Thursday, October 31, 2019
The Substance Abuse Treatment Program in North Dakota Assignment
The Substance Abuse Treatment Program in North Dakota - Assignment Example As such, DCS does not have the instruments of coercion with which to handle violent outbreaks and acts of lawlessness which characterize incarceration. Offenders facing drug charges are to be treated immediately they are established to be addicted to hard drugs such as narcotics and are brought under prison custody. What informs this proposition is the need to foster public and prison health and safety. It is dangerous to have cocaine addicts in prison. The addict may have a violent predisposition or die because of the inability to access the drugs. Drug treatment for hard-drug addicted offenders will also help win the war on drugs. Drugs such as cigarettes may not fall within this rubric due to their relatively mild effects. Ideally, people facing drug charges are to be incarcerated when they are: peddling the hard drugs and substances; engaging in and abetting criminal activities such as forceful conscription into drugs; proven to be dangerous to others and to public order. From a personal standpoint, the most effective drug treatment method is the administration of psychosocial therapy. This is because psychosocial therapy factors the role of the individual and the strength of his will in defeating addiction. According to Gladding, and Wallace, psychosocial therapy in drug rehabilitation is vindicated by the fact that most people have recovered from drug addiction on their own and that the success or failure of any drug rehabilitation program pivots on personal will (Gladding and Wallace, 22, 23).Ã Ã
Tuesday, October 29, 2019
Organisations & Environment Essay Example | Topics and Well Written Essays - 750 words
Organisations & Environment - Essay Example Other sectors such as industries, forestry and wastes are 4%, 2% and 1.4% respectively. (cait.wri.org, 2006) However, UK only produces about 11 percent of the GHG produced by the United States. This paper compares the GHG emissions of UK with other nations such as the United States, Italy and France, providing an analysis of the current status of UK in GHG emissions, enabling us to conclude that UK must work towards lowering its GHG emissions. The United Nations Framework Convention on Climate Change (UNFCC) has taken steps towards curbing total emissions, which would make changes internationally. The United States produces nearly 23.11% of the total GHG emissions, ranking 1st in world emissions. When converted to carbon di oxide equivalents, the US produces 92641.4 parts. This is by far the largest amount produced by a single nation and the US is certainly focusing on reduction of emissions by involving in activities to reduce emissions such as emission trading. When compared with the UK, emissions are much more which is directly related to the large area and the population of industries in the United States. Italy also contributes to global emissions in considerable amounts but its emissions are much lesser than that ok the United Kingdom. However, statistical details provide proof that the emissions produced by Italy have risen over the past few years, even after the Kyoto protocol, which means that UK is doing a better job in curbing GHG emissions. Italy ranks 10th in global emissions, producing about 1.86% of the total emissions. When converted in terms of carbon dioxide equivalents, it produces 7454.2 parts. The emissions produced by UK in terms of carbondioxide equivalents are 9232.3 parts, more than that of Italy or France. This may be due to the rapid emergence of industries in UK. The total emissions produced by France accounts to 1.62% of global GHG. It produces 6483.3 parts in terms of carbon dioxide
Sunday, October 27, 2019
Evaluation of Code Smells Detection Using Meta-heuristics
Evaluation of Code Smells Detection Using Meta-heuristics Evaluation of code smells detection using Meta-heuristicsà Optimization algorithm Ragulraja.M Abstract-The development of software systems over many years leads to needless complexity and inflexibility inà design which leads to a large amount of effort for enhancements and maintenance. To take code smells detection as aà distributed optimization problem. The intention is that to aggregates different methods in parallel way to achieve aà common goal detection of code smells. To this conclusion, it utilized Parallel Evolutionary algorithms (P-EA) whereà numerous evolutionary algorithms with adaptation are executed in parallel cooperative manner, to find unanimityà between detection of code smells. An experimental results to compare the execution of our cooperative P-EA method withà random search, two genetic based approaches and two bad designs detection techniques are found to provide theà statistical measure of results witness to support the claim that cooperative P-EA is more economic and potential than theà art detection approaches based on benchmark of open source systems, whereas the results are generated in terms ofà precision and recall incurred on various code smells types. In this approach should corroborate on an extra code smellsà types with the objective of resolve the common applicability of our methodology. Keywords-Parallel Evolutionary Algorithm, Software Metrics, Code smells, Software Quality Engineering. I.INTRODUCTION Software maintenance projects are veryà costly. The total maintenance costs of Softwareà project are estimated to 40%-70% of the total cost of the lifecycle of the project consequently, reducing theà effort spent on maintenance can be seen as a naturalà way of reducing the overall costs of a softwareà project. This is one of the main reasons for the recentà interest in concepts such as refactoring and codeà smells. Hence, researchers have proposed severalà approaches to reduce defects in software .Suggestedà solutions include improvement of clarity in softwareà design, effective use of process and product metrics,à achievement of extensibility and adaptability in theà development process. The research focusing on theà study of bad software designs also