Thursday, November 28, 2019

Green Computing Research Project free essay sample

This assignment is due for online students by midnight on Sunday of Week 6 and for on-ground students before Week 7’s class meeting. Submit your assignment to the course shell. Read the Green Computing Research Project, Part 2 in Appendix C. Document the requirements and develop a scope statement. Write a 2-3 page paper in which you: Document the requirements based on the information provided and assumptions that you have made, including a requirements traceability matrix. Include a list of questions to ask the sponsor about the project scope. Include at least six (6) questions for full credit. Develop a scope statement for the project. Describe product characteristics and deliverables. Use at least two (2) quality resources in this assignment. Your assignment must: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. We will write a custom essay sample on Green Computing Research Project or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Summarize how the PMBOKÂ ® process groups and knowledge area are involved throughout the project life cycle. Use technology and information resources to research issues in IT project management. Write clearly and concisely about issues in IT project management using proper writing mechanics.

Monday, November 25, 2019

Confucius was a mere preserver and transmitter of tradition, while Muhammad was an innovator. Discuss the validity or otherwise of this statement.

Confucius was a mere preserver and transmitter of tradition, while Muhammad was an innovator. Discuss the validity or otherwise of this statement. Confucius was a Chinese philosopher, one of the most influential figures in Chinese history. (Ching p52) According to tradition, Confucius was born in the state of Lu of the noble K'ung clan in 551 BCE. (Bishop p14) His father, commander of a district in Lu, died three years after Confucius was born; leaving the family in poverty. Confucius nevertheless received a fine education. During the four years immediately after his marriage, poverty compelled him to perform menial labours for the chief of the district in which he lived. His mother died in 527 BCE, and after a period of mourning he began his career as a teacher, usually travelling about and instructing the small body of disciples that had gathered around him. His fame as a man of learning and character and his reverence for Chinese ideals and customs soon spread. Confucius described himself merely as a ‘transmitter of culture, and for the majority of his teachings this is true, but claims can also be supported that he was a ‘conservative innovator in some of the ideas he presented.Gunboat Smith & Pelky [i.e., Pelkey] (LOC)Unfortunately for Confucius, the fruits of his labours occurred long after his death.Chinas traditional religion was ancient, diverse and as complex as the people themselves. It consisted of two indigenous traditions, Confucianism and Taoism, and later in the 1st century CE, Buddhism crept in from India. All three sat comfortably with the Chinese, often complimenting one another. Yet, religion was not restricted to the practices of these three. Ancient practices such as ancestor veneration and several other folk religions focussing on divination were commonly integrated. Amazingly, each of these aspects blended together to form a coherent whole, a concept that is extremely foreign to western understandings of religion. (Ching p31) Even today, such practices and beliefs are still an...

Thursday, November 21, 2019

In the Dark of Night Essay Example | Topics and Well Written Essays - 1250 words

In the Dark of Night - Essay Example Nothing in our history has been so heinous a crime and yet some people actually survived the ordeal and wrote about the experience. The book Night by Elie Wiesel, is a true account of Wiesel's experience in the Nazi concentration camp system, and it is one book among many that shows the courage and faith of a people who had a strong will to survive. 1. The Climate of the State The nature of the State was brewing prior to the actual years of the Holocaust. Wiesel begins his experiences in 1941 when he was 12 years old. However, the State became volatile after the first world war. After this war, the Germans had lost face with the rest of the world. The US, Britain, France and Italy were Allies and wanted to make sure that the Germans would not go to war again (Wood 31). The Allies signed The Treaty of Versailles, which made the Germans lose part of their land and pay "crippling reparations" (Wood 31). Another important event was the Locarno Pact that was between Britain, Italy, Czecho slovakia, France, Germany, Poland and Belgium. This Pact was to confirm Europe's borders that had been set at the Treaty of Versailles. However, Hitler was present at that meeting and decided by 1928 that this rule did not apply to him (Wood 31). Hitler understood that the common German people were upset about their loss and feeling disillusioned. By 1936, Hitler totally ignored the Locarno Pact and moved forward with his goal of annihilating a race. Hitler made the German people believe that the cause of their trouble was the outsiders, which he named the communists and Jews (Wood 33). His rule was based on anti-Semitic over exaggerations and on creating fear about the Jews who were very different from everyone else. The challenge for most people is to understand why Hitler chose to single out the Jews for his wrath. According to Bryan Caplan, Professor of Economics at George Mason University, Hitler went after the Jews because he could. Hitler systematically looked for a target th at matched what he had learned about evolutions. He chose the Jews because they were the "right kind of victim", and they made sense for him to prosecute them. He weighted many options to come to this conclusion. Hitler understood that these were people who would not fight back, and he took advantage of the situation as best he could. The nature of the State at that time was one of fear, ridicule, anger and hate. 2. Relationship between Civilization and the Individual The Jews were a successful race of people because they stayed to themselves and only helped each other. Their religion did not ask them to fight back so they became an easy target. They were very devout in their religion, they loved their families, their community and they thought they were safe. Their civilization was organized and structured and as Tevye the milkman said in Fiddler on the Roof "Everyone knows who he is and what God expects him to do" (Holland 2). At this time, the Jews understood who they were in the ir communities and they were a collaborative people who helped each other collectively. However, the Nazi Regime pushed them into thinking of themselves as individuals. Dienke Hondius, a professor at VU University in Amsterdam, compared the events of the Holocaust with what happened in slavery. She points to the themes of genocide, racism, and human rights violations (S63) that were prevalent in both situations. Also, the issue of family, community and religion were the same for both cultures. However, when the slaves came to America they were also treated as individuals. In both instances, the idea of autonomous individual did not exist for the Jews or for the slaves before the interference of outsiders to their civilization. Now, having to move away

