 2. Asso. Prof in ECE Dept 3. HOD of ECE Dept 4. Lecturar in AE&IE Dept,5.. Asst. Prof in EE Dept. 6. Principal 1,2,&4,5- Gandhi Institute Of Engg & Technology , Gunupur,Rayagada,Orissa-765022,India 3. IACREC,rayagada,Orissa. . TEC, Jonnalagadda(P), Narasaraopet-522601, Guntur(Dist), A. P. ABSTRACT: A vehicle tracking system combines the installation of an electronic device in a vehicle, or fleet of vehicles, with purpose-designed computer software to enable the owner or a third party to track the vehicle's location, collecting data in the process. Modern vehicle tracking systems co mmonly use Global Positioning System (GPS) technology for locating the vehicle, but other types of automatic vehicle location technology can also be used. Vehicle information can be viewed on electronic maps via the Internet or specialized software.In the main they are easy to steal, and the average motorist has very little knowledge of what it is all about. To avoid this kind of steal we are going to implement a system it provides more security to the vehicle. Existing System: In the previous system security lock and alarm is implemented in a car. If a burglar can break open the lock, then it becomes easy for the burglar to steal the car. And in old security system if the car is stolen then it is out of the owner control. User doesn’t have any awareness about the current location of the vehicle.The Proposed System: The RF transmitter is attached with the vehicle which has its own identification. This data will be continuously transmitted to the RF receiver connected to the m icrocontroller. This GPS will be location the position of vehicle and transmit that data to the microcontroller. Suppose the RF receiver not receiving signal from the transmitting unit, receiver unit send the signal to the microcontroller, from that we can identify the theft. If the vehicle is theft it automatically sends location of the vehicle to its owner as a SMS through GSM modem.This will be a much simpler and low cost technique compared to others. If a password like SMS is sent by the owner, it automatically stops the vehicle Keywords: Global Positioning System (GPS), RF receiver and transmitter, operations and maintenance center (OMC) and Gaussian minimum shift keying (GMSK). 1. INTRODUCTION: GSM and GPS based vehicle location and tracking system will provide effective, real time vehicle location, mapping and reporting this information value and adds by improving the level of service provided.A GPS-based vehicle tracking system will inform where your vehicle is and where it has been, how long it has been. The system uses geographic position and time information from the Global Positioning Satellites. The system has an â€Å"OnBoard Module† which resides in the vehicle to be tracked and a â€Å"Base Station† that monitors data from the various vehicles. The On-Board module consists of GPs receiver, a GSM modem www. ijera. com 616 | P a g e Baburao Kodavati, V. K. Raju, S. Srinivasa Rao, A. V. Prabu, T. Appa Rao, Dr. Y. V. Narayana/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. jera. com Vol. 1, Issue 3, pp. 616-625 1. 1 Vehicle Tracking System: A vehicle tracking system combines the installation of an electronic device in a vehicle, or fleet of vehicles, with purposedesigned computer software at least at one operational base to enable the owner or a third party to track the vehicle's location, collecting data in the process from the field and deliver it to the base of operation. Modern vehicle tracking systems commonly use GPS or GLONASS technology for locating the vehicle, but other types of automatic vehicle location technology can also be used.Vehicle information can be viewed on electronic maps via the Internet or specialized software. Vehicle tracking systems are also popular in consumer vehicles as a theft prevention and retrieval device. Police can simply follow the signal emitted by the tracking system and locate the stolen vehicle. When used as a security system, a Vehicle Tracking System may serve as either an addition to or replacement for a traditional Car alarm. Some vehicle tracking systems make it possible to control vehicle remotely, including block doors or engine in case of emergency.The existence of vehicle tracking device then can be used to reduce the insurance cost. 1. 2 GSM Overview: Special Mobile), Global System for Mobile is the world's most Fig 1. GSM Modem Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM is the name of a standardization group established in 1982 to create a common European mobile telephone standard that would formulate specifications for a pan-European mobile cellular radio system operating at 900 MHz. A GSM modem is a wireless modem that works with a GSM wireless network.A wireless modem behaves like a dial-up modem. The main difference between them is that a dial-up modem 2. GSM MODEM: 1. 3 GPS Overview: The Global Positioning System (GPS) is a space-based global navigation satellite system (GNSS) that provides reliable location and time information in all weather and at all times and anywhere on or near the Earth when and where there is an unobstructed line of sight to four or more GPS satellites. It is maintained by the United States government and is freely accessible by anyone with a GPS receiver.The GPS project was started in 1973 to overcome the limitations of previous navigation systems, integrating ideas from several predecessor s, including a number of classified engineering design studies from the 1960s. GPS was created and realized by the U. S. Department of Defense (USDOD) and was originally run with 24 satellites. It became fully operational in 1994. both consumers, who may benefit from the ability to roam and switch carriers without replacing phones, and also to network operators, who can choose equipment from many GSM equipment vendors. Communications or GSM (originally from Groupe opular standard for mobile telephone systems. The GSM Association estimates that 80% of the global mobile market uses the standard. [1] GSM is used by over 1. 5 billion people [2] across more than 212 countries and territories. [3] This ubiquity means that subscribers can use their phones throughout the world, enabled by international roaming arrangements between mobile network operators. GSM differs from its predecessor technologies in that both signaling and speech channels are digital, and thus GSM is considered a secon d generation (2G) mobile phone system. The GSM standard has been an advantage to www. jera. com 617 | P a g e Baburao Kodavati, V. K. Raju, S. Srinivasa Rao, A. V. Prabu, T. Appa Rao, Dr. Y. V. Narayana/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 1, Issue 3, pp. 616-625 sends and receives data through a fixed telephone line while a wireless modem sends and receives data through radio waves. The working of GSM modem is based on commands, the commands always start with AT (which means ATtention) and finish with a character. For example, the dialing command is ATD; ATD3314629080; here the dialing command ends with semicolon.The AT commands are given to the GSM modem with the help of PC or controller. The GSM modem is serially interfaced with the controller with the help of MAX 232.. 2. 1 Circuit Diagram: GSM system. To achieve the basic definition of a new system a meeting was held in 1982 under the auspices of the Confer ence of European Posts and Telegraphs (CEPT). They formed a study group called the Groupe Special Mobile ( GSM ) to study and develop a pan-European public land mobile system. Several basic criteria that the new cellular technology would have to meet were set down for the new GSM system to meet.These included: good subjective speech quality, low terminal and service cost, support for international roaming, ability to support handheld terminals, support for range of new services and facilities, spectral efficiency, and finally ISDN compatibility. With the levels of under-capacity being projected for the analogue systems, this gave a real sense of urgency to the GSM development. Although decisions about the exact nature of the cellular technology were not taken at an early stage, all parties involved had been working toward a digital system. This decision was finally made in February 1987. This gave a variety of advantages.Greater levels of spectral efficiency could be gained, and in addition to this the use of digital circuitry would allow for higher levels of integration in the circuitry. This in turn would result in cheaper handsets with more features. Nevertheless Fig 2. GSM Modem Circuit Diagram significant hurdles still needed to be overcome. For example, many of the methods for encoding the speech within a sufficiently narrow bandwidth needed to be developed, and this posed a significant risk to the project. Nevertheless the GSM system had been started. Global usage:Originally GSM had been planned as a European system.However the first indication that the success of GSM was spreading further a field occurred when the Australian network provider, Telstra signed the GSM Memorandum of Understanding. New approaches: Neither of these approaches proved to be the long-term solution as cellular technology needed to be more efficient. With the experience gained from the NMT system, showing that it was possible to develop a system across national boundaries, and wi th the political situation in Europe lending itself to international cooperation it was decided to develop a new Pan-European System.Furthermore it was realized that economies of scale would bring significant benefits. This was the beginnings of the www. ijera. com 618 | P a g e Baburao Kodavati, V. K. Raju, S. Srinivasa Rao, A. V. Prabu, T. Appa Rao, Dr. Y. V. Narayana/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 1, Issue 3, pp. 616-625 Frequencies:Originally it had been intended that GSM would operate on frequencies in the 900 MHz cellular band. In September 1993, the British operator Mercury One-to-One launched a network.Termed DCS 1800 it operated at frequencies in a new 1800 MHz band. By adopting new frequencies new operators and further competition was introduced into the market apart from allowing additional spectrum to be used and further increasing the overall capacity. This trend was followed in many countries , and soon the term DCS 1800 was dropped in favour of calling it GSM as it was purely the same cellular technology but operating on a different frequency band. In view of the higher frequency used the distances the signals travelled was slightly shorter but this was ompensated for by additional base stations. In the USA as well a portion of spectrum at 1900 MHz was allocated for cellular usage in 1994. The licensing body, the FCC, did not legislate which technology should be used, and accordingly this enabled GSM to gain a foothold in the US market. This system was known as PCS 1900 (Personal Communication System) Fig 3. GSM Network Elements The operations and maintenance center (OMC) is connected to all equipment in the switching system GSM provides recommendations, not and to the BSC. The implementation of OMC is called the operation and support system (OSS).The OSS is the functional entity from which the network operator monitors and controls the system. The purpose of OSS is to offer the customer cost-effective support for centralized, regional, and local operational and maintenance activities that are required for a GSM network. An important function of OSS is to provide a network overview and support the maintenance activities of different operation and maintenance organizations. requirements. The GSM specifications define the functions and interface requirements in detail but do not address the hardware.The reason for this is to limit the designers as little as possible but still to make it possible for the operators to buy equipment from different suppliers. The GSM network is divided into three major systems: the switching system (SS), the base station system (BSS), and the operation and support system (OSS). 3. THE GSM NETWORK: www. ijera. com 619 | P a g e Baburao Kodavati, V. K. Raju, S. Srinivasa Rao, A. V. Prabu, T. Appa Rao, Dr. Y. V. Narayana/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 1, Issue 3, pp. 16-625 SPECIFICATIONS AND CHARACTERISTICS FOR GSM The specifications and characteristics for GSM ? frequency band—The frequency range specified for GSM is 1,850 to 1,990 MHz (mobile station to base station). ? duplex distance—The duplex distance is 80 MHz. Duplex distance is the distance between the uplink and downlink frequencies. A channel has two frequencies, 80 MHz apart. ? channel separation—The separation between adjacent carrier frequencies. In GSM, this is 200 kHz. ? modulation—Modulation is the process of sending a signal by changing the characteristics of a carrier frequency.This is done in GSM via Gaussian minimum shift keying (GMSK). ? transmission rate—GSM is a digital system with an over-the-air bit rate of 270 kbps. ? is used to send the position (Latitude and Longitude) of the vehicle from a remote place. The GPS modem will continuously give the data i. e. the latitude and longitude indicating the position of t he vehicle. The GPS modem gives many parameters as the output, but only the NMEA data coming out is read and displayed on to the LCD. The same data is sent to the mobile at the other end from where the position of the vehicle is demanded.An EEPROM is used to store the mobile number. The hardware interfaces to microcontroller are LCD display, GSM modem and GPS Receiver. The design uses RS-232 protocol modems for serial communication between the and the microcontroller. A serial driver IC is used for converting TTL voltage levels to RS-232 voltage levels. In the main they are easy to steal, and the average motorist has very little knowledge of what it is all about. To avoid this kind of steal we are going to implement this project which provides more security to the vehicle.When the request by user is sent to the number at the modem, the system automatically sends a return reply to that mobile indicating the position of RESULT 4. 1 GSM AND GPS BASED VECHICLE LOCATION AND TRACKING SYST EM Description Present project is designed using 8051 microcontroller in this Project it is proposed to design an embedded system which is used for tracking and positioning of any vehicle by using Global Positioning System (GPS) and Global system for mobile communication (GSM). the vehicle in terms of latitude and longitude from this information we can track our vehicles. 4. APPLICATIONS AND ADVANTAGES 4. . APPLICATIONS ? ? ? Stolen vehicle recovery . Field sevice management. It is used for food delivery and car rental companies. 4. 2 ADVANTAGES: In this project AT89S52 microcontroller is used for interfacing to various hardware peripherals. The current design is an embedded application, which will continuously monitor a moving Vehicle and report the status of the Vehicle on demand. For doing so an AT89S52 microcontroller is interfaced serially to a GSM Modem and GPS Receiver. A GSM modem ? From the remote place we can access the system. ? It provides more security than other system . www. ijera. om 620 | P a g e Baburao Kodavati, V. K. Raju, S. Srinivasa Rao, A. V. Prabu, T. Appa Rao, Dr. Y. V. Narayana/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 1, Issue 3, pp. 616-625 ? By this we can position the vehicle in exact place. [8] Youjing Cui and Shuzhi Sam Ge,†Autonomous vehicle positioning with GPS in urban canyon environments†, IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, vol. 19, NO. 1, pp 15-25, February 2003. BOOKS REFFERED Adler, R. B. , A. C. Smith, and R. L. Longani: â€Å"Introduction to Semiconductor Physics,† vol. , p. 78, Semiconductor Electronics Education Comitee, John Wiley & Sons, Inc. , New York ,1964. ? Jacob Millman Christos C. Halkias. : â€Å"Electronic Devices And Circuits†, Tata McGraw-Hill Publishing Company Ltd. Sep, 2003. ? Schade, O. H. : â€Å"Analysis of Rectifier Operation†, proc. IRE, vol. 31, pp. 341-361, July, 1943. ? Stout, M. B. : â€Å"Analysis of Rectifier Circuits†, Elec. Eng. , vol. 54, September, 1935. ? The 8051 Microcontroller and Embedded Systems using Assembly and C by Muhammad Ali Mazidi, Janice Gillispie, Rolin D. Mckinlay. ? Wireless communication and netwoking – JonW.Mark and Weihua Zhqung,PHI,2005. ? â€Å"Power Electronics† by M D Singh and K B Khanchandan ? â€Å"Linear Integrated Circuits† by D Roy Choudary & Shail Jain WEBSITES: ? http://en. wikipedia. org/wiki/Sevensegment_display ? http://www. gsm-modem. de/ ? http://www. datasheetsite. com/datasheet/MA X232 ? http://www. rentron. com/rf_remote_control. h tm ? http://www. atmel. com/dyn/resources/prod_d ocuments/doc0401. pdf APPENDIX: SOURCE CODE MAIN SOURCE CODE ? 5. CONCLUSION AND FUTURE SCOPE Vehicle tracking system is becoming increasingly important in large cities and it is more secured than other systems.Now a days vehicle thefting is rapidly increasing , with this we can have a good control in it. The veh icle can be turned off by only with a simple SMS. Since, now a days the cost of the vehicles are increasing they will not step back to offord it. This setup can be made more interactive by adding a display to show some basic information about the vehicle and also add emergency numbers which can be used in case of emergency. Upgrading this setup is very easy which makes it open to future requirements without the need of rebuilding everything from scratch, which also makes it more efficient.JOURNALS REFFERED: [1] MarkoWolf, AndreWeimerskirch, and ThomasWollinger, â€Å"State of the Art: Embedding security in vehicles†, Journal on Embedded Systems, Volume 2007, Article ID 74706. [2] J. -P. Hubaux, S. C Apkun, and J. Luo, â€Å"The security and privacy of smart vehicles,† IEEE Security & Privacy Magazine, vol. 2, no. 3, pp. 49–55, 2004. [3] Alison Brown, JacobGriesbach and Bruce Bockius, â€Å"GPS traking location based service using wrist watch GeoZigBee Sensorsâ € , Proceddings of ION NTM, 2007, Som Diego, pp 1-10, December 2007. [4] W. Stallings, â€Å"Cryptography and Network Security†, Prentice-Hall, Englewood Cliffs, NJ, USA, 4th edition, 2005. 5] Ingrid Verbourwhede, Frank Hoornaert, Joos Vandewalle, Hugo J. Deman â€Å"Security and performance optimization of a new DES†, IEEE Journal on Solid State ciruits, vol. 23, no. 3, pp 647656, 1999. [6] National Institute of Standards & Technology, â€Å"FIPS-46-3: Data Encryption Standard (DES),† October 1977, reaffirmed in October 1999. [7] Sinpyo Hong, Man Hyung Lee, Sun Hong Kwon, and Ho Hwan Chun, â€Å"A Car test for the estimation of GPS/INS alignment errors†, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 5, NO. 3, pp 208-218, SEPTEMBER 2004. #include #include†SERIAL. c† #include†LCD. † sbit rf=P2^0; sbit relay=P0^1; sbit motor=P0^0; unsigned char asc,ok[2],r[4],a,n[15],e[15],i,oxoa, a,m[20],j,temp[10],temp1[10]; void cmdwrt_lcd(unsigned char cmd); void serial_transmit(unsigned char *srstr); void command(unsigned char d[]); void serial_tx(unsigned char srda); www. ijera. com 621 | P a g e Baburao Kodavati, V. K. Raju, S. Srinivasa Rao, A. V. Prabu, T. Appa Rao, Dr. Y. V. Narayana/ International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 1, Issue 3, pp. 616-625 void delay1(); void gps() { do { do { oxoa = serial_rx(); }while(oxoa ! = 0x0A); for(i=0;i

