Thursday, October 31, 2019

The Substance Abuse Treatment Program in North Dakota Assignment

The Substance Abuse Treatment Program in North Dakota - Assignment Example As such, DCS does not have the instruments of coercion with which to handle violent outbreaks and acts of lawlessness which characterize incarceration. Offenders facing drug charges are to be treated immediately they are established to be addicted to hard drugs such as narcotics and are brought under prison custody. What informs this proposition is the need to foster public and prison health and safety. It is dangerous to have cocaine addicts in prison. The addict may have a violent predisposition or die because of the inability to access the drugs. Drug treatment for hard-drug addicted offenders will also help win the war on drugs. Drugs such as cigarettes may not fall within this rubric due to their relatively mild effects. Ideally, people facing drug charges are to be incarcerated when they are: peddling the hard drugs and substances; engaging in and abetting criminal activities such as forceful conscription into drugs; proven to be dangerous to others and to public order. From a personal standpoint, the most effective drug treatment method is the administration of psychosocial therapy. This is because psychosocial therapy factors the role of the individual and the strength of his will in defeating addiction. According to Gladding, and Wallace, psychosocial therapy in drug rehabilitation is vindicated by the fact that most people have recovered from drug addiction on their own and that the success or failure of any drug rehabilitation program pivots on personal will (Gladding and Wallace, 22, 23).  Ã‚  

Tuesday, October 29, 2019

Organisations & Environment Essay Example | Topics and Well Written Essays - 750 words

Organisations & Environment - Essay Example Other sectors such as industries, forestry and wastes are 4%, 2% and 1.4% respectively. (cait.wri.org, 2006) However, UK only produces about 11 percent of the GHG produced by the United States. This paper compares the GHG emissions of UK with other nations such as the United States, Italy and France, providing an analysis of the current status of UK in GHG emissions, enabling us to conclude that UK must work towards lowering its GHG emissions. The United Nations Framework Convention on Climate Change (UNFCC) has taken steps towards curbing total emissions, which would make changes internationally. The United States produces nearly 23.11% of the total GHG emissions, ranking 1st in world emissions. When converted to carbon di oxide equivalents, the US produces 92641.4 parts. This is by far the largest amount produced by a single nation and the US is certainly focusing on reduction of emissions by involving in activities to reduce emissions such as emission trading. When compared with the UK, emissions are much more which is directly related to the large area and the population of industries in the United States. Italy also contributes to global emissions in considerable amounts but its emissions are much lesser than that ok the United Kingdom. However, statistical details provide proof that the emissions produced by Italy have risen over the past few years, even after the Kyoto protocol, which means that UK is doing a better job in curbing GHG emissions. Italy ranks 10th in global emissions, producing about 1.86% of the total emissions. When converted in terms of carbon dioxide equivalents, it produces 7454.2 parts. The emissions produced by UK in terms of carbondioxide equivalents are 9232.3 parts, more than that of Italy or France. This may be due to the rapid emergence of industries in UK. The total emissions produced by France accounts to 1.62% of global GHG. It produces 6483.3 parts in terms of carbon dioxide

