Wednesday, July 31, 2019

Analysis of Research Essay

This research discusses the affects positive reinforcement by teachers has on students. The research attempts to determine if promoting a positive environment for students through mechanisms such as praise notes, has a positive effect on overall performance and progression. In one of the studies the researcher directed teacher to use direct models of instruction for the social skill research and praise student if they display skills consist with social skills (Nelson, 2010). The premise of the research was to determine if students who receive praise are less likely to receive disciplinary actions or office discipline referral (ODR). The research question for this study is students who receive praise are less likely to receive office discipline referrals. A basic z test was used to determine if there was a statistical difference in levels of self-esteem between boys and girls. The purpose of calculating a Cohen’s D is to calculate the ideal size for two means, it is also used to reveal the difference between means, which could be used to in conjunction ANOVA and t test reporting. The d=.90 can be revealed using Cohen’s d by dividing the mean difference in the boy and girl’s self-esteem scores by the standard deviation. In addition to this method, mean one less mean two divided by a pooled standard deviation could be used (Lind, 2011). Reference: Lind, D. (2011). Business Statistics for Business and Economics (7thth ed.). New York City, NY: McGraw Hill. Nelson, J. A. P., Young, B. J., Young, E. J., & Cox, G. (2010). Using teacher-written praise notes to promote a positive environment in a middle school. Preventing School Failure, 54(2), 119-125. This article is available at http://library.gcu.edu:2048/login?url=http://search.proquest.com.library.gcu.edu:2048/docview/603227825?accountid=7374.

Tuesday, July 30, 2019

Change Speech

Today I am here to talk to you about change, and a few different texts that have challenged my thinking and broadened my understanding of change. Change, we have all experienced it change at one stage of our life, for the better or maybe even for the worse. But change is a normal part of our life’s, and we have to deal with it the best we can. After studying these texts, Raw by Scott Monk, Andrew Denton’s interview with Aron Ralston, and the short storey the Final Game by Olivia Coleman. My understanding of change has broadened and i am now much more aware of people’s experiences and how they have overcome and dealt with change. Aron Ralston was a young mountaineer. While he was on a mountaineering trip through Blue John Canyon in Utah in April 2003, a boulder crushed his right arm, pinning it against the cliff wall. Aron did not inform anyone of his trip, so he knew that nobody would be searching for him. He spent five days slowly sipping his only small amount of water left, while trying to dislodge his arm. Assuming that he would die, he ran out of water and began to drink his own urine. He video tapped his last goodbyes to his family and friends with a little camcorder he had in his backpack. Aron, so sure that he would die now, carved his name and date of death into the cliff face. After surviving the fifth day, he decided that there was only one way out of here alive. He was forced to amputate his own arm. Using the chalkstone as a vice he managed to snap both bones in his arm. Then using a dull two dollar pocket knife he began to slice through the skin in his arm. Using a pair of pliers to twist and snap his tendon, it was a miracle he didn’t pass out from the pain and blood loss. Once free Aron had to make a 65foot rappel down a sheer drop, then hike seven miles out of the canyon in the hot midday sun to reach his car. After surviving all those odds, he was told he had a bone infection and only had a fifty – fifty percent chance to live. Luckily Aron survived the infection and made a full recovery and lives on with a prosthetic arm. Aron has gone on to design many attachments for not only his arm, but other handicapped people as well. ‘Between a Rock and a hard place’ was the book that Aron published to tell his story and share his experience with others. Aron has shown us that a extremely negative situation can change your life for the positive, and it has certainly changed his life. We see this during his interview on the show Enough Rope with Andrew Denton that his personality has changed; he has a greater sense of patience and has come to appreciate his friends and family more. Even with just one arm Aron says that he has a greater ability to tackle everyday situations and problems, because he knows that he can overcome anything that life throws at him. In another text Raw by Scott Monk, shows us that different people relate to change in different ways. Two characters in particular, Brett Dalton and Josh Collins. Josh is a young man that is open to change and we see this when he says â€Å"Sam doesn’t order me to do anything, He’s my friend, I live on his farm, I do what he says†. Sam is the owner of The Farm, and institute were troubled boys go to seek help in straightening out there life. Brett was sent to The Farm after committing several crimes against the law. There’s one problem though, Brett doesn’t want anything to do with The Farm, he doesn’t want to do what he’s told, he doesn’t care what anyone thinks, and he just doesn’t want to change. To make things worse he feels trapped and alienated from the other boys, and doesn’t fit in. Sam, the owner of the farm, puts up with Brett’s ‘shit’ for as long as he can. He knows that he can change Brett, and won’t give up until he does. Fortunately for Brett, the farm slowly changes his personality to a more positive and caring young man. He begins to fit in with most of the boys, but there will always be one or two that don’t like the way he acts. After some time on the farm Brett seemed to have turned his life around. But it was no happy ending for Brett, as the cops found him after someone dobbed him in for trespassing. Brett was going back to a jail thinking that all this was just a waste of time, but it wasn’t. He still had his friends that he’s made, and the lessons that he had learned along the way. Brett was given the chance to start again, a fresh start to do things right from the beginning. He had changed his own life, something he thought he could never do. Change doesn’t always have to be a positive thing, as shown in the short story by Olivia Coleman called The Final Game. The Final Game is a story about a young man that has a love for football and is very good at it. He is only ever referred to as ‘He’. The author has used this technique to show that ‘he’ can refer to any young man his age. Although he is extremely good at what he does, a serious knee injury is holding him back. Finding it hard to make friends and get selected for the top footy teams, he always things quite negatively about himself. To make things worse, he has a dream to one day couch a footy team, but his parents are only holding him back from this dream. We see this when his dad says â€Å"sorry mate we can’t afford it, you’re stuck here† and â€Å"that’s for wankers, decent blokes stay on the land†. This only creates more negative feelings within him. Until one night he couldn’t take it anymore and took off in his dads Ute. Speeding down the dark road, he lost control of the vehicle. He found himself dangling upside down from the seatbelt, he could feel his legs, and at that moment he realised that his life had changed forever. These three texts have challenged my thinking and broadened my understanding of change. They each show change from a different perspective. From Aron Ralston retelling his story of survival to â€Å"The Final Game† which showed that change might not always turn out positive. I hoped that you all learnt something from these texts, because I sure have. And I hoped you enjoyed my speech on change.

Monday, July 29, 2019

Effect of leadership development program on organizational performance Dissertation

Effect of leadership development program on organizational performance - Dissertation Example statistical null hypotheses 15 Testing the null hypothesis 15 P-values 16 Significance levels 17 One-tailed vs. two-tailed probabilities 17 Reporting your results 18 Confidence interval 20 p=0.891 represents the probability of occurring the event. ... nsistency refers to inter-item reliability, and assesses the degree of consistency among the items in a scale, or the different observations used to derive a score Want to be sure that all the items (or observations) are measuring the same construct Estimates of Internal Consistency Item-total score consistency Split-half reliability: randomly divide items into 2 subsets and examine the consistency in total scores across the 2 subsets (any drawbacks?) Cronbach’s Alpha: conceptually, it is the average consistency across all possible split-half reliabilities Cronbach’s Alpha can be directly computed from data Estimating the Validity of a Measure A good measure must not only be reliable, but also valid A valid measure measures what it is intended to measure Validity is not a property of a measure, but an indication of the extent to which an assessment measures a particular construct in a particular context—thus a measure may be valid for one purpose but not another A measure cannot be valid unless it is reliable, but a reliable measure may not be valid Estimating Validity Like reliability, validity is not absolute Validity is the degree to which variability (individual differences) in participant’s scores on a particular measure, reflect individual differences in the characteristic or construct we want to measure Three types of measurement validity: Face Validity Construct Validity Criterion Validity Face Validity Face validity refers to the extent to which a measure ‘appears’ to measure what it is supposed to measure Not statistical—involves the judgment of the researcher (and the participants) A measure has face validity—’if people think it does’ Just because a measure has face validity does not ensure that it is a valid measure (and measures lacking

Sunday, July 28, 2019

Management at Ace Security and Multiboost Essay - 1

Management at Ace Security and Multiboost - Essay Example This paper illustrates that the need is to adopt a management approach that provides the greater level of motivation and satisfaction to employees that would ultimately have a positive impact on their performance and productivity. In this case, the company should adopt an approach to management that aims at providing benefits to employees and rewarding them for their performance. These rewards are paid in addition to the basic payments received by the employees The term total reward is used to define what employees get in return for the work done by them in addition to the compensation and benefits. This total reward system consists of four components that include an increase in the pay or compensation in cash, benefits, and opportunities for learning and development along with career advancement and the succession of career. In the case of Ace Manufacturers, the company should shift its existing framework to a new system. The company is required to change its strategy and goals of t he business, its philosophy of management and its human resource strategy for the purpose of attracting and retaining the pool of talent. The company should ensure employees that their system of rewards is well developed and managed. This reward package would pay and reward employees on the basis of their performance. With the help of a total rewards system the employees are ensured that they are valued by the company and in this manner, the company would gain the competitive advantage in the market. So, it is required that people are happy, appreciated and recognized in the company and a fruitful work environment should be provided to them. The company should take the decision of restructuring the compensation needs of employees and this decision should be communicated to employees in a clear manner. In the case of Multiboost, there have been problems of change and the specialization and division of labor is lacking in efficiency that has led to the lower level of motivation for em ployees. There are also the situations of conflict between the management and the staff in the company.

