Monday, December 30, 2019

P-39 Airacobra Bell Aircraft

Length: 30 ft. 2 in.Wingspan: 34 ft.Height: 12 ft. 5 in.Wing Area: 213 sq. ft.Empty Weight: 5,347 lbs.Loaded Weight: 7,379 lbs.Maximum Takeoff Weight: 8,400 lbs.Crew: 1 Performance Maximum Speed: 376 mphCombat Radius: 525 milesRate of Climb: 3,750 ft./min.Service Ceiling: 35,000 ft.Power Plant: 1 Ãâ€" Allison V-1710-85 liquid-cooled V-12, 1,200 hp Armament 1 x 37 mm M4 cannon2 x .50 cal. machine guns4 x .30 cal machine gunsup to 500 lbs. of bombs Design Development In early 1937, Lieutenant Benjamin S. Kelsey, the US Army Air Corps Project Officer for Fighters, began to express his frustration over the services armament limitations for pursuit aircraft. Joining with Captain Gordon Saville, a fighter tactics instructor at the Air Corps Tactical School, the two men wrote two circular proposals for a pair of new interceptors which would possess a heavier armament that would allow American aircraft to dominate aerial battles. The first, X-608, called for a twin-engine fighter and would ultimately lead to the development of the Lockheed P-38 Lightning. The second, X-609, requested designs for a single-engine fighter capable of dealing with enemy aircraft at high altitude. Also included in X-609 was a requirement for a turbo-supercharged, liquid-cooled Allison engine as well as a level speed of 360 mph and an ability to reach 20,000 feet within six minutes. Responding to X-609, Bell Aircraft began work on a new fighter that was designed around the Oldsmobile T9 37mm cannon. To accommodate this weapon system, which was intended to fire through the propeller hub, Bell employed the unorthodox approach of mounting the aircrafts engine in the fuselage behind the pilot. This turned a shaft beneath the pilots feet which in turn powered the propeller. Due to this arrangement, the cockpit sat higher which gave the pilot an excellent field of view. It also allowed for a more streamlined design which Bell hoped would aid in achieving the required speed. In another difference from its contemporaries, pilots entered the new aircraft through side doors that were similar to those employed on automobiles rather than sliding canopy. To supplement the T9 cannon, Bell mounted twin .50 cal. machine guns in the aircrafts nose. Later models would also incorporate two to four .30 cal. machine guns mounted in the wings. A Fateful Choice First flying on April 6, 1939, with test pilot James Taylor at the controls, the XP-39 proved disappointing as its performance at altitude failed to meet the specifications set forth in Bells proposal. Attached to the design, Kelsey had hoped to guide the XP-39 through the development process but was thwarted when he received orders that sent him abroad. In June, Major General Henry Hap Arnold directed that the National Advisory Committee for Aeronautics conduct wind tunnel tests on the design in an effort to improve performance. Following this testing, NACA recommended that the turbo-supercharger, which was cooled with the scoop on the left side of the fuselage, be enclosed within the aircraft. Such a change would improve the XP-39s speed by 16 percent. Examining the design, Bells team was unable to find space within the XP-39s small fuselage for the turbo-supercharger. In August 1939, Larry Bell met with the USAAC and NACA to discuss the issue. At the meeting, Bell argued in favor of eliminating the turbo-supercharger altogether. This approach, much to Kelseys later dismay, was adopted and subsequent prototypes of the aircraft moved forward utilizing only a single-stage, single-speed supercharger. While this alteration provided the desired performance improvements at low altitudes, the elimination of the turbo effectively made the type useless as a front-line fighter at heights above 12,000 feet. Unfortunately, the drop-off in performance at medium and high altitudes was not immediately noticed and the USAAC ordered 80 P-39s in August 1939. Early Problems Initially introduced as the P-45 Airacobra, the type was soon re-designated P-39C. The initial twenty aircraft were built without armor or self-sealing fuel tanks. As World War II had begun in Europe, the USAAC began to assess combat conditions and realized that these were needed to ensure survivability. As a result, the remaining 60 aircraft of the order, designated P-39D, were built with armor, self-sealing tanks, and enhanced armament. This added weight further hampered the aircrafts performance. In September 1940, the British Direct Purchase Commission ordered 675 of the aircraft under the name Bell Model 14 Caribou. This order was placed based on the performance of the unarmored and unarmed XP-39 prototype. Receiving their first aircraft in September 1941, the Royal Air Force soon found the production P-39 to be inferior to variants of the Hawker Hurricane and Supermarine Spitfire. In the Pacific As a result, the P-39 flew one combat mission with the British before the RAF shipped 200 aircraft to the Soviet Union for use with the Red Air Force. With the Japanese attack on Pearl Harbor on December 7, 1941, the US Army Air Forces purchased 200 P-39s from the British order for use in the Pacific. First engaging Japanese in April 1942 over New Guinea, the P-39 saw extensive use throughout the Southwest Pacific and flew with American and Australian forces. The Airacobra also served in the Cactus Air Force which operated from Henderson Field during the Battle of Guadalcanal. Engaging at lower altitudes, the P-39, with its heavy armament, frequently proved a tough opponent for the famed Mitsubishi A6M Zero. Also used in the Aleutians, pilots found that the P-39 had a variety of handling problems including a tendency to enter a flat spin. This often was the result of the aircrafts center of gravity shifting as ammunition was expended. As distances in the Pacific war increased, the sh ort-range P-39 was withdrawn in favor of increasing numbers of P-38s. In the Pacific Though found unsuitable for use in Western Europe by the RAF, the P-39 saw service in North Africa and the Mediterranean with the USAAF in 1943 and early 1944. Among those to briefly fly the type was the famed 99th Fighter Squadron (Tuskegee Airmen) who had transitioned from the Curtiss P-40 Warhawk. Flying in support of Allied forces during the Battle of Anzio and maritime patrols, P-39 units found the type to be particularly effective at strafing. By early 1944, most American units transitioned to the newer Republic P-47 Thunderbolt or North American P-51 Mustang. The P-39 was also employed with the Free French and Italian Co-Belligerent Air Forces. While the former was less than pleased with the type, the latter effectively employed the P-39 as a ground-attack aircraft in Albania. Soviet Union Exiled by the RAF and disliked by the USAAF, the P-39 found its home flying for the Soviet Union. Employed by that nations tactical air arm, the P-39 was able to play to its strengths as most of its combat occurred at lower altitudes. In that arena, it proved capable against German fighters such as the Messerschmitt Bf 109 and Focke-Wulf Fw 190. In addition, its heavy armament allowed it to make quick work of Junkers Ju 87 Stukas and other German bombers. A total of 4,719 P-39s were sent to the Soviet Union through the Lend-Lease Program. These were transported to the front via the Alaska-Siberia ferry route. During the course of the war, five of the top ten Soviet aces scored the majority of their kills in the P-39. Of those P-39s flown by the Soviets, 1,030 were lost in combat. The P-39 remained in use with the Soviets until 1949. Selected Sources Military Factory: P-39 AiracobraNational Museum of the US Air Force: P-39 AiracobraAce Pilots: P-39 Airacobra

Sunday, December 22, 2019

Paul s Life Before Christ - 1873 Words

â€Å"For just as we have many members in one body and all the members do not have the same function, so we, who are many, are one body in Christ, and individually members one of another† (Rom. 12:4-6) . As Paul writes to the Church in Rome, he explains how we, as Christians, are all part of the Body of Christ. By studying the writings of Johnny Awwad and Matthew Henry’s brilliant commentary, as well as several passages in the Bible, we take a deeper look into the life of Paul. Upon the completion of this paper, we will be able to conceptualize that Paul’s life, as well as his ministry, is a testament to how God uses people from all walks of life for the betterment of His kingdom. Furthermore, we will learn how Paul’s life was incredibly impactful to the Church. Paul’s Life before Christ Before we can understand just how monumental Paul’s impact was on the Body of Christ, we must first examine his life before he took that life-changing journey to Damascus. We must also explore what drove Paul to detest Christians as much as he did. â€Å"I am a Jew, born in Tarsus of Cilicia, but brought up in this city, educated under Gamaliel, strictly according to the law of our fathers, being zealous for God just as you all are today. I persecuted this Way to the death, binding and putting both men and women into prisons† (Acts 22:3-4). See, Paul devoted his life to rounding up and imprisoning Christians. He learned to strictly follow the laws of his fathers. How did his zeal towards the LawShow MoreRelatedTradition And Rules Of The Gospel Of Christ Essay1465 Words   |  6 Pageshanding over†. Paul had many traditions handed over to him from his Jewish ancestry but he also had a revelation of salvation available through the grace of Jesus Christ both to the Jew and Gentile. Through tradition each generation accumulates wisdom, love and values from their ancestors. Salvation cannot be accumulated through tradition it must be experienced through the revelation of Jesus Christ by the Holy Spirit and accepted as a gift from God. Paul`s gospel stresses that God`s plan is for theRead MoreThe Conversion Of The Apostle Paul1282 Words   |  6 PagesApostle Paul is one of the more well-known occurrences in biblical history. Paul’s conversion, on the Road to Damascus, shows that God’s power is great and that anyone can become a servant of the Lord. Paul became the foremost authority of the teachings of Christ in biblical history. Paul worked fervently, after his conversion, to spread the words of Christ throughout the known world. In this essay, I will explain the events that took place for the conversion and some thoughts as to why Paul convertedRead MoreThe And Purpose For The Writing Of 11007 Words   |  5 Pagesthe opponents of Paul in Thessalonica? What was the nature of the opponents’ teaching and how did Paul respond to it? Should church leaders today apply Paul’s responses in their respective ministries? If so, how? Both 1 and 2 Thessalonians were composed by Paul furthermore incorporate Timothy and Silas. Timothy was a young fellow Paul prompted Christ and we realize that Silas was Paul s essential partner on his second evangelist venture (Acts 15:40). The textbook mentions that Paul was in Athens whenRead MoreGod s Foolishness Is Better Than Human Wisdom1674 Words   |  7 Pageswise; God chose what is weak in the world to shame the strong; God chose what is low and despised in the world, things that are not, to reduce to nothing things that are, so that no one might boast in the presence of God. He is the source of your life in Christ Jesus, who became for us wisdom from God, and righteousness and sanctification and redemption, in order that, as it is written, â€Å"Let the one who boasts, boast in the Lord.† 1 Corinthians 1:25-31 Because the foolishness of God is wiser thanRead MoreThe Testament Of The Ephesians1578 Words   |  7 Pages Paul, who is the author of Ephesians, is writing to the church in Ephesus and possibly surrounding Asia minor cities. He wrote the book of Ephesians sometime between AD 60-62 when he was imprisoned in Rome (3:1, 4:1, 6:20). The letter was taken to Ephesus by Tychicus (vs 6:21-22). Paul knew that the Christians in Ephesus and the surrounding towns were growing and had heard about their faith so he addresses the Ephesians as a corporate body (Hultgren, 2015). At the time, EphesusRead MoreHow Galatians Is Important For Many Reasons911 Words   |  4 PagesChristian churches after Jesus physical death, and most importantly, it reveals one of the most essential elements in Paul s interpretation of Christianity. On this particular point, Paul made a definite break not only with Judaism but also, with Christians of Jewish descent who believed in the new religion in terms of obedience. To start off, it is important to understand what caused Paul to write the letter. This could also be recognized as the setting of the letter that provides some minor backgroundRead MoreThe Reflection Of The Glass1618 Words   |  7 PagesGrace to you and Peace from God, our Father, and His Son, who is the Risen Christ. Have you ever caught your reflection in a piece of glass? You can be looking at something through a window and the light changes or you move slightly and suddenly you catch sight of yourself, right there in the middle of the outside picture. Over the coming weeks, our second readings will come from Paul s letter to the Romans. Though Paul had never been to Rome, he hopes to visit there on his way to Spain. ActuallyRead MoreRomans 8:1-17 as a Summary of Pauls Thoughts1146 Words   |  5 Pagesin Paul s letter to the Romans, there are many themes that we have seen before in his other letters to the Corinthians, Galatians, and Thessalonians. Paul s passage in Romans 8:1-17 is a summary of all of his main thoughts that he wants every Christian to live his or her life according to. Paul uses references of the Spirit and the Flesh to communicate his ideas. There is therefore now no condemnation for those who are in Christ Jesus. For the law of the Spirit of life in Christ JesusRead MoreThe Significance Of The Apostle Paul s Noteworthy Conversion Of A Transformation By The Blood Of Jesus Christ869 Words   |  4 Pagesof Jesus Christ. The most influential portion of Paul’s life is his conversion from a persecuted to an evangelizing missionary. Paul, in his early life was remembered as religiously zealous, a merciless attacker, and an unyielding persecutor of the early church. It’s in Acts chapter 9 that one begins to see just how ruthless Paul truly was, â€Å"Then Saul, still breathing threats and murder against the disciples of the Lord, went to the high priest† ( New King James Version, Ac. 9.1) Before startingRead MoreThe Presence Of God And Of Christ Jesus1208 Words   |  5 PagesIn the presence of God and of Christ Jesus, who will judge the living and the dead, and in view of his appearing and his kingdom, I give you this charge: 2 Preach the word; be prepared in season and out of season; correct, rebuke and encourage—with great patience and careful instruction. 3 For the time will come when people will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear. 4