called bad smellsà or code smells. To avoid these codes smellsà developers to understand the structure of source code. The large systems of existing work in badà smells or code smells detection relies on declarativeà rule specification. In these specifications, rules areà manually constructed to identify symptoms that canà be used for categorization code smells with objectà oriented metrics information. Each code smell, rulesà are defined in the form of metrics combinations. Many studies reported that manual categorizationà with declarative rule specification can be large. Theseà need a threshold value to specify the code smells. Further problem is that translation from symptoms toà rules is not obvious because there is no unanimityà symptom based description of bad smells. When unanimity occurs, the correlation of symptoms couldà be consociated with code smells types, it leads toà precise identification of code smells types. To handle these problems, we plan to extendà an approach based on use of genetic programming toà provide detection rules from the examples of codeà smells detection with metric combinations. However,à the quality of the rules depends on the behavioralà aspects of code smells, and it is not easy to confirmà that coverage also because there is still someà precariousness involves in detected code smells dueà to the difficulty to evaluate the coverage of the baseà of code smell examples. In another past work, we proposed techniqueà based on an artificial immune system metaphor toà detect code smells by deviation with well designedà systems. Thus, we believe in that an effective methodà will be to merge with detection algorithms toà discover consensus when detecting code smells. We intend to provide code smells detection as aà distributed optimization problem.The implementationà of our approach can be established by combiningà Optimization process in parallel manner to encounterà consensus involving detection of code smells. II. RELATED WORKS: There are various studies that have mainlyà based on the code smells detection in softwareà engineering using different methods. Theseà methodologies range from fully automatic detectionà to direct manual inspection. However,there is noà work that focuses on merging various detectionà algorithms to find unanimity when identifying codeà smells. In this work, the classification existingà approach for detection of code smells into variousà broad categories: symptom based approaches, manualà approaches, metric based approaches, search basedà approaches and cooperative based approaches. 2.1 Manual approaches: The software maintainers should manuallyà inspect the program to detect existing codeà anomalies. In addition, they mentioned particularà refactoringà ¢Ã¢â ¬Ã
¸s for each code smells type. Theà technique is to create a set of ââ¬Å"reading techniquesâ⬠à which help a reviewer to ââ¬Å"readâ⬠a design artifact forà calculating related information. The demerits ofà existing manual approaches is that they are finally aà human centric process which involves a great humanà effort and strong analysis and interpretation attemptà from software maintainers to find design fragmentsà that are related to code smells.Furthermore, theseà methods are time consuming, error prone and focusà on programs in their contexts. Another significantà issue is that locating code smells manually has beenà prescribed as more a human intuition than an accurateà science. 2.2 Metric based approaches: The ââ¬Å"detection strategyâ⬠mechanism forà formulating metric based rules for finding deviationsà from well design code. Detection strategies permits toà maintainer to directly find classes or methodsà subjected by a particular design smells. Theseà detection strategies for capturing about ten importantà flaws of object oriented design found in literature. Ità is accomplished by evaluating design quality of anà object oriented system via quantifying deviationsà from good design heuristics and principles byà mapping these design defects to class level metricsà such as complexity, coupling and cohesion by defining rules. Unfortunately, multi metrics neitherà encapsulate metrics in a more abstract construct,norà do they permit a negotiable combination of metrics. In common, the effectiveness of combining metric orà threshold is not clear, that is for each code smell,à rules that are declared in terms of metricà combinations need an important calibration effort toà find the fixing of threshold values for each metric. 2.3 Search based approaches: This approach is divined by contributions inà the domain of search based software engineering. SBSE uses search based approaches to resolveà optimizations problems in software engineering. Once the task is consider as a search problem, severalà search algorithms can be employed to solve thatà problem. Another approach is based on search basedà techniques, for the automatic identification ofà potential code smells in code. The detection focusedà on thenotion that more code deviates from goodà codes, the more likely it is bad. In another work,à detections rule will be produced and is described as aà combination of metrics or thresholds that betterà similar to known an examples of bad smells. Then,à the correction solutions, a combination of refactoringà operations, should reduce the number of bad smellsà detected using the detection rules. 