Sunday, October 27, 2019

Evaluation of Code Smells Detection Using Meta-heuristics

Evaluation of Code Smells Detection Using Meta-heuristics Evaluation of code smells detection using Meta-heuristics  Optimization algorithm Ragulraja.M Abstract-The development of software systems over many years leads to needless complexity and inflexibility in  design which leads to a large amount of effort for enhancements and maintenance. To take code smells detection as a  distributed optimization problem. The intention is that to aggregates different methods in parallel way to achieve a  common goal detection of code smells. To this conclusion, it utilized Parallel Evolutionary algorithms (P-EA) where  numerous evolutionary algorithms with adaptation are executed in parallel cooperative manner, to find unanimity  between detection of code smells. An experimental results to compare the execution of our cooperative P-EA method with  random search, two genetic based approaches and two bad designs detection techniques are found to provide the  statistical measure of results witness to support the claim that cooperative P-EA is more economic and potential than the  art detection approaches based on benchmark of open source systems, whereas the results are generated in terms of  precision and recall incurred on various code smells types. In this approach should corroborate on an extra code smells  types with the objective of resolve the common applicability of our methodology. Keywords-Parallel Evolutionary Algorithm, Software Metrics, Code smells, Software Quality Engineering. I.INTRODUCTION Software maintenance projects are very  costly. The total maintenance costs of Software  project are estimated to 40%-70% of the total cost of the lifecycle of the project consequently, reducing the  effort spent on maintenance can be seen as a natural  way of reducing the overall costs of a software  project. This is one of the main reasons for the recent  interest in concepts such as refactoring and code  smells. Hence, researchers have proposed several  approaches to reduce defects in software .Suggested  solutions include improvement of clarity in software  design, effective use of process and product metrics,  achievement of extensibility and adaptability in the  development process. The research focusing on the  study of bad software designs also called bad smells  or code smells. To avoid these codes smells  developers to understand the structure of source code. The large systems of existing work in bad  smells or code smells detection relies on declarative  rule specification. In these specifications, rules are  manually constructed to identify symptoms that can  be used for categorization code smells with object  oriented metrics information. Each code smell, rules  are defined in the form of metrics combinations. Many studies reported that manual categorization  with declarative rule specification can be large. These  need a threshold value to specify the code smells. Further problem is that translation from symptoms to  rules is not obvious because there is no unanimity  symptom based description of bad smells. When unanimity occurs, the correlation of symptoms could  be consociated with code smells types, it leads to  precise identification of code smells types. To handle these problems, we plan to extend  an approach based on use of genetic programming to  provide detection rules from the examples of code  smells detection with metric combinations. However,  the quality of the rules depends on the behavioral  aspects of code smells, and it is not easy to confirm  that coverage also because there is still some  precariousness involves in detected code smells due  to the difficulty to evaluate the coverage of the base  of code smell examples. In another past work, we proposed technique  based on an artificial immune system metaphor to  detect code smells by deviation with well designed  systems. Thus, we believe in that an effective method  will be to merge with detection algorithms to  discover consensus when detecting code smells. We intend to provide code smells detection as a  distributed optimization problem.The implementation  of our approach can be established by combining  Optimization process in parallel manner to encounter  consensus involving detection of code smells. II. RELATED WORKS: There are various studies that have mainly  based on the code smells detection in software  engineering using different methods. These  methodologies range from fully automatic detection  to direct manual inspection. However,there is no  work that focuses on merging various detection  algorithms to find unanimity when identifying code  smells. In this work, the classification existing  approach for detection of code smells into various  broad categories: symptom based approaches, manual  approaches, metric based approaches, search based  approaches and cooperative based approaches. 2.1 Manual approaches: The software maintainers should manually  inspect the program to detect existing code  anomalies. In addition, they mentioned particular  refactoringà ¢Ã¢â€š ¬Ã… ¸s for each code smells type. The  technique is to create a set of â€Å"reading techniques†Ã‚  which help a reviewer to â€Å"read† a design artifact for  calculating related information. The demerits of  existing manual approaches is that they are finally a  human centric process which involves a great human  effort and strong analysis and interpretation attempt  from software maintainers to find design fragments  that are related to code smells.Furthermore, these  methods are time consuming, error prone and focus  on programs in their contexts. Another significant  issue is that locating code smells manually has been  prescribed as more a human intuition than an accurate  science. 2.2 Metric based approaches: The â€Å"detection strategy†mechanism for  formulating metric based rules for finding deviations  from well design code. Detection strategies permits to  maintainer to directly find classes or methods  subjected by a particular design smells. These  detection strategies for capturing about ten important  flaws of object oriented design found in literature. It  is accomplished by evaluating design quality of an  object oriented system via quantifying deviations  from good design heuristics and principles by  mapping these design defects to class level metrics  such as complexity, coupling and cohesion by defining rules. Unfortunately, multi metrics neither  encapsulate metrics in a more abstract construct,nor  do they permit a negotiable combination of metrics. In common, the effectiveness of combining metric or  threshold is not clear, that is for each code smell,  rules that are declared in terms of metric  combinations need an important calibration effort to  find the fixing of threshold values for each metric. 