Sunday, December 29, 2019

Homeschooling Persuasive Essay - 1949 Words

In today’s world, there are many different options for students to go to school. There is public school, private school, charter school, contract school, and home schools. The question on many people’s minds is â€Å"Why home schooling over any other schooling?† Since 1970s there has been a dramatic growth in homeschooling for student’s kindergarten to twelfth grade students. Although White gives effective arguments, and includes no obvious recall of evidence, she builds her credentials from subjects who have personally experiences, controversial evidence, and then by connecting White’s analysis to conclusions to her reader’s choice of choosing whether home schooling is a quality education. In â€Å"Home Schooling: A Personal Decision,† Karen†¦show more content†¦White’s argument shows evidence on choice of home schooling, the experiences people have, challenges that are for students, and advantages of why home schoolin g is so great for each student. Home schooling can be very flexible for those students who do sports or activities such as ballet. Having the flexibility helps students have more energy than those in public school and worry less about their tests. Parents can be just as hard on their kids as any teacher or tutor can. â€Å"But that s changing. According to the National Center for Education Statistics, in 2004 about 1.1 million children (or 2.2 percent of all children aged 5 to 17) were home schooled, a jump of almost 30 percent from 1999† (3). Home schooling is just as demanding as traditional schools such as public or private schools. â€Å"Moms can be much harder teachers then most other teacher’s students have had before† (par. 4). This shows how home schooling can be beneficial for lots of students. White gives great examples of how home schooling can be great for students who want to express their talents and still have their high school diploma. While Whit e provides some compelling arguments for homeschooling, several of her arguments suffer from logical fallacies. There are so many reasons a person can go back and forth on what they school do and White has helped with some evidence of home schooling being a quality education for any student who chooses to so. She shares thisShow MoreRelatedPersuasive Essay On Homeschooling1609 Words   |  7 Pages Homeschooling is not a new concept to the United States, and for many centuries it was the only way for children to get an education. Many of our founding fathers were homeschooled, proving there is nothing wrong with homeschooling, and to this day it continues to provide children with an adequate education. Many parents believe that public school is satisfactory. However, they feel that homeschooling is a better option because it provides a safer environment for their children and more conduciveRead MorePersuasive Essay Homeschooling923 Words   |  4 Pageseffective style of school called homeschooling has emerged. Most of todays parents have gone to a public school because homeschooling was not very well known back when they were school aged. Since then, homeschooling has become much more popular and has been proven to be effective. Parents should consider homeschooling their kids as an alternative to sending them to a public school. While public schooling is the traditional way of receiving education, homeschooling is an alternative that must beRead MorePersuasive Essay On Homeschooling831 Words   |  4 PagesHomeschooling refers to the procedure of teaching kids from home instead of sending them to public or private schools. This is when they are taught by parents, brothers, sisters, a neighborhood friend, or online. Homeschooling is not for everybody and as we will see later the pros and cons of homeschooling. People say it is good because there is not busy work all the work can be done in a few hours. Then, people say it is bad because parents or whoever is teaching has to be with the kids all theRead MoreHomeschooling outline persuasive speech Essay860 Words   |  4 Pagesï » ¿Persuasive Speech Outline on Homeschooling General Purpose: I want to persuade my audience Specific Goal: I would like the audience to understand the advantage of why I strongly believe homeschooling is beneficial. Thesis: Homeschooling environment is an effective approach in education due to evidence of higher achievement on placement tests, success through college, engaged socially with activities outside homes, and students becoming active members of society. Organization Pattern: (StatementRead MorePhilosophy of Education Essays1644 Words   |  7 Pagesspin on the role of school in society is homeschooling. I think it has many good and bad features. One great aspect of homeschooling is it makes parents feel that their child is in a safe environment, and that they are able to shelter them from the things that they are exposed to in public schools. But, ironically, that is also the problem. Social development is a crucial part of any education, and in many cases, homeschooling hinders this. Homeschooling also allows children to have the freedom ofRead MoreThe Is Not Emotionally Healing Or Accepting Our Fate?990 Words   |  4 Pagesrewriting in academic essays and text. He sees this phrase as the best tool for writers to use when dealing with other people s ideas and motivations. There are steps you have to take to come to terms with someone else’s writing. First, you must define the project and what the purpose is. Without this key step, you do not really know what to come to terms with and are lost to the goals of the text to begin with. For example, if you read an essay about the benefits of homeschooling without defining the

Saturday, December 21, 2019

Descriptive Essay - Original Writing - 1462 Words

â€Å"Mom, please† I whined from across the room. â€Å"No Jamie, I told you before and I will tell you again, we are not going swimming in the ocean. It’s too dangerous with all of the shark spottings from only a mile away from shore.† â€Å"But I already bought a snorkel and I really want to go..† â€Å"Enough.† She interrupted. â€Å"If you want to use your new snorkel, go in the hotel pool while your father and I try and figure out restaurants worth trying for the next week.† â€Å"I thought this vacation was going to be fun.† I mumbled under my breath as I grabbed my snorkel and trudged down to the small, indoor pool near the lobby. I turned around, mesmerized by the waves of the ocean just across the street. The pool was empty, so I would have enough†¦show more content†¦This is incredible! I thought while swimming laps around the pool, needing to reach the surface for air. I could use this, I thought, if there is no way for me to drown, I can go to the ocean by myself without my parents telling me no! I jumped from the water, ripping the snorkel from my face, and raced towards the lobby. The water was swaying in rhythmic motions on the sand, the water slowly creeping onto the shore, then sinking back, leaving some rocks and shells that had been pulled in. As I placed the snorkel on my head, I felt the now familiar tickling sensation emerge and the hard slits forming. I practically dived into the waves, the salty water filling my neck, making me cough. I scratched my hand on the hard scales that had formed along the gills, and a couple drops of blood leaked into the open ocean. I didn’t think anything of it though. Swimming towards the bottom, I watched the many different species of fish swim along, fascinated by their many colors and sizes. One of the larger ones slyly swam right by where I was hiding along a coral reef, with shiny turquoise scales and a deep purple tail. I spotted one nearby with at least three rows of teeth, and I backed away, afraid that it would spot me. I didn’t realize, however, that I had backed into something even more frighten ing. A large shark was hovering behind me, it’s large nose sniffing the blood that had seeped from my hand. I slowly turned around and bolted, but he

Friday, December 13, 2019

Seven Approaches to Studying the Human Body Free Essays

When studying the human body, there are seven organizational approaches. Each approach studies the body in a different yet unique way and is used in the health care field. The approaches consist of; body planes and directions, body cavities, quadrants and regions, anatomy and physiology, microscopic and macroscopic, body systems and medical specialties. We will write a custom essay sample on Seven Approaches to Studying the Human Body or any similar topic only for you Order Now There are three body planes which use different directions: coronal, sagittal, and transverse planes. Coronal plane slices the body from head to toe giving a front and back view. There are two directions that are related with it; anterior posterior, moving from the outside of the body through the anterior part then the posterior section, and posterior anterior, which is its reverse. Sagittal plane cuts the body right down the middle giving a right and left view. Moving medially is to go inwards or towards the middle of the body from the outside and to go laterally is as if moving out or from the midline towards the outside of the body. Lastly, transverse plane divides the body giving a top and bottom sections. The top half is superior and the lower half is inferior. Moving cephalad is moving superiorly, and cuadad is moving inferiorly. Radiologists would use this approach when looking at x-rays or MRI scans to distinguish how the image was taken. There are five sections of hallow space, known as cavities, in the human body, all of which carry-over each other. Starting from the head is the cranial cavity that protects the brain, then the spinal cavity that travels down the middle of the back, then in the chest is the thoracic cavity where the lungs, heart and esophagus are, next is the abdominal cavity which is around the abdominal muscles and last is the pelvic cavity where the hip bones lay. An ultrasound technician would use this approach when projecting images from inside the body cavity onto the screen. The approach to use quadrants and regions is to divide up the abdominopelvic area into four parts, which are quadrants, and then into nine parts out of that which give you regions. (â€Å"Scribd. com†, 2010) This method can be used as a reference to where the organs are located in which area. For instance, in the left lower quadrant is the lower part of the kidney, part of the colon, and the left ovary for women. This type of diagram would help ith position the organs. In the health field, physicians refer to this during an internal exam. According to â€Å"Degreedirectory. org† (1999), anatomy studies the structure of organs and cells. Since cells are a microscopic size the best way to study, using this approach is with a microscope, which is, a tool used to examine cells. Physiology is the study of the function of organ and cells. Organs are of a macros copic size that means it can be seen with the naked eye. These approaches can be used in many ways in health care. An orthopedic would study muscles and tendons or an immunologist would study blood cells using a microscope. The human body is made up of several different types of systems. This means that each system is made up of a few organs, which synchronize with one another and work as a unit. Organs are unable to perform without the help of the other organs in their unit. All of the organs support one another to perform their functions. The gastrointestinal system breaks down the foods we eat into protein, vitamins, fats and carbohydrates, which is used for energy, growth and repair. The organs in the respiratory system are the nose, trachea and lungs. These organs help bring air into the body and eliminate the carbon dioxide. There is a system that acts as a defense called the lymphatic system and runs through the whole body. This system’s main function is to make white blood cells that act as disease fighting antibodies. The integumentary system consists of the skin, hair, nails, glands, and nerves. This system’s main function is to act like a barrier to guard the body from the outside world. The skeletal system protects the organs. It is made up of bones, ligaments, joints and tendons. It gives support and structure to the body and a place for muscle attachment and movement. In other words, it holds the body up. Without the skeletal system the human body would be unable to walk or stand up. The muscular system works with the skeletal system to control the movement of the human body. There are two types of muscles; ones that are voluntary such as moving an arm or leg and ones that are involuntary and act on their own such as the beating of a heat or stomach. How to cite Seven Approaches to Studying the Human Body, Essay examples