2.4 Cooperative based approaches: Some cooperative approaches to referenceà software engineering problems have been proposedà recently, in this program and test cases co-evolve,à regulating each other with the aim of fixing theà maximum number of bugs in the programs. Theà objective is to improve the effectiveness of obtainedà test cases by evaluating their capabilities to avoidà mutants.The P-EA proposal is vary from existing coevolutionaryà approaches, this proposal based on twoà populations that are referencing the same problemà from various perspectives. Finally, the genetic basedà approaches are executed in parallel in our P-EAà framework. III. PROPOSED SCHEME In this paper, we suggested a new searchà based approach for detection of code smells. In thisà approach a parallel metaheuristic optimizationà algorithm adaptation, two genetic populations areà involves simultaneously with the target of eachà depending on the current population of other in aà parallel cooperative manner. Both populations areà generated, on the similar open source systems toà evaluate, and the solutions are punished based on theà intersection between the results of two populationsà are found. We extend our approach to various codeà smells types in order to resolve about commonà applicability ofcooperative parallel search basedà software engineering. Moreover, in this work we notà only focus on the detection of code smells but alsoà concentrate automated the correction of code smells. Furthermore, in this paper we consider theà essential need of code smells during the detectionà procedure using existing code changes, classes andà coupling complexity. Hence, the detected code smellsà will be ranked based on the severity score and also anà important score. We will measure also the use ofà more than two algorithms executed in parallelà manner as a part our work to generate results of moreà accuracy than art detection approach. The negativeà impact on the code smells can be removed byà applying more than two algorithms in cooperativeà manner ità ¢Ã¢â ¬Ã
¸s difficult to find the consensus betweenà the code smells. The research work will direct ourà approach to several software engineering problemsà such as software testing and quality assurance. IV. PROPOSED ARCHITECTURE Fig 1:system architecture 1. Metrics Evaluation 2. Evolutionary Algorithms 3. Code Smell Detection 4.1 METRICS EVALUATION 4.1.1 CK METRIC SUITE Chidember and kemerer proposed a six metricà suite used for analyzing the proposed variable. The sixà metric suite are: 1. Weighted Method Per Class(WMC): Consider a class C1 with methods M1â⬠¦.Mnà that are included in class. Let C1,C2â⬠¦Cn be the sum ofà complexity. WMC=à £ M 2. Depth Of Inheritance(DIT): The maximum length from the node to theà root of the tree. 3. Number Of Children(NOC): Number of immediate subclasses subordinatedà to a class in the class hierarchy. 4. Coupling Between Objects(CBO): It is a count of the number of other classes toà which it is coupled. 5. Response For a Class (RFC) It is the number of methods of the class plusà the number of methods called by any of thoseà methods. 4.1.2 Lack Of Cohesion of Methods (LCOM)à Measure the dissimilarity of methods in aà class via instanced variables. 4.2 EVOLUTIONARY ALGORITHMS The fundamental think of both algorithms isà to explore the search space by devising a populationà of candidate solutions, also called individuals,à germinate towards a ââ¬Å"goodâ⬠solution of a uniqueà problem. To measure the solutions, the fitnessà function in both algorithms has two components. Forà the first component of the fitness function, GPà evaluates the detection rules based on the coverage ofà code-smells examples. In GP, a solution is combinedà of terminals and functions. Hence, while applying GPà to clear particular problem, they should be carefullyà collected and fashioned to fulfil the requirements ofà the current problem. Afterwards, evaluating largeà parameters concerned to the code-smells detectionà problem, the terminal set and the function set areà recognized as follows. The terminals fit to differentà quality metrics with their threshold values (constantà values). The functions that can be used between theseà metrics ar e Union (OR) and Intersection (AND). The second algorithm run in parallel isà genetic algorithm that generates detectors from welldesignedà code examples. For GA, detectors defendà generated artificial code fragments dignified by codeà elements. Thus, detectors are mentioned as a vectorà where each dimension is a code element. We defendà these elements as sets of predicates. All predicateà type represents to a construct type of an objectorientedà system. Then, a set of best solutions areà collected from P-EA algorithms in each iteration,à Bothalgorithms interact with one other victimizingà the second component of the fitness function calledà intersection function. 4.3 CODE SMELLS DETECTION Code smells are design flaws that can beà solved by refactoringà ¢Ã¢â ¬Ã
¸s. They are considered as flagsà to the developer that some parts of the design may beà inappropriate and that it can be improved. For theà purpose of this work, we discuss a few representativeà code smells. There are a lot of code smells mentionedà in the development of this work. A thorough catalogà of code smells can be found in Fowlers refactoringà book. As this work focuses on program analysis, code smells discussed in this work include those thatà require analyses. Though this work develops only aà subset of the code smells, it provides some groundsà which can be adapted to other types of code smells. The set of best solutions from each algorithm isà stored and a new population of individuals isà generated by repetitively choosing pairs of parentà individuals from population p and employing theà crossover operator to them. We admit both the parentà and child variants in the new population pop. Then,à we apply the mutation operator, with a probabilityà score, for both parent and child to assure the solutionà diversity; this produces the population for the nextà generation. While applying change operators, noà individuals are transformed between the parallelà GA/GP. Both algorithms exit when the terminationà criterion is met, and issue the best set of rules andà detectors. At last, developers can use the best rulesà and detectors to find code-smells on new system toà evaluate. V. EXPERIMENTAL RESULTS Fig 2: The impact of the nmber of code smell example on detectionà results Fig 3: Average execution time comparison on the different system. VI. THREATS TO VALIDITY: Conclusion validity related with theà statistical relationship between the treatment andà outcome. The Wilcoxon rank sum test was used withà a 95 percent confidence level to test its importantà differences exist between the measurements forà different treatments. This test makes no suppositionà that the data is normally