Saturday, July 27, 2019

LITERARY HISTORY, INTERPRETATION, & ANALYSIS Essay

LITERARY HISTORY, INTERPRETATION, & ANALYSIS - Essay Example Earlier to this, Henry and Beckett enjoyed a special relationship and Henry raised Beckett to the position of Chancellor and then to the Archbishop of Canterbury. By doing so the King wanted the control of Kingdom on ecclesiastical matters but Beckett undergoes a radical change in his character and attitude after accepting the honorable position. Beckett opposes King’s thirst for power as he tries to raise the crown above the Pope, gives up all the pleasures and starts living a very pious life .Thus, inviting King’s wrath. Thomas Beckett remains away from England for seven years and during his absence, the rule of the King was full of oppression and exploitation. Women folks cheer for his arrival at the time of Christmas but apprehend some disaster. Thomas Beckett is righteous and much loved priest. England awaits and welcomes his arrival. The three priests of the cathedral fear that the homecoming for Beckett won’t be easy as the King and Beckett won’t be able to renew their ties and the fuller reconciliation between them cannot be reached as both of them are head strong characters. The struggle appears more apparent as the plot develops. The homecoming might cost Beckett his life as it is very clear that the old ties cannot be renewed. The Play, Measure for Measure by Shakespeare is a distinctive play .It is been categorized as Black Comedy by some literary analysts. It is a comedy but not to entertain. In the garb of 2. comedy, some real societal problems have been raised therefore it does not fall in normal moulds of Shakespearean work. It is its own genre where the writer has dealt with the issues of power abuse and exploitation of women in the society. There is no protagonist in the play Measure for Measure as such, but all the main characters undergo struggle as the plot moves ahead. As this play deals with the abuse of power and authority, we find that the power is abused in the relationship as well and women are harassed and exploited in any relationship, be it a brother-sister relationship or a partner relationship. Isabella, Claudio’s sister is chaste and virtuous but she finds herself in a dilemma when her brother is arrested for impregnating his lover Juliet. She goes to Angelo and begs to show some mercy, who on the other hand suggests her to sleep with him. She is shocked and leaves. Isabella, on her way comes across Duke, who is disguised as Friar. He has done so to clean up the city from wrong doers. He tells Isabella that Angelo, himself is a big sinner. He has left his lover Mariana because her dowry got lost in a ship wreck. The characters in the play struggle as the plot develops and the true identity of Duke is revealed in the end. The first literary element is the PLOT; The Plot is a sequence of events in any literary work. Murder in the Cathedral very convincingly develops the social struggle faced by Thomas Beckett. The chorus in the play pays a major role in heightening the trag ic effect. In the beginning it informs the audience regarding the upheaval that might happen when the two titans clash. The readers are made aware in the very beginning that the play is about the death and calamity. The Plot is revealed in the words of chorus that they are the common people who, â€Å"try to keep our households in order,†

Assessment in science(Schools in England) Essay

Assessment in science(Schools in England) - Essay Example For one, NC has increased the number of students learning science. A key intention of the NC was to have students aged 5-16 learning science in primary and secondary education, as outlined in the Science 5-16 DES policy statement which was outlined in March 1985. Secondly, the NC has inculcated more effectiveness in teaching and learning of sciences. This is because the DES policy statement emphasised that teaching science was to include both the acquisition of knowledge and comprehension of facts and principles of science (which was to be done in a broad and balanced manner) and the methods of science. In this respect, science became a core subject alongside mathematics and English (Great Britain Parliament, House of Commons, Children, Schools and Families Committee, 2009, 17 and the Great Britain Dept. for Education and Employment, 1999, 34). The NC also lifted up performance in science subjects. This follows the outlining of the form that the policy would take, by the Education Re form Act 1988. ... Studying the science and arts subjects alike, under the programme is to culminate into sitting for the GCSE, when one finishes the Key Stage 4. This ensures that those who proceed to a higher level of learning are fully equipped, cognitively and academically. Thus, students are able to perform academically in higher levels of learning. Again, the same students’ ability to perform and comprehend concepts in higher standards of learning inculcates confidence and a positive attitude among them and extirpates chances for dropouts (Pollard and Bourne, 1994, 22). The teaching of biology, chemistry and physics has also become more standardised, following the changes that the Qualifications and Curriculum Authority for 2006 amendments made. This measure was to help ensure that those issuing guidance and information top science learners in years 9-11 of their studies have a single document that contains accurate and updated information on the opportunities, support and qualifications t hat are available. It is by this virtue that many students have gained increased awareness on sciences and the opportunities that accost studying science (Daugherty, 1995, 17 and Kelly, 1990, 14). According to Watts (1991, 12), the NC also helped further synchronise scientific disciplines and learning of sciences at the national level. This happened especially as changes were made in the 2006 national curriculum. The main changes included information regarding planning timetables, deciding between specifications and understanding the implications for teaching sciences and knowing where to obtain necessary resources from (Daugherty, Phillips and Rees, 2000, 17). The content of the science subjects being taught has also expanded, following the introduction of key stages. Particularly, one of

Friday, July 26, 2019

Absence Makes the Heart Grow Fonder Essay Example | Topics and Well Written Essays - 3000 words

Absence Makes the Heart Grow Fonder - Essay Example This paper illustrates that first way to know whether the proverb is really true is to put ourselves in a situation where we will pretend that the one person we love most is far away from us. The researcher theorizes that the saying is true because based on her own experience, she feels very lonely when she misses her guy so much when many days pass without us seeing each other. The researcher’s anticipation of seeing her love again gives her much happiness and excitement. Love is sweet when two lovers are together, walking hand in hand, sharing stories, feeling each other's hugs and kisses, but when they are away, and thinking about those sweet and romantic moments almost make them crazy, crazy in the sense that they will do anything, everything just to be in the company of their loves again. Going back to the author’s theory, the saying "absence makes the heart grow fonder" means that "love can stand the test of time." It feels very sad for two people in love when the time to say goodbye comes. They will have to let go of each other's hands, break free from the tight embrace, and go their separate ways with a kiss. The saying "absence makes the heart grow fonder" starts with another saying, which is "parting is such sweet sorrow," because one will only feel the absence of someone she loves when they part ways. Yes, they will say their goodbyes and be lonely for a while, but the thought of again seeing each other is what they are thinking of. Lovers are always like that. The absence of the person you love most will only make you miss him more. People who love by heart know that. Moreover, the greatest opposite of being with your love is being far away from him, of course. But what distinguishes these two dimensions of love is the feeling residing in the faraway hearts is their feelings. When the author is with her love and holding him close to her, all she could do is to cherish the seconds she is in his arms, because those moments are the ones t hat will be forever remembered, especially, when he is not around and the author is missing him badly. And when the researcher is feeling sad because she misses him, all she would do is close her eyes and reminisce. Those thoughts will serve as strength in the time of waiting for the time of being together again. This saying not only applies to two persons in love, but it can also be true with a person missing someone important besides his significant one, or it can also be applied to a person feeling the "absence of a place, of an event or even things." But of course, the greatest of the three is the fond heart that misses a person, for loving a person and being loved back by the person is the greatest feeling in the world. Missing someone could not happen when she is always with her love, and that means, for their bond to get stronger and her love gets even more intense because it is waiting to come out and be showered upon a loved one. "Separation makes love even more intense" th at it normally is, distance triggers the want in two persons to be in each other.

Thursday, July 25, 2019

Human Service Program and profession Unit 3 Seminar Research Paper

Human Service Program and profession Unit 3 Seminar - Research Paper Example I hope my study on this course we’ll help me attain my goal of helping the homeless people. In my associates’ degree in medical assisting, I acquired 90 credits over the transfer. I believe that these credits I acquired are sufficient and that they will help me achieve my academic goal. I do not have a massive experience on my area of interest, but I have the head start experience that I acquired during training. I am interested in taking exams that will help me get credit in this area, as it is under my area of specialization (Woodside and Tricia 23). My plan is to take as many tests as possible, exams that will help me boost my credentials and my working experience. If the tests are equivalent to college level learning, my interest to take them is 100% positive. Deciding on what elective choices to take heavily relies on advice from people who have been here before me and majored in my field of interest. Research on the topics and career of my interest is also vital in my elective choice making (Woodside and Tricia

Wednesday, July 24, 2019

Fuji Xerox Strategic Alliance Essay Example | Topics and Well Written Essays - 2000 words

Fuji Xerox Strategic Alliance - Essay Example However, the 4:1 success ratio of strategic alliances has not deterred companies and business enterprises from continuously forming strategic alliances. The most viable reason for this continuation of forming strategic alliances despite the frequent failures may be the present era's increasingly competitive environment. Business firms and companies in every industry are searching new and more effective ways to increase and sustain their competitive advantage. In this search for new mediums to augment the competitive advantage, most of the companies have realized that, owing to a variety of reasons e.g. cultural and social differences, change in consumer's needs and wants and today's accelerating technological advances, significant improvements in performance and competitive advantage cannot be achieved alone ( Whipple J.M. and Frankel R., 1999). Per se, the traditional response of acquisition to enhance the performance and competitiveness of a company is no longer the only alternative. Strategic alliance is the new alternative that facilitates the merging of partnering companies or firms' individual strengths and expertise while also compensating for the participating companies internal resource scarcities without them having to make the required investments for the actual ownership. The most fundamental aspect for a strategic alliance to be a successful, is finding the right match in which experience, expertise, knowledge and strategic resources of the participating companies will complement each other. However, in the business arena today, the researchers have found out that newly formed strategic alliances are more vulnerable to failure than those which have lasted for some time (Lunnan R and Haugland A.S., n.d1.). According to Steve Steinhilber, the vice-president of Strategic Alliances at Cisco, "companies worldwide launch more than two thousand strategic alliances every year, about the quarter of them are complete failures and more than half never deliver as promised" (Steinhilber S, 2008). However, amidst these strategic alliance failures there is the "Fuji Xerox", the strategic alliance between the Japan's Fuji Photo Film Co. Ltd and America's Xerox Corporation, which can be said to be the most successful long term strategic alliance, till date. Hence this paper has been developed as report that envisages the evolution of this strategic alliance between Fuji and Xerox and how it became the most successful strategic alliance as "Fuji Xerox". In the course of understanding the factors that facilitated and made this venture the most triumphant long term strategic alliance, the report perhaps, will also be able to shed some light on the essential building blocks of successful alliances and how to establish them. Creating a

Tuesday, July 23, 2019

Managing projects Essay Example | Topics and Well Written Essays - 3000 words

Managing projects - Essay Example Consequently, a new body of knowledge was evolved, which came to be known as Project Management. Over the years, the science of Project Management has developed enormously and many scholars and practitioners have introduced various tools and techniques to enrich it. Internet, computers, project management software etc have accelerated the pace of development of project management. Successful completion of project on time with the use of limited resources and minimum cost is the main objective of project management. But, project management in modern times is no longer possible by paying attention towards resources, cost and time alone. The project managers are forced to look beyond time, cost and resources. The traditional tools and techniques such as Gantt chart, PERT/CPM networks became powerless and attainment of project objective remained a dream for the competent project managers. A careful analysis has been made in various areas of project management and finally reached a way-ou t that project managers need to have a check on the rapidly changing environment in which the project needs to be materialized. The present essay looks on various aspects of project management and the intricacies of project management in the modern rapidly changing project environment. The term ‘project Management’ has been defined by authors in different ways. There is no unanimity among the academicians and practitioners concerning the activities and the scope of a project manager and hence, about definition. The following definition seems to be a typical one. â€Å"Project management is the process by which projects are defined, planned, monitored, controlled and delivered such that the agreed benefits are realized. Projects are unique, transient endeavors undertaken to achieve a desired outcome. Projects bring about change and project management is