Thursday, December 5, 2019

Security in Cellular Networks and Security in Wireless Sensor Networks

Question: Describe about the security in cellular networks and security in wireless sensor networks? Answer: Introduction Networks are evolving in its shape and functionalities very rapidly. Other than traditional networks, now we can see, different kinds of data communication networks around us. In our day-to-day life, we use numerous amounts of networks. Other than computers, we can use mobile and other types of cellular devices to access the Internet. Thus there are various techniques behind these facilities. Certainly a network of cellular devices, will not have the same component of a computer network, but the functionalities are quiet similar. These cellular networks also facilitates voice communication along with data transmission, internetworking. Thus the technologies are more complex. On the other hand, cellular networks are quiet new now in terms of data communications. Advancement in information and communication technologies are making these networks more robust and functional still there is a long way to go. Other than the technologies and functionalities, a big issue with any type of information sharing network is security. For cellular network, security of the data is essential. A common IT buzzword in recent days is Internet of Things. Other than computers, mobiles etc. there are number of smart devices now a days. Those devices share data across network and Internet. These devices are tiny sensors and the networks they are connected to are generally wireless networks. A wireless sensor network will have limited objective and functionalities, but they also take part in internetworking, data communication etc. Thus it also has security issues. (Vacca, 2013) In the rest of this report, I will be discussing the security in cellular networks and wireless sensor networks in details. The technologies used in both cases will be critically reviewed and several security aspects will be discussed. Technical Description Topic 1 Security in Cellular networks Cellular communication has become an important part of the communication networks around the world. Other than using voice-based communication through cellular phones, now Internet can be accessed through cellular networks. Activities like monetary transactions, sending important communication messages etc. are now very common. Day by day new services are being added over cellular networks. Cellular networks are solely dependent on wireless communication media and networks. There are many advantages of cellular networks. But there are certain disadvantages and security issues too. Limitation of wireless communication media has imposed several difficulties on the implementation of security principles like confidentiality, integrity and authentication to the cellular networks. (Mishra, 2008) Generation and Technologies behind Cellular Networks Cellular networks are working since 1980s. There are a number of generations of cellular networks. Each generation has its own technologies, benefits and challenges. The generations so far are, 1G, 2G, 3G and 4G. 4G cellular networks are rolling out but currently; the mostly used cellular network is the use of 3G networks. During the 1980s, 1G networks were used. It has a maximum of 9.6 Mbps speed. It was known as Advanced Mobile Phone System or AMPS in US and Nordic Mobile Telephony or NMT in European countries. The data used to be transmitted in a continuous waveform through analog modulation technologies. 1G cellular networks had security issues like lack of encryption, misuse of frequency spectrum etc. Then 2G cellular networks came into the picture and still these networks are in use in various parts of the world. These networks are also called Personal Communication Services or PCS. In 2G, digital modulation had been introduced. It overcomes various limitations of 1G. Technologies like Code Division Multiple Access or CDMA, Time Division Multiple Access TDMA, digital AMPS, Global system for Mobile Communication or GSM communication, Personal Digital Cellular or PDC etc. are used in 2G, in different countries. 1G communication networks were improved into 2G cellular networks. But the improvements were mainly in case of voice communication. Data transmission was still poor. An improvement of 2G, called 2.5G helped in better data communication over 2G networks. It bridged the gap between 2G and 3G networks. Technologies like EVDO, High Speed circuit switched data or HSCSD, enhanced GPRS, and EDGE etc. are examples of 2.5G cellular networks. (Halonen, et al., 2004) Then it was 3G networks. It provides faster Internet surfing than previous generations, supports video telephony. The main technologies used in 3G cellular networks are, CDMA 2000, Wideband CDMA or WCDMA, Time Division Synchronous Code Division Multiple Access or TD-SCDMA. Before fully deployment of 3G cellular networks, 4G cellular networks have started to be introduced in various parts of the world. 4G cellular networks will provide faster data transmission than 3G. It is expected that it will support near about 20 Mbps data rates. 4G supports wide array of next generation Internet technologies like Mo-IP, IPv6 etc. It will be cheaper yet more powerful. It is capable of supporting communication among mobile vehicles up to 250km/hour speed. (Pierre, 2010) Technologies in 2G and 2.5G The most widely accepted cellular technology is 2G and its later version of 2.5G. Short Messaging Service or SMS is a service in cellular networks than transfers text based messages between two cell phones. Larger messages are broken down into pieces before transmitting. Some other technologies in 2G and 2.5G networks are, High-Speed Circuit-Switched Data or HSCSD It provides faster data transmission than GSM. The speed can go up to 115 Kbps. But, it cannot carry larger bursts of data. And, that is why; GPRS is more popular than HSCSD. General Packet Radio Service or GPRS GPRS provides data transmission for larger bursts of data. This is facilitated by addition of two components in the cellular networks. Those are Service GPRS support Node or SGSN and Gateway GPRS support Node or GGSN. SCGN helps in implementing security in the access control and mobility. On the other hand GGSN supports connection to external packet switched networks. (Heine Sagkob, 2003) Enhanced Data Rates for GSM Evolution or EDGE This is a standard used in GSM technology. It is based on GMSK modulation techniques and uses 8PSK modulation. The data rate can go up to 384 kbps. (Seurre, et al., 2003) Cellular Digital Packet Data or CDPD This is a data service based on transmission of data packets. It is also able to detect some idle voice channel and further use of those channels for traffic management without harming voice communication. There are different variations of this technology in different countries. For example CDMA is used in USA for primary 2G networks, CDMAOne or IS-95a is the primary CDPD technique. It was capable of serve number of users than GSM and TDMA. The speed can go from 14.4 kbps to 115.2 kbps with CDMATwo extension. In 2.5G cellular networks, there are two techniques of CDMA. Those are 1xEVDV and 1xEVDO. The former one is used for data and voice transmission based on one radio frequency channels. The other one is used for same purpose but through separate channels. (Arokiamary, 2009) Technologies in 3G cellular networks 3G are focused on mobile networking based on worldwide standard and through a common frequency band. A new mobile network infrastructure called International mobile telecommunications 2000 or IMT 2000 was developed for supporting 3G cellular networks worldwide. 3G can support data transmission rate up to 2Mbps in 2 GHz frequency range. The main objectives of 3G cellular networks were set as, Supporting a wide range of services for voice and data communication without limitations of the geographic location. Supporting coverage of the network over a wide area and accommodating different kind of mobile stations. Supporting and expanding the services beyond constraints like inefficient spectrum, radio transmission, system economics etc. Supporting best QoS. Supporting an open architecture for easy deployment of different types of application. Supporting a modular architecture so that the size and complexity of the systems becomes manageable. 3G technologies are based on UMTS. UTMS provides Radio Access Network or RAN and the core network or CN. A RAN can have GSM, GPRS systems with connection to packet switched CNs even circuit switched CNs. To transit into a 3G network, it needs to connect to UTRAN systems. A UTRAN system has several sub systems. Each of these sub systems will have a Radio Network Controller or RNC. These are connected to a number of Base Transceiver Stations or BTN. UTMS provides the basic security implementation in 3G networks. (Hu Qian, 2013) Security in Cellular networks There are different kinds of security issues and attacks in cellular networks. These issues are closely related to the architecture and technologies of different cellular networks. With the advancements of cellular networks through different generations, these issues and attacks have become more common that there are difficulties in conforming to the basic security principles of confidentiality, integrity and availability. The security issues in cellular networks are, Confidentiality As the scope and application of cellular phones and networks in sensitive data transmissions are rising up, the confidentiality of all the information is becoming a serious issue. Integrity Integrity of the data and voice communication through the cellular networks is an essential part. It ensures that data has been transmitted properly from the sender to the receiver and no data is lost or modified whilst transmission. Authentication There is huge number of subscribers in cellular networks. It needs authentication to ensure that each of these subscribers are legitimate. 3G networks allow communication from people to different parts of the world. There may be problems related to cross-regions and cross service providers. Authentication may become an issue in cellular networks. A good authentication method will help to overcome these issues. Other security concerns are related to proper access control, web services and operating systems used in the cellular devices etc. some of the security issues are, Access control Access control to the data in the cellular devices may become an issue if there is any restricted data sharing among devices and across the networks. Web services Web services in cellular devices makes the devices and data exposes the devices and data to risks related to HTTP protocols. For example, issues like denial of services or DoS, buffer overflow, viruses etc. Operating system Cellular devices are small devices. There are different kinds of operating systems on different platforms, vendors etc. compatibility among these heterogeneous operating systems is an issue and may open up several security loopholes or vulnerabilities. Location detection Due to the privacy protection issues of the user, the actual location of a cellular device needs to be hidden. But, as the cellular networks are moving towards IP based networks, there are common issues that link to access point location etc. and this is leading towards the compromise of privacy, location, detection and sharing. Content Download Cellular networks let the user download different type of content from different sources just like traditional computer networks and Internet. Whilst downloading, adware may affect the user, and that may become a security issue. While the content is downloading, another issue is digital rights management. Users may download copyrighted content such as music, images, video etc. and there may be violation of the digital rights. Malware and virus Malware and viruses have become a daunting issue in case of cellular networks and cellular devices also. Liberty is the first virus that affected cellular networks and this was a part of a large occurrence of denial of service or DoS. Security of cellular devices The physical security of a cellular device is also a security issue. As these devices contains data, so there may be unauthorized access to those data and breach of security. Different types of attacks Different types of security attacks also affect cellular networks. The infrastructure is open to different types of attacks. They are as follows; Denial of Services or DoS and Distributed DoS or DDoS. Jamming of channels Eavesdropping Unauthorized access Forgery of message Man in the middle Message replay Session hijacking Etc. Counter measures There are several counter measures of the security attacks in cellular networks. Some of those are, In case of 3G cellular networks, UTMS is common and good security architecture. It has been developed based on the security measurements in 2G networks. Thus the robustness of the 2G networks are retained. Further the security implementations are extended. (Kaaranen, 2005) Wireless application protocol or WAP. Interlayer security in 4G networks. Use of cryptographic algorithms in data communication. Use of firewalls and antivirus. Use of advanced OS like Android etc. that have in built security infrastructure. Critical Review Cellular networks are widely used for long time. There are lots of technology and security measurements available for cellular networks. Wireless communication channels have some inherent security issues. Those are more prone to various information security attacks. But in case of cellular networks, security seems to be an important consideration and there are several counter measurs available to different types of cellular networks. Technical Description Topic 2 Security in Wireless Sensor Networks A wireless sensor network is a wireless communication network of tiny actuators and sensors. Wireless sensor networks have some specific purpose and usually those are used for monitoring different attributes of the environment. The micro sensors are low power and low computing resource devices. In a remote wireless sensor network, huge numbers of sensors are deployed densely. These sensors nodes are used to perform signal processing, routing and data communication. These are self-configurable in nature, scalable and have longer lives. In spite of several advantages and applications of WSN, there are significant security concerns. (Liu Ning, 2007) Architecture of a Wireless Sensor Network A WSN has different constituting components. Those are, a. Sensor nodes These sensor nodes are called sometimes as motes. A node can perform specific monitoring activities or routing activities. Thus a router in a WSN will have additional routing functionalities. Nodes do not interfere with one another. b. Gateway A gateway supports communication between nodes and external network like Internet. c. Network manager A network manager configures the network, schedules the communication process, manages and monitors the routing process, routing table etc. d. Security manager It manages the generation of data, storage and management of the same securely. (Sohraby, et al., 2007) Security analysis of a WSN The nodes in a WSN are simple enough and that makes the WSN simpler and popular. But this simplicity makes these networks more vulnerable from the security view point. WSNs suffers from different kinds of security attacks. For example, eavesdropping, injection of bits, packet replay etc. To make a WSN secure, it needs successful implementation of all security principles like confidentiality, integrity and availability along with other kind of security mechanisms and techniques. (Lpez Zhou, 2008) Attackers can easily mock a legitimate sensor code, damage any node. All these are easy with the sensor nodes as there is very little scope to secure these nodes. Those are low power consuming and limited computing resource devices. Thus implementation of some security measurements on those devices is really challenging. Some of the important and common categories of security attacks on WSNs are, Denial of Service or DoS There are several attacking techniques to attack a WSN. In a DoS attack the WSN network is made unavailable to the legitimate users. Or the capacity of the network is reduced deliberately so that the network fails to perform its activities. Different techniques of DoD attacks are, Jamming in physical layer. This is done by sending an interfering radio signal to the radio frequencies of the WSN. Basically, it is a process of interrupting the WSN by sending some interfering signal. Tampering in physical layer by causing damage of nodes. For example, reverse engineering can be used for this purpose. Collisions, exhaustion, unfairness etc. in data link layer. Homing, spoofing, flooding, black holes etc. in networking layer. De-synchronization, flooding etc. in transport layer. Interrogation attack in data link layer. Sybil Sybil is malicious device illegitimately taking on multiple identities type of attacks in WSNs. A single node can have multiple presence in a WSN as a result of this attack. Thus, it will reduce the effectively and fault tolerance of the network. The routing protocols are ale affected by this attack. Sybil attack can happen in physical layer, data link layer and network layer. In data link layer, the technique is data aggregation and voting. Wormhole In this kind of attack, an adversary sits near the base station and creates a wormhole in the network. Under this attack, the messages from the adversary are tunneled to one part of the network through some low latency link, then those are replayed in other parts of the network. A compromised node can play the role of the adversary. This attack happens in network layer. This is basically a routing based attack to disrupt the whole network. Black hole Black hole or sink hole attacks are carried out by compromising a node that is more attractive to its neighbor nodes in terms of some routing algorithm implemented in that WSN. This kind of attacks can be a part of another attack like selective forwarding. This type of attacks happen in network layer. Routing Information Manipulation Attacks of this type happens due to manipulation of routing information of the network. Selective Forwarding This kind of attack happens in network layer. Malicious nodes work like black holes. Messages are dropped by those nodes. Or the adversary can use these nodes to forward selective messages to the network. Flooding with Hello Packets Hello packets are forwarded by different protocols in a WSN. This is for knowing which nodes are within the range of data transmission. There may be some laptop class attack that may broad case information with more transmission power and convince some other node that the node is within the range. As a result it may take part in data transmission of the victim network. This happens in network layer. Spoofing Spoofing of the acknowledgement messages is very common in a WSN. This special kind of spoofing is called acknowledgement spoofing. There are various other types of attacks. Some of those are, cloning, impersonation, eavesdropping, traffic analysis, mote class, laptop class invasive and non-invasive etc. Counter measures Several countermeasures have been taken to secure WSNs from these wide ranges of security attacks. But the inherent architecture and constraints of a WSN makes those more prone to attacks. Still there are counter measures to combat with these attacks. Some of those counter measures are, a. Link layer security for outsider attacks Simple encryptions and authentication at link layer can save from major outsider attacks. This is done by a globally shared encryption public key. Attacks like wormholes, flooding by hello packets etc. can be prevented in this way. Even if an advisory is stopped from joining to a network, he/she cannot stop from being attacking the network through wormholes kind of attacks. Other link layer security mechanisms like described above cannot save a WSN from insider attacks like black holes, selective packet forwarding etc. b. Countermeasures for Sybil attacks Insider attacks are originated from within the network. Sharing of a global key can help the insider attacker to masquerade any node. There should be verification of the entities. Public key cryptography can help in this case however, generation and verification of digital signatures is not possible by the sensor nodes. A possible solution is to use unique symmetric key by each node, acquired from some trusted base station. Protocols like Needham-Schroeder can be used for verification the identities. To prevent insider attacks from a stationery network is possible by enforcing limitations on some compromised node. c. Countermeasures for help packet flooding Verification of a bi-directional sink can be useful to prevent attacks from hello packet flooding. d. Countermeasure for wormhole and black home attacks These kind of attacks are difficult to deal with. When these two types of attacks are combined in some network, then it becomes more difficult. Wormholes use some out of band and private channel for attack. This is generally invisible to the rest of the part of the WSN. On the other hand black holes or sinkholes are difficult because in this cases, the adversary use remaining energy of the nodes. The routing topology is used and the verification is harder. Routes having minimum hop count to a base station, can be verified easily. But in case of a wormhole attack, the hop count may be completely misinterpreting. Sinkholes can be easily created as there is no defender to verify the identity. A detection technique for wormholes can be very time consuming and requires high synchronization. Thus is not usable in sensor networks. (Patil Szygenda, 2013) Other types of countermeasures can be, Use of probabilistic selection and leveraging of global knowledge. This is difficult to implement due to the self-organizing nature of the nodes. There may be authenticated flooding and broadcasting. Critical Review Wireless sensor networks are an emerging field. These are being used for various types of networks and applications. In most of the cases those are used for monitoring purpose. Sensor networks are also a type of wireless networks but there are inherent differences between sensor networks when compared to IP networks. Thus, there are several other specific issues related to sensor networks. There is no issues with performance of the sensor networks. But as already described, security is a serious issue with sensor networks and there is some relation of security to performance. Rather there is a trade of between these two. Conclusion In this paper, two topics in network security has been discussed in details. The topics are security in cellular networks and security in wireless sensor networks. Both of these networks are different than traditional computer networks, quite new in operation. Both of these are becoming stronger with researches and application. However, security is a common issue for both of these. Types of security attacks and counter measures are different in both of the cases. In this paper those security aspects and counter measures are discussed in details. References Arokiamary, V. J., 2009. Mobile Communications. s.l.:Technical Publications. Chandrasekhar, V. Andrews, J. G., 2009. Spectrum allocation in tiered cellular networks. IEEE Transactions on Communications, 57(10), pp. 3059-3068. Halonen, T., Romero, J. Melero, J., 2004. GSM, GPRS and EDGE Performance. s.l.:John Wiley Sons. Heine, G. Sagkob, H., 2003. GPRS. s.l.:Artech House. Hu, R. Q. Qian, Y., 2013. Heterogeneous Cellular Networks. s.l.:John Wiley Sons. Kaaranen, H., 2005. UMTS Networks. s.l.:John Wiley Sons. Liu, D. Ning, P., 2007. Security for Wireless Sensor Networks. s.l.:Springer Science Business Media. Lpez, J. Zhou, J., 2008. Wireless Sensor Network Security. s.l.:IOS Press. Mishra, A., 2008. Security and Quality of Service in Ad Hoc Wireless Networks. s.l.:Cambridge University Press. Nichols, R. K. Lekkas, P. C., 2002. Wireless security. New York: McGraw-Hill. Patil, H. K. Szygenda, S. A., 2013. Security for Wireless Sensor Networks using Identity-Based Cryptography. s.l.:CRC Press. Pierre, S., 2010. Next Generation Mobile Networks and Ubiquitous Computing. s.l.:Idea Group Inc. Seurre, E., Savelli, P. Pietri, P.-J., 2003. EDGE for Mobile Internet. s.l.:Artech House. Sohraby, K., Minoli, D. Znati, T., 2007. Wireless Sensor Networks. s.l.:John Wiley Sons. Vacca, J. R., 2013. Network and System Security. s.l.:Elsevier.