2.3 Search based approaches: This approach is divined by contributions in  the domain of search based software engineering. SBSE uses search based approaches to resolve  optimizations problems in software engineering. Once the task is consider as a search problem, several  search algorithms can be employed to solve that  problem. Another approach is based on search based  techniques, for the automatic identification of  potential code smells in code. The detection focused  on thenotion that more code deviates from good  codes, the more likely it is bad. In another work,  detections rule will be produced and is described as a  combination of metrics or thresholds that better  similar to known an examples of bad smells. Then,  the correction solutions, a combination of refactoring  operations, should reduce the number of bad smells  detected using the detection rules. 2.4 Cooperative based approaches: Some cooperative approaches to reference  software engineering problems have been proposed  recently, in this program and test cases co-evolve,  regulating each other with the aim of fixing the  maximum number of bugs in the programs. The  objective is to improve the effectiveness of obtained  test cases by evaluating their capabilities to avoid  mutants.The P-EA proposal is vary from existing coevolutionary  approaches, this proposal based on two  populations that are referencing the same problem  from various perspectives. Finally, the genetic based  approaches are executed in parallel in our P-EA  framework. III. PROPOSED SCHEME In this paper, we suggested a new search  based approach for detection of code smells. In this  approach a parallel metaheuristic optimization  algorithm adaptation, two genetic populations are  involves simultaneously with the target of each  depending on the current population of other in a  parallel cooperative manner. Both populations are  generated, on the similar open source systems to  evaluate, and the solutions are punished based on the  intersection between the results of two populations  are found. We extend our approach to various code  smells types in order to resolve about common  applicability ofcooperative parallel search based  software engineering. Moreover, in this work we not  only focus on the detection of code smells but also  concentrate automated the correction of code smells. Furthermore, in this paper we consider the  essential need of code smells during the detection  procedure using existing code changes, classes and  coupling complexity. Hence, the detected code smells  will be ranked based on the severity score and also an  important score. We will measure also the use of  more than two algorithms executed in parallel  manner as a part our work to generate results of more  accuracy than art detection approach. The negative  impact on the code smells can be removed by  applying more than two algorithms in cooperative  manner ità ¢Ã¢â€š ¬Ã… ¸s difficult to find the consensus between  the code smells. The research work will direct our  approach to several software engineering problems  such as software testing and quality assurance. IV. PROPOSED ARCHITECTURE Fig 1:system architecture 1. Metrics Evaluation 2. Evolutionary Algorithms 3. Code Smell Detection 4.1 METRICS EVALUATION 4.1.1 CK METRIC SUITE Chidember and kemerer proposed a six metric  suite used for analyzing the proposed variable. The six  metric suite are: 1. Weighted Method Per Class(WMC): Consider a class C1 with methods M1†¦.Mn  that are included in class. Let C1,C2†¦Cn be the sum of  complexity. WMC=ÃŽ £ M 2. Depth Of Inheritance(DIT): The maximum length from the node to the  root of the tree. 3. Number Of Children(NOC): Number of immediate subclasses subordinated  to a class in the class hierarchy. 4. Coupling Between Objects(CBO): It is a count of the number of other classes to  which it is coupled. 5. Response For a Class (RFC) It is the number of methods of the class plus  the number of methods called by any of those  methods. 4.1.2 Lack Of Cohesion of Methods (LCOM)  Measure the dissimilarity of methods in a  class via instanced variables. 4.2 EVOLUTIONARY ALGORITHMS The fundamental think of both algorithms is  to explore the search space by devising a population  of candidate solutions, also called individuals,  germinate towards a â€Å"good† solution of a unique  problem. To measure the solutions, the fitness  function in both algorithms has two components. For  the first component of the fitness function, GP  evaluates the detection rules based on the coverage of  code-smells examples. In GP, a solution is combined  of terminals and functions. Hence, while applying GP  to clear particular problem, they should be carefully  collected and fashioned to fulfil the requirements of  the current problem. Afterwards, evaluating large  parameters concerned to the code-smells detection  problem, the terminal set and the function set are  recognized as follows. The terminals fit to different  quality metrics with their threshold values (constant  values). The functions that can be used between these  metrics ar e Union (OR) and Intersection (AND). The second algorithm run in parallel is  genetic algorithm that generates detectors from welldesigned  code examples. For GA, detectors defend  generated artificial code fragments dignified by code  elements. Thus, detectors are mentioned as a vector  where each dimension is a code element. We defend  these elements as sets of predicates. All predicate  type represents to a construct type of an objectoriented  system. Then, a set of best solutions are  collected from P-EA algorithms in each iteration,  Bothalgorithms interact with one other victimizing  the second component of the fitness function called  intersection function. 4.3 CODE SMELLS DETECTION Code smells are design flaws that can be  solved by refactoringà ¢Ã¢â€š ¬Ã… ¸s. They are considered as flags  to the developer that some parts of the design may be  inappropriate and that it can be improved. For the  purpose of this work, we discuss a few representative  code smells. There are a lot of code smells mentioned  in the development of this work. A thorough catalog  of code smells can be found in Fowlers refactoring  book. As this work focuses on program analysis, code smells discussed in this work include those that  require analyses. Though this work develops only a  subset of the code smells, it provides some grounds  which can be adapted to other types of code smells. The set of best solutions from each algorithm is  stored and a new population of individuals is  generated by repetitively choosing pairs of parent  individuals from population p and employing the  crossover operator to them. We admit both the parent  and child variants in the new population pop. Then,  we apply the mutation operator, with a probability  score, for both parent and child to assure the solution  diversity; this produces the population for the next  