Sunday, September 29, 2019

Advantages of Chemical and Biological Weapons Essay

Chemical and Biological Weapons are Your FriendsAs we go on our daily lives, terrorists are buying and developing dangerous and hazardous biological and chemical weapons to obliterate us. They do not care who they harm; their mission is to cause terror, to spread chaos, to engulf the world in anarchy. They want to know that they are making people terminally ill and sick. They will be enjoying a job well done while your skin is covered with excruciating painful blisters, or while you tell your loved ones that everything will be fine when there will clearly be a fatal result. Chemical and biological warfare has been around for many centuries. This type of warfare is not new. The Chinese, Greeks, and indigenous groups from South America used it. Whether it was arrows tipped with toxins, or the catapulting bacteria infested bodies, or the burning of toxic chemicals, each had its own deadly way of taking out the enemy. (Solomon 5-6) The U.S. should not stop developing biological and chemical weapons. Chemical and Biological warfare is most useful for taking out enemy personnel behind enemy lines. Al Mauronis book, Chemical and Biological Warfare, states, The larger artillery projectiles [] might use mustard, VX, or thickened GD to contaminate areas behind enemy forces, threatening their ability to resupply or to reinforce a particular sector (108). It is an inexpensive way to eliminate foes compared to sending in an army battalion and risk losing human lives. The biggest benefit from using biochemical weapons, as opposed to sending in persons to do the attacking, is that you can be far away from the danger of combat, and thereby limit exposure to your own troops. The biochemical strike can be executed from either a long-range cruise missile or you can have a stealth bomber deliver it to the exact point where the enemy is situated. This way the U.S. military have less casualties and losses. To further understand how to protect ourselves, we must develop these weapons and test them. There is no way of knowing when a terrorist cell in hiding is planning an attack so we must be prepared with full comprehension of these destructive weapons. How are we supposed to defend ourselves without any knowledge whatsoever of these weapons? We must not only protect ourselves  with precautionary weapons and plans but we must also arm ourselves with knowledge of these weapons. The U.S. must develop, research, and execute defensive plans so we can be safe. There are countries that will use these weapons, but they are also fearful of those weapons being used against them. That is why it crucial for the U.S. to have these weapons at hand. You can prevent a war and make a nation surrender with just the threat of launching a biochemical strike. Saddam Hussein stalled the US for a total of six months from invading Iraq by just mentioning that the country was willing to use biochemical weapons if the U.S. tried to invade. This is called brinkmanship. Just having biochemical weapons is like having a temporary shield that protects against invasion from an opposing country. Countries are fearful of brinkmanship and usually one country will back down for fear of total annihilation- annihilation, a reality that our generation must now try in order to do everything in our power to prevent it from happening. One may think that these weapons of mass destruction will only cause, well destruction, but what people dont know is that they have already done some good. Smallpox has been eradicated because it was proven to be extremely deadly in weapons tests and so it was practically wiped out. It now exists only in two heavily guarded facilities in Russia and the United States. They are not to be destroyed because these weapons of mass destruction may be useful in developing vaccines, antiviral drugs, and diagnostic tests. Bibliography: Mauroni, Al. Chemical and Biological Warfare. Contemporary World Issue. California: Santa Ana, 2003Solomon, Brian, ed. Chemical and Biological Warfare. New York: Dublin, 1999. Stone, J.D.. Free Republic 10/8/2008 .