Thursday, November 28, 2019

The Taming of the Shrew Essay Paper Example For Students

The Taming of the Shrew Essay Paper Shakespeare a well known playwright throughout the 16th Century wrote many comedies and tragedy plays to entertain Elizabethan audiences. The plays were aimed at all classes and ages, after being performed in front of Queen Elizabeth, and approved of. Queen Elizabeth was very feministic and The Taming of the Shrew faired well with the monarch. One of the leading characters, Katherina, is very feisty and classes herself as better or at least equal to men, something unheard of in Elizabethan society. Men were seen as the superior sex, where as women were expected to be sub-dominant and weak. Their role was not to challenge the husband, but to support him; also women were seen as an asset to a married man. Reasons for this philosophy perhaps resided in The Great Chain of Being, a concept accepted and followed by society at the time. These stereotypical views of women were challenged by The Taming of the Shrew. The play revolves around four main characters and a whole host of involved background characters. There are two love stories running through-out, which become tangled and more complicated as the plot thickens and emotions run wild. We will write a custom essay on The Taming of the Shrew Paper specifically for you for only $16.38 $13.9/page Order now One of the most complicated aspects of the play is that characters repeatedly dress up as each other a concept taken from Commedia dellArte. Amusement is also due to the dramatic irony because the audience know of the costume capers, where as the characters in the play do not. Modern audiences might not find some of the disguise antics comedic as they might see them as foolish and stupid. However Elizabethan audiences would have found this confusion amongst characters and visual antics amusing as most of the audience would not have been well educated. The more sophisticated wordplay and punning would also rely on exaggerated actions and the slapstick humour so often seen in Shakespearian plays something else taken from Commedia dellArte. This would help to explain why there are so many scenes involving exaggerated movements, and farcical actions such as when Katherina is fighting with Petruchio. Katherina is the plays antagonist. Widely reputed throughout Padua to be a shrew, Katherine is foul-tempered and sharp-tongued at the start of the play. She constantly insults and degrades the people around her, and often resorts to violence and wild displays of aggression. It is generally perceived that her erratic behaviour is genetic, however we sometimes see the real Katherina which could lead us to believe that her behaviour is the result of many different factors; one being her jealousy for the way Baptista treats Bianca. She may act like a shrew because she is miserable and desperate. However, she is still a very fiery character, a feminist. Katherinas character challenged the stereotypes withheld at the time, which women were nothing more than housewives, possessions to be owned by their husbands. This stereotype partly came about through The Great Chain of Being, which states that women are below men. However the monarch at the time Queen Elizabeth I was a very feministic queen. Katherinas independant stance would have faired well with the Queen as they followed the same principles. Katherinas behaviour would also startle Elizabethan audiences as it was unheard of at the time this could provide humour.