generation. While applying change operators, no  individuals are transformed between the parallel  GA/GP. Both algorithms exit when the termination  criterion is met, and issue the best set of rules and  detectors. At last, developers can use the best rules  and detectors to find code-smells on new system to  evaluate. V. EXPERIMENTAL RESULTS Fig 2: The impact of the nmber of code smell example on detection  results Fig 3: Average execution time comparison on the different system. VI. THREATS TO VALIDITY: Conclusion validity related with the  statistical relationship between the treatment and  outcome. The Wilcoxon rank sum test was used with  a 95 percent confidence level to test its important  differences exist between the measurements for  different treatments. This test makes no supposition  that the data is normally distributed and is suitable for  ordinal data, so we can be assured that the statistical  relationships observed are significant. The  comparison with other techniques not based on  heuristic search; consider the parameters obtained  with the tools. This can be regarded as a threat that  can be addressed in the future by developing the  impact of various parameters on the quality of results  of DÉCOR and JDeodorant. Internal validity is related with the casual  relationship between the treatment and outcome. To  consider the internal threats to validity in the  utilization of stochastic algorithms since this  experimental work based on 51 independent  simulation runs for each problem instance and the  obtained results are statistically analyzed by using the  Wilcoxon rank sum test with a 95 percent fair  comparison between CPU times. VII. CONCLUSION AND FUTURE WORK In this approach a parallel metaheuristic  optimization algorithm adaptation, two genetic  populations are involves simultaneously with the  target of each depending on the current population of  other in a parallel cooperative manner. Both  populations are generated, on the similar open source  systems to evaluate, and the solutions are punished  based on the intersection between the results of two  populations are found.Moreover, in this work we not  only focus on the detection of code smells but also  concentrate automated the correction of code  smells.Furthermore, in this paper we consider the  essential need of code smells during the detection  procedure using existing code changes, classes and  coupling complexity. Hence, the detected code smells  will be ranked based on the severity score and also an  important score. We will measure also the use of  more than two algorithms executed in parallel  manner as a part our work to generate result s of more  accuracy than art detection approach. Future work  should corroborate our method with remaining code  smell types with the objective conclude about the  common applicability of our methodology. We will  assess also the use of more than the algorithm  accomplish simultaneously as a part of our rest of our  future work. Another future issue direction attached  to our approach is to adapt our cooperative parallel  evolutionary approach to various software  engineering problems such as software testing and  the following release problem. VIII. REFERENCES 1) WaelKessentini,MarouaneKessentini,HouariSahrao  ui, Slim Bechikh:†A Cooperative Parallel Search-Based Software Engineering Approach for Code-Smells Detection† IEEE Trans. Softw. Eng.,vol. 40,  no. 9, Sep 2014. 2) N. Moha, Y. G. Gu_eh_eneuc, L. Duchien, and A.  F. Le Meur, â€Å"DECOR: A method for the specification  and detection of code and design smells,† IEEE  Trans. Softw. Eng., vol. 36, no. 1, pp. 20–36,  Jan./Feb. 2010. 3) Chidamber, S., Kemerer, C.: „A metrics suite for  object oriented designà ¢Ã¢â€š ¬Ã… ¸,IEEE Trans. Softw. Eng.,  1994, 20, (6), pp. 476–493.   4) Mark Harman and AfshinMansouri.:†Search Based  Software Engineering: Introduction to the Special  Issue of the IEEE Transactions on Software  Engineering†,† IEEE Trans. Softw. Eng., vol. 36, no.  6,Nov./Dec. 2010.   5) F. Khomh, S. Vaucher, Y. G. Gu_eh_eneuc, and H.A. Sahraoui, â€Å"A bayesian approach for the detection  of code and design smells,† in Proc. Int. Conf.  Quality Softw., 2009, 305–314. 6) R. Marinescu, â€Å"Detection strategies: Metrics-based  rules for detecting design flaws,† in Proc. 20th Int.  Conf. Softw. Maintenance, 2004, pp. 350–359. 7) M. Kessentini, W. Kessentini, H. A. Sahraoui, M.  Boukadoum, and A. Ouni, â€Å"Design defects  detection and correction by example,† in Proc. IEEE  19th Int. Conf. Program Comprehension, 2011, pp.  81–90. 8) T. Burczy_nskia, W. Ku_sa, A. D »ugosza, and P.  Oranteka,â€Å"Optimization and defect identification  using distributed evolutionary algorithms,† Eng.  Appl. Artif. Intell., vol. 4, no. 17, pp. 337–344, 2004. 9) A. Ouni, M. Kessentini, H. A. Sahraoui, and M.  Boukadoum, â€Å"Maintainability defects detection and  correction: A multiobjective approach,† Autom.  Softw. Eng., vol. 20, no. 1, pp. 47–79, 2012. 10) O. Ciupke, â€Å"Automatic detection of design  problems in objectoriented reengineering,† in Proc.  Int. Conf. Technol. Object-OrientedLanguage Syst.,  1999, pp. 18–32. 12) G. Travassos, F. Shull, M. Fredericks, and V. R.  Basili, â€Å"Detecting defects in object-oriented designs:  Using reading techniques to increase software  quality,† in Proc. Int. conf. Object-Oriented  Program.,Syst., Languages, Appl., 1999, pp. 47–56. 13) M. Harman, S. A. Mansouri, and Y. Zhang,  Ã¢â‚¬Å"Search-based software engineering: Trends,  techniques and applications,† ACM Comput. Surv.,  vol. 45, no. 1, 61 pages. 14) A. Arcuri, X. Yao, â€Å"A novel co-evolutionary  approach to automatic software bug fixing,† in Proc.  IEEE Congr. Evol. Comput., 2008, pp. 162–168. 15) M. J. Munro, â€Å"Product metrics for automatic  identification of „Bad Smellà ¢Ã¢â€š ¬Ã… ¸ design problems in Java  source-code,† in Proc. IEEE 11th Int. Softw. Metrics  Symp., 2005, pp. 15–15.   16) W. Banzhaf, â€Å"Genotype-phenotype-mapping and  neutral variation: A case study in genetic  programming,† in Proc. Int. Conf. Parallel Problem  Solving from Nature, 1994, pp. 322–332. 17) W. H. Kruskal and W. A. Wallis, â€Å"Use of ranks in  one-criterion variance analysis,† J. Amer. Statist.  Assoc., vol. 47, no. 260, pp. 583–621, 1952. 18) W. J. Brown, R. C. Malveau, W. H. Brown, and  T. J. Mowbray, â€Å"Anti Patterns: Refactoring Software,  Architectures, and Projects in Crisis†. Hoboken, NJ,  USA: Wiley, 1998. 19) N. Fenton and S. L. Pfleeger, â€Å"Software Metrics:  A Rigorous and Practical Approach†. Int. Thomson  Comput. Press, London, UK, 1997.   20) Emerson Murphy-Hill, Chris Parnin, and Andrew  P. Black† How We Refactor, and How We Know  It†,IEEE Trans. Softw. Eng.,vol. 38,no. 1, Jan./Feb.  2012. 21) M. Fowler, K. Beck, J. Brant, W. Opdyke, and D.  Roberts, â€Å"Refactoring: Improving the Design of  Existing Code†. Reading, MA,USA: Addison  Wesley, 1999.