Monday, July 22, 2019

A research proving that the act of abortion is not immoral Essay Example for Free

A research proving that the act of abortion is not immoral Essay Abortion is the deliberate termination of a human pregnancy, most often performed during the first 28 weeks of pregnancy. Since 1969, abortion has been legal in Canada. However, it was only allowed under special circumstances which included, high-risk pregnancies and pregnancy as a result of rape. Abortion without federal restrictions has been legal since 1988 in Canada. With the advanced technology of today, abortion can be done both surgically and non-surgically. Furthermore, many today may believe that abortion should be illegal as it is considered to be â€Å"inhumane†. Nevertheless, because of the time the abortion takes place, the situations that make abortion the only option and avoiding birth defects, one can come to the conclusion that abortion is not immoral. This fact can be proven throughout the research done by medical professionals and people who have had to get an abortion done. The universal definition of abortion states that abortion is the termination of a pregnancy by either a surgical or non-surgical method before the fetus is able to sustain independent life (up to 24 weeks). Abortion ranges in two different forms, surgical and non-surgical. There are 2 types of surgical procedures which are Vacuum Suction Curettage (VSC)  and Manual Vacuum Aspiration (MVA). Throughout the first twenty weeks of pregnancy, the fetus has now developed the entire skeletal figure, all major organs are functioning, and this would include the heart, stomach, liver, kidney, and brain. By twenty weeks, the fetus can now kick, grasp with his or her hands, hair is visible and vocal cords are working. Stated by Dr. Paul Ranali, a neurologist studying at the University of Toronto, there is evidence of the fetus feeling pain during the abortion procedure (Pollitt, 2011). Although it is unusual that one would have an abortion this late in the pregnancy, abortion can take place any time during the first trimester of pregnancy which is up to 24 weeks, the fetal brain is completely developed at the age of 20 weeks. The brain has the full complement of brain cells as an adult would have therefore made the fetus ready to receive pain signals from the body (Johnson, 2011). Overall, many still allow the abortion to take place after knowing this information. Because the abortion process takes place at such an early stage in the pregnancy, many do not seem to consider the fetus as a human, therefore, disregarding the slurs (murdering the fetus) that are typically said. The main cause for abortions would be the fact that they are unplanned pregnancies. As stated in the Annual Abortion Survey in the United States (AAS), â€Å"on average, women give at least  3 reasons for choosing abortion: 3/4 say that having a baby would interfere with work, school or other responsibilities; about 3/4 say they cannot afford a child; and 1/2 say they do not want to be a single parent or are having problems with their husband or partner† (Annual Abortion Survey- USA, 2013). Because of these reasons, it is unfair to bring an innocent child into the world where they would not receive the care that is needed. Also stated in the AAS, twenty-one percent of women included a physical problem with their health among reasons for having an abortion  and eleven percent admitted that they went along to get an abortion due to the fact that they were victims of rape. Those who do not wish to have a child because of financial situations can be understood by those who believe abortion is immoral because raising a child in today’s time is known to be expensive to those who make an average salary of $34,000. While considering having a child, one must be able to provide basic necessities such as diapers and formula. The costs of diapers can range from $10.00 $50.00. The costs of baby formula can range from $15.00 $50.00 (Evers, 2013).   If one cannot provide their child with the essential needs, they should not bring them into the world. If one cannot provide for their child, it can also cause a strain on the mother and father’s relationship due to overwhelming stress and pressure. Also, studies in the United States have shown, those who are not financially stable and continue with their pregnancy, are more likely to become unemployed, to be on public welfare, to be below the poverty line, and to later on in life, become victims of domestic violence (Evers, 2013). Because many do not want to be placed in a situation where they are in danger or not capable of raising a child, they choose to abort the potential child. A birth defect is defined as a health problem or physical change which is present in a baby at the time he or she is born. Birth defects can occur either from genetic factors or even environmental factors. The genetic causes could be inheritance, single gene defects, multifactorial inheritance, teratogens or a chromosome abnormality.   Luckily, only three out of every one-hundred babies are born with a birth defect (Williams, 2007). Many birth defects can be diagnosed before birth with specialized prenatal diagnosis test. Birth defects that are considered as chromosomal abnormalities such as Downs Syndrome can be diagnosed before birth by examining the amniotic fluid from the placenta. A commonly used test that screen for birth defects and mainly Downs Syndrome would be Alpha-fetoprotein. Alpha-fetoprotein measures the levels of alpha-fetoprotein in the blood. This screening may be included as one part of a two, three, or four-part screening, often called a multiple marker screen. The other parts may include the following: Human Chorionic Gonadotropin and Estriol (Williams, 2007). Human chorionic gonadotropin is a hormone that is extracted from the placenta cells. High levels may indicate a fetus with Down Syndrome. Estriol is  a hormone produced by the placenta and by the fetal liver and adrenal glands. Low levels may indicate a fetus with Down Syndrome. Other birth defects that are a leading cause of infant mortality would be heart defects and missing organs and limbs. These birth defects are noticed through ultrasounds just before the pregnancy goes to twenty weeks. It was founded that roughly two percent of all pregnancies are complicated by a major birth defect. Of that two percent, ninety-three percent of the women decided to terminate the pregnancy before the child is born into a life of suffering (Williams, 2007). Thus concluding that women mainly resort in abortion in order to protect a child from being born with a disability that could lead them i n a life where it would be difficult for them to survive. In conclusion, one can say that abortion is not an immoral act due to the fact that at the time abortion takes place the fetus has not yet become a human, the situations that make abortion the only option which shields the unborn child from being born into a world where they cannot be taken care of and avoiding birth defects. This fact has been proven throughout this essay by the research done by medical professionals and people who have gone through this experience. Bibliography Abortion Laws Worldwide. (n.d.). Retrieved March 2, 2015, from https://www.womenonwaves.org/en/page/460/abortion-laws-worldwide Annual Abortion Survey-USA. (n.d.). Retrieved March 3, 2015, from http://www.abort73.com/abortion_facts/us_abortion_statistics/ Childrens Health. The  Ã‚  Ã‚   Nemours Foundation, 1 Apr. 2014. Web. 8 Mar. 2015. http://kidshealth.org/parent/system/medical/genetics.html?tracking=P_RelatedArticle. Description of Types of Abortions, Abortion Procedures, How They Work, What to Expect. Description of Types of Abortions, Abortion Procedures, How They Work, What to Expect. Web. 6 Mar. 2015. http://www.birthmothers.org/extras/types-of-abortions.htm. Evers, J. (2013, February 1). Religious views on abortion. Retrieved March 4, 2015, from https://www.spuc.org.edu/youth/student_info_on_abortion/religion Guralnick, M. J. (2010). Early intervention approaches to enhance the peer-related social competence of young children with developmental delays: A historical perspective.  Infants and Young Children, 23, 73–83. Hirsch, L.(2010). Genetic Testing. KidsHealth the Webs Most Visited Site about Johnson, M. (2011, January 1). Abortion. Retrieved March 4, 2015, from http://www.cfsh.ca/your_sexual_health/abortion/ Pollitt, K. (2011). Pro: Reclaiming abortion rights (pp. 29-43). Religious views on abortion. (2012, January 1). Retrieved March 4, 2015, from https://www.spuc.org.uk/youth/student_info_on_abortion/religion Sanghavi, D. (2013, January 1). Texas’ Bill Would Ban Abortions at the Time Testing Reveals Fetal Defects. Retrieved March 2, 2015, from http://www.slate.com/articles/health_and_science/medical_examiner/2013/07/texas_ Williams, M. (2007). Abortion (pp. 34-59). Detroit: Greenhaven Press.