distributed and is suitable forà ordinal data, so we can be assured that the statisticalà relationships observed are significant. Theà comparison with other techniques not based onà heuristic search; consider the parameters obtainedà with the tools. This can be regarded as a threat thatà can be addressed in the future by developing theà impact of various parameters on the quality of resultsà of DÃâ°COR and JDeodorant. Internal validity is related with the casualà relationship between the treatment and outcome. Toà consider the internal threats to validity in theà utilization of stochastic algorithms since thisà experimental work based on 51 independentà simulation runs for each problem instance and theà obtained results are statistically analyzed by using theà Wilcoxon rank sum test with a 95 percent fairà comparison between CPU times. VII. CONCLUSION AND FUTURE WORK In this approach a parallel metaheuristicà optimization algorithm adaptation, two geneticà populations are involves simultaneously with theà target of each depending on the current population ofà other in a parallel cooperative manner. Bothà populations are generated, on the similar open sourceà systems to evaluate, and the solutions are punishedà based on the intersection between the results of twoà populations are found.Moreover, in this work we notà only focus on the detection of code smells but alsoà concentrate automated the correction of codeà smells.Furthermore, in this paper we consider theà essential need of code smells during the detectionà procedure using existing code changes, classes andà coupling complexity. Hence, the detected code smellsà will be ranked based on the severity score and also anà important score. We will measure also the use ofà more than two algorithms executed in parallelà manner as a part our work to generate result s of moreà accuracy than art detection approach. Future workà should corroborate our method with remaining codeà smell types with the objective conclude about theà common applicability of our methodology. We willà assess also the use of more than the algorithmà accomplish simultaneously as a part of our rest of ourà future work. Another future issue direction attachedà to our approach is to adapt our cooperative parallelà evolutionary approach to various softwareà engineering problems such as software testing andà the following release problem. VIII. REFERENCES 1) WaelKessentini,MarouaneKessentini,HouariSahraoà ui, Slim Bechikh:â⬠A Cooperative Parallel Search-Based Software Engineering Approach for Code-Smells Detectionâ⬠IEEE Trans. Softw. Eng.,vol. 40,à no. 9, Sep 2014. 2) N. Moha, Y. G. Gu_eh_eneuc, L. Duchien, and A.à F. Le Meur, ââ¬Å"DECOR: A method for the specificationà and detection of code and design smells,â⬠IEEEà Trans. Softw. Eng., vol. 36, no. 1, pp. 20ââ¬â36,à Jan./Feb. 2010. 3) Chidamber, S., Kemerer, C.: ââ¬Å¾A metrics suite forà object oriented designà ¢Ã¢â ¬Ã
¸,IEEE Trans. Softw. Eng.,à 1994, 20, (6), pp. 476ââ¬â493.à 4) Mark Harman and AfshinMansouri.:â⬠Search Basedà Software Engineering: Introduction to the Specialà Issue of the IEEE Transactions on Softwareà Engineeringâ⬠,â⬠IEEE Trans. Softw. Eng., vol. 36, no.à 6,Nov./Dec. 2010.à 5) F. Khomh, S. Vaucher, Y. G. Gu_eh_eneuc, and H.A. Sahraoui, ââ¬Å"A bayesian approach for the detectionà of code and design smells,â⬠in Proc. Int. Conf.à Quality Softw., 2009, 305ââ¬â314. 6) R. Marinescu, ââ¬Å"Detection strategies: Metrics-basedà rules for detecting design flaws,â⬠in Proc. 20th Int.à Conf. Softw. Maintenance, 2004, pp. 350ââ¬â359. 7) M. Kessentini, W. Kessentini, H. A. Sahraoui, M.à Boukadoum, and A. Ouni, ââ¬Å"Design defectsà detection and correction by example,â⬠in Proc. IEEEà 19th Int. Conf. Program Comprehension, 2011, pp.à 81ââ¬â90. 8) T. Burczy_nskia, W. Ku_sa, A. Dà »ugosza, and P.à Oranteka,ââ¬Å"Optimization and defect identificationà using distributed evolutionary algorithms,â⬠Eng.à Appl. Artif. Intell., vol. 4, no. 17, pp. 337ââ¬â344, 2004. 9) A. Ouni, M. Kessentini, H. A. Sahraoui, and M.à Boukadoum, ââ¬Å"Maintainability defects detection andà correction: A multiobjective approach,â⬠Autom.à Softw. Eng., vol. 20, no. 1, pp. 47ââ¬â79, 2012. 10) O. Ciupke, ââ¬Å"Automatic detection of designà problems in objectoriented reengineering,â⬠in Proc.à Int. Conf. Technol. Object-OrientedLanguage Syst.,à 1999, pp. 18ââ¬â32. 12) G. Travassos, F. Shull, M. Fredericks, and V. R.à Basili, ââ¬Å"Detecting defects in object-oriented designs:à Using reading techniques to increase softwareà quality,â⬠in Proc. Int. conf. Object-Orientedà Program.,Syst., Languages, Appl., 1999, pp. 47ââ¬â56. 13) M. Harman, S. A. Mansouri, and Y. Zhang,à ââ¬Å"Search-based software engineering: Trends,à techniques and applications,â⬠ACM Comput. Surv.,à vol. 45, no. 1, 61 pages. 14) A. Arcuri, X. Yao, ââ¬Å"A novel co-evolutionaryà approach to automatic software bug fixing,â⬠in Proc.à IEEE Congr. Evol. Comput., 2008, pp. 162ââ¬â168. 15) M. J. Munro, ââ¬Å"Product metrics for automaticà identification of ââ¬Å¾Bad Smellà ¢Ã¢â ¬Ã
¸ design problems in Javaà source-code,â⬠in Proc. IEEE 11th Int. Softw. Metricsà Symp., 2005, pp. 15ââ¬â15.à 16) W. Banzhaf, ââ¬Å"Genotype-phenotype-mapping andà neutral variation: A case study in geneticà programming,â⬠in Proc. Int. Conf. Parallel Problemà Solving from Nature, 1994, pp. 322ââ¬â332. 17) W. H. Kruskal and W. A. Wallis, ââ¬Å"Use of ranks inà one-criterion variance analysis,â⬠J. Amer. Statist.à Assoc., vol. 47, no. 260, pp. 583ââ¬â621, 1952. 18) W. J. Brown, R. C. Malveau, W. H. Brown, andà T. J. Mowbray, ââ¬Å"Anti Patterns: Refactoring Software,à Architectures, and Projects in Crisisâ⬠. Hoboken, NJ,à USA: Wiley, 1998. 19) N. Fenton and S. L. Pfleeger, ââ¬Å"Software Metrics:à A Rigorous and Practical Approachâ⬠. Int. Thomsonà Comput. Press, London, UK, 1997.à 20) Emerson Murphy-Hill, Chris Parnin, and Andrewà P. Blackâ⬠How We Refactor, and How We Knowà Itâ⬠,IEEE Trans. Softw. Eng.,vol. 38,no. 1, Jan./Feb.à 2012. 21) M. Fowler, K. Beck, J. Brant, W. Opdyke, and D.à Roberts, ââ¬Å"Refactoring: Improving the Design ofà Existing Codeâ⬠. Reading, MA,USA: Addisonà Wesley, 1999.