Saturday, September 28, 2019

Battle Analysis for Bull Run

The battle itself was fought on July 21st, 1861, though the Union Army began executing its movements to Virginia almost a week prior. The Civil War divided the states in simple terms of a Union north and a Confederate south, with a couple undecided states in the middle. The President of the Union was Abraham Lincoln and the Confederate President was Jefferson Davis. Months prior to Bull Run President Lincoln had appointed Brigadier General Irwin McDowell to command the Army of Northeastern Virginia. McDowell was a Mexican-American War veteran and West Point graduate. The commander of the Confederate Army of the Potomac was Brigadier General P. G. T. Beauregard, who was dubbed â€Å"The Hero of Sumter. † He was also commended for valor in the Mexican-American war and like McDowell, a graduate of West Point. The two were classmates at one point. Only months after the start of the war at Fort Sumter, the Northern public pressed to march and capture the Confederate capital of Richmond, Virginia, which could bring an early end to the war. Against his better judgment, BG McDowell yielded to the political pressure and on July 16, 1861, the general departed Washington with the largest field army yet gathered on the North American continent. The Confederates found themselves at a disadvantage in mass initially, and BG McDowell wanted to keep that advantage. He ordered Union MG Robert Pattersons Army to engage BG Joseph Johnstons Army in the Shenandoah Valley, about 50 miles northwest of Manassas. The Union objective was to overwhelm the Confederate forces with a distraction flank attack to the right and a swift surprise flank to the left. With the reinforcements choked off, BG McDowell’s ambitious plan would put his Army in the Confederate capital by the end of the day. The Confederates, however, had been planning to attack the Union left, and if the attack had gone as planned it might have led to a clockwise rotation of the forces. Hundreds of excited spectators in horse-drawn carriages flocked from Washington D. C. to Manassas to watch what they thought to be a speedy Union Army defeat the Confederacy. Both the spectators and the Union Army would leave Bull Run in a hectic retreat back to Washington D. C. Each force had two Armies, one to the east and one to the west. For the Union, BG McDowell commanded the 36,000 Army of Northeastern Virginia Union troops in the east. MG Patterson commanded the 18,000 troops in the west. Within BG McDowell’s Army of five divisions there were several elements that consisted of: The 11th, 13th, 14th, 38th, and 69th New York, the 3rd, 4th, and 5th Maine, the 1st Minnesota, the 5th and 11th Massachusetts, the 1st Michigan, the 1st Vermont, the 2nd Wisconsin, with Griffin and Ricketts Artillery Brigades. BG Beauregard’s Confederate Army of the Potomac consisted of 21,000 troops in the east. BG Johnston’s four Brigades of 12,800 troops were in the Shenandoah Valley to the west and were critical reinforcements. BG Beauregard’s force of six Brigades consisted of: The 2nd, 4th, 5th, 8th, 18th, 27th, 33rd, and 49th Virginia, the Hampton Legion, the 6th North Carolina, the 7th Georgia, the 4th Alabama, Stuart’s Calvary, Elzey Regiment, Early Regiment, and the 7th and 8th South Carolina. The weapon technology used was fairly similar for both sides. Both the Union and Confederate Army relied on simple single-shot Pattern 1853 Enfield Muskets for their infantrymen. The revolvers used by the Union were mainly the new Colt Army Model 1860, and the Confederates preferred the older Colt 1851 Navy Revolver. A variety of bayonets were also an integral part of the infantrymans gear. Typically, these were socket or ring bayonets, intended to be attached to the end of the musket or rifle, and not wielded separately like a knife. The Confederate Calvary would also employ a Sabre, which was a long, lightweight single-edged slashing sword. Field Artillery also played an important role for both sides. The Union used 10-30 pound Parrott Rifles, 12 pound Napoleon smoothbores, 12 pound Howitzers, and 13 pound James Rifles. The Confederates had 6 pound guns, 6 pound rifles, 12 pound Howitzer, 10 pound Parrott Rifles, and 6 pound Cadet Guns. Both Generals had planned offensives. Much of the intelligence was concentrated on reporting the mass of the opposing forces rather than each other’s strategy. BG McDowell wanted a concentrated attack on the Confederate left flank, while BG Beauregard had planned to strike the Union left flank. From Washington D. C. the Union troops had marched southwest into Virginia, and it was at Centreville on July 20th, that BG McDowell decided to rest his weary, overheated troops and concentrate his forces. The same day, BG Johnston’s troops to the west in the Shenandoah Valley received word of the Union advances and they immediate slipped away to reinforce BG Beauregard. He never met MG Patterson’s forces. An hour after BG Johnston’s departure, MG Patterson wired BG McDowell saying he had managed to keep BG Johnston’s Army in the Shenandoah. Shortly after entering Centreville on the 20th, BG Tyler would disobey his orders and send his troops to attack the Confederate front along Bull Run. The attack was easily repulsed. With the Confederate troops dug in across the bank of Bull Run, and the majority of BG Beauregard’s force were behind them. The Union troops marched from Centreville at 0230 on July 21st. BG Tyler was ordered to initiate a diversion to the northwest at Stony Bridge at 0600. The diversion was quickly crushed by COL Evan’s Confederate forces and the feign fails. At 0830 the bayonets of McDowell’s flanking troops were spotted by one of COL Evan’s soldiers and he was warned of the Union plan to flank him. BG McDowell’s troops continued on to the left down bad roads, which would destroy his timeframe to ford Bull Run at Sudley Springs. COL Heinzelman’s Union division also missed the trail at Poplar Ford, and they were forced to stack up behind COL Hunter’s division also fording at Sudley Springs, further downstream. They arrived there at 0930, hours behind schedule.

Friday, September 27, 2019

Marks and Spencer Essay Example | Topics and Well Written Essays - 1000 words

Marks and Spencer - Essay Example Strengths of Marks and Spencer, primarily is their assets. Many of their outlets are purchased when land inside metropolitan areas was not at a premium; as a result the value of these outlets has skyrocketed. Secondarily one of our key strengths is their image (also a weakness that I shall arrive at later) and their brand name, St.Michael. Finally their last identifiable strength is their market share (currently static at 13%) [5]. Their Weaknesses are, as mentioned already, the image and brand name. This is mainly because their target market is split into a number of segments, the most easily identifiable being: School Clothes; pre-teens; teens - 30; 30's - 40's; 50+. This diverse coverage means that they lack the Marketing Economies of Scale with which to target and cater for each of these specifically. In addition to this there is a certain amount of product association that occurs, in the same way Lexus is attached to Toyota, they can't shake the image of a post-war retailer from the minds of the younger people that they're targeting. Opportunities are present in their ability to reshape the firm. With the main segments of the market identified I believe positive steps could be taken to capitalize on this discovery [5]. They can use this information to re-brand certain areas to make them more focused on the individual segments rather than trying to nurture a "One product suits all" ethos. They cultivate a new strategy that makes us more individual. Threats to them still remain the use of Marketing Economies by our competitors. There is no way they can get these simply because of the range that our products are targeting. Other weaknesses include their recent bad press regarding treatment of suppliers which is magnified by their previously thought reliability as a top retailer [1]. The stock marketis a threat to them, mainly because their falling share price leads to less people being interested in purchasing our shares. Chapter 3: Factors Affecting Decision Making: 3.1 The threat of entry: Economies of scale e.g. the benefits associated with bulk purchasing. The high or low cost of entry, e.g. how much will it cost for the latest technology Ease of access to distribution channels e.g. Do our competitors have the distribution channels sewn up Cost advantages not related to the size of the company e.g. personal contacts or knowledge that larger companies do not own or learning curve effects. Will competitors retaliate Government action e.g. will new laws be introduced that will weaken our competitive position How important is differentiation This desensitises the influence of the environment. All they above questions are determinants for a competitor or a new firm to enter the market. Marks and Spencer is constantly bombarded with newer brands which are more consumers specific and focused. People perceive Marks and Spencer as being 'behind the times' and so they have to bring their image in line with the 21st Century in order to win back the customers they have lost to the likes of Gap, Next and USC. According to recent customer surveys, people believe that Marks and Spencer have no specific market. People have commented on the fact that they cannot identify with the store because Marks and Spencer

Thursday, September 26, 2019

Evolutionists and Creationists fight over Genesis.. Explain why Term Paper

Evolutionists and Creationists fight over Genesis.. Explain why neither is correct - Term Paper Example nation of the diversity of life on planet earth and the other voicing, just as vehemently, that the origin of life lies within a divine and literal creation as lain out in the book of Genesis (Daggers 2010). However, as one might expect, due to the absolutist interpretations of both camps, there is little room left for a third path. What is most interesting with respect to this is the fact that although modern Western Christianity leaves little room for an alternate interpretation, the less common and less practiced forms of Eastern Christianity have a perfectly logical explanation for the origin of life that is neither entirely at odds with the science of evolution nor the belief in the Old Testament (Grà ¤b 2012). The key differential between Eastern and Western forms of Christianity lies in the interpretation of the Old Testament. As with most schisms and theological developments that have taken place over the millennia, the Eastern branches of Christianity most often clung to the idea that the stories related in the Old Testament were a combination of both spiritual and literal meaning (Haskell 2012). In such a way, the level fo which each and every text must be interpreted was allowed to have a degree of liberalism. As compared to their Western Christian counterparts, the Eastern branches of Christianity did not insist that each and every text represented a literal truism that must be accepted (Adelin Jà ¸rgensen 2011). Due to this level of interpretation, theories such as the theory of evolution and Christianity, at least in the Eastern Christian understanding, can readily exist at the same time. In such a way, one does not have to suspend belief in order to understand the scientific pro ofs and evidence that have been presented with regards to evolution. In the same way, one does not have to suspend faith in order to accept seemingly disjoint and/or illogical sections of the Old Testament. The key differential between Eastern and Western branches of

Why are firms differentially effective and what this means in terms of Essay

Why are firms differentially effective and what this means in terms of efficiency - Essay Example However, if next year, the government decides to implement duties again, the manufacturers exporting their vehicles to Pakistan will suffer and undoubtedly all the marketing efforts of the manufacturers would be less effective as compared to previous years. 2. Consumer preferences: Consumer Behavior is a variable prone to changes anytime, which is why the saying has it "change is the only constant". A good example would be from the Fast Moving Consumer Goods Market (FMCG's) which generally tend to be low involvement goods and the prices are a smaller percentage of consumer spending power. A marketing campaign for "SOFT-goat milk whitening soap" might have been effective in the early nineties but would not be effective in year 2008 when the awareness about animal testing is high and public opinion is against products of companies that use animal testing. An old marketing campaign in such circumstances would fail. 3. Industry Dynamics: This refers to the industry in itself and the changing relationships with the various stakeholders for example distributors, suppliers, investors and competitors. For example Unilever is the market leader in beauty Soaps category has maintained its leadership in market for over ten years. The tendency of Unilever would be to provide lesser margins to its retailers and distributors.