The Missing Lessons of U.S. History Essay Example for Free

The Missing Lessons of U.S. History Essay In order to examine options for integrating extralegal businesses and individuals into the legal property system, De Soto examines the history of the United States for clues on how this task was successfully accomplished in the past. He found that this integration was accomplished primarily through the adaptation of laws to suit the needs of the majority of the country’s people. De Soto begins his exploration of US history in the sixteenth century, when numerous Western Europeans settled in North America. These early colonists based their legal system on English property law, but these laws were not created to apply to the types of situations faced in the colonies and most of the colonists did not fully understand the minutiae of these laws. Because of this situation, many of the colonists functioned extralegally, with local courts following local customs (rather than British law) when settling disputes. These early settlers were often squatters, occupying land without a legal title. Politicians opposed this practice, and they ordered surveys of the land in order to establish rightful ownership. Their efforts did not work because there were no legal regulations to follow in case of dispute. The success of the squatters to integrate into the system can be seen in Vermont, where a group of squatters led by Ethan Allen actually got Vermont recognized as a state. The majority of squatters, however, found it difficult to integrate into the legal property system because British law did not relate to the way of life in the colonies. These squatters created their own property system, marking trees to indicate possession of a piece of land. They also developed means of settling disputes, transferring parcels of land, and establishing credit. Those in power believed that these practices were in direct violation of the law, and those that engaged in these practices should be prosecuted. These squatters became known for their hatred of the law and sometimes engaged in violence to circumvent official authorities. The situation began to change when authorities recognized that making improvements to the land, paying taxes on land, and making arrangements with neighbors could establish ownership. Squatters who engaged in these practices were allowed to purchase the land in question before it was made available to the general public, a practice known as pre-emption. Pre-emption benefited both the squatters (who could become the rightful owners) and the states (who gained revenue from the sale of the land). More obstacles arose in the nineteenth century when the US gained almost 900 million acres of land. Congress attempted to set prices for this public land but was generally not aware of the situation faced by settlers many miles away from the capital. As a result, much of this land was sold on the black market. During this time there were two legal systems in operation: the official, sanctioned laws and the laws that people lived with on a day-to-day basis. Following Green vs. Biddle, the perception of these squatters changed: politicians began seeing them as hard working pioneers improving the country. Congress gave official, national status to the practice of pre-emption, an important step in integrating the two legal systems in operation. Cooperation amongst extralegals, such as claims associations and miner’s organizations, gave them more political power and forced those in power to take their concerns seriously. De Soto argues that the integration of these two legal systems was an important contributing factor to the US’s economic success. Because the American legal system was built from the ground up, the concerns of the extralegals were taken seriously, and the laws addressed the problems this population faced. Chapter 6, â€Å"The Mystery of Legal Failure† Developing countries have tried for almost two centuries to get more people involved in the legal property system. Their efforts have failed for five reasons: belief that people remain extralegal for tax purposes, lack of proper recording of real estate assets, belief that creating the laws is the only answer, ignoring existing social contracts, and belief that these social contracts can be changed on a whim. De Soto and his team successfully set up practices in Peru to integrate extralegal businesses in to the legal property system. Based on his experiences in Peru and evidence from the history of Western government, De Soto developed a formula, termed the capitalization process, for the successful lifting the bell jar of capitalism. This formula has two components: meeting legal challenges and meeting political challenges. The primary legal challenge is the integration of numerous social contracts into one that all citizens of Third World and former communist countries can abide by. These governments must find out the intricacies of the rules their people live by on a daily basis. These extralegal regulations are often documented, a phenomenon that often goes unnoticed. The recognition of these existing social contracts will facilitate the move to a capitalist economy, but it is not enough. People moving from the extralegal sector to the legal sector also need means by which they can settle disputes, i. e. there needs to be documentation of ownership. Furthermore, many people believe that certain rights come along with property ownership – the right to use and exchange that property as they deem fit. If laws do not allow for the execution of these rights, they will not be followed, and people will move back to the extralegal sector because extralegal protocols are in line with prevailing social contracts. Most of these social contracts are solid enough to form the basis of official law. The process of discovering these existing social contracts is referred to by the author as following the barking dogs, a terminology acquired from his experiences in Indonesia. Additionally, the new laws must be created in such a way that people can transform their property into capital. The successful implementation of these new laws requires considerable political power and effort. The institution of these new laws is made more difficult by the fact that existing laws often protect those in power – they stand to lose out if more people are integrated into the system. Political leaders must listen to the poor of their country and get these people on their side because the support of this population is necessary to the implementation of legal property systems. These political leaders, armed with the support of the majority of the population and evidence of this population’s economic power, will be better equipped to gain the support of the country’s elite. The argument must be framed in such a way that the elite see that they have much to gain from the transformational process. In attempting to gain the support of the elite, political leaders can also stress the one important benefit of property system reform: reduced crime rate. Once the support of the poor and elite has been won, political leaders must address the lawyers and technicians. Lawyers in Third World and former communist countries have traditionally been trained to defend existing laws. De Soto contends that lawyers have the power to undermine capitalism’s success and must be re-educated to expand the reach of the law. They must also learn the economic consequences of their activities. The technicians must be capable of keeping accurate records of property. One major stumbling block that needs to be faced in this respect is that many people in Third World countries conceive of property as a physical asset. As such it is not dealt with by legal and economic departments. Any political leader looking to reform the property system must be an effective communicator because property system reform is an issue that effects every member of a country. Chapter 7, â€Å"By Way of Conclusion† Capitalism’s crisis outside of the West stems from the fact that most of the world’s population views capitalism as something restricted to the privileged elite. Reform efforts must be directed at educating people of developing countries that they have much to gain from participation in the legal property system and, by extension, capitalism. As the success of capitalism is contingent upon capital, developing nations must engage in reforms so that assets and potential are accurately represented. Current globalization efforts have focused on getting governments of developing countries to stabilize their currencies and develop the frameworks for international trade. However, these efforts have been based on the erroneous assumption that the governments’ policies already take into consideration the needs of its citizens. This trend perpetuates capitalism’s bell jar: the majority of the world’s population becomes more and more distanced from capitalism. It also leads to the confirmation of Karl Marx’s premonition: capitalism will fail because capital will ultimately be concentrated in the hands of a few elite. One result of capitalism’s bell jar is the continuation of class conflicts that should have ended with the Cold War. These class conflicts are not explained by theories of capitalism, rather they are best explained in Marxist terms. Marx emphasized the importance of property above and beyond its physicality. He grasped that non-physical characteristics of property had the potential to convert property to other, more useful, forms. Marxist theory, however, is not enough to understand the complexities of the issue. Marx did not understand the motivating power of property ownership, and he did not recognize that the property system itself has characteristics that give value to assets and allow them to be converted into capital. Detailed understanding of the property system will allow for progress in terms of development. Furthermore, a good property system allows people to conceive of abstract concepts (such as potential) in concrete terms. Without this capacity, people will continue to think about property and the global economic market in physical terms. Those opposed to capitalism have been quicker to recognize the intangible aspects of the property system than capitalists. For many of the anti-capitalists, their fear of capitalism stems from these intangible aspects. In reforming the property system, forms of written documentation must be simple, transparent, and easily comprehensible if capitalism is to be able to speak to the majority of the world’s population. De Soto examines the cultural contingency of capitalism and argues that the notion of property ownership is compatible with all major cultures, not just those with a prevalent Protestant work ethic. The main problem, therefore, is not with capitalism in theory: it is with the manner in which people try to institute capitalism. Successful implementation of capitalism would be simple and effective if governments would listen to the poor of their country, recognize that their poor citizens save money, see the necessity of legal property systems, accept the fact that violence is not a peripheral concern, see the poor as the solution to the violence, and communicate better with people to make the necessary legal changes.