Saturday, December 14, 2019

Covering Ignorance Free Essays

In â€Å"The New Civil Rights†, Kenji Yoshino proposed that change is needed in our current civil rights. In recent discussion of civil rights, one issue has been seen that minorities are â€Å"covering† or toning down a disfavored identity to fit into the mainstream (Yoshino 479). On the one hand, some argues that â€Å"covering† is a vital part for a fluid social interaction and peaceful coexistence. We will write a custom essay sample on Covering Ignorance or any similar topic only for you Order Now From this perspective, we can see that the Yoshino’s â€Å"new civil rights† that should be based to individual rights rather than groups can have a drastic change in how our society functions (Yoshino 481). On the other hand, Yoshino argues that a â€Å"new civil rights† is needed for harnessing individual authenticity rather than to assimilate in group identities. In Steve Olson’s essay he said that Hawaii is a â€Å"melting pot of racial cultures† where races are almost indistinguishable because of the history of intermarriage but still these people chose to affiliate themselves differently than others (Olson 251). According to this view even with the lost of distinction between racial groups in Hawaii they still affiliate themselves to different groups to distinguish from the other groups. By looking at Yoshino’s paradigm of â€Å"new civil rights†, we can see that while its goal of â€Å"liberty† is commendable, it is dependent on individuals that will give action which is impractical. We can in sum, then, the issue is finding an effective way to help all citizens’ exercise their civil rights or will it be just a lost cause because we will remain ignorant of the issue. In Marc Maurer’s â€Å"Creating Disability Rights† Maurer said â€Å"they themselves the disabled are the primary agents of change† (Maurer 6). Maurer wanted to change the view of the judicial court about how the disabled are being discriminated and not being protected by the civil rights, but again like Yoshino’s idea, Maurer needs the people to see the issue and act upon it which can cause people to ignore it. I myself didn’t really give too much thought about these matters because I lack knowledge in these issues about civil rights. I suppose there is some degree of demand necessary in order to provoke or encourage a social change but because today’s society is like water in that it always seems to take the path of least resistance. If there is any obstruction it will simply go around. Most people don’t want their lives interrupted by pressing issues like gay or civil rights. They are viewed as obstructions. To maintain social flow, insistence for change by the struggling groups will be largely ignored and the norm of society will use assimilation as its justification vehicle, resulting in covering. In order to change, â€Å"we must be willing to see the dark side of assimilation, and specifically covering, which is the most widespread form of assimilation required of us today. (Yoshino 480) This statement elaborates on the idea that change will occur when society is educated enough to realize the identity assassination that occurs with assimilation, and also be willing to realize it rather than ignore. Education, as it has in the past, will be the best way for social change to occur. Urging change will always encounter resistance, where education will cause improvement. In this way the modern school can play a positive role in advancing this complicated society of ours toward a future in which all kinds of people are both valued and respected. How to cite Covering Ignorance, Papers