Wednesday, September 25, 2019

Networking Assignment Example | Topics and Well Written Essays - 1000 words

Networking - Assignment Example Typically, the Transmission Control Protocol (TCP) is utilised in order to deal with HTTP transport purposes (W3, 2004 a). What is meant by an HTTP request and response, giving an example of each? How are these transmitted? By which underlying TCP/IP protocol? Essentially HTTP is a request and response protocol. The request is used to designate the instructions sent by the client to the server. This transmission takes place in the form of a request method such as Uniform Resource Identifier (URI). Typically, these requests contain the protocol version, request modifiers, information about the client and any other forms of body content. The server reacts to the request by producing a response. The response initiated by a server contains a status line which outlines the protocol version of the involved message along with an indication of failure or success. This is often followed by a message that provides information about the server, any meta data or meta information available and an y other forms of attached body content. A basic example of HTTP request-response protocol is the interaction between web browsers and websites. A web browser tends to act as a client while any application present on a website tends to function as the server. The client, in this case a web browser, sends a HTTP request to the client. In turn the server provides the client with the required resources such as HTML files and other hypermedia. The response from the server’s end contains the required content as well as the completion status of the client’s request. A number of different internet protocol suite protocols are available for carrying out HTTP transportation. However, in most cases the Transmission Control Protocol (TCP) is utilised in preference to other protocols such as User Datagram Protocol (UDP) based on reliability concerns. HTTP connections are of two primary sorts. One of these involves the idea of pipelining request. Explain this concept and describe wh y and how HTTP can benefit from one of these connection types relative to the other. HTTP relies in large part on two primary connection types namely persistent connections and HTTP pipelining. The older versions of HTTP, including 0.9 and 1.0, utilised a single request response pair after which the connection was closed. This meant that the TCP connection request had to be renegotiated for every single request response pair. Persistent connection was introduced in HTTP 1.1 to keep the connection alive after a single request response action had been executed. This meant that the TCP connection did not have to be reinitiated every single time a request response was required. In turn, this meant that connection speeds improved since the TCP restart time was not required for every request response action. However, there was still one serious shortcoming. The client had to wait for a response before it could initiate a new request. This meant that a request response action could be carr ied out one at a time. HTTP pipelining was introduced in version 1.1 to allow the client to send multiple requests without any need to wait for responses. The use of HTTP pipelining allows the reduction of lag time since the client can send multiple requests at the same time and can then wait for their corresponding responses (W3, 2004 b). The use of this technique allows drastic improvements in the internet connection speed since HTML pages

Tuesday, September 24, 2019

Consumer Behaviour in the Sandwich market Assignment

Consumer Behaviour in the Sandwich market - Assignment Example A marketer's job is to figure out what needs and wants the consumer has, and what motivates the consumer to purchase. Motivation is the drive that initiates all our consumption behaviors, and consumers have multiple motives, or goals. Some of these are overt, like a physiological thirst that motivates a consumer to purchase a soft drink or the need to purchase a new suit for an interview. Bucklin, R.E. and C. Sismeiro (2003). Most consumption activities are the result of several motives operating at the same time. Researchers specially trained in uncovering motives often use qualitative research techniques in which consumers are encouraged to reveal their thoughts (cognitions) and feelings (affect) through probing dialogue. The consumer information-processing approach aids in understanding consumptive behavior by focusing on the sequence of mental activities that people use in interpreting and integrating their environment. Katz, M.L. (1984) The sequence begins with human perception of external stimuli. Perception is the process of sensing, selecting, and interpreting stimuli in one's environment. We begin to perceive an external stimulus as it comes into contact with one of our sensory receptors-eyes, ears, nose, mouth, or skin. Perception of external stimuli influences our behavior even without our conscious knowledge that it is doing so. Bulow, J., J. Geanakoplos and P. Klemperer, (1985) Marketers and retailers understand this, and they create products and stores specifically designed to influence our behavior. For example Fast-food chains in the UK paint their walls in "hot" colors, like red, to speed up customer turnover. Marks and Spencer Plc pioneer of the prepacked sandwich market in the UK, kicking off its offering in 1981 with a range of six simple flavors including egg and cress and prawn mayonnaise. M&S steers entering customers directly into the produce section, where they can smell and touch the food, stimulating hunger. In 2005, the range of sandwiches, wraps and baguettes runs to around 80 varieties including

Monday, September 23, 2019

Sodium Chloride An Important Compound Essay Example | Topics and Well Written Essays - 500 words

Sodium Chloride An Important Compound - Essay Example Moreover, it is also found in the ancient bedrock all over the planet in the form of thick layers in places where water bodies used to exist in the form of salt lakes and seas, all of which have evaporated millions of years ago. About 4,700 years ago, the Chinese Png-tzao-kan-mu, one of the earliest known writings, recorded more than 40 types of salt. Ancient civilizations have used salt as one of the vital supplements in diet, with archaeological evidence of Iron Age salt-making largely based upon the discovery of remnants of coarse pottery vessels and supporting pillars recognized as being connected with salt-making and known as briquettage. In Britain, lead salt pans were used by the Romans at Middlewich, Nantwich and Northwich and excavations at Middlewich and Nantwich have revealed extensive salt-making settlements. Moreover, writings on salt no doubt also existed on the clay tablets of Ancient Babylon and on Egyptian papyri. Even without written evidence we can be fairly certain that salt-making and use was a feature of life in all ancient communities. Considering it's chemical and physical properties, Sodium Chloride is usually found as a clear or whit

Sunday, September 22, 2019

Rich man Essay Example for Free

Rich man Essay Slavery is alive and well in the 21st Century. Ever wondered, as you slipped on your trainers or pulled on a pair of jogging bottoms what life would be like for the person who made them? Nike promotes sport and healthy living but the lives of workers who make Nike shoes and clothes in Asia are anything but healthy. Independent research indicates that they live in extreme poverty and suffer stress and exhaustion from over work. Around the world there are millions of people whose lives depend on global trade. Many are small children between an age of nine and seventeen, working in factories trying to earn just a little money for their families. But working in these factories isnt living. Its sweating. Its exhaustion. Its two meals of rice and vegetables a day. Its two twenty-four hour shifts a week. Its food or medicine, not both. Its a mat to sleep on in a nine by nine cell. In short ninety pence, the daily rate at Nike factories and the mandated Indonesian minimum is more a dying wage than a living wage. We are the reason that the poor get poorer and the rich get richer. Demand here effects lives there. Poor people are being kept poor, thanks to companies like Nike. People have to work overtime, and if they dont, they either get the sack or they get abused both physically and mentally. Workers are so poor that they cannot take the risk and say no, because they need the money so much. Even children have had to work in order to earn money because of their poverty. Child labour is one of the most serious human rights abuses in the work place. They are being denied something all children should have an entitlement to, a childhood. A right to play, a right to grow up without the worries and responsibilities of survival. A right to an education without which they can never aspire to a better quality of life. Should such huge responsibilities be placed on such little shoulders? In the U. S. A. and Europe a Nike shirt costs thirty pounds, yet the workers may only get about a quarter of that price per week in wages. The third world kids are victims of poverty. We the consumers are victims of high prices and ignorance. Every time we wear an item of clothing produced by named brand manufacturers we advertise their products. We have been given false hopes, the way that Nike gives false hopes to the workers in their factories. The clothes we buy from Nike are made in factories from China to El Salvador. These factories can only be called sweatshops. The conditions people are expected to work in are nothing short of appalling. Wages are abysmal; hours are long and welfare non-existent. Workers who remained anonymous for fear of loosing their jobs were interviewed by Sarah Strickland in Phonom Penh and are quoted as saying, Some only earn i 20 a month. They have to get their card stamped when they go to the toilet and sometimes they faint from exhaustion and the heat. One particular worker who said he had worked for two years without a holiday told her, When I asked for two days off, they cut my salary. The manufacturers were also approached for their comments on the state of the garment industry in Cambodia. Van Sou Ieng, chairman of the Garment Manufacturers Association told Ms Strickland Some of the workers have unrealistic demands, like asking for forty hour, five day weeks. I wonder how many hours per week he works and for how much pay? I would be very surprised if he wasnt entitled to holiday pay, sick pay and a substantial pension. I think the workers in these factories should be paid more because they are being kept poor and its unfair. The children working in these factories should not have been there, they should have been in school, playing and having fun not receiving pain in a factory. However this is a complex issue, consider this, if you buy Nike products, those factory workers will be kept poor. If you dont buy them they will still be poor, maybe more so. So what can we do about it? Well, we could try protesting to companies like Nike. A letter of disapproval might be a start, but will these multi-million pound companies listen to us? I think we should protest to the world trading organisations and persuade them to set standards for all companies around the world. Standards that are fair to everyone; the factory workers, the companies and you the consumer. A world trade mark could then be a sign of quality without cruelty, a guideline for the unsuspecting buyers around the world that the product didnt cost someone more than a fair days work for a fair days pay, and doesnt cost us our peace of mind. Rich man The executives of the large companies who make their money from us all   Poor man The consumer who is being conned by these companies and kept in the dark about the way in which their products are produced.   Beggar man The people in third world countries who have little or no rights in the workplace, slaves to their rich masters.   Thief The Multi-million pound companies, the fat cats of society, making their money from exploiting others.