Sunday, July 21, 2019

Data leakage

Data leakage Data leakage is the unauthorized or unintentional exposure, disclosure, or loss of sensitive information (GAO, 2007, p.2). Many businesses have in their control sensitive data about their organisation, employees and customers. The Information Commissioner (ICO) in a recent press statement (ICO,2010) is alarmed with the unacceptable number of data leakages within the modern world and will issue fines for major breaches to commence in 2010. In addition to our markets, the safety and security of our information could not be assumed either. (Verizon Business, 2009 p.2). In 2008 there appears to be a link between the turn of the recession and an increase in reported data leakages. Research conducted by Verizon Business (2009) showed that the number of reported compromised records was more than the previous four years combined as shown below in Figure 1.1. Figure 1.1 Number of records compromised per year in breaches investigated by Verizon Business (2009) Within this study (Verizon Business, 2009) it was found that the industries with the highest number of data leakages were in retail (31%) and financial services (30%). As employees exit, so does corporate data (Ponemon Institute, 2009, p.1). A survey conducted (Ponemon Institute, 2009) showed 59% of employees who left a business (including voluntarily and those asked to leave) stole data. It is difficult to measure the entire impact of a data leakage. Data Breaches Are Frequent, but Evidence of Resulting Identity Theft Is Limited; However, the Full Extent Is Unknown. (GAO, 2007, p.1.)   The financial impact on a business per breach according to the Ponemon Institute (2006) is on average $4.8 million.   Breaches can not only be financially costing to a business but also extremely damaging to a companys reputation, this study (Ponemon Institute, 2006) showed that 60% of customers terminated or considered terminating contracts after a security breach. According to Verizon Business (2009) in 2008 91% of all compromised records were linked to organized criminal groups. Examples of confidential data that criminal groups may wish to obtain are companys financial information, customers sensitive data and credit card details.   There are many ways in which data leakage can occur, some of which will be discussed in the following chapter of this report. 1.2 Data Leakage in the Media The media is one of the most influencing ways of communicating issues globally. Data leakage appears to be increasingly more popular in the media as the reported breaches increase. The ICO stated that there were 434 organisations that reported data security breaches in 2009, the previous year had 277 reported (Unacceptable level of data loss, 2009). This evidence supports the theory of there being an increase in breaches during the recession but what must be taken into account is that there is an increase in the reported cases. It may be that more businesses are becoming aware of data leakages where previously they were oblivious to breaches committed or did not disclose the known leakages. Reported in the media, a Nationwide employees laptop was stolen from their home containing confidential customer data (FSA,2007). 11 million Nationwide customers were said to be at risk of identity crime at the time. The FSA (Financial Services Authority) were alerted by the breach and it was found that the Nationwide did not start an investigation until 3 weeks after the theft took place. The firm were fined  £980,000 by the City watchdog for the security violation. Another example in the media (Previous Cases of Missing Data, 2009) is the Ministry of Defence data security breaches. The Ministry of Defence admitted to losing or having stolen 121 memory sticks in a four year period. According to this press release (Previous Cases of Missing Data, 2009) Defence Secretary Des Browne said 747 laptops had been stolen of those only 32 have been recovered. 1.3 Data Loss Prevention (DLP) The protection of sensitive data, to avoid data breaches, should be a vital part of a business day to day operations. Yet organisations rarely have adequate visibility or control of their data (Broom, cited in When financial data goes missing, 2008). From the research conducted (Verizon Business, 2008) out of all the data leakages that occurred in the year 87% were preventable through simple or intermediate controls. This suggests that many businesses are not putting in adequate controls to prevent leakages. The Date Protection Act (DPA) is a framework to ensure that personal information is handled properly (ICO, The Basics, no date). One of the principles of the act is, it is the responsibility of the business to secure the sensitive data it withholds. The DPA have the right to prosecute and unless exempt, all businesses have to abide by this act. The difficulty faced by many businesses is to manage the risk without affecting their productivity and to manage risk in a new and challenging environment (CFO Research Services and Crowe Chizek and Company LLC , 2008, p.2). The important factors to consider when implementing a DLP plan is the alignment of process, technology and people as a unit.   developing a robust security policy and ensuring that all employees fully understand their role and obligations(Broom, cited in When financial data goes missing, 2008). Broom also stated that users need high-quality training and good communication regarding information security concerns. Chapter 2: Types of Threats Threats to the protection of data can be split into two broad categories: Internal and External threats. Internal threats are from within the business itself and majorly centred on employees actions. Attacks from outside of the business are known as external threats. Examples include hackers, organized crime groups and government entities (p.8, Verizon Business, 2009) According to Verizon Business (2008 or 2009) 20% of reported data breaches are caused by insiders whilst 39% of the breaches involved multiple parties, thus proving the importance of a combination of internal and external controls. 2.2 External Threats According to Verizon Business, 2008 saw   more targeted, cutting edge, complex, and clever cybercrime attacks than seen in previous years   (p5 2009). The fact that attacks appear to be increasingly more sophisticated is a concern for many organisations to ensure they have adequate control measures in place. One of the most common external threats to data security is Malware.   According to Easttom (p6 Computer Secuirty Fundamentals) Malware is the Generic term for software that has a malicious purpose. Malware can be used to steal confidential data from a personal computer to a global network. A virus is a small program that replicates and hides itself in other programs, usually without your knowledge (Symantec,2003) through Computer security fundamentals p6.) A Trojan Horse is a useful or apparently useful program containing hidden code that, when invoked, performs some unwanted function. (P48 info sec pipkin). Trojans must spread through user interaction such as opening an e-mail attachment. It looks legitimate and so users are tricked into executing the malicious program. The Trojan can then potentially delete files, steal data and spread other malware. They can also be created to generate back doors to give hackers access to the system. (http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html) An example of a dangerous Trojan is the Dmsys Trojan. According to (http://www.2-spyware.com/trojans-remova) and (http://www.uninstallspyware.com/uninstallDmsysTrojan.html) it steals users confidential information by infecting instant messengers. It uses a keystroke logging technique to steal passwords and private conversations. This information is stored in a log file and then sent to the hacker. Thus allowing the malicious user to have access to potentially, confidential information. There are various tools online that can dispose of this Trojan automatically, but if a user wanted to do it manually they would need to delete the files: dmsysmail.eml and dat.log. Manually Deleting Malware Each program consists of files. Evenspyware, a virus or a different parasite all have their own files( http://www.2-spyware.com/news/post203.html ) To remove a parasite usually means to delete all its files. According to this website, it is not always this simple, as files being used by active applications can not be deleted and some of the Malwares files may be set to invisible. Following this sites guidelines: Open Windows Task Manager and select End Process but only works if you know what processes should be running and those that look suspicious. Once you have stopped the process it is now possible to try and delete the malicious files. Locate the folder you believe the program to be (eg My Computer) and ensure all hidden and protected files are visible (Tools, Folder Options, View, Advanced Settings).There may still be files that are invisible, now type cmd into run to access the Command Prompt. Within the Command Prompt enter dir /A folder_name. All files within this folder will be listed including all hidden files. To delete these files within the cmd enter the command cd folder_name to locate the folder. Then enter del file_name to delete the file. Ensure the Recyle Bin is also emptied. http://www.2-spyware.com/news/post203.html steps on how to manually remove Malware. Preventing Malware attacks Since new viruses are introduced daily (p49 info sec pipkin) an up-to-date valid anti-virus software is essential to avoid data leakages via Malware. Vulnerability patching firewalls A combination of the mentioned attacks can be catastrophic to the security of data hacking gets the criminal in the door, but malware gets him the data (p20 verizon) It is critical that a blend of the above security measures are put into place. 2.1 Internal Threats Whether knowingly or unknowingly, innocently or maliciously, employees engage in behaviours that heighten the risk of data loss.( Cisco data leakage find page) According to a study conducted by cisco data leakage 46% of employees admitted to transferring files between work and personal computers and approximately 1 in 4 admitted sharing sensitive information with friends, family, or even strangers. According to the Deputy Information Commissioner David Smith (http://news.bbc.co.uk/1/hi/uk_politics/8354655.stm) Unacceptable amounts of data are being stolen, lost in transit or mislaid by staff. Dangerous numbers of personal data is still being needlessly stored on unencrypted laptops and USB sticks. if they do not think about security, users can start to cause quite a few problems p37 computer insecurity book. bar chart 5 ponemon 2009 page8 info kept after leaving chart 7 ponemon 2009 page 9 According to Ponemon (2009), only 11% of the respondents who took part in this research had permission from their supervisor to keep this information. in figure à ¢Ã¢â€š ¬Ã‚ ¦. An alarming percentage of the above transfers may have been avoided with appropriate controls, which will be discussed later in this report. It can often be hard to detect data leakages, such an employee copying confidential data to a USB device. more often, the information is left just as it was so that the theft is not quickly discovered p59 info sec pipkin. Using a Data Leakage Prevention tool can assist in monitoring and blocking users risky actions to avoid leakages. In this report Digital Guardian by Verdasys will be used to demonstrate some examples of how a DLP tool can be used to assist in the battle of information security. Chapter 3: Verdasys Digital Guardian Software Introduction Digital Guardian is a comprehensive and proven data security solution for protecting and tracking the flow of critical data anywhere in the world. (Verdasys, 2006) (http://www.daman.it/wp/dg/Digital_Guardian_DS.pdf ) According to Verdasys (2006) Digital Guardian (DG) can help to prevent the loss of data by identifying hard to detect user actions. The tool can block unauthorized access, copying, printing, and other user actions. The DG platform consists of a central server and control console to communicate with remote agents deployed to desktops, laptops and servers where data needs protection. It is an agent based (Endpoint) Data Loss Prevention (DLP) tool. These agents operate silently and report rules violations, continuing to operate even when a device is removed from the network. (Verdasys, 2006 http://www.daman.it/wp/dg/Digital_Guardian_DS.pdf ). The DG server is accessed via a web-based interface to the Control Console.   Figure à ¢Ã¢â€š ¬Ã‚ ¦ DG Management /Control Console The above figure is the web-based management console. This tool can be implemented on both Windows and Linux machines. For this project Windows machines have been used. Capabilities Digital Guardian can monitor or block various risky actions users are taking. Whether it be users abuse or accidental operations. There are many actions that the software can perform some of which will be shown in the followingà ¢Ã¢â€š ¬Ã‚ ¦.. Rules can be created within the software and then applied to policies which are deployed to machines chosen. These rules can generate warnings to the user and also email alerts to administrators upon policy breach. Reports can be generated to allow for auditing and drilldown summaries of use of data and users actions. Along with being able to completely block specific actions DG can also ask for justification from a user which is a form of Soft Blocking (DG, 2006). This type of DLP can also allow for a monitoring only approach, which   according to ( http://www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) can be more   successful than a blocking solution. It can be used assist in computer forensics investigations whether it would be monitoring triggered rules by prohibited actions that breach corporate policy or more sinister illegal activity. According to (http://www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php)   The beginning of the investigative process is to find out what was being sent, where, and by whom. Is it legitimate business reasons? Maliciously? They didnt know any better? Blocking may keep the data safe, but it wont answer those questions. (http://www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) There are functions within the tool that can block the removal of confidential data via clipboard actions (cut/paste/print screen).   add on features such as mail/file encryption and content inspection by Autonomyà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ (company name) (Verdasys 2006) Figure (à ¢Ã¢â€š ¬Ã‚ ¦) shows the capabilities of the software, How the software works Digital Guardian installs drivers that tie into the Operating System (O/S) at a very low level within the kernel. When an application wants to save a file, it calls a function within the application that does this, and that the O/S handles the task, right down to the kernel that does the hard work, without application writers having to know the details.DG ties into that kernel, detects these events happening, extract useful details (like the filename and size etc), and then send the details onto the DG server. The advantage of this is that any application saving a file will have to get the O/S to do it, so tying in at that very low level ensures it works for virtually all applications. Any more Installation oh god try and remember!! Installation details of .. appendix. windows server,   SQL Server, DG Server, DG Agents,   Hardware and Software à ¢Ã¢â€š ¬Ã‚ ¦ pre , key etc. Detailed in the à ¢Ã¢â€š ¬Ã‚ ¦. Digital Guardian files.   Limitations  Ã‚   - FIND some Digital Guardian is mainly used for insider threats and doesnt lessen external threats by intruders or malicious attacks. It also does not address server and network vulnerabilities. (http://www.software.co.il/data-security/17-data-loss-prevention-shoppers-guide.html) No functionality to actually block users downloading applications (CHECK THIS) and running them if not already blocked within Application Management. The software has to be installed on the network to be able to block the use of it. check!! No rule to be able to block all attachments sent via emailcheck Scalability challenge of maintaining classifications of Windows shares/content (http://www.software.co.il/data-security/17-data-loss-prevention-shoppers-guide.html) Chapter 4: Testing and Implementation Policy Exception USB Encrypt Email Prompt Encrypt Mail Rule Encrypted Email Password Application Management Application Management Exceptions Application Management Exceptions Block of Applications Prompt Upload Via Webmail Upload via Webmail Prompt Block upload via webmail sites. This rule controls users access. Instead of completely blocking their access to certain sitesà ¢Ã¢â€š ¬Ã‚ ¦. Can access the specified sites but can not upload to these sites. For example social networking sites like Facebook. Stops the sending of attachments via webmail.   à ¢Ã¢â€š ¬Ã‚ ¦ If laptop accessed from outside of network these rules will still functionà ¢Ã¢â€š ¬Ã‚ ¦.. NEED BETTER SCREEN SHOT THAN THIS IS THERE A COMPONENT RULE FOR THIS? Control of USB Devices Block non-approved USB devices Within DG it is possible to block all uploads to all USB devices, thus preventing all users from removing any data from the network. It is also possible to block uploads to USB devices with the exception of predefined USB devices. For example if a business provides users with an encrypted USB device (such as Kingston.) a rule is created to say block all USB device if stated device is not listed in the component rule associated. The USB device is recognised by its Product ID and Vendor ID. These IDs can be discovered by using a simple tool such as à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦. Block non approved USBs Above is the control rule called Block non approved USBs. This rule is set to block any File Copy/Move/SaveAs to a removable device that is not listed within the function (component control rule) approved usb device. Component rule for USB Approved Within the approved usb device component rule is the Vendor Id and Product Id for the approved USB device(s). USB Block Prompt If the USB device inserted does not match the predefined approved removable device then the above prompt is triggered. This prompt is flexible and any message the administrator wishes to set will be displayed. Once Close is selected no data can then be transferred to the device. This way if the USB device is lost/stolen it is encrypted so would be extremely difficult to view any sensitive contents on the device without knowing the password. This rule could be useful for businesses where their employees have to travel regularly (eg Sales) and so data needs to be easily transportable. Obviously this rule does not stop users from stealing the data but does assist with accidental loss. The software could still be used to monitor who/what/how much data is being transferred to these devices. BETTER SCREEN SHOT Content inspection rulesà ¢Ã¢â€š ¬Ã‚ ¦. Look into TRY AND CRACK/BREAK THESE RULES. Manually blocking USB within the Registry It is possible to manually block all USB devices via the registry. The following steps were taken from Microsofts Support site (http://support.microsoft.com/kb/823732). Before manually adapting the registry it is strongly recommended that a backup of the registry is made as any errors made within the registry can cause severe problems.   To enter the registry of the computer from the Start menu click Run and enter regedit.   Find the registry key : HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUsbStor. On the right hand side double click Start as highlighted in figureà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.   Ensure Hexadecimal is highlighted and enter 4 within Value data. This will now block all USB devices being used on this machine. When a device is plugged into the machine the device will not be acknowledged. To re-enable USB devices follow the same steps above but change the Value data back to the default value of 3. Chapter 5: Analysis of results founded by Digital Guardian.   Digital Guardian Technology   ANY IMPROVEMENTS FOR DG Chapter 6: Critical review of other products Having assessed an Endpoint (agent based) DLP tool, secondary research was conducted on a Network DLP tool, Websense Data Security, for comparison. Figure below is a table of brief pros and cons for different DLP measures available, taken from informationweek.com . Analyse table Taken from (http://www.informationweek.com/1163/163ss_impactassessment690.jhtml;jsessionid=WA0XH3S4GN0CTQE1GHPSKH4ATMY32JVN) WhenDLPvendors are being honest, theyll readily admit they cant stop the serious and skilled insider from getting data out. (http://www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php)Their real significance is in finding employees who are accidentally leaking data, those who dont know its against policy or who are taking risky shortcuts to get their jobs done. Websense Data Security is a network based DLP tool with forward proxy.   According to a review by (http://www.software.co.il/data-security/17-data-loss-prevention-shoppers-guide.html) it is typically used for monitoring email traffic and quarantining suspect messages. It requires placing an application-layer proxy next to an Exchange server or server agent. With a network based DLP such as Websense it avoids having to install an agent onto every machine, and instead involving installing network taps. As data passes through these it is checked, and events collected that way. According to(http://www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) Network-based solutions have the potential to be more vulnerable to an insider threat. An insider can steal data out via thenetwork, using encryption or steganography (where data is embedded within another data format). Unlike DG a network-based tool would not prevent a user plugging in a USB stick and copying files, it also would not log that this event had even occurred. TYPE UP MORE COMPARISONS Still, an even somewhat paranoid but unskilled insider can use a cell phone or digital camera to photograph documents on the screen. No form ofDLPcan protect against that. (http://www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) Installing   a DLP tool is not the be all and end all protection against threats and as emphasised earlier in this report a combination of measures needs to be addressed. Chapter 7: Conclusion and Future Work. Highlight any deficiencies etc Ethical Traking employees? ANY IMPROVEMENTS FOR DG   .Many different aspects to consider Link intro with conclusion. Verizon other factors p3 . The best security technology in the world wont produce a good return on investment without the foundation of security processes, policies, and education. P8 Cisco data leakage. if you have never experienced a security incident, does this mean that you are secure? Or does it just mean that, so far, you have been lucky? computer insecurity book in short no one is immune computer insecurity book More.. Glossary Bibliography Online Sources ICO. (2010), Press Release: Data Breaches to Incur up to  £500,000 penalty, [Online]. Available at [Accessed 31st January 2010]. (2009),Unacceptable Level of Data Loss, [Online]. Available at [Accessed 1st February 2010]. FSA. (2007), Final Notice to Nationwide Building Society, [Online]. Available at [Accessed 26th January 2010] (2009), Previous Cases of Missing Data [Online]. Available at   [Accessed 12th January 2010] Broom, A. (2008),When financial data goes missing.[Online]. Available at [Accessed 3rd February 2010] ICO. (date unknown), The Basics . [Online] Available at [Accessed 2nd February 2010] Journals GAO. (2007), What GAO Found, Report to Congressional Requesters Verizon Business (2009), Data Breach investigations Report Ponemon Institute. (2009), As Employees Exit so does Corporate Data, Data Loss Risks During Downsizing Ponemon Institute. (2006), 2006 Annual Study: Cost of a Data Breach CFO Research Services, Crowe Chizek and Company LLC. (2008), The Changing Landscape of Risk Management Appendices