Friday, December 6, 2019

Marketing Plan Management

Question: Explain EnBuFriend? Answer: About the car The petrol prices are increasing and at the same time, the consumers are becoming environmentally friendly so that they can do their good to the environment. The cars on the road are one of the reasons due to which environment is getting affected the most. It is difficult for the users to be dependent on public transport and that is one of the reasons due to which they own a car even when they think that its expensive. Electric car is one of the ideas that many car companies is trying to implement but it is not successfully accepted by the target audience. A car named EnBuFriend (Environment and Budget Friendly) so that the customers are motivated to buy this car rather than that of any other car. This car will be marketed so that the target market is aware of the availability of the car. Initially, it may seem to be complicated to reach the target market but this can be achieved with extensive marketing. A marketing plan will be in place so that the target market is motivated to be environmentally friendly and also save the huge money that they are investing in the car and also the petrol (Aggeri 2009). Smart objectives Setting smart objectives is the only way by which the management can achieve the targets that has been set. If the management is able to set SMART objectives then they can be rest assured that they will be measure the achievements against the goal that has been set. The SMART objectives that have been set by the management of EnBuFriend are as follows: - In the first year, the management is willing to sell at least 500 cars. At least 90% of the target market should be aware of the availability of EnBuFriend cars. The company will come up at least 25 advertisement campaigns so that the target market is aware of the availability of the car (Beaume 2009). Core competencies of EnBuFriend cars Core competencies are the key strengths of the organization. EnBuFriend will ensure that they invest on their core competencies so that they can survive and be competitive in the organization. Few of the core competencies on which EnBuFriend would like to concentrate on are as follows: - The organization wants to concentrate on being clean. Being clean would mean that the organization will always try its level best to environmentally friendly. Innovation would be the key strength of the organization. The organization will innovate continuously so that they can be better than what they are today. The organization will innovate on the basis of market trends and customer needs. The organization wants to be sure that they are environmentally friendly and hence, they will not deviate from their objective of being environmentally friendly. Comfort of the driver will be given due importance and hence, the car will be designed keeping the drivers requirement in mind. In most of the electrical cars, the drivers comfort is ignored but that will not the case with EnBuFriend. EnBuFriend will introduce one car in the market but slowly and steadily, they will increase the models so that the customer can buy something that they like rather than that of buying something that is available (Belderbos 2010). Segmentation for EnBuFriend cars The regular car segment cannot buy EnBuFriend cars. It is the responsibility of the marketing team to need of the customer and undertake segmentation of the market. If the management tries to understand the regular segment then there are very high chances that the customers will not be willing to buy environmentally friendly cars. Few of the segments that would be targeted by EnBuFriend cars are discussed below. Demographics like age, sex and location will not be used for the purpose of segmentation. If the market is segmented based on the age, sex and location then there are very high chances that the organization will miss out on people who will be actually willing to buy the car. People for EnBuFriend car will be segmented based on the attitude that they hold towards the environment. People who are willing to do their part of good to the environment will be willing to use the car. The management will ensure that the benefits of the environment are well spoken about during the advertisement campaigns so that the customers are motivated to make investments in electric car (Chesbrough 2006). Males and females who are between the age group of 20 to 70 will be targeted. Below the age of 20, people may not be matured enough to drive cars or make decisions on the kind of car that they would like to drive. Apart from that, after the age of 18, people develop an understanding about the harm that they are creating to the environment and hence, they look for ways by which they can correct it. EnBuFriend is one of the ways by which they can save the environment. Similarly, working professionals try car pooling and other activities so that they can reduce the impact on the environment so they can try this car so that they can be dependent on their private car. People after the age of 50 will be well aware of the change in the environment and hence, they will continuously look for ways to reduce the impact so that they can save something for the next generation. Lastly, only the developed nations will be targeted. There are very high chances that the developing and under-developed nations may not be financially strong to purchase electric cars. Slowly and steadily, EnBuFriend will try to capture these markets even a cheaper car so that the customers are willing to make investment. Apart from that, the awareness of being environmentally friendly is very low when it comes to developing and under-developed nation. The advertisement campaign will be developed for developed nation so that the campaigns can be in sync with the attitudes and requirements of the people (Chiaroni 2010). Electrical cars may not be used by everyone and hence, this will be targeted towards people who are tech savvy. EnBuFriend will have plenty of features and that will not be understood and accepted by all the customers. The advertisement campaign will be for tech friendly people only because of the wide range of features that it offers. People who are concerned about the money that they are spending on the petrol will also be targeted. Running on electricity is one of the features that differentiates this car than that of the other cars and hence, people who are concerned about petrol will also be considered while the advertisement strategy is planned (Ebersberger 2010). Target market for EnBuFriend Plenty of market segments have been identified but it is merely impossible for EnBuFriend car to serve all the market segments. Few of the market segments that can be identified and targeted by EnBuFriend are discussed below. Executives between the age group of 25 to 45 can be targeted by EnBudfriend. People between the age group of 25 to 45 are in executive position and hence, they will look for ways by which they can save their money. EnBuFriend will help the customer to petrol and this can be huge saving. Apart from that, people in this age group dont prefer to buy car because of the petrol cost associated with it. With the help of EnBuFriend, people with low income can also save money and buy a car. The car will be initially introduced in developed countries only. The people in developed countries have better understanding of eco-friendly cars and hence, they will opt for these cars. Apart from that, the developed nations governments continuous force their people to stick to norms that can safeguard the environment and hence, they will prefer to buy these kind of cars rather than that of the expensive cars which are available in the market. Tech-savvy customers will be more than happy to buy EnBuFriend car because of the features that the cat will offer. The car will be very comfortable to the driver because of the features but again the customers should be willing to explore the features. A person who is not very techno-freak will not like the car because things will not be simple as it would be in other cars. There will be plenty of other features as well and these features will not be there in other cars (Enkel 2009). Positioning of EnBuFriend EnBuFriend Car should be positioned smartly so that the right set of people is motivated to buy the car. If the car is not positioned properly then there are very high chances that the car will be a failure as it will not be liked by anyone. Few of the ways by which the car with be positioned in the market are discussed below. Be environmentally friendly is one of the core features that is offered by this car so it should reach out to people who are willing to do some good for the environment. The car will be positioned as a car that can contribute to the green initiatives that every individual is taking. If a person is concerned about the environment and if they are undertaking simple small things to reduce the impact of negative things on the environment then they will be able to connect themselves with the positioning. EnBuFriend car will be positioned as a budget friendly car for the executives. The executives are bothered about the money that they will be spending on the petrol for everyday travel and hence, they can opt for electric car. The electric car can charge their car with electricity or they can charge their car with solar energy. This will ensure that the executives have their personal vehicle to travel around and at the same time, they can be rest assured that they arent spending a huge amount of money on petrol (Dyer 2001). The target audience will be explained that they are spending huge money in maintenance because of the usage of petrol but the executives need not spend much money on maintaining EnBuFriend car. EnBuFriend car is for people who are conscious about the money that they are spending and hence, the management will ensure that they are made aware of the savings. This will motivate them to buy this car. This car is only for people who are techno freak. This car will ensure that the driver has plenty of features to enjoy the drive. Most of the people have a person that having an electric car would mean that they will have to compromise on the features of luxury car and also the comfort but the users of EnBuFriend can be rest assured that they will not have to suffer. EnBuFriend will have the best of features and the car is designed by way of keeping the drivers comfort in mind so they can be sure that they will get the best of features at a most affordable price (Dess 2005). SWOT analysis of EnBuFriend There are various strengths, weaknesses, opportunities and threats associated with EnBuFriend so it is the responsibility of the management to understand the various aspects so that the business can be planned accordingly. Few of strengths, weaknesses, opportunities and threats are discussed below. Strengths There are various strengths of EnBuFriend so it is the responsibility of the management to understand the strengths and work on it. Few of the strengths of EnBuFriend are as follows: - EnBuFriend car is cheap to produce and hence, manufacturer can produce cars in huge quality. If an organization is planning to start with the manufacturing of regular cars then it would be expensive but that is not the case with an electric car. EnBuFriend doesnt need any maintenance. The users can be rest assured that they arent going to spend a part of their fortune in maintaining the electric car that they have purchased. EnBuFriend is well planned and hence, the mileage that the car can get from charging the car for 2 hours in a day would be sufficient enough for the complete day travel. Apart from that, the user can take the car for a long drive as well if they can charge the car using solar energy. In the future, when EnBuFriend becomes popular among the users, the production capacity can be increased. The cost of production is low and hence, the management can be rest assured that they can produce more cars to sell more cars. The research and development of EnBuFriend is better than that of the any other electric car. They will ensure that they are able to understand the requirements of the customers and accordingly innovation is done. EnBuFriend ensures that they leave spoke for development open rather than that of keeping the development intact. This will allow the customers to modify the car as per their requirement rather than that of sticking to what is readily available (Faems 2010). Weaknesses There are various weaknesses as well in the organization so the management should understand the weakness and work accordingly so that the organization can improve continuously. Few of the weaknesses which needs to be worked upon by the management of EnBuFriend are as follows: - The batteries that is installed in the electric car is heavy and hence, they the weight of the car also increases. Installation of small batteries would mean that the capacity of holding power is reduced. Unlike the petrol and diesel based cars, the capacity of holding electric power reduces in the electric power. If the user uses the electric car extensively then there are possibilities that the capacity of holding power is reduced in a years time. After the battery gets old, the user will have to charge the battery for longer. The dealer network is small and there very high possibilities that none of the dealer will be willing to have this car in their showroom. If this happens then reaching the target audience would be a difficult thing. Customers trust in this segment is already very low because of the previous electric cars that were introduced by other company. Now it will be difficult for EnBuFriend to gain the trust in the electric car segment. The top of electric car is very low as compared to that of the regular vehicle. This is one of the reasons due to which people reconsider buying this car. Opportunities There are plenty of opportunities in the open market for EnBuFriend. It is the responsibility of the management to understand and explore the opportunities so that they can grow rather than that of being stagnant. Few of the opportunities that can be seen by EnBuFriend for their nearby future are as follows: - The government from different countries will support the Electric car project because every country today is willing to save the planet. EnBuFriend can take help from the home government to sponsor their electric car and this will help them to get easy access to funds required. The management of EnBuFrined can request the government to give road tax breaks for electric cars. This will ensure that more and more people are motivated to buy electric car because people are will to buy electric car to save money and this cat will save further money. The battery technology is evolving fast and hence, EnBuFriend can be rest assured that they will be able to produce the best possible battery that can run without being charged for a longer time period. Not only the government and large organization are trying to go green but also the individuals are willing to do their part of good to the environment. These individuals will buy EnBuFriend because they know that this is green (Francis 2005). Threats There are various threats associated with EnBuFriend so it is the responsibility of the management to identify them and work on it so that they dont create an impact on the business. Few of the threats associated with EnBuFriend are as follows: - EnBuFriend has taken lot of grants from the government and at the same time, they have taken loan from banks. It is the responsibility of the management to ensure that they are able to return back all the money. BMW, Mercedes and other such big names may enter the electric car market in the near future. If these cars enter the electric car market then there are very high chances that people will opt for these brands rather than that of small upcoming brands because of the brand name that they hold. Hybrid and diesel technology is evolving faster than anyone can think about. There are very high possibilities that Hybrid cars will be opted by people over the electric car. Hydrogen powered vehicle is the talk of the town and there are very possibilities that the speed lovers will opt for that rather than that of other cars. Hydrogen technology isnt creating much impact on the environment and hence, the environment lovers will also love it (Freeman 2007). Micro environment of EnBuFriend Various things in the Micro environment will create an impact on the EnBuFriend. It is the responsibility of the EnBuFriend to understand the various groups so that their request can be well understand. Few of the expectations that the micro environment has from EnBuFriend are discussed below. Employees play a very crucial role in the organization. It is the responsibility of the management to understand the expectations that they have so that it can be fulfilled. The employees should be give salary as per the market standards and also incentives for the achievement that they do. This will motivate the employee to work better and stay back with the organization for a longer duration. The employees have the potential to make or break the organization because they are the one who directly with the customers. Suppliers also play a crucial role in the betterment of EnBuFriend. EnBuFriend doesnt undertake all the production in the organization as most of the production work is outsourced. It is the responsibility of the management to pay good and competitive price to the suppliers so that they are motivated to provide good quality. If the suppliers are under-paid then they will provide low quality and this will create an impact on the whole product quality. Quality standards should be set so that the management can be rest assured about the quality of goods that they receive. On the other end, EnBuFriend should conduct annual audits so that the suppliers are motivated to the quality mentioned (Garvin 2006). Customers are the most important part of the micro environment. The management should look for ways by which they can understand the expectations of the customers so that EnBuFriend can be innovate accordingly. If the management of EnBuFriend is not willing to change then there are very high possibilities that they will be stagnant and hence, some other competitor will take number one position in the electric car market and EnBuFriend will be left behind. Shareholders of the organization should also be considered by the management of EnBuFriend. It is the responsibility of the management to keep the shareholders informed about the financial transaction in the organization. If the shareholders arent informed about the financial status of the organization then there are high possibilities that the shareholders will draw back their money and the organization will be in loss. Competitors play a very crucial role in the micro environment of EnBuFriend and they cannot be ignored at any cost. The management of EnBuFriend should keep a close watch on the moves of the competitors. Accordingly, EnBuFriend should also make the move so that they can retain their competitive position in the market. EnBuFriend should understand the moves of the competitor and plan something better so that they can retain the competitive position and also the customers that they have (Herzog 2011). Macro environment trends and EnBuFriend Macro environment may seem to be irrelevant to EnBuFriend but it is the responsibility of the management to track it. If the management ignores the trends in the macros environment then survival will be a difficult task to achieve. Various trends in the macro environment can create an impact on EnBuFriend and they are discussed below. Economics of the target market needs to be considered by EnBuFriends management. If the people in the country arent financially strong then they may opt for a car. Introduction of a car is always recommended in a developed economy because there are very high chances that people will not make investment in car when they are struggling to fulfill their basic requirements. Technological advancements in the environment should be considered. If the technological advancements are ignored by EnBuFriend and if they continue to do the same task then EnBuFriend will be technologically weak. To meet the customer requirements, the organization should be ahead of competition and the only way to achieve that would be understand the technological advancements and implement it accordingly. The social and cultural impact can also create an impact on the sale of EnBuFriend. If the people in the country are willing to be environmentally friendly then it is highly recommended to enter in that country. If people arent willing to be environmentally friendly then they may not accept the car. Socially and culturally, developed nations are accepting electric cars and hence, EnBuFriend should try to flourish in developed nations rather than that of developing and under-developed nation (Holmberg 2011). 7Ps of marketing for EnBuFriend All the 7Ps of marketing should be used effectively by EnBuFriend so that they can reach the target audience. The different Ps of marketing and its impact on EnBuFriend is elaborated effectively below. Product Electric car is the product that EnBuFriend is willing to provide to the customers. This is not like the other cars available in the market and hence, it is the responsibility of the marketing team to benefits that one can derive from the car. The car is environmentally friendly and hence, this is meant for people who are conscious about the environment in which they live. The car can be charged with the help of electricity or solar power. Price EnBuFriend car can be afforded by all and hence, it is available at a very affordable price. This car is available for $1,50,000. This car is for the executives who are not willing to shell out a lot of money in the car that they will be driving. EnBuFriend is cheap and at the same time, they can charge the car at home and hence, additional petrol and diesel expenses can be avoided (Holmberg 2009). Place This car will be initially introduced in the USA and UK. These are developed nations and people from this part of the globe are willing to reduce the impact on the environment. This will be available to people through the various EnBuFriend outlets that will be available. Most of the dealers are dependent on the incentives that they get to promote the car and hence, EnBuFriend will set up its own outlets along with dealer outlets. EnBuFriend will be marketed so that the people are motivated to walk-in in the outlet and buy the electric car that they would like to buy (Lecocq 2009). Promotion Various promotional strategies will be used by EnBuFriend so that they can survive in the market. Few of the promotional strategies that will help the organization to be known among the target audience are discussed below. Advertisements on television will be placed so that the target audience can be aware of the existence of EnBuFriend. The advertisements will be placed during peak hours so that everybody can be aware of the new electric car that is available in the market. Advertisements will be placed on newspaper and magazine. This will help the people to understand the expectations that they have from the car. Apart from that, the customers will be motivated to take test drive so that they can understand the benefits and comforts that they can get from this car. The test drive will be for free of cost and this will be for all the people who are motivated to do their good for the environment. Online marketing will be done extensively so that the customers are motivated to acquire more knowledge about the product. This will motivate the customers to visit the website of EnBuFriend. The details of the visitor will be tracked with the help of cookies and marketing emails will be sent. Marketing emails will also be send to people who has given their email ID at various car related events (Adn 2008). People Plenty of people are associated with EnBuFriend so all of them need to be understood by the management. To start with, the management will start with the employees. All the employees will be trained to communicate to the employees. They will also be given training regarding the technical features of EnBuFriend so that they can sell the products smartly. The employees will be provided soft skill training so that they can be polite with the customer. The customer will be taken care by the employees. If there is any complaint from the customer that will be understood and the management will ensure that any such problem is avoided in the near future (Lehmann 2009). Physical evidence Various physical evidences will be created so that the customer is motivated to reach the location. Banners will be put at regular intervals so that the customers can see and search for more information. The advertisements on magazine can also act as physical evidence. Outlets are one of the places where in the customer will get the touch and feel of the product. It is responsibility of the employees to share complete information about the product. Giving test drive is one of the best physical evidence that can be created. The employee can touch and feel the product. Process The complete process will be automated so that the management can be rest assured that there arent any manual errors. Once the manufacturing of vehicle is done, the management should give technical training to the sales executive. The sales executive will share the same information with the customer. The customer will opt for test drive if they are willing to get a better experience of the vehicle. Lastly, the customer will make the payment and buy the car (Lorenzoni 1995). Conclusion Initially, it may seem to be complicated to reach the target market but this can be achieved with extensive marketing. A marketing plan will be in place so that the target market is motivated to be environmentally friendly and also save the huge money that they are investing in the car and also the petrol. This car is only for people who are techno freak. This car will ensure that the driver has plenty of features to enjoy the drive. Most of the people have a person that having an electric car would mean that they will have to compromise on the features of luxury car and also the comfort but the users of EnBuFriend can be rest assured that they will not have to suffer. References Adn, E., Barray, A. (2008). Go Green in the Automotive Industry . Kalmar: Baltic Business School. Aggeri, F., Elmquist, M., Pohl, H. (2009). Managing learning in the automotive industry the innovation race for electric vehicles. International Journal of Automotive Technology and Management , 9 (2), 123-147. Beaume, R., Midler, C. (2009). From technology competition to reinventing individual ecomobility: new design strategies for electric vehicles. International Journal of Automotive Technology Management , 9 (2), 174-190. Belderbos, R., Faems D, L. B. (2010). Technological activities and their impact on the financial performance of the firm: Exploitation and exploration within and between firms. Journal of Product Innovation Management , 27 (6), 869-882. Chesbrough, H., Crowther, K. (2006, June). Beyond high tech: early adopters of open innovation in other industries. RD Management , 36 (3), pp. 229-236. Chiaroni, D., Chiesa, V., Frattini, F. (2010). Unraveling the process from closed to open innovation: evidence from mature, asset-intensive industries. RD Management , 40 (3), pp. 222-245. Ebersberger, B., Bloch, C., Herstad, S. J., Van de Velde, E. (2010, November). Open innovation practices and their effect on innovation performance. International Journal of Innovation and Technology Management . Enkel, E., Gassmann, O., Chesbrough, H. (2009). Open RD and open innovation: Exploring the phenomenon. RD Management , 39 (4), pp. 311-316. Dyer, J., Kale, P., H., S. (2001). How to Make Strategic Alliances Work. MIT Sloan Management Review , 42 (4), pp. 37-43. Dess, Gregory, G., Lumpkin, G. (2005). The Role of Entrepreneurial Orientation in Stimulating Effective Corporate Entrepreneurship. Academy of Management Executive , 19 (1), 147-156. Faems, D., Visser, M., Andries, P., Looy, B. V. (2010). Technology alliance portfolios and financial performance: Value-enhancing and cost-increasing effects of open innovation. Journal of Product Innovation Management , 27 (6), 785-796. Francis, D., Bessant, J. (2005). Targeting innovation and implications for capability development. Technovation , 25 (3), 171-183. Freeman, J., Engel, J. (2007). Models of Innovation: Start-ups and Mature Corporations. California Management Review , 94-119. Garvin, D., Levesque, L. (2006, October). Meeting the Challenge of Corporate Entrepreneurship. Harvard Business Review , 2-12. Herzog, P. (2011). Open and Closed Innvation, Different Cultures for DIfferent Strategies (2nd ed.). Heidelberg, Germany: Gabler. Holmberg, S. (2011). Emerging Green-Technology Entrepreneurs: Entrepreneurial Pathways to Growth in the Hybrid and Plug-In Hybrid/Electric Vehicle Space . ICSB World Conference Paper, (pp. 3-8). Stockholm. Holmberg, S., Cummings, J. (2009). Building Successful Strategic Alliances: Strategic Process and Analytical Tool for Selecting Partner Industries and Firms. Long Range Planning , 42 (2), 164-193. Lecocq, C., Looy, B. V. (2009). The impact of collaboration on the technological performance of regions: time invariant or driven by life cycle dynamics? An explorative investigation of European regions in the field of Biotechnology. Scientometrics , 80 (3), 845-865. Lehmann, F. (2009). Collaboration with future competitors and partners beyond your current industry, A case study on Tesla Motors. Copenhagen Business School, Copenghagen. Lorenzoni, G., Baden-Fuller, C. (1995). Creating a strategic center to manage a web of partners. California Management Review , 37 (3), 146-163.