Friday, September 20, 2019

The Multi Store Model And The Reconstructive Model Psychology Essay

The Multi Store Model And The Reconstructive Model Psychology Essay In this essay there are two memory models what are compared. The memory models are the Multi Store Model and the Reconstructive Model. It shows how the models work, some studies which have been done experimenting the model, advantages and disadvantages to the models. The multi store model is a theory by Atkinson and Shiffrin (1968). They say that memory uses a number of different processes and that there is actually more than one kind of memory store. There is three parts to the multi store model: sensory memory, short term memory and long term memory. The process starts at sensory memory where you use your senses: Sight, smell, hearing, touch and taste to receive and store information. The information here doesnt last very long from milliseconds to two seconds, just long enough for it to transfer to short term memory. To get to short term memory you use the process, encoding. Encoding means taking the information and making a memory trace. There are three types of encoding: Acoustic, visual and semantic. Acoustic is repeating the topic; you would say or sing the words in your head. Visual is where you would try to see the topic in your head and try to picture it. Semantic encoding is what it means to you e.g. a favourite birthday present, someth ing that has a personal meaning. If the information is not attended to from sensory memory to short term memory this can be lost. The information that has been attended to then rehearsed will go to store in long term memory. (AS Level Psychology) Peterson and Peterson (1959) did a study that supported the multi store model for the duration of short term memory; they named the study Trigram Retention Experiment also known as TRE. The study was highly controlled and the people all started on the same base level. Their aim of the study was to see what the duration of short term memory would be if you did no rehearsal. When they tested this, the people who partook in the trigram, were read three letters. These three constanants were randomly picked and had no meaning e.g. CWT. immediately after been given this the people had to count backwards in threes starting with a very large three digit number. This was called the distractor task they had to do it for a specified time and it was designed so that you could not rehearse the TRE. The time period was called The retention interval and this varied from 3 seconds to 18 seconds. Then when told, the people had to recall the trigram. The letters had to be said exactly the same. They f ound that nearly all the people who recalled after a three second retention interval were successful. Then when they did it at 18 seconds, only very few people could recall the TRE. Doing this study found out that without rehearsing things the duration of short term memory is very short. So this shows that without rehearsal memory is very limited. There were criticisms to this theory though, it was said that the distractor task did prevent rehearsal, but it also meant that the people were doing an additional processing task so this may have affected their recall scores. (Essential AS Psychology for AQA, Richard Gross and Geoff Rolls) Shallice and Warrington (1970) also did a study which supported the multi store model they reported a case where someone had, had a motorbike accident. This resulted in him now having extremely poor short term memory. However his short term memory what he couldnt remember was only for verbal information. His visual and acoustic was normal. This suggests there is more than one type of short term memory, not incorporated in the multi store model. He could only remember one or two digits. Yet his long term memory after the accident was normal. This is in support with the multi store model, because it provides evidence to show that short term memory and long term memory stores are separate. The reconstructive model of memory was a theory by Bartlett (1932). He said that memory is unlike a camera, that its not accurate and the interpretations are based on each persons memories and previous experiences. (Essential Psychology). People tend to be selective about what bit of event they remember. This can be a problem though when needing an accurate recall. Schemas are a major part in reconstructive memory. Schemas are our own ready made expectation of a scenario. They fill the gaps in our own knowledge. Schemas can lead to memory distortions when information doesnt already fit in to the existing schemas we have. There is also a lot of influence to memory from stereo-typing and cultural expectations. (Essential AS Psychology). The eye witness testimony also known as EWT is for criminal incidents that people have seen. Eye witness testimony may not always be accurate; it can be influences by a lot of different things like anxiety, age and even leading questions. If you were to witness a crime it would make you anxious. There are advantages to knowing that the eye witness testimony is not always accurate, this warns us and helps us to know we do have to treat with care. Bartlett (1932) did a study on the reconstructive memory called War of the Ghosts. He did this study to investigate the effect of previous experiences and expectations have on memory recall. A group of people were shown a drawing or a short story, which was the war of the ghosts, to look and read through. The group of people then had to reproduce the story or drawing after different time periods. The time periods ranged from fifteen minutes to years later, this was called a repeated reproduction technique. Over time they found that the group of people produced shorter more clear and carefully thought out versions, more ordinary. They had made the story sound more normal e.g. instead of using the word canoes they used the word boats. They only recalled the basic storyline. In conclusion to this study they found that an explanation or opinion plays a major role in remembering. An active process of reconstruction is remembering, Bartlett called this the effort after meaning, that is mak ing the past more ordinary and normal so that it fits in to our existing knowledge or schemas. This study in psychology is regarded as a classic. Although there are criticisms to this study, It was said that it was a poorly controlled study that Bartlett may have been biased in the interpretations of the different stories. There was also another argument saying the story was very different and unusual. There have been other studies which have done real life everyday memories, which over time were successful. The study was by Wynn and Logie (1998). There is also the study of the unreliability of the eye witness testimony which was done by Loftus and Palmer (1974). They studied smash/ contacted car speed study. The aim of this study was to investigate an immediate recall from the effect of language the group of people use after being asked leading questions. The group of people were shown some slides of an accident which involved two cars. The group were split into two groups, by asking some about how fast were the cars going when they smashed in to each other? for the other set of people they were asked the same but instead of using the word smashed they said hit, bumped and contacted. From doing this study they found that from using different words peoples opinions of the speed were very different. The difference of using the word smashed was higher than the ones who were asked bumped, hit and contacted. So this proves there is an effect when using leading questions. The reconstructive model does provide us with a good explanation of everyday memory. But that we dont have perfect memories. There are disadvantages to the reconstructive memory model there is no information on how we can improve our memory. Also it is more opinion based, because this model of memory assumes that memories are so complicated. Some predictions cannot be made, so we cannot predict what information will be and wont be remembered, as we dont know what a persons schemas are. In conclusion to this, Atkinson and Schiffrins model of the multi store model is one of the best known models of memory, but this doesnt necessarily mean its the best theory. Its a very simple and straight forward theory, but in some ways its too simplistic. It shows that rehearsal doesnt always work, and that you cannot rehearse smells and sights. The reconstructive model is more reliable as its based more on everyday life. It explains that the eye witness testimony is not always accurate and not to fully trust it as much. It also states that we dont have perfect memories. The reconstructive model also helps us to understand how our previous knowledge effects our interpretations of memory.

Thursday, September 19, 2019

Salvage Logging :: Logging Environmental Forestry Essays

Salvage Logging Proponents: Legislators and the timber industry Opponents: Forest Service Employees for Environmental Ethics (FSEEE) Legislators have defined "salvage logging" as the act of logging unhealthy forest stands, considered to have a probability of experiencing extreme insect and disease infestation of catastrophic fire. However, no scientific consensus exists for describing an unhealthy forest, predicting or classifying catastrophic fire event, or classifying the resultant damage of an insect and disease. Salvage logging was an alternative way of meeting timber demands and generating revenues by timber industries and legislators without much opposition from the public. This is because the laws permitting such logging practices are so vague and confusing. Legislators espouse that the sales from such practice brings in money to the Treasury while rendering the forests more "health." Proponents claimed that harvesting timber would reduce fuel-loading to reduce the intensity of fires and thin-out forests stands to relieve inter-tree competition. Though this sounds plausible, the criteria for determining wha t sort of trees would be removed, and who would make the decision still remains unanswered. Salvage logging is an attempt to compromise excessive logging and controlled logging. Excessive logging obviously leads to deforestation as is evident in most areas of the world today. The savannas of Africa, the steppes of eastern Europe and Russia, the pampas of Argentina, and at least some of the prairies of North America used to be forested before human disturbance. The Forest Service Employees for Environmental Ethics (FSEEE) are strongly opposed to this kind of vague laws employed by legislators in salvage logging. In certain instances, the practice has been referred to as "logging without laws" because it exempts timber companies involved in salvage sales from most environmental laws including the Endangered Species Act, the Wild and Scenic Rivers Act, the National Forest Management Act, the National Environmental Policy Act, and the Safe Drinking Water Act. It also allows for clearcutting of huge forest areas. It prevents citizens from exercising their right to challenge illegal logging plans. FSEEE also suggest such vague laws will allow for massive clearcutting of healthy trees and that it also directs the federal government to dramatically increase timber harvests. Allowing for deforestation by the federal government by such vague laws gradually contributes to global deforestation and a corresponding increase in species extinction. Reforestation, by replanting, is only done on a fraction of the deforested area, and it usually creates a monoculture plantation, with much less biological diversity and less disease resistance than in virgin, or old-growth forest.

Directing A New Production Of An Inspector Calls by J. B. Priestly :: English Literature

Directing A New Production Of An Inspector Calls by J. B. Priestly, With Special Reference To Act Two, Page 33 (in Heinemann Plays An Inspector Calls), And The Characters Of The Inspector And Mrs. Birling The two characters that I have chosen - the in The two characters that I have chosen from the play, 'An Inspector Calls', are the Inspector and Mrs. Birling. I chose these characters because they have very contrasting personalities. The Inspector is called 'Goole', which symbolises a ghoul and reflects on his personality. He is very probing when he asks the family questions and obviously has experience with 'interrogating' people. He is very direct and quite blunt when he is questioning the Birling family. In the BBC video version of the play, it was quite obvious that the Inspector was not a normal man as soon as he entered the room. This may have been helped by dramatic music, but it was also evident in the play. "The Inspector enters, and Edna goes, closing the door after her. The Inspector need not be a big man but he creates at once an impression of massiveness, solidity and purposefullyà ¢Ã¢â€š ¬Ã‚ ¦ He speaks carefully, weightily, and has a disconcerting habit of looking hard at the person he addresses before actually speaking." As soon as the Inspector enters the room, the other characters are immediately aware of this "impression of massiveness". In the BBC video the Inspector was quite an old man and he looked feeble in a way, but he still created this effect when he spoke to the other characters. He seems to have a gift to be able to make people feel uncomfortable and guilty when he wants. "INSPECTOR: 'That's more or less what I was thinking earlier tonight, when I was in the infirmary looking at what was left of Eva Smith. A nice little promising life there, I thought, and a nasty mess somebody's made of it.' BIRLING looks as if he is about to make some retort, then thinks better of it, and goes out, closing the door sharply behind him. GERALD and ERIC exchange uneasy glances. The INSPECTOR ignores them." This is a particularly good quote because it shows the Inspector's way of speaking and the character's reactions to him. It seems that Mr Birling cannot even confront the Inspector and has to leave the room, even though Mr Birling was Lord Mayor which gives him authority over a Police Inspector, and is of a higher class than the Inspector, which should give him confidence. Mrs Birling is the quiet wife of the successful owner of Birling and Co. She is a very high-class lady who could be described as 'posh'.

Wednesday, September 18, 2019

AFGHANISTAN A Second Chance to Transform a Nation :: Essays Papers

AFGHANISTAN A Second Chance to Transform a Nation GRAPH I. Historical Background, Pre-European Intervention Before Western European intervention in its affairs, Afghanistan progressed relatively well while resisting the interference of invading foreigners. The region was among the first to domesticate plants and animals over 50,000 years ago, and in the 2000s BCE, urban centers served as important centers of commerce and craft. The city of Mundigak, located near the modern city of Kandahar, possibly invented bronze and served as an important passage between Mesopotamia and other Indus valley civilizations. Its relative prominence and strategic value led Darius the Great to expand the Persian Empire into the majority of Afghanistan in an invasion around 500 BCE that included some of its most metropolitan areas. In a foreshadowing of conflicts to come over the next few thousand years, the Afghan people constantly revolted against and attacked the Persian authority with their tribal groups, particularly in the Arachosia region. After 200 years, Alexander the Great conquered Persia, whic h consequently led to another invasion into Afghanistan met by constant and bloody revolt. In 50 AD, Kushan rule was established by King Kanishka, but the empire fragmented into hostile dynasties 170 years later, setting up the stage for the White Hun invasion of 400 AD that resulted in the destruction of Afghani Buddhist culture. In 550 AD, Persians reaffirmed control over roughly the modern boundaries of Afghanistan, but once again, Afghan tribes revolted fiercely against the Persian occupiers. These events should have served as important and noted precedents for future generations of invaders (Chronological History of Afghanistan). II. Early Precedents of Failed Western Intervention in Afghani Affairs The region of Afghanistan became strategically significant with Great Britain’s colonization of India. By the early nineteenth century, India provided vast amounts of resources, land, and profit for England, and the British considered India the jewel of their â€Å"imperial crown† that needed to be protected at all costs (Chirnside). Under its tsarist rule, Russia had been expanding in many directions, and southward seemed to be the next logical alternative. Russia sent various diplomatic envoys that began to gain favor with Dost Muhammad, the acting ruler of Afghanistan during that time.