Friday, October 25, 2019

Macbeth Essay -- English Literature Essays

Macbeth Trace Macbeths change over the course of the play. How does Shakespeare convey it? The transition from brave and loyal thane to brutal tyrant king can be easily traced, when focusing on the character of Macbeth throughout the play. All aspects of the character change to some extent as his sins and treachery increase in extremity; this includes his relationship with his wife and friends, his clothing, his style of speaking, his attitudes towards fate, paranoia and fear. Shakespeare conveys this change in character to the reader by making all of these different and changing character aspects obvious at some stage during the play. At the start of the play lady Macbeth is the more dominant character in the relationship. In his letter to his wife about the witches' prophecies, Macbeth writes, "This have I thought good to deliver thee, my dearest partner of greatness, that thou mightst not lose the dues of rejoicing, by being ignorant of what greatness is promised thee". He knows that his "partner" will like the idea of being Queen and seems to offer the news as a kind of present, this shows that Macbeth really feels as though he has to please her. However, it is Lady Macbeth that takes charge of the situation and ensures that Duncan is murdered, rather than allowing Macbeth to have his way and let Duncan live. After Macbeth has committed the murder he is distraught and talking about the intensity of the blood on his hands, once again Lady Macbeth takes control of the situation, by saying â€Å"a little water clears us of this deed† she attempts to clear Macbeths conscience. The change in the obvious contr ol Lady Macbeth holds over Macbeths actions, in the first two acts, becomes evident in the banquet scene ( scene 4, act 3 ), by this stage Macbeth is arranging the murder of Banquo without the assistance or reassurance of Lady Macbeth, however, when Macbeth is supposedly seeing the ghost of Banquo later on in the scene, it is Lady Macbeth who, once again, is put into a position of control, as she attempts to cover for her husband and explain his confusing speeches. As the play continues, the plot intensifies, and as Macbeth changes, Lady Macbeth plays a smaller role in the outcome of events. The audience sees her character in decreasing amounts, after the banquet scene, she only features in scene 1, Act 5. Which shows her increasing insanity, as Lad... ...s may not have had any supernatural powers whatsoever, other than Macbeth receiving the title of thane of Cawdor, which may have been coincidence, Macbeth caused everything else to happen, not giving fate a chance as he was causing everything to happen himself. Whether or not you make you own fate is one of the major themes explored by Shakespeare in the play of Macbeth. In the final scene of the play Malcolm describes Macbeth as a â€Å"dead butcher† this in itself sums up the change of Macbeths character, especially when compared to the praise received by the character during the first act of the play. During the early stages of the play Macbeth is described as a â€Å"worthy cousin† to the king and as a â€Å"noble partner† to Banquo, by the end of the play Macbeth has ensured the death of both, either doing it himself or arranging for murderers to do the deed. One has to wonder if it was in Macbeths destiny to face such changes in character, or if it happened as a result of the three weird sisters, playing with a situation that was not meant for their involvement. Regardless of the cause, Shakespeare successfully shows the change in character throughout the play in a large variety of ways. Macbeth Essay -- English Literature Essays Macbeth Trace Macbeths change over the course of the play. How does Shakespeare convey it? The transition from brave and loyal thane to brutal tyrant king can be easily traced, when focusing on the character of Macbeth throughout the play. All aspects of the character change to some extent as his sins and treachery increase in extremity; this includes his relationship with his wife and friends, his clothing, his style of speaking, his attitudes towards fate, paranoia and fear. Shakespeare conveys this change in character to the reader by making all of these different and changing character aspects obvious at some stage during the play. At the start of the play lady Macbeth is the more dominant character in the relationship. In his letter to his wife about the witches' prophecies, Macbeth writes, "This have I thought good to deliver thee, my dearest partner of greatness, that thou mightst not lose the dues of rejoicing, by being ignorant of what greatness is promised thee". He knows that his "partner" will like the idea of being Queen and seems to offer the news as a kind of present, this shows that Macbeth really feels as though he has to please her. However, it is Lady Macbeth that takes charge of the situation and ensures that Duncan is murdered, rather than allowing Macbeth to have his way and let Duncan live. After Macbeth has committed the murder he is distraught and talking about the intensity of the blood on his hands, once again Lady Macbeth takes control of the situation, by saying â€Å"a little water clears us of this deed† she attempts to clear Macbeths conscience. The change in the obvious contr ol Lady Macbeth holds over Macbeths actions, in the first two acts, becomes evident in the banquet scene ( scene 4, act 3 ), by this stage Macbeth is arranging the murder of Banquo without the assistance or reassurance of Lady Macbeth, however, when Macbeth is supposedly seeing the ghost of Banquo later on in the scene, it is Lady Macbeth who, once again, is put into a position of control, as she attempts to cover for her husband and explain his confusing speeches. As the play continues, the plot intensifies, and as Macbeth changes, Lady Macbeth plays a smaller role in the outcome of events. The audience sees her character in decreasing amounts, after the banquet scene, she only features in scene 1, Act 5. Which shows her increasing insanity, as Lad... ...s may not have had any supernatural powers whatsoever, other than Macbeth receiving the title of thane of Cawdor, which may have been coincidence, Macbeth caused everything else to happen, not giving fate a chance as he was causing everything to happen himself. Whether or not you make you own fate is one of the major themes explored by Shakespeare in the play of Macbeth. In the final scene of the play Malcolm describes Macbeth as a â€Å"dead butcher† this in itself sums up the change of Macbeths character, especially when compared to the praise received by the character during the first act of the play. During the early stages of the play Macbeth is described as a â€Å"worthy cousin† to the king and as a â€Å"noble partner† to Banquo, by the end of the play Macbeth has ensured the death of both, either doing it himself or arranging for murderers to do the deed. One has to wonder if it was in Macbeths destiny to face such changes in character, or if it happened as a result of the three weird sisters, playing with a situation that was not meant for their involvement. Regardless of the cause, Shakespeare successfully shows the change in character throughout the play in a large variety of ways.