Friday, November 29, 2019

Discipline Essays - Pedagogy, Educational Psychology, Human Behavior

Discipline Discipline is more than keeping a group of children or young people quiet while being talked to. Preserving good behavior is certainly one aspect to discipline, for learning it in an atmosphere of confusion is difficult. Children have to learn to conform to the rules of behavior needed in a classroom. Teachers have the right to ask for a quiet class, keep the students in their seats, and have the right to discipline them if they do not cooperate. When a teacher expresses his or her thoughts, feelings, and beliefs in direct, honest, and appropriate ways that do not violate the right of others, and when the message does not humiliate, degrade, or dominate the one being talked to, he or she is using Assertive Discipline. In order for a teacher to maintain control of his or her class they must use Assertive Discipline. In order for a teacher to have his or her needs met, they can influence the behavior of the children. Without influence a teacher is "powerless" and will become "burned out." (Canter, 2) There is no simple answer to why this happens. A number of complex factors have combined to create an environment in which teachers are having trouble in getting personal and professional needs met. Until the past decade, the teacher was looked at as the main person in the classroom by students and parents. The teacher, simply because of their role status, had respect and authority. Thus, the teacher was a "powerful" figure in the eyes of the students and could easily influence the student's behavior, often with just a look, smile, or a threat.(Canter,3) All of that is now changed. Today, a teacher has to earn the respect of both the students and their parents. A teacher's basic techniques of influence, or discipline, is no longer as effective as getting the desired results. The discipline approaches of the 1950's and 1960's do not work with the students of the 1990's. In addition, the teacher cannot rely on the strong support of the parents anymore. Many parents are openly questioning, the education that their children are receiving, and do not feel they want to support the needs of their child's teachers. Teachers cannot get their needs met in a classroom unless they have an effective method of discipline in which they thoroughly understand and comfortable utilize. An assertive teacher is: "One who clearly and firmly communicates his or her wants and needs to his or her students, and is prepared to reinforce their words with appropriate actions." (Canter,9) When a teacher is assertive, and clearly and firmly communicates their wants and feelings to a child, they send a clear message. This message simply states: "I mean what I say and say what I mean."(Collins, 155) Lee Canter, a child guidance specialist, has found that while most teachers make lesson plans as a routine matter, very few make discipline plans. Planning is essential to teaching well. Lesson planning is second nature to teachers. Lesson plans are part of a professional routine, and are done almost automatically when the need arises. However, planning for discipline is an entirely different story. The vast majority of teachers have learned or have been exposed to the steps involved in planning discipline programs, especially those to be used specifically with disruptive students. Because of teachers' frustrations, all we often hear is their complaining about how difficult the students really are. Such complaining may help to relieve the strain of dealing with difficult students, but it in no way helps to solve the problem. Planning your discipline efforts, and utilizing assertive principles, are as essential to teaching as a lesson plan. (Charles,128) Discipline planning will structure and guide classroom management efforts the same as lesson planning for academic efforts. Discipline plans are important and helpful to all teachers. Charles, urges to make discipline plans according to the following steps: 1) Identify any existing or potential discipline problems. 2) Specify the behaviors you want the students to eliminate or engage in. 3) Decide on negative and positive consequences appropriate to the student and situation. 4) Decide how to execute the negative and positive consequences.(Charles, 129) Discipline planning is the systematic applications of the assertive principles the teacher exhibits. It involves focusing your attention on any existing or potential discipline problems you may have. These discipline problems may involve an individual student, or a group of students, or an entire class. Having good discipline enables the teacher