Friday, October 25, 2019
Macbeth Essay -- English Literature Essays
Macbeth Trace Macbeths change over the course of the play. How does Shakespeare convey it? The transition from brave and loyal thane to brutal tyrant king can be easily traced, when focusing on the character of Macbeth throughout the play. All aspects of the character change to some extent as his sins and treachery increase in extremity; this includes his relationship with his wife and friends, his clothing, his style of speaking, his attitudes towards fate, paranoia and fear. Shakespeare conveys this change in character to the reader by making all of these different and changing character aspects obvious at some stage during the play. At the start of the play lady Macbeth is the more dominant character in the relationship. In his letter to his wife about the witches' prophecies, Macbeth writes, "This have I thought good to deliver thee, my dearest partner of greatness, that thou mightst not lose the dues of rejoicing, by being ignorant of what greatness is promised thee". He knows that his "partner" will like the idea of being Queen and seems to offer the news as a kind of present, this shows that Macbeth really feels as though he has to please her. However, it is Lady Macbeth that takes charge of the situation and ensures that Duncan is murdered, rather than allowing Macbeth to have his way and let Duncan live. After Macbeth has committed the murder he is distraught and talking about the intensity of the blood on his hands, once again Lady Macbeth takes control of the situation, by saying ââ¬Å"a little water clears us of this deedâ⬠she attempts to clear Macbeths conscience. The change in the obvious contr ol Lady Macbeth holds over Macbeths actions, in the first two acts, becomes evident in the banquet scene ( scene 4, act 3 ), by this stage Macbeth is arranging the murder of Banquo without the assistance or reassurance of Lady Macbeth, however, when Macbeth is supposedly seeing the ghost of Banquo later on in the scene, it is Lady Macbeth who, once again, is put into a position of control, as she attempts to cover for her husband and explain his confusing speeches. As the play continues, the plot intensifies, and as Macbeth changes, Lady Macbeth plays a smaller role in the outcome of events. The audience sees her character in decreasing amounts, after the banquet scene, she only features in scene 1, Act 5. Which shows her increasing insanity, as Lad... ...s may not have had any supernatural powers whatsoever, other than Macbeth receiving the title of thane of Cawdor, which may have been coincidence, Macbeth caused everything else to happen, not giving fate a chance as he was causing everything to happen himself. Whether or not you make you own fate is one of the major themes explored by Shakespeare in the play of Macbeth. In the final scene of the play Malcolm describes Macbeth as a ââ¬Å"dead butcherâ⬠this in itself sums up the change of Macbeths character, especially when compared to the praise received by the character during the first act of the play. During the early stages of the play Macbeth is described as a ââ¬Å"worthy cousinâ⬠to the king and as a ââ¬Å"noble partnerâ⬠to Banquo, by the end of the play Macbeth has ensured the death of both, either doing it himself or arranging for murderers to do the deed. One has to wonder if it was in Macbeths destiny to face such changes in character, or if it happened as a result of the three weird sisters, playing with a situation that was not meant for their involvement. Regardless of the cause, Shakespeare successfully shows the change in character throughout the play in a large variety of ways. Macbeth Essay -- English Literature Essays Macbeth Trace Macbeths change over the course of the play. How does Shakespeare convey it? The transition from brave and loyal thane to brutal tyrant king can be easily traced, when focusing on the character of Macbeth throughout the play. All aspects of the character change to some extent as his sins and treachery increase in extremity; this includes his relationship with his wife and friends, his clothing, his style of speaking, his attitudes towards fate, paranoia and fear. Shakespeare conveys this change in character to the reader by making all of these different and changing character aspects obvious at some stage during the play. At the start of the play lady Macbeth is the more dominant character in the relationship. In his letter to his wife about the witches' prophecies, Macbeth writes, "This have I thought good to deliver thee, my dearest partner of greatness, that thou mightst not lose the dues of rejoicing, by being ignorant of what greatness is promised thee". He knows that his "partner" will like the idea of being Queen and seems to offer the news as a kind of present, this shows that Macbeth really feels as though he has to please her. However, it is Lady Macbeth that takes charge of the situation and ensures that Duncan is murdered, rather than allowing Macbeth to have his way and let Duncan live. After Macbeth has committed the murder he is distraught and talking about the intensity of the blood on his hands, once again Lady Macbeth takes control of the situation, by saying ââ¬Å"a little water clears us of this deedâ⬠she attempts to clear Macbeths conscience. The change in the obvious contr ol Lady Macbeth holds over Macbeths actions, in the first two acts, becomes evident in the banquet scene ( scene 4, act 3 ), by this stage Macbeth is arranging the murder of Banquo without the assistance or reassurance of Lady Macbeth, however, when Macbeth is supposedly seeing the ghost of Banquo later on in the scene, it is Lady Macbeth who, once again, is put into a position of control, as she attempts to cover for her husband and explain his confusing speeches. As the play continues, the plot intensifies, and as Macbeth changes, Lady Macbeth plays a smaller role in the outcome of events. The audience sees her character in decreasing amounts, after the banquet scene, she only features in scene 1, Act 5. Which shows her increasing insanity, as Lad... ...s may not have had any supernatural powers whatsoever, other than Macbeth receiving the title of thane of Cawdor, which may have been coincidence, Macbeth caused everything else to happen, not giving fate a chance as he was causing everything to happen himself. Whether or not you make you own fate is one of the major themes explored by Shakespeare in the play of Macbeth. In the final scene of the play Malcolm describes Macbeth as a ââ¬Å"dead butcherâ⬠this in itself sums up the change of Macbeths character, especially when compared to the praise received by the character during the first act of the play. During the early stages of the play Macbeth is described as a ââ¬Å"worthy cousinâ⬠to the king and as a ââ¬Å"noble partnerâ⬠to Banquo, by the end of the play Macbeth has ensured the death of both, either doing it himself or arranging for murderers to do the deed. One has to wonder if it was in Macbeths destiny to face such changes in character, or if it happened as a result of the three weird sisters, playing with a situation that was not meant for their involvement. Regardless of the cause, Shakespeare successfully shows the change in character throughout the play in a large variety of ways.