Thursday, October 24, 2019

Business Environment Essay

Introduction: In this assignment I will be explaining how the two businesses that I have chosen from my previous assignment P3, how they present the organisational structure and how strategic planning helps them achieve its purposes and aims. This assignment will include the following * The aims of Coca- Cola and Nike * How the strategic planning helps them both to achieve these aims * How the organisational structure helps to achieve the aims of both organizations The aims and purposes of Coca Cola: The mains aim of Coca cola is to revive the world in mind, body and soul. Coca Cola Company is to provide to ensure this the company ensure that all employees are working to their highest standards test product that they can to the public, and create customer satisfaction. o create the best product, in the quickest possible time to make sure that there is an ability for quick distribution. The main goals and objectives of Coca-Cola are to be the finest beverage sales and customer Service Company. This means being the first or second brand in every group in which then can contest, being the customers most appreciated supplier and establishing a winning and inclusive culture. They also aim to never let their high standards of quality fail. To do this, there are strict evaluations at each stage of the manufacture of all products at Coca Cola production plants, throughout the day. When distributing any products, Coca Cola arrange with the distribution companies what standards Coca Cola expect from them. This means that the customer will always be to create a value and make a difference- everywhere they engage and to inspire moments of optimism through their brands and actions The aims and purposes of Nike: Nikes main objective is to develop products that help athletes of every level of ability reach their potential, to create business opportunities that set Nike apart from the competition and to provide value for its shareholders. As they are in the private sector the main objective would be to make a profit. However with all organisations this would be surrounded with other aims and objectives that their organisation may have set in place at the beginning of their campaign. For example Nike has an aim to be the largest sporting organisation for the foreseeable future, which they are currently achieving. Other aims and objectives that Nike may set out would be to improve the working conditions of the factories in the Less Economically Developed Countries. How strategic planning helps Coca-Cola achieve its aims: Coca-Cola is a household name the company can control soft drink market. Their success can be attributed to their overall strategy to produce and promote their products. Coca-Cola decided to build global brands to bottlers throughout the world. And a portion of the proceeds goes toward advertising to build and maintain brand awareness. Coca-Cola is responsible for producing and distributing to vending machines, supermarkets, restaurants, and other retail outlets. However, the advertising is left up to Coca-Cola. In addition, they must sign an agreement that prohibits them from distributing competing cola brands. Their strategy is simple, yet dynamic. It forces bottlers to enter into exclusive agreements, which creates a high barrier to entry into the industry. Any potential competitor must create their distribution network rather than use the existing one. And the large amounts of money spent on advertising helps to develop a global brand name and differentiate their products. How strategic planning helps Nike achieve its aims: The strategic plan aims to focus Nikes vision and priorities in response to a changing environment and to ensure that members of the Nike are working towards the same goals. Strategic management harnesses the full potential of an Nike by integrating daily operational decisions into the strategic process. Strategic management is a task for the whole company all the time. It is a way of thinking and a guide to action, and should govern the behaviour of everybody concerned. It enables Nike to think through and document what they are doing, for whom they are doing it, and why. How organisational structure helps Coca-Cola to achieve its aims: The Coca-Cola Company, have built flexible structures which, wherever possible, encourage teamwork. For example, at Coca-Cola Great Britain any new product development (e.g. Coca-Cola Vanilla) brings together teams of employees with different specialisms. At such team meetings, marketing specialists clarify the results of their market research and testing, food technologists describe what changes to a product are feasible, financial expert’s reports on the cost implications of change. How organisational structure helps Nike to achieve its aims: The organizational structure of a Nike helps affect a workplace culture, employee motivation, performance and cooperation. Selecting the correct structure that compliments Nike’s goals and objectives can positively affect employee’s behaviours and attitudes, as well as a lead to more effective teamwork and networking opportunities that build stronger worker relationships throughout the Nike industry’s. Planning and implementing an organizational structure will help determine the necessary workforce talent to build a successful business like Nike. Conclusion: What I have learnt is that how they style of organisation helps them to fulfil their purposes through there aims and purposes for example, They have built flexible structures which encourage great team work for both organisations. Also and through their strategic planning for example Strategic management is a task for the whole company all the time so they need to organise the company in order to a achieve the best successful organised business.