Monday, November 25, 2019

Jean-Baptiste Bernadottes Role in the Napoleonic Wars

Jean-Baptiste Bernadottes Role in the Napoleonic Wars Born at Pau, France on January 26, 1763, Jean-Baptiste Bernadotte was the son of Jean Henri and Jeanne Bernadotte. Raised locally, Bernadotte elected to pursue a military career rather than become a tailor like his father. Enlisting in the Rà ©giment de Royal-Marine on September 3, 1780, he initially saw service in Corsica and Collioure. Promoted to sergeant eight years later, Bernadotte attained the rank of sergeant major in February 1790. As the French Revolution gathered momentum, his career began to accelerate as well. A Rapid Rise to Power A skilled soldier, Bernadotte received a lieutenants commission in November 1791 and within three years was leading a brigade in General of Division Jean Baptiste Klà ©bers Army of the North. In this role he distinguished himself in General of Division Jean-Baptiste Jourdans victory at Fleurus in June 1794. Earning a promotion to general of division that October, Bernadotte continued to serve along the Rhine and saw action at Limburg in September 1796. The next year, he played a key role in covering the French retreat across the river after being defeated at the Battle of Theiningen. In 1797, Bernadotte left the Rhine front and led reinforcements to the aid of General Napoleon Bonaparte in Italy. Performing well, he received an appointment as ambassador to Vienna in February 1798. His tenure proved brief as he departed on April 15 following a riot associated with his hoisting of the French flag over the embassy. Though this affair initially proved damaging to his career, he restored his connections by marrying the influential Eugà ©nie Dà ©sirà ©e Clary on August 17. The former fiancà ©e of Napoleon, Clary was sister-in-law to Joseph Bonaparte. Marshal of France On July 3, 1799, Bernadotte was made Minister of War. Quickly showing administrative skill, he performed well until the end of his term in September. Two months later, he elected not to support Napoleon in the coup of 18 Brumaire. Though branded a radical Jacobin by some, Bernadotte elected to serve the new government and was made commander of the Army of the West in April 1800. With the creation of the French Empire in 1804, Napoleon appointed Bernadotte as one of the Marshals of France on May 19 and made governor of Hanover the following month. From this position, Bernadotte led I Corps during the 1805 Ulm Campaign which culminated with the capture of Marshal Karl Mack von Leiberichs army. Remaining with Napoleons army, Bernadotte and his corps were initially held in reserve during the Battle of Austerlitz on December 2. Entering the fray late in the battle, I Corps aided in completing the French victory. For his contributions, Napoleon created him Prince of Ponte Corvo on June 5, 1806. Bernadottes efforts for the remainder of the year proved rather uneven. A Star on the Wane Taking part in the campaign against Prussia that fall, Bernadotte failed to come to the support of either Napoleon or Marshal Louis-Nicolas Davout during the twin battles of Jena and Auerstdt on October 14. Severely reprimanded by Napoleon, he was nearly relieved of his command and was perhaps saved by his commanders former connection to Clary. Recovering from this failure, Bernadotte won a victory over a Prussian reserve force at Halle three days later. As Napoleon pushed into East Prussia in early 1807, Bernadottes corps missed the bloody Battle of Eylau in February. Resuming campaigning that spring, Bernadotte was wounded in the head on June 4 during fighting near Spanden. The injury forced him to turn command of I Corps over to General of Division Claude Perrin Victor and he missed the victory over the Russians at the Battle of Friedland ten days later. While recovering, Bernadotte was appointed governor of the Hanseatic towns. In this role he contemplated an expedition against Sweden but was forced to abandon the idea when sufficient transports could not be gathered. Joining Napoleons army in 1809 for the campaign against Austria, he took command of the Franco-Saxon IX Corps. Arriving to take part in the Battle of Wagram (July 5-6), Bernadottes corps performed poorly on the second day of fighting and withdrew without orders. While attempting to rally his men, Bernadotte was relieved of his command by an irate Napoleon. Returning to Paris, Bernadotte was entrusted with command of the Army of Antwerp and directed to defend the Netherlands against British forces during the Walcheren Campaign. He proved successful and the British withdrew later that fall. Crown Prince of Sweden Appointed governor of Rome in 1810, Bernadotte was prevented from assuming this post by an offer to become the heir of the King of Sweden. Believing the offer to be ridiculous, Napoleon neither supported nor opposed Bernadotte pursuing it. As King Charles XIII lacked children, the Swedish government began seeking an heir to the throne. Concerned about the military strength of Russia and wishing to remain on positive terms with Napoleon, they settled on Bernadotte who had shown battlefield prowess and great compassion to Swedish prisoners during earlier campaigns. On August 21, 1810, the Ãâ€"retro States General elected Bernadotte crown prince and named him head of the Swedish armed forces. Formally adopted by Charles XIII, he arrived in Stockholm on November 2 and assumed the name Charles John. Assuming control of the countrys foreign affairs, he began efforts to obtain Norway and worked to avoid being a puppet of Napoleon. Fully adopting his new homeland, the new crown prince led Sweden into the Sixth Coalition in 1813 and mobilized forces to battle his former commander. Joining with the Allies, he added resolve to the cause after twin defeats at Lutzen and Bautzen in May. As the Allies regrouped, he took command of the Northern Army and worked to defend Berlin. In this role he defeated Marshal Nicolas Oudinot at Grossbeeren on August 23 and Marshal Michel Ney at Dennewitz on September 6. In October, Charles John took part in the decisive Battle of Leipzig which saw Napoleon defeated and forced to retreat towards France. In the wake of the triumph, he began actively campaigning against Denmark with the goal of forcing it to cede Norway to Sweden. Winning victories, he achieved his objectives through the Treaty of Kiel (January 1814). Though formally ceded, Norway resisted Swedish rule requiring Charles John to direct a campaign there in the summer of 1814. King of Sweden With the death of Charles XIII on February 5, 1818, Charles John ascended to the throne as Charles XIV John, King of Sweden and Norway. Converting from Catholicism to Lutheranism, he proved a conservative ruler who became increasingly unpopular as time passed. Despite this, his dynasty remained in power and continued after his death on March 8, 1844. The current King of Sweden, Carl XVI Gustaf, is a direct descendent of Charles XIV John.

Thursday, November 21, 2019

Consumer Protection Essay Example | Topics and Well Written Essays - 1500 words

Consumer Protection - Essay Example In order to deal with obstacles in contracts, the government must interfere with free contracts in a negative manner that to the majority of citizens it would seem positive. According to Green, the government had assumed unlimited powers of intervention (Gerven, Stuyck and Wouters 2001). According to Green’s statement, not citizen should be forced to enter in to a contract that is against his free will. Green emphasizes on the need of the government to intervene since it would be able to prevent tragedies from happening. According to Green, the government should promote and safeguard social, economic and political environments so that individuals can act freely according to their will (Howells 2010). However, the government should not excessively intervene in the consumer contracts since it may curtail the ability of individuals to act according to the conscience thus slowing down economic growth and development. The government is supposed to intervene in matters that endanger the consumer rights and liberties (Jones and Hutter 2011). According to Green, the State has the final decision in deciding how the industries should be regulated in order to safeguard the rights of the consumers (Howells and Weatherill 2005). ... The government also protects the consumers through regulations on information dissemination that aim at remedying the high market transactions costs and market distortions (Hancher 1990). The government also protects the rights of consumers on the standards of services offered by service providers like the medical services, insurance services and banking services. The government has a duty to protect the welfare of consumers in contracts, consumers rights are protected during bankruptcy proceedings (Gunning, Holm and Kenway 2009). There are numerous laws that protect consumer interests in the UK. For instance, the competition Act 1998 prohibits businesses from engaging in anti-competitive agreements during the course of their business operations (Goldring 1998). Some of the anti-competitive practices that have been outlawed are price fixing, agreements to reduce the volume of production, carve up markets and customer discrimination by charging different prices when difference of supp ly does not exist. The Act prohibits the businesses from use of dominant market power, like 40 percent market share to impose unfair trading practices to the consumers or to decline supplying to the existing customers without any justifiable reasons. Penalties for anti-competitive practices range from 10 percent of the company turnover to disqualification of the business directors (Turner and Martin 2005). In the UK, numerous Acts of Parliament have outlined the responsibilities of sellers to buyers. All the transactions between the buyer and seller are governed by a contract. According to the Sale of Goods Act of 1979, the goods sold must adhere to the description provided to the buyer.

Wednesday, November 20, 2019

Lizardo vs Denny Inc. NDI Case Study Example | Topics and Well Written Essays - 750 words

Lizardo vs Denny Inc. NDI - Case Study Example In handling the situation, the security guards and the Denny’s management should have calmly sorted out the issue, therefore avoiding the extremism they found themselves in. In a country having high racism records, the affected races were bound to be paranoid and treatments from the major races that seemed unfavorable were construed to be discrimination.Having this at the back of their minds, it would have been therefore proper that the when Chiu complained of the long wait and introducing the element of discrimination , to be explained to that there were others on the waiting list long before them. A customer’s complaint should have been addressed soberly and not with annoyance of Ms. Kirts and the subsequent ejection of Lizardo, the second complainant to their services.The security guards reaction and the shoving of the two plaintiffs’ was a clear indication that Mr. Adam had personalized the whole issue which should not have been the case. The security guard s hould not even have involved himself in the word exchange as this aggravated the tension and led to the physical fights. He should have however restrained himself from anything that would suggest to the paranoid plaintiffs that they were being discriminated against.The manager on the other hand also seemed to have personalized the issue and the African American complaint of the security guard is taken as an offence leading to the profane respond that made them be ejected too out of the restaurant.