Sunday, November 24, 2019

Buying into a Poor Curriculum

Buying into a Poor Curriculum Free Online Research Papers It is a common rationale that because children are the future, the welfare and education of our children should be and will be of the utmost importance. Yet, since the birth of our country, there has never been a consensus on any aspect of our public education system. Our constitution makes no mention of education, except for the 10th amendment, which relegates power to the states to govern their own respective system.(Pulliam, Van Patten pg. 122) Unfortunately, federal policies continue to be enacted which, despite good intentions, often negatively affect public education at all levels. The latest legislation to do so is the â€Å"No Child Left Behind† Act, which enacts theories of standards-based education reform. On the surface, the use of standardized testing may seem to be the solution to ensure quality education to all children. But shortcomings have been identified and now debate is as fervent as ever. The â€Å"No Child Left Behind† Act of 2002 (NCLB) is basically a reauthorization of a â€Å"number of federal programs aiming to improve the performance of U.S. primary and secondary schools by increasing the standards of accountability for states, school districts and schools, as well as providing parents more flexibility in choosing which schools their children will attend.† I believe standardized testing is the chief problem and agree with James Ryan of New York University that the NCLB is â€Å"at war with itself.†(Ryan 2004) Not only has testing proven to worsen the problems of racial equality, teacher shortages, it also has lowered actual lowered academic achievement by giving incentive for a devastating curriculum in the classroom. Actually, testing is not the real problem. The real problem, perpetuated by the NCLB, is the repercussions of not passing the test. The real problem is money. Every individual school board in the country is concerned with funding and its own finances. In order to exist, most are dependent upon federal aid. The NCLB incorporates penalties for showing a lack in proficiency by requiring schools to incur the cost of remediating themselves. If these efforts still due not improve scores, parents may opt to request outside tutoring or to move their child to another school, with the school board picking up the tab for either. This has a snow –balling effect. The schools now have fewer students and are now entitled to less federal per-student aid as well as this transportation expense. In an effort to avoid this, schools have taken a preventative approach. First, the term â€Å"proficient† is very vague and specifically delegated to each state to determine acceptable standards of proficiency by implementing their own tests. Consequently, states are manipulating the test results (South Carolina DOE 2003) by lowering academic expectations of each grade level. Second, elementary school curriculums across the country have been narrowed and have evolved into an elaborate practice test. Ultimately, students are losing out on a well rounded education with cutbacks in physical education, art and music.(Seigel 2007) School officials are under tremendous pressure and held accountable for their school’s performance. There are many critics of the NCLB, all with varying complaints. There is an overwhelming agreement that changes need to be made to the legislation before is reauthorized this year. Amendments suggested all revolve around how to obtain an objective assessment of â€Å"Adequate Yearly Progress†(AYP). Some want to amend the testing and others want to amend the results to not include all students. The latter propose that students who have lived in the country for less than three years and students who have been identified as having a learning disability need not be included.(Lewis 2005) Others propose that there should be no federal legislation at all regarding education. One Education Professor wrote, â€Å"The obvious solution is to reverse roles. Washington should supply unbiased information about student academic performance to states and local districts. It should then be the responsibility of states and local districts to improve performance.†(Ravitch 2007) Th e only real way to fix this legislation, again, boils down to money. In order for the intentions of the legislation to be fully realized, it needs to be fully funded at the federal level. (Ferrandino and Tirozzi 2004) That is not to say that Congress should replace local authority, but only it should provide unconditional aid. Schools would then reimplement a full curriculum. Teachers and other school officials would then return to the business of teaching and not operate in a state of fear. References: 1. Pullman, J.D. Patten, J.V. (2007) History of Education in America. New Jersey: Prentice Hall 2. Ferrandino, V.L. and Tirozzi G. N. (2004) Improving NCLB. Principals’ Perspective. Retrieved October 21, 2007, from naesp.org/ContentLoad.do?contentId=1215. 3. Siegel, D. (2007) High-Stakes Testing and the Status of Physical Education, Journal of Physical Education, Recreation Dance, 78(8), pg. 10. Retrieved October 21, 2007, from Proquest Direct database. 4. Lewis, A. C. (2005) Fixing NCLB Demands, The Education Digest,70(7)pg.69. Retrieved October 21, 2007, from Proquest Direct database. Research Papers on Buying into a Poor CurriculumStandardized TestingResearch Process Part OneInfluences of Socio-Economic Status of Married MalesEffects of Television Violence on ChildrenHip-Hop is ArtPersonal Experience with Teen PregnancyMoral and Ethical Issues in Hiring New EmployeesThe Effects of Illegal ImmigrationQuebec and CanadaGenetic Engineering

Thursday, November 21, 2019

Video Surveillance Cameras vs. Personal Privacy Research Paper

Video Surveillance Cameras vs. Personal Privacy - Research Paper Example This research will begin with the statement that video surveillance has been in existence for a long time now. Often you will find cameras in shopping malls, bank halls, workplaces, airports, transportation hubs and mostly on urban streets. As modernization and development increased, the number of risks also grew to such an alarming extent that employers, governments, organizations and even individuals saw the need for keeping a close watch on their lives and property. Video surveillance has been more embraced in the recent times compared to other complex systems. Camera surveillance has taken over the market as a main figure of supervision in high risk public and private areas, where theft and terrorism are observed to be prevalent. The digital technology has proved to be the ultimate stimulator for camera surveillance, which comes in a variety of models that could be easily implemented for use. According to Jones, there are about 100 million CCTV cameras operating in the world of w hich 30 million can be identified to be from the United States. Systems of video surveillance cameras have been applied widely to different situations and not necessarily to intrude on personal privacy but to monitor and supervise activities for the intended purposes. The use of surveillance cameras is potentially used and recognized in the European nations more than in the United States, with Europe significantly overstating the benefits of the CCTV.... It is obvious that those cameras will be deployed on both ordinary public places and even more private areas, which are prone to crime. The constitution project staff (12) mentions that video surveillance is carried out in line with the need for police investigation, in a suspected criminal act of an individual in New York, pursuant to a warrant. Most of the crimes are strategically organized not to occur in an open place, rather looking for a secluded environment to pursue their mission. Placing cameras in such locations would make it easier for security agencies to deter crime and capture the offenders. Many in the society oppose the government strategy, claiming that they are being watched or recorded enough to read an individual’s next move and the way they privately carry themselves in the public. A study on Manhattan surveillance cameras established that there were high chances of being recorded almost every step of the way, as one walked around the city and most especia lly, it seems to be worse when more cameras are even located in some sacred public domains (Winston and Edelbach 223). While this is true, individuals concentrate more on their private life and tend to forget that the primary concern is not surveillance intrusion in privacy, but to gather and cover timed activities for analysis and as evidence in case of an event (Constitution Project Staff 8). Again, individuals who seem to be anxious would portray a character that would raise the suspicion of security agents monitoring activities on cameras, making them question whether the individual has a hidden agenda. With border patrol surveillance, cameras are placed on roads, highways and at the border to keep watch and control exits and

Wednesday, November 20, 2019

Are human conceptions of God overly anthropomorphic (in the same way Essay

Are human conceptions of God overly anthropomorphic (in the same way that those of the spiders are overly arachnimorphic) - Essay Example This therefore confirms the truth that human conceptions or the true idea of God must be anthropomorphic in nature meaning that the Deity possesses man-like character and norm. Even though it is difficult to prove that man was made in the image of God, it is not in doubt that all men are made in the image of God. All experiences therefore come from God including the human experience, and in that sense anthropomorphic. The substance of the philosophical and theological theories is that man has the conception of God as anthropomorphic as it is embedded in almost all the scriptures of the different religions like Christianity and Judaism amongst others. Hume’ Dialogues brings about different conceptions of God as anthropomorphic through the ranking of four causal principles namely reason, instinct, generation, and vegetation (O’Connor 127; Hume and Richard 46). For instance, Philo argues that the universe resembles an organism and is likely to have originated by generation from matter by stating, â€Å"The universe bears a greater likeness to an animal or vegetable than human works. The cause must therefore be similar. The cause of order in animals and vegetables is reproduction. The universe therefore originated by reproduction rather than design.† (Hume 131). Cleanthes supports the anthropomorphic conception of God along the lines of the Design Argument as he feels it is the only philosophical argument that gives an insight about the true nature and existence of God (Hume and Dorothy 22). Both Demea and Philo feel that it is difficult to understand the real God but Cleanthes uses the Argument Design to describe how humans view God as anthropomorphic. Cleanthes states, â€Å"The existence and nature of God is known by the Argument from design: 1. Premise: The world is adjusted and fine-tuned, 2. Premise: The adjustment of the world resembles exactly, though it