Wednesday, November 20, 2019

Care of Vulnerable people Essay Example | Topics and Well Written Essays - 2000 words

Care of Vulnerable people - Essay Example One of the reasons that might result in schizophrenia are genes associated with the family where the man comes from, which caused alteration of the brain structure. Secondly, the man can be born with a risk of developing mental illness when he attempts to use harmful drugs such as illicit drugs. Often, depressions such as family tensions may cause mental illness to be developed by the persons (Calder, 2010). This condition of schizophrenia is of priority to the country so much since it needs to intervene by ensuring there is education regarding those who have this kind of mental illness. The patient may recover as he can learn topics that enable him to adapt to changes needed to manage the disease and acquires life skills. It is a concern of the government since it hires the personnel (Lambert, Naber & Killackey, 2012). Nurses also play the important roles in efforts of fighting against schizophrenia. One of the roles is that they give patients medicines that decrease symptoms by equalizing the chemical in the brain. The nurses also offer support to the affected (Frank & Cobb, 2005). Vulnerability is defined both as psychological and physiological. Psychological vulnerability is a trend of developing panic disorder over harmful occasions or even additional alerts that arise from experiences, which have predictions and control. Biological vulnerability is a tendency of a body of a person to be neurobiological much reactive to stress. This client diagnosed with schizophrenia is at a high risk since they exhibit a greater frequency neurological signs, which are not accurate at an early development of the children of the affected parents. Risk is the chances of having effects such as illness to occur as a result of physical or biological factors over a specified period. On the other hand, resilience is the ability of someone to adapt to depressions and stress in a proper way. Risk increases high chances of

Monday, November 18, 2019

Sale of Goods and Agency Section 14 Assignment Example | Topics and Well Written Essays - 1000 words