Monday, November 18, 2019

Final Project Essay Example | Topics and Well Written Essays - 1750 words

Final Project - Essay Example However they soon diversified their portfolio and ventured into selling DVDS, CDs, and MP3 downloads software’s, games, electronics, food, toys, furniture and apparel. They started spreading out from United States and established bases in Canada, the United Kingdom, Germany, France, Japan and China. A business model is also termed as a business design. It is the way in which a business intends to specify a value proposition for its targeted customers, it’s positioning and it’s financial model. In other words, it is a summary of how the company intends to serve its customers, in what areas does it intend to serve its customers and what would be its product offering. At the Inception of Amazon.com, the delivery of information, services and goods to end customer was employed as its business model. It was called the â€Å"Online Retailer of Physical Good†. Under this model, manufactured products are sold online and there is a lot of dependency on third party providers. Third party providers are needed to maintain a continuous stock of supplies. Of the four types of e-commerce business models out there, Amazon uses the Business to consumer e-commerce (B2C) model. The B2C models focuses on direct selling of goods and services to the customer. This is done via online catalogs and shopping cart transaction systems. Amazon uses the virtual market place, a subtype of B2C model. Amazon became known for its feel-friendly culture when it was first launched. It was keen on recruiting the brightest, versatile and most intelligent people on the block. Its leaders tried to inculcate the same vision that they had for Amazon in the minds of their employees too. They believed in sharing hard work and fun at work. While employees were paid less than the market rates, they were given enough empowerment to feel happy and wanted at Amazon. Under its cost leadership strategy Amazon has stood out by offering rock-bottom prices. It provides good

Saturday, November 16, 2019

Authenticated Color Extended Visual Cryptography

Authenticated Color Extended Visual Cryptography Authenticated Color Extended Visual Cryptography with Perfect Reconstruction R. Sathishkumar, Gnanou Florence Sudha Abstract Visual Cryptography Scheme (VCS) is an image safeguarding scheme which encrypts the secret text based image into multiple binary images called shares, which are then transmitted to participants. These shares are then stacked over by the participants to decrypt the secret image, however with reduced quality. In Extended Visual Cryptography Scheme (EVCS), these binary shares are encoded with cover images to generate meaningful shares. In order to enhance the decoded EVCS secret image quality, Two in One Image Secret Sharing Scheme (TiOISSS) was implemented, which offers perfect retrieval of the secret image. In this proposed scheme, the TiOISSS implemented for color secret image with meaningful color shares with perfect reconstruction is proposed. This scheme uses Adaptive Halftoning technique to improve the EVCS image quality. Further, a color authenticated image and a text message are encoded in the meaningful color shares to suppress any fake shares from the intruders, thu s improving the security of the proposed scheme. Experimental results depict that the improvement in quality and security of the scheme. Index Terms Image Security, Visual Cryptography Scheme, Adaptive Halftone, Polynomial Image Secret Sharing, I. Introduction With the swift development in the networking technologies, digital data are transmitted across the world over internet. Thus, security has become a vital issue in both communication and the complex encryption gives ways to secure the information from the intruders. Image encryption has a vital role in variety of applications like telemedicine, medical image processing, military applications, etc. In the traditional way of encryption, the data will be encrypted with a security key and the decryption must be done with the same key. Hence, the security key is essential for proper decoding of the secret data. VCS is one such encryption method proposed by Naor and Shamir [1-2] to hide a secret image in the form of n noisy pictures called shares such that the secret data is retrieved by Human Visual System (HVS) by stacking the n shares. The traditional VCS is relaxed for threshold VCS in which at least any k number of shares are sufficient to decode the secret image [3-4]. The VCS has been proposed to hide the gray images by suitably halftoning it to binary images [5-7]. These schemes were proposed with noisy shares, that may invite intruders attention. R. Sathishkumar is with Department of Electronics Communication Engineering, Perunthalaivar Kamarajar Institute of Engineering and Technology (PKIET), Karaikal, India. ([emailprotected]) Gnanou Florence Sudha is with Department of Electronics Communication Engineering, Pondicherry Engineering College, Puducherry, India. ([emailprotected]) By suppressing this weakness, VCS were implemented with meaningful shares from the cover images, and is referred as Extended Visual Cryptography Scheme (EVCS) [8-9]. The VCS has further been extended for natural color images. Rijmen et al [10] proposed a VCS for color secret image with pixel expansion, in which each secret color pixel is expanded into a block of 22 color sub-pixels to generate two color shares. Huo et al [11] proposed the VCS for gray-level and color images using color decomposition and halftone technology, while retaining the advantage of traditional monochrome visual cryptography. Huo et al [12-13] proposed an improved model by using binary encoding to represent the sub-pixel blocks. In [14], Huo et al adjusted the contrast to reveal the secret image with better quality, but the noisy shares reveal the secrecy of the image. Der et al [15] proposed a color VCS with an additional authentic image, but the scheme suffers from the visual quality. Polynomial image secret sharing (PISS) was implemented with perfect decoding of secret image [16]. In [17], Sian et al implemented a Two in One Image Secret Sharing Scheme (TiOISSS) wherein the vague secret image is decoded using VCS in the 1st decoding stage and the better quality secret image is decoded using PISS using computations. Peng et al [18] improved the TiOISSS using GVCS with gray PISS values in the shares. Srividhya et al [19] improved the TiOISSS image quality by applying adaptive halftoning. However, the scheme is implemented for gray images with noisy shares. In [20], TiOISSS was implemented for meaningful shares, but the lossless recovery of the decoded image was not achieved. The existing model of TiOISSS are implemented for gray images and generates noisy shares and that may invite the intruders to insert the fake shares. In this proposed scheme, existing TiOISSS [20] is extended for natural color image with RGB color decomposition method. Further, before applying PISS algorithm, the color secret image is permuted at bit level, block level and pixel level to improve the security. This scheme generates meaningful shares based on the color cover images. Additionally, a color authentication image and a textual secret message are shared to validate the authenticity of the decoded secret image. Experimental results of the proposed scheme show that the weaknesses of the existing TiOISSS schemes are attempted, color TiOISSS are implemented with the enhanced quality and improved security. This paper is organized as follows. The VCS for gray scale and color images, TiOISSS and its related works are discussed in section II. The proposed Authenticated Color VCS is discussed in section III. The experimental results are discussed in section IV. The Quality analysis and Security analysis are discussed in section V and section VI. The conclusion is presented in section VII. II. Related Works The objective of the proposed scheme is to extend the TiOISSS for color images, with improved quality and perfect reconstruction. This section discusses the related works pertaining to existing TiOISSS and its limitations. Visual Cryptography Scheme Moni Noar and Adi Shamir implemented the visual secret sharing scheme in 1994 [1], which requires computations only in the encryption stage. The decoding of secret image is done by human visual system (HVS). In (k, n) threshold visual secret sharing scheme, n noise like shares are generated. Any k or more number of shares are required to decode the secret image. With (k-1) or lesser shares, the secret cannot be reconstructed. In basic (2, 2) VCS, every binary secret image pixel is expanded into 22 sub-pixels in the 2 number of noisy shares, as per the sub-pixel coding table shown in Fig. 1. For every white pixelof the secret image, any one out of the six sub-pixels are randomly selected for both the shares. Similarly, for every black pixel of the secret image, any one out of the six sub-pixels are randomly selected for share 1, and its compliment sub-pixels for share 2. Thus, by stacking the two shares, the white pixels are decoded with 50% gray level. However, the black pixels are reconstructed with full black sub-pixels. With the individual shares which has equal percentage of white and black pixels, the secret image information is not revealed. The share size and therefore the reconstructed image are doubled due to pixel expansion. Fig. 1 Sub-pixel coding table Adaptive Halftoning Halftoning technique is a process of converting the continuous tone image to monochrome image or binary image. The VCS is generally suited for monochrome images. Many techniques like AM halftoning, FM halftoning, etc. are available for converting the gray scale image to binary image. In [16-18], Error diffusion based on FM halftoning with is implemented. But, this results in scattered white pixels in the place of darker areas of gray image. The proposed work utilizes the Adaptive Halftoning [19] where in the dynamically determined threshold for halftoning, results in better contrast for both constantly varying images and sharp transition images. The human eye perceives the tiny dots as white and denser dots as black, in the halftoned image. A gray scale image and its halftoned image is shown in Fig. 2. Fig. 2 a) Continous tone b) Halftone Extended Visual Cryptography Scheme (EVCS) The shares generated in the VCS bears a noise like image. Though, it may reveal no clue about the secret image, it may however raise suspicions about the secret. In order to overcome the weakness of noise like VCS shares, they are embedded with the individual cover images, thus generating the meaningful shares. The VCS with meaningful shares are referred as Extended Visual Cryptography Scheme (EVCS). The meaningful shares depict the cover image and not the secret image. However, on overlapping the meaningful shares, the secret image is decoded. Color Visual Cryptography Scheme Conventional VCS is applicable only for binary images. For grayscale image, it is to be halftoned to binary image as discussed in section II-B. In the proposed scheme, adaptive halftoning is implemented. The color image is generally constituted by either subtractive or additive models as in Fig. 3. Fig. 3 a) Subtractive model, and b) Additive model In the subtractive model, with primary color components as cyan (C), magenta (M) and yellow (Y), the other colors can be obtained with proper mixing of CMY components. The color printer is based on subtractive model. In additive model, the desired color is achieved from proper mixing different Red (R), Green (G) and Blue (B) color components. By mixing the RGB components of equal intensity, white color can be obtained. Computer monitor is based on additive model. The secret color image can be decomposed into Red, Green and Blue frames. The individual frames will then be a gray pattern of the corresponding color components. These frames are adaptive halftoned to obtain the binary images which can be used for generation of shares in Red, Green and Blue components. By concatenating these RGB components of each shares, the corresponding color shares are obtained. Overlapping the color shares, the color secret image is decoded. Polynomial Image Secret Sharing Scheme (PISSS) PISS scheme was first implemented [16] to hide a secret image. Though, it contradicts the advantage of VCS, by involving mathematical calculations in both encrypting and decrypting stages, it offers perfect retrieval of the secret image pixels. The PISS is implemented for TiOISSS with perfect reconstruction [20]. The polynomial in equation 1, encodes the image pixels to cipher data, which is then embedded in GVCS shares. in which are the sequential k pixels of the image and P is the prime number. In the decoding phase, the Lagrange interpolation formula in equation (2) is used to derive the polynomial coefficients, By substituting the pixel position for , where, , keeping as the variable, the polynomial coefficients is derived, Further, the decoding polynomial equation can be derived by from the polynomial coefficient and the encoded image pixels in equation (3). The original secret pixel value can be retrieved from the equation (3), by substituting the image pixel position ,. A large prime number of 251, which is within the gray pixel range, can be considered for encrypting the grayscale image. TiOISSS Two in One Image Secret Sharing Scheme (TiOISSS) [18] combines the merits of both PISS to achieve perfect reconstruction VCS to decode the vague secret image by HVS. Hence, it involves two levels of encoding and decoding phases. The encoding phase starts with generating n VCS shares and n PISS shares from the same secret image, followed by replacing the black pixels of VCS shares by the gray-valued pixels of PISS shares to generate GVCS shares, which are transmitted through n users. In the decoding phase, the GVCS shares from the users are overlapped to reconstruct the vague secret image, in the 1st stage level with just HVS. This process does not require any mathematical computations. Further, Inverse PISS is applied to the gray pixels of GVCS shares to perfectly retrieve the secret image, in the 2nd stage level of decoding. III. Proposed scheme In existing TiOISSS [19], the noisy shares were generated, which make attract the intruders to create a fake shares to forge the legitimate user. In the proposed scheme, the existing TiOISSS is modified for color images. The meaningful color EVCS shares are generated by embedding a color authentication image. The RGB components of color secret image and the cover images are extracted as in Fig. 4. The modified TiOISSS is applied for each color components to generate the corresponding the color components of GVCS shares. By concatenating the RGB components, color GVCS shares are obtained. The vague color secret image and the authentication image can be decoded, in the first decoding phase. Additionally, to provide additional authenticity, a 216 bits of textual message is embedded in the two LSBs of white pixels of all GVCS shares, which are then decoded in the 2nd phase. The RGB components of color secret image and the authentication image are then retrieved by applying Inverse PISS. The stages involved in the proposed modified color TiOISSS with the generation of meaningful EVCS shares and including an authentication image are discussed in the following sections. EVCS Share generation EVCS shares are generated from the individual RGB components of the secret color image, authentication image and the cover image. The Left half of the secret image is considered for generating the left half of VCS shares (LS1 and LS2) as in Fig. 5. By considering the authentication image, the right half of VCS shares (RS1 and RS2) are generated. For each RGB components of the secret image, the following steps are followed to generate the corresponding RGB components of the VCS shares. 1.From the left half of secret image (LS), the left half of share1 (LS1) and the left half of share2 (LS2) are generated. 2.For every black pixel of the halftoned authentication image, corresponding subpixels of left half of share 2 (LS2) with one pixel modified from white to black is placed in the corresponding subpixel location of right half of share 1 (RS1). Thus, the RS1 and LS2 will decode the vague authentication image. 3.For each black pixels of RS, the corresponding sub-pixels of the right half of share 1 (RS1) with modified location of black pixels is placed in the corresponding subpixel location of right half of share 2 (RS2). 4.VCS shares are obtained by combining the left half and the right half of each shares. To overcome the weakness of noisy shares, cover images are embedded to generate the meaningful shares. Each RGB components of the VCS shares are processed as shown in Fig. 5, with the corresponding RGB components of the cover images. For every black pixel in each cover image component, the corresponding sub-pixel location of the respective VCS share component is modified such that one white pixel converted to black. The location of the converted black pixel depends on the pixel value of the secret image in the corresponding location. Thus, the EVCS shares components are generated from the VCS shares and the cover images. GEVCS Share generation The color secret image is first decomposed into RGB components and the pixels of each component are permuted in three levels to improve the security. In the proposed scheme, the 128 bit of encryption key is used as formatted in Fig. 6 is used to perform the permutation in bit level, block level and pixel level with respective 32-bit keys. The permutation order key defines the order of permutation performed which is required in reverse permutation operation. The GVCS share order defines the share order to be processed to retrieve the embedded key from the GVCS shares. The size of the textual secret message embedded in the GVCS shares is defined in the 16-bit Secret Message length. The PISS shares are generated from the permuted color secret image as detailed in section II-E. The resultant PISS values and the authentication color image pixels are embedded into the black sub-pixels are the EVCS shares. Prior to embedding these PISS values, it is truncated by a factor ÃŽÂ ±, (ÃŽÂ ± = 1, 2, à ¢Ã¢â€š ¬Ã‚ ¦ 16). This truncated value along with its remainder in GEVCS shares will be darker near to black, providing better visual quality. Thus, the truncated permuted PISS values, the color authenticated image and the textual secret message are embedded into EVCS shares to generate the GEVCS shares as detailed in the Fig.7. Decryption of the Secret image The decoding of the secret image is done in two phases. In the first phase, the two GEVCS shares are overlapped to decode the vague color secret image. To verify its authenticity, RS1 and LS2 of the GEVCS shares are superimposed to decode the authentication image. In the second phase of decoding, the encryption keys and the secret messages are extracted from the white pixels of each GEVCS shares. The PISS values are retrieved from the GEVCS shares. Inverse PISS is applied to reconstruct the secret image and the authentication image are perfectly. The process is explained in Fig.8. IV. Experimental Results The experimental results of the proposed Authenticated Color Extended TiOISSS with perfect reconstruction are discussed in this section. This scheme is implemented for truncation factor, ÃŽÂ ± = 7 and adaptive halftoning technique is applied for VCS share generation. The 256256 sized color secret image and the 256128 sized color authentication image are considered as shown in Fig. 9(a) 9(b). The color cover images of 256256 size are shown in Fig. 9(c) 9(d). The Adaptive halftoning version of the secret image and cover images are shown in Fig. 9 (e), 9(f) 9 (g). Applying VCS over the halftoned authentication and the secret image with pixel expansion, m = 4, two VCS shares of 512512 are generated and is shown in Fig. 9 (h) 9 (i). The GVCS shares generated from VCS shares by embedding PISS values as detailed in section III-B are shown in Fig. 9 (j) 9 (k). In the first level of decoding, the two GEVCS shares are overlapped to decode the vague color secret image. To verify the authenticity, LS2 and RS1 are overlapped to reveal the vague authentication image. They are shown in Fig. 9 (l) 9 (m). In the 2nd decoding phase, by applying Inverse PISS and reverse permutation over the extracted gray pixels of the GEVCS shares, the perfect reconstruction of both the color authentication image and the color secret image is decoded as shown in Fig. 9 (n) 9 (o). V. Quality Analysis The parameters like Contrast, Structural Similarity Index Measure (SSIM) Peak Signal to Noise Ratio (PSNR) of the Authenticated Color Extended TiOISSS are analysed. Contrast Contrast which represents the visual quality of the image, is given by the normalized difference between the mean grayness of the white secret pixels and the mean grayness of black secret pixels in the decoded image. In this scheme, contrast [20] is calculated among the group of decoded pixels valued more than the threshold, (C0) and the group of decoded pixels valued lesser than the threshold, (C1) and is given by, Contrast between the color secret image and its 1st decoded secret image for adaptive halftoning technique and between the authentication image and its 1st decoded output has been tabled in Table I for various truncation factor, ÃŽÂ ±. The contrast is improved SSIM It is a measure of resemblance between two images and it is calculated for two common sized (NÃÆ'-N) windows x and yof the two images. SSIM is given by where and are the average of y and x. and are the variance of x and y, is the covariance of x and y and are two variables to stabilize the division, L is the dynamic range of the pixel values and and by default. The SSIM between the color secret image and its 1st decoded secret image for adaptive halftoning technique and between the authentication image and its 1st decoded output has been tabled in Table I for various truncation factor, ÃŽÂ ±. The SSIM is improved resulting in increased similarity between the secret image and the decoded secret image. PSNR The Peak Signal to Noise Ratio (PSNR) is a measure to estimate the image quality between two images. Based on the pixel difference between the reconstructed image and the original image, PSNR is defined as where MSE denotes Mean Squared Error and s = 255, the maximum pixel value of the image. The PSNR between the color secret image and its 1st decoded secret image for adaptive halftoning technique and between the authentication image and its 1st decoded output has been tabled in Table I for various truncation factor, ÃŽÂ ±. The PSNR is higher for lesser value of the truncation factor. TABLE I Comparison of Secret Image and 1ST PHASE DECODED Secret Image Secret image vs Decoded Secret image (1st phase) Auth image vs Decoded Auth image (1st phase) ÃŽÂ ± Contrast SSIM PSNR Contrast SSIM PSNR 1 Not possible, No Truncation Not possible, No Truncation 2 0.1324 0.2556 3 0.1314 0.2446 6.7766 0.1720 0.1260 4.3907 4 0.1330 0.2452 6.5423 0.1708 0.1498 4.1201 5 0.1322 0.2380 6.5246 0.1762 0.1769 4.1499 6 0.1319 0.2352 6.4209 0.1752 0.1950 4.0422 7 0.1318 0.2328 6.3584 0.1753 0.2082 3.9912 8 0.1325 0.2348 6.3265 0.1746 0.2217 3.9447 9 0.1320 0.2322 6.3640 0.1772 0.2277 4.0184 10 0.1317 0.2316 6.3082 0.1771 0.2351 3.9738 11 0.1313 0.2292 6.3050 0.1761 0.2378 3.9582 12 0.1312 0.2291 6.2671 0.1768 0.2444 3.9383 13 0.1311 0.2307 6.2571 0.1765 0.2476 3.9250 14 0.1307 0.2286 6.2791 0.1750 0.2436 3.9232 15 0.1302 0.2280 6.2373 0.1760 0.2510 3.8964 16 0.1312 0.2322 6.2348 0.1751 0.2528 3.8830 Table II shows the comparison of meaningful shares with the corresponding cover images, which depicts that meaningful shares offers better visual quality. TABLE II Parameter Comparison for GVCS Shares vs Cover Images, for ÃŽÂ ± = 7 Proposed Scheme GEVCS 1 GEVCS 2 Contrast 0.1239 0.1746 SSIM 0.2803 0.1807 PSNR (dB) 6.1746 6.2839 Table III shows the comparison of different halftoning techniques, which shows that the adaptive halftoning offers better visual quality. TABLE III Parameter Comparison between the Secret Image and 1st decoded Secret Image, for Different Halftoning, for ÃŽÂ ± = 7 Halftoning Technique AM Halftoning FM Halftoning Adaptive Halftoning % Improvement FM vs Adaptive Contrast 0.0947 0.0988 0.1318 33.40 SSIM 0.0755 0.1823 0.2328 27.70 PSNR (dB) 6.1453 6.2268 6.3265 1.60 VI. Security Analysis The security of the proposed scheme is discussed here with the following security aspects. Authentication image for additional security With any one of the GEVCS color shares, the hackers may generate the other counterfeit shares, such that the legitimate receiver may get a bogus secret image instead of the original secret image. To overcome this weakness, a color authentication image is encoded into the GEVCS shares. In the 1st level of decoding, the vague authentication image is reconstructed and is used to validate the genuineness of the secret image, thus enhancing the security of the scheme. Further, the perfect retrieval of the authentication image is achieved by computations, in the 2nd decoding phase. Histogram of Shares Fig. 10 shows the histogram pattern of the color GEVCS share 1, for truncation factor ÃŽÂ ± = 7. It can be observed that the pixels occupy value up to 36 (i.e. 28/ÃŽÂ ±) and at 255. By choosing different values of ÃŽÂ ±, the pixel distribution of GEVCS shares can be limited accordingly. Unlike the original secret image, where pixels are distributed over the entire range, GEVCS shares are secured with limited pixel distribution, thus enhancin