Wednesday, October 23, 2019

Economic Consequences of Software Crime

In 1996 worldwide illegal copying of domestic and international software cost $15. 2 billion to the software industry, with a loss of $5. 1 billion in the North America alone. Some sources put the total up-to-date losses, due to software crime, as high as $4. 7 trillion. On the next page is a regional breakdown of software piracy losses for 1994. Estimates show that over 40 percent of North American software company revenues are generated overseas, yet nearly 85 percent of the software industry†s piracy losses occurred outside of North America. The Software Publishers Association (SPA) indicated that approximately 35 percent of the business software in the North America was obtained illegally. In fact, 30 percent of the piracy occurs in corporate settings. In a corporate setting or business, every computer must have its own set of original software and the appropriate number of manuals. It is illegal for a corporation or business to purchase a single set of original s! oftware and then load that software onto more than one computer, or lend, copy or distribute software for any reason without the prior written consent of the software manufacturer. Many software managers are concerned with the legal compliance, along with asset management and costs to their organizations. Many firms involve their legal departments and human resources in regards to software distribution and licensing. Information can qualify to be property in two ways; patent law and copyright laws which are creations of federal statutes, which are subject to Constitutional authority. In order for the government to prosecute the unauthorized copying of computerized information as theft, it must first rely on other theories of information-as-property. Trade secret laws are created by provincial law, and most jurisdictions have laws that criminalize the violations of a trade-secret holder†s rights. The definition of a trade secret varies somewhat from province to province, but commonly have the same elements. For example, the information must be secret, not of public knowledge or of general knowledge in the trade or business. A court will allow a trade secret to be used by someone who discovered or developed the trade secret independently if the holder takes adequate precautions to protect the secret. In 1964, the National Copyright Office began to register software as a form of literary expression. The office based its decision on White-Smith Music Co. v. Apollo, where the Supreme Court determined that a piano roll used in a player piano did not infringe upon copyrighted music because the roll was part of a mechanical device. Since a computer program is textual, like a book, yet also mechanical, like the piano roll in White-Smith, the Copyright Office granted copyright protection under the rule of doubt. In 1974, the government created the Natural Commission on New Technological Uses (CONTU) to investigate whether the evolving computer technology field outpaced the existing copyright laws and also to determine the extent of copyright protection for computer programs. CONTU concluded that while copyright protection should extend beyond the literal source code of a computer program, evolving case law should determine the extent of protection. The commission also felt copyright was the best alternative among existing intellectual property protective mechanisms. CONTU rejected trade secret and patents as viable protective mechanisms. The CONTU report resulted in the 1980 Computer Software Act, and the report acts as informal legislative history to aid the courts in interpreting the Act. In 1980, the Copyright Act was amended to explicitly include computer programs. It now states that it is illegal to make or to distribute copies of copyrighted material without authorization, except for the user†s right to make a single backup copy for archival purposes. Any written material (including computer programs) fixed in a tangible form (written somewhere – i. . printout) is considered copyrighted without any additional action on the part of the author. Therefore, it is not necessary that a copy of the software program be deposited with the National Copyright Office for the program to be protected as copyrighted. With that in mind a copyright is a property right only. In order to prevent anyone from selling your software programs, you must ask a (federal) court to stop that person by an injunction and to give you damages for the injury they have done to you by selling the program. The Software Rental Amendments Act was approved in 1990. This Act prohibits the commercial rental, leasing or lending of software without the express written permission of the copyright holder. Another amendment to the Copyright Act was passed in 1992. This amendment made software piracy a federal offense, and instituted criminal penalties for copyright infringement of software. The penalties can include imprisonment of up to five years, fines up to $250,000 or both for unauthorized reproduction or distribution of 10 or more copies of software with a total retail value exceeding $2,500 or more. According to federal law duplicating software for profit, making multiple copies for use by different users within an organization, and giving an unauthorized copy to someone else is prohibited. Under this law if anyone is caught with the pirated software, an individual or the individual†s company can be tried under both civil and criminal law. A Civil action may be established for injunction, actual damages (which includes the infringer†s profits) or statutory damages up to $100,000 per infringement. The criminal penalties for copyright infringement can result in fines up to $250,000 and a jail term up to five years for the first offense and ten years for a second offense. When software is counterfeit or copied, the software developer loses their revenue and the whole software industry feels the effect of piracy. All software developers spend a lot of time and money in developing software for public use. A portion of every dollar spent in purchasing original softwar! e is funneled back into research and development of new software. Software piracy can be found in three forms: software counterfeiting, which is the illegal duplication and sale of copyrighted software in a form that is designed to make it appear to be a legitimate program; Hard disk loading, whereby computer dealers load unauthorized copies of software onto the hard disks of personal computers, which acts as an incentive for the end user to buy the hardware from that particular dealer; and downloading of copyrighted software to users connected by modem to electronic bulletin boards and/or the Internet. When software is pirated the consumer pays for that cost by new software and/or upgrade version being more expensive. Federal appellate courts have determined that operating systems, object code and software contained in ROMs are protected by copyright. Some lower federal courts have also determined that microcode (the instructions set on microprocessor chips) and the look and feel of computer screens is subject to copyright protection. Which has created major problems for the widespread development of multimedia applications with regards to clearing copyright for small elements of text, images, video and sound. The United States Government has been an active participant in protecting the rights of the software industry. When the Business Software Alliance (BSA) conducts a raid, Federal Marshals or local law enforcement officials participate as well. An organization known as the Software Publishers Association (SPA) is the principal trade association of the PC software industry. SPA works closely with the FBI and has also written an enforcement manual for the FBI to help them investigate pirate bulletin board systems and organizations (audits). With the help of the FBI, the result of enforcement actions resulted in recoveries from anti-piracy actions totaling $16 million since the program started in 1990. The Software Publishers Association (SPA) funds an educational program to inform individuals and corporations about software use and the law. This program provides all PC users with the tools needed to comply with copyright law and become