Sale of Goods and Agency Section 14 - Assignment Example The shopper made their purpose for which they intended to use it but the trader did supply that specific commodity that could be used in that specific manner. The court issued a verdict that the goods were not worth for the use and that the client had declared the intention for the goods. â€Å"Caveat emptor† is a forewarning to customers to exercise caution when making purchase of a product in order to avoid deceit by the fraudulent traders who may cone them of their money or products or even supply substandard goods at an exorbitant price. During the transfer of property in merchandise, clients are advised to take caution to verify the value of those merchandise and ensure that there will serve the intended purpose4. This is imperative in order to reduce the legal cases relating to the sale of inferior supplies. In Bartlett v Sidney Marcus [1965] 2 All ER 753, lord Denning declared that merchantability refers to use of good for some specific purposes and that this did not re quire the good to be useful in all aspects per se5. It was for the same reasoning that in Thain v Anniesland trade centres [1997] SCLR 991 the car with fault gearbox was still considered to be of superior value6. According to section 14(2) it is presumed that traders in their ordinary duties are obliged to supply their clients with goods that meet their required value7. However, the law does not offer specific characteristics of assessing the quality of goods. Thain v Anniesland trade centre [1997] SCLR 991, the buyer purchased a second hand car whose gearbox was faulty. However, the court gave a verdict that the car was of right superior value.8 However, in Britvic Soft Drinks v Messer UK Ltd [2002] EWCA Civ 548, the supplier was held responsible for distributing tainted carbon dioxide gags which was to be used for manufacturing soft drinks9. According to the revised act, of 1992, section 14(2) defines product as fit for the reason it was intended for if it is able to serve all rea sons10. It should also physically satisfy the buyers need. In ss.14 & 15 SGA 1979, the buyer should have been given sufficient time to check for any fault, security and stability. However, this may not apply if the clients were aware of the issue which is making the good unworthy for the use it was intended, where the buyer was given an opportunity to examine the good before making purchase or if the sale was by sample there was an opportunity for the buyer to inspect the sample11. According to ss.14 & 15 SGA 1979, the seller is not accountable in regard to the security of the goods in case they have a flaw which could not be recognized at the time of the sale or if the declaration of this flaw could not the arrangement of the agreement12. In Grant v The Australian Knitting Mills ([1936] A.C. 562), the plaintiff had contracted dermatitis after putting on woollen garments manufactured by the defendant because of presence of sulphite and that the client used them for a week unwashed. The court verdict was that defendant was answerable for the distress experienced by the plaintiff13. From this case, the law holds that goods are fit for the right purpose and are considered acceptable if the buyer would still purchase them without making request for