Saturday, July 20, 2019

frankenstein ethos :: essays research papers fc

The story begins with and is enveloped by Walton’s letters to his sister. His sister is very close to him; as can be seen by the affection terms used for her and the comfort level that Walton has with her; terms such as â€Å"dear sister† and â€Å"my sister†. This relationship that Walton has with his sister is placed on the reader through his expressions and use of language.   Ã‚  Ã‚  Ã‚  Ã‚  The reader is forced into the role of a character that already has some developments. Walton’s sister is a character that exists prior to the story; this can be seen by the way Walton treats his subject. Because the reader is the audience with her, the reader is pushed into that role, but not to become a part of the story, only to develop the relationship with Walton.   Ã‚  Ã‚  Ã‚  Ã‚  The purpose of this suddenly close relationship is to bring credibility to the narrative of Frankenstein and ultimately bring credibility to the narrative of the monster. This is done be enveloping Walton’s letters around both these narratives. These layers sustain the relationship through the novel and allow the reader to be outside of the story, physically in another location as Walton’s sister is, but to be close and credible.   Ã‚  Ã‚  Ã‚  Ã‚  This established relationship that the reader is now part of allows the emotions that Walton’s sister may have felt to be recreated and obvious to the reader. â€Å"Be Assured†¦ I will not rashly encounter danger.† Walton reassures his sister and it is made clear to the reader that she feels concern for him due to his tendencies. This emotion that she feels is recreated by his words of comfort to her. This pathos helps to build the relationship as do the other elements in combination with it. In many circumstances, the letters also appeal to a more logical sense. Walton believes in his cause and believes that his sister (and reader) do not agree with this cause. Because of this temperament, Walton feels the need to justify his actions. So he justifies his actions with logical proof, these logical proofs appeal to the mind of the reader. This logos helps to build the relationship as do the other elements in combination with it. The story ends with the letters to complete the encirclement and enclosure of the relationship so that all the elements that helped build credibility and a relationship in the beginning are sustained throughout.

Friday, July 19, 2019

Essay --

The American and Chinese culture have a different perspective of what ghost really are. The word ghost has many different meanings in The Woman Warrior. As Maxine was growing up apart from her family’s culture but in a different culture, she knows she is alone. Americans have many different customs than the Chinese do. The ghost change depending on everyone’s point of view. Her mother, Brave Orchid, would describe these different people as ghost, because they weren’t of her culture. The only important people are the Chinese people. They didn’t speak the same language or worked as hard as they did. In the memoir, The Woman Warrior: Memoirs of a Girlhood Among Ghosts, Kingston uses the motif of ghosts, to establish the separation between different cultures as an individual yearns to understand who she is. One way the Chinese culture interprets the word ghost is people who disgrace their own family. As in Maxine no name Aunt, she had a baby outside her marriage so she became a disgrace to her family. They called her â€Å"Ghost! Dead ghost! You have never been born† (Kingston 14). Maxine is ...

The Battle of Vicksburg :: American America History

The Battle of Vicksburg The Civil War split our nation, Americans fighting Americans, brother against brother. The war lasted four long years, a key battle fought westward was the turning point in the war: the Battle of Vicksburg. Between Cairo, Illinois, and the Gulf of Mexico, the Mississippi River twists and winds for nearly 1,000 miles. Commonly referred to as 'the trunk of the American tree'. The river was vital to both the American Government and to the Confederate forces in the west. The city of Vicksburg, Mississippi, 250 feet high, overlooks the Mississippi River on the Louisiana-Mississippi state border. Confederate forces mounted artillery batteries ready to challenge the passage of Union ships. Receiving control of Vicksburg and the Mississippi River was a huge benefit in the war. Due to the Geographic location made it ideal for defense. Before the outbreak of the Civil War, Vicksburg, Mississippi had become one of the most prosperous and sophisticated towns on the old southern frontier. The city was a booming center of trade, its wharves crowded with boats carrying all manner of goods and commodities. It boasted a municipal orchestra, a Shakespeare repertory company, and an imposing courthouse in the Greek revival style. To its proud citizens, Vicksburg was the "Queen City of the Bluff" and a center, as one of them wrote, of "culture, education and luxury." All this was to change with coming of the war. By early 1862 the peaceful town had become one of the most strategically important spots in the entire Confederacy- and would soon be one of the most bitterly fought over. From the beginning of the war in 1861, to protect their most prized possession, the Confederacy put up fortifications at strategic points along the river. Federal forces eventually captured post after post. After fighting their way southward from Illinois and northward from the Gulf of Mexico. Until by late summer of 1862, only Vicksburg and Port Hudson appeared to be major constraints to the Union. Of the two posts, Vicksburg was by far the strongest and most important. Setting high over looking a bend in the river, protected by artillery and dangerous swamps. So far the city had defied Union efforts to force it into submission. In order to protect the Mississippi Valley, Confederates established a line of defense, which ran from Columbus, Kentucky, overlooking the Mississippi River trough Bowling Green to Cumberland Gap where the bright flank was secure on the mountains.