software legal. The SPA also publishes brochures free of charge about the legal use of software for individuals and businesses. Also available to help corporations understand the copyright law is a 12-minute videotape, which is composed of the most commonly asked questions and answers to them. The video tape is available in French and Spanish and all together over 35,000 copies of the tape had been sold. The SPA has also compiled a free Self-Audit Kit with which organizations can examine their software use practices. Included in the kit, is a software inventory management program designed to help an organization track their commercial software programs that are on all their hard disks. The program searches the PC†s hard disk for more than 1300 of the most common programs used in business. Also available is the SPA Software Management Guide which helps companies audit their current software policies, educate employees about the legal use of software, and establish procedures to purchase, register, upgrade and backup computing systems. The guide, in addition, provides an Internal Controls Analysis and Questionnaire. The guide also contains all of the SPA†s current anti-piracy materials. The software industry is facing the challenges of more sophisticated network environments, greater competition among software companies along with hardware manufacturers. At this moment more software than ever before is distributed on a high volume, mass marketed basis. There are many types of software out on the market and the amount is increasing every day. They range from graphical user interfaces for application programs such as mass-market spreadsheets, to more sophisticated technical software used to design integrated circuits. The use of software plays a more vital role in our daily lives than it ever has. Such as embedded software, which is critical to equipment in such locations as a doctor†s office or an automotive shop. The instrument and devices found there depend more and more on software, because software provides the flexibility to meet the many different needs to the end user. As our lives our shaped and enhanced more by technology, there is already a greater demand that impacts the software industry. One of the main concerns of the software industry is how to deal with the issues of software licensing. More and more customers want customized software suited for their business or personal need, and expect the software development firms to accommodate to their wishes. The other side of this issue is that software development firms are concerned with unrealized revenue and excess costs in the form of software piracy, unauthorized use, excess discounts and lengthened sales cycles. For the customer and the software development firm, all of these have high administrative costs in regards to software programs. Software licensing policies were originally a result of software developer†s need to protect their revenue base in the face of potential piracy. Product delivery for software is made up of a number of different components, which are referred to as software licensing. The following factors are taken into consideration when determining a cost for a software license; physical delivery pricing, metric discounts, license periods support and maintenance, license management Tech support, change in use bug fixes and Platform Migration Product enhancements. The most commonly found type of software license found in business is known as a network license. There are four types of categories that are classified as a network license. Concurrent use licenses authorize a specified number of users to access and execute licensed software at any time. Site licenses authorize use at a single site, but are slowly being phased out and replaced by enterprise licenses. Enterprise licenses cover all sites within a corporation because of more virtual computing environments. Node licenses are also slowly being phased out because they are mainly used in a client/server environment, since the licensed software may be used only on a specified workstation in which a user must log on to in order to access and execute the software application. Currently the trend in a network system is to use measurement software, which allows vendors to be more flexible in licensing arrangements. This management software monitors and restricts the number of users or clients who may access and execute the application software at any one time. This is significant because a user pays only for needed use and a vendor can monitor such use to protect intellectual property. A new type of license that is emerging is known as a currency-based license. This type of license works on the basis that it provides to the end user a specified dollar amount of software licenses. This allows licenses to cover different business application software, so long as the total value in use at a given time is less than the amount stipulated in the license. Another type of license emerging is known as a platform-independent licensing. Which permits software to be used on a variety of different computer systems within a business, instead of buying a different license for each version of the same software used by different systems. The most common type of licensing is known as shrink-wrap, the concept behind this that the licenses terms are deemed accepted once the end user breaks a shrink-wrap seal or opens a sealed envelope containing the software. A reason for these new types of licensing is that when software licensing was first introduced, the software development firms assumed that most businesses would use the software for a 8 to 10 hour period. Yet, did not take into consideration that with the advancement of technology, more businesses would want a floating license across the world for 24 hours. This made it so it was not cost effective for the software development firm. A floating license is a license that is made available to anyone on a network. The licenses are not locked to particular workstations, instead they float to modes on the network. Shareware, freeware and public domain are different types of software available to the end user, and are distinguished by different rules about how programs may be distributed, copied, used and modified. The term shareware refers to software that is distributed at a low cost, but which usually requires a payment after a certain time period and registration for full use. Copies of this software are offered on a trial basis, the end user is free to try a scaled down version of the program. If the end user wants the shareware program, included in the program is information specifying how to register the program and what fee is required. Once registered the end user will typically receive a printed manual, an updated copy of the software (often with additional features), and the legal right to use the program in their home or business. The advantage that shareware has is that it lets the end user thoroughly test a program to see if it†s useful before making a purchase. The ! authors of shareware programs retain their copyright on the contents, and as other copyrighted software should not be pirated. Freeware is also distributed at a very low cost and like shareware is found mainly on the Internet. The authors of the freeware program do not expect payment for their software. Typically, freeware programs are small utilities or incomplete programs that are released by authors for the potential benefit to others, but the drawback to this is that there is no technical support. Public domain software is generally found on the Internet and is released without any condition upon its use. It may be copied, modified and distributed as the end user wishes to do. A license manager is a system utility-like application that controls or monitors the use of another end-user application. It is generally implemented to protect intellectual property (meaning to stop illegal copying) and/or to become more competitive by offering new ways in which to evaluate, purchase and pay for software. Since the license manager controls the number of application users, there is not a need to control the number of application copies. This process lets the end user run one or more applications between machines, without violating the terms of the license agreement.