Thursday, October 24, 2019
Business Environment Essay
Introduction: In this assignment I will be explaining how the two businesses that I have chosen from my previous assignment P3, how they present the organisational structure and how strategic planning helps them achieve its purposes and aims. This assignment will include the following * The aims of Coca- Cola and Nike * How the strategic planning helps them both to achieve these aims * How the organisational structure helps to achieve the aims of both organizations The aims and purposes of Coca Cola: The mains aim of Coca cola is to revive the world in mind, body and soul. Coca Cola Company is to provide to ensure this the company ensure that all employees are working to their highest standards test product that they can to the public, and create customer satisfaction. o create the best product, in the quickest possible time to make sure that there is an ability for quick distribution. The main goals and objectives of Coca-Cola are to be the finest beverage sales and customer Service Company. This means being the first or second brand in every group in which then can contest, being the customers most appreciated supplier and establishing a winning and inclusive culture. They also aim to never let their high standards of quality fail. To do this, there are strict evaluations at each stage of the manufacture of all products at Coca Cola production plants, throughout the day. When distributing any products, Coca Cola arrange with the distribution companies what standards Coca Cola expect from them. This means that the customer will always be to create a value and make a difference- everywhere they engage and to inspire moments of optimism through their brands and actions The aims and purposes of Nike: Nikes main objective is to develop products that help athletes of every level of ability reach their potential, to create business opportunities that set Nike apart from the competition and to provide value for its shareholders. As they are in the private sector the main objective would be to make a profit. However with all organisations this would be surrounded with other aims and objectives that their organisation may have set in place at the beginning of their campaign. For example Nike has an aim to be the largest sporting organisation for the foreseeable future, which they are currently achieving. Other aims and objectives that Nike may set out would be to improve the working conditions of the factories in the Less Economically Developed Countries. How strategic planning helps Coca-Cola achieve its aims: Coca-Cola is a household name the company can control soft drink market. Their success can be attributed to their overall strategy to produce and promote their products. Coca-Cola decided to build global brands to bottlers throughout the world. And a portion of the proceeds goes toward advertising to build and maintain brand awareness. Coca-Cola is responsible for producing and distributing to vending machines, supermarkets, restaurants, and other retail outlets. However, the advertising is left up to Coca-Cola. In addition, they must sign an agreement that prohibits them from distributing competing cola brands. Their strategy is simple, yet dynamic. It forces bottlers to enter into exclusive agreements, which creates a high barrier to entry into the industry. Any potential competitor must create their distribution network rather than use the existing one. And the large amounts of money spent on advertising helps to develop a global brand name and differentiate their products. How strategic planning helps Nike achieve its aims: The strategic plan aims to focus Nikes vision and priorities in response to a changing environment and to ensure that members of the Nike are working towards the same goals. Strategic management harnesses the full potential of an Nike by integrating daily operational decisions into the strategic process. Strategic management is a task for the whole company all the time. It is a way of thinking and a guide to action, and should govern the behaviour of everybody concerned. It enables Nike to think through and document what they are doing, for whom they are doing it, and why. How organisational structure helps Coca-Cola to achieve its aims: The Coca-Cola Company, have built flexible structures which, wherever possible, encourage teamwork. For example, at Coca-Cola Great Britain any new product development (e.g. Coca-Cola Vanilla) brings together teams of employees with different specialisms. At such team meetings, marketing specialists clarify the results of their market research and testing, food technologists describe what changes to a product are feasible, financial expertââ¬â¢s reports on the cost implications of change. How organisational structure helps Nike to achieve its aims: The organizational structure of a Nike helps affect a workplace culture, employee motivation, performance and cooperation. Selecting the correct structure that compliments Nikeââ¬â¢s goals and objectives can positively affect employeeââ¬â¢s behaviours and attitudes, as well as a lead to more effective teamwork and networking opportunities that build stronger worker relationships throughout the Nike industryââ¬â¢s. Planning and implementing an organizational structure will help determine the necessary workforce talent to build a successful business like Nike. Conclusion: What I have learnt is that how they style of organisation helps them to fulfil their purposes through there aims and purposes for example, They have built flexible structures which encourage great team work for both organisations. Also and through their strategic planning for example Strategic management is a task for the whole company all the time so they need to organise the company in order to a achieve the best successful organised business.