Monday, November 18, 2019

Value Creation, Communication, and Evaluation Essay - 1

Value Creation, Communication, and Evaluation - Essay Example Thus, the organization competes by ensuring that the standard and quality of its products is high and that the products satisfy the customers wants fully. The organization also competes by promoting its products with the utmost zeal and dedication. This strategy is mainly reached by committing a substantial amount of funds to the sales and marketing department. Effective promotion is also achieved by employing qualified and experienced sales persons. Indeed, the competitive strategies employed by the organization blend well with its marketing strategies. This is because; over the past years the organization has managed to attract more customers than its competitors by use of these marketing strategies. Taking for instance, despite the wide use of promotions and advertisements by the organization, it still manages to maintain a low cost/benefit ratio. This is mainly by ensuring that the advertisements are acutely economical and that the resources used do not exceed the benefits obtained (Paley, 2008). The issue of value proposition is also a strategy employed to ensure the organization competes well in the market. The main value propositions offered include promising the customers to improve the value of products, offer a variety of products, and to ensure that high quality is maintained. The value is communicated to customers by explaining the product relevance to them, stating the benefits that accrue after purchasing the product, and finally informing the customers about the unique differentiation of its products from those of the competitors. The organization also makes use of visuals in order to catch the attention of customers and also achieve a better understanding of the promotion. Over the past years, the organization has managed to make a compelling value proposition by communicating the concrete results to customers clearly. The management also ensures that the

Friday, November 15, 2019

Impact of IMF Policies on China Financial Security

Impact of IMF Policies on China Financial Security Financial crisis swept over the world rapidly last three years. The globalisation and the developed of the derivatives have dramatically changed the whole financial market. The rate of global economic growth was continuing decrease. The economy, particularly financial services sectors suffered a critical strike, which a few investment bank, such as Lehman Brothers Holdings went bankrupt. As one of the largest financial institutions, International Monetary Fund must play more significant role in every areas of finance, especially for financial stability. The members of IMF should following three obligations regarding the abolition of exchange restrictions: Avoidance of restrictions upon current payment. Avoidance of discriminatory currency practices. Convertibility of foreign-held balances. It means IMF has the obligation that protects or makes the whole financial stability. China got a high mark in the process of coping with the financial crisis. The banking in China had a favourable performance, which was a viewpoint by CBRC President Liu Kangming. He pointed that China government had taken a package of measures to stimulate the economy. In the crisis, Chinas banking sectors overall performance, large commercial banks continued to improve profitability, and risk control ability was improved. The role of monetary policy should more significant, meanwhile, the capital market cannot relayed on which being the main source of fund. Between IMF and financial stability of China, it should exists inevitable connection which could impact on banking, credit and insurance. Through the relative research and data analysis, a quantity of experiences and lessons can be summarized and demonstrated, which will advantage other areas of the whole economy to exploit new ways or thinking. Besides, it may become reference to the future. The background of the dissertation Every nation like China is faced with financial management problems to which their business industry should be able to attend to in order to take the economy to move especially during the times of crisis that the global communities are facing. Thus, key financial decisions normally confront the nation leaders in issues and problems that concerns financial investments they usually provide answer to the problems in economy. But despite of this, China remains to be a fortunate, strong economy with a per capita GDP almost similar with the four dominant West European economies (Conway, 2005). Given the importance on low inflation, reforms, a housing market boom, and excellent bonds with other countries like Australia have been essential variables over the course of the economies years of expansion (Conway, 2005). With regards to the current standing of global market and global finance, the current global recession is one of the problems experienced not only in the United States and the United Kingdom but also by the global economy and of course China since their business operation was affected. Today, businesses around the globe work in a more obscured, and more synchronized situation. The monetary policies and practices of China was also affected including their relationship to IMF. The premeditated undertaking, then, is to construct a distinguishing way ahead, using whatsoever core competencies and assets at its discarding, against the environment and control of the situation. Through these distinguishing potentials the organisation look for sustainable competitive plus. With regards to economy of China, financial evaluation and implementation of new strategies can be a demanding exercise. With this, it is difficult to foresee what the future holds (e.g. the actual future outcome may be entirely unexpected), i.e. to foresee what the scenarios are, and to assign probabilities to them; and this is true of the general forecasts never mind the implied financial market returns. However, this is an important procedure because it enables China to make decisions that will be advantageous and beneficial (Lecavalier Santor, 2007). In addition, organisations that are open to change and willing to counter the current financial crisis are generally more successful compare to those who resist it. On the other hand, leadership in accordance to power focuses on the techniques and expertise of efficient organisation, planning, direction, financial planning, credit assessment and control of the operations of a business is really vital. 1.2 Aim and objectives The aim is to analyse the policies and measures of IMF which impact on China financial stability. With respect to the aim of the study, this paper also seeks to attain the following objectives: To research the policies of IMF to China, besides that, those to developing countries should be necessary; To research how China financial services sectors do, especially banking; To analyse how much influence IMF has to these financial services sectors; To analyse the data which IMF and China banking published 1.3 Data and methods The research method depicted in this research is based on both quantitative and qualitative method. The qualitative method permits an iterative and flexible ways, while the quantitative research method lets dependent and independent variables requirement and also allows for longitudinal gauges of ensuing feat of the research subject. Throughout information assembling the preference and plan of methods are continuously tailored, based on current analysis. This allows examination of significant latest issues and questions as they arise, and let the researchers to slump fruitless parts of study from the original research map. Actually, the methods used in this study offer many advantages due to the nature of this study. First of all, for many research questions and objectives, the benefits lie in the enormous saving in resources especially time and money (Saunders et al. 2003, p.200). Actually, this research considers secondary researches due to budget constraint and time limitation. Actually, secondary data provides incomparable benefit that primary data cannot offer. These have generated useful references and have provided a good starting point for formulate and generate ideas. For instance, data includes textbooks related China monetary practices, IMF, financial industry, and government white paper and financial websites. Those data has already been collected and provides an unobtrusive measure. All the sources are quite reliable. Secondly, secondary data may be the only viable choice for many aspects of this research due to the nature in itself. Many psychology data and aggregate data are not likely t o be collected by the author; rather, secondary data from previous researches make this research with easy access. For example, many high quality national newspapers and journal articles being published are permanent and available in a form that may be checked relatively easily. 1.4 Dissertation structure As for the dissertation structure, this paper was broken down into 3 key stages; research problem identification, collection and analysis of information, and Synthesis of information and generation of recommendations. Stage 1: Research Problem Identification In this stage, the researcher considers the exact focus of the problem to be researched. Actually, this engages examination of existing research, practices and theory from genuine literature. This procedure helps the researcher put together empirical findings and theoretical perspectives with the researcherà ¢Ã¢â€š ¬Ã¢â€ž ¢s understanding about problem in the study. This will also help the researcher distinguish the problem feature and learn more about. Stage 2: Collection and Analysis of Data In the second stage, the researcher collected and analyse the data gathered for the purposes of recognizing significant contextual/cultural variables detailed to their setting predominantly in monetary setting. In addition, the evaluation of monetary practices in China and analysis of the policies imposed by IMF are done in this stage. These information enable this research and the researcher to achieve a specific understanding of the problem. Stage 3: Synthesis of Data and Generation of Recommendations In this third stage, the researcher synthesised findings from the previous stages and pertinent previous study. The main centre of this stage is to review these data to amend current hypotheses and account for different factors, in addition to generating recommendations based on new understandings and results. During this stage, culture-specific and research-based recommendations for action are produced. For this study, the researcher focused on the monetary practices of China and IMF policies imposed to borrowing countries. Chapter 2. Literature Review 2.1 Introduction As a response for the global financial crises, the national and international institutions are pushed to create a sound strategy wherein all their knowledge be incorporated thus monitoring and predicting the flow of the financial elements. With the use of wide array of instruments, the assessment on the financial system is found to be based on the analytical practice. The financial stability is difficult to pulse whenever there is an existing financial crisis, and ità ¢Ã¢â€š ¬Ã¢â€ž ¢s getting worse when the crises created a direct impact in the country. 2.2 Related Study of International Monetary Fund According to the history of the international monetary system, 1990s is the most considered time where there is an existence of the hyperinflations and been passed through the different picture of crises in Mexico and Asia. Even the Russia experienced the international financial infection. In each effected episodes of the countriesà ¢Ã¢â€š ¬Ã¢â€ž ¢ financial aspect, the impact participated in the savings and investment, employment, and the purchasing power. Many economists pulled their profession in building the specific solution against the crises and their effects as well. This is the birth of the International Monetary Policy or IMF as the first approach in the crises that plagued the international economy (Conway, 2005). Still, some analysts argued that the approach in the IMF is archaic decision most especially in an era of an international mobility. The present crises shows the different faces of doubts, and it would make the private financial markets suffer from the imperfect information and problems of collective action (Henning, 2009). The assessment of the various financial analysts, business interpreters, and economists, they believe that the effectiveness of the IMF in the new century is on the reform f the IMFà ¢Ã¢â€š ¬Ã¢â€ž ¢s functions, role and governance structure. The idea is around the consideration of six elements namely, (1) quota, voice, and representation, (2) internal governance, (3) surveillance, (4) lending instruments, (5) finances, and (6) the role of the IMF in the low-income countries (Lecavalier Santor, 2007). 2.3 The Function of IMF and the Role IMF Plays The IMF was identified as the provider of the valuable forecasts, served as the advisor of appropriate policy, and acted as the coordinated management through the financing packages whenever there is an implication of crises and assists the countryà ¢Ã¢â€š ¬Ã¢â€ž ¢s adjustment and economic strategies. Through these various characteristics, it is common for the approach to be under the criticisms and be a candidate to tests its ability for a rapid response to the financial crises (Conway, 2005). The appropriate response and the rapid action is the most inevitable requirement in every country to pass through the financial tempest. Obviously, emerging markets face sudden freeze in their capital inflows even if their governments have been pursuing appropriate policies. Based on the basic purpose of the IMF in todayà ¢Ã¢â€š ¬Ã¢â€ž ¢s world economy, the IMF enables the members to maintain and extend the international economic openness and other strategic adjustments. The role of the IMF extends well beyond providing official finance such as monitoring the international monetary system, fostering the negotiations among the members over the macroeconomic policy in coordination and payments adjustment and pursuing the economic policies. The roles that IMF plays are important, most especially in reducing the impact of the financial crises. But the ability to mobilize the financial resources is the central of the IMFà ¢Ã¢â€š ¬Ã¢â€ž ¢s functions (Henning, 2009). 2.4 IMF Financial Soundness Indicators: Core and Encouraged The need for better data and tools to monitor the various financial risks and vulnerabilities in the national systems is pursued and gave to the new area of work called Financial Soundness Indicators or FSI. The IMF has been collecting the various monetary statistics from the participating countries. All of the information gathered admittedly not being focused on the compilation of the soundness and risk information. Translating the needed data based on the information needs careful investigation and be under the assessment to provide the aggregate soundness and risk. In the beginning, the experts and officials of countries collaborated in organizing the call for a process. All the participants agreed that there is indeed, a need for sound information and a number of important indicators and that should be compiled. From the conducted survey of the IMF during the middle of 2000, there was a strong response from over 100 participating countries that allows the IMF to set a core standa rd regarding the financial soundness indicators. In addition, there is an alignment for the countries on what kind or type of information that the country should compile which can be also depends on the national circumstances. After the several rounds of extensive consultations along with the experts, finally, the IMF completed the guide for the indicators they needed. The Compilation Guide: Financial Soundness Indicators or à ¢Ã¢â€š ¬Ã…“the Guideà ¢Ã¢â€š ¬? was published by the IMF that details the concepts and definition, and sources and techniques to serve as the guidance of the participating countries. The Guide was produced to help the countries in compiling and disseminating the information wherein it allows the country to establish the method of comparing the indictors that could provide the valuable information. In the end of the process, the country can have the current soundness of the aggregate financial system (San Jose, Krueger, Khay, 2008). The use of Guide is considered as highly innovative method through the combination of the elements of macroeconomic frameworks, including the monetary statistics, bank supervisory framework, and international financing accounting standards. The use of the provided definitions measures the soundness or risk such as the capital adequacy, exposure to market risk, market fair value in accounting, balance sheet positions of the banks, and many others. The financial reliability gauges/indicators offered two sets known as the core and encouraged sets: The core of the financial soundness indicators is related to the five basic areas relevant to the point of view of banking business shortened in the method called CAMELS as part of the institutionsà ¢Ã¢â€š ¬Ã¢â€ž ¢ assessment of capital adequacy, asset quality, management soundness, earnings, liquidity, and the sensitivity to market risk. The main goal of the FSI is again, for the international comparability that guarantees the all countries that they will use the same applied method. However, the international comparability is limited to some differences at national level, most especially in accounting standards and the data needed in calculating the FSI (GerÃ…Â ¡l HeÃ…â„ ¢mÃÆ' ¡ne, 2006). 2.5 The Conclusion The most important part of assessing the stability of the financial system is the use of the appropriate number of quantitative indicators and the combination of the approaches. The involvement of the financial soundness indicators is one of the best developments in the International Monetary Fund. The compilation of the financial stability indicators and its related information facilitates the assessment through the single method wherein the countries can possibly compare their data among the others.