Wednesday, November 13, 2019

The Evolution of Media Essay -- Communication, New Media, Old Media

The evolution of media, from old media to new media, has transformed the way we understand the world around us. New media is interactive and is user-generated while old media is a more traditional way of communicating through television, radio, newspapers, magazines, books, etc (Lecture Notes. January 12, 2011). New media gives us a new perspective by allowing us to interact with one another through the Internet. Media has become much more personal and diverse as user-generated content becomes more prominent in our lives (Lecture Notes. January 24, 2011). We are exposed to various viewpoints shape our understanding and knowledge of the social world, but does the form of media actually affect the way we understand the content which is presented to us? For my paper, I will determine whether or not the medium is the message by analyzing two different types of media sources and how they affect our understanding of the content. For my old media source I have chosen a news clip from the CB S Evening News with Katie Couric that deals with the ongoing Egyptian uprising. For my new media source I have chosen a video blog, or ‘vlog’, by an Egyptian man named Omar who discusses the crisis in Egypt from a personal point of view. Both media sources deal with the same topic, but result in different understandings of the crisis. Although both mediums focus on the same issue there are a lot of differences between the two. The CBS news clip uses a lot of visually dramatic effects to engage the audience and to get them to feel a certain way. In the news clip there are several images of violence by both the protestors and the police, however most videos are shot from the viewpoint of the police. This may be simply for safety reasons, however this le... ...ts. By simply posting a picture on Facebook, a movement for basic rights began. Since the users create the content of new media, people are able to inspire a mass audience. In conclusion, the medium is the message. The way that information is presented to us plays a key role in our understanding of the topic itself. By framing the crisis in Egypt a particular way, both the old and new media sources are able to give the audience two separate understandings of the social and cultural issues at hand. The media is less interested in telling the audience about the actual story and more interested in the underlying messages of society they provide. These underlying messages lead us to define social and cultural issues the way that the media want us to. Since the media sell us both products and ideas, both personalities and worldviews, the message becomes the medium.