Tuesday, September 17, 2019

Mrs.Fields Cookie Case

Zann Johnson Mrs. Fields’ Cookies Case 1. Would you describe Mrs. Fields’ Cookies as more of a functional hierarchy structured along traditional functional lines or more of an IT-enabled network consisting of tailored business processes? I believe that Mrs. Fields’ Cookies started out as traditional, but evolved into an IT-enabled networked that consisted of tailored business processes. Randy definitely had a vision for the company and made sure that what we desired came to life. It also allowed Debbie to maintain a closeness to her stores by being aware of what was going on at each location and having contact with the managers.Therefore, she could feel as if she was there, even when she wasn’t. 2. What role does IT play in the Mrs. Fields’ organizational structure? IT plays a major role in Mrs. Field’s organizational structure. IT allowed the DSM to not only have a closeness with the owner, but it allowed the company to function under a corp orate standard. They can send/receive electronic mail, given a daily schedule (day planner), schedule labor, offer skills tests to employees for raises, assist with interviewing process, have a time clock 3. What challenges does Mrs. Fields Cookies face in the next five years?The next 5 years challenges would be the need for more speed and the internet. New servers would be needed to meet the demand for faster uploading and downloading times. A better backup system and robust security to prevent hacking and viruses should also be considered. A website will be needed to let everyone know of all locations and what items are sold at all locations. This site can also alert customers of specials sale items. How well positioned is the company to meet these challenges? This company is well positioned to meet these challenges.This company already has a mindset to constantly improve using MIS,. They are well aware that their technological advances contributed to growth and better decision-ma king. They next thing would be implementation, which Randy has a drive to see through. The company is already networked. The servers and personal computers at the stores need to be upgraded with faster processors and better operating systems. The company have programmers that could either create upgraded applications and the website or lead in deciding a third-party in creating them. . What advice would you have given Debbi and Randy Fields in 1988? I would’ve advised them to franchise but with very strict rules and controlled rules and guidelines for their franchisees. I would also advise them to seek more acquisitions to expand their portfolio. I would also have advised them to research their competition and seek any ways to stay a step ahead. Also, they should have contingency plans in place for potential emergency situations and potential recessions.

Monday, September 16, 2019

Change and Continuity Over Time-Scientific Revolution

In the time from the 1300s to the 1800s, ideology, scientific knowledge, and religious understanding changed from superstitious ideas to rational and factually supported theories while views of religion stayed the same. Throughout scientific history, religion has played an integral role. During ancient times, changes in weather and sicknesses were thought to be caused by the moods of the gods. In the 1300s the scientific revolution began in Europe, changing from a science ruled by illogical beliefs to knowledge with a focus of understanding the logical laws of God's creation. This scientific revolution was started by observant, brilliant minded thinkers who dropped superstition and proposed a creation that is knowable. During the Middle Ages scientific studies did not were not as prevalent as they are today. Other areas such as religion, art, and philosophy were being developed, but without the scientific knowledge to back them up. The powerful Roman Catholic Church promoted traditional dogmas based on Greek philosophy that hindered the scientific movement. This imbalance of knowledge caused much of science to give way to superstition. Up until the 1300s the gap of scientific knowledge was filled with this superstition. Through lack of scientific pursuit, superstition and pagan beliefs began to creep into the middle Ages learning. Medicine consisted more of chants, spells, and ways to draw out evil spirits than what was healthy for the patient and little was known about astronomy, physics, or anatomy. During the late 1300s, after the Church had been discredited by the Black Death, science started becoming more important. New ideas were developed, processes changed, and the culture in Europe started moving away from superstition and into the scientific processes. We typically think of the scientific revolution as a change in natural science and technology but it was really a series of changes in human knowledge within Europe itself. In various fields of scientific study they sought rational explanations to these beliefs with astronomy, anatomy, and physics. In the field of astronomy, Nicolaus Copernicus rejected the view of pagan Greeks that the planets rotated around the earth and said that they actually rotated around the sun. Galileo, seeking to understand the verse, â€Å"God is light†, determined that our sun is only one of many in the known universe. Later Isaac Newton developed the idea that the universe is mechanical and there are laws that cause the world to operate predictably. Many of his theories gave the world of science a better understanding of mathematics and physics. Along with the many new discoveries, observation changed the methods of experimentation. The scientific method was developed and allowed people to test ideas and perform experiments in controlled conditions to help them understand the natural world. This brought on new inventions such as the telescope, microscope, and thermometer, which helped to further expand knowledge and experimentation. Scientific institutions were built, new methods and theories were taught, and knowledge took the place of superstition. This continues to be driven by man's religious behavior to understand consciousness. Einstein's famous â€Å"Special Theory of Relativity† suggests the mystical truth that â€Å"God is light†. Light is apart from time, space, and matter, yet it fills the voids of our existence and sustains all life. Light has no mass, no distance, and is constant in time and presence. Christ is the â€Å"Light of the World†. This idea had remained the same throughout the time period and was supported in the fields of science which left this idea to go unchanged. Many scientific reformers such as Isaac Newton, and Nicolaus Copernicus had said that God was the source of their knowledge and the reason for their discoveries. Yet superstition and illogical beliefs are pervasive. For example, the dogma of evolution is founded in atheism whereas creationism takes on views that support God’s creation of the earth. Many religions today use science to support irrational ideas. In the time from the 1300s to the 1800s, ideology, scientific knowledge, religious understanding changed from superstitious ideas to rational and factually supported theories while views of religion stayed the same.