Wednesday, November 13, 2019

Essay --

Cities Reveal the Best and the Worst Poor and Poverty To be poor, in the economic sense, one merely has to have a sufficiently low income relative to the national average. In this study the standard below which one is regarded as poor is defined as an annual income less than one half of the national [gross domestic product - GDP] per head. On this basis it is evident that to be poor is the norm in most developing countries. This fact is critical if we are to target development to benefit the poor. If one further defines the poor as those who belong to households with an annual income of half the national GDP per capita or less, we define as poor between one half and three quarters of the households of developing countries. Less developed countries; the traditional measures of poverty often based on absolute and one-dimensional approaches and referring strictly to monetary variables, seem to represent a good way to describe the phenomenon. Wealth Wealth is conventionally defined in terms of possessions and market value. One definition of wealth is: "Wealth which combines energy and intellect can only increase, and that wealth can increase only with use and that wealth increases as fast as it is used." By Anonymous The World’s Best and Worst Cities There are various reasons, which can make city best and worst for living. One of the prime factor is the economical conditions of the country as well as the in the region. The best condition of humanity includes, the sanitary system, transportation facilities, pollution level, rate of crime, facilities provided to the citizens of the city/country, environmental factor, population growth, country’s GDP, health and safety conditions, and literacy rate are the essential meters to gauge an... ...nd also Bern all sharing the second place. Milan, Athens and Rome were described as the least safe cities in Western Europe, while Washington received the worst safety ranking in the United States. Abidjan in Ivory Coast was the world's second most dangerous city at the end of last year, when the survey was taken. Several other African cities were also at the very bottom of the table. Those cities posses the best human conditions can also be consider as the richest and developed, and those which are worst, can be considered as the poor cities/countries. It is basically the game of wealth and poverty. The major population of the world has lack of food, health, wealth, water, education, and other necessities of life, which make their life so miserable and worst. References http://news.bbc.co.uk/2/hi/africa/2815105.stm http://news.bbc.co.uk/2/hi/europe/2815625.stm

Sunday, November 10, 2019

Teen Pregnancy: its Prevalence and Alternatives

Zarrilli mentioned that â€Å"Although scholars disagree on a definition, we may define ‘popular’ theatre as stage entertainment that appeals to cross class audiences in complex societies through commercial means. † (Zarrilli et al, Theatre Histories, 2006, pg 311) In this context it could be stated that a theatre is a stage where the actor and actress perform their characters according to the director script is written. But the acting on the stage and especially in front of the audience is more difficult rather than performing on the back stage.There is whole lot of difference between a normal theatre and a popular theatre because rather than the culture mimic and mirror it also shows disagreement for the spectators with not a single question to answer but actually gives a reflection to the audience to find the answer. Popular theatre is nothing like that, what we see on television or theatre, where the actor and actress are performing a masterpiece, but here it is only to perform and realise the situation of the script and play a stage role in a very simple manner so that everyone can understand.However, in this context it would be relevant to mention that melodrama, folk drama, festivals, calendar celebrations such as; Christmas, Easter, the harvest festival and Halloween, carnivals, clowns, reality TV as examples of popular theatre. Discussion While placing a role in front of a viewer popular theatre should tell a story and also bring a concern to the community around the issue. The content should be a potential one and it should be a theatre as a â€Å"rehearsal of life† so that the visitors can overcome the fears of mind and can build a self reliance among them selves.The act should be intense, so that the audience gets encourage and they should have the ideas without any hesitation in mind. Thus from this view point events like melodrama, folk drama, festivals, calendar celebrations such as; Christmas, Easter, the harvest festi val and Halloween, carnivals, clowns, reality TV well blends into the parameter of popular theatre. Now, for the presentation it requires some time and with the chosen form of communication it can be done very quickly and easily.Sometimes the local people carry out the expenses making the production cost low. Another important part of popular theatre is to organize a very few people who have a very good understanding among themselves so that they can make their own decisions and participate to do the work. (Berkowitz, 189) An illustration of a case study would help in this context. Take for example ‘Kissa Kursi Ka’ (Trans: Tale of Throne), Directed by former parliamentarian Amrit Nahata, that originated as a folk drama, was a controversial Indian play.The plot revolved around a corrupt and evil politician, Utpal Dutt, trying to woo personified public, Shabana Azmi. It talked about evil politicians running after the ministerial throne to do anything and everything to get the so called ministry chair and ultimately shows that all politicians are of same character, leaving a question mark on the viewers about the characters of the politicians governing the country. This is what folk drama does. It reveals the public sentiment on different issues. In this case it was political satire.(Dos, 177) Now comes the performance part. It is completely an art, where the artist has to interact with spectators indirectly. Before they come in front of them they need ample practice to perform on stage with exemplary presence of mind. To make it complete, the artist should have appropriate make up, speech, to convey the message with proper skills of non verbal communication. Sometimes the interaction with audience can be direct, it becomes a testing time for the artist’s presence of mind, as different audience can behave indifferently.So folk artists of a folk drama have to work according to it. In a normal theatre the artist perform their role very professio nally because it is their bread and butter for them, so they have to perform quiet confidently so that the next order or roll does not quit away from them. Therefore they have to work very sincerely on that performance act. But in the popular theatre such as folk drama the artist plays a role without any tension on the platform and they do well than the professional people.This only happens because they think that they are working for the society or for the community to grow awareness among the people, so that they do not suffer afterwards in the later part of the life. Here we can see that the normal theatre artist perform their duties for their occupation, whereas the popular theatre artist does their work for the betterment of the society. For example, in India our government has taken an initiative to do away with stigma around AIDS. While launching this type of welfare needs, the government has taken two steps to convey the message to the people of India.One is by providing awa reness to the citizen by the help of television. (Border, 227-228) This type of small advertisement programs are covered by popular artist, so that the admirers of the artist gets more attracted to the message of the advertisement, which had been conveyed to them and they should follow that message from that particular day and also discuss the issue with others. With that particular topic, the government also launches small programs, like street skits, with the local people who stay in the villages and perform the role, where the awareness of the advertisement had not reach.Here popular theatre plays its part. It takes more time and hassle for the performers to do the work, but it will be sure that the message will be reach to each and every family, which is much more effective than the regular theatre. These types of popular theatre are conducted by the artist according to the village tradition, culture and language which can give a more positive effect on the minds of the audience . Artist faces many problems out here. Cost is a main factor, where most of the money comes from the government, where the rest had to be collected from the welfare trustees, who donate for the betterment of the people.For every rehearsal the artists had some expenses for make ups, dress, food, lodging, this small cost looks more visible when the artist is performing for quit along time. As the funds are very limited it also crates a negative impact while performing a role. For that the insiders and the outsiders have to talk freely and openly with the particular problem and with the help of the experiences they have to solve it. Most of the people start with his own experience and later notice or study the experience of other artist. (Deb, 323)The analysis part is done between actors, facilitators, animators and even between the insiders and the outsiders. In this type of analysis the issue information is examined in three contexts, that is economical social or political. This issu e should immediately bring to light and the problem had to solve instantly so that the performance gets better. In a popular theatre, one most important point have to be notice that is to convert the major issues into entertainment and that particular entertainment can be in the form of series of work shops, or a play.This type of particular structured entertainment or activities can be done by asking people to take on the role of a group or community unfamiliar to them and then have the feeling and reflect the experience. Thus it is certain that popular theatre like melodrama, folk drama, festivals, calendar celebrations such as; Christmas, Easter, the harvest festival and Halloween, carnivals, clowns, reality TV work highly in the context of mass entertainment. (Dev, 78-81) Conclusion When the artist take on very unfamiliar roles they are forced to learn and find new feelings and experience followed by creative thoughts.Emotions of new thought can be done by incorporating the idea s into the theme. Here practice takes place and the next important stage â€Å"rehearsal for life†, which also provides an opportunity of a new perception. The contributor or audience are said to analyze or resolution of a problem or leave the stage with a provoking question in the mind of the audience so that they can separately analyse and assess the culture and work according to the political scenario. By resolving this type of contradiction the drama reach a new phase and it turns to a new disagreement and so the process becomes continuous.(Dos, 441-442) Bibliography: Zarrilli, Phillip B. McConachie, Bruce A Williams, Gary Jay and Sorgenfrei, Carol Fisher. Theatre Histories: An Introduction. New York and London: Routledge, 2006 Berkowitz, L; Theatre and Man; New Haven and London: Yale University Press. 2006 Border, S; Act I: Fire of the Mind; Wellington: National Book Trust; 2006 Deb, J; Introduction to Russian Acting: Stage for Mankind; Dunedin: ABP Ltd. 2005 Dell, S; Ev aluation of UK Stage; Dunedin: ABP Ltd. 2006 Dos, M; Future of Thought Process in Theatre History; Christchurch: Alliance Publications; 2005