Saturday, November 16, 2019

Network Aware Adaptive Media Streaming in Mobile Cloud

Network Aware Adaptive Media Streaming in Mobile Cloud Authors Name/s per 1st Affiliation (Author) line 1 (of Affiliation): dept. name of organization line 2-name of organization, acronyms acceptable line 3-City, Country line 4-e-mail address if desired Authors Name/s per 2nd Affiliation (Author) line 1 (of Affiliation): dept. name of organization line 2-name of organization, acronyms acceptable line 3-City, Country line 4-e-mail address if desired Abstract—This electronic document is a â€Å"live† template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. *CRITICAL: Do Not Use Symbols, Special Characters, or Math in Paper Title or Abstract. (Abstract) Keywords—multimedia streaming; mobile cloud; ranking; QoS I. Introduction In recent years, mobility of computing devices has caught the fascination and attention of many users all over the world. This has led to rapid advancement in mobile technology and now users can easily stream high quality multimedia content like audio and video on the go. A huge limitation to this, however, is the loss of quality that is incurred while transferring the data. Due to the mobile nature of the devices, varying signal strength can lead to packet loss which ultimately leads to the reduction in the quality of service (QoS). In addition, the memory available in mobile devices is relatively low. To overcome these constraints, data is stored and retrieved from a cloud. Cloud computing addresses the QoS related issues and reliability problems. The cloud has a large amount of storage space and computation power. Harnessing the power of the cloud, it will be possible to service the needs of multiple mobile clients simultaneously. Using the cloud, it is possible to allocate resources on demand and reallocate them dynamically. In order to stream data from a cloud to a mobile device, a coding and decoding architecture like H264/SVC is necessary. This architecture is an extension of the H.264/AVC. It ensures that the same quality of video that can be obtained using H.264/MPEG-4 AVC design on the mobile device. It employs spatial scalability and temporal scalability. According to spatial scalability samples of high quality data can be predicted from their decoded low quality counterparts. Using temporal scalability, the entire video is modelled in such a way that the motion is encoded as dependencies so that the picture for subsequent frames need not be encoded directly. In order to boost QoS, a technique called Bayesian-Gaussian method is used to predict the bandwidth available to the mobile user. Once the bandwidth has been predicted, the data is encoded using xuggler transcoding algorithm. To finally stream the video, multipath routing protocols are used and ranks are provided to each node to ensure that none of them have to wait indefinitely to be serviced. Following this, a comparison is made to the existing Bayesian technique proposed by Keshav[1]. II. Related Work A. Mobile Cloud Compuing A mobile cloud computing setup is one in which mobile devices outsource the computational power of the cloud. Data storage and processing are both performed outside the mobile device. B. Streaming Content C. Role of Cache in Real Time Streaming The role of the cache has been outlined by Wu et al[2]. When a Real Time Streaming Protocol (RTSP) request is sent by a machine, the cache memory is initially searched. In case a cache miss occurs, the original server services the request. D. Improving Quality of Service A number of different approaches have been proposed in order to ensure that the quality of service is maximized. One such method presented by Wang and Dey[3] uses a technique that varies the complexity of the content depending on the network. Non-essential data in a scene are omitted to accomplish this. Lai et al[4] have also put forth an approach to data streaming that depends on the network. Prediction of the bandwidth is done based on measured historical data. This will help prevent the wastage of bandwidth. It is also noted that the video format to be used is to be chosen. This is performed by a Bayesian prediction module. A third approach is detailed by Thuy An et al[5]. Enhancements are made to the Remote Desktop Protocol (RDP) in order to provide an overall better experience. The data separated into two categories and compressed. Lossless techniques are used to provide the best possible output. E. Ranking The various approaches mentioned in the previous section discuss improving QoS with respect to one user. But in reality, the cloud is simultaneously accessed by more than just one user. For this reason, it is important to ensure that there is some scheduling mechanism in place that will monitor the incoming requests so that no client request is forced to wait for too long without being serviced. Zhou et al[6] have proposed a novel approach in which all the competing mobile devices work together to minimize congestion. This approach aims to strike a balance between reducing the distortion in data and increasing the performance of the network as a whole. III. Proposed Work The proposed model has two major components: the mobile device and the cloud. The mobile device simply issues the request while the cloud provides a rank, predicts the bandwidth and then streams the video accordingly. The architecture has been outlined in Fig.1. A. Mobile Device The implementation of the mobile portion of the architecture is fairly straight forward. The user is provided with the option to specify the location of the video in the cloud server. Then, the cache is check to see if the requested data is available. If it is, the data is transferred directly from the cache. This type of cached data will be accessible offline as well. In the case where a cache miss occurs, the server is accessed to retrieve the data. B. The Cloud The videos that are to be stream are stored in a separate database. When a request is made, the video is streamed using the cloud. In order to do this, three major modules are implemented in the cloud. In the cloud, the users are ranked and then the bandwidth available is estimated. Finally, xuggler transcoding is used to encode the data and the encoded data is transferred to the mobile device for viewing. Each operation is handled by a different module as show in Fig.2. C. Bandwidth Prediction D. Xuggler Transcoding E. Ranking The ranking module is used to ensure that QoS is improved while transmitting the data. Once the bandwidth has been determined, the data has to be sent in such a way that the congestion in the network is as low as possible. Ranking is done based on the user profile. The user profile contains a history of the user’s downloads as well as the bandwidth measured. Poorly performing nodes in the system are identified using this ranking system and they can be enhanced to improve the overall functioning of the network as a whole. F. Channel Assignment Once ranking is done, multipath routing algorithms are used to transfer the data. Link states are determined and the several feasible paths are selected. Since several paths are selected, the chances of congestion and packet loss are reduced. The most suitable channel for transmission of the data can be determined by solving the linear programming equation Min (1) The process of selecting the best channel is shown in Fig. 3. IV. Output The proposed system has been implemented and its results have been compared with that of the Keshav’s Bayesian technique. It can be seen that the proposed system works better than Keshav’s system consistently. Comparative studies have been undertaken on the basis of bandwidth and peak signal to noise ratio (PSNR). A. Bandwidth The bandwidth predicted by the proposed system is a lot closer to the actual measured bandwidth than that predicted by Keshav’s system. The graph in Fig.4 clearly shows the deviation of both techniques from the actual measured bandwidth. B. PSNR and Bit Rate The quality of the video streamed can be determined based on the bit rate as well as the PSNR. The proposed system performs better than Keshav’s system on both counts. This is shown in the graph in Fig.5. C. Video Quality The comparative study only shows us how the system works in comparison to Keshav’s existing system. To determine the effectiveness of this system, a detailed study of the video quality was performed and has been summarized in Table 1. Conclusion It is clear from the studies undertaken that the proposed Bayesian-Gaussian technique works well at predicting the bandwidth available. The xuggler transcoding also ensures that quality is preserved. Thus, using a mobile cloud it is possible to stream videos without a loss in quality and also without forcing the user to wait for the video to load. Acknowledgment (Heading 5) The preferred spelling of the word â€Å"acknowledgment† in America is without an â€Å"e† after the â€Å"g.† Avoid the stilted expression â€Å"one of us (R. B. G.) thanks †. Instead, try â€Å"R. B. G. thanks†. Put sponsor acknowledgments in the unnumbered footnote on the first page. References The template will number citations consecutively within brackets [1]. The sentence punctuation follows the bracket [2]. Refer simply to the reference number, as in [3]—do not use â€Å"Ref. [3]† or â€Å"reference [3]† except at the beginning of a sentence: â€Å"Reference [3] was the first † Number footnotes separately in superscripts. Place the actual footnote at the bottom of the column in which it was cited. Do not put footnotes in the reference list. Use letters for table footnotes. Unless there are six authors or more give all authors’ names; do not use â€Å"et al.†. Papers that have not been published, even if they have been submitted for publication, should be cited as â€Å"unpublished† [4]. Papers that have been accepted for publication should be cited as â€Å"in press† [5]. Capitalize only the first word in a paper title, except for proper nouns and element symbols. For papers published in translation journals, please give the English citation first, followed by the original foreign-language citation [6]. G. Eason, B. Noble, and I.N. Sneddon, â€Å"On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,† Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551, April 1955. (references) J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73. I.S. Jacobs and C.P. Bean, â€Å"Fine particles, thin films and exchange anisotropy,† in Magnetism, vol. III, G.T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271-350. K. Elissa, â€Å"Title of paper if known,† unpublished. R. Nicole, â€Å"Title of paper with only first word capitalized,† J. Name Stand. Abbrev., in press. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, â€Å"Electron spectroscopy studies on magneto-optical media and plastic substrate interface,† IEEE Transl. J. Magn. Japan, vol. 2, pp. 740-741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982]. M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.