Wednesday, October 23, 2019
Economic Consequences of Software Crime
In 1996 worldwide illegal copying of domestic and international software cost $15. 2 billion to the software industry, with a loss of $5. 1 billion in the North America alone. Some sources put the total up-to-date losses, due to software crime, as high as $4. 7 trillion. On the next page is a regional breakdown of software piracy losses for 1994. Estimates show that over 40 percent of North American software company revenues are generated overseas, yet nearly 85 percent of the software industryâ⬠s piracy losses occurred outside of North America. The Software Publishers Association (SPA) indicated that approximately 35 percent of the business software in the North America was obtained illegally. In fact, 30 percent of the piracy occurs in corporate settings. In a corporate setting or business, every computer must have its own set of original software and the appropriate number of manuals. It is illegal for a corporation or business to purchase a single set of original s! oftware and then load that software onto more than one computer, or lend, copy or distribute software for any reason without the prior written consent of the software manufacturer. Many software managers are concerned with the legal compliance, along with asset management and costs to their organizations. Many firms involve their legal departments and human resources in regards to software distribution and licensing. Information can qualify to be property in two ways; patent law and copyright laws which are creations of federal statutes, which are subject to Constitutional authority. In order for the government to prosecute the unauthorized copying of computerized information as theft, it must first rely on other theories of information-as-property. Trade secret laws are created by provincial law, and most jurisdictions have laws that criminalize the violations of a trade-secret holderâ⬠s rights. The definition of a trade secret varies somewhat from province to province, but commonly have the same elements. For example, the information must be secret, not of public knowledge or of general knowledge in the trade or business. A court will allow a trade secret to be used by someone who discovered or developed the trade secret independently if the holder takes adequate precautions to protect the secret. In 1964, the National Copyright Office began to register software as a form of literary expression. The office based its decision on White-Smith Music Co. v. Apollo, where the Supreme Court determined that a piano roll used in a player piano did not infringe upon copyrighted music because the roll was part of a mechanical device. Since a computer program is textual, like a book, yet also mechanical, like the piano roll in White-Smith, the Copyright Office granted copyright protection under the rule of doubt. In 1974, the government created the Natural Commission on New Technological Uses (CONTU) to investigate whether the evolving computer technology field outpaced the existing copyright laws and also to determine the extent of copyright protection for computer programs. CONTU concluded that while copyright protection should extend beyond the literal source code of a computer program, evolving case law should determine the extent of protection. The commission also felt copyright was the best alternative among existing intellectual property protective mechanisms. CONTU rejected trade secret and patents as viable protective mechanisms. The CONTU report resulted in the 1980 Computer Software Act, and the report acts as informal legislative history to aid the courts in interpreting the Act. In 1980, the Copyright Act was amended to explicitly include computer programs. It now states that it is illegal to make or to distribute copies of copyrighted material without authorization, except for the userâ⬠s right to make a single backup copy for archival purposes. Any written material (including computer programs) fixed in a tangible form (written somewhere ââ¬â i. . printout) is considered copyrighted without any additional action on the part of the author. Therefore, it is not necessary that a copy of the software program be deposited with the National Copyright Office for the program to be protected as copyrighted. With that in mind a copyright is a property right only. In order to prevent anyone from selling your software programs, you must ask a (federal) court to stop that person by an injunction and to give you damages for the injury they have done to you by selling the program. The Software Rental Amendments Act was approved in 1990. This Act prohibits the commercial rental, leasing or lending of software without the express written permission of the copyright holder. Another amendment to the Copyright Act was passed in 1992. This amendment made software piracy a federal offense, and instituted criminal penalties for copyright infringement of software. The penalties can include imprisonment of up to five years, fines up to $250,000 or both for unauthorized reproduction or distribution of 10 or more copies of software with a total retail value exceeding $2,500 or more. According to federal law duplicating software for profit, making multiple copies for use by different users within an organization, and giving an unauthorized copy to someone else is prohibited. Under this law if anyone is caught with the pirated software, an individual or the individualâ⬠s company can be tried under both civil and criminal law. A Civil action may be established for injunction, actual damages (which includes the infringerâ⬠s profits) or statutory damages up to $100,000 per infringement. The criminal penalties for copyright infringement can result in fines up to $250,000 and a jail term up to five years for the first offense and ten years for a second offense. When software is counterfeit or copied, the software developer loses their revenue and the whole software industry feels the effect of piracy. All software developers spend a lot of time and money in developing software for public use. A portion of every dollar spent in purchasing original softwar! e is funneled back into research and development of new software. Software piracy can be found in three forms: software counterfeiting, which is the illegal duplication and sale of copyrighted software in a form that is designed to make it appear to be a legitimate program; Hard disk loading, whereby computer dealers load unauthorized copies of software onto the hard disks of personal computers, which acts as an incentive for the end user to buy the hardware from that particular dealer; and downloading of copyrighted software to users connected by modem to electronic bulletin boards and/or the Internet. When software is pirated the consumer pays for that cost by new software and/or upgrade version being more expensive. Federal appellate courts have determined that operating systems, object code and software contained in ROMs are protected by copyright. Some lower federal courts have also determined that microcode (the instructions set on microprocessor chips) and the look and feel of computer screens is subject to copyright protection. Which has created major problems for the widespread development of multimedia applications with regards to clearing copyright for small elements of text, images, video and sound. The United States Government has been an active participant in protecting the rights of the software industry. When the Business Software Alliance (BSA) conducts a raid, Federal Marshals or local law enforcement officials participate as well. An organization known as the Software Publishers Association (SPA) is the principal trade association of the PC software industry. SPA works closely with the FBI and has also written an enforcement manual for the FBI to help them investigate pirate bulletin board systems and organizations (audits). With the help of the FBI, the result of enforcement actions resulted in recoveries from anti-piracy actions totaling $16 million since the program started in 1990. The Software Publishers Association (SPA) funds an educational program to inform individuals and corporations about software use and the law. This program provides all PC users with the tools needed to comply with copyright law and become software legal. The