Friday, November 8, 2019

Word Choice Shall vs. Will - Proofeds Writing Tips

Word Choice Shall vs. Will - Proofeds Writing Tips Word Choice: Shall vs. Will The words â€Å"will† and â€Å"shall† can seem a bit confusing. After all, while there is a difference of sorts, they’re both used to express the future tense. Do we really need both, then? The short answer to that question is â€Å"not really.† We don’t really use â€Å"shall† in modern English. However, it is still useful to know the traditional distinction between these terms. Shall (First Person) Traditionally, â€Å"shall† was used to form the future tense in the first person. This means that we use â€Å"shall† with the first-person pronouns â€Å"I† and â€Å"we†: I shall take a walk along the beach after lunch. In modern English, we’d be more likely to say â€Å"I will†¦Ã¢â‚¬  in a sentence like this. However, in very formal or old-fashioned English, â€Å"shall† is technically the correct term to use. â€Å"Shall† can also be used to ask a question in the first person. For instance: Shall we go to the theater tonight? In modern English, though, we’d be more likely to say â€Å"Should we†¦Ã¢â‚¬  in this situation. Will (Second and Third Person) In the second and third person, â€Å"will† is the traditional term used to express the future tense: Will you be home in time for supper? He will miss his train if he doesn’t leave soon. The first sentence above is in the second person and uses the pronoun â€Å"you.† The other sentence is in the third person and uses â€Å"he† (other third-person pronouns include â€Å"she,† â€Å"it,† and â€Å"they†). Except for Emphasis! You know everything we’ve said above? Well, you need to reverse it completely if you’re being emphatic! â€Å"Emphatic† here means making a forceful point. The most famous example of this is from Cinderella, where the Fairy Godmother tells the titular character: You shall go to the ball! Here, we see â€Å"shall† combined with the second-person pronoun â€Å"you.† This is because the Fairy Godmother was being emphatic. This is quite rare, but it is worth remembering in some cases. Cinders: Its a bit small, isnt it?Fairy Godmother: Look, you SHALL go to the ball. Even if I have to force you into my tiny pumpkin carriage. Will or Shall? In around 99.9% of cases, â€Å"will† is correct in modern American English. We simply don’t make the same distinction between â€Å"will† and â€Å"shall† as we used to. The only time you will need to use â€Å"shall† is if you’re being very formal. Probably the most common example of this is legal writing. Nevertheless, it is worth knowing the difference between the traditional uses of these terms. It can be helpful, for example, when you come across â€Å"shall† used in old-fashioned writing. So remember: Shall = First person Will = Second and third person

Wednesday, November 6, 2019

Free Essays on Government vs. Environmentalists vs. Darwin

Government vs. Environmentalists vs. Darwin In an article by Axel Bugge two opinions on what should happen to the Amazon are discussed. One view is that it’s more important to cut down the Amazon due to the growing number of people living in Brazil. The other more vocal side wants to stop any cutting down of the Amazon but at least wants to minimize the amount that is being cut down every year. They don’t want to lose the Amazon that is nicknamed â€Å"the lungs of the planet† for all the oxygen that comes from there (Bugge 1). The Brazilian authorities and large percent of Brazilians know that they should limit the amount of Amazon that is being cut down. They cannot which comes from the problem of population explosion in Brazil. Brazils population has grown from 3.5 million people in 1970 to 20 million people nowadays. This would not be a problem but the Amazon represents more than half Brazil’s territory. Brazilian authorities also face pressures to develop the Amazon. There seems to be a $40 billion government economic development plan, which could possibility, destroy, or heavily damage, up to 42 percent of the Amazon (Bugge 2). On the other side of the argument we have mostly environmentally conscience people. These environmentalists are against the deforestation of the Amazon especially since a piece of the Amazon equal to Rhode Island in size is destroyed every year. This is not that much of the Amazon as a whole especially since the Amazon is an area larger then Western Europe. In the end the feeling is that if we keep cutting down the Amazon at this rate we are losing, as many environmentalists call it, the â€Å"lungs of the planet† since according to them the Amazon produces the vast majority of the earth’s oxygen (Bugge 1). A major problem of deforestation is the vast number of plants and animals living in the Amazon are not only being killed but also are dieing to points of extinction. Already a large... Free Essays on Government vs. Environmentalists vs. Darwin Free Essays on Government vs. Environmentalists vs. Darwin Government vs. Environmentalists vs. Darwin In an article by Axel Bugge two opinions on what should happen to the Amazon are discussed. One view is that it’s more important to cut down the Amazon due to the growing number of people living in Brazil. The other more vocal side wants to stop any cutting down of the Amazon but at least wants to minimize the amount that is being cut down every year. They don’t want to lose the Amazon that is nicknamed â€Å"the lungs of the planet† for all the oxygen that comes from there (Bugge 1). The Brazilian authorities and large percent of Brazilians know that they should limit the amount of Amazon that is being cut down. They cannot which comes from the problem of population explosion in Brazil. Brazils population has grown from 3.5 million people in 1970 to 20 million people nowadays. This would not be a problem but the Amazon represents more than half Brazil’s territory. Brazilian authorities also face pressures to develop the Amazon. There seems to be a $40 billion government economic development plan, which could possibility, destroy, or heavily damage, up to 42 percent of the Amazon (Bugge 2). On the other side of the argument we have mostly environmentally conscience people. These environmentalists are against the deforestation of the Amazon especially since a piece of the Amazon equal to Rhode Island in size is destroyed every year. This is not that much of the Amazon as a whole especially since the Amazon is an area larger then Western Europe. In the end the feeling is that if we keep cutting down the Amazon at this rate we are losing, as many environmentalists call it, the â€Å"lungs of the planet† since according to them the Amazon produces the vast majority of the earth’s oxygen (Bugge 1). A major problem of deforestation is the vast number of plants and animals living in the Amazon are not only being killed but also are dieing to points of extinction. Already a large...

Monday, November 4, 2019

The Role of Insurance Companies and Real Estate Investment Trusts in Assignment

The Role of Insurance Companies and Real Estate Investment Trusts in Serving the Individual, Industry and the Property Market - Assignment Example Insurance is the increasing necessity of today’s life. Insurance companies are the best and the only place that can offer insurance. The increasing importance of the insurance companies can be realized by the fact the increasing role that insurance companies are playing in the lives of the individuals, industry and the market. The role of insurance companies can be categorized as hedging risk and capital formation. Insurance companies are a big help in hedging many different types of risks that can result in minimizing the losses. Another role of an insurance company is to provide and mobilize resources for the development of any country’s economy. The function of any insurance company is to provide insurance to protect individuals, the industries and the markets against losses that they can not afford. The insurance company does this by transferring the risks of the individuals, industries, business and so to itself. The company then reimburses the affected individual for the losses mentioned in the policy or the agreement. In today’s fast-paced world, where there is no time for the individual to look after their health and lives, insurance companies come to aid. How? The need for people to protect themselves against different risks that life offers, the insurance company provides a vast range of products that cater to the needs of different individuals. Some of the products that insurance company offers are health insurance, life insurance and so on. The need for the type of insurance depends on the people and their needs. Like pointed out before, life is full of unexpected surprises. These surprises can either lead to financial profits or financial losses. For instance, whenever anyone drives, there is always a possibility of running into a severe accident either accident of an individual’s life or that of the property.