Sunday, September 15, 2019

Lady Macbeth is one of the most striking characters in the play Essay

Lady Macbeth is one of the most striking characters in the play. What are your feelings toward this character and how do they change as the play progresses? What makes Lady Macbeth so striking in her first few scenes is her manipulative, vindictive nature. She is a very controlling character yet we see her troubled mind reveal itself as the play progresses. Her most famous scene, Act 5 scene 1, allows the audience to see how she has truly been affected by the murders in which she had been involved. She is sleep walking and revealing unconsciously her emotions toward the untimely deaths of King Duncan, Banquo and the Macduff household. I have little sympathy for this character because if it were not for her driving Macbeth to the murder of Duncan, he most probably would not have become so obsessed with his infatuation of becoming king. As we see in Act 1 scene 5 she is extremely ambitious about the prospect of Macbeth’s power increasing. She talks of murder without an ounce of guilt and merely worries over her husband being too gentle to actually commit the execution of the king. She refers to him being â€Å"too full o’the’milk of human kindness† and states that he is in fact ‘without ambition’ and so would not carry out the deed properly. Her personality could, however, be extremely ambitious regardless of the state of power that her husband is in, the situation could have brought out the most of her desire. In each of her scenes we see a new side to her personality. During Act 1 scene 5 we see her praying to evil spirits in her soliloquy for her to become more masculine and evil, with any feminine attributes and natures to be stripped from her, implying that she also may need a little push to make her ambitious enough to commit the murders. This also suggests to the audience that her conscious would probably not let her commit those crimes alone. She asks the evil spirits to â€Å"Come to my woman’s breasts/And take my milk for gall, you murdering ministers.† However, when Macbeth arrives home, he refers to her as â€Å"my dearest love† she then immediately sets about manipulating him and goading him into the murder. When she learns of Duncan coming to dinner, she administrates ideas of looking above suspicion. She tells him â€Å"look like th’innocent flower/But be the serpent under’t.† Shakespeare uses very expressive language here with contrasting imagery of a flower (which represents good) and a serpent (which represents evil). This could also be interpreted as a metaphor for Macbeth’s relationship with his wife in that when Lady Macbeth is plotting murderous schemes and manipulating her husband, Macbeth is presented in a good and vulnerable light. The same applies for when Macbeth decides to take the murders further and the audience gains sympathy for his wife. Macbeth is left with little to say and is interrupted by his wife on several occasions in that scene, providing the audience with a clear insight into Shakespeare’s intentions for the hierarchy within the relationship. That hierarchy being where Macbeth is more or less controlled by what Lady Macbeth tells him to do, almost like a spell of her own. This provides strong evidence for those who believe that Lady Macbeth herself is a witch of some kind. In Act 1 scene 6 Duncan arrives at Macbeth’s castle with other various guests and originally comments on the pleasant air that it gives off, referring to it as â€Å"Nimbly and sweet†. This presents the audience with a dose of dramatic irony as they know that what really lies inside the castle itself is as evil and twisted as it’s inhabitants. He also refers to Lady Macbeth as â€Å"Our honoured hostess.- The love/That follows us sometime is our trouble†. The problem with Lady Macbeth in this scene is that she is elaborately polite and good natured that it could easily appear to be insincere. She tells Duncan that she has checked and double checked that everything is sufficiently in order. She tells him she will pray for him constantly and speaks of loyalty and gratitude for past kind deeds. Shakespeare is rather repetitive when it comes to Lady Macbeth’s lines, she speaks continuously of her homage to him and the effort they are making for him. This is in an obvious bid for her to gain their trust and it does indeed work. Duncan reacts graciously towards this most probably due to his age and gratitude for the effort made. Act 1 scene 7 sees Lady Macbeth belittling her husband in an attempt for him to agree whole heartedly to killing the king of Scotland. She uses foul phrases with appalling imagery such as telling Macbeth that while she was breast feeding her baby she would: â€Å"while it was smiling in my face/Have plucked my nipple from his boneless gums/And dashed the brains out, had I so sworn.† She tries to come over as very menacing and heartless at this point in the play, making a point of the fact that if she had promised to kill her own child she would do so, however, after the murder of Duncan, she contradicts herself rather strongly as she comments on being able to kill her father. In Act 2 scene 2, Macbeth returns from killing the king to discuss the event with his wife. Shakespeare uses this as an opportunity for the audience to feel sympathy as we see his grief and guilt. We also get to see a very new side to Lady Macbeth, she admits that if he had not looked like her own father she would have done the deed herself, showing that underneath her hard exterior, there are elements of compassion and guilt that though she expresses little, she still feels them just like any other human being. The audience then sees her snap out of her sensitive phase and channel her emotions into reassuring and controlling her husband. She tells him to dismiss his hallucinations about the dagger and to return them to frame the guards who were guarding Duncan’s room. â€Å"These deeds must not be thought/After these ways; so, it will make us mad.† The audience could consider this as foreshadowing of what occurs as the play progresses as both Lady Macbeth and her husband experience mental disturbances because of the horrific crimes they committed. Hands are used as a metaphor throughout this scene and as an extended metaphor throughout the play. Macbeth refers to his as â€Å"hangman’s hands† and uses phrases such as â€Å"ravelled sleeve of care†, whereas Lady Macbeth is far more literal and tells him to â€Å"wash this filthy witness from your hand.† This could be interpreted as the hands representing guilt and so each character handles the guilt in different ways; Macbeth is very open about his guilt and remorse by using dramatic devices such as personification and metaphors, for example: â€Å"Glamis hath murdered sleep, and therefore Cawdor/Shall sleep no more: Macbeth shall sleep no more. † Lady Macbeth, however, deals with her culpability in a different way in that she pretends to feel nothing towards the situation but it obviously haunts her as we see in her final scene in Act 5 scene 1 where she sleep walks and hallucinates. Shakespeare illustrates this well when Lady Macbeth mocks Macbeth for being so gentle: â€Å"My hands are of your colour, but I shame/To wear a heart so white.† She also says rather flippantly, â€Å"A little water clears us of this deed./How easy is it then! Your constancy/Hath left you unattended.† Shakespeare’s intention for this scene, I think, was to show us that there is a sensitive, guilty side underneath her shell of ambition and malevolence. Act 2 scene 3 sees Macduff discovering Duncan’s murder with great astonishment. He alerts the whole castle including Banquo, Malcolm and Donaldbain of the king’s death and so Lady Macbeth enters. She acts very much â€Å"like th’innocent flower† by pretending to be oblivious to what had happened in the previous scene, â€Å"What’s the business/That such a hideous trumpet calls to parley/The sleepers of the house?† Then with immense dramatic irony, Macduff replies calling her â€Å"gentle lady† and commenting on the fact that the talk of murderous deeds is too tender for a woman’s ears. The audience would find this somewhat amusing as they know that Lady Macbeth is solely responsible for the murder of Duncan and so would not in any way find the subject too sensitive or painful. She reacts in a way similar to that when she was attending to Duncan in Act 1 scene 6, where she is very elaborate in her efforts to help, creating a suspiciously false air about her. She then dramatically faints and is carried out, she is lucky that the people around her are so affected by the murder that they do not overtly notice her over the top antics. Lady Macbeth experiences a loss of power and control in Act 3 scene 2, where Macbeth arranges his next murder without her involvement. Shakespeare has her character showing compassion to her husband’s ‘sorriest fancies’ when he complains of insecurity about his dangerous thoughts and deeds. She tries to make him forget what has happened by instructing him: â€Å"Using those thoughts which should indeed have died/With them think on? Things without all remedy/Should be without regard; what’s done, is done.† The audience at this moment does not know that Lady Macbeth doesn’t practice these ideas herself and in fact reveals her guilt subconsciously. My feelings toward Lady Macbeth at this time are cold and my sympathy leans toward Macbeth as we see him feeling very remorseful and suicidal. He mentions, â€Å"Better be with the dead/Whom we, to gain our peace, have sent to peace,/Than on the torture of the mind to lie/In restless ecstasy.† However as we see a new side to Macbeth where he is plotting murders without her it does make me wonder would he have killed Duncan without her influence? Lady Macbeth presents herself as the gracious hostess once more as she invites the lords to dinner in Act 3 scene 4. At the beginning of the scene the audience is presented with the news of Banquo’s slaughter. Lady Macbeth suspects this but is not directly informed as her husband has somewhat distanced himself from her, implying that he does not need her influences for villainous thoughts any more, he can do it all by himself now. This scene manages to arouse some sympathy for Lady Macbeth as we see her power lessening downfall. This could be what ultimately leads to her suspected suicide. The audience gets to understand that Shakespeare did not want to present Lady Macbeth as a character who takes pleasure in the sight of bloodshed and gore, but one who craves power and enforces her ambitions upon those she can manipulate. We also see a role reversal here for the second time in the play. She already has upset the natural order of marital hierarchy from the beginning of the play where she presents herself in the dominant role which was extremely uncommon for that period. Then as the play progresses she becomes part of a downward spiral where she loses power and the status within the marriage as she becomes the more recessive figure next to her now dominant husband. The ghost of Banquo makes an appearance at the dinner table in this scene but of course only Macbeth can see (another one of his deluded hallucinations). He becomes extremely unsettled by this and begins to shout at the ghost with a fiery passion that stuns the rest of his guests. â€Å"Thou canst not say I did it; never shake/Thy gory locks at me!† Ross initiates the lords standing up and leaving their new king in peace to rest and collect himself but Lady Macbeth being â€Å"th’innocent flower† that she pretends to be assures the lords that he is fine and is just unwell. The audience feel some sort of consideration for her as we can see her husband’s mental health deteriorates and her power disintegrate. She snaps at Macbeth â€Å"Are you a man?† as she quite obviously feels utterly embarrassed by his reactions to the ghost. She tries to use this as an opportunity to regain her status above Macbeth which is understandable as she feels defeated but is selfish considering her husband’s state. In the most dramatic scene in Lady Macbeth’s presence on stage, the audience is given the opportunity to see the REAL Lady Macbeth as her subconscious takes over her physical state. At the beginning of her last scene, Act 5 scene 1, the doctor and gentlewoman are analysing her recent behaviour, â€Å"She has light by her continually, ’tis her command.† As light is a common metaphor for purity this insinuates that she doesn’t want to be considered evil and wants to redeem herself but can’t because she is too involved to dig herself out now and so her subconscious speaks the words she cannot. â€Å"Out damned spot! Out, I say! One, two. Why then ’tis time to do’t. Hell is murky. Fie, my lord, fie, a soldier, and afeard? What need we fear? Who knows it, when none can call our power to account? Yet who would have thought the old man to have had so much blood in him?† This is one of the most remembered speeches in Shakespeare’s literature and is so because of its quirky formation. Shakespeare has used very disjointed language with punctuation separating every short phrase. This translates to her being very edgy and emotionally unstable. She then reels off a list of other people for which she feels responsible for their deaths as well as her husband. She refers back to the common theme of hands which has occurred throughout the play. â€Å"What, will these hands ne’er be clean?† â€Å"All the perfumes of Arabia will not sweeten this little hand. O, O, O.† She still refers to her hands as being â€Å"little† and the need for them to be ‘sweetened’ and so this indicates the want for her to be filled with good and that she is feeling genuine guilt and mental anguish. This anguish finally leads to her suicide by unspecified means. Shakespeare probably chose not to present the death of Lady Macbeth on stag e to add to the impact of her exit and last scene and also to be slightly ambiguous. I think a dying scene would have been effective for Lady Macbeth’s last scene, she could perhaps have given a soliloquy explaining how she truly was feeling. To conclude, it is evident that Shakespeare had Lady Macbeth’s emotional state disintegrate as the play proceeded to in effect show the downfall of a control freak. It is undecided whether or not she is pretending to be the controlling evil person which her persona appears to be but that is in a way irrelevant as it was certainly influential enough to drive her husband to multiple homicides. She was certainly a brave character for going against the ‘Chain of Being’ in which God was considered to be ultimately at the top with monarchs under that and other members of society such as lords and townsfolk following after, but at the bottom were women and so she was courageous to consider herself to be above even monarchy! Though wrong it is admirable, especially considering what was said if the chain of being was to be disrupted, that chaos would arise, disrupting the natural order of life on earth and in the heavens which is seen as inexcusable. I personally think that Lady Macbeth was blamed for a lot that wasn’t entirely her fault. It is implied that because Macbeth ended Banquo’s life and slaughtered Macduff’s wife and children in a desperate bid for the throne, he was emotionally capable of murdering Duncan all by himself. In the first two acts we have little sympathy for Lady Macbeth as Shakespeare only provides the audience with her vindictive exterior, at this time we cannot see what she is truly thinking and feeling. It is only as the play progresses that we understand WHY she turns out to be the way that she is, that she has a very ambitious character and so enforces that upon her husband. She feels that Macbeth becoming king will benefit them both and sees killing the existing king as the fastest way to get to the throne. She then becomes gradually defeated as Macbeth’s ambition and obsession with becoming king begins to soar and spiral. She is then over-ridden with guilt and eventually feels that she cannot bear the guilt that torments her troubled mind and so decides to end it all.