SPA also publishes brochures free of charge about the legal use of software for individuals and businesses. Also available to help corporations understand the copyright law is a 12-minute videotape, which is composed of the most commonly asked questions and answers to them. The video tape is available in French and Spanish and all together over 35,000 copies of the tape had been sold. The SPA has also compiled a free Self-Audit Kit with which organizations can examine their software use practices. Included in the kit, is a software inventory management program designed to help an organization track their commercial software programs that are on all their hard disks. The program searches the PCâ⬠s hard disk for more than 1300 of the most common programs used in business. Also available is the SPA Software Management Guide which helps companies audit their current software policies, educate employees about the legal use of software, and establish procedures to purchase, register, upgrade and backup computing systems. The guide, in addition, provides an Internal Controls Analysis and Questionnaire. The guide also contains all of the SPAâ⬠s current anti-piracy materials. The software industry is facing the challenges of more sophisticated network environments, greater competition among software companies along with hardware manufacturers. At this moment more software than ever before is distributed on a high volume, mass marketed basis. There are many types of software out on the market and the amount is increasing every day. They range from graphical user interfaces for application programs such as mass-market spreadsheets, to more sophisticated technical software used to design integrated circuits. The use of software plays a more vital role in our daily lives than it ever has. Such as embedded software, which is critical to equipment in such locations as a doctorâ⬠s office or an automotive shop. The instrument and devices found there depend more and more on software, because software provides the flexibility to meet the many different needs to the end user. As our lives our shaped and enhanced more by technology, there is already a greater demand that impacts the software industry. One of the main concerns of the software industry is how to deal with the issues of software licensing. More and more customers want customized software suited for their business or personal need, and expect the software development firms to accommodate to their wishes. The other side of this issue is that software development firms are concerned with unrealized revenue and excess costs in the form of software piracy, unauthorized use, excess discounts and lengthened sales cycles. For the customer and the software development firm, all of these have high administrative costs in regards to software programs. Software licensing policies were originally a result of software developerâ⬠s need to protect their revenue base in the face of potential piracy. Product delivery for software is made up of a number of different components, which are referred to as software licensing. The following factors are taken into consideration when determining a cost for a software license; physical delivery pricing, metric discounts, license periods support and maintenance, license management Tech support, change in use bug fixes and Platform Migration Product enhancements. The most commonly found type of software license found in business is known as a network license. There are four types of categories that are classified as a network license. Concurrent use licenses authorize a specified number of users to access and execute licensed software at any time. Site licenses authorize use at a single site, but are slowly being phased out and replaced by enterprise licenses. Enterprise licenses cover all sites within a corporation because of more virtual computing environments. Node licenses are also slowly being phased out because they are mainly used in a client/server environment, since the licensed software may be used only on a specified workstation in which a user must log on to in order to access and execute the software application. Currently the trend in a network system is to use measurement software, which allows vendors to be more flexible in licensing arrangements. This management software monitors and restricts the number of users or clients who may access and execute the application software at any one time. This is significant because a user pays only for needed use and a vendor can monitor such use to protect intellectual property. A new type of license that is emerging is known as a currency-based license. This type of license works on the basis that it provides to the end user a specified dollar amount of software licenses. This allows licenses to cover different business application software, so long as the total value in use at a given time is less than the amount stipulated in the license. Another type of license emerging is known as a platform-independent licensing. Which permits software to be used on a variety of different computer systems within a business, instead of buying a different license for each version of the same software used by different systems. The most common type of licensing is known as shrink-wrap, the concept behind this that the licenses terms are deemed accepted once the end user breaks a shrink-wrap seal or opens a sealed envelope containing the software. A reason for these new types of licensing is that when software licensing was first introduced, the software development firms assumed that most businesses would use the software for a 8 to 10 hour period. Yet, did not take into consideration that with the advancement of technology, more businesses would want a floating license across the world for 24 hours. This made it so it was not cost effective for the software development firm. A floating license is a license that is made available to anyone on a network. The licenses are not locked to particular workstations, instead they float to modes on the network. Shareware, freeware and public domain are different types of software available to the end user, and are distinguished by different rules about how programs may be distributed, copied, used and modified. The term shareware refers to software that is distributed at a low cost, but which usually requires a payment after a certain time period and registration for full use. Copies of this software are offered on a trial basis, the end user is free to try a scaled down version of the program. If the end user wants the shareware program, included in the program is information specifying how to register the program and what fee is required. Once registered the end user will typically receive a printed manual, an updated copy of the software (often with additional features), and the legal right to use the program in their home or business. The advantage that shareware has is that it lets the end user thoroughly test a program to see if itâ⬠s useful before making a purchase. The ! authors of shareware programs retain their copyright on the contents, and as other copyrighted software should not be pirated. Freeware is also distributed at a very low cost and like shareware is found mainly on the Internet. The authors of the freeware program do not expect payment for their software. Typically, freeware programs are small utilities or incomplete programs that are released by authors for the potential benefit to others, but the drawback to this is that there is no technical support. Public domain software is generally found on the Internet and is released without any condition upon its use. It may be copied, modified and distributed as the end user wishes to do. A license manager is a system utility-like application that controls or monitors the use of another end-user application. It is generally implemented to protect intellectual property (meaning to stop illegal copying) and/or to become more competitive by offering new ways in which to evaluate, purchase and pay for software. Since the license manager controls the number of application users, there is not a need to control the number of application copies. This process lets the end user run one or more applications between machines, without violating the terms of the license agreement.
Subscribe to:
Posts (Atom)