Wednesday, November 13, 2019

Argument For Legalizing Euthanasia Essay examples -- Pro Euthanasia Es

A patient is diagnosed with brain tumors that have spread to their bones and muscles. The doctor gives them three months to live, but only with the continuation of treatment. They spend most of their remaining time in a hospital receiving chemotherapy and radiation treatments. They must be pushed in a wheelchair because they are too sick to walk and spend the rest of their few months in pain, knowing they will die but not sure when. That is how the last few months of Cristy Grayson's life was spent. Now ask yourself, what would you do if you were in this situation? Would you want to spend the last few months of your life unhappy and in pain, or die peacefully? For some, euthanasia is not an option, but for others it is a way to end their suffering and have a peaceful death. Although some view euthanasia to be morally wrong, voluntary euthanasia should be legalized in the United States to end the suffering of others, help patients who have the ability to live a longer life, and decrea se the cost of health care. Euthanasia is an act of killing an incurable patient who is suffering or in pain. Euthanasia comes from a Greek expression for â€Å"good death† and, in other words, allows the patients to die and easy death without suffering. Euthanasia can be described as voluntary, involuntary or active, and passive. Voluntary euthanasia is being put to death with the consent of the patient; involuntary is where the patient is to ill to give consent, so a physician or close family member gives consent for them. Passive euthanasia is when common treatments, such as, antibiotics, pain medications, or surgery, are withheld. Active euthanasia is the use of lethal substances that will end a patient’s life. No matter what form of euthanasia is used... ...a. Hamlon Kathi. â€Å"Could euthanasia or assisted suicide be used as a means of health care cost containment?† Patient’s rights council. Jan. 2010. Web. 21 Nov. 2014. Pearlman, R. "Why Do Patients Request Physician-Assisted Death?† ProConorg Headlines. 10 July 2008. Web. 10 Dec. 2014. Pereira, J. â€Å"Legalizing euthanasia and assisted suicide.† PMC. 19 June 2012. Web. 5 Dec. 2014. Standley, Tim. "Jack Kevorkian's Horrible Career Offers a Warning against Legalizing Euthanasia." News Jack Kevorkian’s Horrible Career Offers a Warning against Legalizing Euthanasia Comments. 4 June 2011. Web. 10 Dec. 2014. Stevens, Kenneth. "PCCEF - Articles." National Legal Center for the Medically Dependent and Disabled. 2006. Web. 3 Dec. 2014. Swarte, N. "Effects of Euthanasia on the Bereaved Family and Friends: A Cross Sectional Study." BMJ. 24 July 2003. Web. 10 Dec. 2014.