Friday, November 1, 2019

Effective Advertising Essay Example | Topics and Well Written Essays - 2000 words - 1

Effective Advertising - Essay Example ng on the other hand refers to an advertisement that reaches the target audience specifically and succeeds in influencing them to take particular actions (Homburg, Sabine & Harley, 2009). The particular actions and the expected results of any advertising process are to influence the consumer behavior regarding increasing the sale of products or services. Political advertising as a contemporary type of advertising seeks to achieve the same results by influencing voters to appreciate either a particular candidate or an ideology. Effective advertising requires effective objectives and timelines. Some of the common objectives in advertising include positioning a new brand or product. Such a product requires dedicated advertisement that addresses particular interests of the target audience. Additionally, such an advert must explain the vital features of the product in order to explain the features elaborately including the products’ competitive advantages (Benkler, 2006). Increasing sales, creation of a brand and competitive relations are yet other primary objectives in different advertisements. The advertisers must develop appropriate messages and win particular appeals of the audience. Additionally, the objectives must influence the timing and channels of communication in order to reach a large group of the target audience. This way, the advertiser increases the chances of the messages influencing the consumer behaviors thereby achieving some of the objectives. Irrespective of the objectives of an advert, an effective advert must pursue three fundamental goals that include the presentation of information to both potential consumers and the rest of the public most of who may not be consumers, increasing the demand for the products and differentiating the product. The three are objectives that every advertiser must address when formulating an advert for a particular product. When developing an advert, an advertiser must consider the features of the product that will

Wednesday, October 30, 2019

Life of John D. Rockefeller and his legacy Term Paper

Life of John D. Rockefeller and his legacy - Term Paper Example One may criticize John D. Rockefeller for many things, like being one of the first to have started a monopoly or oligopoly businesses, yet when his services or assistance to communities and nations are taken into accounted, one can also say that his legacy of sustained philanthropy is probably unmatched for longevity and volume of assistance of assistance rendered. Yet not only is his own life is criticized for his role in history but the role of his descendants. John D. Rockefeller’s Standard Oil John D. Rockefeller Sr. , former school dropout and who became perhaps the richest person during his time, is the Rockefeller patriarch or the seed that produced other Rockefellers of great significance and who have equally created their own legacy by sustaining the legacy of John D. Rockefeller Sr. (PBS, 2000). The other Rockefellers who have contributed their important legacies or who have sustained the John D. Rockefeller Sr. Legacy are John D. Rockefeller, Jr. (1874-1960), son of John D. Rockefeller, Sr., and the Rockefeller brothers John III (1906-78), Nelson (1908-1979), Laurance (1910-2004), Winthrop (1912-1973), and David Rockefeller (1915-?), sons of John D. Rockefeller, Jr.The patriarch was â€Å"twenty-three years old and already a success in his profitable commission business when he decided to risk $4,000 in a speculative oil refinery operation in Cleveland† (Armentano, 1981, p. 58). This was probably in 1862. When John D. Rockefeller began his business, both the Petroleum industry and the Standard Oil Company were â€Å"inchoate† (Montague, 1904, p. 4). ... 4). However, according to Armentano (1981, p. 58), â€Å"the firm quickly prospered under the technical direction of Samuel Andrews, and a second refinery was constructed in 1866.† In a short while, â€Å"Maurice Clark, one of the original partners in the firm, was bought out (for $72,500), and Rockefeller brought in his brother William for entrepreneurial know-how and his shrewd and wealthy friend, Henry Flagler, for additional capital† (Armentano, 1981, p. 58). It was only in 1868, however, that John D. Rockefeller deployed his â€Å"complete and undivided attention† to the petroleum business (Armentano, 1981, p. 58). Armentano (1981, p 58) asserted that â€Å"the firm of Rockefeller, Andrews, and Flagler prospered quickly in the intensely competitive industry by the economic excellence of its entire operations.† The firm implemented a business that is relatively unique in the industry during the period. Armentano (1981, p. 58) revealed that â€Å"inste ad of buying oil from jobbers, they made the jobbers’ profit by sending their own purchasing men into the oil region.† Further, â€Å"they made their own sulfuric acid, their own barrels, their own lumber, their own wagons, and their own glue† (Armentano, 1981, p. 58). Armentano documented that that firm â€Å"kept minute and accurate records of ever item from rivets to barrel bungs† (1981, p. 58). In short, what Armentano has tried to narrate is that the firm organized by John D. Rockefeller Sr. implemented vertical integration as well as good management practices. Breakup of Standard Oil and Development Larson (1969) explained that from 1882 to 1950, the Standard Oil Company founded by John D. Rockefeller had been keen on vertical integration. Luck and shrewdness mattered but the oil firm

Monday, October 28, 2019

Primary education Essay Example for Free

Primary education Essay India has made large strides in educating its population of more than a billion people, yet a lot remains to be done. It is commonplace now that education is both intrinsically valuable and also instrumental for economic well-being, and this is true for individuals and entire nations. No country in the world has been able to develop without the spread of mass education. An educated population is a prerequisite for take-off into high economic growth. Table 1 in the appendix shows literacy rates for India as a whole and by sex. It also shows the decadal rates of change from 1901 to the present. 2 Literacy rates have increased for both males and females, and though the latter continues to lag behind the former, there has been a narrowing of the male-female gap in literacy: from 24. 8% in 1991 to 21. 7% in 2001. In 2001, the absolute number of illiterates declined historically for the first time by nearly 32 million. In terms of state-wise performance, Kerala continues to occupy first rank as it has done historically; on the other hand, densely populated states like Uttar Pradesh, Rajasthan and Bihar are yet to overcome their educational inertia. 3 The average figures for India as a whole hide a great deal of variation among states. Table 2 in the appendix provides literacy rates for states for the years 1991 and 2001, for the population as a whole, by sex and also provides the decadal rate of change. In 2001, Kerala, Maharashtra and Himachal Pradesh had more than 75% of their population of 7+ years literate. On the other hand, even in 2001, less than half of Bihar’s population of seven years and above was literate with female literacy rate only 33. 6%. In terms of zones, states in the South and West outperform states in the North and East. 2. Primary Education Primary education refers to the education of children between the ages 6-11 years (grades 1-5). Universalization of Primary Education (UPE) is a constitutional provision in India and there has been a steady expansion in the spread of primary education since Indian independence in 1947. The Indian educational system is the second largest in the world after China. In 2001-02, there were nearly 0. 66 million primary schools in India 1 This study has been undertaken as part of the United Nations Millennium Development Goals Project. 2 Before the 1991 census, only those belonging to the age-group 0-4 years were excluded from the population in order to compute literacy rates and the basis of the computation was the entire population. From the 1991 census onward, literacy rates were computed based on the population aged 7+ years and above. 3 In Bihar, Nagaland and Manipur as well as Delhi and Chandigarh, the absolute number of illiterates has increased in the 1990s. 4 providing access to 84% of habitations with a primary school located within a distance of one kilometer. Between 1997 and 2002, the gross primary school enrolment rate4 for India was 111 for males and 92 for females. The net primary school enrolment rate5 on the other hand was only 78 for males and 64 for females. The net primary school attendance rate between 1999 and 2002 was 79 for males and 73 for females. However, of the children who entered primary school, only 68% reached grade 5 between 1995 and 1999 (UNICEF, 2004). Table 3 provides data on gross primary school enrolments by sex between 1950-51 and 2001-2002. As can be seen from the table there has been a steady increase in the numbers of boys and girls attending primary school over time. In Table 4, state-wise enrolment of boys and girls as a percentage of their age-group is provided for 1997-1998. Girls’ enrolment has been steadily increasing over time and in 2001-02, nearly 45% of girls in the age-group 6-11 were enrolled in school. These statistics are heartening because at least until the 1990s, one of the most dismal aspects of India’s education system was the large percentage of the population in the younger age groups that were out of school. Socio-economic disparities Despite the strong constitutional backing for the provision of primary education in India6 and its expansion over time, the system is characterized not only by low achievements but also by large unevenness of achievements. Huge gaps remain between rural and urban areas, and the probability of getting any education at all sharply depends on gender, caste and income. Women, scheduled castes and tribes and the poor are faced with formidable barriers when it comes to getting basic education. Of the 200 million children in the age group 6-14, it is estimated that 59 million are out of school. Of these 35 million are girls and 24 million are boys (Ministry of Human Development, GOI). Apart from socio-economic determinants, the educational infrastructure and the management and the governance of the educational system in India are far from efficient or sufficient. The government is the largest provider of education in India with only about 10% of primary schools owned by the private sector. 7 The quality of education provided by the public education system is low which translates into low educational abilities even for those who are able to complete primary education cycle. Moreover, there is a lot of ‘waste’ in the educational system with dropout rates as high as 40% for the country as a whole and in some Indian states, they are as high as 75%. Though the number of primary 4 Gross primary school enrolment rate is computed as the number of children enrolled in primary school regardless of age divided by the population of that age group. 5 Net primary school enrolment rate is computed as the number of children in that age group enrolled in primary school divided by the population of that age group. 6 In 2002, the Supreme Court of India decreed that free primary education was a constitutional right. 7 Around 3% of private schools are aided by the government, which makes government intervention in the education sector even greater. 5 schools in the country increased, more than 1 lakh8 habitations still do not have access to a primary school within a distance of one kilometer. Teacher-pupil ratios are inadequate: less than 2 teachers are available in rural areas to teach a class size of around 100 students. Teacher motivation and teaching incentives are also very weak. India perhaps has the highest rate of teacher truancy in the world. Poverty and Education. Empirical evidence strongly shows that, both at the level of the household as well as at the level of the country, there is a positive relationship between income (and wealth) and educational attainment. More income simply means more resources available to spend on the acquisition of education. With more than 250 million people in India living on less than a $1 a day, poverty remains a major barrier to educational access. Although education is provided ‘free’ by the government, the cost of uniforms, textbooks and transportation costs are beyond the reach of many households (Tilak, 2004). Added to these direct costs are the indirect (opportunity) costs of wage/domestic labor which children perform and the costs of acquiring education become considerable for households. Graphs 1 and 2 in the appendix show simple regressions of literacy rates for sixteen states against state poverty rates and state per capita income for 2001. As is expected, literacy rates decline with poverty and rise with per capita incomes. State per capita incomes seem to explain literacy rates better than poverty rates. Filmer and Pritchett (2001) using Demographic Health Survey data for India find that the gap in enrolment between the highest and the lowest wealth class is as much as 52 percentage points. Gupta (2003) using the 52nd round of National Sample Survey data finds that the percentage of people who have completed five years of schooling declines as one descends consumption deciles. In the lowest consumption decile, the proportion of people who have not completed the primary school cycle is greater than 80%. 9 While poverty status and income class are strong determinants of who goes to school and for how long, they do not make up the whole story. Indian states of Kerala and Himachal Pradesh even with fewer resources at their disposal have been able to achieve much better educational and health outcomes compared to rich states such as Punjab and Haryana in India. This is true even when we look at cross-country outcomes. For example, Sri Lanka and Botswana do much better in education and health terms than would be predicted based on their level of resources; the Latin American countries do much worse given their resources (Mehrotra and Jolly, 1998). 8 One lakh is equal to 100,000. 9 These graphs are meant to be illustrative of the association between resources and education and do not claim any direction of causality. The relationship between resources and educational attainment is bidirectional. The poor cannot afford schooling. With little human capital, the opportunities to escape persistent poverty are very restricted and the poor can be trapped in a low education, low income vicious cycle across generations. A large literature has analyzed both theoretically and empirically persistence of poverty inter-generationally due to lack of resources to invest in education.