Thursday, July 18, 2019

Necessity Of Optical Amplifiers Computer Science Essay

Hybrid Raman and Erbium Doped Fiber Amplifiers ( HFAs ) are a engineering for future heavy wavelength-division-multiplexing ( DWDM ) multiterabit systems. HFAs are designed in order to maximise the transmittal length and to minimise the damages of fibre nonlinearities, and to heighten the bandwidth of Erbium Doped Fiber Amplifiers ( EDFAs ) . This undertaking simulates and evaluates the public presentation of intercrossed Raman and Erbium-Doped Fiber Amplifiers in optical transmittal systems utilizing Optisystem package. Since the public presentation of the amplifier is influenced by the parametric quantity of Optical Signal-to-Noise Ratio ( OSNR ) , Bit Error Rate ( BER ) , and Noise Figure, the job brush in this undertaking is to happen the best design parametric quantity for maximal approachable transmittal distance utilizing the intercrossed amplifiers. Optisystem package is used as the simulation tools for the whole undertaking. Optisystem package is based on realistic mold of fiber ocular communications systems and serves a broad scope of applications, therefore it is an ideal simulation tools for this undertaking.AimsThe aims of the undertaking are: to plan intercrossed Raman and Erbium Doped Fiber Amplifiers utilizing Optisystem package. to supply a design parametric quantity for maximal approachable transmittal distance in optical transmittal system utilizing the intercrossed Raman and Erbium Doped Fiber Amplifiers. to measure the public presentation of the Hybrid Raman and Erbium Doped Fiber Amplifiers based on the amplifier ‘s addition, Optical Signal-to-Noise Ratio ( OSNR ) , Bit Error Rate ( BER ) , Noise Figure, and etc. to analyse the fake informations obtained from Optisystem package.Problem StatementOptical amplifiers have become a necessary constituent in long-haul fibre ocular systems due to the demand for longer transmittal lengths. The effects of scattering and fading can be minimized in long-haul optical systems due to the innovation of Semiconductor optical amplifiers ( SOAs ) , Erbium Doped Fiber Amplifiers ( EDFAs ) , and Raman optical amplifiers. One of the defects of EDFAs is their non flat-gain features across a given optical spectrum. In peculiar, the addition degree is well less at the terminal of the L-band between about 1600 nanometer and 1620 nanometer. Fortunately, the addition degree of such amplifiers can be rendered well level across the L-band window by the usage of addition flattening filters which are optically coupled between the spirals of Er doped fibre. However, the usage of such filters consequences in a higher noise figure in the channels holding wavelengths in the 1600-1620 nanometer scope. The well higher noise figure in the 1600-1620 nanometer scope lowers the useable bandwidth available from such EDFA amplifiers. Raman amplifiers similarly have non-flat addition features. A typical Raman addition degree curve has minimal additions at about 1570 nanometer, 1595 nanometer, and 1620 nanometer, and upper limits at 1585 nanometer and 1610 nanometer. A addition flattening filter can be applied to cut down this fluctuation but will merely be optimized at a individual operating addition value. Additionally, there is the desire to minimise the figure of addition blandishing filters in the system and the loss they incur. Clearly, there is a demand to cut down the maximal Noise Figure in EDFA addition, every bit good as to further flatten the addition curve in Raman-type amplifiers in order to cut down signal losingss throughout the web. The innovation is a intercrossed optical signal amplifier that reduces the maximal Noise Figure of an EDFA while flattening the addition of a Raman amplifier without compromising optical maser pump efficiency. Therefore, this undertaking simulates and evaluates the public presentation of intercrossed Raman and Erbium Doped Fiber Amplifiers ( HFAs ) in optical transmittal systems to supply a design parametric quantity for maximal approachable transmittal distance utilizing the intercrossed amplifiers.ScopeThis undertaking will concentrate chiefly on the simulation of intercrossed Raman and Erbium Doped Fiber Amplifiers ( HFAs ) utilizing Optisystem package. The public presentation of the amplifier will be evaluated depend on amplifier ‘s addition, Optical Signal-to-Noise Ratio ( OSNR ) , Bit Error Rate ( BER ) , and Noise Figure obtained from the simulation of a individual manner fibre transmittal nexus. The fiction or development of intercrossed Raman and Erbium Doped Fiber Amplifiers ( HFAs ) will non be covered in this undertaking.Undertaking OutcomesIt is expected that at the terminal of the undertaking, a design parametric quantity for maximal approachable transmittal distance ut ilizing the intercrossed amplifiers can be obtained.MethodologyThis undertaking starts with the searching of beginning and information respect loanblend Raman and Erbium Doped Fiber Amplifiers ( HFAs ) . The beginning and information are acquired from diary, mention books, e-Books, magazine and cyberspace. The circuit conventional diagram of intercrossed Raman and Erbium Doped Fiber Amplifiers ( HFAs ) is determined from the diary and simulate utilizing Optisystem package. All the parametric quantity likes amplifier ‘s addition, Optical Signal-to-Noise Ratio ( OSNR ) , Bit Error Rate ( BER ) , and Noise Figure that determines the public presentation of the HFAs is analyzed. The simulation procedure is repeated until the design parametric quantity for maximal approachable transmittal distance utilizing the intercrossed amplifiers can be obtained.Thesis StructureChapter 1: The first chapter provides a general inspiration for the undertaking. It includes the overview of undertaki ng ; the aims of undertaking, job statement, range of the undertaking and undertaking results. Chapter 2: Undertaking ‘s background is illustrated in this chapter. By and large, this chapter summaries the literature reappraisal that have been studied. The construct and theory of the circuit conventional diagram of intercrossed Raman and Erbium Doped Fiber Amplifiers ( HFAs ) that is used for simulation will be explained in this chapter. Chapter 3: The 3rd chapter is discussed about the methodological analysis of the undertaking. The method, stuffs and processs used to carry on the undertaking in accomplishing the aims of the undertaking is explained in inside informations. Chapter 4: The chapter four will show all the simulation consequence from the Optisystem package. All the graphs and tabular arraies obtained from the simulation will be discussed in inside informations. Chapter 5: The last chapter will reason all the findings and consequences obtained throughout the undertaking. The consequences will be evaluated based on the findings and the aims of the undertaking. Recommendations for future surveies besides will be included in this chapter.Chapter 2LITERATURE REVIEW2.1 Optical AmplifiersOptical amplifiers have become a necessary constituent in long-haul fibre ocular systems due to the demand for longer transmittal lengths. The effects of scattering and fading can be minimized in long-haul optical systems due to the innovation of Semiconductor optical amplifiers ( SOAs ) , Erbium Doped Fiber Amplifiers ( EDFAs ) , and Raman optical amplifiers. Optical Amplifier has three applications: Supporter In-line Pre-Amplifier The transmittal side of the nexus is operated by a supporter amplifier, having a high input power, medium optical addition, and high end product power. The supporters are designed to magnify aggregative optical input power to make extension. The center of an optical nexus is operated by an inline amplifier. It acts as a medium to moo input power, high end product power, high optical addition, and a low Noise Figure. It is designed for optical elaboration on the chief optical nexus between two web nodes. The having terminal of an optical nexus is operated by a pre-amplifier. It functions as a medium to moo input power, medium end product power, and medium addition. Pre-amplifiers are besides designed for optical elaboration to counterbalance for the losingss in a demultiplexer located near the optical receiving system.2.1.1 Semiconductor Optical AmplifiersSemiconductor optical amplifiers ( SOAs ) really are laser rectifying tubes, with fibre attached to both terminals and do non hold terminal mirrors. The optical signal can comes from either side of the fibre, amplified by the semiconducting material optical amplifiers ( SOAs ) , and the signal comes out from the 2nd fibre. They are typically made in little bundle, and work for 1310 nanometer and 1550nm systems. Besides, the decreased size of the SOAs makes it an advantage over regenerators of EDFAs by conveying bidirectional. However, the disadvantage of SOAs includes polarisation dependance, high-coupling loss, and a higher noise f igure. Figure 1 demonstrates the rudimentss of a semiconducting material optical amplifier. [ 1 ] Semiconductor Optical Amplifier Figure 2.1: Semiconductor Optical Amplifier [ 1 ]2.1.2 Erbium Doped Fiber Amplifier ( EDFA )Erbium Doped Fiber Amplifier ( EDFA ) is an optical amplifier that uses an optical fibre as a addition medium to magnify an optical signal. Rare-earth component Er ions Er3+ dope the nucleus of the optical fibre. There are three possible results for the signal photon, if a optical maser signal with a wavelength between 1520 and 1570 nanometer, and a 974 pump optical maser are fed into an erbium-doped fibre at the same time, as shown in Figure 2.2. Figure 2.2: Simplified energy degree of Er3+ ions in Erbium-doped fiber [ 2 ] stimulated soaking up: signal photon excites an erbium ion from the province E1 to a higher degree E2 and go annihilated in the procedure stimulated emanation: signal photon stimulates an Er ion at province E2 to disintegrate to E1, bring forthing another indistinguishable photon. Thus the signal is amplified. signal photon can propagate unaffected through the fibre. In the mean while, self-generated emanation ever occurs between degree E2 and degree E1. The population inversion os achieved between the energy degree E2 and E1 of erbium-doped fibre when pump optical maser power is high plenty. Thus, the input laser signal passing through the fibre is so amplified. The erbium-doped fibre and pump optical maser can be used to build an optical amplifier, viz. erbium-doped fibre amplifier ( EDFA ) .Pump optical maser could besides magnify the self-generated emanation. Therefore, ASE is ever present in EDFA, and it ‘s the chief beginning of noise in these amplifiers. [ 2 ] Advantages of EDFA are as follows: It provides high power transportation efficiency from pump to signal power. Large addition. It is polarization-insensitive. High end product power. No matching loss to the transmittal fibre. A individual EDFA can supply addition for multiple wavelengths at the same time. The disadvantages of EDFA are Derive holding wavelength dependence. The difference addition will be obtained when usage with wavelength division multiplexing. Particular fibre design. Presence of amplified self-generated emanation ( ASE ) . [ 3 ]2.1.3 Raman Optical AmplifierThe Raman optical amplifier consists of a length of addition fibre combine with a pump assembly. The pump assembly contains a brace of pump optical maser rectifying tubes. The end product of a brace of orthogonally polarized pump-diode optical masers offers backward-propagating pump power in the transmittal fibre. Due to the higher-energy ( shorter wavelength ) pump photons scatter off the quiver manners of the optical fibre ‘s lattice matrix and coherently add to lower-energy ( longer wavelength ) signal photons, forward-propagating signals achieve addition in the fibre. There are two types of Raman amplifier: distributed and distinct Raman amplifier. A distributed Raman amplifier is one in which the transmittal fibre is utilized as the addition medium by multiplexing a pump wavelength with signal wavelength, while a distinct Raman amplifier use a dedicated, shorter length of extremely nonlinear fibre to supply elaboration. The advantages of Raman amplifier are: Ultrawide bandwidth elaboration. Low noise. No particular fibre is required. Suppressed nonlinearities public presentation in transmittal systems. [ 4 ] The disadvantages of Raman Amplifier are: Relatively high pump power required. Double Rayleigh sprinkling noise and nonlinear effects when the addition of RA is increased.2.1.4 Hybrid Raman and Erbium-Doped Fiber Amplifier ( HFAs )Hybrid Raman and Erbium Doped Fiber Amplifiers ( HFAs ) is a combination of Raman optical amplifier and Erbium Doped fiber amplifier. So, in order to understand HFAs, the feature of Raman optical amplifier and Erbium Doped fiber amplifier is study individually. The characteristic that is being study include operation, advantage and disadvantage of the amplifiers as discuss in the paragraph above. The constellation of intercrossed Raman and Erbium Doped Fiber Amplifiers