Monday, November 11, 2019

“a Caring and Supportive Family Is the Main Building Block of a Community.” Discuss.

————————————————- â€Å"A caring and supportive family is the main building block of a community. † Discuss. Family can be defined as a group of people who have blood ties and who usually live under one roof forming a small community. The traditional concept of this would be a man and a woman who have a legal bond living under one roof with their offspring but when circumstances alter this arrangement the subsequent arrangement that arises does not make obsolete the bonds and relationships and the influence each member of that unit has on each other to form values and ethics that would contribute towards the building of communities. As such a caring and supportive family is the main building block of a community as it helps to mould individuals into positive social characters and personalities who contribute towards building a healthy community. However sometimes even though the family is caring and supportive the individual may fail to become one who contributes positively towards building a healthy community, on the other hand there may be individuals who come from dysfunctional families but are able to contribute towards the community because of other factors. The texts that will be used are The Outsiders by S. E. Hinton, Muriel’s Wedding directed by P J Hogan and The Family by Anne Deveson. Firstly a caring and supportive family moulds an individual into a positive social character by building self-esteem and by guiding and helping the individual to realise the potential he or she has. [ts] They may even sacrifice to ensure that the individual is taken care off and disruptions to the individual’s life is minimised thus helping the person face traumatic experiences and eventually develop in them a social conscience to reach out to help the community. On the other hand, when there is no care and support that ensures that the welfare of the individual is secured than the individual may feel cut adrift and may lose all their self-esteem and feel that they are a useless member of society and as such may only focus on their own needs and become insensitive to the needs of others and end up not contributing towards building a better community. This can be seen from the haracters in the novel ‘The Outsiders’ where the two older brothers, Darry and Sodapop, sacrifice their futures and take on the responsibility to hold the family unit together to give stability to the life of their younger brother Ponyboy. They do this so that Ponyboy has the opportunity to fulfil his potential by having a stable home, guidance and support to excel in his studies so that he can have a better life. Pony is eventually able to weather the storms that he faces because his brothers stick by him and support him emotionally and physically. When Pony gets hurt saving the children from the burning church and is sent to the hospital, Darry is at the hospital waiting for him even though it is Pony’s unthinking actions that got Pony into trouble. Darry does not give up and retreat from Ponyboy. In the same token Sodapop does his best to try and help Darry and Pony understand each other. Darry and Sodapop are there for Pony all the time and Darry nurses and cares for him like a mother when Pony collapses after Johnny and Dally’s death. Darry’s perseverance in caring for Ponyboy and Sodapop’s emotional support and understanding eventually manages to shake Pony out of his stupor and depression and he begins to understand his brothers and their needs. This in turn helps Pony to take a grip of his life and come to terms with the grief and trauma of losing loved ones and to move on with his life. It is then that he is able to see that he has a social responsibility to tell people the story of Johnny and Dally so that they can understand boys who live on the wrong side of the cities better. Thus the care and support of his family is what helps Pony through his traumatic experiences and moulds him to be a person who is able to care about others and awakes in him a social conscience which helps to build a strong community. On the other hand Muriel from the movie ‘Muriel’s Wedding’ has little care and support that helps her develop her potential. Her family is dysfunctional. Her father is a corrupt politician who bribes and takes bribes. He is also very loud and bullies his wife and children and constantly makes derogatory remarks about them and especially Muriel all the time. Added to this he also commits adultery and blatantly brings his lover into family gatherings. Muriel does not get any form of guidance from her mother, Betty, who is weak and meek and blinds herself about the state of her marriage by ignoring the blatant adulterous relationship her husband is having with Deidre. Betty seems to cope with these problems by retreating and blurring out details she can’t face. This lack of guidance and bad examples in Muriel’s family results in moulding Muriel into some one who has low self-esteem as well as ethics. She does not think twice about using the blank cheque her mother gives her by mistake and uses all the money in the account in pursuing her own gratification by going to the same resort as her so called friends. Seeing how her Father makes use of friendships for his own gains, Muriel too, later, uses Rhonda’s friendship and support, when she runs away to Sydney, to fulfil her dreams of having a life similar to an Abba song. When Rhonda gets ill, she promises Rhonda to be there for her but eventually dumps Rhonda when she realises that Rhonda will not be able to walk. She deserts her friend who is in need at that point without a tinge of guilt and does not seem to be bothered by the fact that she has betrayed a truly sincere friend. Thus it is clear that Muriel is such a selfish character because of the lack of support and care from her family that have moulded her into a person who could only care for herself and her needs, without any social conscience to look to the needs of another which thus makes her an individual that would not be able to contribute towards building community. A caring and supportive family can also help an individual to develop positive personality traits such as the ability to overcome debilitating circumstances such as poverty and an unstable childhood and take his or her place in the community. On the other hand if the family is dysfunctional, the individual may not be motivated to do anything to get out of the rut and make something of himself or herself by getting a job and contributing positively to the building of the community. We can see how positive family support helps Anne Deveson from the passage titled The Family to learn to deal with her debilitating circumstances of poverty and an unstable childhood. From what she writes we learn that she and her family go through very hard times with points in their life when her parents could barely keep food on their table let alone enjoy the luxury of going for a movie. They have to constantly move and have to share their homes with other families. At one point the family even faces physical separation, yet we know that Anne eventually becomes a successful writer despite this background. Anne herself tells that she was able to do so because no matter how hard life became she did not lack warmth affection and loving. Through all their difficulties the parents always communicate as best they can with the children and persevere in keeping touch with them although they have problems sharing and talking to each other as can be seen at the time Anne’s father would visit her on weekends even though they could not communicate with each other. Anne’s mother’s example also taught her how to be resilient and to cope with problems by focusing on something else. Thus Anne learns never to give up and to face life head on to take her destiny into her own hands and contribute towards the building of a community. Conversely, when a family is dysfunctional, it is difficult for an individual to develop positive character traits that will see them contributing positively towards the building of a community. This can be seen in the character of Muriel’s brother in the movie, Muriel’s Wedding. From the beginning of the movie this character is portrayed as a jobless lout, who sits around watching television all day and orders his mother to do things for him following his father’s example. He also faces verbal abuse from his father who seems to drum into him that he is a useless individual and thus behaves like one too. He, in no way contributes to his family or society. In fact he too becomes a bully like his father and verbally abuses his mother at a time when she is facing emotional trauma because her husband has left her. This insensitivity is probably a catalyst that leads to Betty’s suicide. From this it can be seen that an individual’s home life influences the individual’s character as can be seen in the case of Muriel’s brother who gets no proper guidance from either mother or father. Added to this, he is only exposed to negative behaviour and examples from the father which results in a lazy and loutish character who has no respect for any one not even his own mother. Thus making him an individual who does not seem to have any motivation and interest to make something of himself and so is unable to contribute towards building community. While families that are caring and supportive help individuals to become people who contribute positively towards building a healthy community, there are also times when they may fail because of other factors that also influence the individual. In the same token an individual may come from a dysfunctional family but may be able to contribute positively towards the community because of other factors. This can be seen in the case of Randy from the novel the outsiders. Randy is influenced by the Soc’s and especially his best friend Bob. He joins them in rabble rousing and jumping Greasers. He is also one of those who were with Bob on the night Johnny was jumped and beaten so badly that it caused Johnny to carry a kinfe. As Randy later shares with Ponyboy it becomes obvious that Randy comes from a decent family and one who stands by him in trouble. He is given proper guidance by his father to tell the truth at the inquiry into Bob’s death. From this it can be seen that before Bob’s death Randy had been a destructive person and joined all the acts of aggression and violence of his group despite a family who was loving and caring. At that point of his life Randy was a person who was not capable of contributing towards the building of a community because he just followed his peers without discerning right from wrong. He did not do anything to prevent Bob from doing things that caused harm to others and which eventually cost Bob his life. On the other hand there are also times when the family is dysfunctional and yet the individual develops positive character traits and is able to contribute towards building society. This can be seen in the case of Johnny whose family is dysfunctional. He is abused and neglected and finds shelter with his Greaser friends who do their best to be there for him and support him. At first Johnny’s world is bleak and so negatively impacted by his home life that he shares with Ponyboy that he feels like committing suicide. But after the incident of his killing Bob and running away with Ponyboy, Johnny begins to realise that life can be good. At this point in his life it is his Greaser friends who stand by him. This prompts him to decide to return and face the consequences of his actions rather than drag Ponyboy down with him and become fugitives from the law. This ability to discern and make a life giving decision leads him to take responsibility that he and Ponyboy may have caused the fire and thus go into the burning church to rescue the children. Johnny thus gives his life so that these children may have a chance for a better life than himself. Thus despite coming from a dysfunctional family, Johnny makes decisions that help him achieve personal growth and contribute towards the community because he receives care and support from his friends. In conclusion a caring and supportive family provides an individual with the platform to build self-esteem and realise their potential as well as develop positive personality traits. In this way they can contribute towards the growth of the community. In the same token, despite the fact that they may have a caring and supportive family, ther e are individuals who may fail to contribute positively towards a community and those with dysfunctional families who may end up contributing positively towards a community due to other factors. But the bottom line is that a caring and supportive family is the main building block of the community for we need positive individuals to help influence those who may come from dysfunctional families.