Saturday, September 14, 2019

An Event

Aims Good educational background Safety for all students Enjoyable trip Effective and efficient transport Here are the aims in which we are looking at to achieve on the trip which we choose. We have chosen to aim to get a good educational background from the trip because it therefore gives us a higher value on which to evaluate the trip and we then gain good knowledge. Safety for all students is really Important no matter what the trip Involves. The trip being enjoyable by the students Is also Important because then we are also gallon an experience through school work.Objectives Be organized Effective communication throughout the group Ensure everyone is aware – knowing what is going on at all times Make sure everyone is happy with what we are doing – student input Objectives are what are in place in order to achieve the aim therefore we are looking to achieve the aims above which will make the trip a successful one. The main objective on the trip is to be organized bec ause if we are not organized then could end up causing big problems throughout.Outcomes Successful trip Receiving a positive feedback from all Individuals on the trip Show that we can work together as a team and successfully These outcomes are in place as these are what we are looking to have achieved from the trip. Primary Market Research For the primary research in which we were using to use to see which options are best for the trip and will hopefully allow us to meet our aims and objectives, we created a questionnaire and asked 31 people to see what they thought. Here are the questions in which we asked.Out of the following places where would you most likely like to visit? For each of these trips, how much would you be willing to pay for them? For each of these trips which activities would you most likely like to participate in? For each of these trips, which activities would you be most likely to participate in? For each of these trips how much would you be willing to pay for t hem? (Paris) Below are the results In which we received from the questionnaire that we asked and the evaluations to which we could chose most appropriately to the students' wants and needs. Dents would want to visit would be New York. This shows that although some students would like to see some of the other options in which was available New York would be most likely. 15 out of 31 people said they would prefer New York which shows that it is a popular attraction and would be considered for our trip. We asked a number of people how much they would be willing to pay to go to New York. The results show that students would be willing to pay IEEE-IEEE. From these results we know that students are aware of the pricing in which New York would cost.We now know that we would have to keep the pricing of the trip within this pricing bracket as none of the students we asked said that they would pay IEEE-IOW. We think that this is a good result because looking at the graph above, the majority o f the people that we asked said that they would like to go New York, and comparing it to his one they said that they would be willing to pay a reasonable amount of money up to IEEE, this gives us prime reason to plan a New York trip at an affordable price and therefore meet our aims in which we have set.For each trip we go on, we have to organism events on which to visit whilst we were on the trip to make them worthwhile. We asked this question to see not only what activities students would like to participate in but also where they would like to visit within the same question. This particular graph shows the results of where people would like to visit if we were to go on the trip to Paris. The results show that the majority of the people in which we asked would like to go to Chocolate although the other activities in which were asked about had a very popular response as well.The second most popular answer is State De France which is also a very popular attraction. I think that visi ting these areas of Paris would contribute to our aims and objectives within the group well because both of the most popular answers are very good for educational backgrounds and the trip would most definitely be enjoyable. I think that if we were to go to Paris, the prices from the question and results graph above would vary cause of the price of the activities on top of transport; accommodation etc. Loud appear a lot more than EYE. Here we were looking at how much students would be willing to pay if we were to go on the Paris trip. We asked this question so that we could see how much students would be willing to pay and therefore look at how we could afford this price with activities as well. The results show that students would be willing to pay IEEE-IEEE. If we were to choose this trip we would therefore have to keep the price within this price range as not many students would be willing to pay any more.We would also have to look at including the activities in which were chosen in the above graph and including them in the price which would be difficult so we would have to do a lot of research to see what the best strategy would be to overcome this. This question was asked so that we could see how much each student would be willing to pay for each trip if it were to go to Barcelona. The most popular response was IEEE-IEEE. I think that this is a reasonable price to pay for all students and teachers but also it gives us room for negotiation within the trip so as it is quite a lot of money.If we were to go than this amount finally because the other students which answered this said they would pay any more than IEEE. This question was asked so that we could see what activities students would like to participate in if the trip to New York were to go ahead. The most popular answer was Times Square therefore we would look into visiting Times Square if we were to take the trip to New York. To do this we would have to look at the cost in which students would be wil ling to pay for each visit within the place we chose to go and see if Times Square would be an option. Linking back t rap No. , students answered that they would be willing to pay IEEE-IEEE. This gives us enough off range to organism and plan a trip to Times Square. This graph I based on the results that students would be willing to pay for each trip in Berlin. The most popular result from the students was IEEE-IEEE. This is a reasonable price to pay although looking at graph No. L it shows that not as many students would like to go to Berlin compared to New York or Barcelona. Also, looking at graph No. 2, it shows that students would be willing to pay a lot more for a trip further away and also with ore of a reputation.This gives us opportunity to make the trip an experience of a lifetime. The aim of this question on the questionnaire was to get results of what activities students would most likely want to participate in if the trip to Barcelona were to go ahead. The most common re sult based on this question was Non Camp, Poor of Barcelona being the second most popular answer. Looking at graph No. L only around 5 students said that they would rather go to Barcelona over the other three choices therefore it would not be our most popular trip request. Also, looking at graph No. He students were asked how much they would be willing to pay to go to Barcelona and the most popular answer was IEEE-IEEE. This could be a rough asking price for the trip but as Non Camp and Port of Barcelona are well-known tourist attractions, we would have to cater for these swell within the asking price which would boost it up. This graph is mainly relating to graph No. 7. That graph is asking students what they would be willing pay to towards a trip to Berlin, the most popular answer was IEEE- IEEE. This graph shows that 24 students would like to visit Reichstag Dome and the second most popular option being Alex Springer House.This could involve the trip costing more as both of these places are popular tourist attractions. There is a chance that the trip to Berlin and or one of these trips whilst away could cost a lot more than the students are willing to pay for therefore we would have to negotiate the trip payments etc. BMW Motorbike Factory and the Berlin Stock Exchange are alas very popular answers within the results of this question therefore we could look at the prices for each trip in Berlin and see which would be closest to the price in which students would be willing to pay on this trip.Secondary market research The secondary market research below involves us as a group researching the most important information from different websites about each of the trip options available. The research was print screened directly from the website therefore all information is correct and efficient. This print screen states the information in which appropriate place etc. This website could be very useful to use as if offers all the information that we need to make su re we meet our aims and objectives e. G. Health and Safety.This website also sorts and chooses the most suitable accommodation for he needs of the students therefore it would be efficient in helping us to choose the important details within the trip. This screen shot is from European Study Tours which is a very efficient company when dealing with school trips abroad. The website includes all places in which are too available to visit and also enables us to book the trip and accommodation reliably. There is also an option on this website for ‘Educational Visits' therefore we could plan the trip around education and include day trips etc. Ore efficient for this. The website also offers quotes to be given before the rip as well so that we could try and get the closest price to each trip relating to the questionnaire graphs and therefore how much the students are willing to pay to make sure we meet our aims and objectives. The website offers contact details so that we can contact them if we have any UN-answered questions etc. I think that this website looks efficient in booking our trip as they are a reliable company and provide the information possible for making the booking as easy as possible.The screen shot on the left also states that the company advertise discounted school trips and special offers therefore we could use this to our advantage through the company and possibly decrease the price. Here is a screen shot of the Barcelona section within the European study tours website. It states what Barcelona offers for the students. It also has other links to Barcelona educational trips for 6th forms and colleges. On the right of this screen shot the website offers special offers for different options. The website also offers advice on booking trips on the left.I think that the website offers good facilities to book the trips available. This screenings is based on looking at information about Berlin. The website is schools in Europe which is also a well-kn own and reliable company for booking school trips. I think that this website has a lot in favor compared to the screen shot above. This website offers information on day trips and tours etc. On the right therefore giving the students choices. The website also offers different languages and a lot of information on Berlin itself.I think that this would be a suitable website for us to use to book our trip as it is efficient and has all of the information needed to make sure that we have the most efficient trip possible. We I think that the most appropriate website (company) for us to use would be United Airlines. This is because it seems the most efficient out of the ones in which we looked at and also it enables us to look at all of the different options for the trips relating to the questionnaire above. Travel insurance I looked in to finding some research based on travel insurance to see which one most and also at the cheapest price possible.The results are below. This screen shot s hows the research in which we looked in to about travel insurance from www. Directing. Co. UK. The screen shot says what the insurance covers, how to book etc. This particular travel insurance company covers all of the information at the bottom of the screen shot (bullet points). I think that this travel insurance company would be appropriate to cover our trip because it is a well known brand therefore it would be reliable, it covers a lot within the price and also the pricing is reasonable for the amount in which the price covers. This screen shot shows information from Targeted insurance company.This insurance company shows that it offers school travel insurance which is useful to book in numbers as we would do. The screen shot shows what the travel insurance offers which aren't a lot on this site although it looks reliable and covers the main areas of insurance which we would need. Another advantage if we were to use this company would be that we can get a quote online therefore we could chose if this is the right company for us there and then and therefore price up the trip for the students quicker. This screen shot is from Enkindles Travel Insurance. This company also offer school group travel insurance.This covers accidental loss, theft or damage of the group money. The benefits of using this travel insurance company are at the OTTOMH of the screen shot and there are a lot of them which insures us that the company will be reliable for us students going on the trip. You can also get a quote on the first page of the website therefore we can get a quote quickly. The company looks reliable and efficient in insuring they do the best they can at the cheapest price. Here are four travel insurance companies in which we could use and they all give minimal detail about what they offer/cover.Some of them are better than others for example ‘Protect Your Bubble' looks better than ‘LULL Direct' as they offer better over for the insurance which is more suit ed to the students and trips we have the choices to go on. The LULL Direct Company are suited more to the elderly where as the Topped look as though it is more suited to businesses as they speak about trading company insurance. I think that out of these four the most efficient one suited to the needs of our trip and the bases of the trips that we could be going on would be Protect Your Bubble.Coach Comparisons When we planned the organization of the trip we had to plan and see how we would get to the airport and back etc all together. We researched four different coach impasses to see which was cheapest and we got these results. Company Contact number Price (return) Marshall 01 525376077 Souls IEEE(settle) Masons 01296661604 IEEE Cedar 0800731 5105 IEEE Here shows that the cheapest coach traveling company from the four options we chose from is IEEE because although Souls is cheaper at IEEE that was only one way whereas masons are return for a cheaper price.Marshall did not get back to us with a quote therefore we could not state a price in the chart above. Finance for the trip In this part of the assignment I will provide the fixed and variable costs involved in he trip. The fixed costs are costs in which cannot be changed and have to be paid or the trip cannot go ahead, for example the flights and accommodation bills. The variable costs are costs in which can be paid/available but if they are not then it is not going to give any risk towards the trip and it can therefore still go ahead.Variable costs are Variable' to each person. Fixed and variable costs These are the fixed costs involved in the trip in which we go on. The coach is a fixed cost as this needs to pay in order for all students to arrive at the same time and to not be lost. The travel company is a very important fixed cost and needs to be paid in full. This enables the trip to go ahead; the travel company costs cover the accommodation for the trip and the flights. The visas are also very importan t fixed costs as they cover our insurance for the trip.Above are the variable costs within the trip. A variable cost is a cost in which can change from person to person. Spending money is a variable cost because it differs, there is no set cost in which needs to be bought along on the trip, this is up to the individual. Meals are also a variable cost because students are asked to bring their win money for meals therefore they will need the money, yet if they chose not to bring it then they won't be eating on the trip. Souvenirs are also not a necessity it is out of pure choice that students chose to buy souvenirs for others.Fundraising As the cost of the trip in which we go on, including coaches, travel insurance etc. Would cost a lot more than anticipated, there could be a chance in which we would have to ask the students to do some fund raising activities to put some money towards the trip as it could turn out a big sum of money, more than they stated they ere willing to pay on th e questionnaire analysis. The fund raising activities could include outside and inside of school activities involving sports events, year group events, car boots etc.The money in which we raise will go towards the trip but could accommodation. The fund rising may not need to be done but if it does we feel that it is the best way to make the money quickly and also is an achievement. The finance of the trip will be paid in installments, the trip will be held in February when the decisions are finally made as to where we will be going. This will mean that the mount of money in which is needed to pay the fixed costs and the variable costs (if intended) can be paid over the 8 months in which we have until the trip.The cost will be divided in to 8 costs (or as many months as there are until the trip) plus a OHIO deposit to ensure that we have a place on the trip. Finalized trip plan Looking through all of the above research we have decided as a group that we are going to choose to go to N ew York on the trip. We chose this trip above all of the others because we feel that it will benefit the students more also that it is a very exciting once in a life time trip away which students would pay good money to go on. The other main reason in which we chose this trip was because this was the most popular chosen option on the questionnaire analysis chart.The research that we did for New York states those students would be willing to pay around E801E900. This is a reasonable amount to pay for the trip and we think that we could plan and organism a trip around this value of money. The research also states that students would like to visit Times Square, Ground Zero, Statue of Liberty and the Empire State Building. We have therefore booked these places to visit in New York. We have booked to go to New York using European Study Tours Travel Company as this looked the most efficient and reliable throughout the secondary research.Looking at the coach research, we have chosen to tra vel with Masons to and from the airport as it is cheaper for a return than the other companies offer. Masons are a very reliable coach traveling company therefore we can meet our main aim which is safety for all students. The main details of the trip are below. Where are we going? New York Which travel company are we going with? European Study Tours. This company have planned our accommodation which will be Manhattan Hotel in Times Square (relating back to the visit to Times Square in which students said they would like to visit.They have also arranged for us to fly with United Airlines. Where are we planning to visit whilst in New York? Mustang Harry on 7th Avenue Programmer tour of Financial district stop off at Mooring's Bank Tavern Federal Reserve Ground Zero Liberty & Ellis island ferry Macy's Guided tour Historic Herald Square Location Empire state building Madame Tussahs workshop We have planned these trips based on the questionnaire results and added some ore trips to visit that would make the trip more of an experience.Below is an Itinerary in which we made to show the exact details of the trip and times for parents 17th-21st February Monday 17th February Arrive at London Heathers airport 7. Mama – Check in at United Airlines desk at terminal 10. Mama – Depart London Heathers airport for Newark Liberty Airport – Flight No: AU 28 13. Pm – Arrive at Newark Airport – Skylines – coach transfer to accommodation 3. Pm – Arrive at accommodation 7. Pm – Evening meal in Local restaurant Tuesday 18th February Breakfast – Mustang Harry on 7th Avenue Wednesday 19th FebruaryBreakfast- Mustang Harry Visit Macy's Guided tour Afternoon visit – Empire state building and free time before the evening Thursday 20th February Breakfast – Mustang Harry Visit Madame Tussahs workshop Students given a 45 minute presentation by key members of staff Check out of rooms 2. Pm – meet coach at accomm odation for airport transfer 4. Pm – Check in at United Airlines desk at Newark Liberty airport 7. Pm – Depart Newark Airport for London Heathers on Flight No : CIA 29 Friday 21st February 7. Mama – Arrive at London Heathers Airport Coach from Airport to Cedars Make your own way home from School