is assuring for high capacity WDM transmittal. The amplifiers yield high-gain, low noise, and high end product power that via media for long distance transmittal. [ 5 ] Figure 2.3: Experimental constellations for the three types of individual pump, intercrossed Raman and Erbium Doped Fiber Amplifier ( HFAs ) [ 6 ] Figure 2.3 shows assorted constellations of single-pump dispersion-compensating Hybrid Raman and Erbium Doped Fiber Amplifier ( HFAs ) . Type I: Hybrid Raman and Erbium Doped Fiber Amplifier ( HFAs ) recycling residuary Raman pump in a cascaded EDF subdivision located after a scattering compensatingfiber ( DCF ) . Type I showed a addition of 20.8 dubnium at 1556 nanometer. The minimal Noise Figure of Type I was about 7.5 dubniums. Type II: The difference between TypeII with Type Iis that the HFAs recycling residuary Raman pump in a cascaded EDF subdivision located prior to a DCF. The addition of Type II was 21 dubnium at 1556 nanometer. The minimal Noise Figure ofType II wasapproximately5 dubnium. Type Three: Raman assisted EDFA. The peak addition wavelength of TypeIIIwas found to be at 1532 nanometer and the addition was 19 dubnium. The minimal Noise Figure of Type III was about 8 dubnium. [ 8 ] Type II has the larger addition and smaller Noise Figure as comparison to Type I and Type III.Thus, the Type II circuit will be used for simulation in Optisystem package.2.2 Performance of optical amplifierIn the designation of the public presentation of an optical amplifier, some features have been defined. For illustration: addition, noise, optical signal/noise ratio ratio ( OSNR ) , bit error rate, and eye-pattern.2.2.1 AdditionGain is an of import parametric quantity in amplifiers that measures the elaboration per unit length of fibre. Additions are runing conditions and stuff used dependance. Difference wavelength has difference addition for all stuffs. For a low input powers, the end product power is relative to the addition times the length of fibre: Poutput = Pinput A- Gain A- Length. [ 7 ] The addition may saturate at high input powers. So, the end product power may merely increase in little fraction as input power addition. Basically the optical amplifier has run out of the power it needs to bring forth more end product.2.2.2 NoiseBy and large, optical amplifiers will add spontaneously emitted or scattered photons to the signal during the elaboration procedure, and this will do the signal/noise ratio ratio ( SNR ) degrade accordingly. A parameter Noise Figure ( NF ) , which is defined as the SNR ratio between input and end product quantify the SNR degradation.NF= SNRin / SNRout The self-generated emanation can be reduced by an optical filter during pattern. Therefore, the SNR by and large will be dependent on the bandwidth of the optical filters and the spectral power distribution of the self-generated emanation from the amplifier. The self-generated emanation, which is emitted from the amplifier input terminal, may come in the signal beginning ( a semiconducting material optical maser ) , where it can ensue in public presentation perturbations. Therefore, so as to avoid extra noise in the system, it is ever needed to include isolation between amplifier and light beginning.2.2.3 Signal-to-Noise RatioSignal-to-noise ratio can entree the public presentation of optical amplifiers, where it defines by the ratio of end product signal to the background noise. The higher the signal-to-noise ratio indicates the quality of the signal is higher. This means that the public presentation of the amplifier is good.2.2.4 Bit Error RateThe digital input and end product sign als are compared utilizing spot error rates ( or ratio ) measurings to measure what fraction of the spots are received falsely. Bit error rates offer a quantitative measuring of signal quality. The typical acceptable spot error rate is 10-9. [ 8 ]2.2.5 Eye-PatternThe other ways to measure rapidly the noise public presentation of an optically amplified system are through the usage of â€Å" oculus forms † displayed on the CRO. By the superposition of a random sequence of many 1s and 0 spot, such oculus forms are generated. This give a more qualitative position of the noise impressed on the digital transmittal form. [ 9 ] An illustration of oculus form is shown in Figure 2.4. The end product amplitude is the extremum to top out electromotive force output.Jitter is the divergence of the pulsations signal from their ideal places in clip, measured in picoseconds. Figure 2.4: Example of oculus form at receiving system [ 8 ]2.3 Optical fibreThere are two types of fibre, which is individual manner fibre ( SMF ) and multimode fibre ( MMF ) .Light travel in a consecutive line and typically has a nucleus size of 8 or 10 micrometers doing by a individual manner fibre that has a really little nucleus. It has unlimited bandwidth that can travel unrepeated for over 80 kilometers, depending on the type of conveying equipment. Single manner fibre has immense information capacity, more than multimode fibre. Multimode fibre supports multiple waies of visible radiation and has a much larger nucleus comparison to individual manner fibre. The nucleus size of multimode fibre is typically 50 or 62.5 micrometers. The light travels down a much larger way in multimode fibre, leting the visible radiation to travel down several waies or manners. Since individual manner fibre is used for long distance transmittal, it will be discuss in more inside informations in the undermentioned paragraph.2.3.1 Single Mode Fiber ( SMF )Light is non reflected or refracted within single-mode fibre, but travels merely along the axis of the nucleus as shown in Figure 2.5. Figure 2.5: Light Transmitted through Single-Mode Fiber [ 8 ] Modal scattering does non be in single-mode fibre since merely one manner is propagated. However, single-mode fibre is capable to other causes of pulse distributing such as chromatic scattering. [ 10 ]2.3.2 Chromatic DispersionChromatic scattering is the phenomenon wherein different spectral constituents of the familial lasersignal travel at different speeds in the fibre, geting at different times at the receiving system. It occurs because optical maser beginnings emit a scope of wavelengths: a primary individual wavelength and a narrow scope of secondary wavelengths on either side of this primary wavelength, as shown in Figure 2.6. The different wavelengths travel at somewhat different velocities through the fibre, and hence arrived at the receiving system at different times. This causes distributing, or scattering, of the standard pulsation. As the length of fibre additions, the difference in arrival times besides increases and the pulsations become wider. The end product pulses fi nally become identical from their neighbours and spot mistakes occur. Figure 2.6: Output Wavelengths of Laser Source [ 9 ] The bandwidth of a fibre decreases as chromatic scattering additions. Fewer spots can be transmitted in a given clip period because each spot will be wider and hence occupy a longer bit period. Chromatic scattering is the chief performance-limiting factor for single-mode fibre.2.3.3 Dispersion-compensating fibre ( DCF )By utilizing a really sophisticated fibre profile, it is possible to minimise scattering over the full wavelength scope from 1300 to 1550 nanometer, at the disbursal of really high loss ( around 2 dB/km ) ; this is known as scattering compensatingfiber. This fibre is designed with negative scattering features, so that when used in series with conventional fibre it will â€Å" undisperse † the signal. Dispersion-compensating fibre has a much narrower nucleus than standard single-mode fibre, which makes it susceptible to nonlinear effects. [ 11 ]2.3.4 Multimode Fiber vs. Single-mode FiberTable 2.0 shows a comparing of multimode fibre and single-mode fibre. Because of the many differences between them, these two types of fibre are by and large non interchangeable. Parameter Multimode Fiber ( MMF ) Single-Mode Fiber ( SMF ) Jacket Color Orange ( 62.5A µm ) or Grey ( 50A µm ) Yellow Light Propagation Multiple waies Single way Core Diameter 62.5 A µm or 50A µm ( older ) 9 A µm Link Length Short: & lt ; 1 kilometer Long: 10 kilometer to 100 kilometers Typical Wavelength of Transmitter 850 nanometer ( VSCEL ) 1310 nanometer ( FP ) or 1550 nanometer ( DFB ) Performance-Limiting Factor Modal scattering ( Chromatic scattering is undistinguished ) Chromatic scattering ( Modal scattering does non be ) Attenuation Approximate 3dB/km at 850 nanometers Approximate 0.4 dB/km at 1310 nanometer, 0.2 dB/km at 1550 nanometer Bandwidth Low High Sodium 0.28 0.13 Cost Cheaper More Expensive Table 2.1Multimode Fiber vs. Single-mode Fiber Single manner fibre will be used for this undertaking as the transmittal medium since it is used for long distance transmittal, typically 10 kilometers to 100 kilometers.Chapter 3MethodologyThis chapter is mentioned about the attack and method used to measure the public presentation of Hybrid Raman and Erbium Doped Fiber Amplifiers.Content of this chapter include the method usage to roll up the informations, informations analysis and factor considered when taking the attack and method. Figure 3.1: Undertaking Flow Chart This undertaking starts with the rubric that is provided by the supervisor. The rubric of the undertaking is public presentation rating of Hybrid Raman and Erbium Doped Fiber Amplifiers ( HFAs ) . By understanding the undertaking range and demands, a thorough reappraisal on specific subjects were done. Figure 3.1 below shows the undertaking block diagram that usage to measure the performanceof Hybrid Raman and Erbium-Doped Fiber Amplifiers. The input to the HFAs is signal power and pump power. The public presentation of HFA is evaluated based on end product power, optical Signal-to-Noise Ratio ( OSNR ) , and Bit Error Rate that can be obtained from the simulation consequence of Optical Spectrum Analyzer. The simulation procedure is repeateduntil the maximal end product power, maximal optical Signal-to-Noise Ratio is obtained and the Bit Error Rate is smaller than 10-9. The different value of input and end product value from simulation consequence will be tabular in tabular array and compared to supply a design parametric quantity for maximal approachable transmittal distance utilizing the intercrossed amplifiers. INPUT OUTPUT Figure 3.1: Undertaking block diagram There are different types of optical simulation package available in the market. For illustration: ModeSYS, OptSim, OptiSPICE, and Optisystem. OptiSystem is an advanced optical communicating system simulation bundle for the design, proving and optimisation of virtually any type of optical nexus in the physical bed of a wide spectrum of optical networks.The OptiSystem Component Library includes 100s of constituents that enable users to come in parametric quantities that can be measured from existent devices. Therefore, Optisystem package will be usage to imitate and measure the public presentation of the Hybrid Raman and Erbium Doped Fiber Amplifiers. However, the execution of HFAs into Optisystem package will merely be start at PSM 2.Chapter 4PRELIMINARY RESULT4.1 DiscussionFrom through reading and research, the circuit that will be utilizing for the simulation is as in Figure 2.3, Type II of single-pump dispersion-compensating Hybrid Raman and Erbium-Doped Fiber Amplifier ( HFAs ) . From Figure 2.3, the intercrossed amplifier recycling residuary Raman pump with a cascaded EDF subdivision located prior to a scattering compensatingfiber ( DCF ) . The Raman pump beginning consists of two optical maser rectifying tubes runing at 1455 nanometer and 1465 nanometer, severally. By uniting the two pump wavelengths with a inactive pump combiner, a entire power of up to 500mW was available. Since individual manner fibre is used for long distance transmittal, and the chromatic scattering is the chief performance-limiting factor for single-mode fibre. Therefore, a 12.6 kilometer DCF with 0.55 dB/km fading at a wavelength 1550 nanometer was used to counterbalance the fading. The 12.6 kilometers DCF with a group speed scattering of -98 ps/nm/km at 1550 nanometer can supply sufficient scattering for counterbalancing a 70 kilometer long individual manner fibre based transmittal span. By simulation, it is expected to acquire a addition of 21 dubnium and Noise Figure of 5 dubnium. 4.2 DecisionAt the terminal of the undertaking, it is expected to supply a design parametric quantity for maximal approachable transmittal distance utilizing the Hybrid Raman and Erbium Doped Fiber Amplifiers. Some of the restraints that limit the maximal transmittal distance are pump power, signal power, type and length of fibre used. The public presentation of the HFAs will be evaluated based on the amplifier ‘s addition, Optical Signal-to-Noise Ratio ( OSNR ) , Bit Error Rate ( BER ) and Noise Figure obtained from the simulation consequence. A addition of 21 dubnium, Noise Figure of 5 dubnium, and bit error rate less than 10-9 should be obtained in simulation consequence.